You are on page 1of 7

BLUETOOTH COMMUNICATIONS AND

NETWORKING
Bilal Ahmed, Safwan Hamza

ABSTRACT IEEE organization has recognized the


need for wireless cable replacement
The Bluetooth wireless technology was technology and started the
created to solve the problems created development of the 802.15 working
by the cables that were used to connect group. There is much regulatory and
the mobiles and similar devices. It standards work in the area of security,
replaces the cables with the high especially in wireless. The wireless LAN
frequency waves. This technology standard IEEE 802.11b provides a
allows the simple, low power radio mechanism for Authentication and
system to be integrated into the mobile encryption.
devices. Bluetooth creates an ad-hoc In this review paper we will try to
network that can communicate elaborate the Bluetooth architecture, its
between the devices very quickly and network topology, frame format and
securely. finally its security concerns.
Bluetooth is a low cost, low power, radio
frequency technology for short-range
communications. It can be used to replace the INTRODUCTION
cables connecting portable/fixed electronic Bluetooth is a wireless LAN technology that is
devices, build ad-hoc networks or provide designed to connect devices with different
data/voice access points. functionalities such as telephones, cameras,
The Bluetooth technology was printers, notebooks e.t.c.a Bluetooth LAN can
developed to be used within a unique even be connected to internet [2].
global environment that would not only
enable integration into the host devices Wireless world information about new generation
but would also allow the mobile device has been enhanced daily in radio frequencies
to travel easily from one country to technologies. This new generation of technologies
another. In addition, due to the covers all aspects of wireless communication i.e.
personal/confidential data contained on 3G technology is developed to provide high speed
the different types of client devices connectivity to WANs. WAN and LAN
(e.g., the mobile computer), the link technologies enable device connectivity to
formed between these devices needed infrastructure-based services, but short range
to be as secure as the cable it was personal wireless connecting technologies also
replacing.[1] used through which personal devices can
There are at least three varieties of communicate with each other without establishing
IEEE 802.11 standards. Today the any infrastructure. Bluetooth is also that type of
Bluetooth technology is the only wireless connecting technology.
specification for cable replacement.
1
The Bluetooth wireless technology serve as the
low cost, user friendly, air interface that will
replace the cables that people need to carry and
use to connect their personal devices. The primary
focus of the Bluetooth wireless technology is to
provide a flexible cable connector with
reconfigurable pin arrangements permitting
several personal devices to interconnect with each
other. another focus is to use this technology to
provide ad hoc network between several devices
so that they can communicate with each other and
can share data.[3]

The Standard originated with the formation of a


Bluetooth Special Interest Group (SIG) by IBM,
Intel, Nokia and Toshiba developed in 1998. By
2006,560 million Bluetooth devices has been The Radio Frequency Layer
Predicted by industry-analyst Ovum. ICD predicts
435 million Bluetooth-enabled mobile phones by The physical layer of Bluetooth that is
2005. [4] also called RF layer is composed of an
antenna with 0db power but this can be
extended to 20db for operational
requirements. The RF layer works
BLUETOOTH LAYERS within the limits of ISM band. The radio
ARCHITECTURE uses Frequency Hopping to spread the
energy across the ISM spectrum in 79
Bluetooth technology architecture has hops displaced by 1 MHz, starting at
two basic specifications, core 2.402 GHz and stopping at 2.480 GHz.
specifications and profile specifications. This link can communicate within the
Core specifications describe how range of 10cm to 10m.
Bluetooth technology works, while the Bluetooth hops 1600 times per second, which
later discusses how the devices that are means that each device changes its modulation
interoperating can use the core frequency 1600 times per second. A device uses a
specifications.[5] frequency for only 625 Ils (1/1600 s) before it
hops to another frequency; the dwell time is 625
As core specifications are directly
related with our topic, and it discusses Ils. Bluetooth uses 2.4GHz ISM band because it is
an unlicensed band, and available in most
that how Bluetooth network is possible.
So we discuss here core specifications. countries. At this frequency (=12.3cm), a very
For networking, we have to consider the small antenna is possible. And higher frequency
RF layer and the Baseband layer. band may cause high cost on RF.

FHSS vs. DSSS


In the 2.4GHz ISM band, the use of spread
spectrum is mandatory. Although DSSS can
achieve higher data rate (11Mbps for 802.11b
standard), FHSS has its advantage of low cost,
low power, better security. FHSS also handles
near-far problem better, since it will effectively
2
block out-of-band signals. Considering the The Bluetooth technology provides both
possible a point-to-point connection and a point-
an application of Bluetooth, FHSS is a better to-multipoint connection. In point-to-
solution. The hopping sequence is calculated multipoint connections, the channel is
using the master’s Bluetooth Device Address. It shared among several Bluetooth units.
hops to every 1MHz channel with equal In point-to-point connections, only two
probability. Its 1600hops/sec fast hopping rate units share the connection. Bluetooth
is enough to overcome slow fading in most indoor protocols assume that a small number
environment, which has Doppler spread of of units will participate in
0.1~6Hz. The RMS delay spread usually ranges communications at any given time.[7]
from 100ns to 10s [30]. A typical 0.25 s RMS
delay spread corresponds to 640KHz coherent
bandwidth. So different 1MHz channels will have Piconet
different radio characteristics, and the FHSS will
Effectively solve the multipath and fading A Bluetooth network is called a Piconet, or a
problem. For 1MHz channel, the 1Msps symbol small net. A Piconet can have up to eight stations,
rate is already fully exploiting the bandwidth. The one of which is called the primary the rest are
1MHz channel bandwidth was the requirement of called secondaries. All the secondary stations
FCC, but recent decision from FCC changed that synchronize their clocks and hopping sequence
to 5MHz. This will probably enable the future with the primary. Note that a Piconet can have
version protocol to get higher data rate. HomeRF only one primary station. The communication
is already taking advantage of this 5MHz channel between the primary and the secondary can be
to get 10Mbps throughput.[6] one-to-one or one-to-many. The primary is
the unit that initiates transmissions,
and the secondaries are the responding
The Bluetooth Baseband units. This type of Bluetooth network
The baseband layer of Bluetooth is the can have only one primary unit. Although
2nd layer from the and sometimes refers a Piconet can have a maximum of seven
to be the equivalent layer of MAC sub secondaries, an additional eight secondaries can
layer in LANs. The master and slave be in the
communicate with each other using time slots. Parked state. A secondary in a parked state is
Each time slot is same as dwell time, i.e. 625us. synchronized with the primary, but cannot take
During the time that one frequency is used, a part in communication until it is moved from the
sender sends a frame to a secondary, or a parked state. Because only eight stations can be
secondary sends a frame to the primary. the active in a Piconet, activating a station from the
communication is only between the primary and a parked state means that an active station must go
secondary; secondaries cannot communicate to the parked state.
directly with one another. Bluetooth radios are Symmetric in that
This layer uses a special form of TDMA, any Bluetooth radio can become a
called TDD-TDMA. It is a half-duplex primary or secondary radio, and the
communication in which the secondary and Piconet configuration is determined at
receiver send and receive data, but not at the same the time of formation. Typically, the
time (half duplex); however, the communication connecting radio will become the
for each direction uses different hops. [6] primary; however, a “master/slave
swap” function allows the roles to be
NETWORK ARCHITECTURE / reversed. (A device can only be a
master in one Piconet. [5]
TOPOLOGIES

3
Scatternet
Piconets can be combined to form what is called a
Scatternet. A secondary station in one Piconet can
be the primary in another Piconet. This station can
receive messages from the primary in the first
Piconet (as a secondary) and, acting as a primary,
deliver them to secondaries in the second Piconet. BLUETOOTH NETWORK
A station can be a member of two Piconets. If CONNECTIONS
several Piconets overlap a physical
area, and members of the various Bluetooth is a wireless technology that
Piconets communicate with each other, provides connectivity to the mobile
any unit in one Piconet can devices. Bluetooth connects devices in
communicate in a second Piconet as three ways. We discuss each way as a
long as it serves as master for only one category. These categories are
Piconet at a time. voice/data access points,
peripheral interconnects, and
Up to 10 piconets can work together With Personal Area Networking (PAN).
minimal impact on each other. The throughput
degradation in the presence of multiple piconets is Ad hoc networking is the major
given by difference between Bluetooth wireless
connectivity and the cellular radio
TH=(1-1/79)N-1 architecture. As Bluetooth network is an
So the overall throughput of the scatternet could ad hoc network, it establishes the
reach well above 10Mbps. The topology of connection on run time, and is always
scatternet will also effectively extend the available for use. It’s an example of
operation range when some units act as bridge. ALWAYS ON ALWAYS CONNECTED
Secondary in the same piconet cannot network. Its connections are made on
communicate with each other directly. If one per requirement bases, i.e. when
Secondary wants to talk to another, it can page someone need connectivity Bluetooth
that Secondary and set up a new piconet, or networks are available to serve. [1]
request to change its role from slave to master.
The Bluetooth network depends upon
Each Bluetooth unit has a unique 48-bit Bluetooth
Device Address; this address is derived from the radio connectivity between the peer
IEEE802 standard. devices; in this regard it does not
depend upon the Base stations and any
A single Bluetooth channel has about 1Mbps data terminals.
rate. It’s believed the future version will have a
10Mbps data rate to accommodate applications
like real time video. [8] Voice/Data Access Points
Voice /data access points connect a
computing device with mobile device
through a wireless but secure
4
connection. It allows the connectivity networks have capability to be formed
between mobiles phones that don’t quickly and become able to
have internet connections with the communicate and share information
personnel computers that have internet within the range of 10cm to 10m. This
connection. The mobile phone here is type of networking is refers to ad hoc
acting as an access point. networking. This is again an AOAC
Developments are being made to network which is also an on-demand
create a public data access point. The network, which is available to serve any
main purpose will be to provide internet time when any client wants to send or
connection to public, especially receive data. Another feature is the
passengers at airports, stations that security that this connection provides
carry their equipment in briefcases. The to the data that is being transferred,
main idea behind this development is of which has been discussed in detail. This
access points provided by the Bluetooth network also vanishes quickly save time
technology. These points will support and space.
higher data rates. These data points will
be connected to each other via faster
internet connection e.g. DSL.
SECURITY IMPLEMENTATION FOR
BLUETOOTH
Peripheral Interconnects Bluetooth technology provides three modes of
This category of Bluetooth network security.
provides inter-connectivity between 1. Security mode 1 (non-secure). A
different devices with different device does not initiate any
functions. security procedure such as
For example, keyboard, mouse, encryption or authentication
headsets can be connected to their 2. Security mode 2 (service-level
parent devices such as computers enforcement security). This mode
without any cable connections. These allows different and flexible
wireless peripheral devices are of low access policies for applications,
cost because of less cable connections. and is used especially for running
Moreover all peripheral devices of any applications with different
office can be connected to a common security
point that connects the computing 3. Security mode 3 (link-level
devices of all office.[1] enforced security).a device allows
An other aspect of this type of only authenticated connections.in
connection is used in the field of other words it initiate security
security; it can connect the sensors procedures.
with the computing device and provide
time to time update to central There are three security attributes of Bluetooth
computer. technology.
• Authorization

• Authentication
Personal Area Networking/ Ad
hoc networking • Encryption
This type of networking creates
immediate networks on run time. These

5
We can achieve Authentication using a Bluetooth network contains 8 devices among
challenge response scheme using which one is primary while others are
symmetric link keys. If the devices do secondary.bluetooth network ensures a high
not share a link key, it is created secure communication between its peer devices,
through a process called “pairing” and because it use FHSS that hopes at 79 channel and
it is based on a shared secret also provide near and far effects.
association, such as a PIN code. If a Bluetooth networks could be used in any of three
device does not have a mechanism to categories depending upon requirements, access
enter a PIN, a restricted form link key, points, peripheral connections,PAN,among them
called a unit key, is generated based on PAN or adhoc network is widely used
the device’s address and random this paper covered many aspects of Bluetooth
number. Encryption can only be technology i.e. Bluetooth network architecture,
activated after authentication.[9] bluetooth layer architecture, bluetooth connection
SPREAD SPECTRUM types and security implementations.
Bluetooth use spread spectrum and
operates at 2.4GHz spectrum. Spread REFERNCES
spectrum was initially developed by [1] James Kardach, Bluetooth Architecture
the US military to send unbreakable Overview, Mobile Computing Group, Intel
codes that were either hard to detect or Corporation. Intel Technology Journal Q2, 2000
hard to jam. there systems were [2] Chatschik Bisdikian, an Overview of the
assumes to be very secure because Bluetooth Wireless Technology, IBM Corporation,
they used spread spectrum IEEE Communications Magazine December 2001
technology but when the spreading [3] Behrouz A. Forouzan, Data Communications
sequence is known to everyone, there and Networking, the McGraw-Hill Companies,
is very little security gained from Inc
spread spectrum.[9] pp. 434-435.
[4] Anthony C Davies, An overview of Bluetooth
Wireless Technology and some competing LAN
Impact on ease of use Standards,
Encryption is optional for security. it is School of Computing and Information Systems,
because we also take into account the Kingston University Kingston-upon-Thames,
issue of ease in using such security Surrey, England, KTl 2EE.
[5] Hongfeng Wang, Overview of Bluetooth
applications. sometimes we don’t
Technology, Dept. of Electrical Engineering State
require encryption, so we don’t use it
College, PA16802, July 3, 2001
but it can be used where required. [9]
[6] Behrouz A. Forouzan, Data Communications
Complexity increases with and Networking, the McGraw-Hill Companies,
increasing level of security. if user Inc
want to get security , he should pp. 435-437
have some knowledge about [7] Diane McMichael Gilster, Bluetooth End to
security mechanism, otherwise it is End, Published by: Wiley Date Published: March
not possible for him to access this 2002
application. ISBN: 0764548875, pp 9-11.
[8] Kristoffer Fleming, Robert J. Hunter,
CONCLUSION Jon Inouye, Jeffrey Schiffer, Enabling
Always On, Always Connected (AOAC)
Bluetooth technology is a wireless communication Computing with Bluetooth Technology.
technology whose network range is from 10cm to Intel Technology Journal Q2, 2000
10m.

6
[9] Sultan Weatherspoon,Overview of
IEEE 802.11b Security, Network
Communications Group, Intel
Corporation.

You might also like