16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Security</strong> in <strong>Wireless</strong> Ad Hoc Networks 455<br />

should enter the same PKEY. On the other hand, fixed PKEYs refer to PKEYs that are<br />

preconfigured into the Bluetooth device. Again, both the communicating devices should<br />

be preconfigured with the same PKEY. Even though variable PKEYs are more secure<br />

(since the PKEY can be changed on a per-pairing basis), both variable and fixed PKEYs<br />

serve specific purposes. Consider for example, a scenario where users in a conference<br />

room wish to form a Bluetooth network using their laptops. Such a scenario is well-suited<br />

for using variable PKEYs, since each device has user interaction capabilities. On the<br />

other hand, consider the Bluetooth network between the headset and its cell phone. The<br />

Bluetooth headset must use a fixed PKEY since there is no 5 user interaction capability on<br />

the headset. The Bluetooth standard also allows the use of higher layer key-establishment<br />

protocols to generate the PKEY and pass it on to the Bluetooth stack.<br />

Since the PKEY can come from one of many sources, instead of specifying the exact<br />

length of the PKEY, the Bluetooth standard specifies that the PKEY can be as long as<br />

128 bits. This allows for devices prompting the user for a PKEY to enter a much smaller<br />

PKEY (or a PIN) thus making user interaction a little more convenient. However, using<br />

a smaller PKEY has other drawbacks. As we will see in the next few sections, the PKEY<br />

is the starting point for establishing the Link Key, which in turn forms the basis of all<br />

security in Bluetooth. To be precise, the PKEY is the shared secret between the two<br />

communicating endpoints that ensures the Link Key is known only to the communicating<br />

end-points. The use of a smaller PKEY means that an attack like the dictionary attack<br />

becomes much easier to launch. In this context, a dictionary attack involves calculating<br />

all the link keys that can be derived from all possible PKEYs. This list of link keys is<br />

maintained in a table and can then be used against plaintext, ciphertext pairs 6 to<br />

determine which link key is being used.<br />

19.2.3.2 Initialization Key<br />

The next level in the hierarchy is the Initialization Key (IK or K INIT ). The K INIT is a shortlived<br />

temporary key that is used (and exists only) during the pairing process when two<br />

Bluetooth devices start communicating for the first time. The K INIT is derived using the<br />

E 22 algorithm and three inputs: PKEY, IN_RAND and L PKEY . The PKEY is the pass-key<br />

that we just talked about and L PKEY is the length of this pass-key in bytes. Finally, the<br />

5<br />

Or rather hardly any.<br />

6<br />

For example AU_RAND, SRES pairs.<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!