170 likes | 292 Views
Bluetooth. 발표자 : 현근수. Overview. wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile phones, telephones, laptops, personal computers, printers, GPS receivers, digital cameras, and video game consoles over a secure.
E N D
Bluetooth 발표자 : 현근수
Overview • wireless protocol • short-range communications technology • single digital wireless protocol • connecting multiple devices • mobile phones, telephones, laptops, personal computers, printers, GPS receivers, digital cameras, and video game consoles over a secure
Uses Bluetooth • standard and communications protocol • low power consumption • short range
Bluetooth vs Wi-Fi in networking (1/2) • Wi-Fi • higher throughput • great distance • more expensive hardware • higher power consumption
Requirement • PC support • Bluetooth adapter • others will require an external one in the form of a dongle • multiple devices over a single adapter • Operating system support • Bluetooth dongles packaged with their Bluetooth computer devices (Window) • Bluetooth Stack (Linux) • Mobile support • To ensure the broadest support of feature functionality together with legacy device support
Future of Bluetooth • Broadcast Channel • Topology Management • Alternate MAC PHY
Bluetooth protocol stack (1/3) • Core protocol • Bluetooth Radio • Base band • Link Manager Protocol • Logical Link Control and Adaptation Protocol • Service Discovery Protocol
Bluetooth protocol stack (2/3) • Cable replacement protocol • RFCOMM (Radio frecquency communication ) • Telephony control protocol • TCS BIN (Telephony control protocol-binary)
Bluetooth protocol stack (3/3) • Adopted protocols • PPP (Point-to-Point Protocol) • TCP/IP/UDP • OBEX (Object Exchange Protocol) • WAE/WAP (Wireless Application Environment/ Wireless Application Protocol)
Communication and connection • Piconet • A master device can communicate with up to seven devices • ad-hoc computer network. • Up to 255 further devices can be inactive, or parked. • any time, data can be transferred • the slave can become the master at any time. • The master switches rapidly from one device to another in a round robin fashion. • Scatternet • connecting two or more piconets • some devices acting as a bridge • Setting up connection • Has unique 48 bit address
Pairing • Transmitter • cryptographically authenticate the identity of the other device. • Receiver • encrypt the data that they exchange over the airwaves • pairing is preserved, even if the Bluetooth name is changed. • Bluetooth 2.1 has an optional "touch-to-pair"
Air interface • interfering with other protocols that use the 2.45 GHz band • the Bluetooth protocol divides the band into 79 channels • changes channels up to 1600 times per second
Security (1/2) • Confidentiality ,authentication ,Key derivation • SAFER + block cipher • Key generation == Bluetooth PIN • must be entered into both devices. This procedure might be modified if one of the devices has a fixed PIN, • e.g. for headsets or similar devices with a restricted user interface.
Security (2/2) • Bluejacking • Bluejacking is the sending of either a picture or a message from one user to an unsuspecting user through Bluetooth wireless technology.