Topic > Security Goals: An Overview of Bluetooth Security

Security Goals: So security is the most important part of any system. To protect your data from theft or loss; thus Bluetooth claims some security goals such as link layer based access control. It ensures that device authentication is secret, only the authorized user can access it. Confidential exchange information cannot be disclosed publicly, and integrity detects changed data and ensures that data cannot be changed/deleted or modified. Bluetooth Security Overview: Symmetric encryption process is used in Bluetooth; therefore decryption is performed on the same process, using the same key during encryption and decryption, and the secret key exchange must be done in advance. Four entities are used to maintain security on the link layer: • The device address uses 48-bit BD_ADDR. • It can use a 128-bit authentication link key. • The encryption key is obtained from the authentication key, so every time a new secret key of 8-128 bits is generated due to the activation of encryption each time.• For each transaction of each device a pseudo-random number of 128 bits is generated. Integrity checking: Channel access code can check packets for errors or incorrect delivery, via HEC in the header and CRC in the data payload, can be done in three steps. Where packets may have a shortened passcode in the first step, in the second step they have the passcode and packet header, while in the last third step they have the passcode, packet header, and payload . However, each packet begins with a data access code that is used for synchronization, DC offset compensation, and identification so that all packets on the physical channel can be examined in the exchange. The header error check is an 8-bit code that can check the integrity of the header and the payload... in the center of the card... the device or moving out of range. Solutions: There is no guarantee to stop these attacks. Whereas installing some firewalls and antiviruses can prevent these attacks which can be updated on a scheduled basis. It can prevent your device from interfering with unwanted files that can cause threats such as worms, trojans, viruses etc. which can cause safety problems. Do not allow access to unwanted files. Therefore it is important to take care of the devices in our system from time to time. Many devices such as printers, cell phones and CCTv cameras are based on this technology, so it can cause major security problems. Conclusion: Simply put, every coin has two sides, as like other systems, regardless of Bluetooth, they too can have some security issues. But it can introduce into this world a new wireless technology and a personal network, as well as many devices that can communicate with each other via Bluetooth.