Bluetooth.

Slides:



Advertisements
Similar presentations
BLUETOOTH. INTRODUCTION A look around at the moment! Keyboard connected to the computer, as well as a printer, mouse, monitor and so on. What (literally)
Advertisements

1 Introduction to Bluetooth v1.1 (Part I) Overview Radio Specification Baseband Specification LMP L2CAP.
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
Remote Desktop Connection Techniques Wireless Communication Networks.
CPET 260 Bluetooth. What is Bluetooth? Not IEEE (Wi-Fi) or HomeRF Originally designed to replace wires Short-range, lower-power wireless technology.
Overview The Basics Core Specification Version Spectrum International Radio Frequency Allocation Range Power Benefits Protocol Stack Bluetooth Architecture.
BLUETOOTH The Universal Radio Interface for ad hoc, Wireless Connectivity By Jeffrey Adams.
Chapter 9 Communications and Network Tyler Clutts.
BLUETOOTH.
Bluetooth Jennifer Portillo Thomas Razo Samson Vuong By Sonny Leung.
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji.
Bluetooth Introduction The Bluetooth Technology
Stacy Drake Bluetooth Vs. Wi-Fi. What is Bluetooth?
Embedded Bluetooth Gang Xie presents to EE281 Class Stanford University 11/22/2002.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Bluetooth Technology Jason Babel Kyle Musal Joshua Turella Zdravko Tyankov.
Bluetooth By Richard B. Heisler, Jr. Villanova University Distributed Systems CSC 8530 Fall 2006 Instructor - Dr. Paul A. Schragger.
Why go Wireless? By Cheryl Aupperle The Start…. Wireless communication is something we all are familiar with. Think about using a walkie- talkie, listening.
Bluetooth By Andrew Breen and Chris Backo. Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues.
Wireless Communication Methods
Bluetooth Address or Name Sharing By Joseph Charboneau.
Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
SHAWN CROWE LTEC /026 ASSIGNMENT #3 Networking Components.
Computer by S.Shrestha (comp 251)
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
PRESENTED BY M.A.M.JANI S.AMRUTHA RAJU M.A.M.JANI S.AMRUTHA RAJU.
Presented by Team A Wireless Home Networks By Abraham Kopyt, John Leonard, Christine Terry.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
SEMINAR ON BLUETOOTH TECHNOLOGY
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Overview of the security weaknesses in Bluetooth Dave Singelée COSIC seminar 11/06/2003.
©F.M. Rietti Radio Wave Communication Fundamentals.
Technology By :-. What Is Bluetooth? Designed to be used to connect both mobile devices and peripherals that currently require a wire Short range wireless.
Abdul Rahman Al-Refai Zavnura Pingkan. Introduction Bluetooth is a wireless technology for short range data and/ or voice communication The communication.
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Week-3 (Lecture-1). Some Important internet terms: Archie : A program used to search files at FTP sites. There are currently 30 Archie servers in the.
Presented by Khaled Al Otaishan
Wi-Fi Technology.
Fundamentals of Information Systems, Sixth Edition
Virtual Private Network (VPN)
MANAGEMENT AND METHODS OF MOBILE IP SECURITY
Instructor Materials Chapter 6 Building a Home Network
Wireless Technologies
Channel Control Interim substates for adding new slaves
Wireless Fidelity 1 1.
Virtual Private Networks (VPN)
A Wireless LAN technologies IEEE
Wireless NETWORKS NET 434 Topic No 7 Bluetooth-IEEE802.15
How Data Flows through the Internet
e-business and Information Systems
“I don’t have to be careful, I’ve got a gun.”
Virtual Private Network (VPN)
BLUETOOTH AND ITS APPLICATION IN MOBILE PHONES
BLUETOOTH Personal Area Networking [ PAN ] over Bluetooth
PREPARED BY: RIDDHI PATEL (09CE085)
WLAN Security Antti Miettinen.
Wireless LAN (WLAN) Wireless Ethernet Bluetooth.
Bluetooth Bluetooth is a wireless LAN technology designed to connect devices of different functions when they are at a short distance from each other A.
Security in Wide Area Networks
Presentation transcript:

Bluetooth

Introduction What is Bluetooth? What does it do? History of Bluetooth

Introduction (cont’d) Is Bluetooth here to stay? What should we expect from Bluetooth in the future?

What Bluetooth Delivers to the end-user Connects a wide range of computing and telecommunication devices Expand communication capabilities Devices can communicate with each other with wireless connectivity

User Application E-Mail / Internet / Intranet Access Headsets Car manufactures Industry E-Mail / Internet / Intranet Access Headsets Bluetooth will facilitate Local Area Networks

Source: http//:www.motorola.com Bluetooth in Action In the Office ... In the house Source: http//:www.motorola.com

Home Security On the Road Source: http//:www.motorola.com

Source: http//:www.motorola.com On your Car Source: http//:www.motorola.com

Bluetooth Specifications Things that you must have: Transceivers and Receivers that can send and receive data because they use Radio Waves. MAC Address (Physical Address) Burnt on the NIC card by the manufacturer. PIN Number To identify the user using the device. A Piconet A FHHS protocol

What is a Piconet? A Piconet session is a communication link that must be created between devices for devices to communicate with each other. This is done when the MAC address and the PIN number match.

Piconet (cont.) If two devices come onto contact with each other( 32 feet) the user will be prompted to initiate a communication session Users then can either deny or accept the request to initiate a session Only devices approved by the user can take part in the session Data will appear as noise to unauthorized devices (A great security feature).

FHHS Bluetooth devices use a protocol called (FHHS) Frequency-Hopping Spread Spectrum . Uses packet-switching to send data. Bluetooth sends packets of data on a range of frequencies. In each session one device is a master and the others are slaves. The master device decides at which frequency data will travel.

FHHS Transceivers “hop” among 79 different frequencies in the 2.4 GHz baud at a rate of 1600 frequency hops per second. The master device tells the slaves at what frequency data will be sent. This technique allows devices to communicate with each other more securely.

FHHS Example Source: http://www.xircom.com

Bluetooth Security Modes Security Mode 1 Security Mode 2 No Security Security Mode 2 Service Level Enforced Security Implemented after channel is established Security Mode 3 Link Level Enforced Security Implemented before channel is established

Devices “Trusted” “Untrusted” No Restrictions Restrictions, Access is limited

Service Levels Authorization and Authentication Authentication Only Open to all Devices

Link Level Bluetooth Device Address Private Link Key Private Encryption Key Random Number

Bluetooth Secure Enough? Not enough for confidential and top secret information now but . . . Security will Improve Improve exisiting security Implement new security

Wrap up Growing Technology Automation

For More Information Please Visit The Following Sites www.motorola.com www.xircom.com www.palowireless.com www.bluetooth.com