There was a problem sending you an sms. Check your phone number or try again later.
We've sent a link to the Scribd app. If you didn't receive it, try again.
Blue tooth is a short-range radio link intended to be a cable replacement between portable and/or fixed electronic devices. A frequency hop transceiver is applied to combat interference and fading. It also has a built-in security at the physical layer. Blue tooth employs several layers of data encryption and user authentication measures. This paper deals with the base band layer of Blue tooth and its security. The general format of packet transmission is access code followed by the payload and the header. The datas transmitted in this technology may be corrupted or accessed by the public users. Although there are some security measures in Bluetooth, they is a need for improved security of datas. Hence the Bluetooth is modified with additional security measures by employing the RSA algorithm. This RSA algorithm is applied in the payload of the packet. We implement this by the method of cryptography where the payload is encrypted at the transmitter and decrypted at the recevier using RSA cryptography. When compared to the builtin security this additional security allows secure exchange of datas. This was simulated in VHDL software.
Blue tooth operates in the unlicensed ISM band at 2.4 GHz. The key features are robustness, low complexity, low power, and low cost. On the channel, information is exchanged through packets. Each packet is transmitted on a different hop frequency. A packet nominally covers a single slot, but can be extended to cover up to five slots. The Blue tooth protocol uses a combination of circuit and packet switching. Slots can be reserved for synchronous packets. The Blue tooth system consists of a radio unit, a link control unit, and a support unit for link management and host terminal interface functions. This paper describes the specifications of the Blue tooth link controller which carries out the base band protocols and lower level link routines. The Blue tooth system provides a point-to-point connection or a point-to-multipoint connection. Two or more units sharing the same channel form a Pico net. One Blue tooth unit acts as the master of the Pico net, whereas the other units acts as slaves. Multiple Pico nets with overlapping coverage areas forms a scatter net. Each Pico net can only have a single master. The Pico nets shall not be time or frequency synchronized. Each Pico net has its own hopping channel. The channel is represented by a pseudo-random hopping sequence hopping through the 79 or 23 RF channels. The channel is divided into time slots each 625 ms in length. A TDD scheme is used where master and slave transmit alternatively. The data transmitted has a symbol rate of 1 Ms/s. Two different types of links that can be established between master and slaves are Synchronous Connection-Oriented (SCO) link and Asynchronous Connection-Less (ACL) link.
Now bringing you back...
Does that email address look wrong? Try again with a different email.