100 likes | 223 Views
Bluetooth Kirthika Parmeswaran Telcordia Technologies OOPSLA’2000. Bluetooth http://bluetooth.com. Short range, high speed LAN protocol (1M – 2Mbit/s) Encompass a standard communications interface and a low-cost computer chip
E N D
BluetoothKirthika ParmeswaranTelcordia TechnologiesOOPSLA’2000
Bluetooth http://bluetooth.com • Short range, high speed LAN protocol (1M – 2Mbit/s) • Encompass a standard communications interface and a low-cost computer chip • Combines the DECT (Digital European Cordless Telephone) and iRDA (infraRed Data Association) technologies • Open specification • Enables users to connect their mobile devices via wireless short-range radio links unimpeded by line-of-sight restrictions • Can be used as a WAP bearer
Bluetooth Architecture LMP: Link Management Protocol L2CAP: Logical Link Control And Adaptation Protocol SDP: Service Discovery Protocol TCS BIN: Telephony Control Protocol – Binary RFCOMM: emulates RS 232 , cable replacement protocol OBEX: Object Exchange Protocol
Complementary Capabilities to Jini™ • Service Discovery Layer using the Service Discovery Protocol (SDP) • SDP can be used to: - search for services by service class or attributes - service browsing • Security levels for devices and services • device trust levels <trusted device, untrusted device> • service levels <authentication + authorization, authentication only, open to all> • default security level for legacy applications • Limitations in the security: device level, access control only at set-up
Usage Models • Each usage model has a profile defined, e.g • generic access profile (GAP) • the serial port profile • the service discovery application profile • generic object exchange profile • Usage models commonly used • File Transfer • Internet Bridge • LAN access • Three-in-one phone • Ultimate Headset
Conclusion • Bluetooth can be used as an underlying protocol to Jini(see also Sun white paper on Jini™ Technology and Emerging Network Technologies) • Bluetooth could serve as an area of pattern mining for ad hoc networking
Bluetooth Security Architecture • Security levels for devices and services • (1) device trust levels <trusted device, untrusted device> • (2) service levels <authentication + authorization, • authentication only, • open to all> • (3) Default security level for legacy applications • Limitations • (1) Legacy application need a “adapter application” for security • (2) Only device is authenticated not user • (3) No mechanism defined to preset authorization per service • (4) Access control only at connection set-up time • (5) unidirectional traffic not possible after access check • (6) For “end-to-end” security higher level services required
Security built over Bluetooth • Security Manager - stores security related information on services and devices - performs access checks - helps to set up trusted relationships at the device level - initiates pairing and query PIN entry by the user - checks whether a service does not permit connectionless data packets when needed
Usage Models • Each usage model has a profile defined, • e.g generic access profile (GAP), the serial port profile, • the service discovery application profile (SDAP), • and the generic object exchange profile (GOEP) • Usage models commonly used include File Transfer, Internet Bridge, • LAN access, Three-in-one phone, Ultimate Headset
Protocols in the Bluetooth Architecture • The Specification also defines a Host Controller Interface (HCI), which provides a command interface to the baseband controller, link manager, and access to hardware status and control registers. • It can be positioned above/below L2CAP