Top Banner
Presentation Report Topic:- Department:- CS&IT Class:- SE-I (2011-2015) Submitted to:- Sir. Mohsin Manshad. Date:- 07/02/2012 Group Members Name Roll # 1. Bilal Maqbool. 10 (Bluetooth Introduction & History) 2. Khalil Ahmed. 48 (Communication & working of Bluetooth) 3. Nisar Ahmed. 06
34

Bluetooth PPT Report

Mar 03, 2017

Download

Education

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript

Presentation ReportTopic:-Department:-CS&ITClass:-SE-I (2011-2015)Submitted to:-Sir. Mohsin Manshad.Date:-07/02/2012Group MembersName Roll #Bilal Maqbool.10 (Bluetooth Introduction & History)Khalil Ahmed.48(Communication & working of Bluetooth)Nisar Ahmed.06(Security of Bluetooth)Muhammad Junaid.45(Advantages & Disadvantages of Bluetooth)Abdul Ghafar.14(Use of Bluetooth in now a days & its Future)Contents

12233456889101112121315162021TopicPage #1. Introduction Of Bluetooth2. Bluetooth History3. History of Bluetooth Name4. Version 5. Bluetooth Technology Over the Years6. How does Bluetooth work7. Communication and connection 8. Implementation9. Bluetooth Profiles10. Bluetooth Stack11. Bluetooth Chips - CSR12. Bluetooth Security 13. Fundamentals of security 14. Bluetooth Security Issues15. Why Does Bluetooth Security Matter16. Advantages17. Disadvantages18. USES of Bluetooth in Now a DAY19. Developing with Bluetooth20. The future of Bluetooth

1IntroductionBluetooth technology is a short-range communications technology that is simple, secure, and everywhere. You can find it in billions of devices rangingfrom mobile phones and computers to medical devices and home entertainment products. It is intended to replace the cables connectingdevices, while maintaining high levels of security. The key features of Bluetooth technology are robustness, low power, and low cost. The Bluetooth Specification defines a uniform structure for a wide range of devices to connect and communicate with each other. When two Bluetooth enabled devices connect to each other, this is called pairing. The structure and the global acceptance of Bluetooth technology means any Bluetooth enabled device, almost everywhere in the world, can connect to other Bluetooth enabled devices located in proximity to one another. Connections between Bluetooth enabled electronic devices allow these devices to communicate wirelessly through short-range. The range of Bluetooth technology is application specific. The Core Specification mandates a minimum range of 10 meters or 30 feet, but there is no set limit and manufacturers can tune their implementations to provide the range needed to support the use cases for their solutions.Bluetooth is a proprietary open wireless technology standard for exchanging data over short distances (using short wavelength radio transmissions in the ISM band from 2400-2480MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. Created by telecoms vendor Ericsson in 1994, it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization. Bluetooth is managed by the Bluetooth Special Interest Group, which has more than 15,000 member companies in the areas of telecommunication, computing, networking, and consumer electronics. The SIG oversees the development of the specification, manages the qualification program, and protects the trademarks. To be marketed as a Bluetooth device, it must be qualified to standards defined by the SIG. A network of patents is required to implement the technology and are only licensed to those qualifying devices; thus the protocol, whilst open, may be regarded as proprietary.What are Bluetooths key features?The key features of Bluetoothtechnology are robustness, low power, and low cost, and the fact that it has become a universal standard for exchanging data amongst a range of fixed and mobile devices.In addition, Bluetooth wireless technology has the ability to simultaneously handle both data and voice transmissions. This means that users can use a varietyof applications such as a hands-free headset for voice calls, printing and fax capabilities, and synchronizing PDAs, laptop, and mobilephone applications.What devices is Bluetooth used in?Bluetooth technology offers a way to connect and exchange information between wide varieties of devices. These include mobile phones, telephones, laptops, PCs, printers, Global Positioning System (GPS) receivers, digital cameras, and videogame consoles. The PurposeThe purpose of Bluetooth technology is to connect numerous electronic devices together without the need of wires. For example, a Bluetooth headset allows you to talk on your cell phone without using your hands. Many states have banned the use of cell phones while operating a vehicle, unless the driver has a way of using the phone and keeping both hands on the wheel. Bluetooth technology makes this possible. Video game controllers, such as those designed for the PlayStation 3, also use Bluetooth technology, eliminating the need to connect the controller to the console with a wire.

2Bluetooth HistoryFlag this photoIn 1994, Swedish company Ericsson Mobile Communications launched the Bluetooth wireless technology movement. Ericsson wanted to investigate a radio interface that would prove low-cost and low-power. Goals included the elimination of wire clutter between different devices from differing industries. Creating a single wireless standard would unite computer devices and telecommunications. This wireless technology has connected devices in close proximity, regardless of brand.OriginBluetooth was developed by Ericsson, a large Swedish telecommunications equipment manufacturer. The specification was developed in 1994 by Jaap Haartsen and Sven Mattisson, who were working for Ericsson at the time.The FormationBluetooth technology was officially introduced in 1998, although it was in development in Scandinavia prior. Both the name "Bluetooth" and the logo associated with it have been trademarked by SIG (Bluetooth Special Interest Group). Numerous companies belong to SIG including Ericsson, IBM, Microsoft, Intel, Nokia, Toshiba and Agere. The SIG trade association continues to work on progressing and researching the use of Bluetooth technology in the computing, automotive, industrial automation and telecommunication industries.The Bluetooth SIGThe name Bluetooth and its logo are trademarked by the privately held trade association named the Bluetooth Special Interest Group (SIG). Founded in September 1998, the Bluetooth SIG is a unification of leaders in the telecommunications, computing, network, industrial automation, and Automotive industries. Today, the Bluetooth SIG is responsible for encouraging and supporting research and development in Bluetooth technology.The Bluetooth SIG includes promoter member companies Microsoft, Ericsson, IBM, Intel, Agere, Motorola, Nokia, and Toshiba, plus thousands of Associate and Adopter member companies (BlueTomorrow.com's parent company, SP Commerce LLC, is a licensed and certified Adopter member of the Bluetooth SIG).History of Bluetooth NameBluetooth is named for Viking leader and Danish king Harald "Bluetooth" Blatand (940-981). Jim Kardach, who worked for Intel, heard about King Harald Bluetooth from Sven Mathesson of Ericsson. King Harald Bluetooth united Denmark and Norway and helped bring Christianity to Scandinavia.Intel suggested the codename "Bluetooth" as a temporary name for the SIG program. As a modern day counterpart, the SIG also saw the power of unity as they sought to unite computer devices and telecommunications with a short-range wireless link. During contract preparations, with no agreed formal name, the Bluetooth codename was inserted and resulted in Bluetooth SIG. A board meeting accepted IBM's proposed name, Personal Area Networking (PAN), yet a trademark online search resulted in thousands of hits. The SIG instead launched with the Bluetooth name that remains synonymous with short range radios.Origin of LogoThe logo is the combined German Runes of Harglass (which is the Latin equivalent of "H") and Berkanan (which is analogous to the Latin "B"). These letters represent the origin of the name Harald Bluetooth.

3VersionVersion 1.XBluetooth 1.0 was established in the early days of the product's standardization. As a result, many manufacturers' equipment did not work with other products. Bluetooth 1.1 and 1.2 fixed some of these interoperability problems.Version 2.XBluetooth Version 2.0 was released in November 2004. Version 2.0 increased the speed of the Bluetooth protocol. It was backwards compatible with Bluetooth 1.1. In July 2007, Bluetooth 2.1 was released.Version 3.0Bluetooth Version 3.0 will increase data speed and reduce power consumption. As of April 2009, it has not yet been releasedThe history of Bluetooth technology dates back more than a decade. Since its introduction onto the market, Bluetooth technology has revolutionized the way we stay connected, and the way electronic devices stay connected to each other. The technology behind Bluetooth continues to advance. Bluetooth technology can be found in a wide range of electronic devices, including cell phones and video game controllers.Bluetooth Technology Over the Years1998- Bluetooth technology is officially introduced and the Bluetooth SIG is formed. Bluetooth technology'sintended basic purpose is to be a wire replacement technology in order to rapidly transfer voice and data.1999- Bluetooth 1.0 Specification is introduced.2004- Bluetooth Version 2.0 + EDR (Enhanced Data Rate) is introduced.2005- Devices using Version 2.0 + EDR begin to hit the market in late 2005.2007- Bluetooth Core Specification Version 2.1 + EDR is adopted by the Bluetooth SIG.2009- Bluetooth Core Specification Version 3.0 + HS (High Speed) is adopted by the Bluetooth SIG.

Exmaple

The Bluetooth enabled Eclipse CD5030 lets users control their cell phones wirelessly via their car stereo.

4How does Bluetooth work?Bluetooth uses a radio technology which is called frequency-hopping spread spectrum. It works by chopping up the data that is being sent, and transmitting sections of it on up to 79 frequencies. Spread-spectrum is good for several reasons. Firstly, the signals are very resistant to narrowband interference, which means the transmissions are more likely to reach their destination quickly and intact. Spread-spectrum transmissions can share a frequency band with many types of conventional transmissions with minimal interference. Also, spread-spectrum signals are also very difficult to intercept, making the technology relatively secure except for some early securityissues. Working of Bluetooth TechnologyNow, about how Bluetooth works... Bluetooth Special Interest Group manages and maintains the Bluetooth Standard. IEEE has accepted it as 802.15la standard. Bluetooth was developed with the purpose of creating a single digital wireless protocol, capable of connecting multiple devices and getting over synchronization issues between them. It enables short-range wireless communication thus replacing the wires that are used to connect multiple devices.Transmission over Short DistancesThe Bluetooth RF transceiver lies at the physical layer. There are 79 Bluetooth channels spaced 1MHz apart. A spread spectrum technology is used at the physical layer. Both voice and data transmissions over short distances are possible, creating wireless PANs.Instructions to CommunicateA Bluetooth device consists of an adapter. A Bluetooth adapter can be built into a device or can be in the form of a card that connects to a device. Instructions are embedded into the device, which enable it to communicate with other devices.Packet Segmentation and ReassemblyWhen devices come in each other's radio range, their link managers discover each other. Link management protocol (LMP) engages itself in peer-to-peer message exchange. LMP layer performs link setup and negotiation of packet size. Segmentation and reassembly of packets is done, if needed.Connection Sets UpThe service delivery protocol enables a Bluetooth device to join a piconet. A device inquires what services are available with the piconet. Bluetooth GlobalID (a unique identification for each device in the network) is exchanged between the devices. Their profiles are matched and a connection is set up.Signal TransferBluetooth uses frequency hopping in time slots, which means that the Bluetooth signals avoid interference with other signals by hopping to a new frequency after transmission or reception of every packet. One packet can cover up to five time slots. Bluetooth can support an asynchronous data channel, or up to 3 simultaneous synchronous voice channels, or a channel, which concurrently supports asynchronous data and synchronous voice. Master SlaveBluetooth technology makes use of the concept of a master and slave. Devices have to wait until the master allows them to talk! One master and up to seven slaves employ a star topology to form a piconet and begin to communicate with one another (as per orders from their master of course)!

5Communication and connectionA master Bluetooth device can communicate with a maximum of seven devices in a piconet (an ad-hoc computer network using Bluetooth technology), though not all devices support this limit. The devices can switch roles, by agreement, and the slave can become the master (for example, a headset initiating a connection to a phone will necessarily begin as master, as initiator of the connection; but may subsequently prefer to be slave).The Bluetooth Core Specification provides for the connection of two or more piconets to form a scatternet, in which certain devices simultaneously play the master role in one piconet and the slave role in another.At any given time, data can be transferred between the master and one other device (except for the little-used broadcast mode). The master chooses which slave device to address; typically, it switches rapidly from one device to another in a round-robin fashion. Since it is the master that chooses which slave to address, whereas a slave is (in theory) supposed to listen in each receive slot, being a master is a lighter burden than being a slave. Being a master of seven slaves is possible; being a slave of more than one master is difficult. The specification is vague as to required behaviour in scatternets.Many USB Bluetooth adapters or "dongles" are available, some of which also include an IrDA adapter. Older (pre-2003) Bluetooth dongles, however, have limited capabilities, offering only the Bluetooth Enumerator and a less-powerful Bluetooth Radio incarnation. Such devices can link computers with Bluetooth with a distance of 100 meters, but they do not offer as many services as modern adapters do.Bluetooth Communication1. Radio Frequency Communications (RF C) 0. Controls Frequency Hopping for Bluetooth1. Logical Link Control (LLC)1. Link Management0. Security Management0. QoS Management1. Transmission Scheduling Link Manager Protocol (LMP) Configure, authenticate and handle the connections Power management scheme

What is the data rate and range of Bluetooth?The data transfer rate of Bluetooth technology varies depending on the version. Version 1.2 offers up to 1Mbps. Version2.0 + Enhanced Data Rate (EDR) offers up to 3Mbps, and data can be transferred at up to 24Mbps for Version3.0 + High Speed (HS) enabled devices. Version 3.0 + HS was adopted in April 2009. Version 2.1 + EDR was adopted in July 2007.As for the operating range, this also varies depending on the class of the Bluetooth device. Class 3 radios have a range of up to 1 metre or 3 feet; class 2 radios, which are most commonly found in mobile devices, have a range of 10 metres or 33 feet. Class 1 radios, used primarily in industrial use cases, have a range of 100 metres or 300 feet.

6Implementation

Bluetooth uses a radio technology called frequency-hopping spread spectrum, which chops up the data being sent and transmits chunks of it on up to 79 bands (1MHz each; centered from 2402 to 2480MHz) in the range 2,400-2,483.5MHz (allowing for guard bands). This range is in the globally unlicensed Industrial, Scientific and Medical (ISM) 2.4GHz short-range radio frequency band.Originally Gaussian frequency-shift keying (GFSK) modulation was the only modulation scheme available; subsequently, since the introduction of Bluetooth 2.0+EDR, /4-DQPSK and 8DPSK modulation may also be used between compatible devices. Devices functioning with GFSK are said to be operating in basic rate (BR) mode where an instantaneous data rate of 1 Mbit/s is possible. The term Enhanced Data Rate (EDR) is used to describe /4-DPSK and 8DPSK schemes, each giving 2 and 3 Mbit/s respectively. The combination of these (BR and EDR) modes in Bluetooth radio technology is classified as a "BR/EDR radio".Bluetooth is a packet-based protocol with a master-slave structure. One master may communicate with up to 7 slaves in a piconet; all devices share the master's clock. Packet exchange is based on the basic clock, defined by the master, which ticks at 312.5 s intervals. Two clock ticks make up a slot of 625 s; two slots make up a slot pair of 1250 s. In the simple case of single-slot packets the master transmits in even slots and receives in odd slots; the slave, conversely, receives in even slots and transmits in odd slots. Packets may be 1, 3 or 5 slots long but in all cases the master transmit will begin in even slots and the slave transmit in odd slots.Bluetooth provides a secure way to connect and exchange information between devices such as faxes, mobile phones, telephones, laptops, personal computers, printers, Global Positioning System (GPS) receivers, digital cameras, and video game consoles.Bluetooth BuzzwordsHere we give you a quick list of terms and concepts you will come across when talking or reading about the Bluetooth technology. These are some of the terms you should know if you know what Bluetooth is and how it works.Piconet: A group of devices connected by means of Bluetooth technology in an ad hoc manner is known as a piconet. There can be a maximum of 8 devices forming one piconet. For the duration of a piconet connection, one device acts as the master and others act as slaves in order to synchronize.Scatternet: A scatternet is composed of two or more independent piconets. This brings about a communication between piconets.Master unit: Its clock and hopping frequency are used to synchronize other devices in the piconet. The master device numbers the communication channels.Slave unit: The slave units act in coordination with the master.Frequency Hopping Spread Spectrum: When the carrier (waveform modulated with the input signal) is rapidly switched among different frequency channels, during signal transmission, the method is referred to as frequency hopping spread spectrum.Packet Segmentation and Reassembly: In this process, data packets of varying lengths are fragmented to 48-bytes size when transmitting and reassembled at the receiver's end to their original form, when data transfer is complete.PAN: Short for Personal Area Network, a PAN refers to a communication network formed between devices usually located within the distance of a few meters from one another.

7List of applicationsA typical Bluetooth mobile phone headset.Wireless control of and communication between a mobile phone and a handsfree headset. This was one of the earliest applications to become popular. Wireless control of and communication between a mobile phone and a Bluetooth compatible car stereo system Wireless Bluetooth headset and Intercom. Wireless networking between PCs in a confined space and where little bandwidth is required. Wireless communication with PC input and output devices, the most common being the mouse, keyboard and printer. Transfer of files, contact details, calendar appointments, and reminders between devices with OBEX. Replacement of previous wired RS-232 serial communications in test equipment, GPS receivers, medical equipment, bar code scanners, and traffic control devices. For controls where infrared was often used. For low bandwidth applications where higher USB bandwidth is not required and cable-free connection desired. Sending small advertisements from Bluetooth-enabled advertising hoardings to other, discoverable, Bluetooth devices. Wireless bridge between two Industrial Ethernet (e.g., PROFINET) networks. Three seventh-generation game consoles, Nintendo's Wii and Sony's PlayStation 3 and PSP Go, use Bluetooth for their respective wireless controllers. Dial-up internet access on personal computers or PDAs using a data-capable mobile phone as a wireless modem. Short range transmission of health sensor data from medical devices to mobile phone, set-top box or dedicated telehealth devices. Allowing a DECT phone to ring and answer calls on behalf of a nearby cell phone Real-time location systems (RTLS), are used to track and identify the location of objects in real-time using Nodes or tags attached to, or embedded in the objects tracked, and Readers that receive and process the wireless signals from these tags to determine their locations. Personal security application on mobile phones for prevention of theft or loss of items. The protected item has a Bluetooth marker (e.g. a tag) that is in constant communication with the phone. If the connection is broken (the marker is out of range of the phone) then an alarm is raised. This can also be used as a man overboard alarm. A product using this technology has been available since 2009.Bluetooth Application ModelsModelDescription

File TransferRefers to object transfer or transfer of files between devices.

Internet BridgeIn this model, a cordless modem acts as a modem to a PC and provides dial-up networking and faxing facilities.

LAN AccessMultiple data terminals use a LAN access point (LAP) as a wireless connection to an Ethernet LAN.

SynchronizationThe synchronization model enables a device-to-device synchronization of data.

HeadsetIt is wirelessly connected and can act as an audio input-output interface of remote devices.

8Bluetooth ProfilesOne of the most useful innovations in the Bluetooth standard is the use of device profiles. To use Bluetooth wireless technology, a device has to be able to interpret certain Bluetooth profiles, which are definitions of possible applications and specify general behaviors that Bluetooth enabled devices use to communicate with other Bluetooth devices. These profiles include settings to parameterize and to control the communication from start. Adherence to profiles saves the time for transmitting the parameters anew before the bi-directional link becomes effective. There are a wide range of Bluetooth profiles that describe many different types of applications or use cases for devices.

Bluetooth StackThe message here is that Bluetooth is hairy like TCP/IP. Older Bluetooth chips only provided HCI functionality. Now they go up to the application layers: SPP, DUN, Headset.

9Bluetooth Chips - CSRCambridge Scientific Radio (CSR) manufactures a large number of Bluetooth chips, probably more than half of those shipped. This is a diagram of their Bluecore2 series.

Bluetooth Modules Free2MoveBluetooth modules add the components needed to make a working radio: crystal, antenna, flash memory. The current generation of modules measure about 1x0.5 w/ antenna.Free2Move (Sweden) has some particularly interesting modules based on CSR BlueCore2-flash chips with audio.This radio offers a functioning SPP for serial data, a 15-bit audio channel, and another 8-bit A/D channel.

More Bluetooth HardwareCambridge Scientific Radio (CSR) chips (in most peripherals)BlueCore2 chip Bluetooth v1.1, 16-bit XAP2 processor, A/D, audio optionsBlueCore3 chip Bluetooth v1.1-1.2, XAP2 processor, audio DSP optionBlueCore4 chip Bluetooth V2.0, XAP2 processorAT&T Broadcom chips (in many PC + PDAs)BCM2040 Bluetooth v1.1-1.2, 8-bit 8051 processorBCM2037 Bluetooth v2.0 with audio, 16-bit ARM7 processorBCM2045 Bluetooth v2.0 host side chipClass 2 Modules (with antenna)Free2Move FM03AC2 Bluetooth v1.1 qualified, SPP, 15-bit audio + 8 bit A/DTaiyo Yuden EYMF2CAMM-XX Bluetooth v1.1 qualified, serial port profileBlueGiga WT12 Bluetooth v2.0 EDR qualified, serial port profile + PCM Class 1 Modules (no antenna)Free2Move FM2M03C1 Bluetooth v1.1 qualified, SPP, 15-bit audio + 8 bit A/D BlueGiga Wrap Thor 2022 Bluetooth v1.1 qualified, SPP, DUN, OBEX, HID

10Bluetooth Security

These days, all communication technology faces the issue of privacy and identity theft, with Bluetooth being no exception.Almost everyone knows that email services and networks require security.What users of Bluetooth need to realize is that Bluetooth also requires security measures as well.The good news for Bluetooth users is that the security scares, like most scares, are normally over dramatized and blown entirely out of proportion.The truth being told, these issues are easy to manage,with various measures already in place to provide security for Bluetooth technology.It's true that there has been some Bluetooth phones that have been hacked into. Most devices that arehacked into are normally those that don't have any type of security at all.According to Bluetooth specialists, in order to hack into a Bluetooth device, the hacker must:Force two paired devices to break their connection.2. Steal the packets that are used to resend the pin.3. Decode the pin.Of course, the hacker must also be within range of the device, and using very expensive developer type equipment. Most specialists recommend that you have a longer pin, with 8 digits being recommended.Security OverviewBluetooth implements confidentiality, authentication and key derivation with custom algorithms based on the SAFER+ block cipher. Bluetooth key generation is generally based on a Bluetooth PIN, which must be entered into both devices. This procedure might be modified if one of the devices has a fixed PIN (e.g., for headsets or similar devices with a restricted user interface). During pairing, an initialization key or master key is generated, using the E22 algorithm. The E0 stream cipher is used for encrypting packets, granting confidentiality and is based on a shared cryptographic secret, namely a previously generated link key or master key. Those keys, used for subsequent encryption of data sent via the air interface, rely on the Bluetooth PIN, which has been entered into one or both devices.An overview of Bluetooth vulnerabilities exploits was published in 2007 by Andreas Becker.In September 2008, the National Institute of Standards and Technology (NIST) published a Guide to Bluetooth Security that will serve as reference to organizations on the security capabilities of Bluetooth and steps for securing Bluetooth technologies effectively. While Bluetooth has its benefits, it is susceptible to denial of service attacks, eavesdropping, man-in-the-middle attacks, message modification, and resource misappropriation. Users/organizations must evaluate their acceptable level of risk and incorporate security into the lifecycle of Bluetooth devices. To help mitigate risks, included in the NIST document are security checklists with guidelines and recommendations for creating and maintaining secure Bluetooth piconets, headsets, and smart card readers.Bluetooth v2.1 - finalized in 2007 with consumer devices first appearing in 2009 - makes significant changes to Bluetooth's security, including pairing. See the #Pairing mechanisms section for more about these changes.

11

Bluetooth Vulnerabilities and Security RisksBluejacking is the process of sending unsolicited messages, or business cards, to Bluetooth-enabled devices. This does not involve altering any data from the device, but nonetheless, it is unsolicited. Devices that are set in non-discoverable mode are not susceptible to bluejacking. In order for bluejacking to work, the sending and receiving devices must be within 10 meters of one another. While this method has been widely used for promotional purposes, Bluetooth deviceowners should be careful never to add the contact to their address book. While bluejacking is usually not done with malicious intent, repetitive bogus messages can be annoying to the user, and in some cases, can render the product inoperable. This can also open the door to a variety of social engineering attacks. Bluesnarfing is a method of hacking into a Bluetooth-enabled mobile phone and copying its entire contact book, calendar or anything else stored in the phone's memory. By setting the device in non-discoverable, it becomes significantly more difficult to find and attack the device. However, .the software tools required to steal information from Bluetooth-enabled mobile phones are widely available on the Web, and knowledge of how to use them is growing.. (Kotadia, 2004) Companies such as Nokia and Sony Ericsson are making sure new phones coming to market will not be susceptible to bluesnarfing. .The backdoor attack involves establishing a trust relationship through the .pairing. mechanism, but ensuring that it no longer appears in the target.s register of paired devices. In this way, unless the owner is actually observing their devices at the precise moment a connection is established, they are unlikely to notice anything untoward, and the attacker may be free to continue to use any resource that a trusted relationship with that device grants access to.This means that not only can data be retrieved from the phone, but other services, such as modems, or Internet, WAP and GPRS gateways may be accessed without the owner.s knowledge or consent.. (The Bunker, 2003) The cabir worm is malicious software that uses Bluetooth technology to seek out available Bluetooth devices and send itself to them. According to Bluetooth SIG (2006), .The cabir worm currently only affects mobile phones that use the Symbian series 60 user interface platform and feature Bluetooth wireless technology. Furthermore, the user has to manually accept the worm and install the malware in order to infect the phone.. Although this may be the case, this shows that it is achievable to write mobile viruses that spread via Bluetooth and may cause other hackers to explore the possibilities of writing Bluetooth viruses. The Mabir worm is essentially a variant of the Cabir worm where it uses Bluetooth and Multimedia Messaging Service messages (MMS) to replicate.Fundamentals of security:The "pairing process" is one of the most basic levels of security for Bluetooth devices. Pairing, is two or more Bluetooth devices that recognize each other by the profiles they share - in most cases they both must enter the same pin. The core specifications for Bluetooth use an encryption algorithm, which is completely and entirely secure. Once the devices pair with each other, they too become entirely secure. Until they have successfully paired, the Bluetooth devices won't communicate with each other. Due to this pairing process and the fact that it is short range - Bluetooth technology is considered to be secure. As the news has indicated, experienced hackers have developed ways to get around this level of basic security. There are ways to get around this threat, as you can install software to prevent hackers from getting in. With Bluetooth becoming more and more popular, it's really no wonder that security is always in question. As Bluetooth gets bigger and better, security will always be something that no one really takes lightly. If you've been concerned about Bluetooth security in the past, rest assured that newer devices will offer bigger and better security. Preventing hackers from getting in is something every owner is concerned about - and the manufacturer's are very aware.

12Bluetooth Security IssuesBluetooth can operate in one of three security models:Mode 1 is non security.Mode 2 provides security at the service level, after the channel is established.Mode 3 provides security at the link level, before the channel is established.Each Bluetooth device has a unique 48-bit device address. The authentication scheme is challenge-response, using symmetric keys, and encryption is done with a key that can be up to 128 bits (negotiated by the communicating devices, with each device having a maximum key length defined). A 128 bit random link key handles security transactions between two or more devices.When two Bluetooth devices establish a communications channel, they both create an initialization key. A passkey or Personal Identification Number is input and the inititalization key is created, and the link key is calculated using it. Then the link key is used for authentication. The first security concern is the passkey or PIN. As with any key, long keys are more secure than short ones. If a hacker is able to discover the passkey, he can calculate possible initiation keys, and then from that, calculate the link key. Making the passkey long will make it much harder to accomplish the first step. The initial key exchange takes place over an unencrypted link, so it is especially vulnerable. Its best if this part of the BT device pairing process takes place in a more physically secure location (that is, where there are not likely to be any lurkers with BT devices who could intercept the communications). A hacker could record transmissions sent over the BT frequency and use them to recreate the PIN. Rather than using the same fixed passkey all the time, it should be changed frequently (how frequently depends on the types of devices and the required security level). Link keys can be combination keys or unit keys. Best security practice is to use combination keys instead of unit keys. When you use a unit key, you must use the same key for all secure transactions, and the key has to be shared with other trusted devices. This means any trusted device can potentially access traffic with other trusted devices using this key. Its possible to use the Bluetooth address to identify a particular device (and associated user) and log those transactions, which can create privacy concerns.Why Does Bluetooth Security Matter?Many Bluetooth users only use the technology to connect a wireless headset or similar device to their portable computers, and they may wonder why security is a big deal. Implementing security, even for these types of device pairings, can prevent an unauthorized user from using the headset.However, another use of Bluetooth is to create a temporary computer network. For example, several people in a meeting room can connect their Bluetooth-enabled laptops to each other to share files during the meeting. When you use Bluetooth to create a temporary network, it is usually an ad hoc network; that is, computers communicate directly with each other rather than going through a wireless access point (WAP). This means you have no centralized point of security control, as you do with a WAP (for example, you can configure a WAP to use MAC address filtering and other built-in security mechanisms). Thus, security becomes a major concern because you can be exposing important data stored on your laptop to others on the Bluetooth network. Remember that the range for class 1 Bluetooth devices can be more than 300 feet far enough so that in some locations, the BT equivalent of the wi-fi war driver may be able to establish a link with your computer even though not within your sight. Another special concern is the security of Bluetooth mobile phones. These phones may have information stored on them such as the addresses and phone numbers of contacts, calendar information and other PDA-type data. Hacking into these phones using Bluetooth is called bluesnarfing. Newer mobile phones and software upgrades for older phones can patch this vulnerability. A related hacking technique is called bluebugging, and it involves accessing the phones commands so that the hacker can actually make phone calls, add or delete contact info, or eavesdrop on the phone owners conversations. This vulnerability, too, is being addressed by phone manufacturers. Thus, if you own a BT-enabled phone, its important to keep the software updated or upgrade to the latest phone models frequently.

13Advantages

Main Reasons to Use a Bluetooth Device:Bluetooth Devices are WirelessIf you navigate through the rest of our site you will learn that there are tons of advantages/benefits when using wireless devices. In addition to improving safety as a result of eliminating the clutter of wires and associated hazardous connections, wireless technology also offers many convenient advantages. For example, when you are traveling with your laptop, PDA, MP3 player and other devices, you no longer have to worry about bringing along all of your connecting cables.Bluetooth Technology is InexpensiveBluetooth technology is cheap forcompanies to implement, which results in lower over-allmanufacturing Costs. These savings are then passed on to you, the consumer. The end result: Bluetooth devices are relatively inexpensive.Bluetooth is AutomaticBluetooth doesn't require you to think about setting up a connection or to push any buttons. When two or more Bluetooth devices enter a range (Up to 30 feet) of one another, they automatically begin to communicate without you having to do anything. Once the communicating begins, Bluetooth devices will setup Personal Area Networks or Piconets. The best part is: The devices take care of the entire setup process, and you can go about your business.Standardized Protocol = InteroperabilitySince Bluetooth is a standardized wireless specification, a high level of compatibility among devices is guaranteed. The Bluetooth specification uses and defines various profiles. Every Bluetooth profile is specific to a particular function. For instance, when a Bluetooth enabled cell phone and a Bluetooth headset (Both with the same profile) are communicating with one another, both will understand each other without the user having to do anything, even if the devices are of different models/makes.Low Interference (If Any) Bluetooth devices avoid interference with other wireless devices by:Using a technique known as spread-spectrum frequency hopping, and Using low power wireless signals. Low Energy ConsumptionAs stated above, Bluetooth uses low power signals. As a result, the technology requires little energy and will therefore use less battery or electrical power. Obviously, this is a great benefit for mobile devices because Bluetooth won't drain the life of your device's battery.Share Voice and DataThe Bluetooth standard allows compatible devices to share both voice and data communications. For example, it is probably no surprise that a Bluetooth enabled cell phone is capable of sharing voice communications with a compatible Bluetooth headset, however, the same cell phone may also be capable of establishing a GPRS connection to the Internet. Then, using Bluetooth, the phone can connect to a laptop. The result: The laptop is capable of surfing the web or sending and receiving email.Instant Personal Area Network (PAN)Up to seven compatible Bluetooth devices can connect to one another within a proximity of up to 30 feet, forming a PAN or piconet. Multiple piconets can be automatically setup for a single room.

14Upgradeable The Bluetooth standard is upgradeable. A development group at the Bluetooth Special Interest Group (SIG) has been given the task of working on the new Bluetooth version 2, which offers several new advantages and is backward compatible with the older versions.

The Technology is Here to Stay Bluetooth is a universal, world-wide, wireless standard. Therefore, you can count on it being around for years to come. As more devices begin to use Bluetooth technology, electronics manufacturers will be increasingly eager to make their products compatible, using Bluetooth. A chain reaction is inevitable, in fact, it has already begun.Automatic setting up Bluetooth connectivity is automatic Bluetooth and doesnt need professionals. When two or more devices entera range of up to 30 feet of each other the communication automatically begins between them. Standard protocol - Bluetooth is standardized wireless guarantees the high level of compatibility among devices. Bluetooth devices connect to each other irrespective of their model.Instant PAN (Personal Area Network) - You can have your own personal are network for sharing data among your group consisting of up to seven Bluetooth devices within a range of up to 30 feet.Simplifies communication while driving companies like parrot manufactures Bluetooth car kits resolving the audio and communication issues arising while driving, as Bluetooth simplifies talking and listening music on your cell phone while driving. Avoids interference from other wireless devices - Bluetooth devices avoid interference from other wireless devices with the usage of technique known as frequency hopping, and low power wireless signals.Ease of AccessUnlike a wireless Local Area Network (LAN), Bluetooth doesn't need any configuration to start a connection and perform file transfers. Consequently, Bluetooth is a great alternative for business environments in which wireless file transfers are utilized. In laptops, establishing a wireless connection is as easy as pressing the Bluetooth shortcut or hot key.SecurityThe Bluetooth connection can be securely established without interference from unrecognized devices by entering an identification number for the connection. The user of the master device--the one which starts the connection--can opt to enter a PIN which creates the secure usage loop.ControlUnless a device is already paired to your device, you have the option to accept or reject the connection and file transfer. This prevents unnecessary or infected files from unknown users from transferring to your device.Free AccessAccessing a Bluetooth device doesn't cost money; all you need is the Bluetooth capability.InternetBluetooth is not recommended for establishing Internet connections because of its limited transfer rate. A LAN connection is more efficient.

15DisadvantagesData Transfer RateData sent between two Bluetooth devices has a maximum transfer speed of one megabyte per second. Infared is capable of transferring data at 4MB per second, and Wi-Fi is capable of speeds even higher. The slow transfer speed makes Bluetooth not an ideal choice for data transfer when faster connection methods are available.RangeBluetooth only has a range of 15 to 30 feet depending on the device. The small range is a disadvantage for some who may want to use a Bluetooth device outside of that 30-foot radius. For instance, a Bluetooth printer in a home could not necessarily be used by every computer in the house if some of those computers are located out of the range of the printer. A Wi-Fi printer, however, could be used by anyone who could connect to the home's wireless network.SecuritySince data is transferred over radio waves using Bluetooth, it is is much easier for a hacker to break into than secure wireless networks. For that reason, Bluetooth should not be used to transfer data that needs to remain private and secure.Battery UseBluetooth uses the battery power of a particular device in order to operate. Many cell phone makers send phones out with Bluetooth powered off in order to maximize the battery life of the phone. Turning Bluetooth on, while convenient, can drain a cell phone or computer battery, causing it to run out of juice long before it would have if Bluetooth was not powered on.Susceptibility to interferenceAll Bluetooth enabled devices operate within the 2.4 GHz band, which is the same unlicensed frequency used by many other electronic devices such as microwaves, cordless phones, and the majority of Wi-Fi devices. This frequency sharing could lead to slower overall network performance because some of the signals collide, don't reach their destination, and have to be re-sent. However, since Bluetooth wireless transmissions "hop" all over the bandwidth, this greatly decreases the likelihood of impacting other 2.4 GHz broadcasts. Though the impact is usually negligible, there are situations that can arise where Bluetooth devices can dilute Wi-Fi signals, especially if there are a great number of devices operating in different pairs. The Bluetooth SIG is making every effort to ensure that both of these issues will be soon be negated by the new standard.Bluetooth Limitations Communication speed is not that great with Bluetooth technology. Wi-Fi and Infrared communication can happen at much higher speeds compared to that of Bluetooth. Though Bluetooth communication is considered secure, if a user happens to leave his/her device in the 'discoverable' mode, a hacker can eavesdrop or establish a connection with the 'discovered' device without the user knowing about it. If Bluetooth is in the ON mode, it does drain the battery. So one needs to be careful about switching Bluetooth ON only for the time span of communication and turn it OFF after the communication ends. This practice also reduces the security risk involved with Bluetooth technology.

USES of Bluetooth in Now a DAY

16Top of FormTop of Form Page Image

BTRichHTML1BTRichHTML2

Medical & Health DevicesIncreasing awareness of the benefits of a healthy, independent lifestyle creates a booming market for devices that permit an important share of primary care to be conducted remotely, in the comfort of the patient's home.

Sports & Fitness DevicesToday'sathletes and anyone who wantsto get in shape or stay in shape are eager to improve their results. Many are using Bluetooth technology to help. Page Image

BTRichHTML1BTRichHTML2Bluetooth Technology and Internet AccessYou can also access internet through mobile using Bluetooth technology.Page ImageBTRichHTML1BTRichHTML2Here is a roll call of some the first Bluetooth Smart Ready and Bluetooth Smart devices:Polar releasing first Bluetooth Smart heart-rate strap

Polar H7 heart strapThis Bluetooth Smart device allows you to quickly connect to any Bluetooth Smart Ready device, such as a tablet or smartphone, to store and display heart rate data and other workout statistics.Polar makes a wide variety of heart rate sensors and fitness watches with sophisticated training features. This is the company's first Bluetooth Smart device, and its second Bluetooth enabled heart-rate monitor.

17Casio ready to release its first Bluetooth Smart deviceCasio G-Shock smart watchCasio has created its first Bluetooth Smart devicea watch that's able to communicate wirelessly with a Bluetooth Smart Ready phone.The Casio G-Shock GB-6900 can notify youwith a tone or vibration when you receive newcalls or emails, anddisplays a visiblealert. This could be especially useful when your phoneis stashed in a pocket or purse. The new G-Shock will be available in black, white and red. Because the watch uses Bluetooth low energy technology, it will be able to operate for two years on a single coin-cell battery.The GB-6900 is reportedly due out in Japan by the end of December. No word yet on a release date or price for North America or Europe.

Motorola releases its first Bluetooth Smart Ready phonethe Droid RAZR

Droid RAZRMotorola has resurrected its renowned RAZR phone brand with a new Android smartphone that becomes the company's first Bluetooth Smart Ready device. The new Droid Razr is nothing like the best-selling RAZR phones of a decade ago, however, except for its thinness.This RAZR has a 4.3-inch qHD Super AMOLED display (a first for any mobile phone), a dual-core processor,a tough, "gorilla glass" screen, and a slim profile ofjust 7.1mm.The Droid RAZR is the second Bluetooth Smart Ready phone to reach the market, joining the new Apple iPhone 4S.The Droid RAZR is available now from Verizon Wireless for $299 on contract.

18

MotorolareleasesBluetooth Smartdevice for music, running and more

MOTOACTVThis tiny new Bluetooth Smart device from Motorola is a sophisticated fitness tracker, smart music player and training system. It lets you listen to music on the optional Motorola SF600 Bluetooth wireless headphones while running or doing other workouts in the gym or outside.The MOTOACTV includes precision GPS to track your distance and speed, a "smart" music player that learns what songs motivate you the most by tracking your performance against your music, a touchscreen, audio "coaching" on pace and distance, and more.The MOTOACTV costs $249 for 8GB of memory or $299 for the 16GB version.Apple releases world's first Bluetooth Smart Ready computers and phone

iPhone 4SThe new iPhone 4S may look like the iPhone 4, but it has many important differences inside. One big addition is the use of Bluetooth v4.0. This will allow the new iPhone to wirelessly connect to the next generation of devices coming out later this year with Bluetooth v4.0.The new iPhone 4S also features a more advanced camera, the more powerful A5 processor, and many new software features.

Mac miniLike the MacBook Air, the new Mac mini also adds Bluetooth v4.0, which wil allow it to wirelessly connect to the next generation of Bluetooth v4.0 phones and other devices coming out later this year. The new Mac mini also features the latestdual-core Intel Core i5 and i7 processors, AMD Radeon HD graphics, andhigh-speed Thunderbolt I/O technology.

19MacBook AirThe new MacBook AirApple's thinnest and lightest notebookadds Bluetooth v4.0. This will allow it to wirelessly connect to the next generation of mobile phones and many other devices coming out later this year with Bluetooth v4.0.The new MacBook Air also features the latest-generation Intel Core i5 and i7 processors,high-speed Thunderbolt I/O technology, and all-flash storage.Dayton and Nordic create first Bluetooth Smart device heart strap

Dayton heart-rate strapDayton Industrial Co. Ltd has created the world's first production-readyheart-rate chest strap that is a Bluetooth Smart device. The strapuses a new Bluetooth v4.0 low energy chip from Nordic Semiconductor. The device is now ready to go intoproduction and will be able to pair with the new wave of Bluetooth Smart Readyphones expected out later this year.Users won't need a special matching watch like most heart-rate monitors use today. According to Nordic, the strap can be paired with a phone or other Bluetooth Smart Readydevice in seconds, allowing people to display their heart rate on their phone while they work out and analyze it later.Page ImageBTRichHTML1BTRichHTML2Do more when you're on the goBluetooth enabled wireless headsets and hands-free car systems have always helped drivers focus on the road. Today, new versions of these devices are better than ever, with features that ensure a completely hands-free calling experience made possible by speech recognition, text-to-speech technology, and "speech trigger" capabilities that lets you turn on hands-free calling devices just by speaking a command.

Mobile PhonesAccess and browse your mobile device's phone book from your car's navigation display and make hands-free phone calls. Play music from your phone through your car's speaker system, without cables, adapters, or plugs.

20Car KitsDon't have Bluetooth technology built into your vehicle? No problem. Inexpensive Bluetooth enabled car kits and speakerphones let you talk hands-free in your car even without a built-in hands-free system.

GPS navigationConnect to the Internet through a mobile phone and update your "Points of Interest" database and other map data easily, wirelessly. Use the built-in microphone in some Bluetooth enabled GPS devices to talk hands-free on a phone paired with the GPS device.

Portable Music PlayersUse a Bluetooth adapter to stream music from your iPod or MP3 player to your car's audio system.

Health monitorsCar displays that can help people with diabetes monitor their blood-glucose level while driving, by using a wireless glucose monitoring device with Bluetooth technology they pair with their car.

Bluetooth, the wireless radio technology for short distance mobile communications, has becomepervasive in mobile computing, used in laptops and headsets as well as popular smart phones such as the BlackBerry, and even in RadioFrequency identification (RFID) readers. Developing with BluetoothThe newest modules make it pretty easy to go wireless. Most modules can be used as serial cable replacements. The next simplest step is to add a microprocessor to act as controller (PIC etc.), using the modules serial profile. But since new BT chips have a powerful, energy-efficient processor on-board already, this is rather wasteful. You can develop for the native processor, but you will need to buy some expensive development tools. CSR and some module vendors provide virtual machines so your code cant void the modules qualification.

21What is the future of Bluetooth?The future of Bluetooth looks strong, with initiatives underway for higher throughput, more ubiquitoususage and links with Wifi and Ultra Wideband (UWB) broadcast technology.Operating systems such as the MacOS and Windows continue to have native support for Bluetooth. The Bluetooth SIG partners are working on enabling Bluetooth information points, to enable advertising models based around users pulling information from information points, rather than having to push information out. Other emerging features include Bluetooth in cars; automatic configuration of piconets; and quality of service (QoS) improvements, for example enabling audio and video data to be transmitted at a higher quality.The future of BluetoothIt is estimated that there are more than one billion devices in use that utilize Bluetooth wireless technology. You can expect that number to rise sharply when Bluetooth 3.0 devices become more common.Bluetooth 3.0Bluetooth 3.0 is the new Bluetooth wireless standard adopted by the Bluetooth SIG on April 21, 2009. The new standard supports higher data transfer speeds and builds upon the previous standards. With its higher speed, the technology has the potential to revolutionize the consumer electronics industry.It's FASTBluetooth 3.0 can transfer files at rates of up to 24 megabytes per second. At those speeds, high-quality streaming video is a definite possibility, along with a host of other applications that are simply impractical with the current transfer rates.Picture this...With Bluetooth 3.0, camcorders will stream video footage or still photos to Bluetooth enabled televisions and computers; digital cameras will stream photo slideshows to cell phones, and laptops will ave the ability to transfer presentations wirelessly to a projector. Use your imagination the possibilities are really exciting.Backwards compatibilityBest of all, Bluetooth 3.0 will be backwards-compatible, so all of your old devices will be able to communicate with the new ones and vice versa. But bear in mind that transfer speeds are only as fast as the slowest device, meaning that the two will exchange data at the slower, 3-megabyte rate of Bluetooth 2.1.

Future0. Success of Bluetooth depends on how well it is integrated into consumer products0. -Consumers are more interested in applications than the technology 0. -Bluetooth must be successfully integrated into consumer -- products0. -Must provide benefits for consumer 0. -Must not destroy current product benefits 0. Key Success Factors1. -Interoperability1. -Mass Production at Low Cost1. -Ease of Use1. -End User Experience

Bottom of FormBottom of FormBottom of FormBottom of Form