SlideShare une entreprise Scribd logo
1  sur  50
BLUETOOTH
BASED WIRELESS
SENSOR NETWORKS
Contents
 Introduction
 Blutooth Specification
 Blutooth Basics
 Blutooth Topology
 Blutooth Software
 Blutooth Keyboard
 Blutooth Protocol Stack
 Blutooth Security
 Blutooth Based Sensor N/W
 Sensor N/W Implementation
 Blutooth Hardware
Architecture
 Algorithms For Operation Of
Networks
 Merits
 Demerits
Introduction
 Bluetooth Wireless Technology (BWT) was developed in
1994 at Ericsson in Sweden.
 It is named for Harald Blaatand.
 Bluetooth-Wireless and Automatic technology simplifying
art of communication.
 Frequency used is 2.45 GHz, same used in ISM devices.
 Purpose – Originally it was build to eliminate the need for
cable connections between PDAs and notebook PCs.
Later the goals were to enable different devices through
a commonly accepted standard for wireless connectivity
. Ericsson on advent of BWT conceptualized a Radio
Technology through a wireless personal area network
(WPAN).
Bluetooth Specification
 Bluetooth-Wireless technology providing
link between mobile and electronic
devices.
 It operates on 2.45 GHz radio signals
using frequency hopping spread spectrum.
 Technology of Bluetooth concentrates on
short range of communication.
Bluetooth Specification
•Standard: IEEE 802.15
•ISM Band Frequency: 2.4 GHz
•Range: 10 – 100 meters
•Channel Bandwidth: 1 Mbps
•Maximum Asymmetric Data Transfer
Rate: 721 Kbps
Types of Bluetooth Wireless
Technology
Depending on the power consumption
and range of the device, there are 3
Bluetooth Classes as:
•Class 1: Max Power – 100mW ;
Range – 100 m
•Class 2: Max Power – 2.5mW ;
Range – 10 m
•Class 3: Max Power – 1mW ;
Range – 1 m
Why the name Bluetooth?
The name was adopted as a tribute to
the tenth-century vikingking Harald
Blatand who peacefully united
Denmark and Norway.
Harald liked to eat blueberries,
which gave his teeth the coloration
that lead to the nickname
"Bluetooth."
How to reduce interference?
•BWT devices hop randomly between
frequencies up to 1600 times per
second.
•So,if another device using a 2.4 GHz
frequency (e.g.:cordless phone) ,
then the interference with the BWT
network lasts only for about 1/1600
of a second.
•By then, the devices hop to another
frequency.
Applications
 Laptops
 PDA’s
 Headphones
 Wireless printer
adapter
 Onboard Bluetooth
adapter.
Bluetooth Basics
 Bluetooth is low powered and low cost.
 All the devices follow a uniform structure
 Devices Connect through network called
Pico nets.
 Strength lies in handling data and video
transmission simultaneously.
Bluetooth Basics
 Specification- Bluetooth specification gives
developers data link and application layer
definitions
 Spectrum-Bluetooth operates between 2.4
and 2.485 GHz using a frequency hopping
spread spectrum.
 Interference- is reduced using Adaptive
Frequency Hopping allowing a better
efficiency and greater performance.
Bluetooth Topology
2 main topologies are as:
i.PICONET TOPOLOGY,
&
ii.SCATTERNET TOPOLOGY
i.Piconet Topology
•A piconet consists of upto 8 BWT-
enabled devices.
•When piconet is established, one
device sets up frequency-hopping
pattern and other devices
synchronize their signals to the same
pattern.
•Each piconet has a different
frequency-hopping pattern.
Piconet Topology
ii.Scatternet Topology
•Scatternet consists of several piconets
connected by devices participating in
multiple piconet.
• There is a ‘BRIDGE’ connecting 2
piconets which is also a slave in
individual piconets.
Advantages of Scatternet :
•Higher throughput
•Multi-hop connections between devices
indifferent piconets
Network Topologies?
Bus Network
17
Tree Network
Star Network
Ring Network
Ad Hoc Network
There are SO many technical questions: such as…
Future Of Bluetooth
•BROADCAST CHANNELS:Adoption of
Bluetooth into mobile phones and
enable advertising models based on
users pulling information from the
information points.
•TOPOLOGY MANAGEMENT:Automatic
configuration of piconet topologies in
scatternet situations.
Bluetooth Software
 Bluetooth software can be installed and
used on Bluetooth capable devices.
 There exists different software for different
devices like PDA , personal computer.
 Enables the device to use technology at its
fullest.
 Best example is Bluesoleil.
Bluetooth software
 Bluesoleil can be installed on
personal computer or on
 personal digital assistant also
 On a PC, it provides a lot of
Extra wireless features.
 It also has a graphical user
interface (GUI).
 On a PDA, provides basic
Bluetooth profiles such as
headset and hands free profile,
personal networking (PAN)
profile
How Bluetooth works?
 They normally operate at 2.45GHZ in license
free globally available ISM radio band.
 Advantage-worldwide availability and
compatibility.
 Disadvantage- devices must share the band
with other RF emitters including automobile
security systems, noise sources such as
Microwaves
 Solution- Frequency Hopping Spread
Spectrum.
Frequency Hopping Spread
Spectrum (FHSS)
 Frequency hopping is jumping from one
frequency to another within the ISM radio
band.
 Efficient use of entire bandwidth.
 Low Interference
 Provides basic level of security.
Working of FHSS
 There exists a master-slave relation between
devices.
 A device in master mode can communicate with
upto seven slave devices.
 Bluetooth devices work in a short range to
conserve the battery power.
Technical operations
 High speed, low powered wireless technology.
 Circuits are Contained on a 0.9 cm square.
 This offers 1MB link with security.
 Each device offers unique 48 bit address from
IEEE 802.15 standard.
 Authentification is via a 128 bit key.
 Supports up to 721KBps along with 3 voice
channels.
Bluetooth Keyboard
 Bluetooth keyboard is one of major applications of
Bluetooth technology.
 It was first developed by Microsoft in 2002.
 Today most of companies offer this type of
keyboard, some of which companies include Dell,
Apple..
 A Bluetooth keyboard and mouse combination will
allow the user to work at distances of up to 30 feet.
 There are mainly two types in this-wireless
keyboard and virtual keyboard.
Wireless and Virtual keyboard
 Wireless keyboard, called
Optical Desktop Elite offered
by Microsoft work with 2.4 GHz
Bluetooth technology.
 Apple wireless keyboard is a
sleek and compact design and
makes a secure, reliable
connection with Mac.
 Foldable types are another
type of Bluetooth keyboards.
 It ranges in full size keyboard
to mini keyboard.
Virtual keyboard
 Virtual keyboard is projected
on a flat, non reflective surface
and keystrokes are
accompanied by key clicking
sounds that are simulated.
 The keyboard has 63 keys and
it measures only 295*95 mm
with a height of 3.5 inches.
 Keyboard works by producing
a red diode laser light when
keyboard is projected on
surface.
Potential Bluetooth Markets
28
Bluetooth Market Forecast
29Nov’03: 100M Bluetooth compliant devices worldwide
Bluetooth Protocol Stack
 Adopted Protocols
• PPP(Point-To-Point Protocol)
• TCP/UDP/IP
• OBEX-Session Protocol for IrDA(Infrared Data
Association)
• Contents Fromat(e.g. vCard, vCalendar)
• WAP-Wireless Application Protocol
Bluetooth Security
 Supports Unidirectional or Mutual Encryption based
on a Secret Link key Shared Between Two Devices
 Security Defined In 3 modes:
• Mode1- No Security
• Mode 2 - Service Level Security: Not Established
Before Channel is Established at L2CAP
• Mode 3 - Link Level Security: Device Initiates
Security Before LMP Link is Setup
Bluetooth Security
 3 Levels of Service Access
• Require Authorization and Authenication
• Require Authentication Only
• Default Security for Legacy Applications
32
Bluetooth Based Sensor
Networks
•One such application is : WIRELESS
SENSOR NETWORKS (WSN)
•Important features of
WSN:Collaboration of network nodes
during execution and Data Centric
nature.
•Many smart sensor nodes scattered
in the field collect data and send it to
users via ‘gateway’ using multi-hop
routes.
Wireless Sensor Networks
(WSN)
WSN consists of number of small
devices equipped with asensing unit,
microprocessors, wireless
communication interfaceand power
source.
Sensor Network Implementation
•OBJECTIVE: To build a Hardware
platform and generic Software
Solutions to serve for research in
WSN protocols.
•Components of Sensor Network:
Smart Sensor Nodes and Gateway
Example: Pressure Sensor
For implementation of Pressure Sensor
as Bluetooth Node, following
components are important:
•Bluetooth Device
•Sensors
•Microcontroller
Blutooth Hardware Architecture
Bluetooth Hardware consists of 3 main
functional modules:
•2.4 GHz Bluetooth RF Transceiver
Unit
•Link Management Unit
•Host Controller Interface
Industrial CyberSecurity
 The Case of Vitek Boden
 On October 31, 2001 Vitek Boden was convicted of:
• 26 counts of will fully using a restricted computer to
cause damage
• 1 count of causing serious environment harm
 The facts of the case:
• Vitek worked for the contractor involved in the
installation of Maroochy Shire sewage treatment
plant.
• Vitek left the contractor in December 1999 and
approached the shire for employment. He was
refused.
• Between Jan 2000 and Apr 2000 the sewage
system experienced 47 unexplainable faults,
causing millions of liters of sewage to be spilled.
How did he do it?
 On April 23, 2000 Vitek was arrested with stolen
radio equipment, controller programming
software on a laptop and a fully operational
controller.
 Vitek is now in jail…
Disgruntled
Contractor
PLC PLC
Sewage Plant
Rogue Radio
Algorithms For Operation Of
Networks
•Initialization of gateway and
Bluetooth Inquiry Procedure.
•Discovery of Bluetooth device and
Checking of major and minor devices.
•Setting of parameters and assigning
type of devices and sensors.
•Description by Service-Class Field.
•Discarding of non-smart nodes.
•Else, service database of the
discovered smart node is searched
for sensor services.
•If no current sensor profile, then
database is searched for serial port
connection parameters.
•Lastly, Bluetooth link is established
and data exchange with smart node
starts.
Sensor Market: $11B in 2001
Installation (wiring) costs:
>$100B
43
Freedonia Group report on Sensors, April 2002
• Fragmented market
 platform
opportunity
• Installation cost limits
penetration
 reducing
installation cost
increases market size
Slide courtesy of Rob Conant, Dust
Highly Fragmented
Sensor Market
Firewall Architectures
44
 The external router blocks attempts to use the
underlying IP layer to break security (e.g. IP spoofing,
source routing, packet fragments, etc) and forces all
traffic to the proxy.
 The proxy firewall handles potential security holes in the
higher layer protocols.
 The internal router blocks all traffic except to the proxy
server.
Internal
Router
Internet
External
Router

Statistics on Types of Attacks
0 20 40 60 80 100 120
Theft of Propriety Info
Sabotage
Telecom Evesdropping
System Penetration
Insider Abuse of Net Access
Finacial Fraud
Virus
Unauthorized Insider Access
Telecom Fraud
Active Wiretap
Laptop Theft
Denial of Service
1997
1998
1999
2000
2001
2002
*Source: “2002 CSI/FBI Computer Crime and Security Survey” Computer Security
Institute - www.gocsi.com/losses.
% of Respondents
There’s lot of “Wireless”
 From cellphones to PDAs to WiFi
to Satellite-based
Wireless LAN Standards
Merits
 Wireless
 Inexpensive
 Automatic
 Interoperability
 Low interference and energy consumption.
 Share voice and data
 Instant PAN
 Upgradeable
 Long lasting technology.
 Easy link establishment
Demerits
 Data rate and security
 More susceptible to Interception and
attack
 Less range
 Average Speed
 Short Life
Thank You

Contenu connexe

Tendances (20)

Presentation on home automation
Presentation on home automationPresentation on home automation
Presentation on home automation
 
Zigbee Presentation
Zigbee PresentationZigbee Presentation
Zigbee Presentation
 
5G tecnology
5G tecnology5G tecnology
5G tecnology
 
Blue Eyes ppt
Blue Eyes pptBlue Eyes ppt
Blue Eyes ppt
 
SMART DUST
SMART DUSTSMART DUST
SMART DUST
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
Bluetooth Slides
Bluetooth SlidesBluetooth Slides
Bluetooth Slides
 
Project ideas ece students
Project ideas ece studentsProject ideas ece students
Project ideas ece students
 
Electronics seminar topics
Electronics seminar topicsElectronics seminar topics
Electronics seminar topics
 
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALABluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
 
E-PAPER TECHNOLOGY
E-PAPER TECHNOLOGYE-PAPER TECHNOLOGY
E-PAPER TECHNOLOGY
 
seminar report on wireless communication ppt
seminar report on wireless communication pptseminar report on wireless communication ppt
seminar report on wireless communication ppt
 
Blue eye technology ppt
Blue eye technology pptBlue eye technology ppt
Blue eye technology ppt
 
WIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALA
WIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALAWIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALA
WIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALA
 
BSNL Training Report
BSNL Training ReportBSNL Training Report
BSNL Training Report
 
Project report on home automation using Arduino
Project report on home automation using Arduino Project report on home automation using Arduino
Project report on home automation using Arduino
 
Haptic technology ppt
Haptic technology pptHaptic technology ppt
Haptic technology ppt
 
5g ppt new
5g ppt new5g ppt new
5g ppt new
 
Bluetooth Network security
Bluetooth Network securityBluetooth Network security
Bluetooth Network security
 
Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 

En vedette

Embedded systems: Future perspectives
Embedded systems: Future perspectivesEmbedded systems: Future perspectives
Embedded systems: Future perspectivesGiuseppe La Torre
 
Embedded systems The Past Present and the Future
Embedded systems The Past Present and the FutureEmbedded systems The Past Present and the Future
Embedded systems The Past Present and the FutureSrikanth KS
 
Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Vijay Kribpz
 
C,12925439 toyota-coralla-1996-wiring-diagram-overall
C,12925439 toyota-coralla-1996-wiring-diagram-overallC,12925439 toyota-coralla-1996-wiring-diagram-overall
C,12925439 toyota-coralla-1996-wiring-diagram-overallMelany Calle
 
Toyota corolla 1.6 ecu wiring
Toyota corolla 1.6 ecu wiringToyota corolla 1.6 ecu wiring
Toyota corolla 1.6 ecu wiringmrxeoto
 
Toyota corolla repair manual 1990 2011
Toyota corolla repair manual 1990 2011Toyota corolla repair manual 1990 2011
Toyota corolla repair manual 1990 2011Ryan Melville
 
Classification of Networks & Network topologies
Classification of Networks & Network topologiesClassification of Networks & Network topologies
Classification of Networks & Network topologiesPriyanka Nain
 
Classification of Computer Networks
Classification of Computer Networks Classification of Computer Networks
Classification of Computer Networks Nazren Wak
 
2009 2010 toyota corolla electrical wiring diagrams
2009 2010 toyota corolla electrical wiring diagrams2009 2010 toyota corolla electrical wiring diagrams
2009 2010 toyota corolla electrical wiring diagramsCarlos Coronel Sotillo
 
A topic 2.1.2 classification of network
A topic 2.1.2 classification of networkA topic 2.1.2 classification of network
A topic 2.1.2 classification of networkhazirma
 
http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona
http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona
http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona gsx1
 
Manual electrico de toyota corolla 2012
Manual electrico de toyota corolla   2012Manual electrico de toyota corolla   2012
Manual electrico de toyota corolla 2012Melany Calle
 
Networks classification
Networks classificationNetworks classification
Networks classificationMukesh Chinta
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentationKrishna Kumari
 
Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...
Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...
Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...RAHUL PANDEY
 
Basics of c++ Programming Language
Basics of c++ Programming LanguageBasics of c++ Programming Language
Basics of c++ Programming LanguageAhmad Idrees
 

En vedette (20)

Embedded systems: Future perspectives
Embedded systems: Future perspectivesEmbedded systems: Future perspectives
Embedded systems: Future perspectives
 
Embedded systems The Past Present and the Future
Embedded systems The Past Present and the FutureEmbedded systems The Past Present and the Future
Embedded systems The Past Present and the Future
 
Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2
 
C,12925439 toyota-coralla-1996-wiring-diagram-overall
C,12925439 toyota-coralla-1996-wiring-diagram-overallC,12925439 toyota-coralla-1996-wiring-diagram-overall
C,12925439 toyota-coralla-1996-wiring-diagram-overall
 
Toyota corolla 1.6 ecu wiring
Toyota corolla 1.6 ecu wiringToyota corolla 1.6 ecu wiring
Toyota corolla 1.6 ecu wiring
 
Toyota corolla repair manual 1990 2011
Toyota corolla repair manual 1990 2011Toyota corolla repair manual 1990 2011
Toyota corolla repair manual 1990 2011
 
Classification of Networks & Network topologies
Classification of Networks & Network topologiesClassification of Networks & Network topologies
Classification of Networks & Network topologies
 
Classification of Computer Networks
Classification of Computer Networks Classification of Computer Networks
Classification of Computer Networks
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
2009 2010 toyota corolla electrical wiring diagrams
2009 2010 toyota corolla electrical wiring diagrams2009 2010 toyota corolla electrical wiring diagrams
2009 2010 toyota corolla electrical wiring diagrams
 
A topic 2.1.2 classification of network
A topic 2.1.2 classification of networkA topic 2.1.2 classification of network
A topic 2.1.2 classification of network
 
http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona
http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona
http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona
 
Manual electrico de toyota corolla 2012
Manual electrico de toyota corolla   2012Manual electrico de toyota corolla   2012
Manual electrico de toyota corolla 2012
 
Networks classification
Networks classificationNetworks classification
Networks classification
 
3.1.2 classification of network
3.1.2 classification of network3.1.2 classification of network
3.1.2 classification of network
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 
Electric cars
Electric carsElectric cars
Electric cars
 
Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...
Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...
Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...
 
Basics of c++ Programming Language
Basics of c++ Programming LanguageBasics of c++ Programming Language
Basics of c++ Programming Language
 
Electrical car ppt
Electrical car pptElectrical car ppt
Electrical car ppt
 

Similaire à Bluetooth Wireless Sensor Networks Guide

Similaire à Bluetooth Wireless Sensor Networks Guide (20)

BLUETOOTH.ppt
BLUETOOTH.pptBLUETOOTH.ppt
BLUETOOTH.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Wireless standards
Wireless standards Wireless standards
Wireless standards
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth k.v
Bluetooth                                k.vBluetooth                                k.v
Bluetooth k.v
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth paper (IEEE)
Bluetooth paper (IEEE)Bluetooth paper (IEEE)
Bluetooth paper (IEEE)
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
BluetoothPPT.pdf
BluetoothPPT.pdfBluetoothPPT.pdf
BluetoothPPT.pdf
 
Rj bluetooth
Rj bluetoothRj bluetooth
Rj bluetooth
 

Plus de Siya Agarwal

Whats digital marketing
Whats digital marketingWhats digital marketing
Whats digital marketingSiya Agarwal
 
amrapali la residentia
amrapali la residentiaamrapali la residentia
amrapali la residentiaSiya Agarwal
 
Solar home lighting system
Solar home lighting systemSolar home lighting system
Solar home lighting systemSiya Agarwal
 
Solar charge controller
Solar charge controllerSolar charge controller
Solar charge controllerSiya Agarwal
 
Presentation on venturi
Presentation on venturiPresentation on venturi
Presentation on venturiSiya Agarwal
 
Presentation on sparkler filter bag
Presentation on sparkler filter bagPresentation on sparkler filter bag
Presentation on sparkler filter bagSiya Agarwal
 
Presentation on screening mesh
Presentation on screening meshPresentation on screening mesh
Presentation on screening meshSiya Agarwal
 
Presentation on reverse air type filter bag
Presentation on reverse air type filter bagPresentation on reverse air type filter bag
Presentation on reverse air type filter bagSiya Agarwal
 
Presentation on pulveriser sleeve
Presentation on pulveriser sleevePresentation on pulveriser sleeve
Presentation on pulveriser sleeveSiya Agarwal
 
Presentation on pp cartridge housing filter
Presentation on pp cartridge housing filterPresentation on pp cartridge housing filter
Presentation on pp cartridge housing filterSiya Agarwal
 
Presentation on nutsche filter bag
Presentation on nutsche filter bagPresentation on nutsche filter bag
Presentation on nutsche filter bagSiya Agarwal
 
Presentation on geotextile
Presentation on geotextilePresentation on geotextile
Presentation on geotextileSiya Agarwal
 
Presentation on fine bubble diffuser
Presentation on fine bubble diffuserPresentation on fine bubble diffuser
Presentation on fine bubble diffuserSiya Agarwal
 
Presentation on FBD filter bags
Presentation on FBD filter bagsPresentation on FBD filter bags
Presentation on FBD filter bagsSiya Agarwal
 
Presentation on candle filter bag
Presentation on candle filter bagPresentation on candle filter bag
Presentation on candle filter bagSiya Agarwal
 
Presentation on waste water diffuser
Presentation on waste water diffuserPresentation on waste water diffuser
Presentation on waste water diffuserSiya Agarwal
 
Presentation on support cages
Presentation on support cagesPresentation on support cages
Presentation on support cagesSiya Agarwal
 

Plus de Siya Agarwal (20)

Whats digital marketing
Whats digital marketingWhats digital marketing
Whats digital marketing
 
amrapali la residentia
amrapali la residentiaamrapali la residentia
amrapali la residentia
 
Anode filter bags
Anode filter bagsAnode filter bags
Anode filter bags
 
Pmp west delhi
Pmp west delhiPmp west delhi
Pmp west delhi
 
Solar home lighting system
Solar home lighting systemSolar home lighting system
Solar home lighting system
 
Solar off grid
Solar off gridSolar off grid
Solar off grid
 
Solar charge controller
Solar charge controllerSolar charge controller
Solar charge controller
 
Presentation on venturi
Presentation on venturiPresentation on venturi
Presentation on venturi
 
Presentation on sparkler filter bag
Presentation on sparkler filter bagPresentation on sparkler filter bag
Presentation on sparkler filter bag
 
Presentation on screening mesh
Presentation on screening meshPresentation on screening mesh
Presentation on screening mesh
 
Presentation on reverse air type filter bag
Presentation on reverse air type filter bagPresentation on reverse air type filter bag
Presentation on reverse air type filter bag
 
Presentation on pulveriser sleeve
Presentation on pulveriser sleevePresentation on pulveriser sleeve
Presentation on pulveriser sleeve
 
Presentation on pp cartridge housing filter
Presentation on pp cartridge housing filterPresentation on pp cartridge housing filter
Presentation on pp cartridge housing filter
 
Presentation on nutsche filter bag
Presentation on nutsche filter bagPresentation on nutsche filter bag
Presentation on nutsche filter bag
 
Presentation on geotextile
Presentation on geotextilePresentation on geotextile
Presentation on geotextile
 
Presentation on fine bubble diffuser
Presentation on fine bubble diffuserPresentation on fine bubble diffuser
Presentation on fine bubble diffuser
 
Presentation on FBD filter bags
Presentation on FBD filter bagsPresentation on FBD filter bags
Presentation on FBD filter bags
 
Presentation on candle filter bag
Presentation on candle filter bagPresentation on candle filter bag
Presentation on candle filter bag
 
Presentation on waste water diffuser
Presentation on waste water diffuserPresentation on waste water diffuser
Presentation on waste water diffuser
 
Presentation on support cages
Presentation on support cagesPresentation on support cages
Presentation on support cages
 

Dernier

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 

Dernier (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 

Bluetooth Wireless Sensor Networks Guide

  • 2.
  • 3. Contents  Introduction  Blutooth Specification  Blutooth Basics  Blutooth Topology  Blutooth Software  Blutooth Keyboard  Blutooth Protocol Stack  Blutooth Security  Blutooth Based Sensor N/W  Sensor N/W Implementation  Blutooth Hardware Architecture  Algorithms For Operation Of Networks  Merits  Demerits
  • 4. Introduction  Bluetooth Wireless Technology (BWT) was developed in 1994 at Ericsson in Sweden.  It is named for Harald Blaatand.  Bluetooth-Wireless and Automatic technology simplifying art of communication.  Frequency used is 2.45 GHz, same used in ISM devices.  Purpose – Originally it was build to eliminate the need for cable connections between PDAs and notebook PCs. Later the goals were to enable different devices through a commonly accepted standard for wireless connectivity . Ericsson on advent of BWT conceptualized a Radio Technology through a wireless personal area network (WPAN).
  • 5. Bluetooth Specification  Bluetooth-Wireless technology providing link between mobile and electronic devices.  It operates on 2.45 GHz radio signals using frequency hopping spread spectrum.  Technology of Bluetooth concentrates on short range of communication.
  • 6. Bluetooth Specification •Standard: IEEE 802.15 •ISM Band Frequency: 2.4 GHz •Range: 10 – 100 meters •Channel Bandwidth: 1 Mbps •Maximum Asymmetric Data Transfer Rate: 721 Kbps
  • 7. Types of Bluetooth Wireless Technology Depending on the power consumption and range of the device, there are 3 Bluetooth Classes as: •Class 1: Max Power – 100mW ; Range – 100 m •Class 2: Max Power – 2.5mW ; Range – 10 m •Class 3: Max Power – 1mW ; Range – 1 m
  • 8. Why the name Bluetooth? The name was adopted as a tribute to the tenth-century vikingking Harald Blatand who peacefully united Denmark and Norway. Harald liked to eat blueberries, which gave his teeth the coloration that lead to the nickname "Bluetooth."
  • 9. How to reduce interference? •BWT devices hop randomly between frequencies up to 1600 times per second. •So,if another device using a 2.4 GHz frequency (e.g.:cordless phone) , then the interference with the BWT network lasts only for about 1/1600 of a second. •By then, the devices hop to another frequency.
  • 10. Applications  Laptops  PDA’s  Headphones  Wireless printer adapter  Onboard Bluetooth adapter.
  • 11. Bluetooth Basics  Bluetooth is low powered and low cost.  All the devices follow a uniform structure  Devices Connect through network called Pico nets.  Strength lies in handling data and video transmission simultaneously.
  • 12. Bluetooth Basics  Specification- Bluetooth specification gives developers data link and application layer definitions  Spectrum-Bluetooth operates between 2.4 and 2.485 GHz using a frequency hopping spread spectrum.  Interference- is reduced using Adaptive Frequency Hopping allowing a better efficiency and greater performance.
  • 13. Bluetooth Topology 2 main topologies are as: i.PICONET TOPOLOGY, & ii.SCATTERNET TOPOLOGY
  • 14. i.Piconet Topology •A piconet consists of upto 8 BWT- enabled devices. •When piconet is established, one device sets up frequency-hopping pattern and other devices synchronize their signals to the same pattern. •Each piconet has a different frequency-hopping pattern.
  • 16. ii.Scatternet Topology •Scatternet consists of several piconets connected by devices participating in multiple piconet. • There is a ‘BRIDGE’ connecting 2 piconets which is also a slave in individual piconets. Advantages of Scatternet : •Higher throughput •Multi-hop connections between devices indifferent piconets
  • 17. Network Topologies? Bus Network 17 Tree Network Star Network Ring Network Ad Hoc Network There are SO many technical questions: such as…
  • 18. Future Of Bluetooth •BROADCAST CHANNELS:Adoption of Bluetooth into mobile phones and enable advertising models based on users pulling information from the information points. •TOPOLOGY MANAGEMENT:Automatic configuration of piconet topologies in scatternet situations.
  • 19. Bluetooth Software  Bluetooth software can be installed and used on Bluetooth capable devices.  There exists different software for different devices like PDA , personal computer.  Enables the device to use technology at its fullest.  Best example is Bluesoleil.
  • 20. Bluetooth software  Bluesoleil can be installed on personal computer or on  personal digital assistant also  On a PC, it provides a lot of Extra wireless features.  It also has a graphical user interface (GUI).  On a PDA, provides basic Bluetooth profiles such as headset and hands free profile, personal networking (PAN) profile
  • 21. How Bluetooth works?  They normally operate at 2.45GHZ in license free globally available ISM radio band.  Advantage-worldwide availability and compatibility.  Disadvantage- devices must share the band with other RF emitters including automobile security systems, noise sources such as Microwaves  Solution- Frequency Hopping Spread Spectrum.
  • 22. Frequency Hopping Spread Spectrum (FHSS)  Frequency hopping is jumping from one frequency to another within the ISM radio band.  Efficient use of entire bandwidth.  Low Interference  Provides basic level of security.
  • 23. Working of FHSS  There exists a master-slave relation between devices.  A device in master mode can communicate with upto seven slave devices.  Bluetooth devices work in a short range to conserve the battery power.
  • 24. Technical operations  High speed, low powered wireless technology.  Circuits are Contained on a 0.9 cm square.  This offers 1MB link with security.  Each device offers unique 48 bit address from IEEE 802.15 standard.  Authentification is via a 128 bit key.  Supports up to 721KBps along with 3 voice channels.
  • 25. Bluetooth Keyboard  Bluetooth keyboard is one of major applications of Bluetooth technology.  It was first developed by Microsoft in 2002.  Today most of companies offer this type of keyboard, some of which companies include Dell, Apple..  A Bluetooth keyboard and mouse combination will allow the user to work at distances of up to 30 feet.  There are mainly two types in this-wireless keyboard and virtual keyboard.
  • 26. Wireless and Virtual keyboard  Wireless keyboard, called Optical Desktop Elite offered by Microsoft work with 2.4 GHz Bluetooth technology.  Apple wireless keyboard is a sleek and compact design and makes a secure, reliable connection with Mac.  Foldable types are another type of Bluetooth keyboards.  It ranges in full size keyboard to mini keyboard.
  • 27. Virtual keyboard  Virtual keyboard is projected on a flat, non reflective surface and keystrokes are accompanied by key clicking sounds that are simulated.  The keyboard has 63 keys and it measures only 295*95 mm with a height of 3.5 inches.  Keyboard works by producing a red diode laser light when keyboard is projected on surface.
  • 29. Bluetooth Market Forecast 29Nov’03: 100M Bluetooth compliant devices worldwide
  • 30. Bluetooth Protocol Stack  Adopted Protocols • PPP(Point-To-Point Protocol) • TCP/UDP/IP • OBEX-Session Protocol for IrDA(Infrared Data Association) • Contents Fromat(e.g. vCard, vCalendar) • WAP-Wireless Application Protocol
  • 31. Bluetooth Security  Supports Unidirectional or Mutual Encryption based on a Secret Link key Shared Between Two Devices  Security Defined In 3 modes: • Mode1- No Security • Mode 2 - Service Level Security: Not Established Before Channel is Established at L2CAP • Mode 3 - Link Level Security: Device Initiates Security Before LMP Link is Setup
  • 32. Bluetooth Security  3 Levels of Service Access • Require Authorization and Authenication • Require Authentication Only • Default Security for Legacy Applications 32
  • 33. Bluetooth Based Sensor Networks •One such application is : WIRELESS SENSOR NETWORKS (WSN) •Important features of WSN:Collaboration of network nodes during execution and Data Centric nature. •Many smart sensor nodes scattered in the field collect data and send it to users via ‘gateway’ using multi-hop routes.
  • 34. Wireless Sensor Networks (WSN) WSN consists of number of small devices equipped with asensing unit, microprocessors, wireless communication interfaceand power source.
  • 35. Sensor Network Implementation •OBJECTIVE: To build a Hardware platform and generic Software Solutions to serve for research in WSN protocols. •Components of Sensor Network: Smart Sensor Nodes and Gateway
  • 36. Example: Pressure Sensor For implementation of Pressure Sensor as Bluetooth Node, following components are important: •Bluetooth Device •Sensors •Microcontroller
  • 37. Blutooth Hardware Architecture Bluetooth Hardware consists of 3 main functional modules: •2.4 GHz Bluetooth RF Transceiver Unit •Link Management Unit •Host Controller Interface
  • 38. Industrial CyberSecurity  The Case of Vitek Boden
  • 39.  On October 31, 2001 Vitek Boden was convicted of: • 26 counts of will fully using a restricted computer to cause damage • 1 count of causing serious environment harm  The facts of the case: • Vitek worked for the contractor involved in the installation of Maroochy Shire sewage treatment plant. • Vitek left the contractor in December 1999 and approached the shire for employment. He was refused. • Between Jan 2000 and Apr 2000 the sewage system experienced 47 unexplainable faults, causing millions of liters of sewage to be spilled.
  • 40. How did he do it?  On April 23, 2000 Vitek was arrested with stolen radio equipment, controller programming software on a laptop and a fully operational controller.  Vitek is now in jail… Disgruntled Contractor PLC PLC Sewage Plant Rogue Radio
  • 41. Algorithms For Operation Of Networks •Initialization of gateway and Bluetooth Inquiry Procedure. •Discovery of Bluetooth device and Checking of major and minor devices. •Setting of parameters and assigning type of devices and sensors. •Description by Service-Class Field. •Discarding of non-smart nodes.
  • 42. •Else, service database of the discovered smart node is searched for sensor services. •If no current sensor profile, then database is searched for serial port connection parameters. •Lastly, Bluetooth link is established and data exchange with smart node starts.
  • 43. Sensor Market: $11B in 2001 Installation (wiring) costs: >$100B 43 Freedonia Group report on Sensors, April 2002 • Fragmented market  platform opportunity • Installation cost limits penetration  reducing installation cost increases market size Slide courtesy of Rob Conant, Dust Highly Fragmented Sensor Market
  • 44. Firewall Architectures 44  The external router blocks attempts to use the underlying IP layer to break security (e.g. IP spoofing, source routing, packet fragments, etc) and forces all traffic to the proxy.  The proxy firewall handles potential security holes in the higher layer protocols.  The internal router blocks all traffic except to the proxy server. Internal Router Internet External Router 
  • 45. Statistics on Types of Attacks 0 20 40 60 80 100 120 Theft of Propriety Info Sabotage Telecom Evesdropping System Penetration Insider Abuse of Net Access Finacial Fraud Virus Unauthorized Insider Access Telecom Fraud Active Wiretap Laptop Theft Denial of Service 1997 1998 1999 2000 2001 2002 *Source: “2002 CSI/FBI Computer Crime and Security Survey” Computer Security Institute - www.gocsi.com/losses. % of Respondents
  • 46. There’s lot of “Wireless”  From cellphones to PDAs to WiFi to Satellite-based
  • 48. Merits  Wireless  Inexpensive  Automatic  Interoperability  Low interference and energy consumption.  Share voice and data  Instant PAN  Upgradeable  Long lasting technology.  Easy link establishment
  • 49. Demerits  Data rate and security  More susceptible to Interception and attack  Less range  Average Speed  Short Life