Bluetooth
Security
The Bluetooth wireless technology
provides short range, wireless
connectivity between common
devices. Different applications can be
built based on these spontaneous,
ad-hoc networks. The security
requirements for Bluetooth
applications will vary based on the sensitivity
of the information involved, the
market, and the needs of the user. There
are some applications that do not
require any security and others which
require extremely high levels of
security. Risk analysis and trade
studies
need to be conducted prior to
implementing new applications
using Bluetooth wireless
technology.
The Bluetooth wireless technology
system contains a set of
profiles. A profile defines a
selection of messages and procedures
(generally termed capabilities)
from the Bluetooth SIG specifications.
This gives an unambiguous
description of the air interface for specified
services and use cases. Working
groups within the Bluetooth SIG define
these profiles. The Security
Expert Group (BSEG) provides the Bluetooth
SIG and associated working groups
with expertise regarding all aspects
of Bluetooth security.
Security can be defined by four fundamental elements:
Availability, Access, Integrity, and Confidentiality.
The current Bluetooth System
specification defines security at
the link level. Application level security is not specified,
allowing
application developers the
flexibility to select the most appropriate
security mechanisms for their
particular application. The Security
Expert Group focuses on
developing general security architecture
models.