BLUETOOTH TECHNOLOGY-SECURITYPrepared By- Lo'ai .ppt
《BLUETOOTH TECHNOLOGY-SECURITYPrepared By- Lo'ai .ppt》由会员分享,可在线阅读,更多相关《BLUETOOTH TECHNOLOGY-SECURITYPrepared By- Lo'ai .ppt(72页珍藏版)》请在麦多课文档分享上搜索。
1、BLUETOOTH TECHNOLOGY/SECURITY Prepared By: Loai Hattar Supervised By: Dr. Loai Tawalbeh New York Institute of Technology (NYIT) Jordans campus-2006,Whats With the Name?,The name Bluetooth was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark and Norwa
2、y. The name was adopted because Bluetooth wireless technology is expected to unify the telecommunications and computing industries,Who Started Bluetooth?,Bluetooth Special Interest Group (SIG) Founded in Spring 1998By Ericsson, Intel, IBM, Nokia, Toshiba; Now more than 2000 organizations joint the S
3、IG,What Is Bluetooth?, Bluetooth is an open standard for short-range digital radio to interconnect a variety of devices Cell phones, PDA, notebook computers, modems, cordless phones, pagers, laptop computers, printers, cameras by developing a single-chip, low-cost, radio-based wireless network techn
4、ology,Bluetooth,Simplifying communications between: - devices and the internet- data synchronization Operates in licensed exempt ISM band at 2.4ghz Uses frequency hoping spread spectrum Omni directional, no requiring line of sight Bluetooth offers data speeds of up to 1 Mbps up to 10 meters (Short r
5、ange wireless radio technology ) Unlike IrDA, Bluetooth supports a LAN-like mode where multiple devices can interact with each other. The key limitations of Bluetooth are security and interference with wireless LANs. Short range wireless radio technology,Bluetooth,Bluetooth is a PAN Technology Offer
6、s fast and reliable transmission for both voice and data Can support either one asynchronous data channel with up to three simultaneous synchronous speech channels or one channel that transfers asynchronous data and synchronous speech simultaneously Support both packet-switching and circuit-switchin
7、g,Bluetooth,Personal Area Network (PAN) Bluetooth is a standard that will Eliminate wires and cables between both stationary and mobile devices Facilitate both data and voice communications Offer the possibility of ad hoc networks and deliver synchronicity between personal devices,Bluetooth Topology
8、,Bluetooth-enabled devices can automatically locate each other Topology is established on a temporary and random basis Up to eight Bluetooth devices may be networked together in a master-slave relationship to form a Piconet,Cont.,One is master, which controls and setup the network All devices operat
9、e on the same channel and follow the same frequency hopping sequence Two or more piconet interconnected to form a scatter net Only one master for each piconet A device cant be masters for two piconets The slave of one piconet can be the master of another piconet,Ad-hoc,is a network connection method
10、 which is most often associated with wireless devices. The connection is established for the duration of one session and requires no base station. Instead, devices discover others within range to form a network for those computers. Devices may search for target nodes that are out of range by floodin
11、g the network with broadcasts that are forwarded by each node. Connections are possible over multiple nodes (multihop ad hoc network). Routing protocols then provide stable connections even if nodes are moving around,A piconet,is an ad-hoc computer network of devices using Bluetooth technology proto
12、cols to allow one master device to interconnect with up to seven active slave devices Up to 255 further slave devices can be inactive, or parked, which the master device can bring into active status at any time.,A Typical Bluetooth Network Piconet,Master sends its globally unique 48-bit id and clock
13、 Hopping pattern is determined by the 48-bit device ID Phase is determined by the masters clock Why at most 7 slaves? (because a three-bit MAC adress is used). Parked and standby nodes Parked devices can not actively participate in the piconet but are known to the network and can be reactivated with
14、in some milliseconds 8-bit for parked nodes No id for standby nodes Standby nodes do not participate in the piconet,Security Protocol,There are five phases of Simple Pairing: Phase 1: Public key exchange Phase 2: Authentication Stage 1 Phase 3: Authentication Stage 2 Phase 4: Link key calculation Ph
15、ase 5: LMP Authentication and Encryption Phases 1, 3, 4 and 5 are the same for all protocols whereas phase 2 (Authentication Stage 1) is different depending on the protocol used. Distributed through these five phases are 13 steps.,Bluetooth Frequency,Has been set aside by the ISM( industrial ,sienti
16、fic and medical ) for exclusive use of Bluetooth wireless products,Communicates on the 2.45 GHz frequency,Frequency Selection,FH is used for interference mitigation and media access; TDD (Test-Driven Development) is used for separation of the transmission directions In 3-slot or 5-slot packets,FH-CD
17、MA (Frequency Hopping - Code Division Multiple Access),Frequency hopping (FH) is one of two basic modulation techniques used in spread spectrum signal transmission. It is the repeated switching of frequencies during radio transmission, often to minimize the effectiveness of the unauthorized intercep
18、tion or jamming of telecommunications.It also is known as frequency- hopping code division multiple access (FH-CDMA). Bluetooth uses a technique called spread-spectrum frequency hopping.,Avoiding Interference : Hopping,In this technique, a device will use 79 individual, randomly chosen frequencies w
19、ithin a designated rangeTransmitters change frequency 1600 times a second,Cont.,Each channel is divided into time slots 625 microseconds long,Data in a packet can be up to 2,745 bits in length,Packets can be up to five time slots wide,Cont.,FH-CDMA to separate piconets within a scatternetMore picone
20、ts within a scatter net degrades performance Possible collision because hopping patterns are not coordinatedAt any instant of time, a device can participate only in one piconetIf the device participates as a slave, it just synchronize with the masters hop sequence,Cont.,The master for a piconet can
21、join another piconet as a slave; in this case, all communication within in the former piconet will be suspended . When leaving a piconet, a slave notifies the master about its absence for certain amount of time. Communication between different piconets takes place by devices jumping back and forth b
22、etween these nets,Simplified Bluetooth stack,Bluetooth Profile Structure,How Does It Work?,Bluetooth is a standard for tiny, radio frequency chips that can be plugged into your devices,The information is then transmitted to your device,These chips were designed to take all of the information that yo
23、ur wires normally send, and transmit it at a special frequency to something called a receiver Bluetooth chip.,Bluetooth Chip,SPECIFICATIONS,Bluetooth specifications are divided into two: Core Specifications This bluetooth specification contains the Bluetooth Radio Specification as well as the Baseba
24、nd, Link Manager, L2CAP, Service Discovery, RFCOMM and other specifications.,SPECIFICATIONS,Application Specifications These specifications include the following Profiles Cordless Telephony Serial Port Headset Intercom Dialup Networking Fax File Transfer Service Discovery Application Generic Access,
25、RADIO POWER CLASSES,The Bluetooth specification allows for three different types of radio powers: Class 1 = 100mW Class2 = 2.5mW Class 3 = 1mW These power classes allow Bluetooth devices to connect at different ranges High power radius have longer ranges. The maximum range for a Class 1, 100mW is ab
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
2000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- BLUETOOTHTECHNOLOGYSECURITYPREPAREDBYLO AIPPT

链接地址:http://www.mydoc123.com/p-379041.html