Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
This article is about a wireless technology standard. united dissonant Danish tribes into a single kingdom and,
For the medieval king of Denmark, see Harald Bluetooth. according to legend, introduced Christianity as well. The
idea of this name was proposed in 1997 by Jim Kar-
Bluetooth is a wireless technology standard for exchang- dach who developed a system that would allow mobile
phones to communicate with computers. At the time of
ing data over short distances (using short-wavelength
UHF radio waves in the ISM band from 2.4 to 2.485 this proposal he was reading Frans G. Bengtsson's histor-
The Long Ships about Vikings and King Harald
GHz[4] ) from fixed and mobile devices, and building ical novel [10][11]
personal area networks (PANs). Invented by telecom Bluetooth. The implication is that Bluetooth does
[5]
vendor Ericsson in 1994, it was originally conceived the same with communications protocols, uniting them
[12]
as a wireless alternative to RS-232 data cables. It can into one universal standard.
connect up to seven devices, overcoming problems that
older technologies had when attempting to connect to 2.2 Logo
each other.
Bluetooth is managed by the Bluetooth Special Inter- The Bluetooth logo is a bind rune merging the Younger
est Group (SIG), which has more than 30,000 member Futhark runes (Hagall) ( ) and (Bjarkan) ( ), Har-
companies in the areas of telecommunication, comput- ald’s initials.[13] [14]
ing, networking, and consumer electronics.[6] The IEEE
standardized Bluetooth as IEEE 802.15.1, but no longer
maintains the standard. The Bluetooth SIG oversees de-
velopment of the specification, manages the qualification 3 Implementation
program, and protects the trademarks.[7] A manufacturer
must meet Bluetooth SIG standards to market it as a Blue- Bluetooth operates at frequencies between 2402 and 2480
tooth device.[8] A network of patents apply to the technol- MHz, or 2400 and 2483.5 MHz including guard bands 2
ogy, which are licensed to individual qualifying devices. MHz wide at the bottom end and 3.5 MHz wide at the
top.[15] This is in the globally unlicensed (but not un-
regulated) Industrial, Scientific and Medical (ISM) 2.4
GHz short-range radio frequency band. Bluetooth uses a
1 Origin radio technology called frequency-hopping spread spec-
trum. Bluetooth divides transmitted data into packets,
The development of the “short-link” radio technology, and transmits each packet on one of 79 designated Blue-
later named Bluetooth, was initiated in 1989 by Nils Ry- tooth channels. Each channel has a bandwidth of 1 MHz.
dbeck, CTO at Ericsson Mobile in Lund, Sweden, and It usually performs 800 hops per second, with Adaptive
by Johan Ullman. The purpose was to develop wireless Frequency-Hopping (AFH) enabled.[15] Bluetooth low
headsets, according to two inventions by Johan Ullman, energy uses 2 MHz spacing, which accommodates 40
SE 8902098-6, issued 1989-06-12 and SE 9202239, is- channels.
sued 1992-07-24. Nils Rydbeck tasked Tord Wingren
Originally, Gaussian frequency-shift keying (GFSK)
with specifying and Jaap Haartsen and Sven Mattisson
modulation was the only modulation scheme available.
with developing. Both were working for Ericsson in
Since the introduction of Bluetooth 2.0+EDR, π/4-
Lund.[9] The specification is based on frequency-hopping
DQPSK (Differential Quadrature Phase Shift Keying)
spread spectrum technology.
and 8DPSK modulation may also be used between com-
patible devices. Devices functioning with GFSK are said
to be operating in basic rate (BR) mode where an instan-
2 Name and logo taneous data rate of 1 Mbit/s is possible. The term En-
hanced Data Rate (EDR) is used to describe π/4-DPSK
2.1 Etymology of the name and 8DPSK schemes, each giving 2 and 3 Mbit/s respec-
tively. The combination of these (BR and EDR) modes
The name “Bluetooth” is an Anglicised version of the in Bluetooth radio technology is classified as a “BR/EDR
Scandinavian Blåtand/Blåtann (Old Norse blátǫnn), the radio”.
epithet of the tenth-century king Harald Bluetooth who Bluetooth is a packet-based protocol with a master-slave
1
2 4 USES
structure. One master may communicate with up to seven ft), Class 2, most commonly found in mobile devices, 10
slaves in a piconet. All devices share the master’s clock. metres (33 ft), and Class 1, primarily for industrial use
Packet exchange is based on the basic clock, defined by cases,100 metres (300 ft).[3] Bluetooth Marketing quali-
the master, which ticks at 312.5 µs intervals. Two clock fies that Class 1 range is in most cases 20–30 metres (66–
ticks make up a slot of 625 µs, and two slots make up 98 ft), and Class 2 range 5–10 metres (16–33 ft).[2]
a slot pair of 1250 µs. In the simple case of single-slot The effective range varies due to propagation conditions,
packets the master transmits in even slots and receives in material coverage, production sample variations, antenna
odd slots. The slave, conversely, receives in even slots and configurations and battery conditions. Most Bluetooth
transmits in odd slots. Packets may be 1, 3 or 5 slots long,
applications are for indoor conditions, where attenuation
but in all cases the master’s transmission begins in even of walls and signal fading due to signal reflections make
slots and the slave’s in odd slots.
the range far lower than specified line-of-sight ranges of
The above is valid for “classic” BT. Bluetooth Low En- the Bluetooth products. Most Bluetooth applications are
ergy, introduced in the 4.0 specification, uses the same battery powered Class 2 devices, with little difference
spectrum but somewhat differently; see Bluetooth low in range whether the other end of the link is a Class 1
energy#Radio interface. or Class 2 device as the lower powered device tends to
set the range limit. In some cases the effective range
of the data link can be extended when a Class 2 device
3.1 Communication and connection is connecting to a Class 1 transceiver with both higher
sensitivity and transmission power than a typical Class
A master BR/EDR Bluetooth device can communicate 2 device.[17] Mostly, however, the Class 1 devices have
with a maximum of seven devices in a piconet (an ad-hoc a similar sensitivity to Class 2 devices. Connecting two
computer network using Bluetooth technology), though Class 1 devices with both high sensitivity and high power
not all devices reach this maximum. The devices can can allow ranges far in excess of the typical 100m, de-
switch roles, by agreement, and the slave can become the pending on the throughput required by the application.
master (for example, a headset initiating a connection to Some such devices allow open field ranges of up to 1 km
a phone necessarily begins as master—as initiator of the and beyond between two similar devices without exceed-
connection—but may subsequently operate as slave). ing legal emission limits.[18][19][20]
The Bluetooth Core Specification provides for the con- The Bluetooth Core Specification mandates a range of not
nection of two or more piconets to form a scatternet, in less than 10 metres (33 ft), but there is no upper limit
which certain devices simultaneously play the master role on actual range. Manufacturers’ implementations can be
in one piconet and the slave role in another. tuned to provide the range needed for each case.[3]
At any given time, data can be transferred between the
master and one other device (except for the little-used 4.1 Bluetooth profiles
broadcast mode.) The master chooses which slave device
to address; typically, it switches rapidly from one device Main article: Bluetooth profile
to another in a round-robin fashion. Since it is the mas-
ter that chooses which slave to address, whereas a slave is
To use Bluetooth wireless technology, a device must be
(in theory) supposed to listen in each receive slot, being
able to interpret certain Bluetooth profiles, which are def-
a master is a lighter burden than being a slave. Being a
initions of possible applications and specify general be-
master of seven slaves is possible; being a slave of more
haviours that Bluetooth-enabled devices use to communi-
than one master is possible. The specification is vague as
to required behavior in scatternets. cate with other Bluetooth devices. These profiles include
settings to parametrize and to control the communication
from start. Adherence to profiles saves the time for trans-
mitting the parameters anew before the bi-directional link
4 Uses becomes effective. There are a wide range of Bluetooth
profiles that describe many different types of applications
Bluetooth is a standard wire-replacement communica- or use cases for devices.[21][22]
tions protocol primarily designed for low-power con-
sumption, with a short range based on low-cost
transceiver microchips in each device.[16] Because the 4.2 List of applications
devices use a radio (broadcast) communications system,
they do not have to be in visual line of sight of each • Wireless control of and communication between a
other; however, a quasi optical wireless path must be mobile phone and a handsfree headset. This was one
[6]
viable. Range is power-class-dependent, but effective of the earliest applications to become popular.[23]
ranges vary in practice. See the table on the right. • Wireless control of and communication between a
Officially Class 3 radios have a range of up to 1 metre (3 mobile phone and a Bluetooth compatible car stereo
4.3 Bluetooth vs. Wi-Fi (IEEE 802.11) 3
4.5 Devices
Windows 7 works with Bluetooth v2.1+EDR and Ex- 6.2 Bluetooth 1.1
tended Inquiry Response (EIR).[38]
• Ratified as IEEE Standard 802.15.1–2002[43]
The Windows XP and Windows Vista/Windows 7 Blue-
tooth stacks support the following Bluetooth profiles na- • Many errors found in the v1.0B specifications were
tively: PAN, SPP, DUN, HID, HCRP. The Windows XP fixed.
stack can be replaced by a third party stack that supports
more profiles or newer Bluetooth versions. The Win- • Added possibility of non-encrypted channels.
dows Vista/Windows 7 Bluetooth stack supports vendor-
supplied additional profiles without requiring that the Mi- • Received Signal Strength Indicator (RSSI).
crosoft stack be replaced.[38]
Apple products have worked with Bluetooth since Mac 6.3 Bluetooth 1.2
OS X v10.2, which was released in 2002.[40]
Linux has two popular Bluetooth stacks, BlueZ and Af- Major enhancements include the following:
fix. The BlueZ stack is included with most Linux kernels
and was originally developed by Qualcomm.[41] The Af- • Faster Connection and Discovery
fix stack was developed by Nokia.
FreeBSD features Bluetooth since its v5.0 release. • Adaptive frequency-hopping spread spectrum (AFH),
which improves resistance to radio frequency inter-
NetBSD features Bluetooth since its v4.0 release. Its ference by avoiding the use of crowded frequencies
Bluetooth stack has been ported to OpenBSD as well. in the hopping sequence.
• Core Specification Addendum (CSA), release cycle This version of the Bluetooth Core Specification was re-
can be as tight as a few times per year leased in 2004. The main difference is the introduction
of an Enhanced Data Rate (EDR) for faster data transfer.
• Core Specification Supplements (CSS), can be re- The bit rate of EDR is 3 Mbit/s, although the maximum
leased very quickly data transfer rate (allowing for inter-packet time and ac-
knowledgements) is 2.1 Mbit/s.[44] EDR uses a combina-
• Errata (Available with a user account: Errata login) tion of GFSK and Phase Shift Keying modulation (PSK)
with two variants, π/4-DQPSK and 8DPSK.[46] EDR can
provide a lower power consumption through a reduced
6.1 Bluetooth 1.0 and 1.0B
duty cycle.
Versions 1.0 and 1.0B had many problems and manufac- The specification is published as Bluetooth v2.0 + EDR,
turers had difficulty making their products interoperable. which implies that EDR is an optional feature. Aside
Versions 1.0 and 1.0B also included mandatory Bluetooth from EDR, the v2.0 specification contains other minor
hardware device address (BD_ADDR) transmission in improvements, and products may claim compliance to
the Connecting process (rendering anonymity impossible “Bluetooth v2.0” without supporting the higher data rate.
at the protocol level), which was a major setback for cer- At least one commercial device states “Bluetooth v2.0
tain services planned for use in Bluetooth environments. without EDR” on its data sheet.[47]
6 6 SPECIFICATIONS AND FEATURES
Bluetooth low energy, previously known as Wibree,[61] is specification is an incremental software update to Blue-
a subset of Bluetooth v4.0 with an entirely new protocol tooth Specification v4.0, and not a hardware update. The
stack for rapid build-up of simple links. As an alternative update incorporates Bluetooth Core Specification Ad-
to the Bluetooth standard protocols that were introduced denda (CSA 1, 2, 3 & 4) and adds new features that im-
in Bluetooth v1.0 to v3.0, it is aimed at very low power prove consumer usability. These include increased co-
applications running off a coin cell. Chip designs allow existence support for LTE, bulk data exchange rates—
for two types of implementation, dual-mode, single-mode and aid developer innovation by allowing devices to sup-
and enhanced past versions.[62] The provisional names port multiple roles simultaneously.[71]
Wibree and Bluetooth ULP (Ultra Low Power) were aban-
New features of this specification include:
doned and the BLE name was used for a while. In late
2011, new logos “Bluetooth Smart Ready” for hosts and
“Bluetooth Smart” for sensors were introduced as the • Mobile Wireless Service Coexistence Signaling
general-public face of BLE.[63] • Train Nudging and Generalized Interlaced Scanning
• Low Duty Cycle Directed Advertising
• In a single-mode implementation, only the
low energy protocol stack is implemented. • L2CAP Connection Oriented and Dedicated Chan-
STMicroelectronics,[64] AMICCOM,[65] CSR,[66] nels with Credit Based Flow Control
Nordic Semiconductor[67] and Texas Instruments[68]
have released single mode Bluetooth low energy • Dual Mode and Topology
solutions.
• LE Link Layer Topology
• In a dual-mode implementation, Bluetooth Smart • 802.11n PAL
functionality is integrated into an existing Clas-
sic Bluetooth controller. As of March 2011, • Audio Architecture Updates for Wide Band Speech
the following semiconductor companies have an-
nounced the availability of chips meeting the stan- • Fast Data Advertising Interval
dard: Qualcomm-Atheros, CSR, Broadcom[69][70] • Limited Discovery Time[72]
and Texas Instruments. The compliant architecture
shares all of Classic Bluetooth’s existing radio and
Notice that some features were already available in a
functionality resulting in a negligible cost increase
Core Specification Addendum (CSA) before the release
compared to Classic Bluetooth.
of v4.1.
The following features were removed in this version of • Enhanced Retransmission Mode (ERTM): This
the specification: mode is an improved version of the original re-
transmission mode. This mode provides a reliable
• Park State[81] L2CAP channel.
user must be aware of the input limitations on • For use-cases not requiring MITM protection, user
the other device, there is no mechanism avail- interaction can be eliminated.
able for a capable device to determine how it
should limit the available input a user may use. • For numeric comparison, MITM protection can be
achieved with a simple equality comparison by the
• Secure Simple Pairing (SSP): This is required by user.
Bluetooth v2.1, although a Bluetooth v2.1 device
may only use legacy pairing to interoperate with • Using OOB with NFC enables pairing when devices
a v2.0 or earlier device. Secure Simple Pairing simply get close, rather than requiring a lengthy dis-
uses a form of public key cryptography, and some covery process.
types can help protect against man in the middle, or
MITM attacks. SSP has the following authentica-
7.4.4 Security concerns
tion mechanisms:
• Just works: As the name implies, this method Prior to Bluetooth v2.1, encryption is not required and
just works, with no user interaction. However, can be turned off at any time. Moreover, the encryption
a device may prompt the user to confirm the key is only good for approximately 23.5 hours; using a
pairing process. This method is typically used single encryption key longer than this time allows simple
by headsets with very limited IO capabilities, XOR attacks to retrieve the encryption key.
and is more secure than the fixed PIN mecha-
nism this limited set of devices uses for legacy • Turning off encryption is required for several nor-
pairing. This method provides no man-in-the- mal operations, so it is problematic to detect if en-
middle (MITM) protection. cryption is disabled for a valid reason or for a secu-
• Numeric comparison: If both devices have rity attack.
a display, and at least one can accept a bi-
nary yes/no user input, they may use Numeric Bluetooth v2.1 addresses this in the following ways:
Comparison. This method displays a 6-digit
numeric code on each device. The user should
• Encryption is required for all non-SDP (Service Dis-
compare the numbers to ensure they are iden-
covery Protocol) connections
tical. If the comparison succeeds, the user(s)
should confirm pairing on the device(s) that • A new Encryption Pause and Resume feature is used
can accept an input. This method provides for all normal operations that require that encryption
MITM protection, assuming the user confirms be disabled. This enables easy identification of nor-
on both devices and actually performs the mal operation from security attacks.
comparison properly.
• Passkey Entry: This method may be used be- • The encryption key must be refreshed before it ex-
tween a device with a display and a device with pires.
numeric keypad entry (such as a keyboard),
or two devices with numeric keypad entry. In Link keys may be stored on the device file system, not
the first case, the display presents a 6-digit nu- on the Bluetooth chip itself. Many Bluetooth chip manu-
meric code to the user, who then enters the facturers let link keys be stored on the device—however,
code on the keypad. In the second case, the if the device is removable, this means that the link key
user of each device enters the same 6-digit moves with the device.
number. Both of these cases provide MITM
protection.
• Out of band (OOB): This method uses an 8 Security
external means of communication, such as
Near Field Communication (NFC) to ex-
8.1 Overview
change some information used in the pairing
process. Pairing is completed using the Blue-
See also: Mobile security § Attacks based on communi-
tooth radio, but requires information from the
cation networks
OOB mechanism. This provides only the level
of MITM protection that is present in the OOB
mechanism. Bluetooth implements confidentiality, authentication and
key derivation with custom algorithms based on the
SSP is considered simple for the following reasons: SAFER+ block cipher. Bluetooth key generation is gen-
erally based on a Bluetooth PIN, which must be entered
• In most cases, it does not require a user to generate into both devices. This procedure might be modified if
a passkey. one of the devices has a fixed PIN (e.g., for headsets or
12 8 SECURITY
similar devices with a restricted user interface). During closure of personal data.[88] In a subsequent experiment,
pairing, an initialization key or master key is generated, Martin Herfurt from the trifinite.group was able to do
using the E22 algorithm.[83] The E0 stream cipher is used a field-trial at the CeBIT fairgrounds, showing the im-
for encrypting packets, granting confidentiality, and is portance of the problem to the world. A new attack
based on a shared cryptographic secret, namely a previ- called BlueBug was used for this experiment.[89] In 2004
ously generated link key or master key. Those keys, used the first purported virus using Bluetooth to spread itself
for subsequent encryption of data sent via the air inter- among mobile phones appeared on the Symbian OS.[90]
face, rely on the Bluetooth PIN, which has been entered The virus was first described by Kaspersky Lab and re-
into one or both devices. quires users to confirm the installation of unknown soft-
An overview of Bluetooth vulnerabilities exploits was ware before it can propagate. The virus was written as
a proof-of-concept by a group of virus writers known as
published in 2007 by Andreas Becker.[84]
“29A” and sent to anti-virus groups. Thus, it should be re-
In September 2008, the National Institute of Standards garded as a potential (but not real) security threat to Blue-
and Technology (NIST) published a Guide to Blue- tooth technology or Symbian OS since the virus has never
tooth Security as a reference for organizations. It de- spread outside of this system. In August 2004, a world-
scribes Bluetooth security capabilities and how to se- record-setting experiment (see also Bluetooth sniping)
cure Bluetooth technologies effectively. While Bluetooth showed that the range of Class 2 Bluetooth radios could
has its benefits, it is susceptible to denial-of-service at- be extended to 1.78 km (1.11 mi) with directional an-
tacks, eavesdropping, man-in-the-middle attacks, mes- tennas and signal amplifiers.[91] This poses a potential se-
sage modification, and resource misappropriation. Users curity threat because it enables attackers to access vul-
and organizations must evaluate their acceptable level nerable Bluetooth devices from a distance beyond expec-
of risk and incorporate security into the lifecycle of tation. The attacker must also be able to receive infor-
Bluetooth devices. To help mitigate risks, included in mation from the victim to set up a connection. No at-
the NIST document are security checklists with guide- tack can be made against a Bluetooth device unless the
lines and recommendations for creating and maintain- attacker knows its Bluetooth address and which channels
ing secure Bluetooth piconets, headsets, and smart card to transmit on, although these can be deduced within a
readers.[85] few minutes if the device is in use.[92]
Bluetooth v2.1 – finalized in 2007 with consumer devices
first appearing in 2009 – makes significant changes to
8.3.2 2005
Bluetooth’s security, including pairing. See the pairing
mechanisms section for more about these changes.
In January 2005, a mobile malware worm known as
Lasco. The worm began targeting mobile phones using
Symbian OS (Series 60 platform) using Bluetooth en-
8.2 Bluejacking
abled devices to replicate itself and spread to other de-
vices. The worm is self-installing and begins once the
Main article: Bluejacking
mobile user approves the transfer of the file (velasco.sis)
from another device. Once installed, the worm begins
Bluejacking is the sending of either a picture or a message looking for other Bluetooth enabled devices to infect.
from one user to an unsuspecting user through Bluetooth Additionally, the worm infects other .SIS files on the de-
wireless technology. Common applications include short vice, allowing replication to another device through use of
messages, e.g., “You've just been bluejacked!".[86] Blue- removable media (Secure Digital, Compact Flash, etc.).
jacking does not involve the removal or alteration of any The worm can render the mobile device unstable.[93]
data from the device. Bluejacking can also involve tak-
In April 2005, Cambridge University security researchers
ing control of a mobile device wirelessly and phoning a
published results of their actual implementation of pas-
premium rate line, owned by the bluejacker. Security ad-
sive attacks against the PIN-based pairing between com-
vances have alleviated this issue.
mercial Bluetooth devices. They confirmed that attacks
are practicably fast, and the Bluetooth symmetric key es-
8.3 History of security concerns tablishment method is vulnerable. To rectify this vul-
nerability, they designed an implementation that showed
8.3.1 2001–2004 that stronger, asymmetric key establishment is feasible for
certain classes of devices, such as mobile phones.[94]
In 2001, Jakobsson and Wetzel from Bell Laborato- In June 2005, Yaniv Shaked[95] and Avishai Wool[96] pub-
ries discovered flaws in the Bluetooth pairing proto- lished a paper describing both passive and active methods
col and also pointed to vulnerabilities in the encryption for obtaining the PIN for a Bluetooth link. The passive
scheme.[87] In 2003, Ben and Adam Laurie from A.L. attack allows a suitably equipped attacker to eavesdrop on
Digital Ltd. discovered that serious flaws in some poor communications and spoof, if the attacker was present at
implementations of Bluetooth security may lead to dis- the time of initial pairing. The active method makes use
13
of a specially constructed message that must be inserted Bluetooth uses the microwave radio frequency spectrum
at a specific point in the protocol, to make the master in the 2.402 GHz to 2.480 GHz range,[101] which is
and slave repeat the pairing process. After that, the first harmless non-ionizing radiation that cannot cause cancer.
method can be used to crack the PIN. This attack’s ma- Maximum power output from a Bluetooth radio is 100
jor weakness is that it requires the user of the devices mW for class 1, 2.5 mW for class 2, and 1 mW for class
under attack to re-enter the PIN during the attack when 3 devices. Even the maximum power output of class 1 is
the device prompts them to. Also, this active attack prob- a lower level than the lowest powered mobile phones.[102]
ably requires custom hardware, since most commercially UMTS & W-CDMA outputs 250 mW, GSM1800/1900
available Bluetooth devices are not capable of the timing outputs 1000 mW, and GSM850/900 outputs 2000 mW.
necessary.[97]
In August 2005, police in Cambridgeshire, England, is-
sued warnings about thieves using Bluetooth enabled 10 Bluetooth award programs
phones to track other devices left in cars. Police are ad-
vising users to ensure that any mobile networking con- The Bluetooth Innovation World Cup, a marketing initia-
nections are de-activated if laptops and other devices are tive of the Bluetooth Special Interest Group (SIG), was
left in this way.[98] an international competition that encouraged the devel-
opment of innovations for applications leveraging Blue-
8.3.3 2006 tooth technology in sports, fitness and health care prod-
ucts. The aim of the competition was to stimulate new
[103]
In April 2006, researchers from Secure Network and F- markets.
Secure published a report that warns of the large number The Bluetooth Innovation World Cup morphed into the
of devices left in a visible state, and issued statistics on Bluetooth Breakthrough Awards in 2013. The Break-
the spread of various Bluetooth services and the ease of through Awards[104] Bluetooth program highlights the
spread of an eventual Bluetooth worm.[99] most innovative products and applications available to-
day, prototypes coming soon, and student-led projects in
the making.
8.3.4 2007
• Do not enter link keys or PINs when unexpectedly • Java APIs for Bluetooth
prompted to do so
• Li-Fi
• Remove paired devices when not in use
• MyriaNed
• Regularly update firmware on Bluetooth-enabled
devices • Near field communication
Main article: Wireless electronic devices and health • ZigBee – low-power lightweight wireless protocol in
the ISM band
14 12 REFERENCES
[8] “Brand Enforcement Program”. Bluetooth.org. Retrieved [31] “Real Time Location Systems” (PDF). clarinox. Re-
2 November 2013. trieved 4 August 2010.
[9] “The Bluetooth Blues”. Information Age. 24 May 2001. [32] “Tenbu’s nio Is Kind Of Like A Car Alarm For Your Cell-
Archived from the original on 22 December 2007. Re- phone”. OhGizmo!. Retrieved 4 June 2015.
trieved 1 February 2008.
[33] “Wireless waves used to track travel times | CTV Calgary
[10] Kardach, Jim (5 March 2008). “Tech History: How Blue- News”. Calgary.ctvnews.ca. 26 November 2012. Re-
tooth got its name”. Retrieved 11 June 2013. trieved 11 July 2013.
[11] Mark Forsyth. The etymologicon. // Icon Books Ltd. [34] “Watch”. Bluetooth.com. Retrieved 4 September 2010.
London N79DP, 2011. p. 139.
[35] “How Bluetooth Works”. How Stuff Works. 30 June
[12] “Milestones in the Bluetooth advance”. Ericsson Tech- 2010.
nology Licensing. 22 March 2004. Archived from the
original on 20 June 2004. [36] “Specification Documents” (PDF). Bluetooth.com. 30
June 2010.
[13] “Bluetooth on Twitter”.
[37] “Bluetooth for Programmers” (PDF). MIT Computer Sci-
[14] “Bluetooth Experience Icons” (PDF). Bluetooth Special ence And Artificial Intelligence Laboratory.
Interest Group. Retrieved 2016-10-21. Bluetooth Expe-
rience Icons borrow two of these three features: the blue [38] “Bluetooth Wireless Technology FAQ – 2010”. Retrieved
color and the rune-inspired symbol. 4 September 2010.
[15] “Bluetooth Radio Interface, Modulation & Channels”. [39] “Network Protection Technologie”. Changes to Function-
Radio-Electronics.com. ality in Microsoft Windows XP Service Pack 2. Microsoft
[16] “How Bluetooth Technology Works”. Bluetooth SIG. Technet. Retrieved 1 February 2008.
Archived from the original on 17 January 2008. Retrieved
[40] “Apple Introduces “Jaguar,” the Next Major Release of
1 February 2008.
Mac OS X” (Press release). Apple. 17 July 2002. Re-
[17] “Class 1 Bluetooth Dongle Test”. Amperordirect.com. trieved 4 February 2008.
Retrieved 4 September 2010.
[41] “Official Linux Bluetooth protocol stack”. BlueZ. Re-
[18] “WT41 Long Range Bluetooth Module”. trieved 4 September 2010.
[19] “BluBear Industrial Long Range Bluetooth 2.1 Module [42] “English Introduction to Membership”. Bluetooth.org.
with EDR”. Retrieved 2014-05-13.
[20] “OEM Bluetooth Serial Port Module OBS433”. [43] “IEEE Std 802.15.1–2002 – IEEE Standard for In-
formation technology – Telecommunications and in-
[21] “Profiles Overview”. Bluetooth.com. Retrieved 3 June formation exchange between systems – Local and
2013. metropolitan area networks – Specific requirements
[22] Ian, Paul. “Wi-Fi Direct vs. Bluetooth 4.0: A Battle for Part 15.1: Wireless Medium Access Control (MAC)
Supremacy”. PC World. Retrieved 27 December 2013. and Physical Layer (PHY) Specifications for Wire-
less Personal Area Networks (WPANs)". Ieeex-
[23] “History of the Bluetooth Special Interest Group”. Blue- plore.ieee.org. doi:10.1109/IEEESTD.2002.93621. Re-
tooth.com. trieved 4 September 2010.
15
[44] Guy Kewney (16 November 2004). “High speed Blue- [64] “BlueNRG Bluetooth® low energy wireless network pro-
tooth comes a step closer: enhanced data rate approved”. cessor - STMicroelectronics”. st.com. Retrieved 4 June
Newswireless.net. Retrieved 4 February 2008. 2015.
[45] “IEEE Std 802.15.1–2005 – IEEE Standard for In- [65] "::: -Amiccom:::". Archived from the original on 25
formation technology – Telecommunications and in- August 2013.
formation exchange between systems – Local and
metropolitan area networks – Specific requirements [66] “CSR.com”. CSR. Retrieved 7 April 2011.
Part 15.1: Wireless Medium Access Control (MAC)
[67] “Nordicsemi.com”. Nordic Semiconductor. Retrieved 7
and Physical Layer (PHY) Specifications for Wire-
April 2011.
less Personal Area Networks (W Pans)". Ieeex-
plore.ieee.org. doi:10.1109/IEEESTD.2005.96290. Re- [68] “TI.com”. Texas Instruments. Retrieved 7 April 2011.
trieved 4 September 2010.
[69] “iFixit MacBook Air 13” Mid 2011 Teardown”.
[46] “Specification Documents”. Bluetooth SIG. Retrieved 3 iFixit.com. Retrieved 27 July 2011.
May 2012.
[70] “Broadcom.com – BCM20702 – Single-Chip Bluetooth®
[47] “HTC TyTN Specification” (PDF). HTC. Retrieved 4 4.0 HCI Solution with Bluetooth Low Energy (BLE) Sup-
February 2008. port”. Broadcom. Retrieved 27 July 2011.
[48] “Simple Pairing Whitepaper” (PDF). Version V10r00. [71] “Press Releases Detail | Bluetooth Technology Website”.
Bluetooth SIG. 3 August 2006. Archived from the orig- Bluetooth.com. 2013-12-04. Retrieved 2014-05-13.
inal (PDF) on 18 October 2006. Retrieved 1 February
2007. [72] “Adopted Specification; Bluetooth Technology Website”.
Bluetooth.com. 2013-12-04. Retrieved 2014-05-14.
[49] “Bluetooth Core Version 3.0 + HS specification”.
[73] “Redmondpie”.
[50] “Bluetooth Core Specification Addendum (CSA) 1”.
[74] “DailyTech”.
[51] David Meyer (22 April 2009). “Bluetooth 3.0 released
without ultrawideband”. zdnet.co.uk. Retrieved 22 April [75] Bluetooth 5 promises four times the speed and twice the
2009. range of Bluetooth 4.0 LE transmissions
[54] “Wimedia.org”. Archived from the original on 23 March [77] “Bluetooth 5 standard brings range, speed and capacity
2009. Retrieved 4 September 2010. boost for IoT”.
[55] “bluetooth.com”. Retrieved 29 January 2015. [78] Bluetooth® 5 Quadruples Range, Doubles Speed, In-
creases Data Broadcasting Capacity by 800% | Bluetooth
[56] “USB.org”. USB.org. 16 March 2009. Retrieved 4 Technology Website
September 2010.
[79] ""Bluetooth 5” spec coming next week with 4x more range
[57] “Incisor.tv”. Incisor.tv. 16 March 2009. Retrieved 4 and 2x better speed [Updated]".
September 2010.
[80] “Bluetooth 5: everything you need to know”.
[58] “Bluetooth group drops ultrawideband, eyes 60 GHz”.
EETimes. Retrieved 4 June 2015. [81] “Bluetooth Core Specification v5.0”.
[59] “Report: Ultrawideband dies by 2013”. EETimes. Re- [82] Stallings, William. (2005). Wireless communications &
trieved 4 June 2015. networks.'=' Upper Saddle River, NJ: Pearson Prentice
Hall.
[60] “Simon Stenhouse - Leech Attempt” (PDF). incisor.tv.
Retrieved 4 June 2015. [83] Juha T. Vainio (25 May 2000). “Bluetooth Security”
(PDF). Helsinki University of Technology. Retrieved 1
[61] “Wibree forum merges with Bluetooth SIG” (PDF) (Press January 2009.
release). Nokia. 12 June 2007. Retrieved 4 February
2008. [84] Andreas Becker (16 August 2007). “Bluetooth Security
& Hacks” (PDF). Ruhr-Universität Bochum. Retrieved
[62] “Bluetooth.com”. Bluetooth.com. Retrieved 4 September 10 October 2007.
2010.
[85] Scarfone, K. & Padgette, J. (September 2008). “Guide
[63] “Bluetooth SIG unveils Smart Marks, explains v4.0 com- to Bluetooth Security” (PDF). National Institute of Stan-
patibility with unnecessary complexity”. Engadget. dards and Technology. Retrieved 3 July 2013.
16 13 EXTERNAL LINKS
[90] John Oates (15 June 2004). “Virus attacks mobiles via
Bluetooth”. The Register. Retrieved 1 February 2007.
[100] Elaina Chai; Ben Deardorff & Cathy Wu. “Hacking Blue-
tooth” (PDF). Retrieved 26 April 2015.
tavopaz21, Bovineboy2008, Ryan032, WarddrBOT, Philip Trueman, DoorsAjar, TXiKiBoT, Oshwah, QrK FIN, Geoman888, Fxhomie,
Brianonn, Ssri1983, Tauheedrameez, Rei-bot, Someone else 90, Aymatth2, Qxz, Someguy1221, CharlieGalik, MichaelStanford, OlavN,
Retiono Virginian, Melsaran, Awl, Cootiequits, Don4of4, BwDraco, Rob Blanco~enwiki, Acer65, LeaveSleaves, Notbyworks, Angrymuth,
David Condrey, ARUNKUMAR P.R, Katimawan2005, Mwilso24, Anderssjosvard, Pikemaster18, Andy Dingley, Dirkbb, Haseo9999,
Abidh786, Impasse, Iammasud, Altermike, Blu3tooth, Lwc, Falcon8765, Enviroboy, Dennis mathews, Sapphic, Nettlehead, Vid2vid, Nagy,
Logan, Nisanthks, Dannydream9999, Depaul27, Supernovaess, FlyingLeopard2014, Jw-wiki, Ss power hacker, Cheeseguypie, EJF, Crans-
dell, JerryDeSanto, SMC89, SieBot, Lworbey, Dusti, Tresiden, DimeCadmium, Dreginald, Winchelsea, Caltas, RJaguar3, Steven.keeping,
LeadSongDog, Xelgen, Arda Xi, Keilana, Happysailor, Flyer22 Reborn, Masgatotkaca, Colfer2, JKofoed, Nopetro, Canadiantire122,
JSpung, Gadgetmonster, Oxymoron83, Newtruie, Steven Crossin, Lightmouse, Elopezar, Vanished user kijsdion3i4jf, Macy, Engineerism,
Laspalmas, Karl2620, StaticGull, Jfromcanada, HighInBC, WikiLaurent, Klaus100, Runmcp, Dj4u, Irstu, NMHartman, Lilboogie, Jblbt,
Andreasbecker, Loren.wilton, Martarius, Sfan00 IMG, Tanvir Ahmmed, ClueBot, Fartacus46, Binksternet, Mckinleyma, Learnportuguese,
The Thing That Should Not Be, Gophi, Captzucchini, MichaelKirche, Compellingelegance, Inufuusen, Poterxu, Ndenison, Adrianflem-
ing, Siliconbeat, Mild Bill Hiccup, Polo200, PolarYukon, Digitallyinspired, Burchseymour, Niceguyedc, Chalo phenomenon, Dave4400,
Auntof6, Hrudaya, DragonBot, Excirial, Alexbot, Jusdafax, Aprilstarr, Anon lynx, Wikitumnus, Harleyosborne1234, Tris121, D1991jb,
Howie1989, Proximitia, BobKawanaka, Narendra Sisodiya, CasperGhosty, Estirabot, Rakeshlashkari, Marcelbutucea, Arjayay, Jotterbot,
Squid tamer, OekelWm, BingoDingo, Mikaey, Maine12329, ChrisHodgesUK, La Pianista, Thingg, Aitias, Jonverve, Versus22, SoxBot
III, Apparition11, Wnt, DumZiBoT, InternetMeme, Ryan8374, XLinkBot, Ain't love grand, Little Mountain 5, Avoided, Mitch Ames,
Skarebo, WikHead, Mimarx, Alexius08, Noctibus, Dzero-net, Abomasnow, Psmonu, Airplaneman, RyanCross, Dsimic, Millionbaker,
Addbot, Xp54321, Ramu50, Mortense, Jhumbo, Shyhshinlee, Landon1980, Queenmomcat, DougsTech, Dimosvki, Justallofthem, Holt,
TutterMouse, Fieldday-sunday, NjardarBot, Skyezx, MrOllie, CarsracBot, JeroenvW, Kravdraa Ulb, Pngolla, AndersBot, Chzz, Favonian,
Hitchcockc, Doniago, Agurcu, 5 albert square, 84user, Tide rolls, Bfigura’s puppy, Dwlocks, Navinkhemka, Lightbot, OlEnglish, Apteva,
Teles, Wireless friend, Nicolas Love, Legobot, Luckas-bot, Bpantalone, Yobot, JSimmonz, Senator Palpatine, Fraggle81, TaBOT-zerem,
Village Idiort, THEN WHO WAS PHONE?, Brougham96, KamikazeBot, Gerixau, Wonderfl, TestEditBot, Dacbook, Avaldesm, The
Flying Spaghetti Monster, Synchronism, Koman90, AnomieBOT, DemocraticLuntz, Arjun G. Menon, Stuffed cat, Kristen Eriksen, Little-
world73, Jim1138, JackieBot, Piano non troppo, Dracony, DigitHead, AdjustShift, Materialscientist, NXTguru, Vinod58, Glarrg, Danno
uk, Felyza, ADNewsom, Ears04, ArthurBot, Kevin chen2003, LilHelpa, Andrewmc123, Xqbot, Bjorn Elenfors, Sionus, 4I7.4I7, Capri-
corn42, Nasnema, Aguwhite, AfrowJoww, 1wolfblake, Headsetuser, HannesP, Coretheapple, RibotBOT, Kyng, Amaury, Sophus Bie,
Shadowjams, Tabledhote, Crf150r rider, Alella, Addea, ToothTeam, FrescoBot, Ryanbrannonrulez, Nageh, W Nowicki, Recognizance,
Spab 007, Ginettos, Huddsy09, Edgukated, Jas203, Åkebråke, I dream of horses, 10metreh, Tom.Reding, Tinton5, Yahia.barie, Pmo-
keefe, Snoopy8765, BRUTE, Pedess, RedBot, GerbilSoft, Boobarkee, Olejarde, Merlion444, Toolnut, Surya Adinata, Tim1357, FoxBot,
TobeBot, Lexischemen~enwiki, LogAntiLog, WikiNickM, Jonkerz, Lotje, Blob00, BeebLee, 777sms, Suffusion of Yellow, MG lUkE
xX, PleaseStand, Tbhotch, Philip123ison, Mhrlive, Andrea105, Onel5969, Hoseabrown, Markareal, DRAGON BOOSTER, Squeakypaul,
Skamecrazy123, Tomvanbraeckel, Meckleys, Steve03Mills, EmausBot, Adovid-Mila, Oliverlyc, Acather96, WikitanvirBot, Timtempleton,
BillyPreset, Dewritech, V 2e, Skyy Train, Jvanthou, RenamedUser01302013, Devin, Wdrdoctor, Winner 42, Jlou us, Wikipelli, Dcirovic,
Egwyn3, ZéroBot, John Cline, Fæ, Bollyjeff, Hfkids, Tecnova, Kiwi128, Ebrambot, H3llBot, L.H.N.Prasad, Makecat, OnePt618, Mltinus,
Sbmeirow, Enap007, Ready, Donner60, Zlatan8621, Marioluigi98, Holdenmcrutch, Psicho1963, Abmmhasan, 28bot, Mrbluetooth, WMC,
Petrb, Lohith92, ClueBot NG, Shajure, Suid-Afrikaanse, Rack1600, Satellizer, Mackwho, HonestIntelligence, Zoltan.ackermann, Euquiq,
Cntras, Twillisjr, O.Koslowski, Widr, Roman.harmata, Slasherman77, Invadinado, Caso80, Offeiriad, Helpful Pixie Bot, Tringy, පසිඳු
කාවින්ද, Electriccatfish2, HMSSolent, Fatih431, DBigXray, Krimuk2.0, BG19bot, Neptune’s Trident, Nandeda narayan, Cooljohnpan,
Senabluetooth, Hz.tiang, Scutigeramorpha, Pwesolek, Klaus5512, Daanyaal4Sirran, MusikAnimal, Metricopolus, Titoncio, Compfreak7,
Fifthman, Per1234, Freakoutwithme, Yourmummm, Snow Blizzard, Yourmummmm, Gbluecathy, Sucwingse, Glacialfox, Mesayre, Lind-
saypeattie, Ekroeter, Achowat, Vkusske, Tonyprasanna05, Rbwiki, Blink89x, BattyBot, Cryptos2k, ~riley, Zhaofeng Li, Jimw338, The
Illusive Man, SaurabhG31, ChrisGualtieri, EditorE, Dobie80, Rikkiwiki, Ppooya99, Trinity.Ralphie, Thomasw90, BrightStarSky, Rezo-
nansowy, FoCuSandLeArN, Webclient101, Pintoch, HelicopterLlama, Hair, Nicceg, Jamesx12345, Tomhak, Revolver4u, 069952497a,
Dave Braunschweig, Sɛvɪnti faɪv, I am One of Many, Magnolia677, Adventures9, Edric Chandra, Tentinator, Jakec, Sssemil, Antho-
nyJ Lock, Ssofrigid, Svoboman, Anuja Ray, Pyrog, Ginsuloft, Reenu rajbir, Surie woods, Mikele venditt, Diffference, Fixuture, 7Sidz,
Bad Dryer, Wyn.junior, Clouviere4440, Trynitagain2c, Jweaver120, CatcherStorm, Highway 231, Yuuhaw, AKS.9955, Filedelinkerbot,
Punkpop ladd, JjaroTech, Betty Jeong, HMSLavender, Freelancer2013, Crystallizedcarbon, JamesJSherman, Foia req, EoRdE6, AndyB-
Volcom, BlueFenixReborn, Anonyman101, Krishnatomar1986oct, Sridharnaidu, Tsunami129, JackMurph, Genovif, KingReaperXD, Kas-
parBot, Sravanadire, G-Fly, Techmesho, Whizrayon, JJMC89, Halbpro, CaseyMillerWiki, Epiklyfail77, Sprawucha, Fabienpe, CAPTAIN
RAJU, Malik Muhammad Asim, InternetArchiveBot, Storylinerly, Xokdsuricat, Devtobiro, Acornett35, NgYShung, Rosatolen, Wizap-
ata, Molongolo, T04ds74, Ed.fuentetaja, Leo Kig, Culturefanatic12, Dc3736, RaaneHolmg, ToastedBacon31, Lalitgalgate, Haris786.arts,
Davve156e, P2Phuture and Anonymous: 2195
14.2 Images
• File:BluetoothUSB.jpg Source: https://upload.wikimedia.org/wikipedia/commons/f/f2/BluetoothUSB.jpg License: Public domain Con-
tributors: Transferred from en.wikipedia to Commons. Original artist: Abidh786 at English Wikipedia
• File:Bluetooth_headset.jpg Source: https://upload.wikimedia.org/wikipedia/commons/c/c0/Bluetooth_headset.jpg License: CC-BY-
SA-3.0 Contributors: ? Original artist: ?
• File:Bluetooth_protokoly.svg Source: https://upload.wikimedia.org/wikipedia/commons/9/9f/Bluetooth_protokoly.svg License: GFDL
Contributors: Wersja rastrowa dostępna pod adresem: http://pl.wikipedia.org/wiki/Plik:Protokoly.gif Original artist: Wersję rastrową za-
mieścił użytkownik polskiego projektu wikipedii: Leszek Chuchla, Zwektoryzował: Krzysztof Zajączkowski
• File:Commons-logo.svg Source: https://upload.wikimedia.org/wikipedia/en/4/4a/Commons-logo.svg License: PD Contributors: ? Origi-
nal artist: ?
• File:DELL_TrueMobile_350_Bluetooth_card.jpg Source: https://upload.wikimedia.org/wikipedia/commons/2/28/DELL_
TrueMobile_350_Bluetooth_card.jpg License: CC BY-SA 3.0 Contributors: Taken by User:Omegatron using a Canon Powershot
SD110, modified in Photo Acute and The GIMP Original artist: User:Omegatron
• File:Drone_4.jpg Source: https://upload.wikimedia.org/wikipedia/commons/7/7b/Drone_4.jpg License: Public domain Contributors:
Own work Original artist: Mmckinley
14.3 Content license 19