You are on page 1of 21



Introduction • What is Bluetooth? • What does it do? • History of Bluetooth

Introduction (cont’d) • Is Bluetooth here to stay? • What should we expect from Bluetooth in the future? .

What Bluetooth Delivers to the end-user • Connects a wide range of computing and telecommunication devices • Expand communication capabilities • Devices can communicate with each other with wireless connectivity .

User Application • Car manufactures Industry • E-Mail / Internet / Intranet Access • Headsets • Bluetooth will facilitate Local Area Networks . ..Bluetooth in Action In the house In the Office . Source: http//:www..

Home Security On the Road Source: http// .motorola. .On your Car Source: http//:www.

– PIN Number • To identify the user using the device. – MAC Address (Physical Address) • Burnt on the NIC card by the manufacturer. – A Piconet – A FHHS protocol .Bluetooth Specifications • Things that you must have: – Transceivers and Receivers that can send and receive data because they use Radio Waves.

What is a Piconet? • A Piconet session is a communication link that must be created between devices for devices to communicate with each other. . • This is done when the MAC address and the PIN number match.

Piconet (cont.) • If two devices come onto contact with each other( 32 feet) the user will be prompted to initiate a communication session to initiate a session • Users then can either deny or accept the request • Only devices approved by the user can take part in the session • Data will appear as noise to unauthorized devices (A great security feature). .

• Bluetooth sends packets of data on a range of frequencies. .FHHS • Bluetooth devices use a protocol called (FHHS) Frequency-Hopping Spread Spectrum . • In each session one device is a master and the others are slaves. • Uses packet-switching to send data. • The master device decides at which frequency data will travel.

• The master device tells the slaves at what frequency data will be sent.FHHS • Transceivers “hop” among 79 different frequencies in the 2.4 GHz baud at a rate of 1600 frequency hops per second. . • This technique allows devices to communicate with each other more securely.

com .FHHS Example Source: http://www.xircom.

Bluetooth Security • Modes – Security Mode 1 • No Security – Security Mode 2 • Service Level Enforced Security • Implemented after channel is established – Security Mode 3 • Link Level Enforced Security • Implemented before channel is established .

Devices • “Trusted” – No Restrictions • “Untrusted” – Restrictions. Access is limited .

Service Levels • Authorization and Authentication • Authentication Only • Open to all Devices .

Link Level • Bluetooth Device Address • Private Link Key • Private Encryption Key • Random Number .

. • Security will Improve – Improve exisiting security – Implement new security . .Bluetooth Secure Enough? • Not enough for confidential and top secret information now but .

Wrap up • Growing Technology • Automation .

com • .motorola.For More Information Please Visit The Following Sites • • • www.