Security; Bluetooth Configuration - Motorola MC31XX Series User Manual

Mc31 series
Hide thumbs Also See for MC31XX Series:
Table of Contents

Advertisement

3 - 2
MC31XX Series Mobile Computer User Guide
NOTE It is not recommended to perform Bluetooth wireless technology inquiry when high rate 802.11b operation is
required.

Security

The current Bluetooth specification defines security at the link level. Application-level security is not specified. This
allows application developers to define security mechanisms tailored to their specific need. Link-level security
occurs between devices, not users, while application-level security can be implemented on a per-user basis. The
Bluetooth specification defines security algorithms and procedures needed to authenticate devices, and if needed,
encrypt the data flowing on the link between the devices. Device authentication is a mandatory feature of Bluetooth
while link encryption is optional.
Pairing of Bluetooth devices is accomplished by creating an initialization key that is used to authenticate the
devices and create a link key for them. Entering a common PIN number in the devices being paired generates the
initialization key. The PIN number is never sent over the air. By default, the Bluetooth stack responds with no key
when a key is requested (it is up to user to respond to the key request event). Authentication of Bluetooth devices
is based-upon a challenge-response transaction. Bluetooth allows for a PIN number or passkey that is used to
create other 128-bit keys used for security and encryption. The encryption key is derived from the link key used to
authenticate the pairing devices. Also worthy of note is the limited range and fast frequency hopping of the
Bluetooth radios that makes long-distance eavesdropping difficult.
Recommendations are:
Perform pairing in a secure environment
Keep PIN codes private and don't store the PIN codes in the mobile computer
Implement application-level security.
The Microsoft stack supports Smart-pairing. For detailed information, refer to the Microsoft MSDN.

Bluetooth Configuration

By default, the MC31XX is configured to using the Microsoft stack. Refer to the MC31XX Series Mobile COmputer
Integrator Guide, for information on switching between the Microsoft Bluetooth stack and the StoneStreet One
Bluetooth stack.
If the MC31XX is configured to use the StoneStreet One Bluetooth stack, the Bluetooth icon appears at the bottom
right corner of the Today screen on Windows Mobile devices and in the Status bar for WinCE devices. If the
Microsoft Bluetooth stack is configured, the Bluetooth icon does not appear.
Bluetooth Icon
Figure 3-1
Table 3-1
list the services supported by the StoneStreet One Bluetooth stack and the Microsoft Bluetooth stack.
Bluetooth Icon

Advertisement

Table of Contents
loading

This manual is also suitable for:

Mc3100rMc3100sMc3190gMc3190rMc3190s

Table of Contents