Bluetooth Bluetooth technology was originally developed to replace the cable connections and thus giving more flexibility while operating various devices. Initially launched in 1998, the Bluetooth Special Interest Group (SIG) has now attracted more than 2500 member companies1. Currently the Bluetooth technology is introduced by the three application models. The first model of the Bluetooth usage is the wireless connection of various devices. A group of devices can also communicate in a temporal network, so-called pico-networking; when Bluetooth enabled devices become widespread a third usage model may be realized, namely Bluetooth networking over access points. There are several solutions to connect devices without the cable. Infrared connection has been known for a certain time.
There are certain disadvantages of the infrared communications. The most important is the short range of operation (a) and (b) the devices should be at sight. The Bluetooth wireless communication is based on a short-range radio technology. The devices can operate at a distance of 10m and they may not be at sight. The Bluetooth technology may be used for several devices to communicate at a time. For example the Bluetooth may be used for the file exchange at a meeting room.
Currently almost all applications of the Bluetooth are restricted by the cable replacement in communication only. The use of the Bluetooth devices for the networking access is restricted by the limited amount of the devices in the market available to work with the Bluetooth technology. The Bluetooth technology creates a bridge between the mobile communicative devices and computers, laptops etc. The idea is to create a single digital wireless protocol to address end-user problems arising from proliferation of various mobile devices2. The Bluetooth technology offers the optimum solution in terms of economy for low-to-medium speed connectivity. The Bluetooth has a huge number of applications.
The Essay on Cellular Phone Bluetooth Wireless Technology
... technology that enables short-range wireless connections between desktop and laptop computers and a host of other peripheral devices. Furthermore, the Bluetooth technology ... and exciting applications. A very key characteristic of Bluetooth that differentiates from other wireless technologies is that ... cable clutter of peripherals. It is also a replacement for IrDA, and is a complimentary technology ...
There are myriad applications for wireless personal area networks, and there could easily be 1.5 billion Bluetooth devices by 2005, said Michael Hentschel, Managing Director of TechVest Ventures3. The spread of the Bluetooth technology is expected to influence the market of the telecommunication devices. The amount of the Bluetooth enabled devices will be growing steadily. The technology opens the new horizons for the cellular phones, laptops, desktop computers. There were a lot of speculations regarding the level of the information security while implementing the Bluetooth technology. The developers of the Bluetooth devices pay special attention to providing the information security. It is understandable that the technology may be useless if appropriate level of security is not provided.
Product developers that use Bluetooth wireless technology in their products have several options for implementing security. There are three modes of security for Bluetooth access between two devices. They are: Security Mode 1: non-secure, Security Mode 2: Service level enforced security and Security Mode 3: link level enforced security4. Unfortunately, the Bluetooth devices can be accessible as any other computer/network devices by the spammers, hackers etc. Bluejacking is a way of spamming the Bluetooth devices. Normally the bluejackers can not retrieve data from the device. The bluejackers send some short information, normally personal cards and if the phone owner reacts they ping the phone and if the owner add the contacts of the bluejacker he may receive spam as in regular wireless communication. More dangerous vulnerability that may happen to the Bluetooth devices is bluebugging.
The Essay on Linux Security Technologies
In a world so largely dependent on computer systems, inadequate security measures could lead to anything from having a single person’s financial information compromised to an electronic 9/11 against some of our country’s most secure federal computer networks. In the modern computer based society we live in, security is essential to protecting everything from personal desktops all the way up to the ...
The skillful hackers can gain access to data stored on a Bluetooth enabled phone using Bluetooth wireless technology without alerting the phones user of the connection made to the device5. It is easier to cope with the Bluetooth hackers than with the Internet ones because such hacker should be at a distance of operating the device, i.e. 10 meters. The manufacturers of the Bluetooth devices upgrade the security of their products and made them resistible to bluebugging and bluejacking. In spite of some disadvantages of the Bluetooth based devices the technology is very promising and the use of it will be growing steadily. Citation Bluetooth Opportunities and Threats from a Market Perspective Jeff Stripp, Ibid Wireless Security Ibid Bibliography Bluetooth Opportunities and Threats from a Market Perspective, available at www.northstream.se, retrieved 17.11.2005 Jeff Stripp, Bluetooth: Value Adds and Opportunities, available at www.mindbranch.com, retrieved 17.11.2005 Wireless Security, available at http://www.bluetooth.com/, retrieved 17.11.2005.