The “LE” in LE Privacy stands for Low Energy, but it actually has nothing to do with power consumption nor does it mean to imply there is a higher energy consumption mode involving the “Privacy” part of LE Privacy. In an effort to explain a concept like LE Privacy, we must explain a chunk of the Bluetooth history of security implementations. Bluetooth is managed by the Bluetooth Special Interest Group, also referred to as Bluetooth SIG. There is no one Bluetooth protocol it is a collection of different protocols grouped together under a single specification. ![]() Bluetooth was invented in 1989, but really came into use during the 2000s. Historyīefore we explain current Bluetooth security, we should go back in time a bit. ![]() ![]() It should be noted that this entire blog post started because I needed to explain LE Privacy in a forthcoming blog post and the “appendix” kept growing until I simply split it off into its own thing. In the past, I’ve run into roadblocks while trying to figure out what was going on during various Bluetooth communications such as pairing and encryption, so I’ve put together this blog post to help explain some of the security aspects, how these aspects are typically used, and how to easily spot a few of them during a research effort. This is important when one has to deal with environments where older and less secure Bluetooth implementations on older IoT devices have to interact with the new IoT devices which are capable of better security, and you have to determine what security is actually being used. ![]() As a researcher, it helps when looking at the various Internet of Things (IoT) devices to understand what a vendor of an IoT device actually implemented. The Bluetooth specification is huge and quite complex.
0 Comments
Leave a Reply. |