Sunteți pe pagina 1din 21

Bluetooth

By
Sonny Leung
Jennifer Portillo
Thomas Razo
Samson Vuong

Introduction
What is Bluetooth?
What does it do?
History of Bluetooth

Introduction (contd)
Is Bluetooth here to stay?
What should we expect from
Bluetooth in the future?

What Bluetooth Delivers to


the end-user
Connects a wide range of computing
and telecommunication devices

Expand communication capabilities


Devices can communicate with each
other with wireless connectivity

User Application

Car manufactures Industry

E-Mail / Internet / Intranet Access


Headsets
Bluetooth will facilitate Local Area
Networks

Bluetooth in Action
In the house

In the Office ...

Source: http//:www.motorola.com

Home Security

On the Road

Source: http//:www.motorola.com

On your Car

Source: http//:www.motorola.com

Bluetooth Specifications
Things that you must have:
Transceivers and Receivers that can send and
receive data because they use Radio
Waves.
MAC Address (Physical Address)
Burnt on the NIC card by the manufacturer.
PIN Number
To identify the user using the device.
A Piconet
A FHHS protocol

What is a Piconet?
A Piconet session is a communication
link that must be created between
devices for devices to communicate
with each other.

This is done when the MAC address


and the PIN number match.

Piconet (cont.)
If two devices come onto contact with each other( 32
feet) the user will be prompted to initiate a
communication session

Users then can either deny or accept the request to


initiate a session

Only devices approved by the user can take part in the


session

Data will appear as noise to unauthorized devices


great security feature).

(A

FHHS
Bluetooth devices use a protocol called (FHHS) FrequencyHopping Spread Spectrum .

Uses packet-switching to send data.


Bluetooth sends packets of data on a range of frequencies.
In each session one device is a master and the others are
slaves.

The master device decides at which frequency data will


travel.

FHHS
Transceivers hop among 79 different

frequencies in the 2.4 GHz baud at a rate of


1600 frequency hops per second.

The master device tells the slaves at what


frequency data will be sent.

This technique allows devices to

communicate with each other more securely.

FHHS Example

Source: http://www.xircom.com

Bluetooth Security
Modes
Security Mode 1
No Security
Security Mode 2
Service Level Enforced Security
Implemented after channel is established
Security Mode 3
Link Level Enforced Security
Implemented before channel is established

Devices
Trusted
No Restrictions

Untrusted
Restrictions, Access is limited

Service Levels
Authorization and Authentication
Authentication Only
Open to all Devices

Link Level
Bluetooth Device Address
Private Link Key
Private Encryption Key
Random Number

Bluetooth Secure Enough?


Not enough for confidential and top
secret information now but . . .
Security will Improve
Improve exisiting security
Implement new security

Wrap up
Growing Technology
Automation

For More Information Please


Visit The Following Sites
www.motorola.com
www.xircom.com
www.palowireless.com
www.bluetooth.com

S-ar putea să vă placă și