Presentation is loading. Please wait.

Presentation is loading. Please wait.

Bluetooth By Andrew Breen and Chris Backo. Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues.

Similar presentations


Presentation on theme: "Bluetooth By Andrew Breen and Chris Backo. Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues."— Presentation transcript:

1 Bluetooth By Andrew Breen and Chris Backo

2 Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues

3 What is Bluetooth? Bluetooth devices allow wireless communication. It operates at 2.4 GHz and is capable of transmitting voice and data. The effective range of Bluetooth devices is 32 feet. Some devices may have an extended range Bluetooth transfers data at the rate of 721 Kbps. It uses similar frequencies to microwave ovens and cordless phones, but it should not interfere or be interrupted as a result.

4 What is it for? Bluetooth can be used to wirelessly transfer data among devices. Some examples of it’s use are: –synchronizing contact and calendar information among desktop and notebook computers as well as cell phones and palm pilots. –accessing a network or the Internet with a notebook computer by connecting wirelessly to a cellular phone.

5 Bluetooth vs Wi-Fi Both use same frequency range Wi-Fi has greater range and higher bandwidth (meaning greater power usage and more expensive hardware) Wi-Fi analogous to Ethernet, Bluetooth analogous to USB

6 Product Information Some products that are sold Bluetooth enabled are: –Cell phones and wireless headsets –Desktops and laptops –PDAs –Printers –keyboards and mice –Kitchen appliances such as refrigerators, and microwave ovens –Cars

7 Installation Process We installed Bluetooth on a machine using a windows operating system. We used software included with a Belkin USB bluetooth adapter Once installed, software allows you to find other Bluetooth devices and communicate with them

8 Demonstration We will now attempt to locate another Bluetooth device and communicate with it Does anyone have a Bluetooth enabled device? (such as a cellphone)

9 Security Measures Conversations over Bluetooth are encrypted. They also use Frequency-Hopping Spread Spectrum (FHSS). The two machines switch frequencies (randomly out of 79 total) in a synchronized fashion 1,600 times per second. However, this is pointless if an intruder can obtain the proper synchronization.

10 Security Risks Bluetooth allows short passwords and pin numbers. The master encryption key is shared openly, thus worthless because everyone can decrypt. Unit keys are dangerous to use more than once because they become publicly accessible once they are used. There is no user authentication, only device authentication. Thus, an unauthorized user with an authorized device can obtain access to the network.

11 Security Attacks Man in the Middle Attack –3 devices, A, B, and C. –A talks to B and C and shares it’s unit key with both. –The user on device C can easily eavesdrop on A and B’s conversation, because A uses the same unit key to communicate with both devices. Denial of Service Attack – –Include flooding techniques, battery exhaustion, and jamming techniques.

12 Security Breaches Discovered in June 2004, SYMBOS_CABIR was the 1 st virus said to have spread only via the Bluetooth- enabled devices. Cell phone viruses are becoming more common. They can delete/change information, drain batteries, and make long-distance phone calls.


Download ppt "Bluetooth By Andrew Breen and Chris Backo. Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues."

Similar presentations


Ads by Google