Preview

Network Security Using Bluetooth

Better Essays
Open Document
Open Document
2593 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Network Security Using Bluetooth
ABSTRACT
Bluetooth is a wireless protocol utilizing short-range communications technology facilitating data transmissions over short distances from fixed and/or mobile devices, creating wireless PANs.
Bluetooth provides a way to connect and exchange information between devices such as mobile phones, telephones, laptops, personal computers, printers, GPS receivers, digital cameras.
So the security of the Bluetooth becomes very important. We have different types of security for Bluetooth to protect the data over the transmission
Here we discuss some of the Bluetooth security method.
Authentication-A goal of Bluetooth is the identity verification of communicating devices. This security service addresses the question “Do I know with whom I’m communicating?” This service provides an abort mechanism if a device cannot authenticate properly
Confidentiality-Confidentiality, or privacy, is another security goal of Bluetooth. The intent is to prevent information compromise caused by eavesdropping (passive attack). This service, in general, addresses the question “Are only authorized devices allowed to view my data?”
Authorization-One another goal of Bluetooth is a security service developed to allow the control of resources. This service addresses the question “Has this device been authorized to use this service?”

GLOSSARY
PAN - PERSONAL AREA NETWORKS
LFSR - LINEAR FEEDBACK SHIFT REGISTER
KG - KEY GENERATOR
FHSS - FREQUENCY-HOPPING SPREAD- SPECTRUM
L2CAP - LOGICAL LINK CONTROL AND ADAPTATION PROTOCOL

Bluetooth Overview
Ad hoc networks today are based primarily on Bluetooth technology. Bluetooth is an open standard for short-range digital radio. It is touted as a low-cost, low-power, and low-profile technology that provide a mechanism for creating small wireless networks on an ad hoc basis. Bluetooth is considered a wireless PAN technology that offers fast and reliable transmission for both voice and data. Untethered Bluetooth devices will

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Next we would like to equip each truck with Bluetooth technology to seamlessly keep our customers connected with our drivers via phone. Our drivers are already using cellphones, however, with the current law, only Bluetooth devices are legal to use in our trucks. We are proposing purchasing Aliph Jawbone Era Bluetooth…

    • 407 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Description . . . . . . . . . . . : Bluetooth Device (Personal Area Network)…

    • 355 Words
    • 3 Pages
    Best Essays
  • Better Essays

    NETW471 Course Project

    • 2998 Words
    • 9 Pages

    Blue-tooth is a great emerging technology being used today, which also has potential for much more uses than the tradition bluetooth headset. Bluetooth connects gadgets together, helping users listen to music, talk on phones without having to deal with frustrating cords and wires. To understand how a Bluetooth connection works, I will use an example such as a phone connected to wireless speaker. First, each device is equipped with Bluetooth connectivity, a feature that requires both software and hardware components. On the hardware side, an antenna-equipped chip in both devices sends and receives signals at a specific frequency. The software interprets incoming Bluetooth signals and sends them out in ways other devices can read and understand. In the case of the wireless speaker, the phone will know how to send audio files and information in a format that the speaker understands, while the speaker can interpret these signals–as well as other indicators such as volume and track controls–from the phone.…

    • 2998 Words
    • 9 Pages
    Better Essays
  • Better Essays

    The network covers the connection between two devices connected at a close range, using a standard such as Bluetooth.…

    • 1327 Words
    • 6 Pages
    Better Essays
  • Good Essays

    unit 8 assignement

    • 920 Words
    • 3 Pages

    Wireless technology has become an increasingly crucial part of today's world. From health care and retail to academia across the world, wireless systems are improving the rate and ease with which data is sent and received. Two specific examples of the wireless technology used today personally and professionally are local area networks (LAN) and personal area networks (PAN).…

    • 920 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The use of wireless technology in business and everday life is prevelant in today’s society as a whole. I have a wireless phone use, use Bluetooth and wireless internet on my laptop, as well as being able to transmit ans share internet, in my home and…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    It is estimated that Bluetooth wireless speakers alone will generate roughly $430 billion in revenue worldwide in 2014 alone (Cassagnol & Joseph, 2014). Bluetooth Technology Bluetooth technology is also found in computers and computer accessories, like mice and headsets for video games Bluetooth technology is now also found in many places in the medical field, for example in bedside telemetry monitoring equipment that remote transmits a patient’s cardiac rhythm to the monitor room and nurse’s station simultaneously in real time, alerting medical personal immediately of…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Application Requirements

    • 274 Words
    • 2 Pages

    |Two current applications of WPANs |PDAs and Smart Phones, even tablets using Bluetooth connections. |…

    • 274 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Most Bluetooth devices use a Class 2 radio that has a range of ____ feet.…

    • 724 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    remote access it255

    • 345 Words
    • 2 Pages

    • The power of access points will be turned down to a minimum that still allows…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Wireless Signals

    • 551 Words
    • 3 Pages

    Wireless signals are all around us as we walk or drive around the city or town where we live. The four types of wireless technologies that are out there are Wi-Fi, Cellular, Bluetooth, and WiMAX. We will be looking at these types of wireless technologies a little more in depth, where are they most commonly used, and how they differ from one another. The first wireless technology that we will be looking at is the Wi-Fi wireless signal. The Wi-Fi signal is mainly associated with computer networking, the specification used to create a wireless local area network is the IEEE 802.11. One would use this type of wireless technology if you were a business owner opening up a coffee shop and needed a public network. The network would have a wired connection to an internet source, then leading to a wireless router that transmits and receives the data from all of the customer’s devices that want to use the Wi-Fi. This will also connect all of the devices to one another through the network. The next type of wireless technology that we will be looking at is Cellular. This type of wireless technology is most often associated with wireless telephones. The cellular network is connected to cells that will enable a user to move around freely while staying connected to the network. This type of signal is used everywhere you go nowadays and are used by everyone. There are a multitude of devices that use these networks at one time and those include, smart phones, tablets, and some computers can use the cell towers to get a signal to be able to use the internet. The first generation of cellular signals was completely analog, and from there with the growing demand of faster speeds and better connectivity technology brought us 2G, 3G, and the ever popular 4G phones. Bluetooth is the next technology that we will touch on and is very similar to the Wi-Fi and cellular networks but on…

    • 551 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    The concepts of wireless network security consist of commitment of cyber security and maintaining security based on the latest development and exploits against the network K.W. Ross, J. K. (2012). Wireless Network Security is based on the principles of cryptography, message integrity, authentication, securing e-mails, securing TCP connections: SSL, securing Network layer: IPsec, securing wirelsess: LANs, securing the operational security structure, such as the firewalls and the IDS K.W. Ross, J. K. (2012). This security measure would cover the detection of intrusions, unauthorized usage, authentication, hashing, digital certification, updated security software, network security, hacking prevention, phishing prevention and encryption K.W. Ross, J. K. (2012). There are many risks, threats, and vulnerabilities with online access and usage of the internet, regardless if wired or wireless and all should be secured. Wireless devices communicate through radio without a connection to anything physical Radack, S. (n.d.). The wireless device may be a cell phone, laptop, local area network, remote controls, stereos, personal network, microphones, a headphone, IPad, IPod, etc. It is important to secure the access points because the system may be compromised by unauthorized persons for theft, or other risk factors. The internet could be used by someone unknown, without the user’s permission or knowledge and simply to commit crimes using the user’s credentials. This report will show the importance of securing a wireless system and why it is important.…

    • 1936 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Mobile And Wireless

    • 455 Words
    • 1 Page

    The foundation of any network is some sort of pathway for digital data (bits) to move back and forth between connected agents. Cables, ranging from coaxial to optical, have long dominated this realm. However, wireless is increasingly emerging as a viable alternative to direct physical connection (Stanford University, 2003). Wireless includes many various mediums such as AM, FM, HD and SiriusXM radio. Broadcast and satellite TV, and most, if not all, internet access and cellphones, are now wireless.…

    • 455 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Remote access through these smart mobile devices offers a number of benefits as well as faster answers to events, lower overall costs for operator line hardware, and cheaper travel expenses. These are just some of the important factors that smart mobile device procedure is quickly growing in industrial automation applications. Because this is becoming a more acceptable way of communicating between employees, employers, clients, etc, it is essential that any smart mobile device, whether it be a cell phone, tablet and/or personal computer, that is used for business purposes be controlled through suppliers such as Tofino Security, which assist with automation communications procedures. The scanning of a barcode by a smart mobile device at a machine or a specific location can allow deeper level access by a maintenance person, assisting with keeping a tight control of the information that is being used and shared within that particular mobile device. This particular practice, although burdensome, can help relieve some risk.…

    • 1279 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    W03 Slim Changelog

    • 5599 Words
    • 33 Pages

    V29 (upcoming): ● Note 3: ● Kernel update ­ changelog here ● Common: ● Fix telephony proximity option ● Merge latest sources, many fixes and improvements across build ● Fix a FC while BT music streaming ● Telephony: fix tdsdma asu invalid value ● Telephony: Set the value of min match according to one property ● framework:Thread synchronization for UI update ● Revert "Revert "Fix fatal exception due to missing looper for current thread." " ● core: add support for Welsh ● StatusBar Ticker Option ● Framework: Don't needlessly create shared pref objects V28: ● Note 3: ● Turn off s­pen button while screen is off, avoid s­pen going unresponsive ● Many bluetooth updates ● Kernel update ­ changelog here ● Common: ● Add SlimLauncher, still in early stages will be worked on ● Remove Nova launcher ● Proximity Wake: Add support for checking proximity when waking device ● Option to force expanded notifications ● Telephony: Option to enable speaker on proximity ● Framework: Don't collapse if showing quicksettings ● Merge latest sources ● frameworks/base updates ● frameworks/av updates ● frameworks/native updates ● hardware_qcom_audio­caf updates ● hardware_qcom_display­caf­new updates ● hardware_libhardware_legacy updates ● hardware_samsung updates ● external_stagefright­plugins updates ● external_libnfc­nci updates "fixes NFC for some HLTE and Bacon devices" ● hardware_qcom_media­caf updates ● hardware_qcom_display­caf updates V27.1 ● Note 3: ● ● ● ● V27 ● ● ● ● ● ● ● ● ● ● ● V26 ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● ● Fix IR blaster ­ Increase IR buffer size Common: Only display smart cover disable option on device that support it Revert velocity based scrolling cache + delete scrolling cache Note3: Include W03 Slim hlte kernel ­ changelog here Update bluetooth driver, fix issues with BT devices causing reboots Add option to disable smart cover info window (display settings) Correct NFC NXP permissions…

    • 5599 Words
    • 33 Pages
    Powerful Essays

Related Topics