bluetooth 第七組 王文道. outline what is “bluetooth” characteristic security comparison...
TRANSCRIPT
![Page 1: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/1.jpg)
BLUETOOTH
第七組 王文道
![Page 2: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/2.jpg)
Outline
What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion
![Page 3: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/3.jpg)
Wireless World
IEEE 802.1X Home RF GSM 、 GPRS 、 3G ZigBee IrDA Bluetooth
![Page 4: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/4.jpg)
![Page 5: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/5.jpg)
About Bluetooth……
WhereSIG ,founded in September 1998IBM, Intel, Ericsson, Nokia, Microsoft…… WhyDanish King - Harald Bluetooth WhatShort range (10 meters)Frequency-hopping radio link
![Page 6: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/6.jpg)
Outline
What is “Bluetooth” Characteristic
![Page 7: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/7.jpg)
Features
2.4GHz
Range : 0.1~100 meters Low power
![Page 8: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/8.jpg)
Features
GFSK (Gaussian Frequency Shift Key)
TDMA (Time Division Multiple Access)
FHSS (Frequency Hopping Spread Spectrum)
![Page 9: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/9.jpg)
FHSS
79 (23)channels Each one is 1MHz Hopping 1600/s
![Page 10: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/10.jpg)
Features
Max Bandwidth: 1Mb/s Average Rate: 720kb/s
1 Master connect to 7 Active Mode Slave ( or 255 Standby Mode ones ) to from a Piconet
Extension : Piconet -> Scatternet
![Page 11: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/11.jpg)
Topology
Piconet Scatternet
![Page 12: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/12.jpg)
![Page 13: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/13.jpg)
States
Standby
Inquiry Page
Connected
![Page 14: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/14.jpg)
Modes
Fastest SlowestResponsiveness
Highest LowestPower Consumption
Active Sniff/Hold Park
![Page 15: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/15.jpg)
Transport Protocol
![Page 16: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/16.jpg)
Outline
Characteristic Security
![Page 17: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/17.jpg)
Security
Frequency hopping
Stream cipher EO
![Page 18: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/18.jpg)
Security
Mode1: no security. 應用於不重要的資料 Mode2: service level-enforced security.富有彈性 , 建立連線後才根據應用的不同來決定安全性的高低 .
Mode3: link level-enforced security. 在建連結時就會啟用安全模式 , 如果沒有通過則連結不會被建立 .
![Page 19: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/19.jpg)
Outline
Security Comparison
![Page 20: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/20.jpg)
Bluetooth V.S IrDA
Convenience
Radio wave V.S Infrared light Range
0.1-100 meters V.S 1 meter Data rate
1 Mbps V.S 4 Mbps
![Page 21: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/21.jpg)
![Page 22: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/22.jpg)
Bluetooth V.S IrDA
Power
100 mW V.S 10 mW Safety
Price
$5.00 V.S <$1.00
![Page 23: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/23.jpg)
Outline
Comparison Application/ Conclusion
![Page 24: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/24.jpg)
Bluetooth Products
Mobile Phones
![Page 25: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/25.jpg)
Bluetooth Products
Computer Equipment
![Page 26: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/26.jpg)
Bluetooth Products
Home Environment
![Page 27: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/27.jpg)
Bluetooth Products
Automotive
![Page 28: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/28.jpg)
Bluetooth Products
Headset
![Page 29: BLUETOOTH 第七組 王文道. Outline What is “Bluetooth” Characteristic Security Comparison Application/ Conclusion](https://reader035.vdocuments.mx/reader035/viewer/2022062217/56649f0b5503460f94c1e9f9/html5/thumbnails/29.jpg)
THE END