3. Introduction
3
RS-232 data cable
A wireless technology standard for exchanging data over short distances
The purpose of Bluetooth is to replace the cables that normally connect
devices, while still keeping the communications between them secure
Uses short-wavelength UHF(Ultra high frequency) radio waves
It was originally conceived as a wireless alternative to RS-232 data cables
Bluetooth is managed by the Bluetooth Special
Interest Group (SIG)
A manufacturer must meet Bluetooth SIG standards to market it as a
Bluetooth device
4. History
4
The "Bluetooth" name is taken from a the tenth-century king Harald
Bluetooth who united dissonant Danish tribes into a single kingdom
The idea of this name was proposed in 1997 by Jim Kardach of Intel
who developed a system that would allow mobile phones to
communicate with computers
At the time of this proposal he was reading Frans G. Bengtsson's
historical novel The Long Ships about Vikings and King Harald
Bluetooth
The Bluetooth logo is a bind rune merging the Younger Futhark runes
(ᚼ, Hagall) and (ᛒ, Bjarkan)
5. Implementation
5
Bluetooth uses a radio technology called frequency-hopping spread spectrum
Bluetooth divides transmitted data into packets, and transmits each packet on
one of 79 designated Bluetooth channels
Bluetooth Low Energy uses 2 MHz spacing, which accommodates 40
channels
Each channel has a bandwidth of 1 MHz. It usually performs 1600 hops per
second, with adaptive frequency-hopping (AFH) enabled
Frequency hopping
6. Implementation contd..
6
Bluetooth is a packet-based protocol with a master/slave architecture. One
master may communicate with up to seven slaves in a piconet
All devices share the master's clock. Packet exchange is based on the basic
clock, defined by the master, which ticks at 312.5 µs intervals
Two clock ticks make up a slot of 625 µs, and two slots make up a slot pair
of 1250 µs
In the simple case of single-slot packets, the master transmits in even slots
and receives in odd slots. The slave, conversely, receives in even slots and
transmits in odd slots
Packets maybe 1, 3 or 5 slots long, but in all cases the master's transmission
begins in even slots and the slave's in odd slots.
7. Security
7
Bluetooth implements confidentiality, authentication and key derivation with
custom algorithms based on the SAFER(Secure And Fast Encryption
Routine)+ block cipher.
Bluetooth key generation is generally based on a Bluetooth PIN, which must
be entered into both devices
During pairing, an initialization key or master key is generated, using the
E22 algorithm. The E0 stream cipher is used for encrypting packets, granting
confidentiality, and is based on a shared cryptographic secret, namely a
previously generated link key or master key.
E0 is a stream cipher used in the Bluetooth protocol. It generates a sequence
of pseudorandom numbers and combines it with the data using the XOR
operator. The key length may vary, but is generally 128 bits.
8. Security
8
In April 2017, security researchers at Armis discovered multiple exploits in
the Bluetooth software
These vulnerabilities are collectively called "BlueBorne." The exploits allow
an attacker to connect to devices or systems without authentication and can
give them "virtually full control over the device."
BlueBorne explained
9. List of Applications
9
Wireless control and communication between a mobile phone and a handsfree headset. This was one
of the earliest applications to become popular.
Wireless control of and communication between a mobile phone and a Bluetooth compatible car
stereo system.
Wireless control of and communication with iOS and Android device phones, tablets and portable
wireless speakers.
Wireless Bluetooth headset and Intercom. Idiomatically, a headset is sometimes called "a Bluetooth".
Wireless streaming of audio to headphones with or without communication capabilities.
Wireless streaming of data collected by Bluetooth-enabled fitness devices to phone or PC.
Wireless networking between PCs in a confined space and where little bandwidth is required.
Wireless communication with PC input and output devices, the most common being the mouse,
keyboard and printer.
Transfer of files, contact details, calendar appointments, and reminders between devices with OBEX.
10. References
• "Basics Bluetooth Technology Website". Bluetooth.com. 23 May 2010.
• "Bluetooth.org". Bluetooth.org. Retrieved 3 May 2011.
• "Brand Enforcement Program". Bluetooth.org. Archived from the original on 4
November 2013. Retrieved 2 November 2013.
• "The Bluetooth Blues". Information Age. 24 May 2001. Archived from the original
on 22 December 2007. Retrieved 1 February 2008.
• "Bluetooth traveler". hoovers.com. Archived from the original on 11 January 2011.
Retrieved 9 April 2010.
• Google Images
[https://www.google.com/search?q=bluetooth+gif&source=lnms&tbm=isch&sa=X
&ved=0ahUKEwjvjKGK7PHfAhVMpI8KHe3eABsQ_AUIDigB&biw=1319&bih
=672#imgrc=Jz5fCtFclxU_fM:]
• Youtube video[https://www.youtube.com/watch?v=LLNtZKpL0P8&t=7s]
10