Bluetooth is a packet based protocol
with a master slave structure . One
master may communicate with up to 7
In Bluetooth technology ,the device
which sends the data is called as
MASTER. Where as the devices that
receive the data is called as SLAVE.
BlueTooth- Some Specifications
Uses unlicensed 2.402 - 2.480 GHz frequency range.
Frequency hopping spread spectrum 79 hops separated
by 1 MHz.
Maximum frequency hopping rate: 1600 hops/sec.
Nominal range: 10 cm to 10 meters.
Nominal antenna power: 0 dBm.
One complete Bluetooth data packet can be transmitted
within each 625 msec hop slot.
Bluetooth Market Forecast
Nov’03: 100M Bluetooth compliant devices worldwide
Bluetooth Protocol Stack
OBEX-Session Protocol for IrDA(Infrared Data
Contents Format(e.g. vCard, vCalendar)
WAP-Wireless Application Protocol
Supports Unidirectional or Mutual Encryption based
on a Secret Link key Shared Between Two Devices.
Security Defined In 3 modes:
Mode1- No Security.
Mode 2 - Service Level Security: Not Established
Before Channel is Established at L2CAP.
Mode 3 - Link Level Security: Device Initiates
Security Before LMP Link is Setup.
• Devices and Services can be Set for Different
Levels of Security
Two Trust Levels are Set for Devices:
Trusted Device : Fixed Relationship and
Unrestricted Access to All Services.
Untrusted : No Permanent relationship and
3 Levels of Service Access
Require Authorization and Authentication.
Require Authentication Only.
Default Security for Legacy Applications.
But is this Wireless Link Secure?
Newsflash: Jan 2001: Norwegian “hackers” crack a
Bluetooth vs. the Rest (cont’d)
2.4 GHz, FHSS
Bluetooth – aka IEEE 802.15.1
Zig Bee – aka IEEE 802.15.4