Sunteți pe pagina 1din 10

TECHNOLOGY

Abstract
Bluetooth is an industrial specification for wireless personal area networks
(PANs). Bluetooth provides a way to connect and exchange information between devices
such as mobile phones, laptops, PCs, printers, digital cameras and video game consoles
via a secure, globally unlicensed short-range radio frequency.

Origin of the name and the logo


The name Bluetooth is derived from the cognomen of a 10th century king, Harald
Bluetooth King of Denmark and Norway from 935 and 936 respectively, to 940. He is
known for his unification of previously warring tribes from Denmark (including Scania,
present-day Sweden, where the Bluetooth technology was invented) and Norway.
Bluetooth likewise was intended to unify different technologies like computers and
mobile phones. The name may have been inspired less by the historical Harald than the
loose interpretation of him in The Long Ships by Frans Gunnar Bengtsson, a Swedish
best-selling Viking-inspired novel. The Bluetooth logo merges the Nordic runes
analogous to the modern Latin H and B: (Haglaz) and (Berkanan). The logo is similar
to an older logo for Beauknit Textiles, a division of Beauknit Corporation. That logo,
using the connection of a reversed K and B for Beauknit, is wider and has rounded
corners, but is otherwise the same.
CONTENTS
• 1 Uses
o 1.1 Bluetooth profiles
o 1.2 List of applications
o 1.3 Bluetooth vs. Wi-Fi in networking
• 2 Specifications and Features
o 2.1 Bluetooth 1.0 and 1.0B
o 2.2 Bluetooth 1.1
o 2.3 Bluetooth 1.2
o 2.4 Bluetooth 2.0
o 2.5 Future of Bluetooth
• 3 Technical information
o 3.1 Communication & connection
o 3.2 Setting up connections
o 3.3 Pairing
o 3.4 Air interface
o 3.5 Security
• 4 Social concerns
o 4.1 Security concerns
o 4.2 Health concerns
• 5 Origin of the name and the logo
• 6 Bluetooth Consortium
• 7 See also
• 8 References

9 External links

Uses

Maximu Maximu
m m Range
Clas
Permitte Permitte (approximat
s
d Power d Power e)
(mW) (dBm)

Clas
100 mW 20 dBm ~100 meters
A typical Bluetooth mobile phone s1
headset

Clas
2.5 mW 4 dBm ~10 meters
s2

Clas
1 mW 0 dBm ~1 meter
s3

Bluetooth profiles
A typical Bluetooth USB adapter, shown
In order to use Bluetooth, a device must
here next to a coin for size comparison
be compatible with certain Bluetooth
purposes
profiles. These define the possible
applications and uses.
Bluetooth is a radio standard and
communications protocol primarily
designed for low power consumption, List of applications
with a short range (power class
dependent: 1 metre, 10 metres, 100 • Wireless control of and
metres) based around low-cost communication between a cell
transceiver microchips in each device. phone and a hands free headset
or car kit. This was one of the
Bluetooth lets these devices earliest applications to become
communicate with each other when they popular.
are in range. The devices use a radio • Wireless networking between
communications system, so they do not PCs in a confined space and
have to be in line of sight of each other, where little bandwidth is
and can even be in other rooms, so long required.
as the received transmission is powerful • Wireless communications with
enough. PC input and output devices, the
most common being the mouse,
keyboard and printer.
• Transfer of files between devices network and requires configuration to set
via OBEX. up shared resources, transmit files, set up
• Transfer of contact details, audio links (e.g. headsets and hands-free
calendar appointments, and devices), whereas Bluetooth devices
reminders between devices via advertise all services they actually
OBEX. provide; this makes the utility of the
• Replacement of traditional wired service that much more accessible,
serial communications in test without the need to worry about network
equipment, GPS receivers and addresses, permissions and all the other
medical equipment. considerations that go with typical
• For controls where infrared was networks.
traditionally used.
• Sending small advertisements Wi-Fi
from Bluetooth enabled
advertising hoardings to other, Wi-Fi uses the same radio frequencies as
discoverable, Bluetooth devices. Bluetooth, but with higher power
• Wireless control of a games consumption resulting in a stronger
console – Nintendo's Wii and connection. As mentioned earlier, Wi-Fi
Sony's PlayStation 3 both use is sometimes, but rarely, called "wireless
Bluetooth technology for their Ethernet". Although this description is
wireless controllers. inaccurate, it provides an indication of
Wi-Fi's relative strengths and
Bluetooth vs. Wi-Fi in networking weaknesses. Wi-Fi requires more setup
but is better suited for operating full-
Bluetooth and Wi-Fi both have their scale networks as it enables a faster
places in today’s offices, homes, and on connection, better range from the base
the move: setting up networks, printing, station, and better security than
or transferring presentations and files Bluetooth.
from PDAs to computers.
One method for comparing the
Bluetooth efficiency of wireless transmission
protocols such as Bluetooth and Wi-Fi is
Bluetooth is in a variety of new products called spatial capacity.
such as phones, printers, modems, and
headsets. Bluetooth is acceptable for Specifications and
situations when two or more devices are
in proximity to each other and don't Features
require high bandwidth. Bluetooth is
most commonly used with phones and The Bluetooth specification was first
hand-held computing devices, either developed in 1994 by Sven Mattisson
using a Bluetooth headset or transferring and Jaap Haartsen, who were working
files from phones/PDAs to computers. for Ericsson Mobile Platforms in Lund,
Sweden at the time The specifications
Bluetooth also simplified the discovery were formalized by the Bluetooth
and setup of services. Wi-Fi is more Special Interest Group (SIG). The SIG
analogous to the traditional Ethernet was formally announced on May 20,
1998. Today it has over 6000 companies • Higher transmission speeds in
worldwide. It was established by practice
Ericsson, Sony Ericsson, IBM, Intel, • extended Synchronous
Toshiba and Nokia, and later joined by Connections (eSCO), which
many other companies as Associate or improves voice quality of audio
Adopter members. Bluetooth is also links by allowing retransmissions
known as IEEE 802.15.1. of corrupted packets.
• Host Controller Interface (HCI)
Bluetooth 1.0 and 1.0B support for 3-wire UART
• HCI access to timing information
Versions 1.0 and 1.0B had many for Bluetooth applications
problems and the various manufacturers
had great difficulties in making their Bluetooth 2.0
products interoperable. 1.0 and 1.0B also
had mandatory Bluetooth Hardware This version is backwards compatible
Device Address (BD_ADDR) with 1.x. The main enhancement is the
transmission in the handshaking process, introduction of Enhanced Data Rate
rendering anonymity impossible at a (EDR) of 3.0 Mbps. This has the
protocol level, which was a major following effects.
setback for services planned to be used
in Bluetooth environments, such as • 3 times faster transmission speed
Consumerium. —up to 10 times in certain cases
(up to 2.1 Mbit/s).
Bluetooth 1.1 • 100 meter range (Depends on the
class of the device)
• Many errors found in the 1.0B • Lower power consumption
specifications were fixed. through a reduced duty cycle.
• Added support for non-encrypted • Simplification of multi-link
channels. scenarios due to more available
• Received Signal Strength bandwidth.
Indicator (RSSI) • Further improved BER (bit error
rate) performance.
Bluetooth 1.2
=== Bluetooth 2.1 ===fdfdfd A draft
This version is backwards compatible version of the Bluetooth Core
with 1.1 and the major enhancements Specification Version 2.1 + EDR is now
include available from the Bluetooth website.

• Adaptive Frequency-hopping
spread spectrum (AFH), which
improves resistance to radio
frequency interference by
avoiding the use of crowded
frequencies in the hopping
sequence Future of Bluetooth
The next version of Bluetooth and strength of security. It is
technology, currently code-named expected that this feature will
Lisbon, includes a number of features to significantly increase the use of
increase security, usability and value of Bluetooth.
Bluetooth. The following features are
defined: Bluetooth technology already plays a
part in the rising Voice over IP (VOIP)
• Automatic Encryption Change - scene, with Bluetooth headsets being
allows encrypted links to change used as wireless extensions to the PC
their encryption keys audio system. As VOIP becomes more
periodically, increasing security, popular, and more suitable for general
and also allowing role switches home or office users than wired phone
on an encrypted link lines, Bluetooth may be used in Cordless
handsets, with a base station connected
• Extended Inquiry Response - to the Internet link.
provides more information
during the inquiry procedure to The version of Bluetooth after Lisbon,
allow better filtering of devices code-named Seattle, has many of the
before connection. This same features, but is most notable for
information includes the name of plans to adopt Ultra-wideband radio
the device, and a list of services, technology. This will allow Bluetooth
with other information. use over UWB radio, enabling very fast
data transfers, synchronizations and file
• Sniff Subrating - reducing the pushes, while building on the very low
power consumption when power idle modes of Bluetooth. The
devices are in the sniff low- combination of a radio using little power
power mode, especially on links when no data is transmitted, and a high
with asymmetric data flows. data rate radio used to transmit bulk
Human interface devices (HID) data, could be the start of software
are expected to benefit the most, radios. Bluetooth, given its worldwide
with mice and keyboards regulatory approval, low power
increasing the battery life from 3 operation, and robust data transmission
to 10 times those currently used. capabilities, provides an excellent
signalling channel to enable the soft
• QoS Improvements - these will radio concept.
enable audio and video data to be
transmitted at a higher quality, On 28 March 2006, the Bluetooth
especially when best effort traffic Special Interest Group announced its
is being transmitted in the same selection of the WiMedia Alliance
piconet. Multi-Band Orthogonal Frequency
Division Multiplexing (MB-OFDM)
• Simple Pairing - this version of Ultra-wideband (UWB) for
improvement will radically integration with current Bluetooth
improve the pairing experience wireless technology. UWB integration
for Bluetooth devices, while at will create a version of the globally
the same time increasing the use popular Bluetooth wireless technology
with a high speed/high data rate option. Bluetooth specification allows
This new version of Bluetooth connecting 2 or more piconets together
technology will meet the high-speed to form a scatternet, with some devices
demands of synchronizing and acting as a bridge by simultaneously
transferring large amounts of data as playing the master role in one piconet
well as enabling high quality video and and the slave role in another piconet.
audio applications for portable devices, These devices have yet to come, though
multi-media projectors and television are supposed to appear in 2007.
sets, wireless VOIP. At the same time,
Bluetooth technology will continue Setting up connections
catering to the needs of very low power
applications such as mice, keyboards and Any Bluetooth device will transmit the
mono headsets, enabling devices to following sets of information on
select the most appropriate physical demand:
radio for the application requirements,
thereby offering the best of both worlds. • Device Name
• Device Class
Technical information • List of services
• Technical information eg: device
features, manufacturer, Bluetooth
Communication & connection
specification, clock offset
A Bluetooth device playing the role of
Anything may perform an "inquiry" to
the "master" can communicate with up
find other devices to which to connect,
to 7 devices playing the role of the
and any device can be configured to
"slave". This network "group of up to 8
respond to such inquiries. However, if
devices" (1 master and 7 slaves) is called
the device trying to connect knows the
a piconet. A piconet is an ad-hoc
address of the device it will always
computer network of devices using
respond to direct connection requests
Bluetooth technology protocols to allow
and will transmit the information shown
one master device to interconnect with
in the list above if requested for it. Use
up to seven active slave devices . Up to
of the device's services however may
255 further slave devices can be
require pairing or its owner to accept but
inactive, or parked, which the master
the connection itself can be started by
device can bring into active status at any
any device and be held until it goes out
time.
of range. Some devices can only be
connected to one device at a time and
At any given time, data can be
connecting to them will prevent them
transferred between the master and 1
from connecting to other devices and
slave; but the master switches rapidly
showing up in inquiries until they
from slave to slave in a round-robin
disconnect the other device.
fashion. (Simultaneous transmission
from the master to multiple slaves is
Every device has a unique 48-bit
possible, but not used much in practice).
address. However, these addresses are
Either device may switch the
generally not shown in inquiries and
master/slave role at any time.
instead friendly "Bluetooth names" are
used which can be set by the user, and In a subsequent experiment, Martin
will appear when another user scans for Herfurt from the trifinite.group was able
devices and in lists of paired devices. to do a field-trial at the CeBIT
fairgrounds showing the importance of
Most phones have the Bluetooth name the problem to the world. A new attack
set to the manufacturer and model of the called BlueBug was used for this
phone by default. Most phones and experiment.
laptops will only show the Bluetooth
names and special programs that are 2004:
required to get additional information In April 2004, security consultant firm
about remote devices. This can get @Stake (now Symantec) revealed a
confusing as, for example, there could be security flaw that makes it possible to
several phones in range named "T610" crack into conversations on Bluetooth
(see "Bluejacking"). based wireless headsets by reverse
engineering the PIN.
Security
This is one of a number of concerns that
Bluetooth uses the SAFER+ algorithm have been raised over the security of
for authentication and key generation. Bluetooth communications. In 2004 the
The initialisation key and master key are first purported virus using Bluetooth to
generated using the E22 algorithm The spread itself among mobile phones
E0 stream cipher is used for encrypting appeared for the Symbian OS. The virus
packets. This makes eavesdropping on was first described by Kaspersky Lab
Bluetooth-enabled devices more and requires users to confirm the
difficult. installation of unknown software before
it can propagate.
Social concerns In August 2004, a world-record-setting
experiment (see also Bluetooth sniping)
Security concerns showed that the range of class 2
Bluetooth radios could be extended to
2003: 1.78 km (1.08 mile) with directional
In November 2003, Ben and Adam antennas. This poses a potential security
Laurie from A.L. Digital Ltd. discovered threat as it enables attackers to access
that serious flaws in Bluetooth security vulnerable Bluetooth-devices from a
may lead to disclosure of personal data. distance beyond expectation. However,
It should be noted however that the such experiments will not work using
reported security problems concerned signal amplifiers as the attacker must
some poor implementations of also be able to receive information from
Bluetooth, rather than the protocol itself. its victim in order to set up a connection.
No attack can be made against a
Bluetooth device unless the attacker
knows its Bluetooth address and which
channels to transmit on.
2005: if laptops and other devices are left in
In April 2005, Cambridge University this way. However, the best way is to not
security researchers published results of leave any valuable devices in cars.
their actual implementation of passive
attacks against the PIN-based pairing 2006:
between commercial Bluetooth devices, In April 2006, researchers from Secure
confirming the attacks to be practicably Network and F-Secure published a
fast and Bluetooth's symmetric key report which warns of the huge number
establishment method to be vulnerable. of devices left in a visible state, and
To rectify this vulnerability, they carried issued statistics on the spread of various
out an implementation which showed bluetooth services and the ease of spread
that stronger, asymmetric key of an eventual bluetooth worm.
establishment is feasible for certain
classes of devices, such as handphones. In October 2006, at the Luxemburgish
Hack.lu Security Conference , Kevin
In June 2005 Yaniv Shaked and Avishai Finistere and Thierry Zoller
Wool published the paper "Cracking the demonstrated and released a remote root
Bluetooth PIN1", which shows both shell over Bluetooth on MAC OSX
passive and active methods for obtaining 10.3.9 and 10.4, furthermore they
the PIN for a Bluetooth Link. The demoed the first public release and
passive attack would allow a suitably display of a Bluetooth PIN and Linkkeys
equipped attacker to eavesdrop on cracker which is based on the research of
communications and spoof if they were Wool and Shaked.
present at the time of initial pairing. The
active method makes use of a specially Health concerns
constructed message that must be
inserted at a specific point in the Bluetooth uses the microwave radio
protocol, to make the master and slave frequency spectrum in the 2.4 GHz to
repeat the pairing process. After that the 2.4835 GHz range. Previous
first method may be used to crack the electromagnetic hazard studies dating
PIN. This attack's major weakness is that from the 50's through the 80's, including
it requires the user of the devices under more recent studies concluded that low
attack to re-enter their PIN during the power signals with frequencies as high
attack when their device prompts them as 1.5 GHz - 2 GHz do not cause
to. Also, this active attack will most irreversible damage to human tissue. The
likely require custom hardware, as most radiated output power of Bluetooth
commercially available Bluetooth devices is low when compared to other
Devices are not capable of the timing widely used mobile devices, so it is
necessary. assumed that the potential for health
risks are also correspondingly lower.
In August 2005, police in Cambridge Bluetooth devices can operate
shire, England, issued warnings about continuously or sporadically (on
thieves using Bluetooth-enabled phones demand), so total exposure to EMF
to track other devices left in cars. Police radiation is very variable.
are advising users to ensure any mobile
networking connections are de-activated
Bluetooth Consortium
In 1998, Ericsson, IBM, Intel, Motorola,
Nokia and Toshiba formed the
consortium among themselves and
adopted the code name Bluetooth for
their proposed open specification. In
December 1999, 3Com, Lucent
Technologies, Microsoft and Motorola
joined the initial founders as the
promoter group. Since that time, Lucent
Technologies transferred their
membership to their spinoff Agere
Systems and 3Com has left the Promoter
group. Most recently, Nintendo has
installed Bluetooth on its new video
game controller, the Wii Remote, to
communicate with the Wii console. The
new Sony Playstation 3 also uses
Bluetooth technology for its wireless
functions.

Conclusion
Bluetooth is a low cost, low power RF
technology for short-range
communications. Biggest advantage over
other wireless networks is the low power
and low cost. There is huge market
potential for Bluetooth products. There
are a few commercial products available,
and it’s believed many more will roll out
in the near future. With the growing
demand for coexistence, both the
Bluetooth SIG and the IEEE 802.15
Working Groups are actively looking for
improved mechanisms

S-ar putea să vă placă și