Top Banner

of 21

technical report on Bluetooth

Apr 14, 2018

Download

Documents

Manisha Gupta
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/27/2019 technical report on Bluetooth

    1/21

    1

    1. INTRODUCTION TO BLUETOOTH

    Bluetooth is a proprietary open wireless technology standard for exchanging data over short

    distances (using short wavelength radio transmissions) from fixed and mobile devices,

    creating personal area networks (PANs) with high levels of security .It can connect several

    devices, overcoming problems of synchronization. Bluetooth provides a short range wireless

    communication between devices making it convenient for users and thus eliminating the need

    for messy cables.

    According to Bluetooth Special Interest Group, Bluetooth wireless technology is the most

    widely supported, versatile, and secure wireless standard on the market today. The key

    features of Bluetooth technology are robustness, low power, and low cost. The Bluetooth

    specification defines a uniform structure for a wide range of devices to connect and

    communicate with each other. It is an open specification for a short-range radio technology

    for ad-hoc wireless communication of voice and data anywhere in the world. Bluetooth

    provides a secure way to connect and exchange information between devices.

    Bluetooth uses a low power radio technology called radio-hopping spread spectrum, which

    chops up the data being sent and transmit chunks of it on the 79 bands in the range 2400-

    2483.5 MHZ.Bluetooth operates in the open 2.4 GHz ISM band and is now found in a vast

    array of products such as input devices, printers, medical devices, VoIP phones, whiteboards,

    and surveillance cameras.

    ORIGIN OF THE NAME AND LOGO

    The name "Bluetooth" is taken from the 10th century Harold Bluetooth in English. The idea

    behind Bluetooth technology was born in 1994, when a team of researchers at Ericsson

    Mobile Communications, initiated a feasibility study of universal short-range, low-power

    wireless connectivity as a way of eliminating cables between mobile phones and computers,

    headsets and other devices. In 1998, this group evolved to the Bluetooth Special Interest

    Group (SIG). Along with Ericsson, other founding members included Nokia, Intel, IBM and

    Toshiba.

  • 7/27/2019 technical report on Bluetooth

    2/21

    2

    BLUETOOTH

    The Bluetooth logo contains the latin letters H and B (H for harlad and B for Bluetooth)

    Bluetooth technology is designed to allow collaboration between differing industries such as

    the computing, mobile phone, and automotive markets. In addition to being paired with

    cellphones, short range Bluetooth technology is also compatible with personal computers,

    laptops, printers, GPS receivers, digital cameras, telephones, video game consoles and more

    for various practical functions. Bluetooth is a developing world-wide, open and short range

    communication between the internet and net devices and it defines communication protocols

    between devices and computers.

    2. The BASIC IDEA OF BLUETOOTH

    Bluetooth is a standard and communication protocol primarily designed for lowpower consumption.

    Communication within short range is possible via Bluetooth. Bluetooth chip is designed to replace cables. Information carried by the cable, is

    transmitted at a special frequency to a receiver Bluetooth chip.

    Bluetooth communicates on a frequency between 2.402 GHz to 2.480 GHz It can connect up to eight devices simultaneously in a piconet.

  • 7/27/2019 technical report on Bluetooth

    3/21

    3

    Figure :1

    2.1 CORE BLUETOOTH PRODUCTS

    Notebook PCs and Desktop computers Printers Cell phones Other handled devices Wireless peripherals CD players Headsets

  • 7/27/2019 technical report on Bluetooth

    4/21

    4

    Cordless Phones Telephones Answering Devices

    Access points

    2.2 TECHNICAL FEATURES

    Connection Type Spread spectrum(Frequency Hopping)&Time division Duplex (1600 hops/sec)

    Spectrum 2.4 GHz ISM open band (79 channels) Modulation Gaussian Frequency Shift Key Transmission power 1 mw-100 mw Data rate 1 Mbps Range 30 feet Supported Stations 8 devices Module size 9*9 mm Data security (Authentication) 128 bit key Data security ( Encryption) 8-128 bits

    2.3 REQUIREMENTS

    1. Bluetooth devices : Bluetooth exists in many products such as telephones, printers

    and headsets. The technology transfers data between two or more devices that are near

    to each other in low bandwidth situations.

    2. Computer Requirements: A PC must have Bluetooth adapter in order to be able to

    communicate with other Bluetooth devices ( such as mobile phones, mice and

  • 7/27/2019 technical report on Bluetooth

    5/21

    5

    keyboards). While some desktop computers and most recent laptops come with a

    built-in Bluetooth adapter.

    3. Mobile phone requirements: A mobile phone that is Bluetooth enabled is able to

    pair with many devices.

    3. BLUETOOTH CONNECTION PROCEDUERS

    Operational mode of a Bluetooth enabled device is to be connected to other Bluetooth

    enabled devices (in a piconet) and exchanging data with that Bluetooth enabled device. As

    Bluetooth wireless technologyis an ad-hoc wireless communications technology there are a

    number of operational procedures that enable piconets to be formed so that the subsequent

    communications can take place.

    For making a Bluetooth connection, it follows two procedures:-

    1. Inquiry ( or discovery) Procedure2. Paging ( or Connecting) procedure

    Figure 2: Bluetooth connection

    http://www.radiodatacom.com/bluetooth-data-modules/bluetooth-basicshttp://www.radiodatacom.com/bluetooth-data-modules/bluetooth-basicshttp://www.radiodatacom.com/bluetooth-data-modules/bluetooth-basics
  • 7/27/2019 technical report on Bluetooth

    6/21

    6

    3.1 Inquiry (discovery) Procedure

    Bluetooth devices use inquiry to discover nearby devices and to be discovered. The inquiry

    procedure is asymmetrical; A device that tries to find other nearby devices is known as an

    inquiring device and actively sends inquiry requests, Devices that are ready to be found are

    known as discoverable devices and listen for these inquiry requests and send responses. Both

    inquiring and discoverable devices may already be connected to other devices in a piconet.

    3.2 Paging (or connecting) procedure

    The procedure for forming connections is asymmetrical as well. One device carries out the

    page (connection) procedure. The other device is connectable (page scanning). The

    procedure is targeted, so that the page is only responded to by one device. Both paging and

    connectable devices may already be connected to other devices in a piconet. Bluetooth

    enabled devices in a piconet. It is a network in which up to eight Bluetooth enabled devices

    can be connected.

    3.3 Role Switch Procedure

    The role switch procedure is a method for swapping the roles of two devices connected in a

    piconet. The procedure involves moving from the channel that is defined by the original

    master device to the channel that is defined by the new master device.

    Bluetooth essentially a networking standard that works at two levels:

    1.

    It provides agreement at the physical level- Bluetooth is radio transmission standard.

    2. It provides agreement at the protocol level, where products have to agree on when bitsare sent, how many will be sent at a time and the parties in a conversation can be sure

    that the message received is same as the message sent.

  • 7/27/2019 technical report on Bluetooth

    7/21

    7

    4. BLUETOOTH OPERATIONBluetooth is a standardized technology that is used to create temporary short-range wireless

    communication systems. These Bluetooth wireless personal area networks are used to

    connect personal accessories such as headsets, keyboards and portable devices to

    communications equipment and networks. The Bluetooth system can dynamically discover

    and connect to other nearby devices for communication.

    Figure 3: BLUETOOTH OPERATION

    The basic radio transmission process is used in the Bluetooth system. The above diagram

    shows that the frequency range of the Bluetooth system ranges from 2.4 GHz to 2.483 GHz

    and that the basic radio transmission packet time slot is 625 usec. It also shows that one

    device in a Bluetooth piconet is the master (controller) and other devices are slaves to the

    master. Each radio packet contains a local area piconet ID, device ID, and logical channel

    identifier and the hopping sequence is normally determined by the master's Bluetooth device

    address.

    To setup a Bluetooth system, one of the devices is designated as a master (controlling) and

    the other devices are setup as slaves (responding to the commands of the master).When the

    Bluetooth devices come within close range of each other, an electronic conversation willoccur to determine whether or not they have data to share. The user does not have buttons to

    command to give-the conversation starts automatically. When Bluetooth devices first

  • 7/27/2019 technical report on Bluetooth

    8/21

    8

    connect, there is a piconet master that initiates the connection, and the others are slave

    devices. One piconet can have a maximum of seven active slave devices and one master

    device. All communication within a piconet goes through the piconet master. Two or more

    piconets together form a scatternet, which can be used to eliminate Bluetooth range

    restrictions. It is not possible to be a master of two different piconets because a piconet is a

    group of devices all synchronized on a hopping sequence set by the master. For that reason,

    any devices that share a master must be on the same piconet. Bluetooth technology operates

    in the unlicensed industrial, scientific and medical (ISM) band at 2.4 to 2.485 GHz, using a

    spread spectrum, frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec.

    The 2.4 GHz ISM band is available and unlicensed in most countries. Bluetooth devices

    within a 10 to 100 meters (or 30 to 300 feet) range can share data with a throughput of 1

    Mbps for Version 1.2 and up to 3 Mbps for Version 2.0 + Enhanced Data Rate (EDR). Data

    is transmitted between Bluetooth devices in packets across the physical channel that is

    subdivided into time units known as slots. The radio layer is the physical wireless connection.

    To avoid interference with other devices that communicate in the ISM band, the modulation

    is based on fast frequency hopping. Bluetooth divides the 2.4 GHz frequency band into 79

    channels, 1 MHz apart (from 2.402 to 2.480 GHz), and uses this spread spectrum to hop from

    one channel to another, up to 1,600 times per second.

    Profiles are used with Bluetooth so that devices can communicate with each other and that

    there is interoperability between vendors. These profiles define behaviours of the Bluetooth

    devices and the roles and capabilities for specific types of applications. Hence Bluetooth uses

    the spread spectrum frequency hopping technique to establish the Bluetooth connection

    without any interference.

    5. BLUETOOTH SECURITY

    Security has played a major role in the invention of Bluetooth. The Bluetooth SIG has put

    much effort into making Bluetooth a secure technology and has security experts who provide

    critical security information. Bluetooth security procedures include authorization,

    authentication and optional encryption. Bluetooth technology has built-in security such as

    128 -bit encryption and PIN code authentication.

  • 7/27/2019 technical report on Bluetooth

    9/21

    9

    Bluetooth users can establish trusted devices that can exchange data without asking

    permission. When any other device tries to establish a connection to the users gadget, the

    user has to decide to allow it.

    Service-level security work together to protect Bluetooth devices from unauthorized data

    transmission requires that users make a conscious decision to open a file or accept a data

    transfer. It offers several security modes and device manufactures determine which mode to

    include in a Bluetooth-enabled gadget.

    5.1 APPLICATION LAYER SECURITY

    The Bluetooth General Access Profile defines three modes of security:

    Security Mode 1: non-secure Security Mode 2: service level enforced security Security Mode 3: link level enforced security

    Security Mode 1It does not provide security.A Bluetoothdevice in this mode allows any device to connect toit. This is useful for applications that don't explicitly require security, such as the exchange of

    business cards.

    Security Mode 2

    Security Mode 2 works at the service level. It is secured at the application layer (in otherwords, it is secured after a connection has been established). An application can be written to

    allow access to certain services (by another device) while restricting certain services.

    Security Mode 3

    Security Mode 3 works at the link level. It is secured before a connection is established

    between two devices. The use of a link key (or PIN code, as seen in earlier sections) is usedto authenticate the identity of another device.

  • 7/27/2019 technical report on Bluetooth

    10/21

  • 7/27/2019 technical report on Bluetooth

    11/21

    11

    Figure 4 : Bluetooth authentication process

    Encryption

    Encryption protects the confidentiality of data transmitted between two Bluetooth devices.

    The Bluetooth specification supports three modes of encryption:

    Encryption Mode 1

    No packets are encrypted in this mode.

    Encryption Mode 2

    Data transmitted to a specific device is encrypted, but data broadcast to multiple devices is

    not.

    Encryption Mode 3

    All the data transmitted is encrypted.

    The sequence for the encryption is:

    1. A Key Generator generates an encryption key using as input the 96-bit AuthenticatedCipher Offset (a result returned by the earlier authentication process), the Link key, and the

    32-bit random challenge. The size of the encryption key ranges from 8 to 128 bits, and is

    negotiated between the master and the slave.

    2. A key stream is produced using a cryptographic algorithm based on LFSR (LinearFeedback Shift Registers). The LFSR takes in as input the encryption key generated, the

    master's address, the 32-bit random challenge, and the slot number to be used for the currentpacket.

  • 7/27/2019 technical report on Bluetooth

    12/21

    12

    3. The key stream produced is then xord with the plaintext ,which is then transmitted tothe master.

    Figure 5 : Bluetooth encryption process

    6. BLUETOOTH SECURITY CONCERNS

    The PIN code used for establishing a link is usually short and thus easy to guess.

    Longer PIN codes could be used. However, users normally prefer a shorter PIN code for

    convenience.

    Distribution of PIN codes in a large network is difficult. Fortunately, this is not amajor concern, as Bluetooth is commonly used for ad-hoc networking.

    The 32-bit random challenge may generate numbers that follow a certain pattern. Thisreduces the effectiveness of the encryption.

    Authentication is only at the device level; user-level authentication must be explicitlyimplemented.

    As Bluetooth is a relatively new standard, the Bluetooth specifications are still undergoing

    changes. Over time, we can expect to see more security measures being put in place. At the

    moment, it is appropriate to apply some of the techniques used for securing network

    communications on some types of Bluetooth connections.

  • 7/27/2019 technical report on Bluetooth

    13/21

  • 7/27/2019 technical report on Bluetooth

    14/21

    14

    8. BLUETOOTH Vs WI-FI

    Bluetooth and Wi-Fi Both are communication techniques Both of them uses same frequency range and are versions of unlicensed wireless

    technology but employ different modulating techniques.

    Bluetooth is a replacement of cable for small applications while Wi-Fi is used forLAN access

    Wi-Fi Provides higher output and covers greater distance but require more expensivehardware and higher consumption as compared to Bluetooth communication.

    9. BENEFITS OF BLUETOOTH

    Wireless:

    Bluetooth wireless communication offers plenty of other advantages. When travellingwith your laptop or other wireless devices, you'll no longer have to worry about

    bringing connection cables.

    Bluetooth is actually in-expensive:

    The Technology of Bluetooth is cheap for companies to implement, which results in

    lower costs for the company.

    Bluetooth is automatic:

    Bluetooth doesn't need to set up a connection or push any buttons. When two or more

    devices enter a range of up to 30 feet of each other, they will automatically begin to

    communicate without having to do anything

    Standardized protocol:

  • 7/27/2019 technical report on Bluetooth

    15/21

    15

    Bluetooth is standardized wireless, meaning that a high level of compatibility among

    devices is guaranteed. Bluetooth will connect devices to each other even if they are

    not of same model.

    Low Interference:

    Bluetooth devices almost always avoid interference from other wireless devices.

    Bluetooth uses a technique known as frequency hopping, and also low power

    wireless signals.

    Low energy consumption:

    As a result of Bluetooth using low power signals, the technology requires little energy

    and will use less battery or electrical power. This is excellent benefit for mobile

    devices as Bluetooth wont drain the battery.

    Sharing voice and Data:

    The standard for Bluetooth will allow compatible devices to share voice and data

    communication.

    Instant PAN:

    Seven Bluetooth devices can be connected simultaneously to each other within the

    range of up to 30 feet forming a piconet or PAN.

    Upgradeable:

    Upgradeable is a standard for Bluetooth .There are newer versions of Bluetooth in the

    works, which offer many new advantages and backward compatible with older

    versions.

  • 7/27/2019 technical report on Bluetooth

    16/21

    16

    The Technology stays:

    Bluetooth is worldwide, universal wireless standard. As more and more devices starts

    to use Bluetooth technology, more manufactures will be eager to make their product

    compatible.

    10. APPLICATIONS OF BLUETOOTH

    More prevalent applications of Bluetooth includes

    1. Wireless control of and communication between a mobile phone and hands free set.This is the one of earliest applications to become popular.

    2. Wireless networking between computers in a confined space.3. Wireless communication with PC input and output devices, the most common being

    the mouse, keyboard and printer.

    4. Transfer of files, contact details, calendar appointments and reminders betweendevices with O-BEX ( Object Exchange Technology)

    5. For controls where infrared was traditionally used.6. Game consoles use Bluetooth for their respective wireless controllers.7. Dial-up internet access on personal computers or PDAs using a data-capable mobile

    phone as a modem.

    8. Replacement of traditional wired serial communications in test equipments, GPSreceivers, medical equipment, bar code scanners and traffic control devices.

    9. Hidden computing10.Personal area networking11.Cell phones acting as a modem for PCs and Laptops12.Data synchronization for Address books.13.PC and peripheral networking14.Enabling a connection of YOUR personal devices to cooperatively work together.

    11. ADVANTAGESOF BLUETOOTH

    1. Widely used: Bluetooth is really popular and keeps getting more popular as timepasses by. It is now widely used across countries and almost by everyone.

  • 7/27/2019 technical report on Bluetooth

    17/21

    17

    Companies are taking the benefit by using this in their new and future products to

    make life much easier for everyone. Bluetooth can be used on cell phones,

    laptops, music players, headsets ,printers and a lot more other products.

    2. Feature simplicity: Anyone that does not have no knowledge about the Bluetoothtechnology can still be able to use the Bluetooth feature due to its simplicity and

    the ease of use. The simplicity of it and the fact its wire free makes it very widely

    used and utmost popular.

    3. Free of charge: It is not an extra cell phone or cable that you have to add to yourbudget. Simply by the technology everyone can use it there is no need to pay a

    penny for the service. There has not been any reporting lately on the companies

    charging a month free or any fee for the people to use the Bluetooth feature.

    4. Wireless: Bluetooth is a code free technology and do not have to worry aboutfinding the correct place to connect the extra long code.

    5. Easy to control: With Bluetooth device it is easy to exchange data across the cellphones with ability to keep the information private.

    6. Unlike infrared it is not a line of sight and t provides range up to 100 meters.Bluetooth is also a low power and low processing with an overhead protocol as it

    is ideal for integration to small battery power devices.

    7. Bluetooth technology is simple to install and expand8. Perfect for file transfer and printing application9. Simultaneous handling of data and voice on the same channel.

    12. DISADVANTAGES OF BLUETOOTH

    1. Battery use: This occurs mostly on the cell phones but also occur in other

    technologies such as music players. More of the battery power is used when

    Bluetooth is enabled on the cell phone all day. To disregard all this the user must

    disable the Bluetooth when the transfer of data gets completed. It only takes few

    minutes to enable or disable the Bluetooth so it is easy to save the battery by

    disabling the Bluetooth when not in use.

  • 7/27/2019 technical report on Bluetooth

    18/21

    18

    2. Bluetooth internet: Throughout all devices, when using Bluetooth internet,t he

    connection sometimes run very slow so Bluetooth internet is not highly suggested

    for all cases

    3. Infrared can have data rates of up to 4 Mbps, which provides very fast rates for

    data transfer, while Bluetooth only offers 1MBbs.

    4. The greater range and radio frequency of Bluetooth make it much more open to

    interception and attack. For this reason security is a very key aspect to the

    Bluetooth specification

    Although there are few disadvantages, Bluetooth still remains the for short range

    wireless technology for communications between the devices.

  • 7/27/2019 technical report on Bluetooth

    19/21

    19

    13. CONCLUSION

    Bluetooth wireless is constantly growing in popularity because of the convenience of

    exchanging information between mobile devices. As Bluetooth usage rises, so do the

    security risks associated with the technology. Advantages to Bluetooth include the ability to

    simultaneously handle both data and voice transmissions which enables users to enjoy a

    variety of innovation solutions such as a hands-free headset for voice calls, printing and fax

    capabilities, and synchronizing PDA, laptop, and mobile phone applications. Bluetooth users

    should familiarize themselves with Bluetooth security issues before using Bluetooth devices,

    and especially before they bring these devices into work place.

    As there are lots of advantages and few disadvantages of Bluetooth technology. OverallBluetooth is a great thing to be using on all your devices that supports it. We can do lots of

    things with it and includes cutting all the wires and cables attached to the cell phone.

  • 7/27/2019 technical report on Bluetooth

    20/21

    20

    14. REFERENCES

    1. www.google.com2. www.bluetooth.com3. www.wikipedia.com

    http://www.google.com/http://www.google.com/http://www.bluetooth.com/http://www.bluetooth.com/http://www.wikipedia.com/http://www.wikipedia.com/http://www.wikipedia.com/http://www.bluetooth.com/http://www.google.com/
  • 7/27/2019 technical report on Bluetooth

    21/21

    21