Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
Presentation Report
Topic:-
Department:- CS&IT
Class:- SE-I (2011-2015)
Submitted to:- Sir. Mohsin Manshad.
Date:- 07/02/2012
Group Members
Name Roll #
1. Bilal Maqbool. 10
(Bluetooth Introduction & History)
2. Khalil Ahmed. 48
(Communication & working of Bluetooth)
3. Nisar Ahmed. 06
(Security of Bluetooth)
4. Muhammad Junaid. 45
(Advantages & Disadvantages of Bluetooth)
5. Abdul Ghafar. 14
(Use of Bluetooth in now a days & its Future)
Contents
Topic Page #
1. Introduction Of Bluetooth
2. Bluetooth History
3. History of Bluetooth Name
4. Version
5. Bluetooth Technology Over the Years
6. How does Bluetooth work
7. Communication and connection
8. Implementation
9. Bluetooth Profiles
10. Bluetooth Stack
11. Bluetooth Chips - CSR
12. Bluetooth Security
13. Fundamentals of security
14. Bluetooth Security Issues
15. Why Does Bluetooth Security Matter
16. Advantages
17. Disadvantages
18. USES of Bluetooth in Now a DAY
19. Developing with Bluetooth
20. The future of Bluetooth
1
2
2
3
3
4
5
6
8
8
9
10
11
12
12
13
15
16
20
21
Introduction
Bluetooth technology is a short-range communications technology that is simple, secure, and
everywhere. You can find it in billions of devices ranging from mobile phones and computers to
medical devices and home entertainment products. It is intended to replace the cables
connecting devices, while maintaining high levels of security. The key features of Bluetooth
technology are robustness, low power, and low cost. The Bluetooth Specification defines a uniform
structure for a wide range of devices to connect and communicate with each other. When two
Bluetooth enabled devices connect to each other, this is called pairing. The structure and the global
acceptance of Bluetooth technology means any Bluetooth enabled device, almost everywhere in the
world, can connect to other Bluetooth enabled devices located in proximity to one another.
Connections between Bluetooth enabled electronic devices allow these devices to communicate
wirelessly through short-range. The range of Bluetooth technology is application specific. The Core
Specification mandates a minimum range of 10 meters or 30 feet, but there is no set limit and
manufacturers can tune their implementations to provide the range needed to support the use cases
for their solutions.
Bluetooth is a proprietary open wireless technology standard for exchanging data over short
distances (using short wavelength radio transmissions in the ISM band from 2400-2480 MHz) from
fixed and mobile devices, creating personal area networks (PANs) with high levels of security.
Created by telecoms vendor Ericsson in 1994, it was originally conceived as a wireless alternative to
RS-232 data cables. It can connect several devices, overcoming problems of synchronization.
Bluetooth is managed by the Bluetooth Special Interest Group, which has more than 15,000 member
companies in the areas of telecommunication, computing, networking, and consumer electronics.
The SIG oversees the development of the specification, manages the qualification program, and
protects the trademarks. To be marketed as a Bluetooth device, it must be qualified to standards
defined by the SIG. A network of patents is required to implement the technology and are only
licensed to those qualifying devices; thus the protocol, whilst open, may be regarded as proprietary.
What are Bluetooth’s key features?
The key features of Bluetooth technology are robustness, low power, and low cost, and the fact that
it has become a universal standard for exchanging data amongst a range of fixed and mobile devices.
In addition, Bluetooth wireless technology has the ability to simultaneously handle both data and
voice transmissions.
This means that users can use a variety of applications such as a hands-free headset for voice calls,
printing and fax capabilities, and synchronizing PDAs, laptop, and mobile phone applications.
What devices is Bluetooth used in?
Bluetooth technology offers a way to connect and exchange information between wide varieties of
devices.
These include mobile phones, telephones, laptops, PCs, printers, Global Positioning System (GPS)
receivers, digital cameras, and video game consoles.
The Purpose
The purpose of Bluetooth technology is to connect numerous electronic devices together without the
need of wires. For example, a Bluetooth headset allows you to talk on your cell phone without using
your hands. Many states have banned the use of cell phones while operating a vehicle, unless the
driver has a way of using the phone and keeping both hands on the wheel. Bluetooth technology
makes this possible. Video game controllers, such as those designed for the PlayStation 3, also use
Bluetooth technology, eliminating the need to connect the controller to the console with a wire.
1
Bluetooth History
In 1994, Swedish company Ericsson Mobile Communications launched the Bluetooth wireless
technology movement. Ericsson wanted to investigate a radio interface that would prove low-cost
and low-power. Goals included the elimination of wire clutter between different devices from
differing industries. Creating a single wireless standard would unite computer devices and
telecommunications. This wireless technology has connected devices in close proximity, regardless
of brand.
Origin
Bluetooth was developed by Ericsson, a large Swedish telecommunications equipment manufacturer.
The specification was developed in 1994 by Jaap Haartsen and Sven Mattisson, who were working
for Ericsson at the time.
The Formation
Bluetooth technology was officially introduced in 1998, although it was in development in
Scandinavia prior. Both the name "Bluetooth" and the logo associated with it have been trademarked
by SIG (Bluetooth Special Interest Group). Numerous companies belong to SIG including Ericsson,
IBM, Microsoft, Intel, Nokia, Toshiba and Agere. The SIG trade association continues to work on
progressing and researching the use of Bluetooth technology in the computing, automotive,
industrial automation and telecommunication industries.
The Bluetooth SIG
The name “Bluetooth” and its logo are trademarked by the privately held trade association named
the Bluetooth Special Interest Group (SIG).
Founded in September 1998, the Bluetooth SIG is a unification of leaders in the telecommunications,
computing, network, industrial automation, and Automotive industries. Today, the Bluetooth SIG is
responsible for encouraging and supporting research and development in Bluetooth technology.
The Bluetooth SIG includes promoter member companies Microsoft, Ericsson, IBM, Intel, Agere,
Motorola, Nokia, and Toshiba, plus thousands of Associate and Adopter member companies
(BlueTomorrow.com's parent company, SP Commerce LLC, is a licensed and certified Adopter
member of the Bluetooth SIG).
History of Bluetooth Name
Bluetooth is named for Viking leader and Danish king Harald "Bluetooth" Blatand (940-981). Jim
Kardach, who worked for Intel, heard about King Harald Bluetooth from Sven Mathesson of
Ericsson. King Harald Bluetooth united Denmark and Norway and helped bring Christianity to
Scandinavia.
Intel suggested the codename "Bluetooth" as a temporary name for the SIG program. As a modern
day counterpart, the SIG also saw the power of unity as they sought to unite computer devices and
telecommunications with a short-range wireless link. During contract preparations, with no agreed
formal name, the Bluetooth codename was inserted and resulted in Bluetooth SIG. A board meeting
accepted IBM's proposed name, Personal Area Networking (PAN), yet a trademark online search
resulted in thousands of hits. The SIG instead launched with the Bluetooth name that remains
synonymous with short range radios.
Origin of Logo
The logo is the combined German Runes of Harglass (which is the Latin equivalent of "H") and
Berkanan (which is analogous to the Latin "B"). These letters represent the origin of the name
Harald Bluetooth.
2
Version
Version 1.X
Bluetooth 1.0 was established in the early days of the product's standardization. As a result, many
manufacturers' equipment did not work with other products. Bluetooth 1.1 and 1.2 fixed some of
these interoperability problems.
Version 2.X
Bluetooth Version 2.0 was released in November 2004. Version 2.0 increased the speed of the
Bluetooth protocol. It was backwards compatible with Bluetooth 1.1. In July 2007, Bluetooth 2.1
was released.
Version 3.0
Bluetooth Version 3.0 will increase data speed and reduce power consumption. As of April 2009, it
has not yet been released
The history of Bluetooth technology dates back more than a decade. Since its introduction onto the
market, Bluetooth technology has revolutionized the way we stay connected, and the way electronic
devices stay connected to each other. The technology behind Bluetooth continues to advance.
Bluetooth technology can be found in a wide range of electronic devices, including cell phones and
video game controllers.
Bluetooth Technology Over the Years
1998 - Bluetooth technology is officially introduced and the Bluetooth SIG is formed. Bluetooth
technology's intended basic purpose is to be a wire replacement technology in order to rapidly
transfer voice and data.
1999 - Bluetooth 1.0 Specification is introduced.
2004 - Bluetooth Version 2.0 + EDR (Enhanced Data Rate) is introduced.
2005 - Devices using Version 2.0 + EDR begin to hit the market in late 2005.
2007 - Bluetooth Core Specification Version 2.1 + EDR is adopted by the Bluetooth SIG.
2009 - Bluetooth Core Specification Version 3.0 + HS (High Speed) is adopted by the Bluetooth
SIG.
Exmaple
The Bluetooth enabled Eclipse CD5030 lets users control their cell phones wirelessly via their car
stereo.
3
How does Bluetooth work?
Bluetooth uses a radio technology which is called frequency-hopping spread spectrum. It works by
chopping up the data that is being sent, and transmitting sections of it on up to 79 frequencies.
Spread-spectrum is good for several reasons. Firstly, the signals are very resistant to narrowband
interference, which means the transmissions are more likely to reach their destination quickly and
intact.
Spread-spectrum transmissions can share a frequency band with many types of conventional
transmissions with minimal interference.
Also, spread-spectrum signals are also very difficult to intercept, making the technology relatively
secure – except for some early security issues.
Working of Bluetooth Technology
Now, about how Bluetooth works... Bluetooth Special Interest Group manages and maintains the
Bluetooth Standard. IEEE has accepted it as 802.15la standard. Bluetooth was developed with the
purpose of creating a single digital wireless protocol, capable of connecting multiple devices and
getting over synchronization issues between them. It enables short-range wireless communication
thus replacing the wires that are used to connect multiple devices.
Transmissionover Short Distances
The Bluetooth RF transceiver lies at the physical layer. There are 79 Bluetooth channels spaced
1MHz apart. A spread spectrum technology is used at the physical layer. Both voice and data
transmissions over short distances are possible, creating wireless PANs.
Instructions to Communicate
A Bluetooth device consists of an adapter. A Bluetooth adapter can be built into a device or can be in
the form of a card that connects to a device. Instructions are embedded into the device, which enable
it to communicate with other devices.
PacketSegmentationand Reassembly
When devices come in each other's radio range, their link managers discover each other. Link
management protocol (LMP) engages itself in peer-to-peer message exchange. LMP layer performs
link setup and negotiation of packet size. Segmentation and reassembly of packets is done, if needed.
ConnectionSets Up
The service delivery protocol enables a Bluetooth device to join a piconet. A device inquires what
services are available with the piconet. Bluetooth GlobalID (a unique identification for each device
in the network) is exchanged between the devices. Their profiles are matched and a connection is set
up.
SignalTransfer
Bluetooth uses frequency hopping in time slots, which means that the Bluetooth signals avoid
interference with other signals by hopping to a new frequency after transmission or reception of
every packet. One packet can cover up to five time slots. Bluetooth can support an asynchronous
data channel, or up to 3 simultaneous synchronous voice channels, or a channel, which concurrently
supports asynchronous data and synchronous voice.
MasterSlave
Bluetooth technology makes use of the concept of a master and slave. Devices have to wait until the
master allows them to talk! One master and up to seven slaves employ a star topology to form a
piconet and begin to communicate with one another (as per orders from their master of course)!
4
Communication and connection
A master Bluetooth device can communicate with a maximum of seven devices in a piconet (an ad-
hoc computer network using Bluetooth technology), though not all devices support this limit. The
devices can switch roles, by agreement, and the slave can become the master (for example, a headset
initiating a connection to a phone will necessarily begin as master, as initiator of the connection; but
may subsequently prefer to be slave).
The Bluetooth Core Specification provides for the connection of two or more piconets to form a
scatternet, in which certain devices simultaneously play the master role in one piconet and the slave
role in another.
At any given time, data can be transferred between the master and one other device (except for the
little-used broadcast mode). The master chooses which slave device to address; typically, it switches
rapidly from one device to another in a round-robin fashion. Since it is the master that chooses which
slave to address, whereas a slave is (in theory) supposed to listen in each receive slot, being a master
is a lighter burden than being a slave. Being a master of seven slaves is possible; being a slave of
more than one master is difficult. The specification is vague as to required behaviour in scatternets.
Many USB Bluetooth adapters or "dongles" are available, some of which also include an IrDA
adapter. Older (pre-2003) Bluetooth dongles, however, have limited capabilities, offering only the
Bluetooth Enumerator and a less-powerful Bluetooth Radio incarnation. Such devices can link
computers with Bluetooth with a distance of 100 meters, but they do not offer as many services as
modern adapters do.
Bluetooth Communication
• Radio Frequency Communications (RF C)
– Controls Frequency Hopping
for Bluetooth
• Logical Link Control (LLC)
– Link Management
• Security Management
• QoS Management
– Transmission Scheduling
Link Manager Protocol (LMP)
Configure, authenticate and handle the connections
Power management scheme
What is the data rate and range of Bluetooth?
The data transfer rate of Bluetooth technology varies depending on the version. Version 1.2 offers up
to 1Mbps. Version 2.0 + Enhanced Data Rate (EDR) offers up to 3Mbps, and data can be transferred
at up to 24Mbps for Version 3.0 + High Speed (HS) enabled devices.
Version 3.0 + HS was adopted in April 2009. Version 2.1 + EDR was adopted in July 2007.
As for the operating range, this also varies depending on the class of the Bluetooth device.
Class 3 radios have a range of up to 1 metre or 3 feet; class 2 radios, which are most commonly
found in mobile devices, have a range of 10 metres or 33 feet.
Class 1 radios, used primarily in industrial use cases, have a range of 100 metres or 300 feet.
5
Implementation
Bluetooth uses a radio technology called frequency-hopping spread spectrum, which chops up the
data being sent and transmits chunks of it on up to 79 bands (1 MHz each; centered from 2402 to
2480 MHz) in the range 2,400-2,483.5 MHz (allowing for guard bands). This range is in the globally
unlicensed Industrial, Scientific and Medical (ISM) 2.4 GHz short-range radio frequency band.
Originally Gaussian frequency-shift keying (GFSK) modulation was the only modulation scheme
available; subsequently, since the introduction of Bluetooth 2.0+EDR, π/4-DQPSK and 8DPSK
modulation may also be used between compatible devices. Devices functioning with GFSK are said
to be operating in basic rate (BR) mode where an instantaneous data rate of 1 Mbit/s is possible. The
term Enhanced Data Rate (EDR) is used to describe π/4-DPSK and 8DPSK schemes, each giving 2
and 3 Mbit/s respectively. The combination of these (BR and EDR) modes in Bluetooth radio
technology is classified as a "BR/EDR radio".
Bluetooth is a packet-based protocol with a master-slave structure. One master may communicate
with up to 7 slaves in a piconet; all devices share the master's clock. Packet exchange is based on the
basic clock, defined by the master, which ticks at 312.5 µs intervals. Two clock ticks make up a slot
of 625 µs; two slots make up a slot pair of 1250 µs. In the simple case of single-slot packets the
master transmits in even slots and receives in odd slots; the slave, conversely, receives in even slots
and transmits in odd slots. Packets may be 1, 3 or 5 slots long but in all cases the master transmit
will begin in even slots and the slave transmit in odd slots.
Bluetooth provides a secure way to connect and exchange information between devices such as
faxes, mobile phones, telephones, laptops, personal computers, printers, Global Positioning System
(GPS) receivers, digital cameras, and video game consoles.
Bluetooth Buzzwords
Here we give you a quick list of terms and concepts you will come across when talking or reading
about the Bluetooth technology. These are some of the terms you should know if you know what
Bluetooth is and how it works.
Piconet:A group of devices connected by means of Bluetooth technology in an ad hoc manner is
known as a piconet. There can be a maximum of 8 devices forming one piconet. For the duration of
a piconet connection, one device acts as the master and others act as slaves in order to synchronize.
Scatternet:A scatternet is composed of two or more independent piconets. This brings about a
communication between piconets.
Masterunit: Its clock and hopping frequency are used to synchronize other devices in the
piconet. The master device numbers the communication channels.
Slave unit: The slave units act in coordination with the master.
Frequency Hopping Spread Spectrum: When the carrier (waveform modulated with the
input signal) is rapidly switched among different frequency channels, during signal transmission, the
method is referred to as frequency hopping spread spectrum.
PacketSegmentationand Reassembly: In this process, data packets of varying lengths are
fragmented to 48-bytes size when transmitting and reassembled at the receiver's end to their original
form, when data transfer is complete.
PAN: Short for Personal Area Network, a PAN refers to a communication network formed between
devices usually located within the distance of a few meters from one another.
6
List of applications
A typical Bluetooth mobile phone headset.
Wireless control of and communication between a mobile phone and a handsfree headset. This was
one of the earliest applications to become popular.
Wireless control of and communication between a mobile phone and a Bluetooth compatible car
stereo system
Wireless Bluetooth headset and Intercom.
Wireless networking between PCs in a confined space and where little bandwidth is required.
Wireless communication with PC input and output devices, the most common being the mouse,
keyboard and printer.
Transfer of files, contact details, calendar appointments, and reminders between devices with OBEX.
Replacement of previous wired RS-232 serial communications in test equipment, GPS receivers,
medical equipment, bar code scanners, and traffic control devices.
For controls where infrared was often used.
For low bandwidth applications where higher USB bandwidth is not required and cable-free
connection desired.
Sending small advertisements from Bluetooth-enabled advertising hoardings to other, discoverable,
Bluetooth devices.
Wireless bridge between two Industrial Ethernet (e.g., PROFINET) networks.
Three seventh-generation game consoles, Nintendo's Wii and Sony's PlayStation 3 and PSP Go, use
Bluetooth for their respective wireless controllers.
Dial-up internet access on personal computers or PDAs using a data-capable mobile phone as a
wireless modem.
Short range transmission of health sensor data from medical devices to mobile phone, set-top box or
dedicated telehealth devices.
Allowing a DECT phone to ring and answer calls on behalf of a nearby cell phone
Real-time location systems (RTLS), are used to track and identify the location of objects in real-time
using “Nodes” or “tags” attached to, or embedded in the objects tracked, and “Readers” that receive
and process the wireless signals from these tags to determine their locations.
Personal security application on mobile phones for prevention of theft or loss of items. The protected
item has a Bluetooth marker (e.g. a tag) that is in constant communication with the phone. If the
connection is broken (the marker is out of range of the phone) then an alarm is raised. This can also
be used as a man overboard alarm. A product using this technology has been available since 2009.
Bluetooth Application Models
Model Description
File Transfer Refers to object transfer or transfer of files between devices.
Internet Bridge
In this model, a cordless modem acts as a modem to a PC and provides dial-up
networking and faxing facilities.
LAN Access
Multiple data terminals use a LAN access point (LAP) as a wireless connection to
an Ethernet LAN.
Synchronization The synchronization model enables a device-to-device synchronization of data.
Headset
It is wirelessly connected and can act as an audio input-output interface of remote
devices.
7
BluetoothProfiles
One of the most useful innovations in the Bluetooth standard is the use of device profiles.
To use Bluetooth wireless technology, a device has to be able to interpret certain Bluetooth profiles,
which are definitions of possible applications and specify general behaviors that Bluetooth enabled
devices use to communicate with other Bluetooth devices. These profiles include settings to
parameterize and to control the communication from start. Adherence to profiles saves the time for
transmitting the parameters anew before the bi-directional link becomes effective. There are a wide
range of Bluetooth profiles that describe many different types of applications or use cases for
devices.
BluetoothStack
The message here is that Bluetooth is hairy – like TCP/IP.
Older Bluetooth chips only provided HCI functionality. Now they go up to the application layers:
SPP, DUN, Headset.
8
BluetoothChips - CSR
Cambridge Scientific Radio (CSR) manufactures a large number of Bluetooth chips, probably more
than half of those shipped. This is a diagram of their Bluecore2 series.
Bluetooth Modules – Free2Move
Bluetooth modules add the components needed to make a working radio: crystal, antenna, flash
memory. The current generation of modules measure about 1”x0.5” w/ antenna.
Free2Move (Sweden) has some particularly interesting modules based on CSR BlueCore2-flash
chips with audio.
This radio offers a functioning SPP for serial data, a 15-bit audio channel, and another 8-bit A/D
channel.
More Bluetooth Hardware
Cambridge Scientific Radio (CSR) chips (in most peripherals)
BlueCore2 chip Bluetooth v1.1, 16-bit XAP2 processor, A/D, audio options
BlueCore3 chip Bluetooth v1.1-1.2, XAP2 processor, audio DSP option
BlueCore4 chip Bluetooth V2.0, XAP2 processor
AT&T Broadcom chips (in many PC + PDAs)
BCM2040 Bluetooth v1.1-1.2, 8-bit 8051 processor
BCM2037 Bluetooth v2.0 with audio, 16-bit ARM7 processor
BCM2045 Bluetooth v2.0 host side chip
Class 2 Modules (with antenna)
Free2Move FM03AC2 Bluetooth v1.1 qualified, SPP, 15-bit audio + 8 bit A/D
Taiyo Yuden EYMF2CAMM-XX Bluetooth v1.1 qualified, serial port profile
BlueGiga WT12 Bluetooth v2.0 EDR qualified, serial port profile + PCM
Class 1 Modules (no antenna)
Free2Move FM2M03C1 Bluetooth v1.1 qualified, SPP, 15-bit audio + 8 bit A/D
BlueGiga Wrap Thor 2022 Bluetooth v1.1 qualified, SPP, DUN, OBEX, HID
9
Bluetooth Security
These days, all communication technology faces the issue of privacy and identity theft, with
Bluetooth being no exception.
Almost everyone knows that email services and networks require security.
What users of Bluetooth need to realize is that Bluetooth also requires security measures as well.
The good news for Bluetooth users is that the security scares, like most scares, are normally over
dramatized and blown entirely out of proportion.
The truth being told, these issues are easy to manage,
with various measures already in place to provide security for Bluetooth technology.
It's true that there has been some Bluetooth phones
that have been hacked into. Most devices that are
hacked into are normally those that don't have any type of security at all.
According to Bluetooth specialists, in order to hack into a Bluetooth device, the hacker must:
Force two paired devices to break their connection.
2. Steal the packets that are used to resend the pin.
3. Decode the pin.
Of course, the hacker must also be within range of the device, and using very expensive developer
type equipment. Most specialists recommend that you have a longer pin, with 8 digits being
recommended.
Security Overview
Bluetooth implements confidentiality, authentication and key derivation with custom algorithms
based on the SAFER+ block cipher. Bluetooth key generation is generally based on a Bluetooth PIN,
which must be entered into both devices. This procedure might be modified if one of the devices has
a fixed PIN (e.g., for headsets or similar devices with a restricted user interface). During pairing, an
initialization key or master key is generated, using the E22 algorithm. The E0 stream cipher is used
for encrypting packets, granting confidentiality and is based on a shared cryptographic secret,
namely a previously generated link key or master key. Those keys, used for subsequent encryption
of data sent via the air interface, rely on the Bluetooth PIN, which has been entered into one or both
devices.
An overview of Bluetooth vulnerabilities exploits was published in 2007 by Andreas Becker.
In September 2008, the National Institute of Standards and Technology (NIST) published a Guide to
Bluetooth Security that will serve as reference to organizations on the security capabilities of
Bluetooth and steps for securing Bluetooth technologies effectively. While Bluetooth has its
benefits, it is susceptible to denial of service attacks, eavesdropping, man-in-the-middle attacks,
message modification, and resource misappropriation. Users/organizations must evaluate their
acceptable level of risk and incorporate security into the lifecycle of Bluetooth devices. To help
mitigate risks, included in the NIST document are security checklists with guidelines and
recommendations for creating and maintaining secure Bluetooth piconets, headsets, and smart card
readers.
Bluetooth v2.1 - finalized in 2007 with consumer devices first appearing in 2009 - makes significant
changes to Bluetooth's security, including pairing. See the #Pairing mechanisms section for more
about these changes.
10
Bluetooth Vulnerabilities and Security Risks
iness cards, to Bluetooth-
enabled devices. This does not involve altering any data from the device, but nonetheless, it is
unsolicited. Devices that are set in non-discoverable mode are not susceptible to bluejacking. In
order for bluejacking to work, the sending and receiving devices must be within 10 meters of one
another. While this method has been widely used for promotional purposes, Bluetooth deviceowners
should be careful never to add the contact to their address book. While bluejacking is usually not
done with malicious intent, repetitive bogus messages can be annoying to the user, and in some
cases, can render the product inoperable. This can also open the door to a variety of social
luetooth-enabled mobile phone
and copying its entire contact book, calendar or anything else stored in the phone's memory. By
setting the device in non-discoverable, it becomes significantly more difficult to find and attack the
device. However, .the software tools required to steal information from Bluetooth-enabled mobile
phones are widely available on the Web, and knowledge of how to use them is growing.. (Kotadia,
2004) Companies such as Nokia and Sony Ericsson are making sure new phones coming to market
will not be susceptible to bluesnarfing. .The backdoor attack involves establishing a trust
relationship through the .pairing. mechanism, but ensuring that it no longer appears in the target.s
register of paired devices. In this way, unless the owner is actually observing their devices at the
precise moment a connection is established, they are unlikely to notice anything untoward, and the
attacker may be free to continue to use any resource that a trusted relationship with that device
grants access to.This means that not only can data be retrieved from the phone, but other services,
such as modems, or Internet, WAP and GPRS gateways may be accessed without the owner.s
knowledge or consent.. (The Bunker, 2003) The cabir worm is malicious software that uses
Bluetooth technology to seek out available Bluetooth devices and send itself to them. According to
Bluetooth SIG (2006), .The cabir worm currently only affects mobile phones that use the Symbian
series 60 user interface platform and feature Bluetooth wireless technology. Furthermore, the user
has to manually accept the worm and install the malware in order to infect the phone.. Although this
may be the case, this shows that it is achievable to write mobile viruses that spread via Bluetooth and
may cause other hackers to explore the possibilities of writing Bluetooth viruses. The Mabir worm is
essentially a variant of the Cabir worm where it uses Bluetooth and Multimedia Messaging Service
messages (MMS) to replicate.
Fundamentals of security:
The "pairing process" is one of the most basic levels of security for Bluetooth devices. Pairing, is
two or more Bluetooth devices that recognize each other by the profiles they share - in most cases
they both must enter the same pin. The core specifications for Bluetooth use an encryption
algorithm, which is completely and entirely secure. Once the devices pair with each other, they too
become entirely secure. Until they have successfully paired, the Bluetooth devices won't
communicate with each other. Due to this pairing process and the fact that it is short range -
Bluetooth technology is considered to be secure. As the news has indicated, experienced hackers
have developed ways to get around this level of basic security. There are ways to get around this
threat, as you can install software to prevent hackers from getting in. With Bluetooth becoming more
and more popular, it's really no wonder that security is always in question. As Bluetooth gets bigger
and better, security will always be something that no one really takes lightly. If you've been
concerned about Bluetooth security in the past, rest assured that newer devices will offer bigger and
better security. Preventing hackers from getting in is something every owner is concerned about -
and the manufacturer's are very aware.
11
Bluetooth Security Issues
Bluetooth can operate in one of three security models:
Mode 1 is non security.
Mode 2 provides security at the service level, after the channel is established.
Mode 3 provides security at the link level, before the channel is established.
Each Bluetooth device has a unique 48-bit device address. The authentication scheme is challenge-
response, using symmetric keys, and encryption is done with a key that can be up to 128 bits
(negotiated by the communicating devices, with each device having a maximum key length defined).
A 128 bit random link key handles security transactions between two or more devices.
When two Bluetooth devices establish a communications channel, they both create an initialization
key. A passkey or Personal Identification Number is input and the inititalization key is created, and
the link key is calculated using it. Then the link key is used for authentication. The first security
concern is the passkey or PIN. As with any key, long keys are more secure than short ones. If a
hacker is able to discover the passkey, he can calculate possible initiation keys, and then from that,
calculate the link key. Making the passkey long will make it much harder to accomplish the first
step. The initial key exchange takes place over an unencrypted link, so it is especially vulnerable.
It’s best if this part of the BT device pairing process takes place in a more physically secure location
(that is, where there are not likely to be any lurkers with BT devices who could intercept the
communications). A hacker could record transmissions sent over the BT frequency and use them to
recreate the PIN. Rather than using the same fixed passkey all the time, it should be changed
frequently (how frequently depends on the types of devices and the required security level). Link
keys can be combination keys or unit keys. Best security practice is to use combination keys instead
of unit keys. When you use a unit key, you must use the same key for all secure transactions, and the
key has to be shared with other trusted devices. This means any trusted device can potentially access
traffic with other trusted devices using this key. It’s possible to use the Bluetooth address to identify
a particular device (and associated user) and log those transactions, which can create privacy
concerns.
Why Does Bluetooth Security Matter?
Many Bluetooth users only use the technology to connect a wireless headset or similar device to
their portable computers, and they may wonder why security is a big deal. Implementing security,
even for these types of device pairings, can prevent an unauthorized user from using the headset.
However, another use of Bluetooth is to create a temporary computer network. For example, several
people in a meeting room can connect their Bluetooth-enabled laptops to each other to share files
during the meeting. When you use Bluetooth to create a temporary network, it is usually an ad hoc
network; that is, computers communicate directly with each other rather than going through a
wireless access point (WAP). This means you have no centralized point of security control, as you
do with a WAP (for example, you can configure a WAP to use MAC address filtering and other
built-in security mechanisms). Thus, security becomes a major concern because you can be exposing
important data stored on your laptop to others on the Bluetooth network. Remember that the range
for class 1 Bluetooth devices can be more than 300 feet – far enough so that in some locations, the
BT equivalent of the wi-fi “war driver” may be able to establish a link with your computer even
though not within your sight. Another special concern is the security of Bluetooth mobile phones.
These phones may have information stored on them such as the addresses and phone numbers of
contacts, calendar information and other PDA-type data. Hacking into these phones using Bluetooth
is called bluesnarfing. Newer mobile phones and software upgrades for older phones can patch this
vulnerability. A related hacking technique is called bluebugging, and it involves accessing the
phone’s commands so that the hacker can actually make phone calls, add or delete contact info, or
eavesdrop on the phone owner’s conversations. This vulnerability, too, is being addressed by phone
manufacturers. Thus, if you own a BT-enabled phone, it’s important to keep the software updated or
upgrade to the latest phone models frequently.
12
Advantages
Main Reasons to Use a Bluetooth Device:
Bluetooth Devices are Wireless
If you navigate through the rest of our site you will learn that there are tons of advantages/benefits
when using wireless devices. In addition to improving safety as a result of eliminating the clutter of
wires and associated hazardous connections, wireless technology also offers many convenient
advantages. For example, when you are traveling with your laptop, PDA, MP3 player and other
devices, you no longer have to worry about bringing along all of your connecting cables.
Bluetooth Technology is Inexpensive
Bluetooth technology is cheap for companies to implement, which results in lower over-
all manufacturing Costs. These savings are then passed on to you, the consumer. The end result:
Bluetooth devices are relatively inexpensive.
Bluetooth is Automatic
Bluetooth doesn't require you to think about setting up a connection or to push any buttons. When
two or more Bluetooth devices enter a range (Up to 30 feet) of one another, they automatically begin
to communicate without you having to do anything. Once the communicating begins, Bluetooth
devices will setup Personal Area Networks or Piconets. The best part is: The devices take care of
the entire setup process, and you can go about your business.
Standardized Protocol = Interoperability
Since Bluetooth is a standardized wireless specification, a high level of compatibility among devices
is guaranteed. The Bluetooth specification uses and defines various profiles. Every Bluetooth profile
is specific to a particular function. For instance, when a Bluetooth enabled cell phone and a
Bluetooth headset (Both with the same profile) are communicating with one another, both will
understand each other without the user having to do anything, even if the devices are of different
models/makes.
Low Interference (If Any)
Bluetooth devices avoid interference with other wireless devices by:
Using a technique known as spread-spectrum frequency hopping, and
Using low power wireless signals.
Low Energy Consumption
As stated above, Bluetooth uses low power signals. As a result, the technology requires little energy
and will therefore use less battery or electrical power. Obviously, this is a great benefit for mobile
devices because Bluetooth won't drain the life of your device's battery.
Share Voice and Data
The Bluetooth standard allows compatible devices to share both voice and data communications. For
example, it is probably no surprise that a Bluetooth enabled cell phone is capable of sharing voice
communications with a compatible Bluetooth headset, however, the same cell phone may also be
capable of establishing a GPRS connection to the Internet. Then, using Bluetooth, the phone can
connect to a laptop. The result: The laptop is capable of surfing the web or sending and receiving
email.
Instant Personal Area Network (PAN)
Up to seven compatible Bluetooth devices can connect to one another within a proximity of up to 30
feet, forming a PAN or piconet. Multiple piconets can be automatically setup for a single room.
13
Upgradeable
The Bluetooth standard is upgradeable. A development group at the Bluetooth Special Interest
Group (SIG) has been given the task of working on the new Bluetooth version 2, which offers
several new advantages and is backward compatible with the older versions.
The Technology is Here to Stay
Bluetooth is a universal, world-wide, wireless standard. Therefore, you can count on it being around
for years to come. As more devices begin to use Bluetooth technology, electronics manufacturers
will be increasingly eager to make their products compatible, using Bluetooth. A chain reaction is
inevitable, in fact, it has already begun.
Automatic – setting up Bluetooth connectivity is automatic Bluetooth and doesn’t need
professionals. When two or more devices enter a range of up to 30 feet of each other the
communication automatically begins between them.
Standard protocol - Bluetooth is standardized wireless guarantees the high level of compatibility
among devices. Bluetooth devices connect to each other irrespective of their model.
Instant PAN (Personal Area Network) - You can have your own personal are network for sharing
data among your group consisting of up to seven Bluetooth devices within a range of up to 30 feet.
Simplifies communication while driving – companies like parrot manufactures Bluetooth car kits
resolving the audio and communication issues arising while driving, as Bluetooth simplifies talking
and listening music on your cell phone while driving.
Avoids interference from other wireless devices - Bluetooth devices avoid interference from other
wireless devices with the usage of technique known as frequency hopping, and low power wireless
signals.
Ease of Access
Unlike a wireless Local Area Network (LAN), Bluetooth doesn't need any configuration to start a
connection and perform file transfers. Consequently, Bluetooth is a great alternative for business
environments in which wireless file transfers are utilized. In laptops, establishing a wireless
connection is as easy as pressing the Bluetooth shortcut or hot key.
Security
The Bluetooth connection can be securely established without interference from unrecognized
devices by entering an identification number for the connection. The user of the master device--the
one which starts the connection--can opt to enter a PIN which creates the secure usage loop.
Control
Unless a device is already paired to your device, you have the option to accept or reject the
connection and file transfer. This prevents unnecessary or infected files from unknown users from
transferring to your device.
Free Access
Accessing a Bluetooth device doesn't cost money; all you need is the Bluetooth capability.
Internet
Bluetooth is not recommended for establishing Internet connections because of its limited transfer
rate. A LAN connection is more efficient.
14
Disadvantages
Data Transfer Rate
Data sent between two Bluetooth devices has a maximum transfer speed of one megabyte per
second. Infared is capable of transferring data at 4MB per second, and Wi-Fi is capable of speeds
even higher. The slow transfer speed makes Bluetooth not an ideal choice for data transfer when
faster connection methods are available.
Range
Bluetooth only has a range of 15 to 30 feet depending on the device. The small range is a
disadvantage for some who may want to use a Bluetooth device outside of that 30-foot radius. For
instance, a Bluetooth printer in a home could not necessarily be used by every computer in the house
if some of those computers are located out of the range of the printer. A Wi-Fi printer, however,
could be used by anyone who could connect to the home's wireless network.
Security
Since data is transferred over radio waves using Bluetooth, it is is much easier for a hacker to break
into than secure wireless networks. For that reason, Bluetooth should not be used to transfer data that
needs to remain private and secure.
Battery Use
Bluetooth uses the battery power of a particular device in order to operate. Many cell phone makers
send phones out with Bluetooth powered off in order to maximize the battery life of the phone.
Turning Bluetooth on, while convenient, can drain a cell phone or computer battery, causing it to run
out of juice long before it would have if Bluetooth was not powered on.
Susceptibility to interference
All Bluetooth enabled devices operate within the 2.4 GHz band, which is the same unlicensed
frequency used by many other electronic devices such as microwaves, cordless phones, and the
majority of Wi-Fi devices. This frequency sharing could lead to slower overall network performance
because some of the signals collide, don't reach their destination, and have to be re-sent. However,
since Bluetooth wireless transmissions "hop" all over the bandwidth, this greatly decreases the
likelihood of impacting other 2.4 GHz broadcasts. Though the impact is usually negligible, there are
situations that can arise where Bluetooth devices can dilute Wi-Fi signals, especially if there are a
great number of devices operating in different pairs. The Bluetooth SIG is making every effort to
ensure that both of these issues will be soon be negated by the new standard.
Bluetooth Limitations
Communication speed is not that great with Bluetooth technology. Wi-Fi and Infrared
communication can happen at much higher speeds compared to that of Bluetooth.
Though Bluetooth communication is considered secure, if a user happens to leave his/her device in
the 'discoverable' mode, a hacker can eavesdrop or establish a connection with the 'discovered'
device without the user knowing about it.
If Bluetooth is in the ON mode, it does drain the battery. So one needs to be careful about switching
Bluetooth ON only for the time span of communication and turn it OFF after the communication
ends. This practice also reduces the security risk involved with Bluetooth technology.
15
USES of Bluetooth in Now a DAY
Medical & Health Devices
Increasing awareness of the benefits of a healthy, independent lifestyle creates a booming market
for devices that permit an important share of primary care to be conducted remotely, in the
comfort of the patient's home.
Sports & Fitness Devices
Today's athletes – and anyone who wants to get in shape or stay in shape – are eager to improve their
results. Many are using Bluetooth technology to help.
Bluetooth Technology and Internet Access
You can also access internet through mobile using Bluetooth technology.
Here is a roll call of some the first Bluetooth Smart Ready and Bluetooth Smart devices:
Polar releasing first Bluetooth Smart heart-rate strap
Polar H7 heart strap
This Bluetooth Smart device allows you to quickly connect to any Bluetooth Smart Ready device,
such as a tablet or smartphone, to store and display heart rate data and other workout statistics.
Polar makes a wide variety of heart rate sensors and fitness watches with sophisticated training
features. This is the company's first Bluetooth Smart device, and its second Bluetooth enabled heart-
rate monitor.
16
Casio ready to release its first Bluetooth Smart device
Casio G-Shock smart watch
Casio has created its first Bluetooth Smart device—a watch that's able to communicate wirelessly
with a Bluetooth Smart Ready phone.
The Casio G-Shock GB-6900 can notify you with a tone or vibration when you receive new calls or
emails, and displays a visible alert. This could be especially useful when your phone is stashed in a
pocket or purse.
The new G-Shock will be available in black, white and red. Because the watch uses Bluetooth low
energy technology, it will be able to operate for two years on a single coin-cell battery.
The GB-6900 is reportedly due out in Japan by the end of December. No word yet on a release date
or price for North America or Europe.
Motorola releases its first Bluetooth Smart Ready phone—the Droid RAZR
Droid RAZR
Motorola has resurrected its renowned RAZR phone brand with a new Android smartphone that
becomes the company's first Bluetooth Smart Ready device. The new Droid Razr is nothing like the
best-selling RAZR phones of a decade ago, however, except for its thinness.
This RAZR has a 4.3-inch qHD Super AMOLED display (a first for any mobile phone), a dual-core
processor, a tough, "gorilla glass" screen, and a slim profile of just 7.1mm.
The Droid RAZR is the second Bluetooth Smart Ready phone to reach the market, joining the new
Apple iPhone 4S.
The Droid RAZR is available now from Verizon Wireless for $299 on contract.
17
Motorola releases Bluetooth Smart device for music, running and more
MOTOACTV
This tiny new Bluetooth Smart device from Motorola is a sophisticated fitness tracker, smart music
player and training system. It lets you listen to music on the optional Motorola SF600 Bluetooth
wireless headphones while running or doing other workouts in the gym or outside.
The MOTOACTV includes precision GPS to track your distance and speed, a "smart" music player
that learns what songs motivate you the most by tracking your performance against your music, a
touchscreen, audio "coaching" on pace and distance, and more.
The MOTOACTV costs $249 for 8GB of memory or $299 for the 16GB version.
Apple releases world's first Bluetooth Smart Ready computers and phone
iPhone 4S
The new iPhone 4S may look like the iPhone 4, but it has many important differences inside. One
big addition is the use of Bluetooth v4.0. This will allow the new iPhone to wirelessly connect to the
next generation of devices coming out later this year with Bluetooth v4.0.
The new iPhone 4S also features a more advanced camera, the more powerful A5 processor, and
many new software features.
Mac mini
Like the MacBook Air, the new Mac mini also adds Bluetooth v4.0, which wil allow it to wirelessly
connect to the next generation of Bluetooth v4.0 phones and other devices coming out later this year.
The new Mac mini also features the latest dual-core Intel Core i5 and i7 processors, AMD Radeon
HD graphics, and high-speed Thunderbolt I/O technology.
18
MacBook Air
The new MacBook Air—Apple's thinnest and lightest notebook—adds Bluetooth v4.0. This will
allow it to wirelessly connect to the next generation of mobile phones and many other devices
coming out later this year with Bluetooth v4.0.
The new MacBook Air also features the latest-generation Intel Core i5 and i7 processors, high-speed
Thunderbolt I/O technology, and all-flash storage.
Dayton and Nordic create first Bluetooth Smart device heart strap
Dayton heart-rate strap
Dayton Industrial Co. Ltd has created the world's first production-ready heart-rate chest strap that is
a Bluetooth Smart device. The strap uses a new Bluetooth v4.0 low energy chip from Nordic
Semiconductor. The device is now ready to go into production and will be able to pair with the new
wave of Bluetooth Smart Ready phones expected out later this year.
Users won't need a special matching watch like most heart-rate monitors use today. According to
Nordic, the strap can be paired with a phone or other Bluetooth Smart Ready device in seconds,
allowing people to display their heart rate on their phone while they work out and analyze it later.
Do more when you're on the go
Bluetooth enabled wireless headsets and hands-free car systems have always helped drivers focus on
the road. Today, new versions of these devices are better than ever, with features that ensure a
completely hands-free calling experience made possible by speech recognition, text-to-speech
technology, and "speech trigger" capabilities that lets you turn on hands-free calling devices just by
speaking a command.
Mobile Phones
Access and browse your mobile device's phone book from your car's navigation display and make
hands-free phone calls. Play music from your phone through your car's speaker system, without
cables, adapters, or plugs.
19
Car Kits
Don't have Bluetooth technology built into your vehicle? No problem. Inexpensive Bluetooth
enabled car kits and speakerphones let you talk hands-free in your car even without a built-in hands-
free system.
GPS navigation
Connect to the Internet through a mobile phone and update your "Points of Interest" database and
other map data easily, wirelessly. Use the built-in microphone in some Bluetooth enabled GPS
devices to talk hands-free on a phone paired with the GPS device.
Portable Music Players
Use a Bluetooth adapter to stream music from your iPod or MP3 player to your car's audio system.
Health monitors
Car displays that can help people with diabetes monitor their blood-glucose level while driving, by
using a wireless glucose monitoring device with Bluetooth technology they pair with their car.
Bluetooth, the wireless radio technology for short distance mobile communications, has
become pervasive in mobile computing, used in laptops and headsets as well as popular smart
phones such as the BlackBerry, and even in Radio Frequency identification (RFID) readers.
Developing with Bluetooth
The newest modules make it pretty easy to go wireless. Most modules can be used as serial cable
replacements.
The next simplest step is to add a microprocessor to act as controller (PIC etc.), using the module’s
serial profile. But since new BT chips have a powerful, energy-efficient processor on-board already,
this is rather wasteful.
You can develop for the native processor, but you will need to buy some expensive development
tools. CSR and some module vendors provide virtual machines so your code can’t void the module’s
qualification.
20
What is the future of Bluetooth?
The future of Bluetooth looks strong, with initiatives underway for higher throughput, more
ubiquitous usage and links with Wifi and Ultra Wideband (UWB) broadcast technology.
Operating systems such as the Mac OS and Windows continue to have native support for Bluetooth.
The Bluetooth SIG partners are working on enabling Bluetooth information points, to enable
advertising models based around users pulling information from ‘information points’, rather than
having to ‘push’ information out.
Other emerging features include Bluetooth in cars; automatic configuration of piconets; and quality
of service (QoS) improvements, for example enabling audio and video data to be transmitted at a
higher quality.
The future of Bluetooth
It is estimated that there are more than one billion devices in use that utilize Bluetooth wireless
technology. You can expect that number to rise sharply when Bluetooth 3.0 devices become more
common.
Bluetooth 3.0
Bluetooth 3.0 is the new Bluetooth wireless standard adopted by the Bluetooth SIG on April 21,
2009. The new standard supports higher data transfer speeds and builds upon the previous standards.
With its higher speed, the technology has the potential to revolutionize the consumer electronics
industry.
It's FAST
Bluetooth 3.0 can transfer files at rates of up to 24 megabytes per second. At those speeds, high-
quality streaming video is a definite possibility, along with a host of other applications that are
simply impractical with the current transfer rates.
Picture this...
With Bluetooth 3.0, camcorders will stream video footage or still photos to Bluetooth enabled
televisions and computers; digital cameras will stream photo slideshows to cell phones, and laptops
will ave the ability to transfer presentations wirelessly to a projector. Use your imagination — the
possibilities are really exciting.
Backwards compatibility
Best of all, Bluetooth 3.0 will be backwards-compatible, so all of your old devices will be able to
communicate with the new ones and vice versa. But bear in mind that transfer speeds are only as fast
as the slowest device, meaning that the two will exchange data at the slower, 3-megabyte rate of
Bluetooth 2.1.
Future
• Success of Bluetooth depends on how well it is integrated into consumer products
-Consumers are more interested in applications than the technology
-Bluetooth must be successfully integrated into consumer -- products
-Must provide benefits for consumer
-Must not destroy current product benefits
• Key Success Factors
-Interoperability
-Mass Production at Low Cost
-Ease of Use
-End User Experience
21

More Related Content

Bluetooth PPT Report

  • 1. Presentation Report Topic:- Department:- CS&IT Class:- SE-I (2011-2015) Submitted to:- Sir. Mohsin Manshad. Date:- 07/02/2012 Group Members Name Roll # 1. Bilal Maqbool. 10 (Bluetooth Introduction & History) 2. Khalil Ahmed. 48 (Communication & working of Bluetooth) 3. Nisar Ahmed. 06 (Security of Bluetooth) 4. Muhammad Junaid. 45 (Advantages & Disadvantages of Bluetooth) 5. Abdul Ghafar. 14 (Use of Bluetooth in now a days & its Future)
  • 2. Contents Topic Page # 1. Introduction Of Bluetooth 2. Bluetooth History 3. History of Bluetooth Name 4. Version 5. Bluetooth Technology Over the Years 6. How does Bluetooth work 7. Communication and connection 8. Implementation 9. Bluetooth Profiles 10. Bluetooth Stack 11. Bluetooth Chips - CSR 12. Bluetooth Security 13. Fundamentals of security 14. Bluetooth Security Issues 15. Why Does Bluetooth Security Matter 16. Advantages 17. Disadvantages 18. USES of Bluetooth in Now a DAY 19. Developing with Bluetooth 20. The future of Bluetooth 1 2 2 3 3 4 5 6 8 8 9 10 11 12 12 13 15 16 20 21
  • 3. Introduction Bluetooth technology is a short-range communications technology that is simple, secure, and everywhere. You can find it in billions of devices ranging from mobile phones and computers to medical devices and home entertainment products. It is intended to replace the cables connecting devices, while maintaining high levels of security. The key features of Bluetooth technology are robustness, low power, and low cost. The Bluetooth Specification defines a uniform structure for a wide range of devices to connect and communicate with each other. When two Bluetooth enabled devices connect to each other, this is called pairing. The structure and the global acceptance of Bluetooth technology means any Bluetooth enabled device, almost everywhere in the world, can connect to other Bluetooth enabled devices located in proximity to one another. Connections between Bluetooth enabled electronic devices allow these devices to communicate wirelessly through short-range. The range of Bluetooth technology is application specific. The Core Specification mandates a minimum range of 10 meters or 30 feet, but there is no set limit and manufacturers can tune their implementations to provide the range needed to support the use cases for their solutions. Bluetooth is a proprietary open wireless technology standard for exchanging data over short distances (using short wavelength radio transmissions in the ISM band from 2400-2480 MHz) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. Created by telecoms vendor Ericsson in 1994, it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization. Bluetooth is managed by the Bluetooth Special Interest Group, which has more than 15,000 member companies in the areas of telecommunication, computing, networking, and consumer electronics. The SIG oversees the development of the specification, manages the qualification program, and protects the trademarks. To be marketed as a Bluetooth device, it must be qualified to standards defined by the SIG. A network of patents is required to implement the technology and are only licensed to those qualifying devices; thus the protocol, whilst open, may be regarded as proprietary. What are Bluetooth’s key features? The key features of Bluetooth technology are robustness, low power, and low cost, and the fact that it has become a universal standard for exchanging data amongst a range of fixed and mobile devices. In addition, Bluetooth wireless technology has the ability to simultaneously handle both data and voice transmissions. This means that users can use a variety of applications such as a hands-free headset for voice calls, printing and fax capabilities, and synchronizing PDAs, laptop, and mobile phone applications. What devices is Bluetooth used in? Bluetooth technology offers a way to connect and exchange information between wide varieties of devices. These include mobile phones, telephones, laptops, PCs, printers, Global Positioning System (GPS) receivers, digital cameras, and video game consoles. The Purpose The purpose of Bluetooth technology is to connect numerous electronic devices together without the need of wires. For example, a Bluetooth headset allows you to talk on your cell phone without using your hands. Many states have banned the use of cell phones while operating a vehicle, unless the driver has a way of using the phone and keeping both hands on the wheel. Bluetooth technology makes this possible. Video game controllers, such as those designed for the PlayStation 3, also use Bluetooth technology, eliminating the need to connect the controller to the console with a wire. 1
  • 4. Bluetooth History In 1994, Swedish company Ericsson Mobile Communications launched the Bluetooth wireless technology movement. Ericsson wanted to investigate a radio interface that would prove low-cost and low-power. Goals included the elimination of wire clutter between different devices from differing industries. Creating a single wireless standard would unite computer devices and telecommunications. This wireless technology has connected devices in close proximity, regardless of brand. Origin Bluetooth was developed by Ericsson, a large Swedish telecommunications equipment manufacturer. The specification was developed in 1994 by Jaap Haartsen and Sven Mattisson, who were working for Ericsson at the time. The Formation Bluetooth technology was officially introduced in 1998, although it was in development in Scandinavia prior. Both the name "Bluetooth" and the logo associated with it have been trademarked by SIG (Bluetooth Special Interest Group). Numerous companies belong to SIG including Ericsson, IBM, Microsoft, Intel, Nokia, Toshiba and Agere. The SIG trade association continues to work on progressing and researching the use of Bluetooth technology in the computing, automotive, industrial automation and telecommunication industries. The Bluetooth SIG The name “Bluetooth” and its logo are trademarked by the privately held trade association named the Bluetooth Special Interest Group (SIG). Founded in September 1998, the Bluetooth SIG is a unification of leaders in the telecommunications, computing, network, industrial automation, and Automotive industries. Today, the Bluetooth SIG is responsible for encouraging and supporting research and development in Bluetooth technology. The Bluetooth SIG includes promoter member companies Microsoft, Ericsson, IBM, Intel, Agere, Motorola, Nokia, and Toshiba, plus thousands of Associate and Adopter member companies (BlueTomorrow.com's parent company, SP Commerce LLC, is a licensed and certified Adopter member of the Bluetooth SIG). History of Bluetooth Name Bluetooth is named for Viking leader and Danish king Harald "Bluetooth" Blatand (940-981). Jim Kardach, who worked for Intel, heard about King Harald Bluetooth from Sven Mathesson of Ericsson. King Harald Bluetooth united Denmark and Norway and helped bring Christianity to Scandinavia. Intel suggested the codename "Bluetooth" as a temporary name for the SIG program. As a modern day counterpart, the SIG also saw the power of unity as they sought to unite computer devices and telecommunications with a short-range wireless link. During contract preparations, with no agreed formal name, the Bluetooth codename was inserted and resulted in Bluetooth SIG. A board meeting accepted IBM's proposed name, Personal Area Networking (PAN), yet a trademark online search resulted in thousands of hits. The SIG instead launched with the Bluetooth name that remains synonymous with short range radios. Origin of Logo The logo is the combined German Runes of Harglass (which is the Latin equivalent of "H") and Berkanan (which is analogous to the Latin "B"). These letters represent the origin of the name Harald Bluetooth. 2
  • 5. Version Version 1.X Bluetooth 1.0 was established in the early days of the product's standardization. As a result, many manufacturers' equipment did not work with other products. Bluetooth 1.1 and 1.2 fixed some of these interoperability problems. Version 2.X Bluetooth Version 2.0 was released in November 2004. Version 2.0 increased the speed of the Bluetooth protocol. It was backwards compatible with Bluetooth 1.1. In July 2007, Bluetooth 2.1 was released. Version 3.0 Bluetooth Version 3.0 will increase data speed and reduce power consumption. As of April 2009, it has not yet been released The history of Bluetooth technology dates back more than a decade. Since its introduction onto the market, Bluetooth technology has revolutionized the way we stay connected, and the way electronic devices stay connected to each other. The technology behind Bluetooth continues to advance. Bluetooth technology can be found in a wide range of electronic devices, including cell phones and video game controllers. Bluetooth Technology Over the Years 1998 - Bluetooth technology is officially introduced and the Bluetooth SIG is formed. Bluetooth technology's intended basic purpose is to be a wire replacement technology in order to rapidly transfer voice and data. 1999 - Bluetooth 1.0 Specification is introduced. 2004 - Bluetooth Version 2.0 + EDR (Enhanced Data Rate) is introduced. 2005 - Devices using Version 2.0 + EDR begin to hit the market in late 2005. 2007 - Bluetooth Core Specification Version 2.1 + EDR is adopted by the Bluetooth SIG. 2009 - Bluetooth Core Specification Version 3.0 + HS (High Speed) is adopted by the Bluetooth SIG. Exmaple The Bluetooth enabled Eclipse CD5030 lets users control their cell phones wirelessly via their car stereo. 3
  • 6. How does Bluetooth work? Bluetooth uses a radio technology which is called frequency-hopping spread spectrum. It works by chopping up the data that is being sent, and transmitting sections of it on up to 79 frequencies. Spread-spectrum is good for several reasons. Firstly, the signals are very resistant to narrowband interference, which means the transmissions are more likely to reach their destination quickly and intact. Spread-spectrum transmissions can share a frequency band with many types of conventional transmissions with minimal interference. Also, spread-spectrum signals are also very difficult to intercept, making the technology relatively secure – except for some early security issues. Working of Bluetooth Technology Now, about how Bluetooth works... Bluetooth Special Interest Group manages and maintains the Bluetooth Standard. IEEE has accepted it as 802.15la standard. Bluetooth was developed with the purpose of creating a single digital wireless protocol, capable of connecting multiple devices and getting over synchronization issues between them. It enables short-range wireless communication thus replacing the wires that are used to connect multiple devices. Transmissionover Short Distances The Bluetooth RF transceiver lies at the physical layer. There are 79 Bluetooth channels spaced 1MHz apart. A spread spectrum technology is used at the physical layer. Both voice and data transmissions over short distances are possible, creating wireless PANs. Instructions to Communicate A Bluetooth device consists of an adapter. A Bluetooth adapter can be built into a device or can be in the form of a card that connects to a device. Instructions are embedded into the device, which enable it to communicate with other devices. PacketSegmentationand Reassembly When devices come in each other's radio range, their link managers discover each other. Link management protocol (LMP) engages itself in peer-to-peer message exchange. LMP layer performs link setup and negotiation of packet size. Segmentation and reassembly of packets is done, if needed. ConnectionSets Up The service delivery protocol enables a Bluetooth device to join a piconet. A device inquires what services are available with the piconet. Bluetooth GlobalID (a unique identification for each device in the network) is exchanged between the devices. Their profiles are matched and a connection is set up. SignalTransfer Bluetooth uses frequency hopping in time slots, which means that the Bluetooth signals avoid interference with other signals by hopping to a new frequency after transmission or reception of every packet. One packet can cover up to five time slots. Bluetooth can support an asynchronous data channel, or up to 3 simultaneous synchronous voice channels, or a channel, which concurrently supports asynchronous data and synchronous voice. MasterSlave Bluetooth technology makes use of the concept of a master and slave. Devices have to wait until the master allows them to talk! One master and up to seven slaves employ a star topology to form a piconet and begin to communicate with one another (as per orders from their master of course)! 4
  • 7. Communication and connection A master Bluetooth device can communicate with a maximum of seven devices in a piconet (an ad- hoc computer network using Bluetooth technology), though not all devices support this limit. The devices can switch roles, by agreement, and the slave can become the master (for example, a headset initiating a connection to a phone will necessarily begin as master, as initiator of the connection; but may subsequently prefer to be slave). The Bluetooth Core Specification provides for the connection of two or more piconets to form a scatternet, in which certain devices simultaneously play the master role in one piconet and the slave role in another. At any given time, data can be transferred between the master and one other device (except for the little-used broadcast mode). The master chooses which slave device to address; typically, it switches rapidly from one device to another in a round-robin fashion. Since it is the master that chooses which slave to address, whereas a slave is (in theory) supposed to listen in each receive slot, being a master is a lighter burden than being a slave. Being a master of seven slaves is possible; being a slave of more than one master is difficult. The specification is vague as to required behaviour in scatternets. Many USB Bluetooth adapters or "dongles" are available, some of which also include an IrDA adapter. Older (pre-2003) Bluetooth dongles, however, have limited capabilities, offering only the Bluetooth Enumerator and a less-powerful Bluetooth Radio incarnation. Such devices can link computers with Bluetooth with a distance of 100 meters, but they do not offer as many services as modern adapters do. Bluetooth Communication • Radio Frequency Communications (RF C) – Controls Frequency Hopping for Bluetooth • Logical Link Control (LLC) – Link Management • Security Management • QoS Management – Transmission Scheduling Link Manager Protocol (LMP) Configure, authenticate and handle the connections Power management scheme What is the data rate and range of Bluetooth? The data transfer rate of Bluetooth technology varies depending on the version. Version 1.2 offers up to 1Mbps. Version 2.0 + Enhanced Data Rate (EDR) offers up to 3Mbps, and data can be transferred at up to 24Mbps for Version 3.0 + High Speed (HS) enabled devices. Version 3.0 + HS was adopted in April 2009. Version 2.1 + EDR was adopted in July 2007. As for the operating range, this also varies depending on the class of the Bluetooth device. Class 3 radios have a range of up to 1 metre or 3 feet; class 2 radios, which are most commonly found in mobile devices, have a range of 10 metres or 33 feet. Class 1 radios, used primarily in industrial use cases, have a range of 100 metres or 300 feet. 5
  • 8. Implementation Bluetooth uses a radio technology called frequency-hopping spread spectrum, which chops up the data being sent and transmits chunks of it on up to 79 bands (1 MHz each; centered from 2402 to 2480 MHz) in the range 2,400-2,483.5 MHz (allowing for guard bands). This range is in the globally unlicensed Industrial, Scientific and Medical (ISM) 2.4 GHz short-range radio frequency band. Originally Gaussian frequency-shift keying (GFSK) modulation was the only modulation scheme available; subsequently, since the introduction of Bluetooth 2.0+EDR, π/4-DQPSK and 8DPSK modulation may also be used between compatible devices. Devices functioning with GFSK are said to be operating in basic rate (BR) mode where an instantaneous data rate of 1 Mbit/s is possible. The term Enhanced Data Rate (EDR) is used to describe π/4-DPSK and 8DPSK schemes, each giving 2 and 3 Mbit/s respectively. The combination of these (BR and EDR) modes in Bluetooth radio technology is classified as a "BR/EDR radio". Bluetooth is a packet-based protocol with a master-slave structure. One master may communicate with up to 7 slaves in a piconet; all devices share the master's clock. Packet exchange is based on the basic clock, defined by the master, which ticks at 312.5 µs intervals. Two clock ticks make up a slot of 625 µs; two slots make up a slot pair of 1250 µs. In the simple case of single-slot packets the master transmits in even slots and receives in odd slots; the slave, conversely, receives in even slots and transmits in odd slots. Packets may be 1, 3 or 5 slots long but in all cases the master transmit will begin in even slots and the slave transmit in odd slots. Bluetooth provides a secure way to connect and exchange information between devices such as faxes, mobile phones, telephones, laptops, personal computers, printers, Global Positioning System (GPS) receivers, digital cameras, and video game consoles. Bluetooth Buzzwords Here we give you a quick list of terms and concepts you will come across when talking or reading about the Bluetooth technology. These are some of the terms you should know if you know what Bluetooth is and how it works. Piconet:A group of devices connected by means of Bluetooth technology in an ad hoc manner is known as a piconet. There can be a maximum of 8 devices forming one piconet. For the duration of a piconet connection, one device acts as the master and others act as slaves in order to synchronize. Scatternet:A scatternet is composed of two or more independent piconets. This brings about a communication between piconets. Masterunit: Its clock and hopping frequency are used to synchronize other devices in the piconet. The master device numbers the communication channels. Slave unit: The slave units act in coordination with the master. Frequency Hopping Spread Spectrum: When the carrier (waveform modulated with the input signal) is rapidly switched among different frequency channels, during signal transmission, the method is referred to as frequency hopping spread spectrum. PacketSegmentationand Reassembly: In this process, data packets of varying lengths are fragmented to 48-bytes size when transmitting and reassembled at the receiver's end to their original form, when data transfer is complete. PAN: Short for Personal Area Network, a PAN refers to a communication network formed between devices usually located within the distance of a few meters from one another. 6
  • 9. List of applications A typical Bluetooth mobile phone headset. Wireless control of and communication between a mobile phone and a handsfree headset. This was one of the earliest applications to become popular. Wireless control of and communication between a mobile phone and a Bluetooth compatible car stereo system Wireless Bluetooth headset and Intercom. Wireless networking between PCs in a confined space and where little bandwidth is required. Wireless communication with PC input and output devices, the most common being the mouse, keyboard and printer. Transfer of files, contact details, calendar appointments, and reminders between devices with OBEX. Replacement of previous wired RS-232 serial communications in test equipment, GPS receivers, medical equipment, bar code scanners, and traffic control devices. For controls where infrared was often used. For low bandwidth applications where higher USB bandwidth is not required and cable-free connection desired. Sending small advertisements from Bluetooth-enabled advertising hoardings to other, discoverable, Bluetooth devices. Wireless bridge between two Industrial Ethernet (e.g., PROFINET) networks. Three seventh-generation game consoles, Nintendo's Wii and Sony's PlayStation 3 and PSP Go, use Bluetooth for their respective wireless controllers. Dial-up internet access on personal computers or PDAs using a data-capable mobile phone as a wireless modem. Short range transmission of health sensor data from medical devices to mobile phone, set-top box or dedicated telehealth devices. Allowing a DECT phone to ring and answer calls on behalf of a nearby cell phone Real-time location systems (RTLS), are used to track and identify the location of objects in real-time using “Nodes” or “tags” attached to, or embedded in the objects tracked, and “Readers” that receive and process the wireless signals from these tags to determine their locations. Personal security application on mobile phones for prevention of theft or loss of items. The protected item has a Bluetooth marker (e.g. a tag) that is in constant communication with the phone. If the connection is broken (the marker is out of range of the phone) then an alarm is raised. This can also be used as a man overboard alarm. A product using this technology has been available since 2009. Bluetooth Application Models Model Description File Transfer Refers to object transfer or transfer of files between devices. Internet Bridge In this model, a cordless modem acts as a modem to a PC and provides dial-up networking and faxing facilities. LAN Access Multiple data terminals use a LAN access point (LAP) as a wireless connection to an Ethernet LAN. Synchronization The synchronization model enables a device-to-device synchronization of data. Headset It is wirelessly connected and can act as an audio input-output interface of remote devices. 7
  • 10. BluetoothProfiles One of the most useful innovations in the Bluetooth standard is the use of device profiles. To use Bluetooth wireless technology, a device has to be able to interpret certain Bluetooth profiles, which are definitions of possible applications and specify general behaviors that Bluetooth enabled devices use to communicate with other Bluetooth devices. These profiles include settings to parameterize and to control the communication from start. Adherence to profiles saves the time for transmitting the parameters anew before the bi-directional link becomes effective. There are a wide range of Bluetooth profiles that describe many different types of applications or use cases for devices. BluetoothStack The message here is that Bluetooth is hairy – like TCP/IP. Older Bluetooth chips only provided HCI functionality. Now they go up to the application layers: SPP, DUN, Headset. 8
  • 11. BluetoothChips - CSR Cambridge Scientific Radio (CSR) manufactures a large number of Bluetooth chips, probably more than half of those shipped. This is a diagram of their Bluecore2 series. Bluetooth Modules – Free2Move Bluetooth modules add the components needed to make a working radio: crystal, antenna, flash memory. The current generation of modules measure about 1”x0.5” w/ antenna. Free2Move (Sweden) has some particularly interesting modules based on CSR BlueCore2-flash chips with audio. This radio offers a functioning SPP for serial data, a 15-bit audio channel, and another 8-bit A/D channel. More Bluetooth Hardware Cambridge Scientific Radio (CSR) chips (in most peripherals) BlueCore2 chip Bluetooth v1.1, 16-bit XAP2 processor, A/D, audio options BlueCore3 chip Bluetooth v1.1-1.2, XAP2 processor, audio DSP option BlueCore4 chip Bluetooth V2.0, XAP2 processor AT&T Broadcom chips (in many PC + PDAs) BCM2040 Bluetooth v1.1-1.2, 8-bit 8051 processor BCM2037 Bluetooth v2.0 with audio, 16-bit ARM7 processor BCM2045 Bluetooth v2.0 host side chip Class 2 Modules (with antenna) Free2Move FM03AC2 Bluetooth v1.1 qualified, SPP, 15-bit audio + 8 bit A/D Taiyo Yuden EYMF2CAMM-XX Bluetooth v1.1 qualified, serial port profile BlueGiga WT12 Bluetooth v2.0 EDR qualified, serial port profile + PCM Class 1 Modules (no antenna) Free2Move FM2M03C1 Bluetooth v1.1 qualified, SPP, 15-bit audio + 8 bit A/D BlueGiga Wrap Thor 2022 Bluetooth v1.1 qualified, SPP, DUN, OBEX, HID 9
  • 12. Bluetooth Security These days, all communication technology faces the issue of privacy and identity theft, with Bluetooth being no exception. Almost everyone knows that email services and networks require security. What users of Bluetooth need to realize is that Bluetooth also requires security measures as well. The good news for Bluetooth users is that the security scares, like most scares, are normally over dramatized and blown entirely out of proportion. The truth being told, these issues are easy to manage, with various measures already in place to provide security for Bluetooth technology. It's true that there has been some Bluetooth phones that have been hacked into. Most devices that are hacked into are normally those that don't have any type of security at all. According to Bluetooth specialists, in order to hack into a Bluetooth device, the hacker must: Force two paired devices to break their connection. 2. Steal the packets that are used to resend the pin. 3. Decode the pin. Of course, the hacker must also be within range of the device, and using very expensive developer type equipment. Most specialists recommend that you have a longer pin, with 8 digits being recommended. Security Overview Bluetooth implements confidentiality, authentication and key derivation with custom algorithms based on the SAFER+ block cipher. Bluetooth key generation is generally based on a Bluetooth PIN, which must be entered into both devices. This procedure might be modified if one of the devices has a fixed PIN (e.g., for headsets or similar devices with a restricted user interface). During pairing, an initialization key or master key is generated, using the E22 algorithm. The E0 stream cipher is used for encrypting packets, granting confidentiality and is based on a shared cryptographic secret, namely a previously generated link key or master key. Those keys, used for subsequent encryption of data sent via the air interface, rely on the Bluetooth PIN, which has been entered into one or both devices. An overview of Bluetooth vulnerabilities exploits was published in 2007 by Andreas Becker. In September 2008, the National Institute of Standards and Technology (NIST) published a Guide to Bluetooth Security that will serve as reference to organizations on the security capabilities of Bluetooth and steps for securing Bluetooth technologies effectively. While Bluetooth has its benefits, it is susceptible to denial of service attacks, eavesdropping, man-in-the-middle attacks, message modification, and resource misappropriation. Users/organizations must evaluate their acceptable level of risk and incorporate security into the lifecycle of Bluetooth devices. To help mitigate risks, included in the NIST document are security checklists with guidelines and recommendations for creating and maintaining secure Bluetooth piconets, headsets, and smart card readers. Bluetooth v2.1 - finalized in 2007 with consumer devices first appearing in 2009 - makes significant changes to Bluetooth's security, including pairing. See the #Pairing mechanisms section for more about these changes. 10
  • 13. Bluetooth Vulnerabilities and Security Risks iness cards, to Bluetooth- enabled devices. This does not involve altering any data from the device, but nonetheless, it is unsolicited. Devices that are set in non-discoverable mode are not susceptible to bluejacking. In order for bluejacking to work, the sending and receiving devices must be within 10 meters of one another. While this method has been widely used for promotional purposes, Bluetooth deviceowners should be careful never to add the contact to their address book. While bluejacking is usually not done with malicious intent, repetitive bogus messages can be annoying to the user, and in some cases, can render the product inoperable. This can also open the door to a variety of social luetooth-enabled mobile phone and copying its entire contact book, calendar or anything else stored in the phone's memory. By setting the device in non-discoverable, it becomes significantly more difficult to find and attack the device. However, .the software tools required to steal information from Bluetooth-enabled mobile phones are widely available on the Web, and knowledge of how to use them is growing.. (Kotadia, 2004) Companies such as Nokia and Sony Ericsson are making sure new phones coming to market will not be susceptible to bluesnarfing. .The backdoor attack involves establishing a trust relationship through the .pairing. mechanism, but ensuring that it no longer appears in the target.s register of paired devices. In this way, unless the owner is actually observing their devices at the precise moment a connection is established, they are unlikely to notice anything untoward, and the attacker may be free to continue to use any resource that a trusted relationship with that device grants access to.This means that not only can data be retrieved from the phone, but other services, such as modems, or Internet, WAP and GPRS gateways may be accessed without the owner.s knowledge or consent.. (The Bunker, 2003) The cabir worm is malicious software that uses Bluetooth technology to seek out available Bluetooth devices and send itself to them. According to Bluetooth SIG (2006), .The cabir worm currently only affects mobile phones that use the Symbian series 60 user interface platform and feature Bluetooth wireless technology. Furthermore, the user has to manually accept the worm and install the malware in order to infect the phone.. Although this may be the case, this shows that it is achievable to write mobile viruses that spread via Bluetooth and may cause other hackers to explore the possibilities of writing Bluetooth viruses. The Mabir worm is essentially a variant of the Cabir worm where it uses Bluetooth and Multimedia Messaging Service messages (MMS) to replicate. Fundamentals of security: The "pairing process" is one of the most basic levels of security for Bluetooth devices. Pairing, is two or more Bluetooth devices that recognize each other by the profiles they share - in most cases they both must enter the same pin. The core specifications for Bluetooth use an encryption algorithm, which is completely and entirely secure. Once the devices pair with each other, they too become entirely secure. Until they have successfully paired, the Bluetooth devices won't communicate with each other. Due to this pairing process and the fact that it is short range - Bluetooth technology is considered to be secure. As the news has indicated, experienced hackers have developed ways to get around this level of basic security. There are ways to get around this threat, as you can install software to prevent hackers from getting in. With Bluetooth becoming more and more popular, it's really no wonder that security is always in question. As Bluetooth gets bigger and better, security will always be something that no one really takes lightly. If you've been concerned about Bluetooth security in the past, rest assured that newer devices will offer bigger and better security. Preventing hackers from getting in is something every owner is concerned about - and the manufacturer's are very aware. 11
  • 14. Bluetooth Security Issues Bluetooth can operate in one of three security models: Mode 1 is non security. Mode 2 provides security at the service level, after the channel is established. Mode 3 provides security at the link level, before the channel is established. Each Bluetooth device has a unique 48-bit device address. The authentication scheme is challenge- response, using symmetric keys, and encryption is done with a key that can be up to 128 bits (negotiated by the communicating devices, with each device having a maximum key length defined). A 128 bit random link key handles security transactions between two or more devices. When two Bluetooth devices establish a communications channel, they both create an initialization key. A passkey or Personal Identification Number is input and the inititalization key is created, and the link key is calculated using it. Then the link key is used for authentication. The first security concern is the passkey or PIN. As with any key, long keys are more secure than short ones. If a hacker is able to discover the passkey, he can calculate possible initiation keys, and then from that, calculate the link key. Making the passkey long will make it much harder to accomplish the first step. The initial key exchange takes place over an unencrypted link, so it is especially vulnerable. It’s best if this part of the BT device pairing process takes place in a more physically secure location (that is, where there are not likely to be any lurkers with BT devices who could intercept the communications). A hacker could record transmissions sent over the BT frequency and use them to recreate the PIN. Rather than using the same fixed passkey all the time, it should be changed frequently (how frequently depends on the types of devices and the required security level). Link keys can be combination keys or unit keys. Best security practice is to use combination keys instead of unit keys. When you use a unit key, you must use the same key for all secure transactions, and the key has to be shared with other trusted devices. This means any trusted device can potentially access traffic with other trusted devices using this key. It’s possible to use the Bluetooth address to identify a particular device (and associated user) and log those transactions, which can create privacy concerns. Why Does Bluetooth Security Matter? Many Bluetooth users only use the technology to connect a wireless headset or similar device to their portable computers, and they may wonder why security is a big deal. Implementing security, even for these types of device pairings, can prevent an unauthorized user from using the headset. However, another use of Bluetooth is to create a temporary computer network. For example, several people in a meeting room can connect their Bluetooth-enabled laptops to each other to share files during the meeting. When you use Bluetooth to create a temporary network, it is usually an ad hoc network; that is, computers communicate directly with each other rather than going through a wireless access point (WAP). This means you have no centralized point of security control, as you do with a WAP (for example, you can configure a WAP to use MAC address filtering and other built-in security mechanisms). Thus, security becomes a major concern because you can be exposing important data stored on your laptop to others on the Bluetooth network. Remember that the range for class 1 Bluetooth devices can be more than 300 feet – far enough so that in some locations, the BT equivalent of the wi-fi “war driver” may be able to establish a link with your computer even though not within your sight. Another special concern is the security of Bluetooth mobile phones. These phones may have information stored on them such as the addresses and phone numbers of contacts, calendar information and other PDA-type data. Hacking into these phones using Bluetooth is called bluesnarfing. Newer mobile phones and software upgrades for older phones can patch this vulnerability. A related hacking technique is called bluebugging, and it involves accessing the phone’s commands so that the hacker can actually make phone calls, add or delete contact info, or eavesdrop on the phone owner’s conversations. This vulnerability, too, is being addressed by phone manufacturers. Thus, if you own a BT-enabled phone, it’s important to keep the software updated or upgrade to the latest phone models frequently. 12
  • 15. Advantages Main Reasons to Use a Bluetooth Device: Bluetooth Devices are Wireless If you navigate through the rest of our site you will learn that there are tons of advantages/benefits when using wireless devices. In addition to improving safety as a result of eliminating the clutter of wires and associated hazardous connections, wireless technology also offers many convenient advantages. For example, when you are traveling with your laptop, PDA, MP3 player and other devices, you no longer have to worry about bringing along all of your connecting cables. Bluetooth Technology is Inexpensive Bluetooth technology is cheap for companies to implement, which results in lower over- all manufacturing Costs. These savings are then passed on to you, the consumer. The end result: Bluetooth devices are relatively inexpensive. Bluetooth is Automatic Bluetooth doesn't require you to think about setting up a connection or to push any buttons. When two or more Bluetooth devices enter a range (Up to 30 feet) of one another, they automatically begin to communicate without you having to do anything. Once the communicating begins, Bluetooth devices will setup Personal Area Networks or Piconets. The best part is: The devices take care of the entire setup process, and you can go about your business. Standardized Protocol = Interoperability Since Bluetooth is a standardized wireless specification, a high level of compatibility among devices is guaranteed. The Bluetooth specification uses and defines various profiles. Every Bluetooth profile is specific to a particular function. For instance, when a Bluetooth enabled cell phone and a Bluetooth headset (Both with the same profile) are communicating with one another, both will understand each other without the user having to do anything, even if the devices are of different models/makes. Low Interference (If Any) Bluetooth devices avoid interference with other wireless devices by: Using a technique known as spread-spectrum frequency hopping, and Using low power wireless signals. Low Energy Consumption As stated above, Bluetooth uses low power signals. As a result, the technology requires little energy and will therefore use less battery or electrical power. Obviously, this is a great benefit for mobile devices because Bluetooth won't drain the life of your device's battery. Share Voice and Data The Bluetooth standard allows compatible devices to share both voice and data communications. For example, it is probably no surprise that a Bluetooth enabled cell phone is capable of sharing voice communications with a compatible Bluetooth headset, however, the same cell phone may also be capable of establishing a GPRS connection to the Internet. Then, using Bluetooth, the phone can connect to a laptop. The result: The laptop is capable of surfing the web or sending and receiving email. Instant Personal Area Network (PAN) Up to seven compatible Bluetooth devices can connect to one another within a proximity of up to 30 feet, forming a PAN or piconet. Multiple piconets can be automatically setup for a single room. 13
  • 16. Upgradeable The Bluetooth standard is upgradeable. A development group at the Bluetooth Special Interest Group (SIG) has been given the task of working on the new Bluetooth version 2, which offers several new advantages and is backward compatible with the older versions. The Technology is Here to Stay Bluetooth is a universal, world-wide, wireless standard. Therefore, you can count on it being around for years to come. As more devices begin to use Bluetooth technology, electronics manufacturers will be increasingly eager to make their products compatible, using Bluetooth. A chain reaction is inevitable, in fact, it has already begun. Automatic – setting up Bluetooth connectivity is automatic Bluetooth and doesn’t need professionals. When two or more devices enter a range of up to 30 feet of each other the communication automatically begins between them. Standard protocol - Bluetooth is standardized wireless guarantees the high level of compatibility among devices. Bluetooth devices connect to each other irrespective of their model. Instant PAN (Personal Area Network) - You can have your own personal are network for sharing data among your group consisting of up to seven Bluetooth devices within a range of up to 30 feet. Simplifies communication while driving – companies like parrot manufactures Bluetooth car kits resolving the audio and communication issues arising while driving, as Bluetooth simplifies talking and listening music on your cell phone while driving. Avoids interference from other wireless devices - Bluetooth devices avoid interference from other wireless devices with the usage of technique known as frequency hopping, and low power wireless signals. Ease of Access Unlike a wireless Local Area Network (LAN), Bluetooth doesn't need any configuration to start a connection and perform file transfers. Consequently, Bluetooth is a great alternative for business environments in which wireless file transfers are utilized. In laptops, establishing a wireless connection is as easy as pressing the Bluetooth shortcut or hot key. Security The Bluetooth connection can be securely established without interference from unrecognized devices by entering an identification number for the connection. The user of the master device--the one which starts the connection--can opt to enter a PIN which creates the secure usage loop. Control Unless a device is already paired to your device, you have the option to accept or reject the connection and file transfer. This prevents unnecessary or infected files from unknown users from transferring to your device. Free Access Accessing a Bluetooth device doesn't cost money; all you need is the Bluetooth capability. Internet Bluetooth is not recommended for establishing Internet connections because of its limited transfer rate. A LAN connection is more efficient. 14
  • 17. Disadvantages Data Transfer Rate Data sent between two Bluetooth devices has a maximum transfer speed of one megabyte per second. Infared is capable of transferring data at 4MB per second, and Wi-Fi is capable of speeds even higher. The slow transfer speed makes Bluetooth not an ideal choice for data transfer when faster connection methods are available. Range Bluetooth only has a range of 15 to 30 feet depending on the device. The small range is a disadvantage for some who may want to use a Bluetooth device outside of that 30-foot radius. For instance, a Bluetooth printer in a home could not necessarily be used by every computer in the house if some of those computers are located out of the range of the printer. A Wi-Fi printer, however, could be used by anyone who could connect to the home's wireless network. Security Since data is transferred over radio waves using Bluetooth, it is is much easier for a hacker to break into than secure wireless networks. For that reason, Bluetooth should not be used to transfer data that needs to remain private and secure. Battery Use Bluetooth uses the battery power of a particular device in order to operate. Many cell phone makers send phones out with Bluetooth powered off in order to maximize the battery life of the phone. Turning Bluetooth on, while convenient, can drain a cell phone or computer battery, causing it to run out of juice long before it would have if Bluetooth was not powered on. Susceptibility to interference All Bluetooth enabled devices operate within the 2.4 GHz band, which is the same unlicensed frequency used by many other electronic devices such as microwaves, cordless phones, and the majority of Wi-Fi devices. This frequency sharing could lead to slower overall network performance because some of the signals collide, don't reach their destination, and have to be re-sent. However, since Bluetooth wireless transmissions "hop" all over the bandwidth, this greatly decreases the likelihood of impacting other 2.4 GHz broadcasts. Though the impact is usually negligible, there are situations that can arise where Bluetooth devices can dilute Wi-Fi signals, especially if there are a great number of devices operating in different pairs. The Bluetooth SIG is making every effort to ensure that both of these issues will be soon be negated by the new standard. Bluetooth Limitations Communication speed is not that great with Bluetooth technology. Wi-Fi and Infrared communication can happen at much higher speeds compared to that of Bluetooth. Though Bluetooth communication is considered secure, if a user happens to leave his/her device in the 'discoverable' mode, a hacker can eavesdrop or establish a connection with the 'discovered' device without the user knowing about it. If Bluetooth is in the ON mode, it does drain the battery. So one needs to be careful about switching Bluetooth ON only for the time span of communication and turn it OFF after the communication ends. This practice also reduces the security risk involved with Bluetooth technology. 15
  • 18. USES of Bluetooth in Now a DAY Medical & Health Devices Increasing awareness of the benefits of a healthy, independent lifestyle creates a booming market for devices that permit an important share of primary care to be conducted remotely, in the comfort of the patient's home. Sports & Fitness Devices Today's athletes – and anyone who wants to get in shape or stay in shape – are eager to improve their results. Many are using Bluetooth technology to help. Bluetooth Technology and Internet Access You can also access internet through mobile using Bluetooth technology. Here is a roll call of some the first Bluetooth Smart Ready and Bluetooth Smart devices: Polar releasing first Bluetooth Smart heart-rate strap Polar H7 heart strap This Bluetooth Smart device allows you to quickly connect to any Bluetooth Smart Ready device, such as a tablet or smartphone, to store and display heart rate data and other workout statistics. Polar makes a wide variety of heart rate sensors and fitness watches with sophisticated training features. This is the company's first Bluetooth Smart device, and its second Bluetooth enabled heart- rate monitor. 16
  • 19. Casio ready to release its first Bluetooth Smart device Casio G-Shock smart watch Casio has created its first Bluetooth Smart device—a watch that's able to communicate wirelessly with a Bluetooth Smart Ready phone. The Casio G-Shock GB-6900 can notify you with a tone or vibration when you receive new calls or emails, and displays a visible alert. This could be especially useful when your phone is stashed in a pocket or purse. The new G-Shock will be available in black, white and red. Because the watch uses Bluetooth low energy technology, it will be able to operate for two years on a single coin-cell battery. The GB-6900 is reportedly due out in Japan by the end of December. No word yet on a release date or price for North America or Europe. Motorola releases its first Bluetooth Smart Ready phone—the Droid RAZR Droid RAZR Motorola has resurrected its renowned RAZR phone brand with a new Android smartphone that becomes the company's first Bluetooth Smart Ready device. The new Droid Razr is nothing like the best-selling RAZR phones of a decade ago, however, except for its thinness. This RAZR has a 4.3-inch qHD Super AMOLED display (a first for any mobile phone), a dual-core processor, a tough, "gorilla glass" screen, and a slim profile of just 7.1mm. The Droid RAZR is the second Bluetooth Smart Ready phone to reach the market, joining the new Apple iPhone 4S. The Droid RAZR is available now from Verizon Wireless for $299 on contract. 17
  • 20. Motorola releases Bluetooth Smart device for music, running and more MOTOACTV This tiny new Bluetooth Smart device from Motorola is a sophisticated fitness tracker, smart music player and training system. It lets you listen to music on the optional Motorola SF600 Bluetooth wireless headphones while running or doing other workouts in the gym or outside. The MOTOACTV includes precision GPS to track your distance and speed, a "smart" music player that learns what songs motivate you the most by tracking your performance against your music, a touchscreen, audio "coaching" on pace and distance, and more. The MOTOACTV costs $249 for 8GB of memory or $299 for the 16GB version. Apple releases world's first Bluetooth Smart Ready computers and phone iPhone 4S The new iPhone 4S may look like the iPhone 4, but it has many important differences inside. One big addition is the use of Bluetooth v4.0. This will allow the new iPhone to wirelessly connect to the next generation of devices coming out later this year with Bluetooth v4.0. The new iPhone 4S also features a more advanced camera, the more powerful A5 processor, and many new software features. Mac mini Like the MacBook Air, the new Mac mini also adds Bluetooth v4.0, which wil allow it to wirelessly connect to the next generation of Bluetooth v4.0 phones and other devices coming out later this year. The new Mac mini also features the latest dual-core Intel Core i5 and i7 processors, AMD Radeon HD graphics, and high-speed Thunderbolt I/O technology. 18
  • 21. MacBook Air The new MacBook Air—Apple's thinnest and lightest notebook—adds Bluetooth v4.0. This will allow it to wirelessly connect to the next generation of mobile phones and many other devices coming out later this year with Bluetooth v4.0. The new MacBook Air also features the latest-generation Intel Core i5 and i7 processors, high-speed Thunderbolt I/O technology, and all-flash storage. Dayton and Nordic create first Bluetooth Smart device heart strap Dayton heart-rate strap Dayton Industrial Co. Ltd has created the world's first production-ready heart-rate chest strap that is a Bluetooth Smart device. The strap uses a new Bluetooth v4.0 low energy chip from Nordic Semiconductor. The device is now ready to go into production and will be able to pair with the new wave of Bluetooth Smart Ready phones expected out later this year. Users won't need a special matching watch like most heart-rate monitors use today. According to Nordic, the strap can be paired with a phone or other Bluetooth Smart Ready device in seconds, allowing people to display their heart rate on their phone while they work out and analyze it later. Do more when you're on the go Bluetooth enabled wireless headsets and hands-free car systems have always helped drivers focus on the road. Today, new versions of these devices are better than ever, with features that ensure a completely hands-free calling experience made possible by speech recognition, text-to-speech technology, and "speech trigger" capabilities that lets you turn on hands-free calling devices just by speaking a command. Mobile Phones Access and browse your mobile device's phone book from your car's navigation display and make hands-free phone calls. Play music from your phone through your car's speaker system, without cables, adapters, or plugs. 19
  • 22. Car Kits Don't have Bluetooth technology built into your vehicle? No problem. Inexpensive Bluetooth enabled car kits and speakerphones let you talk hands-free in your car even without a built-in hands- free system. GPS navigation Connect to the Internet through a mobile phone and update your "Points of Interest" database and other map data easily, wirelessly. Use the built-in microphone in some Bluetooth enabled GPS devices to talk hands-free on a phone paired with the GPS device. Portable Music Players Use a Bluetooth adapter to stream music from your iPod or MP3 player to your car's audio system. Health monitors Car displays that can help people with diabetes monitor their blood-glucose level while driving, by using a wireless glucose monitoring device with Bluetooth technology they pair with their car. Bluetooth, the wireless radio technology for short distance mobile communications, has become pervasive in mobile computing, used in laptops and headsets as well as popular smart phones such as the BlackBerry, and even in Radio Frequency identification (RFID) readers. Developing with Bluetooth The newest modules make it pretty easy to go wireless. Most modules can be used as serial cable replacements. The next simplest step is to add a microprocessor to act as controller (PIC etc.), using the module’s serial profile. But since new BT chips have a powerful, energy-efficient processor on-board already, this is rather wasteful. You can develop for the native processor, but you will need to buy some expensive development tools. CSR and some module vendors provide virtual machines so your code can’t void the module’s qualification. 20
  • 23. What is the future of Bluetooth? The future of Bluetooth looks strong, with initiatives underway for higher throughput, more ubiquitous usage and links with Wifi and Ultra Wideband (UWB) broadcast technology. Operating systems such as the Mac OS and Windows continue to have native support for Bluetooth. The Bluetooth SIG partners are working on enabling Bluetooth information points, to enable advertising models based around users pulling information from ‘information points’, rather than having to ‘push’ information out. Other emerging features include Bluetooth in cars; automatic configuration of piconets; and quality of service (QoS) improvements, for example enabling audio and video data to be transmitted at a higher quality. The future of Bluetooth It is estimated that there are more than one billion devices in use that utilize Bluetooth wireless technology. You can expect that number to rise sharply when Bluetooth 3.0 devices become more common. Bluetooth 3.0 Bluetooth 3.0 is the new Bluetooth wireless standard adopted by the Bluetooth SIG on April 21, 2009. The new standard supports higher data transfer speeds and builds upon the previous standards. With its higher speed, the technology has the potential to revolutionize the consumer electronics industry. It's FAST Bluetooth 3.0 can transfer files at rates of up to 24 megabytes per second. At those speeds, high- quality streaming video is a definite possibility, along with a host of other applications that are simply impractical with the current transfer rates. Picture this... With Bluetooth 3.0, camcorders will stream video footage or still photos to Bluetooth enabled televisions and computers; digital cameras will stream photo slideshows to cell phones, and laptops will ave the ability to transfer presentations wirelessly to a projector. Use your imagination — the possibilities are really exciting. Backwards compatibility Best of all, Bluetooth 3.0 will be backwards-compatible, so all of your old devices will be able to communicate with the new ones and vice versa. But bear in mind that transfer speeds are only as fast as the slowest device, meaning that the two will exchange data at the slower, 3-megabyte rate of Bluetooth 2.1. Future • Success of Bluetooth depends on how well it is integrated into consumer products -Consumers are more interested in applications than the technology -Bluetooth must be successfully integrated into consumer -- products -Must provide benefits for consumer -Must not destroy current product benefits • Key Success Factors -Interoperability -Mass Production at Low Cost -Ease of Use -End User Experience 21