Soumi de (1 YR) Roll No-27 Pdsit, Shibpur
Soumi de (1 YR) Roll No-27 Pdsit, Shibpur
Soumi de (1 YR) Roll No-27 Pdsit, Shibpur
for exchanging data over short distance. Bluetooth was originally started as a project by telecom vendor Ericsson. It is the implementation of protocol defined by IEEE802.5 standard.
MASTERMIND OF BLUETOOTH
Piconet
Bluetooth layers
Light On Layers
The Bluetooth system is operating in the(2.402-2.483)
GHz ISM (Industrial Scientific Medicine) band divided into 79 channels of 1MHz each.
Radiowave & Microwave Infrared Light Wave
3khz
2.402G
2.483G 300gHz
400Thz
900T
Bluetooth Range
79
Bluetooth uses (FHSS) in the physical layer to avoid interference from other devices .Dwell time is 625us. Baseband is equivalent to MAC sublayers with access
method TDD-TDMA(Time division duplex TDMA). L2CAP is equivalent to LLC sublayer,used for data exchange on the ACL link.
Bluetooth Stack
A bluetooth stack is the implementation of the bluetooth
protocol stack(*protocol stack is the implementation of network suite where suite is the definition of protocols and stack is the software implementation of them.) Bluetooth Protocol Stack is splitted into controller stack & host stack. Controller stack is implemented in a silicon device containing bluetooth radio & microprocessor. It includes ACL,SCO,LMP,BASEBAND,RADIO. Host stack is generally implemented as a part of OS or installable package on the top of OS. It includes L2CAP,SDP,RFCOMM,AVCTP etc. Contd..
operating system. Windows XP includes a in-built bluetooth stack and all the later version of windows do the same. Bluez is the bluetooth protocol stack for LINUX os. Stonestreet One is a leading global provider of bluetooth protocol stack software,known as Bluetopia to leading companies like Motorolla,Nokia,IBM etc. Bluetopia + LE is the latest version of the software the runs specifically for Bluetooth low energy technology.
/* tiny code to find bluetooth enable device in python*/ from bluetooth import* target_name=soumi /*name of target device*/ target_address=none nearby_devices=discover_devices/*return list of detected devices*/ for addresses in nearby devices: if target_name==lookup_name(address):/*to connect to each
devices,request their names,compare those with given*/`
target_address=address break if target_address is not none: Printfound target bluetooth device with address,target_ad Else: Printcould not find.
Bluetooth Profiles
A Bluetooth profile is a wireless interface
specification for Bluetooth-based communication between devices. each profile specification contains info on the following topics: Dependencies on other profiles Suggested user interface formats Specific parts of the Bluetooth protocol stack used by the profile.
List of Profile
Advanced Audio Distribution Profile (A2DP) Audio/Video Remote Control Profile (AVRCP) Basic Imaging Profile (BIP) Basic Printing Profile (BPP) Common ISDN Access Profile (CIP) Cordless Telephony Profile (CTP) Device ID Profile (DID) Dial-up Networking Profile (DUN) Fax Profile (FAX) File Transfer Profile (FTP) General Audio/Video Distribution Profile (GAVDP) Generic Access Profile (GAP) Generic Object Exchange Profile (GOEP) Hard Copy Cable Replacement Profile (HCRP) Hands-Free Profile (HFP) Human Interface Device Profile (HID) Headset Profile (HSP) Intercom Profile (ICP) LAN Access Profile (LAP) Object Push Profile (OPP) Personal Area Networking Profile (PAN) Phone Book Access Profile (PBAP) Serial Port Profile (SPP) Service Discovery Application Profile (SDAP) SIM Access Profile (SAP, SIM) Synchronisation Profile (SYNCH) Video Distribution Profile (VDP) Wireless Application Protocol Bearer (WAPB)
Bluetooth Security
Principles of good Security Confidentiality Data kept private Integrity Data has not been modified Availability Data is available when needed Authentication Identity of peer is proven Version wise we have 4 diff security mode: Security Mode 1 is non-secure. Security functionality leaves the device and connections susceptible to attackers. Security Mode 1 is only supported in v2.0 + EDR (and earlier) devices. Contd..
security procedures are initiated after LMP link establishment but before L2CAP channel establishment. All Bluetooth devices can support Security Mode 2.
In Security Mode 3, the link level-enforced security mode mode,
a Bluetooth device initiates security procedures before the physical link is fully established. It supports authentication & encryption.
Security Mode 4 (introduced in Bluetooth v2.1 + EDR) is a
service level enforced security mode in which security procedures are initiated after link setup. Security Mode 4 is mandatory for communication between v2.1 + EDR devices.
Security Risks:
Bluejacking is the process of sending unsolicited messages, or
business cards, to bluetooth enabled devices. In order for bluejacking to work, both devices must be within 10 meters of one another. Bluesnarfing is a method of hacking into a Bluetooth-enabled mobile phone and copying its entire contact book, calendar or anything else stored in the phone memory. The backdoor attack involves establishing a trust relationship through the pairing. mechanism, but ensuring that it no longer appears in the targets register of paired device. The cabir worm is malicious software that uses Bluetooth technology to seek out available Bluetooth devices and send itself to them.
announced in April 2009, which combines classic Bluetooth and Wi-Fi to transmit large data files. Bluetooth device discovery is a time-intensive phase of the Bluetooth connection-establishment procedure. first establishing an IrDA connection between two devices equipped with both Bluetooth and IrDA capabilities and then exchanging Bluetooth device discovery information via the established IrDA connection. Bluetooth devices security risks rising : According to research there is a critical problems in all bluetoothenable car kits.