Page 491 - From GMS to LTE
P. 491

Bluetooth and Bluetooth Low Energy  477


                        RFCOMM               ACL-link
                Application       L2CAP





                            Service
                                                                             Remote Bluetooth device
                            database


















                                                                                   t

               Figure 7.14  The different steps of a Bluetooth connection establishment.

               been defined as follows. Some services do not require security functionality. Which
               services are implemented without security is left to the discretion of the device manu-
               facturer. A mobile phone manufacturer, for example, can decide to allow incoming file
               transfers without prior authentication of the remote device. The incoming file can be
               held in a temporary location and the user can then decide to either save the file in a
               permanent location or discard it. For services like dial‐up data, such an approach is not
               advisable. Here, authentication should occur during every connection establishment
               attempt to prevent unknown devices from establishing an Internet connection without
               the user’s knowledge.
                Bluetooth uses the SAFER+ (Secure and Fast Encryption Routine) security algorithms,
               which have been developed by ETH Zürich and are publicly available. So far, no methods
               have been found that compromise the encryption itself. However, there have been
               reports on device‐specific Bluetooth security problems as, for example, discussed in [4]
               and general weaknesses have been found concerning the initial key negotiation. If an
               attacker is able to record the initial pairing process described below, they can calculate
               the keys and later on decrypt the data. Therefore, with version 2.1 of the Bluetooth
               standard, new pairing mechanisms were introduced, which are described in Section 7.5.2.

               7.5.1  Pairing up to Bluetooth 2.0
               To automate security procedures during subsequent connection establishment
               attempts, a procedure called ‘pairing’ is usually performed during the first connection
               establishment between the two devices. From the user’s point of view pairing means
               typing in the same PIN number on both devices. The PIN number is then used to
   486   487   488   489   490   491   492   493   494   495   496