Bluetooth is a new technology named after the 10th century by Danish king Harald Bluetooth.
Bluetooth is develop to provide cable-free environment.
Security architecture
2. OUT LINE
INTRODUCTION
SECURITY FRAMEWORK
LINK LEVEL SECURITY
SERVICE LEVEL SECURITY
CONCLUSION
BIBLOGRAPHY
QUESTIONS
BE COMPUTER SEMINAR
3. INTRODUCTION
Bluetooth is a new technology named
after the 10th century by Danish king
Harald Bluetooth.
Bluetooth is develop to provide cable-
free environment.
Security architecture.
BE COMPUTER SEMINAR
4. APPLICATIONS
Wireless headsets for cell phones.
Wireless PC Mouse connection to the PC using
Bluetooth.
Wireless printing between a PC.
Automated synchronization of Personal Digital
Assistant (PDAs) and PCs using Bluetooth.
Ad hoc networking and file sharing between
PCs, PDAs & laptops in a meeting.
BE COMPUTER SEMINAR
5. BENEFITS
Cable replacement between two
devices
The wide range of device types and
standard interface
Set of wired and wireless devices are
Bluetooth connectable
BE COMPUTER SEMINAR
7. BASIC DEFINITION
ENCRYPTION
Transfers data to other form, can’t
understood without key.
AUTHENTICATION
The ensuring of the identity of another user.
AUTHORIZATION
Deciding, if a device is allowed to have access
to a service.
BE COMPUTER SEMINAR
8. SECURITY MODES
MODE 1: NON-SECURE MODE
MODE 2: SERVICE LEVEL SECURITY
MODE 3: LINK LEVEL SECURITY
BE COMPUTER SEMINAR
9. SECURITY LEVELS
LINK LEVEL SECURITY
The Bluetooth device initiates security
functions before the channel is established.
SERVICE LEVEL SECURITY
The Bluetooth device initiates security
functions after the channel is established
BE COMPUTER SEMINAR
10. LINK LEVEL SECURITY
KEY MANAGEMENT SCHEME
AUTHENTICATION SCHEME
ENCRYPTION SCHEME
BE COMPUTER SEMINAR
14. SERVICE LEVEL SECURITY
This is an approach for a flexible security
architecture built on top of the link-level security
features of Bluetooth
The key component in the architecture is a
security manager
BE COMPUTER SEMINAR
16. CONCLUSION
Bluetooth's security seemed to be adequate
small ad hoc networks.
Bluetooth secure for larger networks,
money transfers and transferring other
sensitive information.
Original design goal of cable replacement.
Bluetooth is more suitable to short-range.
Small-size wireless personal area networks.
BE COMPUTER SEMINAR
17. BE COMPUTER SEMINAR
BIBLIOGRAPHY
Jun-Zhao Sun, Douglas Howie, Antti Koivisto,
and Jaakko Sauvola. Design, Implementation,
And Evaluation Of Bluetooth Security, [referred
2002-01-07]
Saarinen M-J, A Software Implementation of
the Bluetooth Encryption, [referred 2000-03-15]
Muller T., Bluetooth Security Architecture:
Version1.0., Bluetooth Paper, Document #
1.C.116/1.0, July 15, 2000.