Transcript ppt

By
Richard Moore
Arjun Talwar
Usamah Ali
Catarino Almeida
Narottam Jha
Quick History of Bluetooth
• The man behind this technology was Sven Mattisson in Lund.
• In 1995 he went to work for Ericsson Mobile Communications.
• Him and a team were to work on a concept involving short-range radio
links with low output, the point was that mobile phones with this kind
of radio link would be able to communicate with each other without
having to be connected by cables. Initially these were called MC Links,
which stood for Multi-Communicator Links.
• In 1997, Intel and its head of technological development, Jim Kardach,
took this idea and figured out that this technology could be applied to
many other devices.
• The technology was launched in May 1998, under the name of
Bluetooth, to great expectations.
Richard Moore
Continued History…………
 Ten years later there are three output specifications for the technology
and data transfer rates exceed 20 Mbps.
• Bluetooth works by equipping every unit (telephone, PC, printer,
keyboard, headset, microphone and so on) with a Bluetooth chip and
an antenna. The chip combines a transmitter and receiver and listens
for signals from other Bluetooth chips while transmitting signals that
indicate its identity. As soon as two chips make contact with each other,
they begin negotiations to establish a suitable link.
 Bluetooth is based on about ten patents, most of them owned by
Ericsson.
Richard Moore
Quick Timeline History of
Bluetooth






1994:
 People began trying to find ways to standardize the industry around short-range link for doing a
number of things.
1998:
 The original promoters of bluetooth technologies such as Ericsson, Intel, Nokia, Toshiba and
IBM came togther to form the bluetooth special interests group.
1999:
 At this time period the Bluetooth Special Interest Group tried to find different ways to introduce
bluetooth to different technologies such as cell phones, headsets, gaming consoles, laptops and
GPS systems.
2007:
 Bluetooth made a major upgrade which made for easier decryption of data and easier pairing
between two bluetooth compatible devices.
2009:
 After seeing the potential of this rising company over 7,000 companies decided to invest in
bluetooth technologies.
2014:
 Bluetooth has created a new technology called the Bluetooth Low Energy allowing batteries to
last longer. This is achieved by sending short bursts of signals instead of a constant stream of
data to ensure a long battery life in devices that use BLE.
Richard Moore
Detailed Timeline of Bluetooth
SIG
 2007
 First alarm-clock radio
 First television
 The SIG welcomes its 8,000th member
 Bluetooth SIG Executive Director Mike Foley wins the Telematics Leadership Award
 PTS Protocol Viewer is released as part of the release of PTS Version 2.1.1 along with a greatly
updated user interface and report generation capabilities
 2008
 The SIG celebrates its 10th anniversary
 Nearly 2 billion Bluetooth enabled products shipped in 10 years
 The SIG welcomes its 10,000th member
 Bluetooth SIG Executive Director Mike Foley is named one of RCR Wireless News Mobile Movers
& Shakers for 2008
 Profile Tuning Suite (PTS) Version 3.0 is released, including automatic updates and further
improvements to its report generation capabilities
 2009
 The SIG adopts Core Specification Version 3.0 HS, making Bluetooth high speed technology a
reality
 The SIG welcomes its 12,000th member
 The SIG announces the adoption of Bluetooth low energy wireless technology, the hallmark
feature in Bluetooth Core Specification Version 4.0
Richard Moore
Continued Timeline…..
 2010
SIG membership surpasses 13,000 companies
The Bluetooth SIG headquarters moves to Kirkland, WA, USA
The Bluetooth SIG announces the formal adoption of Bluetooth Core Specification Version
4.0 with low energy technology
 Profile Tuning Suite (PTS) v4.1 is launched, including Bluetooth low energy technology test
suites



 2011









SIG membership surpasses 15,000 companies
The SIG picks a 3D television for itsBest of CES award winner
Apple and Nordic Semiconductor join the SIG Board of Directors
The SIG adopts the first new profile for Bluetooth v4.0 in May
Apple releases the first two computers (MacMini and MacBook Air) with Bluetooth v4.0
technology in July
The SIG unveils the Bluetooth Smart and Bluetooth Smart Ready brand extensions
Microsoft announces that Windows 8 will support Bluetooth v4.0
Apple announces that the new iPhone 4S will support Bluetooth v4.0 and become the first
Bluetooth Smart Ready phone
The SIG adopts 29 new Bluetooth v4.0 profiles, services, protocols and prototyping
specifications, creating the infrastructure for Bluetooth Smart devices
Richard Moore
Continued Timeline…..
 2014
 SIG introduces Bluetooth 4.2, adds features for IP connectivity, privacy and speed
 Membership at the Bluetooth SIG hits 24,000 members
 CNET Joins the Breakthrough Awards as exclusive media partner
 The SIG expands Bluetooth World to three global event series
 Dr. Kamil A. Grajski, Qualcomm, joins the SIG Board of Directors
 Bluetooth hits 90 percent penetration in all mobile phones
 2015
 Apple joins the Bluetooth SIG as Promoter member
 SIG announces the beta launch of the Bluetooth Developer Studio
 Fitbit, Google, Under Armour and Lowe's Home Improvement join Bluetooth World
as keynote speakers
 SIG announces the formation of the Smart Mesh Working Group
 Membership at the Bluetooth SIG hits 27,000 members
Richard Moore
Continued Timeline…..
 2012
 Annual Bluetooth product shipments surpass 2 billion*
 SIG membership surpasses 17,000 companies
 The SIG launches new resources for app developers
 The first Bluetooth Smart Ready tablets and music players hit the market.
 SIG Board appoints wireless veteran Mark Powell, as executive director.
 The SIG announces expansion into sports & fitness markets with new working group and
new profiles for real-time running and cycling data monitoring
 Dr. Steven Gray joins the SIG Board of Directors
 2013
 SIG rolls out Bluetooth 4.1, sets the stage for IoT
 SIG introduces Application Accelerator for developers
 Google announced native support for Bluetooth Smart in Android
 Minsoo Lee, LG Electronics, joins the SIG Board of Directors
 Annual Bluetooth® product shipments surpass 2.5 billion*
 SIG membership surpasses 20,000 companies
 The SIG launches Bluetooth World
Richard Moore
Specifications
 Purpose was to create wireless headset.
 Initially was developed at Ericson Mobile.
 Based on frequency-hopping spread spectrum
technology.
Arjun Talwar
Features…
 Bluetooth v1.0 and v1.0b
 Problems and manufacturers difficulty
 Included Bluetooth hardware device address(BD_ADDR)
transmission
 Setback in Bluetooth environments.
 Bluetooth v1.1
 Modified version of v1.0b

Errors found in v1.0b were fixed
 Added possibility of non-encrypted channels
 Received signal strength indicator
Arjun Talwar
Continue…
 Bluetooth v1.2
 Faster Connection
 Frequency-hopping spread spectrum (AFH)
 Higher transmission speeds
 Extended Synchronous Connections (eSCO)
 Host Controller Interface (HCI)
 Introduced Flow Control and Retransmission Modes for
L2CAP
Arjun Talwar
Continue…
 Bluetooth v2.0+EDR
 Enhanced Data Rate (EDR) for faster data transfer @ 3
Mbit/s.
 Combination of GFSK and Phase Shift Keying
modulation
 Bluetooth v2.1+EDR
 Better filtering of devices before connection; sniff
subrating – which reduces the power consumption in
low-power mode.
 Bluetooth v3.0+HS
 Transfer speeds of up to 24 Mbit/s
Arjun Talwar
Continue…
 Bluetooth v3.0 +HS
 Transfer speeds of up to 24 Mbit/s
 L2CAP Enhanced modes
 Alternative MAC/PHY
 Unicast Connectionless Data
 Enhanced Power control
 Ultra-wideband
Arjun Talwar
Continue…
 Bluetooth v4.0 as known as Bluetooth Smart
 Classic Bluetooth
 Bluetooth high speed protocol (Wi-Fi)
 Bluetooth low energy protocol (Wibree)

2 Chip design: dual-mode & single-mode
 Single-mode implementation: low energy protocol stack
 Dual-mode implementation: Bluetooth Smart
functionality is integrated into an existing Classic
Bluetooth controller.
Arjun Talwar
Continue…
 Bluetooth v4.1
 Mobile Wireless Service
Coexistence Signaling
 Train Nudging and
Generalized Interlaced
Scanning
 Low Duty Cycle Directed
Advertising
 Dual Mode and Topology
 LE Link Layer Topology
 802.11n PAL
 Audio Architecture Updates
for Wide Band Speech
 Fast Data Advertising Interval
 Limited Discovery Time
Arjun Talwar
 Bluetooth v4.2
 LE Data Packet Length
Extension
 LE Secure Connections
 Link Layer Privacy
 Link Layer Extended Scanner
Filter Policies
 IP Connectivity
 IPSP
Bluetooth vs Wi-Fi
Usamah Ali
Bluetooth
 Is a wireless technology standard for exchanging data
over short distances
 Invented by telecom vendor Ericsson in 1994
 When two Bluetooth enabled devices connect to each
other, this is called pairing
 Connections between Bluetooth enabled electronic
devices allow these devices to communicate wirelessly
through short-range, ad hoc networks known as
piconets
Usamah Ali
Wi-Fi
 Is a local area wireless computer networking
technology that allows electronic devices to network
 Wi-Fi technology may be used to provide Internet
access to devices that are within the range of a wireless
network that is connected to the Internet
 The coverage of one or more interconnected access
points (hotspots) can extend from an area as small as a
few rooms to as large as many square kilometres.
Usamah Ali
Comparison
Usamah Ali
Conclusion
 Depending on the functionality and nature of use,
determines weather to use Bluetooth or Wi-Fi as each
have their advantages and disadvantages
 As security is always a top priority, Wi-Fi prevails
because Bluetooth is less secure
Usamah Ali
Bluetooth Protocols
 Bluetooth protocols is the main element for
establishing or pairing two devices. When
connecting two devices via Bluetooth, they must
learn about the protocols each one is using in
order to establish a connection between them.
 Only devices that share the same protocols can
exchange data, just like two humans have to agree
on a common language to have a meaningful
conversation.
Catarino Almeida
Bluetooth protocols
 Bluetooth protocol comprises of a
number of protocols which can
be divided into four categories.
 Each of these protocols is responsible
for specific type of task and stands on
its own.
 These protocols are divided in four
categories which are
shown in Bluetooth protocol Stack.
Catarino Almeida
Continue…
1.
2.
3.
4.
Bluetooth core protocols (Baseband, LMP, L2CAP, SDP).
Cable replacement Protocols (Radio Frequency communication).
Telephony Control Protocols (TCSBIN, AT- Commands).
Adopted Protocols (PPP,TCP, OBEX, WAP, vCard, vCalender).
Bluetooth Core Protocols Task:
 Baseband: responsible for the timing, framing, packets and flow
control on the link.
 LMP: responsible for link set up and control between Bluetooth
devices, including the control packet and negotiations of baseband
packet sizes.
 SDP: responsible for device information, services and characteristics of
services can be queried.
 Logical link : handles multiplexing, segmentation and reassembly of
large packets and device discovery.
Catarino Almeida
Bluetooth Security
There are three basic means of providing Bluetooth
security:
 Authentication: verifying the identity of
communicating devices based on their Bluetooth
device address. Bluetooth does not provide native user
authentication.
 Confidentiality: protecting information from
eavesdropping by ensuring that only authorized
devices can access and view transmitted data.
 Authorization: allowing the control of resources by
ensuring that a device is authorized to use a service
before permitting it to do so.
Narottam Jha
Security Modes
 Security Mode 1 is non-secure.
 In Security Mode 2, a security manager controls access
to specific services and devices.
 In Security Mode 3, a Bluetooth device initiates
security procedures before the physical link is fully
established. This mode supports authentication
(unidirectional or mutual) and encryption.
 Security Mode 4 (introduced in Bluetooth v2.1 + EDR)
is a service level enforced security mode in which
security procedures are initiated after link setup.
Narottam Jha
Common Bluetooth security issues
 Bluejacking : Initiated by an attacker sending
unsolicited messages to a user of a Bluetooth-enabled
device to entice the user to respond. Resembles spam
and phishing attacks conducted against email users.
 Bluebugging : Security flaw in the firmware allows
attacker to use the commands of the device without
informing the user.
 Car Whisperer (European developed software tool) :
Allows an attacker to send to or receive audio from the
car kit or receive from mic.
Narottam Jha
Recommendations to Improve the Security of
Bluetooth Implementations
NIST (National Institute of Standards and Technology)
recommends that organizations implement the following
practices to protect their Bluetooth implementations from
security threats and vulnerabilities:
 Use the strongest Bluetooth security mode that is available
for organizational Bluetooth devices.
 Address Bluetooth technology in organizational security
policies and change default settings of Bluetooth devices to
support the adopted policies.
 Ensure that all Bluetooth users in an organization are
informed about their responsibilities regarding the secure
use of Bluetooth devices.
Narottam Jha