What is Bluetooth?
To understand the architecture of Bluetooth first lets understand what actually Bluetooth is. Bluetooth is a radio-wave technology that is mainly designed to enable wireless communications over short distances. The frequency of these waves ranges between 2.400 and 2.485 GHz, which can extend a maximum of 164 feet between two devices. Every Bluetooth device has a Transmitter and a Receiver. The power of the device transmitter governs the range over which a Bluetooth device can operate in other words transmitter decides the range of communication.
These days Bluetooth is the common technology present in most of the products. It is used in many fields such as the health sector, sports and fitness, electronics, home automation, and security, etc.
Some of the applications of Bluetooth:
–> Wireless control and communication between a mobile phone and a handsfree headset.
->Wireless communication between a smartphone and a smart lock for unlocking doors.
–> For low bandwidth applications where higher USB bandwidth is not required and cable-free connection desired.
–> For example, Smartwatches, Smart Lights.
How does it work?
Architecture of Bluetooth has two network types :
Piconet
The Bluetooth network is called a piconet. If it contains one master and one slave then its called a single piconet. Similarly, if it contains one master and multiple slaves are called multiple piconets.
The Master is the one that initiates the communication with other devices and it dictates when a slave device may transmit.
Direct Slave to Slave communication is not possible.
Maximum 7 active slaves can be present in multiple piconets, in other words, only 8 maximum devices including the master can communicate at any one time in a piconet.
Scatternet
Its a Combination of multiple piconets.
Here Master of one piconet can be a slave in another piconet. This node can receive a message from a master in one piconet and deliver the message to its slave into the other piconet.
Therefore, this type of node is referred to as a bridge node. Above all, a station cannot be master in two piconets.
The Architecture of a Bluetooth IoT Application
Firstly, we must first dive into the Bluetooth “stack” to understand why recent shifts in Bluetooth standards are significant for IoT applications The evolution of Bluetooth from a replacement for RS-232 data cables to a powerful and massive IoT connectivity solution is a story of adding new layers to the stack. The newest Bluetooth specification for IoT—Bluetooth mesh—must be engineered upon either the BLE 4.xx or 5.xx stack—an extension of the Bluetooth Core (“classic”) specification. The emerging Bluetooth mesh stack, therefore, comprises three-stack layers: Core, then BLE, and mesh on top.
Bluetooth Topologies: Pair, Broadcast, Mesh
https://www.bluetooth.com/blog/introducing-bluetooth-mesh-networking/
- Pair: Bluetooth as a means of pairing two devices
- For Example, a computer paired with a wireless mouse
- Broadcasting: Bluetooth as a means of having one device broadcast information to many devices or vice versa
- For Example: Playing music on smart speakers and simultaneously casting photos to a projector—both using a single iPhone
- Mesh: Bluetooth as a way of connecting many devices to many others as if in a spider’s web
- For Example: Connecting 1,278 overhead lights in a warehouse to each other to dim and brighten lights automatically based upon activity and personal preferences.
Bluetooth Protocol Types
The main function of the Bluetooth is a Bluetooth protocol stack in architecture of bluetooth . In other words, It defines and provides different types of layers and functionalities. Bluetooth can run the different applications over different protocol stacks, but, each one of these protocol stacks uses the same Bluetooth link and physical layers.
The below diagram shows a complete Bluetooth protocol stack. It shows the relationship between the protocols that use the services of other protocols when there is a payload to be transferred in the air. Anyhow, the protocols have many other relationships between the other protocols – for example, some protocols (L2CAP, TCS Binary) use the LMP to control the link manager.
The complete protocol stack architecture of Bluetooth is made up of both Bluetooth specific protocols like object exchange protocols (OBEX) and user datagram protocol (UDP).
The main principle is to minimize the reuse of current protocols for different purposes at higher layers as if re-inventing circle once again. The protocol re-use is helpful for the legacy applications to work with the Bluetooth technology to measure the smooth operations and interoperability of applications. Hence, many applications are being developed to take immediate advantage of the software and hardware.
Protocol layers | Protocol in the stacks |
---|---|
Bluetooth Core Protocol | Baseband, LMP, L2CAP, SDP |
Cable Replacement Protocol | RFCOMM |
Telephony Control Protocol | TCS Binary, AT- commands |
Adopted Protocols | PPP, OBEX, UDP/TCP/IP, WAP, Vcard, Vcall, IrMC, WAE |
Layers of Architecture of Bluetooth :
Host Controller Interface | A command interface for the controller and for the link manager, which allows access to the hardware status and control registers. |
Logical Link Control and Adaptation Protocol | It is also known as the heart of the Bluetooth protocol stack. It allows the communication between the upper and lower layers of the Bluetooth protocol stack. |
Radio (RF) layer | It performs modulation/demodulation of the data into RF signals. |
Baseband Link layer | In short, it performs the connection establishment within a piconet. |
SDP layer | It is short for Service Discovery Protocol. It allows for discovering the services available on another Bluetooth enabled device. |
WAP | It is short for Wireless Access Protocol. It is used for internet access. |
TCS | It is short for Telephony Control Protocol. It provides a telephony service. |
Application layer | In short , it enables the user to interact with the application. |
Advantages of Bluetooth Protocols
- Bluetooth offers economic wireless solutions (both data & voice) but, for short distances
- On the other hand, Mobile and stationary environment use Bluetooth protocol.
- There is no setup file to install the Bluetooth, in other words, it is an inbuilt device.
- Above all, They are up-gradable
Characteristics of Bluetooth Protocols
- In short, Up to eight devices including the master can communicate in the Piconet by using Bluetooth.
- Bluetooth signals are Omnidirectional as a result devices don’t point at each other.
- Governments regulated worldwide because it is possible to utilize the same standard.
- In short , Signals can transmit through walls and briefcases.
Bluetooth Security
Firstly, the security of any wireless technology is very important. With hackers gaining access to an ever-increasing number of systems, as a result,Bluetooth security is increasingly important.
Bluetooth security must also address more specific Bluetooth related attacks that target known vulnerabilities in Bluetooth implementations and specifications. In other words, these may include attacks against improperly secured Bluetooth implementations which can provide attackers with unauthorized access.
Many users may not believe there is an issue with Bluetooth security, but hackers may be able to gain access to information from phone lists to more sensitive information that others may hold on Bluetooth enabled phones and other devices.
Firstly, there are three basic means of providing Bluetooth security:
- Authentication: In this process, that is to say,the identity of the communicating devices is verified. But ,user authentication is not part of the main Bluetooth security elements of the specification.
- Confidentiality: In Short, this process prevents the information from being eavesdropped by ensuring that only authorized devices can access and view the data.
- Authorization: This process prevents access by ensuring that a device is authorized to use a service before enabling it to do so.
Common Bluetooth security issues
- Bluejacking: In short, Sending spam messages to discoverable Bluetooth enabled devices. However, this form of hacking is harmless. In short, the best way to defend against it is to keep Bluetooth settings to invisible or non-discoverable.
- Bluesnarfing: It is more serious than bluejacking because it can reveal private information on a smartphone and is capable of happening even when invisible/non-discoverable mode is enabled.
- Bluebugging: In short, it’s capable of accessing all the information such as photos, apps, contacts, etc. It’s more dangerous than bluejacking and bluesnarfing.
In Conclusion, Some prevention tips for Bluetooth hacks are to set invisible mode. Therefore, makes it more difficult for hackers to gain access to your data. Lastly, stay awake from the open Wi-Fi networks in busy or untrusted locations, so that you can minimize the risk of falling victim to hackers.