Bluetooth - PowerPoint PPT Presentation

1 / 21
About This Presentation
Title:

Bluetooth

Description:

Bluetooth By Sonny Leung Jennifer Portillo Thomas Razo Samson Vuong Introduction What is Bluetooth? What does it do? History of Bluetooth Introduction (cont d) Is ... – PowerPoint PPT presentation

Number of Views:220
Avg rating:3.0/5.0
Slides: 22
Provided by: calstatel
Category:
Tags: bluetooth

less

Transcript and Presenter's Notes

Title: Bluetooth


1
Bluetooth
By Sonny Leung
Jennifer Portillo
Thomas Razo
Samson Vuong
2
Introduction
  • What is Bluetooth?
  • What does it do?
  • History of Bluetooth

3
Introduction (contd)
  • Is Bluetooth here to stay?
  • What should we expect from Bluetooth in the
    future?

4
What Bluetooth Delivers to the end-user
  • Connects a wide range of computing and
    telecommunication devices
  • Expand communication capabilities
  • Devices can communicate with each other with
    wireless connectivity

5
User Application
  • Car manufactures Industry
  • E-Mail / Internet / Intranet Access
  • Headsets
  • Bluetooth will facilitate Local Area Networks

6
Bluetooth in Action
In the Office ...
In the house
Source http//www.motorola.com
7
Home Security
On the Road
Source http//www.motorola.com
8
On your Car
Source http//www.motorola.com
9
Bluetooth Specifications
  • Things that you must have
  • Transceivers and Receivers that can send and
    receive data because they use Radio Waves.
  • MAC Address (Physical Address)
  • Burnt on the NIC card by the manufacturer.
  • PIN Number
  • To identify the user using the device.
  • A Piconet
  • A FHHS protocol

10
What is a Piconet?
  • A Piconet session is a communication link that
    must be created between devices for devices to
    communicate with each other.
  • This is done when the MAC address and the PIN
    number match.

11
Piconet (cont.)
  • If two devices come onto contact with each other(
    32 feet) the user will be prompted to initiate a
    communication session
  • Users then can either deny or accept the request
    to initiate a session
  • Only devices approved by the user can take part
    in the session
  • Data will appear as noise to unauthorized
    devices (A great security feature).

12
FHHS
  • Bluetooth devices use a protocol called (FHHS)
    Frequency-Hopping Spread Spectrum .
  • Uses packet-switching to send data.
  • Bluetooth sends packets of data on a range of
    frequencies.
  • In each session one device is a master and the
    others are slaves.
  • The master device decides at which frequency data
    will travel.

13
FHHS
  • Transceivers hop among 79 different frequencies
    in the 2.4 GHz baud at a rate of 1600 frequency
    hops per second.
  • The master device tells the slaves at what
    frequency data will be sent.
  • This technique allows devices to communicate with
    each other more securely.

14
FHHS Example
Source http//www.xircom.com
15
Bluetooth Security
  • Modes
  • Security Mode 1
  • No Security
  • Security Mode 2
  • Service Level Enforced Security
  • Implemented after channel is established
  • Security Mode 3
  • Link Level Enforced Security
  • Implemented before channel is established

16
Devices
  • Trusted
  • No Restrictions
  • Untrusted
  • Restrictions, Access is limited

17
Service Levels
  • Authorization and Authentication
  • Authentication Only
  • Open to all Devices

18
Link Level
  • Bluetooth Device Address
  • Private Link Key
  • Private Encryption Key
  • Random Number

19
Bluetooth Secure Enough?
  • Not enough for confidential and top secret
    information now but . . .
  • Security will Improve
  • Improve exisiting security
  • Implement new security

20
Wrap up
  • Growing Technology
  • Automation

21
For More Information Please Visit The Following
Sites
  • www.motorola.com
  • www.xircom.com
  • www.palowireless.com
  • www.bluetooth.com
Write a Comment
User Comments (0)
About PowerShow.com