SlideShare uma empresa Scribd logo
1 de 35
SECURITY IN
BLUETOOTH, CDMA AND
       UMTS



MOTILAL NEHRU NATIONAL INSTITUTE OF TECHNOLOGY
                  ALLAHABAD
BLUETOOTH
   System for short range wireless communication
   Wireless data transfer via ACL link
   Data rates up to 3 Mb/s
   2.4 GHz ISM band (Industrial Scientific Medicine)
   Typical communication range is 10-100 meters
   Bluetooth SIG (Special Interest Group) developed the
    technology
SECURITY THREATS

   Disclosure Threat
   Integrity Threat
   Denial of Service (DoS)
ATTACKS

   Snarf Attack
   Backdoor Attack
   BlueBug Attack
   BlueJack Attack
   Denial of Service Attack
   BluePrinting Attack
SECURITY LEVELS AND MODES
Security Levels:
   Silent
   Private
   Public
Security Modes:
   Non Secure
   Service Level Enforced Security
   Link Level Enforced Security
AUTHENTICATION,
AUTHORIZATION , ENCRYPTION

   Authentication is the process of proving the identity of
    one piconet member to another
   Authorization determines whether the user is authorized
    to have access to the services provided
   Encryption is the process of encoding the information so
    that no eavesdropper can read it
SECURITY OPERATIONS
AUTHENTICATION
AUTHORIZATION
ENCRYPTION

   Encryption Mode 1
   Encryption Mode 2
   Encryption Mode 3
ENCRYPTION PROCEDURE
KNOWN VULNERABILITIES

   Spoofing through Keys
   Spoofing through a Bluetooth Address
   PIN Length
COUNTERMEASURES
   Know your Environment
   Be Invisible
   Abstinence is best
   Use   only     long   PIN    codes   (16   case   sensitive
    alphanumerical characters)
   Requiring Authentication for every L2CAP request
   Using additional security at software level and an
    additional password to physically protect the Bluetooth
    devices
COUNTERMEASURES CONTD…
   Requiring re authentication always prior to access of a
    sensitive information / service
   To prevent Man-in-the-middle attack, approach is to
    make it difficult for an attacker to lock onto the
    frequency   used    for   communication.   Making   the
    frequency hopping intervals and patterns reasonably
    unpredictable might help to prevent an attacker from
    locking onto the devices signal.
PROPOSED SOLUTION FOR DOS
            ATTACK
   When the pairing message is sent by one device
   When the attacker is sending the message with the
    address, which is already connected to Bluetooth device
   When the pairing message sent by more than one device
   When the attacker is changing the Bluetooth address of
    itself with another Bluetooth address
UMTS security
UMTS system architecture (R99) is
based on GSM/GPRS
POSSIBLE ATTACKS ON UMTS

 Denial of service
    Identity catching
    Impersonation of the network
   Impersonation of the user
3G SECURITY FEATURES
   „ Mutual Authentication
       The mobile user and the serving network authenticate
    each other
   „ Data Integrity
     Signaling messages between the mobile station and RNC
     protected by integrity code
    Network to Network Security
     Secure communication between serving networks. IPsec
    suggested
     Secure IMSI (International Mobile Subscriber
    Identity) Usage
       The user is assigned a temporary IMSI by the serving
    network
3G SECURITY FEATURES
              CONTD…
   „ User – Mobile Station Authentication
     The user and the mobile station share a secret key, PIN
   „ Secure Services
     Protect against misuse of services provided by the home
    network and the serving network
   „ Secure Applications
     Provide security for applications resident on mobile
    station
AUTHENTICATION AND KEY
             AGREEMENT
   „ AuC and USIM share
       permanent secret key K
       Message authentication functions f1, f1*, f2
       key generating functions f3, f4, f5
   „ AuC has a random number generator
   „ AuC has scheme to generate fresh sequence numbers
   „ USIM has scheme to verify freshness of received
AUTHENTICATION AND KEY
            AGREEMENT home
  128 bit secret key K is shared between the
               network and the mobile user

Home Network                                 Mobile station
Complete Message flow for
successful AKA
Encryption
Integrity Check
NETWORK DOMAIN SECURITY
   IPSec
      IP traffic between networks can be protected with
       IPSEC between security gateways

   Encapsulating Security Payload (ESP) is used for
    protection of packets
   ESP is always used in tunnel mode
   Advance Encryption Standard (AES)
CDMA
CODE DIVISION MULTIPLE ACCESS
            (CDMA)
   Channel    access   method     used   by   various   radio
    communication technology
   Employs spread spectrum technology and a special
    coding scheme
   Attacks are very difficult and rare
DIFFERENCE BETWEEN CDMA,
     TDMA AND FDMA
TYPES OF CDMA

   Frequency Hopping Spread Spectrum CDMA
   Direct Sequence Spread Spectrum CDMA
SECURITY

   By design, CDMA technology makes eavesdropping very
    difficult
   42-bit PN (Pseudo Random Noise) sequence
   64-bit authentication key (A-Key)
   Electronic Serial Number (ESN) of the mobile
AUTHENTICATION
AUTHENTICATION MODEL
ENCRYPTION
Thank You!!!!!

Mais conteúdo relacionado

Mais procurados

Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesJohn Rhoton
 
Security in wireless cellular network
Security in wireless cellular networkSecurity in wireless cellular network
Security in wireless cellular networkAwais Mansoor Chohan
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsAirTight Networks
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudyMohammad Mahmud Kabir
 
BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITYJay Nagar
 
Wireless network security
Wireless network security Wireless network security
Wireless network security Aurobindo Nayak
 
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2Djadja Sardjana
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaOWASP Delhi
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan securityAnkit Anand
 
Wireless Security
Wireless SecurityWireless Security
Wireless SecuritysiDz
 
An IDS for Secure Visible Light Communication on Android Devices
An IDS for Secure Visible Light Communication on Android DevicesAn IDS for Secure Visible Light Communication on Android Devices
An IDS for Secure Visible Light Communication on Android DevicesBen Graham
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprisesshrutisreddy
 

Mais procurados (20)

Wifi Security
Wifi SecurityWifi Security
Wifi Security
 
Windows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best PracticesWindows Mobile Enterprise Security Best Practices
Windows Mobile Enterprise Security Best Practices
 
Security in wireless cellular network
Security in wireless cellular networkSecurity in wireless cellular network
Security in wireless cellular network
 
Understanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and SolutionsUnderstanding WiFi Security Vulnerabilities and Solutions
Understanding WiFi Security Vulnerabilities and Solutions
 
Wifi hacking
Wifi hackingWifi hacking
Wifi hacking
 
Wireless Hacking
Wireless HackingWireless Hacking
Wireless Hacking
 
Security & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case StudySecurity & Privacy in WLAN - A Primer and Case Study
Security & Privacy in WLAN - A Primer and Case Study
 
BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITY
 
Presentation
PresentationPresentation
Presentation
 
Telecom Security
Telecom SecurityTelecom Security
Telecom Security
 
Wireless network security
Wireless network security Wireless network security
Wireless network security
 
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
Widyatama Lecture Applied Networking IV Week06 Mobile Security 2
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj Verma
 
Wireless lan security
Wireless lan securityWireless lan security
Wireless lan security
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wireless Security
Wireless SecurityWireless Security
Wireless Security
 
Wireless Lan Security
Wireless Lan SecurityWireless Lan Security
Wireless Lan Security
 
An IDS for Secure Visible Light Communication on Android Devices
An IDS for Secure Visible Light Communication on Android DevicesAn IDS for Secure Visible Light Communication on Android Devices
An IDS for Secure Visible Light Communication on Android Devices
 
Wlan security
Wlan securityWlan security
Wlan security
 
Wireless Security Needs For Enterprises
Wireless Security Needs For EnterprisesWireless Security Needs For Enterprises
Wireless Security Needs For Enterprises
 

Destaque

Destaque (6)

A luxurious world of exception....
A luxurious world of exception....A luxurious world of exception....
A luxurious world of exception....
 
Bluetooth Aplication
Bluetooth AplicationBluetooth Aplication
Bluetooth Aplication
 
Bluetooth & cdma technology
Bluetooth & cdma technologyBluetooth & cdma technology
Bluetooth & cdma technology
 
Big data ppt
Big data pptBig data ppt
Big data ppt
 
Big data ppt
Big  data pptBig  data ppt
Big data ppt
 
cloud computing ppt
cloud computing pptcloud computing ppt
cloud computing ppt
 

Semelhante a Security in bluetooth, cdma and umts

Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksNaveen Kumar
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction SecurityMeet Soni
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionADVA
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device SecurityJohn Rhoton
 
124647123-Bluetooth.ppt
124647123-Bluetooth.ppt124647123-Bluetooth.ppt
124647123-Bluetooth.pptMEGHAB26
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentationNitesh Dubey
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxadolphoyonker
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2sweta dargad
 
Case study about voip
Case study about voipCase study about voip
Case study about voipelmudthir
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for SmartphoneEditor IJMTER
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingIJMER
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkSteven Wallach
 

Semelhante a Security in bluetooth, cdma and umts (20)

Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
 
Cdma Security
Cdma SecurityCdma Security
Cdma Security
 
Mobile security
Mobile securityMobile security
Mobile security
 
B010331019
B010331019B010331019
B010331019
 
Wireless Communiction Security
Wireless Communiction SecurityWireless Communiction Security
Wireless Communiction Security
 
Making networks secure with multi-layer encryption
Making networks secure with multi-layer encryptionMaking networks secure with multi-layer encryption
Making networks secure with multi-layer encryption
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
124647123-Bluetooth.ppt
124647123-Bluetooth.ppt124647123-Bluetooth.ppt
124647123-Bluetooth.ppt
 
wireless communication security PPT, presentation
wireless communication security PPT, presentationwireless communication security PPT, presentation
wireless communication security PPT, presentation
 
Wireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docxWireless Security and Mobile DevicesChapter 12Princi.docx
Wireless Security and Mobile DevicesChapter 12Princi.docx
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Case study about voip
Case study about voipCase study about voip
Case study about voip
 
A Survey on Communication for Smartphone
A Survey on Communication for SmartphoneA Survey on Communication for Smartphone
A Survey on Communication for Smartphone
 
Security in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using BroadcastingSecurity in Wireless Sensor Networks Using Broadcasting
Security in Wireless Sensor Networks Using Broadcasting
 
Accessing remote networks
Accessing remote networksAccessing remote networks
Accessing remote networks
 
Analysis Of Security In Wireless Network
Analysis Of Security In Wireless NetworkAnalysis Of Security In Wireless Network
Analysis Of Security In Wireless Network
 
Security model evaluation of 3 g
Security  model  evaluation  of  3 gSecurity  model  evaluation  of  3 g
Security model evaluation of 3 g
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
CNS UNIT-VI.pptx
CNS UNIT-VI.pptxCNS UNIT-VI.pptx
CNS UNIT-VI.pptx
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 

Último

Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...JojoEDelaCruz
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationRosabel UA
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxruthvilladarez
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEaurabinda banchhor
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)lakshayb543
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsRommel Regala
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxElton John Embodo
 

Último (20)

Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in one’s own words. Use appropr...
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Activity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translationActivity 2-unit 2-update 2024. English translation
Activity 2-unit 2-update 2024. English translation
 
TEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docxTEACHER REFLECTION FORM (NEW SET........).docx
TEACHER REFLECTION FORM (NEW SET........).docx
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Dust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSEDust Of Snow By Robert Frost Class-X English CBSE
Dust Of Snow By Robert Frost Class-X English CBSE
 
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
Visit to a blind student's school🧑‍🦯🧑‍🦯(community medicine)
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
The Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World PoliticsThe Contemporary World: The Globalization of World Politics
The Contemporary World: The Globalization of World Politics
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
EMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docxEMBODO Lesson Plan Grade 9 Law of Sines.docx
EMBODO Lesson Plan Grade 9 Law of Sines.docx
 

Security in bluetooth, cdma and umts

  • 1. SECURITY IN BLUETOOTH, CDMA AND UMTS MOTILAL NEHRU NATIONAL INSTITUTE OF TECHNOLOGY ALLAHABAD
  • 2. BLUETOOTH  System for short range wireless communication  Wireless data transfer via ACL link  Data rates up to 3 Mb/s  2.4 GHz ISM band (Industrial Scientific Medicine)  Typical communication range is 10-100 meters  Bluetooth SIG (Special Interest Group) developed the technology
  • 3. SECURITY THREATS  Disclosure Threat  Integrity Threat  Denial of Service (DoS)
  • 4. ATTACKS  Snarf Attack  Backdoor Attack  BlueBug Attack  BlueJack Attack  Denial of Service Attack  BluePrinting Attack
  • 5. SECURITY LEVELS AND MODES Security Levels:  Silent  Private  Public Security Modes:  Non Secure  Service Level Enforced Security  Link Level Enforced Security
  • 6. AUTHENTICATION, AUTHORIZATION , ENCRYPTION  Authentication is the process of proving the identity of one piconet member to another  Authorization determines whether the user is authorized to have access to the services provided  Encryption is the process of encoding the information so that no eavesdropper can read it
  • 10. ENCRYPTION  Encryption Mode 1  Encryption Mode 2  Encryption Mode 3
  • 12. KNOWN VULNERABILITIES  Spoofing through Keys  Spoofing through a Bluetooth Address  PIN Length
  • 13. COUNTERMEASURES  Know your Environment  Be Invisible  Abstinence is best  Use only long PIN codes (16 case sensitive alphanumerical characters)  Requiring Authentication for every L2CAP request  Using additional security at software level and an additional password to physically protect the Bluetooth devices
  • 14. COUNTERMEASURES CONTD…  Requiring re authentication always prior to access of a sensitive information / service  To prevent Man-in-the-middle attack, approach is to make it difficult for an attacker to lock onto the frequency used for communication. Making the frequency hopping intervals and patterns reasonably unpredictable might help to prevent an attacker from locking onto the devices signal.
  • 15. PROPOSED SOLUTION FOR DOS ATTACK  When the pairing message is sent by one device  When the attacker is sending the message with the address, which is already connected to Bluetooth device  When the pairing message sent by more than one device  When the attacker is changing the Bluetooth address of itself with another Bluetooth address
  • 17. UMTS system architecture (R99) is based on GSM/GPRS
  • 18. POSSIBLE ATTACKS ON UMTS  Denial of service  Identity catching  Impersonation of the network  Impersonation of the user
  • 19. 3G SECURITY FEATURES  „ Mutual Authentication The mobile user and the serving network authenticate each other  „ Data Integrity Signaling messages between the mobile station and RNC protected by integrity code  Network to Network Security Secure communication between serving networks. IPsec suggested  Secure IMSI (International Mobile Subscriber Identity) Usage The user is assigned a temporary IMSI by the serving network
  • 20. 3G SECURITY FEATURES CONTD…  „ User – Mobile Station Authentication The user and the mobile station share a secret key, PIN  „ Secure Services Protect against misuse of services provided by the home network and the serving network  „ Secure Applications Provide security for applications resident on mobile station
  • 21. AUTHENTICATION AND KEY AGREEMENT  „ AuC and USIM share  permanent secret key K  Message authentication functions f1, f1*, f2  key generating functions f3, f4, f5  „ AuC has a random number generator  „ AuC has scheme to generate fresh sequence numbers  „ USIM has scheme to verify freshness of received
  • 22. AUTHENTICATION AND KEY AGREEMENT home 128 bit secret key K is shared between the network and the mobile user Home Network Mobile station
  • 23. Complete Message flow for successful AKA
  • 26. NETWORK DOMAIN SECURITY  IPSec  IP traffic between networks can be protected with IPSEC between security gateways  Encapsulating Security Payload (ESP) is used for protection of packets  ESP is always used in tunnel mode  Advance Encryption Standard (AES)
  • 27. CDMA
  • 28. CODE DIVISION MULTIPLE ACCESS (CDMA)  Channel access method used by various radio communication technology  Employs spread spectrum technology and a special coding scheme  Attacks are very difficult and rare
  • 29. DIFFERENCE BETWEEN CDMA, TDMA AND FDMA
  • 30. TYPES OF CDMA  Frequency Hopping Spread Spectrum CDMA  Direct Sequence Spread Spectrum CDMA
  • 31. SECURITY  By design, CDMA technology makes eavesdropping very difficult  42-bit PN (Pseudo Random Noise) sequence  64-bit authentication key (A-Key)  Electronic Serial Number (ESN) of the mobile