by shebin.a.khalam

Upload: shebinakhalam

Post on 30-May-2018

225 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 By Shebin.a.khalam

    1/17

    BLUETOOTH

    by

    SHEBIN.A.KHALAM

  • 8/14/2019 By Shebin.a.khalam

    2/17

    What is Bluetooth?What is Bluetooth?

    A wireless technology that wasA wireless technology that was

    introduced five years ago;introduced five years ago;

    It was designed to replace cablesIt was designed to replace cablesthat connect electronic equipmentthat connect electronic equipment

  • 8/14/2019 By Shebin.a.khalam

    3/17

    FeaturesFeatures

    InexpensiveInexpensive Doesnt require anything special toDoesnt require anything special to

    make it workmake it work It communicates on a frequency ofIt communicates on a frequency of

    2.45 Ghz (the same frequency as2.45 Ghz (the same frequency asbaby monitors and garage doorbaby monitors and garage door

    openersopeners Uses low power and spread-spectrumUses low power and spread-spectrum

    frequency hoppingfrequency hopping

  • 8/14/2019 By Shebin.a.khalam

    4/17

    Future FeaturesFuture Features

    Further power optimizationFurther power optimization

    Security enhancementsSecurity enhancements

    Quality of serviceQuality of service

  • 8/14/2019 By Shebin.a.khalam

    5/17

    Interference Avoidance Method #1Interference Avoidance Method #1

    Low powerLow power

    Limits the range to about 10 metersLimits the range to about 10 meters

    Signal is weak at 1 milliwatt (comparedSignal is weak at 1 milliwatt (compared

    to cell phones at 3 watts)to cell phones at 3 watts)

  • 8/14/2019 By Shebin.a.khalam

    6/17

    Interference Avoidance Method #2Interference Avoidance Method #2

    Spread-Spectrum Frequency HoppingSpread-Spectrum Frequency Hopping

    Uses 79 individual, randomly chosen frequencies within aUses 79 individual, randomly chosen frequencies within a

    designated range (compared to Japan, which uses 23 frequencies)designated range (compared to Japan, which uses 23 frequencies)

    Changes frequencies 1,600 times every secondChanges frequencies 1,600 times every second

    Each channel is divided into time slots 625 microseconds longEach channel is divided into time slots 625 microseconds long

  • 8/14/2019 By Shebin.a.khalam

    7/17

    Bluetooth/ZigBeeBluetooth/ZigBee

    SimilaritiesSimilarities

    Both:Both:

    Are types of IEEE 802.5 wirelessAre types of IEEE 802.5 wireless

    personal-area networkspersonal-area networks

    Run in the 2.4 Ghz frequency bandRun in the 2.4 Ghz frequency band

    Use small form factors and low powerUse small form factors and low power

  • 8/14/2019 By Shebin.a.khalam

    8/17

    Bluetooth/ZigBeeBluetooth/ZigBee

    DifferencesDifferences Modulation techniqueModulation technique

    B: Frequency Hopping Spread SpectrumB: Frequency Hopping Spread Spectrum Z: Direct Sequence Spread HoppingZ: Direct Sequence Spread Hopping

    Protocol stack sizeProtocol stack size B: 250 kbyteB: 250 kbyte Z: 28 kbyteZ: 28 kbyte

    BatteryBattery B: intended for frequent rechargingB: intended for frequent recharging Z: not rechargeableZ: not rechargeable

    Maximum network speedMaximum network speed B: 1 Mbit/sB: 1 Mbit/s Z: 250 kbits/sZ: 250 kbits/s

    Network rangeNetwork range B: 1 or 100 metersB: 1 or 100 meters

    Z: up to 70 metersZ: up to 70 meters Typical network join timeTypical network join time

    B: 3 secondsB: 3 seconds Z: 30 milisecondsZ: 30 miliseconds

  • 8/14/2019 By Shebin.a.khalam

    9/17

    Bluetooth/ZigBeeBluetooth/ZigBee

    Bluetooth is aimed toward:Bluetooth is aimed toward:

    User mobilityUser mobility

    Eliminating short distance cablingEliminating short distance cabling

    ZigBee is aimed toward:ZigBee is aimed toward:

    More grand-scale automationMore grand-scale automation

    Remote controlRemote control

  • 8/14/2019 By Shebin.a.khalam

    10/17

    SecuritySecurity

    Bluetooth Security Experts Group:Bluetooth Security Experts Group:

    A group of engineers from the memberA group of engineers from the member

    companies that make up the Bluetoothcompanies that make up the Bluetooth

    Special Interest GroupSpecial Interest Group

    Provide critical security information andProvide critical security information and

    feedback as the specification evolvesfeedback as the specification evolves

  • 8/14/2019 By Shebin.a.khalam

    11/17

    SecuritySecurity

    Product developers have severalProduct developers have several

    options for implementing security:options for implementing security:

    Three modes of security for BluetoothThree modes of security for Bluetooth

    access between two devices:access between two devices: Non-secureNon-secure

    Service-level enforcedService-level enforced

    Link-level enforcedLink-level enforced

  • 8/14/2019 By Shebin.a.khalam

    12/17

    SecuritySecurity

    Bluetooth devices have two levels of security:Bluetooth devices have two levels of security:

    Trusted device has unrestricted access to allTrusted device has unrestricted access to all

    servicesservices

    Untrusted deviceUntrusted device

    Services have three levels of security:Services have three levels of security:

    Those that require authorization andThose that require authorization and

    authenticationauthentication

    Those that require authorization onlyThose that require authorization only Those that are open to all devicesThose that are open to all devices

  • 8/14/2019 By Shebin.a.khalam

    13/17

    Security Breaches:Security Breaches:

    BluebuggingBluebugging

    Allows skilled individuals to access theAllows skilled individuals to access the

    mobile phone commands using Bluetoothmobile phone commands using Bluetooth

    wireless technology without notifying orwireless technology without notifying or

    alerting the phones user as long as thealerting the phones user as long as thehacker is within a 10 meter range of thehacker is within a 10 meter range of the

    phonephone

    Allows the hacker to initiate phone calls,Allows the hacker to initiate phone calls,

    read and write phonebook contacts, eavesdropread and write phonebook contacts, eavesdrop

    on conversations and connect to the Interneton conversations and connect to the Internet

  • 8/14/2019 By Shebin.a.khalam

    14/17

    Security Breaches:Security Breaches:

    BluesnarfingBluesnarfing

    Allows hackers to gain access to data stored onAllows hackers to gain access to data stored onBluetooth enabled phone using Bluetooth wirelessBluetooth enabled phone using Bluetooth wirelesstechnology without alerting the phones user of thetechnology without alerting the phones user of theconnection madeconnection made

    Without specialized equipment, the hacker must be inWithout specialized equipment, the hacker must be ina 10 meter range of the device while running aa 10 meter range of the device while running adevice with specialized softwaredevice with specialized software

    Only specific older Bluetooth enabled phones areOnly specific older Bluetooth enabled phones aresusceptible ker is within a 10 meter range of thesusceptible ker is within a 10 meter range of thephonephone

  • 8/14/2019 By Shebin.a.khalam

    15/17

    Security SolutionsSecurity Solutions

    The manufacturers of the vulnerableThe manufacturers of the vulnerable

    phones have developed softwarephones have developed software

    patches to fix the problempatches to fix the problem

    The device can be set to the non-The device can be set to the non-

    discoverable mode when not usingdiscoverable mode when not using

    Bluetooth technology or when in anBluetooth technology or when in an

    unknown areaunknown area

  • 8/14/2019 By Shebin.a.khalam

    16/17

    ReferencesReferences

    http://www.wirelessip.infohttp://www.wirelessip.info>> http://www.electronics.howstuffworks.com/bluetoothhttp://www.electronics.howstuffworks.com/bluetooth http://www.rockymountainnews.comhttp://www.rockymountainnews.com http://www.techworld.comhttp://www.techworld.com

    http://www.palowireless.comhttp://www.palowireless.com http://www.businessweek.comhttp://www.businessweek.com http://www.bluetooth.comhttp://www.bluetooth.com

    http://www.wirelessip.info/http://www.wirelessip.info/http://www.electronics.howstuffworks.com/bluetoothhttp://www.electronics.howstuffworks.com/bluetoothhttp://www.techworld.com/http://www.techworld.com/http://www.palowireless.com/http://www.palowireless.com/http://www.businessweek.com/http://www.businessweek.com/http://www.businessweek.com/http://www.palowireless.com/http://www.techworld.com/http://www.electronics.howstuffworks.com/bluetoothhttp://www.wirelessip.info/
  • 8/14/2019 By Shebin.a.khalam

    17/17

    Thank you!!!Thank you!!!