SlideShare a Scribd company logo
BLUETOOTH
BASED WIRELESS
SENSOR NETWORKS
Contents
 Introduction
 Blutooth Specification
 Blutooth Basics
 Blutooth Topology
 Blutooth Software
 Blutooth Keyboard
 Blutooth Protocol Stack
 Blutooth Security
 Blutooth Based Sensor N/W
 Sensor N/W Implementation
 Blutooth Hardware
Architecture
 Algorithms For Operation Of
Networks
 Merits
 Demerits
Introduction
 Bluetooth Wireless Technology (BWT) was developed in
1994 at Ericsson in Sweden.
 It is named for Harald Blaatand.
 Bluetooth-Wireless and Automatic technology simplifying
art of communication.
 Frequency used is 2.45 GHz, same used in ISM devices.
 Purpose – Originally it was build to eliminate the need for
cable connections between PDAs and notebook PCs.
Later the goals were to enable different devices through
a commonly accepted standard for wireless connectivity
. Ericsson on advent of BWT conceptualized a Radio
Technology through a wireless personal area network
(WPAN).
Bluetooth Specification
 Bluetooth-Wireless technology providing
link between mobile and electronic
devices.
 It operates on 2.45 GHz radio signals
using frequency hopping spread spectrum.
 Technology of Bluetooth concentrates on
short range of communication.
Bluetooth Specification
•Standard: IEEE 802.15
•ISM Band Frequency: 2.4 GHz
•Range: 10 – 100 meters
•Channel Bandwidth: 1 Mbps
•Maximum Asymmetric Data Transfer
Rate: 721 Kbps
Types of Bluetooth Wireless
Technology
Depending on the power consumption
and range of the device, there are 3
Bluetooth Classes as:
•Class 1: Max Power – 100mW ;
Range – 100 m
•Class 2: Max Power – 2.5mW ;
Range – 10 m
•Class 3: Max Power – 1mW ;
Range – 1 m
Why the name Bluetooth?
The name was adopted as a tribute to
the tenth-century vikingking Harald
Blatand who peacefully united
Denmark and Norway.
Harald liked to eat blueberries,
which gave his teeth the coloration
that lead to the nickname
"Bluetooth."
How to reduce interference?
•BWT devices hop randomly between
frequencies up to 1600 times per
second.
•So,if another device using a 2.4 GHz
frequency (e.g.:cordless phone) ,
then the interference with the BWT
network lasts only for about 1/1600
of a second.
•By then, the devices hop to another
frequency.
Applications
 Laptops
 PDA’s
 Headphones
 Wireless printer
adapter
 Onboard Bluetooth
adapter.
Bluetooth Basics
 Bluetooth is low powered and low cost.
 All the devices follow a uniform structure
 Devices Connect through network called
Pico nets.
 Strength lies in handling data and video
transmission simultaneously.
Bluetooth Basics
 Specification- Bluetooth specification gives
developers data link and application layer
definitions
 Spectrum-Bluetooth operates between 2.4
and 2.485 GHz using a frequency hopping
spread spectrum.
 Interference- is reduced using Adaptive
Frequency Hopping allowing a better
efficiency and greater performance.
Bluetooth Topology
2 main topologies are as:
i.PICONET TOPOLOGY,
&
ii.SCATTERNET TOPOLOGY
i.Piconet Topology
•A piconet consists of upto 8 BWT-
enabled devices.
•When piconet is established, one
device sets up frequency-hopping
pattern and other devices
synchronize their signals to the same
pattern.
•Each piconet has a different
frequency-hopping pattern.
Piconet Topology
ii.Scatternet Topology
•Scatternet consists of several piconets
connected by devices participating in
multiple piconet.
• There is a ‘BRIDGE’ connecting 2
piconets which is also a slave in
individual piconets.
Advantages of Scatternet :
•Higher throughput
•Multi-hop connections between devices
indifferent piconets
Network Topologies?
Bus Network
17
Tree Network
Star Network
Ring Network
Ad Hoc Network
There are SO many technical questions: such as…
Future Of Bluetooth
•BROADCAST CHANNELS:Adoption of
Bluetooth into mobile phones and
enable advertising models based on
users pulling information from the
information points.
•TOPOLOGY MANAGEMENT:Automatic
configuration of piconet topologies in
scatternet situations.
Bluetooth Software
 Bluetooth software can be installed and
used on Bluetooth capable devices.
 There exists different software for different
devices like PDA , personal computer.
 Enables the device to use technology at its
fullest.
 Best example is Bluesoleil.
Bluetooth software
 Bluesoleil can be installed on
personal computer or on
 personal digital assistant also
 On a PC, it provides a lot of
Extra wireless features.
 It also has a graphical user
interface (GUI).
 On a PDA, provides basic
Bluetooth profiles such as
headset and hands free profile,
personal networking (PAN)
profile
How Bluetooth works?
 They normally operate at 2.45GHZ in license
free globally available ISM radio band.
 Advantage-worldwide availability and
compatibility.
 Disadvantage- devices must share the band
with other RF emitters including automobile
security systems, noise sources such as
Microwaves
 Solution- Frequency Hopping Spread
Spectrum.
Frequency Hopping Spread
Spectrum (FHSS)
 Frequency hopping is jumping from one
frequency to another within the ISM radio
band.
 Efficient use of entire bandwidth.
 Low Interference
 Provides basic level of security.
Working of FHSS
 There exists a master-slave relation between
devices.
 A device in master mode can communicate with
upto seven slave devices.
 Bluetooth devices work in a short range to
conserve the battery power.
Technical operations
 High speed, low powered wireless technology.
 Circuits are Contained on a 0.9 cm square.
 This offers 1MB link with security.
 Each device offers unique 48 bit address from
IEEE 802.15 standard.
 Authentification is via a 128 bit key.
 Supports up to 721KBps along with 3 voice
channels.
Bluetooth Keyboard
 Bluetooth keyboard is one of major applications of
Bluetooth technology.
 It was first developed by Microsoft in 2002.
 Today most of companies offer this type of
keyboard, some of which companies include Dell,
Apple..
 A Bluetooth keyboard and mouse combination will
allow the user to work at distances of up to 30 feet.
 There are mainly two types in this-wireless
keyboard and virtual keyboard.
Wireless and Virtual keyboard
 Wireless keyboard, called
Optical Desktop Elite offered
by Microsoft work with 2.4 GHz
Bluetooth technology.
 Apple wireless keyboard is a
sleek and compact design and
makes a secure, reliable
connection with Mac.
 Foldable types are another
type of Bluetooth keyboards.
 It ranges in full size keyboard
to mini keyboard.
Virtual keyboard
 Virtual keyboard is projected
on a flat, non reflective surface
and keystrokes are
accompanied by key clicking
sounds that are simulated.
 The keyboard has 63 keys and
it measures only 295*95 mm
with a height of 3.5 inches.
 Keyboard works by producing
a red diode laser light when
keyboard is projected on
surface.
Potential Bluetooth Markets
28
Bluetooth Market Forecast
29Nov’03: 100M Bluetooth compliant devices worldwide
Bluetooth Protocol Stack
 Adopted Protocols
• PPP(Point-To-Point Protocol)
• TCP/UDP/IP
• OBEX-Session Protocol for IrDA(Infrared Data
Association)
• Contents Fromat(e.g. vCard, vCalendar)
• WAP-Wireless Application Protocol
Bluetooth Security
 Supports Unidirectional or Mutual Encryption based
on a Secret Link key Shared Between Two Devices
 Security Defined In 3 modes:
• Mode1- No Security
• Mode 2 - Service Level Security: Not Established
Before Channel is Established at L2CAP
• Mode 3 - Link Level Security: Device Initiates
Security Before LMP Link is Setup
Bluetooth Security
 3 Levels of Service Access
• Require Authorization and Authenication
• Require Authentication Only
• Default Security for Legacy Applications
32
Bluetooth Based Sensor
Networks
•One such application is : WIRELESS
SENSOR NETWORKS (WSN)
•Important features of
WSN:Collaboration of network nodes
during execution and Data Centric
nature.
•Many smart sensor nodes scattered
in the field collect data and send it to
users via ‘gateway’ using multi-hop
routes.
Wireless Sensor Networks
(WSN)
WSN consists of number of small
devices equipped with asensing unit,
microprocessors, wireless
communication interfaceand power
source.
Sensor Network Implementation
•OBJECTIVE: To build a Hardware
platform and generic Software
Solutions to serve for research in
WSN protocols.
•Components of Sensor Network:
Smart Sensor Nodes and Gateway
Example: Pressure Sensor
For implementation of Pressure Sensor
as Bluetooth Node, following
components are important:
•Bluetooth Device
•Sensors
•Microcontroller
Blutooth Hardware Architecture
Bluetooth Hardware consists of 3 main
functional modules:
•2.4 GHz Bluetooth RF Transceiver
Unit
•Link Management Unit
•Host Controller Interface
Industrial CyberSecurity
 The Case of Vitek Boden
 On October 31, 2001 Vitek Boden was convicted of:
• 26 counts of will fully using a restricted computer to
cause damage
• 1 count of causing serious environment harm
 The facts of the case:
• Vitek worked for the contractor involved in the
installation of Maroochy Shire sewage treatment
plant.
• Vitek left the contractor in December 1999 and
approached the shire for employment. He was
refused.
• Between Jan 2000 and Apr 2000 the sewage
system experienced 47 unexplainable faults,
causing millions of liters of sewage to be spilled.
How did he do it?
 On April 23, 2000 Vitek was arrested with stolen
radio equipment, controller programming
software on a laptop and a fully operational
controller.
 Vitek is now in jail…
Disgruntled
Contractor
PLC PLC
Sewage Plant
Rogue Radio
Algorithms For Operation Of
Networks
•Initialization of gateway and
Bluetooth Inquiry Procedure.
•Discovery of Bluetooth device and
Checking of major and minor devices.
•Setting of parameters and assigning
type of devices and sensors.
•Description by Service-Class Field.
•Discarding of non-smart nodes.
•Else, service database of the
discovered smart node is searched
for sensor services.
•If no current sensor profile, then
database is searched for serial port
connection parameters.
•Lastly, Bluetooth link is established
and data exchange with smart node
starts.
Sensor Market: $11B in 2001
Installation (wiring) costs:
>$100B
43
Freedonia Group report on Sensors, April 2002
• Fragmented market
 platform
opportunity
• Installation cost limits
penetration
 reducing
installation cost
increases market size
Slide courtesy of Rob Conant, Dust
Highly Fragmented
Sensor Market
Firewall Architectures
44
 The external router blocks attempts to use the
underlying IP layer to break security (e.g. IP spoofing,
source routing, packet fragments, etc) and forces all
traffic to the proxy.
 The proxy firewall handles potential security holes in the
higher layer protocols.
 The internal router blocks all traffic except to the proxy
server.
Internal
Router
Internet
External
Router

Statistics on Types of Attacks
0 20 40 60 80 100 120
Theft of Propriety Info
Sabotage
Telecom Evesdropping
System Penetration
Insider Abuse of Net Access
Finacial Fraud
Virus
Unauthorized Insider Access
Telecom Fraud
Active Wiretap
Laptop Theft
Denial of Service
1997
1998
1999
2000
2001
2002
*Source: “2002 CSI/FBI Computer Crime and Security Survey” Computer Security
Institute - www.gocsi.com/losses.
% of Respondents
There’s lot of “Wireless”
 From cellphones to PDAs to WiFi
to Satellite-based
Wireless LAN Standards
Merits
 Wireless
 Inexpensive
 Automatic
 Interoperability
 Low interference and energy consumption.
 Share voice and data
 Instant PAN
 Upgradeable
 Long lasting technology.
 Easy link establishment
Demerits
 Data rate and security
 More susceptible to Interception and
attack
 Less range
 Average Speed
 Short Life
Thank You

More Related Content

What's hot

Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
OECLIB Odisha Electronics Control Library
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
Maulik Patel
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
AJAL A J
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
NEEVEE Technologies
 
Bluetooth
BluetoothBluetooth
Bluetooth
Anamika Garg
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Siva Pradeep Bolisetti
 
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALABluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Saikiran Panjala
 
Bluetooth based smart sensor networks
Bluetooth based smart sensor networksBluetooth based smart sensor networks
Bluetooth based smart sensor networks
Brockanurag
 
Wireless network
Wireless networkWireless network
Wireless network
Devyani Vaidya
 
Wireless communication
Wireless communicationWireless communication
Wireless communicationDarshan Maru
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
Hina Saxena
 
Bluetooth
BluetoothBluetooth
Bluetooth
Priyanka Anni
 
Bluetooth
BluetoothBluetooth
Bluetooth
Samraiz Tejani
 
The Bluetooth technology
The Bluetooth technologyThe Bluetooth technology
The Bluetooth technology
SaQi95
 
Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Vijay Kribpz
 
Microwave Transmission
Microwave TransmissionMicrowave Transmission
Microwave TransmissionDevang Bhatti
 
Bluetooth
BluetoothBluetooth
Bluetooth
Kashyap Shah
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
Shreejan Acharya
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
Rohit Roy
 
Wireless Communication
 Wireless Communication Wireless Communication
Wireless Communication
Sourov Shaha Suvo
 

What's hot (20)

Wireless Communication ppt
Wireless Communication pptWireless Communication ppt
Wireless Communication ppt
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
Introduction to Bluetooth low energy
Introduction to Bluetooth low energyIntroduction to Bluetooth low energy
Introduction to Bluetooth low energy
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
 
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALABluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
 
Bluetooth based smart sensor networks
Bluetooth based smart sensor networksBluetooth based smart sensor networks
Bluetooth based smart sensor networks
 
Wireless network
Wireless networkWireless network
Wireless network
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 
Bluetooth.ppt
Bluetooth.pptBluetooth.ppt
Bluetooth.ppt
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
The Bluetooth technology
The Bluetooth technologyThe Bluetooth technology
The Bluetooth technology
 
Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2Bluetooth based smart sensor devices 2
Bluetooth based smart sensor devices 2
 
Microwave Transmission
Microwave TransmissionMicrowave Transmission
Microwave Transmission
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Wireless Communication
 Wireless Communication Wireless Communication
Wireless Communication
 

Viewers also liked

Embedded systems: Future perspectives
Embedded systems: Future perspectivesEmbedded systems: Future perspectives
Embedded systems: Future perspectives
Giuseppe La Torre
 
Embedded systems The Past Present and the Future
Embedded systems The Past Present and the FutureEmbedded systems The Past Present and the Future
Embedded systems The Past Present and the Future
Srikanth KS
 
C,12925439 toyota-coralla-1996-wiring-diagram-overall
C,12925439 toyota-coralla-1996-wiring-diagram-overallC,12925439 toyota-coralla-1996-wiring-diagram-overall
C,12925439 toyota-coralla-1996-wiring-diagram-overall
Melany Calle
 
Toyota corolla 1.6 ecu wiring
Toyota corolla 1.6 ecu wiringToyota corolla 1.6 ecu wiring
Toyota corolla 1.6 ecu wiring
mrxeoto
 
Toyota corolla repair manual 1990 2011
Toyota corolla repair manual 1990 2011Toyota corolla repair manual 1990 2011
Toyota corolla repair manual 1990 2011
Ryan Melville
 
Classification of Networks & Network topologies
Classification of Networks & Network topologiesClassification of Networks & Network topologies
Classification of Networks & Network topologies
Priyanka Nain
 
Classification of Computer Networks
Classification of Computer Networks Classification of Computer Networks
Classification of Computer Networks
Nazren Wak
 
Bluetooth
BluetoothBluetooth
Bluetooth
Bhushan Bagde
 
2009 2010 toyota corolla electrical wiring diagrams
2009 2010 toyota corolla electrical wiring diagrams2009 2010 toyota corolla electrical wiring diagrams
2009 2010 toyota corolla electrical wiring diagramsCarlos Coronel Sotillo
 
A topic 2.1.2 classification of network
A topic 2.1.2 classification of networkA topic 2.1.2 classification of network
A topic 2.1.2 classification of networkhazirma
 
http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona
http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona
http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona
gsx1
 
Manual electrico de toyota corolla 2012
Manual electrico de toyota corolla   2012Manual electrico de toyota corolla   2012
Manual electrico de toyota corolla 2012
Melany Calle
 
Networks classification
Networks classificationNetworks classification
Networks classification
Mukesh Chinta
 
Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...
Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...
Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...
RAHUL PANDEY
 
Basics of c++ Programming Language
Basics of c++ Programming LanguageBasics of c++ Programming Language
Basics of c++ Programming Language
Ahmad Idrees
 
Electrical car ppt
Electrical car pptElectrical car ppt
Electrical car ppt
Shyam Sundar Roy
 

Viewers also liked (18)

Embedded systems: Future perspectives
Embedded systems: Future perspectivesEmbedded systems: Future perspectives
Embedded systems: Future perspectives
 
Embedded systems The Past Present and the Future
Embedded systems The Past Present and the FutureEmbedded systems The Past Present and the Future
Embedded systems The Past Present and the Future
 
C,12925439 toyota-coralla-1996-wiring-diagram-overall
C,12925439 toyota-coralla-1996-wiring-diagram-overallC,12925439 toyota-coralla-1996-wiring-diagram-overall
C,12925439 toyota-coralla-1996-wiring-diagram-overall
 
Toyota corolla 1.6 ecu wiring
Toyota corolla 1.6 ecu wiringToyota corolla 1.6 ecu wiring
Toyota corolla 1.6 ecu wiring
 
Toyota corolla repair manual 1990 2011
Toyota corolla repair manual 1990 2011Toyota corolla repair manual 1990 2011
Toyota corolla repair manual 1990 2011
 
Classification of Networks & Network topologies
Classification of Networks & Network topologiesClassification of Networks & Network topologies
Classification of Networks & Network topologies
 
Classification of Computer Networks
Classification of Computer Networks Classification of Computer Networks
Classification of Computer Networks
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
2009 2010 toyota corolla electrical wiring diagrams
2009 2010 toyota corolla electrical wiring diagrams2009 2010 toyota corolla electrical wiring diagrams
2009 2010 toyota corolla electrical wiring diagrams
 
A topic 2.1.2 classification of network
A topic 2.1.2 classification of networkA topic 2.1.2 classification of network
A topic 2.1.2 classification of network
 
http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona
http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona
http://vnx.su/ Electrical Wiring Diagrams Toyota Carina E / Corona
 
Manual electrico de toyota corolla 2012
Manual electrico de toyota corolla   2012Manual electrico de toyota corolla   2012
Manual electrico de toyota corolla 2012
 
Networks classification
Networks classificationNetworks classification
Networks classification
 
3.1.2 classification of network
3.1.2 classification of network3.1.2 classification of network
3.1.2 classification of network
 
Electric cars
Electric carsElectric cars
Electric cars
 
Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...
Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...
Best ppt for seminar on hybrid electric vehicle AND TYPE OF HYBRID VEHICLE by...
 
Basics of c++ Programming Language
Basics of c++ Programming LanguageBasics of c++ Programming Language
Basics of c++ Programming Language
 
Electrical car ppt
Electrical car pptElectrical car ppt
Electrical car ppt
 

Similar to PPT on Bluetooth Based Wireless Sensor Networks

Data Communication and Network World of Bluetooth
Data Communication and Network World of BluetoothData Communication and Network World of Bluetooth
Data Communication and Network World of Bluetooth
Chandrakant Divate
 
BLUETOOTH.ppt
BLUETOOTH.pptBLUETOOTH.ppt
BLUETOOTH.ppt
TheUltimateFunEntert
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic VersionAyesha Saeed
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
Suman Bhattacharyya
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
Engr Sid
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
Somesh Biradar
 
Wireless standards
Wireless standards Wireless standards
Wireless standards
Ajay Suresh
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
Vishal Arora
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
Serena Rinaldi Lambiase
 
Bluetooth k.v
Bluetooth                                k.vBluetooth                                k.v
Bluetooth k.vkarunvir
 
Bluetooth
BluetoothBluetooth
Bluetooth
Fahim Faysal
 
Bluetooth paper (IEEE)
Bluetooth paper (IEEE)Bluetooth paper (IEEE)
Bluetooth paper (IEEE)
Kashyap Shah
 
BluetoothPPT.pdf
BluetoothPPT.pdfBluetoothPPT.pdf
BluetoothPPT.pdf
Ppupu
 

Similar to PPT on Bluetooth Based Wireless Sensor Networks (20)

Data Communication and Network World of Bluetooth
Data Communication and Network World of BluetoothData Communication and Network World of Bluetooth
Data Communication and Network World of Bluetooth
 
BLUETOOTH.ppt
BLUETOOTH.pptBLUETOOTH.ppt
BLUETOOTH.ppt
 
Bluetooth Basic Version
Bluetooth Basic VersionBluetooth Basic Version
Bluetooth Basic Version
 
Overview of Bluetooth technology
Overview of Bluetooth technologyOverview of Bluetooth technology
Overview of Bluetooth technology
 
Bluetooth basic
Bluetooth basicBluetooth basic
Bluetooth basic
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 
Wireless standards
Wireless standards Wireless standards
Wireless standards
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth Technology
Bluetooth TechnologyBluetooth Technology
Bluetooth Technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
IT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIOIT WRITING SAMPLES PORTFOLIO
IT WRITING SAMPLES PORTFOLIO
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth k.v
Bluetooth                                k.vBluetooth                                k.v
Bluetooth k.v
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth paper (IEEE)
Bluetooth paper (IEEE)Bluetooth paper (IEEE)
Bluetooth paper (IEEE)
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
BluetoothPPT.pdf
BluetoothPPT.pdfBluetoothPPT.pdf
BluetoothPPT.pdf
 
Rj bluetooth
Rj bluetoothRj bluetooth
Rj bluetooth
 

More from Siya Agarwal

Whats digital marketing
Whats digital marketingWhats digital marketing
Whats digital marketing
Siya Agarwal
 
amrapali la residentia
amrapali la residentiaamrapali la residentia
amrapali la residentia
Siya Agarwal
 
Anode filter bags
Anode filter bagsAnode filter bags
Anode filter bags
Siya Agarwal
 
Pmp west delhi
Pmp west delhiPmp west delhi
Pmp west delhi
Siya Agarwal
 
Solar home lighting system
Solar home lighting systemSolar home lighting system
Solar home lighting system
Siya Agarwal
 
Solar off grid
Solar off gridSolar off grid
Solar off grid
Siya Agarwal
 
Solar charge controller
Solar charge controllerSolar charge controller
Solar charge controller
Siya Agarwal
 
Presentation on venturi
Presentation on venturiPresentation on venturi
Presentation on venturi
Siya Agarwal
 
Presentation on sparkler filter bag
Presentation on sparkler filter bagPresentation on sparkler filter bag
Presentation on sparkler filter bag
Siya Agarwal
 
Presentation on screening mesh
Presentation on screening meshPresentation on screening mesh
Presentation on screening mesh
Siya Agarwal
 
Presentation on reverse air type filter bag
Presentation on reverse air type filter bagPresentation on reverse air type filter bag
Presentation on reverse air type filter bag
Siya Agarwal
 
Presentation on pulveriser sleeve
Presentation on pulveriser sleevePresentation on pulveriser sleeve
Presentation on pulveriser sleeve
Siya Agarwal
 
Presentation on pp cartridge housing filter
Presentation on pp cartridge housing filterPresentation on pp cartridge housing filter
Presentation on pp cartridge housing filter
Siya Agarwal
 
Presentation on nutsche filter bag
Presentation on nutsche filter bagPresentation on nutsche filter bag
Presentation on nutsche filter bag
Siya Agarwal
 
Presentation on geotextile
Presentation on geotextilePresentation on geotextile
Presentation on geotextile
Siya Agarwal
 
Presentation on fine bubble diffuser
Presentation on fine bubble diffuserPresentation on fine bubble diffuser
Presentation on fine bubble diffuser
Siya Agarwal
 
Presentation on FBD filter bags
Presentation on FBD filter bagsPresentation on FBD filter bags
Presentation on FBD filter bags
Siya Agarwal
 
Presentation on candle filter bag
Presentation on candle filter bagPresentation on candle filter bag
Presentation on candle filter bag
Siya Agarwal
 
Presentation on waste water diffuser
Presentation on waste water diffuserPresentation on waste water diffuser
Presentation on waste water diffuser
Siya Agarwal
 
Presentation on support cages
Presentation on support cagesPresentation on support cages
Presentation on support cages
Siya Agarwal
 

More from Siya Agarwal (20)

Whats digital marketing
Whats digital marketingWhats digital marketing
Whats digital marketing
 
amrapali la residentia
amrapali la residentiaamrapali la residentia
amrapali la residentia
 
Anode filter bags
Anode filter bagsAnode filter bags
Anode filter bags
 
Pmp west delhi
Pmp west delhiPmp west delhi
Pmp west delhi
 
Solar home lighting system
Solar home lighting systemSolar home lighting system
Solar home lighting system
 
Solar off grid
Solar off gridSolar off grid
Solar off grid
 
Solar charge controller
Solar charge controllerSolar charge controller
Solar charge controller
 
Presentation on venturi
Presentation on venturiPresentation on venturi
Presentation on venturi
 
Presentation on sparkler filter bag
Presentation on sparkler filter bagPresentation on sparkler filter bag
Presentation on sparkler filter bag
 
Presentation on screening mesh
Presentation on screening meshPresentation on screening mesh
Presentation on screening mesh
 
Presentation on reverse air type filter bag
Presentation on reverse air type filter bagPresentation on reverse air type filter bag
Presentation on reverse air type filter bag
 
Presentation on pulveriser sleeve
Presentation on pulveriser sleevePresentation on pulveriser sleeve
Presentation on pulveriser sleeve
 
Presentation on pp cartridge housing filter
Presentation on pp cartridge housing filterPresentation on pp cartridge housing filter
Presentation on pp cartridge housing filter
 
Presentation on nutsche filter bag
Presentation on nutsche filter bagPresentation on nutsche filter bag
Presentation on nutsche filter bag
 
Presentation on geotextile
Presentation on geotextilePresentation on geotextile
Presentation on geotextile
 
Presentation on fine bubble diffuser
Presentation on fine bubble diffuserPresentation on fine bubble diffuser
Presentation on fine bubble diffuser
 
Presentation on FBD filter bags
Presentation on FBD filter bagsPresentation on FBD filter bags
Presentation on FBD filter bags
 
Presentation on candle filter bag
Presentation on candle filter bagPresentation on candle filter bag
Presentation on candle filter bag
 
Presentation on waste water diffuser
Presentation on waste water diffuserPresentation on waste water diffuser
Presentation on waste water diffuser
 
Presentation on support cages
Presentation on support cagesPresentation on support cages
Presentation on support cages
 

Recently uploaded

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

PPT on Bluetooth Based Wireless Sensor Networks

  • 2.
  • 3. Contents  Introduction  Blutooth Specification  Blutooth Basics  Blutooth Topology  Blutooth Software  Blutooth Keyboard  Blutooth Protocol Stack  Blutooth Security  Blutooth Based Sensor N/W  Sensor N/W Implementation  Blutooth Hardware Architecture  Algorithms For Operation Of Networks  Merits  Demerits
  • 4. Introduction  Bluetooth Wireless Technology (BWT) was developed in 1994 at Ericsson in Sweden.  It is named for Harald Blaatand.  Bluetooth-Wireless and Automatic technology simplifying art of communication.  Frequency used is 2.45 GHz, same used in ISM devices.  Purpose – Originally it was build to eliminate the need for cable connections between PDAs and notebook PCs. Later the goals were to enable different devices through a commonly accepted standard for wireless connectivity . Ericsson on advent of BWT conceptualized a Radio Technology through a wireless personal area network (WPAN).
  • 5. Bluetooth Specification  Bluetooth-Wireless technology providing link between mobile and electronic devices.  It operates on 2.45 GHz radio signals using frequency hopping spread spectrum.  Technology of Bluetooth concentrates on short range of communication.
  • 6. Bluetooth Specification •Standard: IEEE 802.15 •ISM Band Frequency: 2.4 GHz •Range: 10 – 100 meters •Channel Bandwidth: 1 Mbps •Maximum Asymmetric Data Transfer Rate: 721 Kbps
  • 7. Types of Bluetooth Wireless Technology Depending on the power consumption and range of the device, there are 3 Bluetooth Classes as: •Class 1: Max Power – 100mW ; Range – 100 m •Class 2: Max Power – 2.5mW ; Range – 10 m •Class 3: Max Power – 1mW ; Range – 1 m
  • 8. Why the name Bluetooth? The name was adopted as a tribute to the tenth-century vikingking Harald Blatand who peacefully united Denmark and Norway. Harald liked to eat blueberries, which gave his teeth the coloration that lead to the nickname "Bluetooth."
  • 9. How to reduce interference? •BWT devices hop randomly between frequencies up to 1600 times per second. •So,if another device using a 2.4 GHz frequency (e.g.:cordless phone) , then the interference with the BWT network lasts only for about 1/1600 of a second. •By then, the devices hop to another frequency.
  • 10. Applications  Laptops  PDA’s  Headphones  Wireless printer adapter  Onboard Bluetooth adapter.
  • 11. Bluetooth Basics  Bluetooth is low powered and low cost.  All the devices follow a uniform structure  Devices Connect through network called Pico nets.  Strength lies in handling data and video transmission simultaneously.
  • 12. Bluetooth Basics  Specification- Bluetooth specification gives developers data link and application layer definitions  Spectrum-Bluetooth operates between 2.4 and 2.485 GHz using a frequency hopping spread spectrum.  Interference- is reduced using Adaptive Frequency Hopping allowing a better efficiency and greater performance.
  • 13. Bluetooth Topology 2 main topologies are as: i.PICONET TOPOLOGY, & ii.SCATTERNET TOPOLOGY
  • 14. i.Piconet Topology •A piconet consists of upto 8 BWT- enabled devices. •When piconet is established, one device sets up frequency-hopping pattern and other devices synchronize their signals to the same pattern. •Each piconet has a different frequency-hopping pattern.
  • 16. ii.Scatternet Topology •Scatternet consists of several piconets connected by devices participating in multiple piconet. • There is a ‘BRIDGE’ connecting 2 piconets which is also a slave in individual piconets. Advantages of Scatternet : •Higher throughput •Multi-hop connections between devices indifferent piconets
  • 17. Network Topologies? Bus Network 17 Tree Network Star Network Ring Network Ad Hoc Network There are SO many technical questions: such as…
  • 18. Future Of Bluetooth •BROADCAST CHANNELS:Adoption of Bluetooth into mobile phones and enable advertising models based on users pulling information from the information points. •TOPOLOGY MANAGEMENT:Automatic configuration of piconet topologies in scatternet situations.
  • 19. Bluetooth Software  Bluetooth software can be installed and used on Bluetooth capable devices.  There exists different software for different devices like PDA , personal computer.  Enables the device to use technology at its fullest.  Best example is Bluesoleil.
  • 20. Bluetooth software  Bluesoleil can be installed on personal computer or on  personal digital assistant also  On a PC, it provides a lot of Extra wireless features.  It also has a graphical user interface (GUI).  On a PDA, provides basic Bluetooth profiles such as headset and hands free profile, personal networking (PAN) profile
  • 21. How Bluetooth works?  They normally operate at 2.45GHZ in license free globally available ISM radio band.  Advantage-worldwide availability and compatibility.  Disadvantage- devices must share the band with other RF emitters including automobile security systems, noise sources such as Microwaves  Solution- Frequency Hopping Spread Spectrum.
  • 22. Frequency Hopping Spread Spectrum (FHSS)  Frequency hopping is jumping from one frequency to another within the ISM radio band.  Efficient use of entire bandwidth.  Low Interference  Provides basic level of security.
  • 23. Working of FHSS  There exists a master-slave relation between devices.  A device in master mode can communicate with upto seven slave devices.  Bluetooth devices work in a short range to conserve the battery power.
  • 24. Technical operations  High speed, low powered wireless technology.  Circuits are Contained on a 0.9 cm square.  This offers 1MB link with security.  Each device offers unique 48 bit address from IEEE 802.15 standard.  Authentification is via a 128 bit key.  Supports up to 721KBps along with 3 voice channels.
  • 25. Bluetooth Keyboard  Bluetooth keyboard is one of major applications of Bluetooth technology.  It was first developed by Microsoft in 2002.  Today most of companies offer this type of keyboard, some of which companies include Dell, Apple..  A Bluetooth keyboard and mouse combination will allow the user to work at distances of up to 30 feet.  There are mainly two types in this-wireless keyboard and virtual keyboard.
  • 26. Wireless and Virtual keyboard  Wireless keyboard, called Optical Desktop Elite offered by Microsoft work with 2.4 GHz Bluetooth technology.  Apple wireless keyboard is a sleek and compact design and makes a secure, reliable connection with Mac.  Foldable types are another type of Bluetooth keyboards.  It ranges in full size keyboard to mini keyboard.
  • 27. Virtual keyboard  Virtual keyboard is projected on a flat, non reflective surface and keystrokes are accompanied by key clicking sounds that are simulated.  The keyboard has 63 keys and it measures only 295*95 mm with a height of 3.5 inches.  Keyboard works by producing a red diode laser light when keyboard is projected on surface.
  • 29. Bluetooth Market Forecast 29Nov’03: 100M Bluetooth compliant devices worldwide
  • 30. Bluetooth Protocol Stack  Adopted Protocols • PPP(Point-To-Point Protocol) • TCP/UDP/IP • OBEX-Session Protocol for IrDA(Infrared Data Association) • Contents Fromat(e.g. vCard, vCalendar) • WAP-Wireless Application Protocol
  • 31. Bluetooth Security  Supports Unidirectional or Mutual Encryption based on a Secret Link key Shared Between Two Devices  Security Defined In 3 modes: • Mode1- No Security • Mode 2 - Service Level Security: Not Established Before Channel is Established at L2CAP • Mode 3 - Link Level Security: Device Initiates Security Before LMP Link is Setup
  • 32. Bluetooth Security  3 Levels of Service Access • Require Authorization and Authenication • Require Authentication Only • Default Security for Legacy Applications 32
  • 33. Bluetooth Based Sensor Networks •One such application is : WIRELESS SENSOR NETWORKS (WSN) •Important features of WSN:Collaboration of network nodes during execution and Data Centric nature. •Many smart sensor nodes scattered in the field collect data and send it to users via ‘gateway’ using multi-hop routes.
  • 34. Wireless Sensor Networks (WSN) WSN consists of number of small devices equipped with asensing unit, microprocessors, wireless communication interfaceand power source.
  • 35. Sensor Network Implementation •OBJECTIVE: To build a Hardware platform and generic Software Solutions to serve for research in WSN protocols. •Components of Sensor Network: Smart Sensor Nodes and Gateway
  • 36. Example: Pressure Sensor For implementation of Pressure Sensor as Bluetooth Node, following components are important: •Bluetooth Device •Sensors •Microcontroller
  • 37. Blutooth Hardware Architecture Bluetooth Hardware consists of 3 main functional modules: •2.4 GHz Bluetooth RF Transceiver Unit •Link Management Unit •Host Controller Interface
  • 38. Industrial CyberSecurity  The Case of Vitek Boden
  • 39.  On October 31, 2001 Vitek Boden was convicted of: • 26 counts of will fully using a restricted computer to cause damage • 1 count of causing serious environment harm  The facts of the case: • Vitek worked for the contractor involved in the installation of Maroochy Shire sewage treatment plant. • Vitek left the contractor in December 1999 and approached the shire for employment. He was refused. • Between Jan 2000 and Apr 2000 the sewage system experienced 47 unexplainable faults, causing millions of liters of sewage to be spilled.
  • 40. How did he do it?  On April 23, 2000 Vitek was arrested with stolen radio equipment, controller programming software on a laptop and a fully operational controller.  Vitek is now in jail… Disgruntled Contractor PLC PLC Sewage Plant Rogue Radio
  • 41. Algorithms For Operation Of Networks •Initialization of gateway and Bluetooth Inquiry Procedure. •Discovery of Bluetooth device and Checking of major and minor devices. •Setting of parameters and assigning type of devices and sensors. •Description by Service-Class Field. •Discarding of non-smart nodes.
  • 42. •Else, service database of the discovered smart node is searched for sensor services. •If no current sensor profile, then database is searched for serial port connection parameters. •Lastly, Bluetooth link is established and data exchange with smart node starts.
  • 43. Sensor Market: $11B in 2001 Installation (wiring) costs: >$100B 43 Freedonia Group report on Sensors, April 2002 • Fragmented market  platform opportunity • Installation cost limits penetration  reducing installation cost increases market size Slide courtesy of Rob Conant, Dust Highly Fragmented Sensor Market
  • 44. Firewall Architectures 44  The external router blocks attempts to use the underlying IP layer to break security (e.g. IP spoofing, source routing, packet fragments, etc) and forces all traffic to the proxy.  The proxy firewall handles potential security holes in the higher layer protocols.  The internal router blocks all traffic except to the proxy server. Internal Router Internet External Router 
  • 45. Statistics on Types of Attacks 0 20 40 60 80 100 120 Theft of Propriety Info Sabotage Telecom Evesdropping System Penetration Insider Abuse of Net Access Finacial Fraud Virus Unauthorized Insider Access Telecom Fraud Active Wiretap Laptop Theft Denial of Service 1997 1998 1999 2000 2001 2002 *Source: “2002 CSI/FBI Computer Crime and Security Survey” Computer Security Institute - www.gocsi.com/losses. % of Respondents
  • 46. There’s lot of “Wireless”  From cellphones to PDAs to WiFi to Satellite-based
  • 48. Merits  Wireless  Inexpensive  Automatic  Interoperability  Low interference and energy consumption.  Share voice and data  Instant PAN  Upgradeable  Long lasting technology.  Easy link establishment
  • 49. Demerits  Data rate and security  More susceptible to Interception and attack  Less range  Average Speed  Short Life