Download presentation
Presentation is loading. Please wait.
Published byLenard Peters Modified over 9 years ago
1
Bluetooth By Richard B. Heisler, Jr. Villanova University Distributed Systems CSC 8530 Fall 2006 Instructor - Dr. Paul A. Schragger
2
What I Knew 2 Weeks Ago There were devices that use Bluetooth There were devices that use Bluetooth
3
History of Bluetooth – the Name Named after 10 th C King of Denmark and Norway – he unified warring tribes Named after 10 th C King of Denmark and Norway – he unified warring tribes Bluetooth Technology meant to unify technologies such as personal computers, cameras, game consoles, printers, & mobile phones. Bluetooth Technology meant to unify technologies such as personal computers, cameras, game consoles, printers, & mobile phones.
4
What is Bluetooth, Really? Technology that connects devices – wirelessly Technology that connects devices – wirelessly Devices “sense” other devices Devices “sense” other devices It’s a networking standard It’s a networking standard
5
It’s a Network? Personal Area Network Personal Area Network Classes 100 m, 10 m, & 1 m Classes 100 m, 10 m, & 1 m Two Levels of Agreement Two Levels of Agreement Physical Level – radio-frequency standard (2.45 gHz) Physical Level – radio-frequency standard (2.45 gHz) Protocol Protocol When bits are sent When bits are sent How many bits are sent How many bits are sent Standard 1.0 @ 1 Mbps Standard 1.0 @ 1 Mbps Standard 2.0 @ 3 Mbps (backwards compatible) Standard 2.0 @ 3 Mbps (backwards compatible) Ensure that the message received was the message sent Ensure that the message received was the message sent
6
Isn’t 2.45 gHz the same as…? Yes Yes Garage door openers Garage door openers Baby Monitors Baby Monitors Cordless Phones Cordless Phones How do avoid a clash of signals? How do avoid a clash of signals? Very weak signal - can’t be processed by others Very weak signal - can’t be processed by others 1 milliwatt 1 milliwatt
7
But 2.45 gHz is a Tiny Slice Frequency Hopping Frequency Hopping Bluetooth device hops 1600 time per second Bluetooth device hops 1600 time per second http://electronics.howstuffworks.com/bluetooth1.htm http://electronics.howstuffworks.com/bluetooth1.htm http://electronics.howstuffworks.com/bluetooth1.htm
8
No, Piconet is not a Pokemon Character When Bluetooth devices come within range of each other a conversation begins. When Bluetooth devices come within range of each other a conversation begins. A network is formed A network is formed The entire network frequency hops in unison The entire network frequency hops in unison
9
Any device? Is it safe? No. The automatic inclusion makes it highly susceptible to bad guys No. The automatic inclusion makes it highly susceptible to bad guys Yes… sort of… Yes… sort of… Security Modes Security Modes Device Manufacturer decide Device Manufacturer decide
10
What Modes? Users can establish “trusted devices” Users can establish “trusted devices” Exchange data – no questions asked Exchange data – no questions asked Service-level – user actively decides Service-level – user actively decides Authorization Authorization Authentication Authentication Identification Identification Device-level Device-level Non-discoverable mode - “you can’t see me” Non-discoverable mode - “you can’t see me”
11
Aren’t Hackers Clever? Nasty is more like it Nasty is more like it Infected files Infected files Bluejacking Bluejacking Send “Business Card” to all in 10 m Send “Business Card” to all in 10 m Receiver opens & sender is put in address book Receiver opens & sender is put in address book Sender can issue messages at will as a “known contact” Sender can issue messages at will as a “known contact” Bluebugging Bluebugging Allows attacker to use phone features w/o owner knowledge Allows attacker to use phone features w/o owner knowledge
12
More Hacks? You Bet! You Bet! Car Whisperer Car Whisperer Allows attackers to send and receive audio from a car’s Bluetooth enabled stereo Allows attackers to send and receive audio from a car’s Bluetooth enabled stereo Bluesnarfing Bluesnarfing Allows attackers access to calendars, contact lists, emails, and text messages. Allows attackers access to calendars, contact lists, emails, and text messages. You want the source code? It’s easy to get. http://www.alighieri.org/tools/bluesnarfer.tar.gz You want the source code? It’s easy to get. http://www.alighieri.org/tools/bluesnarfer.tar.gz
13
Benefits Low user interactivity Low user interactivity Little battery usage = less need for recharging Little battery usage = less need for recharging Chip set $3 = cheaper product vs. WiFi, etc Chip set $3 = cheaper product vs. WiFi, etc Small batteries = small devices = high portability Small batteries = small devices = high portability Good firmware/software = high flexibility Good firmware/software = high flexibility Some security features Some security features
14
Tie it together Friend calls on cell phone – tell him to call back in 5 minutes Friend calls on cell phone – tell him to call back in 5 minutes Drive home Drive home GPS sends route map to cell phone GPS sends route map to cell phone Go in the house Go in the house Map route is sent to PC from cell phone Map route is sent to PC from cell phone Friend calls but your landline rings (but he called same #) Friend calls but your landline rings (but he called same #) Address book, contacts list, and calendar are loaded to home PC Address book, contacts list, and calendar are loaded to home PC
15
Bibliography Wikipedia.org “Bluetooth” - http://en.wikipedia.org/wiki/Bluetooth Wikipedia.org “Bluetooth” - http://en.wikipedia.org/wiki/Bluetooth http://en.wikipedia.org/wiki/Bluetooth Bluetooth.com - http://bluetooth.com/bluetooth/ Bluetooth.com - http://bluetooth.com/bluetooth/http://bluetooth.com/bluetooth/ Bluetooth.org - http://www.bluetooth.org Bluetooth.org - http://www.bluetooth.orghttp://www.bluetooth.org Howstuffworks.com - http://www.howstuffworks.com/bluetooth.htm Howstuffworks.com - http://www.howstuffworks.com/bluetooth.htm http://www.howstuffworks.com/bluetooth.htm Commsdesign.com - http://www.commsdesign.com/design_corner/showArticle.jhtml?articleID= 55800768 Commsdesign.com - http://www.commsdesign.com/design_corner/showArticle.jhtml?articleID= 55800768 http://www.commsdesign.com/design_corner/showArticle.jhtml?articleID= 55800768 http://www.commsdesign.com/design_corner/showArticle.jhtml?articleID= 55800768
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.