BLUETOOTH SECURITY
Created By
Jay Nagar
(nagarjay007@gmail.com)
OUT LINE
 INTRODUCTION
 SECURITY FRAMEWORK
 LINK LEVEL SECURITY
 SERVICE LEVEL SECURITY
 CONCLUSION
 BIBLOGRAPHY
 QUESTIONS
BE IT SEMINAR
2/19
INTRODUCTION
 Bluetooth is a new technology named
after the 10th century by Danish king
Harald Bluetooth.
 Bluetooth is develop to provide cable-
free environment.
 Security architecture.
BE IT SEMINAR
3/19
APPLICATIONS
 Wireless headsets for cell phones.
 Wireless PC Mouse connection to the PC using
Bluetooth.
 Wireless printing between a PC.
 Automated synchronization of Personal Digital
Assistant (PDAs) and PCs using Bluetooth.
 Ad hoc networking and file sharing between
PCs, PDAs & laptops in a meeting.
BE IT SEMINAR
4/19
APPLICATIONS
 Wireless headsets for cell phones.
 Wireless PC Mouse connection to the PC using
Bluetooth.
 Wireless printing between a PC.
 Automated synchronization of Personal Digital
Assistant (PDAs) and PCs using Bluetooth.
 Ad hoc networking and file sharing between
PCs, PDAs & laptops in a meeting.
BE IT SEMINAR
4/19
BENEFITS
 Cable replacement between two
devices
 The wide range of device types and
standard interface
 Set of wired and wireless devices are
Bluetooth connectable
5/19
BASIC DEFINITION
 ENCRYPTION
 Transfers data to other form, can’t
understood without key.
 AUTHENTICATION
 The ensuring of the identity of another user.
 AUTHORIZATION
 Deciding, if a device is allowed to have access
to a service.
BE ITSEMINAR
7/19
SECURITY MODES
 MODE 1: NON-SECURE MODE
 MODE 2: SERVICE LEVEL SECURITY
 MODE 3: LINK LEVEL SECURITY
BE IT SEMINAR
8/19
SECURITY LEVELS
 LINK LEVEL SECURITY
 The Bluetooth device initiates security
functions before the channel is established.
 SERVICE LEVEL SECURITY
 The Bluetooth device initiates security
functions after the channel is established
BE ITSEMINAR
9/19
LINK LEVEL SECURITY
 KEY MANAGEMENT SCHEME
 AUTHENTICATION SCHEME
 ENCRYPTION SCHEME
BE IT SEMINAR
10/19
KEY MANAGEMENT SCHEME
BE IT SEMINAR
11/19
CONCLUSION
 Bluetooth's security seemed to be adequate
small ad hoc networks.
 Bluetooth secure for larger networks,
money transfers and transferring other
sensitive information.
 Original design goal of cable replacement.
 Bluetooth is more suitable to short-range.
 Small-size wireless personal area networks.
BE ITSEMINAR
16/19
BE ITSEMINAR
17/19
BIBLIOGRAPHY
 Jun-Zhao Sun, Douglas Howie, Antti Koivisto,
and Jaakko Sauvola. Design, Implementation,
And Evaluation Of Bluetooth Security, [referred
2002-01-07]
 Saarinen M-J, A Software Implementation of
the Bluetooth Encryption, [referred 2000-03-15]
 Muller T., Bluetooth Security Architecture:
Version1.0., Bluetooth Paper, Document #
1.C.116/1.0, July 15, 2000.
BE ITSEMINAR
19/19

BLUETOOTH SECURITY

  • 1.
    BLUETOOTH SECURITY Created By JayNagar (nagarjay007@gmail.com)
  • 2.
    OUT LINE  INTRODUCTION SECURITY FRAMEWORK  LINK LEVEL SECURITY  SERVICE LEVEL SECURITY  CONCLUSION  BIBLOGRAPHY  QUESTIONS BE IT SEMINAR 2/19
  • 3.
    INTRODUCTION  Bluetooth isa new technology named after the 10th century by Danish king Harald Bluetooth.  Bluetooth is develop to provide cable- free environment.  Security architecture. BE IT SEMINAR 3/19
  • 4.
    APPLICATIONS  Wireless headsetsfor cell phones.  Wireless PC Mouse connection to the PC using Bluetooth.  Wireless printing between a PC.  Automated synchronization of Personal Digital Assistant (PDAs) and PCs using Bluetooth.  Ad hoc networking and file sharing between PCs, PDAs & laptops in a meeting. BE IT SEMINAR 4/19
  • 5.
    APPLICATIONS  Wireless headsetsfor cell phones.  Wireless PC Mouse connection to the PC using Bluetooth.  Wireless printing between a PC.  Automated synchronization of Personal Digital Assistant (PDAs) and PCs using Bluetooth.  Ad hoc networking and file sharing between PCs, PDAs & laptops in a meeting. BE IT SEMINAR 4/19
  • 6.
    BENEFITS  Cable replacementbetween two devices  The wide range of device types and standard interface  Set of wired and wireless devices are Bluetooth connectable 5/19
  • 7.
    BASIC DEFINITION  ENCRYPTION Transfers data to other form, can’t understood without key.  AUTHENTICATION  The ensuring of the identity of another user.  AUTHORIZATION  Deciding, if a device is allowed to have access to a service. BE ITSEMINAR 7/19
  • 8.
    SECURITY MODES  MODE1: NON-SECURE MODE  MODE 2: SERVICE LEVEL SECURITY  MODE 3: LINK LEVEL SECURITY BE IT SEMINAR 8/19
  • 9.
    SECURITY LEVELS  LINKLEVEL SECURITY  The Bluetooth device initiates security functions before the channel is established.  SERVICE LEVEL SECURITY  The Bluetooth device initiates security functions after the channel is established BE ITSEMINAR 9/19
  • 10.
    LINK LEVEL SECURITY KEY MANAGEMENT SCHEME  AUTHENTICATION SCHEME  ENCRYPTION SCHEME BE IT SEMINAR 10/19
  • 11.
    KEY MANAGEMENT SCHEME BEIT SEMINAR 11/19
  • 12.
    CONCLUSION  Bluetooth's securityseemed to be adequate small ad hoc networks.  Bluetooth secure for larger networks, money transfers and transferring other sensitive information.  Original design goal of cable replacement.  Bluetooth is more suitable to short-range.  Small-size wireless personal area networks. BE ITSEMINAR 16/19
  • 13.
    BE ITSEMINAR 17/19 BIBLIOGRAPHY  Jun-ZhaoSun, Douglas Howie, Antti Koivisto, and Jaakko Sauvola. Design, Implementation, And Evaluation Of Bluetooth Security, [referred 2002-01-07]  Saarinen M-J, A Software Implementation of the Bluetooth Encryption, [referred 2000-03-15]  Muller T., Bluetooth Security Architecture: Version1.0., Bluetooth Paper, Document # 1.C.116/1.0, July 15, 2000.
  • 14.