Auracast
   HOME

TheInfoList



OR:

Bluetooth is a short-range
wireless Wireless communication (or just wireless, when the context allows) is the transfer of information (''telecommunication'') between two or more points without the use of an electrical conductor, optical fiber or other continuous guided transm ...
technology standard that is used for exchanging data between fixed and mobile devices over short distances and building
personal area network A personal area network (PAN) is a computer network for interconnecting electronic devices within an individual person's workspace. A PAN provides data transmission among devices such as computers, smartphones, tablets and personal digital assi ...
s (PANs). In the most widely used mode, transmission power is limited to 2.5
milliwatt The watt (symbol: W) is the unit of power or radiant flux in the International System of Units (SI), equal to 1 joule per second or 1 kg⋅m2⋅s−3. It is used to quantify the rate of energy transfer. The watt is named in honor o ...
s, giving it a very short range of up to . It employs
UHF Ultra high frequency (UHF) is the ITU designation for radio frequencies in the range between 300 megahertz (MHz) and 3 gigahertz (GHz), also known as the decimetre band as the wavelengths range from one meter to one tenth of a meter ...
radio wave Radio waves (formerly called Hertzian waves) are a type of electromagnetic radiation with the lowest frequencies and the longest wavelengths in the electromagnetic spectrum, typically with frequencies below 300 gigahertz (GHz) and wavelengths g ...
s in the
ISM band The ISM radio bands are portions of the radio spectrum reserved internationally for ''industrial, scientific, and medical'' (ISM) purposes, excluding applications in telecommunications. Examples of applications for the use of radio frequency (RF ...
s, from 2.402
GHz The hertz (symbol: Hz) is the unit of frequency in the International System of Units (SI), often described as being equivalent to one event (or Cycle per second, cycle) per second. The hertz is an SI derived unit whose formal expression in ter ...
to 2.48GHz. It is mainly used as an alternative to wired connections to exchange files between nearby portable devices and connect
cell phone A mobile phone or cell phone is a portable telephone that allows users to make and receive calls over a radio frequency link while moving within a designated telephone service area, unlike fixed-location phones ( landline phones). This radio ...
s and music players with
wireless headphone Headphones are a pair of small loudspeaker drivers worn on or around the head over a user's ears. They are electroacoustic transducers, which convert an electrical signal to a corresponding sound. Headphones let a single user listen to an a ...
s,
wireless speakers Wireless speakers are loudspeakers that receive audio signals using radio frequency (RF) waves rather than over audio cables. The two most popular RF frequencies that support audio transmission to wireless loudspeakers include a variation of Wi ...
,
HIFI High fidelity (hi-fi or, rarely, HiFi) is the high-quality reproduction of sound. It is popular with audiophiles and home audio enthusiasts. Ideally, high-fidelity equipment has inaudible noise and distortion, and a flat (neutral, uncolored) f ...
systems,
car audio Vehicle audio is equipment installed in a car or other vehicle to provide in-car entertainment and information for the occupants. Such systems are popularly known as car stereos. Until the 1950s, it consisted of a simple AM radio. Additions si ...
and wireless transmission between TVs and soundbars. Bluetooth is managed by the
Bluetooth Special Interest Group The Bluetooth Special Interest Group (Bluetooth SIG) is the standards organization that oversees the development of Bluetooth standardization, standards and the licensing of the Bluetooth technologies and trademarks to manufacturers. The SIG i ...
(SIG), which has more than 35,000 member companies in the areas of telecommunication, computing, networking, and consumer electronics. The
IEEE The Institute of Electrical and Electronics Engineers (IEEE) is an American 501(c)(3) organization, 501(c)(3) public charity professional organization for electrical engineering, electronics engineering, and other related disciplines. The IEEE ...
standardized Bluetooth as IEEE 802.15.1 but no longer maintains the standard. The Bluetooth SIG oversees the development of the specification, manages the qualification program, and protects the trademarks. A manufacturer must meet Bluetooth SIG standards to market it as a Bluetooth device. A network of
patent A patent is a type of intellectual property that gives its owner the legal right to exclude others from making, using, or selling an invention for a limited period of time in exchange for publishing an sufficiency of disclosure, enabling discl ...
s applies to the technology, which is licensed to individual qualifying devices. , 4.7 billion Bluetooth
integrated circuit An integrated circuit (IC), also known as a microchip or simply chip, is a set of electronic circuits, consisting of various electronic components (such as transistors, resistors, and capacitors) and their interconnections. These components a ...
chips are shipped annually. Bluetooth was first demonstrated in space in 2024, an early test envisioned to enhance IoT capabilities.


Etymology

The name "Bluetooth" was proposed in 1997 by Jim Kardach of
Intel Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California, and Delaware General Corporation Law, incorporated in Delaware. Intel designs, manufactures, and sells computer compo ...
, one of the founders of the Bluetooth SIG. The name was inspired by a conversation with Sven Mattisson who related Scandinavian history through tales from Frans G. Bengtsson's ''
The Long Ships ''The Long Ships'' or ''Red Orm'' (original Swedish: ''Röde Orm'' meaning ''Red Orm'', lit. ''Red Serpent'' or ''Red Snake'') is an adventure novel by the Swedish writer Frans G. Bengtsson. The narrative is set in the late 10th century and ...
'', a historical novel about Vikings and the 10th-century Danish king
Harald Bluetooth Harald "Bluetooth" Gormsson (; , died c. 985/86) was a king of Denmark and Norway. The son of King Gorm the Old and Thyra Dannebod, Harald ruled as king of Denmark from c. 958 – c. 986, introduced Christianization of Denmark, Christianity to D ...
. Upon discovering a picture of the runestone of Harald Bluetooth in the book ''A History of the Vikings'' by Gwyn Jones, Kardach proposed Bluetooth as the codename for the short-range wireless program which is now called Bluetooth. According to Bluetooth's official website, Bluetooth is the
Anglicised Anglicisation or anglicization is a form of cultural assimilation whereby something non-English becomes assimilated into or influenced by the culture of England. It can be sociocultural, in which a non-English place adopts the English language ...
version of the Scandinavian ''Blåtand''/''Blåtann'' (or in
Old Norse Old Norse, also referred to as Old Nordic or Old Scandinavian, was a stage of development of North Germanic languages, North Germanic dialects before their final divergence into separate Nordic languages. Old Norse was spoken by inhabitants ...
''blátǫnn''). It was the
epithet An epithet (, ), also a byname, is a descriptive term (word or phrase) commonly accompanying or occurring in place of the name of a real or fictitious person, place, or thing. It is usually literally descriptive, as in Alfred the Great, Suleima ...
of King Harald Bluetooth, who united the disparate Danish tribes into a single kingdom; Kardach chose the name to imply that Bluetooth similarly unites communication protocols. The Bluetooth logo is a
bind rune A bind rune or bindrune () is a Migration Period Germanic typographic ligature, ligature of two or more Runic alphabet, runes. They are extremely rare in Viking Age inscriptions, but are common in earlier (Proto-Norse) and later (medieval) inscri ...
merging the Younger Futhark
runes Runes are the Letter (alphabet), letters in a set of related alphabets, known as runic rows, runic alphabets or futharks (also, see ''#Futharks, futhark'' vs ''#Runic alphabets, runic alphabet''), native to the Germanic peoples. Runes were ...
 (ᚼ,
Hagall *Haglaz or *Hagalaz is the reconstructed Proto-Germanic name of the ''h''-rune , meaning "hail" (the precipitation). In the Anglo-Saxon futhorc Anglo-Saxon runes or Anglo-Frisian runes are runes that were used by the Anglo-Saxons and Me ...
) and  (ᛒ, Bjarkan), Harald's initials.


History

The development of the "short-link" radio technology, later named Bluetooth, was initiated in 1989 by Nils Rydbeck, CTO at
Ericsson Mobile (), commonly known as Ericsson (), is a Swedish multinational networking and telecommunications company headquartered in Stockholm, Sweden. Ericsson has been a major contributor to the development of the telecommunications industry and is one ...
in
Lund Lund (, ;"Lund"
(US) and
) is a city in the provinces of Sweden, province of Scania, southern Swed ...
, Sweden. The purpose was to develop wireless headsets, according to two inventions by Johan Ullman, and . Nils Rydbeck tasked Tord Wingren with specifying and Dutchman Jaap Haartsen and Sven Mattisson with developing. Both were working for Ericsson in Lund. Principal design and development began in 1994 and by 1997 the team had a workable solution. From 1997 Örjan Johansson became the project leader and propelled the technology and standardization. In 1997, Adalio Sanchez, then head of
IBM International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
ThinkPad ThinkPad is a line of business-oriented laptop and Tablet computer, tablet computers produced since 1992. It was originally designed, created and manufactured by the American IBM, International Business Machines (IBM) Corporation. IBM Acquisit ...
product R&D, approached Nils Rydbeck about collaborating on integrating a
mobile phone A mobile phone or cell phone is a portable telephone that allows users to make and receive calls over a radio frequency link while moving within a designated telephone service area, unlike fixed-location phones ( landline phones). This rad ...
into a ThinkPad notebook. The two assigned engineers from
Ericsson (), commonly known as Ericsson (), is a Swedish multinational networking and telecommunications company headquartered in Stockholm, Sweden. Ericsson has been a major contributor to the development of the telecommunications industry and is one ...
and
IBM International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
studied the idea. The conclusion was that power consumption on cellphone technology at that time was too high to allow viable integration into a notebook and still achieve adequate battery life. Instead, the two companies agreed to integrate Ericsson's short-link technology on both a ThinkPad notebook and an Ericsson phone to accomplish the goal. Since neither IBM ThinkPad notebooks nor Ericsson phones were the market share leaders in their respective markets at that time, Adalio Sanchez and Nils Rydbeck agreed to make the short-link technology an open industry standard to permit each player maximum market access. Ericsson contributed the short-link radio technology, and IBM contributed patents around the logical layer. Adalio Sanchez of IBM then recruited Stephen Nachtsheim of Intel to join and then Intel also recruited
Toshiba is a Japanese multinational electronics company headquartered in Minato, Tokyo. Its diversified products and services include power, industrial and social infrastructure systems, elevators and escalators, electronic components, semiconductors ...
and
Nokia Nokia Corporation is a Finnish multinational corporation, multinational telecommunications industry, telecommunications, technology company, information technology, and consumer electronics corporation, originally established as a pulp mill in 1 ...
. In May 1998, the Bluetooth SIG was launched with IBM and Ericsson as the founding signatories and a total of five members: Ericsson, Intel, Nokia, Toshiba, and IBM. The first Bluetooth device was revealed in 1999. It was a hands-free mobile headset that earned the "Best of show Technology Award" at COMDEX. The first Bluetooth mobile phone was the unreleased prototype Ericsson T36, though it was the revised Ericsson model T39 that actually made it to store shelves in June 2001. However Ericsson released the R520m in Quarter 1 of 2001, making the R520m the first ever commercially available Bluetooth phone. In parallel, IBM introduced the IBM ThinkPad A30 in October 2001 which was the first notebook with integrated Bluetooth. Bluetooth's early incorporation into consumer electronics products continued at Vosi Technologies in Costa Mesa, California, initially overseen by founding members Bejan Amini and Tom Davidson. Vosi Technologies had been created by real estate developer Ivano Stegmenga, with United States Patent 608507, for communication between a cellular phone and a vehicle's audio system. At the time, Sony/Ericsson had only a minor market share in the cellular phone market, which was dominated in the US by Nokia and Motorola. Due to ongoing negotiations for an intended licensing agreement with Motorola beginning in the late 1990s, Vosi could not publicly disclose the intention, integration, and initial development of other enabled devices which were to be the first "
Smart Home ''SMart'' was a British CBBC television programme based on art, which began in 1994 and ended in 2009. The programme was recorded at BBC Television Centre in London. Previously it had been recorded in Studio A at Pebble Mill Studios in Birming ...
" internet connected devices. Vosi needed a means for the system to communicate without a wired connection from the vehicle to the other devices in the network. Bluetooth was chosen, since
Wi-Fi Wi-Fi () is a family of wireless network protocols based on the IEEE 802.11 family of standards, which are commonly used for Wireless LAN, local area networking of devices and Internet access, allowing nearby digital devices to exchange data by ...
was not yet readily available or supported in the public market. Vosi had begun to develop the Vosi Cello integrated vehicular system and some other internet connected devices, one of which was intended to be a table-top device named the Vosi Symphony, networked with Bluetooth. Through the negotiations with
Motorola Motorola, Inc. () was an American multinational telecommunications company based in Schaumburg, Illinois. It was founded by brothers Paul and Joseph Galvin in 1928 and had been named Motorola since 1947. Many of Motorola's products had been ...
, Vosi introduced and disclosed its intent to integrate Bluetooth in its devices. In the early 2000s a legal battle ensued between Vosi and Motorola, which indefinitely suspended release of the devices. Later, Motorola implemented it in their devices, which initiated the significant propagation of Bluetooth in the public market due to its large market share at the time. In 2012, Jaap Haartsen was nominated by the
European Patent Office The European Patent Office (EPO) is one of the two organs of the European Patent Organisation (EPOrg), the other being the Administrative Council. The EPO acts as executive body for the organisation
for the
European Inventor Award The European Inventor Award (formerly European Inventor of the Year Award, renamed in 2010), are presented annually by the European Patent Office, sometimes supported by the respective Presidency of the Council of the European Union and by the Eur ...
.


Implementation

Bluetooth operates at frequencies between 2.402 and 2.480GHz, or 2.400 and 2.4835GHz, including
guard band In telecommunications, a guard band is a narrow, intentionally unused frequency band that is placed between adjacent frequency bands to minimize interference between them. It is used in frequency-division multiplexing. Guard bands exist in both ...
s 2MHz wide at the bottom end and 3.5MHz wide at the top. This is in the globally unlicensed (but not unregulated) industrial, scientific and medical ( ISM) 2.4GHz short-range radio frequency band. Bluetooth uses a radio technology called
frequency-hopping spread spectrum Frequency-hopping spread spectrum (FHSS) is a method of transmitting radio signals by rapidly changing the carrier frequency among many frequencies occupying a large spectral band. The changes are controlled by a code known to both transmitter ...
. Bluetooth divides transmitted data into packets, and transmits each packet on one of 79 designated Bluetooth channels. Each channel has a bandwidth of 1MHz. It usually performs 1600hops per second, with adaptive frequency-hopping (AFH) enabled.
Bluetooth Low Energy Bluetooth Low Energy (Bluetooth LE, colloquially BLE, formerly marketed as Bluetooth Smart) is a wireless personal area network technology designed and marketed by the Bluetooth Special Interest Group (Bluetooth SIG) aimed at novel applications ...
uses 2MHz spacing, which accommodates 40 channels. Originally,
Gaussian frequency-shift keying Frequency-shift keying (FSK) is a frequency modulation scheme in which digital information is encoded on a carrier signal by periodically shifting the frequency of the carrier between several discrete frequencies. The technology is used for ...
(GFSK) modulation was the only modulation scheme available. Since the introduction of Bluetooth 2.0+EDR, π/4- DQPSK (differential quadrature phase-shift keying) and 8-DPSK modulation may also be used between compatible devices. Devices functioning with GFSK are said to be operating in basic rate (BR) mode, where an instantaneous
bit rate In telecommunications and computing, bit rate (bitrate or as a variable ''R'') is the number of bits that are conveyed or processed per unit of time. The bit rate is expressed in the unit bit per second (symbol: bit/s), often in conjunction ...
of 1
Mbit/s In telecommunications, data transfer rate is the average number of bits (bitrate), characters or symbols (baudrate), or data blocks per unit time passing through a communication link in a data-transmission system. Common data rate units are multi ...
is possible. The term ''Enhanced Data Rate'' (''EDR'') is used to describe π/4-DPSK (EDR2) and 8-DPSK (EDR3) schemes, transferring 2 and 3Mbit/s respectively. In 2019, Apple published an extension called HDR which supports data rates of 4 (HDR4) and 8 (HDR8) Mbit/s using π/4- DQPSK modulation on 4 MHz channels with forward error correction (FEC). Bluetooth is a packet-based protocol with a master/slave architecture. One master may communicate with up to seven slaves in a
piconet A piconet is an ad hoc network that links a wireless user group of devices using Bluetooth technology protocols. A piconet consists of two or more devices occupying the same physical channel (synchronized to a common clock and hopping sequence) ...
. All devices within a given piconet use the clock provided by the master as the base for packet exchange. The master clock ticks with a period of 312.5
μs A microsecond is a unit of time in the International System of Units (SI) equal to one millionth (0.000001 or 10−6 or ) of a second. Its symbol is μs, sometimes simplified to us when Unicode is not available. A microsecond is to one second, ...
, two clock ticks then make up a slot of 625μs, and two slots make up a slot pair of 1250μs. In the simple case of single-slot packets, the master transmits in even slots and receives in odd slots. The slave, conversely, receives in even slots and transmits in odd slots. Packets may be 1, 3, or 5 slots long, but in all cases, the master's transmission begins in even slots and the slave's in odd slots. The above excludes Bluetooth Low Energy, introduced in the 4.0 specification, which uses the same spectrum but somewhat differently.


Communication and connection

A master BR/EDR Bluetooth device can communicate with a maximum of seven devices in a piconet (an ad hoc computer network using Bluetooth technology), though not all devices reach this maximum. The devices can switch roles, by agreement, and the slave can become the master (for example, a headset initiating a connection to a phone necessarily begins as master—as an initiator of the connection—but may subsequently operate as the slave). The Bluetooth Core Specification provides for the connection of two or more piconets to form a scatternet, in which certain devices simultaneously play the master/leader role in one piconet and the slave role in another. At any given time, data can be transferred between the master and one other device (except for the little-used broadcast mode). The master chooses which slave device to address; typically, it switches rapidly from one device to another in a round-robin fashion. Since it is the master that chooses which slave to address, whereas a slave is (in theory) supposed to listen in each receive slot, being a master is a lighter burden than being a slave. Being a master of seven slaves is possible; being a slave of more than one master is possible. The specification is vague as to required behavior in scatternets.


Uses

Bluetooth is a standard wire-replacement communications protocol primarily designed for low power consumption, with a short range based on low-cost
transceiver In radio communication, a transceiver is an electronic device which is a combination of a radio ''trans''mitter and a re''ceiver'', hence the name. It can both transmit and receive radio waves using an antenna, for communication purposes. The ...
microchips An integrated circuit (IC), also known as a microchip or simply chip, is a set of electronic circuits, consisting of various electronic components (such as transistors, resistors, and capacitors) and their interconnections. These components a ...
in each device. Because the devices use a radio (broadcast) communications system, they do not have to be in visual line of sight of each other; however, a '' quasi optical'' wireless path must be viable.


Bluetooth classes and power use

Historically, the Bluetooth range was defined by the radio class, with a lower class (and higher output power) having larger range. The actual range of a given link depends on several qualities of both communicating devices and the air and obstacles in between. The primary attributes affecting range are the data rate, protocol (Bluetooth Classic or Bluetooth Low Energy), transmission power, and receiver sensitivity, and the relative orientations and gains of both antennas. The effective range varies depending on propagation conditions, material coverage, production sample variations, antenna configurations and battery conditions. Most Bluetooth applications are for indoor conditions, where attenuation of walls and signal fading due to signal reflections make the range far lower than specified line-of-sight ranges of the Bluetooth products. Most Bluetooth applications are battery-powered Class 2 devices, with little difference in range whether the other end of the link is a Class 1 or Class 2 device as the lower-powered device tends to set the range limit. In some cases the effective range of the data link can be extended when a Class 2 device is connecting to a Class 1 transceiver with both higher sensitivity and transmission power than a typical Class 2 device. In general, however, Class 1 devices have sensitivities similar to those of Class 2 devices. Connecting two Class 1 devices with both high sensitivity and high power can allow ranges far in excess of the typical 100 m, depending on the throughput required by the application. Some such devices allow open field ranges of up to 1 km and beyond between two similar devices without exceeding legal emission limits.


Bluetooth profile

To use Bluetooth wireless technology, a device must be able to interpret certain Bluetooth profiles. For example, * The Headset Profile (HSP) connects headphones and earbuds to a cell phone or laptop. * The Health Device Profile (HDP) can connect a cell phone to a digital thermometer or heart rate detector. * The Video Distribution Profile (VDP) sends a video stream from a video camera to a TV screen or a recording device. Profiles are definitions of possible applications and specify general behaviors that Bluetooth-enabled devices use to communicate with other Bluetooth devices. These profiles include settings to parameterize and to control the communication from the start. Adherence to profiles saves the time for transmitting the parameters anew before the bi-directional link becomes effective. There are a wide range of Bluetooth profiles that describe many different types of applications or use cases for devices.


List of applications

* Wireless control and communication between a mobile phone and a
handsfree Handsfree is an adjective describing equipment that can be used without the use of hands (for example via voice commands) or, in a wider sense, equipment which needs only limited use of hands, or for which the controls are positioned so that the ...
headset. This was one of the earliest applications to become popular. * Wireless control of audio and communication functions between a mobile phone and a Bluetooth compatible car stereo system (and sometimes between the SIM card and the car phone). *Wireless communication between a smartphone and a
smart lock A smart lock is an electromechanics, electromechanical Lock (security device), lock that is designed to perform locking and unlocking operations on a door when it receives a prompt via an electronic keypad, biometric sensor, access card, Bluetoot ...
for unlocking doors. * Wireless control of and communication with iOS and Android device phones, tablets and portable
wireless speaker Wireless speakers are loudspeakers that receive audio signals using radio frequency (RF) waves rather than over audio cables. The two most popular RF frequencies that support audio transmission to wireless loudspeakers include a variation of Wi ...
s. * Wireless Bluetooth headset and
intercom An intercom, also called an intercommunication device, intercommunicator, or interphone, is a stand-alone voice communications system for use within a building, small collection of buildings or portably within a small coverage area, which funct ...
. Idiomatically, a headset is sometimes called "a Bluetooth". * Wireless streaming of audio to
headphones Headphones are a pair of small loudspeaker drivers worn on or around the head over a user's ears. They are electroacoustic transducers, which convert an electrical signal to a corresponding sound. Headphones let a single user listen to an ...
with or without communication capabilities. * Wireless streaming of data collected by Bluetooth-enabled fitness devices to phone or PC. * Wireless networking between PCs in a confined space and where little bandwidth is required. * Wireless communication with PC input and output devices, the most common being the
mouse A mouse (: mice) is a small rodent. Characteristically, mice are known to have a pointed snout, small rounded ears, a body-length scaly tail, and a high breeding rate. The best known mouse species is the common house mouse (''Mus musculus'' ...
,
keyboard Keyboard may refer to: Text input * Keyboard, part of a typewriter * Computer keyboard ** Keyboard layout, the software control of computer keyboards and their mapping ** Keyboard technology, computer keyboard hardware and firmware Music * Mus ...
and
printer Printer may refer to: Technology * Printer (publishing), a person * Printer (computing), a hardware device * Optical printer for motion picture films People * Nariman Printer (fl. c. 1940), Indian journalist and activist * James Printer (1640 ...
. * Transfer of files, contact details, calendar appointments, and reminders between devices with OBEX and sharing directories via FTP. * Triggering the camera shutter of a
smartphone A smartphone is a mobile phone with advanced computing capabilities. It typically has a touchscreen interface, allowing users to access a wide range of applications and services, such as web browsing, email, and social media, as well as multi ...
using a Bluetooth controlled
selfie stick A selfie stick is used to take photographs or video by positioning a digital camera device, typically a smartphone, beyond the normal range of the arm. This allows for shots to be taken at angles and distances that would not have been possible wi ...
. * Replacement of previous wired
RS-232 In telecommunications, RS-232 or Recommended Standard 232 is a standard introduced in 1960 for serial communication transmission of data. It formally defines signals connecting between a ''DTE'' (''data terminal equipment'') such as a compu ...
serial communications in test equipment,
GPS receivers A satellite navigation (satnav) device or GPS device is a device that uses satellites of the Global Positioning System (GPS) or similar global navigation satellite systems (GNSS). A satnav device can determine the user's geographic coordinates ...
, medical equipment, bar code scanners, and traffic control devices. * For controls where
infrared Infrared (IR; sometimes called infrared light) is electromagnetic radiation (EMR) with wavelengths longer than that of visible light but shorter than microwaves. The infrared spectral band begins with the waves that are just longer than those ...
was often used. * For low bandwidth applications where higher
USB Universal Serial Bus (USB) is an industry standard, developed by USB Implementers Forum (USB-IF), for digital data transmission and power delivery between many types of electronics. It specifies the architecture, in particular the physical ...
bandwidth is not required and cable-free connection desired. * Sending small advertisements from Bluetooth-enabled advertising hoardings to other, discoverable, Bluetooth devices. * Wireless bridge between two Industrial Ethernet (e.g.,
PROFINET Profinet (usually styled as PROFINET, as a portmanteau for Process Field Network) is an industry technical standard for data communication over Industrial Ethernet, designed for collecting data from, and controlling equipment in Automation#Indus ...
) networks. * Game consoles have been using Bluetooth as a wireless communications protocol for peripherals since the seventh generation, including
Nintendo is a Japanese Multinational corporation, multinational video game company headquartered in Kyoto. It develops, publishes, and releases both video games and video game consoles. The history of Nintendo began when craftsman Fusajiro Yamauchi ...
's
Wii The Wii ( ) is a home video game console developed and marketed by Nintendo. It was released on November 19, 2006, in North America, and in December 2006 for most other regions of the world. It is Nintendo's fifth major home game console, f ...
and
Sony is a Japanese multinational conglomerate (company), conglomerate headquartered at Sony City in Minato, Tokyo, Japan. The Sony Group encompasses various businesses, including Sony Corporation (electronics), Sony Semiconductor Solutions (i ...
's
PlayStation 3 The PlayStation 3 (PS3) is a home video game console developed and marketed by Sony Computer Entertainment (SCE). It is the successor to the PlayStation 2, and both are part of the PlayStation brand of consoles. The PS3 was first released on ...
which use Bluetooth for their respective controllers. * Dial-up internet access on personal computers or PDAs using a data-capable mobile phone as a wireless modem. * Short-range transmission of health sensor data from medical devices to mobile phone,
set-top box A set-top box (STB), also known as a cable converter box, cable box, receiver, or simply box, and historically television decoder or a converter, is an information appliance device that generally contains a Tuner (radio)#Television, TV tuner inpu ...
or dedicated
telehealth Telehealth is the distribution of Health care, health-related services and information via electronic information and telecommunications, telecommunication technologies. It allows long-distance patient and clinician contact, care, advice, reminde ...
devices. * Allowing a
DECT Digital Enhanced Cordless Telecommunications (DECT) is a cordless telephony standard maintained by ETSI. It originated in Europe, where it is the common standard, replacing earlier standards, such as CT1 and CT2. Since the DECT-2020 standard ...
phone to ring and answer calls on behalf of a nearby mobile phone. * Real-time location systems (RTLS) are used to track and identify the location of objects in real time using "Nodes" or "tags" attached to, or embedded in, the objects tracked, and "Readers" that receive and process the wireless signals from these tags to determine their locations. * Personal security application on mobile phones for prevention of theft or loss of items. The protected item has a Bluetooth marker (e.g., a tag) that is in constant communication with the phone. If the connection is broken (the marker is out of range of the phone) then an alarm is raised. This can also be used as a
man overboard "Man overboard!" is an exclamation given aboard a vessel to indicate that a member of the crew or a passenger has fallen off of the ship into the water and is in need of immediate rescue. Whoever sees the person fall is to shout, "Man overboar ...
alarm. *
Calgary Calgary () is a major city in the Canadian province of Alberta. As of 2021, the city proper had a population of 1,306,784 and a metropolitan population of 1,481,806 making it the third-largest city and fifth-largest metropolitan area in C ...
,
Alberta Alberta is a Provinces and territories of Canada, province in Canada. It is a part of Western Canada and is one of the three Canadian Prairies, prairie provinces. Alberta is bordered by British Columbia to its west, Saskatchewan to its east, t ...
, Canada's Roads Traffic division uses data collected from travelers' Bluetooth devices to predict travel times and road congestion for motorists. * Wireless transmission of audio (a more reliable alternative to FM transmitters) * Live video streaming to the visual cortical implant device by Nabeel Fattah in Newcastle university 2017. * Connection of
motion controller In computing, a motion controller is a type of input device that uses accelerometers, gyroscopes, Image sensor, cameras, or other sensors to Motion capture, track motion. Motion controllers see use as game controllers, for virtual reality and ot ...
s to a PC when using VR headsets * Wireless connection between TVs and soundbars.


Devices

Bluetooth exists in numerous products such as telephones,
speakers Speaker most commonly refers to: * Speaker, a person who produces speech * Loudspeaker, a device that produces sound ** Computer speakers Speaker, Speakers, or The Speaker may also refer to: Arts and entertainment * Speaker (song), "Speaker" ( ...
, tablets, media players, robotics systems, laptops, and game console equipment as well as some high definition headsets,
modem The Democratic Movement (, ; MoDem ) is a centre to centre-right political party in France, whose main ideological trends are liberalism and Christian democracy, and that is characterised by a strong pro-Europeanist stance. MoDem was establis ...
s,
hearing aid A hearing aid is a device designed to improve hearing by making sound audible to a person with hearing loss. Hearing aids are classified as medical devices in most countries, and regulated by the respective regulations. Small audio amplifiers ...
s and even watches. Bluetooth is useful when transferring information between two or more devices that are near each other in low-bandwidth situations. Bluetooth is commonly used to transfer sound data with telephones (i.e., with a Bluetooth headset) or byte data with hand-held computers (transferring files). Bluetooth protocols simplify the discovery and setup of services between devices. Bluetooth devices can advertise all of the services they provide. This makes using services easier, because more of the security,
network address A network address is an identifier for a node or host on a telecommunications network. Network addresses are designed to be unique identifiers across the network, although some networks allow for local, private addresses, or locally administere ...
and permission configuration can be automated than with many other network types.


Computer requirements

A personal computer that does not have embedded Bluetooth can use a Bluetooth adapter that enables the PC to communicate with Bluetooth devices. While some
desktop computer A desktop computer, often abbreviated as desktop, is a personal computer designed for regular use at a stationary location on or near a desk (as opposed to a portable computer) due to its size and power requirements. The most common configuratio ...
s and most recent laptops come with a built-in Bluetooth radio, others require an external adapter, typically in the form of a small USB "
dongle A dongle is a small piece of computer hardware that connects to a port on another device to provide it with additional functionality, or enable a pass-through to such a device that adds functionality. In computing, the term was initially synony ...
". Unlike its predecessor,
IrDA IrDA is a wireless standard designed for exchanging data using infrared (IR). Infrared ports for this purpose have been implemented in portable electronic devices such as mobile telephones, laptops, cameras, printers, and medical devices. The mai ...
, which requires a separate adapter for each device, Bluetooth lets multiple devices communicate with a computer over a single adapter.


Operating system implementation

For
Microsoft Microsoft Corporation is an American multinational corporation and technology company, technology conglomerate headquartered in Redmond, Washington. Founded in 1975, the company became influential in the History of personal computers#The ear ...
platforms,
Windows XP Service Pack 2 Windows XP is a major release of Microsoft's Windows NT operating system. It was released to manufacturing on August 24, 2001, and later to retail on October 25, 2001. It is a direct successor to Windows 2000 for high-end and business users a ...
and SP3 releases work natively with Bluetooth v1.1, v2.0 and v2.0+EDR. Previous versions required users to install their Bluetooth adapter's own drivers, which were not directly supported by Microsoft. Microsoft's own Bluetooth dongles (packaged with their Bluetooth computer devices) have no external drivers and thus require at least Windows XP Service Pack 2. Windows Vista RTM/SP1 with the Feature Pack for Wireless or Windows Vista SP2 work with Bluetooth v2.1+EDR. Windows 7 works with Bluetooth v2.1+EDR and Extended Inquiry Response (EIR). The Windows XP and Windows Vista/Windows 7 Bluetooth stacks support the following Bluetooth profiles natively: PAN, SPP,
DUN Dun most commonly refers to: *Dun gene, which produces a brownish-gray color (dun) in horses and other Equidae * Dun (fortification), an ancient or medieval fort Dun or DUN may also refer to: Places Scotland * Dun, Angus, a civil parish in ...
, HID, HCRP. The Windows XP stack can be replaced by a third party stack that supports more profiles or newer Bluetooth versions. The Windows Vista/Windows 7 Bluetooth stack supports vendor-supplied additional profiles without requiring that the Microsoft stack be replaced. Windows 8 and later support Bluetooth Low Energy (BLE). It is generally recommended to install the latest vendor driver and its associated stack to be able to use the Bluetooth device at its fullest extent.
Apple An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
products have worked with Bluetooth since Mac OSX v10.2, which was released in 2002.
Linux Linux ( ) is a family of open source Unix-like operating systems based on the Linux kernel, an kernel (operating system), operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically package manager, pac ...
has two popular Bluetooth stacks, BlueZ and Fluoride. The BlueZ stack is included with most Linux kernels and was originally developed by
Qualcomm Qualcomm Incorporated () is an American multinational corporation headquartered in San Diego, California, and Delaware General Corporation Law, incorporated in Delaware. It creates semiconductors, software and services related to wireless techn ...
. Fluoride, earlier known as Bluedroid is included in Android OS and was originally developed by
Broadcom Broadcom Inc. is an American multinational corporation, multinational designer, developer, manufacturer, and global supplier of a wide range of semiconductor and infrastructure software products. Broadcom's product offerings serve the data cen ...
. There is also Affix stack, developed by
Nokia Nokia Corporation is a Finnish multinational corporation, multinational telecommunications industry, telecommunications, technology company, information technology, and consumer electronics corporation, originally established as a pulp mill in 1 ...
. It was once popular, but has not been updated since 2005.
FreeBSD FreeBSD is a free-software Unix-like operating system descended from the Berkeley Software Distribution (BSD). The first version was released in 1993 developed from 386BSD, one of the first fully functional and free Unix clones on affordable ...
has included Bluetooth since its v5.0 release, implemented through netgraph.
NetBSD NetBSD is a free and open-source Unix-like operating system based on the Berkeley Software Distribution (BSD). It was the first open-source BSD descendant officially released after 386BSD was fork (software development), forked. It continues to ...
has included Bluetooth since its v4.0 release. Its Bluetooth stack was ported to
OpenBSD OpenBSD is a security-focused operating system, security-focused, free software, Unix-like operating system based on the Berkeley Software Distribution (BSD). Theo de Raadt created OpenBSD in 1995 by fork (software development), forking NetBSD ...
as well, however OpenBSD later removed it as unmaintained.
DragonFly BSD DragonFly BSD is a free and open-source Unix-like operating system forked from FreeBSD 4.8. Matthew Dillon, an Amiga developer in the late 1980s and early 1990s and FreeBSD developer between 1994 and 2003, began working on DragonFly BSD in ...
has had NetBSD's Bluetooth implementation since 1.11 (2008). A netgraph-based implementation from
FreeBSD FreeBSD is a free-software Unix-like operating system descended from the Berkeley Software Distribution (BSD). The first version was released in 1993 developed from 386BSD, one of the first fully functional and free Unix clones on affordable ...
has also been available in the tree, possibly disabled until 2014-11-15, and may require more work.


Specifications and features

The specifications were formalized by the
Bluetooth Special Interest Group The Bluetooth Special Interest Group (Bluetooth SIG) is the standards organization that oversees the development of Bluetooth standardization, standards and the licensing of the Bluetooth technologies and trademarks to manufacturers. The SIG i ...
(SIG) and formally announced on 20 May 1998. In 2014 it had a membership of over 30,000 companies worldwide. It was established by
Ericsson (), commonly known as Ericsson (), is a Swedish multinational networking and telecommunications company headquartered in Stockholm, Sweden. Ericsson has been a major contributor to the development of the telecommunications industry and is one ...
,
IBM International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
,
Intel Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California, and Delaware General Corporation Law, incorporated in Delaware. Intel designs, manufactures, and sells computer compo ...
,
Nokia Nokia Corporation is a Finnish multinational corporation, multinational telecommunications industry, telecommunications, technology company, information technology, and consumer electronics corporation, originally established as a pulp mill in 1 ...
and
Toshiba is a Japanese multinational electronics company headquartered in Minato, Tokyo. Its diversified products and services include power, industrial and social infrastructure systems, elevators and escalators, electronic components, semiconductors ...
, and later joined by many other companies. All versions of the Bluetooth standards are
backward-compatible In telecommunications and computing, backward compatibility (or backwards compatibility) is a property of an operating system, software, real-world product, or technology that allows for interoperability with an older legacy system, or with inp ...
with all earlier versions. The Bluetooth Core Specification Working Group (CSWG) produces mainly four kinds of specifications: * The Bluetooth Core Specificationtypically released every few years * Core Specification Addendum (CSA) * Core Specification Supplements (CSS)can be released more frequently than Addenda * Errataavailable with a Bluetooth SIG account
Errata login


Bluetooth 1.0 and 1.0B

* Products were not interoperable. * Anonymity was not possible, preventing certain services from using Bluetooth environments.


Bluetooth 1.1

* Ratified as IEEE Standard 802.15.1–2002 * Many errors found in the v1.0B specifications were fixed. * Added possibility of non-encrypted channels. *
Received signal strength indicator In telecommunications, received signal strength indicator or received signal strength indication (RSSI) is a measurement of the power present in a received radio signal. RSSI is usually invisible to a user of a receiving device. However, because ...
(RSSI)


Bluetooth 1.2

Major enhancements include: * Faster connection and discovery * ''Adaptive
frequency-hopping spread spectrum Frequency-hopping spread spectrum (FHSS) is a method of transmitting radio signals by rapidly changing the carrier frequency among many frequencies occupying a large spectral band. The changes are controlled by a code known to both transmitter ...
(AFH)'', which improves resistance to radio frequency interference by avoiding the use of crowded frequencies in the hopping sequence * Higher transmission speeds in practice than in v1.1, up to 721 kbit/s * Extended Synchronous Connections (eSCO), which improve voice quality of audio links by allowing retransmissions of corrupted packets, and may optionally increase audio latency to provide better concurrent data transfer * Host Controller Interface (HCI) operation with three-wire
UART A universal asynchronous receiver-transmitter (UART ) is a peripheral device for asynchronous serial communication in which the data format and transmission speeds are configurable. It sends data bits one by one, from the least significant to ...
* Ratified as IEEE Standard 802.15.1–2005 * Introduced flow control and retransmission modes for


Bluetooth 2.0 + EDR

This version of the Bluetooth Core Specification was released before 2005. The main difference is the introduction of an Enhanced Data Rate (EDR) for faster
data transfer Data communication, including data transmission and data reception, is the transfer of data, transmitted and received over a point-to-point or point-to-multipoint communication channel. Examples of such channels are copper wires, optical ...
. The data rate of EDR is 3Mbit/s, although the maximum data transfer rate (allowing for inter-packet time and acknowledgements) is 2.1Mbit/s. EDR uses a combination of GFSK and
phase-shift keying Phase-shift keying (PSK) is a digital modulation process which conveys data by changing (modulating) the phase of a constant frequency carrier wave. The modulation is accomplished by varying the sine and cosine inputs at a precise time. I ...
modulation (PSK) with two variants, π/4- DQPSK and 8- DPSK. EDR can provide a lower power consumption through a reduced
duty cycle A duty cycle or power cycle is the fraction of one period in which a signal or system is active. Duty cycle is commonly expressed as a percentage or a ratio. A period is the time it takes for a signal to complete an on-and-off cycle. As a for ...
. The specification is published as ''Bluetooth v2.0 + EDR'', which implies that EDR is an optional feature. Aside from EDR, the v2.0 specification contains other minor improvements, and products may claim compliance to "Bluetooth v2.0" without supporting the higher data rate. At least one commercial device states "Bluetooth v2.0 without EDR" on its data sheet.


Bluetooth 2.1 + EDR

Bluetooth Core Specification version 2.1 + EDR was adopted by the Bluetooth SIG on 26 July 2007. The headline feature of v2.1 is secure simple pairing (SSP): this improves the pairing experience for Bluetooth devices, while increasing the use and strength of security. Version 2.1 allows various other improvements, including ''extended inquiry response'' (EIR), which provides more information during the inquiry procedure to allow better filtering of devices before connection; and sniff subrating, which reduces the power consumption in low-power mode.


Bluetooth 3.0 + HS

Version 3.0 + HS of the Bluetooth Core Specification was adopted by the Bluetooth SIG on 21 April 2009. Bluetooth v3.0 + HS provides theoretical data transfer speeds of up to 24 Mbit/s, though not over the Bluetooth link itself. Instead, the Bluetooth link is used for negotiation and establishment, and the high data rate traffic is carried over a colocated
802.11 IEEE 802.11 is part of the IEEE 802 set of local area network (LAN) technical standards, and specifies the set of medium access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) computer c ...
link. The main new feature is (Alternative MAC/PHY), the addition of
802.11 IEEE 802.11 is part of the IEEE 802 set of local area network (LAN) technical standards, and specifies the set of medium access control (MAC) and physical layer (PHY) protocols for implementing wireless local area network (WLAN) computer c ...
as a high-speed transport. The high-speed part of the specification is not mandatory, and hence only devices that display the "+HS" logo actually support Bluetooth over 802.11 high-speed data transfer. A Bluetooth v3.0 device without the "+HS" suffix is only required to support features introduced in Core Specification version 3.0 or earlier Core Specification Addendum 1. ; L2CAP Enhanced modes: Enhanced Retransmission Mode (ERTM) implements reliable L2CAP channel, while Streaming Mode (SM) implements unreliable channel with no retransmission or flow control. Introduced in Core Specification Addendum 1. ; Alternative MAC/PHY: Enables the use of alternative
MAC Mac or MAC may refer to: Common meanings * Mac (computer), a line of personal computers made by Apple Inc. * Mackintosh, a raincoat made of rubberized cloth * Mac, a prefix to surnames derived from Gaelic languages * McIntosh (apple), a Canadi ...
and
PHY In the seven-layer OSI model of computer networking, the physical layer or layer 1 is the first and lowest layer: the layer most closely associated with the physical connection between devices. The physical layer provides an electrical, mechani ...
s for transporting Bluetooth profile data. The Bluetooth radio is still used for device discovery, initial connection and profile configuration. However, when large quantities of data must be sent, the high-speed alternative MAC PHY 802.11 (typically associated with Wi-Fi) transports the data. This means that Bluetooth uses proven low power connection models when the system is idle, and the faster radio when it must send large quantities of data. AMP links require enhanced L2CAP modes. ; Unicast Connectionless Data: Permits sending service data without establishing an explicit L2CAP channel. It is intended for use by applications that require low latency between user action and reconnection/transmission of data. This is only appropriate for small amounts of data. ; Enhanced Power Control: Updates the power control feature to remove the open loop power control, and also to clarify ambiguities in power control introduced by the new modulation schemes added for EDR. Enhanced power control removes the ambiguities by specifying the behavior that is expected. The feature also adds closed loop power control, meaning RSSI filtering can start as the response is received. Additionally, a "go straight to maximum power" request has been introduced. This is expected to deal with the headset link loss issue typically observed when a user puts their phone into a pocket on the opposite side to the headset.


Ultra-wideband

The high-speed (AMP) feature of Bluetooth v3.0 was originally intended for UWB, but the WiMedia Alliance, the body responsible for the flavor of UWB intended for Bluetooth, announced in March 2009 that it was disbanding, and ultimately UWB was omitted from the Core v3.0 specification. On 16 March 2009, the
WiMedia Alliance The WiMedia Alliance was a non-profit industry trade group that promoted the adoption, regulation, standardization and multi-vendor interoperability of ultra-wideband (UWB) technologies. It existed from about 2002 through 2009. History The Wirel ...
announced it was entering into technology transfer agreements for the WiMedia
Ultra-wideband Ultra-wideband (UWB, ultra wideband, ultra-wide band and ultraband) is a radio technology that can use a very low energy level for short-range, high-bandwidth communications over a large portion of the radio spectrum. UWB has traditional applicat ...
(UWB) specifications. WiMedia has transferred all current and future specifications, including work on future high-speed and power-optimized implementations, to the Bluetooth Special Interest Group (SIG),
Wireless USB Wireless USB is a short-range, high-bandwidth wireless radio communication protocol version of the Universal Serial Bus (USB) created by the Wireless USB Promoter Group. It is unrelated to Wi-Fi and Cypress Wireless USB. It was maintained by the ...
Promoter Group and the
USB Implementers Forum USB Implementers Forum, Inc. (USB-IF) is a nonprofit organization created to promote and maintain USB (Universal Serial Bus), a set of specifications and transmission procedures for a type of cable connection that has since become used widely fo ...
. After successful completion of the technology transfer, marketing, and related administrative items, the WiMedia Alliance ceased operations. In October 2009, the
Bluetooth Special Interest Group The Bluetooth Special Interest Group (Bluetooth SIG) is the standards organization that oversees the development of Bluetooth standardization, standards and the licensing of the Bluetooth technologies and trademarks to manufacturers. The SIG i ...
suspended development of UWB as part of the alternative MAC/PHY, Bluetooth v3.0 + HS solution. A small, but significant, number of former WiMedia members had not and would not sign up to the necessary agreements for the IP transfer. As of 2009, the Bluetooth SIG was in the process of evaluating other options for its longer-term roadmap.


Bluetooth 4.0

The Bluetooth SIG completed the Bluetooth Core Specification version 4.0 (called Bluetooth Smart) and has been adopted . It includes ''Classic Bluetooth'', ''Bluetooth high speed'' and ''
Bluetooth Low Energy Bluetooth Low Energy (Bluetooth LE, colloquially BLE, formerly marketed as Bluetooth Smart) is a wireless personal area network technology designed and marketed by the Bluetooth Special Interest Group (Bluetooth SIG) aimed at novel applications ...
'' (BLE) protocols. Bluetooth high speed is based on Wi-Fi, and Classic Bluetooth consists of legacy Bluetooth protocols.
Bluetooth Low Energy Bluetooth Low Energy (Bluetooth LE, colloquially BLE, formerly marketed as Bluetooth Smart) is a wireless personal area network technology designed and marketed by the Bluetooth Special Interest Group (Bluetooth SIG) aimed at novel applications ...
, previously known as Wibree, is a subset of Bluetooth v4.0 with an entirely new protocol stack for rapid build-up of simple links. As an alternative to the Bluetooth standard protocols that were introduced in Bluetooth v1.0 to v3.0, it is aimed at very low power applications powered by a
coin cell A button cell, watch battery, or coin battery is a small battery made of a single electrochemical cell and shaped as a squat cylinder typically in diameter and high – resembling a button. Stainless steel usually forms the bottom body and p ...
. Chip designs allow for two types of implementation, dual-mode, single-mode and enhanced past versions. The provisional names ''Wibree'' and ''Bluetooth ULP'' (Ultra Low Power) were abandoned and the BLE name was used for a while. In late 2011, new logos "Bluetooth Smart Ready" for hosts and "Bluetooth Smart" for sensors were introduced as the general-public face of BLE. Compared to ''Classic Bluetooth'', Bluetooth Low Energy is intended to provide considerably reduced power consumption and cost while maintaining a similar communication range. In terms of lengthening the battery life of Bluetooth devices, represents a significant progression. * In a single-mode implementation, only the low energy protocol stack is implemented.
Dialog Semiconductor Dialog Semiconductor Plc is an Anglo-German semiconductor-based system designer and manufacturer. The company is headquartered in the United Kingdom in Reading, Berkshire, Reading, with a global sales, R&D and marketing organization. Dialog cre ...
,
STMicroelectronics STMicroelectronics Naamloze vennootschap, NV (commonly referred to as ST or STMicro) is a European multinational corporation, multinational semiconductor contract manufacturing and design company. It is the largest of such companies in Europe. ...
, AMICCOM, CSR,
Nordic Semiconductor Nordic Semiconductor ASA (formerly known as Nordic VLSI) was founded in 1983 and is a Norwegian fabless technology company with its headquarters in Trondheim, Norway. The company specializes in designing ultra-low-power wireless communication sem ...
and
Texas Instruments Texas Instruments Incorporated (TI) is an American multinational semiconductor company headquartered in Dallas, Texas. It is one of the top 10 semiconductor companies worldwide based on sales volume. The company's focus is on developing analog ...
have released single mode Bluetooth Low Energy solutions. * In a dual-mode implementation, Bluetooth Smart functionality is integrated into an existing Classic Bluetooth controller. , the following semiconductor companies have announced the availability of chips meeting the standard:
Qualcomm Atheros Atheros Communications, Inc., was an American computer networking company independently active from 1998 to 2011. It produced semiconductor chips for network communications, particularly wireless chipsets. The company was founded under the nam ...
, CSR,
Broadcom Broadcom Inc. is an American multinational corporation, multinational designer, developer, manufacturer, and global supplier of a wide range of semiconductor and infrastructure software products. Broadcom's product offerings serve the data cen ...
and
Texas Instruments Texas Instruments Incorporated (TI) is an American multinational semiconductor company headquartered in Dallas, Texas. It is one of the top 10 semiconductor companies worldwide based on sales volume. The company's focus is on developing analog ...
. The compliant architecture shares all of Classic Bluetooth's existing radio and functionality resulting in a negligible cost increase compared to Classic Bluetooth. Cost-reduced single-mode chips, which enable highly integrated and compact devices, feature a lightweight Link Layer providing ultra-low power idle mode operation, simple device discovery, and reliable point-to-multipoint data transfer with advanced power-save and secure encrypted connections at the lowest possible cost. General improvements in version 4.0 include the changes necessary to facilitate BLE modes, as well the Generic Attribute Profile (GATT) and Security Manager (SM) services with AES Encryption. Core Specification Addendum 2 was unveiled in December 2011; it contains improvements to the audio Host Controller Interface and to the High Speed (802.11) Protocol Adaptation Layer. Core Specification Addendum 3 revision 2 has an adoption date of 24 July 2012. Core Specification Addendum 4 has an adoption date of 12 February 2013.


Bluetooth 4.1

The Bluetooth SIG announced formal adoption of the Bluetooth v4.1 specification on 4 December 2013. This specification is an incremental software update to Bluetooth Specification v4.0, and not a hardware update. The update incorporates Bluetooth Core Specification Addenda (CSA 1, 2, 3 & 4) and adds new features that improve consumer usability. These include increased co-existence support for LTE, bulk data exchange rates—and aid developer innovation by allowing devices to support multiple roles simultaneously. New features of this specification include: * Mobile wireless service coexistence signaling * Train nudging and generalized interlaced scanning * Low Duty Cycle Directed Advertising * L2CAP connection-oriented and dedicated channels with credit-based flow control * Dual Mode and Topology * LE Link Layer Topology * 802.11n PAL * Audio architecture updates for Wide Band Speech * Fast data advertising interval * Limited discovery time Some features were already available in a Core Specification Addendum (CSA) before the release of v4.1.


Bluetooth 4.2

Released on 2 December 2014, it introduces features for the
Internet of things Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communication networks. The IoT encompasse ...
. The major areas of improvement are: * Bluetooth Low Energy Secure Connection with Data Packet Length Extension to improve the
cryptographic protocol A cryptographic protocol is an abstract or concrete Communications protocol, protocol that performs a information security, security-related function and applies cryptographic methods, often as sequences of cryptographic primitives. A protocol desc ...
* Link Layer Privacy with Extended Scanner Filter Policies to improve
data security Data security or data protection means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach. Technologies Disk encryption ...
* Internet Protocol Support Profile (IPSP) version 6 ready for Bluetooth
smart devices A smart device is an electronic device, generally connected to other devices or networks via different wireless protocols (such as Bluetooth, Zigbee, near-field communication, Wi-Fi, NearLink, Li-Fi, or 5G) that can operate to some extent inte ...
to support the Internet of things and
home automation Home automation or domotics is building automation for a home. A home automation system will monitor and/or control home attributes such as lighting, climate, entertainment systems, and appliances. It may also include home security such ...
Older Bluetooth hardware may receive 4.2 features such as Data Packet Length Extension and improved privacy via firmware updates.


Bluetooth 5

The Bluetooth SIG released Bluetooth 5 on 6 December 2016. Its new features are mainly focused on new
Internet of Things Internet of things (IoT) describes devices with sensors, processing ability, software and other technologies that connect and exchange data with other devices and systems over the Internet or other communication networks. The IoT encompasse ...
technology. Sony was the first to announce Bluetooth 5.0 support with its Xperia XZ Premium in Feb 2017 during the Mobile World Congress 2017. The Samsung
Galaxy S8 The Samsung Galaxy S8 and Samsung Galaxy S8+ are Android smartphones produced by Samsung Electronics as the eighth generation of the Samsung Galaxy S series. The S8 and S8+ were unveiled on 29 March 2017 and directly succeeded the Samsung Gal ...
launched with Bluetooth 5 support in April 2017. In September 2017, the
iPhone 8 The iPhone 8 and iPhone 8 Plus are smartphones developed and marketed by Apple Inc. They are the eleventh generation of the iPhone. The iPhone 8 was released on September 22, 2017, succeeding the iPhone 7 and iPhone 7 Plus, respectively. T ...
, 8 Plus and
iPhone X The iPhone X (Roman numerals, Roman numeral "X" pronounced "ten") is a smartphone that was developed and marketed by Apple Inc. It is part of the List of iPhone models, 11th generation of the iPhone. Available for pre-order from September 26, 2 ...
launched with Bluetooth 5 support as well.
Apple An apple is a round, edible fruit produced by an apple tree (''Malus'' spp.). Fruit trees of the orchard or domestic apple (''Malus domestica''), the most widely grown in the genus, are agriculture, cultivated worldwide. The tree originated ...
also integrated Bluetooth 5 in its new
HomePod The HomePod is a series of smart speakers developed by Apple Inc., Apple. Designed to work with the Apple Music subscription service, the HomePod incorporates beamforming and eight speakers and is sold in two colors: white and midnight. It is s ...
offering released on 9 February 2018. Marketing drops the point number; so that it is just "Bluetooth 5" (unlike Bluetooth 4.0); the change is for the sake of "Simplifying our marketing, communicating user benefits more effectively and making it easier to signal significant technology updates to the market." Bluetooth 5 provides, for BLE, options that can double the data rate (2Mbit/s burst) at the expense of range, or provide up to four times the range at the expense of data rate. The increase in transmissions could be important for Internet of Things devices, where many nodes connect throughout a whole house. Bluetooth 5 increases capacity of connectionless services such as location-relevant navigation of low-energy Bluetooth connections. The major areas of improvement are: * Slot Availability Mask (SAM) * 2 Mbit/s PHY for * LE Long Range * High Duty Cycle Non-Connectable Advertising * LE Advertising Extensions * LE Channel Selection Algorithm #2 Features added in CSA5 – integrated in v5.0: * Higher Output Power The following features were removed in this version of the specification: * Park State


Bluetooth 5.1

The Bluetooth SIG presented Bluetooth 5.1 on 21 January 2019. The major areas of improvement are: *
Angle of arrival The angle of arrival (AoA) of a signal is the direction from which the signal (e.g. radio, optical or acoustic) is received. Measurement Measurement of AoA can be done by determining the direction of propagation of a radio-frequency wave incident ...
(AoA) and Angle of Departure (AoD) which are used for locating and tracking of devices * Advertising Channel Index * GATT caching * Minor Enhancements batch 1: ** HCI support for debug keys in LE Secure Connections ** Sleep clock accuracy update mechanism ** ADI field in scan response data ** Interaction between and Flow Specification ** Block Host channel classification for secondary advertising ** Allow the SID to appear in scan response reports ** Specify the behavior when rules are violated * Periodic Advertising Sync Transfer Features added in Core Specification Addendum (CSA) 6 – integrated in v5.1: * Models * Mesh-based model hierarchy The following features were removed in this version of the specification: * Unit keys


Bluetooth 5.2

On 31 December 2019, the Bluetooth SIG published the Bluetooth Core Specification version 5.2. The new specification adds new features: * Enhanced Attribute Protocol (EATT), an improved version of the Attribute Protocol (ATT) * LE Power Control * LE Isochronous Channels * LE Audio that is built on top of the new 5.2 features. BT LE Audio was announced in January 2020 at CES by the Bluetooth SIG. Compared to regular Bluetooth Audio, Bluetooth Low Energy Audio makes lower battery consumption possible and creates a standardized way of transmitting audio over BT LE. Bluetooth LE Audio also allows one-to-many and many-to-one transmission, allowing multiple receivers from one source or one receiver for multiple sources, known as Auracast. It uses a new LC3 codec. BLE Audio will also add support for hearing aids. On 12 July 2022, the Bluetooth SIG announced the completion of Bluetooth LE Audio. The standard has a lower minimum latency claim of 20–30 ms vs Bluetooth Classic audio of 100–200 ms. At
IFA IFA or Ifa may refer to: Organisations Economics * Independent financial adviser, a type of financial services professional in the UK * Index Fund Advisors * Institute and Faculty of Actuaries, representing actuaries in the UK * Institute of Act ...
in August 2023 Samsung announced support for Auracast through a software update for their Galaxy Buds2 Pro and two of their TVs. In October users started getting updates for the earbuds.


Bluetooth 5.3

The Bluetooth SIG published the Bluetooth Core Specification version 5.3 on 13 July 2021. The feature enhancements of Bluetooth 5.3 are: * Connection Subrating * Periodic Advertisement Interval * Channel Classification Enhancement * Encryption key size control enhancements The following features were removed in this version of the specification: * Alternate MAC and PHY (AMP) Extension


Bluetooth 5.4

The Bluetooth SIG released the Bluetooth Core Specification version 5.4 on 7 February 2023. This new version adds the following features: * Periodic Advertising with Responses (PAwR) * Encrypted Advertising Data * LE Security Levels Characteristic * Advertising Coding Selection


Bluetooth 6.0

The Bluetooth SIG released the Bluetooth Core Specification version 6.0 on 27 August 2024. This version adds the following features: * Bluetooth Channel Sounding * Decision-based advertising filtering * Monitoring advertisers * enhancement * LL extended feature set * Frame space update


Bluetooth 6.1

The Bluetooth SIG released the Bluetooth Core Specification version 6.1 on 7 May 2025. * Increased device privacy * Improved power efficiency


Technical information


Architecture


Software

Seeking to extend the compatibility of Bluetooth devices, the devices that adhere to the standard use an interface called HCI (Host Controller Interface) between the host and the controller. High-level protocols such as the SDP (Protocol used to find other Bluetooth devices within the communication range, also responsible for detecting the function of devices in range), RFCOMM (Protocol used to emulate serial port connections) and TCS (Telephony control protocol) interact with the baseband controller through the L2CAP (Logical Link Control and Adaptation Protocol). The L2CAP protocol is responsible for the segmentation and reassembly of the packets.


Hardware

The hardware that makes up the Bluetooth device is made up of, logically, two parts; which may or may not be physically separate. A radio device, responsible for modulating and transmitting the signal; and a digital controller. The digital controller is likely a CPU, one of whose functions is to run a Link Controller; and interfaces with the host device; but some functions may be delegated to hardware. The Link Controller is responsible for the processing of the baseband and the management of ARQ and physical layer FEC protocols. In addition, it handles the transfer functions (both asynchronous and synchronous), audio coding (e.g.
SBC (codec) SBC, or low-complexity subband codec, is an audio subband codec specified by the Bluetooth Special Interest Group (SIG) for the Advanced Audio Distribution Profile (A2DP).Bluetooth SIG, Specification of the Bluetooth System, Profiles, Advanced ...
) and data encryption. The CPU of the device is responsible for attending the instructions related to Bluetooth of the host device, in order to simplify its operation. To do this, the CPU runs software called Link Manager that has the function of communicating with other devices through the LMP protocol. A Bluetooth device is a short-range
wireless Wireless communication (or just wireless, when the context allows) is the transfer of information (''telecommunication'') between two or more points without the use of an electrical conductor, optical fiber or other continuous guided transm ...
device. Bluetooth devices are fabricated on
RF CMOS RF CMOS is a metal–oxide–semiconductor (MOS) integrated circuit (IC) technology that integrates radio-frequency (RF), analog and digital electronics on a mixed-signal CMOS (complementary MOS) RF circuit chip. It is widely used in modern wir ...
integrated circuit An integrated circuit (IC), also known as a microchip or simply chip, is a set of electronic circuits, consisting of various electronic components (such as transistors, resistors, and capacitors) and their interconnections. These components a ...
(
RF circuit Radio-frequency (RF) engineering is a subset of electrical engineering involving the application of transmission line, waveguide, antenna, radar, and electromagnetic field principles to the design and application of devices that produce or ...
) chips.


Bluetooth protocol stack

Bluetooth is defined as a layer protocol architecture consisting of core protocols, cable replacement protocols, telephony control protocols, and adopted protocols. Mandatory protocols for all Bluetooth stacks are LMP, L2CAP and SDP. In addition, devices that communicate with Bluetooth almost universally can use these protocols: HCI and RFCOMM.


Link Manager

The Link Manager (LM) is the system that manages establishing the connection between devices. It is responsible for the establishment, authentication and configuration of the link. The Link Manager locates other managers and communicates with them via the management protocol of the LMP link. To perform its function as a service provider, the LM uses the services included in the Link Controller (LC). The Link Manager Protocol basically consists of several PDUs (Protocol Data Units) that are sent from one device to another. The following is a list of supported services: * Transmission and reception of data. * Name request * Request of the link addresses. * Establishment of the connection. * Authentication. * Negotiation of link mode and connection establishment.


Host Controller Interface

The Host Controller Interface provides a command interface between the controller and the host.


Logical Link Control and Adaptation Protocol

The ''Logical Link Control and Adaptation Protocol'' (L2CAP) is used to multiplex multiple logical connections between two devices using different higher level protocols. Provides segmentation and reassembly of on-air packets. In ''Basic'' mode, L2CAP provides packets with a payload configurable up to 64 kB, with 672 bytes as the default MTU, and 48 bytes as the minimum mandatory supported MTU. In ''Retransmission and Flow Control'' modes, L2CAP can be configured either for isochronous data or reliable data per channel by performing retransmissions and CRC checks. Bluetooth Core Specification Addendum 1 adds two additional L2CAP modes to the core specification. These modes effectively deprecate original Retransmission and Flow Control modes: ; Enhanced Retransmission Mode (ERTM): This mode is an improved version of the original retransmission mode. This mode provides a reliable L2CAP channel. ; Streaming Mode (SM): This is a very simple mode, with no retransmission or flow control. This mode provides an unreliable L2CAP channel. Reliability in any of these modes is optionally and/or additionally guaranteed by the lower layer Bluetooth BDR/EDR air interface by configuring the number of retransmissions and flush timeout (time after which the radio flushes packets). In-order sequencing is guaranteed by the lower layer. Only L2CAP channels configured in ERTM or SM may be operated over AMP logical links.


Service Discovery Protocol

The ''Service Discovery Protocol'' (SDP) allows a device to discover services offered by other devices, and their associated parameters. For example, when you use a mobile phone with a Bluetooth headset, the phone uses SDP to determine which
Bluetooth profile In order to use Bluetooth, a device must be compatible with the subset of Bluetooth ''profiles'' (often called services or functions) necessary to use the desired services. A Bluetooth profile is a specification regarding an aspect of Bluetooth-b ...
s the headset can use (Headset Profile, Hands Free Profile (HFP), Advanced Audio Distribution Profile (A2DP) etc.) and the protocol multiplexer settings needed for the phone to connect to the headset using each of them. Each service is identified by a
Universally unique identifier A Universally Unique Identifier (UUID) is a 128-bit label used to uniquely identify objects in computer systems. The term Globally Unique Identifier (GUID) is also used, mostly in Microsoft systems. When generated according to the standard methods ...
(UUID), with official services (Bluetooth profiles) assigned a short form UUID (16 bits rather than the full 128).


Radio Frequency Communications

''Radio Frequency Communications'' (RFCOMM) is a cable replacement protocol used for generating a virtual serial data stream. RFCOMM provides for binary data transport and emulates
EIA-232 In telecommunications, RS-232 or Recommended Standard 232 is a standard introduced in 1960 for serial communication transmission of data. It formally defines signals connecting between a ''DTE'' (''data terminal equipment'') such as a compute ...
(formerly RS-232) control signals over the Bluetooth baseband layer, i.e., it is a serial port emulation. RFCOMM provides a simple, reliable, data stream to the user, similar to TCP. It is used directly by many telephony related profiles as a carrier for AT commands, as well as being a transport layer for OBEX over Bluetooth. Many Bluetooth applications use RFCOMM because of its widespread support and publicly available API on most operating systems. Additionally, applications that used a serial port to communicate can be quickly ported to use RFCOMM.


Bluetooth Network Encapsulation Protocol

The ''Bluetooth Network Encapsulation Protocol'' (BNEP) is used for transferring another protocol stack's data via an L2CAP channel. Its main purpose is the transmission of IP packets in the Personal Area Networking Profile. BNEP performs a similar function to SNAP in Wireless LAN.


Audio/Video Control Transport Protocol

The ''Audio/Video Control Transport Protocol'' (AVCTP) is used by the remote control profile to transfer AV/C commands over an L2CAP channel. The music control buttons on a stereo headset use this protocol to control the music player.


Audio/Video Distribution Transport Protocol

The ''Audio/Video Distribution Transport Protocol'' (AVDTP) is used by the advanced audio distribution (
A2DP In order to use Bluetooth, a device must be compatible with the subset of Bluetooth ''profiles'' (often called services or functions) necessary to use the desired services. A Bluetooth profile is a specification regarding an aspect of Bluetooth-b ...
) profile to stream music to stereo headsets over an L2CAP channel intended for video distribution profile in the Bluetooth transmission.


Telephony Control Protocol

The ''Telephony Control Protocol– Binary'' (TCS BIN) is the bit-oriented protocol that defines the call control signaling for the establishment of voice and data calls between Bluetooth devices. Additionally, "TCS BIN defines mobility management procedures for handling groups of Bluetooth TCS devices." TCS-BIN is only used by the cordless telephony profile, which failed to attract implementers. As such it is only of historical interest.


Adopted protocols

Adopted protocols are defined by other standards-making organizations and incorporated into Bluetooth's protocol stack, allowing Bluetooth to code protocols only when necessary. The adopted protocols include: ;
Point-to-Point Protocol In computer networking, Point-to-Point Protocol (PPP) is a data link layer (layer 2) communication protocol between two routers directly without any host or any other networking in between. It can provide loop detection, authentication, transmissio ...
(PPP): Internet standard protocol for transporting
IP datagram A datagram is a basic transfer unit associated with a packet-switched network. Datagrams are typically structured in header and payload sections. Datagrams provide a connectionless communication service across a packet-switched network. The del ...
s over a point-to-point link. ;
TCP/IP The Internet protocol suite, commonly known as TCP/IP, is a framework for organizing the communication protocols used in the Internet and similar computer networks according to functional criteria. The foundational protocols in the suite are ...
/UDP: Foundation Protocols for TCP/IP protocol suite ; Object Exchange Protocol (OBEX): Session-layer protocol for the exchange of objects, providing a model for object and operation representation ; Wireless Application Environment/Wireless Application Protocol (WAE/WAP): WAE specifies an application framework for wireless devices and WAP is an open standard to provide mobile users access to telephony and information services.


Baseband error correction

Depending on packet type, individual packets may be protected by
error correction In information theory and coding theory with applications in computer science and telecommunications, error detection and correction (EDAC) or error control are techniques that enable reliable delivery of digital data over unreliable communi ...
, either 1/3 rate
forward error correction In computing, telecommunication, information theory, and coding theory, forward error correction (FEC) or channel coding is a technique used for controlling errors in data transmission over unreliable or noisy communication channels. The centra ...
(FEC) or 2/3 rate. In addition, packets with CRC will be retransmitted until acknowledged by
automatic repeat request Automatic repeat request (ARQ), also known as automatic repeat query, is an error-control method for data transmission that uses acknowledgements (messages sent by the receiver indicating that it has correctly received a message) and timeout ...
(ARQ).


Setting up connections

Any Bluetooth device in ''discoverable mode'' transmits the following information on demand: * Device name * Device class * List of services * Technical information (for example: device features, manufacturer, Bluetooth specification used, clock offset) Any device may perform an inquiry to find other devices to connect to, and any device can be configured to respond to such inquiries. However, if the device trying to connect knows the address of the device, it always responds to direct connection requests and transmits the information shown in the list above if requested. Use of a device's services may require pairing or acceptance by its owner, but the connection itself can be initiated by any device and held until it goes out of range. Some devices can be connected to only one device at a time, and connecting to them prevents them from connecting to other devices and appearing in inquiries until they disconnect from the other device. Every device has a unique 48-bit address. However, these addresses are generally not shown in inquiries. Instead, friendly Bluetooth names are used, which can be set by the user. This name appears when another user scans for devices and in lists of paired devices. Most cellular phones have the Bluetooth name set to the manufacturer and model of the phone by default. Most cellular phones and laptops show only the Bluetooth names and special programs are required to get additional information about remote devices. This can be confusing as, for example, there could be several cellular phones in range named T610 (see
Bluejacking __NOTOC__ Bluejacking is the sending of unsolicited messages over Bluetooth to Bluetooth-enabled devices such as mobile phones, PDAs or laptop computers, sending a vCard which typically contains a message in the name field (i.e., for bluedati ...
).


Pairing and bonding


Motivation

Many services offered over Bluetooth can expose private data or let a connecting party control the Bluetooth device. Security reasons make it necessary to recognize specific devices, and thus enable control over which devices can connect to a given Bluetooth device. At the same time, it is useful for Bluetooth devices to be able to establish a connection without user intervention (for example, as soon as in range). To resolve this conflict, Bluetooth uses a process called ''bonding'', and a bond is generated through a process called ''pairing''. The pairing process is triggered either by a specific request from a user to generate a bond (for example, the user explicitly requests to "Add a Bluetooth device"), or it is triggered automatically when connecting to a service where (for the first time) the identity of a device is required for security purposes. These two cases are referred to as dedicated bonding and general bonding respectively. Pairing often involves some level of user interaction. This user interaction confirms the identity of the devices. When pairing completes, a bond forms between the two devices, enabling those two devices to connect in the future without repeating the pairing process to confirm device identities. When desired, the user can remove the bonding relationship.


Implementation

During pairing, the two devices establish a relationship by creating a
shared secret In cryptography, a shared secret is a piece of data, known only to the parties involved, in a secure communication. This usually refers to the key of a symmetric cryptosystem. The shared secret can be a PIN code, a password, a passphrase, a b ...
known as a ''link key''. If both devices store the same link key, they are said to be ''paired'' or ''bonded''. A device that wants to communicate only with a bonded device can cryptographically
authenticate Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating ...
the identity of the other device, ensuring it is the same device it previously paired with. Once a link key is generated, an authenticated ACL link between the devices may be
encrypted In cryptography, encryption (more specifically, encoding) is the process of transforming information in a way that, ideally, only authorized parties can decode. This process converts the original representation of the information, known as plain ...
to protect exchanged data against
eavesdropping Eavesdropping is the act of secretly or stealthily listening to the private conversation or communications of others without their consent in order to gather information. Etymology The verb ''eavesdrop'' is a back-formation from the noun ''eave ...
. Users can delete link keys from either device, which removes the bond between the devices—so it is possible for one device to have a stored link key for a device it is no longer paired with. Bluetooth services generally require either encryption or authentication and as such require pairing before they let a remote device connect. Some services, such as the Object Push Profile, elect not to explicitly require authentication or encryption so that pairing does not interfere with the user experience associated with the service use-cases.


Pairing mechanisms

Pairing mechanisms changed significantly with the introduction of Secure Simple Pairing in Bluetooth v2.1. The following summarizes the pairing mechanisms: * ''Legacy pairing'': This is the only method available in Bluetooth v2.0 and before. Each device must enter a PIN code; pairing is only successful if both devices enter the same PIN code. Any 16-byte UTF-8 string may be used as a PIN code; however, not all devices may be capable of entering all possible PIN codes. ** ''Limited input devices'': The obvious example of this class of device is a Bluetooth Hands-free headset, which generally have few inputs. These devices usually have a ''fixed PIN'', for example "0000" or "1234", that are hard-coded into the device. ** ''Numeric input devices'': Mobile phones are classic examples of these devices. They allow a user to enter a numeric value up to 16 digits in length. ** ''Alpha-numeric input devices'': PCs and smartphones are examples of these devices. They allow a user to enter full UTF-8 text as a PIN code. If pairing with a less capable device the user must be aware of the input limitations on the other device; there is no mechanism available for a capable device to determine how it should limit the available input a user may use. * ''Secure Simple Pairing'' (SSP): This is required by Bluetooth v2.1, although a Bluetooth v2.1 device may only use legacy pairing to interoperate with a v2.0 or earlier device. Secure Simple Pairing uses a form of
public-key cryptography Public-key cryptography, or asymmetric cryptography, is the field of cryptographic systems that use pairs of related keys. Each key pair consists of a public key and a corresponding private key. Key pairs are generated with cryptographic alg ...
, and some types can help protect against man in the middle, or MITM attacks. SSP has the following authentication mechanisms: ** ''Just works'': As the name implies, this method just works, with no user interaction. However, a device may prompt the user to confirm the pairing process. This method is typically used by headsets with minimal IO capabilities, and is more secure than the fixed PIN mechanism this limited set of devices uses for legacy pairing. This method provides no man-in-the-middle (MITM) protection. ** ''Numeric comparison'': If both devices have a display, and at least one can accept a binary yes/no user input, they may use Numeric Comparison. This method displays a 6-digit numeric code on each device. The user should compare the numbers to ensure they are identical. If the comparison succeeds, the user(s) should confirm pairing on the device(s) that can accept an input. This method provides MITM protection, assuming the user confirms on both devices and actually performs the comparison properly. ** ''Passkey Entry'': This method may be used between a device with a display and a device with numeric keypad entry (such as a keyboard), or two devices with numeric keypad entry. In the first case, the display presents a 6-digit numeric code to the user, who then enters the code on the keypad. In the second case, the user of each device enters the same 6-digit number. Both of these cases provide MITM protection. ** ''Out of band'' (OOB): This method uses an external means of communication, such as
near-field communication Near-field communication (NFC) is a set of communication protocols that enables communication between two electronic devices over a distance of or less. NFC offers a low-speed connection through a simple setup that can be used for the boots ...
(NFC) to exchange some information used in the pairing process. Pairing is completed using the Bluetooth radio, but requires information from the OOB mechanism. This provides only the level of MITM protection that is present in the OOB mechanism. SSP is considered simple for the following reasons: * In most cases, it does not require a user to generate a passkey. * For use cases not requiring MITM protection, user interaction can be eliminated. * For ''numeric comparison'', MITM protection can be achieved with a simple equality comparison by the user. * Using OOB with NFC enables pairing when devices simply get close, rather than requiring a lengthy discovery process.


Security concerns

Prior to Bluetooth v2.1, encryption is not required and can be turned off at any time. Moreover, the encryption key is only good for approximately 23.5 hours; using a single encryption key longer than this time allows simple XOR attacks to retrieve the encryption key. * Turning off encryption is required for several normal operations, so it is problematic to detect if encryption is disabled for a valid reason or a security attack. Bluetooth v2.1 addresses this in the following ways: * Encryption is required for all non-SDP (Service Discovery Protocol) connections * A new Encryption Pause and Resume feature is used for all normal operations that require that encryption be disabled. This enables easy identification of normal operation from security attacks. * The encryption key must be refreshed before it expires. Link keys may be stored on the device file system, not on the Bluetooth chip itself. Many Bluetooth chip manufacturers let link keys be stored on the device—however, if the device is removable, this means that the link key moves with the device.


Security


Overview

Bluetooth implements
confidentiality Confidentiality involves a set of rules or a promise sometimes executed through confidentiality agreements that limits the access to or places restrictions on the distribution of certain types of information. Legal confidentiality By law, la ...
,
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
and key derivation with custom algorithms based on the SAFER+
block cipher In cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called ''blocks''. Block ciphers are the elementary building blocks of many cryptographic protocols. They are ubiquitous in the storage a ...
. Bluetooth key generation is generally based on a Bluetooth PIN, which must be entered into both devices. This procedure might be modified if one of the devices has a fixed PIN (e.g., for headsets or similar devices with a restricted user interface). During pairing, an initialization key or master key is generated, using the E22 algorithm. The E0 stream cipher is used for encrypting packets, granting confidentiality, and is based on a shared cryptographic secret, namely a previously generated link key or master key. Those keys, used for subsequent encryption of data sent via the air interface, rely on the Bluetooth PIN, which has been entered into one or both devices. An overview of Bluetooth vulnerabilities exploits was published in 2007 by Andreas Becker. In September 2008, the
National Institute of Standards and Technology The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into Outline of p ...
(NIST) published a Guide to Bluetooth Security as a reference for organizations. It describes Bluetooth security capabilities and how to secure Bluetooth technologies effectively. While Bluetooth has its benefits, it is susceptible to denial-of-service attacks, eavesdropping, man-in-the-middle attacks, message modification, and resource misappropriation. Users and organizations must evaluate their acceptable level of risk and incorporate security into the lifecycle of Bluetooth devices. To help mitigate risks, included in the NIST document are security checklists with guidelines and recommendations for creating and maintaining secure Bluetooth piconets, headsets, and smart card readers. Bluetooth v2.1 – finalized in 2007 with consumer devices first appearing in 2009 – makes significant changes to Bluetooth's security, including pairing. See the pairing mechanisms section for more about these changes.


Bluejacking

Bluejacking is the sending of either a picture or a message from one user to an unsuspecting user through Bluetooth wireless technology. Common applications include short messages, e.g., "You've just been bluejacked!" Bluejacking does not involve the removal or alteration of any data from the device. Some form of
DoS DOS (, ) is a family of disk-based operating systems for IBM PC compatible computers. The DOS family primarily consists of IBM PC DOS and a rebranded version, Microsoft's MS-DOS, both of which were introduced in 1981. Later compatible syste ...
is also possible, even in modern devices, by sending unsolicited pairing requests in rapid succession; this becomes disruptive because most systems display a full screen notification for every connection request, interrupting every other activity, especially on less powerful devices.


History of security concerns


2001–2004

In 2001, Jakobsson and Wetzel from
Bell Laboratories Nokia Bell Labs, commonly referred to as ''Bell Labs'', is an American industrial research and development company owned by Finnish technology company Nokia. With headquarters located in Murray Hill, New Jersey, the company operates several lab ...
discovered flaws in the Bluetooth pairing protocol and also pointed to vulnerabilities in the encryption scheme. In 2003, Ben and Adam Laurie from A.L. Digital Ltd. discovered that serious flaws in some poor implementations of Bluetooth security may lead to disclosure of personal data. In a subsequent experiment, Martin Herfurt from the trifinite.group was able to do a field-trial at the
CeBIT CeBIT was a computer expo which, at its peak, was the largest and most internationally representative. The trade fair was held each year on the Hanover fairground, the world's largest fairground, in Hanover, Germany. In its day, it was c ...
fairgrounds, showing the importance of the problem to the world. A new attack called BlueBug was used for this experiment. In 2004 the first purported
virus A virus is a submicroscopic infectious agent that replicates only inside the living Cell (biology), cells of an organism. Viruses infect all life forms, from animals and plants to microorganisms, including bacteria and archaea. Viruses are ...
using Bluetooth to spread itself among mobile phones appeared on the
Symbian OS Symbian is a discontinued mobile operating system (OS) and computing platform designed for smartphones. It was originally developed as a proprietary software OS for personal digital assistants in 1998 by the Symbian Ltd. consortium. Symbian OS ...
. The virus was first described by
Kaspersky Lab Kaspersky Lab (; ) is a Russian multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia, and operated by a holding company in the United Kingdom. It was founded in 1997 by Eugene Kaspersky, Natalya Kaspersky a ...
and requires users to confirm the installation of unknown software before it can propagate. The virus was written as a proof-of-concept by a group of virus writers known as "29A" and sent to anti-virus groups. Thus, it should be regarded as a potential (but not real) security threat to Bluetooth technology or
Symbian OS Symbian is a discontinued mobile operating system (OS) and computing platform designed for smartphones. It was originally developed as a proprietary software OS for personal digital assistants in 1998 by the Symbian Ltd. consortium. Symbian OS ...
since the virus has never spread outside of this system. In August 2004, a world-record-setting experiment (see also Bluetooth sniping) showed that the range of Class 2 Bluetooth radios could be extended to with directional antennas and signal amplifiers. This poses a potential security threat because it enables attackers to access vulnerable Bluetooth devices from a distance beyond expectation. The attacker must also be able to receive information from the victim to set up a connection. No attack can be made against a Bluetooth device unless the attacker knows its Bluetooth address and which channels to transmit on, although these can be deduced within a few minutes if the device is in use.


2005

In January 2005, a mobile
malware Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
worm known as Lasco surfaced. The worm began targeting mobile phones using
Symbian OS Symbian is a discontinued mobile operating system (OS) and computing platform designed for smartphones. It was originally developed as a proprietary software OS for personal digital assistants in 1998 by the Symbian Ltd. consortium. Symbian OS ...
( Series 60 platform) using Bluetooth enabled devices to replicate itself and spread to other devices. The worm is self-installing and begins once the mobile user approves the transfer of the file (Velasco.sis) from another device. Once installed, the worm begins looking for other Bluetooth enabled devices to infect. Additionally, the worm infects other .SIS files on the device, allowing replication to another device through the use of removable media (
Secure Digital Secure Digital (SD) is a proprietary, non-volatile, flash memory card format developed by the SD Association (SDA). Owing to their compact size, SD cards have been widely adopted in a variety of portable consumer electronics, including digi ...
,
CompactFlash CompactFlash (CF) is a flash memory mass storage device used mainly in portable electronic devices. The format was specified and the devices were first manufactured by SanDisk in 1994. CompactFlash became one of the most successful of the e ...
, etc.). The worm can render the mobile device unstable. In April 2005,
University of Cambridge The University of Cambridge is a Public university, public collegiate university, collegiate research university in Cambridge, England. Founded in 1209, the University of Cambridge is the List of oldest universities in continuous operation, wo ...
security researchers published results of their actual implementation of passive attacks against the PIN-based pairing between commercial Bluetooth devices. They confirmed that attacks are practicably fast, and the Bluetooth symmetric key establishment method is vulnerable. To rectify this vulnerability, they designed an implementation that showed that stronger, asymmetric key establishment is feasible for certain classes of devices, such as mobile phones. In June 2005, Yaniv Shaked and Avishai Wool published a paper describing both passive and active methods for obtaining the PIN for a Bluetooth link. The passive attack allows a suitably equipped attacker to eavesdrop on communications and spoof if the attacker was present at the time of initial pairing. The active method makes use of a specially constructed message that must be inserted at a specific point in the protocol, to make the master and slave repeat the pairing process. After that, the first method can be used to crack the PIN. This attack's major weakness is that it requires the user of the devices under attack to re-enter the PIN during the attack when the device prompts them to. Also, this active attack probably requires custom hardware, since most commercially available Bluetooth devices are not capable of the timing necessary. In August 2005, police in
Cambridgeshire Cambridgeshire (abbreviated Cambs.) is a Ceremonial counties of England, ceremonial county in the East of England and East Anglia. It is bordered by Lincolnshire to the north, Norfolk to the north-east, Suffolk to the east, Essex and Hertfor ...
, England, issued warnings about thieves using Bluetooth enabled phones to track other devices left in cars. Police are advising users to ensure that any mobile networking connections are de-activated if laptops and other devices are left in this way.


2006

In April 2006, researchers from Secure Network and
F-Secure F-Secure Corporation is a global cyber security and privacy company, which has its headquarters in Helsinki, Finland. The company has offices in Denmark, Finland, France, Germany, India, Italy, Japan, Malaysia, Netherlands, Norway, Poland, Swed ...
published a report that warns of the large number of devices left in a visible state, and issued statistics on the spread of various Bluetooth services and the ease of spread of an eventual Bluetooth worm. In October 2006, at the Luxembourgish Hack.lu Security Conference, Kevin Finistere and Thierry Zoller demonstrated and released a remote root shell via Bluetooth on Mac OS X v10.3.9 and v10.4. They also demonstrated the first Bluetooth PIN and Linkkeys cracker, which is based on the research of Wool and Shaked.


2017

In April 2017, security researchers at Armis discovered multiple exploits in the Bluetooth software in various platforms, including
Microsoft Windows Windows is a Product lining, product line of Proprietary software, proprietary graphical user interface, graphical operating systems developed and marketed by Microsoft. It is grouped into families and subfamilies that cater to particular sec ...
,
Linux Linux ( ) is a family of open source Unix-like operating systems based on the Linux kernel, an kernel (operating system), operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically package manager, pac ...
, Apple
iOS Ios, Io or Nio (, ; ; locally Nios, Νιός) is a Greek island in the Cyclades group in the Aegean Sea. Ios is a hilly island with cliffs down to the sea on most sides. It is situated halfway between Naxos and Santorini. It is about long an ...
, and Google Android. These vulnerabilities are collectively called " BlueBorne". The exploits allow an attacker to connect to devices or systems without authentication and can give them "virtually full control over the device". Armis contacted Google, Microsoft, Apple, Samsung and Linux developers allowing them to patch their software before the coordinated announcement of the vulnerabilities on 12 September 2017.


2018

In July 2018, Lior Neumann and
Eli Biham Eli Biham () is an Israeli cryptographer and cryptanalyst who is a professor at the Technion - Israel Institute of Technology Computer Science department. From 2008 to 2013, Biham was the dean of the Technion Computer Science department, afte ...
, researchers at the Technion – Israel Institute of Technology identified a security vulnerability in the latest Bluetooth pairing procedures: Secure Simple Pairing and LE Secure Connections. Also, in October 2018, Karim Lounis, a network security researcher at Queen's University, identified a security vulnerability, called CDV (Connection Dumping Vulnerability), on various Bluetooth devices that allows an attacker to tear down an existing Bluetooth connection and cause the deauthentication and disconnection of the involved devices. The researcher demonstrated the attack on various devices of different categories and from different manufacturers.


2019

In August 2019, security researchers at the
Singapore University of Technology and Design The Singapore University of Technology and Design (SUTD) is a public university, public autonomous university in Singapore. History The founding president is Thomas L. Magnanti, who is a professor associated with the Massachusetts Institu ...
, Helmholtz Center for Information Security, and
University of Oxford The University of Oxford is a collegiate university, collegiate research university in Oxford, England. There is evidence of teaching as early as 1096, making it the oldest university in the English-speaking world and the List of oldest un ...
discovered a vulnerability, called KNOB (Key Negotiation of Bluetooth) in the key negotiation that would "brute force the negotiated encryption keys, decrypt the eavesdropped ciphertext, and inject valid encrypted messages (in real-time)". Google released an Android security patch on 5 August 2019, which removed this vulnerability.


2023

In November 2023, researchers from Eurecom revealed a new class of attacks known as BLUFFS (Bluetooth Low Energy Forward and Future Secrecy Attacks). These 6 new attacks expand on and work in conjunction with the previously known KNOB and BIAS (Bluetooth Impersonation AttackS) attacks. While the previous KNOB and BIAS attacks allowed an attacker to decrypt and spoof Bluetooth packets within a session, BLUFFS extends this capability to all sessions generated by a device (including past, present, and future). All devices running Bluetooth versions 4.2 up to and including 5.4 are affected.


Health concerns

Bluetooth uses the
radio frequency Radio frequency (RF) is the oscillation rate of an alternating electric current or voltage or of a magnetic, electric or electromagnetic field or mechanical system in the frequency range from around to around . This is roughly between the u ...
spectrum in the 2.402GHz to 2.480GHz range, which is
non-ionizing radiation Non-ionizing (or non-ionising) radiation refers to any type of electromagnetic radiation that does not carry enough energy per quantum ( photon energy) to ionize atoms or molecules—that is, to completely remove an electron from an atom or mol ...
, of similar bandwidth to that used by wireless and mobile phones. No specific harm has been demonstrated, even though wireless transmission has been included by
IARC IARC may refer to: * International Aerial Robotics Competition * International Age Rating Coalition * International Agency for Research on Cancer * International Arctic Research Center * Israel Association of Radio Communication * iArc, South Ko ...
in the possible
carcinogen A carcinogen () is any agent that promotes the development of cancer. Carcinogens can include synthetic chemicals, naturally occurring substances, physical agents such as ionizing and non-ionizing radiation, and biologic agents such as viruse ...
list. Maximum power output from a Bluetooth radio is 100 mW for Class1, 2.5mW for Class2, and 1mW for Class3 devices. Even the maximum power output of Class1 is a lower level than the lowest-powered mobile phones.
UMTS The Universal Mobile Telecommunications System (UMTS) is a 3G mobile cellular system for networks based on the GSM standard. UMTS uses Wideband Code Division Multiple Access, wideband code-division multiple access (W-CDMA) radio access technolog ...
and
W-CDMA The Universal Mobile Telecommunications System (UMTS) is a 3G mobile cellular system for networks based on the GSM standard. UMTS uses wideband code-division multiple access (W-CDMA) radio access technology to offer greater spectral efficiency ...
output 250mW, GSM1800/1900 outputs 1000mW, and GSM850/900 outputs 2000mW.


Award programs

The Bluetooth Innovation World Cup, a marketing initiative of the Bluetooth Special Interest Group (SIG), was an international competition that encouraged the development of innovations for applications leveraging Bluetooth technology in sports, fitness and health care products. The competition aimed to stimulate new markets. The Bluetooth Innovation World Cup morphed into the Bluetooth Breakthrough Awards in 2013. Bluetooth SIG subsequently launched the Imagine Blue Award in 2016 at Bluetooth World. The Bluetooth Breakthrough Awards program highlights the most innovative products and applications available today, prototypes coming soon, and student-led projects in the making.


See also

*
ANT+ Ants are Eusociality, eusocial insects of the Family (biology), family Formicidae and, along with the related wasps and bees, belong to the Taxonomy (biology), order Hymenoptera. Ants evolved from Vespoidea, vespoid wasp ancestors in the Cre ...
* Bluetooth stack – building blocks that make up the various implementations of the Bluetooth protocol *
List of Bluetooth profiles In order to use Bluetooth, a device must be compatible with the subset of Bluetooth ''profiles'' (often called services or functions) necessary to use the desired services. A Bluetooth profile is a specification regarding an aspect of Bluetooth-b ...
– features used within the Bluetooth stack * Bluesniping * BlueSoleil – proprietary Bluetooth driver * Bluetooth Low Energy beacons ( AltBeacon,
iBeacon iBeacon is a protocol developed by Apple and introduced at the Apple Worldwide Developers Conference in 2013. Various vendors have since made iBeacon-compatible hardware transmitters – typically called beacons – a class of Blueto ...
, Eddystone) *
Bluetooth mesh networking Bluetooth Mesh is a computer mesh networking standard based on Bluetooth Low Energy that allows for many-to-many communication over Bluetooth radio. The Bluetooth Mesh specifications were defined in the Mesh Profile and Mesh Model specification ...
* Continua Health Alliance *
DASH7 DASH7 Alliance Protocol (D7A) is an open-source wireless sensor and actuator network protocol, which operates in the 433 MHz, 868 MHz and 915 MHz unlicensed ISM/SRD band. DASH7 provides multi-year battery life, range of up to 2&n ...
*
Audio headset A headset is a combination of headphone and microphone. Headsets connect over a telephone or to a computer, allowing the user to speak and listen while keeping both hands free. They are commonly used in customer service and technical support ce ...
*
Wi-Fi hotspot A hotspot is a physical location where people can obtain Internet access, typically using Wi-Fi technology, via a wireless local-area network (WLAN) using a router connected to an Internet service provider. Public hotspots may be created by ...
*
Java APIs for Bluetooth Java APIs for Bluetooth Wireless Technology (JABWT) is a J2ME specification for APIs that allows Java MIDlets running on embedded devices such as mobile phones to use Bluetooth for short-range wireless communication. JABWT was developed as JSR-82 ...
*
Key finder Key finders, also known as keyfinders, key locators, or electronic finders, are small electronic devices fitted to objects to locate them when misplaced or stolen, such as keys, luggage, purses, wallets, pets, laptop computers, toddlers, cellph ...
*
Li-Fi Li-Fi (commonly referred to as LiFi) is a wireless communication technology which utilizes light to transmit data and position between devices. The term was first introduced by Harald Haas during a 2011 TEDGlobal talk in Edinburgh. Li-Fi is a ...
*
List of Bluetooth protocols The wireless data exchange standard Bluetooth uses a variety of protocols. Core protocols are defined by the trade organization Bluetooth SIG. Additional protocols have been adopted from other standards bodies. This article gives an overview of ...
* MyriaNed *
Near-field communication Near-field communication (NFC) is a set of communication protocols that enables communication between two electronic devices over a distance of or less. NFC offers a low-speed connection through a simple setup that can be used for the boots ...
*
NearLink NearLink ( zh, 星闪; also known as SparkLink and formerly Greentooth) is a short-range wireless technology protocol, which was developed by the NearLink Alliance, led by Huawei to set up on September 22, 2020. As of September 2023, the Allianc ...
* RuBee – secure wireless protocol alternative *
Tethering Tethering or phone-as-modem (PAM) is the sharing of a mobile device's cellular data connection with other connected computers. It effectively turns the transmitting device into a modem to allow others to use its cellular network as a gateway for ...
*
Thread (network protocol) Thread is an IPv6-based, low-power mesh networking technology for Internet of things (IoT) products. The Thread protocol specification is available at no cost; however, this requires agreement and continued adherence to an end-user license ...
* Wi-Fi HaLow *
Zigbee Zigbee is an IEEE 802.15.4-based specification for a suite of high-level communication protocols used to create personal area networks with small, low-power digital radios, such as for home automation, medical device data collection, and oth ...
 – low-power lightweight wireless protocol in the
ISM band The ISM radio bands are portions of the radio spectrum reserved internationally for ''industrial, scientific, and medical'' (ISM) purposes, excluding applications in telecommunications. Examples of applications for the use of radio frequency (RF ...
based on
IEEE 802.15.4 IEEE 802.15.4 is a technical standard that defines the operation of a low-rate wireless personal area network (LR-WPAN). It specifies the physical layer and media access control for LR-WPANs, and is maintained by the IEEE 802.15 working group, ...


Notes


References


External links

*
Specifications
at Bluetooth SIG {{Authority control Bluetooth Mobile computers Networking standards Wireless communication systems Telecommunications-related introductions in 1989 Swedish inventions Dutch inventions Cultural depictions of Harald Bluetooth