Difference between revisions of "Bluetooth Security Features"
Jump to navigation
Jump to search
(Created page with "== Summary == '''This Page is work in progress please come back later.''' This documentation is about the security features of Bluetooth Classic and Bluetooth Low Energy....") |
|||
Line 3: | Line 3: | ||
'''This Page is work in progress please come back later.''' | '''This Page is work in progress please come back later.''' | ||
This documentation is about the security features of Bluetooth Classic and Bluetooth Low Energy. | This documentation is a survey about the security features of Bluetooth Classic and Bluetooth Low Energy. | ||
== Basic Security Services == | == Basic Security Services == |
Revision as of 12:18, 4 February 2020
Summary
This Page is work in progress please come back later.
This documentation is a survey about the security features of Bluetooth Classic and Bluetooth Low Energy.
Basic Security Services
- Authentication: verifies the identity of communicating devices based on their Bluetooth address. User authentication is not provided by the Bluetooth Specification.
- Confidentiality: prevents eavesdropping of the transmitted data by an untrusted third person in the piconet. Confidentiality is created by data encryption.
- Authorization: controls the access of the resources. It assures that only authorized devices get permitted to access a service.
- Message Integrity: checks if the data was altered during the transmission.
- Pairing/Bonding: creates shared secret keys to use them in subsequent connections.
Bluetooth Classic Security
Security Mode 1
Security Mode 2
Security Mode 3
Security Mode 4
- Layer 0:
- Layer 1:
- Layer 2:
- Layer 3:
- Layer 4:
Bluetooth Low Energy Security
WIP
WIP
WIP
WIP WIP
WIP
WIP
- WIP
- WIP
- WIP
Courses
- A course where this documentation was used (2017, 2018)
- Another one (2018)