Download presentation
Presentation is loading. Please wait.
1
Bluetooth
2
Introduction What is Bluetooth? What does it do? History of Bluetooth
3
Introduction (cont’d)
Is Bluetooth here to stay? What should we expect from Bluetooth in the future?
4
What Bluetooth Delivers to the end-user
Connects a wide range of computing and telecommunication devices Expand communication capabilities Devices can communicate with each other with wireless connectivity
5
User Application E-Mail / Internet / Intranet Access Headsets
Car manufactures Industry / Internet / Intranet Access Headsets Bluetooth will facilitate Local Area Networks
6
Source: http//:www.motorola.com
Bluetooth in Action In the Office ... In the house Source: http//:
7
Home Security On the Road Source: http//:
8
Source: http//:www.motorola.com
On your Car Source: http//:
9
Bluetooth Specifications
Things that you must have: Transceivers and Receivers that can send and receive data because they use Radio Waves. MAC Address (Physical Address) Burnt on the NIC card by the manufacturer. PIN Number To identify the user using the device. A Piconet A FHHS protocol
10
What is a Piconet? A Piconet session is a communication link that must be created between devices for devices to communicate with each other. This is done when the MAC address and the PIN number match.
11
Piconet (cont.) If two devices come onto contact with each other( 32 feet) the user will be prompted to initiate a communication session Users then can either deny or accept the request to initiate a session Only devices approved by the user can take part in the session Data will appear as noise to unauthorized devices (A great security feature).
12
FHHS Bluetooth devices use a protocol called (FHHS) Frequency-Hopping Spread Spectrum . Uses packet-switching to send data. Bluetooth sends packets of data on a range of frequencies. In each session one device is a master and the others are slaves. The master device decides at which frequency data will travel.
13
FHHS Transceivers “hop” among 79 different frequencies in the 2.4 GHz baud at a rate of 1600 frequency hops per second. The master device tells the slaves at what frequency data will be sent. This technique allows devices to communicate with each other more securely.
14
FHHS Example Source:
15
Bluetooth Security Modes Security Mode 1 Security Mode 2
No Security Security Mode 2 Service Level Enforced Security Implemented after channel is established Security Mode 3 Link Level Enforced Security Implemented before channel is established
16
Devices “Trusted” “Untrusted” No Restrictions
Restrictions, Access is limited
17
Service Levels Authorization and Authentication Authentication Only
Open to all Devices
18
Link Level Bluetooth Device Address Private Link Key
Private Encryption Key Random Number
19
Bluetooth Secure Enough?
Not enough for confidential and top secret information now but . . . Security will Improve Improve exisiting security Implement new security
20
Wrap up Growing Technology Automation
21
For More Information Please Visit The Following Sites
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.