Page 13 - WIRELESS TECHNOLOGIES- BLUETOOTH AND WI-FI
P. 13
Fig A.3.4 Bluetooth Pairing
Once the Bluetooth pairing has been established it is remembered by the devices, which can then
connect to each without user intervention.
If necessary, the Bluetooth pairing relationship may be removed by the user at a later time if
required.
A.4 Bluetooth Security
In any wireless networking setup, security is a concern. Devices can easily grab radio waves out
of the air, so people who send sensitive information over a wireless connection need to take
precautions to make sure those signals aren't intercepted. Bluetooth technology is no different --
it's wireless and therefore susceptible to spying and remote access, just like WiFi is susceptible if
the network isn't secure. With Bluetooth, though, the automatic nature of the connection, which
is a huge benefit in terms of time and effort, is also a benefit to people looking to send you data
without your permission.
Bluetooth signals can be picked up by anyone within range some sort of cryptography has to be
used to make sure that your data remains private. The only advantage that Bluetooth has over
other wireless technologies, such as WiFi networking, is that its shorter range means that you
should be able to see any potential eavesdroppers!
Bluetooth has three security modes:
Mode 1 is no security at all. In this mode the device accepts any connections that are
offered to it.
Mode 2 delegates the security to the application. The connection is made and then the
application software decides what to do with it.