Sunteți pe pagina 1din 19




Introduction What is Bluetooth? What does it do? History of Bluetooth

Introduction (contd)
Is Bluetooth here to stay? What should we expect from
Bluetooth in the future?

What Bluetooth Delivers to the end-user

Connects a wide range of computing and
telecommunication devices

Expand communication capabilities Devices can communicate with each other

with wireless connectivity

User Application

Car manufactures Industry

E-Mail / Internet / Intranet Access

Headsets Bluetooth will facilitate Local Area

Bluetooth in Action
In the house In the Office ...

Source: http//

Home Security

On the Road

Source: http//

On your Car

Source: http//

Bluetooth Specifications
Things that you must have:
Transceivers and Receivers that can send and receive data because they use Radio Waves. MAC Address (Physical Address) Burnt on the NIC card by the manufacturer. PIN Number To identify the user using the device. A Piconet A FHHS protocol

What is a Piconet?
A Piconet session is a communication link

that must be created between devices for devices to communicate with each other.

This is done when the MAC address and

the PIN number match.

Piconet (cont.)
If two devices come onto contact with each
other( 32 feet) the user will be prompted to initiate a communication session to initiate a session

Users then can either deny or accept the request

Only devices approved by the user can take part
in the session

Data will appear as noise to unauthorized

devices (A great security feature).

Bluetooth devices use a protocol called (FHHS)
Frequency-Hopping Spread Spectrum .

Uses packet-switching to send data.

Bluetooth sends packets of data on a range of


In each session one device is a master and the

others are slaves.

The master device decides at which frequency

data will travel.

Transceivers hop among 79 different
frequencies in the 2.4 GHz baud at a rate of 1600 frequency hops per second.

The master device tells the slaves at what

frequency data will be sent.

This technique allows devices to communicate

with each other more securely.

FHHS Example


Bluetooth Security
Security Mode 1 No Security Security Mode 2 Service Level Enforced Security Implemented after channel is established Security Mode 3 Link Level Enforced Security Implemented before channel is established

No Restrictions

Restrictions, Access is limited

Service Levels
Authorization and Authentication
Authentication Only Open to all Devices

Link Level
Bluetooth Device Address
Private Link Key Private Encryption Key Random Number

Bluetooth Secure Enough?

Not enough for confidential and top secret
information now but . . . Security will Improve
Improve exisiting security Implement new security