Bluetooth is a wireless protocol utilizing short-range communications technology facilitating data transmissions over short distances from fixed and/or mobile devices, creating wireless PANs.
Bluetooth provides a way to connect and exchange information between devices such as mobile phones, telephones, laptops, personal computers, printers, GPS receivers, digital cameras.
So the security of the Bluetooth becomes very important. We have different types of security for Bluetooth to protect the data over the transmission
Here we discuss some of the Bluetooth security method.
Authentication-A goal of Bluetooth is the identity verification of communicating devices. This security service addresses the question “Do I know with whom I’m communicating?” This service provides an abort mechanism if a device cannot authenticate properly
Confidentiality-Confidentiality, or privacy, is another security goal of Bluetooth. The intent is to prevent information compromise caused by eavesdropping (passive attack). This service, in general, addresses the question “Are only authorized devices allowed to view my data?”
Authorization-One another goal of Bluetooth is a security service developed to allow the control of resources. This service addresses the question “Has this device been authorized to use this service?”
GLOSSARY
PAN - PERSONAL AREA NETWORKS
LFSR - LINEAR FEEDBACK SHIFT REGISTER
KG - KEY GENERATOR
FHSS - FREQUENCY-HOPPING SPREAD- SPECTRUM
L2CAP - LOGICAL LINK CONTROL AND ADAPTATION PROTOCOL
Bluetooth Overview
Ad hoc networks today are based primarily on Bluetooth technology. Bluetooth is an open standard for short-range digital radio. It is touted as a low-cost, low-power, and low-profile technology that provide a mechanism for creating small wireless networks on an ad hoc basis. Bluetooth is considered a wireless PAN technology that offers fast and reliable transmission for both voice and data. Untethered Bluetooth devices will