BLUETOOTH Margaret A. Sears St. Xavier University ACSG - Computer Networks for Internet Information Systems Spring 2005.

Slides:



Advertisements
Similar presentations
Indian Institute of Technology Hyderabad Presented By : Harish Kumar, Tulasi Ram. Bluetooth.
Advertisements

BLUETOOTH. INTRODUCTION A look around at the moment! Keyboard connected to the computer, as well as a printer, mouse, monitor and so on. What (literally)
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
Infrared Data Association and Bluetooth Technology EE566 presentation
By Abdullah M. Dalloul… Abdullah M. Dalloul… Salman Y. Mansour Salman Y. Mansour Supervisor. Supervisor. Dr.
CPET 260 Bluetooth. What is Bluetooth? Not IEEE (Wi-Fi) or HomeRF Originally designed to replace wires Short-range, lower-power wireless technology.
Wireless Security.
Bluetooth What is it and where is it going?. Background…..   Conceived initially by Ericsson, before being adopted by a myriad of other companies, Bluetooth.
Short Distance Wireless Communication. Team 5 Thomas French Jordan Harris Mike Symanow Luseane Tangataevaha.
What is Bluetooth? Bluetooth technology is a peripheral that connects to a variety of products in order to provide wireless connections.
Mice Introduction to one of the most frequently used device in computer today.
ZIGBEE Compared to BLUETOOTH
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
Bluetooth Jennifer Portillo Thomas Razo Samson Vuong By Sonny Leung.
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji.
Bluetooth Introduction The Bluetooth Technology
Stacy Drake Bluetooth Vs. Wi-Fi. What is Bluetooth?
Bluetooth & WPAN. 2 Bluetooth/WPAN WPAN (Wireless Personal Area Network) has a smaller area of coverage, say, 2.5 mW transmitter power, distance
Area 2 Computers & Technology Group 21 August 2008 Dean Steichen Br.#8.
IEEE & Priyanka Vanjani CST 554: Short Presentation ASU Id #
 Midterm 30%  Final 40%  LAB 15%  Assignment 15%  Text Book – Designing and Deploying n Wireless Networks  Jim Geier (ciscopress)
Bluetooth Technology Jason Babel Kyle Musal Joshua Turella Zdravko Tyankov.
Bluetooth By Richard B. Heisler, Jr. Villanova University Distributed Systems CSC 8530 Fall 2006 Instructor - Dr. Paul A. Schragger.
Emerging Wireless Standards Understanding the Role of IEEE & ZigBee™ in AMR & Submetering Mapping Your Future: From Data to Value AMRA 2003 International.
Bluetooth By Andrew Breen and Chris Backo. Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues.
Fall 2011 Patrick Johnson “The wireless telegraph is not difficult to understand. The ordinary telegraph is like a very long cat. You pull the.
An Analysis of Bluetooth Security
BZUpages.com. Advantages of Bluetooth Presented by: Shahbaz Hussain.
INTRODUCTION TO BLUETOOTH Named after tenth-century danish King Harald Blatand. Developed by Special Interest Group (SIG). Bluetooth wireless technology.
Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.
Bluetooth Presented by Venkateshwar R Gotur CMPT
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
Bluetooth Low Energy
IEEE &
By S.Karthika Menon N.Shanti sree.  Designed to connect both mobile devices and peripherals that currently requires a wire.  “USB without wires” 
GENERAL PRESENTATION ON BLUETOOTH Neeraj Dhiman.
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
PRESENTED BY M.A.M.JANI S.AMRUTHA RAJU M.A.M.JANI S.AMRUTHA RAJU.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
Wireless Security. Traditional method A computer with network card a cable connecting network card and the network.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Bluetooth In 1994, the L. M. Ericsson company became interested in connecting its mobile phones to other devices without cables. A SIG (Special Interest.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
©F.M. Rietti Radio Wave Communication Fundamentals.
“A TECHNOLOGY WHICH MAY OVERWRITE BLUETOOTH” BY V.BHEEM REDDY BTech(CSE) 07K91A0511.
Technology By :-. What Is Bluetooth? Designed to be used to connect both mobile devices and peripherals that currently require a wire Short range wireless.
Bluetooth Technology Mary Steiger October Introduction Bluetooth wireless technology is designed to replace cables connecting portable and other.
Exploring the World of Wireless James Taylor - COSC 352 Fall 2007.
COMPUTER FUNDAMENTALS David Samuel Bhatti
Wired and Wireless network management 1. outline 2 Wireless applications Wireless LAN Wireless LAN transmission medium WLAN modes WLAN design consideration.
Abdul Rahman Al-Refai Zavnura Pingkan. Introduction Bluetooth is a wireless technology for short range data and/ or voice communication The communication.
BLUETOOTH AT WORK. The Not So New Solution To The Wireless Office. Established 1998.
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
BLUETOOTH HACKING - Image the world without wireless By Indra Divya.K Kalasalingam University CSE-Final yr.
Pritee Parwekar. Requirements and Standards Some requirements for WSN deployment include: –Fault tolerance –Lifetime –Scalability –Real-time data.
A presentation by Abhijit Chakrabarty or Dept of Computer Sc. & Engg. Dream Institute of Technology.
Objective of this Presentation To understand what is Wi-Fi and what is Bluetooth. Difference between Bluetooth and Wi-Fi.
Wi-Fi Technology.
Bluetooth Presented by :- Sachin mogha
Instructor Materials Chapter 6 Building a Home Network
Bluetooth By.
Wireless Fidelity 1 1.
A Wireless LAN technologies IEEE
“I don’t have to be careful, I’ve got a gun.”
Wireless LAN 第一組 電機四 林長寬 B /11/24.
Bluetooth.
Emilia Nisha D’souza [ ]
Presentation transcript:

BLUETOOTH Margaret A. Sears St. Xavier University ACSG - Computer Networks for Internet Information Systems Spring 2005

What is Bluetooth? A wireless technology that was introduced five years ago; A wireless technology that was introduced five years ago; It was designed to replace cables that connect electronic equipment It was designed to replace cables that connect electronic equipment

Features Inexpensive Inexpensive Doesn’t require anything special to make it work Doesn’t require anything special to make it work It communicates on a frequency of 2.45 Ghz (the same frequency as baby monitors and garage door openers It communicates on a frequency of 2.45 Ghz (the same frequency as baby monitors and garage door openers Uses low power and spread-spectrum frequency hopping Uses low power and spread-spectrum frequency hopping

Future Features Further power optimization Further power optimization Security enhancements Security enhancements Quality of service Quality of service

Interference Avoidance Method #1 Low power Low power Limits the range to about 10 metersLimits the range to about 10 meters Signal is weak at 1 milliwatt (compared to cell phones at 3 watts)Signal is weak at 1 milliwatt (compared to cell phones at 3 watts)

Interference Avoidance Method #2 Spread-Spectrum Frequency Hopping Spread-Spectrum Frequency Hopping Uses 79 individual, randomly chosen frequencies within a designated range (compared to Japan, which uses 23 frequencies)Uses 79 individual, randomly chosen frequencies within a designated range (compared to Japan, which uses 23 frequencies) Changes frequencies 1,600 times every secondChanges frequencies 1,600 times every second Each channel is divided into time slots 625 microseconds longEach channel is divided into time slots 625 microseconds long

Bluetooth/ZigBee Similarities Both: Are types of IEEE “wireless personal-area networks”Are types of IEEE “wireless personal-area networks” Run in the 2.4 Ghz frequency bandRun in the 2.4 Ghz frequency band Use small form factors and low powerUse small form factors and low power

Bluetooth/ZigBee Differences Modulation technique Modulation technique B: Frequency Hopping Spread SpectrumB: Frequency Hopping Spread Spectrum Z: Direct Sequence Spread HoppingZ: Direct Sequence Spread Hopping Protocol stack size Protocol stack size B: 250 kbyteB: 250 kbyte Z: 28 kbyteZ: 28 kbyte Battery Battery B: intended for frequent rechargingB: intended for frequent recharging Z: not rechargeableZ: not rechargeable Maximum network speed Maximum network speed B: 1 Mbit/sB: 1 Mbit/s Z: 250 kbits/sZ: 250 kbits/s Network range Network range B: 1 or 100 metersB: 1 or 100 meters Z: up to 70 metersZ: up to 70 meters Typical network join time Typical network join time B: 3 secondsB: 3 seconds Z: 30 milisecondsZ: 30 miliseconds

Bluetooth/ZigBee Bluetooth is aimed toward: Bluetooth is aimed toward: User mobilityUser mobility Eliminating short distance cablingEliminating short distance cabling ZigBee is aimed toward: ZigBee is aimed toward: More grand-scale automationMore grand-scale automation Remote controlRemote control

Security Bluetooth Security Experts Group: Bluetooth Security Experts Group: A group of engineers from the member companies that make up the Bluetooth Special Interest GroupA group of engineers from the member companies that make up the Bluetooth Special Interest Group Provide critical security information and feedback as the specification evolvesProvide critical security information and feedback as the specification evolves

Security Product developers have several options for implementing security: Product developers have several options for implementing security: Three modes of security for Bluetooth access between two devices:Three modes of security for Bluetooth access between two devices: Non-secure Non-secure Service-level enforced Service-level enforced Link-level enforced Link-level enforced

Security Bluetooth devices have two levels of security: Bluetooth devices have two levels of security: Trusted device has unrestricted access to all servicesTrusted device has unrestricted access to all services Untrusted deviceUntrusted device Services have three levels of security: Services have three levels of security: Those that require authorization and authenticationThose that require authorization and authentication Those that require authorization onlyThose that require authorization only Those that are open to all devicesThose that are open to all devices

Security Breaches: Bluebugging Allows skilled individuals to access the mobile phone commands using Bluetooth wireless technology without notifying or alerting the phone’s user as long as the hacker is within a 10 meter range of the phone Allows the hacker to initiate phone calls, read and write phonebook contacts, eavesdrop on conversations and connect to the Internet

Security Breaches: Bluesnarfing Allows hackers to gain access to data stored on Bluetooth enabled phone using Bluetooth wireless technology without alerting the phone’s user of the connection made Without specialized equipment, the hacker must be in a 10 meter range of the device while running a device with specialized software Only specific older Bluetooth enabled phones are susceptible ker is within a 10 meter range of the phone Only specific older Bluetooth enabled phones are susceptible ker is within a 10 meter range of the phone

Security Solutions The manufacturers of the vulnerable phones have developed software patches to fix the problem The manufacturers of the vulnerable phones have developed software patches to fix the problem The device can be set to the non- discoverable mode when not using Bluetooth technology or when in an unknown area The device can be set to the non- discoverable mode when not using Bluetooth technology or when in an unknown area

References

Thank you!!!