Skip to main content

Security in Bluetooth Networks and Communications

  • Chapter
Wireless Network Security

Abstract

This chapter is concerned with security management in Bluetooth communication. The chapter begins with description of the development of Bluetooth and its technical specifications. It continues with a discussion of the various network structures that can be developed through Bluetooth. A discussion of Bluetooth security goals leads to a description of the different security models available. We conclude with a discussion of the more prevalent attacks on Bluetooth security and the most widely used procedures for mitigating such attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Scarfone K, Padgette J (2008) Guide to Bluetooth Security: Recommendations of the National Institute of Standards and Technology. Special Publication 800-121, National Institute of Standards and Technology (NIST), U.S. Department of Commerce.

    Google Scholar 

  2. Vainio J (2000) Bluetooth Security. Helsinki University of Technology. http: //www.cse.tkk.fi/fi/opinnot/T-110.5190/2000/bluetooth security/bluesec. html. Accessed 16 June, 2011.

    Google Scholar 

  3. Bialoglowy M (2011) Bluetooth Security Review, Part I. Retrieved from http://www.syman tec.com/connect/articles/bluetooth-security-review-part-1. Accessed, 19 June, 2011.

    Google Scholar 

  4. Bluetooth Special Interest Group (2011) Specification of the Bluetooth System (Core Package version 4). Retrieved from http://www.bluetooth.com. Accessed 6 November, 2011.

    Google Scholar 

  5. Gehramnn C (2011) Bluetooth Security White Paper. Bluetooth SIG Security Expert Group. Retrieved from http://grouper.ieee.org/groups/1451/5/ Comparison%20of%20PHY/Bluetooth 24Security Paper.pdf. Accessed 19 June, 2011.

    Google Scholar 

  6. Bluetooth Security (2011) Retrieved from http://en.wikipedia.org/wiki/ Bluetooth#Security from Wikipedia. Accessed 19 June, 2011.

    Google Scholar 

  7. Shaked Y, Wool A (2005) Cracking the Bluetooth PIN. 3rd USENIX/ACM conf. Mobile Systems, Applications, and Services (MobiSys), pp. 39–50.

    Google Scholar 

  8. Björnsson M (2001) Retrieved from http://www.lysator.liu.se/~martinb/ Bluetooth/Bluetooth in Secure Products.html#Toc520619560. Accessed 19 June, 2011.

    Google Scholar 

  9. El-Hadidi M, Sayegh A (2005) A Modified Secure Remote Password (SRP) Protocol for Key Initialization and Exchange in Bluetooth Systems. International Conference on Security and Privacy for Emerging Areas in Communications Network, pp. 261–269.

    Google Scholar 

  10. Jasobsson M, Wetzel S (2001) SecurityWeaknesses in Bluetooth. CT-RSA’01. LNCS 2020: 176–191. Springer-Verlag, Berlin.

    Google Scholar 

  11. Bakshi A (2007) Bluetooth Secure Simple Pairing. Retrieved from http:// www.wireless designmag.com/PDFs/2007/1207/wd712 coverstory.pdf. Accessed 16 October, 2011.

    Google Scholar 

  12. SIM Access Profile (SAP) (2011) Retrieved from http://www.palowireless. com/infotooth/ tutorial /n12 sap.asp. Accessed 16 October, 2011.

    Google Scholar 

  13. Simple Pairing Whitepaper (2011) Retrieved from http://mclean-linsky. net/joel/cv/Simple% 20Pairing WP V10r00.pdf. Accessed 16 October, 2011.

    Google Scholar 

  14. Pasanen S, Toivanen P, Haataja K, Paivinen N (2010) New Efficient RF Fingerprint-Based Security Solution for Bluetooth Secure Simple Pairing. Hawaii International Conference on System Sciences, pp. 1–8.

    Google Scholar 

  15. Near Field Communication (2011) Retrieved from http://en.wikipedia.org/ wiki/Near field communication. Accessed 16 October, 2011.

    Google Scholar 

  16. What is NFC (2011) Retrieved from http://www.nfc-forum.org/aboutnfc/. Accessed 16 October, 2011.

    Google Scholar 

  17. Xin Y, Ting Y (2009) A Security Architecture Based on User Authentication of Bluetooth. International forum on Information Technology and Applications, pp. 627–629.

    Google Scholar 

  18. Rowe M, Hurman T (2011) Bluetooth Security: Issues, threats and consequences. Retrieved from http://www.pentest.co.uk/documents/wbf slides.pdf. Accessed 19 June, 2011.

    Google Scholar 

  19. Bluetooth Security Mechanisms (2011) Seguridad Mobile. Retrieved from http://www.seg uridadmobile.com/bluetooth/bluetooth-security/securitymechanisms. html. Accessed 19 June, 2011.

    Google Scholar 

  20. Levy O, Wool A (2005) A Uniform Framework for Cryptanalysis of the Bluetooth E0 Cipher. 1st International Conference on Security and Privacy for Emerging Areas in Communication Networks (SecureComm), pp. 365–373.

    Google Scholar 

  21. Shaked Y, Wool A (2006) Cryptanalysis of the Bluetooth E0 Cipher using OBDD’s. 9th Information Security Conference, LNCS 4176: 187–202.

    Google Scholar 

  22. Dunning J (2010) Taming the Blue Beast: A survey of Bluetooth Based Threats. IEEE Security and Privacy, pp. 20–27.

    Google Scholar 

  23. Laurie A, Holtmann M, HeMrfurt M (2011) Bluetooth Hacking: The State of the Art. Retrieved from http://trifinite.org/Downloads/trifinite.presentation 22c3 berlin.pdf. Accessed 10 June, 2011.

    Google Scholar 

  24. Becker A (2011) Bluetooth Security & Hacks. Retrieved from http://gsyc.es/ ≈anto/ubicuos2/bluetooth security and hacks.pdf. Accessed 19 June, 2011.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Higher Education Press, Beijing and Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Chen, L., Cooper, P., Liu, Q. (2013). Security in Bluetooth Networks and Communications. In: Wireless Network Security. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36511-9_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-36511-9_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-36510-2

  • Online ISBN: 978-3-642-36511-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics