PPT on Bluetooth Based Wireless Sensor Networks

52,243 views
51,996 views

Published on

Published in: Technology, Business
5 Comments
51 Likes
Statistics
Notes
No Downloads
Views
Total views
52,243
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
3,270
Comments
5
Likes
51
Embeds 0
No embeds

No notes for slide

PPT on Bluetooth Based Wireless Sensor Networks

  1. 1. BLUETOOTHBASED WIRELESSSENSOR NETWORKS
  2. 2. Contents Introduction Blutooth Specification Blutooth Basics Blutooth Topology Blutooth Software Blutooth Keyboard Blutooth Protocol Stack Blutooth Security Blutooth Based Sensor N/W Sensor N/W Implementation Blutooth HardwareArchitecture Algorithms For Operation OfNetworks Merits Demerits
  3. 3. Introduction Bluetooth Wireless Technology (BWT) was developed in1994 at Ericsson in Sweden. It is named for Harald Blaatand. Bluetooth-Wireless and Automatic technology simplifyingart of communication. Frequency used is 2.45 GHz, same used in ISM devices. Purpose – Originally it was build to eliminate the need forcable connections between PDAs and notebook PCs.Later the goals were to enable different devices througha commonly accepted standard for wireless connectivity. Ericsson on advent of BWT conceptualized a RadioTechnology through a wireless personal area network(WPAN).
  4. 4. Bluetooth Specification Bluetooth-Wireless technology providinglink between mobile and electronicdevices. It operates on 2.45 GHz radio signalsusing frequency hopping spread spectrum. Technology of Bluetooth concentrates onshort range of communication.
  5. 5. Bluetooth Specification•Standard: IEEE 802.15•ISM Band Frequency: 2.4 GHz•Range: 10 – 100 meters•Channel Bandwidth: 1 Mbps•Maximum Asymmetric Data TransferRate: 721 Kbps
  6. 6. Types of Bluetooth WirelessTechnologyDepending on the power consumptionand range of the device, there are 3Bluetooth Classes as:•Class 1: Max Power – 100mW ;Range – 100 m•Class 2: Max Power – 2.5mW ;Range – 10 m•Class 3: Max Power – 1mW ;Range – 1 m
  7. 7. Why the name Bluetooth?The name was adopted as a tribute tothe tenth-century vikingking HaraldBlatand who peacefully unitedDenmark and Norway.Harald liked to eat blueberries,which gave his teeth the colorationthat lead to the nickname"Bluetooth."
  8. 8. How to reduce interference?•BWT devices hop randomly betweenfrequencies up to 1600 times persecond.•So,if another device using a 2.4 GHzfrequency (e.g.:cordless phone) ,then the interference with the BWTnetwork lasts only for about 1/1600of a second.•By then, the devices hop to anotherfrequency.
  9. 9. Applications Laptops PDA’s Headphones Wireless printeradapter Onboard Bluetoothadapter.
  10. 10. Bluetooth Basics Bluetooth is low powered and low cost. All the devices follow a uniform structure Devices Connect through network calledPico nets. Strength lies in handling data and videotransmission simultaneously.
  11. 11. Bluetooth Basics Specification- Bluetooth specification givesdevelopers data link and application layerdefinitions Spectrum-Bluetooth operates between 2.4and 2.485 GHz using a frequency hoppingspread spectrum. Interference- is reduced using AdaptiveFrequency Hopping allowing a betterefficiency and greater performance.
  12. 12. Bluetooth Topology2 main topologies are as:i.PICONET TOPOLOGY,&ii.SCATTERNET TOPOLOGY
  13. 13. i.Piconet Topology•A piconet consists of upto 8 BWT-enabled devices.•When piconet is established, onedevice sets up frequency-hoppingpattern and other devicessynchronize their signals to the samepattern.•Each piconet has a differentfrequency-hopping pattern.
  14. 14. Piconet Topology
  15. 15. ii.Scatternet Topology•Scatternet consists of several piconetsconnected by devices participating inmultiple piconet.• There is a ‘BRIDGE’ connecting 2piconets which is also a slave inindividual piconets.Advantages of Scatternet :•Higher throughput•Multi-hop connections between devicesindifferent piconets
  16. 16. Network Topologies?Bus Network17Tree NetworkStar NetworkRing NetworkAd Hoc NetworkThere are SO many technical questions: such as…
  17. 17. Future Of Bluetooth•BROADCAST CHANNELS:Adoption ofBluetooth into mobile phones andenable advertising models based onusers pulling information from theinformation points.•TOPOLOGY MANAGEMENT:Automaticconfiguration of piconet topologies inscatternet situations.
  18. 18. Bluetooth Software Bluetooth software can be installed andused on Bluetooth capable devices. There exists different software for differentdevices like PDA , personal computer. Enables the device to use technology at itsfullest. Best example is Bluesoleil.
  19. 19. Bluetooth software Bluesoleil can be installed onpersonal computer or on personal digital assistant also On a PC, it provides a lot ofExtra wireless features. It also has a graphical userinterface (GUI). On a PDA, provides basicBluetooth profiles such asheadset and hands free profile,personal networking (PAN)profile
  20. 20. How Bluetooth works? They normally operate at 2.45GHZ in licensefree globally available ISM radio band. Advantage-worldwide availability andcompatibility. Disadvantage- devices must share the bandwith other RF emitters including automobilesecurity systems, noise sources such asMicrowaves Solution- Frequency Hopping SpreadSpectrum.
  21. 21. Frequency Hopping SpreadSpectrum (FHSS) Frequency hopping is jumping from onefrequency to another within the ISM radioband. Efficient use of entire bandwidth. Low Interference Provides basic level of security.
  22. 22. Working of FHSS There exists a master-slave relation betweendevices. A device in master mode can communicate withupto seven slave devices. Bluetooth devices work in a short range toconserve the battery power.
  23. 23. Technical operations High speed, low powered wireless technology. Circuits are Contained on a 0.9 cm square. This offers 1MB link with security. Each device offers unique 48 bit address fromIEEE 802.15 standard. Authentification is via a 128 bit key. Supports up to 721KBps along with 3 voicechannels.
  24. 24. Bluetooth Keyboard Bluetooth keyboard is one of major applications ofBluetooth technology. It was first developed by Microsoft in 2002. Today most of companies offer this type ofkeyboard, some of which companies include Dell,Apple.. A Bluetooth keyboard and mouse combination willallow the user to work at distances of up to 30 feet. There are mainly two types in this-wirelesskeyboard and virtual keyboard.
  25. 25. Wireless and Virtual keyboard Wireless keyboard, calledOptical Desktop Elite offeredby Microsoft work with 2.4 GHzBluetooth technology. Apple wireless keyboard is asleek and compact design andmakes a secure, reliableconnection with Mac. Foldable types are anothertype of Bluetooth keyboards. It ranges in full size keyboardto mini keyboard.
  26. 26. Virtual keyboard Virtual keyboard is projectedon a flat, non reflective surfaceand keystrokes areaccompanied by key clickingsounds that are simulated. The keyboard has 63 keys andit measures only 295*95 mmwith a height of 3.5 inches. Keyboard works by producinga red diode laser light whenkeyboard is projected onsurface.
  27. 27. Potential Bluetooth Markets28
  28. 28. Bluetooth Market Forecast29Nov’03: 100M Bluetooth compliant devices worldwide
  29. 29. Bluetooth Protocol Stack Adopted Protocols• PPP(Point-To-Point Protocol)• TCP/UDP/IP• OBEX-Session Protocol for IrDA(Infrared DataAssociation)• Contents Fromat(e.g. vCard, vCalendar)• WAP-Wireless Application Protocol
  30. 30. Bluetooth Security Supports Unidirectional or Mutual Encryption basedon a Secret Link key Shared Between Two Devices Security Defined In 3 modes:• Mode1- No Security• Mode 2 - Service Level Security: Not EstablishedBefore Channel is Established at L2CAP• Mode 3 - Link Level Security: Device InitiatesSecurity Before LMP Link is Setup
  31. 31. Bluetooth Security 3 Levels of Service Access• Require Authorization and Authenication• Require Authentication Only• Default Security for Legacy Applications32
  32. 32. Bluetooth Based SensorNetworks•One such application is : WIRELESSSENSOR NETWORKS (WSN)•Important features ofWSN:Collaboration of network nodesduring execution and Data Centricnature.•Many smart sensor nodes scatteredin the field collect data and send it tousers via ‘gateway’ using multi-hoproutes.
  33. 33. Wireless Sensor Networks(WSN)WSN consists of number of smalldevices equipped with asensing unit,microprocessors, wirelesscommunication interfaceand powersource.
  34. 34. Sensor Network Implementation•OBJECTIVE: To build a Hardwareplatform and generic SoftwareSolutions to serve for research inWSN protocols.•Components of Sensor Network:Smart Sensor Nodes and Gateway
  35. 35. Example: Pressure SensorFor implementation of Pressure Sensoras Bluetooth Node, followingcomponents are important:•Bluetooth Device•Sensors•Microcontroller
  36. 36. Blutooth Hardware ArchitectureBluetooth Hardware consists of 3 mainfunctional modules:•2.4 GHz Bluetooth RF TransceiverUnit•Link Management Unit•Host Controller Interface
  37. 37. Industrial CyberSecurity The Case of Vitek Boden
  38. 38.  On October 31, 2001 Vitek Boden was convicted of:• 26 counts of will fully using a restricted computer tocause damage• 1 count of causing serious environment harm The facts of the case:• Vitek worked for the contractor involved in theinstallation of Maroochy Shire sewage treatmentplant.• Vitek left the contractor in December 1999 andapproached the shire for employment. He wasrefused.• Between Jan 2000 and Apr 2000 the sewagesystem experienced 47 unexplainable faults,causing millions of liters of sewage to be spilled.
  39. 39. How did he do it? On April 23, 2000 Vitek was arrested with stolenradio equipment, controller programmingsoftware on a laptop and a fully operationalcontroller. Vitek is now in jail…DisgruntledContractorPLC PLCSewage PlantRogue Radio
  40. 40. Algorithms For Operation OfNetworks•Initialization of gateway andBluetooth Inquiry Procedure.•Discovery of Bluetooth device andChecking of major and minor devices.•Setting of parameters and assigningtype of devices and sensors.•Description by Service-Class Field.•Discarding of non-smart nodes.
  41. 41. •Else, service database of thediscovered smart node is searchedfor sensor services.•If no current sensor profile, thendatabase is searched for serial portconnection parameters.•Lastly, Bluetooth link is establishedand data exchange with smart nodestarts.
  42. 42. Sensor Market: $11B in 2001Installation (wiring) costs:>$100B43Freedonia Group report on Sensors, April 2002• Fragmented market platformopportunity• Installation cost limitspenetration reducinginstallation costincreases market sizeSlide courtesy of Rob Conant, DustHighly FragmentedSensor Market
  43. 43. Firewall Architectures44 The external router blocks attempts to use theunderlying IP layer to break security (e.g. IP spoofing,source routing, packet fragments, etc) and forces alltraffic to the proxy. The proxy firewall handles potential security holes in thehigher layer protocols. The internal router blocks all traffic except to the proxyserver.InternalRouterInternetExternalRouter
  44. 44. Statistics on Types of Attacks0 20 40 60 80 100 120Theft of Propriety InfoSabotageTelecom EvesdroppingSystem PenetrationInsider Abuse of Net AccessFinacial FraudVirusUnauthorized Insider AccessTelecom FraudActive WiretapLaptop TheftDenial of Service199719981999200020012002*Source: “2002 CSI/FBI Computer Crime and Security Survey” Computer SecurityInstitute - www.gocsi.com/losses.% of Respondents
  45. 45. There’s lot of “Wireless” From cellphones to PDAs to WiFito Satellite-based
  46. 46. Wireless LAN Standards
  47. 47. Merits Wireless Inexpensive Automatic Interoperability Low interference and energy consumption. Share voice and data Instant PAN Upgradeable Long lasting technology. Easy link establishment
  48. 48. Demerits Data rate and security More susceptible to Interception andattack Less range Average Speed Short Life
  49. 49. Thank You

×