SlideShare a Scribd company logo
1 of 14
BLUETOOTH SECURITY
Created By
Jay Nagar
(nagarjay007@gmail.com)
OUT LINE
 INTRODUCTION
 SECURITY FRAMEWORK
 LINK LEVEL SECURITY
 SERVICE LEVEL SECURITY
 CONCLUSION
 BIBLOGRAPHY
 QUESTIONS
BE IT SEMINAR
2/19
INTRODUCTION
 Bluetooth is a new technology named
after the 10th century by Danish king
Harald Bluetooth.
 Bluetooth is develop to provide cable-
free environment.
 Security architecture.
BE IT SEMINAR
3/19
APPLICATIONS
 Wireless headsets for cell phones.
 Wireless PC Mouse connection to the PC using
Bluetooth.
 Wireless printing between a PC.
 Automated synchronization of Personal Digital
Assistant (PDAs) and PCs using Bluetooth.
 Ad hoc networking and file sharing between
PCs, PDAs & laptops in a meeting.
BE IT SEMINAR
4/19
APPLICATIONS
 Wireless headsets for cell phones.
 Wireless PC Mouse connection to the PC using
Bluetooth.
 Wireless printing between a PC.
 Automated synchronization of Personal Digital
Assistant (PDAs) and PCs using Bluetooth.
 Ad hoc networking and file sharing between
PCs, PDAs & laptops in a meeting.
BE IT SEMINAR
4/19
BENEFITS
 Cable replacement between two
devices
 The wide range of device types and
standard interface
 Set of wired and wireless devices are
Bluetooth connectable
5/19
BASIC DEFINITION
 ENCRYPTION
 Transfers data to other form, can’t
understood without key.
 AUTHENTICATION
 The ensuring of the identity of another user.
 AUTHORIZATION
 Deciding, if a device is allowed to have access
to a service.
BE ITSEMINAR
7/19
SECURITY MODES
 MODE 1: NON-SECURE MODE
 MODE 2: SERVICE LEVEL SECURITY
 MODE 3: LINK LEVEL SECURITY
BE IT SEMINAR
8/19
SECURITY LEVELS
 LINK LEVEL SECURITY
 The Bluetooth device initiates security
functions before the channel is established.
 SERVICE LEVEL SECURITY
 The Bluetooth device initiates security
functions after the channel is established
BE ITSEMINAR
9/19
LINK LEVEL SECURITY
 KEY MANAGEMENT SCHEME
 AUTHENTICATION SCHEME
 ENCRYPTION SCHEME
BE IT SEMINAR
10/19
KEY MANAGEMENT SCHEME
BE IT SEMINAR
11/19
CONCLUSION
 Bluetooth's security seemed to be adequate
small ad hoc networks.
 Bluetooth secure for larger networks,
money transfers and transferring other
sensitive information.
 Original design goal of cable replacement.
 Bluetooth is more suitable to short-range.
 Small-size wireless personal area networks.
BE ITSEMINAR
16/19
BE ITSEMINAR
17/19
BIBLIOGRAPHY
 Jun-Zhao Sun, Douglas Howie, Antti Koivisto,
and Jaakko Sauvola. Design, Implementation,
And Evaluation Of Bluetooth Security, [referred
2002-01-07]
 Saarinen M-J, A Software Implementation of
the Bluetooth Encryption, [referred 2000-03-15]
 Muller T., Bluetooth Security Architecture:
Version1.0., Bluetooth Paper, Document #
1.C.116/1.0, July 15, 2000.
BE ITSEMINAR
19/19

More Related Content

What's hot

Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
h_marvin
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technology
pariluv
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
Akshita Pillai
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
David Livingston J
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
Sadhana28
 

What's hot (20)

Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
bluejacking
bluejackingbluejacking
bluejacking
 
Bluetooth technology by polite group
Bluetooth technology by polite groupBluetooth technology by polite group
Bluetooth technology by polite group
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technology
 
WIRELESS TECHNOLOGY-Bluetooth
WIRELESS TECHNOLOGY-Bluetooth WIRELESS TECHNOLOGY-Bluetooth
WIRELESS TECHNOLOGY-Bluetooth
 
An Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGYAn Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGY
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
BLUEJACKING
BLUEJACKINGBLUEJACKING
BLUEJACKING
 
Extending Bluetooth with Mesh Networking
Extending Bluetooth with Mesh NetworkingExtending Bluetooth with Mesh Networking
Extending Bluetooth with Mesh Networking
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
 
Bluejacking by Niharika Mundra
Bluejacking  by Niharika MundraBluejacking  by Niharika Mundra
Bluejacking by Niharika Mundra
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth & Bluetooth Low Energy internals
Bluetooth & Bluetooth Low Energy internalsBluetooth & Bluetooth Low Energy internals
Bluetooth & Bluetooth Low Energy internals
 
Bluetooth low energy
Bluetooth low energyBluetooth low energy
Bluetooth low energy
 

Viewers also liked (8)

Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Blue Tooth Technoloty
Blue Tooth TechnolotyBlue Tooth Technoloty
Blue Tooth Technoloty
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 

Similar to BLUETOOTH SECURITY

Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]
Ahsaan Arain
 
226335 633858374451812775
226335 633858374451812775226335 633858374451812775
226335 633858374451812775
pratikpatilp
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
Siya Agarwal
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
mathan0071
 

Similar to BLUETOOTH SECURITY (20)

Bluetooth Security.PPT
Bluetooth Security.PPTBluetooth Security.PPT
Bluetooth Security.PPT
 
Blue1
Blue1Blue1
Blue1
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
 
Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]
 
Bluetooth by vk
Bluetooth by vkBluetooth by vk
Bluetooth by vk
 
226335 633858374451812775
226335 633858374451812775226335 633858374451812775
226335 633858374451812775
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Wireless standards
Wireless standards Wireless standards
Wireless standards
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Seminar
SeminarSeminar
Seminar
 
Seminar on bluetooth
Seminar on bluetoothSeminar on bluetooth
Seminar on bluetooth
 
Bq4301381388
Bq4301381388Bq4301381388
Bq4301381388
 
Bluetooth 27 01-12 PPT
Bluetooth 27 01-12 PPTBluetooth 27 01-12 PPT
Bluetooth 27 01-12 PPT
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

More from Jay Nagar

More from Jay Nagar (20)

11 best tips to grow your influence youtube
11 best tips to grow your influence youtube11 best tips to grow your influence youtube
11 best tips to grow your influence youtube
 
Impact of micro vs macro influencers in 2022
Impact of micro vs macro influencers in 2022Impact of micro vs macro influencers in 2022
Impact of micro vs macro influencers in 2022
 
What is Signature marketing
What is Signature marketingWhat is Signature marketing
What is Signature marketing
 
100+ Guest blogging sites list
100+ Guest blogging sites list100+ Guest blogging sites list
100+ Guest blogging sites list
 
Ethical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationEthical Hacking and Defense Penetration
Ethical Hacking and Defense Penetration
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020
 
On-Page SEO Techniques By Digitech Jay
On-Page SEO Techniques By Digitech JayOn-Page SEO Techniques By Digitech Jay
On-Page SEO Techniques By Digitech Jay
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Dynamic programming
Dynamic programmingDynamic programming
Dynamic programming
 
Bluethooth Protocol stack/layers
Bluethooth Protocol stack/layersBluethooth Protocol stack/layers
Bluethooth Protocol stack/layers
 
GPRS(General Packet Radio Service)
GPRS(General Packet Radio Service)GPRS(General Packet Radio Service)
GPRS(General Packet Radio Service)
 
Communication and Networking
Communication and NetworkingCommunication and Networking
Communication and Networking
 
MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION
 
Global system for mobile communication(GSM)
Global system for mobile communication(GSM)Global system for mobile communication(GSM)
Global system for mobile communication(GSM)
 
Python for beginners
Python for beginnersPython for beginners
Python for beginners
 
Earn Money from bug bounty
Earn Money from bug bountyEarn Money from bug bounty
Earn Money from bug bounty
 
Code smell & refactoring
Code smell & refactoringCode smell & refactoring
Code smell & refactoring
 
The Diffie-Hellman Algorithm
The Diffie-Hellman AlgorithmThe Diffie-Hellman Algorithm
The Diffie-Hellman Algorithm
 

Recently uploaded

Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (6)

Mobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s ToolsMobile Application Development-Android and It’s Tools
Mobile Application Development-Android and It’s Tools
 
Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312Mobile App Penetration Testing Bsides312
Mobile App Penetration Testing Bsides312
 
Mobile Application Development-Components and Layouts
Mobile Application Development-Components and LayoutsMobile Application Development-Components and Layouts
Mobile Application Development-Components and Layouts
 
Android Application Components with Implementation & Examples
Android Application Components with Implementation & ExamplesAndroid Application Components with Implementation & Examples
Android Application Components with Implementation & Examples
 
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
Obat Penggugur Kandungan Di Apotik Kimia Farma (087776558899)
 
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
Satara Call girl escort *74796//13122* Call me punam call girls 24*7hour avai...
 

BLUETOOTH SECURITY

  • 1. BLUETOOTH SECURITY Created By Jay Nagar (nagarjay007@gmail.com)
  • 2. OUT LINE  INTRODUCTION  SECURITY FRAMEWORK  LINK LEVEL SECURITY  SERVICE LEVEL SECURITY  CONCLUSION  BIBLOGRAPHY  QUESTIONS BE IT SEMINAR 2/19
  • 3. INTRODUCTION  Bluetooth is a new technology named after the 10th century by Danish king Harald Bluetooth.  Bluetooth is develop to provide cable- free environment.  Security architecture. BE IT SEMINAR 3/19
  • 4. APPLICATIONS  Wireless headsets for cell phones.  Wireless PC Mouse connection to the PC using Bluetooth.  Wireless printing between a PC.  Automated synchronization of Personal Digital Assistant (PDAs) and PCs using Bluetooth.  Ad hoc networking and file sharing between PCs, PDAs & laptops in a meeting. BE IT SEMINAR 4/19
  • 5. APPLICATIONS  Wireless headsets for cell phones.  Wireless PC Mouse connection to the PC using Bluetooth.  Wireless printing between a PC.  Automated synchronization of Personal Digital Assistant (PDAs) and PCs using Bluetooth.  Ad hoc networking and file sharing between PCs, PDAs & laptops in a meeting. BE IT SEMINAR 4/19
  • 6. BENEFITS  Cable replacement between two devices  The wide range of device types and standard interface  Set of wired and wireless devices are Bluetooth connectable 5/19
  • 7. BASIC DEFINITION  ENCRYPTION  Transfers data to other form, can’t understood without key.  AUTHENTICATION  The ensuring of the identity of another user.  AUTHORIZATION  Deciding, if a device is allowed to have access to a service. BE ITSEMINAR 7/19
  • 8. SECURITY MODES  MODE 1: NON-SECURE MODE  MODE 2: SERVICE LEVEL SECURITY  MODE 3: LINK LEVEL SECURITY BE IT SEMINAR 8/19
  • 9. SECURITY LEVELS  LINK LEVEL SECURITY  The Bluetooth device initiates security functions before the channel is established.  SERVICE LEVEL SECURITY  The Bluetooth device initiates security functions after the channel is established BE ITSEMINAR 9/19
  • 10. LINK LEVEL SECURITY  KEY MANAGEMENT SCHEME  AUTHENTICATION SCHEME  ENCRYPTION SCHEME BE IT SEMINAR 10/19
  • 11. KEY MANAGEMENT SCHEME BE IT SEMINAR 11/19
  • 12. CONCLUSION  Bluetooth's security seemed to be adequate small ad hoc networks.  Bluetooth secure for larger networks, money transfers and transferring other sensitive information.  Original design goal of cable replacement.  Bluetooth is more suitable to short-range.  Small-size wireless personal area networks. BE ITSEMINAR 16/19
  • 13. BE ITSEMINAR 17/19 BIBLIOGRAPHY  Jun-Zhao Sun, Douglas Howie, Antti Koivisto, and Jaakko Sauvola. Design, Implementation, And Evaluation Of Bluetooth Security, [referred 2002-01-07]  Saarinen M-J, A Software Implementation of the Bluetooth Encryption, [referred 2000-03-15]  Muller T., Bluetooth Security Architecture: Version1.0., Bluetooth Paper, Document # 1.C.116/1.0, July 15, 2000.