BLUETOOTH
by SHEBIN.A.KHALAM
What is Bluetooth?
A wireless technology that was introduced five years ago; It was designed to replace cables that connect electronic equipment
Features
Inexpensive Doesn’t require anything special to make it work It communicates on a frequency of 2.45 Ghz (the same frequency as baby monitors and garage door openers Uses low power and spread-spectrum frequency hopping
Future Features
Further power optimization Security enhancements Quality of service
Interference Avoidance Method #1
Low power • Limits the range to about 10 meters • Signal is weak at 1 milliwatt (compared to cell phones at 3 watts)
Interference Avoidance Method #2
Spread-Spectrum Frequency Hopping • Uses 79 individual, randomly chosen frequencies within a designated range (compared to Japan, which uses 23 frequencies) • Changes frequencies 1,600 times every second • Each channel is divided into time slots 625 microseconds long
Bluetooth/ZigBee Similarities Both: • Are types of IEEE 802.5 “wireless personal-area networks” • Run in the 2.4 Ghz frequency band • Use small form factors and low power
Bluetooth/ZigBee Differences
Modulation technique • •
B: Frequency Hopping Spread Spectrum Z: Direct Sequence Spread Hopping
• •
B: 250 kbyte Z: 28 kbyte
• •
B: intended for frequent recharging Z: not rechargeable
• •
B: 1 Mbit/s Z: 250 kbits/s
• •
B: 1 or 100 meters Z: up to 70 meters
• •
B: 3 seconds Z: 30 miliseconds
Protocol stack size Battery
Maximum network speed Network range
Typical network join time
Bluetooth/ZigBee
Bluetooth is aimed toward: • User mobility • Eliminating short distance cabling
ZigBee is aimed toward: • More grand-scale automation • Remote control
Security
Bluetooth Security Experts Group: • A group of engineers from the member companies that make up the Bluetooth Special Interest Group • Provide critical security information and feedback as the specification evolves
Security
Product developers have several options for implementing security: • Three modes of security for Bluetooth access between two devices: Non-secure Service-level enforced Link-level enforced
Security
Bluetooth devices have two levels of security: • Trusted device has unrestricted access to all services • Untrusted device
Services have three levels of security: • Those that require authorization and authentication • Those that require authorization only • Those that are open to all devices
Security Breaches: Bluebugging Allows skilled individuals to access the mobile phone commands using Bluetooth wireless technology without notifying or alerting the phone’s user as long as the hacker is within a 10 meter range of the phone Allows the hacker to initiate phone calls, read and write phonebook contacts, eavesdrop on conversations and connect to the Internet
Security Breaches: Bluesnarfing Allows hackers to gain access to data stored on Bluetooth enabled phone using Bluetooth wireless technology without alerting the phone’s user of the connection made Without specialized equipment, the hacker must be in a 10 meter range of the device while running a device with specialized software Only specific older Bluetooth enabled phones are susceptible ker is within a 10 meter range of the phone
Security Solutions
The manufacturers of the vulnerable phones have developed software patches to fix the problem The device can be set to the nondiscoverable mode when not using Bluetooth technology or when in an unknown area
References
http://www.wirelessip.info> http://www.electronics.howstuffworks.com/bluetooth http://www.rockymountainnews.com http://www.techworld.com http://www.palowireless.com http://www.businessweek.com http://www.bluetooth.com
Thank you!!!