Bluetooth Tech - Parag K. ITPA09

download Bluetooth Tech - Parag K. ITPA09

of 8

Transcript of Bluetooth Tech - Parag K. ITPA09

  • 7/29/2019 Bluetooth Tech - Parag K. ITPA09

    1/8

    Bluetooth - A path towards an IT revolution

    Parag K. Rabade1

    1 Microsoft IT Academy Centre, Pune, INDIA

    e-mail:[email protected]

    Abstract. Take a look around at any person working on a computer and you

    will find that his CPU is entangled with so many cables!!! One comes from the

    keyboard, another from the mouse, still another from the printer and so on. The

    cables are a mess. In order to make life simple and comfortable, Ericsson

    conceived the Bluetooth technology which means replacement for cables.

    Bluetooth is a standard for small, cheap radio-chip to be plugged into

    computers, printers, mobile phones etc. It is designed to replace the cables by

    getting the information carried by the cable and transmitting it at a special

    frequency to a receiver Bluetooth chip which will then give the information to

    the computer, phone etc. Bluetooth is an industrial specification for wireless

    personal area networks (PANs).Bluetooth is a standard and communicationsprotocol primarily designed for low power consumption, with a short range

    (power-class-dependent: 1 meter, 10 meters, 100 meters) based on low-cost

    transceivermicrochipsin each device.

    Keywords: piconet, spread-spectrum frequency hopping, adaptive frequencyhopping, scatternet, Link Manager Protocol, Logical link control and adaptation

    protocol, Radio frequency communication, passkey, Bluejacking, Bluebugging,

    Bluesnarfing, eavesdrop.

    1 Introduction

    Bluetooth was named after a Danish Viking and King, Harald Bltand (translated as

    Bluetooth in English), who lived in the latter part of the 10th century. He united and

    controlled Denmark and Norway. However a more popular, was that Old Harald had

    an inclination towards eating Blueberries, so much so his teeth became stained withthe color, leaving Harald with a rather unique set of molars. Bluetooth is a

    specification for the use of low power radio communications to wireless phones,

    computers, and other network wireless devices over short distances. The wireless

    signals that are transmitted by Bluetooth cover short distances of up to 30 feet,

    generally communicating less than 1 Mbps (Mega Byte per second). The technology

    is more popular with cell phones, as Bluetooth headsets are the way to go these days.

    mailto:[email protected]:[email protected]:[email protected]://en.wikipedia.org/wiki/Personal_area_networkhttp://en.wikipedia.org/wiki/Personal_area_networkhttp://en.wikipedia.org/wiki/Meterhttp://en.wikipedia.org/wiki/Meterhttp://en.wikipedia.org/wiki/Transceiverhttp://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Integrated_circuithttp://en.wikipedia.org/wiki/Integrated_circuitmailto:[email protected]://en.wikipedia.org/wiki/Personal_area_networkhttp://en.wikipedia.org/wiki/Meterhttp://en.wikipedia.org/wiki/Transceiverhttp://en.wikipedia.org/wiki/Integrated_circuit
  • 7/29/2019 Bluetooth Tech - Parag K. ITPA09

    2/8

    To use Bluetooth, your cell phone will need to have it enabled, or an infrared device

    somewhere on the phone. Certain mobile phone based chat clients can use bluetooth

    to communicate, with the benefit again of the mobile phone operators billing being

    totally cut out. Many video streaming mobile phones are equipped with Bluetooth.

    1.1 Why Bluetooth technology?

    Wireless is improving safety as a result of eliminating wires you don't need. When

    traveling with your laptop or other wireless devices, you'll no longer have to worry

    about bringing connection cables.

    1. Bluetooth is actually inexpensive: The technology of Bluetooth is cheap

    for companies to implement, which results in lower costs for the

    company.

    2. Interoperability: Bluetooth is standardized wireless. Bluetooth will

    connect devices to each other, even if they aren't the same model.

    3. Low energy consumption: As a result of Bluetooth using low power

    signals, the technology requires very little energy and will use less battery

    or electrical power as a result.

    4. Low interference: Bluetooth devices almost always avoid interference

    from other wireless devices. Bluetooth uses a technique known as

    frequency hopping, and also low power wireless signals.

    5. Sharing voice and data: The standard for Bluetooth will allow compatible

    devices to share data and voice communications.

    6. Instant PAN (Personal Area Network) you can connect up to seven

    Bluetooth devices to each other within a range of up to 30 feet, forming a

    piconet or PAN. For a single room, you can also set up multiple piconets.

    7. The technology stays: Bluetooth technology is a world wide, universal

    wireless standard. A chain reaction will occur, making Bluetooth the

    standard for cutting edge wireless.

    1.2 How Bluetooth works?

    When the devices are using Bluetooth technology, they will communicate without

    wires. Devices in this electronic conversation know that the information is via a

    protocol. A protocol is a standard that controls or enables the connection,

    communication, and data transfer between two electrical devices. Bluetooth uses a

    standardized wireless protocol for devices to communicate. It forces devices to agree

    on when bits are sent, how many will be sent at a time, and how the devices in a

  • 7/29/2019 Bluetooth Tech - Parag K. ITPA09

    3/8

    conversation can be sure that the message received is the same as the message sent.

    Data can be transferred at a rate of up to one Megabyte per second. Bluetooth

    transmitters require minimal amounts of power. Bluetooth devices are able to avoid

    interference is through a technique known as spread-spectrum frequency hopping. By

    using the hopping method, a device will use one of 79 different, randomly chosen

    frequencies within an assigned range, and will frequently change frequencies from

    one to another. Bluetooth enabled devices, which all use the hopping method,

    change frequencies 1,600 times per second.

    Bluetooth version 2.0 + EDR, the very latest of the Bluetooth specification

    versions, uses an enhanced technology called: Adaptive Frequency Hopping (AFH).

    AFH allows Bluetooth devices to measure the quality of the wireless signal and thendetermine if there are bad channels present on specific frequencies due to interference

    from other wireless devices. If bad channels are present on a specific frequency, the

    Bluetooth device will adjust its hopping sequence to avoid them. As a result, the

    Bluetooth connection is stronger, faster, and more reliable.

    Bluetooth enabled devices must use and understand certain Bluetooth profiles in

    order to use Bluetooth technology to connect to one another. These profiles define the

    possible applications that a Bluetooth enabled device can support. In order for one

    Bluetooth device to connect to another, both devices must share at least one of the

    same Bluetooth profiles. Once the Bluetooth devices are all connected, a network is

    created.

    Bluetooth devices create a Personal-area Network (PAN), or commonly called apiconet. Bluetooth piconets are designed to link up to eight different devices. A

    piconet can be as small as a two foot connection between a keyboard and computer,

    or it can encompass several devices over an entire room. Devices that are apart of a

    specific piconet, based on their profiles, use Hopping simultaneously so they stay in

    touch with one another and avoid other piconets that may be operating in the same

    room. In order to regulate communications one of the participating devices is

    assigned the role of master of the piconet, while all other units become slaves.

    Masters have the duty of directing and controlling communications, even between

    two slave devices.

    Furthermore, in order to extend these networks, several piconets can be joined

    together in what is known as a scatternet. In theory, anyone with a compatible

    Bluetooth device is supposed to have the ability to hook up anywhere within that

    network and connect to another Bluetooth device.

  • 7/29/2019 Bluetooth Tech - Parag K. ITPA09

    4/8

    2 Bluetooth Profiles

    The Bluetooth SIG states, Bluetooth profiles are general behaviors through which

    Bluetooth enabled devices communicate with other devices. Bluetooth profiles define

    the possible applications and describe how Bluetooth technology is to be used for

    each specific device. When a Bluetooth device is developed, the manufacturer assigns

    specific Bluetooth profiles for that device to use in order to establish applications

    which will work with other Bluetooth devices. For example, if you want to use a

    Bluetooth headset with your Bluetooth enabled cell phone, both devices must use the

    Headset (HS) profile According to the Bluetooth SIG, every Bluetooth profile

    includes information on the following issues:1. Dependencies on other profiles.

    2. Recommended user interface formats.

    3. Particular parts of the Bluetooth protocol stack used by the profile.

    Most Bluetooth devices are given just a few profiles. For example, a Bluetooth

    headset will use the Headset Profile, but not the LAN Access Profile.

    2.1 Bluetooth Protocol Architecture

    The architecture given in fig. 1 includes layers like:

    1. Radio Layer: Everything in Bluetooth runs over the Radio Layer, whichdefines the requirements for a Bluetooth radio transceiver, which operates

    in the 2.4GHz band. The radio layer defines the sensitivity levels of the

    transceiver, establishes the requirements for using Spread-spectrum

    Frequency Hopping and classifies Bluetooth devices into three different

    power classes:

    a. Power Class 1 long range devices (100m),

    b. Power Class 2 normal or standard range devices (10m), and

    c. Power Class 3 short (10cm)-range operation

  • 7/29/2019 Bluetooth Tech - Parag K. ITPA09

    5/8

    2. Baseband Layer: The next floor in the Bluetooth protocol stack is the

    Baseband Layer as shown in fig.2, which is the physical layer of the

    Bluetooth. It is used as a link controller, which works with the link

    manager to carry out routines like creating link connections with other

    devices. It controls device addressing, channel control (how devices find

    each other) through paging and inquiry methods, power-saving

    operations, and also flow control and synchronization among Bluetooth

    devices.

    3. Link Manager Protocol (LMP): A Bluetooth devices Link Manager

    Protocol (LM) carries out link setup, authentication, link configuration

    and other protocols. It discovers other LMs within the area and

    communicates with them via the Link Manager Protocol (LMP).

    4. Host Controller Interface (HCI): Next in the protocol stack, above the

    LMP is the Host Controller Interface (HCI), which is there to allow

  • 7/29/2019 Bluetooth Tech - Parag K. ITPA09

    6/8

    command line access to the Baseband Layer and LMP for control and to

    receive status information. Its made up of three parts:

    a. The HCI firmware, which is part of the actual Bluetooth

    hardware;

    b. The HCI driver, which is found in the software of the Bluetooth

    device, and

    c. The Host Controller Transport Layer, which connects the

    firmware to the driver.

    5. Logical Link Control and Adaptation Protocol (L2CAP): Above the

    HCI level is the Logical Link Control and Adaptation Protocol (L2CAP),

    which provides data services to the upper level host protocols. TheL2CAP plugs into the Baseband Layer and is located in the data link

    layer, rather than riding directly over LMP. It provides connection-

    oriented and connectionless data services to upper layer protocols.

    Protocol types are first identified in the L2CAP. Data services are

    provided here using protocol multiplexing, segmentation and reassembly

    operation, and group abstractions occur. L2CAP allows higher-level

    protocols and applications to send and receive data packets up to 64

    kilobytes. The L2CAP spends a lot of its time handling segmentation and

    reassembly tasks.

    6. RFCOMM (Radio frequency communication): Above L2CAP, the

    RFCOMM protocol is what actually makes upper layer protocols thinktheyre communicating over a RS232 wired serial interface, so theres no

    need for applications to know anything about Bluetooth.

    7. Service Discovery Protocol (SDP): Also relying on L2CAP is the

    Service Discovery Protocol (SDP). The SDP provides a way for

    applications to detect which services are available and to determine the

    characteristics of those services.

    2.2 What is Bluetooth Pairing?

    1. Bluetooth device A looks for other Bluetooth devices in the area: Whenset to discoverable, Bluetooth device A will allow other Bluetooth devices

    to detect its presence and attempt to establish a connection.

    Undiscoverable devices can still communicate with each other but they

    have to initiate communication themselves.

  • 7/29/2019 Bluetooth Tech - Parag K. ITPA09

    7/8

    2. Bluetooth device A finds Bluetooth device B: Usually the discoverable

    device will indicate what type of device it is and its Bluetooth device

    name.

    3. Bluetooth Device A prompts you to enter a password (Passkey): Both

    users must agree on the Passkey and enter it into their device. The code

    can be anything you like as long as it is the same for both Bluetooth

    wireless devices. Most often, the passkey is zero.

    4. Bluetooth deviceA sends the Passkey to Bluetooth device B.

    5. When both Passkeys are the same, a trusted pair is formed. This happens

    automatically.

    6. Bluetooth deviceA and B are now paired and able to exchange data.

    3 Bluetooth Security

    Today, all communication technologies are facing the issue of privacy and identity

    theft. Bluetooth technology is no exception. There have been some Bluetooth cell

    phones that have been hacked into. According to the Bluetooth Special Interest Group

    (SIG), in order to break into a Bluetooth device, a hacker must:

    a. Force two paired Bluetooth devices to break their connection;

    b. Steal the packets used to resend the PIN;

    c. Decode the PIN.

    One of the most basic levels of security for Bluetooth devices is the pairing

    process. Once Bluetooth devices pair with one another, they too are entirely secure.

    Unfortunately experienced hackers have come up with a way to get around this basic

    level of security. There are three security modes for connecting Bluetooth devices:

    a. Security Mode 1: non-secure;

    b. Security Mode 2: service level enforced security;

    c. Security Mode 3: link level enforced security.

    It is the company who develops each specific Bluetooth product that decides which

    security modes to use. For example, devices use two levels: trusted device and

    distrusted device. After a trusted device is connected to another device, it has

    unrestricted access to all services. However, if the problem is a result of the

    implementation of Bluetooth technology, then the SIG will work with the specific

    members in order to release patches and prevent future problems from occurring.

    Following security threats might arise.

    1. Bluejacking: It allows phone users to send business cards anonymously

    to one another using Bluetooth technology. To ignore bluejackers, simply

  • 7/29/2019 Bluetooth Tech - Parag K. ITPA09

    8/8

    reject the business card, or if you want to avoid them entirely, set your

    phone to non-discoverable mode.

    2. Bluesnarfing: This refers to a hacker who has gained access to data,

    which is stored on a Bluetooth enabled phone. It allows the hacker to

    make phone calls, send and receive text messages. It requires advanced

    equipment and expertise. To avoid this, set your phone to non-

    discoverable mode always.

    3. Bluebugging: It refers to a skilled hacker who has accessed a cell phone's

    commands using Bluetooth technology without the owner's permission or

    knowledge. To do so, the hacker must be within a 30 feet range.

    4 Conclusion

    The future success of Bluetooth remains to be seen, yet there are strong indicators

    that the technology will continue to grow. Manufacturers are constantly coming up

    with new ways to implement Bluetooth in various industries, including auto,

    medicine, restaurants, and more.

    Future of Bluetooth is likely to succeed due to

    1. Broadcast Channel: This will drive the adoption of Bluetooth into

    mobile phones, and enable advertising models based around users pulling

    information from the information points

    2. Topology Management: enables the automatic configuration of the

    piconet topologies especially in scatternet situations that are becoming

    more common today.

    3. Alternate MAC PHY: enables the use of alternative MAC and PHY's for

    transporting Bluetooth profile data. The high speed alternate MAC PHY's

    will be used to transport the data.

    4. QoS improvements: enable audio and video data to be transmitted at a

    higher quality, especially when best effort traffic is being transmitted in

    the same piconet.

    References

    1. Bluetooth end to end by Dee Bakker, Diane McMichael Gilste, Ron Glister, Wiley

    Publication.

    2. Bluetooth Profiles by Dean A Gratton, Prentice Hall Publication.

    3. Bluetooth Technology -http://progtutorials.tripod.com/Bluetooth_Technology.htm

    http://progtutorials.tripod.com/Bluetooth_Technology.htmhttp://progtutorials.tripod.com/Bluetooth_Technology.htmhttp://progtutorials.tripod.com/Bluetooth_Technology.htm