SlideShare une entreprise Scribd logo
1  sur  14
BLUETOOTH SECURITY
Created By
Jay Nagar
(nagarjay007@gmail.com)
OUT LINE
 INTRODUCTION
 SECURITY FRAMEWORK
 LINK LEVEL SECURITY
 SERVICE LEVEL SECURITY
 CONCLUSION
 BIBLOGRAPHY
 QUESTIONS
BE IT SEMINAR
2/19
INTRODUCTION
 Bluetooth is a new technology named
after the 10th century by Danish king
Harald Bluetooth.
 Bluetooth is develop to provide cable-
free environment.
 Security architecture.
BE IT SEMINAR
3/19
APPLICATIONS
 Wireless headsets for cell phones.
 Wireless PC Mouse connection to the PC using
Bluetooth.
 Wireless printing between a PC.
 Automated synchronization of Personal Digital
Assistant (PDAs) and PCs using Bluetooth.
 Ad hoc networking and file sharing between
PCs, PDAs & laptops in a meeting.
BE IT SEMINAR
4/19
APPLICATIONS
 Wireless headsets for cell phones.
 Wireless PC Mouse connection to the PC using
Bluetooth.
 Wireless printing between a PC.
 Automated synchronization of Personal Digital
Assistant (PDAs) and PCs using Bluetooth.
 Ad hoc networking and file sharing between
PCs, PDAs & laptops in a meeting.
BE IT SEMINAR
4/19
BENEFITS
 Cable replacement between two
devices
 The wide range of device types and
standard interface
 Set of wired and wireless devices are
Bluetooth connectable
5/19
BASIC DEFINITION
 ENCRYPTION
 Transfers data to other form, can’t
understood without key.
 AUTHENTICATION
 The ensuring of the identity of another user.
 AUTHORIZATION
 Deciding, if a device is allowed to have access
to a service.
BE ITSEMINAR
7/19
SECURITY MODES
 MODE 1: NON-SECURE MODE
 MODE 2: SERVICE LEVEL SECURITY
 MODE 3: LINK LEVEL SECURITY
BE IT SEMINAR
8/19
SECURITY LEVELS
 LINK LEVEL SECURITY
 The Bluetooth device initiates security
functions before the channel is established.
 SERVICE LEVEL SECURITY
 The Bluetooth device initiates security
functions after the channel is established
BE ITSEMINAR
9/19
LINK LEVEL SECURITY
 KEY MANAGEMENT SCHEME
 AUTHENTICATION SCHEME
 ENCRYPTION SCHEME
BE IT SEMINAR
10/19
KEY MANAGEMENT SCHEME
BE IT SEMINAR
11/19
CONCLUSION
 Bluetooth's security seemed to be adequate
small ad hoc networks.
 Bluetooth secure for larger networks,
money transfers and transferring other
sensitive information.
 Original design goal of cable replacement.
 Bluetooth is more suitable to short-range.
 Small-size wireless personal area networks.
BE ITSEMINAR
16/19
BE ITSEMINAR
17/19
BIBLIOGRAPHY
 Jun-Zhao Sun, Douglas Howie, Antti Koivisto,
and Jaakko Sauvola. Design, Implementation,
And Evaluation Of Bluetooth Security, [referred
2002-01-07]
 Saarinen M-J, A Software Implementation of
the Bluetooth Encryption, [referred 2000-03-15]
 Muller T., Bluetooth Security Architecture:
Version1.0., Bluetooth Paper, Document #
1.C.116/1.0, July 15, 2000.
BE ITSEMINAR
19/19

Contenu connexe

Tendances

bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
Aeman Khan
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
Akshita Pillai
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
David Livingston J
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technology
pariluv
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
Siva Pradeep Bolisetti
 

Tendances (20)

Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentation
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
bluejacking.ppt
bluejacking.pptbluejacking.ppt
bluejacking.ppt
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
My seminar on bluejacking
My seminar on bluejackingMy seminar on bluejacking
My seminar on bluejacking
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
 
Bluetooth technology
Bluetooth  technologyBluetooth  technology
Bluetooth technology
 
Bluetooth & Bluetooth Low Energy internals
Bluetooth & Bluetooth Low Energy internalsBluetooth & Bluetooth Low Energy internals
Bluetooth & Bluetooth Low Energy internals
 
Bluetooh Technology
Bluetooh TechnologyBluetooh Technology
Bluetooh Technology
 
Bluejacking
BluejackingBluejacking
Bluejacking
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
BTLE (Bluetooth Low Energy) and CoreBluetooth
BTLE (Bluetooth Low Energy) and CoreBluetooth BTLE (Bluetooth Low Energy) and CoreBluetooth
BTLE (Bluetooth Low Energy) and CoreBluetooth
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
 
Bluetooth technology
Bluetooth  technologyBluetooth  technology
Bluetooth technology
 
BLUETOOTH _TECHNOLOGY
BLUETOOTH _TECHNOLOGYBLUETOOTH _TECHNOLOGY
BLUETOOTH _TECHNOLOGY
 

En vedette (8)

Bluetooth security
Bluetooth securityBluetooth security
Bluetooth security
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Blue Tooth Technoloty
Blue Tooth TechnolotyBlue Tooth Technoloty
Blue Tooth Technoloty
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 

Similaire à BLUETOOTH SECURITY

Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]
Ahsaan Arain
 
226335 633858374451812775
226335 633858374451812775226335 633858374451812775
226335 633858374451812775
pratikpatilp
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
Siya Agarwal
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
mathan0071
 

Similaire à BLUETOOTH SECURITY (20)

Bluetooth Security.PPT
Bluetooth Security.PPTBluetooth Security.PPT
Bluetooth Security.PPT
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
 
Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]Bluetooth technology [compatibility mode]
Bluetooth technology [compatibility mode]
 
Bluetooth by vk
Bluetooth by vkBluetooth by vk
Bluetooth by vk
 
226335 633858374451812775
226335 633858374451812775226335 633858374451812775
226335 633858374451812775
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Wireless standards
Wireless standards Wireless standards
Wireless standards
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Seminar
SeminarSeminar
Seminar
 
Seminar on bluetooth
Seminar on bluetoothSeminar on bluetooth
Seminar on bluetooth
 
Bq4301381388
Bq4301381388Bq4301381388
Bq4301381388
 
Bluetooth 27 01-12 PPT
Bluetooth 27 01-12 PPTBluetooth 27 01-12 PPT
Bluetooth 27 01-12 PPT
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 

Plus de Jay Nagar

Plus de Jay Nagar (20)

11 best tips to grow your influence youtube
11 best tips to grow your influence youtube11 best tips to grow your influence youtube
11 best tips to grow your influence youtube
 
Impact of micro vs macro influencers in 2022
Impact of micro vs macro influencers in 2022Impact of micro vs macro influencers in 2022
Impact of micro vs macro influencers in 2022
 
What is Signature marketing
What is Signature marketingWhat is Signature marketing
What is Signature marketing
 
100+ Guest blogging sites list
100+ Guest blogging sites list100+ Guest blogging sites list
100+ Guest blogging sites list
 
Ethical Hacking and Defense Penetration
Ethical Hacking and Defense PenetrationEthical Hacking and Defense Penetration
Ethical Hacking and Defense Penetration
 
Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020Cyber Security and Cyber Awareness Tips manual 2020
Cyber Security and Cyber Awareness Tips manual 2020
 
On-Page SEO Techniques By Digitech Jay
On-Page SEO Techniques By Digitech JayOn-Page SEO Techniques By Digitech Jay
On-Page SEO Techniques By Digitech Jay
 
Artificial Intelligence
Artificial IntelligenceArtificial Intelligence
Artificial Intelligence
 
Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness Cyber Security and Cyber Awareness
Cyber Security and Cyber Awareness
 
Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual Cyber security and Privacy Awareness manual
Cyber security and Privacy Awareness manual
 
Dynamic programming
Dynamic programmingDynamic programming
Dynamic programming
 
Bluethooth Protocol stack/layers
Bluethooth Protocol stack/layersBluethooth Protocol stack/layers
Bluethooth Protocol stack/layers
 
GPRS(General Packet Radio Service)
GPRS(General Packet Radio Service)GPRS(General Packet Radio Service)
GPRS(General Packet Radio Service)
 
Communication and Networking
Communication and NetworkingCommunication and Networking
Communication and Networking
 
MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION MOBILE COMPUTING and WIRELESS COMMUNICATION
MOBILE COMPUTING and WIRELESS COMMUNICATION
 
Global system for mobile communication(GSM)
Global system for mobile communication(GSM)Global system for mobile communication(GSM)
Global system for mobile communication(GSM)
 
Python for beginners
Python for beginnersPython for beginners
Python for beginners
 
Earn Money from bug bounty
Earn Money from bug bountyEarn Money from bug bounty
Earn Money from bug bounty
 
Code smell & refactoring
Code smell & refactoringCode smell & refactoring
Code smell & refactoring
 
The Diffie-Hellman Algorithm
The Diffie-Hellman AlgorithmThe Diffie-Hellman Algorithm
The Diffie-Hellman Algorithm
 

BLUETOOTH SECURITY

  • 1. BLUETOOTH SECURITY Created By Jay Nagar (nagarjay007@gmail.com)
  • 2. OUT LINE  INTRODUCTION  SECURITY FRAMEWORK  LINK LEVEL SECURITY  SERVICE LEVEL SECURITY  CONCLUSION  BIBLOGRAPHY  QUESTIONS BE IT SEMINAR 2/19
  • 3. INTRODUCTION  Bluetooth is a new technology named after the 10th century by Danish king Harald Bluetooth.  Bluetooth is develop to provide cable- free environment.  Security architecture. BE IT SEMINAR 3/19
  • 4. APPLICATIONS  Wireless headsets for cell phones.  Wireless PC Mouse connection to the PC using Bluetooth.  Wireless printing between a PC.  Automated synchronization of Personal Digital Assistant (PDAs) and PCs using Bluetooth.  Ad hoc networking and file sharing between PCs, PDAs & laptops in a meeting. BE IT SEMINAR 4/19
  • 5. APPLICATIONS  Wireless headsets for cell phones.  Wireless PC Mouse connection to the PC using Bluetooth.  Wireless printing between a PC.  Automated synchronization of Personal Digital Assistant (PDAs) and PCs using Bluetooth.  Ad hoc networking and file sharing between PCs, PDAs & laptops in a meeting. BE IT SEMINAR 4/19
  • 6. BENEFITS  Cable replacement between two devices  The wide range of device types and standard interface  Set of wired and wireless devices are Bluetooth connectable 5/19
  • 7. BASIC DEFINITION  ENCRYPTION  Transfers data to other form, can’t understood without key.  AUTHENTICATION  The ensuring of the identity of another user.  AUTHORIZATION  Deciding, if a device is allowed to have access to a service. BE ITSEMINAR 7/19
  • 8. SECURITY MODES  MODE 1: NON-SECURE MODE  MODE 2: SERVICE LEVEL SECURITY  MODE 3: LINK LEVEL SECURITY BE IT SEMINAR 8/19
  • 9. SECURITY LEVELS  LINK LEVEL SECURITY  The Bluetooth device initiates security functions before the channel is established.  SERVICE LEVEL SECURITY  The Bluetooth device initiates security functions after the channel is established BE ITSEMINAR 9/19
  • 10. LINK LEVEL SECURITY  KEY MANAGEMENT SCHEME  AUTHENTICATION SCHEME  ENCRYPTION SCHEME BE IT SEMINAR 10/19
  • 11. KEY MANAGEMENT SCHEME BE IT SEMINAR 11/19
  • 12. CONCLUSION  Bluetooth's security seemed to be adequate small ad hoc networks.  Bluetooth secure for larger networks, money transfers and transferring other sensitive information.  Original design goal of cable replacement.  Bluetooth is more suitable to short-range.  Small-size wireless personal area networks. BE ITSEMINAR 16/19
  • 13. BE ITSEMINAR 17/19 BIBLIOGRAPHY  Jun-Zhao Sun, Douglas Howie, Antti Koivisto, and Jaakko Sauvola. Design, Implementation, And Evaluation Of Bluetooth Security, [referred 2002-01-07]  Saarinen M-J, A Software Implementation of the Bluetooth Encryption, [referred 2000-03-15]  Muller T., Bluetooth Security Architecture: Version1.0., Bluetooth Paper, Document # 1.C.116/1.0, July 15, 2000.