7/27/2019 technical report on Bluetooth
1/21
1
1. INTRODUCTION TO BLUETOOTH
Bluetooth is a proprietary open wireless technology standard for exchanging data over short
distances (using short wavelength radio transmissions) from fixed and mobile devices,
creating personal area networks (PANs) with high levels of security .It can connect several
devices, overcoming problems of synchronization. Bluetooth provides a short range wireless
communication between devices making it convenient for users and thus eliminating the need
for messy cables.
According to Bluetooth Special Interest Group, Bluetooth wireless technology is the most
widely supported, versatile, and secure wireless standard on the market today. The key
features of Bluetooth technology are robustness, low power, and low cost. The Bluetooth
specification defines a uniform structure for a wide range of devices to connect and
communicate with each other. It is an open specification for a short-range radio technology
for ad-hoc wireless communication of voice and data anywhere in the world. Bluetooth
provides a secure way to connect and exchange information between devices.
Bluetooth uses a low power radio technology called radio-hopping spread spectrum, which
chops up the data being sent and transmit chunks of it on the 79 bands in the range 2400-
2483.5 MHZ.Bluetooth operates in the open 2.4 GHz ISM band and is now found in a vast
array of products such as input devices, printers, medical devices, VoIP phones, whiteboards,
and surveillance cameras.
ORIGIN OF THE NAME AND LOGO
The name "Bluetooth" is taken from the 10th century Harold Bluetooth in English. The idea
behind Bluetooth technology was born in 1994, when a team of researchers at Ericsson
Mobile Communications, initiated a feasibility study of universal short-range, low-power
wireless connectivity as a way of eliminating cables between mobile phones and computers,
headsets and other devices. In 1998, this group evolved to the Bluetooth Special Interest
Group (SIG). Along with Ericsson, other founding members included Nokia, Intel, IBM and
Toshiba.
7/27/2019 technical report on Bluetooth
2/21
2
BLUETOOTH
The Bluetooth logo contains the latin letters H and B (H for harlad and B for Bluetooth)
Bluetooth technology is designed to allow collaboration between differing industries such as
the computing, mobile phone, and automotive markets. In addition to being paired with
cellphones, short range Bluetooth technology is also compatible with personal computers,
laptops, printers, GPS receivers, digital cameras, telephones, video game consoles and more
for various practical functions. Bluetooth is a developing world-wide, open and short range
communication between the internet and net devices and it defines communication protocols
between devices and computers.
2. The BASIC IDEA OF BLUETOOTH
Bluetooth is a standard and communication protocol primarily designed for lowpower consumption.
Communication within short range is possible via Bluetooth. Bluetooth chip is designed to replace cables. Information carried by the cable, is
transmitted at a special frequency to a receiver Bluetooth chip.
Bluetooth communicates on a frequency between 2.402 GHz to 2.480 GHz It can connect up to eight devices simultaneously in a piconet.
7/27/2019 technical report on Bluetooth
3/21
3
Figure :1
2.1 CORE BLUETOOTH PRODUCTS
Notebook PCs and Desktop computers Printers Cell phones Other handled devices Wireless peripherals CD players Headsets
7/27/2019 technical report on Bluetooth
4/21
4
Cordless Phones Telephones Answering Devices
Access points
2.2 TECHNICAL FEATURES
Connection Type Spread spectrum(Frequency Hopping)&Time division Duplex (1600 hops/sec)
Spectrum 2.4 GHz ISM open band (79 channels) Modulation Gaussian Frequency Shift Key Transmission power 1 mw-100 mw Data rate 1 Mbps Range 30 feet Supported Stations 8 devices Module size 9*9 mm Data security (Authentication) 128 bit key Data security ( Encryption) 8-128 bits
2.3 REQUIREMENTS
1. Bluetooth devices : Bluetooth exists in many products such as telephones, printers
and headsets. The technology transfers data between two or more devices that are near
to each other in low bandwidth situations.
2. Computer Requirements: A PC must have Bluetooth adapter in order to be able to
communicate with other Bluetooth devices ( such as mobile phones, mice and
7/27/2019 technical report on Bluetooth
5/21
5
keyboards). While some desktop computers and most recent laptops come with a
built-in Bluetooth adapter.
3. Mobile phone requirements: A mobile phone that is Bluetooth enabled is able to
pair with many devices.
3. BLUETOOTH CONNECTION PROCEDUERS
Operational mode of a Bluetooth enabled device is to be connected to other Bluetooth
enabled devices (in a piconet) and exchanging data with that Bluetooth enabled device. As
Bluetooth wireless technologyis an ad-hoc wireless communications technology there are a
number of operational procedures that enable piconets to be formed so that the subsequent
communications can take place.
For making a Bluetooth connection, it follows two procedures:-
1. Inquiry ( or discovery) Procedure2. Paging ( or Connecting) procedure
Figure 2: Bluetooth connection
http://www.radiodatacom.com/bluetooth-data-modules/bluetooth-basicshttp://www.radiodatacom.com/bluetooth-data-modules/bluetooth-basicshttp://www.radiodatacom.com/bluetooth-data-modules/bluetooth-basics7/27/2019 technical report on Bluetooth
6/21
6
3.1 Inquiry (discovery) Procedure
Bluetooth devices use inquiry to discover nearby devices and to be discovered. The inquiry
procedure is asymmetrical; A device that tries to find other nearby devices is known as an
inquiring device and actively sends inquiry requests, Devices that are ready to be found are
known as discoverable devices and listen for these inquiry requests and send responses. Both
inquiring and discoverable devices may already be connected to other devices in a piconet.
3.2 Paging (or connecting) procedure
The procedure for forming connections is asymmetrical as well. One device carries out the
page (connection) procedure. The other device is connectable (page scanning). The
procedure is targeted, so that the page is only responded to by one device. Both paging and
connectable devices may already be connected to other devices in a piconet. Bluetooth
enabled devices in a piconet. It is a network in which up to eight Bluetooth enabled devices
can be connected.
3.3 Role Switch Procedure
The role switch procedure is a method for swapping the roles of two devices connected in a
piconet. The procedure involves moving from the channel that is defined by the original
master device to the channel that is defined by the new master device.
Bluetooth essentially a networking standard that works at two levels:
1.
It provides agreement at the physical level- Bluetooth is radio transmission standard.
2. It provides agreement at the protocol level, where products have to agree on when bitsare sent, how many will be sent at a time and the parties in a conversation can be sure
that the message received is same as the message sent.
7/27/2019 technical report on Bluetooth
7/21
7
4. BLUETOOTH OPERATIONBluetooth is a standardized technology that is used to create temporary short-range wireless
communication systems. These Bluetooth wireless personal area networks are used to
connect personal accessories such as headsets, keyboards and portable devices to
communications equipment and networks. The Bluetooth system can dynamically discover
and connect to other nearby devices for communication.
Figure 3: BLUETOOTH OPERATION
The basic radio transmission process is used in the Bluetooth system. The above diagram
shows that the frequency range of the Bluetooth system ranges from 2.4 GHz to 2.483 GHz
and that the basic radio transmission packet time slot is 625 usec. It also shows that one
device in a Bluetooth piconet is the master (controller) and other devices are slaves to the
master. Each radio packet contains a local area piconet ID, device ID, and logical channel
identifier and the hopping sequence is normally determined by the master's Bluetooth device
address.
To setup a Bluetooth system, one of the devices is designated as a master (controlling) and
the other devices are setup as slaves (responding to the commands of the master).When the
Bluetooth devices come within close range of each other, an electronic conversation willoccur to determine whether or not they have data to share. The user does not have buttons to
command to give-the conversation starts automatically. When Bluetooth devices first
7/27/2019 technical report on Bluetooth
8/21
8
connect, there is a piconet master that initiates the connection, and the others are slave
devices. One piconet can have a maximum of seven active slave devices and one master
device. All communication within a piconet goes through the piconet master. Two or more
piconets together form a scatternet, which can be used to eliminate Bluetooth range
restrictions. It is not possible to be a master of two different piconets because a piconet is a
group of devices all synchronized on a hopping sequence set by the master. For that reason,
any devices that share a master must be on the same piconet. Bluetooth technology operates
in the unlicensed industrial, scientific and medical (ISM) band at 2.4 to 2.485 GHz, using a
spread spectrum, frequency hopping, full-duplex signal at a nominal rate of 1600 hops/sec.
The 2.4 GHz ISM band is available and unlicensed in most countries. Bluetooth devices
within a 10 to 100 meters (or 30 to 300 feet) range can share data with a throughput of 1
Mbps for Version 1.2 and up to 3 Mbps for Version 2.0 + Enhanced Data Rate (EDR). Data
is transmitted between Bluetooth devices in packets across the physical channel that is
subdivided into time units known as slots. The radio layer is the physical wireless connection.
To avoid interference with other devices that communicate in the ISM band, the modulation
is based on fast frequency hopping. Bluetooth divides the 2.4 GHz frequency band into 79
channels, 1 MHz apart (from 2.402 to 2.480 GHz), and uses this spread spectrum to hop from
one channel to another, up to 1,600 times per second.
Profiles are used with Bluetooth so that devices can communicate with each other and that
there is interoperability between vendors. These profiles define behaviours of the Bluetooth
devices and the roles and capabilities for specific types of applications. Hence Bluetooth uses
the spread spectrum frequency hopping technique to establish the Bluetooth connection
without any interference.
5. BLUETOOTH SECURITY
Security has played a major role in the invention of Bluetooth. The Bluetooth SIG has put
much effort into making Bluetooth a secure technology and has security experts who provide
critical security information. Bluetooth security procedures include authorization,
authentication and optional encryption. Bluetooth technology has built-in security such as
128 -bit encryption and PIN code authentication.
7/27/2019 technical report on Bluetooth
9/21
9
Bluetooth users can establish trusted devices that can exchange data without asking
permission. When any other device tries to establish a connection to the users gadget, the
user has to decide to allow it.
Service-level security work together to protect Bluetooth devices from unauthorized data
transmission requires that users make a conscious decision to open a file or accept a data
transfer. It offers several security modes and device manufactures determine which mode to
include in a Bluetooth-enabled gadget.
5.1 APPLICATION LAYER SECURITY
The Bluetooth General Access Profile defines three modes of security:
Security Mode 1: non-secure Security Mode 2: service level enforced security Security Mode 3: link level enforced security
Security Mode 1It does not provide security.A Bluetoothdevice in this mode allows any device to connect toit. This is useful for applications that don't explicitly require security, such as the exchange of
business cards.
Security Mode 2
Security Mode 2 works at the service level. It is secured at the application layer (in otherwords, it is secured after a connection has been established). An application can be written to
allow access to certain services (by another device) while restricting certain services.
Security Mode 3
Security Mode 3 works at the link level. It is secured before a connection is established
between two devices. The use of a link key (or PIN code, as seen in earlier sections) is usedto authenticate the identity of another device.
7/27/2019 technical report on Bluetooth
10/21
7/27/2019 technical report on Bluetooth
11/21
11
Figure 4 : Bluetooth authentication process
Encryption
Encryption protects the confidentiality of data transmitted between two Bluetooth devices.
The Bluetooth specification supports three modes of encryption:
Encryption Mode 1
No packets are encrypted in this mode.
Encryption Mode 2
Data transmitted to a specific device is encrypted, but data broadcast to multiple devices is
not.
Encryption Mode 3
All the data transmitted is encrypted.
The sequence for the encryption is:
1. A Key Generator generates an encryption key using as input the 96-bit AuthenticatedCipher Offset (a result returned by the earlier authentication process), the Link key, and the
32-bit random challenge. The size of the encryption key ranges from 8 to 128 bits, and is
negotiated between the master and the slave.
2. A key stream is produced using a cryptographic algorithm based on LFSR (LinearFeedback Shift Registers). The LFSR takes in as input the encryption key generated, the
master's address, the 32-bit random challenge, and the slot number to be used for the currentpacket.
7/27/2019 technical report on Bluetooth
12/21
12
3. The key stream produced is then xord with the plaintext ,which is then transmitted tothe master.
Figure 5 : Bluetooth encryption process
6. BLUETOOTH SECURITY CONCERNS
The PIN code used for establishing a link is usually short and thus easy to guess.
Longer PIN codes could be used. However, users normally prefer a shorter PIN code for
convenience.
Distribution of PIN codes in a large network is difficult. Fortunately, this is not amajor concern, as Bluetooth is commonly used for ad-hoc networking.
The 32-bit random challenge may generate numbers that follow a certain pattern. Thisreduces the effectiveness of the encryption.
Authentication is only at the device level; user-level authentication must be explicitlyimplemented.
As Bluetooth is a relatively new standard, the Bluetooth specifications are still undergoing
changes. Over time, we can expect to see more security measures being put in place. At the
moment, it is appropriate to apply some of the techniques used for securing network
communications on some types of Bluetooth connections.
7/27/2019 technical report on Bluetooth
13/21
7/27/2019 technical report on Bluetooth
14/21
14
8. BLUETOOTH Vs WI-FI
Bluetooth and Wi-Fi Both are communication techniques Both of them uses same frequency range and are versions of unlicensed wireless
technology but employ different modulating techniques.
Bluetooth is a replacement of cable for small applications while Wi-Fi is used forLAN access
Wi-Fi Provides higher output and covers greater distance but require more expensivehardware and higher consumption as compared to Bluetooth communication.
9. BENEFITS OF BLUETOOTH
Wireless:
Bluetooth wireless communication offers plenty of other advantages. When travellingwith your laptop or other wireless devices, you'll no longer have to worry about
bringing connection cables.
Bluetooth is actually in-expensive:
The Technology of Bluetooth is cheap for companies to implement, which results in
lower costs for the company.
Bluetooth is automatic:
Bluetooth doesn't need to set up a connection or push any buttons. When two or more
devices enter a range of up to 30 feet of each other, they will automatically begin to
communicate without having to do anything
Standardized protocol:
7/27/2019 technical report on Bluetooth
15/21
15
Bluetooth is standardized wireless, meaning that a high level of compatibility among
devices is guaranteed. Bluetooth will connect devices to each other even if they are
not of same model.
Low Interference:
Bluetooth devices almost always avoid interference from other wireless devices.
Bluetooth uses a technique known as frequency hopping, and also low power
wireless signals.
Low energy consumption:
As a result of Bluetooth using low power signals, the technology requires little energy
and will use less battery or electrical power. This is excellent benefit for mobile
devices as Bluetooth wont drain the battery.
Sharing voice and Data:
The standard for Bluetooth will allow compatible devices to share voice and data
communication.
Instant PAN:
Seven Bluetooth devices can be connected simultaneously to each other within the
range of up to 30 feet forming a piconet or PAN.
Upgradeable:
Upgradeable is a standard for Bluetooth .There are newer versions of Bluetooth in the
works, which offer many new advantages and backward compatible with older
versions.
7/27/2019 technical report on Bluetooth
16/21
16
The Technology stays:
Bluetooth is worldwide, universal wireless standard. As more and more devices starts
to use Bluetooth technology, more manufactures will be eager to make their product
compatible.
10. APPLICATIONS OF BLUETOOTH
More prevalent applications of Bluetooth includes
1. Wireless control of and communication between a mobile phone and hands free set.This is the one of earliest applications to become popular.
2. Wireless networking between computers in a confined space.3. Wireless communication with PC input and output devices, the most common being
the mouse, keyboard and printer.
4. Transfer of files, contact details, calendar appointments and reminders betweendevices with O-BEX ( Object Exchange Technology)
5. For controls where infrared was traditionally used.6. Game consoles use Bluetooth for their respective wireless controllers.7. Dial-up internet access on personal computers or PDAs using a data-capable mobile
phone as a modem.
8. Replacement of traditional wired serial communications in test equipments, GPSreceivers, medical equipment, bar code scanners and traffic control devices.
9. Hidden computing10.Personal area networking11.Cell phones acting as a modem for PCs and Laptops12.Data synchronization for Address books.13.PC and peripheral networking14.Enabling a connection of YOUR personal devices to cooperatively work together.
11. ADVANTAGESOF BLUETOOTH
1. Widely used: Bluetooth is really popular and keeps getting more popular as timepasses by. It is now widely used across countries and almost by everyone.
7/27/2019 technical report on Bluetooth
17/21
17
Companies are taking the benefit by using this in their new and future products to
make life much easier for everyone. Bluetooth can be used on cell phones,
laptops, music players, headsets ,printers and a lot more other products.
2. Feature simplicity: Anyone that does not have no knowledge about the Bluetoothtechnology can still be able to use the Bluetooth feature due to its simplicity and
the ease of use. The simplicity of it and the fact its wire free makes it very widely
used and utmost popular.
3. Free of charge: It is not an extra cell phone or cable that you have to add to yourbudget. Simply by the technology everyone can use it there is no need to pay a
penny for the service. There has not been any reporting lately on the companies
charging a month free or any fee for the people to use the Bluetooth feature.
4. Wireless: Bluetooth is a code free technology and do not have to worry aboutfinding the correct place to connect the extra long code.
5. Easy to control: With Bluetooth device it is easy to exchange data across the cellphones with ability to keep the information private.
6. Unlike infrared it is not a line of sight and t provides range up to 100 meters.Bluetooth is also a low power and low processing with an overhead protocol as it
is ideal for integration to small battery power devices.
7. Bluetooth technology is simple to install and expand8. Perfect for file transfer and printing application9. Simultaneous handling of data and voice on the same channel.
12. DISADVANTAGES OF BLUETOOTH
1. Battery use: This occurs mostly on the cell phones but also occur in other
technologies such as music players. More of the battery power is used when
Bluetooth is enabled on the cell phone all day. To disregard all this the user must
disable the Bluetooth when the transfer of data gets completed. It only takes few
minutes to enable or disable the Bluetooth so it is easy to save the battery by
disabling the Bluetooth when not in use.
7/27/2019 technical report on Bluetooth
18/21
18
2. Bluetooth internet: Throughout all devices, when using Bluetooth internet,t he
connection sometimes run very slow so Bluetooth internet is not highly suggested
for all cases
3. Infrared can have data rates of up to 4 Mbps, which provides very fast rates for
data transfer, while Bluetooth only offers 1MBbs.
4. The greater range and radio frequency of Bluetooth make it much more open to
interception and attack. For this reason security is a very key aspect to the
Bluetooth specification
Although there are few disadvantages, Bluetooth still remains the for short range
wireless technology for communications between the devices.
7/27/2019 technical report on Bluetooth
19/21
19
13. CONCLUSION
Bluetooth wireless is constantly growing in popularity because of the convenience of
exchanging information between mobile devices. As Bluetooth usage rises, so do the
security risks associated with the technology. Advantages to Bluetooth include the ability to
simultaneously handle both data and voice transmissions which enables users to enjoy a
variety of innovation solutions such as a hands-free headset for voice calls, printing and fax
capabilities, and synchronizing PDA, laptop, and mobile phone applications. Bluetooth users
should familiarize themselves with Bluetooth security issues before using Bluetooth devices,
and especially before they bring these devices into work place.
As there are lots of advantages and few disadvantages of Bluetooth technology. OverallBluetooth is a great thing to be using on all your devices that supports it. We can do lots of
things with it and includes cutting all the wires and cables attached to the cell phone.
7/27/2019 technical report on Bluetooth
20/21
20
14. REFERENCES
1. www.google.com2. www.bluetooth.com3. www.wikipedia.com
http://www.google.com/http://www.google.com/http://www.bluetooth.com/http://www.bluetooth.com/http://www.wikipedia.com/http://www.wikipedia.com/http://www.wikipedia.com/http://www.bluetooth.com/http://www.google.com/7/27/2019 technical report on Bluetooth
21/21
21
Top Related