0% found this document useful (0 votes)
136 views22 pages

Soumi de (1 YR) Roll No-27 Pdsit, Shibpur

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1/ 22

SOUMI DE(1ST YR) ROLL NO-27 PDSIT, SHIBPUR

Bluetooth Basics: Bluetooth is a open wireless LAN(ad-hoc) technology standard

for exchanging data over short distance. Bluetooth was originally started as a project by telecom vendor Ericsson. It is the implementation of protocol defined by IEEE802.5 standard.

MASTERMIND OF BLUETOOTH

Bluetooth is a cable replacement technology

Different networks created by bluetooh:

Piconet

Scatternet (Comprising 3 piconets)

Bluetooth layers

Light On Layers
The Bluetooth system is operating in the(2.402-2.483)

GHz ISM (Industrial Scientific Medicine) band divided into 79 channels of 1MHz each.
Radiowave & Microwave Infrared Light Wave

3khz

2.402G

2.483G 300gHz

400Thz

900T

Bluetooth Range

79

Bluetooth uses (FHSS) in the physical layer to avoid interference from other devices .Dwell time is 625us. Baseband is equivalent to MAC sublayers with access

method TDD-TDMA(Time division duplex TDMA). L2CAP is equivalent to LLC sublayer,used for data exchange on the ACL link.

Bluetooth Stack
A bluetooth stack is the implementation of the bluetooth

protocol stack(*protocol stack is the implementation of network suite where suite is the definition of protocols and stack is the software implementation of them.) Bluetooth Protocol Stack is splitted into controller stack & host stack. Controller stack is implemented in a silicon device containing bluetooth radio & microprocessor. It includes ACL,SCO,LMP,BASEBAND,RADIO. Host stack is generally implemented as a part of OS or installable package on the top of OS. It includes L2CAP,SDP,RFCOMM,AVCTP etc. Contd..

Widdcomm was the first bluetooth stack for the windows

operating system. Windows XP includes a in-built bluetooth stack and all the later version of windows do the same. Bluez is the bluetooth protocol stack for LINUX os. Stonestreet One is a leading global provider of bluetooth protocol stack software,known as Bluetopia to leading companies like Motorolla,Nokia,IBM etc. Bluetopia + LE is the latest version of the software the runs specifically for Bluetooth low energy technology.

Bluetooth Programming Concepts


Few Steps:Choosing a device with which to communicate with the help of bluetooth address, same as 48bit MAC address.This address is used at all the layer,from lower level radio layer to upper level application layer. Choosing a communication protocol.Generally RFMM is treated as transport layer protocol and L2CAP is treated as data link layer protocol. OBEX or object exchange is a very popular protocol for exchanging objects like music,clip even an application program.. Socket programming is done to establish connection b/w devices

/* tiny code to find bluetooth enable device in python*/ from bluetooth import* target_name=soumi /*name of target device*/ target_address=none nearby_devices=discover_devices/*return list of detected devices*/ for addresses in nearby devices: if target_name==lookup_name(address):/*to connect to each
devices,request their names,compare those with given*/`

target_address=address break if target_address is not none: Printfound target bluetooth device with address,target_ad Else: Printcould not find.

Bluetooth Profiles
A Bluetooth profile is a wireless interface

specification for Bluetooth-based communication between devices. each profile specification contains info on the following topics: Dependencies on other profiles Suggested user interface formats Specific parts of the Bluetooth protocol stack used by the profile.

List of Profile
Advanced Audio Distribution Profile (A2DP) Audio/Video Remote Control Profile (AVRCP) Basic Imaging Profile (BIP) Basic Printing Profile (BPP) Common ISDN Access Profile (CIP) Cordless Telephony Profile (CTP) Device ID Profile (DID) Dial-up Networking Profile (DUN) Fax Profile (FAX) File Transfer Profile (FTP) General Audio/Video Distribution Profile (GAVDP) Generic Access Profile (GAP) Generic Object Exchange Profile (GOEP) Hard Copy Cable Replacement Profile (HCRP) Hands-Free Profile (HFP) Human Interface Device Profile (HID) Headset Profile (HSP) Intercom Profile (ICP) LAN Access Profile (LAP) Object Push Profile (OPP) Personal Area Networking Profile (PAN) Phone Book Access Profile (PBAP) Serial Port Profile (SPP) Service Discovery Application Profile (SDAP) SIM Access Profile (SAP, SIM) Synchronisation Profile (SYNCH) Video Distribution Profile (VDP) Wireless Application Protocol Bearer (WAPB)

Bluetooth Security
Principles of good Security Confidentiality Data kept private Integrity Data has not been modified Availability Data is available when needed Authentication Identity of peer is proven Version wise we have 4 diff security mode: Security Mode 1 is non-secure. Security functionality leaves the device and connections susceptible to attackers. Security Mode 1 is only supported in v2.0 + EDR (and earlier) devices. Contd..

In Security Mode 2, a service level-enforced security mode,

security procedures are initiated after LMP link establishment but before L2CAP channel establishment. All Bluetooth devices can support Security Mode 2.
In Security Mode 3, the link level-enforced security mode mode,

a Bluetooth device initiates security procedures before the physical link is fully established. It supports authentication & encryption.
Security Mode 4 (introduced in Bluetooth v2.1 + EDR) is a

service level enforced security mode in which security procedures are initiated after link setup. Security Mode 4 is mandatory for communication between v2.1 + EDR devices.

Security Risks:
Bluejacking is the process of sending unsolicited messages, or

business cards, to bluetooth enabled devices. In order for bluejacking to work, both devices must be within 10 meters of one another. Bluesnarfing is a method of hacking into a Bluetooth-enabled mobile phone and copying its entire contact book, calendar or anything else stored in the phone memory. The backdoor attack involves establishing a trust relationship through the pairing. mechanism, but ensuring that it no longer appears in the targets register of paired device. The cabir worm is malicious software that uses Bluetooth technology to seek out available Bluetooth devices and send itself to them.

Further Research on Bluetooth


Bluetooth 3.0 + High Speed, a specification that was

announced in April 2009, which combines classic Bluetooth and Wi-Fi to transmit large data files. Bluetooth device discovery is a time-intensive phase of the Bluetooth connection-establishment procedure. first establishing an IrDA connection between two devices equipped with both Bluetooth and IrDA capabilities and then exchanging Bluetooth device discovery information via the established IrDA connection. Bluetooth devices security risks rising : According to research there is a critical problems in all bluetoothenable car kits.

THANKS FOR YOUR PATIENCE

You might also like