Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 18

BLUETOOTH SECURITY

PREPARED BY:
RIDDHI PATEL (09CE085)

OUT LINE
INTRODUCTION SECURITY FRAMEWORK LINK LEVEL SECURITY SERVICE LEVEL SECURITY CONCLUSION BIBLOGRAPHY

INTRODUCTION
Bluetooth is a new technology named after the 10th century by Danish king Herald Bluetooth. Bluetooth is develop to provide cablefree environment. Security architecture.

SECURITY FRAMEWORK
TECH. PROVIDES SECURITY AT APPLICATION LAYER AND LINK LAYER HOP SELECTION MECHANISM
BASIC DEFINITION SECURITY MODES SECURITY LEVELS

BASIC DEFINITION
ENCRYPTION
Transfers data to other form, cant understood without key.

AUTHENTICATION
The ensuring of the identity of another user.

AUTHORIZATION
Deciding, if a device is allowed to have access to a service.

SECURITY MODES
MODE 1: NON-SECURE MODE MODE 2: SERVICE LEVEL SECURITY MODE 3: LINK LEVEL SECURITY

SECURITY LEVELS
LINK LEVEL SECURITY
The Bluetooth device initiates security functions before the channel is established.

SERVICE LEVEL SECURITY


The Bluetooth device initiates security functions after the channel is established

LINK LEVEL SECURITY


KEY MANAGEMENT SCHEME AUTHENTICATION SCHEME ENCRYPTION SCHEME

KEY MANAGEMENT SCHEME

AUTHENTICATION SCHEME
Challenge-response for the Bluetooth authentication.

2 PROTOCOLS ARE USED BOTH USERS SHOULD SHARE SAME KEYS

ENCRYPTION SCHEME

SERVICE LEVEL SECURITY


This is an approach for a flexible security architecture built on top of the link-level security features of Bluetooth

The key component in the architecture is a security manager Functions

APPLICATIONS
Wireless headsets for cell phones. Wireless PC Mouse connection to the PC using Bluetooth. Wireless printing between a PC. Automated synchronization of Personal Digital Assistant (PDAs) and PCs using Bluetooth. Ad hoc networking and file sharing between PCs, PDAs & laptops in a meeting.

BENEFITS
Cable replacement between two devices The wide range of device types and standard interface Set of wired and wireless devices are Bluetooth connectable

CONCLUSION
Bluetooth's security seemed to be adequate small ad hoc networks. Bluetooth secure for larger networks, money transfers and transferring other sensitive information. Original design goal of cable replacement. Bluetooth is more suitable to short-range. Small-size wireless personal area networks.

References:
www.google.com www.cs.hut.fi.com

You might also like