A SEMINAR PRESENTATION
On
BLUETOOTH SECURITY
OUT LINE
 INTRODUCTION
 SECURITY FRAMEWORK
 LINK LEVEL SECURITY
 SERVICE LEVEL SECURITY
 CONCLUSION
 BIBLOGRAPHY
 QUESTIONS
BE COMPUTER SEMINAR
INTRODUCTION
 Bluetooth is a new technology named
after the 10th century by Danish king
Harald Bluetooth.
 Bluetooth is develop to provide cable-
free environment.
 Security architecture.
BE COMPUTER SEMINAR
APPLICATIONS
 Wireless headsets for cell phones.
 Wireless PC Mouse connection to the PC using
Bluetooth.
 Wireless printing between a PC.
 Automated synchronization of Personal Digital
Assistant (PDAs) and PCs using Bluetooth.
 Ad hoc networking and file sharing between
PCs, PDAs & laptops in a meeting.
BE COMPUTER SEMINAR
BENEFITS
 Cable replacement between two
devices
 The wide range of device types and
standard interface
 Set of wired and wireless devices are
Bluetooth connectable
BE COMPUTER SEMINAR
SECURITY FRAMEWORK
 BASIC DEFINITION
 SECURITY MODES
 SECURITY LEVELS
BE COMPUTER SEMINAR
BASIC DEFINITION
 ENCRYPTION
 Transfers data to other form, can’t
understood without key.
 AUTHENTICATION
 The ensuring of the identity of another user.
 AUTHORIZATION
 Deciding, if a device is allowed to have access
to a service.
BE COMPUTER SEMINAR
SECURITY MODES
 MODE 1: NON-SECURE MODE
 MODE 2: SERVICE LEVEL SECURITY
 MODE 3: LINK LEVEL SECURITY
BE COMPUTER SEMINAR
SECURITY LEVELS
 LINK LEVEL SECURITY
 The Bluetooth device initiates security
functions before the channel is established.
 SERVICE LEVEL SECURITY
 The Bluetooth device initiates security
functions after the channel is established
BE COMPUTER SEMINAR
LINK LEVEL SECURITY
 KEY MANAGEMENT SCHEME
 AUTHENTICATION SCHEME
 ENCRYPTION SCHEME
BE COMPUTER SEMINAR
KEY MANAGEMENT SCHEME
BE COMPUTER SEMINAR
AUTHENTICATION SCHEME
BE COMPUTER SEMINAR
ENCRYPTION SCHEME
BE COMPUTER SEMINAR
SERVICE LEVEL SECURITY
This is an approach for a flexible security
architecture built on top of the link-level security
features of Bluetooth
The key component in the architecture is a
security manager
BE COMPUTER SEMINAR
BE COMPUTER SEMINAR
CONCLUSION
 Bluetooth's security seemed to be adequate
small ad hoc networks.
 Bluetooth secure for larger networks,
money transfers and transferring other
sensitive information.
 Original design goal of cable replacement.
 Bluetooth is more suitable to short-range.
 Small-size wireless personal area networks.
BE COMPUTER SEMINAR
BE COMPUTER SEMINAR
BIBLIOGRAPHY
 Jun-Zhao Sun, Douglas Howie, Antti Koivisto,
and Jaakko Sauvola. Design, Implementation,
And Evaluation Of Bluetooth Security, [referred
2002-01-07]
 Saarinen M-J, A Software Implementation of
the Bluetooth Encryption, [referred 2000-03-15]
 Muller T., Bluetooth Security Architecture:
Version1.0., Bluetooth Paper, Document #
1.C.116/1.0, July 15, 2000.
BE COMPUTER SEMINAR
BE COMPUTER SEMINAR

Bluetooth Security.PPT

  • 1.
  • 2.
    OUT LINE  INTRODUCTION SECURITY FRAMEWORK  LINK LEVEL SECURITY  SERVICE LEVEL SECURITY  CONCLUSION  BIBLOGRAPHY  QUESTIONS BE COMPUTER SEMINAR
  • 3.
    INTRODUCTION  Bluetooth isa new technology named after the 10th century by Danish king Harald Bluetooth.  Bluetooth is develop to provide cable- free environment.  Security architecture. BE COMPUTER SEMINAR
  • 4.
    APPLICATIONS  Wireless headsetsfor cell phones.  Wireless PC Mouse connection to the PC using Bluetooth.  Wireless printing between a PC.  Automated synchronization of Personal Digital Assistant (PDAs) and PCs using Bluetooth.  Ad hoc networking and file sharing between PCs, PDAs & laptops in a meeting. BE COMPUTER SEMINAR
  • 5.
    BENEFITS  Cable replacementbetween two devices  The wide range of device types and standard interface  Set of wired and wireless devices are Bluetooth connectable BE COMPUTER SEMINAR
  • 6.
    SECURITY FRAMEWORK  BASICDEFINITION  SECURITY MODES  SECURITY LEVELS BE COMPUTER SEMINAR
  • 7.
    BASIC DEFINITION  ENCRYPTION Transfers data to other form, can’t understood without key.  AUTHENTICATION  The ensuring of the identity of another user.  AUTHORIZATION  Deciding, if a device is allowed to have access to a service. BE COMPUTER SEMINAR
  • 8.
    SECURITY MODES  MODE1: NON-SECURE MODE  MODE 2: SERVICE LEVEL SECURITY  MODE 3: LINK LEVEL SECURITY BE COMPUTER SEMINAR
  • 9.
    SECURITY LEVELS  LINKLEVEL SECURITY  The Bluetooth device initiates security functions before the channel is established.  SERVICE LEVEL SECURITY  The Bluetooth device initiates security functions after the channel is established BE COMPUTER SEMINAR
  • 10.
    LINK LEVEL SECURITY KEY MANAGEMENT SCHEME  AUTHENTICATION SCHEME  ENCRYPTION SCHEME BE COMPUTER SEMINAR
  • 11.
    KEY MANAGEMENT SCHEME BECOMPUTER SEMINAR
  • 12.
  • 13.
  • 14.
    SERVICE LEVEL SECURITY Thisis an approach for a flexible security architecture built on top of the link-level security features of Bluetooth The key component in the architecture is a security manager BE COMPUTER SEMINAR
  • 15.
  • 16.
    CONCLUSION  Bluetooth's securityseemed to be adequate small ad hoc networks.  Bluetooth secure for larger networks, money transfers and transferring other sensitive information.  Original design goal of cable replacement.  Bluetooth is more suitable to short-range.  Small-size wireless personal area networks. BE COMPUTER SEMINAR
  • 17.
    BE COMPUTER SEMINAR BIBLIOGRAPHY Jun-Zhao Sun, Douglas Howie, Antti Koivisto, and Jaakko Sauvola. Design, Implementation, And Evaluation Of Bluetooth Security, [referred 2002-01-07]  Saarinen M-J, A Software Implementation of the Bluetooth Encryption, [referred 2000-03-15]  Muller T., Bluetooth Security Architecture: Version1.0., Bluetooth Paper, Document # 1.C.116/1.0, July 15, 2000.
  • 18.
  • 19.