6 - 2
WT4070/90 Wearable Terminal Integrator Guide
When AFH is enabled, the Bluetooth radio “hops-around” (instead of through) the 802.11b high-rate channels. AFH
coexistence allows Zebra wearable terminals to operate in any infrastructure. AFH is always enabled in the
WT4090.
The Bluetooth radio in this wearable terminal operates as a Class 2 device power class. The maximum output
power is 2.5mW and the expected range is up to 32.8 feet (10 meters). A definitive definition of ranges based on
power class is difficult to obtain due to power and device differences, and whether one measures open space or
closed office space.
Security
The current Bluetooth specification defines security at the link level. Application-level security is not specified. This
allows application developers to define security mechanisms tailored to their specific need. Link-level security is
really between devices not users, while application-level security can be implemented on a per-user basis. The
Bluetooth specification defines security algorithms and procedures needed to authenticate devices, and if needed,
encrypt the data flowing on the link between the devices. Device authentication is a mandatory feature of Bluetooth
while link encryption is optional.
Pairing of Bluetooth devices is accomplished by creating an initialization key that is used to authenticate the
devices and create a link key for them. Entering a common PIN number in the devices being paired generates the
initialization key. The PIN number is never sent over the air. By default, the Bluetooth stack responds with no key
when a key is requested (it is up to user to respond to the key request event). Authentication of Bluetooth devices
is based-upon a challenge-response transaction. Bluetooth allows for a PIN number or passkey that is used to
create other 128-bit keys used for security and encryption. The encryption key is derived from the link key used to
authenticate the pairing devices. Also worthy of note is the limited range and fast frequency hopping of the
Bluetooth radios that makes long-distance eavesdropping difficult.
It is recommended:
•
Perform pairing in a secure environment
•
Keep PIN codes private and don't store the PIN codes in the wearable terminal
•
Implement application-level security.
NOTE
It is not recommended to perform Bluetooth wireless technology inquiry when high rate 802.11b operation
is required.
Summary of Contents for WT4090
Page 1: ...WT4070 90 Wearable Terminal Integrator Guide ...
Page 2: ......
Page 3: ...WT4070 90 Wearable Terminal Integrator Guide 72E 87638 07 Rev A April 2015 ...
Page 6: ...iv WT4070 90 Wearable Terminal Integrator Guide ...
Page 14: ...xii WT4070 90 Wearable Terminal Integrator Guide ...
Page 20: ...xviii WT4070 90 Wearable Terminal Integrator Guide ...
Page 55: ...Accessories 2 25 Figure 2 25 Disconnecting Connector with Shroud Connector Eject Hole ...
Page 56: ...2 26 WT4070 90 Wearable Terminal Integrator Guide ...
Page 62: ...3 6 WT4070 90 Wearable Terminal Integrator Guide ...
Page 66: ...4 4 WT4070 90 Wearable Terminal Integrator Guide ...
Page 138: ...6 32 WT4070 90 Wearable Terminal Integrator Guide ...
Page 162: ...8 2 WT4070 90 Wearable Terminal Integrator Guide ...
Page 166: ...9 4 WT4070 90 Wearable Terminal Integrator Guide ...
Page 190: ...A 12 WT4070 90 Wearable Terminal Integrator Guide ...
Page 205: ......