SlideShare una empresa de Scribd logo
1 de 25
Descargar para leer sin conexión
Carwhisperer
Bluetooth Attack
What is Bluetooth??
• Bluetooth is “A specification for short-range radio
  links between mobile phones, mobile computers,
  digital cameras, and other portable devices.”
• Enables users to establish ad hoc networks
  supporting voice and data communications
History



• It has been called after Harald Blatand (Harald
  bluetooth), the king of Denmark.
• The Bluetooth wireless technology was invented in
  1994 by Ericsson
• In September 1998, the Bluetooth Special Interest
  Group (SIG) was founded with the objective of
  developing the Bluetooth wireless technology
Bluetooth Basics

• Bluetooth operates in the licensed-free ISM band
  between 2.4 and 2.48 GHz.
• For Prevention of interference with other devices working
  within ISM, Bluetooth make use of a technique called
  frequency hopping.
• It takes 1600 hops/sec
• It has 79 base band frequencies
• Bluetooth is a connection oriented service.
Bluetooth Basics(Continued)

• In order to connect two Bluetooth devices, one of them,
  normally the device initiating the connection, elevates to
  the master, leaving the second device as a slave.
• Piconet
• Scatternet
• ACL (Asynchronous connection-oriented) and SCO
  (Synchronous connection-less)
• Data rates up to 3 Mb/s
• Typical communication range is 10 to100 meters
Bluetooth Topology (ACL link)
Bluetooth Topology (SCO/eSCO link)
Master-Slave Architecture




• In Bluetooth, connections with up to seven devices,
  which form piconet are possible, where communication is
  led by the master device.
Bluetooth Services

• Bluetooth makes use of a protocol stack, which makes it
  simple to separate application logic from physical data
  connections.

• The protocol architecture of Bluetooth allows for straight
  forward implementation of existing network protocols
  like HTTP, FTP, etc.
Bluetooth Radio & Baseband
• Bluetooth Radio work as a digital signal processing
  component of the system
• Bluetooth device transmit data, which is made up of bits
  (ones and zeros), over a radio frequency
• Baseband processes the signal received and transmitted
  by Radio
• Controls links, packets, error and flow
LMP & HCI
• LMP manages link setup, authentication, link
  configuration and other low level protocols
• Connection establishment
• HCI provides command interface to the baseband
  controller and link manager
• Exists across three sections, the host, transport layer and
  the host controller
L2CAP & RFCOMM
• L2CAP provides connection-oriented and connection-
  less data services to upper layer protocols
• Permits protocols and applications to transmit and
  receive data packets up to 64 kilobytes in length
• RFCOMM protocol supports 60 simultaneous connection
  between two Bluetooth devices
• The number of connections that can be used
  simultaneously in a bluetooth device is implementation
  specific, meaning what profile is being used
SDP-Service Discovery Protocol

• Bluetooth is a technology, which is deployed in a
  dynamical environment. Devices may get out of range or
  even switched on, while new devices might become
  activated.

• In order to detect services, provided by other devices, a
  protocol, which detects services makes sense. In
  Bluetooth, the Service Discovery Protocol is responsible
  for keeping track of services, provided within a device’s
  operating range
TCS - Telephony Control Protocol

• The Telephony Control Protocol provides functionality to
  control telephony applications and makes use of L2CAP
  connections.
OBEX - Object Exchange Protocol

• The Object Exchange Protocol (OBEX) provides services
  for the exchange of binary data objects. To initiate an
  OBEX session, an optional OBEX authentication is
  possible.



• Therefore, a limited set of commands like PUT, GET or
  ABORT exist for easy file transfers, comparable to HTTP.
Bluetooth Profiles

• In Bluetooth, provided services are composed to a
  Bluetooth Profile. Bluetooth devices communicate via the
  profiles, that act as ”interfaces”.

• For further consideration, two Bluetooth profiles are
  especially interesting, concerning BlueSnarfing and
  BlueBugging attacks:
   1. OBEX Object Push Profile (OPP).
   2. Synchronisation Profile (SYNCH).
OBEX Object Push Profile (OPP)

• The Object Push Profile (OPP) provides basic functions
  for exchange of binary objects, mainly used for vCards in
  Bluetooth.

• vCard is a file format standard for electronic business
  cards.

• Since vCards are not worth being especially protected, no
  authorization procedure is performed before OPP
  transactions. Supported OBEX commands are connect,
  disconnect, put , get and abort.
Synchronization Profile (SYNCH)

• The Synchronization Profile (SYNCH) provides functions
  for exchange of Personal Information Manager (PIM)
  data and was adopted from the IrDA infrared
  specification.



• In Bluetooth, especially private data, like the address
  book, calendar, etc. is sent using the SYNCH profile.
Overview On Bluetooth Security

• Security within Bluetooth itself covers three major
  areas:
      – Authentication
      – Authorization
      – Encryption

• Security levels:
      – Silent
      – Private
      – Public
Thank You !!

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

How MQTT work ?
How MQTT work ?How MQTT work ?
How MQTT work ?
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Ethernet
EthernetEthernet
Ethernet
 
DOM-based XSS
DOM-based XSSDOM-based XSS
DOM-based XSS
 
3. CPU virtualization and scheduling
3. CPU virtualization and scheduling3. CPU virtualization and scheduling
3. CPU virtualization and scheduling
 
Mobile Cloud Computing
Mobile Cloud ComputingMobile Cloud Computing
Mobile Cloud Computing
 
Ethernet
EthernetEthernet
Ethernet
 
Kubernetes Native Infrastructure and CoreOS Operator Framework for 5G Edge Cl...
Kubernetes Native Infrastructure and CoreOS Operator Framework for 5G Edge Cl...Kubernetes Native Infrastructure and CoreOS Operator Framework for 5G Edge Cl...
Kubernetes Native Infrastructure and CoreOS Operator Framework for 5G Edge Cl...
 
An Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGYAn Introduction to BLUETOOTH TECHNOLOGY
An Introduction to BLUETOOTH TECHNOLOGY
 
Collaborating In The Cloud - updated
Collaborating In The Cloud - updatedCollaborating In The Cloud - updated
Collaborating In The Cloud - updated
 
MQTT
MQTTMQTT
MQTT
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
MQTT Introduction
MQTT IntroductionMQTT Introduction
MQTT Introduction
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
5 G Wireless Technology
5 G Wireless Technology5 G Wireless Technology
5 G Wireless Technology
 
Software Defined Networking (SDN)
Software Defined Networking (SDN)Software Defined Networking (SDN)
Software Defined Networking (SDN)
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Network
NetworkNetwork
Network
 
Containerized Cloud Computing - Redhat
Containerized Cloud Computing - RedhatContainerized Cloud Computing - Redhat
Containerized Cloud Computing - Redhat
 

Destacado

Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
h_marvin
 

Destacado (10)

Hijacking bluetooth headsets
Hijacking bluetooth headsetsHijacking bluetooth headsets
Hijacking bluetooth headsets
 
Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7Bluetooth and profiles on WEC7
Bluetooth and profiles on WEC7
 
Bluetooth Vulnerabilities
Bluetooth VulnerabilitiesBluetooth Vulnerabilities
Bluetooth Vulnerabilities
 
About BLE server profile
About BLE server profile About BLE server profile
About BLE server profile
 
Ble overview and_implementation
Ble overview and_implementationBle overview and_implementation
Ble overview and_implementation
 
Attacking and Crashing IoT Devices via Bluetooth LE protocol
Attacking and Crashing IoT Devices via Bluetooth LE protocolAttacking and Crashing IoT Devices via Bluetooth LE protocol
Attacking and Crashing IoT Devices via Bluetooth LE protocol
 
Bluetooth Secure Simple Pairing Using NFC Part 1
Bluetooth Secure Simple Pairing Using NFC Part 1 Bluetooth Secure Simple Pairing Using NFC Part 1
Bluetooth Secure Simple Pairing Using NFC Part 1
 
Bluetooth Security
Bluetooth SecurityBluetooth Security
Bluetooth Security
 
Bluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case StudyBluetooth Low Energy - A Case Study
Bluetooth Low Energy - A Case Study
 
Bluetooth Secure Simple Pairing Using NFC Part 2
Bluetooth Secure Simple Pairing Using NFC Part 2Bluetooth Secure Simple Pairing Using NFC Part 2
Bluetooth Secure Simple Pairing Using NFC Part 2
 

Similar a Carwhisperer Bluetooth Attack

Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
Ayesha Saeed
 
SEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth HotspotSEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth Hotspot
Kamonasish Hore
 
Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetooth
Sonali Parab
 
Protocols in Bluetooth
Protocols in BluetoothProtocols in Bluetooth
Protocols in Bluetooth
Sonali Parab
 
Introduction to bluetooth
Introduction to bluetoothIntroduction to bluetooth
Introduction to bluetooth
vish0110
 

Similar a Carwhisperer Bluetooth Attack (20)

Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
 
Bluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX TechnologiesBluetooth, RFID and WiMAX Technologies
Bluetooth, RFID and WiMAX Technologies
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
 
Wireless personal area networks(PAN)
Wireless personal area networks(PAN)Wireless personal area networks(PAN)
Wireless personal area networks(PAN)
 
SEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth HotspotSEMINAR ON Bluetooth Hotspot
SEMINAR ON Bluetooth Hotspot
 
Bluetooth Technology & Security
Bluetooth Technology & SecurityBluetooth Technology & Security
Bluetooth Technology & Security
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
BluetoothSecurity.ppt
BluetoothSecurity.pptBluetoothSecurity.ppt
BluetoothSecurity.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
bluetooth-security
bluetooth-securitybluetooth-security
bluetooth-security
 
Protols used in bluetooth
Protols used in bluetoothProtols used in bluetooth
Protols used in bluetooth
 
Bluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan SevindikBluetooth Technology By Volkan Sevindik
Bluetooth Technology By Volkan Sevindik
 
Protocols in Bluetooth
Protocols in BluetoothProtocols in Bluetooth
Protocols in Bluetooth
 
Bluethooth Protocol stack/layers
Bluethooth Protocol stack/layersBluethooth Protocol stack/layers
Bluethooth Protocol stack/layers
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdfSYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 2 short range .pdf
 
Introduction to bluetooth
Introduction to bluetoothIntroduction to bluetooth
Introduction to bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 

Más de n|u - The Open Security Community

Más de n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Último

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

Carwhisperer Bluetooth Attack

  • 2. What is Bluetooth?? • Bluetooth is “A specification for short-range radio links between mobile phones, mobile computers, digital cameras, and other portable devices.” • Enables users to establish ad hoc networks supporting voice and data communications
  • 3. History • It has been called after Harald Blatand (Harald bluetooth), the king of Denmark. • The Bluetooth wireless technology was invented in 1994 by Ericsson • In September 1998, the Bluetooth Special Interest Group (SIG) was founded with the objective of developing the Bluetooth wireless technology
  • 4. Bluetooth Basics • Bluetooth operates in the licensed-free ISM band between 2.4 and 2.48 GHz. • For Prevention of interference with other devices working within ISM, Bluetooth make use of a technique called frequency hopping. • It takes 1600 hops/sec • It has 79 base band frequencies • Bluetooth is a connection oriented service.
  • 5. Bluetooth Basics(Continued) • In order to connect two Bluetooth devices, one of them, normally the device initiating the connection, elevates to the master, leaving the second device as a slave. • Piconet • Scatternet • ACL (Asynchronous connection-oriented) and SCO (Synchronous connection-less) • Data rates up to 3 Mb/s • Typical communication range is 10 to100 meters
  • 8. Master-Slave Architecture • In Bluetooth, connections with up to seven devices, which form piconet are possible, where communication is led by the master device.
  • 9. Bluetooth Services • Bluetooth makes use of a protocol stack, which makes it simple to separate application logic from physical data connections. • The protocol architecture of Bluetooth allows for straight forward implementation of existing network protocols like HTTP, FTP, etc.
  • 10.
  • 11. Bluetooth Radio & Baseband • Bluetooth Radio work as a digital signal processing component of the system • Bluetooth device transmit data, which is made up of bits (ones and zeros), over a radio frequency • Baseband processes the signal received and transmitted by Radio • Controls links, packets, error and flow
  • 12. LMP & HCI • LMP manages link setup, authentication, link configuration and other low level protocols • Connection establishment • HCI provides command interface to the baseband controller and link manager • Exists across three sections, the host, transport layer and the host controller
  • 13. L2CAP & RFCOMM • L2CAP provides connection-oriented and connection- less data services to upper layer protocols • Permits protocols and applications to transmit and receive data packets up to 64 kilobytes in length • RFCOMM protocol supports 60 simultaneous connection between two Bluetooth devices • The number of connections that can be used simultaneously in a bluetooth device is implementation specific, meaning what profile is being used
  • 14. SDP-Service Discovery Protocol • Bluetooth is a technology, which is deployed in a dynamical environment. Devices may get out of range or even switched on, while new devices might become activated. • In order to detect services, provided by other devices, a protocol, which detects services makes sense. In Bluetooth, the Service Discovery Protocol is responsible for keeping track of services, provided within a device’s operating range
  • 15. TCS - Telephony Control Protocol • The Telephony Control Protocol provides functionality to control telephony applications and makes use of L2CAP connections.
  • 16. OBEX - Object Exchange Protocol • The Object Exchange Protocol (OBEX) provides services for the exchange of binary data objects. To initiate an OBEX session, an optional OBEX authentication is possible. • Therefore, a limited set of commands like PUT, GET or ABORT exist for easy file transfers, comparable to HTTP.
  • 17. Bluetooth Profiles • In Bluetooth, provided services are composed to a Bluetooth Profile. Bluetooth devices communicate via the profiles, that act as ”interfaces”. • For further consideration, two Bluetooth profiles are especially interesting, concerning BlueSnarfing and BlueBugging attacks: 1. OBEX Object Push Profile (OPP). 2. Synchronisation Profile (SYNCH).
  • 18. OBEX Object Push Profile (OPP) • The Object Push Profile (OPP) provides basic functions for exchange of binary objects, mainly used for vCards in Bluetooth. • vCard is a file format standard for electronic business cards. • Since vCards are not worth being especially protected, no authorization procedure is performed before OPP transactions. Supported OBEX commands are connect, disconnect, put , get and abort.
  • 19. Synchronization Profile (SYNCH) • The Synchronization Profile (SYNCH) provides functions for exchange of Personal Information Manager (PIM) data and was adopted from the IrDA infrared specification. • In Bluetooth, especially private data, like the address book, calendar, etc. is sent using the SYNCH profile.
  • 20. Overview On Bluetooth Security • Security within Bluetooth itself covers three major areas: – Authentication – Authorization – Encryption • Security levels: – Silent – Private – Public
  • 21.
  • 22.
  • 23.
  • 24.