WO2003017579A1 - Connecting bluetooth devices to each other - Google Patents
Connecting bluetooth devices to each other Download PDFInfo
- Publication number
- WO2003017579A1 WO2003017579A1 PCT/SE2002/001445 SE0201445W WO03017579A1 WO 2003017579 A1 WO2003017579 A1 WO 2003017579A1 SE 0201445 W SE0201445 W SE 0201445W WO 03017579 A1 WO03017579 A1 WO 03017579A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- address
- unit
- addr
- bluetooth
- devices
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5038—Address allocation for local use, e.g. in LAN or USB networks, or in a controller area network [CAN]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/14—Direct-mode setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organising networks, e.g. ad-hoc networks or sensor networks
Definitions
- the present invention relates to a method of connecting Bluetooth compatible or similar devices to each other, to a Bluetooth or similar network and to Bluetooth compatible or similar devices.
- Bluetooth is an open standard for peer-to-peer short distance wireless radio data communication. Bluetooth provides "ad hoc" networking, i.e. Bluetooth compatible units that are within communication distance can spontaneously exchange information with each other.
- a Bluetooth compatible unit is herein taken to mean a unit working in all s respects, as seen from other units, according to the Bluetooth specification.
- a regular Bluetooth unit or a Bluetooth enabled is herein taken to mean a unit working totally according to the Bluetooth specification.
- a regular Bluetooth or Bluetooth enabled unit is obviously always a Bluetooth compatible unit.
- Bluetooth compatible units can be used for replacing a cord between two objects o with wireless communication.
- Bluetooth compatible units can also spontaneously establish small networks, piconets, including up to eight units.
- One of the units is assigned the role of "master” of the piconet and the others are “slaves” .
- the slaves communicate with each other via the master.
- Communication can be established between Bluetooth compatible units that belong to different piconets, either through so called “scatternets", 5 ad hoc peer-to-peer communication between overlapping piconets, or by connecting the piconets to a computer network spanning larger geographic distances and having capacity for more users, e.g. a LAN - purely local or connected to the Internet.
- Bluetooth is frequently suggested as a solution for the last yards of the mobile Internet, closest to the user terminals. 0 Privacy problem
- each Bluetooth enabled unit has a unique Bluetooth device address, BD ADDR.
- the BD ADDR is used for setting up the links and for communicating between the units. It is used from basic levels and upwards in the protocol stack. For 5 example it determines the sequence of frequency hops in the radio communication between units and is used when producing keys for encrypted data communication.
- This unique address is a threat to privacy, because BD_ADDR is visible for all Bluetooth compatible units within communication distance.
- a Bluetooth compatible unit for protecting privacy. It deviates from the Bluetooth specification by not having a unique Bluetooth address BD ADDR. Instead, it may choose its address from a group of BD_ADDR addresses. The unit switches its BD_ADDR from time to time, thus preserving privacy. s Therefore, the suggested Bluetooth compatible unit having address switching facilities does not fully comply with the Bluetooth standard. However, it will still be capable of communicating without any conflict with units following the Bluetooth standard. No Bluetooth compatible unit is capable of distinguishing between a Bluetooth compatible unit using address switching and a regular Bluetooth unit at any given o moment.
- Fig. 1 is diagram of a network formed according to the Bluetooth specification
- - Fig. 2 is a picture illustrating the standard format of a packet according to the 5 Bluetooth specification
- FIG. 3 is a picture illustrating the format of an FHS packet
- - Fig. 4 is diagram of a Bluetooth compatible device having address switching means
- FIG. 5 is a block diagram of an address switching unit to be used in a Bluetooth compatible device.
- a device adapted to communicate according to the Bluetooth specification generally includes a radio unit, a link control unit and a support unit for link management and host 5 terminal interface function.
- Point-to-point and point-to-multipoint connections can be provided.
- the radio band is shared by several units.
- the units form a small network called a piconet, see Fig. 1. Within such a piconet a unit can be a master or a slave. Within each piconet there may be only one master and up to seven active slaves. o
- Each unit adapted to communicate according to the Bluetooth specification has a globally unique 48-bit IEEE 802 address.
- BD_ADDR Bluetooth unit Address
- A_ADDR Active Member Address
- a standard packet has a field for an access code having the length of 72 bits and a header field of a length of 54 bits. There is a field for the pay load which has a length o that can range from zero to a maximum of 2745 bits.
- the AM ADDR is located in the packet header followed by some control parameters, e.g. a bit indicating acknowledgement or retransmission request of the previous packet, when applicable, and a header error check (HEC).
- HEC header error check
- the access code used in a packet can be one of three different types: Channel 5 Access Code (CAC), Device Access Code (DAC), and Inquiry Access Code (IAC):
- CAC Channel 5 Access Code
- DAC Device Access Code
- IAC Inquiry Access Code
- the Channel Access Code identifies a channel that is used in a certain piconet, i.e. essentially the CAC identifies the piconet. All packets exchanged within a piconet carry the same the CAC.
- the CAC is derived from the BD_ADDR of the master unit of the piconet.
- the Device Access Code is derived from the BD ADDR of the particular unit. It is used for special signalling procedures, e.g. the PAGE procedure.
- the Inquiry Access Code appears in two variants: the General Inquiry Access Code (GIAC) and the Dedicated Inquiry Access Code (DIAC), both used in the INQUIRY procedure. 5
- GIAC General Inquiry Access Code
- DIAC Dedicated Inquiry Access Code
- An important property of any ad hoc network such as a network working according to the Bluetooth specification is the neighbour discovery feature.
- the neighbour discovery procedure according to Bluetooth consists of the INQUIRY message and the INQUIRY RESPONSE message.
- An "inquiry" procedure is defined which is used in applications where the device address of the destination is unknown to the source.
- a Bluetooth compatible unit wanting to discover neighbouring Bluetooth units repeatedly transmits INQUIRY messages and listens for INQUIRY RESPONSE messages.
- An INQUIRY message consists of an Inquiry Access Code (IAC). It does not contain any information about the source but may indicate the class of devices which should respond.
- the Inquiry Access Code can be a General Inquiry Access Code (GIAC), which is sent to discover any unit in the neighbourhood, or a Dedicated Inquiry Access Code (DIAC), which is sent to discover only a certain type of units, for which a particular DIAC is dedicated.
- GIAC General Inquiry Access Code
- DIAC Dedicated Inquiry Access Code
- a Bluetooth compatible unit receiving an INQUIRY message may respond by sending an INQUIRY RESPONSE message.
- the INQUIRY RESPONSE message is actually an Frequency Hop Synchronisation (FHS) packet, see Fig. 3.
- the FHS packet is a special control packet revealing, among other things, the transmitting unit and the clock of the transmitting unit.
- the pay load field in such a packet includes eleven fields. All fields in the packet, except the AM ADDR s field, and of course the "Undefined" field, indicate properties or parameters of the unit that sends the FHS packet.
- LAP Lower Address Part
- UAP Upper Address Part
- NAP Non-significant Address Part
- An FHS packet is also used for other purposes according to the Bluetooth specification, in addition to the use as the INQUIRY RESPONSE message, e.g. for a paged master response.
- the PAGE procedure which is used to 5 establish an actual connection between two units.
- the paging unit Once the BD_ADDR of a neighbouring unit is known to a unit, the paging unit, as a result of an INQUIRY procedure, the neighbouring unit can be paged by sending a PAGE message. Also the knowledge of the internal clock value of the unit to be paged will potentially speed up the PAGE procedure, since it makes it possible for the paging unit to estimate when and on which 0 frequency hop channel the neighbouring unit will listen for PAGE messages.
- a PAGE message consists of the Device Access Code (DAC), derived from the BD ADDR of the paged unit.
- DAC Device Access Code
- a unit adapted to communicate according to the Bluetooth specification and receiving a PAGE message including its own DAC responds by sending an identical packet, i.e. including only the DAC of the paged unit.
- the paging unit then 5 replies by sending an FHS packet, including the BD_ADDR of the paging unit, the current value of the internal clock of the paging unit, the AM_ADDR assigned to the paged unit and some other parameters, see Fig. 4.
- the paged unit then responds once again by transmitting its DAC and thereby the connection between the two units is established.
- the paging unit already was the master of a piconet, the paged unit has now joined this piconet as a new slave unit. Otherwise, the two units have just formed a new piconet having the paging unit as the master unit. Since the INQUIRY message does not include any information on the sender thereof, in particular not its BD ADDR, the unit
- the unit initiating an INQUIRY procedure will also be the master of any new piconet that is formed as a result of a subsequent PAGE procedure.
- the BD_ADDR is used i.a. to initially define the participating units, this resulting in a privacy problem.
- the BD_ADDR is also o used in other types of communicated information, at various levels.
- the units can be provided with an address switching function performed by a block 1, called an address switching unit or AS unit, see Fig. 4, incorporated in or added to the usual s Bluetooth circuit 3.
- the address switching unit 1 provides at all instances, when the unit is operative, a valid BD ADDR of the device and it is stored in a register 5 and is used by the Bluetooth circuit 3, e.g. in the INQUIRY and PAGE procedures described above.
- the register 5 is a rewritable, non- volatile memory cell remembering the stored data even when the power is off.
- the BD_ADDR is accessed from the register 5 in the o address switching unit in the same way as for any regular Bluetooth unit.
- the actual BD_ADDR stored in the cell 5 is randomly switched among a set of valid BD_ADDR addresses, thus making it impossible to say which BD ADDR address the unit will use at any randomly selected time.
- an additional memory can be used, not shown, called 5 BD ADDR CLKN, in which the value of the Bluetooth native clock CLKN is stored at each change of BD_ADDR.
- the native clock CLKN is described in the Bluetooth specification 1.1, baseband specification section 10.3. This is for handling the case where there are several interacting address switching devices using the same BD_ADDR at the same time, thus creating interference. In that case, the device that first chooses the 0 BD ADDR will be the one that keeps it, whereas the other will switch BD ADDR.
- the functions for controlling and manipulating the BD_ADDR are performed by a group of circuits, the AS circuit 1, in the hardware, as seen in Fig. 5, or by a software block executed in some processor in the host device of the Bluetooth circuit 3.
- the selecting of a new BD ADDR is started by a block 11, called 5 TRIG SELECT BD ADDR, activating another block 13, SELECT BD ADDR, in which the very selecting is made and the selected BD ADDR is stored in the register 5.
- the selecting block includes a unit 15, RAND, for generating random numbers, and a unit 17, BD ADDR GROUP, which can include a memory in which all possible permitted choices of addresses are stored.
- the address unit 17 can instead or additionally include some function generating the possible addresses from some basic data.
- the BD ADDR of the Bluetooth unit may be changed by the hardware function SELECT_BD_ADDR 13.
- This function uses the random number, created by the block 15, as an argument to select a BD_ADDR from those specified by the block 5 BD ADDR GROUP 17.
- the selecting function can also include a function, not shown, that writes the value of the Bluetooth native clock CLKN into the memory cell BD ADDR CLKN.
- the start of the function 13 SELECT BD ADDR is triggered by the triggering unit 11 , that can be activated by a transition of the unit from the CONNECTION state to the o STANDBY state.
- the triggering unit 11 In the STANDBY state, no connection has been established, see Bluetooth spec. 1.1, sect. 10.7.2, p. 106. Switching the BD ADDR when the unit is in this state will not effect the operation of any other unit, since no other Bluetooth compatible unit is connected.
- the unit may be equipped with a manual switch, not shown, operated by 5 the user, disabling the function 13 SELECT_BD_ADDR. BD ADDR will then remain fixed until the manual switch is set so that SELECT BD ADDR is enabled again.
- the triggering unit TRIG SELECT BD ADDR may also be connected to activate the selecting function 13 when sensing a hard reset of the unit.
- the Reset command may be induced in various manners described in the Bluetooth specification, or o by a manual switch.
- a group of Bluetooth compatible units having address switching units as described above can share a group of BD_ADDR addresses with each other. Then the address switching unit 1 of each of the Bluetooth units of the group will select the temporary BD ADDR from the same group at all times, thus making it impossible to say 5 which Bluetooth compatible unit is using a certain BD ADDR at each moment. In such a group the units share addresses only with each other, thus avoiding BD_ADDR conflicts with regular Bluetooth units.
- the switching of device address is done in such a way that it does not violate the Bluetooth communication protocol of other units at any given time, thus making it 0 impossible for a regular Bluetooth unit to distinguish between a Bluetooth compatible unit having an address switching unit and a regular Bluetooth unit at any time.
- BD_ADDR addresses can be reserved, forming one or several address groups. Each Bluetooth compatible address switching unit is instructed to choose every BD_ADDR only from one such group. Conflict can then arise only if two 5 Bluetooth compatible units having address switching facilities selecting addresses from the same group are in direct communication range of each other and use the same BD_ADDR at the same time. Since the BD_ADDR determines the frequency hopping procedure, they may jam the communication. Other identity conflicts will in principle occur simultaneously on higher levels. But due to the short-range Bluetooth radio communication distances, less than a few hundred meters, the risk of such a conflict can made very small by setting the number of BD_ADDR addresses in an address group some orders of magnitude larger than the largest number of address switching units using the same address group expected to be
- a conflict - however improbable - will be solved when the conflicting address switching devices select new fixed device addresses BD_ADDR or if the communicating devices are programmed to sense the conflict and then trigger a new choice of BD_ADDR.
- Communication may be maximally preserved by offering the o address switching unit that first chose the BD ADDR used by the two units to be the last one to switch away from it, for example by setting the default time limit for each unit before switching BD_ADDR proportional to the time that the BD ADDR has been used by the unit.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE0102758-0 | 2001-08-17 | ||
SE0102758A SE522556C2 (en) | 2001-08-17 | 2001-08-17 | Procedure, wireless ad hoc network and device for connecting Bluetooth devices to each other |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003017579A1 true WO2003017579A1 (en) | 2003-02-27 |
Family
ID=20285059
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SE2002/001445 WO2003017579A1 (en) | 2001-08-17 | 2002-08-09 | Connecting bluetooth devices to each other |
Country Status (2)
Country | Link |
---|---|
SE (1) | SE522556C2 (en) |
WO (1) | WO2003017579A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005032058A1 (en) * | 2003-09-30 | 2005-04-07 | Anders Carlius | Method and arrangement for solving identity conflicts in a network |
US9591684B2 (en) | 2014-06-06 | 2017-03-07 | BBPOS Limited | System and method of bluetooth pairing with a group of bluetooth devices |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6240080B1 (en) * | 1997-08-05 | 2001-05-29 | Nec Corporation | Mobile terminal and method of controlling the same |
WO2001097447A2 (en) * | 2000-06-12 | 2001-12-20 | Telefonaktiebolaget Lm Ericsson (Publ) | Random identity management in scatternets |
US20020025780A1 (en) * | 2000-08-30 | 2002-02-28 | Jakobsson Bjorn Markus | Method and apparatus for ensuring security of users of bluetoothTM-enabled devices |
-
2001
- 2001-08-17 SE SE0102758A patent/SE522556C2/en not_active IP Right Cessation
-
2002
- 2002-08-09 WO PCT/SE2002/001445 patent/WO2003017579A1/en not_active Application Discontinuation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6240080B1 (en) * | 1997-08-05 | 2001-05-29 | Nec Corporation | Mobile terminal and method of controlling the same |
WO2001097447A2 (en) * | 2000-06-12 | 2001-12-20 | Telefonaktiebolaget Lm Ericsson (Publ) | Random identity management in scatternets |
US20020025780A1 (en) * | 2000-08-30 | 2002-02-28 | Jakobsson Bjorn Markus | Method and apparatus for ensuring security of users of bluetoothTM-enabled devices |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2005032058A1 (en) * | 2003-09-30 | 2005-04-07 | Anders Carlius | Method and arrangement for solving identity conflicts in a network |
US9591684B2 (en) | 2014-06-06 | 2017-03-07 | BBPOS Limited | System and method of bluetooth pairing with a group of bluetooth devices |
US10111073B2 (en) | 2014-06-06 | 2018-10-23 | BBPOS Limited | System and method of bluetooth pairing with a group of bluetooth devices |
US10313862B2 (en) | 2014-06-06 | 2019-06-04 | BBPOS Limited | System and method of bluetooth pairing with a group of bluetooth devices |
US10484853B2 (en) | 2014-06-06 | 2019-11-19 | BBPOS Limited | System and method of Bluetooth pairing with a group of Bluetooth devices |
US10863337B2 (en) | 2014-06-06 | 2020-12-08 | BBPOS Limited | System and method of Bluetooth pairing with a group of Bluetooth devices |
Also Published As
Publication number | Publication date |
---|---|
SE0102758D0 (en) | 2001-08-17 |
SE522556C2 (en) | 2004-02-17 |
SE0102758L (en) | 2003-02-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR100877466B1 (en) | Smart scan for bluetooth pan devices | |
US8027324B2 (en) | Self-configuring, self-optimizing wireless local area network system | |
US7602754B2 (en) | Short-range RF access point design enabling services to master and slave mobile devices | |
US7986655B2 (en) | Method for setting up a link between bluetooth devices in a bluetooth system | |
Bhagwat | Bluetooth: technology for short-range wireless apps | |
US7215923B2 (en) | System and method for establishing a connection between wireless devices | |
KR101163080B1 (en) | Method for operating a wireless network | |
JP3884748B2 (en) | High-speed personal wireless network and data transmission method for enabling communication between devices of piconet | |
US20010029166A1 (en) | Intelligent piconet forming | |
JP2009519635A (en) | Distributed Bluetooth system | |
WO2002096062A1 (en) | Method for protecting privacy when using a bluetooth device | |
Khan et al. | Comparison among short range wireless networks: bluetooth, Zig Bee & Wi-Fi | |
EP1586176B1 (en) | Dynamic network formation for wireless adhoc networks | |
US20060052125A1 (en) | Network and terminal for forming an adhoc network by responsive to an inquiry forwarded by a slave terminal, setting up by the master unit a connection with the terminal to be incorporated into the network | |
WO2005067162A1 (en) | A method for reducing radio interference in a frequency-hopping radio network | |
WO2003017579A1 (en) | Connecting bluetooth devices to each other | |
JP3776402B2 (en) | Bluetooth data transmission system having a plurality of sub-terminals (slaves) | |
KR20030087746A (en) | Method and apparatus for communication between two piconets within bluetooth scatternet | |
Ayrault | Service discovery for personal area networks | |
Farkas et al. | Introduction to WLAN IEEE802. 11 Communication on Mobile Devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BY BZ CA CH CN CO CR CU CZ DE DM DZ EC EE ES FI GB GD GE GH HR HU ID IL IN IS JP KE KG KP KR LC LK LR LS LT LU LV MA MD MG MN MW MX MZ NO NZ OM PH PL PT RU SD SE SG SI SK SL TJ TM TN TR TZ UA UG US UZ VC VN YU ZA ZM |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ UG ZM ZW AM AZ BY KG KZ RU TJ TM AT BE BG CH CY CZ DK EE ES FI FR GB GR IE IT LU MC PT SE SK TR BF BJ CF CG CI GA GN GQ GW ML MR NE SN TD TG Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 69(1) EPC |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: JP |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: JP |