Overview of security knowledge used by Bluetooth

The DHS 4300A Series Manual was launched by the US Department of Homeland Security to guide the safe use of wireless technology in sensitive systems. The manual includes specifications for many wireless technologies such as RFID and Bluetooth. Next, we will use Bluetooth technology as an example to analyze the manual requirements for Bluetooth technology in this manual. DHS 4300A – Q6 (Bluetooth Security) was released on December 15, 2014. The main purpose of the document is to ensure a minimum security benchmark when installing, configuring, using, and managing Bluetooth-enabled devices.

Figure 1 DHS 4300A Sensitive System Manual

Introduction to Bluetooth technology

Bluetooth is a wireless open standard technology for exchanging voice or data between short-range devices without interconnecting cables. The effective range varies depending on propagation conditions, material coverage, antenna configuration, battery condition, etc., but most Bluetooth devices have an effective range of 10 m or less. The technology has been integrated into many types of devices, including cell phones, laptops, printers, keyboards, mice, and headsets, and is primarily used to create self-organizing wireless personal area networks (WPANs) between devices. . Bluetooth versions 1.1 and 1.2 only support transmission speeds of up to 1 Mbps, called Basic Rate (BR), and can achieve a payload throughput of approximately 720 kbps. The Enhanced Data Rate (EDR) introduced in Version 2.0 specifies a data rate of up to 3 Mbps and a throughput of approximately 2.1 Mbps.

Figure 2 Ad hoc Bluetooth network

An example of the ability of Bluetooth technology to enhance department staff's ability to perform tasks and business needs is given in the document:

● Tablet Bluetooth keyboard in the office environment;

● Bluetooth headset for office personnel;

● Bluetooth PIV card reader;

● hands-free mobile phone used in the car;

● Transfer data between the checkpoint basic unit and the mobile device;

● Collect fingerprints of suspects or interested parties encountered at the scene during law enforcement or investigation.

As can be seen from the above, the demand for Bluetooth technology is very urgent, and Bluetooth has obvious advantages in ease of use compared to cable devices and peripheral devices.

Bluetooth technology security issues

But like any wireless technology, Bluetooth communication is vulnerable to a variety of threats. Because the technology has used a variety of chipset, operating system, and physical device configurations, this results in a number of different secure programming interfaces and default settings. These complexities are added to wireless communications, meaning that Bluetooth is susceptible to general wireless threats and inherent vulnerabilities. Common attacks include:

●Bluebugging: The attacker controls the phone, can make calls, tap phone conversations, read contacts and calendars, etc.

●Bluejacking: Send anonymous, unsolicited messages to phones with Bluetooth devices and make them invisible;

●BlueprinTIng: remotely collect fingerprints of Bluetooth devices;

●BlueSmack: Performs a denial of service attack via a Bluetooth connection, making the device unavailable;

●Bluesnarfing: gives attackers full access to calendars, contacts, emails and text messages;

● BlueStumbling: Allows an attacker to find and identify users based on their Bluetooth device address.

The Bluetooth specification includes four security modes that provide different ways and different levels of protection.

Safe mode 1

Devices using Safe Mode 1 are considered unsafe. In this secure mode, security features (authentication and encryption) never start, so devices and connections are vulnerable. In fact, the Bluetooth device in this mode is "indiscriminate" and does not use any mechanism to prevent other Bluetooth devices from establishing a connection. If the remote device initiates a pairing, authentication or encryption request, the secure mode 1 device will accept the request without any authentication. Due to its high degree of vulnerability, the document states that DHS must not use Safe Mode 1.

Safe mode 2

Security Mode 2 is a Service Level Mandatory Security Mode that can initiate a security procedure after the link is established but before the logical channel is established. In this secure mode, the local security manager controls access to specific services. Access control and interfaces to other protocols and device users are maintained by a separate centralized security manager. This policy can restrict access by defining different security policies and trust levels for applications running in parallel with different security requirements, and grant access to certain services without providing access to other services. In this mode, the concept of authorization (the process of determining whether a particular device allows access to a particular service) is introduced.

Safe mode 3

Safe Mode 3 provides the best security. It is a link-level mandatory security mode in which the Bluetooth device initiates a security process before the link is fully established. A Bluetooth device operating in Safe Mode 3 authorizes authentication and encryption for all connections to the device. Therefore, the discovery of services cannot even be performed until authentication, encryption, and authorization are performed. Once the device is authenticated, the service level authorization is typically not performed by the secure mode 3 device. When an authenticated remote device uses a Bluetooth service without knowing the local device owner, the service level authorization should be enforced to prevent "authentication abuse."

Safe mode 4

Security Mode 4 uses Secure Simple Pairing (SSP), in which the EllipTIc Curve Diffie-Hellman (ECDH) key protocol replaces the outdated key protocol when the link key is generated.

Guidance for improving the security of Bluetooth technology

In order to improve the security of Bluetooth technology as much as possible, the document gives guidance from three aspects: management, technology, and operation deployment.

The best way to manage

● Ensure that Bluetooth users understand the security-related responsibilities associated with Bluetooth use and provide a range of precautions to better protect handheld Bluetooth devices from theft;

● Enable Bluetooth only when necessary (for example, turn off Bluetooth on a mobile device and turn off the headset when not in use);

● When the Bluetooth link is active, try to reduce the distance between Bluetooth link devices;

● Minimize the duration of voice calls;

● Minimize the chance of signal interception and maximize the distance from other Bluetooth devices, other people and untrusted areas;

● When pairing, the mobile device will try to find other Bluetooth-enabled devices. Always verify and confirm the device you are pairing with. If you get an unexpected prompt, please do not enter your password;

● Remove lost, stolen or unused devices from the list of paired devices;

● Conduct a comprehensive security assessment on a regular basis to fully understand the Bluetooth security status;

● Ensure that the wireless devices and networks involved in Bluetooth technology are fully understood from an architectural perspective and record accordingly;

● maintain a complete list of all Bluetooth devices and addresses;

● Individuals track the progress of Bluetooth security products and standards and the threats and vulnerabilities of technology in a timely manner.

Technical best method

●Change the default settings of the Bluetooth device;

● Set Bluetooth power to the lowest available to minimize the signal range. The minimum Bluetooth power used should be sufficient to maintain communication between authorized users;

● Choose a PIN code that is long enough, random, and private to avoid static and weak PINs (such as all zeros);

● Make sure the link key is not based on the unit key. Using shared unit keys can lead to successful spoofing, man-in-the-middle attack (MITM) and eavesdropping attacks;

• Use a random and unique key for each set of paired devices based on the key entry association model. If a static key is used for multiple sets of paired devices, the MITM protection provided by the key entry association model will be reduced;

Lock the Bluetooth stack on each device to ensure that only required and approved profiles and services are available, disabling unwanted and unapproved services;

● Set the Bluetooth device to be undiscoverable by default and remain unrecognizable unless pairing is required. The default Bluetooth device name sent during discovery service should be changed to a non-identification value;

● Link encryption for all Bluetooth connections and use it to protect all data transmissions during Bluetooth connections, otherwise the transmitted data is vulnerable to eavesdropping;

● If you are using multi-hop wireless communication, be sure to enable encryption on each link in the communication link. An insecure link will affect the entire communication chain;

● Ensure that mutual device authentication is performed for all connections;

• Configure the encryption key size to the maximum allowed (128 bits). Use the maximum allowed key to prevent brute force attacks;

Best practices for operation and deployment

● Make sure the Bluetooth function is disabled when not in use. Bluetooth should be disabled on all devices unless the user explicitly enables Bluetooth to establish a connection. This minimizes potential malicious activity. For devices that do not support disabling Bluetooth (such as headsets), the entire device should be turned off when not in use;

● Pair as often as possible. Ideally, in a secure zone, an attacker cannot actually observe a key entry or intercept a Bluetooth pairing message. The user should not respond to any message requesting a PIN unless the user has initiated pairing and it is determined that one of the user's devices has sent a PIN request. Pairing is a vital security feature that requires users to maintain a basic security awareness of possible eavesdropping;

• Basic Rate/Enhanced Data Rate (BR / EDR) Service Level Security Mode (ie, Security Mode 2 or 4) can only be used in controlled and good known environments. Safe Mode 3 provides the best security;

● Make sure that the portable device with Bluetooth interface is configured with a password or a PIN that enables access. This helps prevent unauthorized access if the device is lost or stolen;

● If the Bluetooth device is lost or stolen, the user should immediately delete the lost device from the list of paired devices of all other Bluetooth devices;

● Install anti-virus software on Bluetooth-enabled hosts that support host-based security software;

● Comprehensive testing and regular deployment of Bluetooth software and firmware patches and upgrades;

● Do not accept any transmissions from unknown or suspicious devices. These types of transmissions usually include messages, files and images;

● Before you deploy, fully understand the impact of deploying any security features or products.

to sum up

Wireless communication technology facilitates all aspects of life and work, but it also introduces more security risks. It is extremely important to use wireless communication technology reasonably and legally within a standardized security framework. This article starts with the DHS 4300A series manual and provides guidance for the use of Bluetooth technology in sensitive systems to protect the development of Bluetooth technology.

Wireless Power Banks

Wireless Charging Power Banks,Fast Charging Wireless Power Bank,Power Banks,Wireless Power Banks

Dongguan Guancheng Precision Plastic Manufacturing Co., Ltd. , https://www.dpowergo.com