2. OUT LINE
INTRODUCTION
SECURITY FRAMEWORK
LINK LEVEL SECURITY
SERVICE LEVEL SECURITY
CONCLUSION
BIBLOGRAPHY
QUESTIONS
BE IT SEMINAR
2/19
3. INTRODUCTION
Bluetooth is a new technology named
after the 10th century by Danish king
Harald Bluetooth.
Bluetooth is develop to provide cable-
free environment.
Security architecture.
BE IT SEMINAR
3/19
4. APPLICATIONS
Wireless headsets for cell phones.
Wireless PC Mouse connection to the PC using
Bluetooth.
Wireless printing between a PC.
Automated synchronization of Personal Digital
Assistant (PDAs) and PCs using Bluetooth.
Ad hoc networking and file sharing between
PCs, PDAs & laptops in a meeting.
BE IT SEMINAR
4/19
5. APPLICATIONS
Wireless headsets for cell phones.
Wireless PC Mouse connection to the PC using
Bluetooth.
Wireless printing between a PC.
Automated synchronization of Personal Digital
Assistant (PDAs) and PCs using Bluetooth.
Ad hoc networking and file sharing between
PCs, PDAs & laptops in a meeting.
BE IT SEMINAR
4/19
6. BENEFITS
Cable replacement between two
devices
The wide range of device types and
standard interface
Set of wired and wireless devices are
Bluetooth connectable
5/19
7. BASIC DEFINITION
ENCRYPTION
Transfers data to other form, can’t
understood without key.
AUTHENTICATION
The ensuring of the identity of another user.
AUTHORIZATION
Deciding, if a device is allowed to have access
to a service.
BE ITSEMINAR
7/19
8. SECURITY MODES
MODE 1: NON-SECURE MODE
MODE 2: SERVICE LEVEL SECURITY
MODE 3: LINK LEVEL SECURITY
BE IT SEMINAR
8/19
9. SECURITY LEVELS
LINK LEVEL SECURITY
The Bluetooth device initiates security
functions before the channel is established.
SERVICE LEVEL SECURITY
The Bluetooth device initiates security
functions after the channel is established
BE ITSEMINAR
9/19
10. LINK LEVEL SECURITY
KEY MANAGEMENT SCHEME
AUTHENTICATION SCHEME
ENCRYPTION SCHEME
BE IT SEMINAR
10/19
12. CONCLUSION
Bluetooth's security seemed to be adequate
small ad hoc networks.
Bluetooth secure for larger networks,
money transfers and transferring other
sensitive information.
Original design goal of cable replacement.
Bluetooth is more suitable to short-range.
Small-size wireless personal area networks.
BE ITSEMINAR
16/19
13. BE ITSEMINAR
17/19
BIBLIOGRAPHY
Jun-Zhao Sun, Douglas Howie, Antti Koivisto,
and Jaakko Sauvola. Design, Implementation,
And Evaluation Of Bluetooth Security, [referred
2002-01-07]
Saarinen M-J, A Software Implementation of
the Bluetooth Encryption, [referred 2000-03-15]
Muller T., Bluetooth Security Architecture:
Version1.0., Bluetooth Paper, Document #
1.C.116/1.0, July 15, 2000.