SlideShare a Scribd company logo
1 of 19
A SEMINAR PRESENTATION
On
BLUETOOTH SECURITY
OUT LINE
 INTRODUCTION
 SECURITY FRAMEWORK
 LINK LEVEL SECURITY
 SERVICE LEVEL SECURITY
 CONCLUSION
 BIBLOGRAPHY
 QUESTIONS
BE COMPUTER SEMINAR
INTRODUCTION
 Bluetooth is a new technology named
after the 10th century by Danish king
Harald Bluetooth.
 Bluetooth is develop to provide cable-
free environment.
 Security architecture.
BE COMPUTER SEMINAR
APPLICATIONS
 Wireless headsets for cell phones.
 Wireless PC Mouse connection to the PC using
Bluetooth.
 Wireless printing between a PC.
 Automated synchronization of Personal Digital
Assistant (PDAs) and PCs using Bluetooth.
 Ad hoc networking and file sharing between
PCs, PDAs & laptops in a meeting.
BE COMPUTER SEMINAR
BENEFITS
 Cable replacement between two
devices
 The wide range of device types and
standard interface
 Set of wired and wireless devices are
Bluetooth connectable
BE COMPUTER SEMINAR
SECURITY FRAMEWORK
 BASIC DEFINITION
 SECURITY MODES
 SECURITY LEVELS
BE COMPUTER SEMINAR
BASIC DEFINITION
 ENCRYPTION
 Transfers data to other form, can’t
understood without key.
 AUTHENTICATION
 The ensuring of the identity of another user.
 AUTHORIZATION
 Deciding, if a device is allowed to have access
to a service.
BE COMPUTER SEMINAR
SECURITY MODES
 MODE 1: NON-SECURE MODE
 MODE 2: SERVICE LEVEL SECURITY
 MODE 3: LINK LEVEL SECURITY
BE COMPUTER SEMINAR
SECURITY LEVELS
 LINK LEVEL SECURITY
 The Bluetooth device initiates security
functions before the channel is established.
 SERVICE LEVEL SECURITY
 The Bluetooth device initiates security
functions after the channel is established
BE COMPUTER SEMINAR
LINK LEVEL SECURITY
 KEY MANAGEMENT SCHEME
 AUTHENTICATION SCHEME
 ENCRYPTION SCHEME
BE COMPUTER SEMINAR
KEY MANAGEMENT SCHEME
BE COMPUTER SEMINAR
AUTHENTICATION SCHEME
BE COMPUTER SEMINAR
ENCRYPTION SCHEME
BE COMPUTER SEMINAR
SERVICE LEVEL SECURITY
This is an approach for a flexible security
architecture built on top of the link-level security
features of Bluetooth
The key component in the architecture is a
security manager
BE COMPUTER SEMINAR
BE COMPUTER SEMINAR
CONCLUSION
 Bluetooth's security seemed to be adequate
small ad hoc networks.
 Bluetooth secure for larger networks,
money transfers and transferring other
sensitive information.
 Original design goal of cable replacement.
 Bluetooth is more suitable to short-range.
 Small-size wireless personal area networks.
BE COMPUTER SEMINAR
BE COMPUTER SEMINAR
BIBLIOGRAPHY
 Jun-Zhao Sun, Douglas Howie, Antti Koivisto,
and Jaakko Sauvola. Design, Implementation,
And Evaluation Of Bluetooth Security, [referred
2002-01-07]
 Saarinen M-J, A Software Implementation of
the Bluetooth Encryption, [referred 2000-03-15]
 Muller T., Bluetooth Security Architecture:
Version1.0., Bluetooth Paper, Document #
1.C.116/1.0, July 15, 2000.
BE COMPUTER SEMINAR
BE COMPUTER SEMINAR

More Related Content

Similar to Bluetooth Security.PPT

Network Trends
Network TrendsNetwork Trends
Network TrendsArun ACE
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksSiya Agarwal
 
How Wireless Networks/Bluetooth Works And Its Role Today
How Wireless Networks/Bluetooth Works And Its Role TodayHow Wireless Networks/Bluetooth Works And Its Role Today
How Wireless Networks/Bluetooth Works And Its Role Todaymhenderson132
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth TechnologyManish Sharma
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetoothKumar
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetoothmadhu428
 
Bluetooth Technology In Wireless Communications
Bluetooth Technology In Wireless CommunicationsBluetooth Technology In Wireless Communications
Bluetooth Technology In Wireless Communicationsguestac67362
 
Connected lighting in commercial applications
Connected lighting in commercial applicationsConnected lighting in commercial applications
Connected lighting in commercial applicationsSilvair
 
Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]Ahsaan Arain
 
Bluetooth k.v
Bluetooth                                k.vBluetooth                                k.v
Bluetooth k.vkarunvir
 
Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)lurdhu agnes
 
Wireless standards
Wireless standards Wireless standards
Wireless standards Ajay Suresh
 
Bluetooth global-technology 170
Bluetooth global-technology 170Bluetooth global-technology 170
Bluetooth global-technology 170manasanreddy
 

Similar to Bluetooth Security.PPT (20)

Network Trends
Network TrendsNetwork Trends
Network Trends
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
 
How Wireless Networks/Bluetooth Works And Its Role Today
How Wireless Networks/Bluetooth Works And Its Role TodayHow Wireless Networks/Bluetooth Works And Its Role Today
How Wireless Networks/Bluetooth Works And Its Role Today
 
Bluetooth by vk
Bluetooth by vkBluetooth by vk
Bluetooth by vk
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetooth
 
Understanding bluetooth
Understanding bluetoothUnderstanding bluetooth
Understanding bluetooth
 
Bluetooth Technology In Wireless Communications
Bluetooth Technology In Wireless CommunicationsBluetooth Technology In Wireless Communications
Bluetooth Technology In Wireless Communications
 
Connected lighting in commercial applications
Connected lighting in commercial applicationsConnected lighting in commercial applications
Connected lighting in commercial applications
 
Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]
 
Bluetooth k.v
Bluetooth                                k.vBluetooth                                k.v
Bluetooth k.v
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)Bluetooth smart technology(description about all versions)
Bluetooth smart technology(description about all versions)
 
Wireless standards
Wireless standards Wireless standards
Wireless standards
 
Bluetooth global-technology 170
Bluetooth global-technology 170Bluetooth global-technology 170
Bluetooth global-technology 170
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
BLUETOOTH.ppt
BLUETOOTH.pptBLUETOOTH.ppt
BLUETOOTH.ppt
 

Recently uploaded

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 

Bluetooth Security.PPT

  • 2. OUT LINE  INTRODUCTION  SECURITY FRAMEWORK  LINK LEVEL SECURITY  SERVICE LEVEL SECURITY  CONCLUSION  BIBLOGRAPHY  QUESTIONS BE COMPUTER SEMINAR
  • 3. INTRODUCTION  Bluetooth is a new technology named after the 10th century by Danish king Harald Bluetooth.  Bluetooth is develop to provide cable- free environment.  Security architecture. BE COMPUTER SEMINAR
  • 4. APPLICATIONS  Wireless headsets for cell phones.  Wireless PC Mouse connection to the PC using Bluetooth.  Wireless printing between a PC.  Automated synchronization of Personal Digital Assistant (PDAs) and PCs using Bluetooth.  Ad hoc networking and file sharing between PCs, PDAs & laptops in a meeting. BE COMPUTER SEMINAR
  • 5. BENEFITS  Cable replacement between two devices  The wide range of device types and standard interface  Set of wired and wireless devices are Bluetooth connectable BE COMPUTER SEMINAR
  • 6. SECURITY FRAMEWORK  BASIC DEFINITION  SECURITY MODES  SECURITY LEVELS BE COMPUTER SEMINAR
  • 7. BASIC DEFINITION  ENCRYPTION  Transfers data to other form, can’t understood without key.  AUTHENTICATION  The ensuring of the identity of another user.  AUTHORIZATION  Deciding, if a device is allowed to have access to a service. BE COMPUTER SEMINAR
  • 8. SECURITY MODES  MODE 1: NON-SECURE MODE  MODE 2: SERVICE LEVEL SECURITY  MODE 3: LINK LEVEL SECURITY BE COMPUTER SEMINAR
  • 9. SECURITY LEVELS  LINK LEVEL SECURITY  The Bluetooth device initiates security functions before the channel is established.  SERVICE LEVEL SECURITY  The Bluetooth device initiates security functions after the channel is established BE COMPUTER SEMINAR
  • 10. LINK LEVEL SECURITY  KEY MANAGEMENT SCHEME  AUTHENTICATION SCHEME  ENCRYPTION SCHEME BE COMPUTER SEMINAR
  • 11. KEY MANAGEMENT SCHEME BE COMPUTER SEMINAR
  • 14. SERVICE LEVEL SECURITY This is an approach for a flexible security architecture built on top of the link-level security features of Bluetooth The key component in the architecture is a security manager BE COMPUTER SEMINAR
  • 16. CONCLUSION  Bluetooth's security seemed to be adequate small ad hoc networks.  Bluetooth secure for larger networks, money transfers and transferring other sensitive information.  Original design goal of cable replacement.  Bluetooth is more suitable to short-range.  Small-size wireless personal area networks. BE COMPUTER SEMINAR
  • 17. BE COMPUTER SEMINAR BIBLIOGRAPHY  Jun-Zhao Sun, Douglas Howie, Antti Koivisto, and Jaakko Sauvola. Design, Implementation, And Evaluation Of Bluetooth Security, [referred 2002-01-07]  Saarinen M-J, A Software Implementation of the Bluetooth Encryption, [referred 2000-03-15]  Muller T., Bluetooth Security Architecture: Version1.0., Bluetooth Paper, Document # 1.C.116/1.0, July 15, 2000.