Short blutooth present
description
Transcript of Short blutooth present
![Page 1: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/1.jpg)
1
Bluetooth
![Page 2: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/2.jpg)
Bluetooth is a packet based protocol with a master slave structure . One master may communicate with up to 7 slaves.
In Bluetooth technology ,the device which sends the data is called as MASTER. Where as the devices that receive the data is called as SLAVE.
![Page 3: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/3.jpg)
![Page 4: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/4.jpg)
4
BlueTooth- Some Specifications Uses unlicensed 2.402 - 2.480 GHz frequency range. Frequency hopping spread spectrum 79 hops separated
by 1 MHz. Maximum frequency hopping rate: 1600 hops/sec. Nominal range: 10 cm to 10 meters. Nominal antenna power: 0 dBm. One complete Bluetooth data packet can be transmitted
within each 625 msec hop slot.
![Page 5: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/5.jpg)
5
Potential Bluetooth Markets
![Page 6: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/6.jpg)
![Page 7: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/7.jpg)
![Page 8: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/8.jpg)
![Page 9: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/9.jpg)
9
Bluetooth Market Forecast
Nov’03: 100M Bluetooth compliant devices worldwide
![Page 10: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/10.jpg)
![Page 11: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/11.jpg)
11
Bluetooth Protocol StackAdopted Protocols
PPP(Point-To-Point Protocol)TCP/UDP/IPOBEX-Session Protocol for IrDA(Infrared Data
Association)Contents Format(e.g. vCard, vCalendar)WAP-Wireless Application Protocol
![Page 12: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/12.jpg)
![Page 13: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/13.jpg)
13
Bluetooth SecuritySupports Unidirectional or Mutual Encryption based
on a Secret Link key Shared Between Two Devices.Security Defined In 3 modes:
Mode1- No Security.Mode 2 - Service Level Security: Not Established
Before Channel is Established at L2CAP.Mode 3 - Link Level Security: Device Initiates
Security Before LMP Link is Setup.
![Page 14: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/14.jpg)
• Devices and Services can be Set for Different Levels of Security
Two Trust Levels are Set for Devices:Trusted Device : Fixed Relationship and
Unrestricted Access to All Services.Untrusted : No Permanent relationship and
Restricted Services.
![Page 15: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/15.jpg)
![Page 16: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/16.jpg)
16
Bluetooth Security3 Levels of Service Access
Require Authorization and Authentication.Require Authentication Only.Default Security for Legacy Applications.
![Page 17: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/17.jpg)
![Page 18: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/18.jpg)
18
But is this Wireless Link Secure?
Newsflash: Jan 2001: Norwegian “hackers” crack a Bluetooth transmissionNewsflash: Jan 2001: Norwegian “hackers” crack a Bluetooth transmission
![Page 19: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/19.jpg)
Bluetooth vs. the Rest (cont’d)
19
802.112.4 GHz, DSSS11 chips/bit11Mbps+20 dBm50m128 devicesCSMA/CAOptional WEPOptional
HomeRF2.4GHz, FHSS50 hops/s1 Mbps+20 dBm50m128 devicesCSMA/CAOptionalOptional
Bluetooth2.4 GHz, FHSS1000+hops/s1Mbps0, +20dBm1-10m, 50m8 devices, PiconetEncryptionYes
ParameterTechnology
Data RatePowerRangeTopology
SecurityVoice Channel
ZigBee (proposed)2.4 GHz,DSSS15 chips/bit40 kbits/s0dBm100m100s devices, CSMA/CANot yetNo
Bluetooth – aka IEEE 802.15.1
Zig Bee – aka IEEE 802.15.4
![Page 20: Short blutooth present](https://reader033.fdocuments.in/reader033/viewer/2022052601/558c2ec2d8b42a553e8b456c/html5/thumbnails/20.jpg)