6. History
- Ericsson 94 July 99
- SIG
Ericsson, Nokia, IBM, Intel & Toshiba
- Bluetooth of ‘’Harald Blatand‘’ الزرقا ةَّنِسال
- The way it written
8. eZzay bySht3’l
- Kobyten w 7abl
- Hardware and software
- Universal language
- Low level radio wavelength
- Small bursts
- ISM, RF band Industrial Scientific and Medical
Transmitter and receiver
14. B vs Wi-Fi
- Usage
- B 3shan nwsl agheza Oryba
Wi 3shan fast internet access
- 3dd el agheza el mtwsla
- El B mbyhmnash sor3to awy zy el Wifi
- Bandwidth of B < Wifi Frequency 5 GHz to 10 GHz
Cost Low
Bandwidth Low(800 Kbps)
Specifications
authority
Blutooth SIG(1)
Security doesn’t need to be highly secured
16. Versions
Bluetooth
Versions
Optional Features
Basic rate(BR) Enhanced
Rate (EDR)
High Speed
(HS)
Low Energy
(LE)
Slot Availability
Availability
Masking
(SAM)
Bluetooth 1.x Yes No No No No
Bluetooth 2.x Yes Yes No No No
Bluetooth 3.x Yes Yes Yes No No
Bluetooth 4.x Yes Yes Yes Yes No
Bluetooth 5.x Yes Yes Yes Yes Yes
22. Core System Protocols
− Radio (RF) protocol : Specifies details of the air interface, the use of frequency hopping,
modulation scheme, and transmit power.
− Baseband protocol : Concerned with connection establishment within a Piconet,
addressing, packet format, timing, and power control.
− Link Manager protocol (LMP) : Responsible for link setup between Bluetooth devices
and ongoing link management.
− Logical link control and adaptation protocol (L2CAP).
L2CAP provides both connectionless and connection-oriented services.
− Service discovery protocol (SDP) : Device information, services, and the characteristics
of the services can be queried to enable the establishment of a connection between two
or more Bluetooth devices.
24. Additional Protocols
−RF COMM : It provides connections to multiple devices by relying on L2CAP to
handle multiplexing over single connection
−Wireless access protocol (WAP): It supports the limited display size and
resolution typically found on mobile devices by providing special formats for
Web pages
−Object exchange protocol (OBEX): OBEX is a protocol designed to allow a
variety of devices to exchange data simply and spontaneously.
−Telephony control protocol : Bluetooth's Telephony Control protocol
−Specification (TCS) defines how telephone calls should be sent across a
Bluetooth link.
−Point-to-point protocol (PPP): The point-to-point protocol is an Internet
standard protocol for transporting IP datagram over a pointto-point link.
26. Bluetooth Profiles
- 3shan t2dr t5Osh el connection bta3 el Bluetooth m7tag t-interpret el
Bluetooth profiles
‘‘3lshan td5Ol dyrtna, m7tag visa w t2Shera’’
- Each profile specification contains information on the following
Topics:
−Dependencies on other profiles
−Suggested user interface formats
−Specific parts of the Bluetooth protocol stack used by the profile. To perform its
task, each profile uses particular options and parameters at each layer of the
stack .
30. Applications of Bluetooth
- Hands free headset. This was one of the earliest applications to become popular.
- Wireless communication with pc input and output devices, the most common being the mouse,
keyboard and printer.
- Transfer of files, contact details, calendar appointments, and reminders between devices with
obex.
- In 2004 released cars like toyota prius & lexus ls 430 have hands free call system.
- Sending small advertisements from bluetooth-enabled advertising hoardings to other,
discoverable, Bluetooth devices.
- In game consoles like Sony's PlayStation 3.
- In Real-time location systems (RTLS).
- Digital Pulse Oximetry System Toshiba Washer & Dryer.
- Personal security application on mobile phones for prevention of theft or loss of items.
35. Mwdo3 el security bd2 emta?
• F 2001 5fe 3almen 5do balhom en fe shwyt flaws (defects) 3yoob
y3ny fl connection wl encryption
• W bd2t el tgarob wl ab7aS
• 2004 the first Virus from KASPERSKY LAP
• Bd2t 3yoOb Tanya tZhr zy el connection lmsafa ab3d 3n tree2
amplifiers
• 2005 another virus form
• And so on
37. How to be sucure? Ha ? Ezzay ?
• Unique 128-bit device address
• Personal Integrity 128-bit key
• 8 128-bit E^2~!p%!0n key
• Random RF number 128-bit key
38. Ezzay by7afZ 3l connection bta3o lw fe aktr mn
connection
y3ny ezzay mby7slsh interfering
• Random key
• Spred Spectrum Frequency Hopping
Nattet 7ettet Natta
39. Even if it is a virus, it can’t harm hard
• Bluejacking Contacts
• Bluebugging msgs, calls, wnta msh 7aSs .. Ya b2f
• Car Whispering Car stereo