Wireless Security
March 2007
DECT™ Headset Security
Plantronics DECT wireless products (CS60™, CS70™ and SupraPlus® Wireless) use a digital technology and meet
the full requirements of the DECT standard security requirements, as outlined in ETSI EN 300 175-7.
Security is one of the many strong points of a DECT system which uses TDMA/TDD digital radio and dynamic
channel selection, together with a three layer security system. This 3-layer system of subscription verification,
encryption and authentication ensures a very high level of protection against eavesdropping:
1. Subscription verification
Base and remote devices are paired to one another such that they can easily identify their correct base
or remote to a first level. A secret authentication key is calculated using the DECT Standard
Authentication Algorithm (DSAA). Definition of this algorithm in full is only made available to the
equipment manufacturers.
2. Encryption
The cipher-key is used to encrypt the data being transmitted over the air link.
3. Authentication
Both ends check the appropriate authentication key is used and also calculate cipher keys (used to
encrypt the data sent over the air). The DECT Standard Cipher (DSC) is used; again definition of this
algorithm is only made available to the equipment manufacturers.
RF Protocol:
With dynamic channel allocation, the RF protocol itself provides a level of security with channels and timeslots
changing as the environment suits over 10 carry frequencies and 12 time slots per carrier (for each communication
direction).
Bluetooth® Headset Security
Despite quite widespread press reports of Bluetooth security vulnerabilities in devices such as phones and PDAs, the
audio connection between a phone and a Plantronics Bluetooth headset is highly secure- using advanced
authentication and encryption algorithms.
Headsets need only be "discoverable", (visible to other devices) for a short time when they are set-up for use with a
new device (eg mobile phone). During this process (commonly called "Pairing") the two devices exchange information
to establish a 'secure' connection. Note that the base of the Plantronics Voyager™ 510 system which connects to a
deskphone is never discoverable.
Whitepaper
Need help?
Do you have a question about the WIRELESS SECURITY - WHITE PAPER and is the answer not in the manual?
Questions and answers