Bluetooth Security Full Download Seminar Report and Paper Presentation
#2
CONTENT
Introduction
The Name-Bluetooth
The basic idea
How to creates connection
How a Bluetooth transfer data
CONTENT
Bluetooth security . Bluetooth Vs Wi-Fi
Beneficial because of
Applications
References
Advantages & disadvantages
INTRODUCTION
What actually Bluetooth technology is
11 isn't some strange form of tooth decay as you might initially imagine. Bluetooth is the name of a technology that is now becoming commercially available. 11 promises to change significantly the way use machines.
Bluetooth technology is a wireless short-range communication system introduced to replace the cables connecting portable electronic devices.
Bluetooth is a developing, world wide, open, short-range radio specification focused on communication between the Internet and Net devices, plus it defines communication protocols between devices and computers.
The Name - Bluetooth
Bluetooth was named after a 10th century king, Harald Bluetooth, king of Denmark & Norway.
In 1994 Ericsson work on a wireless technology called Bluetooth. Since then many companies have adopted Bluetooth technology. Making it a small low power, low rate chip to wireless link.
The Bluetooth logo merges the Germanic runes analogous to the modern Latin letter H and B: (for Harald Bluetooth) T (Hagall) and & (Berkanan) merged together, forming a bind rune.
The Basic Idea
Bluetooth is a standard and communication protocol primarily designed for low power consumption.
Communication within short range is possible via Bluetooth(power-class-dependent: 1m, 10m, 100ms).
Bluetooth chip is designed to replace cables. Information normally carried by the cable, is transmitted at a special frequency to a receiver Bluetooth chip.
,i How a creates connection
For making a connection, a Bluetooth follows two procedures: -
1.) Inquiry (or Discovering) Procedure
2.) Paging (or Connecting) Procedure
I nquiry (or Discovering) Procedure
Bluetooth enabled devices use the inquiry procedure to discover nearby devices or to be discovered devices in their locality.
A Bluetooth enabled devices that tries to find other nearby devices is know as inquiry devices and actively send inquiry request.
Bluetooth enabled devices in a piconet.
Piconet: - It is a network in which upto eight Bluetooth enabled devices can be connected.
U i REQUIREMENTS
BLUETOOTH DEVICES:- Bluetooth exists in many products, such as telephones, printers and headsets. The technology transfers data between two or more devices that are near each other in low-bandwidth situations. Bluetooth is commonly used to transfer sound data with telephones or byte data with hand-held computers.
COMPUTER REQUIREMENTS:- A EC must have a Bluetooth adapter in order to be able to communicate with other Bluetooth devices (such as mobile phones, mice and keyboards). While some desktop computers and most recent laptops come with a built-in Bluetooth adapter, others will require an external one in the form of a dongle.
MOBILE PHONE REQUIREMENTS:- A mobile phone that is Bluetooth enabled is able to pair with many devices. To ensure the broadest support of feature functionality together with legacy device support.
Class
Maximum P ermitted Power mW(dBm)
Class 1 100mW(20 dBm)
Class 2 2.5 mW (4 dBm)
Class 3 1 mW (0 dBm)
Version Data Rate
Version 1.2 1 Mbit/s

Version 2.0 + EDR 3 Mbit/s

WiMedia Alliance (proposed) 53 - 480 Mbit/s
~1 meter
Range (approximate)
,,How a Bluetooth transfer data
This networking transmit data via low power radio wave. The Bluetooth system is operating in the 2.4 GHz ISM (Industrial Scientific Medicine) band.
11 communicates on a frequency between 2.402 GHz to 2.480 GHz .
It can connect up to eight devices simultaneously, with all of those devices in the 10 meter (32feets) radius, as each has it's own 48-bit address.
It use a technique called spread spectrum frequency hopping that make it rare for more then one devices to be transmitting at the same time.
,i Bluetooth security
I n any wireless networking setup, security is a concern. Devices can easily grab radio waves out of the air, so people who send sensitive information over a wireless connection need to take precautions to make sure those signals aren't intercepted.
With Bluetooth, though the automatic nature of the connection, which is a huge benefit in terms of time and effort, is also a benefit to people looking to send you data without your permission.
It offers several security modes, and device manufacturers determine which mode to include in a Bluetooth-enabled gadget
,i Bluetooth security
I n almost all cases, Bluetooth users can establish "trusted devices" that can exchange data without asking permission. When any other device tries to establish a connection to the user's gadget, the user has to decide to allow it.
Service-level security and Device-level security work together to protect Bluetooth devices from unauthorized data transmission. require that users make a conscious decision to open a file or accept a data transfer.
J| BLUETOOTH Vs WI-FI
Bluetooth & Wi-Fi both are wireless communication tech.
Both of them using same frequency range & are versions of unlicensed wireless technology, but employ different modulating techniques.
Bluetooth is a replacement of cable in small scale app. where as Wi-Fi in LAN access.
Wi-fi provides higher throughput & covers greater distances, but requires more expensive hardware & higher power consumption.
Bluetooth Technology is Beneficial because of it's:
Global Availability
Ease of Use
Globally Accepted Specification
Range of Devices
Secure Connections
^APPLICATIONS
More prevalent applications of Bluetooth include:
Wireless control of and communication between a mobile phone and a hands-free headsets. This was one of the earliest applications to become popular.
Wireless networking between PCs in a confined space and where little bandwidth is required.
Wireless communications with PC input and output devices, the most common being the mouse, keyboard and printer.
Sending small advertisements from Bluetooth enabled advertising hoardings to other, discoverable, Bluetooth devices.
Two seventh-generation game console, Sony's playstation3 use Bluetooth for their respective wireless controllers.
Dial-up internet access on personal computer or PDA using a data-capable mobile phone as a modem.
For controls where infrared was traditionally used. Replacement of wired serial communications, GPS receivers, medical equipment and traffic control devices.
Bluetooth has a lot to offer with an increasingly difficult market place. Bluetooth helps to bring with it the promise of freedom from the cables and simplicity in networking that has yet to be matched by LAN (Local Area Network).
I n the key marketplace, of wireless and handheld devices, the closest competitor to Bluetooth is infrared. I nfrared holds many key features, although the line of sight it provides doesn't go through walls or through obstacles like that of the Bluetooth technology.
Unlike infrared, Bluetooth isn't a line of sight and it provides ranges of up to 100 meters. Bluetooth is also low power and low processing with an overhead protocol. What this means, is that it's ideal for integration into small battery powered devices.
I nfrared can have data rates of up to 4 MBps, which provides very fast rates for data transfer, while Bluetooth only offers 1 MBps.
For this very reason, infrared has yet to be dispensed with completely and is considered by many to be the complimentary technology to that of Bluetooth. I nfrared has inherent security due to its line of sight.
The greater range and radio frequency (RF) of Bluetooth make it much more open to interception and attack. For this reason, security is a very key aspect to the Bluetooth specification.
Jj ASPECTS USING BLUETOOTH
Athough there are very few d isadvantages, Bluetooth still remains the best for short range wireess technology. Those who have tried t love t, and they know for a fact that Bluetooth will be around for years to come.
HAZARDS:-
First, though there has been a great deal of research, the evidence pointing to any health hazard from radiation in the 800 MHz to 2 GHz range at the power levels used by mobile phones is, at worst, equivocal. This suggests that if there is any risk at all, it is very small. Second, I have not seen any studies suggesting any risk from Bluetooth. This is not surprising. While a phone needs to transmit with enough power to reach a base station antenna that may be a couple of miles away, Bluetooth has a nominal range of 30 feet.
References
1.) bluetooth.com 2.) google.com 3.) wikipedia.org 4) palowireless.com
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: bluetooth security devices, seminar topic bluetooth in 20 slides, www bluetooth q8i xnxx com, research paper on bluetooth seminar topic download pdf file, seminar topics on homerf and bluetooth, ieee project on bluetooth jammer for security application, pic24fj64 bluetooth,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: Bluetooth Security Full Download Seminar Report and Paper Presentation - by seminar topics - 31-03-2010, 08:14 PM
RE: Bluetooth - by seminar class - 21-02-2011, 03:25 PM
RE: Bluetooth - by seminar class - 17-03-2011, 02:10 PM

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 21,025 24-11-2018, 01:19 AM
Last Post:
  computer networks full report seminar topics 8 43,831 06-10-2018, 12:35 PM
Last Post: jntuworldforum
  OBJECT TRACKING AND DETECTION full report project topics 9 31,771 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  imouse full report computer science technology 3 25,932 17-06-2016, 12:16 PM
Last Post: ashwiniashok
  Implementation of RSA Algorithm Using Client-Server full report seminar topics 6 27,647 10-05-2016, 12:21 PM
Last Post: dhanabhagya
  Optical Computer Full Seminar Report Download computer science crazy 46 68,011 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  ethical hacking full report computer science technology 41 76,104 18-03-2016, 04:51 PM
Last Post: seminar report asees
  broadband mobile full report project topics 7 24,448 27-02-2016, 12:32 PM
Last Post: Prupleannuani
  steganography full report project report tiger 15 42,585 11-02-2016, 02:02 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,319 16-09-2015, 02:51 PM
Last Post: seminar report asees

Forum Jump: