CON101 Assignment 3: Network Security
Satyam Kumar Modi
December 2020
1 Introduction
Bluetooth technology is a wireless technology used to transfer data over short
range radio transmissions.Its bandwidth lies between 2.402 GHz to 2.480 GHz
and provides a personal area networks. It can be found in cell phones, headsets
and many more gadgets. The technology has even extended to the automated
smart homes where one can exercise control over the appliances via bluetooth.
No doubt, bluetooth offers convenience and ease of use, but it lacks centralized
security infrastructure. As a result, it has become a hub of serious security
vulnerabilities and people need to be more conscious while using this technology.
The pairing step that is involved in the connection setup is a major contributor
to security issues found in bluetooth. For an example attackers may perform a
Man-in-the middle attacks in which the two system feels as if they are coonected
to each other but they are connected to the attackers system. We will be
discussing more on bluetooth attacks below.
2 BlueJacking
BlueJacking is a method in which the hacker sends short, decitful text messages
to Bluetooth enabled devices to trick the user into using the access code. This
provides the hackers to an access to the targeted device.The device to which
the attack is to be performed must be within a radius of 10m for the attack
to be successful. This is particularly done in the crowded areas. BlueJacking
can be used to exploit the communication paradigm between consumers and
producers to share content such as test, images and videos. Sometimes it can
be used as a circulating channel for the multimedia content of any brand. Best
practices to mitigate the BlueJacking threats against the Bluetooth are: user
awareness, disable device when not in use, remove the details of previously
connected devices, use hardcoded pins to pair the devices.
3 Man in the middle Attack
Man in the middle attack is one another serious vulnerability in the bluetooth
technology. In this, the attacker can impersonate a previously paired device
1
with the user’s device that allows the attacker to connect to the user’s phone
without any intervention. For this attack to occur, the attacker needs to be
within the wireless range and permits no authentication or no user-controlled
restrictions. Ios users are most of time on the safer side wrt this vulnerability
as it always asks for the user’s permission when a bluetooth connection is done.
This step notifies the user of an incoming connection request which can easily
be denied which protects the user from such attacks.
4 DOS attack
DOS attacks occur when the attacker uses his device to frequently request pair-
ing with the victim’s device. DOS attacks are the easiest to perform and can
waste a device’s battery. However, this attack too depends on the distance be-
tween the victim’s device and the attacker device. Now, we have a numerous
softwares which block these attacks.
5 Bluetooth security measures
1. Always enable the exchange codes to pair up with the bluetooth devices, so
that only the connecting users get connected.
2. Turn off your bluetooth when not in use, so that the attacker doesn’t get a
chance to get connected to you.
3. Always update the bluetooth version of your device.