User`s manual

80
Security
Composition of Bluetooth
In the current Bluetooth speci¿cations, the security level is de¿ned to the level of link and the security level of
applications is not de¿ned. Therefore, application developers may de¿ne security mechanisms to meet speci¿c
requirements. The security at the level of applications is implemented per each user, whereas the security at the
level of link is implemented between devices. The Bluetooth speci¿cations de¿ne security algorithms and procedures
necessary to certi¿cate devices and, if necessary, to encrypt the data Àow of link between devices. The certi¿cation of
devices is a fundamental feature of Bluetooth; however, the encryption of link is selective.
The synchronization between Bluetooth devices are performed by generating initialization keys used for link keys
required for certifying devices. Basically, a Bluetooth stack responds without a key when a key is requested (the
response to the key-requesting event is the user
s role). The certi¿cation of Bluetooth devices are based on attempt-
response transactions. In Bluetooth technology, other PIN numbers or passwords used for generating 128 bit keys
for security and encryption can be re-used. Encrypted keys are extracted from the link keys used for certifying
synchronized devices. Also, the constraints in distance and high-speed frequency hopping of Bluetooth wireless
technology make eavesdropping dif¿cult.
Recommendations are as follows:
Synchronization should be conducted under secured environments.
Do not save PIN code at industrial PDA. Store it somewhere else personally.
Implement a security at the level of applications.
Microsoft stack supports smart synchronization. For the details, see Microsoft MSDN.
In principle, CW30 is con¿gured to use Microsoft Bluetooth stack.
The available services via Microsoft Bluetooth stack is listed in Table 6-1.
[Table 6-1. Bluetooth services]
Microsoft Bluetooth Stack
OBEX Object Push Services
Hands-Free Audio Gateway Services
Serial Port Services
Personal Area Networking Services
PBAP Services
Dial-Up Networking Services
HID Client Services
A2DP/AVRCP Services