Shared Flashcard Set

Details

Bluetooth
BT
36
Computer Science
Undergraduate 4
04/18/2012

Additional Computer Science Flashcards

 


 

Cards

Term
6 Constraints for a personal area network
Definition
Limited battery power
Computational power
Small amount of memory
Small range
Ad-hoc network
Not always I/O Interface
Term
In a piconet how many slaves can one master have?
Definition
7
Term
What are the 4 bluetooth security expectations?
Definition
Easy to use and self-explanatory security confg
Confidentiality protection
Authentication of connecting devices
Anonymity
Term
What are the three bluetooth security modes
Definition
Mode 1 - Unit never initiates any security procedues
Mode 2 - Will not demand authentication or encryption at link establishment
Mode 3 - Initiate security procedures before link set-up is completed
Term
3 Security modes for devices and services
Definition
Trusted
Untrusted
Unknown
Term
Services have 3 security levels
Definition
Auth and Authorisation
Authentication only
Services open to al ldevices
Term
There are 7 security protocols in bluetooth, 4 of them generate keys these are
Definition
Generation of unit key (no longer used)
Generation of initialisations key
Generation of link key
Generation of encryption key
Term
There are 7 security protocols in bluetooth, 4 of them generate keys the other 3 are
Definition
Mutual authentication
Generation of key stream
Encryption of data
Term
E1, E21, E22, E3 Are all encryption algorithms. They are based upon the same underlying cipher which is
Definition
SAFER
Term
E1 is used for
Definition
Message authentication code
Term
E21, E22, E3 is used for
Definition
Key generation
Term
E0 is used for
Definition
stream cipher
Term
There are 6 bluetooth security weaknesses, these are
Definition
Unit key
Pin
location privacy (tracking devices)
Denial of service attacks
Implementation attacks
Problems with cryptographic algorithms
Term
The weaknesses with the unit key is
Definition
All trusted devices use the same key for all secure communications
Term
There are three weaknesses with the PIN
Definition
Fixed PIN
Weak PIN
Security keys are based upon security PIN
Term
There are 5 location tracking attacks
Definition
Inquiry attacks
Traffic monitoring attack
Paging attack
Frequency hoping attack
User-friendly name attack
Term
Denial of service attacks (4)
Definition
Radio jamming
Buffer overflow
Block of other devices
Battery exhaustion
Term
The 3 implementation attacks are
Definition
Bluejacking
Blue snarfing
bluebugging
Term
Bluejacking is
Definition
Literally sending messages
Term
Bluesnarfing is
Definition
Getting into their phonebook
Term
Bluebugging is
Definition
Exec commands on a targets phone
Term
Six constraints of Bluetooth systems
Definition
Limited battery power
Computational power
Small amount of memory
Small range
Ad-hoc range
Not always I/O-interface
Term
In bluetooth what two things are in the application layer:
Definition
vCard, vCal
Term
IWhat are the one thing on the Presentation layer and what the fuck does it do?
Definition
Object Exchanger Binary Data - facilitates the exchange of binary objects between devices
Term
What are the things in session layer of the bluetooth protocol stack (6) - one appers twice for some reason
Definition
WAP
UPnP
AT cmds
TCS Bin
LMP
Term
Transport layer of bluetooth stack has which two protocols
Definition
UDP
TCP
Term
Whats one the network layer, there's r. one links into another that links into another. The other seems to come out of no where. Then the fifth comes from the remaining two
Definition
IP goes into PPP into RFCOMM and SOP is on its own. These both go into L2CAP
Term
Data-link bluetooth protocol stack (one)
Definition
baseband
Term
Physical layer protocol stack... (uno)
Definition
bluetooth radio
Term
How's generation unit key work
Definition
RANDOM number and Addr goes into E21, Key comes out
Term
How generation init keys comes
Definition
Exchange IN_RAND, both devices put the PIN, the IN_RAND and Length of PIN values into E22, get the K(init) - a temp session key
Term
How generation link key works (semi-permanent key)
Definition
Dev 1 gives LK_RAND(a), Dev 2 gives LK_RAND(b) -> these are sent encrypted with K(init). ADDR, LK_RAND goes into E21 on both devs, this generates LK(a) do the same with the the (b) versions and it gets LK(b) -> This generates K(ab) / K(link)
Term
Mutual auth works by
Definition
ADDR(b) send to Dev 1. AU_RAND sent to Dev2. Addr(b), K(link), AU_RAND all go into E1(MAC) and this produces SRES
Term
Generation Encryption key
Definition
EN_RAND given to Dev 2. EU_RAND, K(link), ACO go into E3. This generates K(c)
Term
Generation key stream works by
Definition
EN_RAND, ADDR(A), Clock(master), K(c) goes into E0. This generates K(Cipher)
Term
Encryption of data works by using K(Cipher) going in with data.
Definition
Yup. That's right.
Supporting users have an ad free experience!