As with engineers and administrators whose wired networks provide access to the general public, a very large dose of well-founded paranoia exists in those who want to protect their data as they flow between Bluetooth nodes.There is cause for greater concern when wireless connections are used in establishing peer-to-peer connections, because such communication is easily intercepted. This sentiment has been captured in a statement recently made in the July issue of the technical journal RFDesign,"... any high-school freshman with a scanner and some basic software knowledge can crack a Bluetooth network."
Without considering the implementation of security measures in your product, as outlined in the Bluetooth specification, such beliefs may, in fact, prove very accurate. Presented within this section are very powerful tools that, when properly implemented, can thwart the efforts of those making an attempt to extract information flowing in a completely unprotected public network.
What you need to know before reading this chapter:
■ Bluetooth protocol stack component function
■ Generic access protocol procedures
■ Peer-to-peer protocol connection establishment mechanics
■ Host Controller and Host function
■ Embedded systems programming
■ Familiarity with Bluetooth profiles
Was this article helpful?