16.05.2014 Views

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

Wireless Security.pdf - PDF Archive

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

610 Chapter 23<br />

It should suffice for our discussion to say that there are no known serious attacks on the<br />

protocol itself, but various implementations may be vulnerable to a few attacks, referred<br />

to as “ bluejacking, ” “ bluebugging, ” and “ bluesnarfing. ” 9 All of these attacks relate to<br />

the ability of an attacker to connect to a Bluetooth device (in most instances a mobile<br />

phone with Bluetooth) without the knowledge of the device user. The bluejacking attack<br />

simply involves the sending of an unwanted message to the device user, which could be<br />

used to trick the user into providing sensitive information to the attacker (phishing). The<br />

other attacks involve the ability of an attacker to access the contents of a device, either<br />

being able to execute commands (bluebugging) or to download data from the device<br />

(bluesnarfing). In any case, these attacks require the attacker to be in close proximity<br />

(within a few meters) unless they have the equipment to boost the Bluetooth protocol’s<br />

range. Apparently these issues have been addressed in newer implementations of the<br />

protocol but as always, it is a good idea to keep up with current developments, as a<br />

devastating attack can always be right around the corner.<br />

Bluetooth provides a decent midrange protocol for embedded systems that need a<br />

moderate level of throughput, but it is a complex protocol (the specification is well<br />

over 1200 pages long), and the cost of a dedicated controller unit may be prohibitive<br />

depending on the application. In the next section, we will look at a relative newcomer to<br />

the wireless arena, the ZigBee protocol. Designed around the IEEE 802.15.4<br />

low-power radio standard, ZigBee aims to be the go-to standard for industrial wireless<br />

communication where throughput is less of an issue, and flexibility, power consumption,<br />

and cost are primary concerns.<br />

23.3 ZigBee<br />

At the low end of the power-requirement spectrum for wireless devices, ZigBee 10 is the<br />

equivalent of a dripping faucet when compared to the garden hose of Bluetooth or the fire<br />

hose of 802.11 (in the case of 802.11g, a water cannon used for putting out aircraft fires),<br />

as seen in Figure 23.3 . ZigBee is a relatively new standard developed and maintained by<br />

9<br />

Terms and definitions for Bluetooth attacks adapted from the Bluetooth SIG overview of<br />

Bluetooth security ( http://www.bluetooth.com/Bluetooth/Learn/<strong>Security</strong>/ )<br />

10<br />

Parts of the description of ZigBee in the section are adapted from the ZigBee Alliance ZigBee<br />

FAQ at www.zigbee.org .<br />

www.newnespress.com

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!