by shebin.a.khalam
TRANSCRIPT
-
8/14/2019 By Shebin.a.khalam
1/17
BLUETOOTH
by
SHEBIN.A.KHALAM
-
8/14/2019 By Shebin.a.khalam
2/17
What is Bluetooth?What is Bluetooth?
A wireless technology that wasA wireless technology that was
introduced five years ago;introduced five years ago;
It was designed to replace cablesIt was designed to replace cablesthat connect electronic equipmentthat connect electronic equipment
-
8/14/2019 By Shebin.a.khalam
3/17
FeaturesFeatures
InexpensiveInexpensive Doesnt require anything special toDoesnt require anything special to
make it workmake it work It communicates on a frequency ofIt communicates on a frequency of
2.45 Ghz (the same frequency as2.45 Ghz (the same frequency asbaby monitors and garage doorbaby monitors and garage door
openersopeners Uses low power and spread-spectrumUses low power and spread-spectrum
frequency hoppingfrequency hopping
-
8/14/2019 By Shebin.a.khalam
4/17
Future FeaturesFuture Features
Further power optimizationFurther power optimization
Security enhancementsSecurity enhancements
Quality of serviceQuality of service
-
8/14/2019 By Shebin.a.khalam
5/17
Interference Avoidance Method #1Interference Avoidance Method #1
Low powerLow power
Limits the range to about 10 metersLimits the range to about 10 meters
Signal is weak at 1 milliwatt (comparedSignal is weak at 1 milliwatt (compared
to cell phones at 3 watts)to cell phones at 3 watts)
-
8/14/2019 By Shebin.a.khalam
6/17
Interference Avoidance Method #2Interference Avoidance Method #2
Spread-Spectrum Frequency HoppingSpread-Spectrum Frequency Hopping
Uses 79 individual, randomly chosen frequencies within aUses 79 individual, randomly chosen frequencies within a
designated range (compared to Japan, which uses 23 frequencies)designated range (compared to Japan, which uses 23 frequencies)
Changes frequencies 1,600 times every secondChanges frequencies 1,600 times every second
Each channel is divided into time slots 625 microseconds longEach channel is divided into time slots 625 microseconds long
-
8/14/2019 By Shebin.a.khalam
7/17
Bluetooth/ZigBeeBluetooth/ZigBee
SimilaritiesSimilarities
Both:Both:
Are types of IEEE 802.5 wirelessAre types of IEEE 802.5 wireless
personal-area networkspersonal-area networks
Run in the 2.4 Ghz frequency bandRun in the 2.4 Ghz frequency band
Use small form factors and low powerUse small form factors and low power
-
8/14/2019 By Shebin.a.khalam
8/17
Bluetooth/ZigBeeBluetooth/ZigBee
DifferencesDifferences Modulation techniqueModulation technique
B: Frequency Hopping Spread SpectrumB: Frequency Hopping Spread Spectrum Z: Direct Sequence Spread HoppingZ: Direct Sequence Spread Hopping
Protocol stack sizeProtocol stack size B: 250 kbyteB: 250 kbyte Z: 28 kbyteZ: 28 kbyte
BatteryBattery B: intended for frequent rechargingB: intended for frequent recharging Z: not rechargeableZ: not rechargeable
Maximum network speedMaximum network speed B: 1 Mbit/sB: 1 Mbit/s Z: 250 kbits/sZ: 250 kbits/s
Network rangeNetwork range B: 1 or 100 metersB: 1 or 100 meters
Z: up to 70 metersZ: up to 70 meters Typical network join timeTypical network join time
B: 3 secondsB: 3 seconds Z: 30 milisecondsZ: 30 miliseconds
-
8/14/2019 By Shebin.a.khalam
9/17
Bluetooth/ZigBeeBluetooth/ZigBee
Bluetooth is aimed toward:Bluetooth is aimed toward:
User mobilityUser mobility
Eliminating short distance cablingEliminating short distance cabling
ZigBee is aimed toward:ZigBee is aimed toward:
More grand-scale automationMore grand-scale automation
Remote controlRemote control
-
8/14/2019 By Shebin.a.khalam
10/17
SecuritySecurity
Bluetooth Security Experts Group:Bluetooth Security Experts Group:
A group of engineers from the memberA group of engineers from the member
companies that make up the Bluetoothcompanies that make up the Bluetooth
Special Interest GroupSpecial Interest Group
Provide critical security information andProvide critical security information and
feedback as the specification evolvesfeedback as the specification evolves
-
8/14/2019 By Shebin.a.khalam
11/17
SecuritySecurity
Product developers have severalProduct developers have several
options for implementing security:options for implementing security:
Three modes of security for BluetoothThree modes of security for Bluetooth
access between two devices:access between two devices: Non-secureNon-secure
Service-level enforcedService-level enforced
Link-level enforcedLink-level enforced
-
8/14/2019 By Shebin.a.khalam
12/17
SecuritySecurity
Bluetooth devices have two levels of security:Bluetooth devices have two levels of security:
Trusted device has unrestricted access to allTrusted device has unrestricted access to all
servicesservices
Untrusted deviceUntrusted device
Services have three levels of security:Services have three levels of security:
Those that require authorization andThose that require authorization and
authenticationauthentication
Those that require authorization onlyThose that require authorization only Those that are open to all devicesThose that are open to all devices
-
8/14/2019 By Shebin.a.khalam
13/17
Security Breaches:Security Breaches:
BluebuggingBluebugging
Allows skilled individuals to access theAllows skilled individuals to access the
mobile phone commands using Bluetoothmobile phone commands using Bluetooth
wireless technology without notifying orwireless technology without notifying or
alerting the phones user as long as thealerting the phones user as long as thehacker is within a 10 meter range of thehacker is within a 10 meter range of the
phonephone
Allows the hacker to initiate phone calls,Allows the hacker to initiate phone calls,
read and write phonebook contacts, eavesdropread and write phonebook contacts, eavesdrop
on conversations and connect to the Interneton conversations and connect to the Internet
-
8/14/2019 By Shebin.a.khalam
14/17
Security Breaches:Security Breaches:
BluesnarfingBluesnarfing
Allows hackers to gain access to data stored onAllows hackers to gain access to data stored onBluetooth enabled phone using Bluetooth wirelessBluetooth enabled phone using Bluetooth wirelesstechnology without alerting the phones user of thetechnology without alerting the phones user of theconnection madeconnection made
Without specialized equipment, the hacker must be inWithout specialized equipment, the hacker must be ina 10 meter range of the device while running aa 10 meter range of the device while running adevice with specialized softwaredevice with specialized software
Only specific older Bluetooth enabled phones areOnly specific older Bluetooth enabled phones aresusceptible ker is within a 10 meter range of thesusceptible ker is within a 10 meter range of thephonephone
-
8/14/2019 By Shebin.a.khalam
15/17
Security SolutionsSecurity Solutions
The manufacturers of the vulnerableThe manufacturers of the vulnerable
phones have developed softwarephones have developed software
patches to fix the problempatches to fix the problem
The device can be set to the non-The device can be set to the non-
discoverable mode when not usingdiscoverable mode when not using
Bluetooth technology or when in anBluetooth technology or when in an
unknown areaunknown area
-
8/14/2019 By Shebin.a.khalam
16/17
ReferencesReferences
http://www.wirelessip.infohttp://www.wirelessip.info>> http://www.electronics.howstuffworks.com/bluetoothhttp://www.electronics.howstuffworks.com/bluetooth http://www.rockymountainnews.comhttp://www.rockymountainnews.com http://www.techworld.comhttp://www.techworld.com
http://www.palowireless.comhttp://www.palowireless.com http://www.businessweek.comhttp://www.businessweek.com http://www.bluetooth.comhttp://www.bluetooth.com
http://www.wirelessip.info/http://www.wirelessip.info/http://www.electronics.howstuffworks.com/bluetoothhttp://www.electronics.howstuffworks.com/bluetoothhttp://www.techworld.com/http://www.techworld.com/http://www.palowireless.com/http://www.palowireless.com/http://www.businessweek.com/http://www.businessweek.com/http://www.businessweek.com/http://www.palowireless.com/http://www.techworld.com/http://www.electronics.howstuffworks.com/bluetoothhttp://www.wirelessip.info/ -
8/14/2019 By Shebin.a.khalam
17/17
Thank you!!!Thank you!!!