1 / 10

Bluetooth Kirthika Parmeswaran Telcordia Technologies OOPSLA’2000

Bluetooth Kirthika Parmeswaran Telcordia Technologies OOPSLA’2000. Bluetooth http://bluetooth.com. Short range, high speed LAN protocol (1M – 2Mbit/s) Encompass a standard communications interface and a low-cost computer chip

taffy
Télécharger la présentation

Bluetooth Kirthika Parmeswaran Telcordia Technologies OOPSLA’2000

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. BluetoothKirthika ParmeswaranTelcordia TechnologiesOOPSLA’2000

  2. Bluetooth http://bluetooth.com • Short range, high speed LAN protocol (1M – 2Mbit/s) • Encompass a standard communications interface and a low-cost computer chip • Combines the DECT (Digital European Cordless Telephone) and iRDA (infraRed Data Association) technologies • Open specification • Enables users to connect their mobile devices via wireless short-range radio links unimpeded by line-of-sight restrictions • Can be used as a WAP bearer

  3. Bluetooth Architecture LMP: Link Management Protocol L2CAP: Logical Link Control And Adaptation Protocol SDP: Service Discovery Protocol TCS BIN: Telephony Control Protocol – Binary RFCOMM: emulates RS 232 , cable replacement protocol OBEX: Object Exchange Protocol

  4. Complementary Capabilities to Jini™ • Service Discovery Layer using the Service Discovery Protocol (SDP) • SDP can be used to: - search for services by service class or attributes - service browsing • Security levels for devices and services • device trust levels <trusted device, untrusted device> • service levels <authentication + authorization, authentication only, open to all> • default security level for legacy applications • Limitations in the security: device level, access control only at set-up

  5. Usage Models • Each usage model has a profile defined, e.g • generic access profile (GAP) • the serial port profile • the service discovery application profile • generic object exchange profile • Usage models commonly used • File Transfer • Internet Bridge • LAN access • Three-in-one phone • Ultimate Headset

  6. Conclusion • Bluetooth can be used as an underlying protocol to Jini(see also Sun white paper on Jini™ Technology and Emerging Network Technologies) • Bluetooth could serve as an area of pattern mining for ad hoc networking

  7. Bluetooth Security Architecture • Security levels for devices and services • (1) device trust levels <trusted device, untrusted device> • (2) service levels <authentication + authorization, • authentication only, • open to all> • (3) Default security level for legacy applications • Limitations • (1) Legacy application need a “adapter application” for security • (2) Only device is authenticated not user • (3) No mechanism defined to preset authorization per service • (4) Access control only at connection set-up time • (5) unidirectional traffic not possible after access check • (6) For “end-to-end” security higher level services required

  8. Security built over Bluetooth • Security Manager - stores security related information on services and devices - performs access checks - helps to set up trusted relationships at the device level - initiates pairing and query PIN entry by the user - checks whether a service does not permit connectionless data packets when needed

  9. Usage Models • Each usage model has a profile defined, • e.g generic access profile (GAP), the serial port profile, • the service discovery application profile (SDAP), • and the generic object exchange profile (GOEP) • Usage models commonly used include File Transfer, Internet Bridge, • LAN access, Three-in-one phone, Ultimate Headset

  10. Protocols in the Bluetooth Architecture • The Specification also defines a Host Controller Interface (HCI), which provides a command interface to the baseband controller, link manager, and access to hardware status and control registers. • It can be positioned above/below L2CAP

More Related