100 likes | 229 Views
Bluetooth is a short-range, high-speed LAN protocol enabling wireless connections between mobile devices without line-of-sight restrictions. It encompasses standard communication interfaces and low-cost computer chips, combining DECT and iRDA technologies. With open specifications and various usage models like file transfer and Internet bridging, Bluetooth is essential for wireless networking. Its security architecture includes device trust levels and service levels, ensuring secure connections. This document details Bluetooth’s protocols, security mechanisms, and application profiles for effective utilization.
E N D
BluetoothKirthika ParmeswaranTelcordia TechnologiesOOPSLA’2000
Bluetooth http://bluetooth.com • Short range, high speed LAN protocol (1M – 2Mbit/s) • Encompass a standard communications interface and a low-cost computer chip • Combines the DECT (Digital European Cordless Telephone) and iRDA (infraRed Data Association) technologies • Open specification • Enables users to connect their mobile devices via wireless short-range radio links unimpeded by line-of-sight restrictions • Can be used as a WAP bearer
Bluetooth Architecture LMP: Link Management Protocol L2CAP: Logical Link Control And Adaptation Protocol SDP: Service Discovery Protocol TCS BIN: Telephony Control Protocol – Binary RFCOMM: emulates RS 232 , cable replacement protocol OBEX: Object Exchange Protocol
Complementary Capabilities to Jini™ • Service Discovery Layer using the Service Discovery Protocol (SDP) • SDP can be used to: - search for services by service class or attributes - service browsing • Security levels for devices and services • device trust levels <trusted device, untrusted device> • service levels <authentication + authorization, authentication only, open to all> • default security level for legacy applications • Limitations in the security: device level, access control only at set-up
Usage Models • Each usage model has a profile defined, e.g • generic access profile (GAP) • the serial port profile • the service discovery application profile • generic object exchange profile • Usage models commonly used • File Transfer • Internet Bridge • LAN access • Three-in-one phone • Ultimate Headset
Conclusion • Bluetooth can be used as an underlying protocol to Jini(see also Sun white paper on Jini™ Technology and Emerging Network Technologies) • Bluetooth could serve as an area of pattern mining for ad hoc networking
Bluetooth Security Architecture • Security levels for devices and services • (1) device trust levels <trusted device, untrusted device> • (2) service levels <authentication + authorization, • authentication only, • open to all> • (3) Default security level for legacy applications • Limitations • (1) Legacy application need a “adapter application” for security • (2) Only device is authenticated not user • (3) No mechanism defined to preset authorization per service • (4) Access control only at connection set-up time • (5) unidirectional traffic not possible after access check • (6) For “end-to-end” security higher level services required
Security built over Bluetooth • Security Manager - stores security related information on services and devices - performs access checks - helps to set up trusted relationships at the device level - initiates pairing and query PIN entry by the user - checks whether a service does not permit connectionless data packets when needed
Usage Models • Each usage model has a profile defined, • e.g generic access profile (GAP), the serial port profile, • the service discovery application profile (SDAP), • and the generic object exchange profile (GOEP) • Usage models commonly used include File Transfer, Internet Bridge, • LAN access, Three-in-one phone, Ultimate Headset
Protocols in the Bluetooth Architecture • The Specification also defines a Host Controller Interface (HCI), which provides a command interface to the baseband controller, link manager, and access to hardware status and control registers. • It can be positioned above/below L2CAP