Top Banner
SOUMI DE(1 ST YR) ROLL NO-27 PDSIT, SHIBPUR
22
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Bluetooth

SOUMI DE(1ST YR)ROLL NO-27

PDSIT, SHIBPUR

Page 2: Bluetooth

Bluetooth Basics:-Bluetooth is a open wireless LAN(ad-hoc) technology

standard for exchanging data over short distance.Bluetooth was originally started as a project by

telecom vendor Ericsson.It is the implementation of protocol defined by

IEEE802.5 standard.

.

MASTERMIND OF BLUETOOTH

Page 3: Bluetooth
Page 4: Bluetooth

Different networks created by bluetooh:-

Piconet

Page 5: Bluetooth

Scatternet (Comprising 3 piconets)

Page 6: Bluetooth

Bluetooth layers

Page 7: Bluetooth

Light On Layers The Bluetooth system is operating in

the(2.402-2.483) GHz ISM (Industrial Scientific Medicine) band divided into 79 channels of 1MHz each.

3khz 2.402G 2.483G 300gHz 400Thz 900T

1 Bluetooth Range 79

Radiowave & Microwave Infrared Light Wave

Page 8: Bluetooth
Page 9: Bluetooth
Page 10: Bluetooth

Bluetooth uses (FHSS) in the physical layer to avoid interference from other devices .Dwell time is 625us.

Baseband is equivalent to MAC sublayers with access method TDD-TDMA(Time division duplex TDMA).

L2CAP is equivalent to LLC sublayer,used for data exchange on the ACL link.

Page 11: Bluetooth

Bluetooth StackA bluetooth stack is the implementation of the

bluetooth protocol stack(*protocol stack is the implementation of network suite where ‘suite’ is the definition of protocols and ‘stack’ is the software implementation of them.)

Bluetooth Protocol Stack is splitted into controller stack & host stack.

Controller stack is implemented in a silicon device containing bluetooth radio & microprocessor. It includes ACL,SCO,LMP,BASEBAND,RADIO.

Host stack is generally implemented as a part of OS or installable package on the top of OS. It includes L2CAP,SDP,RFCOMM,AVCTP etc.

Contd..

Page 12: Bluetooth
Page 13: Bluetooth

Widdcomm was the first bluetooth stack for the windows operating system.

Windows XP includes a in-built bluetooth stack and all the later version of windows do the same.

Bluez is the bluetooth protocol stack for LINUX os.Stonestreet One is a leading global provider of

bluetooth protocol stack software,known as Bluetopia to leading companies like Motorolla,Nokia,IBM etc.

 Bluetopia + LE is the latest version of the software the runs specifically for Bluetooth low energy technology.

Page 14: Bluetooth

Bluetooth Programming ConceptsFew Steps:-Choosing a device with which to communicate

with the help of bluetooth address, same as 48bit MAC address.This address is used at all the layer,from lower level radio layer to upper level application layer.

Choosing a communication protocol.Generally RFMM is treated as transport layer protocol and L2CAP is treated as data link layer protocol.

OBEX or object exchange is a very popular protocol for exchanging objects like music,clip even an application program..

Socket programming is done to establish connection b/w devices

Page 15: Bluetooth

/* tiny code to find bluetooth enable device in python*/

from bluetooth import*target_name=‘soumi’ /*name of target device*/

target_address=nonenearby_devices=discover_devices/*return list of detected

devices*/

for addresses in nearby devices:if target_name==lookup_name(address):/*to connect to each

devices,request their names,compare those with given*/`

target_address=addressbreakif target_address is not none:Print“found target bluetooth device with

address”,target_adElse:Print”could not find”.

Page 16: Bluetooth

Bluetooth Profiles• A Bluetooth profile is a wireless interface

specification for Bluetooth-based communication between devices.

each profile specification contains info on the following topics:Dependencies on other profiles Suggested user interface formats Specific parts of the Bluetooth protocol

stack used by the profile.

Page 17: Bluetooth

List of ProfileAdvanced Audio Distribution Profile (A2DP) Audio/Video Remote Control Profile (AVRCP) Basic Imaging Profile (BIP) Basic Printing Profile (BPP) Common ISDN Access Profile (CIP) Cordless Telephony Profile (CTP) Device ID Profile (DID) Dial-up Networking Profile (DUN) Fax Profile (FAX) File Transfer Profile (FTP) General Audio/Video Distribution Profile (GAVDP) Generic Access Profile (GAP) Generic Object Exchange Profile (GOEP) Hard Copy Cable Replacement Profile (HCRP)

Hands-Free Profile (HFP) Human Interface Device Profile (HID) Headset Profile (HSP) Intercom Profile (ICP) LAN Access Profile (LAP) Object Push Profile (OPP) Personal Area Networking Profile (PAN) Phone Book Access Profile (PBAP) Serial Port Profile (SPP) Service Discovery Application Profile (SDAP) SIM Access Profile (SAP, SIM) Synchronisation Profile (SYNCH) Video Distribution Profile (VDP) Wireless Application Protocol Bearer (WAPB)

Page 18: Bluetooth

Bluetooth Security Principles of good SecurityConfidentiality● Data kept private Integrity● Data has not been modified Availability● Data is available when needed Authentication Identity of peer is proven

Version wise we have 4 diff security mode: Security Mode 1 is non-secure. Security functionality

leaves the device and connections susceptible to attackers. Security Mode 1 is only supported in v2.0 + EDR (and earlier) devices.

Contd..

Page 19: Bluetooth

In Security Mode 2, a service level-enforced security mode, security procedures are initiated after LMP link establishment but before L2CAP channel establishment. All Bluetooth devices can support Security Mode 2.

In Security Mode 3, the link level-enforced security mode mode, a Bluetooth device initiates security procedures before the physical link is fully established. It supports authentication & encryption.

Security Mode 4 (introduced in Bluetooth v2.1 + EDR) is a service level enforced security mode in which security procedures are initiated after link setup. Security Mode 4 is mandatory for communication between v2.1 + EDR devices.

Page 20: Bluetooth

Security Risks:Bluejacking is the process of sending unsolicited

messages, or business cards, to bluetooth enabled devices. In order for bluejacking to work, both devices must be within 10 meters of one another.

Bluesnarfing is a method of hacking into a Bluetooth-enabled mobile phone and copying its entire contact book, calendar or anything else stored in the phone memory.

The backdoor attack involves establishing a trust relationship through the pairing. mechanism, but ensuring that it no longer appears in the target’s register of paired device.

The cabir worm is malicious software that uses Bluetooth technology to seek out available Bluetooth devices and send itself to them.

Page 21: Bluetooth

Further Research on BluetoothBluetooth 3.0 + High Speed, a specification that

was announced in April 2009, which combines classic Bluetooth and Wi-Fi to transmit large data files.

Bluetooth device discovery is a time-intensive phase of the Bluetooth connection-establishment procedure. first establishing an IrDA connection between two devices equipped with both Bluetooth and IrDA capabilities and then exchanging Bluetooth device discovery information via the established IrDA connection.

Bluetooth devices security risks rising : According to research there is a critical problems in all bluetooth-enable car kits.

 

Page 22: Bluetooth

THANKS FOR YOUR PATIENCE