Presentation ReportTopic:-Department:-CS&ITClass:-SE-I
(2011-2015)Submitted to:-Sir. Mohsin Manshad.Date:-07/02/2012Group
MembersName Roll #Bilal Maqbool.10 (Bluetooth Introduction &
History)Khalil Ahmed.48(Communication & working of
Bluetooth)Nisar Ahmed.06(Security of Bluetooth)Muhammad
Junaid.45(Advantages & Disadvantages of Bluetooth)Abdul
Ghafar.14(Use of Bluetooth in now a days & its
Future)Contents
12233456889101112121315162021TopicPage #1. Introduction Of
Bluetooth2. Bluetooth History3. History of Bluetooth Name4. Version
5. Bluetooth Technology Over the Years6. How does Bluetooth work7.
Communication and connection 8. Implementation9. Bluetooth
Profiles10. Bluetooth Stack11. Bluetooth Chips - CSR12. Bluetooth
Security 13. Fundamentals of security 14. Bluetooth Security
Issues15. Why Does Bluetooth Security Matter16. Advantages17.
Disadvantages18. USES of Bluetooth in Now a DAY19. Developing with
Bluetooth20. The future of Bluetooth
1IntroductionBluetooth technology is a short-range
communications technology that is simple, secure, and everywhere.
You can find it in billions of devices rangingfrom mobile phones
and computers to medical devices and home entertainment products.
It is intended to replace the cables connectingdevices, while
maintaining high levels of security. The key features of Bluetooth
technology are robustness, low power, and low cost. The Bluetooth
Specification defines a uniform structure for a wide range of
devices to connect and communicate with each other. When two
Bluetooth enabled devices connect to each other, this is called
pairing. The structure and the global acceptance of Bluetooth
technology means any Bluetooth enabled device, almost everywhere in
the world, can connect to other Bluetooth enabled devices located
in proximity to one another. Connections between Bluetooth enabled
electronic devices allow these devices to communicate wirelessly
through short-range. The range of Bluetooth technology is
application specific. The Core Specification mandates a minimum
range of 10 meters or 30 feet, but there is no set limit and
manufacturers can tune their implementations to provide the range
needed to support the use cases for their solutions.Bluetooth is a
proprietary open wireless technology standard for exchanging data
over short distances (using short wavelength radio transmissions in
the ISM band from 2400-2480MHz) from fixed and mobile devices,
creating personal area networks (PANs) with high levels of
security. Created by telecoms vendor Ericsson in 1994, it was
originally conceived as a wireless alternative to RS-232 data
cables. It can connect several devices, overcoming problems of
synchronization. Bluetooth is managed by the Bluetooth Special
Interest Group, which has more than 15,000 member companies in the
areas of telecommunication, computing, networking, and consumer
electronics. The SIG oversees the development of the specification,
manages the qualification program, and protects the trademarks. To
be marketed as a Bluetooth device, it must be qualified to
standards defined by the SIG. A network of patents is required to
implement the technology and are only licensed to those qualifying
devices; thus the protocol, whilst open, may be regarded as
proprietary.What are Bluetooths key features?The key features of
Bluetoothtechnology are robustness, low power, and low cost, and
the fact that it has become a universal standard for exchanging
data amongst a range of fixed and mobile devices.In addition,
Bluetooth wireless technology has the ability to simultaneously
handle both data and voice transmissions. This means that users can
use a varietyof applications such as a hands-free headset for voice
calls, printing and fax capabilities, and synchronizing PDAs,
laptop, and mobilephone applications.What devices is Bluetooth used
in?Bluetooth technology offers a way to connect and exchange
information between wide varieties of devices. These include mobile
phones, telephones, laptops, PCs, printers, Global Positioning
System (GPS) receivers, digital cameras, and videogame consoles.
The PurposeThe purpose of Bluetooth technology is to connect
numerous electronic devices together without the need of wires. For
example, a Bluetooth headset allows you to talk on your cell phone
without using your hands. Many states have banned the use of cell
phones while operating a vehicle, unless the driver has a way of
using the phone and keeping both hands on the wheel. Bluetooth
technology makes this possible. Video game controllers, such as
those designed for the PlayStation 3, also use Bluetooth
technology, eliminating the need to connect the controller to the
console with a wire.
2Bluetooth HistoryFlag this photoIn 1994, Swedish company
Ericsson Mobile Communications launched the Bluetooth wireless
technology movement. Ericsson wanted to investigate a radio
interface that would prove low-cost and low-power. Goals included
the elimination of wire clutter between different devices from
differing industries. Creating a single wireless standard would
unite computer devices and telecommunications. This wireless
technology has connected devices in close proximity, regardless of
brand.OriginBluetooth was developed by Ericsson, a large Swedish
telecommunications equipment manufacturer. The specification was
developed in 1994 by Jaap Haartsen and Sven Mattisson, who were
working for Ericsson at the time.The FormationBluetooth technology
was officially introduced in 1998, although it was in development
in Scandinavia prior. Both the name "Bluetooth" and the logo
associated with it have been trademarked by SIG (Bluetooth Special
Interest Group). Numerous companies belong to SIG including
Ericsson, IBM, Microsoft, Intel, Nokia, Toshiba and Agere. The SIG
trade association continues to work on progressing and researching
the use of Bluetooth technology in the computing, automotive,
industrial automation and telecommunication industries.The
Bluetooth SIGThe name Bluetooth and its logo are trademarked by the
privately held trade association named the Bluetooth Special
Interest Group (SIG). Founded in September 1998, the Bluetooth SIG
is a unification of leaders in the telecommunications, computing,
network, industrial automation, and Automotive industries. Today,
the Bluetooth SIG is responsible for encouraging and supporting
research and development in Bluetooth technology.The Bluetooth SIG
includes promoter member companies Microsoft, Ericsson, IBM, Intel,
Agere, Motorola, Nokia, and Toshiba, plus thousands of Associate
and Adopter member companies (BlueTomorrow.com's parent company, SP
Commerce LLC, is a licensed and certified Adopter member of the
Bluetooth SIG).History of Bluetooth NameBluetooth is named for
Viking leader and Danish king Harald "Bluetooth" Blatand (940-981).
Jim Kardach, who worked for Intel, heard about King Harald
Bluetooth from Sven Mathesson of Ericsson. King Harald Bluetooth
united Denmark and Norway and helped bring Christianity to
Scandinavia.Intel suggested the codename "Bluetooth" as a temporary
name for the SIG program. As a modern day counterpart, the SIG also
saw the power of unity as they sought to unite computer devices and
telecommunications with a short-range wireless link. During
contract preparations, with no agreed formal name, the Bluetooth
codename was inserted and resulted in Bluetooth SIG. A board
meeting accepted IBM's proposed name, Personal Area Networking
(PAN), yet a trademark online search resulted in thousands of hits.
The SIG instead launched with the Bluetooth name that remains
synonymous with short range radios.Origin of LogoThe logo is the
combined German Runes of Harglass (which is the Latin equivalent of
"H") and Berkanan (which is analogous to the Latin "B"). These
letters represent the origin of the name Harald Bluetooth.
3VersionVersion 1.XBluetooth 1.0 was established in the early
days of the product's standardization. As a result, many
manufacturers' equipment did not work with other products.
Bluetooth 1.1 and 1.2 fixed some of these interoperability
problems.Version 2.XBluetooth Version 2.0 was released in November
2004. Version 2.0 increased the speed of the Bluetooth protocol. It
was backwards compatible with Bluetooth 1.1. In July 2007,
Bluetooth 2.1 was released.Version 3.0Bluetooth Version 3.0 will
increase data speed and reduce power consumption. As of April 2009,
it has not yet been releasedThe history of Bluetooth technology
dates back more than a decade. Since its introduction onto the
market, Bluetooth technology has revolutionized the way we stay
connected, and the way electronic devices stay connected to each
other. The technology behind Bluetooth continues to advance.
Bluetooth technology can be found in a wide range of electronic
devices, including cell phones and video game controllers.Bluetooth
Technology Over the Years1998- Bluetooth technology is officially
introduced and the Bluetooth SIG is formed. Bluetooth
technology'sintended basic purpose is to be a wire replacement
technology in order to rapidly transfer voice and data.1999-
Bluetooth 1.0 Specification is introduced.2004- Bluetooth Version
2.0 + EDR (Enhanced Data Rate) is introduced.2005- Devices using
Version 2.0 + EDR begin to hit the market in late 2005.2007-
Bluetooth Core Specification Version 2.1 + EDR is adopted by the
Bluetooth SIG.2009- Bluetooth Core Specification Version 3.0 + HS
(High Speed) is adopted by the Bluetooth SIG.
Exmaple
The Bluetooth enabled Eclipse CD5030 lets users control their
cell phones wirelessly via their car stereo.
4How does Bluetooth work?Bluetooth uses a radio technology which
is called frequency-hopping spread spectrum. It works by chopping
up the data that is being sent, and transmitting sections of it on
up to 79 frequencies. Spread-spectrum is good for several reasons.
Firstly, the signals are very resistant to narrowband interference,
which means the transmissions are more likely to reach their
destination quickly and intact. Spread-spectrum transmissions can
share a frequency band with many types of conventional
transmissions with minimal interference. Also, spread-spectrum
signals are also very difficult to intercept, making the technology
relatively secure except for some early securityissues. Working of
Bluetooth TechnologyNow, about how Bluetooth works... Bluetooth
Special Interest Group manages and maintains the Bluetooth
Standard. IEEE has accepted it as 802.15la standard. Bluetooth was
developed with the purpose of creating a single digital wireless
protocol, capable of connecting multiple devices and getting over
synchronization issues between them. It enables short-range
wireless communication thus replacing the wires that are used to
connect multiple devices.Transmission over Short DistancesThe
Bluetooth RF transceiver lies at the physical layer. There are 79
Bluetooth channels spaced 1MHz apart. A spread spectrum technology
is used at the physical layer. Both voice and data transmissions
over short distances are possible, creating wireless
PANs.Instructions to CommunicateA Bluetooth device consists of an
adapter. A Bluetooth adapter can be built into a device or can be
in the form of a card that connects to a device. Instructions are
embedded into the device, which enable it to communicate with other
devices.Packet Segmentation and ReassemblyWhen devices come in each
other's radio range, their link managers discover each other. Link
management protocol (LMP) engages itself in peer-to-peer message
exchange. LMP layer performs link setup and negotiation of packet
size. Segmentation and reassembly of packets is done, if
needed.Connection Sets UpThe service delivery protocol enables a
Bluetooth device to join a piconet. A device inquires what services
are available with the piconet. Bluetooth GlobalID (a unique
identification for each device in the network) is exchanged between
the devices. Their profiles are matched and a connection is set
up.Signal TransferBluetooth uses frequency hopping in time slots,
which means that the Bluetooth signals avoid interference with
other signals by hopping to a new frequency after transmission or
reception of every packet. One packet can cover up to five time
slots. Bluetooth can support an asynchronous data channel, or up to
3 simultaneous synchronous voice channels, or a channel, which
concurrently supports asynchronous data and synchronous voice.
Master SlaveBluetooth technology makes use of the concept of a
master and slave. Devices have to wait until the master allows them
to talk! One master and up to seven slaves employ a star topology
to form a piconet and begin to communicate with one another (as per
orders from their master of course)!
5Communication and connectionA master Bluetooth device can
communicate with a maximum of seven devices in a piconet (an ad-hoc
computer network using Bluetooth technology), though not all
devices support this limit. The devices can switch roles, by
agreement, and the slave can become the master (for example, a
headset initiating a connection to a phone will necessarily begin
as master, as initiator of the connection; but may subsequently
prefer to be slave).The Bluetooth Core Specification provides for
the connection of two or more piconets to form a scatternet, in
which certain devices simultaneously play the master role in one
piconet and the slave role in another.At any given time, data can
be transferred between the master and one other device (except for
the little-used broadcast mode). The master chooses which slave
device to address; typically, it switches rapidly from one device
to another in a round-robin fashion. Since it is the master that
chooses which slave to address, whereas a slave is (in theory)
supposed to listen in each receive slot, being a master is a
lighter burden than being a slave. Being a master of seven slaves
is possible; being a slave of more than one master is difficult.
The specification is vague as to required behaviour in
scatternets.Many USB Bluetooth adapters or "dongles" are available,
some of which also include an IrDA adapter. Older (pre-2003)
Bluetooth dongles, however, have limited capabilities, offering
only the Bluetooth Enumerator and a less-powerful Bluetooth Radio
incarnation. Such devices can link computers with Bluetooth with a
distance of 100 meters, but they do not offer as many services as
modern adapters do.Bluetooth Communication1. Radio Frequency
Communications (RF C) 0. Controls Frequency Hopping for Bluetooth1.
Logical Link Control (LLC)1. Link Management0. Security
Management0. QoS Management1. Transmission Scheduling Link Manager
Protocol (LMP) Configure, authenticate and handle the connections
Power management scheme
What is the data rate and range of Bluetooth?The data transfer
rate of Bluetooth technology varies depending on the version.
Version 1.2 offers up to 1Mbps. Version2.0 + Enhanced Data Rate
(EDR) offers up to 3Mbps, and data can be transferred at up to
24Mbps for Version3.0 + High Speed (HS) enabled devices. Version
3.0 + HS was adopted in April 2009. Version 2.1 + EDR was adopted
in July 2007.As for the operating range, this also varies depending
on the class of the Bluetooth device. Class 3 radios have a range
of up to 1 metre or 3 feet; class 2 radios, which are most commonly
found in mobile devices, have a range of 10 metres or 33 feet.
Class 1 radios, used primarily in industrial use cases, have a
range of 100 metres or 300 feet.
6Implementation
Bluetooth uses a radio technology called frequency-hopping
spread spectrum, which chops up the data being sent and transmits
chunks of it on up to 79 bands (1MHz each; centered from 2402 to
2480MHz) in the range 2,400-2,483.5MHz (allowing for guard bands).
This range is in the globally unlicensed Industrial, Scientific and
Medical (ISM) 2.4GHz short-range radio frequency band.Originally
Gaussian frequency-shift keying (GFSK) modulation was the only
modulation scheme available; subsequently, since the introduction
of Bluetooth 2.0+EDR, /4-DQPSK and 8DPSK modulation may also be
used between compatible devices. Devices functioning with GFSK are
said to be operating in basic rate (BR) mode where an instantaneous
data rate of 1 Mbit/s is possible. The term Enhanced Data Rate
(EDR) is used to describe /4-DPSK and 8DPSK schemes, each giving 2
and 3 Mbit/s respectively. The combination of these (BR and EDR)
modes in Bluetooth radio technology is classified as a "BR/EDR
radio".Bluetooth is a packet-based protocol with a master-slave
structure. One master may communicate with up to 7 slaves in a
piconet; all devices share the master's clock. Packet exchange is
based on the basic clock, defined by the master, which ticks at
312.5 s intervals. Two clock ticks make up a slot of 625 s; two
slots make up a slot pair of 1250 s. In the simple case of
single-slot packets the master transmits in even slots and receives
in odd slots; the slave, conversely, receives in even slots and
transmits in odd slots. Packets may be 1, 3 or 5 slots long but in
all cases the master transmit will begin in even slots and the
slave transmit in odd slots.Bluetooth provides a secure way to
connect and exchange information between devices such as faxes,
mobile phones, telephones, laptops, personal computers, printers,
Global Positioning System (GPS) receivers, digital cameras, and
video game consoles.Bluetooth BuzzwordsHere we give you a quick
list of terms and concepts you will come across when talking or
reading about the Bluetooth technology. These are some of the terms
you should know if you know what Bluetooth is and how it
works.Piconet: A group of devices connected by means of Bluetooth
technology in an ad hoc manner is known as a piconet. There can be
a maximum of 8 devices forming one piconet. For the duration of a
piconet connection, one device acts as the master and others act as
slaves in order to synchronize.Scatternet: A scatternet is composed
of two or more independent piconets. This brings about a
communication between piconets.Master unit: Its clock and hopping
frequency are used to synchronize other devices in the piconet. The
master device numbers the communication channels.Slave unit: The
slave units act in coordination with the master.Frequency Hopping
Spread Spectrum: When the carrier (waveform modulated with the
input signal) is rapidly switched among different frequency
channels, during signal transmission, the method is referred to as
frequency hopping spread spectrum.Packet Segmentation and
Reassembly: In this process, data packets of varying lengths are
fragmented to 48-bytes size when transmitting and reassembled at
the receiver's end to their original form, when data transfer is
complete.PAN: Short for Personal Area Network, a PAN refers to a
communication network formed between devices usually located within
the distance of a few meters from one another.
7List of applicationsA typical Bluetooth mobile phone
headset.Wireless control of and communication between a mobile
phone and a handsfree headset. This was one of the earliest
applications to become popular. Wireless control of and
communication between a mobile phone and a Bluetooth compatible car
stereo system Wireless Bluetooth headset and Intercom. Wireless
networking between PCs in a confined space and where little
bandwidth is required. Wireless communication with PC input and
output devices, the most common being the mouse, keyboard and
printer. Transfer of files, contact details, calendar appointments,
and reminders between devices with OBEX. Replacement of previous
wired RS-232 serial communications in test equipment, GPS
receivers, medical equipment, bar code scanners, and traffic
control devices. For controls where infrared was often used. For
low bandwidth applications where higher USB bandwidth is not
required and cable-free connection desired. Sending small
advertisements from Bluetooth-enabled advertising hoardings to
other, discoverable, Bluetooth devices. Wireless bridge between two
Industrial Ethernet (e.g., PROFINET) networks. Three
seventh-generation game consoles, Nintendo's Wii and Sony's
PlayStation 3 and PSP Go, use Bluetooth for their respective
wireless controllers. Dial-up internet access on personal computers
or PDAs using a data-capable mobile phone as a wireless modem.
Short range transmission of health sensor data from medical devices
to mobile phone, set-top box or dedicated telehealth devices.
Allowing a DECT phone to ring and answer calls on behalf of a
nearby cell phone Real-time location systems (RTLS), are used to
track and identify the location of objects in real-time using Nodes
or tags attached to, or embedded in the objects tracked, and
Readers that receive and process the wireless signals from these
tags to determine their locations. Personal security application on
mobile phones for prevention of theft or loss of items. The
protected item has a Bluetooth marker (e.g. a tag) that is in
constant communication with the phone. If the connection is broken
(the marker is out of range of the phone) then an alarm is raised.
This can also be used as a man overboard alarm. A product using
this technology has been available since 2009.Bluetooth Application
ModelsModelDescription
File TransferRefers to object transfer or transfer of files
between devices.
Internet BridgeIn this model, a cordless modem acts as a modem
to a PC and provides dial-up networking and faxing facilities.
LAN AccessMultiple data terminals use a LAN access point (LAP)
as a wireless connection to an Ethernet LAN.
SynchronizationThe synchronization model enables a
device-to-device synchronization of data.
HeadsetIt is wirelessly connected and can act as an audio
input-output interface of remote devices.
8Bluetooth ProfilesOne of the most useful innovations in the
Bluetooth standard is the use of device profiles. To use Bluetooth
wireless technology, a device has to be able to interpret certain
Bluetooth profiles, which are definitions of possible applications
and specify general behaviors that Bluetooth enabled devices use to
communicate with other Bluetooth devices. These profiles include
settings to parameterize and to control the communication from
start. Adherence to profiles saves the time for transmitting the
parameters anew before the bi-directional link becomes effective.
There are a wide range of Bluetooth profiles that describe many
different types of applications or use cases for devices.
Bluetooth StackThe message here is that Bluetooth is hairy like
TCP/IP. Older Bluetooth chips only provided HCI functionality. Now
they go up to the application layers: SPP, DUN, Headset.
9Bluetooth Chips - CSRCambridge Scientific Radio (CSR)
manufactures a large number of Bluetooth chips, probably more than
half of those shipped. This is a diagram of their Bluecore2
series.
Bluetooth Modules Free2MoveBluetooth modules add the components
needed to make a working radio: crystal, antenna, flash memory. The
current generation of modules measure about 1x0.5 w/
antenna.Free2Move (Sweden) has some particularly interesting
modules based on CSR BlueCore2-flash chips with audio.This radio
offers a functioning SPP for serial data, a 15-bit audio channel,
and another 8-bit A/D channel.
More Bluetooth HardwareCambridge Scientific Radio (CSR) chips
(in most peripherals)BlueCore2 chip Bluetooth v1.1, 16-bit XAP2
processor, A/D, audio optionsBlueCore3 chip Bluetooth v1.1-1.2,
XAP2 processor, audio DSP optionBlueCore4 chip Bluetooth V2.0, XAP2
processorAT&T Broadcom chips (in many PC + PDAs)BCM2040
Bluetooth v1.1-1.2, 8-bit 8051 processorBCM2037 Bluetooth v2.0 with
audio, 16-bit ARM7 processorBCM2045 Bluetooth v2.0 host side
chipClass 2 Modules (with antenna)Free2Move FM03AC2 Bluetooth v1.1
qualified, SPP, 15-bit audio + 8 bit A/DTaiyo Yuden EYMF2CAMM-XX
Bluetooth v1.1 qualified, serial port profileBlueGiga WT12
Bluetooth v2.0 EDR qualified, serial port profile + PCM Class 1
Modules (no antenna)Free2Move FM2M03C1 Bluetooth v1.1 qualified,
SPP, 15-bit audio + 8 bit A/D BlueGiga Wrap Thor 2022 Bluetooth
v1.1 qualified, SPP, DUN, OBEX, HID
10Bluetooth Security
These days, all communication technology faces the issue of
privacy and identity theft, with Bluetooth being no
exception.Almost everyone knows that email services and networks
require security.What users of Bluetooth need to realize is that
Bluetooth also requires security measures as well.The good news for
Bluetooth users is that the security scares, like most scares, are
normally over dramatized and blown entirely out of proportion.The
truth being told, these issues are easy to manage,with various
measures already in place to provide security for Bluetooth
technology.It's true that there has been some Bluetooth phones that
have been hacked into. Most devices that arehacked into are
normally those that don't have any type of security at
all.According to Bluetooth specialists, in order to hack into a
Bluetooth device, the hacker must:Force two paired devices to break
their connection.2. Steal the packets that are used to resend the
pin.3. Decode the pin.Of course, the hacker must also be within
range of the device, and using very expensive developer type
equipment. Most specialists recommend that you have a longer pin,
with 8 digits being recommended.Security OverviewBluetooth
implements confidentiality, authentication and key derivation with
custom algorithms based on the SAFER+ block cipher. Bluetooth key
generation is generally based on a Bluetooth PIN, which must be
entered into both devices. This procedure might be modified if one
of the devices has a fixed PIN (e.g., for headsets or similar
devices with a restricted user interface). During pairing, an
initialization key or master key is generated, using the E22
algorithm. The E0 stream cipher is used for encrypting packets,
granting confidentiality and is based on a shared cryptographic
secret, namely a previously generated link key or master key. Those
keys, used for subsequent encryption of data sent via the air
interface, rely on the Bluetooth PIN, which has been entered into
one or both devices.An overview of Bluetooth vulnerabilities
exploits was published in 2007 by Andreas Becker.In September 2008,
the National Institute of Standards and Technology (NIST) published
a Guide to Bluetooth Security that will serve as reference to
organizations on the security capabilities of Bluetooth and steps
for securing Bluetooth technologies effectively. While Bluetooth
has its benefits, it is susceptible to denial of service attacks,
eavesdropping, man-in-the-middle attacks, message modification, and
resource misappropriation. Users/organizations must evaluate their
acceptable level of risk and incorporate security into the
lifecycle of Bluetooth devices. To help mitigate risks, included in
the NIST document are security checklists with guidelines and
recommendations for creating and maintaining secure Bluetooth
piconets, headsets, and smart card readers.Bluetooth v2.1 -
finalized in 2007 with consumer devices first appearing in 2009 -
makes significant changes to Bluetooth's security, including
pairing. See the #Pairing mechanisms section for more about these
changes.
11
Bluetooth Vulnerabilities and Security RisksBluejacking is the
process of sending unsolicited messages, or business cards, to
Bluetooth-enabled devices. This does not involve altering any data
from the device, but nonetheless, it is unsolicited. Devices that
are set in non-discoverable mode are not susceptible to
bluejacking. In order for bluejacking to work, the sending and
receiving devices must be within 10 meters of one another. While
this method has been widely used for promotional purposes,
Bluetooth deviceowners should be careful never to add the contact
to their address book. While bluejacking is usually not done with
malicious intent, repetitive bogus messages can be annoying to the
user, and in some cases, can render the product inoperable. This
can also open the door to a variety of social engineering attacks.
Bluesnarfing is a method of hacking into a Bluetooth-enabled mobile
phone and copying its entire contact book, calendar or anything
else stored in the phone's memory. By setting the device in
non-discoverable, it becomes significantly more difficult to find
and attack the device. However, .the software tools required to
steal information from Bluetooth-enabled mobile phones are widely
available on the Web, and knowledge of how to use them is growing..
(Kotadia, 2004) Companies such as Nokia and Sony Ericsson are
making sure new phones coming to market will not be susceptible to
bluesnarfing. .The backdoor attack involves establishing a trust
relationship through the .pairing. mechanism, but ensuring that it
no longer appears in the target.s register of paired devices. In
this way, unless the owner is actually observing their devices at
the precise moment a connection is established, they are unlikely
to notice anything untoward, and the attacker may be free to
continue to use any resource that a trusted relationship with that
device grants access to.This means that not only can data be
retrieved from the phone, but other services, such as modems, or
Internet, WAP and GPRS gateways may be accessed without the owner.s
knowledge or consent.. (The Bunker, 2003) The cabir worm is
malicious software that uses Bluetooth technology to seek out
available Bluetooth devices and send itself to them. According to
Bluetooth SIG (2006), .The cabir worm currently only affects mobile
phones that use the Symbian series 60 user interface platform and
feature Bluetooth wireless technology. Furthermore, the user has to
manually accept the worm and install the malware in order to infect
the phone.. Although this may be the case, this shows that it is
achievable to write mobile viruses that spread via Bluetooth and
may cause other hackers to explore the possibilities of writing
Bluetooth viruses. The Mabir worm is essentially a variant of the
Cabir worm where it uses Bluetooth and Multimedia Messaging Service
messages (MMS) to replicate.Fundamentals of security:The "pairing
process" is one of the most basic levels of security for Bluetooth
devices. Pairing, is two or more Bluetooth devices that recognize
each other by the profiles they share - in most cases they both
must enter the same pin. The core specifications for Bluetooth use
an encryption algorithm, which is completely and entirely secure.
Once the devices pair with each other, they too become entirely
secure. Until they have successfully paired, the Bluetooth devices
won't communicate with each other. Due to this pairing process and
the fact that it is short range - Bluetooth technology is
considered to be secure. As the news has indicated, experienced
hackers have developed ways to get around this level of basic
security. There are ways to get around this threat, as you can
install software to prevent hackers from getting in. With Bluetooth
becoming more and more popular, it's really no wonder that security
is always in question. As Bluetooth gets bigger and better,
security will always be something that no one really takes lightly.
If you've been concerned about Bluetooth security in the past, rest
assured that newer devices will offer bigger and better security.
Preventing hackers from getting in is something every owner is
concerned about - and the manufacturer's are very aware.
12Bluetooth Security IssuesBluetooth can operate in one of three
security models:Mode 1 is non security.Mode 2 provides security at
the service level, after the channel is established.Mode 3 provides
security at the link level, before the channel is established.Each
Bluetooth device has a unique 48-bit device address. The
authentication scheme is challenge-response, using symmetric keys,
and encryption is done with a key that can be up to 128 bits
(negotiated by the communicating devices, with each device having a
maximum key length defined). A 128 bit random link key handles
security transactions between two or more devices.When two
Bluetooth devices establish a communications channel, they both
create an initialization key. A passkey or Personal Identification
Number is input and the inititalization key is created, and the
link key is calculated using it. Then the link key is used for
authentication. The first security concern is the passkey or PIN.
As with any key, long keys are more secure than short ones. If a
hacker is able to discover the passkey, he can calculate possible
initiation keys, and then from that, calculate the link key. Making
the passkey long will make it much harder to accomplish the first
step. The initial key exchange takes place over an unencrypted
link, so it is especially vulnerable. Its best if this part of the
BT device pairing process takes place in a more physically secure
location (that is, where there are not likely to be any lurkers
with BT devices who could intercept the communications). A hacker
could record transmissions sent over the BT frequency and use them
to recreate the PIN. Rather than using the same fixed passkey all
the time, it should be changed frequently (how frequently depends
on the types of devices and the required security level). Link keys
can be combination keys or unit keys. Best security practice is to
use combination keys instead of unit keys. When you use a unit key,
you must use the same key for all secure transactions, and the key
has to be shared with other trusted devices. This means any trusted
device can potentially access traffic with other trusted devices
using this key. Its possible to use the Bluetooth address to
identify a particular device (and associated user) and log those
transactions, which can create privacy concerns.Why Does Bluetooth
Security Matter?Many Bluetooth users only use the technology to
connect a wireless headset or similar device to their portable
computers, and they may wonder why security is a big deal.
Implementing security, even for these types of device pairings, can
prevent an unauthorized user from using the headset.However,
another use of Bluetooth is to create a temporary computer network.
For example, several people in a meeting room can connect their
Bluetooth-enabled laptops to each other to share files during the
meeting. When you use Bluetooth to create a temporary network, it
is usually an ad hoc network; that is, computers communicate
directly with each other rather than going through a wireless
access point (WAP). This means you have no centralized point of
security control, as you do with a WAP (for example, you can
configure a WAP to use MAC address filtering and other built-in
security mechanisms). Thus, security becomes a major concern
because you can be exposing important data stored on your laptop to
others on the Bluetooth network. Remember that the range for class
1 Bluetooth devices can be more than 300 feet far enough so that in
some locations, the BT equivalent of the wi-fi war driver may be
able to establish a link with your computer even though not within
your sight. Another special concern is the security of Bluetooth
mobile phones. These phones may have information stored on them
such as the addresses and phone numbers of contacts, calendar
information and other PDA-type data. Hacking into these phones
using Bluetooth is called bluesnarfing. Newer mobile phones and
software upgrades for older phones can patch this vulnerability. A
related hacking technique is called bluebugging, and it involves
accessing the phones commands so that the hacker can actually make
phone calls, add or delete contact info, or eavesdrop on the phone
owners conversations. This vulnerability, too, is being addressed
by phone manufacturers. Thus, if you own a BT-enabled phone, its
important to keep the software updated or upgrade to the latest
phone models frequently.
13Advantages
Main Reasons to Use a Bluetooth Device:Bluetooth Devices are
WirelessIf you navigate through the rest of our site you will learn
that there are tons of advantages/benefits when using wireless
devices. In addition to improving safety as a result of eliminating
the clutter of wires and associated hazardous connections, wireless
technology also offers many convenient advantages. For example,
when you are traveling with your laptop, PDA, MP3 player and other
devices, you no longer have to worry about bringing along all of
your connecting cables.Bluetooth Technology is InexpensiveBluetooth
technology is cheap forcompanies to implement, which results in
lower over-allmanufacturing Costs. These savings are then passed on
to you, the consumer. The end result: Bluetooth devices are
relatively inexpensive.Bluetooth is AutomaticBluetooth doesn't
require you to think about setting up a connection or to push any
buttons. When two or more Bluetooth devices enter a range (Up to 30
feet) of one another, they automatically begin to communicate
without you having to do anything. Once the communicating begins,
Bluetooth devices will setup Personal Area Networks or Piconets.
The best part is: The devices take care of the entire setup
process, and you can go about your business.Standardized Protocol =
InteroperabilitySince Bluetooth is a standardized wireless
specification, a high level of compatibility among devices is
guaranteed. The Bluetooth specification uses and defines various
profiles. Every Bluetooth profile is specific to a particular
function. For instance, when a Bluetooth enabled cell phone and a
Bluetooth headset (Both with the same profile) are communicating
with one another, both will understand each other without the user
having to do anything, even if the devices are of different
models/makes.Low Interference (If Any) Bluetooth devices avoid
interference with other wireless devices by:Using a technique known
as spread-spectrum frequency hopping, and Using low power wireless
signals. Low Energy ConsumptionAs stated above, Bluetooth uses low
power signals. As a result, the technology requires little energy
and will therefore use less battery or electrical power. Obviously,
this is a great benefit for mobile devices because Bluetooth won't
drain the life of your device's battery.Share Voice and DataThe
Bluetooth standard allows compatible devices to share both voice
and data communications. For example, it is probably no surprise
that a Bluetooth enabled cell phone is capable of sharing voice
communications with a compatible Bluetooth headset, however, the
same cell phone may also be capable of establishing a GPRS
connection to the Internet. Then, using Bluetooth, the phone can
connect to a laptop. The result: The laptop is capable of surfing
the web or sending and receiving email.Instant Personal Area
Network (PAN)Up to seven compatible Bluetooth devices can connect
to one another within a proximity of up to 30 feet, forming a PAN
or piconet. Multiple piconets can be automatically setup for a
single room.
14Upgradeable The Bluetooth standard is upgradeable. A
development group at the Bluetooth Special Interest Group (SIG) has
been given the task of working on the new Bluetooth version 2,
which offers several new advantages and is backward compatible with
the older versions.
The Technology is Here to Stay Bluetooth is a universal,
world-wide, wireless standard. Therefore, you can count on it being
around for years to come. As more devices begin to use Bluetooth
technology, electronics manufacturers will be increasingly eager to
make their products compatible, using Bluetooth. A chain reaction
is inevitable, in fact, it has already begun.Automatic setting up
Bluetooth connectivity is automatic Bluetooth and doesnt need
professionals. When two or more devices entera range of up to 30
feet of each other the communication automatically begins between
them. Standard protocol - Bluetooth is standardized wireless
guarantees the high level of compatibility among devices. Bluetooth
devices connect to each other irrespective of their model.Instant
PAN (Personal Area Network) - You can have your own personal are
network for sharing data among your group consisting of up to seven
Bluetooth devices within a range of up to 30 feet.Simplifies
communication while driving companies like parrot manufactures
Bluetooth car kits resolving the audio and communication issues
arising while driving, as Bluetooth simplifies talking and
listening music on your cell phone while driving. Avoids
interference from other wireless devices - Bluetooth devices avoid
interference from other wireless devices with the usage of
technique known as frequency hopping, and low power wireless
signals.Ease of AccessUnlike a wireless Local Area Network (LAN),
Bluetooth doesn't need any configuration to start a connection and
perform file transfers. Consequently, Bluetooth is a great
alternative for business environments in which wireless file
transfers are utilized. In laptops, establishing a wireless
connection is as easy as pressing the Bluetooth shortcut or hot
key.SecurityThe Bluetooth connection can be securely established
without interference from unrecognized devices by entering an
identification number for the connection. The user of the master
device--the one which starts the connection--can opt to enter a PIN
which creates the secure usage loop.ControlUnless a device is
already paired to your device, you have the option to accept or
reject the connection and file transfer. This prevents unnecessary
or infected files from unknown users from transferring to your
device.Free AccessAccessing a Bluetooth device doesn't cost money;
all you need is the Bluetooth capability.InternetBluetooth is not
recommended for establishing Internet connections because of its
limited transfer rate. A LAN connection is more efficient.
15DisadvantagesData Transfer RateData sent between two Bluetooth
devices has a maximum transfer speed of one megabyte per second.
Infared is capable of transferring data at 4MB per second, and
Wi-Fi is capable of speeds even higher. The slow transfer speed
makes Bluetooth not an ideal choice for data transfer when faster
connection methods are available.RangeBluetooth only has a range of
15 to 30 feet depending on the device. The small range is a
disadvantage for some who may want to use a Bluetooth device
outside of that 30-foot radius. For instance, a Bluetooth printer
in a home could not necessarily be used by every computer in the
house if some of those computers are located out of the range of
the printer. A Wi-Fi printer, however, could be used by anyone who
could connect to the home's wireless network.SecuritySince data is
transferred over radio waves using Bluetooth, it is is much easier
for a hacker to break into than secure wireless networks. For that
reason, Bluetooth should not be used to transfer data that needs to
remain private and secure.Battery UseBluetooth uses the battery
power of a particular device in order to operate. Many cell phone
makers send phones out with Bluetooth powered off in order to
maximize the battery life of the phone. Turning Bluetooth on, while
convenient, can drain a cell phone or computer battery, causing it
to run out of juice long before it would have if Bluetooth was not
powered on.Susceptibility to interferenceAll Bluetooth enabled
devices operate within the 2.4 GHz band, which is the same
unlicensed frequency used by many other electronic devices such as
microwaves, cordless phones, and the majority of Wi-Fi devices.
This frequency sharing could lead to slower overall network
performance because some of the signals collide, don't reach their
destination, and have to be re-sent. However, since Bluetooth
wireless transmissions "hop" all over the bandwidth, this greatly
decreases the likelihood of impacting other 2.4 GHz broadcasts.
Though the impact is usually negligible, there are situations that
can arise where Bluetooth devices can dilute Wi-Fi signals,
especially if there are a great number of devices operating in
different pairs. The Bluetooth SIG is making every effort to ensure
that both of these issues will be soon be negated by the new
standard.Bluetooth Limitations Communication speed is not that
great with Bluetooth technology. Wi-Fi and Infrared communication
can happen at much higher speeds compared to that of Bluetooth.
Though Bluetooth communication is considered secure, if a user
happens to leave his/her device in the 'discoverable' mode, a
hacker can eavesdrop or establish a connection with the
'discovered' device without the user knowing about it. If Bluetooth
is in the ON mode, it does drain the battery. So one needs to be
careful about switching Bluetooth ON only for the time span of
communication and turn it OFF after the communication ends. This
practice also reduces the security risk involved with Bluetooth
technology.
USES of Bluetooth in Now a DAY
16Top of FormTop of Form Page Image
BTRichHTML1BTRichHTML2
Medical & Health DevicesIncreasing awareness of the benefits
of a healthy, independent lifestyle creates a booming market for
devices that permit an important share of primary care to be
conducted remotely, in the comfort of the patient's home.
Sports & Fitness DevicesToday'sathletes and anyone who
wantsto get in shape or stay in shape are eager to improve their
results. Many are using Bluetooth technology to help. Page
Image
BTRichHTML1BTRichHTML2Bluetooth Technology and Internet
AccessYou can also access internet through mobile using Bluetooth
technology.Page ImageBTRichHTML1BTRichHTML2Here is a roll call of
some the first Bluetooth Smart Ready and Bluetooth Smart
devices:Polar releasing first Bluetooth Smart heart-rate strap
Polar H7 heart strapThis Bluetooth Smart device allows you to
quickly connect to any Bluetooth Smart Ready device, such as a
tablet or smartphone, to store and display heart rate data and
other workout statistics.Polar makes a wide variety of heart rate
sensors and fitness watches with sophisticated training features.
This is the company's first Bluetooth Smart device, and its second
Bluetooth enabled heart-rate monitor.
17Casio ready to release its first Bluetooth Smart deviceCasio
G-Shock smart watchCasio has created its first Bluetooth Smart
devicea watch that's able to communicate wirelessly with a
Bluetooth Smart Ready phone.The Casio G-Shock GB-6900 can notify
youwith a tone or vibration when you receive newcalls or emails,
anddisplays a visiblealert. This could be especially useful when
your phoneis stashed in a pocket or purse. The new G-Shock will be
available in black, white and red. Because the watch uses Bluetooth
low energy technology, it will be able to operate for two years on
a single coin-cell battery.The GB-6900 is reportedly due out in
Japan by the end of December. No word yet on a release date or
price for North America or Europe.
Motorola releases its first Bluetooth Smart Ready phonethe Droid
RAZR
Droid RAZRMotorola has resurrected its renowned RAZR phone brand
with a new Android smartphone that becomes the company's first
Bluetooth Smart Ready device. The new Droid Razr is nothing like
the best-selling RAZR phones of a decade ago, however, except for
its thinness.This RAZR has a 4.3-inch qHD Super AMOLED display (a
first for any mobile phone), a dual-core processor,a tough,
"gorilla glass" screen, and a slim profile ofjust 7.1mm.The Droid
RAZR is the second Bluetooth Smart Ready phone to reach the market,
joining the new Apple iPhone 4S.The Droid RAZR is available now
from Verizon Wireless for $299 on contract.
18
MotorolareleasesBluetooth Smartdevice for music, running and
more
MOTOACTVThis tiny new Bluetooth Smart device from Motorola is a
sophisticated fitness tracker, smart music player and training
system. It lets you listen to music on the optional Motorola SF600
Bluetooth wireless headphones while running or doing other workouts
in the gym or outside.The MOTOACTV includes precision GPS to track
your distance and speed, a "smart" music player that learns what
songs motivate you the most by tracking your performance against
your music, a touchscreen, audio "coaching" on pace and distance,
and more.The MOTOACTV costs $249 for 8GB of memory or $299 for the
16GB version.Apple releases world's first Bluetooth Smart Ready
computers and phone
iPhone 4SThe new iPhone 4S may look like the iPhone 4, but it
has many important differences inside. One big addition is the use
of Bluetooth v4.0. This will allow the new iPhone to wirelessly
connect to the next generation of devices coming out later this
year with Bluetooth v4.0.The new iPhone 4S also features a more
advanced camera, the more powerful A5 processor, and many new
software features.
Mac miniLike the MacBook Air, the new Mac mini also adds
Bluetooth v4.0, which wil allow it to wirelessly connect to the
next generation of Bluetooth v4.0 phones and other devices coming
out later this year. The new Mac mini also features the
latestdual-core Intel Core i5 and i7 processors, AMD Radeon HD
graphics, andhigh-speed Thunderbolt I/O technology.
19MacBook AirThe new MacBook AirApple's thinnest and lightest
notebookadds Bluetooth v4.0. This will allow it to wirelessly
connect to the next generation of mobile phones and many other
devices coming out later this year with Bluetooth v4.0.The new
MacBook Air also features the latest-generation Intel Core i5 and
i7 processors,high-speed Thunderbolt I/O technology, and all-flash
storage.Dayton and Nordic create first Bluetooth Smart device heart
strap
Dayton heart-rate strapDayton Industrial Co. Ltd has created the
world's first production-readyheart-rate chest strap that is a
Bluetooth Smart device. The strapuses a new Bluetooth v4.0 low
energy chip from Nordic Semiconductor. The device is now ready to
go intoproduction and will be able to pair with the new wave of
Bluetooth Smart Readyphones expected out later this year.Users
won't need a special matching watch like most heart-rate monitors
use today. According to Nordic, the strap can be paired with a
phone or other Bluetooth Smart Readydevice in seconds, allowing
people to display their heart rate on their phone while they work
out and analyze it later.Page ImageBTRichHTML1BTRichHTML2Do more
when you're on the goBluetooth enabled wireless headsets and
hands-free car systems have always helped drivers focus on the
road. Today, new versions of these devices are better than ever,
with features that ensure a completely hands-free calling
experience made possible by speech recognition, text-to-speech
technology, and "speech trigger" capabilities that lets you turn on
hands-free calling devices just by speaking a command.
Mobile PhonesAccess and browse your mobile device's phone book
from your car's navigation display and make hands-free phone calls.
Play music from your phone through your car's speaker system,
without cables, adapters, or plugs.
20Car KitsDon't have Bluetooth technology built into your
vehicle? No problem. Inexpensive Bluetooth enabled car kits and
speakerphones let you talk hands-free in your car even without a
built-in hands-free system.
GPS navigationConnect to the Internet through a mobile phone and
update your "Points of Interest" database and other map data
easily, wirelessly. Use the built-in microphone in some Bluetooth
enabled GPS devices to talk hands-free on a phone paired with the
GPS device.
Portable Music PlayersUse a Bluetooth adapter to stream music
from your iPod or MP3 player to your car's audio system.
Health monitorsCar displays that can help people with diabetes
monitor their blood-glucose level while driving, by using a
wireless glucose monitoring device with Bluetooth technology they
pair with their car.
Bluetooth, the wireless radio technology for short distance
mobile communications, has becomepervasive in mobile computing,
used in laptops and headsets as well as popular smart phones such
as the BlackBerry, and even in RadioFrequency identification (RFID)
readers. Developing with BluetoothThe newest modules make it pretty
easy to go wireless. Most modules can be used as serial cable
replacements. The next simplest step is to add a microprocessor to
act as controller (PIC etc.), using the modules serial profile. But
since new BT chips have a powerful, energy-efficient processor
on-board already, this is rather wasteful. You can develop for the
native processor, but you will need to buy some expensive
development tools. CSR and some module vendors provide virtual
machines so your code cant void the modules qualification.
21What is the future of Bluetooth?The future of Bluetooth looks
strong, with initiatives underway for higher throughput, more
ubiquitoususage and links with Wifi and Ultra Wideband (UWB)
broadcast technology.Operating systems such as the MacOS and
Windows continue to have native support for Bluetooth. The
Bluetooth SIG partners are working on enabling Bluetooth
information points, to enable advertising models based around users
pulling information from information points, rather than having to
push information out. Other emerging features include Bluetooth in
cars; automatic configuration of piconets; and quality of service
(QoS) improvements, for example enabling audio and video data to be
transmitted at a higher quality.The future of BluetoothIt is
estimated that there are more than one billion devices in use that
utilize Bluetooth wireless technology. You can expect that number
to rise sharply when Bluetooth 3.0 devices become more
common.Bluetooth 3.0Bluetooth 3.0 is the new Bluetooth wireless
standard adopted by the Bluetooth SIG on April 21, 2009. The new
standard supports higher data transfer speeds and builds upon the
previous standards. With its higher speed, the technology has the
potential to revolutionize the consumer electronics industry.It's
FASTBluetooth 3.0 can transfer files at rates of up to 24 megabytes
per second. At those speeds, high-quality streaming video is a
definite possibility, along with a host of other applications that
are simply impractical with the current transfer rates.Picture
this...With Bluetooth 3.0, camcorders will stream video footage or
still photos to Bluetooth enabled televisions and computers;
digital cameras will stream photo slideshows to cell phones, and
laptops will ave the ability to transfer presentations wirelessly
to a projector. Use your imagination the possibilities are really
exciting.Backwards compatibilityBest of all, Bluetooth 3.0 will be
backwards-compatible, so all of your old devices will be able to
communicate with the new ones and vice versa. But bear in mind that
transfer speeds are only as fast as the slowest device, meaning
that the two will exchange data at the slower, 3-megabyte rate of
Bluetooth 2.1.
Future0. Success of Bluetooth depends on how well it is
integrated into consumer products0. -Consumers are more interested
in applications than the technology 0. -Bluetooth must be
successfully integrated into consumer -- products0. -Must provide
benefits for consumer 0. -Must not destroy current product benefits
0. Key Success Factors1. -Interoperability1. -Mass Production at
Low Cost1. -Ease of Use1. -End User Experience
Bottom of FormBottom of FormBottom of FormBottom of Form