Bluetooth Introduction What is Bluetooth What does it
Bluetooth
Introduction • What is Bluetooth? • What does it do? • History of Bluetooth
Introduction (cont’d) • Is Bluetooth here to stay? • What should we expect from Bluetooth in the future?
What Bluetooth Delivers to the end-user • Connects a wide range of computing and telecommunication devices • Expand communication capabilities • Devices can communicate with each other with wireless connectivity
User Application • Car manufactures Industry • E-Mail / Internet / Intranet Access • Headsets • Bluetooth will facilitate Local Area Networks
Bluetooth in Action In the house Source: http//: www. motorola. com In the Office. . .
Home Security On the Road Source: http//: www. motorola. com
On your Car Source: http//: www. motorola. com
Bluetooth Specifications • Things that you must have: – Transceivers and Receivers that can send and receive data because they use Radio Waves. – MAC Address (Physical Address) • Burnt on the NIC card by the manufacturer. – PIN Number • To identify the user using the device. – A Piconet – A FHHS protocol
What is a Piconet? • A Piconet session is a communication link that must be created between devices for devices to communicate with each other. • This is done when the MAC address and the PIN number match.
Piconet (cont. ) • If two devices come onto contact with each other( 32 feet) the user will be prompted to initiate a communication session • Users then can either deny or accept the request to initiate a session • Only devices approved by the user can take part in the session • Data will appear as noise to unauthorized devices (A great security feature).
FHHS • Bluetooth devices use a protocol called (FHHS) Frequency-Hopping Spread Spectrum. • Uses packet-switching to send data. • Bluetooth sends packets of data on a range of frequencies. • In each session one device is a master and the others are slaves. • The master device decides at which frequency data will travel.
FHHS • Transceivers “hop” among 79 different frequencies in the 2. 4 GHz baud at a rate of 1600 frequency hops per second. • The master device tells the slaves at what frequency data will be sent. • This technique allows devices to communicate with each other more securely.
FHHS Example Source: http: //www. xircom. com
Bluetooth Security • Modes – Security Mode 1 • No Security – Security Mode 2 • Service Level Enforced Security • Implemented after channel is established – Security Mode 3 • Link Level Enforced Security • Implemented before channel is established
Devices • “Trusted” – No Restrictions • “Untrusted” – Restrictions, Access is limited
Service Levels • Authorization and Authentication • Authentication Only • Open to all Devices
Link Level • Bluetooth Device Address • Private Link Key • Private Encryption Key • Random Number
Bluetooth Secure Enough? • Not enough for confidential and top secret information now but. . . • Security will Improve – Improve exisiting security – Implement new security
Wrap up • Growing Technology • Automation
For More Information Please Visit The Following Sites • www. motorola. com • www. xircom. com • www. palowireless. com • www. bluetooth. com
- Slides: 21