16029 Bluetooth

download 16029 Bluetooth

of 19

Transcript of 16029 Bluetooth

  • 7/30/2019 16029 Bluetooth

    1/19

    Bluetooth

    BYsandeep

  • 7/30/2019 16029 Bluetooth

    2/19

    Introduction

    What is Bluetooth?

    What does it do?

    History of Bluetooth

  • 7/30/2019 16029 Bluetooth

    3/19

    Introduction (contd)

    Is Bluetooth here to stay?

    What should we expect fromBluetooth in the future?

  • 7/30/2019 16029 Bluetooth

    4/19

    What Bluetooth Delivers to theend-user

    Connects a wide range of computing andtelecommunication devices

    Expand communication capabilities

    Devices can communicate with each otherwith wireless connectivity

  • 7/30/2019 16029 Bluetooth

    5/19

    User Application Car manufactures Industry

    E-Mail / Internet / Intranet Access

    Headsets

    Bluetooth will facilitate Local AreaNetworks

  • 7/30/2019 16029 Bluetooth

    6/19

    Bluetooth in Action

    Source: http//:www.motorola.com

    In the Office ...In the house

  • 7/30/2019 16029 Bluetooth

    7/19

    Home Security On the Road

    Source: http//:www.motorola.com

  • 7/30/2019 16029 Bluetooth

    8/19

    On your Car

    Source: http//:www.motorola.com

  • 7/30/2019 16029 Bluetooth

    9/19

    Bluetooth Specifications

    Things that you must have: Transceivers and Receivers that can send and

    receive data because they use RadioWaves.

    MAC Address (Physical Address) Burnt on the NIC card by the manufacturer.

    PIN Number To identify the user using the device.

    A Piconet

    A FHHS protocol

  • 7/30/2019 16029 Bluetooth

    10/19

    What is a Piconet?

    A Piconet session is a communication link

    that must be created between devices fordevices to communicate with each other.

    This is done when the MAC address andthe PIN number match.

  • 7/30/2019 16029 Bluetooth

    11/19

    Piconet (cont.)

    If two devices come onto contact with eachother( 32 feet) the user will be prompted toinitiate a communication session

    Users then can either deny or accept the requestto initiate a session

    Only devices approved by the user can take partin the session

    Data will appear as noise to unauthorized

    devices (A great security feature).

  • 7/30/2019 16029 Bluetooth

    12/19

    FHHS

    Bluetooth devices use a protocol called (FHHS)Frequency-Hopping Spread Spectrum .

    Uses packet-switching to send data.

    Bluetooth sends packets of data on a range offrequencies.

    In each session one device is a master and theothers are slaves.

    The master device decides at which frequencydata will travel.

  • 7/30/2019 16029 Bluetooth

    13/19

    FHHS

    Transceivers hop among 79 differentfrequencies in the 2.4 GHz baud at a rate of1600 frequency hops per second.

    The master device tells the slaves at whatfrequency data will be sent.

    This technique allows devices to communicatewith each other more securely.

  • 7/30/2019 16029 Bluetooth

    14/19

    FHHS Example

    Source: http://www.xircom.com

  • 7/30/2019 16029 Bluetooth

    15/19

    Bluetooth Security

    Modes Security Mode 1

    No Security Security Mode 2 Service Level Enforced Security Implemented after channel is established

    Security Mode 3 Link Level Enforced Security Implemented before channel is established

  • 7/30/2019 16029 Bluetooth

    16/19

    Devices

    Trusted No Restrictions

    Untrusted Restrictions, Access is limited

  • 7/30/2019 16029 Bluetooth

    17/19

    Service Levels

    Authorization and Authentication

    Authentication Only

    Open to all Devices

  • 7/30/2019 16029 Bluetooth

    18/19

    Link Level

    Bluetooth Device Address

    Private Link Key

    Private Encryption Key

    Random Number

  • 7/30/2019 16029 Bluetooth

    19/19

    Bluetooth Secure Enough?

    Not enough for confidential and top secretinformation now but . . .

    Security will Improve Improve exisiting security

    Implement new security