Anda di halaman 1dari 21

1.

INTRODUCTION TO BLUETOOTH
Bluetooth is a proprietary open wireless technology standard for exchanging data over short distances (using short wavelength radio transmissions) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security .It can connect several devices, overcoming problems of synchronization. Bluetooth provides a short range wireless communication between devices making it convenient for users and thus eliminating the need for messy cables. According to Bluetooth Special Interest Group, Bluetooth wireless technology is the most widely supported, versatile, and secure wireless standard on the market today. The key features of Bluetooth technology are robustness, low power, and low cost. The Bluetooth specification defines a uniform structure for a wide range of devices to connect and communicate with each other. It is an open specification for a short-range radio technology for ad-hoc wireless communication of voice and data anywhere in the world. Bluetooth provides a secure way to connect and exchange information between devices. Bluetooth uses a low power radio technology called radio-hopping spread spectrum, which chops up the data being sent and transmit chunks of it on the 79 bands in the range 24002483.5 MHZ. Bluetooth operates in the open 2.4 GHz ISM band and is now found in a vast array of products such as input devices, printers, medical devices, VoIP phones, whiteboards, and surveillance cameras.

ORIGIN OF THE NAME AND LOGO


The name "Bluetooth" is taken from the 10th century Harold Bluetooth in English. The idea behind Bluetooth technology was born in 1994, when a team of researchers at Ericsson Mobile Communications, initiated a feasibility study of universal short-range, low-power wireless connectivity as a way of eliminating cables between mobile phones and computers, headsets and other devices. In 1998, this group evolved to the Bluetooth Special Interest Group (SIG). Along with Ericsson, other founding members included Nokia, Intel, IBM and Toshiba.

BLUETOOTH
The Bluetooth logo contains the latin letters H and B (H for harlad and B for Bluetooth) Bluetooth technology is designed to allow collaboration between differing industries such as the computing, mobile phone, and automotive markets. In addition to being paired with cellphones, short range Bluetooth technology is also compatible with personal computers, laptops, printers, GPS receivers, digital cameras, telephones, video game consoles and more for various practical functions. Bluetooth is a developing world-wide, open and short range communication between the internet and net devices and it defines communication protocols between devices and computers.

2. The BASIC IDEA OF BLUETOOTH


Bluetooth is a standard and communication protocol primarily designed for low power consumption. Communication within short range is possible via Bluetooth. Bluetooth chip is designed to replace cables. Information carried by the cable, is transmitted at a special frequency to a receiver Bluetooth chip. Bluetooth communicates on a frequency between 2.402 GHz to 2.480 GHz It can connect up to eight devices simultaneously in a piconet.

Figure :1

2.1 CORE BLUETOOTH PRODUCTS


Notebook PCs and Desktop computers Printers Cell phones Other handled devices Wireless peripherals CD players Headsets

Cordless Phones Telephones Answering Devices Access points

2.2 TECHNICAL FEATURES


Connection Type Spread spectrum(Frequency Hopping)& Time division Duplex (1600 hops/sec) Spectrum Modulation Transmission power Data rate Range Supported Stations Module size Data security (Authentication) Data security ( Encryption) 2.4 GHz ISM open band (79 channels) Gaussian Frequency Shift Key 1 mw-100 mw 1 Mbps 30 feet 8 devices 9*9 mm 128 bit key 8-128 bits

2.3 REQUIREMENTS 1. Bluetooth devices : Bluetooth exists in many products such as telephones, printers and headsets. The technology transfers data between two or more devices that are near to each other in low bandwidth situations. 2. Computer Requirements: A PC must have Bluetooth adapter in order to be able to communicate with other Bluetooth devices ( such as mobile phones, mice and

keyboards). While some desktop computers and most recent laptops come with a built-in Bluetooth adapter. 3. Mobile phone requirements: A mobile phone that is Bluetooth enabled is able to pair with many devices.

3. BLUETOOTH CONNECTION PROCEDUERS


Operational mode of a Bluetooth enabled device is to be connected to other Bluetooth enabled devices (in a piconet) and exchanging data with that Bluetooth enabled device. As Bluetooth wireless technology is an ad-hoc wireless communications technology there are a number of operational procedures that enable piconets to be formed so that the subsequent communications can take place. For making a Bluetooth connection, it follows two procedures:1. Inquiry ( or discovery) Procedure 2. Paging ( or Connecting) procedure

Figure 2: Bluetooth connection

3.1 Inquiry (discovery) Procedure


Bluetooth devices use inquiry to discover nearby devices and to be discovered. The inquiry procedure is asymmetrical; A device that tries to find other nearby devices is known as an inquiring device and actively sends inquiry requests, Devices that are ready to be found are known as discoverable devices and listen for these inquiry requests and send responses. Both inquiring and discoverable devices may already be connected to other devices in a piconet.

3.2 Paging (or connecting) procedure


The procedure for forming connections is asymmetrical as well. One device carries out the page (connection) procedure. The other device is connectable (page scanning). The procedure is targeted, so that the page is only responded to by one device. Both paging and connectable devices may already be connected to other devices in a piconet. Bluetooth enabled devices in a piconet. It is a network in which up to eight Bluetooth enabled devices can be connected.

3.3 Role Switch Procedure


The role switch procedure is a method for swapping the roles of two devices connected in a piconet. The procedure involves moving from the channel that is defined by the original master device to the channel that is defined by the new master device. Bluetooth essentially a networking standard that works at two levels: 1. It provides agreement at the physical level- Bluetooth is radio transmission standard. 2. It provides agreement at the protocol level, where products have to agree on when bits are sent, how many will be sent at a time and the parties in a conversation can be sure that the message received is same as the message sent.

4. BLUETOOTH OPERATION
Bluetooth is a standardized technology that is used to create temporary short-range wireless communication systems. These Bluetooth wireless personal area networks are used to connect personal accessories such as headsets, keyboards and portable devices to communications equipment and networks. The Bluetooth system can dynamically discover and connect to other nearby devices for communication.

Figure 3: BLUETOOTH OPERATION

The basic radio transmission process is used in the Bluetooth system. The above diagram shows that the frequency range of the Bluetooth system ranges from 2.4 GHz to 2.483 GHz and that the basic radio transmission packet time slot is 625 usec. It also shows that one device in a Bluetooth piconet is the master (controller) and other devices are slaves to the master. Each radio packet contains a local area piconet ID, device ID, and logical channel identifier and the hopping sequence is normally determined by the master's Bluetooth device address. To setup a Bluetooth system, one of the devices is designated as a master (controlling) and the other devices are setup as slaves (responding to the commands of the master).When the Bluetooth devices come within close range of each other, an electronic conversation will occur to determine whether or not they have data to share. The user does not have buttons to command to give-the conversation starts automatically. When Bluetooth devices first
7

connect, there is a piconet master that initiates the connection, and the others are slave devices. One piconet can have a maximum of seven active slave devices and one master device. All communication within a piconet goes through the piconet master. Two or more piconets together form a scatternet, which can be used to eliminate Bluetooth range restrictions. It is not possible to be a master of two different piconets because a piconet is a group of devices all synchronized on a hopping sequence set by the master. For that reason, any devices that share a master must be on the same piconet. Bluetooth technology operates in the unlicensed industrial, scientific and medical (ISM) band at 2.4 to 2.485 GHz, using a spread spectrum, frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec. The 2.4 GHz ISM band is available and unlicensed in most countries. Bluetooth devices within a 10 to 100 meters (or 30 to 300 feet) range can share data with a throughput of 1 Mbps for Version 1.2 and up to 3 Mbps for Version 2.0 + Enhanced Data Rate (EDR). Data is transmitted between Bluetooth devices in packets across the physical channel that is subdivided into time units known as slots. The radio layer is the physical wireless connection. To avoid interference with other devices that communicate in the ISM band, the modulation is based on fast frequency hopping. Bluetooth divides the 2.4 GHz frequency band into 79 channels, 1 MHz apart (from 2.402 to 2.480 GHz), and uses this spread spectrum to hop from one channel to another, up to 1,600 times per second. Profiles are used with Bluetooth so that devices can communicate with each other and that there is interoperability between vendors. These profiles define behaviours of the Bluetooth devices and the roles and capabilities for specific types of applications. Hence Bluetooth uses the spread spectrum frequency hopping technique to establish the Bluetooth connection without any interference.

5. BLUETOOTH SECURITY
Security has played a major role in the invention of Bluetooth. The Bluetooth SIG has put much effort into making Bluetooth a secure technology and has security experts who provide critical security information. Bluetooth security procedures include authorization, authentication and optional encryption. Bluetooth technology has built-in security such as 128 -bit encryption and PIN code authentication.

Bluetooth users can establish trusted devices that can exchange data without asking permission. When any other device tries to establish a connection to the users gadget, the user has to decide to allow it. Service-level security work together to protect Bluetooth devices from unauthorized data transmission requires that users make a conscious decision to open a file or accept a data transfer. It offers several security modes and device manufactures determine which mode to include in a Bluetooth-enabled gadget.

5.1 APPLICATION LAYER SECURITY


The Bluetooth General Access Profile defines three modes of security:

Security Mode 1: non-secure Security Mode 2: service level enforced security Security Mode 3: link level enforced security

Security Mode 1
It does not provide security. A Bluetooth device in this mode allows any device to connect to it. This is useful for applications that don't explicitly require security, such as the exchange of business cards.

Security Mode 2

Security Mode 2 works at the service level. It is secured at the application layer (in other words, it is secured after a connection has been established). An application can be written to allow access to certain services (by another device) while restricting certain services.

Security Mode 3

Security Mode 3 works at the link level. It is secured before a connection is established between two devices. The use of a link key (or PIN code, as seen in earlier sections) is used to authenticate the identity of another device.
9

5.2 Link Layer Security

The link layer specification defines methods for both authentication and encryption that are subsequently used by higher layers. These methods utilize a number of keys generated by the process that begins with three basic device entities: a public 48 bits address, a random number generator and a secret PIN which is either built into the unit by the manufacturer or programmed by the user. A typical PIN may consists of four decimal digits. However for applications requiring more security a PIN code up to 128 bits long can be entered.

AUTHENTICATION
Authentication verifies the identity of a device. The sequence of the authentication process is: 1. 2. 3. The user enters a PIN code (on both the claimant and the verifier). The two devices use the PIN code to generate a 128-bit link key. The claimant transmits its address (a 48-bit address, similar to the MAC address of a wireless card) to the verifier. The verifier transmits a 128-bit random challenge to the claimant. Both the claimant and the verifier use the SAFER+ algorithm (Secure and Fast Encryption Routine) to generate a 32-bitauthentication response. The SAFER+ algorithm takes in as input the link key, claimants address, and the 128-bit random challenge. The claimant transmits the 32-bit authentication response to the verifier, which then compares it with its own. If the two authentication responses are identical, the authentication is successful; otherwise, it fails. When an authentication fails, a Bluetooth device has to wait for an interval of time before it can be authenticated again. This is a security measure against hackers using a rapid trial-and-error approach.

10

Figure 4 : Bluetooth authentication process

Encryption
Encryption protects the confidentiality of data transmitted between two Bluetooth devices. The Bluetooth specification supports three modes of encryption:

Encryption Mode 1 No packets are encrypted in this mode. Encryption Mode 2 Data transmitted to a specific device is encrypted, but data broadcast to multiple devices is not. Encryption Mode 3 All the data transmitted is encrypted.

The sequence for the encryption is: 1. A Key Generator generates an encryption key using as input the 96-bit Authenticated Cipher Offset (a result returned by the earlier authentication process), the Link key, and the 32-bit random challenge. The size of the encryption key ranges from 8 to 128 bits, and is negotiated between the master and the slave. 2. A key stream is produced using a cryptographic algorithm based on LFSR (Linear Feedback Shift Registers). The LFSR takes in as input the encryption key generated, the master's address, the 32-bit random challenge, and the slot number to be used for the current packet.
11

3.

The key stream produced is then xord with the plaintext ,which is then transmitted to the master.

Figure 5 : Bluetooth encryption process

6. BLUETOOTH SECURITY CONCERNS

The PIN code used for establishing a link is usually short and thus easy to guess. Longer PIN codes could be used. However, users normally prefer a shorter PIN code for convenience.

Distribution of PIN codes in a large network is difficult. Fortunately, this is not a major concern, as Bluetooth is commonly used for ad-hoc networking.

The 32-bit random challenge may generate numbers that follow a certain pattern. This reduces the effectiveness of the encryption.

Authentication is only at the device level; user-level authentication must be explicitly implemented. As Bluetooth is a relatively new standard, the Bluetooth specifications are still undergoing changes. Over time, we can expect to see more security measures being put in place. At the moment, it is appropriate to apply some of the techniques used for securing network communications on some types of Bluetooth connections.

12

7. BLUETOOTH SECURITY RISKS


Bluetooth uses radio waves to transfer information, so it could be vulnerable to attacks. But it is easy for a hacker to steal, read or modify a phone's address book, calendar or virtually anything else stored in your handset without leaving any trace of the intrusion.

BLUESNAFRING
It is a method of hacking into a Bluetooth-enabled mobile phone and copying its entire contact book, calendar or anything else stored in the phones memory. By setting the device in non-discoverable, it becomes significantly more difficult to find and attack the device. However, the software tools required to steal information from Bluetooth-enabled mobile phones are widely available on the Web, and knowledge of how to use them is growing. Companies such as Nokia and Sony Ericsson are making sure new phones coming to market will not be susceptible to bluesnarfing.

BACKDOOR ATTACK
This is when a hacker establishes trusted relationship with a handset, but then ensuring that it no longer appears in the target's registry of paired devices. This connection is granting him access not only to the data on your phone but also allowing him to use modems and WAP/GPRS services.

BLUEJACKING
Bluejacking is the process of sending unsolicited messages, or business cards, to Bluetoothenabled devices. Devices that are set in non-discoverable mode are not susceptible to bluejacking. In order for bluejacking to work, the sending and receiving devices must be within 10 meters of one another. Bluetooth device owners should be careful never to add the contact to their address book. This can also open the door to a variety of social engineering attacks.

13

8. BLUETOOTH Vs WI-FI
Bluetooth and Wi-Fi Both are communication techniques Both of them uses same frequency range and are versions of unlicensed wireless technology but employ different modulating techniques. Bluetooth is a replacement of cable for small applications while Wi-Fi is used for LAN access Wi-Fi Provides higher output and covers greater distance but require more expensive hardware and higher consumption as compared to Bluetooth communication.

9. BENEFITS OF BLUETOOTH
Wireless: Bluetooth wireless communication offers plenty of other advantages. When travelling with your laptop or other wireless devices, you'll no longer have to worry about bringing connection cables. Bluetooth is actually in-expensive: The Technology of Bluetooth is cheap for companies to implement, which results in lower costs for the company. Bluetooth is automatic: Bluetooth doesn't need to set up a connection or push any buttons. When two or more devices enter a range of up to 30 feet of each other, they will automatically begin to communicate without having to do anything Standardized protocol:

14

Bluetooth is standardized wireless, meaning that a high level of compatibility among devices is guaranteed. Bluetooth will connect devices to each other even if they are not of same model.

Low Interference: Bluetooth devices almost always avoid interference from other wireless devices. Bluetooth uses a technique known as frequency hopping, and also low power wireless signals. Low energy consumption: As a result of Bluetooth using low power signals, the technology requires little energy and will use less battery or electrical power. This is excellent benefit for mobile devices as Bluetooth wont drain the battery. Sharing voice and Data: The standard for Bluetooth will allow compatible devices to share voice and data communication. Instant PAN: Seven Bluetooth devices can be connected simultaneously to each other within the range of up to 30 feet forming a piconet or PAN. Upgradeable: Upgradeable is a standard for Bluetooth .There are newer versions of Bluetooth in the works, which offer many new advantages and backward compatible with older versions.

15

The Technology stays: Bluetooth is worldwide, universal wireless standard. As more and more devices starts to use Bluetooth technology, more manufactures will be eager to make their product compatible.

10. APPLICATIONS OF BLUETOOTH


More prevalent applications of Bluetooth includes 1. Wireless control of and communication between a mobile phone and hands free set. This is the one of earliest applications to become popular. 2. Wireless networking between computers in a confined space. 3. Wireless communication with PC input and output devices, the most common being the mouse, keyboard and printer. 4. Transfer of files, contact details, calendar appointments and reminders between devices with O-BEX ( Object Exchange Technology) 5. For controls where infrared was traditionally used. 6. Game consoles use Bluetooth for their respective wireless controllers. 7. Dial-up internet access on personal computers or PDAs using a data-capable mobile phone as a modem. 8. Replacement of traditional wired serial communications in test equipments, GPS receivers, medical equipment, bar code scanners and traffic control devices. 9. Hidden computing 10. Personal area networking 11. Cell phones acting as a modem for PCs and Laptops 12. Data synchronization for Address books. 13. PC and peripheral networking 14. Enabling a connection of YOUR personal devices to cooperatively work together.

11. ADVANTAGESOF BLUETOOTH 1. Widely used: Bluetooth is really popular and keeps getting more popular as time passes by. It is now widely used across countries and almost by everyone.
16

Companies are taking the benefit by using this in their new and future products to make life much easier for everyone. Bluetooth can be used on cell phones, laptops, music players, headsets ,printers and a lot more other products. 2. Feature simplicity: Anyone that does not have no knowledge about the Bluetooth technology can still be able to use the Bluetooth feature due to its simplicity and the ease of use. The simplicity of it and the fact its wire free makes it very widely used and utmost popular. 3. Free of charge: It is not an extra cell phone or cable that you have to add to your budget. Simply by the technology everyone can use it there is no need to pay a penny for the service. There has not been any reporting lately on the companies charging a month free or any fee for the people to use the Bluetooth feature. 4. Wireless: Bluetooth is a code free technology and do not have to worry about finding the correct place to connect the extra long code. 5. Easy to control: With Bluetooth device it is easy to exchange data across the cell phones with ability to keep the information private. 6. Unlike infrared it is not a line of sight and t provides range up to 100 meters. Bluetooth is also a low power and low processing with an overhead protocol as it is ideal for integration to small battery power devices. 7. Bluetooth technology is simple to install and expand 8. Perfect for file transfer and printing application 9. Simultaneous handling of data and voice on the same channel.

12. DISADVANTAGES OF BLUETOOTH


1. Battery use: This occurs mostly on the cell phones but also occur in other technologies such as music players. More of the battery power is used when Bluetooth is enabled on the cell phone all day. To disregard all this the user must disable the Bluetooth when the transfer of data gets completed. It only takes few minutes to enable or disable the Bluetooth so it is easy to save the battery by disabling the Bluetooth when not in use.

17

2. Bluetooth internet: Throughout all devices, when using Bluetooth internet,t he connection sometimes run very slow so Bluetooth internet is not highly suggested for all cases 3. Infrared can have data rates of up to 4 Mbps, which provides very fast rates for data transfer, while Bluetooth only offers 1MBbs. 4. The greater range and radio frequency of Bluetooth make it much more open to interception and attack. For this reason security is a very key aspect to the Bluetooth specification Although there are few disadvantages, Bluetooth still remains the for short range wireless technology for communications between the devices.

18

13. CONCLUSION
Bluetooth wireless is constantly growing in popularity because of the convenience of exchanging information between mobile devices. As Bluetooth usage rises, so do the

security risks associated with the technology. Advantages to Bluetooth include the ability to simultaneously handle both data and voice transmissions which enables users to enjoy a variety of innovation solutions such as a hands-free headset for voice calls, printing and fax capabilities, and synchronizing PDA, laptop, and mobile phone applications. Bluetooth users should familiarize themselves with Bluetooth security issues before using Bluetooth devices, and especially before they bring these devices into work place. As there are lots of advantages and few disadvantages of Bluetooth technology. Overall Bluetooth is a great thing to be using on all your devices that supports it. We can do lots of things with it and includes cutting all the wires and cables attached to the cell phone.

19

14. REFERENCES 1. www.google.com 2. www.bluetooth.com 3. www.wikipedia.com

20

21

Anda mungkin juga menyukai