TABLEOFCONTENTS:
1.BluetoothProtocol(Part2):Types,DataExchange,Security
2.BluetoothProtocolCategories
3.InternalDetailsofBluetoothProtocols
4.BluetoothCoreProtocols
5.CableReplacementProtocols
6.AdoptedProtocols
7.TelephonyControlProtocol
BluetoothProtocol(Part2):Types,DataExchange,
Security
SECURITY
Bluetoothsecurityisveryimportanttoallowkeylessdoors
andautomaticbillingsuperstores.Atlinklayeritis
maintainedbyauthenticationandencryption.Firstadevice
doesauthenticationbyissuingachallengeandotherdevice
hastothensendaresponsetothatchallenge.TheBD-ADDR
andlinkkeyissharedbetweenthem.Afterauthentication
encryptionmaybeusedtocommunicate.Therearefourtypes
ofkeys:combination,unit,temporaryandinitialization.
LinkManagerandcontroller
Linkmanagerisusedformanagingthesecurity,linkset-upandcontrol.Itcommunicateswithotherlinkmanager
toexchangeinformationandcontrolmessagesthroughlinkcontrollerbyusingsomepre-definedlinklevel
commands.Oncetheconnectionhasbeensetup,itcanhaveuptothreeSCOconnectionscreatedacrossit,or
itsmodecanbechanged,eithertoalowpowermodeortoatestmode(theseareusefulforcertificationof
Bluetoothdevicesbytestingauthoritiesandforamanufacture’sproductionlinetestingofdevices).Whenthe
connectionisnolongerrequired,LMPcancausedisconnection.
Ithaslesssupportforupperlayersbutitcanbeimprovedbyusingaupperlayerinterfacewhichallowsitto
executealgorithmsformodemanagement(park,hold,sniff,active),securitymanagement,QoSetc.Forexample
ifuserrequestslowpowerthenlinkmanagercannegotiatewithotherlinkmanageraboutthepowercontroland
bothcangointothesamemodeaccordingtothepre-setalgorithm
TheLinkManager(LM)convertsthecommandsintooperationsattheBasebandlevel,managingthefollowing
operations.
1)AttachingslavestoPico-nets,andallocatingtheiractivememberaddresses.
2)BreakingconnectionstodetachSlavesfromaPico-net.
3)ConfiguringthelinkincludingMaster/Slaveswitches
4)EstablishingACLandSCOlinks.
5)PuttingconnectionsintoLowPowermodes:Hold,SniffandPark.
6)Controllingtestmodes.
AuthenticationModule
Itisaprocessofidentifyingadeviceinanetworkusuallybasedonusernameandpasswordtoensure
security.Itisalsoawaytoallowdevicesinanetworkedsystemtogaintheaccesstotheotherdevice.
ThelinkmanagerprotocolensurestheauthenticationinthePico-netorscatternet.
Encryptionmodule
Thetranslationofdataintoasecretcodeisknownasencryption.Itisthemosteffectivewaytoachieve
datasecuritybecauseweneedasecretkeyorpasswordthatenablestodecryptit.Unencrypteddatais
plaintextwhiledecryptiscalledciphertext.
Apartfromauthenticationandencryptiontherearemanyotherfunctionsasshowninfigure.
Allthefunctionsarespecifiedbelow.
|
|