Saturday, July 12, 2025

Understanding Bluetooth Technology

Bluetooth is a ubiquitous wireless communication technology designed to enable short-range data exchange between devices. Introduced in the late 1990s by Ericsson and later standardized by the Bluetooth Special Interest Group (SIG), Bluetooth has become essential in modern computing and communications. From wireless audio streaming and peripheral connectivity to health monitoring and industrial IoT applications, Bluetooth provides a reliable and energy-efficient protocol for device-to-device communication.

This article will examine the core aspects of Bluetooth technology, including its purpose, types of devices that use it, communication ranges based on device classes, frequency and channel utilization, and how devices are configured and connected through dynamic channel selection and pairing.


How Did “Bluetooth” Get Its Name?

The name "Bluetooth" comes from Harald "Bluetooth" Gormsson, a 10th-century Danish king who is known for uniting Denmark and parts of Norway under a single rule—just as Bluetooth technology was intended to unite different communication devices under a common wireless standard.

Historical Background:

  • King Harald earned the nickname "Bluetooth" reportedly because he had a dead tooth that looked blue or dark-colored.
  • The creators of the Bluetooth standard (from companies including Ericsson, Intel, and Nokia) chose the name as a code name during development.
  • It was never intended to be the final brand—but it stuck because it symbolized the goal of unification and interoperability.

Bluetooth Logo:

  • The Bluetooth logo is a combination of two Nordic runes:
    • (Hagall) = H
    • (Bjarkan) = B
  • These are the initials of Harald Bluetooth, blended into a single symbol.

So, in essence, Bluetooth is a tribute to a Viking king known for bringing people together, just as the technology brings different devices together wirelessly.


Purpose of Bluetooth

Bluetooth is designed for low-power, short-range wireless communication. Its key purposes include:

  • Wireless Peripheral Connectivity: Replacing cables for devices like keyboards, mice, printers, and game controllers.
  • Audio Streaming: Connecting wireless headphones, earbuds, and speakers using Bluetooth profiles like A2DP.
  • File Transfer and Data Exchange: Sending files or contact information between phones or computers.
  • Health and Fitness Devices: Enabling communication with fitness bands, heart rate monitors, and smartwatches.
  • Internet of Things (IoT): Connecting sensors and control systems in smart homes and industrial automation.
  • Vehicle Integration: Hands-free calling, audio streaming, and diagnostics in automotive systems.

Types of Bluetooth Equipment

Bluetooth-capable devices fall into many categories across consumer and industrial use cases:

Device Type

Common Examples

Audio Devices

Headphones, speakers, car stereos

Input Devices

Keyboards, mice, game controllers

Wearables

Smartwatches, fitness trackers

Mobile Devices

Smartphones, tablets, laptops

Home Automation

Smart locks, thermostats, lighting systems

Medical Devices

Glucose monitors, pulse oximeters

Industrial Systems

Barcode scanners, data loggers, machinery sensors

These devices use various Bluetooth profiles depending on their function, such as HID (Human Interface Device), HFP (Hands-Free Profile), and GATT (Generic Attribute Profile) for BLE (Bluetooth Low Energy) communication.


Bluetooth Range and Device Classes

Bluetooth range depends on transmission power, antenna design, and interference in the environment. Bluetooth defines device classes that determine the communication range:

Device Class

Maximum Power Output

Approximate Range

Class 1

100 mW (20 dBm)

Up to 100 meters (328 ft)

Class 2

2.5 mW (4 dBm)

Up to 10 meters (33 ft)

Class 3

1 mW (0 dBm)

Up to 1 meter (3 ft)

Bluetooth Low Energy (BLE)

Varies by implementation

Up to 100+ meters (typically ~50 m)

 

  • Class 1 devices are often used in industrial or commercial environments.
  • Class 2 devices are most common in consumer electronics like smartphones and wireless headphones.
  • BLE devices, introduced with Bluetooth 4.0, are optimized for low power and longer range in IoT environments.

But What About Class 3 Bluetooth?

Class 3 Bluetooth devices are the lowest power category of Bluetooth transmitters, with a maximum output power of 1 milliwatt (0 dBm) and an approximate range of up to 1 meter (3 feet). Because of their extremely short range, they are not commonly used in consumer devices today and have largely been replaced by Bluetooth Low Energy (BLE) in most modern applications.

Typical Use of Class 3 Bluetooth

Class 3 Bluetooth was originally intended for:

  • Close-proximity data transfers
  • Cable-replacement for devices in tight spaces
  • Temporary or constrained connections where minimal energy use and short range were desired

Examples of Class 3 Bluetooth Devices

Though rare today, examples of devices that might have used or supported Class 3 Bluetooth include:

Device Type

Use Case

Basic Wireless Mice or Keyboards

Older models intended only for close desktop use

Simple Mobile Phone Headsets

Early-generation Bluetooth mono earpieces

Basic USB Bluetooth Dongles

Budget models for short-range use

Industrial Sensors

Devices designed to transmit data to nearby machinery or controllers only within a couple feet

POS Terminals or Barcode Scanners

Where the device is docked or always close to the receiver (legacy systems)

Why Class 3 is Rare Today

  • BLE has replaced Class 3 for most short-range and low-power applications.
  • The range is too limited for most real-world use cases, especially in a mobile environment.
  • Battery technology improvements and better power management make Class 2 and BLE preferable. 

Bluetooth Frequencies and Channels

Bluetooth operates in the 2.4 GHz ISM (Industrial, Scientific, and Medical) radio band, which ranges from 2.400 GHz to 2.4835 GHz. It shares this frequency with Wi-Fi, cordless phones, and microwave ovens, but uses unique techniques to minimize interference.

Frequency Allocation and Channel Structure

Bluetooth uses frequency hopping spread spectrum (FHSS), which rapidly switches frequencies to reduce interference and eavesdropping.

  • Classic Bluetooth uses:
    • 79 channels (for most regions) spaced at 1 MHz intervals from 2.402 GHz to 2.480 GHz.
    • Hops among these channels up to 1,600 times per second.
  • Bluetooth Low Energy (BLE) uses:
    • 40 channels spaced at 2 MHz intervals from 2.402 GHz to 2.480 GHz.
    • Of these, 37 are data channels and 3 are advertising channels (used for device discovery and pairing).

Bluetooth Type

Total Channels

Channel Width

Usage

Classic Bluetooth

79

1 MHz

Voice, audio, legacy file transfer

Bluetooth LE

40

2 MHz

Sensor data, IoT, beacon signals

BLE is more energy-efficient and better suited for intermittent, small-packet communications, such as sensor readings or alerts.


Bluetooth Configuration and Channel Selection

Bluetooth setup and operation involve device discovery, pairing, service discovery, and data exchange, with dynamic channel selection for communication.

Step-by-Step Configuration Process

  1. Discovery: Devices enter a discoverable mode using advertising packets (BLE) or inquiry scans (Classic).
  2. Pairing: Devices exchange authentication and encryption information using:
    • Legacy Pairing (PIN code)
    • Secure Simple Pairing (SSP) introduced in Bluetooth 2.1 using ECDH for key exchange
  3. Bonding: Devices remember each other and store encryption keys for future connections.
  4. Service Discovery:
    • Uses SDP (Service Discovery Protocol) for Classic Bluetooth
    • Uses GATT (Generic Attribute Profile) for BLE
  5. Channel Selection:
    • Classic Bluetooth uses adaptive frequency hopping to select channels dynamically based on interference levels.
    • BLE scans the 3 advertising channels first. If a connection is initiated, both devices negotiate a channel map indicating good channels to use.

Bluetooth also uses techniques like AFH (Adaptive Frequency Hopping) to avoid congested or noisy channels. This ensures better coexistence with Wi-Fi networks operating in the same 2.4 GHz band.

 


Bluetooth Security Mechanisms

Bluetooth communication, particularly in sensitive applications like health data, voice, or control systems, must be protected against eavesdropping, impersonation, and tracking. To achieve this, Bluetooth employs several layered security features involving authentication, encryption, key management, and privacy protections.

Authentication Using Device Identity and Pairing Methods

Authentication in Bluetooth is the process of verifying the identity of a connecting device before establishing a trusted connection. It ensures that a device attempting to connect is indeed the one it claims to be.

Key Pairing Methods:

Depending on the Bluetooth version and capabilities of the devices, several pairing methods are used:

Pairing Method

Description

Security Level

Just Works

No authentication or user input; vulnerable to MITM attacks

Low

PIN Code (Legacy)

Devices exchange a 4-digit or 6-digit PIN

Medium

Passkey Entry

User enters or confirms a passkey on both devices

High

Numeric Comparison

Devices display a code that the user must confirm matches

High

Out-of-Band (OOB)

Uses NFC or QR codes to exchange authentication data

Very High

 

Authentication keys are generated during the pairing process and stored to allow future bonding without re-authentication.


Encryption Using AES-CCM for BLE and E0 Cipher for Classic Bluetooth

Once devices are authenticated, they begin encrypting communications to prevent interception or tampering.

Classic Bluetooth:

  • Uses the E0 stream cipher, a proprietary algorithm.
  • It generates a keystream by combining the Bluetooth address, clock, and encryption key.
  • Considered relatively weak by modern cryptographic standards and vulnerable to passive attacks if improperly configured.

Bluetooth Low Energy (BLE):

  • Uses AES-CCM (Counter with CBC-MAC) with a 128-bit key.
    • Combines encryption and integrity checking in one operation.
    • Provides confidentiality, authentication, and integrity.
  • All BLE devices supporting LE Secure Connections must use AES-CCM.

BLE encryption is more secure, efficient, and standards-based than Classic Bluetooth encryption.


Key Management with Support for LE Secure Connections Using Elliptic Curve Diffie-Hellman (ECDH)

Modern Bluetooth implementations (4.2 and later) support LE Secure Connections, a more secure pairing mode.

Key Exchange Process:

  • LE Secure Connections uses Elliptic Curve Diffie-Hellman (ECDH) for public key exchange.
  • Both devices generate ephemeral key pairs, exchange public keys, and compute a shared secret.
  • The shared secret is used to derive session encryption keys.

·         Example Bluetooth Key Exchange:

In LE Secure Connections using ECDH:

1.      Each Bluetooth device generates an ephemeral ECDH key pair.

2.      They exchange public keys over the air.

3.      Each device uses its own private key and the peer’s public key to compute the same shared secret.

4.      That shared secret becomes the basis for session encryption keys.

5.      The ephemeral keys are then deleted once the session is complete.

Benefits of ECDH in LE Secure Connections:

  • Forward secrecy: Even if one session is compromised, previous sessions remain secure.
  • Resistant to Man-in-the-Middle (MITM) attacks when paired with user input (e.g., passkey or numeric comparison).
  • Complies with modern cryptographic standards, suitable for medical and financial applications.

Key Storage:

  • After pairing, keys can be stored and reused (bonding), preventing repeated prompts.
  • Stored keys include:
    • LTK (Long-Term Key) – used to re-establish encryption.
    • IRK (Identity Resolving Key) – used for resolving private device addresses.
    • CSRK (Connection Signature Resolving Key) – used for data signing in unencrypted connections.

Privacy Features Like Random Address Generation in BLE to Prevent Tracking

Bluetooth devices advertise their presence using MAC addresses. Without protections, this can be exploited to track users' physical locations.

BLE Privacy Mechanisms:

  • Random Addressing:
    • Devices use randomly generated MAC addresses instead of their fixed hardware address.
    • These addresses change periodically, making it hard to associate device activity over time.
  • Two types of random addresses:

o    Resolvable Private Address – Can be resolved by trusted devices using the IRK.

o    Non-Resolvable Private Address – Cannot be resolved, used for anonymous interactions.

Real-World Applications:

  • Fitness trackers, smartwatches, and health monitors use random addressing to protect user privacy in public spaces.
  • Prevents unauthorized Bluetooth scanners (e.g., in retail or surveillance environments) from correlating a device with a person.

Summary Table of Bluetooth Security Features

Security Feature

Applies To

Key Technologies

Purpose

Authentication

Classic & BLE

Passkey, OOB, Numeric Comparison

Verify identity

Encryption

Classic & BLE

E0 Cipher (Classic), AES-CCM (BLE)

Confidentiality and integrity

Key Management

BLE 4.2+

ECDH, LTK, IRK, CSRK

Secure session and bonding

Privacy

BLE

Resolvable/Non-Resolvable Private Addresses

Prevent device tracking

 


Wrapping It All Up

Bluetooth has transformed how modern devices interact wirelessly, supporting a broad range of use cases—from hands-free communication and wireless peripherals to fitness tracking, industrial automation, and smart home integration. Operating in the unlicensed 2.4 GHz ISM band, Bluetooth achieves reliable and efficient performance through technologies such as frequency hopping, adaptive channel selection, and energy-efficient modulation schemes, making it ideal for low-power, short-range communication.

This article explored the foundational aspects of Bluetooth technology, including its purpose, the types of equipment it supports, the classes of transmission power that determine its range, and the frequencies and channels over which it operates. It also outlined how Bluetooth devices are configured through discovery, pairing, bonding, and service discovery protocols.

Importantly, as Bluetooth-enabled devices continue to proliferate in both consumer and enterprise environments, ensuring robust security is critical. From device authentication and AES-based encryption to Elliptic Curve Diffie-Hellman key exchanges and privacy-preserving address randomization, modern Bluetooth implementations are equipped with multiple layers of security features. However, these protections must be correctly implemented and regularly updated to prevent vulnerabilities such as unauthorized access, device tracking, and man-in-the-middle attacks.

Understanding the technical capabilities of Bluetooth—along with its security architecture—is essential for IT professionals, developers, and students involved in designing, configuring, or maintaining Bluetooth-based systems. Whether deploying BLE beacons in a retail environment or securing wireless peripherals in a corporate workspace, a firm grasp of Bluetooth fundamentals and its evolving security requirements is key to building resilient and user-friendly wireless solutions.