Network Security Using Bluetooth

Only available on StudyMode
  • Download(s) : 75
  • Published : March 5, 2013
Open Document
Text Preview

Bluetooth is a wireless protocol utilizing short-range communications technology facilitating data transmissions over short distances from fixed and/or mobile devices, creating wireless PANs. Bluetooth provides a way to connect and exchange information between devices such as mobile phones, telephones, laptops, personal computers, printers, GPS receivers, digital cameras. So the security of the Bluetooth becomes very important. We have different types of security for Bluetooth to protect the data over the transmission Here we discuss some of the Bluetooth security method.

Authentication-A goal of Bluetooth is the identity verification of communicating devices. This security service addresses the question “Do I know with whom I’m communicating?” This service provides an abort mechanism if a device cannot authenticate properly Confidentiality-Confidentiality, or privacy, is another security goal of Bluetooth. The intent is to prevent information compromise caused by eavesdropping (passive attack). This service, in general, addresses the question “Are only authorized devices allowed to view my data?” Authorization-One another goal of Bluetooth is a security service developed to allow the control of resources. This service addresses the question “Has this device been authorized to use this service?”


Bluetooth Overview
Ad hoc networks today are based primarily on Bluetooth technology. Bluetooth is an open standard for short-range digital radio. It is touted as a low-cost, low-power, and low-profile technology that provide a mechanism for creating small wireless networks on an ad hoc basis. Bluetooth is considered a wireless PAN technology that offers fast and reliable transmission for both voice and data. Untethered Bluetooth devices will eliminate the need for cables and provide a bridge to existing networks. Bluetooth can be used to connect almost any device to any other device. An example is the connection between a PDA and a mobile phone. The goal of Bluetooth is to connect disparate devices (PDAs, cell phones, printers, faxes, etc.) together wirelessly in a small environment such as an office or home. According to the leading proponents of the technology, Bluetooth is a standard that will ultimately Eliminate wires and cables between both stationary and mobile devices • Eliminate wires and cables between both stationary and mobile devices • Facilitate both data and voice communications

• Offer the possibility of ad hoc networks and deliver synchronicity between personal devices.

Bluetooth is designed to operate in the unlicensed ISM (industrial, scientific, medical applications) band that is available in most parts of the world, with variation in some locations. Bluetooth-enabled devices will automatically locate each other, but making connections with other devices and forming networks requires user action. Frequency and Data Rates

The designers of Bluetooth like those of the 802.11 WLAN standard designed Bluetooth to operate in the unlicensed 2.4 GHz–2.4835 GHz ISM frequency band. Because numerous other technologies also operate in this band, Bluetooth uses a frequency-hopping spread-spectrum (FHSS) technology to solve interference problems. OPERATING RANGE OF BLUETOOTH

The FHSS scheme uses 79 different radio channels by changing frequency about 1,600 times per second. One channel is used in 625 microseconds followed by a hop in a pseudo-random order to another channel for another 625 microsecond transmission; this process is repeated continuously. As stated previously, the ISM band has become popular for wireless communications because it is available worldwide and does not require a license. In the ISM band, Bluetooth technology permits...
tracking img