210 likes | 613 Views
Bluetooth. By Sonny Leung. Jennifer Portillo. Thomas Razo. Samson Vuong. Introduction. What is Bluetooth? What does it do? History of Bluetooth. Introduction (cont’d). Is Bluetooth here to stay? What should we expect from Bluetooth in the future?.
E N D
Bluetooth By Sonny Leung Jennifer Portillo Thomas Razo Samson Vuong
Introduction • What is Bluetooth? • What does it do? • History of Bluetooth
Introduction (cont’d) • Is Bluetooth here to stay? • What should we expect from Bluetooth in the future?
What Bluetooth Delivers to the end-user • Connects a wide range of computing and telecommunication devices • Expand communication capabilities • Devices can communicate with each other with wireless connectivity
User Application • Car manufactures Industry • E-Mail / Internet / Intranet Access • Headsets • Bluetooth will facilitate Local Area Networks
Bluetooth in Action In the Office ... In the house Source: http//:www.motorola.com
Home Security On the Road Source: http//:www.motorola.com
On your Car Source: http//:www.motorola.com
Bluetooth Specifications • Things that you must have: • Transceivers and Receivers that can send and receive data because they use Radio Waves. • MAC Address (Physical Address) • Burnt on the NIC card by the manufacturer. • PIN Number • To identify the user using the device. • A Piconet • A FHHS protocol
What is a Piconet? • A Piconet session is a communication link that must be created between devices for devices to communicate with each other. • This is done when the MAC address and the PIN number match.
Piconet (cont.) • If two devices come onto contact with each other( 32 feet) the user will be prompted to initiate a communication session • Users then can either deny or accept the request to initiate a session • Only devices approved by the user can take part in the session • Data will appear as noise to unauthorized devices (A great security feature).
FHHS • Bluetooth devices use a protocol called (FHHS) Frequency-Hopping Spread Spectrum . • Uses packet-switching to send data. • Bluetooth sends packets of data on a range of frequencies. • In each session one device is a master and the others are slaves. • The master device decides at which frequency data will travel.
FHHS • Transceivers “hop” among 79 different frequencies in the 2.4 GHz baud at a rate of 1600 frequency hops per second. • The master device tells the slaves at what frequency data will be sent. • This technique allows devices to communicate with each other more securely.
FHHS Example Source: http://www.xircom.com
Bluetooth Security • Modes • Security Mode 1 • No Security • Security Mode 2 • Service Level Enforced Security • Implemented after channel is established • Security Mode 3 • Link Level Enforced Security • Implemented before channel is established
Devices • “Trusted” • No Restrictions • “Untrusted” • Restrictions, Access is limited
Service Levels • Authorization and Authentication • Authentication Only • Open to all Devices
Link Level • Bluetooth Device Address • Private Link Key • Private Encryption Key • Random Number
Bluetooth Secure Enough? • Not enough for confidential and top secret information now but . . . • Security will Improve • Improve exisiting security • Implement new security
Wrap up • Growing Technology • Automation
For More Information Please Visit The Following Sites • www.motorola.com • www.xircom.com • www.palowireless.com • www.bluetooth.com