Bluetooth device Protection
Unless they are protected, Bluetooth piconets are prone to attacks from hackers. Protecting a piconet involves the implementation of a combination of measures, including proper and secure set-up of the piconet, product assessment, patching and security auditing of the airwaves. In this article we will examine each of these three methods, in depth, in order to fully grasp what is entailed.
Proper and secure set-up
This mainly comes in to focus during the set-up pairing stage. During this process the network administrator must assign both devices the same PIN code. Using predictable or weak PIN codes, like the date of your birthday or easily guessed codes, for example 1111, can greatly compromise the security of these devices. Fortunately it does not take much to eliminate this risk. All one has to do is to use a long, random PIN code. In addition, the pairing should not be done in a public location.
Configure both devices to ask for authentication
The main reason for doing this is that authentication exchange is open to key guessing. Where a device attempts to authenticate itself by the trial and error method. It is always good practice to configure the devices in such a way that they have to seek incoming permission from users.
There are three encryption modes available to choose from. Mode 1: no encryption, mode 2: encrypt unicast, but not broadcast traffic, mode 3: encrypt all traffic. Mode 3 is clearly the most secure way to operate. Data encrypted with too short a key can be easily decrypted. Therefore it is advisable to configure both devices using 128-bit encryption keys.