Professional Documents
Culture Documents
Today, electronics that connect to one another are found everywhere; in the office, home, Car, etc.
Keyboards connect to computers, MP3 players to headphones and so on. These are possible with
the help of wires and cables.
In this seminar work I try to look at Bluetooth technology in handling connection issues. Bluetooth
technology is a short-range wireless radio technology that allows electronic devices to connect to
one another. Generally, Bluetooth has a range of up to 30 ft. or greater, depending on the Bluetooth
Core Specification Version. Newer devices, using newer versions of Bluetooth, have ranges over
100 ft. Bluetooth wireless technology makes connections just like cables connect a computer to a
keyboard, mouse, or printer, or how a wire connects an MP3 player to headphones. Bluetooth
technology makes these same connections, except it does it without the cables and wires.
Bluetooth technology was first developed by Ericsson and then formalized by a group of
electronics manufacturers (Ericsson, IBM, Intel, Nokia, and Toshiba) who joined forces to form a
private trade association known as the Bluetooth Special Interest Group (SIG). When they formally
introduced the Bluetooth specification to the public, they established a global standard, thus
creating a universal way for mobile computers, cell phones, and various other devices to wirelessly
connect with one another.
The name “Bluetooth” and its logo are trademarked by the privately held trade association named
the Bluetooth Special Interest Group (SIG). Founded in September 1998, the Bluetooth SIG is a
unification of leaders in the telecommunications, computing, network, industrial automation, and
Automotive industries. Today, the Bluetooth SIG is responsible for encouraging and supporting
research and development in Bluetooth technology.
The Bluetooth SIG includes promoter member companies Microsoft, Ericsson, IBM, Intel, Agere,
Motorola, Nokia, and Toshiba, plus thousands of Associate and Adopter member companies.
Why is It Called Bluetooth? The developers of this wireless technology first used the name
"Bluetooth" as a code name, but as time past, the name stuck.
The word "Bluetooth" is taken from the 10th century Danish King Harald Bluetooth. King
Bluetooth had been influential in uniting Scandinavian Europe during an era when the region was
torn apart by wars and feuding clans. The founders of the Bluetooth SIG felt the name was fitting
because: Bluetooth technology was first developed in Scandinavia, and is able to unite differing
industries such as the cell phone, computing, and automotive markets. Bluetooth wireless
technology simplifies and combines multiple forms of wireless communication into a single,
secure, low-power, low-cost, globally available radio frequency.
Connecting Devices
In order to understand how Bluetooth technology works, we must first take a look at how electronic
devices (Bluetooth or not) connect and communicate with one another. There are several questions
that need to be addressed before any two devices can communicate with one another.
Q: How will devices in this “electronic conversation” know what the information (bits or groups of
bits) means? How will they know if they received the same message that was sent?
A: Most of the time these questions are answered by the creation of what is known as a protocol. A
protocol is a standard that controls or enables the connection, communication, and data transfer
between two electrical devices. Basically, a protocol is the "language" of devices.
With so many different types of electronics available, it is probably no surprise that there are tons
of established protocols. However, almost all protocols address one or more of the following:
Some types of products have a standard protocol used by almost all companies. As a result, the
commands for one product will have the same effect on another. However, there are other devices
that use their own specific protocol, which means that commands intended for one specific device
will seem foreign if received by another.
The goal of Bluetooth is to establish a worldwide, universal "language" for devices. Bluetooth uses
a standardized wireless protocol for devices to communicate. It forces devices to agree on when
bits are sent, how many will be sent at a time, and how the devices in a conversation can be sure
that the message received is the same as the message sent. So, you can be positive that any two
devices using compatible Bluetooth will definitely be able to communicate with one another.
Bluetooth avoids interference is through the use of low power signals (around one milliwatt).
Devices One of the ways using the Bluetooth Core Specification Version 1.1 or later are able to
avoid interference with other wireless devices because their signal is so weak.
The signal is also capable of passing through the walls in your home, making it useful for
controlling several devices in different rooms. Data can be transferred at a rate of up to one
Megabyte per second (Mbps). Also, because Bluetooth transmitters require minimal amounts of
power, they are relatively inexpensive to manufacture. Simply put, Bluetooth uses low-power radio
waves to reliably communicate in an inexpensive way.
Another way Bluetooth devices are able to avoid interference is through a technique known as
spread-spectrum frequency hopping. By using the “hopping” method, a device will use one of 79
Bluetooth enabled devices, which all use the “hopping” method, change frequencies 1,600 times
per second. As a result, more devices can use a portion of the radio spectrum.
The risk of a device like a cell phone or baby monitor interfering with Bluetooth devices is
minimized, since any interference on a specific frequency will last for only a fraction of a second.
Bluetooth version 2.0 + EDR, the very latest of the Bluetooth specification versions, uses an
enhanced technology called: Adaptive Frequency Hopping (AFH).
AFH allows Bluetooth devices to measure the quality of the wireless signal and then determine if
there are bad channels present on specific frequencies due to interference from other wireless
devices. If bad channels are present on a specific frequency, the Bluetooth device will adjust its
hopping sequence to avoid them. As a result, the Bluetooth connection is stronger, faster, and more
reliable.
Furthermore, it is possible for multiple, distinct piconets to be operating in the same room at any
given moment. Devices that are apart of a specific piconet, based on their profiles, use “Hopping”
Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 6
simultaneously so they stay in touch with one another and avoid other piconets that may be
operating in the same room.
In order to regulate communications one of the participating devices is assigned the role of
"master" of the piconet, while all other units become "slaves". Masters have the duty of directing
and controlling communications, even between two slave devices.
Under the current Bluetooth specification, up to seven slaves and one master can actively
communicate. Furthermore, in order to extend these networks, several piconets can be joined
together in what is known as a scatternet.
Piconet Piconet
In theory, anyone with a compatible Bluetooth device is supposed to have the ability to hook up
anywhere within that network and connect to another Bluetooth device.
Since this piconet is established between devices with the same specific profiles, the signals sent by
other devices with different profiles, like the headset, will be ignored. All the other Bluetooth
devices in the room establish similar piconets that are all separated from one another based on the
specific profile(s) they use.
Our "dream" office now has several different piconets operating simultaneously, and each one
knows which Bluetooth devices to communicate with and which signals to ignore.
3. Bluetooth is Automatic. Bluetooth doesn't require you to think about setting up a connection
or to push any buttons. When two or more Bluetooth devices enter a range (Up to 30 feet) of
one another, they automatically begin to communicate without you having to do anything.
Once the communicating begins, Bluetooth devices will setup Personal Area Networks or
Piconets. The best part is: The devices take care of the entire setup process, and you can go
about your business.
5. Low Interference (If Any). Bluetooth devices avoid interference with other wireless devices
by:
a) Using a technique known as spread-spectrum frequency hopping, and
b) Using low power wireless signals.
7. Share Voice and Data. The Bluetooth standard allows compatible devices to share both
voice and data communications. For example, it is probably no surprise that a Bluetooth
enabled cell phone is capable of sharing voice communications with a compatible Bluetooth
headset, however, the same cell phone may also be capable of establishing a GPRS
connection to the Internet. Then, using Bluetooth, the phone can connect to a laptop. The
result: The laptop is capable of surfing the web or sending and receiving email.
8. Instant Personal Area Network (PAN). Up to seven compatible Bluetooth devices can
connect to one another within a proximity of up to 30 feet, forming a PAN or piconet.
Multiple piconets can be automatically setup for a single room.
10. The Technology is Here to Stay. Bluetooth is a universal, world-wide, wireless standard.
Therefore, you can count on it being around for years to come. As more devices begin to
use Bluetooth technology, electronics manufacturers will be increasingly eager to make
their products compatible, using Bluetooth. A chain reaction is inevitable, in fact, it has
already begun.
Several Bluetooth specification versions have been released since Bluetooth technology was
introduced in 1998.
Versions 1.0 and 1.0B had too many problems and restraints for manufacturers to successfully
develop Bluetooth devices. The main issue was the lack of interoperability among devices.
The Bluetooth Core Specification version 1.1 is the first truly successful operating version of
Bluetooth technology. Bluetooth 1.1 corrected many of the problems found in the earlier versions.
As a result: Devices using Bluetooth 1.1 have much greater interoperability.
Bluetooth Version 1.2. Many new Bluetooth devices, like the latest cell phones, are being sold with
the newer Bluetooth specification version 1.2. So, what new features/benefits does Bluetooth 1.2
offer?
Bluetooth Version 2.0 + EDR (Enhanced Data Rate). There may be multiple communication
technologies, but they all share one thing in common: Faster is better. The Bluetooth SIG realized
this, and worked on improving the speeds of Bluetooth version 1.2. Bluetooth version 2.0 + EDR
was announced by the Bluetooth SIG in June 2004 and began appearing in Bluetooth devices in late
2005.
Bluetooth version 2.0 + EDR delivers data transfer rates up to three times faster than the original
Bluetooth specification. Bluetooth version 2.0 + EDR also provides enhanced multiple-
connectivity. With Bluetooth 2.0 + EDR, users will be able to more efficiently run multiple
Bluetooth devices at the same time. As a result, Bluetooth Personal-Area Networks (PAN) or
Piconets will become more common.
Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 11
For example, users will have the ability to synchronize a Bluetooth enabled computer with a
Bluetooth PDA, and at the same time they can listen to music using a pair of Bluetooth wireless
headphones.
Computers and computer related devices have been some of the 1st devices to use Bluetooth 2.0 +
EDR, while audio and imaging devices are expected to follow shortly.
Here is a listing of the main enhancements/features you will find with Bluetooth Specification
Version 2.0 + EDR:
Bluetooth pairing occurs when two Bluetooth devices agree to communicate with each other and
establish a connection. In order to pair two Bluetooth wireless devices, a password (passkey) has to
be exchanged between the two devices. A Passkey is a code shared by both Bluetooth devices,
which proves that both users have agreed to pair with each other.
In order to find other Bluetooth devices, Bluetooth device A must be set to discoverable mode.
When set to discoverable, Bluetooth device A will allow other Bluetooth devices to detect its
presence and attempt to establish a connection.
You may set your discover setting off if you like (It is recommended that you turn it off when not
using the Bluetooth). When the discover setting is off, no other Bluetooth device will be able to
find it. Undiscoverable devices can still communicate with each other but they have to initiate
communication themselves.
Bluetooth device A finds Bluetooth device B. Usually the discoverable device will indicate what
type of device it is (Such as a printer, cell phone, headset, etc.) and its Bluetooth device name. The
Bluetooth device name is the name that you give the Bluetooth device or the factory name that
originally was programmed.
Bluetooth Device A prompts you to enter a password (PassKey). With advanced devices, both users
must agree on the Passkey and enter it into their device. The code can be anything you like as long
as it is the same for both Bluetooth wireless devices. On other devices, such as Bluetooth headsets,
the Passkey stays the same. Refer to the product’s manual for the default passkey. Most often , the
passkey is zero.
A & B (Paired)
B (Passkey)
A (Passkey)
The Bluetooth SIG states, "Bluetooth profiles are general behaviors through which Bluetooth
enabled devices communicate with other devices." In order to connect to one another, devices that
use Bluetooth technology must support and understand certain Bluetooth profiles. Bluetooth
profiles define the possible applications and describe how Bluetooth technology is to be used for
each specific device.
For example, the File Transfer profile is used to define how devices like a PDA will use Bluetooth
Technology to transfer files to other devices like another PDA, cell phone, or computer.
When a Bluetooth device is developed, the manufacturer assigns (In accordance with the Bluetooth
SIG's requirements) specific Bluetooth profiles for that device to use in order to establish
applications which will work with other Bluetooth devices.
In order for one Bluetooth device to connect to another, both devices must share at least one of the
same Bluetooth profiles.
For example, if you want to use a Bluetooth headset with your Bluetooth enabled cell phone, both
devices must use the Headset (HS) profile (Defines how headsets and cell phones use Bluetooth
technology to connect to one another).
According to the Bluetooth SIG: At minimum, every Bluetooth profile includes information on the
following issues:
Dependencies on other profiles.
Recommended user interface formats.
Particular parts of the Bluetooth protocol stack used by the profile. To perform its functions, each
profile uses particular options and parameters at each layer of the stack. This may include an
outline of the required service record, if applicable.
Most Bluetooth devices are given just a few profiles. For example, a Bluetooth headset will use the
Headset Profile, but not the LAN Access Profile (Defines how devices use Bluetooth technology to
connect to local area networks).
Most of the time the specific Bluetooth profiles won't be of much importance to you. However,
when you are trying to expand a device's functions or use it with another Bluetooth device that's not
listed as compatible, then it is highly recommended that you find out what specific profiles are
used.
Recently, Bluetooth technology has been popping up in the internet. Unfortunately, most of the
news involves confusion and misinformation regarding the security of Bluetooth. Recent reports
have surfaced describing ways for hackers to crack Bluetooth devices security codes.
Yes, it is true: there have been some Bluetooth cell phones that have been hacked into. However, it
is most likely the case that those who have experienced these security breaches have not taken the
appropriate precautions to protect their devices.
According to the Bluetooth Special Interest Group (SIG), in order to break into a Bluetooth device,
a hacker must:
Force two paired Bluetooth devices to break their connection
Steal the packets used to resend the PIN, then
Decode the PIN
The hacker must of course be within range of the Bluetooth device and, according to the Bluetooth
SIG, be using very expensive developers’ equipment. The SIG suggests users create a longer PIN (8
digit is recommended).
The Bluetooth SIG Focuses on Security. The Bluetooth SIG is constantly improving formats for
combating security threats associated with Bluetooth technology. Offering a secure method to
Bluetooth Technology by Omokaro Richardson…. HD Computer Engineering, Olabisi Onabanjo Univerisity. 18
wirelessly communicate has always been one of the key benefits of Bluetooth technology. If you
look at The History of Bluetooth, you will see that offering secure data transmission was one of the
core principles for its creation.
In order to lead the security effort, a group of engineers within the Bluetooth SIG formed the
Bluetooth Security Experts Group. As the Bluetooth Core Specification Versions continue to
advance, the Bluetooth Security Experts Group is responsible for monitoring the advancement and
testing for flaws in its security.
The Fundamentals of Bluetooth Security. One of the most basic levels of security for Bluetooth
devices is the “pairing” process.
Pairing = Two or more Bluetooth devices recognize each other by the Bluetooth Profiles they share,
and in most cases, both must enter the same PIN.
The Bluetooth core specifications use an encryption algorithm, which is entirely secure. Once
Bluetooth devices pair with one another, they too are entirely secure.
Bluetooth devices will not communicate with each other until they have successfully paired. So,
because of this pairing process and the fact that it has a short range, Bluetooth technology is
considered to be fundamentally secure.
Unfortunately, as recent news has indicated, experienced hackers have come up with a way to get
around this basic level of security. However, there are precautions users can take to limit the
chances of their Bluetooth device from being compromised by a hacker.
How Developers Can Provide Security. Companies who develop Bluetooth enabled products have
multiple options in order to provide security. There are three security modes for connecting two
Bluetooth devices:
Security Mode 1: non-secure
Security Mode 2: service level enforced security
Security Mode 3: link level enforced security
It is the company who develops each specific Bluetooth product that decides which security modes
to use. Also, the devices and services have different security levels as well. For example, devices
use two levels: "trusted device" and "untrusted device". After a trusted device is connected to
another device, it has unrestricted access to all services. As far as services, there are three security
If there is something wrong with the actual Bluetooth specification, then the Bluetooth SIG will
confront the problem directly. However, if the problem is a result of the implementation of
Bluetooth technology, then the SIG will work with the specific members in order to release patches
and prevent future problems from occurring.
What is Bluejacking? Bluejacking allows phone users to send business cards anonymously to one
another using Bluetooth technology. Bluejacking does NOT involve any altercations to your
phone's data. These business cards usually consist of some clever message or joke. Bluejackers are
simply looking for a reaction from the recipient. To ignore bluejackers, simply reject the business
card, or if you want to avoid them entirely, set your phone to non-discoverable mode
What is Bluesnarfing? Bluesnarfing refers to a hacker who has gained access to data, which is
stored on a Bluetooth enabled phone. Bluesnarfing allows the hacker to make phone calls, send and
receive text messages, read and write phonebook contacts, eavesdrop on phone conversations, and
connect to the Internet. The good news is, bluesnarfing requires advanced equipment and expertise
or requires the hacker to be within a 30 ft. range. If your phone is in non-discoverable mode, it
becomes significantly more difficult for hackers to bluesnarf your phone. According to the
Bluetooth SIG, only some older Bluetooth enabled phones are vunerable to bluesnarfing.
What is Bluebugging? Bluebugging refers to a skilled hacker who has accessed a cell phone's
commands using Bluetooth technology without the owner's permission or knowledge. Bluebugging
allows the hacker to make phone calls, send messages, read and write contacts and calendar events,
eavesdrop on phone conversations, and connect to the Internet. Just like all Bluetooth attacks, the
hacker must be within a 30 ft. range. Bluebugging and bluesnarfing are separate security issues, and
phones that are vulnerable to one are not necessarily vulnerable to the other.