Professional Documents
Culture Documents
ON
BLUETOOTH
TECHNOLOGY
Submitted by:
ELECTRONICS &
TELECOMMUNICATION
ENGINEERING
Gagan Jyoti Kalita
Roll No -- 139
1
Himu Kalita
Roll No -- 081
Himangshu Saud
Roll No -- 076
Mridul Barman
Roll No -- 085
2
Acknowledgement:
3
CONTENTS
Chapter Page
1. Introduction to Bluetooth 4
2. Bluetooth range 5
3. Uses of Bluetooth 5
4. Working of Bluetooth 7
5. Bluetooth Security 9
6. Competing Technologies 13
10. Application 28
11. Conclusions 30
4
Introduction to Bluetooth
5
home stereos, and digital MP3 players.
Bluetooth Range
These are very low power (typically 1 mill watt - 1/1000th of
a watt) and have a range of about 10 m (33 ft). The current
data rate is 1 Mbps with a 2.4-GHz bandwidth. With
Bluetooth, short range is actually a benefit, because it reduces
the chance of interference between your Bluetooth devices and
those belonging to other people nearby.
Uses of Bluetooth
6
Maximum Permitted Power
Range
Class
(approximate)
mW dBm
7
Working of Bluetooth Technology:
1)Uses frequency of 2.45 GHZ:
3)Connection establishment:
8
frquency hopping spread spectrum (FHSS)to avoid interference
from other devices or network i.e. each device changes its
modulation frequency 1600 times per second.
• Baseband layer:
Here products have to agree on when bits are sent, how many will
be sent at a time.The access method used in this technology is
TDMA(Time Division Multiple Access).Here the primary and
secondary communicate with each other using time slots.The
length of a time slot is exactly 625 micro sec.This means that
during the time that one frequency is used,a primary sends a frame
to a secondary,or a secondary sends a frame to a primary.
9
Bluetooth Security
10
doesn't get very far. When the virus arrives in the user's cell phone,
the user has to agree to open it and then agree to install it. This has,
so far, stopped most cell-phone viruses from doing much damage.
11
cards. To meet these differing demands, the Bluetooth
specification defines three security modes that cover the
functionality and application of devices.
Bluejacking:
12
bluejacking, followed by bluesnarfing, and as this article will go
into more detail, Bluebugging.
Bluebugging was first discovered by the German researcher named
Herfurt. His Bluebug program allowed the user to ultimately take
control of a victim's phone, which, in turn could be used to call the
user's phone. In other words, this meant that the Bluebug user
could simply listen to any conversation his/her victim was having
in real life/time. In addition, this program allowed for the ability to
create a call forwarding application whereby the user could receive
calls intended for his/her victim.
Bluesnarfing
Bluesnarfing is the unauthorized access of information from a
wireless device through a Bluetooth connection, often between
phones, desktops, laptops, and PDAs. This allows access to a
calendar, contact list, emails and text messages and on some
phones users can copy pictures and private videos. Currently
available programs must allow connection and to be 'paired' to
another phone to copy content. There may be other programs that
can break into the phones without any control, but if they exist
they are not made publicly available by the developer. One
instance of Bluesnarfing software that was demonstrated (but never
made available for download) utilised weaknesses in the Bluetooth
connection of some phones. This weakness has since been patched
by the Bluetooth standard. There seem to be no available reports of
phones being Bluesnarfed without pairing, since the patching of
the Bluetooth standard.
Bluesnarfing is much more serious than bluejacking, but both
exploit others' Bluetooth connections without their knowledge.
Any device with its Bluetooth connection turned on and set to
"discoverable" (able to be found by other Bluetooth devices in
range) may be susceptible to Bluejacking, and possibly to
Bluesnarfing when and if Bluesnarfing of the current Bluetooth
security becomes possible. By turning off this feature, the potential
13
victim can be safer from the possibility of being Bluesnarfed;
although a device that is set to "hidden" may be Bluesnarfable by
guessing the device's MAC address via brute force.
Competing Technologies
Besides Bluetooth many other technologies exist like IrDA, Home
RF (SWAP) that provide similar or related services. A quick
glance into their scope and properties would help putting all of
these into perspective. Let’s look at the features of Bluetooth first
1) IrDA
IrDA is an international organization that creates and
promotes interoperable, low-cost infrared data
interconnection standards. IrDA has a set of protocols
covering all layers of data transfer and in addition has some
network management and interoperability designs. IrDA
protocols have IrDA DATA as the vehicle for data delivery
and IrDA CONTROL for sending the control information.
14
Features:
IrDA vs Bluetooth
15
achieve interoperability with IrDA and WAP. In addition, a host of
other applications will be able to use the Bluetooth technology and
protocols.
2) HOME RF
16
• Data Security : Blowfish encryption algorithm (over 1 trillion
codes)
SWAP vs Bluetooth
WI-FI vs Bluetooth
17
Wi-Fi is a traditional Ethernet network, and requires configuration
to set up shared resources, transmit files, and to set up audio links
(for example, headsets and hands-free devices). Wi-Fi uses the
same radio frequencies as Bluetooth, but with higher power,
resulting in a stronger connection. Wi-Fi is sometimes called
"wireless Ethernet." This description is accurate, as it also provides
an indication of its relative strengths and weaknesses. Wi-Fi
requires more setup but is better suited for operating full-scale
networks; it enables a faster connection, better range from the base
station, and better security than Bluetooth.
18
Specifications and features
The Bluetooth specification was developed in 1994 by Jaap
Haartsen and Sven Mattisson, who were working for Ericsson in
Lund, Sweden.[13] The specification is based on frequency-hopping
spread spectrum technology.
Versions 1.0 and 1.0B had many problems, and manufacturers had
difficulty making their products interoperable. Versions 1.0 and
1.0B also included mandatory Bluetooth hardware device address
(BD_ADDR) transmission in the Connecting process (rendering
anonymity impossible at the protocol level), which was a major
setback for certain services planned for use in Bluetooth
environments.
• Bluetooth 1.1
• Bluetooth 1.2
19
• Adaptive frequency-hopping spread spectrum (AFH), which
improves resistance to radio frequency interference by
avoiding the use of crowded frequencies in the hopping
sequence.
• Higher transmission speeds in practice, up to 721 kbit/s, than
in 1.1.
• Extended Synchronous Connections (eSCO), which improve
voice quality of audio links by allowing retransmissions of
corrupted packets, and may optionally increase audio latency
to provide better support for concurrent data transfer.
• Host Controller Interface (HCI) support for three-wire
UART.
• Ratified as IEEE Standard 802.15.1-2005[15]
• Introduced Flow Control and Retransmission Modes for
L2CAP.
20
• Three times the transmission speed (2.1 Mbit/s) in some
cases.
• Reduced complexity of multiple simultaneous connections
due to additional bandwidth.
• Lower power consumption through a reduced duty cycle.
21
up to several times per second. In contrast, the 2.1 + EDR
specification allows pairs of devices to negotiate this value
between them to as infrequently as once every 10 seconds.
Encryption pause/resume (EPR)
Enables an encryption key to be changed with less
management required by the Bluetooth host. Changing an
encryption key must be done for a role switch of an
encrypted ACL link, or every 23.3 hours (one Bluetooth day)
encryption is enabled on an ACL link. Before this feature
was introduced, when an encryption key is refreshed the
Bluetooth host would be notified of a brief gap in encryption
while the new key was generated; so the Bluetooth host was
required to handle pausing data transfer (however data
requiring encryption may already have been sent before the
notification that encryption is disabled has been received).
With EPR, the Bluetooth host is not notified of the gap, and
the Bluetooth controller ensures that no unencrypted data is
transferred while they key is refreshed.
Secure simple pairing (SSP)
Radically improves the pairing experience for Bluetooth
devices, while increasing the use and strength of security. See
the section on Pairing below for more details. It is expected
that this feature will significantly increase the use of
Bluetooth.[19]
Near field communication (NFC) cooperation
Automatic creation of secure Bluetooth connections when
NFC radio interface is also available. This functionality is
part of SSP where NFC is one way of exchanging pairing
information. For example, a headset should be paired with a
Bluetooth 2.1 + EDR phone including NFC just by bringing
the two devices close to each other (a few centimeters).
Another example is automatic uploading of photos from a
mobile phone or camera to a digital picture frame just by
bringing the phone or camera close to the frame.[20][21]
Non-Automatically-Flushable Packet Boundary Flag (PBF)
22
Using this feature L2CAP may support both isochronous
(A2DP media Streaming) and asynchronous data flows
(AVRCP Commands) over the same logical link by marking
packets as automatically-flushable or non-automatically-
flushable by setting the appropriate value for the
Packet_Boundary_Flag in the HCI ACL Data Packet
• Bluetooth 3.0 + HS
Alternate MAC/PHY
Enables the use of alternative MAC and PHYs for
transporting Bluetooth profile data. The Bluetooth Radio is
still used for device discovery, initial connection and profile
configuration, however when lots of data needs to be sent,
the high speed alternate MAC PHY (802.11, typically
associated with Wi-Fi) will be used to transport the data. This
means that the proven low power connection models of
Bluetooth are used when the system is idle, and the low
power per bit radios are used when lots of data needs to be
sent.
Unicast connectionless data
Permits service data to be sent without establishing an
explicit L2CAP channel. It is intended for use by applications
that require low latency between and
reconnection/transmission of data. This is only appropriate
for small amounts of data.
Read encryption key size
23
Introduces a standard HCI command for a Bluetooth host to
query the encryption key size on an encrypted ACL link. The
encryption key size used on a link is required for the SIM
Access Profile, so generally Bluetooth controllers provided
this feature in a proprietary manner. Now the information is
available over the standard HCI interface.
Enhanced Power Control
Updates the power control feature to remove the open loop
power control, and also to clarify ambiguities in power
control introduced by the new modulation schemes added for
EDR. Enhanced power control removes the ambiguities by
specifying the behaviour that is expected. The feature also
adds closed loop power control, meaning RSSI filtering can
start as the response is received. Additionally, a "go straight
to maximum power" request has been introduced, this is
expected to deal with the headset link loss issue typically
observed when a user puts their phone into a pocket on the
opposite side to the headset.
24
On June 12, 2007, Nokia and Bluetooth SIG had announced that
Wibree will be a part of the Bluetooth specification, as an ultra-low
power Bluetooth technology.[24] Expected use cases include
watches displaying Caller ID information, sports sensors
monitoring the wearer's heart rate during exercise, and medical
devices. The Medical Devices Working Group is also creating a
medical devices profile and associated protocols to enable this
market. Bluetooth low energy technology is designed for devices
to have a battery life of up to one year.
25
Future of Bluetooth Technology
Many Bluetooth pilot products have already been rolled into the
market and backed by big vendors, which is a healthy sign for the
overall acceptance of the technology. The support for Bluetooth is
not limited to companies that develop only Bluetooth enabled
products.
26
industries as well. The adoption of Bluetooth technology is
expected to spread throughout the industry of computers.
27
Advantages:
Free of Charge: Best of all, we do not have to pay a penny for the
service! It's not an extra cell phone or cable bill that we have to add
to your budget. Simply by the technology and we're done! All we
need to do is connect it with what we are using. There hasn't been
any reporting lately on companies charging a monthly fee or any
fee for people to use the Bluetooth feature
Data Privacy: Even though we are able to exchange data across our
cell phones, we still have the ability to keep your information
private. In order to make a transfer or allow someone to access the
files on your phone, we will have to give them access by accepting
28
or rejecting the request through our phone.
Disadvantages:
Battery Use: This occurs mostly on the cell phone but also occurs
in other technology such as music players. We're using up more
battery power when we leave our Bluetooth enabled on our phone
all day. To disregard all this, the best thing that we can possibly do
is disable it once we are completed with the transfer. It only takes
a few seconds to enable and disable so it wouldn't hurt to disable it
once we are done using it.
As you can notice that there are quite a bit of advantages and fewer
disadvantages. Overall, Bluetooth is a great thing to be using on all
your devices that supports it. You can do so much with it and
includes cutting all the cords attached to your devices.
Applications:
29
• The Bluetooth technology connects all our office peripherals
wirelessly. We can connect our PC or notebook to printers,
scanners and faxes without the troublesome cable
attachments.
30
Conclusion:
31
BIBLIOGRAPHY:
32