Beruflich Dokumente
Kultur Dokumente
M.PALLAVI
INDEX
BLUETOOTH TECHNOLOGY
APPLICATIONS OF BLUE TOOTH
BLUETOOTH OPERATION
AVOIDING INTERFERENCE-HOPPING
FEATURES OF BLUETOOTH
COMPARISION WITH OTHER TECHNOLOGY
BLUETOOTH NETWORK TOPOLOGY
BLUETOOTH SECURITY
THREATS ENCOUNTERED
TECHNIQUES TO PROTECT THE DATA
FUTURE OF BLUETOOTH
CONCLUSION
GLOSSARY
REFERENCES
ABSTRACT
“Think of a connected world of electronics devices and
appliances around you! You click on am icon for a device
and you are linked to it automatically and transparently”
Can you imagine walking into a store and having all the sale items
automatically available on your cell phone or PDA (Personal
Digital Assistant)? It is a definite possibility with Bluetooth.
It will enable users to connect a wide range of computing and
telecommunication devices easily and simply without the need to
buy, carry or connect cables-quite often proprietary to specific
device
HOW DOES IT WORK?
Bluetooth communication occurs in the unlicensed ISM (Industrial,
Scientific and Medical) band at 2.4GHz. The transceiver utilizes
frequency hopping to reduce interference and fading. A typical Bluetooth
device has a range of about 10 meters (there are solutions for even 100
meters). The communication channel can support both data
(asynchronous) and voice (synchronous) communications with a total
bandwidth of 1 Mb/sec.
The key features of Bluetooth technology are robustness, small size, low
power consumption (about 30mA), and low cost.
•File transfer.
•In cell phones, playstations,keyboards and mice, etc
•Ad-hoc networking: Communicating devices can spontaneously form
a community of networks that persists only as long as it's needed
•Car kits: Hands-free packages enable users to access phones and other
devices without taking their hands off the steering wheel
2. Bluetooth car
Bluetooth technology and its use in car is becoming extremely popular in
US. It is a perfect solution to have conversations without having to hold their cell
phones while driving.
BLUETOOTH OPERATION
Bluetooth networking transmits data via low-power radio
waves. It communicates on a frequency of 2.45 gigahertz
Example: half/full duplex:- A speaker phone that lets you either listen or
talk , but not both, is an example of half-duplex communication , while a
regular handset is a full duplex device.
FEATURES OF BLUETOOTH
Every technology has its own advantages or features. This simple and
fascinating technology has dominated its few drawbacks and is now widely
used.
Home electronics devices like TVs and VCRs communicate using beams
of light in the infrared spectrum. Infrared is fairly reliable and doesn't cost
much to build into devices. It does have drawbacks:
It's line-of-sight, so a sender must align with its receiver. For example, you
have to point the remote control at the television or DVD player to make
things happen.
It's one-to-one, so a device can't send to multiple receivers at the same time.
for example you can send data between your desktop computer and your
laptop computer but not your laptop computer and your PDA at same time
BLUETOOTH Vs IrDA
Infrared's advantages are consequences of its disadvantages:
For devices, normally there are two levels: Mode 1 and Mode 2,
which are normally enabled by the manufacturer.
THREATS ENCOUNTERED
Bluetooth has few threats which are listed below:-
Blue jacking
Blue jacking allows phone users to send business cards anonymously
using Bluetooth wireless technology. These business cards often have a
message or joke. To ignore bluejackers, simply reject the business card or set
your phone to non-discoverable mode.
Bluebugging
It allows the hacker to make phone calls, send messages, read and write
contacts and eavesdrops on phone conversations & connect to the internet.
Just like all bluetooth attacks, the hacker must be with in 30 feet range.
Bluesnarfing
It allows hackers to gain access to data, that includes phonebook and
associated images without alerting the phone’s user of the connection made to
the device. By setting the device in non-discoverable, it becomes difficult to
find and attack the device. Only specific older Bluetooth enabled phones are
susceptible to bluesnarfing.
THREATS ENCOUNTERED
Car Whisperer
The car whisperer is a software tool developed by security researchers to
connect to and send or receive audio to and from Bluetooth car-kits with a
specific implementation. An individual using the tool could potentially
remotely connect to and communicate with a car from an unauthorized remote
device, sending audio to the speakers and receiving audio from the
microphone in the remote device. Without specialized equipment, someone
using the tool must be within a 10 meter range of the targeted car.
Cabir Worm
The cabir worm is malicious software, also known as malware. When
installed on a phone, it uses Bluetooth technology to send itself to other
similarly vulnerable devices. Due to this self-replicating behaviour, it is
classified as a worm. The cabir worm currently only affects mobile phones
that use the Symbian series 60 user interface platform and feature Bluetooth
wireless technology. Furthermore, the user has to manually accept the worm
and install the malware in order to infect the phone.
METHODS TO PROTECT DATA
There are several measures that users can take in order to protect their devices
information:-
Turn the device to non-discoverable mode when not using Bluetooth
technology.
One of the best ways to avoid these threats is to have a secure PIN (Personal
identification number). that is temporarily associated with one's products.
product owners must share that PIN number only with trusted individuals and
trusted products for pairing. Without this PIN number, pairing cannot occur. It
is always advisable to pair products in areas with relative privacy than in public
In the light of this study, it seems that the security of Bluetooth is still
inadequate for any serious, security sensitive work. After the basic problems
have been corrected, the more sophisticated security methods may be
implemented on the upper levels. The security specification only considers
simple issues and the more functional security has to be built above it. This
includes the better security authorization systems with possible KDCs and
distributed secret schemes. The secure routing protocols for larger ad hoc
networks must also be implemented separately.
GLOSSARY
BD_ADDR Bluetooth Device Address
CA Certification Authority
FEC Forward Error Correction
GFSK Gaussian Frequency Shift Keying
IEEE Institution of Electrical and Electronics
Engineers
ISM Industrial, Scientific, Medical
KDC Key Distribution Center
LFSR Linear Feedback Shift Register
LMP Link Manager Protocol
PDA Personal Digital Assistant
SIG Special Interest Group (as in Bluetooth
SIG)
REFERENCES
[1]. http://www.bluetooth.com
[2]. http://www.bluetooth.org
[3]. http://www.howstuffworks.com/bluetooth.htm
[4]. http://www.wirelessdevnet.com
QUERIES