Bluetooth security

Bluetooth

What is Bluetooth?

Bluetooth is a technology intended particularly for use in wireless communication between pieces of electronic apparatus which are separated by relatively small distances (typically up to a few meters). The basic motivation for this is to avoid the use of cables for connecting devices, particularly mobile devices which need to be moved from place to place.

Typical examples of devices which use Bluetooth are mobile phones, PDAs, portable and stationary computers, medical apparatus, and all sorts of equipment which might be attached to these, such as headphones, microphones, printers, sensors and so on.

Bluetooth devices communicate with one another using a range of frequencies around 2.4GHz, within the so-called ISM (Industrial, Scientific and Medical) band. This band is also used by a lot of Wireless LAN (WiFi) equipment, by microwave ovens, and for many other purposes.

As Bluetooth devices are only intended to communicate over small distances, the power of the transmitter in a Bluetooth device is typically very small. There are in fact three classes of Bluetooth device, with different ranges for transmission:

Class Power (mW)Range (m)
1 100 100
2 2.5 10
3 1 0.1-10

Most pieces of apparatus which use Bluetooth technology are equipped with a non-directional antenna, which is used both for sending and receiving wireless signals. Essentially, this means that any other Bluetooth equipment within range of the transmitter can receive the signals. The ranges given in the table above are estimates based on typical Bluetooth antennas in small standard pieces of apparatus. It is important to realise that with special equipment, the signals can be picked up over much larger distances, maybe as large as 2-3 kilometers!

directional antenna unaware victim
A directional antenna (in the white tube) enables Bluetooth signals from Class 2 devices to be picked up at a distance of at least 500m. Even at a distance of 25-50m, the victim does not notice that his device is being monitored.

Bluetooth security

Since any equipment within range of a Bluetooth transmitter can in principle receive the transmitted signals, precautions need to be taken to prevent signals from being used by anyone except the intended receiver(s). Although each Bluetooth device is identified by an address (in fact just a number between 0 and 248-1), which is used to indicate the intended receiver of a transmitted message, there is no guarantee that other devices cannot pick up the message simply by eavesdropping. Three mechanisms are available to prevent this:
  1. Bonding, by means of which two devices can produce a shared secret, which only those two devices know.
  2. Authentication, by means of which two or more devices can verify one another's identities.
  3. Encryption, by means of which two devices can achieve confidentiality of an exchange of messages by ensuring that third parties cannot understand the messages.

Bluetooth security modes and profiles

Bluetooth devices can operate in three security modes which exploit various combinations of these mechanisms: In security modes 2 and 3, it is possible to specify a security policy, such that only particular devices have access to particular services.

Yet another possibility is to define Bluetooth profiles, which utilise combinations of the basic mechanisms in order to achieve a level of security which is thought to be appropriate for particular applications. For example, profiles might be defined for use in:

A typical Bluetooth device is set up to support a number of profiles appropriate to its functionality. This may lead to security problems if the device has some functions which do not require a high level of security, since these functions will typically be supported by low security profiles. A well-known example is the object push profile used to support transfer of objects. In this profile, authentication is not used before the objects are exchanged, and this deficiency can be exploited by intruders who want to attack Bluetooth devices in which the profile is installed.

What are the security risks?

There are a number of built-in weaknesses in the way in which Bluetooth operates: These weaknesses are in practice relatively difficult to exploit for real attacks. Faking the address is no help to the attacker, as long as the devices use correct Bluetooth authentication. Deducing the secrets from the passing communication is not really a realistic possibility, as you need an extremely powerful computer to perform the necessary analysis, which in the "cheapest" case requires 264 (about 16 billion billion) arithmetic operations.

Thus most actual attacks on Bluetooth devices are based on other approaches:

What can you do to protect yourself?

Some simple rules can help a lot to reduce the risks inherent in the use of Bluetooth:

Further information

For the technically interested person, there are lots of much more technical descriptions of Bluetooth security, most of them in English. A good web page, with detailed references, can be found at: http://www.niksula.cs.hut.fi/~jiitv/bluesec.html.

An overview of some of the best-known attacks and a list of some models of telephone which are particularly at risk, can be found at: http://www.thebunker.net/security/bluetooth.htm.


Robin Sharp
Last updated 050518.