Bluetooth Technology as an Interactive Tool in the Internet of Things

Size: px
Start display at page:

Download "Bluetooth Technology as an Interactive Tool in the Internet of Things"

Transcription

1 Bluetooth Technology as an Interactive Tool in the Internet of Things Nyeche Hakwumeru Prince Abstract Bluetooth technology is one of the leading growing technologies that has surface during the 21 st century, it has encompass every aspect of emerging technology that are used virtually in different industries. The main scope of this research is to educate, link and find a constructive method for the productivity and how communication can go beyond just sharing of information to expanding information into different forms with what most people use mobile technology within the 21 st century. The author will disseminate stringent history and development of how Bluetooth technology can be expanded to focus not primarily on information dispersal but with interaction with other mobile technology. Bluetooth technology has seen growth in Mobile telecommunication, Health Sectors, information technology, Engineering etc. All these sector of the industries has a purpose to the use of Bluetooth, but how can they use Bluetooth to interact with the user or his environment would be an interesting aspect. Making Bluetooth technology expand its range beyond wireless frequencies into wireless Network and wireless interconnectivity; spanning across greater distances. In so doing, converting short distances using bridges of wireless networks known as the Internet. Keywords: Bluetooth, wireless, technology, mobile technology, mobile telecommunication, social interaction, wireless networks, wireless sensor networks, internet of things, mobile computing, ubiquitous computing, Bluetooth technology Introduction Bluetooth is a technology developed by Ericsson in 1994 came to form the technology we use today in most mobile devices. It uses radio transmission which operating outside an unlicensed Industrial, Scientific and Medical Band of 2.4 to GHz. Which later various companies which promoted the technology such as Ericsson, Nokia, Intel, Toshiba and IBM; came to form the now Bluetooth Special Interest Group (SIG) (Bluetooth.com). To form a variant of globally connecting millions of devices through the internet, Bluetooth is a prospective technology that has the ability to make such breakthrough a possibility. Just imagine going to a grocery store and being able to look through the inventory for things you shop the most for. Think about walking into a boutique / mall and having a prerequisite alerting you of items that have gotten sales discount just by having your Bluetooth on from a mobile device or a mobile computer or just imagine entering a restaurant or even a transport system and paying via phone or mobile device wirelessly even before you get there. These are the innovation that can span through if properly looked on. The internet of Things is an idea that would make machines connect and understand one another without / less human interaction. What makes Bluetooth an ideal candidate in this picture will tell a greater meaning in the development of the technology that will present more connectivity and it s common among already existing technology and mobile devices. Page 1

2 As the 21 st century moves on, more and more technology will rise that will define the scope at which it either improves or limits the ones that we have currently. Looking at it from a perspective of a consumer, you might be asking how this technology can benefit me. Now with the rise in social applications and how people have mobile devices, the increase will ascertain that more; and how much people need wireless connectivity. In so doing information needs to be passed from one person to another. The broader scope of the internet of things and Bluetooth is very vast so the author is going to lessen the scope and pertain only to innovation that can spring forth which is expressed in section (IV) and security concerns on the existing technology. Therefore section (I) will describe a brief introduction to Bluetooth, Section (II) will illustrate and describe existing technologies and uses of Bluetooth and how it encompass to the Internet of Things, Section (III) will talk about the problems faced in the technology, Section (IV) will illustrate the methodology employed, potential ideas and innovation between Bluetooth and how it can bring greater connectivity with Internet of Things, Section (V) will conclude on the research and references. 1.1 Objectives Find a constructive way for communication to be more interactive with quality transmission and retrieval of information using existing technology with the aid of the Internet and Bluetooth technology Literature Review The internet of things is an idea that started over a decade ago and has since seen a rise in the development by various communities in the field. How can Bluetooth improve or contribute to such technology can be seen in Bluetooth Smart a new technology that encompass low use of Bluetooth technology and increase distance using mesh-technology (Bluetooth.com), users can be able to control basis home automated devices using current device present without any changes (Naveen Erasala, 2002). Due to the fact that Bluetooth currently is supported by many mobile devices, it makes it easier to be able to provide connectivity among these cross platform in addition such connectivity can be accessed from any device around the globe not necessarily that you have to be extremely close to the connected device but once close, wireless connectivity can still take place. Over the years, Bluetooth and many online developers has come up with ingenious ideas that change how we look at everyday devices, application and everyday appliances can become ubiquitous and with the application of Bluetooth along with wireless network and Wireless sensors. How these things (Stankovic, 2012) can function together goes a long way to describe why we need connectivity among devices that we use daily in our everyday endeavours. Beacon Technology in conjunction with Bluetooth Smart are now leading a frontier in the internet of Things bringing along Bluetooth technology into the mix, making things identifiable easily. Fig.2. Scatternet [Source: (Jaap Haartsen, 1999) ] Fig.1. Application Framework [Source: (Jaap Haartsen, 1999) ] The mec hani sm behi Page 2

3 nd Bluetooth technology can be described in the above Figures. Figure 1 describes the structural aspect of Bluetooth technology, which heavily depends on a network topology between physical, Network and the application aspect (Naveen Erasala, 2002). The Radio in the figure takes care of receiving and sending bitstream modulation. The Baseband defines timing, packets and framing. The link manager as the name implies is responsible of managing power, connection status and other management tasks. The logical link handles multiplexing higher level protocols. The audio data is linked directly to the baseband and audio control is layered over the logical link control. The RFCOMM and Network protocol provides different communication parameters. Therefore, Bluetooth uses an ad hoc, piconet structure which is referred to as scatternet technology in Figure 2. Scatternet sends bits of radio signals hence in piconets because these signal hops around a frequency of over 1600 hops/s which is the communication range at which Bluetooth technology comprises on, the hops causes the frequency waves to be generated in a randomized fraction. This makes Bluetooth more of a personal space technology unlike other radio technology such as Radio (AM/FM) or TV. Each Bluetooth network comprises of a Node which are made up of piconets of which each piconets describes a node called a Master and a Slave of which when a node belongs to multiple piconets they can be referred to as what is termed a Bridge (Bisdikian, 2001). As the name depicts, A Master is the like the head in a node and the Slave is like its servant who attaches itself to the Master to form these modulating hopping frequencies that scatters called piconets. So far as depicted by (Roch Guerin, 2001) classified piconets as being independent of one another and not certain which node chooses to become the master or slave but from the analysis describes the Scatternet technology as one where by a master is determined by having the highest available time and being the one able to hop quicker when in a Network. Thus once two nodes are joined in the same piconets and are hopping at the same frequencies, their clock synchronizes and they use the same hopping frequencies in the exchange of information (Mrs. Pratibha Singh, 2011) Problem Statement One of the greatest risk or rather ethical issues around Bluetooth technology is its security and privacy concern. The questions baffling critics has been, how secure is this Bluetooth technology? And over the years since it has suffice, there has been glitches of how information has been swindled and how it has been hacked. Never-the-less No great technology hasn t faced the tyranny demolished by security flaws or bugs that might be thwacked on any system. In line of trying to get Bluetooth as a frontier in the Internet of Things also comes with its own dilemma. Likewise the Internet of Things as promising as it could seems raises some privacy concern and security issues that deal with weak password and cross site scripting as examined by (Hewlett-Packard Development Company, 2014) report. The Internet of Things describes a future whereby all things are connected by means of wireless/wired to the internet, and when the author says Things it refers to items of the physical world which are attached or within sensors of these items connected to a network (Steve Hodges, 2013). Kevin Ashton layered the groundwork for the IoT at MIT s AutoID lab by making this ground statements "If we had computers that knew everything there was to know about things using data they gathered without any help from us -- we would be able to track and count everything, and greatly reduce waste, loss and cost. We would know when things needed replacing, repairing or recalling, and Page 3

4 whether they were fresh or past their best. We need to empower computers with their own means of gathering information, so they can see, hear and smell the world for themselves, in all its random glory. RFID and sensor technology enable computers to observe identify and understand the world without the limitations of human-entered data. (Lopez Research, 2013) By this time Bluetooth technology was at the brink of its Era, never knowing that one day, could also be relied on to achieve such spectacular features. Privacy/Health Concerns Weak Password Susceptible to Hacking ( Man-in-the-Middle Attack) MAC Spoofing Attacks PIN Cracking Attacks The above mentioned problems are what are considered when Bluetooth technology takes a leap into a broader network structure albeit we won t go into details as it is outside the scope of this research (Nateq Be-Nazir Ibn Minar, 2011). Privacy concern will raise an issue in the sense that, once more and more devices are connected to the internet, where this information goes to, who stores them and what if that information is used against a particular individual(s). Thus this will raise a concern for individual who will plan to use the future technology of Bluetooth and with so much radio waves been emitted in the environment, its only sceptical that one s health might or might not be affected due to the emission of radio waves every moment of the day. Weak password will also raise concern as well, as many things are connected to the internet especially when such things uses Bluetooth technology to collect data, definitely such system or software must encompass a model that is able to provide greater security identification pattern. Since all devices uses microchip sets or microcontrollers, therefore, there is a possibility that this technology could be susceptible to some form of hacking, although there are known threats and those unknown threats at the moment but when a technology becomes rapidly available then trends to find out loop holes will emerged to find out the plausibility of either by means of manipulation or control. Identifying devices and how these devices can be spoofed from their manufacture s identity or located using a device s MAC Address poses tension as well when a new technology is to be used this raising issues of information leakage as well Research Methodology In the implementation of this research, the author of this research decided to follow a mixed methodology. First of all, a Secondary Methodology will be employed followed by an Empirical methodology. Thus, this is to ensure that information that is gotten is properly used, data is analyzed and results can be gotten to be used in the continuous effort of improving the entire research idea. Secondly in terms of creating or developing a system that is ready, an Agile Methodology can be employed to tackle the system development cycle of this research thus, if any given system is used in place to expand this research, this methodology is a preferred solution in place to follow. Using such concept, the author will base most of the preliminary finding on observation and how the hardware aspect of Bluetooth will interact to achieve the author s designs. The concept is relatively simple, and it employs basic fundamental or rather rudimentary aspect of technology we all know and use which is mobile devices. 4.1 Work Plan and Implications The author s preliminary work plans includes designing a compatible mobile application, which is able to use the Bluetooth schema from a mobile phone or mobile device in communication pattern with other Bluetooth compatible devices. What the author envisions is to enable and use the internet in conjunction with Bluetooth technology to provide communication among different individuals as well as enable those devices to be able to Page 4

5 interact with the users. What the author is targeting as an innovative aspect of this research is described below: Bluetooth Voice Calls Providing wireless voice calls between Bluetooth enable devices, original audio waves will be transferred within a PAN and WAN Network. Bluetooth File Sharing over Cloud Technology Enabling a way whereby connected devices can have access to files or share files with each other or with other devices even after physically Bluetooth connected has been lost. This is rather carried over an Internet Protocol. Bluetooth Video Calls Enables the mobile devices to be able to make video calls in as much the same way a voice call would be implemented, even when not in a PAN area, information is securely transmitted over the Internet. Device Searching by means of a Unique Identifier one of the ways the author is targeting would be by using an address as the unique identifier in identifying other Bluetooth devices that are connected over the Internet. Thus tagging the device s MAC address and tying it up with a Central Database to identify devices. Sharing of Internet connectivity and Device Lock Mechanism (which include physical structures with sensor ability) with the aid of Bluetooth and Internet technology. With the aid of Bluetooth Smart currently version 4.2, Bluetooth technology will be able to perform with the below specification (Bluetooth.com): An intelligent wireless connection to authenticate and manage interactions An extremely power-efficient connection that doesn't drain the user's phone battery Nearly ubiquitous support from phone manufacturers and mobile operating systems Thus the author has come with an idea to create an application able to render services of which these Bluetooth devices will be able to conform with and allow the users to be able to control, use and interact with well known object. Preliminary areas of interest include: Universities/Schools Offices Homes These areas were targeted to ensure that communication is rapidly dispersed among individuals who normally lurk or engage in activities. An illustrative architecture below will demonstrate the author s vision in this given research project. Page 5

6 Fig.3. Bluetooth Internet Architecture 5.0. Conclusion Fig.4. Network Control System [Source: In the process of advancing science and technology an innovation must spring forth in order to drive the frontier in the quest for greater knowledge and for the betterment of mankind. Bluetooth technology shows a prospectus in bringing each and every devices connected to the Internet, and making the Internet of Things a reality. Albeit the finalization might not be too far ahead, the construct and idea the technology promises makes it an ideal candidate in improving the lives of individuals and how they communicate with one another and how computers can interact with users. In so doing, combining Bluetooth technology and the internet can help in various aspect of the Industrial and Academic sector. For starter, consumers will be able to share much more information easily at their own convenience, students can be able to communication of a free scale around campus areas, and information can be communicated to them at the same time. The possibility is vast but brings and reduces cost of communication on the long run. This way we can curb the cost it will take to talk over the internet as well as pay for using such services especially when such prices are statistically placed value of using such a service. This way communication will be on an open medium that binds connectivity. Reducing cost of communication, providing security of information and Page 6

7 expanding experience; on how mobile devices can learn, react and provide better information especially between people or individual who uses them on an everyday scale. With the help of Sensors, Bluetooth and the Internet, information can be easily passed across, there would be less restriction on how information can be used and in what form it can be used. The internet and Bluetooth will change the way we see our everyday lives by bringing it one step closer together when multiple devices are able to communicate with less hassle and when such communication will make mankind interact more with others. References [1] Bisdikian, C. (2001, June 25). An Overview of the Bluetooth Wireless Technology. Retrieved from IBM Research Division: 56AA000700E03/$File/RC22109.pdf [2] Bluetooth.com. (n.d.). Fast Facts - Bluetooth Technology Website. Retrieved January 16, 2015, from [3] Hewlett-Packard Development Company. (2014, September). Internet of Things Research Study. Retrieved January 16, 2015, from [4] Jaap Haartsen, M. N. (1999). Bluetooth: Vision, Goals, and Architecture. Mobile Computing and Communications Review, I(2), 1-8. [5] Lopez Research. (2013). An Introduction to the Internet of Things (IoT). San Francisco, CA: Lopez Research LLC. [6] Mrs. Pratibha Singh, M. D. (2011, August). A Modern Study of Bluetooth Wireless Technology. International Journal of Computer Science, Engineer and Information Technology (IJCSEIT), [7] Nateq Be-Nazir Ibn Minar, M. T. (2011, July). A Secured Bluetooth Based Social Network. International Journal of Computer Applications ( ), [8] Naveen Erasala, D. C. (2002). Bluetooth technology: a strategic analysis of its role in global 3G wireless communication era. Computer Standards & Interfaces(24), [9] Roch Guerin, E. K. (2001). Bluetooth Technology Key Challenges and Initial Research. Philadelphia, PA. [10] Stankovic, J. A. (2012). Research Directions for the Internet of Things. Retrieved January 16, 2015, from [11] Steve Hodges, S. T. (2013). Prototyping Connected for the Internet of Things. IEEE Intelligent Systems, Page 7

An Introduction to the Internet of Things (IoT)

An Introduction to the Internet of Things (IoT) An Introduction to the Internet of Things (IoT) Part 1. of The IoT Series November 2013 Lopez Research LLC 2269 Chestnut Street #202 San Francisco, CA 94123 T (866) 849-5750 E [email protected] W

More information

ITL BULLETIN FOR AUGUST 2012

ITL BULLETIN FOR AUGUST 2012 ITL BULLETIN FOR AUGUST 2012 SECURITY OF BLUETOOTH SYSTEMS AND DEVICES: UPDATED GUIDE ISSUED BY THE NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY (NIST) Shirley Radack, Editor Computer Security Division

More information

Wireless Personal Area Networks (WPANs)

Wireless Personal Area Networks (WPANs) Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and

More information

Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07.

Professur Technische Informatik Prof. Dr. Wolfram Hardt. Network Standards. and Technologies for Wireless Sensor Networks. Karsten Knuth 16.07. Network Standards and Technologies for Wireless Sensor Networks Karsten Knuth 16.07.2008 Index 1. Motivation 2. Introduction 3. Bluetooth 4. ZigBee 5. nanonet 6. Roundup 16.07.2008 Network Standards 2

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Wi-Fi, Bluetooth, and the Internet of Things

Wi-Fi, Bluetooth, and the Internet of Things WHITEPAPER Mindtribe Product Engineering 25 Kearny St. Suite 200 San Francisco, CA 94108 Introduction, Bluetooth, and the Internet of Things The Internet of Things (IoT) has an increasing number of our

More information

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman

Wireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman 1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers

More information

RFID based Bill Generation and Payment through Mobile

RFID based Bill Generation and Payment through Mobile RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce

More information

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture

Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture Wireless Home Networks based on a Hierarchical Bluetooth Scatternet Architecture W. Lilakiatsakun'. 2, A. Seneviratne' I School of Electrical Engineering and Telecommunication University of New South Wales,

More information

Introduction to Computer Networks and Data Communications

Introduction to Computer Networks and Data Communications Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the

More information

Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID}

Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID} Overview of the Internet of Things {adapted based on Things in 2020 Roadmap for the Future by EU INFSO D.4 NETWORKED ENTERPRISE & RFID} John Soldatos Associate Professor, Athens Information Technology

More information

Tecnologías Inalámbricas.

Tecnologías Inalámbricas. Tecnologías Inalámbricas. Why is Wireless Security Different? There are four major differences for wireless services: Bandwidth Allowable error rates Latency Power Constraints Secure Mobile Devices Characteristics

More information

WPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

WPAN. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1 Contents Bluetooth (IEEE 802.15.1) Network topology FHSS operation Link delivery services System architecture & protocols Usage models ZigBee (IEEE 802.15.4) Network topology Physical layer operation CSMA/CA

More information

Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City

Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City Performance Evaluation of Large-Scale Wireless Sensor Networks Communication Protocols that can be Integrated in a Smart City A. Lavric 1, V. Popa 2 PhD.,Computers, Department of Electronics and Automation,

More information

WHITE PAPER. Emerging IoT Wireless Communication

WHITE PAPER. Emerging IoT Wireless Communication WHITE PAPER Emerging IoT Wireless Communication ABSTRACT It is quite apparent by now that cellular technologies, built primarily for voice traffic, cannot currently provide a scalable solution for long-range

More information

Home Automation and Cybercrime

Home Automation and Cybercrime Trend Micro Incorporated Research Paper 2013 Home Automation and Cybercrime By: Ranieri Romera Contents Introduction...1 Distribution...2 Installation...3 Backdoor...3 Network Traffic Encryption... 5 Infrastructure...7

More information

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN:

Wireless LAN advantages. Wireless LAN. Wireless LAN disadvantages. Wireless LAN disadvantages WLAN: WLAN: Wireless LAN Make use of a wireless transmission medium Tipically restricted in their diameter: buildings, campus, single room etc.. The global goal is to replace office cabling and to introduce

More information

Applying Mesh Networking to Wireless Lighting Control

Applying Mesh Networking to Wireless Lighting Control White Paper Applying Mesh Networking to Wireless Lighting Control www.daintree.net Abstract Recent advances in wireless communications standards and energy-efficient lighting equipment have made it possible

More information

Telecommunications, Networks, and Wireless Computing

Telecommunications, Networks, and Wireless Computing Objectives Telecommunications, Networks, and Wireless Computing 1. What are the features of a contemporary corporate telecommunications system? On what major technology developments are they based? 2.

More information

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK

ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK ANYTIME ANYPLACE-REMOTE MONITORING OF STUDENTS ATTENDANCE BASED ON RFID AND GSM NETWORK Mr.C.S.Karthikeyan 1 S.Murugeswari 2 Assistant professor, Dept. of ECE, Kamaraj College of Engineering and Technology,

More information

IOT WPAN technologies IoT binnen handbereik. EA IoT 2015 Pepijn Herman 2-6-2015

IOT WPAN technologies IoT binnen handbereik. EA IoT 2015 Pepijn Herman 2-6-2015 Internet of Things IOT WPAN technologies IoT binnen handbereik EA IoT 2015 Pepijn Herman 2-6-2015 Metatronics Development of smart electronics solution HQ in Eindhoven, The Netherlands Team of 21 engineers

More information

TDM & FDM Overlays on Bluetooth

TDM & FDM Overlays on Bluetooth TDM & FDM Overlays on Bluetooth Abdelshakour Abuzneid, Sarosh Patel Viqar U.Mohammed, Varun Kumar Godula Department of Computer Science & Engineering University of Bridgeport {abuzneid, saroshp,vmohamme,vgodula}@bridgeport.edu

More information

Wireless Sensor Network: Challenges, Issues and Research

Wireless Sensor Network: Challenges, Issues and Research ISBN 978-93-84468-20-0 Proceedings of 2015 International Conference on Future Computational Technologies (ICFCT'2015) Singapore, March 29-30, 2015, pp. 224-228 Wireless Sensor Network: Challenges, Issues

More information

Internet of Things: Consumerisation of Technology. www.avasant.com

Internet of Things: Consumerisation of Technology. www.avasant.com : Consumerisation of Technology Technology democratization has weaved an ecosystem powered by intelligent systems, connectivity services, analytics, and technology infrastructure to deliver services. With

More information

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

Internet of Things (IoT): A vision, architectural elements, and future directions

Internet of Things (IoT): A vision, architectural elements, and future directions SeoulTech UCS Lab 2014-2 st Internet of Things (IoT): A vision, architectural elements, and future directions 2014. 11. 18 Won Min Kang Email: [email protected] Table of contents Open challenges

More information

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council

Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions. July, 2006. Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked Questions July, 2006 Developed by: Smart Card Alliance Identity Council Contactless Smart Cards vs. EPC Gen 2 RFID Tags: Frequently Asked

More information

Demystifying Wireless for Real-World Measurement Applications

Demystifying Wireless for Real-World Measurement Applications Proceedings of the IMAC-XXVIII February 1 4, 2010, Jacksonville, Florida USA 2010 Society for Experimental Mechanics Inc. Demystifying Wireless for Real-World Measurement Applications Kurt Veggeberg, Business,

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

AVB Basics... 4 WHITE PAPER. Choosing AVB or CobraNet... 8

AVB Basics... 4 WHITE PAPER. Choosing AVB or CobraNet... 8 a new era for av: How AVB is changing the industry Overview In the last decade, the audio/visual (AV) industry was eclipsed by rapid technological advancements in the IT industry and adoption of industry

More information

How To Be Prepared For A Cybercrime

How To Be Prepared For A Cybercrime Cybersecurity and the Internet of Things June 2015 What is the Internet of Things? Agenda What is the Internet of Things?..2 The many and various benefits of IoT...7 The rise of the cyber threat..13 The

More information

Bluetooth wireless technology basics

Bluetooth wireless technology basics Bluetooth wireless technology basics Abstract... 2 Introduction... 2 How Bluetooth wireless technology works... 3 BWT network topologies... 4 BWT security... 5 Establishing BWT connections... 6 Activating

More information

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks

Lecture 1. Lecture Overview. Intro to Networking. Intro to Networking. Motivation behind Networking. Computer / Data Networks Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction

More information

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 [email protected],

More information

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System

Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Rapid Prototyping of a Frequency Hopping Ad Hoc Network System Martin Braun, Nico Otterbach, Jens Elsner, and Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology (KIT),

More information

IT 3202 Internet Working (New)

IT 3202 Internet Working (New) [All Rights Reserved] SLIATE SRI LANKA INSTITUTE OF ADVANCED TECHNOLOGICAL EDUCATION (Established in the Ministry of Higher Education, vide in Act No. 29 of 1995) Instructions for Candidates: Answer any

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

How To Understand The Power Of The Internet Of Things

How To Understand The Power Of The Internet Of Things Next Internet Evolution: Getting Big Data insights from the Internet of Things Internet of things are fast becoming broadly accepted in the world of computing and they should be. Advances in Cloud computing,

More information

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007. Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

The 5G Infrastructure Public-Private Partnership

The 5G Infrastructure Public-Private Partnership The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility

More information

Wireless LANs vs. Wireless WANs

Wireless LANs vs. Wireless WANs White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,

More information

Security in Wireless Local Area Network

Security in Wireless Local Area Network Fourth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCET 2006) Breaking Frontiers and Barriers in Engineering: Education, Research and Practice 21-23 June

More information

Wireless Security: Secure and Public Networks Kory Kirk

Wireless Security: Secure and Public Networks Kory Kirk Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science [email protected] www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that

More information

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker

More information

A Peek into the Future-''Internet of Things''

A Peek into the Future-''Internet of Things'' A Peek into the Future-''Internet of Things'' Raj Kosaraju CIO at Maxil Technology Solutions Inc. A Peek into the Future-''Internet of Things'' Smart appliances that communicate with each other and share

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Dr Cecilia Mascolo About Me In this course The course will include aspects related to general understanding of Mobile and ubiquitous

More information

Android Application Development and Bluetooth Technology

Android Application Development and Bluetooth Technology Android Application Development and Bluetooth Technology James Cracchiolo 3/28/14 Table of Contents Introduction page 3 Objective page 3 What is Bluetooth? page 3 What is Android? page 4 Materials Needed

More information

Remote Monitoring and Controlling System Based on ZigBee Networks

Remote Monitoring and Controlling System Based on ZigBee Networks Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr

More information

ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna

ZIGBEE 802.15.4. ECGR-6185 Advanced Embedded Systems. Charlotte. University of North Carolina-Charlotte. Chaitanya Misal Vamsee Krishna ECGR-6185 Advanced Embedded Systems ZIGBEE 802.15.4 University of North Carolina-Charlotte Charlotte Chaitanya Misal Vamsee Krishna WPAN A personal area network (PAN) is a computer network used for communication

More information

C20.0001 Information Systems for Managers Fall 1999

C20.0001 Information Systems for Managers Fall 1999 New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in

More information

ENERGY HARVESTED ELECTRONIC SHELF LABEL

ENERGY HARVESTED ELECTRONIC SHELF LABEL ENERGY HARVESTED ELECTRONIC SHELF LABEL Ranajay Mallik, Jitendra Jain, Neha Kochhar, STMicroelectronics - IMS Systems Lab and Technical Marketing Abstract: This article explains the concept of electronic

More information

Problems of Security in Ad Hoc Sensor Network

Problems of Security in Ad Hoc Sensor Network Problems of Security in Ad Hoc Sensor Network Petr Hanáček * [email protected] Abstract: The paper deals with a problem of secure communication between autonomous agents that form an ad hoc sensor wireless

More information

Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson

Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things. Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson Wi-Fi Backscatter: Battery-free Internet Connectivity to Empower the Internet of Things Ubiquitous Computing Seminar FS2015 Bjarni Benediktsson Internet of Things The Internet of Things (IoT) is a computing

More information

Internet of Things: IoT Day Special Edition

Internet of Things: IoT Day Special Edition Table of Contents Executive Summary..1 Introduction...2 Stack Layers in Internet of Things...4 Trends..5 Assignee-wise technology distribution. 8 Appendix...9 Executive Summary Internet of Things (IoT)

More information

UPnP: The Discovery & Service Layer For The Internet of Things April 2015

UPnP: The Discovery & Service Layer For The Internet of Things April 2015 UPnP: The Discovery & Service Layer For The Internet of Things April 2015 The First Chapter: The Connected Home In late 1999, the founding members of what would become the UPnP Forum started to put together

More information

ESP 8266: A BREAKTHROUGH IN WIRELESS SENSOR NETWORKS AND INTERNET OF THINGS

ESP 8266: A BREAKTHROUGH IN WIRELESS SENSOR NETWORKS AND INTERNET OF THINGS International Journal of Electronics and Communication Engineering & Technology (IJECET) Volume 6, Issue 8, Aug 2015, pp. 07-11, Article ID: IJECET_06_08_002 Available online at http://www.iaeme.com/ijecetissues.asp?jtypeijecet&vtype=6&itype=8

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the

More information

A CIO s Guide To Mobility Management

A CIO s Guide To Mobility Management The Complimentary Reprint Of This Syndicated Research Report Has Been Sponsored By: A CIO s Guide To Mobility Management Written By: Maribel Lopez March 2013 Lopez Research LLC 2269 Chestnut Street #202

More information

Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center

Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center Mobile Payment Transactions: BLE and/or NFC? White paper by Swen van Klaarbergen, consultant for UL Transaction Security s Mobile Competence Center Mobile Payment Transactions: BLE and/or NFC? About the

More information

Bluetooth usage with Architecture view & security measures

Bluetooth usage with Architecture view & security measures Bluetooth usage with Architecture view & security measures Savan K. Patel Assi.Professor AMPICS Dept Ganpat University Kherva, Gujarat, India Hiral R.Patel Assi.Professor Department of CS, Ganpat University

More information

Bluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations

Bluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations Bluetooth: Understanding the Technology, Its Vulnerabilities, and Security Recommendations 19 March 2015 Key Points Continuous development of Bluetooth technology is rapidly increasing the use of Bluetoothenabled

More information

IoT Prospects of Worldwide Development and Current Global Circumstances

IoT Prospects of Worldwide Development and Current Global Circumstances IoT Prospects of Worldwide Development and Current Global Circumstances Dr. Bilel Jamoussi Chief Study Groups Department Telecommunication Standardization Bureau, ITU www.itu.int/itu-t/go/iot 1 IoT in

More information

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace

Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of

More information

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS

SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS SELECTIVE ACTIVE SCANNING FOR FAST HANDOFF IN WLAN USING SENSOR NETWORKS Sonia Waharte, Kevin Ritzenthaler and Raouf Boutaba University of Waterloo, School of Computer Science 00, University Avenue West,

More information

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks

WBAN Beaconing for Efficient Resource Sharing. in Wireless Wearable Computer Networks Contemporary Engineering Sciences, Vol. 7, 2014, no. 15, 755-760 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.4686 WBAN Beaconing for Efficient Resource Sharing in Wireless Wearable

More information

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected]

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 ageyer@tunitas.com Wireless Security Overview Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance 209-754-9130 [email protected] Ground Setting Three Basics Availability Authenticity Confidentiality Challenge

More information

INTRODUCTION. IoT AND IP STRATEGIES

INTRODUCTION. IoT AND IP STRATEGIES INTRODUCTION At first, the Internet of Things (IoT) may seem like an idea straight out of science fiction. However, on closer consideration, we realize that the process of connecting everyday electronic

More information

Using Xbee 802.15.4 in Serial Communication

Using Xbee 802.15.4 in Serial Communication Using Xbee 802.15.4 in Serial Communication Jason Grimes April 2, 2010 Abstract Instances where wireless serial communication is required to connect devices, Xbee RF modules are effective in linking Universal

More information

The Basics of Wireless Local Area Networks

The Basics of Wireless Local Area Networks The Basics of Wireless Local Area Networks Andreas Johnsen Student at Mälardalens högskola [email protected] +46 712345678 ABSTRACT This paper is written as a brief education about the basics of

More information

DELIVERING MOBILE GOVERNMENT SERVICES THROUGH CLOUD COMPUTING

DELIVERING MOBILE GOVERNMENT SERVICES THROUGH CLOUD COMPUTING DELIVERING MOBILE GOVERNMENT SERVICES THROUGH CLOUD COMPUTING Konstantin Simić 1, Jovana Dadić 2, Lidija Paunović 3, Miloš Milutinović 4, Zorica Bogdanović 5 Abstract With the implementation of Internet

More information

Introduction to Information Technology

Introduction to Information Technology Introduction to Information Technology Career Cluster Information Technology Course Code 10009 Prerequisite(s) Recommended that a student has taken from the Foundation Courses Computer Applications. Credit.5

More information

New protocol concept for wireless MIDI connections via Bluetooth

New protocol concept for wireless MIDI connections via Bluetooth Wireless MIDI over Bluetooth 1 New protocol concept for wireless MIDI connections via Bluetooth CSABA HUSZTY, GÉZA BALÁZS Dept. of Telecommunications and Media Informatics, Budapest University of Technology

More information

Introduction to Z-Wave. An Introductory Guide to Z-Wave Technology

Introduction to Z-Wave. An Introductory Guide to Z-Wave Technology Introduction to Z-Wave An Introductory Guide to Z-Wave Technology Table of Contents Z-Wave Overview and Functionality... 3 Z-Wave Technology Quick Overview... 3 Radio Specifications... 3 Network and Topology...

More information

Electromagnetic Spectrum (3kHz 300GHz)

Electromagnetic Spectrum (3kHz 300GHz) Wireless Communication Serial communication Allocated a frequency of operation Could be a range of frequencies Regulated by FCC (Federal Communications Commission) in US Unfortunately, allocations are

More information

ANDROID BASED SECURITY AND HOME AUTOMATION SYSTEM

ANDROID BASED SECURITY AND HOME AUTOMATION SYSTEM ANDROID BASED SECURITY AND HOME AUTOMATION SYSTEM Sadeque Reza Khan 1 and Farzana Sultana Dristy 2 1 Department of Information and Communication Engineering, Chosun University, Korea 2 Department of Computer

More information

Wired & Wireless LAN Connections

Wired & Wireless LAN Connections Lecture 5 Wired & Wireless LAN Connections Network Interface Card (NIC) Ethernet Wiring - Thick Ethernet - Thin Ethernet - Star (Hub) Ethernet Extending LAN - Fiber Modem - Repeater - Bridge - Switch Short

More information

DATA SECURITY MODEL FOR CLOUD COMPUTING

DATA SECURITY MODEL FOR CLOUD COMPUTING DATA SECURITY MODEL FOR CLOUD COMPUTING POOJA DHAWAN Assistant Professor, Deptt of Computer Application and Science Hindu Girls College, Jagadhri 135 001 [email protected] ABSTRACT Cloud Computing

More information

Introduction to computer networks and Cloud Computing

Introduction to computer networks and Cloud Computing Introduction to computer networks and Cloud Computing Aniel Nieves-González Fall 2015 Computer Netwoks A computer network is a set of independent computer systems that are connected by a communication

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

PART I: The Pros and Cons of Public Cloud Computing

PART I: The Pros and Cons of Public Cloud Computing PART I: The Pros and Cons of Public Cloud Computing Pros 1. Efficiently use the resource through sharing Users from companies or enterprises can access to the centralized servers where data are stored

More information

Security and the Internet of Things

Security and the Internet of Things Security and the Internet of Things Joe Sanford 1. Abstract More and more smart devices are being introduced to the market, allowing end-users to have more of the devices they use every day to be connected

More information

Unified Communications: The Layman s Guide

Unified Communications: The Layman s Guide White Paper Unified Communications: The Layman s Guide Contents Introduction....2 What can you expect in return?....2 How Unified Communications Works....2 Challenges Ahead....2 Are you ready?....3 About

More information

A Hurwitz white paper. Inventing the Future. Judith Hurwitz President and CEO. Sponsored by Hitachi

A Hurwitz white paper. Inventing the Future. Judith Hurwitz President and CEO. Sponsored by Hitachi Judith Hurwitz President and CEO Sponsored by Hitachi Introduction Only a few years ago, the greatest concern for businesses was being able to link traditional IT with the requirements of business units.

More information

Wireless Home Security and Automation System Utilizing ZigBee based Multi-hop Communication

Wireless Home Security and Automation System Utilizing ZigBee based Multi-hop Communication Wireless Home Security and Automation System Utilizing ZigBee based Multi-hop Communication Rozeha A. Rashid, Mohd Adib B. Sarijari, Mohd Rozaini Abd Rahim Faculty of Electrical Engineering University

More information

Design of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2

Design of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2 Design of a Wireless Medical Monitoring System * Chavabathina Lavanya 1 G.Manikumar 2 1 PG Student (M. Tech), Dept. of ECE, Chirala Engineering College, Chirala., A.P, India. 2 Assistant Professor, Dept.

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung Gaming as a Service Prof. Victor C.M. Leung The University of British Columbia, Canada www.ece.ubc.ca/~vleung International Conference on Computing, Networking and Communications 4 February, 2014 Outline

More information