Bluetooth Presented by Venkateshwar R Gotur CMPT - 320.

Slides:



Advertisements
Similar presentations
Bluetooth.
Advertisements

Indian Institute of Technology Hyderabad Presented By : Harish Kumar, Tulasi Ram. Bluetooth.
A Preliminary Investigation of Worm Infections in a Bluetooth Environment PAPER REVIEW ANISH DUTTA RAGAVENDRAN SRINIVASAN SABAREESWAR.
BLUETOOTH. INTRODUCTION A look around at the moment! Keyboard connected to the computer, as well as a printer, mouse, monitor and so on. What (literally)
W IRELESS S ECURITY Chapter 8. History 1971 AlohoNet – Ethernet Protocol st version of Wi-Fi Alliance trade association.
Bluetooth Technology. What is Bluetooth? Bluetooth is a short- range communications technology that allows devices to communicate with each other without.
Infrared Data Association and Bluetooth Technology EE566 presentation
By Abdullah M. Dalloul… Abdullah M. Dalloul… Salman Y. Mansour Salman Y. Mansour Supervisor. Supervisor. Dr.
Overview The Basics Core Specification Version Spectrum International Radio Frequency Allocation Range Power Benefits Protocol Stack Bluetooth Architecture.
Wireless Security.
WIRELESS CONNECTIONS IrDA Bluetooth WAP - GPRS. IrDA  I nfrared D ata A ssociation founded 1993.
1 Mini Course Programming Context-aware Mobile Phones Thomas Bodin IT University of Copenhagen.
Bluetooth What is it and where is it going?. Background…..   Conceived initially by Ericsson, before being adopted by a myriad of other companies, Bluetooth.
Short Distance Wireless Communication. Team 5 Thomas French Jordan Harris Mike Symanow Luseane Tangataevaha.
How secure is Darren Adams, Kyle Coble, and Lakshmi Kasoji.
By: Trevor Parker, Minh-Tri Le. Bluetooth is a wireless technology that is a low-cost, low-power, short-range radio for ad-hoc wireless communication,
  Life without wires Done By: Farah Ata Hourani.
Prepared by:-Nirmal Dhruvi
Respected Sir & dear friends. Presented by Mohd. Sufiyan MCA –Vth Sem Sec-A2 GIMT (Gr. Noida)
was it called this on behalf of the Bluetooth technolog? Harald Bluetooth was king of Denmark around the turn of the last millennium. He managed to.
Bluetooth & WPAN. 2 Bluetooth/WPAN WPAN (Wireless Personal Area Network) has a smaller area of coverage, say, 2.5 mW transmitter power, distance
Area 2 Computers & Technology Group 21 August 2008 Dean Steichen Br.#8.
Bluetooth Technology Jason Babel Kyle Musal Joshua Turella Zdravko Tyankov.
Bluetooth By Richard B. Heisler, Jr. Villanova University Distributed Systems CSC 8530 Fall 2006 Instructor - Dr. Paul A. Schragger.
Goodbye! ….. to all things that are connected by cable…… NOW it can be connected using….
Bluetooth By Andrew Breen and Chris Backo. Presentation Overview Bluetooth overview Bluetooth vs. WiFi ProductsInstallationDemonstration Security Issues.
An Analysis of Bluetooth Security
INTRODUCTION TO BLUETOOTH Named after tenth-century danish King Harald Blatand. Developed by Special Interest Group (SIG). Bluetooth wireless technology.
Making connections. Smile Taking a picture of the class and transferring it… What methods could I use?
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
An Introduction to BLUETOOTH TECHNOLOGY
 2001 Prentice Hall, Inc. All rights reserved. 1 Chapter 23 - Bluetooth™ Wireless Technology Outline 23.1 Introduction 23.2 History of Bluetooth Wireless.
Wireless Network Security Presented by: Prabhakaran Theertharaman.
GENERAL PRESENTATION ON BLUETOOTH Neeraj Dhiman.
BLUETOOTH Created By: Ajay Bahoriya. Agenda Introduction to Bluetooth Bluetooth Basics Mode of operation Technology Security Advantages Integrating BT.
A tree line has a central line connecting together a series of star networks. The server is connected to a central line. Tree Network As the star, and.
PRESENTED BY M.A.M.JANI S.AMRUTHA RAJU M.A.M.JANI S.AMRUTHA RAJU.
발표자 : 현근수 Bluetooth. Overview wireless protocol short-range communications technology single digital wireless protocol connecting multiple devices mobile.
Team Topic Presentation Team 6 BLUETOOTH What is Bluetooth? Cable Replacement Automatic Connectivity Hidden Computing Few Examples: 1.Automatic Door.
SEMINAR ON BLUETOOTH TECHNOLOGY
Wireless Security. Traditional method A computer with network card a cable connecting network card and the network.
Focus On Bluetooth Security Presented by Kanij Fatema Sharme.
3.3 Mobile Digital Communication. Overview Demonstrate and apply the knowledge and understanding of the increasing use of mobile communication devices.
Bluetooth. What is Bluetooth? Created in 1994 by Ericsson, a Swedish company, Bluetooth was conceived as a wireless alternative to data cables by exchanging.
Bluetooth Matthew Sklar CSCI 030 November 15, 2004.
BLUE TOOTH PRESENTED TO: MR AHMED TISMAN PASHA PRESENTED BY: MUDASSIR ABBAS ROLL NO SESSION DEPARTMENT OF COMPUTER SCIENCE BZU MULTAN.
Technology By :-. What Is Bluetooth? Designed to be used to connect both mobile devices and peripherals that currently require a wire Short range wireless.
How to hack into mobile phones via bluetooth & How to Hack Wireless Internet Connections in 3 Easy Steps PresentedBy Pradosh H.S.
BluetoothTechnology Presenting By: AJAY DAGAR (ECE) Roll No: B.Tech VIIth Semester Inderprastha Engineering College.
Bluetooth Technology. History The name ‘Bluetooth’ was named after 10th century Viking king in Denmark Harald Bluetooth who united and controlled Denmark.
BLUETOOTH HACKING - Image the world without wireless By Indra Divya.K Kalasalingam University CSE-Final yr.
Respected Mam Madhurima Presented by Sharath Kumar.
Respected Ma’am & Dear friends
Objective of this Presentation To understand what is Wi-Fi and what is Bluetooth. Difference between Bluetooth and Wi-Fi.
Presented by Khaled Al Otaishan
BUSINESS COMMUNICATION AND ETHICS (HS-304)
Bluetooth Presented by :- Sachin mogha
How this name came? Harald Bluetooth was king of Denmark in the late 900s. United Denmark and Norway.
Name: Bandar M.Khaleel Id: MIS, Telecommunation
Physical layer protocol bluetooth
Bluetooth By.
A Wireless LAN technologies IEEE
CompTIA Security+ Study Guide (SY0-501)
“I don’t have to be careful, I’ve got a gun.”
PREPARED BY: RIDDHI PATEL (09CE085)
Topic- Bluetooth Architecture
3.3 Mobile Digital Communication
Emilia Nisha D’souza [ ]
Presentation transcript:

Bluetooth Presented by Venkateshwar R Gotur CMPT - 320

AGENDA  Bluetooth Overview  Types of Bluetooth enabled devices and technology  Benefits of Bluetooth  Bluetooth Security, Vulnerabilities and Threads  Security Recommendations, Needs and Requirements.

Bluetooth Overview  Bluetooth was founded in 1998 by: Ericsson, Intel, IBM, Toshiba and Nokia  Created in order to promote, shape an define the specification and position Bluetooth in the market place  It name comes form the 10 th century Danish King Harald, who managed to unite Denmark and Norway

Continued…  Bluetooth is a radio technology used for exchanging data over short distances  Bluetooth is a standard and communication protocol primarily designed for low power consumption, with a short range based on low cost transceiver microchips in each device.  Used within the devices like cell phones, laptops and other wireless devices to communicate.

Bluetooth Technology  Short range (theoretically 10 –100m)  Point to point or point to multipoint  Wireless (ISM frequency band - 2.4GHz)  Voice and data transfer ( up to 1Mb/s)

Bluetooth Enabled Devices  Laptops  Headset  Printers  Keyboards  GPS  Cellular Phones and many more….

Benefits of Bluetooth  Cable replacement  Ease of File sharing  Wireless Synchronization  Internet Connectivity  Share capabilities

Bluetooth Vulnerability, Security and Threats  Bluesnarfing  Bluejacking  Bluebugging  Car Whisperer  Denial of Service  Fizzing Attacks  Pin Cracking  Bloover  Blue smack  Long distance snarf, etc

Bluesnarfing  Unauthorized access of information from a wireless device.  Loss of personal information.  Can rout out calls to his/her cell phones.  Works within the mechanism for exchanging business cards.  OBEX (object exchange).  Aims for discoverable and undiscoverable devices to be hacked based on brute force.

Continued…

Blue jacking  Attacked by sending unsolicited messages to a user of Bluetooth enabled devices.  Blue jack can create a phone book contact and write messages.  Pop up messages from the hacker  User can panic that his/her device is hacked.

Continued…

Bluebugging  Bluebugging goes well beyond bluesnurfing and bluejacking.  Allows hackers to completely takeover a Bluetooth device.  Blue bug has capabilities like bluesnarfing.  Bluebugger can pick up conversations in phone’s immediate area.  Bluebugger manipulates “backdoor” attacks and many more etc….

Continued…

Security recommendations, needs and requirements.  Disable Bluetooth, Turn off Bluetooth features when not in use.  Paring security: Bluetooth devices should be paired up in a private physical setting to minimize the risk of potential attack.  User should not respond to any messages requesting for a pin.  Pin for Bluetooth devices should be changed on regular intervals with at least eight characters alphanumeric.   Always Upgrade your devices to the latest technology.

Continued…  Do not pair up with other devices if you feel its unsecure.  Higher layer of encryption will also add an additional layer to security.  With increase in Bluetooth enabled devices the user should establish connection only with trusted devices.  Spatial distance can avoid other devices to gain access to your Bluetooth enabled device.

QUESTIONS QUESTIONS