SOUMI DE(1 ST YR) ROLL NO-27 PDSIT, SHIBPUR
SOUMI DE(1ST YR)ROLL NO-27
PDSIT, SHIBPUR
Bluetooth Basics:-Bluetooth is a open wireless LAN(ad-hoc) technology
standard for exchanging data over short distance.Bluetooth was originally started as a project by
telecom vendor Ericsson.It is the implementation of protocol defined by
IEEE802.5 standard.
.
MASTERMIND OF BLUETOOTH
Different networks created by bluetooh:-
Piconet
Scatternet (Comprising 3 piconets)
Bluetooth layers
Light On Layers The Bluetooth system is operating in
the(2.402-2.483) GHz ISM (Industrial Scientific Medicine) band divided into 79 channels of 1MHz each.
3khz 2.402G 2.483G 300gHz 400Thz 900T
1 Bluetooth Range 79
Radiowave & Microwave Infrared Light Wave
Bluetooth uses (FHSS) in the physical layer to avoid interference from other devices .Dwell time is 625us.
Baseband is equivalent to MAC sublayers with access method TDD-TDMA(Time division duplex TDMA).
L2CAP is equivalent to LLC sublayer,used for data exchange on the ACL link.
Bluetooth StackA bluetooth stack is the implementation of the
bluetooth protocol stack(*protocol stack is the implementation of network suite where ‘suite’ is the definition of protocols and ‘stack’ is the software implementation of them.)
Bluetooth Protocol Stack is splitted into controller stack & host stack.
Controller stack is implemented in a silicon device containing bluetooth radio & microprocessor. It includes ACL,SCO,LMP,BASEBAND,RADIO.
Host stack is generally implemented as a part of OS or installable package on the top of OS. It includes L2CAP,SDP,RFCOMM,AVCTP etc.
Contd..
Widdcomm was the first bluetooth stack for the windows operating system.
Windows XP includes a in-built bluetooth stack and all the later version of windows do the same.
Bluez is the bluetooth protocol stack for LINUX os.Stonestreet One is a leading global provider of
bluetooth protocol stack software,known as Bluetopia to leading companies like Motorolla,Nokia,IBM etc.
Bluetopia + LE is the latest version of the software the runs specifically for Bluetooth low energy technology.
Bluetooth Programming ConceptsFew Steps:-Choosing a device with which to communicate
with the help of bluetooth address, same as 48bit MAC address.This address is used at all the layer,from lower level radio layer to upper level application layer.
Choosing a communication protocol.Generally RFMM is treated as transport layer protocol and L2CAP is treated as data link layer protocol.
OBEX or object exchange is a very popular protocol for exchanging objects like music,clip even an application program..
Socket programming is done to establish connection b/w devices
/* tiny code to find bluetooth enable device in python*/
from bluetooth import*target_name=‘soumi’ /*name of target device*/
target_address=nonenearby_devices=discover_devices/*return list of detected
devices*/
for addresses in nearby devices:if target_name==lookup_name(address):/*to connect to each
devices,request their names,compare those with given*/`
target_address=addressbreakif target_address is not none:Print“found target bluetooth device with
address”,target_adElse:Print”could not find”.
Bluetooth Profiles• A Bluetooth profile is a wireless interface
specification for Bluetooth-based communication between devices.
each profile specification contains info on the following topics:Dependencies on other profiles Suggested user interface formats Specific parts of the Bluetooth protocol
stack used by the profile.
List of ProfileAdvanced Audio Distribution Profile (A2DP) Audio/Video Remote Control Profile (AVRCP) Basic Imaging Profile (BIP) Basic Printing Profile (BPP) Common ISDN Access Profile (CIP) Cordless Telephony Profile (CTP) Device ID Profile (DID) Dial-up Networking Profile (DUN) Fax Profile (FAX) File Transfer Profile (FTP) General Audio/Video Distribution Profile (GAVDP) Generic Access Profile (GAP) Generic Object Exchange Profile (GOEP) Hard Copy Cable Replacement Profile (HCRP)
Hands-Free Profile (HFP) Human Interface Device Profile (HID) Headset Profile (HSP) Intercom Profile (ICP) LAN Access Profile (LAP) Object Push Profile (OPP) Personal Area Networking Profile (PAN) Phone Book Access Profile (PBAP) Serial Port Profile (SPP) Service Discovery Application Profile (SDAP) SIM Access Profile (SAP, SIM) Synchronisation Profile (SYNCH) Video Distribution Profile (VDP) Wireless Application Protocol Bearer (WAPB)
Bluetooth Security Principles of good SecurityConfidentiality● Data kept private Integrity● Data has not been modified Availability● Data is available when needed Authentication Identity of peer is proven
Version wise we have 4 diff security mode: Security Mode 1 is non-secure. Security functionality
leaves the device and connections susceptible to attackers. Security Mode 1 is only supported in v2.0 + EDR (and earlier) devices.
Contd..
In Security Mode 2, a service level-enforced security mode, security procedures are initiated after LMP link establishment but before L2CAP channel establishment. All Bluetooth devices can support Security Mode 2.
In Security Mode 3, the link level-enforced security mode mode, a Bluetooth device initiates security procedures before the physical link is fully established. It supports authentication & encryption.
Security Mode 4 (introduced in Bluetooth v2.1 + EDR) is a service level enforced security mode in which security procedures are initiated after link setup. Security Mode 4 is mandatory for communication between v2.1 + EDR devices.
Security Risks:Bluejacking is the process of sending unsolicited
messages, or business cards, to bluetooth enabled devices. In order for bluejacking to work, both devices must be within 10 meters of one another.
Bluesnarfing is a method of hacking into a Bluetooth-enabled mobile phone and copying its entire contact book, calendar or anything else stored in the phone memory.
The backdoor attack involves establishing a trust relationship through the pairing. mechanism, but ensuring that it no longer appears in the target’s register of paired device.
The cabir worm is malicious software that uses Bluetooth technology to seek out available Bluetooth devices and send itself to them.
Further Research on BluetoothBluetooth 3.0 + High Speed, a specification that
was announced in April 2009, which combines classic Bluetooth and Wi-Fi to transmit large data files.
Bluetooth device discovery is a time-intensive phase of the Bluetooth connection-establishment procedure. first establishing an IrDA connection between two devices equipped with both Bluetooth and IrDA capabilities and then exchanging Bluetooth device discovery information via the established IrDA connection.
Bluetooth devices security risks rising : According to research there is a critical problems in all bluetooth-enable car kits.
THANKS FOR YOUR PATIENCE