Sunteți pe pagina 1din 19

Bluetooth

BY

sandeep

Introduction What is Bluetooth? What does it do? History of Bluetooth

Introduction (contd)
Is Bluetooth here to stay? What should we expect from
Bluetooth in the future?

What Bluetooth Delivers to the end-user


Connects a wide range of computing and
telecommunication devices

Expand communication capabilities Devices can communicate with each other


with wireless connectivity

User Application

Car manufactures Industry

E-Mail / Internet / Intranet Access


Headsets Bluetooth will facilitate Local Area
Networks

Bluetooth in Action
In the house In the Office ...

Source: http//:www.motorola.com

Home Security

On the Road

Source: http//:www.motorola.com

On your Car

Source: http//:www.motorola.com

Bluetooth Specifications
Things that you must have:
Transceivers and Receivers that can send and receive data because they use Radio Waves. MAC Address (Physical Address) Burnt on the NIC card by the manufacturer. PIN Number To identify the user using the device. A Piconet A FHHS protocol

What is a Piconet?
A Piconet session is a communication link

that must be created between devices for devices to communicate with each other.

This is done when the MAC address and


the PIN number match.

Piconet (cont.)
If two devices come onto contact with each
other( 32 feet) the user will be prompted to initiate a communication session to initiate a session

Users then can either deny or accept the request


Only devices approved by the user can take part
in the session

Data will appear as noise to unauthorized


devices (A great security feature).

FHHS
Bluetooth devices use a protocol called (FHHS)
Frequency-Hopping Spread Spectrum .

Uses packet-switching to send data.

Bluetooth sends packets of data on a range of


frequencies.

In each session one device is a master and the


others are slaves.

The master device decides at which frequency


data will travel.

FHHS
Transceivers hop among 79 different
frequencies in the 2.4 GHz baud at a rate of 1600 frequency hops per second.

The master device tells the slaves at what


frequency data will be sent.

This technique allows devices to communicate


with each other more securely.

FHHS Example

Source: http://www.xircom.com

Bluetooth Security
Modes
Security Mode 1 No Security Security Mode 2 Service Level Enforced Security Implemented after channel is established Security Mode 3 Link Level Enforced Security Implemented before channel is established

Devices
Trusted
No Restrictions

Untrusted
Restrictions, Access is limited

Service Levels
Authorization and Authentication
Authentication Only Open to all Devices

Link Level
Bluetooth Device Address
Private Link Key Private Encryption Key Random Number

Bluetooth Secure Enough?


Not enough for confidential and top secret
information now but . . . Security will Improve
Improve exisiting security Implement new security