Published on

1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • The name, Bluetooth, comes from the 10th century Danish King Harald Blaatand, whose last name is translated into English as Bluetooth . King Bluetooth united Denmark and Norway, so the Swedish-based Ericsson borrowed his name for its linking technology.
  • Unit keys are encryption keys shared between two conversing devices.
  • Flooding techniques are when a device or devices repeatedly request a user for information which blocks him from important tasks Bluetooth essentially uses a radio signal which can be jammed by almost any device using a 2.4 GHz frequency.
  • Bluetooth

    1. 1. Bluetooth By Andrew Breen and Chris Backo
    2. 2. Presentation Overview <ul><li>Bluetooth overview </li></ul><ul><li>Bluetooth vs. WiFi </li></ul><ul><li>Products </li></ul><ul><li>Installation </li></ul><ul><li>Demonstration </li></ul><ul><li>Security Issues </li></ul>
    3. 3. What is Bluetooth? <ul><li>Bluetooth devices allow wireless communication. It operates at 2.4 GHz and is capable of transmitting voice and data. </li></ul><ul><li>The effective range of Bluetooth devices is 32 feet. Some devices may have an extended range </li></ul><ul><li>Bluetooth transfers data at the rate of 721 Kbps. </li></ul><ul><li>It uses similar frequencies to microwave ovens and cordless phones, but it should not interfere or be interrupted as a result. </li></ul>
    4. 4. What is it for? <ul><li>Bluetooth can be used to wirelessly transfer data among devices. </li></ul><ul><li>Some examples of it’s use are: </li></ul><ul><ul><li>synchronizing contact and calendar information among desktop and notebook computers as well as cell phones and palm pilots. </li></ul></ul><ul><ul><li>accessing a network or the Internet with a notebook computer by connecting wirelessly to a cellular phone. </li></ul></ul>
    5. 5. Bluetooth vs Wi-Fi <ul><li>Both use same frequency range </li></ul><ul><li>Wi-Fi has greater range and higher bandwidth (meaning greater power usage and more expensive hardware) </li></ul><ul><li>Wi-Fi analogous to Ethernet, Bluetooth analogous to USB </li></ul>
    6. 6. Product Information <ul><li>Some products that are sold Bluetooth enabled are: </li></ul><ul><ul><li>Cell phones and wireless headsets </li></ul></ul><ul><ul><li>Desktops and laptops </li></ul></ul><ul><ul><li>PDAs </li></ul></ul><ul><ul><li>Printers </li></ul></ul><ul><ul><li>keyboards and mice </li></ul></ul><ul><ul><li>Kitchen appliances such as refrigerators, and microwave ovens </li></ul></ul><ul><ul><li>Cars </li></ul></ul>
    7. 7. Installation Process <ul><li>We installed Bluetooth on a machine using a windows operating system. </li></ul><ul><li>We used software included with a Belkin USB bluetooth adapter </li></ul><ul><li>Once installed, software allows you to find other Bluetooth devices and communicate with them </li></ul>
    8. 8. Demonstration <ul><li>We will now attempt to locate another Bluetooth device and communicate with it </li></ul><ul><li>Does anyone have a Bluetooth enabled device? (such as a cellphone) </li></ul>
    9. 9. Security Measures <ul><li>Conversations over Bluetooth are encrypted. </li></ul><ul><li>They also use Frequency-Hopping Spread Spectrum (FHSS). The two machines switch frequencies (randomly out of 79 total) in a synchronized fashion 1,600 times per second. However, this is pointless if an intruder can obtain the proper synchronization. </li></ul>
    10. 10. Security Risks <ul><li>Bluetooth allows short passwords and pin numbers. </li></ul><ul><li>The master encryption key is shared openly, thus worthless because everyone can decrypt. </li></ul><ul><li>Unit keys are dangerous to use more than once because they become publicly accessible once they are used. </li></ul><ul><li>There is no user authentication, only device authentication. Thus, an unauthorized user with an authorized device can obtain access to the network. </li></ul>
    11. 11. Security Attacks <ul><li>Man in the Middle Attack </li></ul><ul><ul><li>3 devices, A, B, and C. </li></ul></ul><ul><ul><li>A talks to B and C and shares it’s unit key with both. </li></ul></ul><ul><ul><li>The user on device C can easily eavesdrop on A and B’s conversation, because A uses the same unit key to communicate with both devices. </li></ul></ul><ul><li>Denial of Service Attack </li></ul><ul><ul><li>Include flooding techniques, battery exhaustion, and jamming techniques. </li></ul></ul>
    12. 12. Security Breaches <ul><li>Discovered in June 2004, SYMBOS_CABIR was the 1 st virus said to have spread only via the Bluetooth-enabled devices. </li></ul><ul><li>Cell phone viruses are becoming more common. </li></ul><ul><li>They can delete/change information, drain batteries, and make long-distance phone calls. </li></ul>