Bluetooth Security Report

Bluetooth Security Report - Insecurities in Bluetooth...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
Insecurities in Bluetooth Wireless Technology [http://www.newegg.com] Bryan Farley Nolan Gilley Rithirong Thandee Electrical and Computer Engineering Department Virginia Tech 12/03/2006
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Insecurities in Wireless Bluetooth Technology Bryan Farley Nolan Gilley Rithirong Thandee Electrical and Computer Engineering Department Virginia Tech 12/03/2006 Summary Bluetooth is a new wireless technology that is capable of sending and receiving  data within a range of ten to fifteen meters.  It provides advantages over previous  technology by eliminating wires from our everyday life.  Because of Bluetooth’s cost  effectiveness, it is becoming an extremely popular technology showing up in all sorts of  new devices.  As with any wireless technology, there are a number of security and ethical  issues that must be addressed.  Hackers’ skills are increasing just as fast as technology is  improving and security is a top tier issue.  So far, security breaches that have been made  are problems that lie in the manufacturers’ implementation of the Bluetooth technology,  not problems that lie in Bluetooth itself.  Every day updates are being made to Bluetooth  and the future from a security standpoint is looking very strong.
Background image of page 2
Table of Contents Summary i Introduction 1 Basics of Bluetooth 1 Bluetooth Security 3 Security Levels and Modes 3 Security Breeches 4 Preventing Security Breeches and Hacking 6 User Awareness 6 Security Updates for Devices 6 Future Security Improvements 7 Conclusions 8 Appendix A: A List of Vulnerable Bluetooth Devices 9 References 10
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Introduction Bluetooth is a new technology that unites the computer and telecommunications.  It was named after Harald I Bluetooth. He was the King of Denmark from 904 to 980  AD, and was famous for uniting Denmark and Norway.  In 1994, Ericson Mobile started  researching for a way to construct a low power and low cost radio that could connect  mobile phones and various accessories.  In 1998, Ericson, Nokia, IBM, Toshiba and Intel  came together to form a Special Interest Group (SIG) to improve the emerging Bluetooth  technology[1].  Bluetooth is wireless technology very similar to Wi-Fi, however it costs much  less, uses far less power, and cannot transfer data as fast. Tables 1 and 2 show the data  range and the power output of different wireless technologies respectively.  Bluetooth  works in the frequency of 2.45 GHz which is in the international agreement for use of  Industrial, Scientific and Medical devices (ISM) [2]. Bluetooth sends a weak signal and  uses spread-spectrum frequency hopping, a randomly chosen frequency in the range 1 to  avoid interfering with other wireless devices. Since Bluetooth is a new technology, its security is still a large concern to 
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/19/2008 for the course ENGE 1024 taught by Professor Dcohanehi during the Fall '06 term at Virginia Tech.

Page1 / 15

Bluetooth Security Report - Insecurities in Bluetooth...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online