Sei sulla pagina 1di 21

Bluetooth

Jennifer Portillo
Thomas Razo


Samson Vuong

By
Sonny Leung

Introduction
What is Bluetooth?

What does it do?

History of Bluetooth



Introduction (contd)


Is Bluetooth here to stay?

What should we expect from
Bluetooth in the future?


What Bluetooth Delivers to the
end-user


Connects a wide range of computing and
telecommunication devices

Expand communication capabilities

Devices can communicate with each other
with wireless connectivity


User Application
Car manufactures Industry

E-Mail / Internet / Intranet Access

Headsets

Bluetooth will facilitate Local Area
Networks
Bluetooth in Action
Source: http//:www.motorola.com
In the Office ...
In the house
Home Security On the Road
Source: http//:www.motorola.com
On your Car
Source: http//:www.motorola.com
Bluetooth Specifications
Things that you must have:
Transceivers and Receivers that can send and
receive data because they use Radio
Waves.
MAC Address (Physical Address)
Burnt on the NIC card by the manufacturer.
PIN Number
To identify the user using the device.
A Piconet
A FHHS protocol



What is a Piconet?
A Piconet session is a communication link
that must be created between devices for
devices to communicate with each other.

This is done when the MAC address and
the PIN number match.

Piconet (cont.)
If two devices come onto contact with each
other( 32 feet) the user will be prompted to
initiate a communication session

Users then can either deny or accept the request
to initiate a session

Only devices approved by the user can take part
in the session

Data will appear as noise to unauthorized
devices (A great security feature).
FHHS
Bluetooth devices use a protocol called (FHHS)
Frequency-Hopping Spread Spectrum .

Uses packet-switching to send data.

Bluetooth sends packets of data on a range of
frequencies.

In each session one device is a master and the
others are slaves.

The master device decides at which frequency
data will travel.
FHHS
Transceivers hop among 79 different
frequencies in the 2.4 GHz baud at a rate of
1600 frequency hops per second.

The master device tells the slaves at what
frequency data will be sent.

This technique allows devices to communicate
with each other more securely.
FHHS Example
Source: http://www.xircom.com
Bluetooth Security
Modes
Security Mode 1
No Security
Security Mode 2
Service Level Enforced Security
Implemented after channel is established
Security Mode 3
Link Level Enforced Security
Implemented before channel is established
Devices
Trusted
No Restrictions
Untrusted
Restrictions, Access is limited
Service Levels
Authorization and Authentication

Authentication Only

Open to all Devices
Link Level
Bluetooth Device Address

Private Link Key

Private Encryption Key

Random Number
Bluetooth Secure Enough?
Not enough for confidential and top secret
information now but . . .
Security will Improve
Improve exisiting security
Implement new security
Wrap up
Growing Technology

Automation

For More Information Please
Visit The Following Sites
www.motorola.com
www.xircom.com
www.palowireless.com
www.bluetooth.com

Potrebbero piacerti anche