Difference between revisions of "Bluetooth Security Features"

From Embedded Lab Vienna for IoT & Security
Jump to navigation Jump to search
Line 30: Line 30:
== Bluetooth Low Energy Security  ==
== Bluetooth Low Energy Security  ==


WIP
=== WIP ===
WIP
WIP
WIP
=== WIP ===
WIP
* WIP
* WIP
* WIP


== Courses ==
== Courses ==

Revision as of 12:34, 4 February 2020

Summary

This Page is work in progress please come back later.

This documentation is a survey about the security features of Bluetooth Classic and Bluetooth Low Energy.

Basic Security Services

  • Authentication: verifies the identity of communicating devices based on their Bluetooth address. User authentication is not provided by the Bluetooth Specification.
  • Confidentiality: prevents eavesdropping of the transmitted data by an untrusted third person in the piconet. Confidentiality is created by data encryption.
  • Authorization: controls the access of the resources. It assures that only authorized devices get permitted to access a service.
  • Message Integrity: checks if the data was altered during the transmission.
  • Pairing/Bonding: creates shared secret keys to use them in subsequent connections.

Bluetooth Classic Security

Bluetooth Classic defines encryption and authentication during two different stages of the communication setup. The stages can be differed in Link-level and Service-level. Link-level enforced security features occur before the Bluetooth physical link is fully established. Service-level enforced security features occur after the physical link is already established and while the logical link gets established.Security mode one to the three were defined before Bluetooth version 2.1 came out. Bluetooth version 2.1 added the fourth security mode.

Security Mode 1

Security Mode 2

Security Mode 3

Security Mode 4

  • Layer 0:
  • Layer 1:
  • Layer 2:
  • Layer 3:
  • Layer 4:

Bluetooth Low Energy Security

Courses

References