


Other wireless technologies, including 802.11b, or known as Wi-Fi, Infrared Data Association (IrDA), Ultra- Wideband Radio (UWB), and Home RF are being applied to similar technologies that Bluetooth use with mixed results. Wi-Fi or 802.11 is the most well known technology, excluding Bluetooth, and uses the same radio frequency, which means that they are not compatible as they cause interference with each other. 802.11 is being implemented into universities as well as food and beverage shops where they are being used to identify students and customers. Airports have also taken up the 802.11 technology, with airports all over America, and three of America's most prominent airlines promoting the use of it.
Advantages to Bluetooth
- Use of radio frequency ( The radio waves of Bluetooth, unlike Infra red do not need a clear path)
- Inexpensive costs of the device (The price is cheap and is currently decreasing further)
- Low power use (Phones will not be drained of their battery after using Bluetooth)
- Implemented security measures (Frequency hopping where the frequency will change sixteen hundred times per second to avoid hackers)
- No replacing wires or hassle (No need to go into expense and trouble to replace and look after wires)
- Hands free device, useful if people are driving or are busy, and also keeps radiation away from the brain region - BEST ADVANTANGE
Security - Different Bluetooth attacks
The Snarf attack
Attackers will connect through connect to the device without he user knowing, once in the system sensitive data can be retrieved, such as contacts in phone books, images, messages and personal information.
The Backdoor attack
This attack is a higher concern for Bluetooth uses, as it allows the attacker to set up a trust relationship through the 'pairing' mechanism, but making sure the user can not see the registered paired devices. By doing this the attacker has access to all the data on the device and can also use it to go on the internet without the owner's consent.
The Bluebug attack
The attacker is able to gain the identity of the owner of the device, "Identity theft". The attacker will then be able to make premium priced phone calls, use SMS text messaging and use the internet.