0% found this document useful (0 votes)
124 views14 pages

Introduction To Bluetooth

This document provides an overview and introduction to Bluetooth technology. It discusses the history and development of Bluetooth, how Bluetooth works, and some key advantages. Specifically: 1) Bluetooth was originally developed in 1998 by Ericsson to provide a way to wirelessly exchange information between various devices like phones, laptops, and cameras. 2) It uses short-range radio waves and frequency hopping to connect multiple devices without needing cables or being limited by synchronization issues. 3) Some key advantages of Bluetooth include being wireless, inexpensive, automatic in connecting devices within 30 feet, having standardized protocols for interoperability between devices, and using low power consumption.

Uploaded by

amitt_54541529
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
124 views14 pages

Introduction To Bluetooth

This document provides an overview and introduction to Bluetooth technology. It discusses the history and development of Bluetooth, how Bluetooth works, and some key advantages. Specifically: 1) Bluetooth was originally developed in 1998 by Ericsson to provide a way to wirelessly exchange information between various devices like phones, laptops, and cameras. 2) It uses short-range radio waves and frequency hopping to connect multiple devices without needing cables or being limited by synchronization issues. 3) Some key advantages of Bluetooth include being wireless, inexpensive, automatic in connecting devices within 30 feet, having standardized protocols for interoperability between devices, and using low power consumption.

Uploaded by

amitt_54541529
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 14

REPORT ON

BLUETOOTH DEVICE

Submitted To : Prof. Rakesh Bhatnagar.

Submitted By :
Vaibhav Bhatia Abhay Kalvinkar Amit Makasana Amit Thakkar (2007_03) (2007_13) (2007_17) (2007_52)

Prafullchandra Shrimali (2007_48)

INTRODUCTION TO BLUETOOTH

Bluetooth provides a way to exchange information between wireless devices such as personal digital assistants (PDAs), mobile phones, laptops, computers, printers and digital cameras via a secure, low-cost, globally available short-range radio frequency band. Originally developed by Ericsson, Bluetooth is now used in many different products by many different manufacturers. These manufacturers must be members of some level (see below) in the Bluetooth SIG before they are granted access to the Bluetooth specifications. The SIG also specifies a qualification process that products must be tested in accordance with before they may be branded with the Bluetooth trademarks and sold to consumers. It also markets the Bluetooth brand and technology and owns the trademarks and standardization documents. Since its inception in 1998, the Bluetooth SIG is primarily run by a volunteer staff from its member companies. In 2001 Tom Siep served as the group's Managing Director and from 2002-2004 Mike McCamon led the group as its Executive Director. In 2004 he was replaced by Michael W. Foley (Mike). Beginning in 2002 a professional staff was hired, composed of operations, engineering and marketing specialists. From 2002-2004 the Bluetooth SIG was based in Overland Park, Kansas USA and is now based in Bellevue, Washington with additional offices in Malm, Sweden and Hong Kong, China. In addition to its professional staff, the SIG still relies on many volunteers from member companies who participate in the various working groups that produce the standardization documents and oversee the qualification process for new products. Bluetooth is a wireless protocol for exchanging data over short distances from fixed and mobile devices, creating personal area networks (PANs). It was originally conceived as a wireless alternative to RS232 data cables. It can connect several devices, overcoming problems of synchronization.

HISTORY OF BLUETOOTH
Bluetooth
Founded in September 1998, the Bluetooth SIG is a unification of leaders in the telecommunications, computing, network, industrial automation, and development in Bluetooth technology.

Automotive

industries. Today, the Bluetooth SIG is responsible for encouraging and supporting research and

The Bluetooth SIG includes promoter member companies Microsoft, Ericsson, IBM, Intel, Agere, Motorola, Nokia, and Toshiba, plus thousands of Associate and Adopter member companies (BlueTomorrow.com's parent company, SP Commerce LLC, is a licensed and certified Adopter member of the Bluetooth SIG) The developers of this wireless technology first used the name "Bluetooth" as a code name, but as time past, the name stuck. The word "Bluetooth" is taken from the 10th century Danish King Harald Bluetooth. King Bluetooth had been influential in uniting Scandinavian Europe during an era when the region was torn apart by wars and feuding clans.
The 1) 2) founders Bluetooth of the Bluetooth was SIG first felt the name in was fitting because: and

technology

developed

Scandinavia,

Bluetooth technology is able to unite differing industries such as the cell phone, computing,

and automotive markets. Bluetooth wireless technology simplifies and combines multiple forms of wireless communication into a single, secure, low-power, low-cost, globally available radio frequency.

WHERE DID THE LOGO COME FROM?

A Scandinavian firm originally designed the logo at the time the SIG was formally introduced to the public. Keeping to the same origin as the Bluetooth name, the logo unites the Runic alphabetic characters "H", which looks similar to an asterisk, and a "B", which are the initials for Harald Bluetooth. If you look close enough you can see both embodied in the logo.

BLUETOOTH TECHNOLOGY OVER THE YEARS


When Bluetooth was officially introduced in 1998, its intended basic purpose was to be a wire replacement technology in order to rapidly transfer voice and data. There were many doubters who believed Bluetooth would be a distant memory in just a couple of years. However, multiple years have passed and Bluetooth continues to make strides and advancements everyday. A lot has changed since the first Bluetooth Core Specification Version was introduced in 1998. Over the past couple years Bluetooth technology has really begun to take giant leaps forward. In 2003, the Bluetooth SIG began a major overhaul of the Bluetooth specification with the announcement of version 2.1. Then, in 2004, Bluetooth version 2.0 + EDR (Enhanced Data Rate) was introduced. Devices using version 2.0 + EDR began to hit the market in late 2005.

HOW BLUETOOTH TECHNOLOGY WORKS?


Connecting Devices :
In order to understand how Bluetooth technology works, we must first take a look at how electronic devices (Bluetooth or not) connect and communicate with one another. There are several questions that need to be addressed before any two devices can communicate with one another. Bluetooth devices communicate via wires or through the air : If the devices are using Bluetooth technology, they will communicate without wires. However, if the devices are not Bluetooth enabled, then they have the option of communicating either with or without wires. Devices can take advantage of several wireless technologies (Bluetooth included) by using various transmitters to send information over the airwaves. How messages or information are sent between the two devices? Information can be sent one bit at a time in a scheme called serial communications, or in groups of bits (usually 8 or 16 at a time) in a scheme called parallel communications

Bluetooth: Low Power and Low Cost :


Bluetooth wireless technology operates on an open frequency within the 2.4 gigahertz band, which is the same as WiFi, cordless phones and various other wireless devices. Bluetooth is able to share the same frequency band without experiencing any interference because it utilizes various key technologies. Take into consideration that powerful cell phones use a signal of around three watts. Even though the signal is weaker, Bluetooth still offers a range of up to 30 feet (Newer versions can have a range over 100 feet).

The signal is also capable of passing through the walls in your home, making it useful for controlling several devices in different rooms. Data can be transferred at a rate of up to one Megabyte per second (Mbps). Also, because Bluetooth transmitters require minimal amounts of power, they are relatively inexpensive to manufacture. Simply put, Bluetooth uses low-power radio waves to reliably communicate in an inexpensive way.

HOPPING = No Interference :
Another way Bluetooth devices are able to avoid interference is through a technique known as spread-spectrum frequency hopping. By using the hopping method, a device will use one of 79 different, randomly chosen frequencies within an assigned range, and will frequently change frequencies from one to another. Bluetooth enabled devices, which all use the hopping method, change frequencies 1,600 times per second. As a result, more devices can use a portion of the radio spectrum. The risk of a device like a cell phone or baby monitor interfering with Bluetooth devices is minimized, since any interference on a specific frequency will last for only a fraction of a second. Bluetooth version 2.0 + EDR, the very latest of the Bluetooth specification versions, uses an enhanced technology called: Adaptive Frequency Hopping (AFH). AFH allows Bluetooth devices to measure the quality of the wireless signal and then determine if there are bad channels present on specific frequencies due to interference from other wireless devices.

ADVANTAGES OF BLUETOOTH
1. Bluetooth Devices are Wireless.

If you navigate through the rest of our site you will learn that there are tons of advantages/benefits when using wireless devices. In addition to improving safety as a result of eliminating the clutter of wires and associated hazardous connections, wireless technology also offers many convenient advantages. For example, when you are traveling with your laptop, PDA, MP3 player and other devices, you no longer have to worry about bringing along all of your connecting cables. 2. Bluetooth Technology is Inexpensive. Bluetooth technology is cheap for companies to implement, which results in lower overall manufacturing Costs. These savings are then passed on to you, the consumer. The end result: Bluetooth devices are relatively inexpensive. 3. Bluetooth is Automatic. Bluetooth doesn't require you to think about setting up a connection or to push any buttons. When two or more Bluetooth devices enter a range (Up to 30 feet) of one another, they automatically begin to communicate without you having to do anything. Once the communicating begins, Bluetooth devices will setup Personal Area Networks or Pico nets. The best part is: The devices take care of the entire setup process, and you can go about your business. 4. Standardized Protocol = Interoperability Since Bluetooth is a standardized wireless specification, a high level of compatibility among devices is guaranteed. The Bluetooth specification uses and defines various profiles. Every Bluetooth profile is specific to a particular function. For instance, when a Bluetooth enabled cell phone and a Bluetooth headset (Both with the same profile) are communicating with one another, both will understand each other without the user having to do anything, even if the devices are of different models/makes. 5. Low Interference (If Any) Bluetooth devices avoid interference with other wireless devices by:

a) Using a technique known as spread-spectrum frequency hopping, and b) Using low power wireless signals. 6. Low Energy Consumption As stated above, Bluetooth uses low power signals. As a result, the technology requires little energy and will therefore use less battery or electrical power. Obviously, this is a great benefit for mobile devices because Bluetooth won't drain the life of your device's battery. 7. Share Voice and Data The Bluetooth standard allows compatible devices to share both voice and data communications. For example, it is probably no surprise that a Bluetooth enabled cell phone is capable of sharing voice communications with a compatible Bluetooth headset, however, the same cell phone may also be capable of establishing a GPRS connection to the Internet. Then, using Bluetooth, the phone can connect to a laptop. The result: The laptop is capable of surfing the web or sending and receiving email. 8. Instant Personal Area Network (PAN) Up to seven compatible Bluetooth devices can connect to one another within a proximity of up to 30 feet, forming a PAN or Pico net. Multiple Pico nets can be automatically setup for a single room. 9. Upgradeable The Bluetooth standard is upgradeable. A development group at the Bluetooth Special Interest Group (SIG) has been given the task of working on the new Bluetooth version 2, which offers several new advantages and is backward compatible with the older versions. 10. The Technology is Here to Stay

Bluetooth is a universal, world-wide, wireless standard. Therefore, you can count on it being around for years to come. As more devices begin to use Bluetooth technology, electronics manufacturers will be increasingly eager to make their products compatible, using Bluetooth. A chain reaction is inevitable, in fact, it has already begun.

BLUETOOTH SECURITY
Bluetooth Technology Faces Security Threats

Today, all communication technologies are facing the issue of privacy and identity theft. Bluetooth technology is no exception. The information and data we share through these communication technologies is both private and in many cases, critically important to us. Everyone knows that email services, company networks, and home networks all require security measures. What Bluetooth users need to realize, is: Bluetooth requires similar security measures. Recently, Bluetooth technology has been popping up in the news. Unfortunately, most of the news involves confusion and misinformation regarding the security of Bluetooth. Recent reports have surfaced describing ways for hackers to crack Bluetooth devices security codes. Are the Threats Serious? The good news: most of the recent Bluetooth security scares, like most scares, are over-dramatized and blown out of proportion. The truth is, these issues are easily combatable, and various measures are already in place to provide for the secure use of Bluetooth technology. Yes, it is true: there have been some Bluetooth cell phones that have been hacked into. However, it is most likely the case that those who have experienced these security breaches have not taken the appropriate precautions to protect their devices.

According to the Bluetooth Special Interest Group (SIG), in order to break into a Bluetooth device, a hacker must:

Force two paired Bluetooth devices to break their connection Steal the packets used to resend the PIN, then

Decode the PIN

The hacker must of course be within range of the Bluetooth device and, according to the Bluetooth SIG, be using very expensive developers equipment. The SIG suggests users create a longer PIN (8 digit is recommended).
The Bluetooth SIG Focuses on Security

The Bluetooth SIG is constantly improving formats for combating security threats associated with Bluetooth technology. Offering a secure method to wirelessly communicate has always been one of the key benefits of Bluetooth technology. If you look at The History of Bluetooth, you will see that offering secure data transmission was one of the core principles for its creation. In order to lead the security effort, a group of engineers within the Bluetooth SIG formed the Bluetooth Security Experts Group. As the Bluetooth Core Specification Versions continue to advance, the Bluetooth Security Experts Group is responsible for monitoring the advancement and testing for flaws in its security. The Fundamentals of Bluetooth Security One of the most basic levels of security for Bluetooth devices is the pairing process. Pairing = Two or more Bluetooth devices recognize each other by the Bluetooth Profiles they share, and in most cases, both must enter the same PIN. The Bluetooth core specifications use an encryption algorithm, which is entirely secure. Once Bluetooth devices pair with one another, they too are entirely secure. Bluetooth devices will not communicate with each other until they have successfully paired. So, because of this pairing process and the fact that it has a short range, Bluetooth technology is considered to be fundamentally secure.

Unfortunately, as recent news has indicated, experienced hackers have come up with a way to get around this basic level of security. However, there are precautions users can take to limit the chances of their Bluetooth device from being compromised by a hacker.
How Developers Can Provide Security

Companies who develop Bluetooth enabled products have multiple options in order to provide security. There are three security modes for connecting two Bluetooth devices:

Security Mode 1: non-secure Security Mode 2: service level enforced security Security Mode 3: link level enforced security

It is the company who develops each specific Bluetooth product that decides which security modes to use. Also, the devices and services have different security levels as well. For example, devices use two levels: "trusted device" and "untrusted device". After a trusted device is connected to another device, it has unrestricted access to all services. As far as services, there are three security levels which are defined: services that require authorization and authentication, services that require authentication only and services that are open to all devices. Why Have There Been Security Threats? The recent Bluetooth security threats have been isolated to Bluetooth cell phones. The issues were due to specific problems with the cell phones platforms. In order to solve, and prevent against further security problems, the Bluetooth SIG and all of its members work together to discover, inspect and solve reported problems. If there is something wrong with the actual Bluetooth specification, then the Bluetooth SIG will confront the problem directly. However, if the problem is a result of the implementation of Bluetooth technology, then the SIG will work with the specific members in order to release patches and prevent future problems from occurring.

What is Bluejacking?

Bluejacking allows phone users to send business cards anonymously to one another using Bluetooth technology. Bluejacking does NOT involve any altercations to your phone's data. These business cards usually consist of some clever message or joke. Bluejackers are simply looking for a reaction from the recipient. To ignore bluejackers, simply reject the business card, or if you want to avoid them entirely, set your phone to non-discoverable mode What is Bluesnarfing? Bluesnarfing refers to a hacker who has gained access to data, which is stored on a Bluetooth enabled phone. Bluesnarfing allows the hacker to make phone calls, send and receive text messages, read and write phonebook contacts, eavesdrop on phone conversations, and connect to the Internet. The good news is, bluesnarfing requires advanced equipment and expertise or requires the hacker to be within a 30 ft. range. If your phone is in non-discoverable mode, it becomes significantly more difficult for hackers to bluesnarf your phone. According to the Bluetooth SIG, only some older Bluetooth enabled phones are vunerable to bluesnarfing. What is Bluebugging? Bluebugging refers to a skilled hacker who has accessed a cell phone's commands using Bluetooth technology without the owner's permission or knowledge. Bluebugging allows the hacker to make phone calls, send messages, read and write contacts and calendar events, eavesdrop on phone conversations, and connect to the Internet. Just like all Bluetooth attacks, the hacker must be within a 30 ft. range. Bluebugging and bluesnarfing are separate security issues, and phones that are vulnerable to one are not necessarily vulnerable to the other. What are Phone Manufacturers Doing to Solve These Problems? Two of the leading cell phone manufacturers, Nokia and Sony Ericsson, have developed software patches for phones susceptible to bluesnarfing and bluebugging. Also, both

manufacturers have taken great measures to ensure new phones entering the market will not be susceptible to these attacks. Are There Any Other Threats With Bluetooth Technology? According to the Bluetooth SIG, bluesnarfing and bluebugging are the only known security threats. The Bluetooth SIG is constantly researching security risks associated with the technology and figure out if the risk is even possible as the technology expands and develops. What Can Users Do to Protect Their Data? There are several measures users can take in order to protect their devices information:

If a phone is vulnerable to bluesnarfing or bluebugging--contact the

manufacturer or take the phone to a manufacturer-authorized dealer. There are software patches available for many older Bluetooth phones.

Turn the device to non-discoverable mode when not using Bluetooth Never pair with unknown devices or in public places. When possible, use an eight character or more alphanumeric PIN.

technology.

You might also like