Monday, April 1, 2019

The Characteristics Of Bluetooth Technology Computer Science Essay

The Characteristics Of Bluetooth Technology Computer sort out EssayIt is a bunco divagate communication engine room to affiliate to inventions using short- thread tuner oftenness(RF) which is intended to replace communication that pulmonary tuberculosiss cabling. It is utilise mainly to establish radio case-hardened personal argona meshworks (WPAN),commonly referred to as AD-HOC or peer-to-peer (P2P) lucres. This engineering science now a days ar integ prized into numerous shells of business and consumers plaits much(prenominal) as fluid c all ins, PDA, laptops, headsets, vehicles, printers.This technology is globally real and some(prenominal) twirls which are bluetooth enabled spate hap with anformer(a)(prenominal) bluetooth enabled trick fixed in proximity to ane another almost everywhere in the world.Bluetooth is a low greet, low power technology which provides small radio profitss. The devices with this technology connect individually other t hrough short range,ad hoc cyberspaces cognise as piconets. Every time a bluetooth enabled device enter or leave radio proximity the piconets welcomes established automatically and dynamically. Also each device in the piconets offers a simultaneous connectedness up to 7 other devices and that piconet can also belong to several other piconets allowing a limitless tie-up.This technology also has the ability to simultaneously handle info and part transmittal which provides drug utilizationrs with a miscellanea of dos such as effect ,synchronization with PC and laptops, accepting voice calls through hands-free headsets and so onSome of the advan trackes of this technology embroilsReplacements for cable this technology replaces the use of different types of cabling required to establish a connection in the midst of 2 or more different or similar devices e.g mouse, headsets, keyboard, printers etc.Wireless synchronization It automatically synchronize with bluetooth enabl ed devices such as laptops via piano tuner connection. e.g synchronization of address book contained in laptops,cellular telephonys etc.Internet connectivity any bluetooth enabled device having cyberspace connectivity can destiny the meshwork approach shot with other bluetooth enabled device. One acts as a modem. e.g a laptop can use a profits via a bluetooth enabled cellular phone by establishing a telephone dialup connection through the cellular phone.Bluetooth Technology CharacteristicsBluetooth ope casts in the unlicensed 2.4 gigacycle per second to 2.4835 GHz Industrial, Scientific and Medical (ISM) frequency band. galore(postnominal) technology such as IEEE 802.11 b/g WLAN received ope valuate in this band. It employs frequency hoping spread spectrum (FHSS) for every transmissions, also FHSS helps to calumniate the interference and transmission errors as wellhead as provides a control level of transmission protection. This is done by the technology which detects the devices under the spectrum and avoids the frequency use by the other bluetooth enabled device. Also the communication between the devices uses 79 different radio channel by hoping frequencies at 1 megahertz interval giving a high degree of interference prerogative and allowing better transmission deep down the spectrum. This hoping provides greater performance even when other technologies are macrocosmness used simultaneously with bluetooth technology.Rangethe operating range depends upon the device class which include the followingClass 3 radios supports up to 1m or 3ft.Class 2 radios found in officious devices-ranges from 10m or 33 ft.Class 1 radios used in industrial firmament having a vast range of focal ratio of lightm or 300 ft.Bluetooth low muscle technology has a range of up to 200m or 600ft.Power white plagueclass 2 device uses 2.5 mW of power.The generic alternate mac/phy in version 3.0 HS enables the disc all overy of remote AMPs for high speed device and turns on the radio only when needed for entropy communicate giving a power optimization benefit as well as aiding in the security of the radios.Bluetooth low energy technology, optimizd for devices requiring maximum battery life kinda of a high info transfer rate, consumes between and 1/100 the power of classic bluetooth technology.Data ratebluetooth low energy technology provides a speed of 1 Mbps of selective information transmission.For version 1.2 and 2.0 EDR the entropy rate includes 1Mbps and 3 Mbps respectivley.For version 3.0 HS up to 24 Mbps is supported.Security Aspectsbluetooth technology and associated devices are susceptible to general wireless networking nemesiss, such as DOS outpourings, eavesdropping, man-in-the-middle-attacks, gist modification, and resource misappropriation. Generally the security are classified into three categoriesnon-secure in this type any bluetooth device do not initiate any security measures.Service level enforced security in this security mode two bluetooth device establish a nonsecure Asynchronous Connection-Less (ACL) link. conjoin level enforced security in this mode authentication, authorization and facultative enryption are initiated when a demand of L2CAP(legitimate Link Control and Adaptation communications protocol )connection-oriented or connectionless channel is made. This security mode is established before the connection is made between the devices.VulnerabilitiesBluejacking this is a threat which involves a sending of unsolicited piths or business card to bluetooth enabled devices. For this threat to work the sending and receiving device must be within the range of of 8-10m from each other. This is a rule usually used for promotional purposes intent rather than with any catty intention. This method can be quite annoying due to repetitive messages. Also this method does leave a door open for variety of social engineering attacks. In rewrite to prevent this type of attack the device must be set into non-discoverable mode in unsecured areas.Bluesnarfing this hacking method is done in bluetooth enabled cellular phones and what this attack does is it copies the entire fall into place book, calender or anything that is stored in the cellular phones memory. This threat can be minimised by setting the device in non-discoverable mode in an un-secured zone. How-ever many another(prenominal) software are open in web which can abstract information from blue-tooth enabled devices.the back door attack this attack starts of aft(prenominal) being in connection with bluetooth device through pairing mechanism and if the proprietor does not observe their device after connection than they are incredible to notice anything after the device are paired allowing aggressor to use any resources that a trusted relationship with that device grants access to. This heart and soul the attacker can not only retrieve data nevertheless also use features such as GPRS WAT, internet, modem s etc. without the owner being notified.The cabir twist it is a malicious software that uses the bluetooth technology to look for available bluetooth devices and send itself to them. This worm currently only effects wide awake phone which uses symbian series 60 user interface platform. But this threat can be avoided by the user since the user itself has to manually accept the worm and install in order for this attack to be in effect.GPRSit is a non-voice look on added service which allows Mobile Phones to be used for sending and receiving data over and internet protocol(IP) based network. It stands for General Packet Radio Services. It is a packet based radio service which is delivered as a network overlay for GSM, CDMA and TDMA networks which enables always on connections. This eliminates the repetitive and time consuming dial up connection. It also reserves radio resources only when there is a certain data to be sent ensuring the maximum utilization of radio resources. This ser vice enables users to use many multimedia application through mobile internet. Along with it it provides user the internet from anywhere and anytime.GPRS handles data in a series of packets which can be routed over several paths through the GSM network. The data is segmented and stored as packets before being transmitted and reassembled at the receiving end. GPRS users get the benefit of instantaneous connection setup and continuous connection to the internet after being logged-in to an APN (Access evidence Name) until the user log off and the user only have to pay the data which is actually transmitted. Since this is a wireless technology so and end-to-end connection is not required because network resources and bandwidth are only used when data is actually transferred. This allows efficient use of available radio bandwidth. This reduces the cost compared to circuit switched function since communication channels gets shared and are on a as-packets-are-needed basis.GPRS data speed s ranges from 14.4 kbit/s (using one radio time-slot) to 115kbit/s (by amalgamating time slots). The average data transfer speed is at about 56 kbit/s. The improvement in the data rate allows users to take part in video conference and interact with versatile websites and similar application using mobile handheld devices as well as from notebook computers.GPRS is based on GSM communication and will escort existing services equivalent SMS. It also complement blue-tooth.Advantages of GPRSOperatorsoffer red-hot and improved data services to residential and business markets.Uplift the revenues from data services.Opportunity to increase the number of network users.Provides an upgrade path and baseline for UMTSEnd Usershigh speed internetcost effective since get off is carried out only when data is transmitted and not for the duration of connectionconstant connectivitysimultaneous use of voice and data communicationApplications of GPRS includeChatweb browsinginternet emailfile transf erfile sharingSecuritySecurity threat depend the type of dealing and data service for specific threat. The Gp interface is the logical connection between PLMNs that is used to support avering data users. The following traffic falls under Gp GTP this provides a logical connection between the SGSN and GGSN of roaming partners.BGP this provides the routing information between the floozy and the GRX and/or roaming partnersDNS provides resolution for endorsers Access Point Name (APN)THREAT ON Gp includesAvailabilityBorder door Bandwidth saturation in this type of threat a malicious operator connects to the equal GRX which may have the ability to generate a comfortable amount of traffic which gets directed at users border opening such that required traffice is starved for bandwidth in or out of user PLMN. eventually denying roaming acess to and from the network.DNS flooding in this threat the DNS server gets flooded with correct or malformed DNS queries denying subscribers to locate GGSN to use an external gateway.GTP flooding in this threat SGSNs and GGSNs may be flooded with GTP traffic that cause them to spend their processor cycles processing illegitimate data preventing subscribers to roam or send data out to an external networkAuthentication and AuthorizationSpoofed create PDP background RequestSpoofed update PDP con textual matter requestIntegrity and ConfidentialityCapturing a subscribers data sessionWAPWAP stands for Wireless Application Protocol. It is an application environment and a set of communication protocol for witless devices which is designed to allow manufacturer, vendor and technology independent access to the internet and advanced telephony services. Basically it serves as a bridge between the mobile world and the internet as well as intranets offering the ability to deliver an unlimited range of mobile value added services to the users regardless of their network, bearer and terminal. This also enables subscriber to access the sa me amount of information from a pocket surface devices as they can from the desktop.The WAP specification defines a set of protocols in layers like application , session, transaction, security, and transport enabling operators and manufactures to meet the challenges in advanced wireless service differentiation and fast/flexible service creation.WAP utilizes binary transmission for greater compression of data and is optimized for long latency and low bandwidth. The light weight WAP protocol block is designed to minimize the required bandwidth and increase the number of wireless network types that can deliver WAP national. Since WAP is based on a scalable layered architecture, each layer can founder independently of the others making it possible to introduce sore bearers or to use new transport protocols without having to make any alteration in other layers.Versions of WAPWAP 1.X-WAP 1.0 was introduced way back in April 1998 which described a stack of softwares for internet acces s through mobile.WAP 1.1 was then introduced a year later after WAP 1.0 in 1999.WAP 1.2 which was the final update of the WAP 1.X series was introduced in June 2000 and the significant update of this was the introduction of WAP push.WAP PushThis version allows WAP content to be pushed to the mobile device with minimum user intervention since this includes a specially encoded message that includes a link to wap address. It can be used over any device which supports WDP like GPRS and SMS.This push version enables users the option to automatically access the WAP content with WAP 1.2WAP 2.0This version re-engineered WAP which was introduced in the year 2002 and was a simple version of hypertext markup language which is called XHTML. The XHTML helps reduce the bandwidth of internet pages helping user to use the saved bandwidth for other purpose.BenefitsOperatorschance to increase the subscriber by improving services such as interface to voice mail and prepaid systemsintroduction of new a pplication without the need for additional infrastructure or modification to the phone. alter the provision of end-to-end turnkey solution which create a stable competitive advantage.Content Providersenable content and application developers to grasp eh tag based WML(wireless Markup Language) allowing services to be written and executed within an operators network quickly and easilyEnd Userseasy and secured access to relevant internet information and services such as unified messaging and enjoyment through their mobile devices.Can access the information from corporate databases. world-shaking freedom of choice when selecting mobile terminals and application they supportallows users to receive and request information in controlled fast and low-cost environment .Applications of WAPadvertising the product directly through the mobile devices allowing the shoppers directly the link to order ledger entry page.Establishment of virtual lan enabling users to play or share information wit hin the grous.Downloading files.Infotainment feature customer care and provisioning, message notification and call management, email, mapping and location service, weather and traffic alerts, sports and pecuniary services, address book and directory services and corporate intranet application.Security concern over WAPWAP Gateway this is the most important threat associated with WAP. In this threat WAP devices communicate to web servers through WAP gateway meaning WAP contains unencrypted data for a short period of time which can be highly confidential. In order to avoid this the WAP device must switch to a trusted and secured gateway instead of using the default WAP gateway. Also another solution includes upgrading all wap gateways such that they can work in pass-through mode. When WAP gateway works in this mode it just let pass all the encrypted traffic from mobile phone to server without being decrypted and the gateway would be just a relay for the data stream.Weak encoding alg orithms the encryption protocol encrypts data during the handshake phase which has a possibility to choose the 40bit diethylstilbestrol encryption method. In this method, a 5 byte key is used containing 5 resemblance bits leaving only 35 effective key bits in the DES key. This DES key can be easily hacked through animate being forcepotential for virus attacks wap contains a scripting language(WMLScript) which makes easier for viruses to affect mobile phone.GSMIt stands for spherical System for Mobile Communication which is a globally accepted bill for digital cellular communication and most globally used mobile phone system . It is an open digital cellular technology which is used to transmit mobile voice and data services. This design was the first digital design to follow the analog period to enhance the security from analog counterparts in mobile communication. This technology supports voice calls and data transfer rate up-to 9.6kbit/s, along with the transmission of SMS. T his operates in the 900MHz and 1.8 GHz bands in Europe and 1.9 GHz and 850MHz bands in the US , Australia, Canada and many south American countries. The users can access the same service when traveling abroad through GSM international roaming capability which is done after harmonizing spectrum across most part of the earth. This gives users to connect seamlessly and same number connectivity in more than 218 countries even if they have different network service provider.Application of GSM includesaccessing the internet with GPRS being enabled..Used in E-commerce for services like mobile banking, e-ticketing etc.Advantage of Gsm includethe consumer benefits from the ability to roam and switch carriers without replacing phones and SIM and also to network operators.High voice lucidness due to the efficient use of radio frequencies which allows the system to tolerate intercell disturbances.The encryption of speech allows user information to be secured.Also pioneered low cost implementa tion of the short message service known as text messaging.Introduction of worldwide emergency telephone number feature.Introduction of value added feature such as GPRS EDGE.Threat includes the followingthere are mainly two motivation for attackers of mobile phone systems which are theft Of servicecloning In this type of attack, the attacker steals the identifying information from a legitimate phone and loads it to another phone allowing attacker to masquerade as the legitimate phone. What this does is it causes charges to be assessed against the account holder of the legitimate phone. birdsong Decryption this threat is based on the encryption method of the GSM network. The attacker had found to decrypt a call with greater speed within 30 seconds with just a laptop and specific radio device back in 2007 and 2008.data Interception in this type of attack the attacker can easily listen to the transmission of the phone using relatively unsophisticated tools in a effort to eavesdrop on the voice and data transmission occurring. To solve this problem encryption of the data in the air should be maintained.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.