Vous êtes sur la page 1sur 21

Bluetooth

By
Sonny Leung
Jennifer Portillo
Thomas Razo
Samson Vuong
Introduction

What is Bluetooth?

What does it do?

History of Bluetooth
Introduction (contd)

Is Bluetooth here to stay?

What should we expect from


Bluetooth in the future?
What Bluetooth Delivers to
the end-user

Connects a wide range of computing


and telecommunication devices

Expand communication capabilities

Devices can communicate with each


other with wireless connectivity
User Application
Car manufactures Industry

E-Mail / Internet / Intranet Access

Headsets

Bluetooth will facilitate Local Area


Networks
Bluetooth in Action
In the Office ...
In the house

Source: http//:www.motorola.com
Home Security On the Road

Source: http//:www.motorola.com
On your Car

Source: http//:www.motorola.com
Bluetooth Specifications
Things that you must have:
Transceivers and Receivers that can send and
receive data because they use Radio
Waves.
MAC Address (Physical Address)
Burnt on the NIC card by the manufacturer.
PIN Number
To identify the user using the device.
A Piconet
A FHHS protocol
What is a Piconet?

A Piconet session is a communication


link that must be created between
devices for devices to communicate
with each other.

This is done when the MAC address


and the PIN number match.
Piconet (cont.)
If two devices come onto contact with each other( 32
feet) the user will be prompted to initiate a
communication session

Users then can either deny or accept the request to


initiate a session

Only devices approved by the user can take part in the


session

Data will appear as noise to unauthorized devices (A


great security feature).
FHHS
Bluetooth devices use a protocol called (FHHS) Frequency-
Hopping Spread Spectrum .

Uses packet-switching to send data.

Bluetooth sends packets of data on a range of frequencies.

In each session one device is a master and the others are


slaves.

The master device decides at which frequency data will


travel.
FHHS
Transceivers hop among 79 different
frequencies in the 2.4 GHz baud at a rate of
1600 frequency hops per second.

The master device tells the slaves at what


frequency data will be sent.

This technique allows devices to


communicate with each other more securely.
FHHS Example

Source: http://www.xircom.com
Bluetooth Security

Modes
Security Mode 1
No Security
Security Mode 2
Service Level Enforced Security
Implemented after channel is established
Security Mode 3
Link Level Enforced Security
Implemented before channel is established
Devices

Trusted
No Restrictions
Untrusted
Restrictions, Access is limited
Service Levels

Authorization and Authentication

Authentication Only

Open to all Devices


Link Level

Bluetooth Device Address

Private Link Key

Private Encryption Key

Random Number
Bluetooth Secure Enough?

Not enough for confidential and top


secret information now but . . .
Security will Improve
Improve exisiting security
Implement new security
Wrap up

Growing Technology

Automation
For More Information Please
Visit The Following Sites
www.motorola.com
www.xircom.com
www.palowireless.com
www.bluetooth.com

Vous aimerez peut-être aussi