Sei sulla pagina 1di 19

Bluetooth

This article is about a wireless technology standard. united dissonant Danish tribes into a single kingdom and,
For the medieval king of Denmark, see Harald Bluetooth. according to legend, introduced Christianity as well. The
idea of this name was proposed in 1997 by Jim Kar-
Bluetooth is a wireless technology standard for exchang- dach who developed a system that would allow mobile
phones to communicate with computers. At the time of
ing data over short distances (using short-wavelength
UHF radio waves in the ISM band from 2.4 to 2.485 this proposal he was reading Frans G. Bengtsson's histor-
The Long Ships about Vikings and King Harald
GHz[4] ) from fixed and mobile devices, and building ical novel [10][11]
personal area networks (PANs). Invented by telecom Bluetooth. The implication is that Bluetooth does
[5]
vendor Ericsson in 1994, it was originally conceived the same with communications protocols, uniting them
[12]
as a wireless alternative to RS-232 data cables. It can into one universal standard.
connect up to seven devices, overcoming problems that
older technologies had when attempting to connect to 2.2 Logo
each other.
Bluetooth is managed by the Bluetooth Special Inter- The Bluetooth logo is a bind rune merging the Younger
est Group (SIG), which has more than 30,000 member Futhark runes (Hagall) ( ) and (Bjarkan) ( ), Har-
companies in the areas of telecommunication, comput- ald’s initials.[13] [14]
ing, networking, and consumer electronics.[6] The IEEE
standardized Bluetooth as IEEE 802.15.1, but no longer
maintains the standard. The Bluetooth SIG oversees de-
velopment of the specification, manages the qualification 3 Implementation
program, and protects the trademarks.[7] A manufacturer
must meet Bluetooth SIG standards to market it as a Blue- Bluetooth operates at frequencies between 2402 and 2480
tooth device.[8] A network of patents apply to the technol- MHz, or 2400 and 2483.5 MHz including guard bands 2
ogy, which are licensed to individual qualifying devices. MHz wide at the bottom end and 3.5 MHz wide at the
top.[15] This is in the globally unlicensed (but not un-
regulated) Industrial, Scientific and Medical (ISM) 2.4
GHz short-range radio frequency band. Bluetooth uses a
1 Origin radio technology called frequency-hopping spread spec-
trum. Bluetooth divides transmitted data into packets,
The development of the “short-link” radio technology, and transmits each packet on one of 79 designated Blue-
later named Bluetooth, was initiated in 1989 by Nils Ry- tooth channels. Each channel has a bandwidth of 1 MHz.
dbeck, CTO at Ericsson Mobile in Lund, Sweden, and It usually performs 800 hops per second, with Adaptive
by Johan Ullman. The purpose was to develop wireless Frequency-Hopping (AFH) enabled.[15] Bluetooth low
headsets, according to two inventions by Johan Ullman, energy uses 2 MHz spacing, which accommodates 40
SE 8902098-6, issued 1989-06-12 and SE 9202239, is- channels.
sued 1992-07-24. Nils Rydbeck tasked Tord Wingren
Originally, Gaussian frequency-shift keying (GFSK)
with specifying and Jaap Haartsen and Sven Mattisson
modulation was the only modulation scheme available.
with developing. Both were working for Ericsson in
Since the introduction of Bluetooth 2.0+EDR, π/4-
Lund.[9] The specification is based on frequency-hopping
DQPSK (Differential Quadrature Phase Shift Keying)
spread spectrum technology.
and 8DPSK modulation may also be used between com-
patible devices. Devices functioning with GFSK are said
to be operating in basic rate (BR) mode where an instan-
2 Name and logo taneous data rate of 1 Mbit/s is possible. The term En-
hanced Data Rate (EDR) is used to describe π/4-DPSK
2.1 Etymology of the name and 8DPSK schemes, each giving 2 and 3 Mbit/s respec-
tively. The combination of these (BR and EDR) modes
The name “Bluetooth” is an Anglicised version of the in Bluetooth radio technology is classified as a “BR/EDR
Scandinavian Blåtand/Blåtann (Old Norse blátǫnn), the radio”.
epithet of the tenth-century king Harald Bluetooth who Bluetooth is a packet-based protocol with a master-slave

1
2 4 USES

structure. One master may communicate with up to seven ft), Class 2, most commonly found in mobile devices, 10
slaves in a piconet. All devices share the master’s clock. metres (33 ft), and Class 1, primarily for industrial use
Packet exchange is based on the basic clock, defined by cases,100 metres (300 ft).[3] Bluetooth Marketing quali-
the master, which ticks at 312.5 µs intervals. Two clock fies that Class 1 range is in most cases 20–30 metres (66–
ticks make up a slot of 625 µs, and two slots make up 98 ft), and Class 2 range 5–10 metres (16–33 ft).[2]
a slot pair of 1250 µs. In the simple case of single-slot The effective range varies due to propagation conditions,
packets the master transmits in even slots and receives in material coverage, production sample variations, antenna
odd slots. The slave, conversely, receives in even slots and configurations and battery conditions. Most Bluetooth
transmits in odd slots. Packets may be 1, 3 or 5 slots long,
applications are for indoor conditions, where attenuation
but in all cases the master’s transmission begins in even of walls and signal fading due to signal reflections make
slots and the slave’s in odd slots.
the range far lower than specified line-of-sight ranges of
The above is valid for “classic” BT. Bluetooth Low En- the Bluetooth products. Most Bluetooth applications are
ergy, introduced in the 4.0 specification, uses the same battery powered Class 2 devices, with little difference
spectrum but somewhat differently; see Bluetooth low in range whether the other end of the link is a Class 1
energy#Radio interface. or Class 2 device as the lower powered device tends to
set the range limit. In some cases the effective range
of the data link can be extended when a Class 2 device
3.1 Communication and connection is connecting to a Class 1 transceiver with both higher
sensitivity and transmission power than a typical Class
A master BR/EDR Bluetooth device can communicate 2 device.[17] Mostly, however, the Class 1 devices have
with a maximum of seven devices in a piconet (an ad-hoc a similar sensitivity to Class 2 devices. Connecting two
computer network using Bluetooth technology), though Class 1 devices with both high sensitivity and high power
not all devices reach this maximum. The devices can can allow ranges far in excess of the typical 100m, de-
switch roles, by agreement, and the slave can become the pending on the throughput required by the application.
master (for example, a headset initiating a connection to Some such devices allow open field ranges of up to 1 km
a phone necessarily begins as master—as initiator of the and beyond between two similar devices without exceed-
connection—but may subsequently operate as slave). ing legal emission limits.[18][19][20]
The Bluetooth Core Specification provides for the con- The Bluetooth Core Specification mandates a range of not
nection of two or more piconets to form a scatternet, in less than 10 metres (33 ft), but there is no upper limit
which certain devices simultaneously play the master role on actual range. Manufacturers’ implementations can be
in one piconet and the slave role in another. tuned to provide the range needed for each case.[3]
At any given time, data can be transferred between the
master and one other device (except for the little-used 4.1 Bluetooth profiles
broadcast mode.) The master chooses which slave device
to address; typically, it switches rapidly from one device Main article: Bluetooth profile
to another in a round-robin fashion. Since it is the mas-
ter that chooses which slave to address, whereas a slave is
To use Bluetooth wireless technology, a device must be
(in theory) supposed to listen in each receive slot, being
able to interpret certain Bluetooth profiles, which are def-
a master is a lighter burden than being a slave. Being a
initions of possible applications and specify general be-
master of seven slaves is possible; being a slave of more
haviours that Bluetooth-enabled devices use to communi-
than one master is possible. The specification is vague as
to required behavior in scatternets. cate with other Bluetooth devices. These profiles include
settings to parametrize and to control the communication
from start. Adherence to profiles saves the time for trans-
mitting the parameters anew before the bi-directional link
4 Uses becomes effective. There are a wide range of Bluetooth
profiles that describe many different types of applications
Bluetooth is a standard wire-replacement communica- or use cases for devices.[21][22]
tions protocol primarily designed for low-power con-
sumption, with a short range based on low-cost
transceiver microchips in each device.[16] Because the 4.2 List of applications
devices use a radio (broadcast) communications system,
they do not have to be in visual line of sight of each • Wireless control of and communication between a
other; however, a quasi optical wireless path must be mobile phone and a handsfree headset. This was one
[6]
viable. Range is power-class-dependent, but effective of the earliest applications to become popular.[23]
ranges vary in practice. See the table on the right. • Wireless control of and communication between a
Officially Class 3 radios have a range of up to 1 metre (3 mobile phone and a Bluetooth compatible car stereo
4.3 Bluetooth vs. Wi-Fi (IEEE 802.11) 3

• Dial-up internet access on personal computers or


PDAs using a data-capable mobile phone as a wire-
less modem.

• Short range transmission of health sensor data from


medical devices to mobile phone, set-top box or
dedicated telehealth devices.[29][30]

• Allowing a DECT phone to ring and answer calls on


behalf of a nearby mobile phone.

• Real-time location systems (RTLS), are used to


track and identify the location of objects in real-time
A typical Bluetooth mobile phone headset. using “Nodes” or “tags” attached to, or embedded in
the objects tracked, and “Readers” that receive and
process the wireless signals from these tags to deter-
system. mine their locations.[31]
• Wireless control of and communication with iOS • Personal security application on mobile phones for
and Android device phones, tablets and portable prevention of theft or loss of items. The protected
wireless speakers.[24] item has a Bluetooth marker (e.g., a tag) that is in
constant communication with the phone. If the con-
• Wireless Bluetooth headset and Intercom. Idiomat- nection is broken (the marker is out of range of the
ically, a headset is sometimes called “a Bluetooth”. phone) then an alarm is raised. This can also be
used as a man overboard alarm. A product using
• Wireless streaming of audio to headphones with or
this technology has been available since 2009.[32]
without communication capabilities.
• Calgary, Alberta, Canada's Roads Traffic division
• Wireless streaming of data collected by Bluetooth- uses data collected from travelers’ Bluetooth de-
enabled fitness devices to phone or PC.[25] vices to predict travel times and road congestion for
motorists.[33]
• Wireless networking between PCs in a confined
space and where little bandwidth is required.[26] • Wireless transmission of audio (a more reliable al-
ternative to FM transmitters)
• Wireless communication with PC input and out-
put devices, the most common being the mouse,
keyboard and printer. 4.3 Bluetooth vs. Wi-Fi (IEEE 802.11)
• Transfer of files, contact details, calendar appoint-
Bluetooth and Wi-Fi (the brand name for products using
ments, and reminders between devices with OBEX.
IEEE 802.11 standards) have some similar applications:
• Replacement of previous wired RS-232 serial com- setting up networks, printing, or transferring files. Wi-Fi
munications in test equipment, GPS receivers, med- is intended as a replacement for high speed cabling for
ical equipment, bar code scanners, and traffic con- general local area network access in work areas or home.
trol devices. This category of applications is sometimes called wireless
local area networks (WLAN). Bluetooth was intended for
• For controls where infrared was often used. portable equipment and its applications. The category of
applications is outlined as the wireless personal area net-
• For low bandwidth applications where higher USB work (WPAN). Bluetooth is a replacement for cabling
bandwidth is not required and cable-free connection in a variety of personally carried applications in any set-
desired. ting, and also works for fixed location applications such
as smart energy functionality in the home (thermostats,
• Sending small advertisements from Bluetooth- etc.).
enabled advertising hoardings to other, discover-
able, Bluetooth devices.[27] Wi-Fi and Bluetooth are to some extent complementary
in their applications and usage. Wi-Fi is usually access
• Wireless bridge between two Industrial Ethernet point-centered, with an asymmetrical client-server con-
(e.g., PROFINET) networks. nection with all traffic routed through the access point,
while Bluetooth is usually symmetrical, between two
• Seventh and eighth generation game consoles such Bluetooth devices. Bluetooth serves well in simple ap-
as Nintendo's Wii,[28] and Sony's PlayStation 3 use plications where two devices need to connect with mini-
Bluetooth for their respective wireless controllers. mal configuration like a button press, as in headsets and
4 5 COMPUTER REQUIREMENTS

remote controls, while Wi-Fi suits better in applications 5 Computer requirements


where some degree of client configuration is possible
and high speeds are required, especially for network ac-
cess through an access node. However, Bluetooth access
points do exist and ad-hoc connections are possible with
Wi-Fi though not as simply as with Bluetooth. Wi-Fi Di-
rect was recently developed to add a more Bluetooth-like
ad-hoc functionality to Wi-Fi.

4.4 Bluetooth vs. ANT+

Bluetooth Smart and ANT+ are similar wireless tech-


nologies that allow information to pass between electronic
devices.
Bluetooth devices will talk to other electronics connected
to the Bluetooth network – and the same goes for ANT+
devices. A typical Bluetooth USB dongle.
Of course there are advantages and disadvantages of each
protocol that must be considered when choosing.

4.5 Devices

An internal notebook Bluetooth card (14×36×4 mm).

A personal computer that does not have embedded Blue-


tooth can use a Bluetooth adapter that enables the PC
to communicate with Bluetooth devices. While some
desktop computers and most recent laptops come with
a built-in Bluetooth radio, others require an external
adapter, typically in the form of a small USB "dongle.”
Unlike its predecessor, IrDA, which requires a separate
A Bluetooth USB dongle with a 100 m range. adapter for each device, Bluetooth lets multiple devices
communicate with a computer over a single adapter.[37]
Bluetooth exists in many products, such as telephones,
speakers, tablets, media players, robotics systems, hand-
held, laptops and console gaming equipment, and some 5.1 Operating system implementation
high definition headsets, modems, and watches.[34] The
technology is useful when transferring information be- For more details on this topic, see Bluetooth stack.
tween two or more devices that are near each other in
low-bandwidth situations. Bluetooth is commonly used to For Microsoft platforms, Windows XP Service Pack 2
transfer sound data with telephones (i.e., with a Bluetooth and SP3 releases work natively with Bluetooth v1.1,
headset) or byte data with hand-held computers (transfer- v2.0 and v2.0+EDR.[38] Previous versions required users
ring files). to install their Bluetooth adapter’s own drivers, which
Bluetooth protocols simplify the discovery and setup of were not directly supported by Microsoft.[39] Microsoft’s
services between devices.[35] Bluetooth devices can ad- own Bluetooth dongles (packaged with their Bluetooth
vertise all of the services they provide.[36] This makes us- computer devices) have no external drivers and thus re-
ing services easier, because more of the security, network quire at least Windows XP Service Pack 2. Windows
address and permission configuration can be automated Vista RTM/SP1 with the Feature Pack for Wireless or
than with many other network types.[35] Windows Vista SP2 work with Bluetooth v2.1+EDR.[38]
6.2 Bluetooth 1.1 5

Windows 7 works with Bluetooth v2.1+EDR and Ex- 6.2 Bluetooth 1.1
tended Inquiry Response (EIR).[38]
• Ratified as IEEE Standard 802.15.1–2002[43]
The Windows XP and Windows Vista/Windows 7 Blue-
tooth stacks support the following Bluetooth profiles na- • Many errors found in the v1.0B specifications were
tively: PAN, SPP, DUN, HID, HCRP. The Windows XP fixed.
stack can be replaced by a third party stack that supports
more profiles or newer Bluetooth versions. The Win- • Added possibility of non-encrypted channels.
dows Vista/Windows 7 Bluetooth stack supports vendor-
supplied additional profiles without requiring that the Mi- • Received Signal Strength Indicator (RSSI).
crosoft stack be replaced.[38]
Apple products have worked with Bluetooth since Mac 6.3 Bluetooth 1.2
OS X v10.2, which was released in 2002.[40]
Linux has two popular Bluetooth stacks, BlueZ and Af- Major enhancements include the following:
fix. The BlueZ stack is included with most Linux kernels
and was originally developed by Qualcomm.[41] The Af- • Faster Connection and Discovery
fix stack was developed by Nokia.
FreeBSD features Bluetooth since its v5.0 release. • Adaptive frequency-hopping spread spectrum (AFH),
which improves resistance to radio frequency inter-
NetBSD features Bluetooth since its v4.0 release. Its ference by avoiding the use of crowded frequencies
Bluetooth stack has been ported to OpenBSD as well. in the hopping sequence.

• Higher transmission speeds in practice than in v1.1,


6 Specifications and features up to 721 kbit/s.[44]

• Extended Synchronous Connections (eSCO), which


The specifications were formalized by the Bluetooth Spe- improve voice quality of audio links by allowing re-
cial Interest Group (SIG). The SIG was formally an- transmissions of corrupted packets, and may option-
nounced on 20 May 1998. Today it has a membership ally increase audio latency to provide better concur-
of over 30,000 companies worldwide.[42] It was estab- rent data transfer.
lished by Ericsson, IBM, Intel, Toshiba and Nokia, and
later joined by many other companies. • Host Controller Interface (HCI) operation with
All versions of the Bluetooth standards support downward three-wire UART.
compatibility. That lets the latest standard cover all older • Ratified as IEEE Standard 802.15.1–2005[45]
versions.
The Bluetooth Core Specification Working Group • Introduced Flow Control and Retransmission Modes
(CSWG) produces mainly 4 kinds of specifications for L2CAP.

• The Bluetooth Core Specification, release cycle is


6.4 Bluetooth 2.0 + EDR
typically a few years in between

• Core Specification Addendum (CSA), release cycle This version of the Bluetooth Core Specification was re-
can be as tight as a few times per year leased in 2004. The main difference is the introduction
of an Enhanced Data Rate (EDR) for faster data transfer.
• Core Specification Supplements (CSS), can be re- The bit rate of EDR is 3 Mbit/s, although the maximum
leased very quickly data transfer rate (allowing for inter-packet time and ac-
knowledgements) is 2.1 Mbit/s.[44] EDR uses a combina-
• Errata (Available with a user account: Errata login) tion of GFSK and Phase Shift Keying modulation (PSK)
with two variants, π/4-DQPSK and 8DPSK.[46] EDR can
provide a lower power consumption through a reduced
6.1 Bluetooth 1.0 and 1.0B
duty cycle.
Versions 1.0 and 1.0B had many problems and manufac- The specification is published as Bluetooth v2.0 + EDR,
turers had difficulty making their products interoperable. which implies that EDR is an optional feature. Aside
Versions 1.0 and 1.0B also included mandatory Bluetooth from EDR, the v2.0 specification contains other minor
hardware device address (BD_ADDR) transmission in improvements, and products may claim compliance to
the Connecting process (rendering anonymity impossible “Bluetooth v2.0” without supporting the higher data rate.
at the protocol level), which was a major setback for cer- At least one commercial device states “Bluetooth v2.0
tain services planned for use in Bluetooth environments. without EDR” on its data sheet.[47]
6 6 SPECIFICATIONS AND FEATURES

6.5 Bluetooth 2.1 + EDR tion/transmission of data. This is only appropriate


for small amounts of data.
Bluetooth Core Specification Version 2.1 + EDR was
adopted by the Bluetooth SIG on 26 July 2007.[46] Enhanced Power Control Updates the power control
The headline feature of v2.1 is secure simple pairing feature to remove the open loop power control, and
(SSP): this improves the pairing experience for Bluetooth also to clarify ambiguities in power control intro-
devices, while increasing the use and strength of security. duced by the new modulation schemes added for
See the section on Pairing below for more details. [48] EDR. Enhanced power control removes the ambi-
guities by specifying the behaviour that is expected.
Version 2.1 allows various other improvements, including The feature also adds closed loop power control,
“Extended inquiry response” (EIR), which provides more meaning RSSI filtering can start as the response is
information during the inquiry procedure to allow better received. Additionally, a “go straight to maximum
filtering of devices before connection; and sniff subrat- power” request has been introduced. This is ex-
ing, which reduces the power consumption in low-power pected to deal with the headset link loss issue typ-
mode. ically observed when a user puts their phone into a
pocket on the opposite side to the headset.
6.6 Bluetooth 3.0 + HS
6.6.1 Ultra-wideband
Version 3.0 + HS of the Bluetooth Core Specification[46]
was adopted by the Bluetooth SIG on 21 April 2009.
The high speed (AMP) feature of Bluetooth v3.0 was
Bluetooth v3.0 + HS provides theoretical data transfer
originally intended for UWB, but the WiMedia Alliance,
speeds of up to 24 Mbit/s, though not over the Bluetooth
the body responsible for the flavor of UWB intended for
link itself. Instead, the Bluetooth link is used for negoti-
Bluetooth, announced in March 2009 that it was disband-
ation and establishment, and the high data rate traffic is
ing, and ultimately UWB was omitted from the Core v3.0
carried over a colocated 802.11 link.
specification.[51]
The main new feature is AMP (Alternative MAC/PHY),
On 16 March 2009, the WiMedia Alliance announced
the addition of 802.11 as a high speed transport. The
it was entering into technology transfer agreements for
High-Speed part of the specification is not mandatory,
the WiMedia Ultra-wideband (UWB) specifications. Wi-
and hence only devices that display the "+HS” logo actu-
Media has transferred all current and future specifica-
ally support Bluetooth over 802.11 high-speed data trans-
tions, including work on future high speed and power
fer. A Bluetooth v3.0 device without the "+HS” suffix
optimized implementations, to the Bluetooth Special In-
is only required to support features introduced in Core
terest Group (SIG), Wireless USB Promoter Group and
Specification Version 3.0[49] or earlier Core Specification
the USB Implementers Forum. After successful com-
Addendum 1.[50]
pletion of the technology transfer, marketing, and re-
lated administrative items, the WiMedia Alliance ceased
L2CAP Enhanced modes Enhanced Retransmission operations.[52][53][54][55][56][57]
Mode (ERTM) implements reliable L2CAP chan-
nel, while Streaming Mode (SM) implements In October 2009 the Bluetooth Special Interest Group
unreliable channel with no retransmission or suspended development of UWB as part of the alterna-
flow control. Introduced in Core Specification tive MAC/PHY, Bluetooth v3.0 + HS solution. A small,
Addendum 1. but significant, number of former WiMedia members
had not and would not sign up to the necessary agree-
Alternative MAC/PHY Enables the use of alternative ments for the IP transfer. The Bluetooth SIG is now in
MAC and PHYs for transporting Bluetooth profile the process of evaluating other options for its longer term
data. The Bluetooth radio is still used for device dis- roadmap.[58][59][60]
covery, initial connection and profile configuration.
However, when large quantities of data must be sent,
the high speed alternative MAC PHY 802.11 (typ- 6.7 Bluetooth 4.0 + LE
ically associated with Wi-Fi) transports the data.
This means that Bluetooth uses proven low power See also: Bluetooth low energy
connection models when the system is idle, and the
faster radio when it must send large quantities of
data. AMP links require enhanced L2CAP modes. The Bluetooth SIG completed the Bluetooth Core Speci-
fication version 4.0 (called Bluetooth Smart) and has been
Unicast Connectionless Data Permits sending service adopted as of 30 June 2010. It includes Classic Blue-
data without establishing an explicit L2CAP chan- tooth, Bluetooth high speed and Bluetooth low energy pro-
nel. It is intended for use by applications that re- tocols. Bluetooth high speed is based on Wi-Fi, and Clas-
quire low latency between user action and reconnec- sic Bluetooth consists of legacy Bluetooth protocols.
6.9 Bluetooth 4.2 7

Bluetooth low energy, previously known as Wibree,[61] is specification is an incremental software update to Blue-
a subset of Bluetooth v4.0 with an entirely new protocol tooth Specification v4.0, and not a hardware update. The
stack for rapid build-up of simple links. As an alternative update incorporates Bluetooth Core Specification Ad-
to the Bluetooth standard protocols that were introduced denda (CSA 1, 2, 3 & 4) and adds new features that im-
in Bluetooth v1.0 to v3.0, it is aimed at very low power prove consumer usability. These include increased co-
applications running off a coin cell. Chip designs allow existence support for LTE, bulk data exchange rates—
for two types of implementation, dual-mode, single-mode and aid developer innovation by allowing devices to sup-
and enhanced past versions.[62] The provisional names port multiple roles simultaneously.[71]
Wibree and Bluetooth ULP (Ultra Low Power) were aban-
New features of this specification include:
doned and the BLE name was used for a while. In late
2011, new logos “Bluetooth Smart Ready” for hosts and
“Bluetooth Smart” for sensors were introduced as the • Mobile Wireless Service Coexistence Signaling
general-public face of BLE.[63] • Train Nudging and Generalized Interlaced Scanning
• Low Duty Cycle Directed Advertising
• In a single-mode implementation, only the
low energy protocol stack is implemented. • L2CAP Connection Oriented and Dedicated Chan-
STMicroelectronics,[64] AMICCOM,[65] CSR,[66] nels with Credit Based Flow Control
Nordic Semiconductor[67] and Texas Instruments[68]
have released single mode Bluetooth low energy • Dual Mode and Topology
solutions.
• LE Link Layer Topology
• In a dual-mode implementation, Bluetooth Smart • 802.11n PAL
functionality is integrated into an existing Clas-
sic Bluetooth controller. As of March 2011, • Audio Architecture Updates for Wide Band Speech
the following semiconductor companies have an-
nounced the availability of chips meeting the stan- • Fast Data Advertising Interval
dard: Qualcomm-Atheros, CSR, Broadcom[69][70] • Limited Discovery Time[72]
and Texas Instruments. The compliant architecture
shares all of Classic Bluetooth’s existing radio and
Notice that some features were already available in a
functionality resulting in a negligible cost increase
Core Specification Addendum (CSA) before the release
compared to Classic Bluetooth.
of v4.1.

Cost-reduced single-mode chips, which enable highly in-


tegrated and compact devices, feature a lightweight Link 6.9 Bluetooth 4.2
Layer providing ultra-low power idle mode operation,
Bluetooth v4.2 was released on December 2, 2014. It In-
simple device discovery, and reliable point-to-multipoint
data transfer with advanced power-save and secure en- troduces some key features for IoT. Some features, such
crypted connections at the lowest possible cost. as Data Length Extension, require a hardware update.[73]
But some older Bluetooth hardware may receive some
General improvements in version 4.0 include the changes Bluetooth v4.2 features, such as privacy updates via
necessary to facilitate BLE modes, as well the Generic firmware.[74]
Attribute Profile (GATT) and Security Manager (SM)
services with AES Encryption. The major areas of improvement are:
Core Specification Addendum 2 was unveiled in Decem-
ber 2011; it contains improvements to the audio Host • LE Data Packet Length Extension
Controller Interface and to the High Speed (802.11) Pro- • LE Secure Connections
tocol Adaptation Layer.
• Link Layer Privacy
Core Specification Addendum 3 revision 2 has an adop-
tion date of 24 July 2012. • Link Layer Extended Scanner Filter Policies
Core Specification Addendum 4 has an adoption date of
• IP connectivity for Bluetooth Smart devices to be-
12 February 2013.
come available soon after the introduction of BT
v4.2 via the new Internet Protocol Support Profile
(IPSP).
6.8 Bluetooth 4.1
• IPSP adds an IPv6 connection option for Bluetooth
The Bluetooth SIG announced formal adoption of the Smart, to support connected home and other IoT im-
Bluetooth v4.1 specification on 4 December 2013. This plementations.
8 7 TECHNICAL INFORMATION

6.10 Bluetooth 5 Applications/Profiles


Application
layer
Other Service Middleware
RFcomm Telephony
LLC discovery layer
The Bluetooth SIG officially unveiled Bluetooth 5 during Audio Logical link control adaptation protocol
Control
Data
a media event in London on 16 June 2016. Its new fea- Link manager link
layer
tures are mainly focused on emerging Internet of Things Baseband
Physical
technology. The release of products is scheduled for late Physical radio layer

2016 to early 2017.


One change on the marketing side is the dropping of Bluetooth Protocol Stack
the point number, so that it is just “Bluetooth 5” (and
not Bluetooth 5.0 or 5.0 LE like for Bluetooth 4.0).
The change was purportedly for the sake of “simplify- 7.1.1 LMP
ing marketing, and communicating user benefits more
effectively.”[75] The Link Management Protocol (LMP) is used for set-up
and control of the radio link between two devices. Im-
On the technical side, Bluetooth 5 has quadruple the
plemented on the controller.
range, double the speed, and provides an eight-fold in-
crease in data broadcasting capacity of low energy Blue-
tooth transmissions compared to Bluetooth 4.x, which
could be important for IoT applications where nodes are 7.1.2 L2CAP
connected throughout a whole house. Bluetooth 5 sup-
ports transfers at 2 Mbit/s instead of the usual 1 Mbit/s. In The Logical Link Control and Adaptation Protocol
addition it adds functionality for connectionless services (L2CAP) is used to multiplex multiple logical connec-
like location-relevant information and navigation[76][77] of tions between two devices using different higher level
low energy Bluetooth connections.[78][79][80] protocols. Provides segmentation and reassembly of on-
The major areas of improvement are: air packets.
In Basic mode, L2CAP provides packets with a payload
• Slot Availability Mask (SAM) configurable up to 64 kB, with 672 bytes as the default
MTU, and 48 bytes as the minimum mandatory sup-
• 2 Mbit/s PHY for LE
ported MTU.
• LE Long Range
In Retransmission and Flow Control modes, L2CAP can
• High Duty Cycle Non-Connectable Advertising be configured either for isochronous data or reliable data
per channel by performing retransmissions and CRC
• LE Advertising Extensions checks.
• LE Channel Selection Algorithm #2 Bluetooth Core Specification Addendum 1 adds two ad-
ditional L2CAP modes to the core specification. These
Features Added in CSA5 - Integrated in v5.0: modes effectively deprecate original Retransmission and
Flow Control modes:
• Higher Output Power

The following features were removed in this version of • Enhanced Retransmission Mode (ERTM): This
the specification: mode is an improved version of the original re-
transmission mode. This mode provides a reliable
• Park State[81] L2CAP channel.

• Streaming Mode (SM): This is a very simple mode,


7 Technical information with no retransmission or flow control. This mode
provides an unreliable L2CAP channel.
7.1 Bluetooth protocol stack
Main articles: Bluetooth stack and Bluetooth protocols Reliability in any of these modes is optionally and/or
Bluetooth is defined as a layer protocol architecture con- additionally guaranteed by the lower layer Bluetooth
sisting of core protocols, cable replacement protocols, BDR/EDR air interface by configuring the number of re-
telephony control protocols, and adopted protocols.[82] transmissions and flush timeout (time after which the ra-
Mandatory protocols for all Bluetooth stacks are: LMP, dio flushes packets). In-order sequencing is guaranteed
L2CAP and SDP. In addition, devices that communicate by the lower layer.
with Bluetooth almost universally can use these protocols: Only L2CAP channels configured in ERTM or SM may
HCI and RFCOMM. be operated over AMP logical links.
7.2 Baseband error correction 9

7.1.3 SDP channel intended for video distribution profile in the


Bluetooth transmission.
The Service Discovery Protocol (SDP) allows a device to
discover services offered by other devices, and their asso-
ciated parameters. For example, when you use a mobile 7.1.8 TCS
phone with a Bluetooth headset, the phone uses SDP to
determine which Bluetooth profiles the headset can use The Telephony Control Protocol – Binary (TCS BIN)
(Headset Profile, Hands Free Profile, Advanced Audio is the bit-oriented protocol that defines the call control
Distribution Profile (A2DP) etc.) and the protocol mul- signaling for the establishment of voice and data calls
tiplexer settings needed for the phone to connect to the between Bluetooth devices. Additionally, “TCS BIN
headset using each of them. Each service is identified defines mobility management procedures for handling
by a Universally Unique Identifier (UUID), with official groups of Bluetooth TCS devices.”
services (Bluetooth profiles) assigned a short form UUID TCS-BIN is only used by the cordless telephony profile,
(16 bits rather than the full 128). which failed to attract implementers. As such it is only of
historical interest.
7.1.4 RFCOMM
7.1.9 Adopted protocols
Radio Frequency Communications (RFCOMM) is a cable
replacement protocol used for generating a virtual serial Adopted protocols are defined by other standards-making
data stream. RFCOMM provides for binary data trans- organizations and incorporated into Bluetooth’s protocol
port and emulates EIA-232 (formerly RS-232) control stack, allowing Bluetooth to code protocols only when
signals over the Bluetooth baseband layer, i.e. it is a serial necessary. The adopted protocols include:
port emulation.
RFCOMM provides a simple reliable data stream to the Point-to-Point Protocol (PPP) Internet standard pro-
user, similar to TCP. It is used directly by many telephony tocol for transporting IP datagrams over a point-to-
related profiles as a carrier for AT commands, as well as point link.
being a transport layer for OBEX over Bluetooth.
TCP/IP/UDP Foundation Protocols for TCP/IP proto-
Many Bluetooth applications use RFCOMM because of col suite
its widespread support and publicly available API on most
operating systems. Additionally, applications that used a Object Exchange Protocol (OBEX) Session-layer
serial port to communicate can be quickly ported to use protocol for the exchange of objects, providing a
RFCOMM. model for object and operation representation
Wireless Application Environment/Wireless Appli-
7.1.5 BNEP cation Protocol (WAE/WAP)
WAE specifies an application framework for wire-
The Bluetooth Network Encapsulation Protocol (BNEP) less devices and WAP is an open standard to provide
is used for transferring another protocol stack’s data via mobile users access to telephony and information
an L2CAP channel. Its main purpose is the transmission services.[82]
of IP packets in the Personal Area Networking Profile.
BNEP performs a similar function to SNAP in Wireless
LAN.
7.2 Baseband error correction
Depending on packet type, individual packets may be
7.1.6 AVCTP protected by error correction, either 1/3 rate forward er-
ror correction (FEC) or 2/3 rate. In addition, packets
The Audio/Video Control Transport Protocol (AVCTP) is with CRC will be retransmitted until acknowledged by
used by the remote control profile to transfer AV/C com- automatic repeat request (ARQ).
mands over an L2CAP channel. The music control but-
tons on a stereo headset use this protocol to control the
music player. 7.3 Setting up connections
Any Bluetooth device in discoverable mode transmits the
7.1.7 AVDTP following information on demand:

The Audio/Video Distribution Transport Protocol • Device name


(AVDTP) is used by the advanced audio distribution
profile to stream music to stereo headsets over an L2CAP • Device class
10 7 TECHNICAL INFORMATION

• List of services When pairing successfully completes, a bond forms be-


tween the two devices, enabling those two devices to con-
• Technical information (for example: device fea- nect to each other in the future without repeating the pair-
tures, manufacturer, Bluetooth specification used, ing process to confirm device identities. When desired,
clock offset) the user can remove the bonding relationship.

Any device may perform an inquiry to find other devices


to connect to, and any device can be configured to respond 7.4.2 Implementation
to such inquiries. However, if the device trying to connect
knows the address of the device, it always responds to During pairing, the two devices establish a relationship by
direct connection requests and transmits the information creating a shared secret known as a link key. If both de-
shown in the list above if requested. Use of a device’s vices store the same link key, they are said to be paired or
services may require pairing or acceptance by its owner, bonded. A device that wants to communicate only with
but the connection itself can be initiated by any device a bonded device can cryptographically authenticate the
and held until it goes out of range. Some devices can be identity of the other device, ensuring it is the same de-
connected to only one device at a time, and connecting vice it previously paired with. Once a link key is gen-
to them prevents them from connecting to other devices erated, an authenticated Asynchronous Connection-Less
and appearing in inquiries until they disconnect from the (ACL) link between the devices may be encrypted to pro-
other device. tect exchanged data against eavesdropping. Users can
delete link keys from either device, which removes the
Every device has a unique 48-bit address. However, these bond between the devices—so it is possible for one de-
addresses are generally not shown in inquiries. Instead, vice to have a stored link key for a device it is no longer
friendly Bluetooth names are used, which can be set by paired with.
the user. This name appears when another user scans for
devices and in lists of paired devices. Bluetooth services generally require either encryption or
authentication and as such require pairing before they let a
Most cellular phones have the Bluetooth name set to remote device connect. Some services, such as the Object
the manufacturer and model of the phone by default. Push Profile, elect not to explicitly require authentication
Most cellular phones and laptops show only the Bluetooth or encryption so that pairing does not interfere with the
names and special programs are required to get additional user experience associated with the service use-cases.
information about remote devices. This can be confusing
as, for example, there could be several cellular phones in
range named T610 (see Bluejacking). 7.4.3 Pairing mechanisms

Pairing mechanisms changed significantly with the intro-


7.4 Pairing and bonding duction of Secure Simple Pairing in Bluetooth v2.1. The
following summarizes the pairing mechanisms:
7.4.1 Motivation
• Legacy pairing: This is the only method available in
Many services offered over Bluetooth can expose private Bluetooth v2.0 and before. Each device must enter a
data or let a connecting party control the Bluetooth de- PIN code; pairing is only successful if both devices
vice. Security reasons make it necessary to recognize spe- enter the same PIN code. Any 16-byte UTF-8 string
cific devices, and thus enable control over which devices may be used as a PIN code; however, not all devices
can connect to a given Bluetooth device. At the same may be capable of entering all possible PIN codes.
time, it is useful for Bluetooth devices to be able to estab-
lish a connection without user intervention (for example, • Limited input devices: The obvious example
as soon as in range). of this class of device is a Bluetooth Hands-
To resolve this conflict, Bluetooth uses a process called free headset, which generally have few inputs.
bonding, and a bond is generated through a process called These devices usually have a fixed PIN, for ex-
pairing. The pairing process is triggered either by a spe- ample “0000” or “1234”, that are hard-coded
cific request from a user to generate a bond (for example, into the device.
the user explicitly requests to “Add a Bluetooth device”), • Numeric input devices: Mobile phones are
or it is triggered automatically when connecting to a ser- classic examples of these devices. They allow
vice where (for the first time) the identity of a device is a user to enter a numeric value up to 16 digits
required for security purposes. These two cases are re- in length.
ferred to as dedicated bonding and general bonding re- • Alpha-numeric input devices: PCs and smart-
spectively. phones are examples of these devices. They
Pairing often involves some level of user interaction. allow a user to enter full UTF-8 text as a PIN
This user interaction confirms the identity of the devices. code. If pairing with a less capable device the
11

user must be aware of the input limitations on • For use-cases not requiring MITM protection, user
the other device, there is no mechanism avail- interaction can be eliminated.
able for a capable device to determine how it
should limit the available input a user may use. • For numeric comparison, MITM protection can be
achieved with a simple equality comparison by the
• Secure Simple Pairing (SSP): This is required by user.
Bluetooth v2.1, although a Bluetooth v2.1 device
may only use legacy pairing to interoperate with • Using OOB with NFC enables pairing when devices
a v2.0 or earlier device. Secure Simple Pairing simply get close, rather than requiring a lengthy dis-
uses a form of public key cryptography, and some covery process.
types can help protect against man in the middle, or
MITM attacks. SSP has the following authentica-
7.4.4 Security concerns
tion mechanisms:
• Just works: As the name implies, this method Prior to Bluetooth v2.1, encryption is not required and
just works, with no user interaction. However, can be turned off at any time. Moreover, the encryption
a device may prompt the user to confirm the key is only good for approximately 23.5 hours; using a
pairing process. This method is typically used single encryption key longer than this time allows simple
by headsets with very limited IO capabilities, XOR attacks to retrieve the encryption key.
and is more secure than the fixed PIN mecha-
nism this limited set of devices uses for legacy • Turning off encryption is required for several nor-
pairing. This method provides no man-in-the- mal operations, so it is problematic to detect if en-
middle (MITM) protection. cryption is disabled for a valid reason or for a secu-
• Numeric comparison: If both devices have rity attack.
a display, and at least one can accept a bi-
nary yes/no user input, they may use Numeric Bluetooth v2.1 addresses this in the following ways:
Comparison. This method displays a 6-digit
numeric code on each device. The user should
• Encryption is required for all non-SDP (Service Dis-
compare the numbers to ensure they are iden-
covery Protocol) connections
tical. If the comparison succeeds, the user(s)
should confirm pairing on the device(s) that • A new Encryption Pause and Resume feature is used
can accept an input. This method provides for all normal operations that require that encryption
MITM protection, assuming the user confirms be disabled. This enables easy identification of nor-
on both devices and actually performs the mal operation from security attacks.
comparison properly.
• Passkey Entry: This method may be used be- • The encryption key must be refreshed before it ex-
tween a device with a display and a device with pires.
numeric keypad entry (such as a keyboard),
or two devices with numeric keypad entry. In Link keys may be stored on the device file system, not
the first case, the display presents a 6-digit nu- on the Bluetooth chip itself. Many Bluetooth chip manu-
meric code to the user, who then enters the facturers let link keys be stored on the device—however,
code on the keypad. In the second case, the if the device is removable, this means that the link key
user of each device enters the same 6-digit moves with the device.
number. Both of these cases provide MITM
protection.
• Out of band (OOB): This method uses an 8 Security
external means of communication, such as
Near Field Communication (NFC) to ex-
8.1 Overview
change some information used in the pairing
process. Pairing is completed using the Blue-
See also: Mobile security § Attacks based on communi-
tooth radio, but requires information from the
cation networks
OOB mechanism. This provides only the level
of MITM protection that is present in the OOB
mechanism. Bluetooth implements confidentiality, authentication and
key derivation with custom algorithms based on the
SSP is considered simple for the following reasons: SAFER+ block cipher. Bluetooth key generation is gen-
erally based on a Bluetooth PIN, which must be entered
• In most cases, it does not require a user to generate into both devices. This procedure might be modified if
a passkey. one of the devices has a fixed PIN (e.g., for headsets or
12 8 SECURITY

similar devices with a restricted user interface). During closure of personal data.[88] In a subsequent experiment,
pairing, an initialization key or master key is generated, Martin Herfurt from the trifinite.group was able to do
using the E22 algorithm.[83] The E0 stream cipher is used a field-trial at the CeBIT fairgrounds, showing the im-
for encrypting packets, granting confidentiality, and is portance of the problem to the world. A new attack
based on a shared cryptographic secret, namely a previ- called BlueBug was used for this experiment.[89] In 2004
ously generated link key or master key. Those keys, used the first purported virus using Bluetooth to spread itself
for subsequent encryption of data sent via the air inter- among mobile phones appeared on the Symbian OS.[90]
face, rely on the Bluetooth PIN, which has been entered The virus was first described by Kaspersky Lab and re-
into one or both devices. quires users to confirm the installation of unknown soft-
An overview of Bluetooth vulnerabilities exploits was ware before it can propagate. The virus was written as
a proof-of-concept by a group of virus writers known as
published in 2007 by Andreas Becker.[84]
“29A” and sent to anti-virus groups. Thus, it should be re-
In September 2008, the National Institute of Standards garded as a potential (but not real) security threat to Blue-
and Technology (NIST) published a Guide to Blue- tooth technology or Symbian OS since the virus has never
tooth Security as a reference for organizations. It de- spread outside of this system. In August 2004, a world-
scribes Bluetooth security capabilities and how to se- record-setting experiment (see also Bluetooth sniping)
cure Bluetooth technologies effectively. While Bluetooth showed that the range of Class 2 Bluetooth radios could
has its benefits, it is susceptible to denial-of-service at- be extended to 1.78 km (1.11 mi) with directional an-
tacks, eavesdropping, man-in-the-middle attacks, mes- tennas and signal amplifiers.[91] This poses a potential se-
sage modification, and resource misappropriation. Users curity threat because it enables attackers to access vul-
and organizations must evaluate their acceptable level nerable Bluetooth devices from a distance beyond expec-
of risk and incorporate security into the lifecycle of tation. The attacker must also be able to receive infor-
Bluetooth devices. To help mitigate risks, included in mation from the victim to set up a connection. No at-
the NIST document are security checklists with guide- tack can be made against a Bluetooth device unless the
lines and recommendations for creating and maintain- attacker knows its Bluetooth address and which channels
ing secure Bluetooth piconets, headsets, and smart card to transmit on, although these can be deduced within a
readers.[85] few minutes if the device is in use.[92]
Bluetooth v2.1 – finalized in 2007 with consumer devices
first appearing in 2009 – makes significant changes to
8.3.2 2005
Bluetooth’s security, including pairing. See the pairing
mechanisms section for more about these changes.
In January 2005, a mobile malware worm known as
Lasco. The worm began targeting mobile phones using
Symbian OS (Series 60 platform) using Bluetooth en-
8.2 Bluejacking
abled devices to replicate itself and spread to other de-
vices. The worm is self-installing and begins once the
Main article: Bluejacking
mobile user approves the transfer of the file (velasco.sis)
from another device. Once installed, the worm begins
Bluejacking is the sending of either a picture or a message looking for other Bluetooth enabled devices to infect.
from one user to an unsuspecting user through Bluetooth Additionally, the worm infects other .SIS files on the de-
wireless technology. Common applications include short vice, allowing replication to another device through use of
messages, e.g., “You've just been bluejacked!".[86] Blue- removable media (Secure Digital, Compact Flash, etc.).
jacking does not involve the removal or alteration of any The worm can render the mobile device unstable.[93]
data from the device. Bluejacking can also involve tak-
In April 2005, Cambridge University security researchers
ing control of a mobile device wirelessly and phoning a
published results of their actual implementation of pas-
premium rate line, owned by the bluejacker. Security ad-
sive attacks against the PIN-based pairing between com-
vances have alleviated this issue.
mercial Bluetooth devices. They confirmed that attacks
are practicably fast, and the Bluetooth symmetric key es-
8.3 History of security concerns tablishment method is vulnerable. To rectify this vul-
nerability, they designed an implementation that showed
8.3.1 2001–2004 that stronger, asymmetric key establishment is feasible for
certain classes of devices, such as mobile phones.[94]
In 2001, Jakobsson and Wetzel from Bell Laborato- In June 2005, Yaniv Shaked[95] and Avishai Wool[96] pub-
ries discovered flaws in the Bluetooth pairing proto- lished a paper describing both passive and active methods
col and also pointed to vulnerabilities in the encryption for obtaining the PIN for a Bluetooth link. The passive
scheme.[87] In 2003, Ben and Adam Laurie from A.L. attack allows a suitably equipped attacker to eavesdrop on
Digital Ltd. discovered that serious flaws in some poor communications and spoof, if the attacker was present at
implementations of Bluetooth security may lead to dis- the time of initial pairing. The active method makes use
13

of a specially constructed message that must be inserted Bluetooth uses the microwave radio frequency spectrum
at a specific point in the protocol, to make the master in the 2.402 GHz to 2.480 GHz range,[101] which is
and slave repeat the pairing process. After that, the first harmless non-ionizing radiation that cannot cause cancer.
method can be used to crack the PIN. This attack’s ma- Maximum power output from a Bluetooth radio is 100
jor weakness is that it requires the user of the devices mW for class 1, 2.5 mW for class 2, and 1 mW for class
under attack to re-enter the PIN during the attack when 3 devices. Even the maximum power output of class 1 is
the device prompts them to. Also, this active attack prob- a lower level than the lowest powered mobile phones.[102]
ably requires custom hardware, since most commercially UMTS & W-CDMA outputs 250 mW, GSM1800/1900
available Bluetooth devices are not capable of the timing outputs 1000 mW, and GSM850/900 outputs 2000 mW.
necessary.[97]
In August 2005, police in Cambridgeshire, England, is-
sued warnings about thieves using Bluetooth enabled 10 Bluetooth award programs
phones to track other devices left in cars. Police are ad-
vising users to ensure that any mobile networking con- The Bluetooth Innovation World Cup, a marketing initia-
nections are de-activated if laptops and other devices are tive of the Bluetooth Special Interest Group (SIG), was
left in this way.[98] an international competition that encouraged the devel-
opment of innovations for applications leveraging Blue-
8.3.3 2006 tooth technology in sports, fitness and health care prod-
ucts. The aim of the competition was to stimulate new
[103]
In April 2006, researchers from Secure Network and F- markets.
Secure published a report that warns of the large number The Bluetooth Innovation World Cup morphed into the
of devices left in a visible state, and issued statistics on Bluetooth Breakthrough Awards in 2013. The Break-
the spread of various Bluetooth services and the ease of through Awards[104] Bluetooth program highlights the
spread of an eventual Bluetooth worm.[99] most innovative products and applications available to-
day, prototypes coming soon, and student-led projects in
the making.
8.3.4 2007

In October 2007, at the Luxemburgish Hack.lu Security


Conference, Kevin Finistere and Thierry Zoller demon- 11 See also
strated and released a remote root shell via Bluetooth on
Mac OS X v10.3.9 and v10.4. They also demonstrated • Bluesniping
the first Bluetooth PIN and Linkkeys cracker, which is
based on the research of Wool and Shaked. • BlueSoleil – proprietary driver

• Bluetooth low energy beacons (iBeacon and


8.4 Mitigation Eddystone)

Options to mitigate against Bluetooth security attacks • Continua Health Alliance


include:[100]
• DASH7
• Enable Bluetooth only when required
• Headset (audio)
• Enable Bluetooth discovery only when necessary,
and disable discovery when finished • Hotspot (Wi-Fi)

• Do not enter link keys or PINs when unexpectedly • Java APIs for Bluetooth
prompted to do so
• Li-Fi
• Remove paired devices when not in use
• MyriaNed
• Regularly update firmware on Bluetooth-enabled
devices • Near field communication

• RuBee – secure wireless protocol alternative


9 Health concerns • Tethering

Main article: Wireless electronic devices and health • ZigBee – low-power lightweight wireless protocol in
the ISM band
14 12 REFERENCES

12 References [24] “Portable Wireless Bluetooth Compatible Speakers”.


Trusound Audio.
[1] DualShock#DualShock 4, Wikipedia
[25] “Bluetooth Revisited”. www.techpayout.com. Retrieved
[2] bluAir. “Bluetooth Range: 100m, 1km, or 10km?". blu- 10 May 2016.
air.pl. Retrieved 4 June 2015.
[26] “Bluetooth Technology”. mobileinfo.com.
[3] “Basics | Bluetooth Technology Website”. Bluetooth.com.
23 May 2010. [27] John Fuller. “How Bluetooth Surveillance Works”. how-
stuffworks. Retrieved 26 May 2015.
[4] “basic rate/enhanced data rate (br/edr)". Bluetooth.com.
Retrieved 3 June 2016. [28] “Wii Controller”. Bluetooth SIG. Archived from the orig-
inal on 20 February 2008. Retrieved 1 February 2008.
[5] “Bluetooth traveler”. hoovers.com. Retrieved 9 April
2010. [29] “Telemedicine.jp”. Telemedicine.jp. Retrieved 4
September 2010.
[6] Newton, Harold. (2007). Newton’s telecom dictionary.
New York: Flatiron Publishing. [30] tainghebluetooth.com. “Tai nghe bluetooth nokia”.
tainghebluetooth.com.
[7] “Bluetooth.org”. Bluetooth.org. Retrieved 3 May 2011.

[8] “Brand Enforcement Program”. Bluetooth.org. Retrieved [31] “Real Time Location Systems” (PDF). clarinox. Re-
2 November 2013. trieved 4 August 2010.

[9] “The Bluetooth Blues”. Information Age. 24 May 2001. [32] “Tenbu’s nio Is Kind Of Like A Car Alarm For Your Cell-
Archived from the original on 22 December 2007. Re- phone”. OhGizmo!. Retrieved 4 June 2015.
trieved 1 February 2008.
[33] “Wireless waves used to track travel times | CTV Calgary
[10] Kardach, Jim (5 March 2008). “Tech History: How Blue- News”. Calgary.ctvnews.ca. 26 November 2012. Re-
tooth got its name”. Retrieved 11 June 2013. trieved 11 July 2013.

[11] Mark Forsyth. The etymologicon. // Icon Books Ltd. [34] “Watch”. Bluetooth.com. Retrieved 4 September 2010.
London N79DP, 2011. p. 139.
[35] “How Bluetooth Works”. How Stuff Works. 30 June
[12] “Milestones in the Bluetooth advance”. Ericsson Tech- 2010.
nology Licensing. 22 March 2004. Archived from the
original on 20 June 2004. [36] “Specification Documents” (PDF). Bluetooth.com. 30
June 2010.
[13] “Bluetooth on Twitter”.
[37] “Bluetooth for Programmers” (PDF). MIT Computer Sci-
[14] “Bluetooth Experience Icons” (PDF). Bluetooth Special ence And Artificial Intelligence Laboratory.
Interest Group. Retrieved 2016-10-21. Bluetooth Expe-
rience Icons borrow two of these three features: the blue [38] “Bluetooth Wireless Technology FAQ – 2010”. Retrieved
color and the rune-inspired symbol. 4 September 2010.
[15] “Bluetooth Radio Interface, Modulation & Channels”. [39] “Network Protection Technologie”. Changes to Function-
Radio-Electronics.com. ality in Microsoft Windows XP Service Pack 2. Microsoft
[16] “How Bluetooth Technology Works”. Bluetooth SIG. Technet. Retrieved 1 February 2008.
Archived from the original on 17 January 2008. Retrieved
[40] “Apple Introduces “Jaguar,” the Next Major Release of
1 February 2008.
Mac OS X” (Press release). Apple. 17 July 2002. Re-
[17] “Class 1 Bluetooth Dongle Test”. Amperordirect.com. trieved 4 February 2008.
Retrieved 4 September 2010.
[41] “Official Linux Bluetooth protocol stack”. BlueZ. Re-
[18] “WT41 Long Range Bluetooth Module”. trieved 4 September 2010.

[19] “BluBear Industrial Long Range Bluetooth 2.1 Module [42] “English Introduction to Membership”. Bluetooth.org.
with EDR”. Retrieved 2014-05-13.

[20] “OEM Bluetooth Serial Port Module OBS433”. [43] “IEEE Std 802.15.1–2002 – IEEE Standard for In-
formation technology – Telecommunications and in-
[21] “Profiles Overview”. Bluetooth.com. Retrieved 3 June formation exchange between systems – Local and
2013. metropolitan area networks – Specific requirements
[22] Ian, Paul. “Wi-Fi Direct vs. Bluetooth 4.0: A Battle for Part 15.1: Wireless Medium Access Control (MAC)
Supremacy”. PC World. Retrieved 27 December 2013. and Physical Layer (PHY) Specifications for Wire-
less Personal Area Networks (WPANs)". Ieeex-
[23] “History of the Bluetooth Special Interest Group”. Blue- plore.ieee.org. doi:10.1109/IEEESTD.2002.93621. Re-
tooth.com. trieved 4 September 2010.
15

[44] Guy Kewney (16 November 2004). “High speed Blue- [64] “BlueNRG Bluetooth® low energy wireless network pro-
tooth comes a step closer: enhanced data rate approved”. cessor - STMicroelectronics”. st.com. Retrieved 4 June
Newswireless.net. Retrieved 4 February 2008. 2015.

[45] “IEEE Std 802.15.1–2005 – IEEE Standard for In- [65] "::: -Amiccom:::". Archived from the original on 25
formation technology – Telecommunications and in- August 2013.
formation exchange between systems – Local and
metropolitan area networks – Specific requirements [66] “CSR.com”. CSR. Retrieved 7 April 2011.
Part 15.1: Wireless Medium Access Control (MAC)
[67] “Nordicsemi.com”. Nordic Semiconductor. Retrieved 7
and Physical Layer (PHY) Specifications for Wire-
April 2011.
less Personal Area Networks (W Pans)". Ieeex-
plore.ieee.org. doi:10.1109/IEEESTD.2005.96290. Re- [68] “TI.com”. Texas Instruments. Retrieved 7 April 2011.
trieved 4 September 2010.
[69] “iFixit MacBook Air 13” Mid 2011 Teardown”.
[46] “Specification Documents”. Bluetooth SIG. Retrieved 3 iFixit.com. Retrieved 27 July 2011.
May 2012.
[70] “Broadcom.com – BCM20702 – Single-Chip Bluetooth®
[47] “HTC TyTN Specification” (PDF). HTC. Retrieved 4 4.0 HCI Solution with Bluetooth Low Energy (BLE) Sup-
February 2008. port”. Broadcom. Retrieved 27 July 2011.
[48] “Simple Pairing Whitepaper” (PDF). Version V10r00. [71] “Press Releases Detail | Bluetooth Technology Website”.
Bluetooth SIG. 3 August 2006. Archived from the orig- Bluetooth.com. 2013-12-04. Retrieved 2014-05-13.
inal (PDF) on 18 October 2006. Retrieved 1 February
2007. [72] “Adopted Specification; Bluetooth Technology Website”.
Bluetooth.com. 2013-12-04. Retrieved 2014-05-14.
[49] “Bluetooth Core Version 3.0 + HS specification”.
[73] “Redmondpie”.
[50] “Bluetooth Core Specification Addendum (CSA) 1”.
[74] “DailyTech”.
[51] David Meyer (22 April 2009). “Bluetooth 3.0 released
without ultrawideband”. zdnet.co.uk. Retrieved 22 April [75] Bluetooth 5 promises four times the speed and twice the
2009. range of Bluetooth 4.0 LE transmissions

[52] “Wimedia.org”. Wimedia.org. 4 January 2010. Re- [76] https://www.bluetooth.com/


trieved 4 September 2010. news/pressreleases/2016/06/16/
-bluetooth5-quadruples-rangedoubles-speedincreases-data-broadcasting-cap
[53] “Wimedia.org”. Wimedia.org. Retrieved 4 September Bluetooth® 5 quadruples range, doubles speed, increases
2010. data broadcasting capacity by 800%

[54] “Wimedia.org”. Archived from the original on 23 March [77] “Bluetooth 5 standard brings range, speed and capacity
2009. Retrieved 4 September 2010. boost for IoT”.

[55] “bluetooth.com”. Retrieved 29 January 2015. [78] Bluetooth® 5 Quadruples Range, Doubles Speed, In-
creases Data Broadcasting Capacity by 800% | Bluetooth
[56] “USB.org”. USB.org. 16 March 2009. Retrieved 4 Technology Website
September 2010.
[79] ""Bluetooth 5” spec coming next week with 4x more range
[57] “Incisor.tv”. Incisor.tv. 16 March 2009. Retrieved 4 and 2x better speed [Updated]".
September 2010.
[80] “Bluetooth 5: everything you need to know”.
[58] “Bluetooth group drops ultrawideband, eyes 60 GHz”.
EETimes. Retrieved 4 June 2015. [81] “Bluetooth Core Specification v5.0”.

[59] “Report: Ultrawideband dies by 2013”. EETimes. Re- [82] Stallings, William. (2005). Wireless communications &
trieved 4 June 2015. networks.'=' Upper Saddle River, NJ: Pearson Prentice
Hall.
[60] “Simon Stenhouse - Leech Attempt” (PDF). incisor.tv.
Retrieved 4 June 2015. [83] Juha T. Vainio (25 May 2000). “Bluetooth Security”
(PDF). Helsinki University of Technology. Retrieved 1
[61] “Wibree forum merges with Bluetooth SIG” (PDF) (Press January 2009.
release). Nokia. 12 June 2007. Retrieved 4 February
2008. [84] Andreas Becker (16 August 2007). “Bluetooth Security
& Hacks” (PDF). Ruhr-Universität Bochum. Retrieved
[62] “Bluetooth.com”. Bluetooth.com. Retrieved 4 September 10 October 2007.
2010.
[85] Scarfone, K. & Padgette, J. (September 2008). “Guide
[63] “Bluetooth SIG unveils Smart Marks, explains v4.0 com- to Bluetooth Security” (PDF). National Institute of Stan-
patibility with unnecessary complexity”. Engadget. dards and Technology. Retrieved 3 July 2013.
16 13 EXTERNAL LINKS

[86] John Fuller. “What is bluejacking?". howstuffworks. Re- 13 External links


trieved 26 May 2015.
• Official website
[87] “Security Weaknesses in Bluetooth”. RSA Security Conf.
– Cryptographer’s Track. CiteSeerX 10.1.1.23.7357 . • Specifications at Bluetooth SIG

[88] “Bluetooth”. The Bunker. Archived from the original on


26 January 2007. Retrieved 1 February 2007.

[89] “BlueBug”. Trifinite.org. Retrieved 1 February 2007.

[90] John Oates (15 June 2004). “Virus attacks mobiles via
Bluetooth”. The Register. Retrieved 1 February 2007.

[91] “Long Distance Snarf”. Trifinite.org. Retrieved 1 Febru-


ary 2007.

[92] “Dispelling Common Bluetooth Misconceptions”. SANS.


Retrieved 9 July 2014.

[93] “F-Secure Malware Information Pages: Lasco.A”. F-


Secure.com. Retrieved 5 May 2008.

[94] Ford-Long Wong; Frank Stajano; Jolyon Clulow (April


2005). “Repairing the Bluetooth pairing protocol”
(PDF). University of Cambridge Computer Laboratory.
Archived from the original (PDF) on 16 June 2007. Re-
trieved 1 February 2007.

[95] “Archived copy”. Archived from the original on 9 Novem-


ber 2007. Retrieved 2007-11-06.

[96] “Avishai Wool - ‫"אבישי וול‬. tau.ac.il. Retrieved 4 June


2015.

[97] Yaniv Shaked; Avishai Wool (2 May 2005). “Cracking the


Bluetooth PIN”. School of Electrical Engineering Sys-
tems, Tel Aviv University. Retrieved 1 February 2007.

[98] “Phone pirates in seek and steal mission”. Cambridge


Evening News. Archived from the original on 17 July
2007. Retrieved 4 February 2008.

[99] “Going Around with Bluetooth in Full Safety” (PDF). F-


Secure. May 2006. Retrieved 4 February 2008.

[100] Elaina Chai; Ben Deardorff & Cathy Wu. “Hacking Blue-
tooth” (PDF). Retrieved 26 April 2015.

[101] D. Chomienne; M. Eftimakis (20 October 2010).


“Bluetooth Tutorial” (PDF). Retrieved 11 December
2009.

[102] M. Hietanen; T. Alanko (October 2005). “Occupational


Exposure Related to Radiofrequency Fields from Wireless
Communication Systems” (PDF). XXVIIIth General As-
sembly of URSI – Proceedings. Union Radio-Scientifique
Internationale. Archived from the original (PDF) on 6 Oc-
tober 2006. Retrieved 19 April 2007.

[103] “Bluetooth Innovation World Cup”. Bluetooth.com. Re-


trieved 4 September 2010.

[104] “Bluetooth Breakthrough Awards”. bluetooth.org. Re-


trieved 4 June 2015.
17

14 Text and image sources, contributors, and licenses


14.1 Text
• Bluetooth Source: https://en.wikipedia.org/wiki/Bluetooth?oldid=765829288 Contributors: AxelBoldt, The Epopt, David Parker, Timo
Honkasalo, Ed Poor, LA2, Kowloonese, Heron, Netesq, Roybadami, Kemkim, Jdlh, Edward, Infrogmation, JohnOwens, Michael Hardy,
Ezra Wax, Modster, Lexor, DopefishJustin, David Martland, Aezram, Mahjongg, Dan Koehl, Nixdorf, Liftarn, Tompagenet, Ixfd64,
Sannse, 6birc, Delirium, Mythril, Haakon, Mac, Ronz, William M. Connolley, Angela, Jebba, Julesd, Glenn, Kimiko, Nikai, IMSoP,
Harvester, Ehn, Dwo, Jerec, RodC, Crissov, Jukeboksi, Wikiborg, Ww, Dysprosia, Wik, Haukurth, Tpbradbury, Mrand, Morwen, Omega-
tron, Mowgli~enwiki, Ed g2s, Frazzydee, Jeffq, Dmytro, Phil Boswell, EdwinHJ, Freitasm, Robbot, Ktims, The Phoenix, Pigsonthew-
ing, Iam, Sappe, RedWolf, Altenmann, Romanm, Rfc1394, Puckly, Auric, Zidane2k1, Seajay, Sunray, Hadal, Patcat88, Mushroom,
Lupo, TPK, Lzur, Salty-horse, Tea2min, Gobeirne, Matthew Stannard, Giftlite, Paul Richter, DavidCary, Jao, Dinomite, KenBentubo,
Nichalp, Peruvianllama, Everyking, Curps, Markus Kuhn, Joconnor, Ssd, Scott Wilson, Guanaco, SheldonYoung, AlistairMcMillan,
Foobar, Khalid hassani, Matt Crypto, Jackol, Bobblewik, Edcolins, Golbez, Mooquackwooftweetmeow, Vadmium, Isidore, ChicXulub,
Dyfrgi, Gadfium, Utcursch, Alexf, Mendel, Cathcart~enwiki, Antandrus, Beland, Jossi, Vina, Wehe, Heman, Maximaximax, Wkdewey,
Cape ryano, Bk0, Sfoskett, Gscshoyru, Eiffel, Tooki, Mpesce, Neutrality, Hellisp, Mschlindwein, THA-Zp~enwiki, Shadowlink1014,
Adashiel, Trevor MacInnis, Grunt, Eisnel, Ericg, Canterbury Tail, Jakro64, DmitryKo, Jennypei, Mike Rosoft, Freakofnurture, Imroy,
Discospinster, Rich Farmbrough, Guanabot, Sladen, Leibniz, FT2, Pmsyyz, Drano, Wk muriithi, Flatline, Horkana, Darren Olivier, Al-
istair1978, MAlvis, Mani1, Pavel Vozenilek, MarkS, Kenb215, Bender235, IanGM, BonzoESC, Dpotter, CanisRufus, El C, Dajhorn,
Mwanner, Jantangring, WibblyLeMoende, Nile, Sietse Snel, Bdoserror, Leif, N.o.bouvin, Femto, Peter M Gerdes, Bobo192, Rivo~enwiki,
Whosyourjudas, Dystopos, Apyule, Carradee, Giraffedata, AndrewRH, Jasonataylor, Davidgothberg, Sleske, Towel401, Xenium, Pogo747,
HasharBot~enwiki, Nikhildandekar, Friviere, Jumbuck, Alansohn, Jhertel, Duffman~enwiki, Polarscribe, Droob, Ahruman, DavisLee,
Abesford, DKBG, Szumyk, Ksnow, Live Forever, Wtmitchell, Melaen, Velella, Wtshymanski, Arkid77, Cburnett, Stephan Leeds, Su-
ruena, Docboat, Amorymeltzer, Sciurinæ, ComCat, Bsadowski1, DV8 2XL, Drbreznjev, Talkie tim, Btornado, Galaxiaad, Greensalad,
Tom.k, Alex.g, Natalya, Mcsee, Joey7643, Shahad, Sars~enwiki, Woohookitty, RHaworth, TigerShark, David Haslam, Rocastelo, Uncle
G, Armando, Robert K S, Pol098, WadeSimMiser, Amigadave, Hdante, MONGO, Nfearnley, Squirrelist, Eyreland, Sega381, Kralizec!,
Willkn, Bruns, Wisq, Rufous, Graham87, Elvey, John Anderson, Dwaipayanc, Phoenix-forgotten, Sjö, Sjakkalle, Rjwilmsi, Seidenstud,
Demian12358, Jfinlayson, Arabani, KamasamaK, Zpetro, MZMcBride, Tawker, Darguz Parsilvan, Vegaswikian, Eptalon, Danfuzz, Hap-
pyCamper, Band B, CQJ, DoubleBlue, Aapo Laitinen, Utuado, Yamamoto Ichiro, Casimir~enwiki, SLi, Gringer, FlaBot, Windchaser, Wei-
hao.chiu~enwiki, Spaceman85, Ausinha, Avalyn, RexNL, Ghen, RobyWayne, Intgr, CoolFox, Alphachimp, BradBeattie, Ahunt, Wouter-
Bot, Chobot, Nylex, Sharkface217, DVdm, Bgwhite, Hahnchen, WriterHound, Gwernol, Flcelloguy, Efthimios, Jasonauk, The Rambling
Man, Siddhant, YurikBot, Sceptre, Todd Vierling, Charles Gaudette, Phantomsteve, RussBot, Pw201, PEZ, John Quincy Adding Machine,
Sillybilly, Splash, John2kx, Hydrargyrum, Stephenb, Gaius Cornelius, Yyy, Shaddack, Lavenderbunny, Rsrikanth05, Varnav, Wimt, Prze-
myslaw Pawelczak, Daveswagon, Thinkmike, NawlinWiki, DavidConrad, Dat789, Mipadi, Wahooker, Nirvana2013, Grafen, Bloodofox,
Deskana, Tokachu, Retired username, Misza13, U235, Killdevil, SixSix, Tony1, Bucketsofg, PS2pcGAMER, Todeswalzer, Kkmurray,
Xpclient, Nlu, Superluser, Mholland, Novasource, Sperril, Kenguest, Masatran, Nachoman-au, Raistolo, Jwissick, Arthur Rubin, Nen-
tuaby, Th1rt3en, Rhallanger, Tharos, C-randles, GraemeL, Aeon1006, Trent Arms, JoanneB, Alias Flood, Natgoo, Hyst, JLaTondre,
Mossig, Warreed, Garion96, Warpedshadow, Allens, Katieh5584, Kungfuadam, Mdwyer, Jaysbro, Maxamegalon2000, Eptin, Funkendub,
WesleyDodds, Victor falk, NetRolller 3D, Luk, Yakudza, SmackBot, TheBilly, PiCo, Unschool, Imz, Faisal.akeel, IddoGenuth, Del Mer-
ritt, Incnis Mrsi, Tarret, CrazyTerabyte, Olorin28, Pmaas, WookieInHeat, Lds, JoeMarfice, Genia4, Pedrose, KelleyCook, Ahmadr, Dp-
wkbw, Sonu27, Flntobi~enwiki, Canthusus, Jonathan Karlsson, Aphid360, SampsonSimpson, TheDoctor10, Pfaff9, Mountainlogic, Half-
Shadow, Davegsun, Misterdan, Yamaguchi , Brahmanknight, Gilliam, Brianski, Ohnoitsjamie, Brent01, Averisk, Kurykh, Persian Poet
Gal, Quartz25, Ramprasadb, Lordkazan, Morte, Oli Filth, EncMstr, Repetition, SchfiftyThree, Droll, Rediahs, Deli nk, Adpete, Mithaca,
SleepyHappyDoc, DHN-bot~enwiki, Darth Panda, Jnavas, AKMask, Gracenotes, John Reaves, Zsinj, Can't sleep, clown will eat me,
Frap, OrphanBot, Fdlj~enwiki, JonHarder, Yidisheryid, Michkalas, Davezarzycki, Greenshed, Whpq, Alyssa3467, Maurice45, Jmnbatista,
SQB, Aaronsharpe, Coolbho3000, Nakon, JRaue, VegaDark, EVula, Chrylis, HarisM, Clean Copy, Just plain Bill, Daniel.Cardenas, Jóna
Þórunn, Curly Turkey, Ceoil, TiCPU, Ohconfucius, BlueMint, The undertow, SashatoBot, ArglebargleIV, Wvbailey, Gloriamarie, Dire-
Wolf~enwiki, Kuru, Palopt, Alexey V. Molchanov, Notmicro, Heimstern, Disavian, William Wang, Fatespeaks, Demonte Morton, Shad-
owlynk, JorisvS, Minna Sora no Shita, Agency SEA, Dumelow, Nux, IronGargoyle, Nagle, Morten, Nobunaga24, Ex nihil, Mtodorov 69,
Mabahj, Zebov, Andypandy.UK, Slakr, Werdan7, Gromreaper, Boomshadow, Martinp23, Aeluwas, Lipatden, Topazg, Dicklyon, Darz
Mol~enwiki, PRRfan, BrockF5, SandyGeorgia, Jgrahn, Manifestation, AEMoreira042281, Peyre, Frvwfr2, Nialsh, Hu12, Stephen B
Streater, Sonic3KMaster, Iridescent, Melnorme, Virexix, Lakers, Shoeofdeath, Wjejskenewr, Dave Messina, Omnilord, Igoldste, Theflyer,
Blehfu, MrRedwood, Color probe, Hk1992, FakeTango, Mojtaba fouladi, Dlohcierekim, Ouishoebean, G-W, Andy120, Chris55, Davidb-
spalding, Ste m t1988, Aquinex, HDCase, GFellows, Anon user, PuerExMachina, SammyJames, Makeemlighter, Ajbrowe, Random Non-
sense, Jsmaye, Ibadibam, N2e, Gigas10, Skyskraper, NickW557, Jlarkin, Leujohn, WeggeBot, Oden, Glenn4pr, Apterygial, Oo7565, Fun-
nyfarmofdoom, Grungen, Cydebot, Winesouvenir, Karichisholm, Danrok, Mjmarcus, Cambrant, Djg2006, JustToHelp, O mores, Pedantic-
Christian, Gogo Dodo, Travelbird, Anonymi, JFreeman, Uker, ST47, Myscrnnm, Scott14, YhnMzw, B, Tawkerbot4, Luccas, Shirulashem,
Energetic is francine@yahoo.com, DumbBOT, Teratornis, Lisa 4 envyme@yahoo.com, Zzsql, Plasticbadge, Cowpriest2, Kozuch, Lt Mas-
ter1, SpK, Omicronpersei8, Zzsignup, Ebrahim, Sthow, Landroo, Epbr123, Mercury~enwiki, Pstanton, Butter Bandit, N5iln, Sdream93,
Headbomb, Dtgriscom, Marek69, John254, Electron9, James086, Phooto, RickinBaltimore, WickedInk, Danielsage98, Austin Spafford,
Muaddeeb, ProbablyDrew, Dawnseeker2000, RoboServien, Escarbot, I already forgot, Porqin, Jtmoon, AntiVandalBot, Davidoff, WinBot,
Obiwankenobi, Seaphoto, Opelio, Masamage, Qwavel, Padishar, Jj137, Tmopkisn, Farosdaughter, Jhsounds, Mrmason, AubreyEllen-
Shomo, Myanw, Ronnymexico, Kaini, Canadian-Bacon, MikeLynch, Bigjimr, JAnDbot, Leuko, Harryzilber, Barek, MER-C, CosineKitty,
Mntlnrg, Klensed, TheOtherSiguy, Schwarzes Nacht, PhilKnight, Kirrages, Y2kcrazyjoker4, LittleOldMe, Magioladitis, Freedomlinux,
Parsecboy, Bongwarrior, VoABot II, Bardia52, Anthonyramos1, JamesBWatson, Kierenj, Aka042, Froid, Dilane, Catgut, Ifroggie, Mo-
bileMistress, Felixgomez18~enwiki, Animum, Mushu118, 28421u2232nfenfcenc, Boffob, Cpl Syx, Retroneo, Somearemoreequal, Der-
Hexer, Plexos, Granpire Viking Man, Daemonic Kangaroo, Lucid00, Eskalin, Bitbit, Gary63, S3000, Kerr avon, Kelaiel, Conquerist, Mart-
inBot, Plagana, Vigyani, Sjjupadhyay~enwiki, Steveobd, NAHID, Nikpapag, Dorvaq, Jonathan Hall, R'n'B, Lcabanel, Westleyd, Thirdright,
Manticore, J.delanoy, Pharaoh of the Wizards, Darin-0, Theups, Adavidb, Bogey97, CosminManole, Herbythyme, PhoenixofMT, Uncle
Dick, Nigholith, Neon white, Reedy Bot, P3net, Nubi78, Laurusnobilis, Sudsak, Jench, Little Professor, Crakkpot, Servel333, Supuhstar,
Kazu89, RenniePet, Dtt.hatchi, SJP, WikiMarcus, Cmichael, KylieTastic, Uhai, Tweisbach, DorganBot, Mike V, Opn800, Avijaikumar,
MrPaul84, Doggkruse, Tkgd2007, Vojamisic, SoCalSuperEagle, Spellcast, Wikieditor06, Malik Shabazz, Jericbryledy, CWii, Thedjatclu-
brock, Icarus4586, Davrukin, Gmoose1, Dave Andrew, DSRH, Hersfold, Jmrowland, Nburden, Fireblaster lyz, Tjh1234, LokiClock, Gus-
18 14 TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES

tavopaz21, Bovineboy2008, Ryan032, WarddrBOT, Philip Trueman, DoorsAjar, TXiKiBoT, Oshwah, QrK FIN, Geoman888, Fxhomie,
Brianonn, Ssri1983, Tauheedrameez, Rei-bot, Someone else 90, Aymatth2, Qxz, Someguy1221, CharlieGalik, MichaelStanford, OlavN,
Retiono Virginian, Melsaran, Awl, Cootiequits, Don4of4, BwDraco, Rob Blanco~enwiki, Acer65, LeaveSleaves, Notbyworks, Angrymuth,
David Condrey, ARUNKUMAR P.R, Katimawan2005, Mwilso24, Anderssjosvard, Pikemaster18, Andy Dingley, Dirkbb, Haseo9999,
Abidh786, Impasse, Iammasud, Altermike, Blu3tooth, Lwc, Falcon8765, Enviroboy, Dennis mathews, Sapphic, Nettlehead, Vid2vid, Nagy,
Logan, Nisanthks, Dannydream9999, Depaul27, Supernovaess, FlyingLeopard2014, Jw-wiki, Ss power hacker, Cheeseguypie, EJF, Crans-
dell, JerryDeSanto, SMC89, SieBot, Lworbey, Dusti, Tresiden, DimeCadmium, Dreginald, Winchelsea, Caltas, RJaguar3, Steven.keeping,
LeadSongDog, Xelgen, Arda Xi, Keilana, Happysailor, Flyer22 Reborn, Masgatotkaca, Colfer2, JKofoed, Nopetro, Canadiantire122,
JSpung, Gadgetmonster, Oxymoron83, Newtruie, Steven Crossin, Lightmouse, Elopezar, Vanished user kijsdion3i4jf, Macy, Engineerism,
Laspalmas, Karl2620, StaticGull, Jfromcanada, HighInBC, WikiLaurent, Klaus100, Runmcp, Dj4u, Irstu, NMHartman, Lilboogie, Jblbt,
Andreasbecker, Loren.wilton, Martarius, Sfan00 IMG, Tanvir Ahmmed, ClueBot, Fartacus46, Binksternet, Mckinleyma, Learnportuguese,
The Thing That Should Not Be, Gophi, Captzucchini, MichaelKirche, Compellingelegance, Inufuusen, Poterxu, Ndenison, Adrianflem-
ing, Siliconbeat, Mild Bill Hiccup, Polo200, PolarYukon, Digitallyinspired, Burchseymour, Niceguyedc, Chalo phenomenon, Dave4400,
Auntof6, Hrudaya, DragonBot, Excirial, Alexbot, Jusdafax, Aprilstarr, Anon lynx, Wikitumnus, Harleyosborne1234, Tris121, D1991jb,
Howie1989, Proximitia, BobKawanaka, Narendra Sisodiya, CasperGhosty, Estirabot, Rakeshlashkari, Marcelbutucea, Arjayay, Jotterbot,
Squid tamer, OekelWm, BingoDingo, Mikaey, Maine12329, ChrisHodgesUK, La Pianista, Thingg, Aitias, Jonverve, Versus22, SoxBot
III, Apparition11, Wnt, DumZiBoT, InternetMeme, Ryan8374, XLinkBot, Ain't love grand, Little Mountain 5, Avoided, Mitch Ames,
Skarebo, WikHead, Mimarx, Alexius08, Noctibus, Dzero-net, Abomasnow, Psmonu, Airplaneman, RyanCross, Dsimic, Millionbaker,
Addbot, Xp54321, Ramu50, Mortense, Jhumbo, Shyhshinlee, Landon1980, Queenmomcat, DougsTech, Dimosvki, Justallofthem, Holt,
TutterMouse, Fieldday-sunday, NjardarBot, Skyezx, MrOllie, CarsracBot, JeroenvW, Kravdraa Ulb, Pngolla, AndersBot, Chzz, Favonian,
Hitchcockc, Doniago, Agurcu, 5 albert square, 84user, Tide rolls, Bfigura’s puppy, Dwlocks, Navinkhemka, Lightbot, OlEnglish, Apteva,
Teles, Wireless friend, Nicolas Love, Legobot, Luckas-bot, Bpantalone, Yobot, JSimmonz, Senator Palpatine, Fraggle81, TaBOT-zerem,
Village Idiort, THEN WHO WAS PHONE?, Brougham96, KamikazeBot, Gerixau, Wonderfl, TestEditBot, Dacbook, Avaldesm, The
Flying Spaghetti Monster, Synchronism, Koman90, AnomieBOT, DemocraticLuntz, Arjun G. Menon, Stuffed cat, Kristen Eriksen, Little-
world73, Jim1138, JackieBot, Piano non troppo, Dracony, DigitHead, AdjustShift, Materialscientist, NXTguru, Vinod58, Glarrg, Danno
uk, Felyza, ADNewsom, Ears04, ArthurBot, Kevin chen2003, LilHelpa, Andrewmc123, Xqbot, Bjorn Elenfors, Sionus, 4I7.4I7, Capri-
corn42, Nasnema, Aguwhite, AfrowJoww, 1wolfblake, Headsetuser, HannesP, Coretheapple, RibotBOT, Kyng, Amaury, Sophus Bie,
Shadowjams, Tabledhote, Crf150r rider, Alella, Addea, ToothTeam, FrescoBot, Ryanbrannonrulez, Nageh, W Nowicki, Recognizance,
Spab 007, Ginettos, Huddsy09, Edgukated, Jas203, Åkebråke, I dream of horses, 10metreh, Tom.Reding, Tinton5, Yahia.barie, Pmo-
keefe, Snoopy8765, BRUTE, Pedess, RedBot, GerbilSoft, Boobarkee, Olejarde, Merlion444, Toolnut, Surya Adinata, Tim1357, FoxBot,
TobeBot, Lexischemen~enwiki, LogAntiLog, WikiNickM, Jonkerz, Lotje, Blob00, BeebLee, 777sms, Suffusion of Yellow, MG lUkE
xX, PleaseStand, Tbhotch, Philip123ison, Mhrlive, Andrea105, Onel5969, Hoseabrown, Markareal, DRAGON BOOSTER, Squeakypaul,
Skamecrazy123, Tomvanbraeckel, Meckleys, Steve03Mills, EmausBot, Adovid-Mila, Oliverlyc, Acather96, WikitanvirBot, Timtempleton,
BillyPreset, Dewritech, V 2e, Skyy Train, Jvanthou, RenamedUser01302013, Devin, Wdrdoctor, Winner 42, Jlou us, Wikipelli, Dcirovic,
Egwyn3, ZéroBot, John Cline, Fæ, Bollyjeff, Hfkids, Tecnova, Kiwi128, Ebrambot, H3llBot, L.H.N.Prasad, Makecat, OnePt618, Mltinus,
Sbmeirow, Enap007, Ready, Donner60, Zlatan8621, Marioluigi98, Holdenmcrutch, Psicho1963, Abmmhasan, 28bot, Mrbluetooth, WMC,
Petrb, Lohith92, ClueBot NG, Shajure, Suid-Afrikaanse, Rack1600, Satellizer, Mackwho, HonestIntelligence, Zoltan.ackermann, Euquiq,
Cntras, Twillisjr, O.Koslowski, Widr, Roman.harmata, Slasherman77, Invadinado, Caso80, Offeiriad, Helpful Pixie Bot, Tringy, පසිඳු
කාවින්ද, Electriccatfish2, HMSSolent, Fatih431, DBigXray, Krimuk2.0, BG19bot, Neptune’s Trident, Nandeda narayan, Cooljohnpan,
Senabluetooth, Hz.tiang, Scutigeramorpha, Pwesolek, Klaus5512, Daanyaal4Sirran, MusikAnimal, Metricopolus, Titoncio, Compfreak7,
Fifthman, Per1234, Freakoutwithme, Yourmummm, Snow Blizzard, Yourmummmm, Gbluecathy, Sucwingse, Glacialfox, Mesayre, Lind-
saypeattie, Ekroeter, Achowat, Vkusske, Tonyprasanna05, Rbwiki, Blink89x, BattyBot, Cryptos2k, ~riley, Zhaofeng Li, Jimw338, The
Illusive Man, SaurabhG31, ChrisGualtieri, EditorE, Dobie80, Rikkiwiki, Ppooya99, Trinity.Ralphie, Thomasw90, BrightStarSky, Rezo-
nansowy, FoCuSandLeArN, Webclient101, Pintoch, HelicopterLlama, Hair, Nicceg, Jamesx12345, Tomhak, Revolver4u, 069952497a,
Dave Braunschweig, Sɛvɪnti faɪv, I am One of Many, Magnolia677, Adventures9, Edric Chandra, Tentinator, Jakec, Sssemil, Antho-
nyJ Lock, Ssofrigid, Svoboman, Anuja Ray, Pyrog, Ginsuloft, Reenu rajbir, Surie woods, Mikele venditt, Diffference, Fixuture, 7Sidz,
Bad Dryer, Wyn.junior, Clouviere4440, Trynitagain2c, Jweaver120, CatcherStorm, Highway 231, Yuuhaw, AKS.9955, Filedelinkerbot,
Punkpop ladd, JjaroTech, Betty Jeong, HMSLavender, Freelancer2013, Crystallizedcarbon, JamesJSherman, Foia req, EoRdE6, AndyB-
Volcom, BlueFenixReborn, Anonyman101, Krishnatomar1986oct, Sridharnaidu, Tsunami129, JackMurph, Genovif, KingReaperXD, Kas-
parBot, Sravanadire, G-Fly, Techmesho, Whizrayon, JJMC89, Halbpro, CaseyMillerWiki, Epiklyfail77, Sprawucha, Fabienpe, CAPTAIN
RAJU, Malik Muhammad Asim, InternetArchiveBot, Storylinerly, Xokdsuricat, Devtobiro, Acornett35, NgYShung, Rosatolen, Wizap-
ata, Molongolo, T04ds74, Ed.fuentetaja, Leo Kig, Culturefanatic12, Dc3736, RaaneHolmg, ToastedBacon31, Lalitgalgate, Haris786.arts,
Davve156e, P2Phuture and Anonymous: 2195

14.2 Images
• File:BluetoothUSB.jpg Source: https://upload.wikimedia.org/wikipedia/commons/f/f2/BluetoothUSB.jpg License: Public domain Con-
tributors: Transferred from en.wikipedia to Commons. Original artist: Abidh786 at English Wikipedia
• File:Bluetooth_headset.jpg Source: https://upload.wikimedia.org/wikipedia/commons/c/c0/Bluetooth_headset.jpg License: CC-BY-
SA-3.0 Contributors: ? Original artist: ?
• File:Bluetooth_protokoly.svg Source: https://upload.wikimedia.org/wikipedia/commons/9/9f/Bluetooth_protokoly.svg License: GFDL
Contributors: Wersja rastrowa dostępna pod adresem: http://pl.wikipedia.org/wiki/Plik:Protokoly.gif Original artist: Wersję rastrową za-
mieścił użytkownik polskiego projektu wikipedii: Leszek Chuchla, Zwektoryzował: Krzysztof Zajączkowski
• File:Commons-logo.svg Source: https://upload.wikimedia.org/wikipedia/en/4/4a/Commons-logo.svg License: PD Contributors: ? Origi-
nal artist: ?
• File:DELL_TrueMobile_350_Bluetooth_card.jpg Source: https://upload.wikimedia.org/wikipedia/commons/2/28/DELL_
TrueMobile_350_Bluetooth_card.jpg License: CC BY-SA 3.0 Contributors: Taken by User:Omegatron using a Canon Powershot
SD110, modified in Photo Acute and The GIMP Original artist: User:Omegatron
• File:Drone_4.jpg Source: https://upload.wikimedia.org/wikipedia/commons/7/7b/Drone_4.jpg License: Public domain Contributors:
Own work Original artist: Mmckinley
14.3 Content license 19

• File:Folder_Hexagonal_Icon.svg Source: https://upload.wikimedia.org/wikipedia/en/4/48/Folder_Hexagonal_Icon.svg License: Cc-by-


sa-3.0 Contributors: ? Original artist: ?
• File:Lock-green.svg Source: https://upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg License: CC0 Contributors: en:File:
Free-to-read_lock_75.svg Original artist: User:Trappist the monk
• File:Portal-puzzle.svg Source: https://upload.wikimedia.org/wikipedia/en/f/fd/Portal-puzzle.svg License: Public domain Contributors: ?
Original artist: ?
• File:Runic_letter_berkanan.svg Source: https://upload.wikimedia.org/wikipedia/commons/6/6e/Runic_letter_berkanan.svg License:
Public domain Contributors: Based on Runic letter berkanan.png, which was based on the Junicode font. Original artist: ClaesWallin
• File:Runic_letter_ior.svg Source: https://upload.wikimedia.org/wikipedia/commons/6/6f/Runic_letter_ior.svg License: Public domain
Contributors: Based on the Junicode font Original artist: Glanthor Reviol
• File:Telecom-icon.svg Source: https://upload.wikimedia.org/wikipedia/commons/4/4e/Telecom-icon.svg License: Public domain Con-
tributors: Vectorized by User:Booyabazooka from original small PD raster image File:Telecom-icon.jpg Original artist: Vectorized by
User:Booyabazooka from original small PD raster image File:Telecom-icon.jpg

14.3 Content license


• Creative Commons Attribution-Share Alike 3.0

Potrebbero piacerti anche