Which wireless technology is used to create a connection between two devices?

Bluetooth connects devices in the ISM band at 2400–2480 MHz. Devices connected via Bluetooth are considered to be part of a personal area network (PAN).

As you can see, there are many risks associated with mobile devices because not only are they in great numbers, but they are also hard to monitor and control and have many avenues in which they can connect to different networks. To secure against client-side attack, make sure that you consider the use of mobile devices in your organization and protect with end-user education, security policy, and/or enforcement. Enforcement can be policy based, where you eliminate all personal device usage and do not allow for it to be a part of your company network, connect to PCs, or used freely on the network. For example, if you wanted to secure Apple iPhones from connecting to your corporate desktops, you can enforce a policy that disallows for it, barring iTunes (which is needed when connecting an iPhone to your desktop) from loading or being installed. This is but one example of how to enforce not using a mobile device on your corporate network.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597495905000092

ZigBee Coexistence

Shahin Farahani, in ZigBee Wireless Networks and Transceivers, 2008

8.4 Coexistence with Bluetooth

Bluetooth systems operate in the 2.4 GHz ISM band and use the frequency hopping spread spectrum (FHSS) method instead of DSSS to spread their signals. Figure 8.3 shows the Bluetooth basic operation mechanism. The transmitted signal bandwidth is 1 MHz, but the frequency channel is changed using a pseudorandom sequence. The maximum number of hops in Bluetooth is 1600 hops per second in the connection state. There are 79 frequency channels in Bluetooth separated by 1 MHz:

Which wireless technology is used to create a connection between two devices?

Which wireless technology is used to create a connection between two devices?

Figure 8.3. (a) IEEE 802.15.4 Channels and (b) Bluetooth Channels

(8.2)Bluetooth frequency channels=2402+k      0≤k≤undefined78

where k is the channel number.

Bluetooth typical output power can be as high as 20 dBm. Bluetooth versions 1.1 and 1.2 were ratified as IEEE 802.15.1. But future versions of Bluetooth will not be ratified as any IEEE standard. The Bluetooth version 2.0 and higher can provide data rates of up to 3 Mbps. The device type in Bluetooth can be either master or slave. A master device can communicate with up to seven devices. The slaves periodically synchronize their clocks with the master.

FHSS, similarly to DSSS, provides processing gain, which improves the chance of successful packet delivery when interference is present. An IEEE 802.15.4 signal has 2 MHz bandwidth and may cause interference to three of the Bluetooth channels. Therefore, if the nearby Bluetooth device is using all 79 channels for frequency hopping, the maximum chance of interference between a single ZigBee node and a Bluetooth node is 3 out of 79 hops, which is approximately 4%.

However, a Bluetooth device can reduce the effect of presence of a ZigBee network (or any other network) by using adaptive frequency hopping (AFH). The AFH identifies the channels where interferences are present and marks these channels as “bad channels.” Then the sequence of hops is modified such that the frequency channels with high-level interference are avoided. The bad channels in the frequency-hopping pattern are replaced with good channels via a lookup table. The Bluetooth master may periodically listen on a bad channel and if the interference has disappeared, the channel is marked as a good channel. Bluetooth slaves can also send a report regarding the channel quality to the master if necessary. The AFH method not only improves the performance of the Bluetooth network, it also reduces the effect of the Bluetooth network on other nearby networks that are not Bluetooth compliant.

The Bluetooth devices might not notice the presence of the ZigBee network due to the low duty cycle and low power of typical ZigBee nodes. If the frequency channel used by the ZigBee network is not marked as a bad channel, the Bluetooth network can cause interference to the ZigBee network, depending on the distance between the Bluetooth and ZigBee nodes.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B978075068393700008X

Feeling Bluetooth

Paul Braeckel, in Advances in Computers, 2011

1.3 Specifications and Compliance

The BT architectural combines a hardware and software solution with a logical division for simplification into three core components: a transceiver, a Baseband, and a protocol stack. The radio frequency (RF) transceiver is responsible for sending and receiving communications to and from the device. The BT Baseband is responsible for managing the BT networking between devices. The BT protocol stack is responsible for processing the communications and providing the service profiles for BT functionality between networked devices. The BT SIG, which is the governing body over the BT technology, initially approved and released the document detailing the specifications and compliance for these components in 1999. Since this initial release, the BT technology and its specifications have evolved through several revisions. Table I lists the publicly released specification revisions, starting with this initial release in 1999. As per the BT SIG, the most recent official specification was released in April 2009 and they have slated several functionalities for future versions. This newest released and approved version of BT, v. 3.0 + HS, which stands for High Speed, retains the simplicity and easy of connection already expected from BT but combines with the speed and efficiency of Wi-Fi.

Table I. Official Bluetooth Specification Revisionsa

RevisionRelease dateDescriptionv1.0AJuly 26, 1999Short-lived, first public release of the Bluetooth Specifications and Compliance Requirements that incorporated limited profile functionalityv1.0BDecember 1, 1999First amendment to the Bluetooth Specification and Compliance, mainly addressed errata updates to v1.0A. The first products to reach market complied with this specification releasev1.1February 22, 2001Improved manufacturer interoperability of Bluetooth devices, improved general device usability, and increased the available functionality profilesv1.2November 5, 2003Reduced interference with other devices on its host ISM band, increased throughput, and improved audio quality through implementation of FHSS. Referred to as Basic Rate: (transmission rate = 1 Mbit/s)v2.0 + EDRNovember 9, 2004Improved compliance to basic design goals of higher throughput and lower power consumption. Referred to as Enhanced Date Rate (EDR): (transmission rate = 2–3 Mbit/s)v2.1 + EDRJuly 26, 2007Increased available functionality profiles, increased network security (specifically pairing), lower power consumption, and modified specifications to adapt technology to incorporate high-speed throughput (transmission rate = 3 Mbit/s)v3.0 + HSApril 21, 2009Increased throughput and improved security (through Alternate MAC/PHY for transmitting large amounts of data), power management optimized (transmission rate = up to 24 Mbit/s)v4.0June 30, 2010Bluetooth Low Energy (a.k.a. Wibree), Broadcast channel, improved QoSFuture???UWB to 60 GHz

aBluetooth Special Interest Group, Specification of the Bluetooth System (11/4/2004): Part C, 55–57.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780123855145000045

Wireless Personal Area Network — Bluetooth

Vijay K. Garg, in Wireless Communications & Networking, 2007

19.13 WAP and Bluetooth

Bluetooth can be used with WAP like any other wireless network. Bluetooth wireless networks can be used to transport data from a WAP client to a WAP server. The WAP client can make use of Bluetooth's SOP to find the WAP server/gateway. This is very useful when the WAP device is a mobile phone and when it comes into the range of a WAP server, it can use Bluetooth's SDP to discover the gateway. The Bluetooth SDP must be able to provide some details about the WAP server to the WAP client.

The other feature that can be supported is the reverse of the above. The WAP server can periodically check for the availability of WAP-enabled clients in its range. It can use Bluetooth's SDP to do this. If there are any clients, the server can push any data to the client. The client of course is not required to accept the data pushed to it.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9780123735805500533

An Overview of JABWT

C. Bala Kumar, ... Timothy J. Thompson, in Bluetooth Application Programming with the Java APIs, 2004

2.2.3 Bluetooth System Requirements

The Bluetooth part of the JABWT implementation is not designed to access the Bluetooth hardware directly. It accesses the Bluetooth hardware through an underlying Bluetooth stack. The Bluetooth stack can be implemented in many ways, such as making it part of the JABWT implementation or writing it completely in the Java language. Typically, JABWT is to be implemented on top of a native (written in C or C++) Bluetooth stack, thus allowing native Bluetooth applications and Java Bluetooth applications to run on a system. The requirements of the underlying Bluetooth system on which this API is built are as follows:

The underlying system is qualified in accordance with the Bluetooth Qualification Program for at least the GAP, SDAP, and SPP.

The following layers are supported as defined in Bluetooth specification version 1.1, and the JABWT has access to them.

SDP

RFCOMM

L2CAP

The BCC is provided by either the Bluetooth stack or system software. The BCC is a “control panel”–like application that allows a user or an original equipment manufacturer (OEM) to define specific values for certain configuration parameters in a stack. The details of the BCC are discussed in Chapter 3.

Unlike the Bluetooth part of the API, the OBEX API can either be implemented completely in the Java programming language within the JABWT implementation or use the OBEX implementation in the underlying Bluetooth stack. If OBEX is being implemented on another transport, the OBEX API can use the OBEX implementation over that transport system. More of the implementation details are discussed in Section 10.3.3.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781558609341500056

New Technology

Matthew Neely, ... Chris Sanyk, in Wireless Reconnaissance in Penetration Testing, 2013

Bluetooth

Bluetooth is an extremely common technology, found in pretty much every cellphone, most laptops, many desktop-class personal computers, and in ever-growing number of cars. Bluetooth uses frequency-hopping spread spectrum in the 2.4 GHz ISM band, the same band used by WiFi, microwave ovens, and most other 2.4 GHz consumer devices. Bluetooth devices form a piconet containing up to eight nodes—one master and seven slaves. Bluetooth is used for short-range communications between device peers, as well as device to peripheral. The number and variety of peripherals which communicate via Bluetooth is immense—wireless headsets for hands-free cell phone use, keyboards, mice, videogame controllers, audio speakers, you name it. Bluetooth is best known for transmitting audio, as in Bluetooth headsets. But it can also be used to connect HID devices such as keyboards and mice, and send data. Although not very popular, there are Bluetooth access points which function the same as WiFi access points to connect multiple devices to a network.

Attack tools against Bluetooth exist, such as Ubertooth (Figure 9.2), but still Bluetooth is not commonly targeted in penetration tests. Ubertooth is a custom made radio dongle that can attack radio systems in the 2.4 GHz range. Originally it was created to attack only Bluetooth, hence the name, but has since been expanded. The project’s home page is http://ubertooth.sourceforge.net/.

Which wireless technology is used to create a connection between two devices?

Figure 9.2. Ubertooth One Dongle. Reprinted with Permission from Meagan Call

Ubertooth can be used to monitor traffic, inject traffic, and do basic spectrum monitoring. It is very much a platform still in development, so new features are being added all the time. It is one of the cheaper, if not cheapest, ways to sniff Bluetooth, and the cheapest tool to inject custom packets. It has lowered the cost of entry to start attacking Bluetooth devices.

The key with Ubertooth is it is very difficult to take a consumer Bluetooth dongle and have it sniff and inject custom frames. With WiFi, this was very easy to do. Nearly any WiFi adaptor can be used to sniff traffic, and today most support injection as well. Once this was discovered, it became a lot cheaper to attack WiFi. To date, the only way we have seen to accomplish this on a Bluetooth dongle is to load a commercial firmware, which has probable EULA violation implications. Commercial tools to sniff and inject Bluetooth packets cost thousands of dollars. Ubertooth has lowered the cost for a device to attack Bluetooth to $120.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597497312000090

Bluetooth Attacks

Brad Haines, in Seven Deadliest Wireless Technologies Attacks, 2010

Publisher Summary

Bluetooth is actually a suite of protocols and functions operating in the 2.4 GHz ISM band along the same as 802.11b/g/n Wi-Fi. Bluetooth has undergone some revisions and multiple versions of the protocol exist. Bluetooth 1.2 and 2.0 1 Enhanced Data Rate (EDR), are the most common in the marketplace. Bluetooth 1.2 supports approximately 725 Kbps throughput that is enough for devices such as mouse, keyboards, printers, and headsets. Revisions to the standards culminating in Bluetooth 2.0 includes EDR, which bumps the maximum throughput to 3 Mbps on compatible devices for larger data such as photos or music files. Bluetooth attacks are against targets of opportunity. In the case of Bluetooth, its design assumes that devices interact with one another occasionally. The need for these devices to find one another easily is a requirement of this. This allows legitimate users to find the device they are seeking and allows a nearby attacker to find those same devices and silently interrogate them to find out if they are suitable to attack. The most common attacks on Bluetooth devices are due to default PIN numbers. Many devices come preset from the factory with a PIN that the user is asked to change.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597495417000035

Mobile Malware Mitigation Measures

In Mobile Malware Attacks and Defense, 2009

Bluetooth

A Bluetooth firewall provides similar functionality for interactions over the Bluetooth interface. There have been various Bluetooth attacks demonstrated against common phones. While there is limited data measuring their frequency in the wild, there is at least some real exposure here today. In some cases, it's not viable to just turn off Bluetooth completely. Even making your phone “undiscoverable” isn't foolproof. A firewall or something similar that would be able to prevent unwanted connections and look for suspicious activity (like forged unpair requests) would be useful. Following the Bluetooth best practices will likely be sufficient for most people, but if you're extra-concerned, adding a little additional security wouldn't hurt. Bluetooth security packages often add very little overhead since they only really operate when there is Bluetooth traffic.

Read moreNavigate Down

View chapterPurchase book

Read full chapter

URL: https://www.sciencedirect.com/science/article/pii/B9781597492980000112

Using the Palm OS for Bluetooth Applications

In Bluetooth Application Developer's Guide, 2002

The Future of Palm OS Bluetooth Support

Bluetooth is, of course, a very young technology, and will certainly see a fair amount of evolution over the next few years. Similarly, Palm OS's Bluetooth support will likely continue to evolve alongside the technology. In the near future, Bluetooth devices will address the issues of Layer 3 (Network level) support in the Bluetooth communication protocol stack. New specifications will define a network layer for communications between all the members of a piconet (not just master to slave), as well as inter-piconet communication issues. Roaming and scatternets will also be addressed. The eventual goal is the creation of true ad-hoc networks, self-configuring network groupings that grow and change as the user's environment changes. For Bluetooth technology to succeed in the long run, it will also need to address issues like discovery time (currently far too slow) and maximum throughput (to align with 3G technologies).

As much as possible, these changes will be integrated seamlessly into the Palm OS Bluetooth Library. New editions of the library will expand the Palm OS's Bluetooth capabilities, without compromising existing applications.

What are two 2 types of wireless technologies used for communication?

The Different Types of Wireless Communication.
Satellite Communication. Satellite communication is a crucial form of wireless communication. ... .
Infrared Communication. ... .
Broadcast Radio. ... .
Microwave Communication. ... .
Wi-Fi. ... .
Mobile Communication Systems. ... .
Bluetooth Technology..

What are two wireless technologies used to connect peripheral devices?

Wi-Fi is designed to extend the traditional Internet model to mobile devices, replacing the last link of the network with a wireless access point. Bluetooth defines a local point-to-point mechanism that allows computer peripherals to communicate without a cable physically connecting the devices.

Which technology is used for wireless Internet connection?

Wireless LANs use spread spectrum technology to enable communication between multiple devices in a limited area. IEEE 802.11 defines a common flavor of open-standards wireless radio-wave technology known as Wi-Fi. Free-space optical communication uses visible or invisible light for communications.

Which two connection types are wireless?

The four types of wireless networks -- wireless LAN, wireless MAN, wireless PAN and wireless WAN -- differ when it comes to size, range and connectivity requirements.