SLIDE 1
Team X
B Bhooma Reddy (200601224) Koundinya (200601201)
SLIDE 2 Bluetooth wireless technology is a short-range
communications technology intended to replace the cables connecting portable and/or fixed devices while maintaining high levels of security.
key features
- Robustness
- low power
- low cost
- short range
SLIDE 3
Ericsson mobile communications initiated in
1994.
Special Interest Group (SIG) formed in 1998
with 5 companies.
SLIDE 4 Voice/Data Access Points
- connecting a computing device to a communicating
device
Peripheral Interconnects
- Connecting devices together
Personal Area Networking
SLIDE 5
SLIDE 6 Bluetooth band
- 2.402 GHz – 2.480 GHz of ISM
spread-spectrum frequency hopping (SSFH)
1600 hops/sec – time slot is 625
microsecond
SLIDE 7
Baseband: The Baseband and Link Control Layer
enables the RF link Bluetooth units in a piconet. This layer uses inquiry and paging procedures to synchronize the transmission between different Bluetooth devices.
SLIDE 8
SLIDE 9
SLIDE 10
Link Manager Protocol (LMP): The link manager
protocol is responsible for setting up link channels between Bluetooth devices after performing security methods like authentication and encryption by generating, exchanging and verifying linking and encryption keys and negotiating baseband packet size.
SLIDE 11
Logical Link Control and Adaptation Protocol
(L2CAP): L2CAP packets carry payloads which are carried to the upper layer protocols.
SLIDE 12
Service Discovery Protocol (SDP): Using SDP, device
information, services allowed and characteristics of the services are queried between Bluetooth enabled devices.
SLIDE 13
Cable Replacement Protocol (RFCOMM): RFCOMM is
a serial line emulation protocol
SLIDE 14 Telephony Control Protocol: The Telephony Control
- Binary (TCS Binary) and Telephony Control - AT
Commands are used to establish speech and data calls between devices and control mobile phones and modems respectively.
SLIDE 15
Adopted Protocols: Bluetooth also supports PPP,
TCP/UDP/IP, OBEX and WAP protocols to maximize interoperability.
SLIDE 16 Bluejacking
- Unknown person sends messages
Bluebugging
- A hacker is remotely accesses user’s features
Car whisperer
- A software to receive audio from car
The device manufactures are releasing firmware upgrades to solve new problems
SLIDE 17 http://www.cs.utk.edu/~dasgupta/bluetooth
/blueprotocols.htm
http://electronics.howstuffworks.com/blueto
http://www.bluetooth.com ‘Bluetooth Architecture Overview’ by James
Kardach, Intel Corporation
SLIDE 18