University of Virginia
1
University of Virginia2
presentspresents
Menz Corporation
University of Virginia
3Introduction
• Definition
• History
• Technologies
• Application
• Development
• Overview
• Service Provider
University of Virginia
4Bluetooth In Past
• 10th Century Danish King (unified warring Viking Tribes): Harald Bluetooth
• No Wireless Networks prior to 20th Century
• New Wireless Transmission Schemes for the 21st Century– 802.11b– Home Radio Frequency– Bluetooth (version 1.0)
University of Virginia
5
• Ad hoc Networks• Bluetooth Chip: $5• Range 10 meters (30 feet)• Throughput: 720,000 bps• Peer to Peer• Piconet (8/250)• Scatternet (10 Piconets)
Bluetooth In Present
University of Virginia
6Bluetooth Applications
University of Virginia
PICONET
• Type of Network
• Containing 8 System
• Grouped into
(i)Master Section
(ii)Slave Section
• Only Official Use
7
University of Virginia
8Bluetooth Development
Local AreaNetwork(LAN)
Wireless Phone
Network
• Small Network• Large Throughput• IR or Radio Communication• Relays not used• Fixed with limited mobility • Small Distances
• Large Network• Small Throughput• Radio Communication• Relays used• Mobility• Large Distances
University of Virginia
9Bluetooth Overview
Local AreaNetwork
(LAN)
Wireless Phone
Network
Encryption
Authentication
Communication
• Challenge-Response Scheme• SAFER+• None/One-way/Mutual• Needed for encryption
• Optional• Symmetric Stream Cipher• Negotiable Key Size (8-128 bits)• Clock dependent
• Radio Frequency Hopping (1600 Hps)• 2.4GHz Frequency Range• RF Interface• 720 Kbps – 4 Mbps
University of Virginia
10Bluetooth Communication
• Link Manager Protocol (LMP) – Configure, authenticate and
handle the connections – Power management scheme
• Radio Frequency Communications (RF C)– Controls Frequency Hopping
for Bluetooth
• Logical Link Control (LLC)– Link Management
– Security Management– QoS Management
– Transmission Scheduling
University of Virginia
11Bluetooth Authentication
Link key generationKLINK
PINRandom #
SRES’SRES ACO’ACO
Encryption key generation
SRES’
BD_ADDRB
CHECKSRES = SRES’
E1
(SAFER+)BD_ADDRB
KLINK
AU_RAND
E1
(SAFER+)BD_ADDRB
KLINK
AU_RAND
A (Verifier) B (Claimant)
AU_RAND
University of Virginia
12Bluetooth Encryption
E0
BD_ADDRA
clockA
KC’
Kcipher
Kcipher
Kcipher
dataA-B
dataB-A
E0
BD_ADDRA
clockA
K’C’
K’cipher
K’cipher
K’cipher
dataA-B
dataB-A
data
A B
=
Is everything OK?Yes, BUT...
Is everything OK?Yes, BUT...
University of Virginia
13Bluetooth Disadvantage
• Encryption– Plain Text Attack
• Authentication– Unit Key Stealing
• Communication– Impersonation
Security Weaknesses
University of Virginia
14
Service Providers
1,900 Bluetooth Technology Manufactures
Menz Menz CorporationCorporation
SAN CO SYSTEMS
University of Virginia1515
University of Virginia1616
Blue & Me - Fiat and Microsoft Blue & Me - Fiat and Microsoft Collaboration Collaboration
University of Virginia1717
BLUE & ME DEVICEBLUE & ME DEVICE
University of Virginia1818
The Hands - Free SystemThe Hands - Free System SMS ReaderSMS Reader Musical EntertainmentMusical Entertainment MP3MP3 WMAWMA WAVWAV Digital FormatDigital Format
University of Virginia1919
University of Virginia2020
University of Virginia2121
University of Virginia2222
University of Virginia2323
University of Virginia2424
University of Virginia2525
University of Virginia2626
University of Virginia
THANK YOU
SUBMITTED BY S.MURALI J.SARAVANAN