Presentation is loading. Please wait.

Presentation is loading. Please wait.

PREPARED BY: RIDDHI PATEL (09CE085)

Similar presentations


Presentation on theme: "PREPARED BY: RIDDHI PATEL (09CE085)"— Presentation transcript:

1 PREPARED BY: RIDDHI PATEL (09CE085)
BLUETOOTH SECURITY PREPARED BY: RIDDHI PATEL (09CE085)

2 OUT LINE INTRODUCTION SECURITY FRAMEWORK LINK LEVEL SECURITY
SERVICE LEVEL SECURITY CONCLUSION BIBLOGRAPHY

3 INTRODUCTION Bluetooth is a new technology named after the 10th century by Danish king Herald Bluetooth. Bluetooth is develop to provide cable-free environment. Security architecture.

4 SECURITY FRAMEWORK TECH. PROVIDES SECURITY AT APPLICATION LAYER AND LINK LAYER HOP SELECTION MECHANISM BASIC DEFINITION SECURITY MODES SECURITY LEVELS

5 BASIC DEFINITION ENCRYPTION AUTHENTICATION AUTHORIZATION
Transfers data to other form, can’t understood without key. AUTHENTICATION The ensuring of the identity of another user. AUTHORIZATION Deciding, if a device is allowed to have access to a service.

6 SECURITY MODES MODE 1: NON-SECURE MODE MODE 2: SERVICE LEVEL SECURITY
MODE 3: LINK LEVEL SECURITY

7 SECURITY LEVELS LINK LEVEL SECURITY SERVICE LEVEL SECURITY
The Bluetooth device initiates security functions before the channel is established. SERVICE LEVEL SECURITY The Bluetooth device initiates security functions after the channel is established

8 LINK LEVEL SECURITY KEY MANAGEMENT SCHEME AUTHENTICATION SCHEME
ENCRYPTION SCHEME

9 KEY MANAGEMENT SCHEME

10 AUTHENTICATION SCHEME Challenge-response for the Bluetooth authentication.
2 PROTOCOLS ARE USED BOTH USERS SHOULD SHARE SAME KEYS

11 ENCRYPTION SCHEME

12 SERVICE LEVEL SECURITY
This is an approach for a flexible security architecture built on top of the link-level security features of Bluetooth The key component in the architecture is a security manager Functions

13

14 APPLICATIONS Wireless headsets for cell phones.
Wireless PC Mouse connection to the PC using Bluetooth. Wireless printing between a PC. Automated synchronization of Personal Digital Assistant (PDAs) and PCs using Bluetooth. Ad hoc networking and file sharing between PCs, PDAs & laptops in a meeting.

15 BENEFITS Cable replacement between two devices
The wide range of device types and standard interface Set of wired and wireless devices are Bluetooth connectable

16 CONCLUSION Bluetooth's security seemed to be adequate small ad hoc networks. Bluetooth secure for larger networks, money transfers and transferring other sensitive information. Original design goal of cable replacement. Bluetooth is more suitable to short-range. Small-size wireless personal area networks.

17 References:

18 THANK U….


Download ppt "PREPARED BY: RIDDHI PATEL (09CE085)"

Similar presentations


Ads by Google