SlideShare a Scribd company logo
A SEMINAR REPORT
ON
“BLUETOOTH NETWORK SECURITY”
Is submitted to
Jawaharlal Nehru Technological University, Anantapururam
In partial fulfillment of
The requirements for the award of the degree of
BACHELOR OF TECHNOLOGY
In
ELECTRONICS AND COMMUNICATION ENGINEERING
Submitted By
NAME: V.R.SREEKANTH RAO REG NO:149F1A0461
Under the Co-Ordination of
C. MURALI MOHAN M.Tech,Ph.D Dr. N.A.V.PRASAD M.Tech,Ph.D
Associate Professor, ECE Dept. Professor and HOD, ECE Dept.
DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING
SRI VENKATESWARA INSTITUTE OF TECHNOLGY
(Affiliated to J.N.T.UNIVERSITY, ANANTAPUR)
NH-44, HAMPAPURAM, ANANTAPURURAM - 515 722
2018
BLUETOOTH NETWORK SECURITY
SUBMITTED BY
V.R SREEKANTH RAO
149F1A0461
DEPT. OF ECE
SVIT
CONTENTS
o INTRODUCTION
o ABOUT BLUETOOTH
o BLUETOOTH NETWORKS
o BLUETOOTH ARCHITECTURE
o SECURITY ASPECTS IN BLUETOOTH
o ATTACKING TOOLS OR TRICKS
o ATTACKING SOFTWARE
o ADVANTAGES
o DISADVANTAGES
o APPLICATIONS
o REFERENCES
INTRODUCTION
o Wireless communications offer
organizations and users many benefits.
o Bluetooth is managed by the Bluetooth
Special Interest Group (SIG)
o Founded in year 1998.
ABOUT BLUETOOTH
o Bluetooth is a wireless LAN technology
Bluetooth specification is:
o The 802.11 WLAN standards.
o Using 2.4 GHz--2.4835 GHz
o Frequency-hopping spread-spectrum (FHSS) technology to
solve interference problems.
o Transmission speeds up to 1 Mbps.
Bluetooth Classes and Ranges
CLASS Range (in mts)
Class 1 ~100m
Class 2 ~10m
Class 3 ~1m
BLUETOOTH NETWORKS
Bluetooth devices can form three types of networks:
Point to Point Link
Piconet Network
Ad-hoc or Scatternet Network
BLUETOOTH ARCHITECTURE
SECURITY ASPECTS IN BLUETOOTH
The Bluetooth-system provide security at two level-
1)At Link layer
o Four different entities are used for maintaining
security at the link layer.
Entity Size
BD_ADDR 48 bits
Private user key, Authentication 128 bits
Private user key, encryption configurable length (Byte
wise)
8-128 bits
RAND 128 bits
2)At Application layer
ATTACKING TOOLS OR TRICKS
o Blue jacking
o OBEX Push
o Blue snarfing
o Hello Moto
o Blue bugging
o DOS (Denial of service) Attacks
o Long Distance Attacking (Blue Sniper)
o Blueprinting
ATTACKING SOFTWARE
For Discovering Bluetooth Devices
o Blue Scanner
o Blue Sniff
o BT Browser
o BT Crawler
FOR HACKING BLUETOOTH DEVICES:
o Blue Bugger
o CIHWB
o Blue diving
o Blue snarfer
o BT crack
o Blooover II
o Blue Test
o BT Audit
ADVANTAGES
o It is cheap.
o Easy to install.
o It makes connecting to different devices convenient .
o It is wireless.
o It is free to use if the device is installed with it.
DISADVANTAGES
o It can be hacked.
o If installed on a cell phone it is prone to receiving cell
phone viruses.
o It only allows short range communication between
devices.
o It can only connect two devices at once.
o It can lose connection in certain conditions.
APPLICATION
o Wireless communication between a mobile phone
and a hands free headset. This was one of the
earliest applications to become popular.
o Wireless communication with iOS and Android
device phones, tablets and portable wireless
speakers.
o Wireless communication with PC input and output
devices, the most common being
the mouse, keyboard and printer.
o Short-range transmission of health sensor data
from medical devices to mobile phone.
REFERENCES
o 1.Data Communication and Networking, 4th edition, Behrouz A
Forouzan.
o 2.http://trifinite.org
o 3.http://en.wikipedia.org/wiki/Bluetooth/
o 4.Wireless Network Security 802.11, Bluetooth and Handheld
Devices, National Institute of Standards and Technology, Technology
Administration, U.S. Department of Commerce.
o 5.BLUETOOTH SPECIFICATION Version 2.1 + EDR [vol 0] ,
www.Bluetooth.com
o 6.Andreas Becker, “Bluetooth Security and Hacks”, Ruhr-University
Bochum, 2007.
o 7.Essential Bluetooth hacking tools, http://www.security-
hacks.com/2007/05/25/essential bluetooth hacking-tools.
o 8.Marek Bialoglow, “Bluetooth Security Review”,
http://www.securityfocus.com/infocus/1830
Bluetooth Network security
Ad

More Related Content

What's hot (20)

Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
ROHIT SAGAR
 
BATTERY LESS PHONE
BATTERY LESS PHONE BATTERY LESS PHONE
BATTERY LESS PHONE
MuhammedAslam77
 
plastic solaar cell
plastic solaar cellplastic solaar cell
plastic solaar cell
Mahesh Badri
 
SMART DUST
SMART DUSTSMART DUST
SMART DUST
Khyravdhy Tannaya
 
Project smart notice board ppt
Project smart notice board pptProject smart notice board ppt
Project smart notice board ppt
Rahul Shaw
 
Final report obstacle avoiding roboat
Final report obstacle avoiding roboatFinal report obstacle avoiding roboat
Final report obstacle avoiding roboat
Shubham Thakur
 
Bluetooth ppt
Bluetooth pptBluetooth ppt
Bluetooth ppt
Kirti Kausik Kumar
 
Clockless chips
Clockless chipsClockless chips
Clockless chips
Saumya Ranjan Behura
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
Siya Agarwal
 
Wireless charging ppt
Wireless charging pptWireless charging ppt
Wireless charging ppt
Manjunath Kareppagoudr
 
Optical satellite communication
Optical satellite communicationOptical satellite communication
Optical satellite communication
Prashastha Babu
 
Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc Students
Arun Kumar
 
IBOC TECHNOLOGY
IBOC TECHNOLOGYIBOC TECHNOLOGY
IBOC TECHNOLOGY
Dj Tibi
 
CHILD SAFETY WEARABLE DEVICE
CHILD SAFETY WEARABLE DEVICECHILD SAFETY WEARABLE DEVICE
CHILD SAFETY WEARABLE DEVICE
SANTOSH KUMARI MALVE
 
smart helmet
smart helmetsmart helmet
smart helmet
Venkata Krishna
 
Polytronics
PolytronicsPolytronics
Polytronics
Ayesha Mubeen
 
Bluetooth Controlled Robot/Car
Bluetooth Controlled Robot/CarBluetooth Controlled Robot/Car
Bluetooth Controlled Robot/Car
Varun A M
 
Bluetooth based home automation using Arduino UNO
Bluetooth based home automation using Arduino UNOBluetooth based home automation using Arduino UNO
Bluetooth based home automation using Arduino UNO
parameshwar koneti
 
IoT based Smart board for Displaying and Forwarding notices using Raspberry Pi
IoT based Smart board for Displaying and Forwarding notices using Raspberry PiIoT based Smart board for Displaying and Forwarding notices using Raspberry Pi
IoT based Smart board for Displaying and Forwarding notices using Raspberry Pi
Sinthana Sambandam
 
Silent sound-technology ppt final
Silent sound-technology ppt finalSilent sound-technology ppt final
Silent sound-technology ppt final
Lohit Dalal
 
Bluetooth network-security-seminar-report
Bluetooth network-security-seminar-reportBluetooth network-security-seminar-report
Bluetooth network-security-seminar-report
ROHIT SAGAR
 
plastic solaar cell
plastic solaar cellplastic solaar cell
plastic solaar cell
Mahesh Badri
 
Project smart notice board ppt
Project smart notice board pptProject smart notice board ppt
Project smart notice board ppt
Rahul Shaw
 
Final report obstacle avoiding roboat
Final report obstacle avoiding roboatFinal report obstacle avoiding roboat
Final report obstacle avoiding roboat
Shubham Thakur
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
Siya Agarwal
 
Optical satellite communication
Optical satellite communicationOptical satellite communication
Optical satellite communication
Prashastha Babu
 
Latest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc StudentsLatest Seminar Topics for Engineering,MCA,MSc Students
Latest Seminar Topics for Engineering,MCA,MSc Students
Arun Kumar
 
IBOC TECHNOLOGY
IBOC TECHNOLOGYIBOC TECHNOLOGY
IBOC TECHNOLOGY
Dj Tibi
 
Bluetooth Controlled Robot/Car
Bluetooth Controlled Robot/CarBluetooth Controlled Robot/Car
Bluetooth Controlled Robot/Car
Varun A M
 
Bluetooth based home automation using Arduino UNO
Bluetooth based home automation using Arduino UNOBluetooth based home automation using Arduino UNO
Bluetooth based home automation using Arduino UNO
parameshwar koneti
 
IoT based Smart board for Displaying and Forwarding notices using Raspberry Pi
IoT based Smart board for Displaying and Forwarding notices using Raspberry PiIoT based Smart board for Displaying and Forwarding notices using Raspberry Pi
IoT based Smart board for Displaying and Forwarding notices using Raspberry Pi
Sinthana Sambandam
 
Silent sound-technology ppt final
Silent sound-technology ppt finalSilent sound-technology ppt final
Silent sound-technology ppt final
Lohit Dalal
 

Similar to Bluetooth Network security (20)

Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
Mohammad Shoeb Quraishi
 
Redtacton
RedtactonRedtacton
Redtacton
ravpha143
 
MD ARIF RAIHANThesis-Presentation.pptx
MD ARIF RAIHANThesis-Presentation.pptxMD ARIF RAIHANThesis-Presentation.pptx
MD ARIF RAIHANThesis-Presentation.pptx
ssuser480912
 
Arthi.pptx
Arthi.pptxArthi.pptx
Arthi.pptx
PALANIAPPANC2
 
Bluetooth
BluetoothBluetooth
Bluetooth
aimenriyadh
 
Bluetooth technology
Bluetooth technology Bluetooth technology
Bluetooth technology
Karun Kumar
 
Arduino Based Home Lighting Control by Android Phone
Arduino Based Home Lighting Control by Android PhoneArduino Based Home Lighting Control by Android Phone
Arduino Based Home Lighting Control by Android Phone
ijtsrd
 
Bluetooth technology_new.pptx
Bluetooth technology_new.pptxBluetooth technology_new.pptx
Bluetooth technology_new.pptx
SumitSabale4
 
Bluetooth
BluetoothBluetooth
Bluetooth
aimenriyadh
 
siddharth bt ppt.pptx
siddharth bt ppt.pptxsiddharth bt ppt.pptx
siddharth bt ppt.pptx
HindujaBairi
 
Improving compliance with bluetooth device detection
Improving compliance with bluetooth device detectionImproving compliance with bluetooth device detection
Improving compliance with bluetooth device detection
TELKOMNIKA JOURNAL
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
David Livingston J
 
Bluetooth
BluetoothBluetooth
Bluetooth
kajalsingh177
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
Sadhana28
 
Blue jacking
Blue jackingBlue jacking
Blue jacking
BindhuBhargaviTalasi
 
HOME AUTOMATION VIA BLUETOOTH Using Smart Phone
HOME AUTOMATION VIA BLUETOOTH Using Smart PhoneHOME AUTOMATION VIA BLUETOOTH Using Smart Phone
HOME AUTOMATION VIA BLUETOOTH Using Smart Phone
YogeshThakare38
 
blue-JACKING.pptx
blue-JACKING.pptxblue-JACKING.pptx
blue-JACKING.pptx
22R25A0507PONNALOKES
 
49175819-red-tacton report.ppt
49175819-red-tacton report.ppt49175819-red-tacton report.ppt
49175819-red-tacton report.ppt
AbhiAavu
 
Device Hacking
Device HackingDevice Hacking
Device Hacking
Damian T. Gordon
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
Serena Rinaldi Lambiase
 
MD ARIF RAIHANThesis-Presentation.pptx
MD ARIF RAIHANThesis-Presentation.pptxMD ARIF RAIHANThesis-Presentation.pptx
MD ARIF RAIHANThesis-Presentation.pptx
ssuser480912
 
Bluetooth technology
Bluetooth technology Bluetooth technology
Bluetooth technology
Karun Kumar
 
Arduino Based Home Lighting Control by Android Phone
Arduino Based Home Lighting Control by Android PhoneArduino Based Home Lighting Control by Android Phone
Arduino Based Home Lighting Control by Android Phone
ijtsrd
 
Bluetooth technology_new.pptx
Bluetooth technology_new.pptxBluetooth technology_new.pptx
Bluetooth technology_new.pptx
SumitSabale4
 
siddharth bt ppt.pptx
siddharth bt ppt.pptxsiddharth bt ppt.pptx
siddharth bt ppt.pptx
HindujaBairi
 
Improving compliance with bluetooth device detection
Improving compliance with bluetooth device detectionImproving compliance with bluetooth device detection
Improving compliance with bluetooth device detection
TELKOMNIKA JOURNAL
 
Introduction to Bluetooth technology
Introduction to Bluetooth technologyIntroduction to Bluetooth technology
Introduction to Bluetooth technology
David Livingston J
 
Bluejacking sadhana
Bluejacking sadhanaBluejacking sadhana
Bluejacking sadhana
Sadhana28
 
HOME AUTOMATION VIA BLUETOOTH Using Smart Phone
HOME AUTOMATION VIA BLUETOOTH Using Smart PhoneHOME AUTOMATION VIA BLUETOOTH Using Smart Phone
HOME AUTOMATION VIA BLUETOOTH Using Smart Phone
YogeshThakare38
 
49175819-red-tacton report.ppt
49175819-red-tacton report.ppt49175819-red-tacton report.ppt
49175819-red-tacton report.ppt
AbhiAavu
 
Ad

Bluetooth Network security

  • 1. A SEMINAR REPORT ON “BLUETOOTH NETWORK SECURITY” Is submitted to Jawaharlal Nehru Technological University, Anantapururam In partial fulfillment of The requirements for the award of the degree of BACHELOR OF TECHNOLOGY In ELECTRONICS AND COMMUNICATION ENGINEERING Submitted By NAME: V.R.SREEKANTH RAO REG NO:149F1A0461 Under the Co-Ordination of C. MURALI MOHAN M.Tech,Ph.D Dr. N.A.V.PRASAD M.Tech,Ph.D Associate Professor, ECE Dept. Professor and HOD, ECE Dept. DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING SRI VENKATESWARA INSTITUTE OF TECHNOLGY (Affiliated to J.N.T.UNIVERSITY, ANANTAPUR) NH-44, HAMPAPURAM, ANANTAPURURAM - 515 722 2018
  • 2. BLUETOOTH NETWORK SECURITY SUBMITTED BY V.R SREEKANTH RAO 149F1A0461 DEPT. OF ECE SVIT
  • 3. CONTENTS o INTRODUCTION o ABOUT BLUETOOTH o BLUETOOTH NETWORKS o BLUETOOTH ARCHITECTURE o SECURITY ASPECTS IN BLUETOOTH o ATTACKING TOOLS OR TRICKS o ATTACKING SOFTWARE o ADVANTAGES o DISADVANTAGES o APPLICATIONS o REFERENCES
  • 4. INTRODUCTION o Wireless communications offer organizations and users many benefits. o Bluetooth is managed by the Bluetooth Special Interest Group (SIG) o Founded in year 1998.
  • 5. ABOUT BLUETOOTH o Bluetooth is a wireless LAN technology Bluetooth specification is: o The 802.11 WLAN standards. o Using 2.4 GHz--2.4835 GHz o Frequency-hopping spread-spectrum (FHSS) technology to solve interference problems. o Transmission speeds up to 1 Mbps.
  • 6. Bluetooth Classes and Ranges CLASS Range (in mts) Class 1 ~100m Class 2 ~10m Class 3 ~1m
  • 7. BLUETOOTH NETWORKS Bluetooth devices can form three types of networks: Point to Point Link
  • 11. SECURITY ASPECTS IN BLUETOOTH The Bluetooth-system provide security at two level- 1)At Link layer o Four different entities are used for maintaining security at the link layer. Entity Size BD_ADDR 48 bits Private user key, Authentication 128 bits Private user key, encryption configurable length (Byte wise) 8-128 bits RAND 128 bits
  • 13. ATTACKING TOOLS OR TRICKS o Blue jacking o OBEX Push o Blue snarfing o Hello Moto o Blue bugging o DOS (Denial of service) Attacks o Long Distance Attacking (Blue Sniper) o Blueprinting
  • 14. ATTACKING SOFTWARE For Discovering Bluetooth Devices o Blue Scanner o Blue Sniff o BT Browser o BT Crawler FOR HACKING BLUETOOTH DEVICES: o Blue Bugger o CIHWB o Blue diving o Blue snarfer o BT crack o Blooover II o Blue Test o BT Audit
  • 15. ADVANTAGES o It is cheap. o Easy to install. o It makes connecting to different devices convenient . o It is wireless. o It is free to use if the device is installed with it.
  • 16. DISADVANTAGES o It can be hacked. o If installed on a cell phone it is prone to receiving cell phone viruses. o It only allows short range communication between devices. o It can only connect two devices at once. o It can lose connection in certain conditions.
  • 17. APPLICATION o Wireless communication between a mobile phone and a hands free headset. This was one of the earliest applications to become popular. o Wireless communication with iOS and Android device phones, tablets and portable wireless speakers. o Wireless communication with PC input and output devices, the most common being the mouse, keyboard and printer. o Short-range transmission of health sensor data from medical devices to mobile phone.
  • 18. REFERENCES o 1.Data Communication and Networking, 4th edition, Behrouz A Forouzan. o 2.http://trifinite.org o 3.http://en.wikipedia.org/wiki/Bluetooth/ o 4.Wireless Network Security 802.11, Bluetooth and Handheld Devices, National Institute of Standards and Technology, Technology Administration, U.S. Department of Commerce. o 5.BLUETOOTH SPECIFICATION Version 2.1 + EDR [vol 0] , www.Bluetooth.com o 6.Andreas Becker, “Bluetooth Security and Hacks”, Ruhr-University Bochum, 2007. o 7.Essential Bluetooth hacking tools, http://www.security- hacks.com/2007/05/25/essential bluetooth hacking-tools. o 8.Marek Bialoglow, “Bluetooth Security Review”, http://www.securityfocus.com/infocus/1830