Welcome: Presented By:-Vishal More 229 Shubham Kotalwar 228 Kiran Karhale 223

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 20

WELCOME

Presented by :-
VISHAL MORE 229
SHUBHAM KOTALWAR 228
KIRAN KARHALE 223

With Guidance of:-


Mr. Joshi Sir
 Introduction
 What Bluetooth Delivers to the end-user
 User Application
 Bluetooth in Action
 Bluetooth Specifications
 Pico net
 FHHS
 Bluetooth Security
 Reference
Introduction

 Is Bluetooth here to stay?

 What should we expect from


Bluetooth in the future?
What Bluetooth Delivers to the end-
user

 Connects a wide range of computing and


telecommunication devices

 Expand communication capabilities

 Devices can communicate with each other


with wireless connectivity
User Application
 Car manufactures Industry

 E-Mail / Internet / Intranet Access

 Headsets

 Bluetooth will facilitate Local Area


Networks
Bluetooth in Action

In the house In the Office.


Home On the
Security Road
Bluetooth Specifications
 Things that you must have:
– Transceivers and Receivers that can
send and receive data because they use
Radio Waves.
– MAC Address (Physical Address)
• Burnt on the NIC card by the manufacturer.
– PIN Number
• To identify the user using the device.
– A Piconet
– A FHHS protocol
Pico net
 If two devices come onto contact with each
other( 32 feet) the user will be prompted to initiate a
communication session

 Users then can either deny or accept the request to


initiate a session

 Only devices approved by the user can take part in


the session

 Data will appear as noise to unauthorized devices


(A great security feature).
FHHS
 Bluetooth devices use a protocol called (FHHS)
Frequency-Hopping Spread Spectrum .
 Uses packet-switching to send data.
 Bluetooth sends packets of data on a range of
frequencies.
 In each session one device is a master and the
others are slaves.
 The master device decides at which frequency data
will travel.
FHHS
 Transceivers “hop” among 79 different
frequencies in the 2.4 GHz baud at a rate of
1600 frequency hops per second.

 The master device tells the slaves at what


frequency data will be sent.

 This technique allows devices to


communicate with each other more
securely.
FHHS Example
Bluetooth Security
 Modes
– Security Mode 1
• No Security
– Security Mode 2
• Service Level Enforced Security
• Implemented after channel is established
– Security Mode 3
• Link Level Enforced Security
• Implemented before channel is established
Service Levels
 Authorization and Authentication

 Authentication Only

 Open to all Devices


Link Level
 Bluetooth Device Address

 Private Link Key

 Private Encryption Key

 Random Number
Bluetooth Secure Enough?
 Not enough for confidential and top
secret information now but . . .
 Security will Improve
– Improve exisiting security
– Implement new security
Wrap up

 Growing Technology

 Automation
Devices Connection
Note that a device can
be “Undiscoverable”
D
F N
H
G M

A P
B
O
E
K
J L
I Q
C
10 meters
After inquiry procedure, A knows about others within range
Reference
 www.motorola.com
 www.xircom.com
 www.palowireless.com
 www.bluetooth.com
THANK YOU

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy