What are some keywords on Bluetooth?
What are Bluetooth profiles? What are some examples?
-Generic Access Profile: e.g. defines service discovery protocol
-Service Discovery Application Profile
-Headset Profile
-Human Interface Device Profile:
What are the security modes in classical Bluetooth?
What are the security levels in Bluetooth?
What are the security procedures in Bluetooth?
What are the modes of operation in Bluetooth?
How is pairing done in < BT 2.1?
Pin-based:
- PIN 1-16 Byte: Fixed or user-selected
- K_init derived from PIN and RAND
- K_A unit key - once generated with address and RAND
- K_AB combination key derived during pairing
- LK derived from either K_A or K_AB. Used for further auth and key-agreement:
LK = K_A xor K_init OR
LK = K_A xor K_B
How is authentication done in Bluetooth < 2.1?
How is encryption done in Bluetooth < 2.1?
How is broadcast realized in Bluetooth < 2.1?
What are the service levels in Bluetooth?
Service level 1: Requires authentication and authorization. Automatic access to trusted devices only
Service level 2: Requires authentication only.
Service level 3: Open to all devices
What are the known attacks against Bluetooth < 2.1?
What is Secure Simple Pairing in Bluetooth?
How does numeric comparison work in SSP?
How does passkey entry work in SSP?
What is the stage 2 in all SSP options?
How is a device authenticated on an established LK in Bluetooth > 2.1?
Same as before: Send challenge RAND and compare RES with expected result
How are devices authenticated on an LK in BT version > 4.1?
How is an man-in-the-middle attack against passkey protected device done?
What are the BLE security modes and levels?
LE security mode 1:
- Level 1: No security
- Level 2: Unauthenticated pairing and (AEAD) encryption
- Level 3: Authenticated pairing and (AEAD) encryption
- Level 4: Authenticated LE Secure Connections pairing with 128 bit (AEAD) encryption
LE security mode 2:
- Level 1: Unauthenticated pairing with ”data signing” (AES-CMAC, not a digital signature)
- Level 2: Authenticated pairing with “data signing” (AES-CMAC, not a digital signature)
LE security mode 3:
- Level 1: No security
- Level 2: unauthenticated broadcast
- Level 3: authenticated broadcast
What are the phases in BLE pairing?
Phase 1: Select method of pairing and authentication
Phase 2: Short term key generation
LE Legacy Pairing (v4.0, v4.1), no DH: Passkey, OOB, Just works
Secure connections pairing (v4.2), DH: Passkey, OOB, Just works, Numberic comparison
Phase 3: Longterm key generation: LTK, CRSK, IRK
What is the problem with legacy BLE pairing?