Bluetooth is a Wireless communications technology for creating personal area networks operating in the 2.4 GHz unlicensed band, with a default range of 10 meters.
An overview of Bluetooth:
- http://engineeringagenda.com/agenda/2013/09/bluetooth/ An introduction to Bluetooth
- https://learn.sparkfun.com/tutorials/bluetooth-basics bluetooth basics
- http://www.eetimes.com/document.asp?doc_id=1200909 An introduction to debugging Bluetooth in embedded systems
- http://travisgoodspeed.blogspot.fr/2011/12/introduction-to-bluetooth-rfcomm.html Introduction to Bluetooth RFCOMM Reverse Engineering
- http://ecomputernotes.com/computernetworkingnotes/communication-networks/bluetooth Bluetooth Architecture
- http://imperia.rz.rub.de:9085/imperia/md/content/seminare/itsss07/slides_bluetooth_security_and_hacks.pdf (or http://gsyc.es/~anto/ubicuos2/bluetooth_security_and_hacks.pdf) Bluetooth Security & Hacks
Bluetooth 2.0 uses frequencies between 2.4000 and 2.4835 GHz, and divides the band into 79 MHz channels (numbered 0-78), with frequency hopping at a rate of 1600 times per second.
Channel 0 has a frequency centred at 2.4020 GHz, allowing a lower guard band of 2 MHz. Channel 78 has a frequency centred at 2.4800 GHz, allowing an upper guard band of 3.5 MHz.
Bluetooth devices are divided into three classes, depending on their maximum transmitted power (and hence their maximum range):
- http://www.instructables.com/id/Increase-and-extend-the-range-of-a-USB-Bluetooth-d/#step0 Increase and extend the range of a USB Bluetooth
- http://trifinite.org/trifinite_stuff_lds.html Long Distance Snarf showed that the range of Class 2 Bluetooth radios could be extended to 1.78 km (1.11 mi) with directional antennas and signal amplifiers.
Overlapping channels BT/WiFi
(center freq. in GHz)
There are three type of (oriented) connections in Bluetooth:
- Single-slave: a point-to-point connection (only 2 Bluetooth units involved)
- Piconet: One Bluetooth unit acts as the master of the piconet, whereas the (up to seven active) others units acts as slaves.
- Scatternet: Multiple piconets with overlapping coverage areas form a scatternet.
Shows the types of found Bluetooth® devices using icons.
|BD Remote Control||n/a||Yes|
|Mobile phone, smartphone||Yes||Yes|
|No icon||Other devices||Yes||Yes|
Each Bluetooth unit has a unique 48-bit address (BD_ADDR).
|Lower Adress Part (24-bit)
transmitted with every packet as part of the packet header
|Upper Adress Part (8-bit)
||Non-Significant Adress Part (16-bit)|
assigned publicly by the IEEE
For a secure communication via Bluetooth, the following security targets are defined:
• (device) authentication
• (device) authorisation
In order to accomplish those security targets, three possible modes of security are defined:
• Security Mode 1: No security efforts
• Security Mode 2: Service level security, applications have to implement needed cryptographic means
• Security Mode 3: Device level security (cryptographic means are implemented in LMP, independent of applications)
In mode 3, services make transparent use of a secure channel, which is normally established via the Link Managing Protocol (LMP). Therefore, a pairing process between two devices A and B has to be done, in order to establish a shared cryptographic secret for subsequent encryption or authentication.
Bluetooth Protocol and layers
- The Bluetooth protocol stack is split in two parts: a "controller stack" (Hardware) containing the timing critical radio interface, and a "host stack" (software) dealing with high level data.
- Bluetooth standard has many protocols that are organized into different layers.
Baseband, LMP and L2CAP are the OSI layer 1 and 2 Bluetooth protocols. RFCOMM is the adaptation of GSM TS 07.10. OBEX is the adaptation of IrOBEX.
- The layer structure of Bluetooth does not follow OS1 model, TCP/IP model or any other known model.
- Bluetooth makes use of a protocol stack, which makes it simple to seperate application logic from physical data connections.
The Bluetooth radio layer corresponds to the physical layer of OSI model.
• It deals with ratio transmission and modulation.
• The radio layer moves data from master to slave or vice versa.
• It is a low power system that uses 2.4 GHz ISM band in a range of 10 meters.
• This band is divided into 79 channels of 1MHz each. Bluetooth uses the Frequency Hopping Spread Spectrum (FHSS) method in the physical layer to avoid interference from other devices or networks.
• Bluetooth hops 1600 times per second, i.e. each device changes its modulation frequency 1600 times per second.
• In order to change bits into a signal, it uses a version of FSK called GFSK i.e. FSK with Gaussian bandwidth filtering.
• Baseband layer is equivalent to the MAC sublayer in LANs.
• Bluetooth uses a form of TDMA called TDD-TDMA (time division duplex TDMA).
• Master and slave stations communicate with each other using time slots.
• The master in each piconet defines the time slot of 625 µsec.
• In TDD- TDMA, communication is half duplex in which receiver can send and receive data but not at the same time.
• If the piconet has only no slave; the master uses even numbered slots (0, 2, 4, ...) and the slave uses odd-numbered slots (1, 3, 5, .... ). Both master and slave communicate in half duplex mode. In slot 0, master sends & secondary receives; in slot 1, secondary sends and primary receives.
• If piconet has more than one slave, the master uses even numbered slots. The slave sends in the next odd-numbered slot if the packet in the previous slot was addressed to it.
• In Baseband layer, two types of links can be created between a master and slave. These are:
1. Asynchronous Connection-less (ACL)
• It is used for packet switched data that is available at irregular intervals.
• ACL delivers traffic on a best effort basis. Frames can be lost & may have to be retransmitted.
• A slave can have only one ACL link to its master.
• Thus ACL link is used where correct delivery is preferred over fast delivery.
• The ACL can achieve a maximum data rate of 721 kbps by using one, three or more slots.
2. Synchronous Connection Oriented (SCO)
• A SCO (physical) link is a set of (up to 3) reserved timeslots on an existing ACL link.
• sco is used for real time data such as sound/voice data. It is used where fast delivery is preferred over accurate delivery.
• Damaged packet are not retransmitted over sco links (error correction can be optionally applied).
• A slave can have three sco links with the master and can send data at 64 Kbps.
• Enhanced SCO (eSCO) links allow greater flexibility: they may use retransmissions to achieve reliability, allow a wider variety of packet types, and greater intervals between packets than SCO, thus increasing radio availability for other link.
Link Managing Protocol
Especially interesting for further consideration is the Link Managing Protocol (LMP), as one of three possible security modes in Bluetooth is implemented in this layer.
Every Bluetooth device contains a Link Manager Unit, which keeps track of connected devices. Those Link Managers communicate via protocol data units (PDU), defined in LMP.
New connections are established, using an inquiry routine (detecting device address), followed by a page command (call for a device with known device address),
which have to be responded correctly by the opposite device.
Subsequently, devices may initiate the pairing process, where a link key, KAB is established and the opposite device is stored in the ”trusted devices” history.
Logical Link, Control Adaptation Protocol Layer (L2CAP)
The Logical Link Control and Adaption Protocol (L2CAP) provides connection oriented and connection less data services to protocols in upper layers, while making use of ACL (asynchronous connectionless) packets for communication via the Baseband.
• The logical unit link control adaptation protocol is equivalent to logical link control sublayer of LAN.
• The ACL link uses L2CAP for data exchange but sco channel does not use it.
• The various function of L2CAP is:
1. Segmentation and reassembly
• L2CAP receives the packets of upto 64 KB from upper layers and divides them into frames for transmission.
• It adds extra information to define the location of frame in the original packet.
• The L2CAP reassembles the frame into packets again at the destination.
• L2CAP performs multiplexing at sender side and demultiplexing at receiver side.
• At the sender site, it accepts data from one of the upper layer protocols frames them and deliver them to the Baseband layer.
• At the receiver site, it accepts a frame from the baseband layer, extracts the data, and delivers them to the appropriate protocol1ayer.
3. Quality of Service (QOS)
• L2CAP handles quality of service requirements, both when links are established and during normal operation.
• It also enables the devices to negotiate the maximum payload size during connection establishment.
Radio Frequency Communication (RFCOMM)
provides emulated RS-232 serial ports and makes use of the lower-level L2CAP protocol. Up to 60 simultaneous connections to other Bluetooth devices are possible, called RFCOMM channels (3 used on VITA?)
- The protocol is based on the ETSI standard TS 07.10.
- RFCOMM provides a simple reliable data stream to the user, similar to TCP. It is used directly by many telephony related profiles as a carrier for AT commands, as well as being a transport layer for OBEX over Bluetooth.
Object Exchange Protocol (OBEX)
provides services for the exchange of binary data objects. To initiate an OBEX session, an optional OBEX authentication is possible (not used on VITA?). Therefore, a limited set of commands like PUT, GET or ABORT exist for easy object push, file transfer, basic imaging, basic printing, phonebook access, etc. In Bluetooth, OBEX is mainly used within the profiles OBEX Object Push Profile (OPP) and the Synchronisation Profile (SYNCH).
Bluetooth, provided services are composed to a Bluetooth Profile. Bluetooth devices communicate via the profiles, that act as ”interfaces”. For example, a Bluetooth-enabled mobile phone might make use of a Bluetooth headset, which implements the Headset Profile (HSP), which means that SCO (synchronous connection-oriented)-based audio connections and a subset of AT commands for accepting an incoming phone call, etc. are supported.
Bluetooth devices that support the following profile can be paired with your system:
- A2DP (Advanced Audio Distribution Profile)
- AVRCP (Audio/Video Remote Control Profile)
- HSP (Headset Profile)
- HID (Human Interface Device Profile)
- HFP (3G model only?), PBAP (3G model only?)?
OPP defines the roles of push server and push client. These roles are analogous to and must interoperate with the server and client device roles that GOEP defines.
The Object Push Profile (OPP) provides basic functions for exchange of binary objects, mainly used for vCards in Bluetooth.
vCard is a file format standard for electronic business cards. Since vCards are not worth being especially protected, no authorisation procedure is performed before OPP transactions.
Supported OBEX commands are connect, disconnect, put, get and abort.
An example scenario would be the exchange of a contact or appointment between two mobile phones, or a mobile phone and a PC.
Class of Device/Service (CoD)
In practice, most Bluetooth clients scan their surroundings in two successive steps: they first look for all bluetooth devices around them and find out their "class". You can do this on Linux with the hcitool scan command. Then, they use SDP in order to check if a device in a given class offers the type of service that they want.
The PlayStation Vita PCH-2000 has a class of Device/Service (CoD) 0x3e0100:
- Major Service Class : Networking (LAN, Ad hoc etc) (0x20000)
- Major Service Class : Rendering (printing, speaker etc) (0x40000)
- Major Service Class : Capturing (scanner, microphone etc) (0x80000)
- Major Service Class : Object Transfer (v-inbox, v-folder etc) (0x100000)
- Major Service Class : Audio (speaker, microphone, headset service etc) (0x200000)
- Major Device Class : Computer (desktop,notebook, PDA, organizers etc ) (0x100)
- Minor Device Class : Uncategorized, code for device not assigned