Bluetooth Networking: Comprehensive Analysis of Operation & Risks

Verified

Added on  2023/05/26

|6
|1325
|156
Report
AI Summary
This report provides a comprehensive overview of Bluetooth networking, detailing its operation based on radio waves and frequency bands, its ability to connect multiple devices, and the ad-hoc network setup known as piconet. It highlights the strengths of Bluetooth, such as simple setup and compatibility, but also addresses weaknesses like battery drain, slow data transfer speeds, and security vulnerabilities. The report further explores potential risks, including issues with newer devices supporting multiple connections and bugs in Android platforms. Key security issues discussed are MAC spoofing attacks, Cabir worms, Blue Jacking attacks, Blue Snarfing attacks, and war nibbling, emphasizing the various threats to data transaction security. Desklib offers a platform for students to access this and other solved assignments to enhance their understanding.
Document Page
Running head: BLUETOOTH NETWORKING
BLUETOOTH NETWORKING
Name of the Student
Name of the University
Author note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1
BLUETOOTH NETWORKING
Table of Contents
Operation.........................................................................................................................................3
Strength............................................................................................................................................3
Weakness.........................................................................................................................................4
Potential risk....................................................................................................................................5
Issues................................................................................................................................................5
Referencing......................................................................................................................................7
Document Page
2
BLUETOOTH NETWORKING
Operation
Bluetooth is dependent on radio waves for transaction of the data. Bluetooth sends and
receives the signal in bands. The bands that are prosecuted in between the projection of the
management of signals includes 79 bands. All these 79 bands consists of different frequency. 2.4
GHz is the central band of frequency. 2.4GHz is set aside for medical purposes and is not used
for regular day to day use. But the networking that are used by common people are very low in
compared to the networking power of the Bluetooth systems that are used in the medical centers.
This is the sole reason that there are least interference in the projection of the management of the
networking system.
Bluetooth device can connect to utmost 8 other devices. The fact that the network can get
connected to 8 devices chances of interference in the system can be received. This is the main
aspect that the projection of the management of electronic devices will get acclaimed in a
negative manner. To avoid this terminology the setting that is provided incurs the aspect that
there are 79 networking channels and this leads to the fact that the management of the network
interference is well mitigated and this is the main reason that there are least interference in the
prosecution of the project (Kriz, Maly and Kozel 2016). To avoid the regular interference, the
paired device keeps on shifting and this helps in preventing interference.
During the setting of Bluetooth system, the main concern that is taken into consideration
is that the connection in between the two networking system is set to be ad-hoc networking
system. The entire set up is known as piconet. In case more than one piconet is connected
together it is called scatternet.
Strength
The strengths that are present in the commencement of the functioning of the Bluetooth
system are as following: -
Simple setup: Setup that is present in the course of management of the project
management is one if the maim strength that is present is the commencement of the
Bluetooth networking management.
Compatibility: Compatibility of the connectivity is very high and this is the main reason
that the projection of the management of the system gets performed in a better manner.
Document Page
3
BLUETOOTH NETWORKING
Weakness
The main disadvantage that are present in the course of the transaction of data are as follows:
-
Battery drain: Battery drain of the device that have been using Bluetooth is very high.
This is one of the major disadvantage and tis leads to the fact that the projection of the
management of the system
Slow data: In today’s society, there are several data transaction application which
provides high speed in transaction of data (Ensworth and Reynolds 2015). Bluetooth is
the only networking system that does not provide much high speed and the time that is
required for transaction of data is very high.
Security: Lack of security that is present in the processing of the transaction of the data
through the platform of the Bluetooth networking ensures the fact that the data that are
being transacted might not stay protected and this is the a main reason that the usage of
the Bluetooth system has been decreasing in such a high rate.
Potential risk
The risks that are present in the data transaction of Bluetooth are as follows: -
Newer devices might not be supporting the computational power for usurping more than
one Bluetooth connection. This might led to drops or hiccups in the projection of the
system. These might happen even after the fact that the devices has the specification of
supporting the system
Bug in the platform of android is one of the main reason that the extinction of the
platform of Bluetooth has been increasing. With the androids 4.3 update the main issue
that was present in the case of management of the project includes the fact that the
projection of the commencement of the data transaction ensures the fact that the
projection of the data transaction failed miserably.
Issues
The main issues that are present in the commencing of the Bluetooth networking are as
follows: -
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
BLUETOOTH NETWORKING
MAC spoofing attack: MAC spoofing attack is considered to be one of the main attack
that threatens the entire scenario and this leads to the fact that the data that are being
transacted will get prohibited from reach their destined location and this leads to the fact
that the management of the data prosecution will get performed in an inefficient manner
(Gupta 2016).
Cabir worm: Cabir worm is considered to be one of the first computer worm that affects
the mobile system as well. This is the sole reason that the management of the mobile also
gets harmed and this acts as one of the major reason that the prosecution of the
management of the functioning gets affected in negative manner
Blue Jacking attack: Blue jacking attack instills the fact that the management of the
transaction of data is affected in a negative manner. This leads to the fact that the
prosecution of the management of the data that are transferred with the help of Bluetooth
gets affected in a drastic manner (Chang 2014). The messages that are sent through the
platform of Bluetooth gets interfered in between the channel which leads to the fact that
the management of the entire task gets affected in a negative manner.
Blue Snarfing attack: Blue snarfing attack includes the fact that the data that are sent
through Bluetooth in a short range are stolen which leads to the fact that the management
of the project gets performed in a negative manner (Faragher and Harle 2015). This is the
sole reason that the projection of the process is transcript with proper data stealing
techniques
War nibbling: War nibbling is performed in such a manner that the data that are being
transacted gets performed with the help of excellent tracking of the imposters. This leads
to the fact that the imposters can get access ti the data that are being transacted
Document Page
5
BLUETOOTH NETWORKING
Referencing
Chang, K.H., 2014. Bluetooth: a viable solution for IoT?[Industry Perspectives]. IEEE Wireless
Communications, 21(6), pp.6-7.
Collotta, M. and Pau, G., 2015. Bluetooth for Internet of Things: A fuzzy approach to improve
power management in smart homes. Computers & Electrical Engineering, 44, pp.137-152.
Ensworth, J.F. and Reynolds, M.S., 2015, April. Every smart phone is a backscatter reader:
Modulated backscatter compatibility with bluetooth 4.0 low energy (ble) devices. In RFID
(RFID), 2015 IEEE International Conference on (pp. 78-85). IEEE.
Faragher, R. and Harle, R., 2015. Location fingerprinting with bluetooth low energy
beacons. IEEE journal on Selected Areas in Communications, 33(11), pp.2418-2428.
Gupta, N.K., 2016. Inside Bluetooth low energy. Artech house.
Kriz, P., Maly, F. and Kozel, T., 2016. Improving indoor localization using bluetooth low energy
beacons. Mobile Information Systems, 2016.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]