Find multiple specifications for
Well-known Bluetooth:
1. Even in the United States and Europe,
The frequency range is 2,400-2,483. With 5 MHZ, and
79 1 MHz RF (radio frequency) channel. this
Japan's frequency range is from 2,472 to 2,497 MHz
23 1 MHz RF channel.
2. Bluetooth data channel randomly hop 1,600
Time per second between 79 RF channels.
3. Each Bluetooth channel is divided into time
Slots, each with a length of 625 microseconds.
4. Bluetooth piconet is a master
Seven slave masters will still be sent
Time slots, slaves are sent with odd numbers
Time slot
5. Data in a single packet is possible up to 2,745
A bit of length.
6. There are currently two types of data transfer
Inter-device-SCO (synchronous connection
And ACL (asynchronous connectionless).
7. With Bluetooth's piconet, you can do until it is there
Three SCO links including 64,000 bits per second
each. To avoid collision and timing
The problem is that the SCO link uses Reserved
Slot set by master.
8. The master can support the following SCO links
With either one, two, or three slaves.
9. Slots not reserved for SCO link,
Used for ACL link.
10. A single master and slave have one ACL
Link
11 ACL is master for either slave (
Point) or it broadcasts to all slaves.
12 ACL slave is sent only in the following cases
Requested by Master. When the master does not do it
When making a request, the ACL slave will not be sent
anything
PPPPP
Bluetooth Security
These days, we face all communication technologies
Bluetooth, privacy and the theft problem of personal information,
It is not an exception. E-mail that most people in Uzbekistan know
Security Users Who
It means that Bluetooth is necessary for realizing it
Security measures are also necessary.
The good news for Bluetooth users is that
Security fear is more like normal, like most fears
It dots legs and blows completely in proportion. this
The truth is told, these problems are easy to manage,
In order to provide, with various measures already in place
Guarantee for Bluetooth technology.
It is true that there were several Bluetooth phones
Most of the devices being hacked
There are usually no people in misuse
All security types.
According to Bluetooth experts, to hack
On the Bluetooth device, the hacker will be:
1. Force two pair devices to break
Connection.
2. Steal packets used for
Resend the pin.
3. Decode the pin.
Of course, hackers must also be within range
Using a type of device, and a very expensive developer
apparatus. Most experts,
There are long pins, 8 digits recommended.
Security foundation
"Pairing process" is one of the most basic levels
Bluetooth device security. Pairing, is
Multiple Bluetooth devices that recognize each
In most cases the profile also has other
Both must input the same pin.
Specifying the center for use of Bluetooth
A complete and complete encryption algorithm,
When safe devices pair with each other,
They become totally safe too.
Until they are successfully paired, Bluetooth
Devices do not communicate with each other. by
This pairing process and the fact that it is short
Range - Bluetooth technology is considered as follows
It's safe
As the news showed, experienced hackers
We developed a way to avoid this level
Basic security, there is a way to avoid this
By installing software,
A hacker invaded
Bluetooth is that it is getting more and more popular
It was hard to keep such security constantly
As the Bluetooth is bigger and better,
Security will always be something for everyone
It really takes lightly.
Worried about Bluetooth security
In the past, new devices
Please keep in mind. Prevention
Hackers come in all owners
There are concerns - and manufacturers
Very recognizing.
PPPPP
0 comments:
Post a Comment