Wednesday, October 13, 2010

What It Is Bluetooth and How It Works?

I know many experienced computer users never give an idea of Bluetooth. "Oh, yes, I think that's built into my laptop, but I have never" is a common refrain. Originally as a technology that eventually the horrors of multiple cables and cords-free, non-Bluetooth succeeded regarded as fast as expected. Until recently, many are simply not useful (with emphasis on "Utility") Bluetooth devices available - at least not for desktop computing. Users of handheld computers (like my iPaq), the technology faster and allows us to easily portable keyboards, headsets, printers, (do the often determine not to be a lot of connections, including desktops and laptops), etc. in our portable devices. Bluetooth phones allow you to connect a PDA or laptop to the Internet through it.
<span class="fullpost">
Bluetooth was developed using the Personal Area Network (PAN) - a way for devices to communicate in relative proximity to each other wirelessly. Bluetooth transmission range of about 1 meter to 100 meters, depending on the nature of the performance of the unit. Therefore, the most powerful (Class 1) can communicate over a distance of about 300 meters, similar to a typical Wi-Fi network.

Such as 802.11b and g, Bluetooth transmits in the radio frequency of 2.4 GHz, its speed to about 1 Mbit / s (much slower than Wi-Fi, but more or less equivalent to limited with a typical broadband Internet connection). Using LMP (Link Manager Protocol) to manage connections between devices.
Bluetooth vulnerabilities

Bluetooth can be in one of three levels of security work types:

1. is not security.
2. provides security at the level of service, after the channel established.
3. provides security at the link level, before the channel is established.

Every Bluetooth device has a unique 48-bit address of the device.The authentication scheme is the challenge-response, using symmetric keys, and encryption with a key are to (negotiated by communication devices, each device having a defined maximum key length) to 128 bits done. A 128-bit random key link handles securities transactions between two or more devices.

When two Bluetooth devices establish a communication channel to create both an initialization key. A password or personal identification number is the key and initialization is created and the link key is using. Then the link key is used for authentication.

The first vulnerability is the password or PIN. As with primary key, much safer than short ones. If an attacker is able to discover the password, you can calculate the possible key to the introduction and then calculating the binding key. Make the password long will it much more difficult to carry out the first step.

The initial key exchange is done through an encrypted connection made that was it particularly vulnerable. It is best if this part of the BT device pairing takes place in a physically secure (ie, where it is unlikely that viewers with BT devices that could intercept the communication). A hacker can record broadcasts sent on the incidence of BT and use them to re-create the PIN.

Instead of using the same password all the time, it should be changed frequently (how often depends on the type of equipment required and the level of security.)

Link buttons can be a combination of keys or the keys of the device. The best security is the practice to use the arrow keys instead of combination units. When using a unit must use the same key for all secure transactions, and the key must be shared with other trusted devices. This means that each device can recognize familiar intercourse with other trusted devices access to this key.

You can identify the Bluetooth address to a specific device (and associated users) and recording of transactions, which create problems of privacy.
Why Does Bluetooth Security?

Many users only use Bluetooth technology to a wireless headset or similar device to connect their laptops, and one wonders why security is a big deal. Implementation of security, even for such couples, the device allows a user to prevent unauthorized use of headphones.

Another use of Bluetooth is to create a temporary computer network. For example, multiple people can connect to a conference room in your Bluetooth-enabled laptops together to share files in the session.

If you use Bluetooth to create a temporary network, it is usually ad-hoc network, ie computers communicate directly with each other rather than in a Wireless Access Point (WAP). This means you have no central point of control of security, as there is with a WAP browser (such as a WAP can add MAC address filtering and other built-in security mechanisms) does. Therefore, the security is a concern because it can expose sensitive data stored on your laptop to others in the Bluetooth network. Remember that the range for Class 1 Bluetooth devices can be over 300 meters - enough so that, at some points, the equivalent of BT Wireless from the "war drivers" fi, but not to connect to the Team to see.

Another special concern is the safety of mobile phones. These phones can access their stored information such as addresses and phone numbers of contacts, calendar and other PDA data. Hacking on these phones using Bluetooth is called Bluesnarfing. Latest phones and software updates for older phones can affect patch this vulnerability.

A related technique called Bluebugging hacking, and attempts to access your commands so that the hacker actually calling add or delete contact information or eavesdrop on conversations of the participants. This vulnerability is included for handset manufacturers. If you are a BT-enabled phone, which is important for the software updated or extended with the latest mobile phone models are often our own.

Bluetooth devices may also be subject to Denial of Service (DoS), typically by bombarding the device with applications to the point that makes the battery degrades.

Finally, there are "mobile worms" as Cabir can use Bluetooth technology to spread to other BT devices. Cabir targets phones that use the operating system simbian.

The relatively short range of most Bluetooth devices to mitigate the risk of most of these vulnerabilities. For example, in the practice Bluebugging Bluesnarfing or against a BT phone, the hacker would usually within 10 meters (slightly less than 33 feet) are from your destination.

</span>

No comments:

Post a Comment