Logitech Advanced 2.4 GHz Technology



Similar documents
Logitech Advanced 2.4 GHz Technology With Unifying Technology

Office Cordless Desktop 2.4GHz FAQ

Peripherals. Architecture for Business. Designed to optimise the workspace. 2.4 GHz Wireless Technology A Logitech white paper

The next generation of knowledge and expertise Wireless Security Basics

Bluetooth usage with Architecture view & security measures

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

ZIGBEE ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna

SmartDiagnostics Application Note Wireless Interference

LoRaWAN. What is it? A technical overview of LoRa and LoRaWAN. Technical Marketing Workgroup 1.0

Wireless Network Policy

Bluetooth wireless technology basics

Comparison of 2.4-GHz proprietary RF and Bluetooth 4.0 for HIS applications Page 1 of 6

NetPlug200 Nano.

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

1. What is the main difference between the X3 micro and other Bluetooth headsets? 3. How does the X3 micro use the Bluetooth technology?

Guide for wireless environments

Wi-Fi Why Now? Exploring New Wireless Technologies for Industrial Applications

An Overview of ZigBee Networks

Optimizing Wireless Networks.

Chapter 2 Configuring Your Wireless Network and Security Settings

WHITE PAPER. WEP Cloaking for Legacy Encryption Protection

Wireless Ethernet LAN (WLAN) General a/802.11b/802.11g FAQ

750Mbps ac Wireless Broadband Router

running operation mode painless TECHNICAL SPECIFICATION WAN/LAN: One 10/100 Fast Ethernet RJ-45 WPS (WiFi Protected Setup) WAN (Internet connection)

CYPRESS SEMICONDUCTOR CORPORATION Internal Correspondence. Frequently Asked Questions. Contents. TITLE: Cypress s WUSB-NX Solutions for HID NPI

Maximizing Range and Battery Life in Low-Cost Wireless Networks

Microchip Technology. February 2008 Valerio Moretto Slide 1

Wireless Telephone System Product Comparison

ENHWI-N n Wireless Router

Linksys WAP300N. User Guide

CS263: Wireless Communications and Sensor Networks

EAP N Wall Mount Access Point / WDS AP / Universal Repeater

INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6

The Basics of Wireless Local Area Networks

The Increasing Use of Cordless Handheld Bar Code Readers, Technology, and Applications. A White Paper by Datalogic Scanning, Inc.

Purpose Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations Data Encryption...

Chapter 2 Wireless Settings and Security

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

PM0237 Programming manual

Talon Communications Presentation

Tecnologías Inalámbricas.

PCMCIA Wireless LAN Card User s Manual

Chapter 3 Safeguarding Your Network

a Unified Home Gateway Series Introduction: Market Drivers and Tech Challenges Carol Ansley, Sr. Director Advanced Architecture, ARRIS

Cloud-based Wireless LAN for Enterprise, SMB, IT Service Providers and Carriers. Product Highlights. Relay2 Enterprise Access Point RA100 Datasheet

User Manual. Ver 1.0. Solutions for the Digital Life

2.4GHz / 5GHz Dual CPU 600Mbps 11N AP/Router

Wharf T&T Limited Report of Wireless LAN Technology Trial Version: 1.0 Date: 26 Jan Wharf T&T Limited. Version: 1.0 Date: 26 January 2004

Wireless Encryption Protection

Jabra FREEWAY. User manual.

VMware View 4 with PCoIP I N F O R M AT I O N G U I D E

Crestron Best Practices for Installation and Setup of Crestron RF Products Reference Guide

Wireless Phone Systems for Your Organization

Wireless LANs vs. Wireless WANs

Zlinx Wireless I/O. Peer-to-Peer and Modbus I/O B&B ELECTRONICS PRODUCT INFORMATION

EPL 657 Wireless Networks

Wireless Technologies for the 450 MHz band

Home Passport Gateway Series Simplify your Life with Smart Solutions

Key Priorities for Sub-GHz Wireless Deployment

Portable Wireless Mesh Networks: Competitive Differentiation

Home Automation and Cybercrime

Key Features. Multiple Operation Modes ENH500 can operate into four different modes with Access Point, Client Bridge, Client Router and WDS Mode.

EPI-3601S Wireless LAN PCI adapter Version 1.2 EPI-3601S. Wireless LAN PCI Adapter. (802.11g & b up to 108 Mbps) User Manual. Version: 1.

300Mbps Dual Band n Wireless Gigabit Router

ESR7550 KEY FEATURES PRODUCT DESCRIPTION

LTE, WLAN, BLUETOOTHB

Spring Final Project Report

5GHz 300Mbps 13dBi Outdoor CPE

PQoS Parameterized Quality of Service. White Paper

MAKING THE RIGHT CONNECTIONS

Monitores Equipos Móviles Especificaciones de Producto

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Quick Start Guide. USB Packet Sniffer/Dongle for Kinetis MKW22D and MKW24D Wireless MCUs USB-KW24D512

Wireless Multi-Mode AP Router. AP Only. WDS Repeater. WDS Only. Adapter WAN. Port LAN LAN

Wireless VPN White Paper. WIALAN Technologies, Inc.

A Division of Cisco Systems, Inc. GHz g. Wireless-G. Access Point with SRX. User Guide WIRELESS WAP54GX. Model No.

Cisco Aironet Wireless Bridges FAQ

Output Power (without antenna) 5GHz 2.4GHz

ESR b/g/n SOHO Router

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

AC1750 Dual Band Wireless Router with StreamBoost Technology. TEW-824DRU (v1.0r) TEW-824DRU

Demystifying Wireless for Real-World Measurement Applications

Wireless LAN Concepts

WASP User Manual. Revision: 1.6. (c) 2012 North Pole Engineering, Inc.

Wireless Personal Area Networks (WPANs)

White Paper. D-Link International Tel: (65) , Fax: (65) Web:

ESR b/g/n SOHO Router

TECHNICAL NOTE. GoFree WIFI-1 web interface settings. Revision Comment Author Date 0.0a First release James Zhang 10/09/2012

MCB3101 (Class I) WiRobot Serial Bluetooth Wireless Module User Manual

APx4 Wireless System-on-Module 5/8/2013 1

FREQUENTLY ASKED QUESTIONS

802.11b/g/n SOHO Router 2.4GHz 150Mbps 11N AP/Router

ZigBee Technology Overview

Transcription:

Logitech Advanced 2.4 GHz Technology Revision 1.1H March 2, 2009

TABLE OF CONTENTS 1 INTRODUCTION... 3 2 SYSTEM OVERVIEW... 4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN FEATURES...4 3 ASSOCIATION MODEL... 5 4 ENCRYPTION... 6 4.1 ENCRYPTION ALGORITHM...6 4.2 GENERATION OF ENCRYPTION KEYS...7 5 FEATURES & PERFORMANCE... 8 5.1 POWER CONSUMPTION...9 6 LOGITECH PRODUCTS WITH ADVANCED 2.4 GHZ TECHNOLOGY...10 2

1 Introduction: The Move to Wireless Peripherals in Business In today s workplace, businesses demand that employees be increasingly mobile to move quickly, with computer equipment in hand, between in-house meetings, office to home, office to offsite meetings, and to travel to distant locations. More and more companies are therefore prioritizing the adoption of both wireless networks and notebook computers to not only meet these mobility needs, but also to promote comfort and productivity for their busy employees. This modern business place in turn demands mice and keyboards that complete the story of mobility, along with employee comfort and productivity that also have the highest-level of encryption and powerful connections even in the busiest of environments. Logitech offers a variety of wireless mice, keyboards and mice + keyboard combinations which come standard with Advanced 2.4 GHz technology. This technology includes: Secure 128-bit (AES) encryption between device and receiver Up to 3-years battery life Range of up to 10 meters or 33 feet With Logitech s Advanced 2.4 GHz, your employees can get all the benefits of a cord with the convenience of wireless. And, Logitech s wireless mice and keyboards are easy to use no software installation or pairing are required. The goal of this document is to highlight the main features of the Logitech advanced 2.4 GHz proprietary wireless technology. The scope is limited to a high-level presentation of the advanced 2.4 GHz technology. For a complete list of wireless mice and keyboards that contain Logitech s Advanced 2.4 GHz wireless technology, please visit the Logitech for Business Products section at www.logitech.com/business. 3

2 System Overview 2.1 Network Topology An advanced 2.4 GHz network is a star topology network where the receiver is the central point. Advanced 2.4 GHz supports one encrypted keyboard and one mouse connected to the same receiver, transmitting data simultaneously. The Logitech software (SetPoint for PC or LCC for Mac) provides extra functionalities but is not mandatory to operate an advanced 2.4 GHz network. Unlike most star topology networks, the advanced 2.4 GHz receiver is not the master of the links. Each device is a master and may transmit data at any time. This scheme contributes to further reduce the power consumption of the devices by shutting down their radio when no user activity is detected. The more common scheme where the receiver is continuously polling each device for data requires that the devices are continuously listening for the master. 2.2 Main Features Unlike Bluetooth, Logitech advanced 2.4 GHz is not a frequency-hopping protocol that continuously jumps from one channel to another. Logitech advanced 2.4 GHz is a so-called frequency-agility protocol that stays on the same channel as long as possible. When the active channel becomes unusable, Logitech advanced 2.4 GHz automatically selects another one. The advanced 2.4 GHz system uses 24 radio channels defined in the 2.4 GHz ISM band. This ISM band has the advantage of being available in most countries around the world. The advanced 2.4 GHz system implements only bidirectional links. Bidirectional links allow improved error correction, seamless encryption, device firmware upgrade and a better interaction between the Logitech software and the devices. The typical latency of an advanced 2.4 GHz device operating in a clean environment is below 10 ms. In a noisy environment, this latency may increase depending on the strength, type and occurrence of the interference. Communication between the wireless keyboard and receiver are always encrypted to avoid eavesdropping. 4

The advanced 2.4 GHz devices are pre-paired to their receiver at the factory to be functional out-of-the box. The encryption keys required by the keyboard link are also pre-programmed at the factory. An advanced 2.4 GHz device can be replaced by another one at any time. The pairing procedure requires the Logitech Connect Utility software, and the communication will be automatically encryptedassociation Model The association model defines the concepts and methods implemented to achieve a mutual recognition of wireless devices. To simplify the out-of-the-box product setup by the end user, the devices are pre-paired to their receiver at the factory. The factory pairing includes the generations of the encryption keys required by the keyboard link. 3 Association Model The association model defines the concepts and methods implemented to achieve a mutual recognition of wireless devices. To simplify the out-of-the-box product setup by the end user, the devices are pre-paired to their receiver at the factory. The factory pairing includes the generations of the encryption keys required by the keyboard link. 5

4 Encryption Computer keyboards process very private or sensitive information like passwords, credit card numbers, or personal messages. Since the range of an advanced 2.4 GHz device may reach several tens of meters in an open environment, it is critical to take adequate measures to prevent eavesdropping. Advanced 2.4 GHz applies state-of-the-art encryption to the keyboard reports. Since the displacements of a mouse would not give any useful information to a hacker, the mouse reports are not encrypted. Encryption is limited to the wireless link between the keyboard and the receiver. Encryption is totally transparent to the software which receives clear data from the receiver over the USB. This means that the advanced 2.4 GHz encryption provides no protection against hackers who are able to get physical access to the PC, or who are able to remotely install spy software on the PC. The encryption applies to all standard keyboard keys (a, s, d, f...) and modifiers (Shift, Ctrl, Alt...). The multimedia keys (Play, Pause, Mute...) that may be implemented in some keyboards are transmitted in clear text. 4.1 Encryption Algorithm The encryption method consists of hiding the wireless messages with a cryptogram. The selected algorithm is the AES 128-bit cipher, which has been adopted as an encryption standard by the US government. As of today, the only known way to crack it is to try all possible keys. Even if it was possible to test 1 billion keys per second, billions of years would be necessary to try all combinations. AES is based on symmetric 128-bit keys, symmetric meaning that the same key is used to encrypt a message in the keyboard and to decrypt the message in the receiver. 6

4.2 Generation of Encryption Keys When a device that requires encryption is paired to a receiver, the pairing process includes the generation of 128-bit encryption keys. The same unique key is constructed both in the keyboard and in the receiver based on random values exchanged during the pairing procedure. Note that the encryption keys are never transmitted over the air. By spying the packets exchanged during the pairing process, a hacker would not be able to find the encryption keys without knowing the secret algorithm implemented to construct them. The initial encryption keys are programmed at the factory when the devices are paired to their receiver. The encryption keys are stored in a non-volatile memory area of the keyboard and receiver. As this is hardware encrypted, software cannot access. 7

5 Features & Performance Transmission Parameters Radio frequency band 2.4 GHz ISM Number of radio channels 24 Transmit power 0 dbm (like BT class 2 and Cypress WUSB) Range: USB Micro receiver 10 m Responsiveness Bandwidth (peak, raw) Mouse report rate [rpts/s] Keyboard typing speed [keys/s] Latency in a clean environment [ms] Latency following a power up [ms] Latency following low power mode [ms] 2 Mbps bursts 125 rpts/s 25 keys/s < 8 ms < 90 ms Implementation specific Resistance to Interference Resistance to Wi-Fi perturbation Resistance to Bluetooth perturbation Resistance to Audio RF streamer (Logitech Z- 5450) Resistance to Multipath effect (selfperturbation) Resistance to RF analog surveillance camera Exposition to interference in continuous tracking (= typical percentage of time during which the radio channel is used, and prone to collide with other radio traffic) Good Excellent Excellent Excellent Excellent 1-2% Architecture Capabilities Keyboard encryption Yes Encryption method AES 128 Bit Downstream capability Yes Downstream bandwidth [kbits/s] up to 20 kbits/s Number of devices per dongle 2 Full SetPoint and LCC compatibility Yes 8

(proprietary extensions, HID++, Hi-Res roller etc ) 5.1 Power Consumption In terms of power consumption, the main advantage of advanced 2.4 GHz compared to a 27 MHz system is the available bit rate: 2 Mbits/s for advanced 2.4 GHz vs. 6 kbits/s for 27 MHz. As a consequence, the time needed by an advanced 2.4 GHz device to transmit a report is about 300 times shorter that the time needed by a 27 MHz device to transmit the same report. The radio of an advanced 2.4 GHz device is therefore active for a much shorter period of time, leading to a lower average power consumption. 2008 Logitech, Inc. All rights reserved. Logitech, the Logitech logo, and other Logitech marks are owned by Logitech and may be registered. All other trademarks are the property of their respective owners. Rev 9/08 9