Infrared, Bluetooth, and NFC Facts Flashcards
Bluetooth
is designed to allow devices to communicate within a personal area network (PAN) of close proximity.
examples of pan devices are:
-cell phones
-personal digital assistants (PDAs)
-printers
-mice
-keyboards
Bluetooth:
-is designed for longer distances than infrared (IR) and has lower power consumption.
-requires that devices are in discovery mode to find each and synchronize.
-operates in the 2.4 GHz range and uses adaptive frequency hopping (AFH).
-by using AFH, Bluetooth can automatically detect other devices in the area and avoid the frequencies used by those devices.
-it can switch between 79 channels to avoid interference.
-uses a 128-bit proprietary encryption mechanism to encrypt signals.
The range of a Bluetooth is determined by its class:
-Class 1 devices can transmit up to 100 meters.
-Class 2 devices can transmit up to 10 meters.
-Class 3 devices transmit at a range less than 10 meters.
Bluetooth v1
Operates at a range of 10 meters and speeds up to 1 Mbps.
bluetooth v2
Operates at a range up to 30 meters and speeds up to 1 Mbps.
A special mode called Enhanced Data Rate (EDR) enables transfer rates up to 3 Mbps.
bluetooth v3
-Operates at a range up to 30 meters and speeds up to 1 Mbps.
-A special mode known as High Speed (HS) allows the Bluetooth device to use a nearby 802.11 link to achieve speeds up to 24 Mbps.
bluetooth v4
-Operates at a range up to 60 meters and speeds up to 1 Mbps (24 Mbps when using High Speed mode).
-Version 4.0 introduced the Bluetooth Low Energy (BLE) standard.
-BLE reduces the power consumption of Bluetooth devices.
bluetooth v5
-Operates at a range up to 240 meters and speeds up to 2 Mbps (48 Mbps when using High Speed mode).
-Bluetooth 5 improves the performance of BLE devices.
-It also introduced the dual audio feature which allows audio to play simultaneously on two connected devices.
The process of connecting two Bluetooth devices is called:
pairing
Bluetooth uses a typical client/server relationship between two devices. The client (peripheral) device connects to the server (central) device.
For example, headphones (client) connect to a phone (server).
facts
Bluetooth devices use a protocol called _____ to perform the pairing process and exchange data.
Object Exchange (OBEX)
RFID (Radio Frequency Identification)
uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
There are two types of RFID tags:
-Active RFID
-Passive RFID
_____ RFID tags have on-board batteries and can send signals over a long distance. Toll passes in vehicles use active RFID.
Active
_____ RFID are not powered and rely on the energy transferred by the scanner to transmit data. ID badges, credit cards, and similar devices use these tags.
Passive
RFID systems are vulnerable to various kinds of attacks, including:
-Eavesdropping
-On-path attack
-Denial of service
-Cloning and spoofing
An attacker uses an RFID reader to listen to conversations between a tag and the intended reader.
Eavesdropping
An attacker intercepts a signal from an RFID tag and manipulates the signal before sending it to the intended recipient. This kind of attack is frequently used to take down a system.
On-path attack
An attacker blocks radio signals or jams the system with interfering noise.
Denial of service
An attacker creates a copy of an existing tag, then uses the fake tag to gain access to a secure system.
Cloning and spoofing
To protect against these attacks, RFID chips often operate at different frequencies. This makes it more difficult for an attacker to find and scan them. (true/false)
true
NFC (near field communication)
-is a newer technology that is built on RFID
- allows two-way communication between two devices that are within 2 inches of each other
facts about NFC: (1/3)
-NFC operates in the 13.56 MHz frequency. It has a maximum transmission speed of 424 Kbps.
-Special chips called NFC chips can send, receive, and store data.
facts about NFC: (2/3)
Devices using NFC operate in one of three modes:
-Reader/writer mode is used to read information stored on an NFC chip.
-Peer-to-Peer mode enables two devices to communicate and exchange information.
-Card Emulation mode enables the device to function as a smart card to perform contactless payment or ticketing. This mode is typically used by smart phones.
facts about NFC: (3/3)
Data transmissions can be secured by using encryption algorithms.
To connect two devices: (1/5)
1) The client device is put in discoverable mode. This means that other nearby Bluetooth devices can see the device.
To connect two devices: (2/5)
2) The server device sees the client device and sends a pairing request to begin the pairing process.
To connect two devices: (3/5)
3) A security passkey is exchanged between the two devices to confirm the correct devices are being paired. The passkey can be pre-programmed or manually created depending on the devices being paired.
To connect two devices: (4/5)
4) If the passkey matches, the two devices are paired.
To connect two devices: (5/5)
5) Once paired, the devices remember each other and automatically connect in the future. The pairing process does not need to repeat.