16029 Bluetooth
-
Upload
baldev-bansal -
Category
Documents
-
view
218 -
download
0
Transcript of 16029 Bluetooth
-
7/30/2019 16029 Bluetooth
1/19
Bluetooth
BYsandeep
-
7/30/2019 16029 Bluetooth
2/19
Introduction
What is Bluetooth?
What does it do?
History of Bluetooth
-
7/30/2019 16029 Bluetooth
3/19
Introduction (contd)
Is Bluetooth here to stay?
What should we expect fromBluetooth in the future?
-
7/30/2019 16029 Bluetooth
4/19
What Bluetooth Delivers to theend-user
Connects a wide range of computing andtelecommunication devices
Expand communication capabilities
Devices can communicate with each otherwith wireless connectivity
-
7/30/2019 16029 Bluetooth
5/19
User Application Car manufactures Industry
E-Mail / Internet / Intranet Access
Headsets
Bluetooth will facilitate Local AreaNetworks
-
7/30/2019 16029 Bluetooth
6/19
Bluetooth in Action
Source: http//:www.motorola.com
In the Office ...In the house
-
7/30/2019 16029 Bluetooth
7/19
Home Security On the Road
Source: http//:www.motorola.com
-
7/30/2019 16029 Bluetooth
8/19
On your Car
Source: http//:www.motorola.com
-
7/30/2019 16029 Bluetooth
9/19
Bluetooth Specifications
Things that you must have: Transceivers and Receivers that can send and
receive data because they use RadioWaves.
MAC Address (Physical Address) Burnt on the NIC card by the manufacturer.
PIN Number To identify the user using the device.
A Piconet
A FHHS protocol
-
7/30/2019 16029 Bluetooth
10/19
What is a Piconet?
A Piconet session is a communication link
that must be created between devices fordevices to communicate with each other.
This is done when the MAC address andthe PIN number match.
-
7/30/2019 16029 Bluetooth
11/19
Piconet (cont.)
If two devices come onto contact with eachother( 32 feet) the user will be prompted toinitiate a communication session
Users then can either deny or accept the requestto initiate a session
Only devices approved by the user can take partin the session
Data will appear as noise to unauthorized
devices (A great security feature).
-
7/30/2019 16029 Bluetooth
12/19
FHHS
Bluetooth devices use a protocol called (FHHS)Frequency-Hopping Spread Spectrum .
Uses packet-switching to send data.
Bluetooth sends packets of data on a range offrequencies.
In each session one device is a master and theothers are slaves.
The master device decides at which frequencydata will travel.
-
7/30/2019 16029 Bluetooth
13/19
FHHS
Transceivers hop among 79 differentfrequencies in the 2.4 GHz baud at a rate of1600 frequency hops per second.
The master device tells the slaves at whatfrequency data will be sent.
This technique allows devices to communicatewith each other more securely.
-
7/30/2019 16029 Bluetooth
14/19
FHHS Example
Source: http://www.xircom.com
-
7/30/2019 16029 Bluetooth
15/19
Bluetooth Security
Modes Security Mode 1
No Security Security Mode 2 Service Level Enforced Security Implemented after channel is established
Security Mode 3 Link Level Enforced Security Implemented before channel is established
-
7/30/2019 16029 Bluetooth
16/19
Devices
Trusted No Restrictions
Untrusted Restrictions, Access is limited
-
7/30/2019 16029 Bluetooth
17/19
Service Levels
Authorization and Authentication
Authentication Only
Open to all Devices
-
7/30/2019 16029 Bluetooth
18/19
Link Level
Bluetooth Device Address
Private Link Key
Private Encryption Key
Random Number
-
7/30/2019 16029 Bluetooth
19/19
Bluetooth Secure Enough?
Not enough for confidential and top secretinformation now but . . .
Security will Improve Improve exisiting security
Implement new security