
BlueGate 2100
Appendices—A: Intro to BT
July 26, 2001
WIDCOMM, Inc, Proprietary and Confidential
A-3
A
UTHENTICATION
Authentication requires a passkey from the remote device attempting to access the local
device.
An audible and/or visual warning notifies the local operator that a remote device is
attempting to access the system.
The local operator can open a dialog box that provides:
•
Name-level security information—the user-friendly name of the device
attempting access.
•
Device-level security information—the Bluetooth Device Address (BD Addr) of
the device attempting access.
•
The type of access the requesting device is trying to achieve.
•
A place for the local operator to enter a passkey.
The operator of the remote system must enter the identical passkey or access is denied.
If the initial notification is ignored access is denied after a preset timeout.
There is no limit to the number passkeys that may be assigned. Individual remote devices
may be assigned different passkeys for each service provided by the local computer.
For example, John’s PC, BDA 00:00:D0:11:22:33, may be assigned a passkey of “2468”
and granted access to all services on the local computer, or John’s PC can be assigned a
different passkey for each service.
Advantages of authentication
: Stronger security.
Disadvantages of authentication
: Passkeys must be protected.
E
NCRYPTION
The Bluetooth specification allows for encrypted transactions using a key size of up to
128 bits.
Some Bluetooth devices do not support encryption. If a device or service is configured to
use encryption and attempts a connection with a device that does not support encryption
the connection may fail unexpectedly.
Encryption is available when authentication is required.
Advantages of encryption
: Protects against radio frequency snooping.
Disadvantages of encryption
: The receiving unit must also support encryption.
S
ERVICE
L
EVEL
Each Bluetooth service can be selectively disabled. If all Bluetooth services are disabled
the local computer is unable to accept connections from a remote computer.
The local machine can still initiate outgoing connections to other Bluetooth units, but
incoming connections will not be allowed.
Advantages of service level security
: Strong security.
Disadvantages of service level security
: It is non-selective; it shuts out all incoming
Bluetooth connections for a particular service.