Tuesday, August 16, 2011

The Mechanism of Bluetooth Connection Layer


Bluetooth special interest group (SIG) spent considerable time to develop safe mode as the protection mechanism for link levels, such as a 128 element encryption, device authentication and authorization. But if you want to reach the highest trust requirements, application developers or IT organization must be add application security in link level security, in order to achieve protection from end to end. Because Bluetooth communication distance is short (only 10 meters), and automatic power adjusts mechanism to limit the signal radius, so it is not easy to remote block. However, Class 3 wave can make Bluetooth receiving distance increase to 100 meters.

Bluetooth authentication and encryption service are provided by connecting layer. Authentication adopts password-response mode. In the course of the connection, it may need one or two certifications, or without authentication. Certification is an important component for any Bluetooth systems. It allows users to add their own trusted Bluetooth devices. For example, only the user’s own laptop can communicate through the user's own mobile phone. Bluetooth system uses stream cipher encryption technology which is suitable for hardware implementation. The key length can be 0, 40 or 64, by the senior management of key software. Security mechanism of Bluetooth aims to provide the appropriate level of protection. If users have a high level of confidentiality requirements, they can use the effective transport layer and apply layer security.

Bluetooth device can communicate with the certified party for bilateral links, or permanently link (referred to as pairing, paired line), thus the trusted party does not need certification process every time (such as between telephone headset and phones). The weakest link of Bluetooth security is in the paired device online (pairing). Paired line would use Bluetooth address in the device (the steadfast address set by manufacturers) and individual ID number (PIN) to create a link key. In the matching process, hackers may guess the too short PIN, then get the link key, and tap all dialogue, or fabricate a device added to the match.

Currently people do not hear any Bluetooth security vulnerability. But there is a famous program that can use the test address number to detect presence of devices. In future, this software will have the opportunity to exposure device address, and attempt to perform on-line. But both sides should have common PIN number. Otherwise the hacker cannot attack. As all systems, the technology will be more mature, more users and developers use it, and vulnerabilities will be exposed faster. IT organization should study the safety function of Bluetooth device, and guide customers how put the security risk at a minimum. In general, if people do not use the authentication, they are inappropriate to transmit highly confidential information by Bluetooth.

Monday, August 8, 2011

Technological Superiority of Bluetooth


Global availability:
The specifications of Bluetooth wireless technology for our global member companies’ free use. Many industry manufacturers are active in their products in the implementation of this technology, in order to reduce the use of messy wires, to achieve seamless connectivity, streaming stereo, transmit data or make voice communications. Bluetooth technology is in 2.4 GHz running band, and the band is radio band provided for unlicensed industry, science and technology, medical (ISM). Because of this, the use of Bluetooth technology does not need to pay any costs. But you have to register to use GSM or CDMA from mobile phone providers. In addition to equipment costs, you do not need to pay any fee to Bluetooth technology.

Equipment Range:
Bluetooth technology has been in unprecedented wide application, integrated products from the technology, such as mobile phone, cars and medical equipment. The users using the technique are from the consumer, industrial market and enterprise and so on. The solution of low power consumption, small size and low cost chip even makes Bluetooth technology be applied to very small equipment.

Easy to use:
Bluetooth technology is an instant technology, does not requires fixed infrastructure, and easy to install and setup. You do not need to connect the cable. It is also easy to use for new users. You only need to have Bluetooth brand products, check the available configuration file, and connect it to another Bluetooth device with the same configuration files. Follow-up PIN code flow is simply just like that you operate on an ATM machine. When you go out, you can bring your personal area network (PAN), and even can connect other network.

Global general specifications:
Bluetooth wireless technology today is the most widely supported on the market with the richest features and secure wireless standard. Global certification programs can test whether a product from members is complied with standard or not. Since its release of Bluetooth specifications in 1999, a total of more than 4000 companies become members of Bluetooth special interest group (SIG). At the same time, Bluetooth products in the market also have grown rapidly. The number of products has doubled for four consecutive years, and the number of base stations installed at the end of 2005 can reach 500000000.