NOTE: Free essay sample provided on this page should be used for references or sample purposes only. The sample essay is available to anyone, so any direct quoting without mentioning the source will be considered plagiarism by schools, colleges and universities that use plagiarism detection software. To get a completely brand-new, plagiarism-free essay, please use our essay writing service.
One click instant price quote
Bluetooth Bluetooth technology was originally developed to replace the cable connections and thus giving more flexibility while operating various devices. Initially launched in 1998, the Bluetooth Special Interest Group (SIG) has now attracted more than 2500 member companies 1. Currently the Bluetooth technology is introduced by the three application models. The first model of the Bluetooth usage is the wireless connection of various devices.
A group of devices can also communicate in a temporal network, so-called pico-networking; when Bluetooth enabled devices become widespread a third usage model may be realized, namely Bluetooth networking over access points. There are several solutions to connect devices without the cable. Infrared connection has been known for a certain time. There are certain disadvantages of the infrared communications.
The most important is the short range of operation (a) and (b) the devices should be at sight. The Bluetooth wireless communication is based on a short-range radio technology. The devices can operate at a distance of 10 m and they may not be at sight. The Bluetooth technology may be used for several devices to communicate at a time. For example the Bluetooth may be used for the file exchange at a meeting room. Currently almost all applications of the Bluetooth are restricted by the cable replacement in communication only.
The use of the Bluetooth devices for the networking access is restricted by the limited amount of the devices in the market available to work with the Bluetooth technology. The Bluetooth technology creates a bridge between the mobile communicative devices and computers, laptops etc. The idea is to create a single digital wireless protocol to address end-user problems arising from proliferation of various mobile devices 2. The Bluetooth technology offers the optimum solution in terms of economy for low-to-medium speed connectivity. The Bluetooth has a huge number of applications. There are myriad applications for wireless personal area networks, and there could easily be 1. 5 billion Bluetooth devices by 2005, said Michael Hentschel, Managing Director of Tech Vest Ventures 3.
The spread of the Bluetooth technology is expected to influence the market of the telecommunication devices. The amount of the Bluetooth enabled devices will be growing steadily. The technology opens the new horizons for the cellular phones, laptops, desktop computers. There were a lot of speculations regarding the level of the information security while implementing the Bluetooth technology. The developers of the Bluetooth devices pay special attention to providing the information security.
It is understandable that the technology may be useless if appropriate level of security is not provided. Product developers that use Bluetooth wireless technology in their products have several options for implementing security. There are three modes of security for Bluetooth access between two devices. They are: Security Mode 1: non-secure, Security Mode 2: Service level enforced security and Security Mode 3: link level enforced security 4. Unfortunately, the Bluetooth devices can be accessible as any other computer / network devices by the spammers, hackers etc. Blue jacking is a way of spamming the Bluetooth devices.
Normally the bluejackets can not retrieve data from the device. The bluejackets send some short information, normally personal cards and if the phone owner reacts they ping the phone and if the owner add the contacts of the bluejacket he may receive spam as in regular wireless communication. More dangerous vulnerability that may happen to the Bluetooth devices is blue bugging. The skillful hackers can gain access to data stored on a Bluetooth enabled phone using Bluetooth wireless technology without alerting the phones user of the connection made to the device 5. It is easier to cope with the Bluetooth hackers than with the Internet ones because such hacker should be at a distance of operating the device, i. e. 10 meters.
The manufacturers of the Bluetooth devices upgrade the security of their products and made them resistible to blue bugging and blue jacking. In spite of some disadvantages of the Bluetooth based devices the technology is very promising and the use of it will be growing steadily. Citation Bluetooth Opportunities and Threats from a Market Perspective Jeff Stripp, Ibid Wireless Security Ibid Bibliography Bluetooth Opportunities and Threats from a Market Perspective, available at web retrieved 17. 11. 2005 Jeff Stripp, Bluetooth: Value Adds and Opportunities, available at web retrieved 17. 11. 2005 Wireless Security, available at web retrieved 17. 11. 2005
Free research essays on topics related to: wireless communication, opportunities and threats, information security, wireless technology, short range
Research essay sample on Opportunities And Threats Wireless Communication