Bluetooth Connection GFSK

Bluetooth was originally formed by the following five entities:
The initial five have grown to well over a thousand companies at this point and the number is increasing. Though Bluetooth is not quite as popular as 802.11, there are number of applications for a wide array of divergent wireless devices.
For interesting background where exactly Bluetooth get its name? Contrary to what your dentist might think it is not from eating blueberries. The actual origin of this term is formed from a tenth century Scandinavian king whose name was HARALD BLUETOOTH. The connection is that in his real life he managed to unite several disparate kingdoms under one area. The idea was to make Bluetooth encompass a kingdom of different devices and to create a convergence of many different devices under the umbrella of one global specification.
Bluetooth wireless is an open specification for a low-cast , low power, short-range radio technology for ad hoc wireless communication of voice and data any where in the world. Let’s examine each of these attributes
An open specification means that the specification is publicly available and royalty free
Short range radio technology means device can communicate over the air using radio waves at a distance of 10 meters. With higher transmission power the range increases to approximately 100 meters.
Because communication is with in a short range, the radios are low power and are suited for portable, battery-operated devices.
Bluetooth wireless technology supports both voice and data, allowing devices to communicate either type of content
2.1 Modulation Introduction
Bluetooth uses Gaussian frequency shift keying (GFSK). More explicitly, Bluetooth 0.5 BT Gaussian filtered frequency shift keying (2FSK) also referred to as binary frequency shift keying (BFSK) at one M symbols/s with a channel spacing of 1MHz. Since only two frequencies are used one bit is one symbol (i.e. one indicates a positive frequency deviation (normally 157.5 KHz) from the carrier, and a zero indicates a negative frequency deviation (normally 157.5 KHz) from the carrier).
The figure shows that amplitude versus time as well as constellation diagram plot of 2FSK modulation that is used for Bluetooth. The frequency deviation range is between 140 & 175 KHz.
2.2 Summary of Bluetooth modulation requirements
To receive Bluetooth qualification, a radio must have the following modulation characteristics:

Symbol rate of 1 mega symbols per second (Ms/s), corresponding to a data rate of 1 Mb/s modulation index beta between 0.28 & 0.35
Binary 1 with a positive fd and 0 with a negative fd
Symbol timing better than +20, -20 parts per million (PPM)
Zero crossing error not greater than 1/8 of a symbol period
The fd corresponding to a 1010 sequence to be at least 80 % of fd corresponding to a 00001111 sequence
Minimum fd equal to 115 KHz
Most of the previous modulation characteristics are self explanatory except perhaps the last two. If the modulation index is between 0.28 & 0.35, then equation 3.18 tell us that the corresponding fd must be between 140 & 175 KHz. This can be considered a “steady state” fd for a long sequence of binary ones or zeroes. Due to the ISI inherent in GFSK its possible that fd may not reach its maximum value for a binary sequence that alternates between 1 & 0. The specification requires that fd under these conditions reach at least 115 KHz, which is about 80 % of the minimum steady state fd of 140 KHz.
2.3 Bluetooth Data Rates and Data Packets
The theoretical maximum data rate is 1 Mbps, but due to overhead, the maximum realizable asymmetric data rate is reduced to 723.2 Kbps. This is also a bit misleading because the reverse link has a much lower data rate. The table shows is a summary of the possible data rates for the various packet sizes.
The information is transmitted in a packet in a time slot. Each time slot corresponds to an RF hop frequency. A packet of information can be transmitted in one time slot, three time slots, or five time slots. Naturally, a five slot packet carries more information than a three slot packet, which carries more than a one slot packet. Data high rate (DH) achieves higher data rates by using less error correction in the packets. Data medium (DM) rate achieves a lower bit error rate probability by using more error correction in the packets. A Bluetooth packet is shown in the figure.
2.4 Bluetooth Modulated Signal
A modulated signal can be denoted as:
Where fc is the carrier frequency, T is the bit period, h is the modulation index and x(t) is the input of the modulator. The above equation can be viewed as the output of a voltage controlled oscillator with an input of x(t). In FSK modulation, x(t) is a binary signal whereas in GFSK modulation, the binary signal is first passed through a low pass Gaussian filter to produce x(t). This is shown in below figure.
GFSK modulation is determined by two parameters: the modulation index (h) and the bandwidth of the Gaussian filter. The Gaussian filter is usually characterized by the bandwidth-time product (BT), which is equal to the 3-db bandwidth of the Gaussian filter (B) times the bit period (T).
In Bluetooth the bit rate is 1Mb/s, BT is 0.5 in the modulation index varies from 0.28 to 0.35, the figure above shows the simulated spectrum of a Bluetooth signal.
Note that the well known Gaussian minimum shift keying (GMSK) is a special case of GFSK in the modulation index 0.5.
2.5 Frequency Hopping
The physical connection of Bluetooth uses frequency hopping at 1 MHz hops at the actual carrier is spread spectrum modulated. This is known as frequency hop spectrum and is used to improve immunity from interference – mainly from IEEE 802; WiFi WLAN shares the same spectrum as other users of the ISM band for example transitorily operated microwave ovens.
There is a fundamentally sound reason for this approach. WLANs occupy significantly more bandwidth than 1 MHz and employ SS techniques, in which a pseudo-random code is used to modulate the information transmitted. At the receiver the same pseudo-random code has to be available to de-modulate it successfully called co-relation. As a result, many WLANs using different pseudo codes can transmit simultaneously without mutual interference. The Bluetooth frequency-hop system appears as an un-correlated noise like signal to a WLAN receiver and what is more its signal energy is spread over the entire band of the WLAN by the de-correlated demodulation process. SO in practice mutual interference amounts only to a raised noise floor for both systems. A raise noise floor simply reduces the available carrier to noise and hence reduces the range possible. This is the main effect of mutual interference. An exception can occur when signals are so strong because of the close proximity of the antennas, that they overwhelm a receiver.
Bluetooth frequency rate is chosen to be 1600 hops per second with a 625 us dwell time per hop. The minimum dual time of 625 us corresponds to a single time slot. Part of this hop timing is taken up by the guard time 220 us allowing the hardware based frequency synthesizer time to settle. The transmission channel is derived from the time slots, spread over 79 or 23 frequencies. The frequency hoping scheme uses time division multiplexing (TDMA), as illustrated in the figure, where the frequency step n=1MHz.
2.6 Piconets
A piconet is formed by two or more devices discover each other and begin to communicate. A piconet can have up to eight devices, with one device acting as a master and the rest acting as slsaves. The first device initiates transmission becomes the master, although the specification provides for a master and slave unit to exchange roles. A specific frequency-hopping sequence is used by all devices within each piconet. The figure shows the simplest example of a piconet. In the figure, a cell phone is downloading the address book and telephone number information to the user’s laptop.
In this example the laptop acts as the master. The application software running on the laptop contacts the cell phone when it is within range, and requests that it synchronize its database with the one stored on the laptop.
As stated earlier a single piconet can have up to eight devices. The reason for this limit is simple:
The address is only three bit long. This means that in binary only the value of 0 – 7 can be stored in the address field. The master has no address but zero is reserved for broadcast messages; so the only addresses remaining for use by slaves are 1 – 7. However, a device can participate in two different piconets called a scatternet. The figure shows an example of a larger piconet, in which one master controls multiple slaves in a piconet.

Find Out How Can Help You!
Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.
View our services

You can see that its possible to link various devices in a piconet. You can download digital images from your digital camera to the laptop, use more than one Bluetooth-enabled cell phone to place voice calls and even contact a personal digital assistant PDA to the laptop to exchange information. Another interesting thing to note in this figure is that you can also use a single connection to the internet without having to have a direct cable connection to the modem or broadband connection.
2.7 Scatternets
A device can be master of only one piconet. The device can, at the same time, also be a slave in another piconet that is within range. A slave can also participate in two different piconets that are within its range. However, because the master device determines the hoping pattern used for a piconet, a device cannot be a master of more than one piconet. An example of a simple scatternet is shown in figure.
In this figure, a laptop computer communicates with devices in both piconets. Note that the laptop is a slave in both piconets. It is possible, however, for the laptop to be a master in one piconet and a slave in another (as shown in the figure). When a device is member of two piconets it keeps track of both frequency-hoping patterns and occasionally listens in on the correct frequency on each of the two piconerts so that it can stay in touch with both piconets. A master device transmits a packet to its slaves occasionally to maintain the link, base band on negotiations between the master and its slave devices. Thus, a device that is a member of two piconets must listen for these transmissions (or make them if it’s the master in one piconet) within the time frame negotiated for each of the piconets of which it is member. The above explanation can be understand better with the below figure.
Bluetooth transmitter consists of

3. Advantages and Disadvantages of Bluetooth
The main advantage of Bluetooth is its compact form and portability. This technology can be manufactured cheap and can be integrated to micro-levels easily. Bluetooth signals are very resistant to weather conditions and can often operate where other technologies may fail. Despite its short range the technology can be very effective and cheap where long distance coverage is not required. In modern hardware Bluetooth is being used widely. Almost all platforms are benefiting from its cheap production such as cell phones, gaming consoles, computer peripheral devices etc. Even computers can achieve LAN connectivity using Bluetooth. Another great feature of this technology is its less power consumption.
The only disadvantage of this technology is perhaps its short range and limited connections i.e. only up to eight devices can connect be connected simultaneously.
4. Conclusion
The main aims of Bluetooth are to provide universal radio interference for ad hoc wireless connectivity at low cost, delivering modest speed (1-3Mbps) short range (1-100M) and low power consumption.
Bluetooth is a very powerful tool. This technology has proven to be very cost effective and powerful. Over the years we have seen rapid enhancements in this technology. This technology has replaced the previously famous infrared technology which was dependent on line of sight connections. Through Bluetooth one can achieve an effective data transfer rate and easier connectivity regardless the weather conditions.
1. Kumar Bala C, Klien Paul, Thomson Tin, Thomson J. Timothy; Bluetooth application programming with Java applications
2. Iniewski Krzysztof; Wireless Technologies: Circuit, Systems, Devices
3. Miller Stewart S.; WiFi Security
4. Patrick David, Morrow Robert; Wireless network Co-Existence
5. Ganguly Madushree; Getting Started With Bluetooth
6. Kelly Jod, Schaub Keith B.; Production Testing of RF and System-on-Chip Devices for Wireless
7. Nicholas Randall K., Lekkas Panos C.; Wireless Security: Models, Threats and Solution
8. Golrnie Nada; Coexistance in Wireless Networks: Challenges and System Solutions
9. Prabhu C. S. R., Reddi Prathap A.; Bluetooth Technology and its Applications with Java and J2ME
10. Zolfaghari Ali Raza; Low-Power CMOS Design for Wireless Transceivers
11. Morrow Robert, Laroka James; Demystified: Operation and Use
12. Muller Scott; Upgrading and Repairing Networks
13. Hill Goff; The Cable and Telecommunication Professional References PSTN, IP

The Different Types of Bluetooth Hacking

Bluetooth is a wireless technology which is used to exchange information over short range of distances by making use of short-wavelength radio transmissions. This technology is used in mobile as well as fixed devices. It enables the connection of several devices at the same time.
Given that the Bluetooth has been used for a long time, there exist several flaws in the system. These flaws have been subject to different types of attacks over time, which makes the technology very vulnerable to hacking.
Types of Bluetooth hacking
The first most popular attack on Bluetooth enables devices is Bluejacking. This type of attack enables unknown people to send unwanted messages or electronic business cards to Bluetooth enabled mobile phones. The attackers modify the procedure for card passing so as to make the message to be sent to appear as a business card and then send the business card to a nearby mobile phone which is Bluetooth enabled.
Bluejacking tools are very easy to use and these messages can be shooted in crowdy places for examples in shopping malls. Some people even use the bluejacking technique to send commercial advertisement messages to people passing nearby.
The Bluesnarfing attack is much more damaging to the bluejacking technique as it enables you to wirelessly connect to to Bluetooth enables mobile phones without any knowledge from the owner and copy their the mobile phone’s address book, their sms messages, their call logs and some more advanced features enable you to to update the directory of the mobile by adding new contacts in the mobile phones.
Most bluesnarfing tools are downloaded as JAR files.
The Bluesanrfing technique works like the Bluejacking technique by making use of the exchange of business cards. This exchange is done using the OBEX protocol and enables the Bluetooth machine to connect to the device which needs to be compromised but instead of exchanging a business card, it request for information (the phonebook file, the call logs etc) from the target.

Find Out How Can Help You!
Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.
View our services

The Bluebugging attack is more powerful than the bluejacking and bluesnarfing attacks. It allows the attacker to take complete control of your mobile phone without the user knowing anything about it. They can make phone calls, listen to conversations where the phone is located. Bluesanrfing capabilities also exist in bluebugging tools like copying the phone book and the the phone’s call list.
What factors make the Bluetooth technology vulnerable?

Previous Bluetooth enabled devices contined many flaws.
Users use pins which are short in length and easy to find out.
Users accepting pairing blindly from unknows sources.
Motivated hackers who want to gain valuable information.
People leaving their Bluetooth permanently on.

How to Bluejack

Find a busy place where lots of mobile phones might be, such as shopping centres, trains, bars or cinemas
Create a new entry in your phone’s address book like ‘Hi you’ve been bluejacked’. Attach a picture if you want to.
Search the area for other Bluetooth phones to contact and choose one.
Send your message. They then receive the message, ‘Hi you’ve been bluejacked’.
Keep a look out for when your ‘victim’ gets the message and the puzzled look on their face.

Security Tips to prevent attacks on mobile phones
Enable Passcode Lock on Your phone
The most basic precaution you can take is to enable passcode lock and set it to automatically engage after a brief period of inactivity. By default, a passcode is not required to unlock the phone. Most people would put off this security measure for ease of use and convenience. However, the truth is that once you have it enabled, it becomes second nature and you would not notice any difference. It is recommended that you set a strong passcode. In the event of a physical theft, this will increase the effort required to compromise your phone.

Disable Features That Could Be Accessed Without Entering the Passcode
This would prevent the use of applications from your phone without your knowledge.
Disable geotagging on the phone.
This will prevent attackers find out where you are located.
Erase All the Data Before Return, Repair, or Resale of Your phone.
Erase all confidential information so that attackers cannt retrieve your personal information.
Regularly Update the phone’s Firmware or Operating system.
This will nebale you to get the latest security features for your mobile phones.
Disable Bluetooth When Not in Use
Disabling Bluetooth when not in use will prevent attackers from getting access to you phone when not in use.