Professional Documents
Culture Documents
Bluetooth Security: Prepared by
Bluetooth Security: Prepared by
PREPARED BY:
RIDDHI PATEL (09CE085)
OUT LINE
INTRODUCTION SECURITY FRAMEWORK LINK LEVEL SECURITY SERVICE LEVEL SECURITY CONCLUSION BIBLOGRAPHY
INTRODUCTION
Bluetooth is a new technology named after the 10th century by Danish king Herald Bluetooth. Bluetooth is develop to provide cablefree environment. Security architecture.
SECURITY FRAMEWORK
TECH. PROVIDES SECURITY AT APPLICATION LAYER AND LINK LAYER HOP SELECTION MECHANISM
BASIC DEFINITION SECURITY MODES SECURITY LEVELS
BASIC DEFINITION
ENCRYPTION
Transfers data to other form, cant understood without key.
AUTHENTICATION
The ensuring of the identity of another user.
AUTHORIZATION
Deciding, if a device is allowed to have access to a service.
SECURITY MODES
MODE 1: NON-SECURE MODE MODE 2: SERVICE LEVEL SECURITY MODE 3: LINK LEVEL SECURITY
SECURITY LEVELS
LINK LEVEL SECURITY
The Bluetooth device initiates security functions before the channel is established.
AUTHENTICATION SCHEME
Challenge-response for the Bluetooth authentication.
ENCRYPTION SCHEME
APPLICATIONS
Wireless headsets for cell phones. Wireless PC Mouse connection to the PC using Bluetooth. Wireless printing between a PC. Automated synchronization of Personal Digital Assistant (PDAs) and PCs using Bluetooth. Ad hoc networking and file sharing between PCs, PDAs & laptops in a meeting.
BENEFITS
Cable replacement between two devices The wide range of device types and standard interface Set of wired and wireless devices are Bluetooth connectable
CONCLUSION
Bluetooth's security seemed to be adequate small ad hoc networks. Bluetooth secure for larger networks, money transfers and transferring other sensitive information. Original design goal of cable replacement. Bluetooth is more suitable to short-range. Small-size wireless personal area networks.
References:
www.google.com www.cs.hut.fi.com