Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
101 views2 pages

CON101 Assignment 3: Network Security: Satyam Kumar Modi December 2020

Bluetooth technology offers wireless connectivity for short-range data transfer between devices like phones and headsets, but lacks centralized security. It is vulnerable to attacks like bluejacking, where hackers send messages to trick users into sharing access codes, and man-in-the-middle attacks, where attackers impersonate paired devices to connect without authentication. DoS attacks can also waste a device's battery by repeatedly requesting pairing. Users should enable encryption during pairing, turn off Bluetooth when unused, and keep it updated to mitigate these security risks.

Uploaded by

satyamkumarmod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views2 pages

CON101 Assignment 3: Network Security: Satyam Kumar Modi December 2020

Bluetooth technology offers wireless connectivity for short-range data transfer between devices like phones and headsets, but lacks centralized security. It is vulnerable to attacks like bluejacking, where hackers send messages to trick users into sharing access codes, and man-in-the-middle attacks, where attackers impersonate paired devices to connect without authentication. DoS attacks can also waste a device's battery by repeatedly requesting pairing. Users should enable encryption during pairing, turn off Bluetooth when unused, and keep it updated to mitigate these security risks.

Uploaded by

satyamkumarmod
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

CON101 Assignment 3: Network Security

Satyam Kumar Modi


December 2020

1 Introduction
Bluetooth technology is a wireless technology used to transfer data over short
range radio transmissions.Its bandwidth lies between 2.402 GHz to 2.480 GHz
and provides a personal area networks. It can be found in cell phones, headsets
and many more gadgets. The technology has even extended to the automated
smart homes where one can exercise control over the appliances via bluetooth.
No doubt, bluetooth offers convenience and ease of use, but it lacks centralized
security infrastructure. As a result, it has become a hub of serious security
vulnerabilities and people need to be more conscious while using this technology.
The pairing step that is involved in the connection setup is a major contributor
to security issues found in bluetooth. For an example attackers may perform a
Man-in-the middle attacks in which the two system feels as if they are coonected
to each other but they are connected to the attackers system. We will be
discussing more on bluetooth attacks below.

2 BlueJacking
BlueJacking is a method in which the hacker sends short, decitful text messages
to Bluetooth enabled devices to trick the user into using the access code. This
provides the hackers to an access to the targeted device.The device to which
the attack is to be performed must be within a radius of 10m for the attack
to be successful. This is particularly done in the crowded areas. BlueJacking
can be used to exploit the communication paradigm between consumers and
producers to share content such as test, images and videos. Sometimes it can
be used as a circulating channel for the multimedia content of any brand. Best
practices to mitigate the BlueJacking threats against the Bluetooth are: user
awareness, disable device when not in use, remove the details of previously
connected devices, use hardcoded pins to pair the devices.

3 Man in the middle Attack


Man in the middle attack is one another serious vulnerability in the bluetooth
technology. In this, the attacker can impersonate a previously paired device

1
with the user’s device that allows the attacker to connect to the user’s phone
without any intervention. For this attack to occur, the attacker needs to be
within the wireless range and permits no authentication or no user-controlled
restrictions. Ios users are most of time on the safer side wrt this vulnerability
as it always asks for the user’s permission when a bluetooth connection is done.
This step notifies the user of an incoming connection request which can easily
be denied which protects the user from such attacks.

4 DOS attack
DOS attacks occur when the attacker uses his device to frequently request pair-
ing with the victim’s device. DOS attacks are the easiest to perform and can
waste a device’s battery. However, this attack too depends on the distance be-
tween the victim’s device and the attacker device. Now, we have a numerous
softwares which block these attacks.

5 Bluetooth security measures


1. Always enable the exchange codes to pair up with the bluetooth devices, so
that only the connecting users get connected.
2. Turn off your bluetooth when not in use, so that the attacker doesn’t get a
chance to get connected to you.
3. Always update the bluetooth version of your device.

You might also like