Bluetooth By Andrew Breen and Chris Backo. Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues.

Slides:



Advertisements
Similar presentations
Wi-Fi Technology.
Advertisements

Indian Institute of Technology Hyderabad Presented By : Harish Kumar, Tulasi Ram. Bluetooth.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013 Connecting.
BLUETOOTH. INTRODUCTION A look around at the moment! Keyboard connected to the computer, as well as a printer, mouse, monitor and so on. What (literally)
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
Infrared Data Association and Bluetooth Technology EE566 presentation
Wireless Security.
Short Distance Wireless Communication. Team 5 Thomas French Jordan Harris Mike Symanow Luseane Tangataevaha.
Project Proposal: Security Threats for Wireless Devices Matt Fratkin April 11 th, 2005 E6886.
Wireless UTC Jess Williams Wireless Network Administrator Robbie Reel Network Operations Manager Christopher Howard Senior Network Engineer.
Paper Presentation Wi-Fi (802.11b) and Bluetooth: Enabling Coexistence Jim Lansford, Ron Nevo, and Brett Monello CSC8900 Presented by: Tu Tran.
Vocabulary Terms Adapted from “Cooling Systems” – CTAE Information Technology Essentials PROFITT.
Bluetooth Jennifer Portillo Thomas Razo Samson Vuong By Sonny Leung.
Bluetooth Network Prepared By: Sara Ayad Aldehany.
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji.
Bluetooth Introduction The Bluetooth Technology
WIRELESS NETWORKING Presenter: Nhan Nguyên Phương.
Stacy Drake Bluetooth Vs. Wi-Fi. What is Bluetooth?
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 6 1 Real-Time Communication on the Internet Exploring Wireless Networks Tutorial.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module E Network Basics.
Wireless Versus Wired Network Components By: Steven R. Yasoni & Dario Strazimiri.
PC Support & Repair Chapter 13 Advanced Laptops & Portable Devices.
Wireless Networks This section Contain : 1) Wireless Basics. 2) Bluetooth. 3) Wi-Fi. 4) Wi-Fi Equipment. 5)Wi-Fi Setup.
“Security Weakness in Bluetooth” M.Jakobsson, S.Wetzel LNCS 2020, 2001 The introduction of new technology and functionality can provides its users with.
Bluetooth Technology Jason Babel Kyle Musal Joshua Turella Zdravko Tyankov.
COMMUNICATION SYSTEM (2) CT1401 LECTURE-9 : MOBILE PHONE BY : AFNAN ALAYYASH SUPERVISION : DR.OUIEM BCHIR.
Why go Wireless? By Cheryl Aupperle The Start…. Wireless communication is something we all are familiar with. Think about using a walkie- talkie, listening.
Wireless Networks Tamus, Zoltán Ádám
Wireless Security: Protect yourself when you’re mobile.
Bluetooth Presented by Venkateshwar R Gotur CMPT
MAHARANA PRATAP COLLEGE OF TECHNOLOGY, GWALIOR
Guided by: Jenela Prajapati Presented by: (08bec039) Nikhlesh khatra.
PRESENTATION ON WI-FI TECHNOLOGY
1. Outlines Introduction What is Wi-Fi ? Wi-Fi Standards Hotspots Wi-Fi Network Elements How a Wi-Fi Network Works Advantages and Limitations of Wi-Fi.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
Wi-Fi Technology. Agenda Introduction Introduction History History Wi-Fi Technologies Wi-Fi Technologies Wi-Fi Network Elements Wi-Fi Network Elements.
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
A tree line has a central line connecting together a series of star networks. The server is connected to a central line. Tree Network As the star, and.
WIRELESS NETWORKING TOT AK Agenda Introduction to Wireless Technologies Wireless Networking Overview Non-Technical considerations Other Comparable.
Presented by Team A Wireless Home Networks By Abraham Kopyt, John Leonard, Christine Terry.
Bluetooth Techniques Chapter 15. Overview of Bluetooth Initially developed by Swedish mobile phone maker in 1994 to let laptop computers make calls over.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
SEMINAR ON BLUETOOTH TECHNOLOGY
Wireless Security. Traditional method A computer with network card a cable connecting network card and the network.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
Mohammed F & Aya. Peer-to-peer network are usually common in homes and small businesses and are not necessarily expensive. On a peer-to-peer network each.
Wireless Networks Standards and Protocols & x Standards and x refers to a family of specifications developed by the IEEE for.
NETWORKING & SYSTEM UPDATES
7 - 1 Session 7 Wireless Security Wireless LANs (WLANs) Use radio or infrared frequencies to transmit signals through the air (instead of cables)
Your Interactive Guide to the Digital World Discovering Computers 2012 Chapter 9 Networks and Communications.
Wireless Networking Devices. wireless LAN adapter cards wireless access Points wireless bridges wireless routers.
There is a lot to talk about if we think of the advantages of a wireless connection, the most important of its aspects is mobility and everything that.
PRESENTATION ON. What is a Wi-Fi Hotspot? A Wi-Fi hotspot is location or access point where you can access wireless broadband using a wireless enabled.
Introducing Networks and the Internet Mrs. Wilson Rocky Point High School.
Urban Wireless Internet Amenity BANDWIDTH BAY City of San Diego Economic Development Corporation Downtown Partnership Downtown Business Government and.
11-Jun-16 Seminar on BLUETOOTH.
Wireless Networking Presented by: Jeffrey D. Bombell, American Computer Technologies.
BluetoothTechnology Presenting By: AJAY DAGAR (ECE) Roll No: B.Tech VIIth Semester Inderprastha Engineering College.
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
ICT Unit 4: Network and the effects of using them
Objective of this Presentation To understand what is Wi-Fi and what is Bluetooth. Difference between Bluetooth and Wi-Fi.
Wi-Fi Brandon & Jiayang. What is Wi-Fi? Wi-Fi (wireless fidelity) is a wireless networking technology that allows devices to communicate without wires.
Wireless Technologies
Presented by: Jeffrey D. Bombell, American Computer Technologies
Mobile Phone Techniques
Wi-Fi Technology By : Pranav Mandora Rikin Mistry LDRP-EC.
Bluetooth.
Emilia Nisha D’souza [ ]
Presentation transcript:

Bluetooth By Andrew Breen and Chris Backo

Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues

What is Bluetooth? Bluetooth devices allow wireless communication. It operates at 2.4 GHz and is capable of transmitting voice and data. The effective range of Bluetooth devices is 32 feet. Some devices may have an extended range Bluetooth transfers data at the rate of 721 Kbps. It uses similar frequencies to microwave ovens and cordless phones, but it should not interfere or be interrupted as a result.

What is it for? Bluetooth can be used to wirelessly transfer data among devices. Some examples of it’s use are: –synchronizing contact and calendar information among desktop and notebook computers as well as cell phones and palm pilots. –accessing a network or the Internet with a notebook computer by connecting wirelessly to a cellular phone.

Bluetooth vs Wi-Fi Both use same frequency range Wi-Fi has greater range and higher bandwidth (meaning greater power usage and more expensive hardware) Wi-Fi analogous to Ethernet, Bluetooth analogous to USB

Product Information Some products that are sold Bluetooth enabled are: –Cell phones and wireless headsets –Desktops and laptops –PDAs –Printers –keyboards and mice –Kitchen appliances such as refrigerators, and microwave ovens –Cars

Installation Process We installed Bluetooth on a machine using a windows operating system. We used software included with a Belkin USB bluetooth adapter Once installed, software allows you to find other Bluetooth devices and communicate with them

Demonstration We will now attempt to locate another Bluetooth device and communicate with it Does anyone have a Bluetooth enabled device? (such as a cellphone)

Security Measures Conversations over Bluetooth are encrypted. They also use Frequency-Hopping Spread Spectrum (FHSS). The two machines switch frequencies (randomly out of 79 total) in a synchronized fashion 1,600 times per second. However, this is pointless if an intruder can obtain the proper synchronization.

Security Risks Bluetooth allows short passwords and pin numbers. The master encryption key is shared openly, thus worthless because everyone can decrypt. Unit keys are dangerous to use more than once because they become publicly accessible once they are used. There is no user authentication, only device authentication. Thus, an unauthorized user with an authorized device can obtain access to the network.

Security Attacks Man in the Middle Attack –3 devices, A, B, and C. –A talks to B and C and shares it’s unit key with both. –The user on device C can easily eavesdrop on A and B’s conversation, because A uses the same unit key to communicate with both devices. Denial of Service Attack – –Include flooding techniques, battery exhaustion, and jamming techniques.

Security Breaches Discovered in June 2004, SYMBOS_CABIR was the 1 st virus said to have spread only via the Bluetooth- enabled devices. Cell phone viruses are becoming more common. They can delete/change information, drain batteries, and make long-distance phone calls.