AllBestEssays.com - All Best Essays, Term Papers and Book Report
Search

Wireless Technologies

Essay by   •  June 6, 2011  •  Research Paper  •  4,416 Words (18 Pages)  •  1,851 Views

Essay Preview: Wireless Technologies

Report this essay
Page 1 of 18

In today's fast paced society, people are on the move more than ever before, so mobility is a must. People have come to rely on cell phones and computers to handle some of their most important needs and to stay in contact with family and friends. This means that wireless technologies have become critical to allowing people to stay connected with their mobile devices and ensuring they get their information that they need at precisely the time when they need it. Some of the most important and prevalent wireless technologies today include Bluetooth, cell phones, and WiMAX.

Bluetooth is a wireless technology that was created in 1994 by Ericsson. In 1998, other companies such as Nokia, IBM, Intel and Toshiba followed Ericsson's lead and also developed Bluetooth technology. These five companies started the formation of Bluetooth Special Group (SIG) which opened up the standard for Bluetooth technology development. Bluetooth is a "short range, wire free, secure and international standardized wireless technology that provides wireless communications system between the Bluetooth enabled devices in a short ranged network". Furthermore, it creates short range wireless connections between mobile phones, laptops, handheld personal computers, and wireless communication devices. As a medium, Bluetooth uses low energy radio wave frequency that operates at 2.4 GHz bands with transmission capabilities of 1, 10 and 100 meters distance. Since Bluetooth can automatically detect and communicate with other Bluetooth devices, it does not depend on user input. The devices that are Bluetooth ready within an area, pico or personal area network (PAN) are formed to communicate with each other by synchronizing and integrating their frequency-hopping. Since Bluetooth devices are capable of creating multiple PANs, interference is very minimal. Bluetooth can also be used to transfer files from mobile phones or PDA devices to computers. RS transceiver, protocol stacks and base bands are typical parts of a Bluetooth device and the wireless extension for the Bluetooth device is provided by the Bluetooth headset.

Three different Bluetooth power classes are available. Class 1 Devices have 1mW power level with operating range of 0.1 to 10 meters in range. Class 2 Devices have 10mW power level and operating range of up to 10 meters. Finally, Class 3 Devices have power level of 100mW and up to 100 meters in range.

Furthermore, there also have been many Bluetooth standards released. The latest standard is the 4.0 version which was released in December 2009. This updated version includes the Bluetooth Low Energy which requires lower power consumption thus allowing the device to operate longer without recharging and the battery life is extended.

There are benefits associated with Bluetooth technology. Some of the benefits are it is wireless which means no connection cables are needed. Also, it is automatic. It requires no input from the user. Next it is inexpensive thus it doesn't cost much for the company to update the technology. Low energy is also a benefit. It uses less battery power and so the battery life is extended. Another benefit is Instant Personal Area Network (PAN) where multiple connections can be made. Finally, low interference is another benefit. Because of frequency hopping, Bluetooth devices avoid interference from other wireless devices.

Like many of the benefits mentioned above, there are also many vulnerabilities and security weaknesses that Bluetooth devices face. Some of the vulnerabilities and security weaknesses are: 1. Attempts for authentication is repeated. There should be a feature that limits the repeated authentication. 2. No user authentication is required. Since only the device authentication is required to use the device, a feature for user identification should be developed for better security. 3. Weak PINs are allowed. People tend to use short PINs which are usually figured out easily. 4. Link keys are stored improperly. An attacker can read or modify link keys if they are not stored properly. 5. End to end security is not provided. At intermediate points, data is decrypted because only individual links are authenticated and encrypted.

Bluetooth also encounters many threats. Some of the threats are: 1. Bluesnarfing-By exploiting a firmware flaw in a device, an attacker gains access to data stored in the Bluetooth device. 2. Bluejacking- Sending unsolicited messages to Bluetooth enabled mobile phones, PDAs and smartphones. It is similar email spams and phishing attacks. When the user responds to a bluejacking message with malicious content, harm is caused to the device. 3. Bluebugging- In order to gain access to the device and its commands, it exploits older devices with flaw firmware and uses its commands to access the data, send messages, eavesdrop and make phone calls. 4. Denial of Service (DOS) - these attacks can drain the battery of the device and can disable the usage of the interface. Thus providing security for Bluetooth devices from threats and risks are important to keep them safe.

Bluetooth security basics are authentication, confidentiality and authorization. Authentication involves the identification of the Bluetooth device and not the identification of the user. It is in the form of a challenge-response scheme. Devices are authenticated by the Bluetooth link key which is the secret key. Secrecy of the link key is a primary security for Bluetooth authentication. Confidentiality is preventing eavesdropping and allowing only authorized devices to view and access the data. Bluetooth has two encryption modes that provide confidentiality. Encryption Mode 2 uses encryption keys to encrypt traffic for individual addresses. However, broadcast traffic is not encrypted. Encryption Mode 3 uses an encryption key that is based on the master link key to encrypt all traffic. Authorization makes sure that in order to use a service, the Bluetooth device is authorized.

There are four Bluetooth Security modes. First is the Bluetooth Security Mode 1. This is a non-secure mode. There is no encryption or authentication functionality in this mode thus the device and its connections are open to attacks from hackers. Also, other Bluetooth enabled devices are not prevented from making connections. This mode is only supported up to Bluetooth 2.0+ EDR. Second is the Bluetooth Security Mode 2. A centralized security manager controls the devices and their access to other services. Authorization is used to determine whether a certain device is allowed to have access to a certain service. This security mode supports all Bluetooth devices except v2.1+EDR devices which with v2.0 + EDR or earlier devices can only support it for backward compatibility. Third is the Bluetooth Security Mode 3.

...

...

Download as:   txt (27.2 Kb)   pdf (267.5 Kb)   docx (19.6 Kb)  
Continue for 17 more pages »
Only available on AllBestEssays.com