Sie sind auf Seite 1von 25

PRESENTED BY:-

M.PALLAVI
INDEX
 BLUETOOTH TECHNOLOGY
APPLICATIONS OF BLUE TOOTH
BLUETOOTH OPERATION
AVOIDING INTERFERENCE-HOPPING
FEATURES OF BLUETOOTH
COMPARISION WITH OTHER TECHNOLOGY
BLUETOOTH NETWORK TOPOLOGY
BLUETOOTH SECURITY
THREATS ENCOUNTERED
TECHNIQUES TO PROTECT THE DATA
FUTURE OF BLUETOOTH
CONCLUSION
GLOSSARY
REFERENCES
ABSTRACT
“Think of a connected world of electronics devices and
appliances around you! You click on am icon for a device
and you are linked to it automatically and transparently”

Bluetooth is a way of connecting machines to each other


without cables or any other physical medium. It uses radio
waves to transfer information, so it is very susceptible to
attacks. This paper first gives some background information
about Bluetooth system and security issues. It then
concentrates on its operation, features, comparison with
other technologies, its network topology and security issues
in Bluetooth enabled devices with possible solution.
WHAT IS BLUETOOTH?
Bluetooth, the new technology named after the 10th Century Danish
King Harold Bluetooth, is a hot topic among wireless developers.

Bluetooth was designed to allow low bandwidth wireless


connections to become so simple to use that they seamlessly
integrate into our daily life..A simple example of a Bluetooth
application is updating the phone directory of your mobile phone.

Can you imagine walking into a store and having all the sale items
automatically available on your cell phone or PDA (Personal
Digital Assistant)? It is a definite possibility with Bluetooth.
It will enable users to connect a wide range of computing and
telecommunication devices easily and simply without the need to
buy, carry or connect cables-quite often proprietary to specific
device
HOW DOES IT WORK?
Bluetooth communication occurs in the unlicensed ISM (Industrial,
Scientific and Medical) band at 2.4GHz. The transceiver utilizes
frequency hopping to reduce interference and fading. A typical Bluetooth
device has a range of about 10 meters (there are solutions for even 100
meters). The communication channel can support both data
(asynchronous) and voice (synchronous) communications with a total
bandwidth of 1 Mb/sec.

The key features of Bluetooth technology are robustness, small size, low
power consumption (about 30mA), and low cost.

The Bluetooth specification defines a uniform structure for a wide range


of devices to connect and communicate with each other. A fundamental
Bluetooth wireless technology strength is the ability to simultaneously
handle both data and voice transmissions.
APPLICATIONS
Bluetooth wireless technology can be used for these applications:

•File transfer.
•In cell phones, playstations,keyboards and mice, etc
•Ad-hoc networking: Communicating devices can spontaneously form
a community of networks that persists only as long as it's needed
•Car kits: Hands-free packages enable users to access phones and other
devices without taking their hands off the steering wheel

•Mobile payments: Your Bluetooth-enabled phone can communicate with


a Bluetooth-enabled vending machine to buy a can of Diet Pepsi, and put
the charge on your phone bill.
APPLICATIONS
Few more applications where Bluetooth technology is used:-
1. Audio
Bluetooth technology is changing the way we listen to music. by
having a wireless control of our audio devices, Bluetooth audio is becoming
a necessasity for all music lovers.

2. Bluetooth car
Bluetooth technology and its use in car is becoming extremely popular in
US. It is a perfect solution to have conversations without having to hold their cell
phones while driving.
BLUETOOTH OPERATION
Bluetooth networking transmits data via low-power radio
waves. It communicates on a frequency of 2.45 gigahertz

One of the ways Bluetooth devices avoid interfering with other


systems is by sending out very weak signals of about 1 milli
watt. The low power limits the range of a Bluetooth device to
about 10 meters (32 feet), cutting the chances of interference
between your computer system and your portable telephone or
television. Even with the low power, Bluetooth doesn't require
line of sight between communicating devices. The walls in your
house won't stop a Bluetooth signal, making the standard useful
for controlling several devices in different rooms.
AVOIDING INTERFERENCE
Hopping
Bluetooth can connect up to eight devices simultaneously.. Bluetooth
uses a technique called spread-spectrum frequency hopping that makes it
rare for more than one device to be transmitting on the same frequency at
the same time. In this technique, a device will use 79 individual, randomly
chosen frequencies within a designated range, changing from one to another
on a regular basis,
When Bluetooth-capable devices come within range of one another, an
electronic conversation takes place to determine whether they have data to
share or whether one needs to control the other. Bluetooth systems create a
PAN or piconet that may encompass no more distance between the cell
phone and the headset on your head. Once a PAN is established, the
members can stay in touch with one another & avoid other piconets that
may be operating in the same room.

Example: half/full duplex:- A speaker phone that lets you either listen or
talk , but not both, is an example of half-duplex communication , while a
regular handset is a full duplex device.
FEATURES OF BLUETOOTH
Every technology has its own advantages or features. This simple and
fascinating technology has dominated its few drawbacks and is now widely
used.

Bluetooth wireless technology is the simple choice for convenient, wire-free,


short-range communication between devices
The Bluetooth wireless technology specification is available free-of-charge to
our member companies around the globe
Bluetooth technology operates in the 2.4 GHz, one of the unlicensed
industrial, scientific, medical (ISM) radio bands
Bluetooth wireless technology is the most widely supported, versatile and
secure wireless standard on the market today
Bluetooth technology has built-in security such as 128bit encryption and PIN
code authentication. Once connected, always securely connected.
Due the above magnificent features of Bluetooth this technology which was
firstly used in mobiles has now emerged in development of it different fields.
COMPARISON WITH OTHER TECHNOLOGY
When we compare Bluetooth with the other wireless technologies like
Ultra-Wideband, Certified Wireless USB, Wi-Fi (802.11), ZigBee (IEEE
802.15.4), HIPERMAN, HiperLAN, Near-Field Magnetic Communication,
Near Field Communication (NFC), Infrared (IrDA) Bluetooth makes itself
distinguished and efficient from others based on its following features

Bluetooth wireless technology is geared towards voice and data applications


Bluetooth wireless technology operates in the unlicensed 2.4 GHz spectrum
Bluetooth wireless technology can operate over a distance of 10 meters or
100 meters depending on the Bluetooth device class. The peak data rate with
EDR is 3 Mbps
Bluetooth wireless technology is able to penetrate solid objects
Bluetooth technology is omni-directional and does not require line-of-sight
positioning of connected devices
Security has always been and continues to be a priority in the development
of the Bluetooth specification. The Bluetooth specification allows for three
modes of security
BLUETOOTH Vs IrDA

Home electronics devices like TVs and VCRs communicate using beams
of light in the infrared spectrum. Infrared is fairly reliable and doesn't cost
much to build into devices. It does have drawbacks:

It's line-of-sight, so a sender must align with its receiver. For example, you
have to point the remote control at the television or DVD player to make
things happen.

It's one-to-one, so a device can't send to multiple receivers at the same time.
for example you can send data between your desktop computer and your
laptop computer but not your laptop computer and your PDA at same time
BLUETOOTH Vs IrDA
Infrared's advantages are consequences of its disadvantages:

Because it's line-of-sight, interference is uncommon.

Because it's one-to-one, message delivery is reliable: each


message sent goes to the intended recipient no matter how many
infrared receivers are in the room.
BLUETOOTH Vs 802.11b

While both Bluetooth and (the Institute of Electrical and Electronics


Engineers )IEEE 802.11b are wireless communication protocols and both
operate in the 2.4GHz band, it is important not to visualize Bluetooth as a
replacement for 802.11 wireless LAN technologies. They're designed to
accomplish different goals.
The 802.11b protocol is designed to connect relatively large devices
with lots of power and speed, such as desktops and laptops. Devices
communicate at up to 11 Mbit/sec, at greater distances (up to 300 feet, or
100 meters). By contrast, Bluetooth is designed to connect small devices
like PDAs, mobile phones, and peripherals at slower speeds (1 Mbit/sec),
within a shorter range (30 feet, or 10 meters), which reduces power
requirements.
COMPARION OF THE TEHNOLOGIES
Peak Data Range Relative Voice Data
Rate Cost network network
support support

IEEE 2 Mbps 50m Medium Via IP TCP / IP


802.11

IrDA 16 Mbps < 2m Low Via IP Via PPP

Bluetooth 1 Mbps < 10m Medium Via IP and Via PPP


cellular

HomeRF 1.6 Mbps 50m Medium Via IP and TCP / IP


PSTN
BLUETOOTH NETWORK TOPOLOGY
Bluetooth-enabled devices are organized in
groups called piconets. A piconet consists of a
master and up to seven active slaves. A master and a
single slave use point-to-point communication; if
there are multiple slaves; point-to-multipoint
communication is used A master unit is the device
that initiates the communication. A device in one
piconet can communicate to another device in
Scatter net another piconet, forming a scatternet, as depicted in
Comprising
Three Figure 1. Notice that a master in one piconet may be
Piconets
a slave in another piconet:
BLUETOOTH NETWORK TOPOLOGY
The architecture of Bluetooth is formed by the radio, the base
frequency part and the Link Manager. It uses the
radio range of 2.45 GHz. The theoretical Maximum
bandwidth is 1 Mb/s. The base frequency part
of the Bluetooth Architecture uses combination of
circuit and packet switching technologies The Link
Manager (LM) is an essential part of the Bluetooth
architecture. It uses Link Manager Protocol (LMP)
to configure, authenticate and handle the
connections between Bluetooth devices. The host
control interface (HCI) is a hardware & software
interface specified to allow modular
implementations of the lower-level hardware and base band. The low-level
protocol is responsible for packetization, multiplexing, & demultiplexing
packets for the higher-level protocols, and it maintains order in the piconet;
this interface is essentially Bluetooth's "traffic cop."
BLUETOOTH SECURITY
In any wireless networking set-up, security is a concern. Devices
can easily grab radio waves out of the air. Bluetooth technology is no
different -- it's wireless and therefore susceptible to spying and remote
access.. Product developers that use Bluetooth wireless technology in their
products have several options for implementing security. There are three
modes of security for Bluetooth access between two devices.

Security Mode 1: Non-Secure


Security Mode 2: Service Level Enforced Security
Security Mode 3: Link Level Enforced Security

For devices, normally there are two levels: Mode 1 and Mode 2,
which are normally enabled by the manufacturer.
THREATS ENCOUNTERED
Bluetooth has few threats which are listed below:-
Blue jacking
Blue jacking allows phone users to send business cards anonymously
using Bluetooth wireless technology. These business cards often have a
message or joke. To ignore bluejackers, simply reject the business card or set
your phone to non-discoverable mode.

Bluebugging
It allows the hacker to make phone calls, send messages, read and write
contacts and eavesdrops on phone conversations & connect to the internet.
Just like all bluetooth attacks, the hacker must be with in 30 feet range.

Bluesnarfing
It allows hackers to gain access to data, that includes phonebook and
associated images without alerting the phone’s user of the connection made to
the device. By setting the device in non-discoverable, it becomes difficult to
find and attack the device. Only specific older Bluetooth enabled phones are
susceptible to bluesnarfing.
THREATS ENCOUNTERED
Car Whisperer
The car whisperer is a software tool developed by security researchers to
connect to and send or receive audio to and from Bluetooth car-kits with a
specific implementation. An individual using the tool could potentially
remotely connect to and communicate with a car from an unauthorized remote
device, sending audio to the speakers and receiving audio from the
microphone in the remote device. Without specialized equipment, someone
using the tool must be within a 10 meter range of the targeted car.

Cabir Worm
The cabir worm is malicious software, also known as malware. When
installed on a phone, it uses Bluetooth technology to send itself to other
similarly vulnerable devices. Due to this self-replicating behaviour, it is
classified as a worm. The cabir worm currently only affects mobile phones
that use the Symbian series 60 user interface platform and feature Bluetooth
wireless technology. Furthermore, the user has to manually accept the worm
and install the malware in order to infect the phone.
METHODS TO PROTECT DATA
There are several measures that users can take in order to protect their devices
information:-
Turn the device to non-discoverable mode when not using Bluetooth
technology.

If a phone is vulnerable to bluesnarfing or blue bugging—contact the


manufacturer. Software patches available for many older Bluetooth phones.

One of the best ways to avoid these threats is to have a secure PIN (Personal
identification number). that is temporarily associated with one's products.
product owners must share that PIN number only with trusted individuals and
trusted products for pairing. Without this PIN number, pairing cannot occur. It
is always advisable to pair products in areas with relative privacy than in public

 By using a PIN code with eight or more alphanumeric characters it would


take the hacker years to discover the PIN. By using a four digit numeric PIN
code, the hacker could discover the PIN in a matter of a few hours. Still
advanced software is required.
CONCLUSION
We have now examined Bluetooth in general, some of the security
properties of distributed systems and ad hoc networks and the Bluetooth
security mechanisms. As was seen, the Bluetooth's security seemed to be
adequate only for small ad hoc networks, such as a network of the participants
in a meeting. Connecting a PDA to a mobile phone using Bluetooth may also
be secure enough, but is Bluetooth secure enough for larger ad hoc networks,
money transfers and transferring other sensitive information?

In the light of this study, it seems that the security of Bluetooth is still
inadequate for any serious, security sensitive work. After the basic problems
have been corrected, the more sophisticated security methods may be
implemented on the upper levels. The security specification only considers
simple issues and the more functional security has to be built above it. This
includes the better security authorization systems with possible KDCs and
distributed secret schemes. The secure routing protocols for larger ad hoc
networks must also be implemented separately.
GLOSSARY
BD_ADDR Bluetooth Device Address
CA Certification Authority
FEC Forward Error Correction
GFSK Gaussian Frequency Shift Keying
IEEE Institution of Electrical and Electronics
Engineers
ISM Industrial, Scientific, Medical
KDC Key Distribution Center
LFSR Linear Feedback Shift Register
LMP Link Manager Protocol
PDA Personal Digital Assistant
SIG Special Interest Group (as in Bluetooth
SIG)
REFERENCES
[1]. http://www.bluetooth.com
[2]. http://www.bluetooth.org
[3]. http://www.howstuffworks.com/bluetooth.htm
[4]. http://www.wirelessdevnet.com
QUERIES

Das könnte Ihnen auch gefallen