Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Bluetooth Security.pdf
Скачиваний:
113
Добавлен:
17.08.2013
Размер:
1.57 Mб
Скачать

8

Providing Anonymity

In Chapter 7 we described different types of location tracking attacks against Bluetooth units. These threats show that some important security features are lacking in the Bluetooth standard. This has motivated the development of a new Bluetooth mode of operation that provides protection against the location privacy threat. We call the new mode a Bluetooth anonymity mode. This mode of operation is currently not part of the Bluetooth standard. Special care has been taken to make this mode of operation have good interoperability with devices not supporting the anonymity mode. The anonymity might be included in a future release of the Bluetooth specification.

As previously explained, location tracking can be based on the BD_ADDR, channel access code, or the device access code. The best way to protect against location tracking would be to regularly change the device address. This is also the basic idea in the anonymity mode. However, normal Bluetooth functionality must also be provided if the device address is changed. In this chapter we describe how this can be dealt with.

8.1 Overview of the anonymity mode

The regular address changes necessary for anonymity result in new address management and new addresses being introduced. Three address types are suggested: fixed address, active address, and alias address. The active address is randomly selected, and anonymous devices base the Bluetooth access codes on this address. Recall that the access code can be used to track the location of a device. Rules for how and when the active address is updated are given. It is actually also the case that the different address behavior for anonymous devices implies that

123