Bluetooth Technology as an Interactive Tool in the Internet of Things
|
|
|
- Janel Watts
- 9 years ago
- Views:
Transcription
1 Bluetooth Technology as an Interactive Tool in the Internet of Things Nyeche Hakwumeru Prince Abstract Bluetooth technology is one of the leading growing technologies that has surface during the 21 st century, it has encompass every aspect of emerging technology that are used virtually in different industries. The main scope of this research is to educate, link and find a constructive method for the productivity and how communication can go beyond just sharing of information to expanding information into different forms with what most people use mobile technology within the 21 st century. The author will disseminate stringent history and development of how Bluetooth technology can be expanded to focus not primarily on information dispersal but with interaction with other mobile technology. Bluetooth technology has seen growth in Mobile telecommunication, Health Sectors, information technology, Engineering etc. All these sector of the industries has a purpose to the use of Bluetooth, but how can they use Bluetooth to interact with the user or his environment would be an interesting aspect. Making Bluetooth technology expand its range beyond wireless frequencies into wireless Network and wireless interconnectivity; spanning across greater distances. In so doing, converting short distances using bridges of wireless networks known as the Internet. Keywords: Bluetooth, wireless, technology, mobile technology, mobile telecommunication, social interaction, wireless networks, wireless sensor networks, internet of things, mobile computing, ubiquitous computing, Bluetooth technology Introduction Bluetooth is a technology developed by Ericsson in 1994 came to form the technology we use today in most mobile devices. It uses radio transmission which operating outside an unlicensed Industrial, Scientific and Medical Band of 2.4 to GHz. Which later various companies which promoted the technology such as Ericsson, Nokia, Intel, Toshiba and IBM; came to form the now Bluetooth Special Interest Group (SIG) (Bluetooth.com). To form a variant of globally connecting millions of devices through the internet, Bluetooth is a prospective technology that has the ability to make such breakthrough a possibility. Just imagine going to a grocery store and being able to look through the inventory for things you shop the most for. Think about walking into a boutique / mall and having a prerequisite alerting you of items that have gotten sales discount just by having your Bluetooth on from a mobile device or a mobile computer or just imagine entering a restaurant or even a transport system and paying via phone or mobile device wirelessly even before you get there. These are the innovation that can span through if properly looked on. The internet of Things is an idea that would make machines connect and understand one another without / less human interaction. What makes Bluetooth an ideal candidate in this picture will tell a greater meaning in the development of the technology that will present more connectivity and it s common among already existing technology and mobile devices. Page 1
2 As the 21 st century moves on, more and more technology will rise that will define the scope at which it either improves or limits the ones that we have currently. Looking at it from a perspective of a consumer, you might be asking how this technology can benefit me. Now with the rise in social applications and how people have mobile devices, the increase will ascertain that more; and how much people need wireless connectivity. In so doing information needs to be passed from one person to another. The broader scope of the internet of things and Bluetooth is very vast so the author is going to lessen the scope and pertain only to innovation that can spring forth which is expressed in section (IV) and security concerns on the existing technology. Therefore section (I) will describe a brief introduction to Bluetooth, Section (II) will illustrate and describe existing technologies and uses of Bluetooth and how it encompass to the Internet of Things, Section (III) will talk about the problems faced in the technology, Section (IV) will illustrate the methodology employed, potential ideas and innovation between Bluetooth and how it can bring greater connectivity with Internet of Things, Section (V) will conclude on the research and references. 1.1 Objectives Find a constructive way for communication to be more interactive with quality transmission and retrieval of information using existing technology with the aid of the Internet and Bluetooth technology Literature Review The internet of things is an idea that started over a decade ago and has since seen a rise in the development by various communities in the field. How can Bluetooth improve or contribute to such technology can be seen in Bluetooth Smart a new technology that encompass low use of Bluetooth technology and increase distance using mesh-technology (Bluetooth.com), users can be able to control basis home automated devices using current device present without any changes (Naveen Erasala, 2002). Due to the fact that Bluetooth currently is supported by many mobile devices, it makes it easier to be able to provide connectivity among these cross platform in addition such connectivity can be accessed from any device around the globe not necessarily that you have to be extremely close to the connected device but once close, wireless connectivity can still take place. Over the years, Bluetooth and many online developers has come up with ingenious ideas that change how we look at everyday devices, application and everyday appliances can become ubiquitous and with the application of Bluetooth along with wireless network and Wireless sensors. How these things (Stankovic, 2012) can function together goes a long way to describe why we need connectivity among devices that we use daily in our everyday endeavours. Beacon Technology in conjunction with Bluetooth Smart are now leading a frontier in the internet of Things bringing along Bluetooth technology into the mix, making things identifiable easily. Fig.2. Scatternet [Source: (Jaap Haartsen, 1999) ] Fig.1. Application Framework [Source: (Jaap Haartsen, 1999) ] The mec hani sm behi Page 2
3 nd Bluetooth technology can be described in the above Figures. Figure 1 describes the structural aspect of Bluetooth technology, which heavily depends on a network topology between physical, Network and the application aspect (Naveen Erasala, 2002). The Radio in the figure takes care of receiving and sending bitstream modulation. The Baseband defines timing, packets and framing. The link manager as the name implies is responsible of managing power, connection status and other management tasks. The logical link handles multiplexing higher level protocols. The audio data is linked directly to the baseband and audio control is layered over the logical link control. The RFCOMM and Network protocol provides different communication parameters. Therefore, Bluetooth uses an ad hoc, piconet structure which is referred to as scatternet technology in Figure 2. Scatternet sends bits of radio signals hence in piconets because these signal hops around a frequency of over 1600 hops/s which is the communication range at which Bluetooth technology comprises on, the hops causes the frequency waves to be generated in a randomized fraction. This makes Bluetooth more of a personal space technology unlike other radio technology such as Radio (AM/FM) or TV. Each Bluetooth network comprises of a Node which are made up of piconets of which each piconets describes a node called a Master and a Slave of which when a node belongs to multiple piconets they can be referred to as what is termed a Bridge (Bisdikian, 2001). As the name depicts, A Master is the like the head in a node and the Slave is like its servant who attaches itself to the Master to form these modulating hopping frequencies that scatters called piconets. So far as depicted by (Roch Guerin, 2001) classified piconets as being independent of one another and not certain which node chooses to become the master or slave but from the analysis describes the Scatternet technology as one where by a master is determined by having the highest available time and being the one able to hop quicker when in a Network. Thus once two nodes are joined in the same piconets and are hopping at the same frequencies, their clock synchronizes and they use the same hopping frequencies in the exchange of information (Mrs. Pratibha Singh, 2011) Problem Statement One of the greatest risk or rather ethical issues around Bluetooth technology is its security and privacy concern. The questions baffling critics has been, how secure is this Bluetooth technology? And over the years since it has suffice, there has been glitches of how information has been swindled and how it has been hacked. Never-the-less No great technology hasn t faced the tyranny demolished by security flaws or bugs that might be thwacked on any system. In line of trying to get Bluetooth as a frontier in the Internet of Things also comes with its own dilemma. Likewise the Internet of Things as promising as it could seems raises some privacy concern and security issues that deal with weak password and cross site scripting as examined by (Hewlett-Packard Development Company, 2014) report. The Internet of Things describes a future whereby all things are connected by means of wireless/wired to the internet, and when the author says Things it refers to items of the physical world which are attached or within sensors of these items connected to a network (Steve Hodges, 2013). Kevin Ashton layered the groundwork for the IoT at MIT s AutoID lab by making this ground statements "If we had computers that knew everything there was to know about things using data they gathered without any help from us -- we would be able to track and count everything, and greatly reduce waste, loss and cost. We would know when things needed replacing, repairing or recalling, and Page 3
4 whether they were fresh or past their best. We need to empower computers with their own means of gathering information, so they can see, hear and smell the world for themselves, in all its random glory. RFID and sensor technology enable computers to observe identify and understand the world without the limitations of human-entered data. (Lopez Research, 2013) By this time Bluetooth technology was at the brink of its Era, never knowing that one day, could also be relied on to achieve such spectacular features. Privacy/Health Concerns Weak Password Susceptible to Hacking ( Man-in-the-Middle Attack) MAC Spoofing Attacks PIN Cracking Attacks The above mentioned problems are what are considered when Bluetooth technology takes a leap into a broader network structure albeit we won t go into details as it is outside the scope of this research (Nateq Be-Nazir Ibn Minar, 2011). Privacy concern will raise an issue in the sense that, once more and more devices are connected to the internet, where this information goes to, who stores them and what if that information is used against a particular individual(s). Thus this will raise a concern for individual who will plan to use the future technology of Bluetooth and with so much radio waves been emitted in the environment, its only sceptical that one s health might or might not be affected due to the emission of radio waves every moment of the day. Weak password will also raise concern as well, as many things are connected to the internet especially when such things uses Bluetooth technology to collect data, definitely such system or software must encompass a model that is able to provide greater security identification pattern. Since all devices uses microchip sets or microcontrollers, therefore, there is a possibility that this technology could be susceptible to some form of hacking, although there are known threats and those unknown threats at the moment but when a technology becomes rapidly available then trends to find out loop holes will emerged to find out the plausibility of either by means of manipulation or control. Identifying devices and how these devices can be spoofed from their manufacture s identity or located using a device s MAC Address poses tension as well when a new technology is to be used this raising issues of information leakage as well Research Methodology In the implementation of this research, the author of this research decided to follow a mixed methodology. First of all, a Secondary Methodology will be employed followed by an Empirical methodology. Thus, this is to ensure that information that is gotten is properly used, data is analyzed and results can be gotten to be used in the continuous effort of improving the entire research idea. Secondly in terms of creating or developing a system that is ready, an Agile Methodology can be employed to tackle the system development cycle of this research thus, if any given system is used in place to expand this research, this methodology is a preferred solution in place to follow. Using such concept, the author will base most of the preliminary finding on observation and how the hardware aspect of Bluetooth will interact to achieve the author s designs. The concept is relatively simple, and it employs basic fundamental or rather rudimentary aspect of technology we all know and use which is mobile devices. 4.1 Work Plan and Implications The author s preliminary work plans includes designing a compatible mobile application, which is able to use the Bluetooth schema from a mobile phone or mobile device in communication pattern with other Bluetooth compatible devices. What the author envisions is to enable and use the internet in conjunction with Bluetooth technology to provide communication among different individuals as well as enable those devices to be able to Page 4
5 interact with the users. What the author is targeting as an innovative aspect of this research is described below: Bluetooth Voice Calls Providing wireless voice calls between Bluetooth enable devices, original audio waves will be transferred within a PAN and WAN Network. Bluetooth File Sharing over Cloud Technology Enabling a way whereby connected devices can have access to files or share files with each other or with other devices even after physically Bluetooth connected has been lost. This is rather carried over an Internet Protocol. Bluetooth Video Calls Enables the mobile devices to be able to make video calls in as much the same way a voice call would be implemented, even when not in a PAN area, information is securely transmitted over the Internet. Device Searching by means of a Unique Identifier one of the ways the author is targeting would be by using an address as the unique identifier in identifying other Bluetooth devices that are connected over the Internet. Thus tagging the device s MAC address and tying it up with a Central Database to identify devices. Sharing of Internet connectivity and Device Lock Mechanism (which include physical structures with sensor ability) with the aid of Bluetooth and Internet technology. With the aid of Bluetooth Smart currently version 4.2, Bluetooth technology will be able to perform with the below specification (Bluetooth.com): An intelligent wireless connection to authenticate and manage interactions An extremely power-efficient connection that doesn't drain the user's phone battery Nearly ubiquitous support from phone manufacturers and mobile operating systems Thus the author has come with an idea to create an application able to render services of which these Bluetooth devices will be able to conform with and allow the users to be able to control, use and interact with well known object. Preliminary areas of interest include: Universities/Schools Offices Homes These areas were targeted to ensure that communication is rapidly dispersed among individuals who normally lurk or engage in activities. An illustrative architecture below will demonstrate the author s vision in this given research project. Page 5
6 Fig.3. Bluetooth Internet Architecture 5.0. Conclusion Fig.4. Network Control System [Source: In the process of advancing science and technology an innovation must spring forth in order to drive the frontier in the quest for greater knowledge and for the betterment of mankind. Bluetooth technology shows a prospectus in bringing each and every devices connected to the Internet, and making the Internet of Things a reality. Albeit the finalization might not be too far ahead, the construct and idea the technology promises makes it an ideal candidate in improving the lives of individuals and how they communicate with one another and how computers can interact with users. In so doing, combining Bluetooth technology and the internet can help in various aspect of the Industrial and Academic sector. For starter, consumers will be able to share much more information easily at their own convenience, students can be able to communication of a free scale around campus areas, and information can be communicated to them at the same time. The possibility is vast but brings and reduces cost of communication on the long run. This way we can curb the cost it will take to talk over the internet as well as pay for using such services especially when such prices are statistically placed value of using such a service. This way communication will be on an open medium that binds connectivity. Reducing cost of communication, providing security of information and Page 6
7 expanding experience; on how mobile devices can learn, react and provide better information especially between people or individual who uses them on an everyday scale. With the help of Sensors, Bluetooth and the Internet, information can be easily passed across, there would be less restriction on how information can be used and in what form it can be used. The internet and Bluetooth will change the way we see our everyday lives by bringing it one step closer together when multiple devices are able to communicate with less hassle and when such communication will make mankind interact more with others. References [1] Bisdikian, C. (2001, June 25). An Overview of the Bluetooth Wireless Technology. Retrieved from IBM Research Division: 56AA000700E03/$File/RC22109.pdf [2] Bluetooth.com. (n.d.). Fast Facts - Bluetooth Technology Website. Retrieved January 16, 2015, from [3] Hewlett-Packard Development Company. (2014, September). Internet of Things Research Study. Retrieved January 16, 2015, from [4] Jaap Haartsen, M. N. (1999). Bluetooth: Vision, Goals, and Architecture. Mobile Computing and Communications Review, I(2), 1-8. [5] Lopez Research. (2013). An Introduction to the Internet of Things (IoT). San Francisco, CA: Lopez Research LLC. [6] Mrs. Pratibha Singh, M. D. (2011, August). A Modern Study of Bluetooth Wireless Technology. International Journal of Computer Science, Engineer and Information Technology (IJCSEIT), [7] Nateq Be-Nazir Ibn Minar, M. T. (2011, July). A Secured Bluetooth Based Social Network. International Journal of Computer Applications ( ), [8] Naveen Erasala, D. C. (2002). Bluetooth technology: a strategic analysis of its role in global 3G wireless communication era. Computer Standards & Interfaces(24), [9] Roch Guerin, E. K. (2001). Bluetooth Technology Key Challenges and Initial Research. Philadelphia, PA. [10] Stankovic, J. A. (2012). Research Directions for the Internet of Things. Retrieved January 16, 2015, from [11] Steve Hodges, S. T. (2013). Prototyping Connected for the Internet of Things. IEEE Intelligent Systems, Page 7
An Introduction to the Internet of Things (IoT)
An Introduction to the Internet of Things (IoT) Part 1. of The IoT Series November 2013 Lopez Research LLC 2269 Chestnut Street #202 San Francisco, CA 94123 T (866) 849-5750 E [email protected] W
ITL BULLETIN FOR AUGUST 2012
ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division
Wireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07.
Network Standards and Technologies for Wireless Sensor Networks Karsten Knuth 16.07.2008 Index 1. Motivation 2. Introduction 3. Bluetooth 4. ZigBee 5. nanonet 6. Roundup 16.07.2008 Network Standards 2
Introduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
Wi-Fi, Bluetooth, and the Internet of Things
WHITEPAPER Mindtribe Product Engineering 25 Kearny St. Suite 200 San Francisco, CA 94108 Introduction, Bluetooth, and the Internet of Things The Internet of Things (IoT) has an increasing number of our
Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
RFID based Bill Generation and Payment through Mobile
RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture
Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,
Introduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID}
Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID} John Soldatos Associate Professor, Athens Information Technology
Tecnologías Inalámbricas.
Tecnologías Inalámbricas. Why is Wireless Security Different? There are four major differences for wireless services: Bandwidth Allowable error rates Latency Power Constraints Secure Mobile Devices Characteristics
WPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Bluetooth (IEEE 802.15.1) Network topology FHSS operation Link delivery services System architecture & protocols Usage models ZigBee (IEEE 802.15.4) Network topology Physical layer operation CSMA/CA
Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City
Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City A. Lavric 1, V. Popa 2 PhD.,Computers, Department of Electronics and Automation,
WHITE PAPER. Emerging IoT Wireless Communication
WHITE PAPER Emerging IoT Wireless Communication ABSTRACT It is quite apparent by now that cellular technologies, built primarily for voice traffic, cannot currently provide a scalable solution for long-range
Home Automation and Cybercrime
Trend Micro Incorporated Research Paper 2013 Home Automation and Cybercrime By: Ranieri Romera Contents Introduction...1 Distribution...2 Installation...3 Backdoor...3 Network Traffic Encryption... 5 Infrastructure...7
Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:
WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce
Applying Mesh Networking to Wireless Lighting Control
White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible
Telecommunications, Networks, and Wireless Computing
Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK
ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,
IOT WPAN technologies IoT binnen handbereik. EA IoT 2015 Pepijn Herman 2-6-2015
Internet of Things IOT WPAN technologies IoT binnen handbereik EA IoT 2015 Pepijn Herman 2-6-2015 Metatronics Development of smart electronics solution HQ in Eindhoven, The Netherlands Team of 21 engineers
TDM & FDM Overlays on Bluetooth
TDM & FDM Overlays on Bluetooth Abdelshakour Abuzneid, Sarosh Patel Viqar U.Mohammed, Varun Kumar Godula Department of Computer Science & Engineering University of Bridgeport {abuzneid, saroshp,vmohamme,vgodula}@bridgeport.edu
Wireless Sensor Network: Challenges, Issues and Research
ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues
Internet of Things: Consumerisation of Technology. www.avasant.com
: Consumerisation of Technology Technology democratization has weaved an ecosystem powered by intelligent systems, connectivity services, analytics, and technology infrastructure to deliver services. With
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
In the pursuit of becoming smart
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
Internet of Things (IoT): A vision, architectural elements, and future directions
SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: [email protected] Table of contents Open challenges
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council
Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked
Demystifying Wireless for Real-World Measurement Applications
Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
AVB Basics... 4 WHITE PAPER. Choosing AVB or CobraNet... 8
a new era for av: How AVB is changing the industry Overview In the last decade, the audio/visual (AV) industry was eclipsed by rapid technological advancements in the IT industry and adoption of industry
How To Be Prepared For A Cybercrime
Cybersecurity and the Internet of Things June 2015 What is the Internet of Things? Agenda What is the Internet of Things?..2 The many and various benefits of IoT...7 The rise of the cyber threat..13 The
Bluetooth wireless technology basics
Bluetooth wireless technology basics Abstract... 2 Introduction... 2 How Bluetooth wireless technology works... 3 BWT network topologies... 4 BWT security... 5 Establishing BWT connections... 6 Activating
Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 [email protected],
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System
Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),
IT 3202 Internet Working (New)
[All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any
EPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
How To Understand The Power Of The Internet Of Things
Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,
Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.
Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
The 5G Infrastructure Public-Private Partnership
The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility
Wireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
Security in Wireless Local Area Network
Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June
Wireless Security: Secure and Public Networks Kory Kirk
Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science [email protected] www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that
Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader
Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker
A Peek into the Future-''Internet of Things''
A Peek into the Future-''Internet of Things'' Raj Kosaraju CIO at Maxil Technology Solutions Inc. A Peek into the Future-''Internet of Things'' Smart appliances that communicate with each other and share
Mobile and Sensor Systems
Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous
Android Application Development and Bluetooth Technology
Android Application Development and Bluetooth Technology James Cracchiolo 3/28/14 Table of Contents Introduction page 3 Objective page 3 What is Bluetooth? page 3 What is Android? page 4 Materials Needed
Remote Monitoring and Controlling System Based on ZigBee Networks
Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr
ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna
ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication
C20.0001 Information Systems for Managers Fall 1999
New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in
ENERGY HARVESTED ELECTRONIC SHELF LABEL
ENERGY HARVESTED ELECTRONIC SHELF LABEL Ranajay Mallik, Jitendra Jain, Neha Kochhar, STMicroelectronics - IMS Systems Lab and Technical Marketing Abstract: This article explains the concept of electronic
Problems of Security in Ad Hoc Sensor Network
Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless
Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson
Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson Internet of Things The Internet of Things (IoT) is a computing
Internet of Things: IoT Day Special Edition
Table of Contents Executive Summary..1 Introduction...2 Stack Layers in Internet of Things...4 Trends..5 Assignee-wise technology distribution. 8 Appendix...9 Executive Summary Internet of Things (IoT)
UPnP: The Discovery & Service Layer For The Internet of Things April 2015
UPnP: The Discovery & Service Layer For The Internet of Things April 2015 The First Chapter: The Connected Home In late 1999, the founding members of what would become the UPnP Forum started to put together
ESP 8266: A BREAKTHROUGH IN WIRELESS SENSOR NETWORKS AND INTERNET OF THINGS
International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 6, Issue 8, Aug 2015, pp. 07-11, Article ID: IJECET_06_08_002 Available online at http://www.iaeme.com/ijecetissues.asp?jtypeijecet&vtype=6&itype=8
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
Chapter 9A. Network Definition. The Uses of a Network. Network Basics
Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
A CIO s Guide To Mobility Management
The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202
Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center
Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center Mobile Payment Transactions: BLE and/or NFC? About the
Bluetooth usage with Architecture view & security measures
Bluetooth usage with Architecture view & security measures Savan K. Patel Assi.Professor AMPICS Dept Ganpat University Kherva, Gujarat, India Hiral R.Patel Assi.Professor Department of CS, Ganpat University
Bluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations
Bluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations 19 March 2015 Key Points Continuous development of Bluetooth technology is rapidly increasing the use of Bluetoothenabled
IoT Prospects of Worldwide Development and Current Global Circumstances
IoT Prospects of Worldwide Development and Current Global Circumstances Dr. Bilel Jamoussi Chief Study Groups Department Telecommunication Standardization Bureau, ITU www.itu.int/itu-t/go/iot 1 IoT in
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS
SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,
WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks
Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 755-760 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4686 WBAN Beaconing for Efficient Resource Sharing in Wireless Wearable
Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]
Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge
INTRODUCTION. IoT AND IP STRATEGIES
INTRODUCTION At first, the Internet of Things (IoT) may seem like an idea straight out of science fiction. However, on closer consideration, we realize that the process of connecting everyday electronic
Using Xbee 802.15.4 in Serial Communication
Using Xbee 802.15.4 in Serial Communication Jason Grimes April 2, 2010 Abstract Instances where wireless serial communication is required to connect devices, Xbee RF modules are effective in linking Universal
The Basics of Wireless Local Area Networks
The Basics of Wireless Local Area Networks Andreas Johnsen Student at Mälardalens högskola [email protected] +46 712345678 ABSTRACT This paper is written as a brief education about the basics of
DELIVERING MOBILE GOVERNMENT SERVICES THROUGH CLOUD COMPUTING
DELIVERING MOBILE GOVERNMENT SERVICES THROUGH CLOUD COMPUTING Konstantin Simić 1, Jovana Dadić 2, Lidija Paunović 3, Miloš Milutinović 4, Zorica Bogdanović 5 Abstract With the implementation of Internet
Introduction to Information Technology
Introduction to Information Technology Career Cluster Information Technology Course Code 10009 Prerequisite(s) Recommended that a student has taken from the Foundation Courses Computer Applications. Credit.5
New protocol concept for wireless MIDI connections via Bluetooth
Wireless MIDI over Bluetooth 1 New protocol concept for wireless MIDI connections via Bluetooth CSABA HUSZTY, GÉZA BALÁZS Dept. of Telecommunications and Media Informatics, Budapest University of Technology
Introduction to Z-Wave. An Introductory Guide to Z-Wave Technology
Introduction to Z-Wave An Introductory Guide to Z-Wave Technology Table of Contents Z-Wave Overview and Functionality... 3 Z-Wave Technology Quick Overview... 3 Radio Specifications... 3 Network and Topology...
Electromagnetic Spectrum (3kHz 300GHz)
Wireless Communication Serial communication Allocated a frequency of operation Could be a range of frequencies Regulated by FCC (Federal Communications Commission) in US Unfortunately, allocations are
ANDROID BASED SECURITY AND HOME AUTOMATION SYSTEM
ANDROID BASED SECURITY AND HOME AUTOMATION SYSTEM Sadeque Reza Khan 1 and Farzana Sultana Dristy 2 1 Department of Information and Communication Engineering, Chosun University, Korea 2 Department of Computer
Wired & Wireless LAN Connections
Lecture 5 Wired & Wireless LAN Connections Network Interface Card (NIC) Ethernet Wiring - Thick Ethernet - Thin Ethernet - Star (Hub) Ethernet Extending LAN - Fiber Modem - Repeater - Bridge - Switch Short
DATA SECURITY MODEL FOR CLOUD COMPUTING
DATA SECURITY MODEL FOR CLOUD COMPUTING POOJA DHAWAN Assistant Professor, Deptt of Computer Application and Science Hindu Girls College, Jagadhri 135 001 [email protected] ABSTRACT Cloud Computing
Introduction to computer networks and Cloud Computing
Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication
Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
PART I: The Pros and Cons of Public Cloud Computing
PART I: The Pros and Cons of Public Cloud Computing Pros 1. Efficiently use the resource through sharing Users from companies or enterprises can access to the centralized servers where data are stored
Security and the Internet of Things
Security and the Internet of Things Joe Sanford 1. Abstract More and more smart devices are being introduced to the market, allowing end-users to have more of the devices they use every day to be connected
Unified Communications: The Layman s Guide
White Paper Unified Communications: The Layman s Guide Contents Introduction....2 What can you expect in return?....2 How Unified Communications Works....2 Challenges Ahead....2 Are you ready?....3 About
A Hurwitz white paper. Inventing the Future. Judith Hurwitz President and CEO. Sponsored by Hitachi
Judith Hurwitz President and CEO Sponsored by Hitachi Introduction Only a few years ago, the greatest concern for businesses was being able to link traditional IT with the requirements of business units.
Wireless Home Security and Automation System Utilizing ZigBee based Multi-hop Communication
Wireless Home Security and Automation System Utilizing ZigBee based Multi-hop Communication Rozeha A. Rashid, Mohd Adib B. Sarijari, Mohd Rozaini Abd Rahim Faculty of Electrical Engineering University
Design of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2
Design of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2 1 PG Student (M. Tech), Dept. of ECE, Chirala Engineering College, Chirala., A.P, India. 2 Assistant Professor, Dept.
TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung
Gaming as a Service Prof. Victor C.M. Leung The University of British Columbia, Canada www.ece.ubc.ca/~vleung International Conference on Computing, Networking and Communications 4 February, 2014 Outline
