34 research outputs found
Traffic integration in personal, local and geograhical wireless networks
Currently, users identify wireless networks with the first and second generation of cellular-telephony networks. Although voice and short messaging have driven the success of these networks so far, data and more sophisticated applications are emerging as the future driving forces for the extensive deployment of new wireless technologies. In this chapter we will consider future wireless technologies that will provide support to different types of traffic including legacy voice applications, Internet data traffic, and sophisticated multimedia applications. In the near future, wireless technologies will span from broadband wide-area technologies (such as satellite-based network and cellular networks) to local and personal area networks. Hereafter, for each class of networks, we will present the emerging wireless technologies for supporting service integration. Our overview will start by analyzing the Bluetooth technology that is the de-facto standard for Wireless Personal Area Networks (WPANs), i.e. networks that connect devices placed inside a circle with radius of 10 meters. Two main standards exist for Wireless Local Area Networks (WLANs): IEEE 802. and HiperLAN. In this chapter we focus on the IEEE 802.11 technology, as it is the technology currently available on the market. In this chapter, after a brief description of the IEEE 802.11 architecture, we will focus on the mechanisms that have been specifically designed to support delay sensitive traffics
Security Threats Analysis in Bluetooth-Enabled Mobile Devices
Exponential growth of the volume of Bluetooth-enabled devices indicates that
it has become a popular way of wireless interconnections for exchanging
information. The main goal of this paper is to analyze the most critical
Bluetooth attacks in real scenarios. In order to find out the major
vulnerabilities in modern Bluetooth-enabled mobile devices several attacks have
performed successfully such as- Surveillance, Obfuscation, Sniffing,
Unauthorized Direct Data Access (UDDA) and Man-in-the-Middle Attack (MITM). To
perform the testbed, several devices are used such as mobile phones, laptops,
notebooks, wireless headsets, etc. and all the tests are carried out by
pen-testing software like hcittml, braudit, spoafiooph, hridump, bluesnarfer,
bluebugger and carwhisperer.
KEYWORDS: Bluetooth, Security, Surveillance, Obfuscation, Sniffing, Denial of
service, Man-in-the-middle.Comment: 16 page
Wireless personal area networks and free-space optical links
This thesis is concerned with the link layer design of indoor (IrDA) and outdoor infrared links, as well as the performance of the higher layers of two major Wireless
Personal Area Network (WPAN) technologies: IrDA and Bluetooth. Recent advancesin wireless technology have made it possible to put networking technology into small portable devices. During the past few years, WPAN
technologies have been the subject of a tremendous growth both in research and development. Although many studies have been conducted on wireless links to address different issues on physical and link layers, wireless communications are still characterised by high error rates becauseof the frequently changing medium. On the other hand, performance studies of the higher layers are also very important. In this thesis, for the first time, a comprehensivestudy of the interactions betweenthe higher and the lower protocol layers of IrDA and Bluetooth has been carried out to improve the overall system performance. Mathematical models for the link layers are introduced for the infrared systems: infrared data association (IrDA) and free space optics (FSO). A model for the IrDA (indoor infrared) link layer is developed by considering the presence of bit errors. Based on this model, the effect of propagation delay on the link through put is investigated. An optimization study is also carried out to maximize the link
throughput. FSO (outdoor infrared) links are often characterized by high speed and long link distance. A mathematical model for the FSO link layer is also developed. Significant improvement of the link throughput is achieved by optimizing the link parameters. Based on the link layer model, the performance of the IrDA higher layers
(transport, session and application layers) is investigated. First, a mathematical model of TinyTP (transport protocol) is elaborated and subsequently verified by simulations. The effects of multiple connections and available buffer size are investigated. The
throughput at the TinyTP level is optimized for different buffer sizes. Subsequently, the session layer, including Object Exchange (OBEX) and IrDA Burst (IrBurst) protocols, is studied and modelled. The derived mathematical model is verified by simulation results. A set of protocol parameters and hardware selection guidelines is proposed to optimize the overall system performance while also keeping the hardware requirementto a minimum. Finally, two rapidly developing IrDA applications, IrDA financial messaging(IrFM) and IrDA simple connection (IrSC), are studied. IrFM is investigated by comparison to other digital payment technologies, while the performance of IrSC is compared in two different technical approaches. In order to improve the throughput and minimize the transmission delay for the
Bluetooth data applications, a systematic analysis is carried out for the Bluetooth Logical Link Control and Adaptation Layer Protocol (L2CAP). L2CAP is layered
above the Bluetooth link layer (Baseband) and is essential to Bluetooth data applications. A simple and intuitive mathematical model is developed to derive simple
equations for the L2CAP throughput and the average packet delay. The derived throughput equation, which is validated by simulations, takes into account bit errors as well as packet retry limits. Finally, a number of easy-to-implement performance enhancement schemes are proposed, including the optimum use of the protocol parameters
Bluetooth software on Linux, wireless hand-held devices
In order to enable existing computers (non-Bluetooth ready) to connect to a Bluetooth piconet, a Bluetooth hardware device comprising of the Radio antenna, the baseband and control circuit is used. The digital portion of this device is also known as a Host Controller, HC. In the traditional communication lingo, the Bluetooth Hardware functions, as the Data Communication Equipment (DCE) while the Host is the Data terminal Equipment (DTE). This report discusses the theory and implementation of the communication protocol between the Host and the Host Controller, enabling communication between the computer and the Bluetooth hardwar
Packet Analysis of Unmodified Bluetooth Communication Devices
Bluetooth technology has potential for widespread use within the Department of Defense and the Air Force. An office environment using Bluetooth technology can wirelessly connect computers, printers, and other office equipment in order to share information over short distances. The clutter and annoyance of cables connecting equipment can be eliminated. Bluetooth provides a standard interface for connection, as opposed to many different proprietary cables. The research is conducted indoors in a climate controlled environment, with minimal obstructions, to closely follow free-space signal propagation. Four different antenna orientations are used. The factors varied are the distance between devices, and the antenna orientation. This research determined that two of the four cards tested have a specific distance where a change from Data High rate packets and Data Medium rate are used. The change occurs at 2 meters for one and 3 meters for the other. This research also shows that manufacturers transmit identical data in identical formats. Also, this research shows that antenna orientation, and receiver signal strength indicator values have no predictive value in determining packet type used for transmission
Wireless personal area networks and free-space optical links
This thesis is concerned with the link layer design of indoor (IrDA) and outdoor infrared links, as well as the performance of the higher layers of two major Wireless Personal Area Network (WPAN) technologies: IrDA and Bluetooth. Recent advancesin wireless technology have made it possible to put networking technology into small portable devices. During the past few years, WPAN technologies have been the subject of a tremendous growth both in research and development. Although many studies have been conducted on wireless links to address different issues on physical and link layers, wireless communications are still characterised by high error rates becauseof the frequently changing medium. On the other hand, performance studies of the higher layers are also very important. In this thesis, for the first time, a comprehensivestudy of the interactions betweenthe higher and the lower protocol layers of IrDA and Bluetooth has been carried out to improve the overall system performance. Mathematical models for the link layers are introduced for the infrared systems: infrared data association (IrDA) and free space optics (FSO). A model for the IrDA (indoor infrared) link layer is developed by considering the presence of bit errors. Based on this model, the effect of propagation delay on the link through put is investigated. An optimization study is also carried out to maximize the link throughput. FSO (outdoor infrared) links are often characterized by high speed and long link distance. A mathematical model for the FSO link layer is also developed. Significant improvement of the link throughput is achieved by optimizing the link parameters. Based on the link layer model, the performance of the IrDA higher layers (transport, session and application layers) is investigated. First, a mathematical model of TinyTP (transport protocol) is elaborated and subsequently verified by simulations. The effects of multiple connections and available buffer size are investigated. The throughput at the TinyTP level is optimized for different buffer sizes. Subsequently, the session layer, including Object Exchange (OBEX) and IrDA Burst (IrBurst) protocols, is studied and modelled. The derived mathematical model is verified by simulation results. A set of protocol parameters and hardware selection guidelines is proposed to optimize the overall system performance while also keeping the hardware requirementto a minimum. Finally, two rapidly developing IrDA applications, IrDA financial messaging(IrFM) and IrDA simple connection (IrSC), are studied. IrFM is investigated by comparison to other digital payment technologies, while the performance of IrSC is compared in two different technical approaches. In order to improve the throughput and minimize the transmission delay for the Bluetooth data applications, a systematic analysis is carried out for the Bluetooth Logical Link Control and Adaptation Layer Protocol (L2CAP). L2CAP is layered above the Bluetooth link layer (Baseband) and is essential to Bluetooth data applications. A simple and intuitive mathematical model is developed to derive simple equations for the L2CAP throughput and the average packet delay. The derived throughput equation, which is validated by simulations, takes into account bit errors as well as packet retry limits. Finally, a number of easy-to-implement performance enhancement schemes are proposed, including the optimum use of the protocol parameters.EThOS - Electronic Theses Online ServiceGBUnited Kingdo
Performance Evaluation and Analysis of Effective Range and Data Throughput for Unmodified Bluetooth Communication Devices
The DoD and the Air Force continually seek to incorporate new technology in an effort to improve communication, work effectiveness, and efficiency. Office devices utilizing Bluetooth technology simplify device configuration and communication. They provide a means to communicate wirelessly over short distances thereby eliminating the need for different vendor specific cables and interfaces. One of the key concerns involved in incorporating new communication technology is security; the fundamental security concern of wireless communication is interception. Studies focusing on IEEE 802.11b have shown vulnerability zones around many DoD installations that reflect the ranges at which wireless communications using the 802.11b standard can be intercepted
A PROTOCOL SUITE FOR WIRELESS PERSONAL AREA NETWORKS
A Wireless Personal Area Network (WPAN) is an ad hoc network that consists of devices that surround an individual or an object. Bluetooth® technology is especially suitable for formation of WPANs due to the pervasiveness of devices with Bluetooth® chipsets, its operation in the unlicensed Industrial, Scientific, Medical (ISM) frequency band, and its interference resilience. Bluetooth® technology has great potential to become the de facto standard for communication between heterogeneous devices in WPANs.
The piconet, which is the basic Bluetooth® networking unit, utilizes a Master/Slave (MS) configuration that permits only a single master and up to seven active slave devices. This structure limitation prevents Bluetooth® devices from directly participating in larger Mobile Ad Hoc Networks (MANETs) and Wireless Personal Area Networks (WPANs). In order to build larger Bluetooth® topologies, called scatternets, individual piconets must be interconnected. Since each piconet has a unique frequency hopping sequence, piconet interconnections are done by allowing some nodes, called bridges, to participate in more than one piconet. These bridge nodes divide their time between piconets by switching between Frequency Hopping (FH) channels and synchronizing to the piconet\u27s master.
In this dissertation we address scatternet formation, routing, and security to make Bluetooth® scatternet communication feasible. We define criteria for efficient scatternet topologies, describe characteristics of different scatternet topology models as well as compare and contrast their properties, classify existing scatternet formation approaches based on the aforementioned models, and propose a distributed scatternet formation algorithm that efficiently forms a scatternet topology and is resilient to node failures.
We propose a hybrid routing algorithm, using a bridge link agnostic approach, that provides on-demand discovery of destination devices by their address or by the services that devices provide to their peers, by extending the Service Discovery Protocol (SDP) to scatternets.
We also propose a link level security scheme that provides secure communication between adjacent piconet masters, within what we call an Extended Scatternet Neighborhood (ESN)