Download presentation
Presentation is loading. Please wait.
1
BLUETOOTH Margaret A. Sears St. Xavier University ACSG - Computer Networks for Internet Information Systems Spring 2005
2
What is Bluetooth? A wireless technology that was introduced five years ago; A wireless technology that was introduced five years ago; It was designed to replace cables that connect electronic equipment It was designed to replace cables that connect electronic equipment
3
Features Inexpensive Inexpensive Doesn’t require anything special to make it work Doesn’t require anything special to make it work It communicates on a frequency of 2.45 Ghz (the same frequency as baby monitors and garage door openers It communicates on a frequency of 2.45 Ghz (the same frequency as baby monitors and garage door openers Uses low power and spread-spectrum frequency hopping Uses low power and spread-spectrum frequency hopping
4
Future Features Further power optimization Further power optimization Security enhancements Security enhancements Quality of service Quality of service
5
Interference Avoidance Method #1 Low power Low power Limits the range to about 10 metersLimits the range to about 10 meters Signal is weak at 1 milliwatt (compared to cell phones at 3 watts)Signal is weak at 1 milliwatt (compared to cell phones at 3 watts)
6
Interference Avoidance Method #2 Spread-Spectrum Frequency Hopping Spread-Spectrum Frequency Hopping Uses 79 individual, randomly chosen frequencies within a designated range (compared to Japan, which uses 23 frequencies)Uses 79 individual, randomly chosen frequencies within a designated range (compared to Japan, which uses 23 frequencies) Changes frequencies 1,600 times every secondChanges frequencies 1,600 times every second Each channel is divided into time slots 625 microseconds longEach channel is divided into time slots 625 microseconds long
7
Bluetooth/ZigBee Similarities Both: Are types of IEEE 802.5 “wireless personal-area networks”Are types of IEEE 802.5 “wireless personal-area networks” Run in the 2.4 Ghz frequency bandRun in the 2.4 Ghz frequency band Use small form factors and low powerUse small form factors and low power
8
Bluetooth/ZigBee Differences Modulation technique Modulation technique B: Frequency Hopping Spread SpectrumB: Frequency Hopping Spread Spectrum Z: Direct Sequence Spread HoppingZ: Direct Sequence Spread Hopping Protocol stack size Protocol stack size B: 250 kbyteB: 250 kbyte Z: 28 kbyteZ: 28 kbyte Battery Battery B: intended for frequent rechargingB: intended for frequent recharging Z: not rechargeableZ: not rechargeable Maximum network speed Maximum network speed B: 1 Mbit/sB: 1 Mbit/s Z: 250 kbits/sZ: 250 kbits/s Network range Network range B: 1 or 100 metersB: 1 or 100 meters Z: up to 70 metersZ: up to 70 meters Typical network join time Typical network join time B: 3 secondsB: 3 seconds Z: 30 milisecondsZ: 30 miliseconds
9
Bluetooth/ZigBee Bluetooth is aimed toward: Bluetooth is aimed toward: User mobilityUser mobility Eliminating short distance cablingEliminating short distance cabling ZigBee is aimed toward: ZigBee is aimed toward: More grand-scale automationMore grand-scale automation Remote controlRemote control
10
Security Bluetooth Security Experts Group: Bluetooth Security Experts Group: A group of engineers from the member companies that make up the Bluetooth Special Interest GroupA group of engineers from the member companies that make up the Bluetooth Special Interest Group Provide critical security information and feedback as the specification evolvesProvide critical security information and feedback as the specification evolves
11
Security Product developers have several options for implementing security: Product developers have several options for implementing security: Three modes of security for Bluetooth access between two devices:Three modes of security for Bluetooth access between two devices: Non-secure Non-secure Service-level enforced Service-level enforced Link-level enforced Link-level enforced
12
Security Bluetooth devices have two levels of security: Bluetooth devices have two levels of security: Trusted device has unrestricted access to all servicesTrusted device has unrestricted access to all services Untrusted deviceUntrusted device Services have three levels of security: Services have three levels of security: Those that require authorization and authenticationThose that require authorization and authentication Those that require authorization onlyThose that require authorization only Those that are open to all devicesThose that are open to all devices
13
Security Breaches: Bluebugging Allows skilled individuals to access the mobile phone commands using Bluetooth wireless technology without notifying or alerting the phone’s user as long as the hacker is within a 10 meter range of the phone Allows the hacker to initiate phone calls, read and write phonebook contacts, eavesdrop on conversations and connect to the Internet
14
Security Breaches: Bluesnarfing Allows hackers to gain access to data stored on Bluetooth enabled phone using Bluetooth wireless technology without alerting the phone’s user of the connection made Without specialized equipment, the hacker must be in a 10 meter range of the device while running a device with specialized software Only specific older Bluetooth enabled phones are susceptible ker is within a 10 meter range of the phone Only specific older Bluetooth enabled phones are susceptible ker is within a 10 meter range of the phone
15
Security Solutions The manufacturers of the vulnerable phones have developed software patches to fix the problem The manufacturers of the vulnerable phones have developed software patches to fix the problem The device can be set to the non- discoverable mode when not using Bluetooth technology or when in an unknown area The device can be set to the non- discoverable mode when not using Bluetooth technology or when in an unknown area
16
References http://www.wirelessip.info> http://www.wirelessip.info> http://www.wirelessip.info http://www.electronics.howstuffworks.com/bluetooth http://www.electronics.howstuffworks.com/bluetooth http://www.electronics.howstuffworks.com/bluetooth http://www.rockymountainnews.com http://www.rockymountainnews.com http://www.techworld.com http://www.techworld.com http://www.techworld.com http://www.palowireless.com http://www.palowireless.com http://www.palowireless.com http://www.businessweek.com http://www.businessweek.com http://www.businessweek.com http://www.bluetooth.com http://www.bluetooth.com
17
Thank you!!!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.