bluetooth technology initial research instructor: professor ivan student: chang li 7067014 email:...

39
BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: [email protected]

Upload: keanu-elvidge

Post on 01-Apr-2015

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

BLUETOOTH TECHNOLOGY INITIAL RESEARCHInstructor: Professor IvanStudent: Chang Li 7067014Email: [email protected]

Page 2: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Contents

Introduction History and Version Bluetooth vs Other wireless technologies Bluetooth Architecture Connection Establishment States Bluetooth Protocol Stack Bluetooth Profile Bluetooth Security Advantages and Disadvantages Question

Page 3: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

What is Bluetooth?

A cable-replacement technology that can be used to connect almost any device to any other device

Radio interface enabling electronic devices to communicate wirelessly via short range (10 meters) ad-hoc radio connections

a standard for a small , cheap radio chip to be plugged into computers, printers, mobile phones, etc

Page 4: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

What is Bluetooth?

Uses the radio range of 2.45 GHz Theoretical maximum bandwidth is 1 Mb/s Several Bluetooth devices can form an ad hoc

network called a “piconet” In a piconet one device acts as a master (sets frequency

hopping behavior) and the others as slaves Example: A conference room with many laptops

wishing to communicate with each other

Page 5: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Class of Bluetooth Bluetooth devices are classified according to three

different power classes, as shown in the following table.

Page 6: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

History

Harald Bluetooth : 10th century Danish King, managed to unite Denmark and Norway

Bluetooth SIG (Special Interest Group) : Founded in 1998 by : Ericsson, Intel, IBM, Toshiba and

Nokia Currently more than 2500 adopter companies Created in order to promote, shape an define the

specification and position Bluetooth in the market place Current specification : Bluetooth 4.0

Page 7: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Bluetooth Applications

Automatic synchronization between mobile and stationary devices

Connecting mobile users to the internet using bluetooth-enabled wire-bound connection ports

Dynamic creation of private networks

PDACell Phone

Cordless PhoneBase Station

InkjetPrinter

Scanner

Home Audio System

ComputerDigital Camera

Page 8: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Version Bluetooth v1.2 Backward compatible with v1.1, faster connection and discovery. Recovered confrontation to radio frequency interference by avoiding the use of crowded frequencies in the hopping

sequence. Data transmission speed up to 721 kbit / s. Bluetooth v2.0 Backward compatible with the previous v1.2. Enhanced Data Rate (EDR) for faster data transfer. The nominal rate of EDR is about 3 Mbit / s Bluetooth v2.1 Backward compatible with v1.2. Uses secure simple pairing (SSP) to improve a better pairing experience for Bluetooth devices. Uses sniff sub rating, which reduces the power consumption in low-power mode. Bluetooth v3.0 Backward compatible with v2.1. Bluetooth 3.0 provides theoretical data transfer speeds of up to 24 Mbit / s. For high data rate traffic this version uses the adjacent 802.11 link. Bluetooth v4.0 Backward compatible with v3.0. It includes Classic Bluetooth, Bluetooth high speed and Bluetooth low energy protocols. Bluetooth high speed is

based on Wi-Fi, and Classic Bluetooth consists of legacy Bluetooth protocols. Provides faster speed in data transmission than the earlier version. It comes with greatly reduced power consuming, as if it does not require any power at all to function. It provides more security in data transmission than the earlier version.

Page 9: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Bluetooth vs Other wireless technologies

Page 10: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Bluetooth Architecture

Piconet Each piconet has one master and up to 7 simultaneous

slaves Master : device that initiates a data exchange. Slave : device that responds to the master

Scatternet Linking of multiple piconets through the master or slave

devices Bluetooth devices have point-to-multipoint capability to

engage in Scatternet communication.

Page 11: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Establishing Piconets

Whenever there is a connection between two Bluetooth devices, a piconet is formed

Always 1 master and up to 7 active slaves

Any Bluetooth device can be either a master or a slave

Can be a master of one piconet and a slave of another piconet at the same time (scatternet)

All devices have the same timing and frequency hopping sequence

MS

S

SP

PSB

SB

M=Master P=ParkedS=Slave SB=Standby

Page 12: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Scatternets

Formed by two or more Piconets

Master of one piconet can participate as a slave in another connected piconet

No time or frequency synchronization between piconets

Page 13: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Link Manager Operation

Devices operate in standby mode by default until they become connected to a piconet

4 Connection Modes Active Hold Park Sniff

Modes allow devices to adjust power consumption, performance, and the number/role of participants in a piconet

Page 14: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Active Mode

Limited to 7 Active slaves for each master Three bit address (AM_ADDR) given to each

active slave Unit actively participates on channel Can receive communications in any given frame Active slaves are polled by master for

transmissions Unit operates on high-power

Page 15: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Hold Mode

Frees slave to Attend another Piconet Perform scanning, paging, or inquiry operations Move into low-power sleep

Unit keeps active member address Unit does not support ACL packets on the channel but may

support SCO packets Master and slave agree on a one time hold duration after which

the slave revives and synchronizes with channel traffic Unit operates on low-power

Page 16: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Sniff Mode

Very similar to hold mode Slave is freed for reoccurring fixed time

intervals Master can only communicate during arranged

“sniff” time slots

Page 17: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Park Mode

Parked unit gives up active member address and is assigned 8 bit Parked member address (PM_ADDR) – allows

master to unpark slave 8 bit Access request address (AR_ADDR) – allows

slave to ask master to unpark it Unit stays synchronized to channel Operates in very low-power sleep

Page 18: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Park Mode (cont.)

Provides the ability to connect more than 7 devices to a master (8 bit PM_ADDR allows 255 parked devices)

Active and Parked slaves can be switched in and out to allow many connections to a single piconet

Page 19: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Inquiry and Page

Inquiry

Page

Inquiryscan

Masterresponse

Inquiryresponse

Pagescan

Slaveresponse

Connection Connection

(1) ID packet (Broadcast)

(2) FHS packet

(3) Paging ID packet

(4) ID packet

(5) FHS packet

(6) ID packet

(7) ID packet

Standby Standby

Master Slave

This is the connection process from standby

Page 20: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Physical links

Between master and slave(s), different types of links can be established. Two link types have been defined: Synchronous Connection-Oriented (SCO) link Asynchronous Connection-Less (ACL) link

Page 21: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Synchronous Connection Oriented (SCO)

Intended for use with time-bounded information such as audio or video

Provides a circuit-switched connection where data is regularly exchanged

Retransmission is not necessary, since data is real-time

Up to 3 SCO links per piconet

Page 22: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Asynchronous Connection-Less (ACL)

Designed for data traffic Packet switched connection where data is

exchanged sporadically as and when data is available from higher up the stack

Data integrity is checked through error checking and retransmission

One ACL link between a master and a slave

Page 23: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Frequency-Hopping Spread Spectrum (FHSS)

In order to mitigate interference, Bluetooth implements frequency hopping

1600 hops per second through 79MHz channels Spreads Bluetooth traffic over the entire ISM band All slaves in piconet follow the master for frequency hop sequence Such type of frequency hopping technique is called Adaptive

Frequency Hopping (AFH).

Page 24: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Frequency-Hopping Spread Spectrum(FHSS)

This adaptive hopping technique helps in the coexistance of other non-hoping static ISM devices with the Bluetooth devices. A good protection from the interference can be obtained with a fast hop rate. The other advantage is that the packets are short length. So whenever there is blocking or interference in the frequency, the packets can be resent in any other frequency provided by the frequency scheme of the master.

Page 25: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Bluetooth Protocol Stack

Bluetooth Radio

Baseband

LMP

L2CAPAudio

RFCOMM

PPP

IPUDP TCP

WAPWAE

OBEXvCard/vCal

AT-Commands

TCS BIN

Host Controller Interface (HCI)

Bluetooth Core Protocol

Adopted Protocol

Cable Replacement Protocol

SDP

Telephony Protocol

Page 26: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Bluetooth Protocol Stack Bluetooth Radio : specifics details of the air interface,

including frequency, frequency hopping, modulation scheme, and transmission power.

Baseband: concerned with connection establishment within a piconet, addressing, packet format, timing and power control.

Link manager protocol (LMP): establishes the link setup between Bluetooth devices and manages ongoing links, including security aspects (e.g. authentication and encryption), and control and negotiation of baseband packet size

Page 27: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Bluetooth Protocol Stack Logical link control and adaptation protocol (L2CAP):

adapts upper layer protocols to the baseband layer. Provides both connectionless and connection-oriented services.

Service discovery protocol (SDP): handles device information, services, and queries for service characteristics between two or more Bluetooth devices.

Host Controller Interface (HCI): provides an interface method for accessing the Bluetooth hardware capabilities. It contains a command interface, which acts between the Baseband controller and link manager

Page 28: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Bluetooth Profile

On the basis of the nature of the Bluetooth application, the Bluetooth Special Interest Group(SIG) has number of models profile for the usage of bluetooth technology in a device. In the other words, it is a wireless specification for the device that communicates using bluetooth technology. To provide the services based on the bluetooth technology a device must incorporate the terms of bluetooth profiles for the desired services.

Page 29: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Bluetooth Profile

Dial-up Networking Profile (DNP) LAN Access Profile (LAP) FAX Profile Object Push Profile (OPP) File Transfer Profile (FTP) Synchronization Profile (SYNC) Headset Profile (HSP) Hands Free Profile (HFP) Human Interface Device Profile (HID) Basic Imaging Profile (BIP) Hardcopy Cable Replacement Profile (HCRP) Basic Printing Profile (BPP) Personal Area Network Profile (PAN) Advanced Audio Distribution Profile (A2DP) Audio/Video Remote Control Profile (AVRCP) General Access Profile (GAP) Service Discovery Application Profile (SDAP) Serial Port Profile (SPP) Generic Object Exchange Profile (GOEP)

Page 30: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Inquiry and Page

Inquiry

Page

Inquiryscan

Masterresponse

Inquiryresponse

Pagescan

Slaveresponse

Connection Connection

(1) ID packet (Broadcast)

(2) FHS packet

(3) Paging ID packet

(4) ID packet

(5) FHS packet

(6) ID packet

(7) ID packet

Standby Standby

Master Slave

Page 31: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Bluetooth Security There are three modes of security for Bluetooth

access between two devices. non-secure service level enforced security link level enforced security

Device security level Trusted untrusted

Service security level Authorization and Authentication Authentication only Open to all devices

Page 32: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Bluetooth Security

The following are the three basic security services specified in the Bluetooth standard: Authentication

verifying the identity of communicating devices. User authentication is not provided natively by Bluetooth.

Confidentiality preventing information compromise caused by eavesdropping by

ensuring that only authorized devices can access and view data. Authorization

allowing the control of resources by ensuring that a device is authorized to use a service before permitting it to do so.

Page 33: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Bluetooth Security Bluebugging: Bluebugging attacking is targeted for privacy issues that are

specific to cell phones and Bluetooth headsets. In order to succeed, bluebugging needs skilled hackers with knowledge of Bluetooth privacy protection and protocols. The hacker gains the access to a cellular phone’s commands and persisted information. A number of functions are performed by the hacker while in control of the cell phone.

Bluejacking: A least damaging Bluetooth privacy issues. It could cause great annoyance to users. Bluejacking allows other user of mobile phones for sending business cards to other people’s phones anonymously. Usually, bluejacking is a prank. It may be able to transmit Trojan viruses.

Bluesnarfing: Bluesnarfing are attacks which are more serious issues of privacy than bluejacking. It describes the unauthorized access to the utilization of information on a Bluetooth device, which includes cell phones, computer systems and PDAs. The information includes the text messages, calendar schedules, address books, emails, pictures and also videos. The best privacy protection against bluesnarfing is setting Bluetooth device to “non-discoverable”.

Page 34: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Advantages

Eliminates wires Facilitates Data and Voice Communication Offers formation of Ad hoc networks Free of charge Easy to use Low power consumes battery less Stationary and mobile environments

Page 35: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Disadvantages

Relatively short range less secure Interference with other devices Mediocre Data rates Bluetooth internet connection gets slow somtimes

Page 36: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Question1

How many devices can communicate concurrently? Answer: Bluetooth device playing the role of the “master” can communica

te with up to 7 devices playing the role of the “slave”. This network of “group of up to 8 devices” (1 master + 7 slaves) is called a piconet. A piconet is an ad-hoc computer network of devices using Bluetooth technology protocols to allow one master device to interconnect with up to seven active slave devices (because a three-bit MAC address is used). Up to 255 further slave devices can be inactive, or parked, which the master device can bring into active status at any time.

Page 37: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Question2

In the part of differences between ACL and SCO?

Answer: Slide 21 & 22

Intended Traffic Type

Retransmission

Max # links between master and slave

Supported during hold mode

Switched connection type

ACL Data Yes 1 No Packet

SCO Time bounded info (Audio or Video)

No 3 Yes Circuit

Page 38: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Question3

In the part of Bluetooth security, which kind of attack would send out messages to other devices?why?

Answer: Bluejacking.Bluejacking allows other user of mobile phones for sending business cards to other people’s phones anonymously. Usually, bluejacking is a prank. It may be able to transmit Trojan viruses.

Explain:Slide 33

Page 39: BLUETOOTH TECHNOLOGY INITIAL RESEARCH Instructor: Professor Ivan Student: Chang Li 7067014 Email: cli023@uottawa.ca

Thank you!