Sunteți pe pagina 1din 23

ABSTRACT

Today, electronics that connect to one another are found everywhere; in the office, home, Car, etc.
Keyboards connect to computers, MP3 players to headphones and so on. These are possible with
the help of wires and cables.

In this seminar work I try to look at Bluetooth technology in handling connection issues. Bluetooth
technology is a short-range wireless radio technology that allows electronic devices to connect to
one another. Generally, Bluetooth has a range of up to 30 ft. or greater, depending on the Bluetooth
Core Specification Version. Newer devices, using newer versions of Bluetooth, have ranges over
100 ft. Bluetooth wireless technology makes connections just like cables connect a computer to a
keyboard, mouse, or printer, or how a wire connects an MP3 player to headphones. Bluetooth
technology makes these same connections, except it does it without the cables and wires.

Bluetooth technology is actually derived from a combination of wireless technologies. The


Bluetooth specification unites these technologies under the title: "Bluetooth technology".

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 1


INTRODUCTION

Bluetooth technology was first developed by Ericsson and then formalized by a group of
electronics manufacturers (Ericsson, IBM, Intel, Nokia, and Toshiba) who joined forces to form a
private trade association known as the Bluetooth Special Interest Group (SIG). When they formally
introduced the Bluetooth specification to the public, they established a global standard, thus
creating a universal way for mobile computers, cell phones, and various other devices to wirelessly
connect with one another.

The name “Bluetooth” and its logo are trademarked by the privately held trade association named
the Bluetooth Special Interest Group (SIG). Founded in September 1998, the Bluetooth SIG is a
unification of leaders in the telecommunications, computing, network, industrial automation, and
Automotive industries. Today, the Bluetooth SIG is responsible for encouraging and supporting
research and development in Bluetooth technology.

The Bluetooth SIG includes promoter member companies Microsoft, Ericsson, IBM, Intel, Agere,
Motorola, Nokia, and Toshiba, plus thousands of Associate and Adopter member companies.

Why is It Called Bluetooth? The developers of this wireless technology first used the name
"Bluetooth" as a code name, but as time past, the name stuck.
The word "Bluetooth" is taken from the 10th century Danish King Harald Bluetooth. King
Bluetooth had been influential in uniting Scandinavian Europe during an era when the region was
torn apart by wars and feuding clans. The founders of the Bluetooth SIG felt the name was fitting
because: Bluetooth technology was first developed in Scandinavia, and is able to unite differing
industries such as the cell phone, computing, and automotive markets. Bluetooth wireless
technology simplifies and combines multiple forms of wireless communication into a single,
secure, low-power, low-cost, globally available radio frequency.

Bluetooth Technology Over the Years


When Bluetooth was officially introduced in 1998, its intended basic purpose was to be a wire
replacement technology in order to rapidly transfer voice and data. There were many doubters who
believed Bluetooth would be a distant memory in just a couple of years. However, multiple years
have passed and Bluetooth continues to make strides and advancements everyday.

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 2


A lot has changed since the first Bluetooth Core Specification Version was introduced in 1998.
Over the past couple years Bluetooth technology has really begun to take giant leaps forward.
In 2003, the Bluetooth SIG began a major overhaul of the Bluetooth specification with the
announcement of version 2.1. Then, in 2004, Bluetooth version 2.0 + EDR (Enhanced Data Rate)
was introduced. Devices using version 2.0 + EDR began to hit the market in late 2005.

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 3


HOW BLUETOOTH TECHNOLOGY WORKS

Connecting Devices
In order to understand how Bluetooth technology works, we must first take a look at how electronic
devices (Bluetooth or not) connect and communicate with one another. There are several questions
that need to be addressed before any two devices can communicate with one another.

Q: Will the devices communicate via wires or through the air?


A: Obviously, if the devices are using Bluetooth technology, they will communicate without wires.
However, if the devices are not Bluetooth enabled, then they have the option of communicating
either with or without wires. Devices can take advantage of several wireless technologies
(Bluetooth included) by using various transmitters to send information over the airwaves.

Q: How will messages or information be sent between the two devices?


A: Information can be sent one bit at a time in a scheme called serial communications, or in groups
of bits (usually 8 or 16 at a time) in a scheme called parallel communications.

Q: How will devices in this “electronic conversation” know what the information (bits or groups of
bits) means? How will they know if they received the same message that was sent?
A: Most of the time these questions are answered by the creation of what is known as a protocol. A
protocol is a standard that controls or enables the connection, communication, and data transfer
between two electrical devices. Basically, a protocol is the "language" of devices.

With so many different types of electronics available, it is probably no surprise that there are tons
of established protocols. However, almost all protocols address one or more of the following:

* Detecting the presence of other devices


* Establishing communications guidelines between two devices (AKA: Handshaking)
* Determining the various connection characteristics
* How to format a message
* How to start and end a message
* What to do with corrupted or incorrectly formatted messages
* How to recognize unexpected connection loss, and what to do next
* Ending the connection or “conversation”

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 4


Phone Server Computer Printer

Some types of products have a standard protocol used by almost all companies. As a result, the
commands for one product will have the same effect on another. However, there are other devices
that use their own specific protocol, which means that commands intended for one specific device
will seem foreign if received by another.

The goal of Bluetooth is to establish a worldwide, universal "language" for devices. Bluetooth uses
a standardized wireless protocol for devices to communicate. It forces devices to agree on when
bits are sent, how many will be sent at a time, and how the devices in a conversation can be sure
that the message received is the same as the message sent. So, you can be positive that any two
devices using compatible Bluetooth will definitely be able to communicate with one another.

Bluetooth: Low Power and Low Cost!


Bluetooth wireless technology operates on an open frequency within the 2.4 gigahertz band, which
is the same as WiFi, cordless phones and various other wireless devices. Bluetooth is able to share
the same frequency band without experiencing any interference because it utilizes various key
technologies.

Bluetooth avoids interference is through the use of low power signals (around one milliwatt).
Devices One of the ways using the Bluetooth Core Specification Version 1.1 or later are able to
avoid interference with other wireless devices because their signal is so weak.

The signal is also capable of passing through the walls in your home, making it useful for
controlling several devices in different rooms. Data can be transferred at a rate of up to one
Megabyte per second (Mbps). Also, because Bluetooth transmitters require minimal amounts of
power, they are relatively inexpensive to manufacture. Simply put, Bluetooth uses low-power radio
waves to reliably communicate in an inexpensive way.

Another way Bluetooth devices are able to avoid interference is through a technique known as
spread-spectrum frequency hopping. By using the “hopping” method, a device will use one of 79

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 5


different, randomly chosen frequencies within an assigned range, and will frequently change
frequencies from one to another.

Bluetooth enabled devices, which all use the “hopping” method, change frequencies 1,600 times
per second. As a result, more devices can use a portion of the radio spectrum.

The risk of a device like a cell phone or baby monitor interfering with Bluetooth devices is
minimized, since any interference on a specific frequency will last for only a fraction of a second.

Bluetooth version 2.0 + EDR, the very latest of the Bluetooth specification versions, uses an
enhanced technology called: Adaptive Frequency Hopping (AFH).

AFH allows Bluetooth devices to measure the quality of the wireless signal and then determine if
there are bad channels present on specific frequencies due to interference from other wireless
devices. If bad channels are present on a specific frequency, the Bluetooth device will adjust its
hopping sequence to avoid them. As a result, the Bluetooth connection is stronger, faster, and more
reliable.

How Bluetooth is used


Bluetooth enabled devices must use and understand certain Bluetooth "profiles" in order to use
Bluetooth technology to connect to one another. These profiles define the possible applications that
a Bluetooth enabled device can support. In order for one Bluetooth device to connect to another,
both devices must share at least one of the same Bluetooth profiles.

Personal-Area Network (PAN) or Piconet


When two or more Bluetooth devices, sharing the same profile(s), come in range of one another,
they establish a connection automatically. So, the user doesn’t have to press any buttons or set
anything up. Once the Bluetooth devices are all connected, a network is created.
Bluetooth devices create a Personal-area Network (PAN), or commonly called a piconet.
Bluetooth piconets are designed to link up to eight different devices. A piconet can be as small as a
two foot connection between a keyboard and computer, or it can encompass several devices over an
entire room.

Furthermore, it is possible for multiple, distinct piconets to be operating in the same room at any
given moment. Devices that are apart of a specific piconet, based on their profiles, use “Hopping”
Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 6
simultaneously so they stay in touch with one another and avoid other piconets that may be
operating in the same room.

In order to regulate communications one of the participating devices is assigned the role of
"master" of the piconet, while all other units become "slaves". Masters have the duty of directing
and controlling communications, even between two slave devices.

Under the current Bluetooth specification, up to seven slaves and one master can actively
communicate. Furthermore, in order to extend these networks, several piconets can be joined
together in what is known as a scatternet.

Piconet Piconet
In theory, anyone with a compatible Bluetooth device is supposed to have the ability to hook up
anywhere within that network and connect to another Bluetooth device.

Extended Synchronous Connection Oriented Links


With the introduction of Bluetooth version 2.0 + EDR (Enhanced Data Rate), the latest of the
Bluetooth Core Specification Versions, the ability to form larger more diverse piconets is greatly
improved. One factor that contributes to more improved piconets is the addition of the extended
Synchronous Connection Oriented (eSCO) link type. The eSCO link type allows Bluetooth devices
to monitor and retransmit voice packets to improve the quality of the link. This is an especially
important advancement to wireless devices that transmit audio data, like stereo headphones and
headsets.

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 7


BLUETOOTH IN ACTION

The Wireless Office


Imagine a modern day office with various hi-tech, yet common electronic devices.
The first thing an office should have are the basic essentials: a computer, keyboard, mouse, printer
and phone. Next, lets say there is a Headset that works with the phone.
Every device is connected, or is capable of being connected to at least one other device. For
example, the keyboard and mouse have to connect to the computer and the PDA has the option to
connect to the computer.

Just imagine if all these devices used cables to


connect to one another. The office would have cables
running everywhere and we'd be left with a big,
tangled mess.
Now imagine all of these devices use Bluetooth
technology to connect to one another instead. The
result: no more cables and no more mess.

Suppose the Bluetooth enabled printer comes with a


Bluetooth Computer Adapter that plugs into the computer's universal serial bus (USB) port. The
company that manufactured the printer and computer adapter programmed each device with the
same Bluetooth profiles.
Bluetooth profiles are used by devices to instruct them on how to use the Bluetooth technology.
Profiles define the application(s) of Bluetooth technology.
After the printer is turned on, it transmits a signal, which looks for a response from other Bluetooth
enabled devices with the same profile(s). Since the USB adapter shares the same profile(s), it
responds and a small network (AKA: Piconet) is created.

Since this piconet is established between devices with the same specific profiles, the signals sent by
other devices with different profiles, like the headset, will be ignored. All the other Bluetooth
devices in the room establish similar piconets that are all separated from one another based on the
specific profile(s) they use.
Our "dream" office now has several different piconets operating simultaneously, and each one
knows which Bluetooth devices to communicate with and which signals to ignore.

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 8


THE ADVANTAGES OF BLUETOOTH

Main Reasons to Use a Bluetooth Device


1. Bluetooth Devices are Wireless. In addition to improving safety as a result of eliminating the
clutter of wires and associated hazardous connections, wireless technology also offers many
convenient advantages. For example, when you are traveling with your laptop, PDA, MP3
player and other devices, you no longer have to worry about bringing along all of your
connecting cables.

2. Bluetooth Technology is Inexpensive. Bluetooth technology is cheap for companies to


implement, which results in lower over-all manufacturing Costs. These savings are then
passed on to you, the consumer. The end result: Bluetooth devices are relatively
inexpensive.

3. Bluetooth is Automatic. Bluetooth doesn't require you to think about setting up a connection
or to push any buttons. When two or more Bluetooth devices enter a range (Up to 30 feet) of
one another, they automatically begin to communicate without you having to do anything.
Once the communicating begins, Bluetooth devices will setup Personal Area Networks or
Piconets. The best part is: The devices take care of the entire setup process, and you can go
about your business.

4. Standardized Protocol = Interoperability. Since Bluetooth is a standardized wireless


specification, a high level of compatibility among devices is guaranteed. The Bluetooth
specification uses and defines various profiles. Every Bluetooth profile is specific to a
particular function. For instance, when a Bluetooth enabled cell phone and a Bluetooth
headset (Both with the same profile) are communicating with one another, both will
understand each other without the user having to do anything, even if the devices are of
different models/makes.

5. Low Interference (If Any). Bluetooth devices avoid interference with other wireless devices
by:
a) Using a technique known as spread-spectrum frequency hopping, and
b) Using low power wireless signals.

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 9


6. Low Energy Consumption. As stated above, Bluetooth uses low power signals. As a result,
the technology requires little energy and will therefore use less battery or electrical power.
Obviously, this is a great benefit for mobile devices because Bluetooth won't drain the life
of your device's battery.

7. Share Voice and Data. The Bluetooth standard allows compatible devices to share both
voice and data communications. For example, it is probably no surprise that a Bluetooth
enabled cell phone is capable of sharing voice communications with a compatible Bluetooth
headset, however, the same cell phone may also be capable of establishing a GPRS
connection to the Internet. Then, using Bluetooth, the phone can connect to a laptop. The
result: The laptop is capable of surfing the web or sending and receiving email.

8. Instant Personal Area Network (PAN). Up to seven compatible Bluetooth devices can
connect to one another within a proximity of up to 30 feet, forming a PAN or piconet.
Multiple piconets can be automatically setup for a single room.

9. Upgradeable. The Bluetooth standard is upgradeable. A development group at the Bluetooth


Special Interest Group (SIG) has been given the task of working on the new Bluetooth
version 2, which offers several new advantages and is backward compatible with the older
versions.

10. The Technology is Here to Stay. Bluetooth is a universal, world-wide, wireless standard.
Therefore, you can count on it being around for years to come. As more devices begin to
use Bluetooth technology, electronics manufacturers will be increasingly eager to make
their products compatible, using Bluetooth. A chain reaction is inevitable, in fact, it has
already begun.

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 10


BLUETOOTH CORE SPECIFICATION VERSIONS

Several Bluetooth specification versions have been released since Bluetooth technology was
introduced in 1998.
Versions 1.0 and 1.0B had too many problems and restraints for manufacturers to successfully
develop Bluetooth devices. The main issue was the lack of interoperability among devices.

The Bluetooth Core Specification version 1.1 is the first truly successful operating version of
Bluetooth technology. Bluetooth 1.1 corrected many of the problems found in the earlier versions.
As a result: Devices using Bluetooth 1.1 have much greater interoperability.

Bluetooth Version 1.2. Many new Bluetooth devices, like the latest cell phones, are being sold with
the newer Bluetooth specification version 1.2. So, what new features/benefits does Bluetooth 1.2
offer?

a. Backward compatible with Bluetooth 1.1


b. Adaptive Frequency Hopping - helps reduce radio interference by eliminating the
use of crowded frequencies in the hopping sequence
c. Faster transmission speeds (1 Mbps)
d. Extended Synchronous Connections Oriented links - improves voice quality of audio
connections by enabling retransmissions of corrupted data.
e. Received Signal Strength Indicator
f. Host Controller Interface (HCI) support for 3-wire UART
g. HCI access to timing information for Bluetooth applications

Bluetooth Version 2.0 + EDR (Enhanced Data Rate). There may be multiple communication
technologies, but they all share one thing in common: Faster is better. The Bluetooth SIG realized
this, and worked on improving the speeds of Bluetooth version 1.2. Bluetooth version 2.0 + EDR
was announced by the Bluetooth SIG in June 2004 and began appearing in Bluetooth devices in late
2005.
Bluetooth version 2.0 + EDR delivers data transfer rates up to three times faster than the original
Bluetooth specification. Bluetooth version 2.0 + EDR also provides enhanced multiple-
connectivity. With Bluetooth 2.0 + EDR, users will be able to more efficiently run multiple
Bluetooth devices at the same time. As a result, Bluetooth Personal-Area Networks (PAN) or
Piconets will become more common.
Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 11
For example, users will have the ability to synchronize a Bluetooth enabled computer with a
Bluetooth PDA, and at the same time they can listen to music using a pair of Bluetooth wireless
headphones.
Computers and computer related devices have been some of the 1st devices to use Bluetooth 2.0 +
EDR, while audio and imaging devices are expected to follow shortly.
Here is a listing of the main enhancements/features you will find with Bluetooth Specification
Version 2.0 + EDR:

* Backward compatible with previous Bluetooth versions


* Three times faster transmission speed (10 times in some cases)
* Enhanced data rate of up to 3 Mbps
* Lower power consumption due to reduced duty cycles
* Broadcast/multicast support
* Simplification of multi-link scenarios due to more available bandwidth
* Distributed media-access control protocols
* Further improved Bit Error Rate performance

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 12


BLUETOOTH PAIRING

Bluetooth pairing occurs when two Bluetooth devices agree to communicate with each other and
establish a connection. In order to pair two Bluetooth wireless devices, a password (passkey) has to
be exchanged between the two devices. A Passkey is a code shared by both Bluetooth devices,
which proves that both users have agreed to pair with each other.

In order to find other Bluetooth devices, Bluetooth device A must be set to discoverable mode.
When set to discoverable, Bluetooth device A will allow other Bluetooth devices to detect its
presence and attempt to establish a connection.

You may set your discover setting off if you like (It is recommended that you turn it off when not
using the Bluetooth). When the discover setting is off, no other Bluetooth device will be able to
find it. Undiscoverable devices can still communicate with each other but they have to initiate
communication themselves.

Bluetooth device A finds Bluetooth device B. Usually the discoverable device will indicate what
type of device it is (Such as a printer, cell phone, headset, etc.) and its Bluetooth device name. The
Bluetooth device name is the name that you give the Bluetooth device or the factory name that
originally was programmed.

Bluetooth Device A prompts you to enter a password (PassKey). With advanced devices, both users
must agree on the Passkey and enter it into their device. The code can be anything you like as long
as it is the same for both Bluetooth wireless devices. On other devices, such as Bluetooth headsets,
the Passkey stays the same. Refer to the product’s manual for the default passkey. Most often , the
passkey is zero.

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 13


Bluetooth device A sends the Passkey to Bluetooth device B
Bluetooth device B sends the Passkey back to Bluetooth device A
If both Passkeys are the same, a trusted pair is formed. This will happen automatically.
Bluetooth device A and B are now paired and able to exchange data

A & B (Paired)

B (Passkey)
A (Passkey)

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 14


BLUETOOTH PROFILES

The Bluetooth SIG states, "Bluetooth profiles are general behaviors through which Bluetooth
enabled devices communicate with other devices." In order to connect to one another, devices that
use Bluetooth technology must support and understand certain Bluetooth profiles. Bluetooth
profiles define the possible applications and describe how Bluetooth technology is to be used for
each specific device.

For example, the File Transfer profile is used to define how devices like a PDA will use Bluetooth
Technology to transfer files to other devices like another PDA, cell phone, or computer.

When a Bluetooth device is developed, the manufacturer assigns (In accordance with the Bluetooth
SIG's requirements) specific Bluetooth profiles for that device to use in order to establish
applications which will work with other Bluetooth devices.

In order for one Bluetooth device to connect to another, both devices must share at least one of the
same Bluetooth profiles.

For example, if you want to use a Bluetooth headset with your Bluetooth enabled cell phone, both
devices must use the Headset (HS) profile (Defines how headsets and cell phones use Bluetooth
technology to connect to one another).

According to the Bluetooth SIG: At minimum, every Bluetooth profile includes information on the
following issues:
Dependencies on other profiles.
Recommended user interface formats.
Particular parts of the Bluetooth protocol stack used by the profile. To perform its functions, each
profile uses particular options and parameters at each layer of the stack. This may include an
outline of the required service record, if applicable.

Most Bluetooth devices are given just a few profiles. For example, a Bluetooth headset will use the
Headset Profile, but not the LAN Access Profile (Defines how devices use Bluetooth technology to
connect to local area networks).

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 15


Progression of Bluetooth Profiles: There are currently 25 Bluetooth profiles which have been
officially adopted and are in use. Most of the Bluetooth profiles were introduced with the Bluetooth
Core Specification version 1.1. The Bluetooth SIG governs the development of new Bluetooth
profiles.
With the continual growth of Bluetooth technology, Bluetooth profiles will continue to be enhanced
and expanded upon. As more profiles are developed, the overall Bluetooth specification is updated
and reformatted so that the entire thing doesn’t have to be rewritten.

How are Bluetooth Profiles Important to Me?


Just because a product is advertised as a Bluetooth device, doesn't mean it's capable of connecting
to every other Bluetooth device in existence. A device that is "Bluetooth-enabled" simply means it
has at least one Bluetooth profile which would allow it to connect with another Bluetooth device
that shares the same profile(s). However, if the other Bluetooth device does not share the same
profile(s), the devices cannot connect. When buying a Bluetooth-enabled product you should find
out what Bluetooth functions/services the device supports. These functions will usually spell out
what Bluetooth profiles the product uses. Don’t worry, most of the time you don't even need to
worry about profiles when buying a Bluetooth device. The specifications on the manufacturer’s
website, retailer’s website (i.e. Amazon) or on the retail box for a Bluetooth device should explain
everything you need to know. Such as: what other devices it's compatible with, what it can do, and
any system requirements.

Most of the time the specific Bluetooth profiles won't be of much importance to you. However,
when you are trying to expand a device's functions or use it with another Bluetooth device that's not
listed as compatible, then it is highly recommended that you find out what specific profiles are
used.

What Profiles Does a Device Support?


Each Bluetooth profile has a specialized use. So, you can find out which Bluetooth devices are
compatible by knowing what Bluetooth profile(s) they support. Finding out what profile(s) a device
supports is usually an easy, quick process.
For example, you know a Bluetooth enabled printer is going to support the Basic Printing Profile.
But, if you have a PDA with Bluetooth technology, things may be a little more complicated. A
Bluetooth enabled PDA usually supports several profiles, such as the Synchronization Profile, LAN
Access Profile, File Transfer Profile and others.

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 16


BLUETOOTH SPECIFICATIONS

• Bluetooth devices in a piconet share a common communication data channel. The


channel has a total capacity of 1 megabit per second (Mbps). Headers and
handshaking information consume about 20 percent of this capacity.
• In the United States and Europe, the frequency range is 2,400 to 2,483.5 MHz, with
79 1-MHz radio frequency (RF) channels. In practice, the range is 2,402 MHz to
2,480 MHz. In Japan, the frequency range is 2,472 to 2,497 MHz with 23 1-MHz RF
channels and in Nigeria, the frequency range is that same as that of the US.
• A data channel hops randomly 1,600 times per second between the 79 (or 23) RF
channels.
• Each channel is divided into time slots 625 microseconds long.
• A piconet has a master and up to seven slaves. The master transmits in even time
slots, slaves in odd time slots.
• Packets can be up to five time slots wide.
• Data in a packet can be up to 2,745 bits in length.
• There are currently two types of data transfer between devices: SCO (synchronous
connection oriented) and ACL (asynchronous connectionless).
• In a piconet, there can be up to three SCO links of 64,000 bits per second each. To
avoid timing and collision problems, the SCO links use reserved slots set up by the
master.
• Masters can support up to three SCO links with one, two or three slaves.
• Slots not reserved for SCO links can be used for ACL links.
• One master and slave can have a single ACL link.
• ACL is either point-to-point (master to one slave) or broadcast to all the slaves.
• ACL slaves can only transmit when requested by the master.

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 17


BLUETOOTH SECURITY

Bluetooth Technology Faces Security Threats


Today, all communication technologies are facing the issue of privacy and identity theft. Bluetooth
technology is no exception. The information and data we share through these communication
technologies is both private and in many cases, critically important to us.
Everyone knows that email services, company networks, and home networks all require security
measures. What Bluetooth users need to realize, is: Bluetooth requires similar security measures.

Recently, Bluetooth technology has been popping up in the internet. Unfortunately, most of the
news involves confusion and misinformation regarding the security of Bluetooth. Recent reports
have surfaced describing ways for hackers to crack Bluetooth devices security codes.

The question is; Are the Threats Serious?


The good news: most of the recent Bluetooth security scares, like most scares, are over-dramatized
and blown out of proportion. The truth is, these issues are easily combatable, and various measures
are already in place to provide for the secure use of Bluetooth technology.

Yes, it is true: there have been some Bluetooth cell phones that have been hacked into. However, it
is most likely the case that those who have experienced these security breaches have not taken the
appropriate precautions to protect their devices.

According to the Bluetooth Special Interest Group (SIG), in order to break into a Bluetooth device,
a hacker must:
Force two paired Bluetooth devices to break their connection
Steal the packets used to resend the PIN, then
Decode the PIN

The hacker must of course be within range of the Bluetooth device and, according to the Bluetooth
SIG, be using very expensive developers’ equipment. The SIG suggests users create a longer PIN (8
digit is recommended).

The Bluetooth SIG Focuses on Security. The Bluetooth SIG is constantly improving formats for
combating security threats associated with Bluetooth technology. Offering a secure method to
Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 18
wirelessly communicate has always been one of the key benefits of Bluetooth technology. If you
look at The History of Bluetooth, you will see that offering secure data transmission was one of the
core principles for its creation.
In order to lead the security effort, a group of engineers within the Bluetooth SIG formed the
Bluetooth Security Experts Group. As the Bluetooth Core Specification Versions continue to
advance, the Bluetooth Security Experts Group is responsible for monitoring the advancement and
testing for flaws in its security.

The Fundamentals of Bluetooth Security. One of the most basic levels of security for Bluetooth
devices is the “pairing” process.
Pairing = Two or more Bluetooth devices recognize each other by the Bluetooth Profiles they share,
and in most cases, both must enter the same PIN.
The Bluetooth core specifications use an encryption algorithm, which is entirely secure. Once
Bluetooth devices pair with one another, they too are entirely secure.

Bluetooth devices will not communicate with each other until they have successfully paired. So,
because of this pairing process and the fact that it has a short range, Bluetooth technology is
considered to be fundamentally secure.

Unfortunately, as recent news has indicated, experienced hackers have come up with a way to get
around this basic level of security. However, there are precautions users can take to limit the
chances of their Bluetooth device from being compromised by a hacker.

How Developers Can Provide Security. Companies who develop Bluetooth enabled products have
multiple options in order to provide security. There are three security modes for connecting two
Bluetooth devices:
Security Mode 1: non-secure
Security Mode 2: service level enforced security
Security Mode 3: link level enforced security

It is the company who develops each specific Bluetooth product that decides which security modes
to use. Also, the devices and services have different security levels as well. For example, devices
use two levels: "trusted device" and "untrusted device". After a trusted device is connected to
another device, it has unrestricted access to all services. As far as services, there are three security

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 19


levels which are defined: services that require authorization and authentication, services that
require authentication only and services that are open to all devices.
Why Have There Been Security Threats? The recent Bluetooth security threats have been isolated
to Bluetooth cell phones. The issues were due to specific problems with the cell phone’s platforms.
In order to solve, and prevent against further security problems, the Bluetooth SIG and all of its
members work together to discover, inspect and solve reported problems.

If there is something wrong with the actual Bluetooth specification, then the Bluetooth SIG will
confront the problem directly. However, if the problem is a result of the implementation of
Bluetooth technology, then the SIG will work with the specific members in order to release patches
and prevent future problems from occurring.

What is Bluejacking? Bluejacking allows phone users to send business cards anonymously to one
another using Bluetooth technology. Bluejacking does NOT involve any altercations to your
phone's data. These business cards usually consist of some clever message or joke. Bluejackers are
simply looking for a reaction from the recipient. To ignore bluejackers, simply reject the business
card, or if you want to avoid them entirely, set your phone to non-discoverable mode

What is Bluesnarfing? Bluesnarfing refers to a hacker who has gained access to data, which is
stored on a Bluetooth enabled phone. Bluesnarfing allows the hacker to make phone calls, send and
receive text messages, read and write phonebook contacts, eavesdrop on phone conversations, and
connect to the Internet. The good news is, bluesnarfing requires advanced equipment and expertise
or requires the hacker to be within a 30 ft. range. If your phone is in non-discoverable mode, it
becomes significantly more difficult for hackers to bluesnarf your phone. According to the
Bluetooth SIG, only some older Bluetooth enabled phones are vunerable to bluesnarfing.

What is Bluebugging? Bluebugging refers to a skilled hacker who has accessed a cell phone's
commands using Bluetooth technology without the owner's permission or knowledge. Bluebugging
allows the hacker to make phone calls, send messages, read and write contacts and calendar events,
eavesdrop on phone conversations, and connect to the Internet. Just like all Bluetooth attacks, the
hacker must be within a 30 ft. range. Bluebugging and bluesnarfing are separate security issues, and
phones that are vulnerable to one are not necessarily vulnerable to the other.

What are Phone Manufacturers Doing to Solve These Problems?

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 20


Two of the leading cell phone manufacturers, Nokia and Sony Ericsson, have developed software
patches for phones susceptible to bluesnarfing and bluebugging. Also, both manufacturers have
taken great measures to ensure new phones entering the market will not be susceptible to these
attacks.

Are There Any Other Threats With Bluetooth Technology?


According to the Bluetooth SIG, bluesnarfing and bluebugging are the only known security threats.
The Bluetooth SIG is constantly researching security risks associated with the technology and
figure out if the risk is even possible as the technology expands and develops.

What Can Users Do to Protect Their Data?


There are several measures users can take in order to protect their device’s information:
If a phone is vulnerable to bluesnarfing or bluebugging--contact the manufacturer or take the phone
to a manufacturer-authorized dealer. There are software patches available for many older Bluetooth
phones.
Turn the device to non-discoverable mode when not using Bluetooth technology.
Never pair with unknown devices or in public places.
When possible, use an eight character or more alphanumeric PIN.

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 21


CONCLUSION
Bluetooth Technology is becoming the world fasted growing communication medium for
organizations, establishments, homes and even on the streets whose quest is to share data,
information, pictures, music at a reduced cost. I employ everyone the next time you shopping for a
device in your home, offices look for a Bluetooth enabled device. You don’t always have to be at
your desk to listen to music or carry your phone(s) around in your house just to receive a call.

Join in the world of communication made easy.

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 22


Reference
1. www.scribd.com
2. www.bluetooth.com
3. www.bluetoothtomorrow.com
4. Bluetooth Application Developer Guild by David Kammer, Gordon McNutt, Brian Senese
& Jennifer Bray. www.syngress.com

Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 23

S-ar putea să vă placă și