Bluetooth Kirthika Parmeswaran Telcordia Technologies OOPSLA’2000
Bluetooth Short range, high speed LAN protocol (1M – 2Mbit/s) Encompass a standard communications interface and a low-cost computer chip Combines the DECT (Digital European Cordless Telephone) and iRDA (infraRed Data Association) technologies Open specification Enables users to connect their mobile devices via wireless short-range radio links unimpeded by line-of- sight restrictions Can be used as a WAP bearer
Bluetooth Architecture LMP: Link Management Protocol L2CAP: Logical Link Control And Adaptation Protocol SDP: Service Discovery Protocol TCS BIN: Telephony Control Protocol – Binary RFCOMM: emulates RS 232, cable replacement protocol OBEX: Object Exchange Protocol
Complementary Capabilities to Jini™ Service Discovery Layer using the Service Discovery Protocol (SDP) SDP can be used to: - search for services by service class or attributes - service browsing Security levels for devices and services –device trust levels –service levels –default security level for legacy applications Limitations in the security: device level, access control only at set-up
Usage Models Each usage model has a profile defined, e.g – generic access profile (GAP) –the serial port profile –the service discovery application profile –generic object exchange profile Usage models commonly used –File Transfer –Internet Bridge –LAN access –Three-in-one phone –Ultimate Headset
Conclusion Bluetooth can be used as an underlying protocol to Jini (see also Sun white paper on Jini™ Technology and Emerging Network Technologies) Bluetooth could serve as an area of pattern mining for ad hoc networking
Bluetooth Security Architecture Security levels for devices and services (1) device trust levels (2) service levels <authentication + authorization, authentication only, open to all> (3) Default security level for legacy applications Limitations (1) Legacy application need a “adapter application” for security (2) Only device is authenticated not user (3) No mechanism defined to preset authorization per service (4) Access control only at connection set-up time (5) unidirectional traffic not possible after access check (6) For “end-to-end” security higher level services required
Security built over Bluetooth Security Manager - stores security related information on services and devices - performs access checks - helps to set up trusted relationships at the device level - initiates pairing and query PIN entry by the user - checks whether a service does not permit connectionless data packets when needed
Usage Models Each usage model has a profile defined, e.g generic access profile (GAP), the serial port profile, the service discovery application profile (SDAP), and the generic object exchange profile (GOEP) Usage models commonly used include File Transfer, Internet Bridge, LAN access, Three-in-one phone, Ultimate Headset
Protocols in the Bluetooth Architecture The Specification also defines a Host Controller Interface (HCI), which provides a command interface to the baseband controller, link manager, and access to hardware status and control registers. It can be positioned above/below L2CAP