What is meant by Authentication and Authorization in Bluetooth technology.

Mumbai University > Electronics Engineering > Sem 8 > Advanced Networking Technologies

Marks: 10M

1 Answer

There are two kinds of security levels: authentication and authorization. Authentication verifies who is at the other end of the link. In Bluetooth this is achieved by the authentication procedure based on the stored link key or by the pairing procedure. To meet different requirements on availability of services without user intervention, authentication is performed after determining what the security level of the requested service is. Thus, authentication cannot be performed when the ACL link is established. The authentication is performed when a connection request to a service is submitted. The following procedure is used:

  1. The connect request to L2CAP is sent.
  2. L2CAP requests access from the security manager.
  3. The security manager enquires the service database.
  4. The security manager enquires the device database.
  5. If necessary, the security manager enforces the authentication and encryption procedure.
  6. The security manager grants access, and L2CAP continues to set up the connection. Authentication can be performed in both directions: client authenticates server and vice versa.

enter image description here


  1. When one device is allowed to access the other, the concept of trust comes into existence.
  2. Trusted devices are allowed access to services.
  3. While, on the contrary, untrusted devices may require authorization based on user interaction before access to services is granted.

There are two kinds of device trust levels:

  1. Trusted device: A device with a fixed relationship (paired) that has trusted and unrestricted access to all services.
  2. Untrusted device: This device has been previously authenticated, a link key is stored, but the device is not marked as trusted in the device database.
  3. An unknown device is also an untrusted device. No security information is available for this device.

For services, the requirement for authorization, authentication, and encryption are set independently (although some restrictions apply). The access requirements define three security levels:

  1. Services that require authorization and authentication — Automatic access is only granted to trusted devices. Other devices need a manual authorization.
  2. Services that require authentication only — Authorization is not necessary.
  3. Services open to all devices — Authentication is not required, no access approval is required before service access is granted.
  4. A default security level is defined to serve the needs of legacy applications.
  5. This default policy will be used unless other settings are found in a security database related to a service.
Please log in to add an answer.