Bluetooth Security Training

Bluetooth Security Training

Print Friendly, PDF & Email

Introduction:

Bluetooth Security Training Workshop – Hands-on

Bluetooth is a short range wireless technology used for applications such as Wireless Personal Area Networks (WPAN), Smart Homes, and Internet of Things (IoT). In this comprehensive four-day Bluetooth Course: Operation, Security, Applications, Coexistence session, you will acquire in-depth knowledge of all aspects of Bluetooth, including the technology, security, applications, and coexistence issues.

Duration: 4 days

Bluetooth Security Training – RESOURCES:

  • Bluetooth Security Training Guide by Madhusanka Liyanage , Ijaz Ahmad, et al
  • Bluetooth Security Training Guide by Patrick Marsch , Ömer Bulakci, et al.
  • Bluetooth Security Training Guide by Erik Dahl

Bluetooth Security Training – Related Courses

  • We can adapt this Bluetooth Security Training Workshop course to your group’s background and work requirements at little to no added cost.
  • If you are familiar with some aspects of this Bluetooth Security Training Workshop, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Bluetooth Security Training Workshop around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Bluetooth Security Workshop course in manner understandable to lay audiences.

Bluetooth Security Training Workshop – Audience/Target Group

The target audience for this Bluetooth Security Workshop course:

  • This Bluetooth course is for wireless system designers, developers, implementers, and others who require an in-depth understanding of the Bluetooth technology.

Bluetooth Security Training – Class Prerequisites

The knowledge and skills that a learner must have before attending this Bluetooth Security course are:

  • Prior familiarity with wireless networks.

Bluetooth Security Training – Course Syllabus

Part 1:  Bluetooth Overview

  • Bluetooth usage model and protocol stack
    • Categories of information transmission
    • Short range wireless features
    • Bluetooth protocol stack: Host and controller

Part 2: The Bluetooth Radio

  • Propagation and ranging
    • RF modeling in indoor environments
    • Calculating maximum range
    • Eavesdropping vulnerability
  • Modulation and radio performance
    • Frequency hopping spread spectrum and Bluetooth channel set
    • Basic rate (BR) and enhanced data rate (EDR) modulation
    • Low Energy (LE) modulation
    • Radio performance

Part 3: Baseband Signaling I

  • BR/EDR functional operation
    • Master/slave timing
    • Automatic Repeat Request (ARQ)
    • Addressing methods
    • Packet structure
    • Error control
    • Frequency hop parameters
    • Logical transport
    • Throughput in perfect and imperfect channels

Part 4: Baseband Signaling II

  • Bluetooth audio
    • Methods of voice encoding
    • SCO and eSCO packet structure and performance
    • SCO vs ACL for wireless audio
  • BR/EDR device discovery, connection, and low-power modes
    • Operational state diagram
    • Paging and inquiry processes
    • Sniff, hold, and park modes
    • Scatternet operation
  • LE baseband operation
    • State diagram
    • Addressing
    • Packet structure
    • Advertising, initiating, and connecting operation
    • Data channel and packet exchange

Part 5: Link Management

  • Overview of Link Management Protocol (LMP)
  • Link management operations
    • Link connection and detachment
    • Maintaining the link
  • LMP packets and examples
    • Link setup
    • Link control

Part 6: Higher Protocols

  • Logical Link Control and Adaptation Protocol (L2CAP)
    • L2CAP overview and purpose
    • Protocol multiplexing and channel definitions
    • L2CAP signaling and channel setup
  • Service Discovery Protocol (SDP)
    • Client-server interaction
    • Service record and attributes
  • LE Attribute Protocol (ATT)
    • ATT operation on attributes
    • ATT retrieval
  • Host Controller Interface (HCI)
    • HCI overview and purpose
    • Summary of commands and events
    • HCI over USB transport example

Part 7: Profiles

  • Profile purpose and interaction
  • Generic Access Profile (GAP)
    • Purpose
    • BR/EDR operational modes
    • LE functions and roles
  • Headset Profile (HSP) and Handsfree Profile (HFP) [BR/EDR]
    • Fundamentals
    • Connections and usage
    • HSP and HFP comparison
  • Advanced Audio Distribution Profile (A2DP) [BR/EDR]
    • Protocol stack
    • Streaming process
    • A2DP and HSP comparison
  • LE profile examples
    • Generic Attribute (GATT) Profile
    • Find-Me Profile (FMP)

Part 8: Security

  • Overview
  • Shared and Public Key cryptography
  • Attack methods
  • Summary of legacy security
    • Link key generation and initialization
    • Combination key derivation
    • Authentication
    • Encryption
  • Secure Simple Pairing

Part 9: Qualification and Test

  • Qualification
    • Requirements
    • Program overview
    • Types of Bluetooth products
    • Steps to qualification
  • Testing
    • Development tools
    • Component test mode
    • Examples of devices and performance

Part 10: Coexistence

  • Coexistence overview
    • Bluetooth and Wi-Fi signal spectra
    • Interference modeling
  • Bluetooth-on-Bluetooth coexistence
    • Range of vulnerability
    • Simulation analysis
  • Bluetooth and Wi-Fi coexistence
    • Separated nodes
    • Collocated nodes
    • Examples and throughput analysis
  • Improving coexistence and interference mitigation

Request More Information

    Time frame:

    0