Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Bluetooth Security.pdf
Скачиваний:
104
Добавлен:
17.08.2013
Размер:
1.57 Mб
Скачать

128

Bluetooth Security

8.2.3Alias addresses, BD_ADDR_alias

Since it is not possible to identify other anonymous devices based on their BD_ADDR when they are operating in the anonymous mode, anonymous devices must make use of an alternative device identifier in the Bluetooth authentication procedure. Also, the authentication procedure must be slightly modified. The new procedure, alias authentication, will be described in more detail in Section 8.5. The alias authentication is based on the usage of alias addresses, BD_ADDR_alias. An alias address is used purely for authentication purposes. For simplicity, the BD_ADDR_alias can be chosen to 48 bits like any ordinary device address. All the bits should be chosen uniformly, independently, and at random. Hence, the address field cannot be divided into any meaningful subfields. The support and use of alias addresses and authentication are necessary for making authentication in the anonymity mode work.

8.3 Modes of operation

In order to distinguish devices operating in the anonymous mode from devices that are not anonymous, we define two different modes of operation:

1.Nonanonymous;

2.Anonymous.

A Bluetooth device can only operate in one of these modes at a time. Both modes are in principle fully backward compatible with devices not supporting these new modes. The latter, of course, with the exception that the new features introduced in the anonymous mode cannot be utilized with standard devices. One can say that for anonymous devices, Bluetooth devices not supporting the anonymous mode will look like devices that always operate in nonanonymous mode. Devices in anonymous mode shall regularly update the active device address, BD_ADDR (see Section 8.2). In addition, devices supporting the anonymous mode need to support alias authentication (see Section 8.5).

When a device is in nonanonymous mode, it uses the fixed device address in all its communications. Devices that want to prevent the location tracking attacks based on the BD_ADDR, CAC, DAC, or hopping sequence choose to operate in the anonymous mode. Location tracking is in the anonymous mode prevented by regularly updating the active device address, as it is the address that is visible on the wireless link.