Bluetooth By Richard B. Heisler, Jr. Villanova University Distributed Systems CSC 8530 Fall 2006 Instructor - Dr. Paul A. Schragger.

Slides:



Advertisements
Similar presentations
Security+ All-In-One Edition Chapter 10 – Wireless Security
Advertisements

Indian Institute of Technology Hyderabad Presented By : Harish Kumar, Tulasi Ram. Bluetooth.
Professor Nigel Linge Computer Networking and Telecommunications Research Group University of Salford.
A Preliminary Investigation of Worm Infections in a Bluetooth Environment PAPER REVIEW ANISH DUTTA RAGAVENDRAN SRINIVASAN SABAREESWAR.
BLUETOOTH. INTRODUCTION A look around at the moment! Keyboard connected to the computer, as well as a printer, mouse, monitor and so on. What (literally)
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
Chapter 7 Securing your Wireless Network (WIFI). Synopsis What is a wireless home network? What damage can a wireless network snoop do? Who are the snoopers?
BLUETOOTH Margaret A. Sears St. Xavier University ACSG - Computer Networks for Internet Information Systems Spring 2005.
Bluetooth What is it and where is it going?. Background…..   Conceived initially by Ericsson, before being adopted by a myriad of other companies, Bluetooth.
What is Bluetooth? Bluetooth technology is a peripheral that connects to a variety of products in order to provide wireless connections.
Bluetooth Ville Jounio Dap02s. Intoduction to Bluetooth Brief history How does it work? Other wireless methods Bluetooth devices today Future of Bluetooth.
Smartphones. Lesson Objectives To understand and demonstrate an understanding of Smartphones.
PROTOCOLSSTANDARDSEQUIPMENTBLUETOOTH CELL PHONE DATA NETWORKS ADVANTAGES/ DISADVANTAGES GENERAL INFORMATION Main Menu.
Bluetooth Jennifer Portillo Thomas Razo Samson Vuong By Sonny Leung.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
By Paul Capers.  A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves.
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 6 1 Real-Time Communication on the Internet Exploring Wireless Networks Tutorial.
To: Mr Riche By: Brittany Bennett.  Bluetooth is an open wireless technology standard for exchanging data over short distances (using short wavelength.
Prepared by:-Nirmal Dhruvi
Wireless Networking and Security
1 Chapter Overview Wireless Technologies Wireless Security.
Bluetooth & WPAN. 2 Bluetooth/WPAN WPAN (Wireless Personal Area Network) has a smaller area of coverage, say, 2.5 mW transmitter power, distance
Area 2 Computers & Technology Group 21 August 2008 Dean Steichen Br.#8.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
What is Blue Tooth ? Blue tooth is a cable replacement technology that can be used to connect almost any device to any other devices. Blue tooth is the.
Bluetooth Technology Jason Babel Kyle Musal Joshua Turella Zdravko Tyankov.
Wireless Communication. Learning Objectives: By the end of this topic you should be able to: describe wireless communication methods, describe wireless.
Specification section 6.2. What do you need to learn? The application and advantages/disadvantages of the following digital media and new technology in.
Wireless Communication Methods
University of Virginia 1 Gregory LammGerlando Falauto Jorge EstradaJag Gadiyaram November 29, 2000 Identifying and Assessing Security Issues related to.
BZUpages.com. Advantages of Bluetooth Presented by: Shahbaz Hussain.
INTRODUCTION TO BLUETOOTH Named after tenth-century danish King Harald Blatand. Developed by Special Interest Group (SIG). Bluetooth wireless technology.
Bluetooth Presented by Venkateshwar R Gotur CMPT
MANETS Justin Champion Room C203, Beacon Building Tel 3292,
By S.Karthika Menon N.Shanti sree.  Designed to connect both mobile devices and peripherals that currently requires a wire.  “USB without wires” 
GENERAL PRESENTATION ON BLUETOOTH Neeraj Dhiman.
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
PRESENTED BY M.A.M.JANI S.AMRUTHA RAJU M.A.M.JANI S.AMRUTHA RAJU.
Presented by Team A Wireless Home Networks By Abraham Kopyt, John Leonard, Christine Terry.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
SEMINAR ON BLUETOOTH TECHNOLOGY
INTRANETS MR ROSS UNIT 3 IT APPLICATIONS. DEFINITION An intranet is an internal, secured environment that has a similar look and feel to the Internet,
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Mobile Technology Last Mile Problem Solved 1. Mobile Web’s Potential Mobile Tech 2011 The Future is Now 2.
1 REMOTE CONTROL SYSTEM V7 2 Introduction.
Introduction to Networking. What is a Network? Discuss in groups.
Technology By :-. What Is Bluetooth? Designed to be used to connect both mobile devices and peripherals that currently require a wire Short range wireless.
By John Rodriguez COSC 356 SEC April 2015 Wireless Network Attacks.
Bluetooth Technology Mary Steiger October Introduction Bluetooth wireless technology is designed to replace cables connecting portable and other.
BluetoothTechnology Presenting By: AJAY DAGAR (ECE) Roll No: B.Tech VIIth Semester Inderprastha Engineering College.
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
A presentation by Abhijit Chakrabarty or Dept of Computer Sc. & Engg. Dream Institute of Technology.
Respected Ma’am & Dear friends
Objective of this Presentation To understand what is Wi-Fi and what is Bluetooth. Difference between Bluetooth and Wi-Fi.
Intention – Understanding the features of the following networks
How this name came? Harald Bluetooth was king of Denmark in the late 900s. United Denmark and Norway.
Instructor Materials Chapter 6 Building a Home Network
Physical layer protocol bluetooth
Bluetooth History and Uses.
Ultra Wideband Technology
“I don’t have to be careful, I’ve got a gun.”
Bluetooth: Vision, Goals and Architecture
Bluetooth Profiles.
Bluetooth.
PREPARED BY: RIDDHI PATEL (09CE085)
Emilia Nisha D’souza [ ]
Presentation transcript:

Bluetooth By Richard B. Heisler, Jr. Villanova University Distributed Systems CSC 8530 Fall 2006 Instructor - Dr. Paul A. Schragger

What I Knew 2 Weeks Ago There were devices that use Bluetooth There were devices that use Bluetooth

History of Bluetooth – the Name Named after 10 th C King of Denmark and Norway – he unified warring tribes Named after 10 th C King of Denmark and Norway – he unified warring tribes Bluetooth Technology meant to unify technologies such as personal computers, cameras, game consoles, printers, & mobile phones. Bluetooth Technology meant to unify technologies such as personal computers, cameras, game consoles, printers, & mobile phones.

What is Bluetooth, Really? Technology that connects devices – wirelessly Technology that connects devices – wirelessly Devices “sense” other devices Devices “sense” other devices It’s a networking standard It’s a networking standard

It’s a Network? Personal Area Network Personal Area Network Classes 100 m, 10 m, & 1 m Classes 100 m, 10 m, & 1 m Two Levels of Agreement Two Levels of Agreement Physical Level – radio-frequency standard (2.45 gHz) Physical Level – radio-frequency standard (2.45 gHz) Protocol Protocol When bits are sent When bits are sent How many bits are sent How many bits are sent Standard 1 Mbps Standard 1 Mbps Standard 3 Mbps (backwards compatible) Standard 3 Mbps (backwards compatible) Ensure that the message received was the message sent Ensure that the message received was the message sent

Isn’t 2.45 gHz the same as…? Yes Yes Garage door openers Garage door openers Baby Monitors Baby Monitors Cordless Phones Cordless Phones How do avoid a clash of signals? How do avoid a clash of signals? Very weak signal - can’t be processed by others Very weak signal - can’t be processed by others 1 milliwatt 1 milliwatt

But 2.45 gHz is a Tiny Slice Frequency Hopping Frequency Hopping Bluetooth device hops 1600 time per second Bluetooth device hops 1600 time per second

No, Piconet is not a Pokemon Character When Bluetooth devices come within range of each other a conversation begins. When Bluetooth devices come within range of each other a conversation begins. A network is formed A network is formed The entire network frequency hops in unison The entire network frequency hops in unison

Any device? Is it safe? No. The automatic inclusion makes it highly susceptible to bad guys No. The automatic inclusion makes it highly susceptible to bad guys Yes… sort of… Yes… sort of… Security Modes Security Modes Device Manufacturer decide Device Manufacturer decide

What Modes? Users can establish “trusted devices” Users can establish “trusted devices” Exchange data – no questions asked Exchange data – no questions asked Service-level – user actively decides Service-level – user actively decides Authorization Authorization Authentication Authentication Identification Identification Device-level Device-level Non-discoverable mode - “you can’t see me” Non-discoverable mode - “you can’t see me”

Aren’t Hackers Clever? Nasty is more like it Nasty is more like it Infected files Infected files Bluejacking Bluejacking Send “Business Card” to all in 10 m Send “Business Card” to all in 10 m Receiver opens & sender is put in address book Receiver opens & sender is put in address book Sender can issue messages at will as a “known contact” Sender can issue messages at will as a “known contact” Bluebugging Bluebugging Allows attacker to use phone features w/o owner knowledge Allows attacker to use phone features w/o owner knowledge

More Hacks? You Bet! You Bet! Car Whisperer Car Whisperer Allows attackers to send and receive audio from a car’s Bluetooth enabled stereo Allows attackers to send and receive audio from a car’s Bluetooth enabled stereo Bluesnarfing Bluesnarfing Allows attackers access to calendars, contact lists, s, and text messages. Allows attackers access to calendars, contact lists, s, and text messages. You want the source code? It’s easy to get. You want the source code? It’s easy to get.

Benefits Low user interactivity Low user interactivity Little battery usage = less need for recharging Little battery usage = less need for recharging Chip set $3 = cheaper product vs. WiFi, etc Chip set $3 = cheaper product vs. WiFi, etc Small batteries = small devices = high portability Small batteries = small devices = high portability Good firmware/software = high flexibility Good firmware/software = high flexibility Some security features Some security features

Tie it together Friend calls on cell phone – tell him to call back in 5 minutes Friend calls on cell phone – tell him to call back in 5 minutes Drive home Drive home GPS sends route map to cell phone GPS sends route map to cell phone Go in the house Go in the house Map route is sent to PC from cell phone Map route is sent to PC from cell phone Friend calls but your landline rings (but he called same #) Friend calls but your landline rings (but he called same #) Address book, contacts list, and calendar are loaded to home PC Address book, contacts list, and calendar are loaded to home PC

Bibliography Wikipedia.org “Bluetooth” - Wikipedia.org “Bluetooth” Bluetooth.com - Bluetooth.com - Bluetooth.org - Bluetooth.org - Howstuffworks.com - Howstuffworks.com Commsdesign.com Commsdesign.com