The Bluetooth wireless technology provides short range, wireless
connectivity between common devices. Different applications can be
built based on these spontaneous, ad-hoc networks. The security
requirements for Bluetooth applications will vary based on the sensitivity
of the information involved, the market, and the needs of the user. There
are some applications that do not require any security and others which
require extremely high levels of security. Risk analysis and trade studies
need to be conducted prior to implementing new applications
using Bluetooth wireless technology.
The Bluetooth wireless technology system contains a set of
profiles. A profile defines a selection of messages and procedures
(generally termed capabilities) from the Bluetooth SIG specifications.
This gives an unambiguous description of the air interface for specified
services and use cases. Working groups within the Bluetooth SIG define
these profiles. The Security Expert Group (BSEG) provides the Bluetooth
SIG and associated working groups with expertise regarding all aspects
of Bluetooth security.
Security can be defined by four fundamental elements:
Availability, Access, Integrity, and Confidentiality.
The current Bluetooth System specification defines security at
the link level. Application level security is not specified, allowing
application developers the flexibility to select the most appropriate
security mechanisms for their particular application. The Security
Expert Group focuses on developing general security architecture