Bluetooth. March 28, 2005 Patrick Lui

Similar documents
Bluetooth. Quote of the Day. "I don't have to be careful, I've got a gun. -Homer Simpson. Stephen Carter March 19, 2002

[A SHORT REPORT ON BLUETOOTH TECHNOLOGY]

Chapter 10: Wireless LAN & VLANs

Research on Modern Bluetooth Technology

Guide to Wireless Communications, 3 rd Edition. Objectives

A Seminar Report On Bluetooth Technology

ON SECURITY OF BLUETOOTH WIRELESS SYSTEM. Pavel Kucera, Petr Fiedler, Zdenek Bradac, Ondrej Hyncica

Introduction to Wireless Networking ECE 401WN Spring 2009

Solving the Interference Problem due to Wireless LAN for Bluetooth Transmission Using a Non- Collaborative Mechanism. Yun-Ming, Chiu 2005/6/09

Security. Nelli Gordon and Sean Vakili May 10 th 2011

Wireless# Guide to Wireless Communications. Objectives

Bluetooth. Bluetooth Radio

CompTIA FC0-U51. CompTIA IT Fundamentals.

Securing A Bluetooth Device

Jeffrey Price Dr. Konak IST 220 Bluetooth Technology

CS4/MSc Computer Networking. Lecture 13: Personal Area Networks Bluetooth

Computer Networks II Advanced Features (T )

Bluetooth technology, developed by Ericsson Mobile Communications, a. worldwide telecommunications company based in Sweden, is fast becoming the

Inside Bluetooth. Host. Bluetooth. Module. Application RFCOMM SDP. Transport Interface. Transport Bus. Host Controller Interface

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Bluetooth. Digital Communications CIM242. Amarpreet Singh Saini KINGSTON UNIVERSITY K /10/2010

A COLLOCATED APPROACH FOR COEXISTENCE RESOLUTION IN WIRELESS HOME NETWORKING

e-pg Pathshala Quadrant 1 e-text

ENRNG3076 : Oral presentation BEng Computer and Communications Engineering

Wireless Personal Area Networks & Wide Area Networks

Wireless Technologies

Bhopal, , India 3 M.Tech Scholor,Department Of Computer Science, BIST Bhopal. Bhopal, , India

ALL SAINTS COLLEGE OF TECHNOLOGY, BHOPAL

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Wireless Networks. Authors: Marius Popovici Daniel Crişan Zagham Abbas. Technical University of Cluj-Napoca Group Cluj-Napoca, 24 Nov.

WIRELESS TECHNOLOGIES

Bluetooth PCI Adapter

Amarjeet Singh. February 7, 2012

Overview of Bluetooth

WPAN-like Systems. UWB Ultra Wide Band. IrDA Infrared Data Association. Bluetooth. Z-Wave. WPAN Wireless Personal Area Network

Security in Ad-hoc Networks

CS263: Wireless Communications and Sensor Networks

WIRELESS-NETWORK TECHNOLOGIES/PROTOCOLS

MODELING AND SIMULATION OF IEEE WIRELESS-LAN AND BLUETOOTH PICONET RANGE INTERFERENCE

Network Communications Standards. Applied Information Technology

Performance Evaluation of Bluetooth Links in the Presence of Specific Types of Interference

Wireless Sensor Networks

SIMULATION BASED ANALYSIS OF BLUETOOTH NETWORKS. M. Subramani and M. Ilyas

Co-Existence of WirelessHART with other Wireless Technologies

Sensor Application for Museum Guidance

Advanced Mobile Computing and Networking - CS 560. Wireless Technologies. Bluetooth. Bluetooth. Bluetooth. Bluetooth 7/3/2014.

Bluetooth Tutorial. Bluetooth Introduction. Bluetooth Technology

MOBILE COMPUTING. Jan-May,2012. ALAK ROY. Assistant Professor Dept. of CSE NIT Agartala.

Employing Wireless Bluetooth for C 3 in Industrial Automation C. Norz C. Miller

Rab Nawaz Jadoon (Assistant Professor) Department of Computer Science COMSATS University, Abbottabad, Pakistan

12/2/09. Mobile and Ubiquitous Computing. Bluetooth Networking" George Roussos! Bluetooth Overview"

Modulation. Propagation. Typical frequency bands

AT THE END OF THIS SECTION, YOU SHOULD HAVE AN UNDERSTANDING OF THE

Module 5. Embedded Communications. Version 2 EE IIT, Kharagpur 1

Seminar: Mobile Systems. Krzysztof Dabkowski Supervisor: Fabio Hecht

Ethernet. Lecture 6. Outline. Ethernet - Physical Properties. Ethernet - Physical Properties. Ethernet

A Wireless Identification System to Assist Sight- Constrained People

Mobile Hands Free Operation. Ontario Regulation 366/09

Wireless LAN. Access Point. Provides network connectivity over wireless media

Bluetooth: Short-range Wireless Communication

Implementing A Bluetooth Stack on UEFI

Communication Systems. WPAN: Bluetooth. Page 1

Lecture 23 Overview. Last Lecture. This Lecture. Next Lecture ADSL, ATM. Wireless Technologies (1) Source: chapters 6.2, 15

Cryptographic Concepts

But where'd that extra "s" come from, and what does it mean?

The 8 th International Scientific Conference DEFENSE RESOURCES MANAGEMENT IN THE 21st CENTURY Braşov, November 14 th 2013

BlueSerial. Bluetooth Serial RS232 Port Adapters. User Manual HANTZ + PARTNER. The Upgrade Company!

Wireless Communications

Table Contents. Introduction Key Features...2. Getting Started Package Contents...3. Minimum System Requirements...3

Logitech Advanced 2.4 GHz Technology With Unifying Technology

Bluetooth Wireless Technology meets CAN

A Study Wireless Communication Domain

Wireless Sensor Networks CS742

Message acknowledgement and an optional beacon. Channel Access is via Carrier Sense Multiple Access with

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN

Wireless Terms. Uses a Chipping Sequence to Provide Reliable Higher Speed Data Communications Than FHSS

Wireless Networked Systems

Institute of Electrical and Electronics Engineers (IEEE) IEEE standards

CHAPTER 3 BLUETOOTH AND IEEE

A Survey on Security Threats and Vulnerability attacks on Bluetooth Communication

ZigBee----free as a bee!

LevelOne BLH-1000 Bluetooth Headset User s Manual

3Com Wireless Bluetooth PC Card, USB Adapter, and Printer Adapter

Lecture 6. Reminder: Homework 2, Programming Project 2 due on Thursday. Questions? Tuesday, September 13 CS 475 Networks - Lecture 6 1

Security Overview of Bluetooth

WIRELESS SENSOR NETWORK

Case study of Wireless Technologies in Industrial Applications

Bluetooth Demystified

Unit title: Mobile Technology: Device Connectivity (SCQF level 5) Outcome 1

SE 4C03 Winter 2005 Bluetooth Wireless Network Technology

By N.Golmie Presented by: Sushanth Divvela

Outline. Performance Evaluation of Traffic in a Interfering Wireless LANs Environment for Bluetooth and IEEE

Wireless Local Area Networks (WLAN)

Comparative Analysis of ZigBee, WLAN and Bluetooth System and its Throughput Enhancement

Extending or Interconnecting LANS. Physical LAN segment. Virtual LAN. Forwarding Algorithm 11/9/15. segments. VLAN2, Port3. VLAN1, Port1.

By FaaDoOEngineers.com

ITP 140 Mobile Applications Technologies. Networks

Wireless LANs/data networks

Bluetooth Communications App Using App Inventor

Wireless technology Principles of Security

Transcription:

Bluetooth March 28, 2005 Patrick Lui 0053252

1. Introduction As our everyday lives move closer towards complete digital age, connectivity between devices is an important aspect that has not been emphasized comparing to other technologies. An often neglected part of research and development, there are only a few different protocols used in commercial products. Some of the examples include infrared, radio signal and Bluetooth. The latter is the focus of this research paper. 2. How Bluetooth works Bluetooth, in short, is a radio-frequency standard allows electronic devices to communicate wirelessly. It can be separated into two different layers: physical and link layers. Physical Layer It uses frequency in the range 2400 to 2483.5 MHz, which is the Industrial, Scientific and Medical (ISM) band. To minimize collision, Bluetooth adopts Frequency Hopping Spread Spectrum (FHSS). FHSS is when a device switches its frequency at up to 1600 times per second within 79 randomly chosen frequencies. There are three power classes with Class 3 being the most common. A Class 3 Bluetooth device sends 1 millivolt signals while giving a range of up to 10 meters. Since it uses radio-frequency, the shortcoming of line of sight technologies such as infrared is eliminated. It has the ability to go through walls. Link Layer This layer is responsible to establish and multiplex the data between two Bluetooth adapters. Each adapter is assigned an address by the manufacturer. When a Bluetooth-enabled device is turned on, the link layer will look for other devices that are physically within the range that have addresses in a particular addressing range. If one of such device is in range, a Personal Area Network (PAN), also known as a piconet, is formed. One device will act as the master and another as the slave. There can be up to seven active slaves in a piconet. Each slave is given a 3-bit Active Member Address. Once this is done, packets can be transmitted between the master and the slaves. The speed of transmission can go up to 723.2 kb/sec depending if the data is symmetric 2

or asymmetric. This layer is usually controlled by embedded software to conserve power. 3. Security There are three modes of security: Mode 1: Non-secure, no authentication required. Mode 2: Authentication only. Mode 3: Authentication and authorization required before a link can be established. To accomplish the above, the following is provided either by the physical layer or the link layer: random (128 bits), encryption key (8-128 bits) and link key (128 bits). Before a connection between two devices can be established, the link key has to be used for authentication. The link key can be a combination key, unit key, master key or an initialization key, depending on the application. The following table shows which algorithm produces which key: Algorithm Input Output Notes E3 Link key, 96-bit Ciphering Encryption key - encryption key is used whenever a device go into encryption mode Offset Number, random - new encryption key is generated each time going into encryption mode E21 Bluetooth device address, random Combination/Unit key - devices exchange securely their random s and calculate the combination key to be used between them E22 PIN, length of PIN, random Initialization/Master key - the generated key is used for key exchange during the generation of a link key 3

The encryption process is similar to encryption in other devices where the encryption key is used to encrypt and decrypt data. Vulnerabilities There are several known attacks that go through the Bluetooth protocol. A snarf attack refers to the compromise of data. Normally, this is only possible if the devices near an attacker are visible but there are ways around it. Another type of attack is called a backdoor attack, which is the abuse of the list of trusted devices that each Bluetooth-enabled device has. By posing as a trust device, the attack will be able to sneak onto the device without the owner knowing. Bluejacking is another vulnerability where the attacker can send unwanted messages to Bluetooth-enabled devices. The details of how these attacks can be accomplished are easily available online. Although it seems as if it is very easy to be a victim, there is a very simple method to avoid being attacked; do not turn on Bluetooth unless one needs to. There is no way an attacker can cause any harm if Bluetooth is not turned on. 4. Conclusion With so many electronics manufacturer, including Apple, IBM, Sony, Motorola, backing Bluetooth, it is here to stay and will only become more prominent in the near future. As outlined in the Security section, there are issues with Bluetooth but it is a good step towards a wireless society. There are already printers that utilize Bluetooth technology. Bluetooth-enabled keyboards and mouse are becoming more common. While the main use so far is to connect mobile phones and PDA s to the computer, there is no reason to limit this technology to those uses alone. More innovative uses will be seen in the near future. 4

References: Blankenbeckler, D. (n.d.). Retrieved Mar. 25, 2005, from An Introduction to Bluetooth Web site: http://www.wirelessdevnet.com/channels/bluetooth/features/bluetooth.html. Vainio, J. T. (2000). Retrieved Mar. 25, 2005, from Bluetooth Security Web site: http://www.niksula.cs.hut.fi/~jiitv/bluesec.html. (2003). Retrieved Mar. 25, 2005, from Bluetooth Specification Web site: http://www.thewirelessdirectory.com/bluetooth-overview/bluetooth-specifi cation.htm. (2004). Retrieved Mar. 25, 2005, from Serious flaws in bluetooth security lead to disclosure of personal data Web site: http://www.thebunker.net/security/bluetooth.htm. (n.d.). Retrieved Mar. 25, 2005, from How Bluetooth Works Web site: http://electronics.howstuffworks.com/bluetooth.htm. 5