bluetooth

21
Bluetooth Bluetooth Jennifer Portillo Jennifer Portillo Thomas Razo Thomas Razo Samson Vuong Samson Vuong By By Sonny Leung Sonny Leung

Upload: pratibha-jain

Post on 08-Aug-2015

28 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Bluetooth

BluetoothBluetooth

Jennifer PortilloJennifer PortilloThomas RazoThomas Razo

Samson VuongSamson Vuong

ByBy

Sonny LeungSonny Leung

Page 2: Bluetooth

IntroductionIntroduction

•What is Bluetooth?What is Bluetooth?

•What does it do?What does it do?

•History of BluetoothHistory of Bluetooth

Page 3: Bluetooth

Introduction (cont’d)Introduction (cont’d)

• Is Bluetooth here to stay?Is Bluetooth here to stay?

•What should we expect from What should we expect from Bluetooth in the future?Bluetooth in the future?

Page 4: Bluetooth

What Bluetooth Delivers to What Bluetooth Delivers to the end-userthe end-user

• Connects a wide range of computing Connects a wide range of computing and telecommunication devicesand telecommunication devices

• Expand communication capabilitiesExpand communication capabilities

• Devices can communicate with each Devices can communicate with each other with wireless connectivityother with wireless connectivity

Page 5: Bluetooth

User ApplicationUser Application

• Car manufactures Industry Car manufactures Industry

• E-Mail / Internet / Intranet AccessE-Mail / Internet / Intranet Access

• HeadsetsHeadsets

• Bluetooth will facilitate Local Area Bluetooth will facilitate Local Area NetworksNetworks

Page 6: Bluetooth

Bluetooth in ActionBluetooth in Action

Source: http//:www.motorola.com

In the Office ...In the Office ...In the houseIn the house

Page 7: Bluetooth

Home SecurityHome Security On the RoadOn the Road

Source: http//:www.motorola.com

Page 8: Bluetooth

On your CarOn your Car

Source: http//:www.motorola.com

Page 9: Bluetooth

Bluetooth SpecificationsBluetooth Specifications

• Things that you must have:Things that you must have:– Transceivers and Receivers that can send Transceivers and Receivers that can send

and receive data because they use and receive data because they use Radio Radio Waves.Waves.

– MAC Address (Physical Address)MAC Address (Physical Address)•Burnt on the NIC card by the manufacturer.Burnt on the NIC card by the manufacturer.

– PIN Number PIN Number •To identify the user using the device.To identify the user using the device.

– A PiconetA Piconet– A FHHS protocolA FHHS protocol

Page 10: Bluetooth

What is a Piconet?What is a Piconet?

• A Piconet session is a communication A Piconet session is a communication link that must be created between link that must be created between devices for devices to communicate devices for devices to communicate with each other. with each other.

• This is done when the MAC address This is done when the MAC address and the PIN number match.and the PIN number match.

Page 11: Bluetooth

Piconet (cont.)Piconet (cont.)

• If two devices come onto contact with each other( 32 If two devices come onto contact with each other( 32 feet) the user will be prompted to initiate a feet) the user will be prompted to initiate a communication sessioncommunication session

• Users then can either deny or accept the request to Users then can either deny or accept the request to initiate a sessioninitiate a session

• Only devices approved by the user can take part in Only devices approved by the user can take part in the sessionthe session

• Data will appear as noise to unauthorized devicesData will appear as noise to unauthorized devices (A (A great security feature).great security feature).

Page 12: Bluetooth

FHHSFHHS• Bluetooth devices use a protocol called (FHHS) Bluetooth devices use a protocol called (FHHS)

Frequency-Hopping Spread Spectrum .Frequency-Hopping Spread Spectrum .

• Uses packet-switching to send data.Uses packet-switching to send data.

• Bluetooth sends packets of data on a range of Bluetooth sends packets of data on a range of frequencies.frequencies.

• In each session one device is a master and the others are In each session one device is a master and the others are slaves.slaves.

• The master device decides at which frequency data will The master device decides at which frequency data will travel.travel.

Page 13: Bluetooth

FHHSFHHS

• Transceivers “hop” among 79 different Transceivers “hop” among 79 different frequencies in the 2.4 GHz baud at a rate of frequencies in the 2.4 GHz baud at a rate of 1600 frequency hops per second.1600 frequency hops per second.

• The master device tells the slaves at what The master device tells the slaves at what frequency data will be sent.frequency data will be sent.

• This technique allows devices to This technique allows devices to communicate with each other more securely.communicate with each other more securely.

Page 14: Bluetooth

FHHS ExampleFHHS Example

Source: http://www.xircom.com

Page 15: Bluetooth

Bluetooth SecurityBluetooth Security

• ModesModes– Security Mode 1Security Mode 1

•No SecurityNo Security

– Security Mode 2Security Mode 2•Service Level Enforced SecurityService Level Enforced Security• Implemented after channel is establishedImplemented after channel is established

– Security Mode 3Security Mode 3•Link Level Enforced Security Link Level Enforced Security • Implemented before channel is establishedImplemented before channel is established

Page 16: Bluetooth

DevicesDevices

• ““Trusted”Trusted”– No RestrictionsNo Restrictions

• ““Untrusted”Untrusted”– Restrictions, Access is limitedRestrictions, Access is limited

Page 17: Bluetooth

Service LevelsService Levels

• Authorization and AuthenticationAuthorization and Authentication

• Authentication OnlyAuthentication Only

• Open to all DevicesOpen to all Devices

Page 18: Bluetooth

Link LevelLink Level

• Bluetooth Device AddressBluetooth Device Address

• Private Link KeyPrivate Link Key

• Private Encryption KeyPrivate Encryption Key

• Random NumberRandom Number

Page 19: Bluetooth

Bluetooth Secure Enough?Bluetooth Secure Enough?

• Not enough for confidential and top Not enough for confidential and top secret information now but . . . secret information now but . . .

• Security will ImproveSecurity will Improve– Improve exisiting securityImprove exisiting security– Implement new securityImplement new security

Page 20: Bluetooth

Wrap upWrap up

• Growing TechnologyGrowing Technology

• AutomationAutomation

Page 21: Bluetooth

For More Information Please For More Information Please Visit The Following SitesVisit The Following Sites

• www.motorola.comwww.motorola.com

• www.xircom.comwww.xircom.com

• www.palowireless.comwww.palowireless.com

• www.bluetooth.comwww.bluetooth.com