The document discusses Bluetooth technology and related topics. It provides an overview of Bluetooth SIG, the development and adoption of Bluetooth specifications, and key Bluetooth concepts like generic attribute profile (GATT) and attribute protocol (ATT). It also summarizes Nanoleq's work in developing e-textile solutions using multiple Bluetooth services.
“Bluetooth wireless technology is an open specification for a low-cost, low-power, short-range radio technology for ad-hoc wireless communication of voice and data anywhere in the world.”
Slides are mainly on the major security flaws that existed in the Bluetooth 4.0/4.1 (released 2010) specifically Bluetooth Low Energy(BLE) (a.k.a Bluetooth Smart) specification. BLE was introduced as part of Bluetooth 4.0 targeting low power devices which is quite different from classic Bluetooth. Later part contains major security enhancements that are introduced in BLE 4.2
M240 reader-bundle for environmental monitoring in IT / Network Closets.pe2six
The M240 network closed environmental monitoring bundle enables the monitoring of critical environmental conditions in distributed network closets, MERs and SERs.
This presentation provides the information about zigbee network functionalities. The procedure of Zigbee Personal Area Network creation, joining with the Personal Area Network, Allowing the device, routers to join & leave the network.
“Bluetooth wireless technology is an open specification for a low-cost, low-power, short-range radio technology for ad-hoc wireless communication of voice and data anywhere in the world.”
Slides are mainly on the major security flaws that existed in the Bluetooth 4.0/4.1 (released 2010) specifically Bluetooth Low Energy(BLE) (a.k.a Bluetooth Smart) specification. BLE was introduced as part of Bluetooth 4.0 targeting low power devices which is quite different from classic Bluetooth. Later part contains major security enhancements that are introduced in BLE 4.2
M240 reader-bundle for environmental monitoring in IT / Network Closets.pe2six
The M240 network closed environmental monitoring bundle enables the monitoring of critical environmental conditions in distributed network closets, MERs and SERs.
This presentation provides the information about zigbee network functionalities. The procedure of Zigbee Personal Area Network creation, joining with the Personal Area Network, Allowing the device, routers to join & leave the network.
- SDN : Software defined network : Introduction & Basics
- Why we need SDN & Features of SDN
- SDN Role in Data and Forwarding Plane , Control Plane & Management Plane
- SDN Framework & Architecture
- Openflow Architecture
- Need of SDN
How new Low Power Wireless Area Networks (LPWAN's) are aggressively challenging the Internet of Things status quo and how industry can exploit this opportunity. Specifically, the ability to query IoT endpoints in real time, improve network capacity and data rates, and the ability to deploy a filesystem in order to create a "Hadoop"-like real-time query capability at the edge of the network is explored.
- SDN : Software defined network : Introduction & Basics
- Why we need SDN & Features of SDN
- SDN Role in Data and Forwarding Plane , Control Plane & Management Plane
- SDN Framework & Architecture
- Openflow Architecture
- Need of SDN
How new Low Power Wireless Area Networks (LPWAN's) are aggressively challenging the Internet of Things status quo and how industry can exploit this opportunity. Specifically, the ability to query IoT endpoints in real time, improve network capacity and data rates, and the ability to deploy a filesystem in order to create a "Hadoop"-like real-time query capability at the edge of the network is explored.
Describes the key protocols used in Internet of Things across the network stack.
It covers the MAC protocol such as 802.15.4, Zigbee, Z-wave, Bluetooth, BLE, some key protocol used in IIoT - Industrial Internet of Things / Automation such as ISA 100.11, Wireless HART, NB-IoT, LTE-M
Effort has been made to keep the explanation short and crisp. The intention was never to replace numerous books on this subject.
How to use Bluetooth® Smart to control your embedded device with a mobile deviceAnaren, Inc.
This presentation explores the challenges facing OEMs trying to achieve wireless control of their embedded applications via Bluetooth mobile devices -- and several tips for overcoming those challenges. At the session’s conclusion, he will also touch on how Anaren's online development tool (Atmosphere) simplifies the embedded-to-mobile-device code authoring experience.
Bluetooth is an open standard for short-range
digital radio to interconnect a variety of devices Cell
phones, PDA, notebook computers, modems,
cordless phones, pagers, laptop computers, printers,
cameras by developing a single-chip, low-cost,
radio-based wireless network technology.
The following is almost an extempore presentation I gave at the Bluetooth WG summit 2017. This presentation is not to be taken too seriously and was mostly for fun with a number of serious messages.
CSEM deserves to be credited for their contribution.
Let's dive deeper into the world of ODC! Ricardo Alves (OutSystems) will join us to tell all about the new Data Fabric. After that, Sezen de Bruijn (OutSystems) will get into the details on how to best design a sturdy architecture within ODC.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
Bluetooth technology introduction and ecosystem
1. Reconnect to your body.
Know your vitals.
Niclas Granqvist, CTO
granqvist@nanoleq.com
2. • Bluetooth SIG
• Bluetooth technology
• Markets and Global Success
• Marketing
• What You Must
• LL – Link Layer
• L2CAP – Multiplexer
• ATT – Attribute Protocol
• GATT – Generic Attribute Profile
• GAP – Generic Access Profile
• DIS – Device Information Service
• Bluetooth LE Health Services
• Qualification
• What else does Bluetooth provide?
• What is Nanoleq doing?
Content
3. • Founded September 1998
• Bluetooth SIG is worlds largest Special Interest Group: ~36 000 member
companies
• Jaap Haartsen, inventor
• 2 Membership levels adopters(free) and associate
• Promotor level is for BoD companies: Microsoft, Intel, Apple, Ericsson, Motorola, Nokia and
Toshiba
• A few associates that are selected among member companies
• Bluetooth SIG is run as a “not-for-profit”
Bluetooth SIG
6. Bluetooth Low Energy is the most
successful low power radio
technology ever launched shipping in
billions.
The reason was the combination with
BR/EDR
Global Success!
7. The members develop the specifications and the SIG adopts the spec.
• Adoption means that Bluetooth SIG takes ownership of the specification
• Bluetooth SIG immediately licenses it back to the member on the condition that
you show interoperability by going through a qualification program and paying a
listing fee
• The members cross license. You can not sue for another company using your IP
in the spec. Patents can be used passively for defence
• The Bluetooth license is royalty free, unlimited, perpetual and irrevocable
• The specification development is the heart of Bluetooth
• The Bluetooth qualification program is maybe the most important service as
each product must pass to be qualified
• A significant part of the Bluetooth is marketing promotion but also promotion of
members solutions.
Development model
8. • You must be a member of the SIG
• You must ensure that the product is properly qualified and listed
• You must follow the Bluetooth brand guidelines
Simple, Secure and Everywhere
What you must
9. • Bluetooth is one of the most recognized brands in the world
• Correct marketing is important for the message and integrity of the brand
• Read the Bluetooth brand guidelines before making the product design
Bluetooth Brand Marketing
10. • Members develops the Bluetooth specifications
• 1.0, 1.0b, 1.1, 1.2, 2.0, 2.1, 3.0, 4.0, 4.1, 4.2, 5.0, 5.1, 5.2, 5.3
Core specfications
• Release cadence has increased over past years
• Rule of thumb: Major version change means new HW. Minor
implies a software update may be enough
• Backwards compatible
• Core specification (BR/EDR and LE)
• In total ~5 different radio specifications
• 2 Mbits e.g. useful for FW updates and music
• 1 Mbits, best range and general performance
• Long Range: 500 & 125 kbits: > 600 meters in open air
• Specifications to support applications
• Bluetooth LE services and profiles
• Bluetooth classic profiles and protocols
• Bluetooth Mesh and mesh models
• Tests for qualification
Bluetooth SIG spec dev.
Core spec 5.2
3256 pages
7142 Shalls
766 Shoulds
+ 2020 Mays
=============
9 928 conditions to remember!
11. Bluetooth is a hierarchal stack
• Stack divided into logical layers
• Each layer has clear responsibilities
• Mixing layers is a “layer violation”
• Layers should not know of each other
• Layers have feature bits for future
enhancements
The packet is the sum of the layers
Advantages
• Layers can evolve independently
• Layers can be added or removed
Hierarchal stacks
Application
Services Data
GATT/ATT
MUX – L2CAP
LINK LAYER
Preamble Acc. adr LL LL
L2CAP ATT Data
BLE layout
Radio
12. OSI model and Bluetooth
Android and iOS API integration
BLE Profile
BLE Application stack
BLE Service / GATT
ATT Protocol /
L2CAP
BLE Link Layer
BLE radios
BLE Mesh
network
Mesh
transport
Models
H
o
s
t
C
o
n
t
r
o
l
l
e
r
BLE is point to point
No sessions
14. • Low peak currents, coin cell technology
• Optimised for small and infrequent data
• Cheap and robust, not fast
• Cheap, robust and fast. Pick two!
• 1 Mbits is fast enough for most simple devices
Robustness
• Channel hopping to combat WIFI and multipath
• Data whitening to optimise receiver performance
• Advertisement channels (3) in-between wifi channels
• Long CRC (3 bytes) to ensure that bits are correct
• Good enough for medical applications
• Encryption gurantees integrity
• Link layer will retry an unsuccessful transfer
• Device address made so as to increase correlation in noise
• ATT transport protocol has acknowledgement, if needed
• Extended advertising reduces load on current channels
BLE Communication System
15. • Centrals control connections
• Peripheral obey
• A device can be master and
slave at the same time
• You can have many LL state
machines
• This is all LL terminology. In
most cases better to use GAP:
Central, Peripheral, Observer
and Broadcaster
Link Layer State Machine
Slave Master
Sound,
Streaming
Data, ECG
Find devices
Advertising
Chains on sec. adv.
channels
Connection
creation
Sensor ready
For discovery
and connection
16. • BLE 4.0 was a star topology
• BLE >4.1 is scatternet
• Advertisements are broadcasts
• Connections are unicasts
Example:
The Polar H10 heart rate sensor can be
connected to two masters at the same time
Topology
M/Sl
Sl M
M
Sl
Sl Sl
Adv
Sc
Sc
Sc
Scatternet:
Star:
Sl
M
M
Polar
H10
Sl
Broadcasts
17. All data packets are modifications of one basic format.
This keeps BLE simple
PDU = protocol data unit
BLE packet format
Allows some
time for the
AGC to
stabilise
Address of the
device, correlator
Data Error check
Long range packet
1 Mbit/sec =
1 bit = 1 usec
(Symbol time)
TERM1,2 are for
error correction
18. • An advertisement PDU is can be
directed or undirected
• Undirected = broadcast
• Directed = for one special device
• Advertisements can be
connectable or non-connectable
• AD structures encode data using
UUIDs
BT 5.0 has a new elaborate
advertising functions for long range,
synch chains, sec. adv. channels etc
Advertisement data format
20. BLE: GATT Data
exchange can start after
exchange of one packet.
It takes Bluetooth
classic average ~100
ms to get to data
exchange because
“many” protocols must
be setup
Initiate connection
Master
Slave
21. Once two devices are in a connection, either device
can send data. This example shows both devices
sending data, for example when the Attribute
Protocol does a read request and a read response
is returned
There are two channel hopping algorithms. The
newer channel hopping algorithm is superior
Data Exchange
22. • Use More Data (MD) bit when more to say
• SN, NSN for ack
• Lazy ack to save 50% energy
MD and SN
24. If reception stops
• The master receives no response
• The slave receive no poll package
then the link layers will inform the hosts that the a disconnection has
occurred.
This is called a supervision timeout.
Supervision Timeout
25. BLE security features
BLE has a cryptographic toolbox that allows for various use
1. Encryption (AES-128 bit) (hides message, integrity, authentication of
every packet)
2. Authentication
3. Privacy, the ID of the device can be obfuscated. This makes it impossible
to scan for BLE devices as the unique device ID is changing periodically
4. Data Signing
5. Authorisation
All algorithms are standard algorithms that are well understood!
26. L2CAP is a sophisticated data
multiplexer
• Is part of the host
• Provides static and dynamic
data streams between hosts
• Splits large packets into
pieces and moves the parts.
• The receiving host reassembles the
parts
• The unhenhanced ATT bearer
is using CID 0x04 that is a
static port. This is highly
efficient and saves battery
L2CAP
27. • GATT is a client server architecture, compare to http
• Clients collect data
• Sensors are services and send notifications with data
• The roles are not fixed. The first one issuing a PDU determines the role
• A server can handle multiple clients
• Decouples development of the two ends
• GATT is stateless
• GATT services are considered immutable (never change, once deployed)
• GATT services are collections of characteristics structured into services
• Service UUIDs identify the type of service. A service consist of characteristics
• Characteristics return data, e.g. HR and RR
• Characteristics have UUID
• Another characteristic return the measurement location
• BT SIG UUID = 16 bit, company defined 128 bit randomised
• Characteristics have operations
• Notifications and indications (acknowledged)
• Read data
• Write data
• Special operations for e.g. automation multiple characteristic writes + commit
• Characteristics have security e.g. a certain operation may require encryption
GATT
Server
Client
Client
Client
Server
28. Generic attribute profile (GATT)
• Enable large scale interoperable ecosystems of data
• Asynchronous data
• Bluetooth has no QoS but it is best effort
• Enable applications on phones, watches
• Build smarter applications
• Be small and efficient
• GATT uses a static port (compare to UDP in TCP/IP) and does not need to
configure L2CAP. This saves ~6 packets.
• GATT discovery and execution is all done using one protocol,
ATT protocol
• Bluetooth classic needs minimum 2 protocols
• The attribute protocol is used throughout BLE. Keep it simple!
• GATT is a way to describe structured and unstructured data
• Profiles describe use cases (roles, security, advertising etc)
GATT
Services
GATT
ATT
Profile
GAP
Use case
29. • Used by GATT & higher level profiles to implement services
• Can be independently qualified and can be used on it’s own if ever
needed
ATT (Attribute protocol)
30. 1. The first step is always to discover all services
• If the GATT database has not changed then this is unnecessary, GATT caching, bonded?
• Hash
2. Configure the proper characteristics
3. Enable notifications - Communicate !
Service Discovery
31. • Bluetooth 5.2 supports enhanced bearers
• The enhanced bearer allows for collections of
services
• Solves fundamental limitations in ATT for
complex multi-service scenarios
Service Collections
Device 2
Collection 21
Client 1
Collection 22
Service 1
Service 2
Device 1
Collection 11
Client 1
Collection 12
Service 1
Service 2
32. Most layers can support company specific information when needed.
• L2CAP has dynamic channels
• GATT has 128 bits services
• Company specific advertisement information
As a rule a protocol commands cannot be added in any layer ATT, L2CAP
and LL are fixed
Company specific info
34. It considered good practice to support DIS in every device.
Always implement all relevant DIS characteristics
Device Information Service
35. Reuse GATT services
Name Version Year
BAT Battery Service 1.0 2011
FTMS Fitness Machine Service 1.1 2017
DIS Device Information Service 1.1 2011
UDS User Data Service 1.1 2019
PAMS Physical Activity Monitor Service 1.0 1.0 2020
HRS Heart Rate Service 1.0 2011
HTS Health Thermometer Service 1.0 2011
PLXS Pulse Oximeter Service 1.0 2015
OTS Object Transfer Service 1.0 1.0 2015
Useful services to promote open data
Make your own GATT service if not one of the existing ones.
36. Some principles
• All products must be qualified
• The qualification is validation of design. The required commitment to
interoperability goes beyond testing. It must work!
• What has been tested does not need to be tested a second time
• Changes need to be assessed and tested
• Start project using Bluetooth Launch Studio
• Download and use PTS for testing
• Tip: The testing specifications are very useful when implementing as they
list all possible mandatory and optional features explicitly. Study testing
specs before implementation!
• Fees: Listing fee 8000 USD for adopters for a product family
Bluetooth Qualification
37. • Long range radio
• Stay connected even if phone is far away
• Android has fairly good support
• Advertising and Extended advertising
• Beacons
• Used in group training and workwear
• Direction finding AoA & AoD (5.1)
• Touch and go, integration with NFC
• Out of band TKs
• Isochronous channels (streaming data: sound, ECG) (5.2)
• Can be used for other types of data, too!
• LE power control (5.2) – minimises output power in closed loop
Other useful core features?
38. We are building a ground-
breaking e-textile multi service
solution for your body!
Nanoleq plans eclipses
everything the industry has
done so far in scope and
sophistication
What is Nanoleq doing?