Bluetooth is a wireless technology that allows various electronic devices to connect and communicate with each other over short distances. It allows devices such as computers, phones, and other electronics to exchange data without cables. Bluetooth is widely used in applications like connecting headphones, keyboards, and mice to devices, as well as enabling hands-free calling in cars. While Bluetooth security has improved, it may not be suitable for highly confidential information currently. However, Bluetooth security is expected to continue enhancing over time through improved existing security measures and new security implementations. Bluetooth has become prevalent in offices, homes, and on the road in applications like wireless earbuds, smartwatches, and connecting phones to cars.
3. Introduction (cont’d)Introduction (cont’d)
• Is Bluetooth here to stay?Is Bluetooth here to stay?
• What should we expect fromWhat should we expect from
Bluetooth in the future?Bluetooth in the future?
4. What Bluetooth Delivers toWhat Bluetooth Delivers to
the end-userthe end-user
• Connects a wide range of computing andConnects a wide range of computing and
telecommunication devicestelecommunication devices
• Expand communication capabilitiesExpand communication capabilities
• Devices can communicate with each otherDevices can communicate with each other
with wireless connectivitywith wireless connectivity
5. User ApplicationUser Application
• Car manufactures IndustryCar manufactures Industry
• E-Mail / Internet / Intranet AccessE-Mail / Internet / Intranet Access
• HeadsetsHeadsets
• Bluetooth will facilitate Local AreaBluetooth will facilitate Local Area
Networks
6. Bluetooth in ActionBluetooth in Action
Source: http//:www.motorola.com
In the Office ...In the Office ...
In the houseIn the house
8. On your CarOn your Car
Source: http//:www.motorola.com
9. Bluetooth SpecificationsBluetooth Specifications
• Things that you must have:Things that you must have:
– Transceivers and Receivers thatTransceivers and Receivers that
can send and receive data becausecan send and receive data because
they usethey use Radio Waves.Radio Waves.
– PIN NumberPIN Number
• To identify the user using the device.To identify the user using the device.
10. Bluetooth SecurityBluetooth Security
• ModesModes
– Security Mode 1Security Mode 1
• No SecurityNo Security
– Security Mode 2Security Mode 2
• Service Level Enforced SecurityService Level Enforced Security
• Implemented after channel is establishedImplemented after channel is established
– Security Mode 3Security Mode 3
• Link Level Enforced SecurityLink Level Enforced Security
12. Service LevelsService Levels
• Authorization and AuthenticationAuthorization and Authentication
• Authentication OnlyAuthentication Only
• Open to all DevicesOpen to all Devices
13. Bluetooth Secure Enough?Bluetooth Secure Enough?
• Not enough for confidential and top secretNot enough for confidential and top secret
information now but . . .information now but . . .
• Security will ImproveSecurity will Improve
– Improve exisiting securityImprove exisiting security
– Implement new securityImplement new security
14. For More Information PleaseFor More Information Please
Visit The Following SitesVisit The Following Sites
REFERENCESREFERENCES
• www.motorola.comwww.motorola.com
• www.xircom.comwww.xircom.com
• www.palowireless.comwww.palowireless.com
• www.bluetooth.comwww.bluetooth.com