Bluetooth Security

The Bluetooth wireless technology provides short range, wireless

connectivity between common devices. Different applications can be

built based on these spontaneous, ad-hoc networks. The security

requirements for Bluetooth applications will vary based on the sensitivity

of the information involved, the market, and the needs of the user. There

are some applications that do not require any security and others which

require extremely high levels of security.  Risk analysis and trade studies

need to be conducted prior to implementing new applications

using Bluetooth wireless technology.

 

 

The Bluetooth wireless technology system contains a set of

profiles. A profile defines a selection of messages and procedures

(generally termed capabilities) from the Bluetooth SIG specifications.

This gives an unambiguous description of the air interface for specified

services and use cases. Working groups within the Bluetooth SIG define

these profiles. The Security Expert Group (BSEG) provides the Bluetooth

SIG and associated working groups with expertise regarding all aspects

of Bluetooth security.

 

Security can be defined by four fundamental elements:

 

Availability, Access, Integrity, and Confidentiality.

 

The current Bluetooth System specification defines security at

the link level.  Application level security is not specified, allowing

application developers the flexibility to select the most appropriate

security mechanisms for their particular application. The Security

Expert Group focuses on developing general security architecture

models.