- How Bluetooth® works
- Encryption during usage
- High level of security
- Different types of threats
- Supplementary EPOS security
Bluetooth® is a wireless technology standard for exchanging voice and data over short distances between Bluetooth enabled devices. Ericsson introduced Bluetooth to the market in 1994 to overcome the challenges of connecting devices with different types of technology and communication protocols.
Since its introduction, the Bluetooth® Special Interest Group has collected more than 20,000 member companies and the Bluetooth standard has become a widespread and popular method of connecting devices. More than 2 billion units are able to use Bluetooth technology, which has consequentially raised concerns about security issues.
Before getting into details about Bluetooth security, it should be mentioned that overall, the risk of unauthorized access to communication via Bluetooth is limited. In general, Bluetooth offers a very high level of security, which EPOS has chosen to enhance further through the intelligent use of innovative solutions.
The Bluetooth standard offers a wireless connection between devices in proximity to each other. To do so, the two devices have to first be paired. The pairing is like a “technological handshake” that introduces the two devices to each other and enables them to communicate.
The pairing requires that the two devices can find each other – they must be made “discoverable”. For most Bluetooth devices, this requires an active process of putting the devices in pairing mode. While in this setting, the devices become discoverable for a short while and can begin to exchange a security key for authentication.
After exchanging this security key, which is not transmitted through the air and cannot be stolen, the devices are successfully paired. The secret key is the “bridge” between the devices that is formed after the initial pairing. In the future, these devices can continue to use this key, which eliminates the need for repeating the pairing each time the devices are used.
After successful exchange of secret keys, the two Bluetooth devices can communicate. All EPOS products benefit from the best encryption level by using a 128-bit key generated by the pairing process. Thanks to this encryption, the data sent between devices can only be read by the intended recipient. The receiving unit decrypts the data back to its original format based on the same algorithm.
As mentioned earlier, Bluetooth technology offers a high level of security for the user. It is extremely difficult to eavesdrop or to interfere with Bluetooth communication for many reasons, including the short range and the authentication that must take place in order to use the devices.
In theory, the most vulnerable point for Bluetooth devices is when they are pairing as they have to be visible/discoverable to do that. Even though the security threat is highly hypothetical, EPOS has addressed the issue with several intelligent measures.
In order to explain the advantages of the secure EPOS headsets it is useful to list the different types of threats that are being discussed.
Man in the middle attack – An attacker tries to intercept information over to his device without the knowledge of the attacked. It is extremely difficult to do that in real life, as the attacker would have to be very close to the devices.
Virus – Wireless transmission of a harmful virus. The EPOS Bluetooth headset and the Bluetooth dongle only transmit speech, not data like other Bluetooth devices. Therefore, there is no environment for a virus to run.
Eavesdropping – An attacker listening in on a conversation. The attacker would have to be present at the pairing and furthermore have extremely advanced equipment. The voices are encrypted and converted to a digital stream.
Modern devices use the Bluetooth® 4.0 standard and higher, especially for the use of voice transmission, which provides a high level of protection.
For EPOS, security for the user plays an important role in product development. We have taken extra steps in order to strengthen the high level of security that Bluetooth technology provides. Here are some examples:
Intelligent Power Management – During pairing, the transmit power of EPOS Bluetooth devices is reduced. This results in a much shorter range when performing the pairing process. “Man in the Middle” attacks become extremely difficult to undertake as the attacking device would have to be very close to the pairing devices.
Host Device Access Security – EPOS headsets and the corresponding USB-dongles only support audio related Bluetooth profiles. Data content stored on the host device can never be transmitted to the headset or other devices. This means that viruses cannot be transferred, either.
Short Pairing Window – EPOS headsets are only discoverable for a very short period during pairing. After that short period, they automatically turn off the Bluetooth access until access is reactivated by the authorized user.