Bluetooth By Sonny Leung Jennifer Portillo Thomas Razo Samson Vuong
Introduction • What is Bluetooth? • What does it do? • History of Bluetooth
Introduction (cont’d) • Is Bluetooth here to stay? • What should we expect from Bluetooth in the future?
What Bluetooth Delivers to the end-user • Connects a wide range of computing and telecommunication devices • Expand communication capabilities • Devices can communicate with each other with wireless connectivity
User Application • Car manufactures Industry • E-Mail / Internet / Intranet Access • Headsets • Bluetooth will facilitate Local Area Networks
Bluetooth in Action In the Office ... In the house Source: http//:www.motorola.com
Home Security On the Road Source: http//:www.motorola.com
On your Car Source: http//:www.motorola.com
Bluetooth Specifications • Things that you must have: • Transceivers and Receivers that can send and receive data because they use Radio Waves. • MAC Address (Physical Address) • Burnt on the NIC card by the manufacturer. • PIN Number • To identify the user using the device. • A Piconet • A FHHS protocol
What is a Piconet? • A Piconet session is a communication link that must be created between devices for devices to communicate with each other. • This is done when the MAC address and the PIN number match.
Piconet (cont.) • If two devices come onto contact with each other( 32 feet) the user will be prompted to initiate a communication session • Users then can either deny or accept the request to initiate a session • Only devices approved by the user can take part in the session • Data will appear as noise to unauthorized devices (A great security feature).
FHHS • Bluetooth devices use a protocol called (FHHS) Frequency-Hopping Spread Spectrum . • Uses packet-switching to send data. • Bluetooth sends packets of data on a range of frequencies. • In each session one device is a master and the others are slaves. • The master device decides at which frequency data will travel.
FHHS • Transceivers “hop” among 79 different frequencies in the 2.4 GHz baud at a rate of 1600 frequency hops per second. • The master device tells the slaves at what frequency data will be sent. • This technique allows devices to communicate with each other more securely.
FHHS Example Source: http://www.xircom.com
Bluetooth Security • Modes • Security Mode 1 • No Security • Security Mode 2 • Service Level Enforced Security • Implemented after channel is established • Security Mode 3 • Link Level Enforced Security • Implemented before channel is established
Devices • “Trusted” • No Restrictions • “Untrusted” • Restrictions, Access is limited
Service Levels • Authorization and Authentication • Authentication Only • Open to all Devices
Link Level • Bluetooth Device Address • Private Link Key • Private Encryption Key • Random Number
Bluetooth Secure Enough? • Not enough for confidential and top secret information now but . . . • Security will Improve • Improve exisiting security • Implement new security
Wrap up • Growing Technology • Automation
For More Information Please Visit The Following Sites • www.motorola.com • www.xircom.com • www.palowireless.com • www.bluetooth.com