Download
bluetooth n.
Skip this Video
Loading SlideShow in 5 Seconds..
Bluetooth PowerPoint Presentation

Bluetooth

338 Vues Download Presentation
Télécharger la présentation

Bluetooth

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Bluetooth By Sonny Leung Jennifer Portillo Thomas Razo Samson Vuong

  2. Introduction • What is Bluetooth? • What does it do? • History of Bluetooth

  3. Introduction (cont’d) • Is Bluetooth here to stay? • What should we expect from Bluetooth in the future?

  4. What Bluetooth Delivers to the end-user • Connects a wide range of computing and telecommunication devices • Expand communication capabilities • Devices can communicate with each other with wireless connectivity

  5. User Application • Car manufactures Industry • E-Mail / Internet / Intranet Access • Headsets • Bluetooth will facilitate Local Area Networks

  6. Bluetooth in Action In the Office ... In the house Source: http//:www.motorola.com

  7. Home Security On the Road Source: http//:www.motorola.com

  8. On your Car Source: http//:www.motorola.com

  9. Bluetooth Specifications • Things that you must have: • Transceivers and Receivers that can send and receive data because they use Radio Waves. • MAC Address (Physical Address) • Burnt on the NIC card by the manufacturer. • PIN Number • To identify the user using the device. • A Piconet • A FHHS protocol

  10. What is a Piconet? • A Piconet session is a communication link that must be created between devices for devices to communicate with each other. • This is done when the MAC address and the PIN number match.

  11. Piconet (cont.) • If two devices come onto contact with each other( 32 feet) the user will be prompted to initiate a communication session • Users then can either deny or accept the request to initiate a session • Only devices approved by the user can take part in the session • Data will appear as noise to unauthorized devices (A great security feature).

  12. FHHS • Bluetooth devices use a protocol called (FHHS) Frequency-Hopping Spread Spectrum . • Uses packet-switching to send data. • Bluetooth sends packets of data on a range of frequencies. • In each session one device is a master and the others are slaves. • The master device decides at which frequency data will travel.

  13. FHHS • Transceivers “hop” among 79 different frequencies in the 2.4 GHz baud at a rate of 1600 frequency hops per second. • The master device tells the slaves at what frequency data will be sent. • This technique allows devices to communicate with each other more securely.

  14. FHHS Example Source: http://www.xircom.com

  15. Bluetooth Security • Modes • Security Mode 1 • No Security • Security Mode 2 • Service Level Enforced Security • Implemented after channel is established • Security Mode 3 • Link Level Enforced Security • Implemented before channel is established

  16. Devices • “Trusted” • No Restrictions • “Untrusted” • Restrictions, Access is limited

  17. Service Levels • Authorization and Authentication • Authentication Only • Open to all Devices

  18. Link Level • Bluetooth Device Address • Private Link Key • Private Encryption Key • Random Number

  19. Bluetooth Secure Enough? • Not enough for confidential and top secret information now but . . . • Security will Improve • Improve exisiting security • Implement new security

  20. Wrap up • Growing Technology • Automation

  21. For More Information Please Visit The Following Sites • www.motorola.com • www.xircom.com • www.palowireless.com • www.bluetooth.com