Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s...
-
Upload
camron-lloyd -
Category
Documents
-
view
213 -
download
0
Transcript of Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s...
![Page 1: Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e905503460f94b95427/html5/thumbnails/1.jpg)
Bluetooth
Submitted to:
Doctor : Rabie Ramadan
Submitted by:
Khaled Mohammed Ali Hassan
Master’s Student, Cairo
University/2011
![Page 2: Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e905503460f94b95427/html5/thumbnails/2.jpg)
BlueTooth- Some Specifications
• Uses unlicensed 2.402 - 2.480 GHz frequency range
• Frequency hopping spread spectrum 79 hops separated
by 1 MHz
• Maximum frequency hopping rate: 1600 hops/sec
• Nominal range: 10 cm to 10 meters
• Nominal antenna power: 0 dBm
• One complete Bluetooth data packet can be transmitted
within each 625 msec hop slot
![Page 3: Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e905503460f94b95427/html5/thumbnails/3.jpg)
Potential Bluetooth Markets
![Page 4: Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e905503460f94b95427/html5/thumbnails/4.jpg)
Bluetooth Protocol Stack
• Adopted Protocols
– PPP(Point-To-Point Protocol)
– TCP/UDP/IP
– OBEX-Session Protocol for IrDA(Infrared Data
Association)
– Contents Fromat(e.g. vCard, vCalendar)
– WAP-Wireless Application Protocol
![Page 5: Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e905503460f94b95427/html5/thumbnails/5.jpg)
Bluetooth Protocol Stack
![Page 6: Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e905503460f94b95427/html5/thumbnails/6.jpg)
Bluetooth Security
• Supports Unidirectional or Mutual Encryption based on
a Secret Link key Shared Between Two Devices
• Security Defined In 3 modes:
– Mode1- No Security
– Mode 2 - Service Level Security: Not Established
Before Channel is Established at L2CAP
– Mode 3 - Link Level Security: Device Initiates Security
Before LMP Link is Setup
![Page 7: Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e905503460f94b95427/html5/thumbnails/7.jpg)
Bluetooth Security
• Devices and Services can be Set for Different Levels of
Security
– Two Trust Levels are Set for Devices
• Trusted Device: Fixed Relationship and
Unrestricted Access to All Services
• Untrusted : No Permanent relationship and
Restricted Services
![Page 8: Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e905503460f94b95427/html5/thumbnails/8.jpg)
Bluetooth Security
• 3 Levels of Service Access
– Require Authorization and Authenication
– Require Authentication Only
– Default Security for Legacy Applications
![Page 9: Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e905503460f94b95427/html5/thumbnails/9.jpg)
The Challenges
• Future work is aimed to develop and
design a blue tooth-enabled data
concentrator for data acquisition and
analysis.
![Page 10: Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e905503460f94b95427/html5/thumbnails/10.jpg)
CONCLUSION
• Blue tooth represents a great chance for sensor-
networked architecture. This architecture heralds
wireless future for home and also for industrial
implementation. With a blue tooth RF link, users
only need to bring the devices with in range, and
the devices will automatically link up and
exchange information.
• Thus implementation of blue tooth technology for
sensor networks not only cuts wiring cost but also
integrates the industrial environment to smarter
environment.
![Page 11: Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.](https://reader036.fdocuments.us/reader036/viewer/2022082820/56649e905503460f94b95427/html5/thumbnails/11.jpg)
CONCLUSION
• Today, with a broader specifications and a
renewed concentration on interoperability,
manufacturers are ready to forge ahead and take
blue tooth products to the market place.
Embedded design can incorporate the blue tooth
wireless technology into a range of new products
to meet the growing demand for connected
information appliances.