Bluetooth Jennifer Portillo Thomas Razo Samson Vuong By Sonny Leung.

Slides:



Advertisements
Similar presentations
BLUETOOTH. INTRODUCTION A look around at the moment! Keyboard connected to the computer, as well as a printer, mouse, monitor and so on. What (literally)
Advertisements

1 Introduction to Bluetooth v1.1 (Part I) Overview Radio Specification Baseband Specification LMP L2CAP.
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
Remote Desktop Connection Techniques Wireless Communication Networks.
CPET 260 Bluetooth. What is Bluetooth? Not IEEE (Wi-Fi) or HomeRF Originally designed to replace wires Short-range, lower-power wireless technology.
Overview The Basics Core Specification Version Spectrum International Radio Frequency Allocation Range Power Benefits Protocol Stack Bluetooth Architecture.
December 17, Wi-Fi Mark Faggiano GBA 576. December 17, Purpose of the Project  I hear Wi-Fi, WLAN, everywhere  What does it all.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale Wireless & Network Security Lecture 10:
BLUETOOTH The Universal Radio Interface for ad hoc, Wireless Connectivity By Jeffrey Adams.
Sujeeth Narayan1 Smartphones Security CS 691 Sujeeth Narayan.
Chapter 9 Communications and Network Tyler Clutts.
BLUETOOTH.
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji.
Bluetooth Introduction The Bluetooth Technology
Stacy Drake Bluetooth Vs. Wi-Fi. What is Bluetooth?
Embedded Bluetooth Gang Xie presents to EE281 Class Stanford University 11/22/2002.
Computer Networks. Network Connections Ethernet Networks Single wire (or bus) runs to all machines Any computer can send info to another computer Header.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 50 – The Wireless LAN.
Overview of Wireless LANs Use wireless transmission medium Issues of high prices, low data rates, occupational safety concerns, & licensing requirements.
Wireless and Security CSCI 5857: Encoding and Encryption.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Bluetooth Technology Jason Babel Kyle Musal Joshua Turella Zdravko Tyankov.
Bluetooth By Richard B. Heisler, Jr. Villanova University Distributed Systems CSC 8530 Fall 2006 Instructor - Dr. Paul A. Schragger.
Introduction to Networking. Key Terms packet  envelope of data sent between computers server  provides services to the network client  requests actions.
Why go Wireless? By Cheryl Aupperle The Start…. Wireless communication is something we all are familiar with. Think about using a walkie- talkie, listening.
Wireless Networks Tamus, Zoltán Ádám
Bluetooth By Andrew Breen and Chris Backo. Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues.
Unit 1—Computer Basics Lesson 7 Networks.
Wireless Communication Methods
Bluetooth Address or Name Sharing By Joseph Charboneau.
Bluetooth Submitted to: Doctor : Rabie Ramadan Submitted by: Khaled Mohammed Ali Hassan Master’s Student, Cairo University/2011.
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
 2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 23 - Bluetooth™ Wireless Technology Outline 23.1 Introduction 23.2 History of Bluetooth Wireless.
By S.Karthika Menon N.Shanti sree.  Designed to connect both mobile devices and peripherals that currently requires a wire.  “USB without wires” 
Computer by S.Shrestha (comp 251)
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
PRESENTED BY M.A.M.JANI S.AMRUTHA RAJU M.A.M.JANI S.AMRUTHA RAJU.
Presented by Team A Wireless Home Networks By Abraham Kopyt, John Leonard, Christine Terry.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
SEMINAR ON BLUETOOTH TECHNOLOGY
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Network Components David Blakeley LTEC HUB A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN.
Overview of the security weaknesses in Bluetooth Dave Singelée COSIC seminar 11/06/2003.
Individual Project 1 Sarah Pritchard. Fran, a customer of your company, would like to visit your company’s website from her home computer… How does your.
JPMA PROJECT PRESENTATION (ITU) 1 INTRODUCTION BLUETOOTH CHAT DESIGN JAVA ON MOBILE DEVICE Presenters Benjamin Boateng Abass Omer Venkateshwar Rao Namilakonda.
©F.M. Rietti Radio Wave Communication Fundamentals.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Technology By :-. What Is Bluetooth? Designed to be used to connect both mobile devices and peripherals that currently require a wire Short range wireless.
Abdul Rahman Al-Refai Zavnura Pingkan. Introduction Bluetooth is a wireless technology for short range data and/ or voice communication The communication.
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
Respected Ma’am & Dear friends
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Wireless LANs.
Instructor Materials Chapter 6 Building a Home Network
A Wireless LAN technologies IEEE
“I don’t have to be careful, I’ve got a gun.”
BLUETOOTH AND ITS APPLICATION IN MOBILE PHONES
Bluetooth.
PREPARED BY: RIDDHI PATEL (09CE085)
Presentation transcript:

Bluetooth Jennifer Portillo Thomas Razo Samson Vuong By Sonny Leung

Introduction What is Bluetooth? What is Bluetooth? What does it do? What does it do? History of Bluetooth History of Bluetooth

Introduction (cont’d) Is Bluetooth here to stay? Is Bluetooth here to stay? What should we expect from Bluetooth in the future? What should we expect from Bluetooth in the future?

What Bluetooth Delivers to the end-user Connects a wide range of computing and telecommunication devices Connects a wide range of computing and telecommunication devices Expand communication capabilities Expand communication capabilities Devices can communicate with each other with wireless connectivity Devices can communicate with each other with wireless connectivity

User Application Car manufactures Industry Car manufactures Industry / Internet / Intranet Access / Internet / Intranet Access Headsets Headsets Bluetooth will facilitate Local Area Networks Bluetooth will facilitate Local Area Networks

Bluetooth in Action Source: http//: In the Office... In the Office... In the house

Home Security On the Road Source: http//:

On your Car Source: http//:

Bluetooth Specifications Things that you must have: Things that you must have: –Transceivers and Receivers that can send and receive data because they use Radio Waves. –MAC Address (Physical Address) Burnt on the NIC card by the manufacturer. Burnt on the NIC card by the manufacturer. –PIN Number To identify the user using the device. To identify the user using the device. –A Piconet –A FHHS protocol

What is a Piconet? A Piconet session is a communication link that must be created between devices for devices to communicate with each other. A Piconet session is a communication link that must be created between devices for devices to communicate with each other. This is done when the MAC address and the PIN number match. This is done when the MAC address and the PIN number match.

Piconet (cont.) If two devices come onto contact with each other( 32 feet) the user will be prompted to initiate a communication session If two devices come onto contact with each other( 32 feet) the user will be prompted to initiate a communication session Users then can either deny or accept the request to initiate a session Users then can either deny or accept the request to initiate a session Only devices approved by the user can take part in the session Only devices approved by the user can take part in the session Data will appear as noise to unauthorized devices(A great security feature). Data will appear as noise to unauthorized devices(A great security feature).

FHHS Bluetooth devices use a protocol called (FHHS) Frequency-Hopping Spread Spectrum. Bluetooth devices use a protocol called (FHHS) Frequency-Hopping Spread Spectrum. Uses packet-switching to send data. Uses packet-switching to send data. Bluetooth sends packets of data on a range of frequencies. Bluetooth sends packets of data on a range of frequencies. In each session one device is a master and the others are slaves. In each session one device is a master and the others are slaves. The master device decides at which frequency data will travel. The master device decides at which frequency data will travel.

FHHS Transceivers “hop” among 79 different frequencies in the 2.4 GHz baud at a rate of 1600 frequency hops per second. Transceivers “hop” among 79 different frequencies in the 2.4 GHz baud at a rate of 1600 frequency hops per second. The master device tells the slaves at what frequency data will be sent. The master device tells the slaves at what frequency data will be sent. This technique allows devices to communicate with each other more securely. This technique allows devices to communicate with each other more securely.

FHHS Example Source:

Bluetooth Security Modes Modes –Security Mode 1 No Security No Security –Security Mode 2 Service Level Enforced Security Service Level Enforced Security Implemented after channel is established Implemented after channel is established –Security Mode 3 Link Level Enforced Security Link Level Enforced Security Implemented before channel is established Implemented before channel is established

Devices “Trusted” “Trusted” –No Restrictions “Untrusted” “Untrusted” –Restrictions, Access is limited

Service Levels Authorization and Authentication Authorization and Authentication Authentication Only Authentication Only Open to all Devices Open to all Devices

Link Level Bluetooth Device Address Bluetooth Device Address Private Link Key Private Link Key Private Encryption Key Private Encryption Key Random Number Random Number

Bluetooth Secure Enough? Not enough for confidential and top secret information now but... Not enough for confidential and top secret information now but... Security will Improve Security will Improve –Improve exisiting security –Implement new security

Wrap up Growing Technology Growing Technology Automation Automation

For More Information Please Visit The Following Sites