Page 13 - WIRELESS TECHNOLOGIES- BLUETOOTH AND WI-FI
P. 13

Fig A.3.4 Bluetooth Pairing

               Once the Bluetooth pairing has been established it is remembered by the devices, which can then
               connect to each without user intervention.

               If necessary, the Bluetooth pairing relationship may be removed by the user at  a later time if
               required.




               A.4 Bluetooth Security


               In any wireless networking setup, security is a concern. Devices can easily grab radio waves out
               of  the  air,  so  people  who  send  sensitive  information  over  a  wireless  connection  need  to  take
               precautions to make sure those signals aren't intercepted. Bluetooth technology is no different --
               it's wireless and therefore susceptible to spying and remote access, just like WiFi is susceptible if
               the network isn't secure. With Bluetooth, though, the automatic nature of the connection, which
               is a huge benefit in terms of time and effort, is also a benefit to people looking to send you data
               without your permission.


               Bluetooth signals can be picked up by anyone within range some sort of cryptography has to be
               used to make sure that your data remains private. The only advantage that Bluetooth has over
               other wireless technologies, such as WiFi networking, is that its shorter range means that you
               should be able to see any potential eavesdroppers!

               Bluetooth has three security modes:


                     Mode 1 is no security at all. In this mode  the device accepts any connections that are
                       offered to it.

                     Mode 2 delegates the security to the application. The connection is made and then the
                       application software decides what to do with it.
   8   9   10   11   12   13   14   15   16   17   18