80
Security
Composition of Bluetooth
In the current Bluetooth speci
¿
cations, the security level is de
¿
ned to the level of link and the security level of
applications is not de
¿
ned. Therefore, application developers may de
¿
ne security mechanisms to meet speci
¿
c
requirements. The security at the level of applications is implemented per each user, whereas the security at the
level of link is implemented between devices. The Bluetooth speci
¿
cations de
¿
ne security algorithms and procedures
necessary to certi
¿
cate devices and, if necessary, to encrypt the data
À
ow of link between devices. The certi
¿
cation of
devices is a fundamental feature of Bluetooth; however, the encryption of link is selective.
The synchronization between Bluetooth devices are performed by generating initialization keys used for link keys
required for certifying devices. Basically, a Bluetooth stack responds without a key when a key is requested (the
response to the key-requesting event is the user’s role). The certi
¿
cation of Bluetooth devices are based on attempt-
response transactions. In Bluetooth technology, other PIN numbers or passwords used for generating 128 bit keys
for security and encryption can be re-used. Encrypted keys are extracted from the link keys used for certifying
synchronized devices. Also, the constraints in distance and high-speed frequency hopping of Bluetooth wireless
technology make eavesdropping dif
¿
cult.
Recommendations are as follows:
Synchronization should be conducted under secured environments.
Do not save PIN code at industrial PDA. Store it somewhere else personally.
Implement a security at the level of applications.
Microsoft stack supports smart synchronization. For the details, see Microsoft MSDN.
In principle, CW30 is con
¿
gured to use Microsoft Bluetooth stack.
The available services via Microsoft Bluetooth stack is listed in Table 6-1.
[Table 6-1. Bluetooth services]
Microsoft Bluetooth Stack
OBEX Object Push Services
Hands-Free Audio Gateway Services
Serial Port Services
Personal Area Networking Services
PBAP Services
Dial-Up Networking Services
HID Client Services
A2DP/AVRCP Services
Summary of Contents for CW30
Page 1: ...1 ...
Page 14: ...14 kjG Li ion polymer battery USB cable Power cord Power adapter Protective lm Earset ...
Page 101: ......