Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
Bluetooth was a nickname for Harald Gormsson, who was a 10th-century Danish king who ruled Denmark and parts of Norway from approximately 958 to 986 CE. He's historically significant for a few key reasons, including that he unified Denmark under his rule and conquered parts of Norway. The modern Bluetooth wireless technology was named after him in the 1990’s. The creators chose his name as a reference to his role in unifying different regions, much like how Bluetooth technology was designed to unify communications protocols. The Bluetooth symbol is actually a combination of the Nordic runes for his initials (H and B).
Computer Standards & Interfaces, 2004
Bluetooth is still a relatively new technology to the wireless world. It is designed for wireless communication between a wide variety of different Bluetooth enabled devices; from computers and PDAs to GPS systems and heart monitoring devices. There are a growing number of companies continually adopting this technology. As Bluetooth becomes a standard feature in many products that we use everyday, it seems that the use of the technology will grow even faster in the future. This paper provides an analysis of the technology's features and how companies should go about deciding if they should adopt Bluetooth or another wireless alternative. First, the paper talks about what Bluetooth is and how it compares with other wireless standards. It then goes into an analysis of how feasible integrating Bluetooth into a business would be, and how some industries are already using the technology. These case studies are followed by a look at what steps need to be taken through the implementation cycle, and deciding what technology makes a better fit for a business. The paper ends with a look at the pros and cons of Bluetooth, as well as a look into what the future may hold for this technology.
2015
This Paper Defines Bluetooth as a way of broadcasting Channel and study shows that Bluetooth broadcasting would be appropriate for any file types not exceeding 500 KB in size. The effect of several parameters such as data file types and sizes, distance, barriers and interference from other wireless technologies on the system were tested. The software was written in Java in order to allow interoperability across multiple platforms. It was programmed to discover all Bluetooth-enabled devices within its range irrespective of the number of devices present and then broadcast multimedia content to these devices. It was further noted that performance degrades in conditions where there is interference due to Wi-Fi and Bluetooth as well as obstruction due to barriers and in broad sunlight.
Mobile Computing and Communications Review - MCCR
A few years ago it was recognized that the vision of a truly low-cost, low-power radio-based cable replacement was feasible. Such a ubiquitous link would provide the basis for portable devices to communicate together in an ad hoc fashion by creating personal area networks which have similar advantages to their office environment counterpart -the local area network (LAN). Bluetooth is an effort by a consortium of companies to design a royalty free technology specification enabling this vision. This article describes the vision and goals of the Bluetooth program and introduces the radiobased technology.
his Paper Defines Bluetooth as a way of broadcasting Channel and study shows that Bluetooth broadcasting would be appropriate for any file types not exceeding 500 KB in size. The effect of several parameters such as data file types and sizes, distance, ba rriers and interference from other wireless technologies on the system were tested. The software was written in Java in order to allow interoperability across multiple platforms. It was programmed to discover all Bluetooth - enabled devices within its range irrespective of the number of devices present and then broadcast multimedia content to these devices. It was further noted that performance degrades in conditions where there is interference due to Wi - Fi and Bluetooth as well as obstruction due to barriers and in broad sunlight
The Bluetooth wireless technology is designed as a short-range connectivity solution for personal, portable and handheld electronic devices. Since, May 1998 the Bluetooth SIG steers the development of the technology through the development of an open industry specification, including both protocols and application scenarios, and a qualification program designed to assure end-user value for Bluetooth products. This article highlights the Bluetooth wireless technology.
2014
A few years ago it was recognized that the vision of a truly low-cost, low-power radio-based cable replacement was feasible. Such a ubiquitous link would provide the basis for portable devices to communicate together in an ad hoc fashion by creating personal area networks which have similar advantages to their office environment counterpart - the local area network (LAN). Bluetooth is an effort by a consortium of companies to design a royalty free technology specification enabling this vision. This article describes the vision and goals of the Bluetooth program and introduces the radio based technology.
2004
In this paper, we give a short overview of the security architecture of Bluetooth. We will especially focus on the key exchange protocol in Bluetooth. This is the most important security critical part of the security architecture. Unfortunately, there are a lot of security flaws in the Bluetooth standard. Some are rather theoretical, but most of the problems can be exploited by an attacker. An extensive overview of the security flaws in Bluetooth will be given in this paper. Some of these security problems, e.g. the Bluesnarf attack, were only discovered very recently.
Proceedings of the World …, 2010
This research looks into assessing the potential of using Bluetooth as a broadcasting medium for transmission of data files among Bluetooth-enabled devices. The effect of several parameters such as data file types and sizes, distance, barriers and interference from other wireless technologies on the system were tested. The software was written in Java in order to allow interoperability across multiple platforms. It was programmed to discover all Bluetooth-enabled devices within its range irrespective of the number of devices present and then broadcast multimedia content to these devices. This study shows that Bluetooth broadcasting would be appropriate for any file types not exceeding 500 KB in size. It was further noted that performance degrades in conditions where there is interference due to Wi-Fi and Bluetooth as well as obstruction due to barriers and in broad sunlight.
2007
ABSTRACT Bluetooth is a wireless transmission technology carried by most students on their personal wireless devices. It can be used to support the transfer of objects such as files and applications and consequently to support learning and interaction. This allows Bluetooth to support a variety of designs of mobile learning but with the institutional attractions that it exploits devices already owned by students and uses technology that is free after initial set up.
Journal of Advertising Research, 2011
Bluetooth is a method for data communication that uses short-range radio links to replace cables between computers and their connected units. Industry-wide Bluetooth promises very substantial benefits for wireless network operators, end workers, and content developers of exciting new applications. This article delves into the implementation and architecture of Bluetooth. It also describes the functional overview and applications of Bluetooth, and deals with the development of a model for recording, printing, monitoring, and controlling of eight process variables at the same time, using a distributed control system. We explain industrial automation via Bluetooth using IISS. Industrial automation is one of the major applications of Bluetooth technology. Industrial automation, in terms of controlling or monitoring a factory, office, or industrial process, means to install machines that can do the work instead of human workers. Industrial plants consists of many devices interconnected in different ways ranging from simple data collection units (I/O) to more intelligent devices such as sensors, one-loop controllers, or programmable controllers, and a supervisory system used as a human-machine interface (HMI) for data logging and supervisory control. An IISS is a controlling device that monitors the devices in a company. It basically communicates via the interface card in the PC; the hardware is connected parallel across the device, and it is interfaced with the PC via a transceiver. The device can be accessed both manually via the switches and remotely via the PC. we will show how the remote monitoring takes place between the control room and the PC. These details in the article establish the growing need for Bluetooth technology.
Computers & Security, 2017
His research interests include mobility of IPv6 networks, security, scalability and survivability of mobile networks, Software defined networking and Internet of Things. He has several conference and journal papers published by IEEE, Elsevier and Springer.
2008
Abstract This paper notes the creative tension created by network industries in high technology production. The tension emerges due to firms needs to both focus on developing strong and defensible competencies and also the need to share knowledge as part of wider development networks. The paper looks at the development of the Bluetooth wireless standard within this context. We find that Bluetooth s promoters made the standard open to create support within a competitive technical environment.
A gold object has appeared in Sweden which may provide new information about the Danish Viking king Harald Bluetooth, dead around 986. The gold object is a plaque with text and a cross symbol. Is this a contemporary memorial plaque for the dead king? In that case it is a unique and sensational object. Harald Bluetooth conquered Denmark and introduced Christianity as the state religion in the country. He was mortally wounded in a battle against his son Sweyn Forkbeard and fled to Wolin in northern Poland where he died. The gold object was encountered during excavation work in the medieval church ruins just outside Wolin in the village Wiejkowo.
2015
Bluetooth is a new RF short-range wireless technology which is designed for wireless communication between different devices. There is increase in popularity of Bluetooth technology and is being accepted in today’s world. There are organizations which are doing research on Bluetooth technology, but very few of their research analysis provide a balanced view of the technology, describing its implications for businesses, pros and cons. In this paper analysis have been done keeping in mind various perspectives of the Bluetooth technology. The analysis starts with a description of the technology in terms of its network infrastructure, hardware and software. Then it is continued by the Error corrections and retransmission. The analysis is done on macro analytical view including the business implications, advantages of this technology, its role in the global third generation (3G) wireless schemes. The finally it concludes with the applications and future potentials of Bluetooth.
2020
Digital devices are presented several vulnerabilities because when making a connection your information can be compromised. Bluetooth is a means of wireless communication that allows you to transfer files with distances of up to 100 meters, but its security has been seen as malicious users, attacking special cell phones. The Bluetooth manufacturers have improved their security but it has not been enough to control the vulnerabilities. The security of the Bluetooth connection has been directed by the manufacturers, but the user has not been able to carry out a control of this security.Los dispositivos digitales presentan vulnerabilidades ya que al realizar una conexión su información puede verse comprometida. Bluetooth es un medio de comunicación inalámbrico muy reconocido ya que permite transferencia de archivos con distancias de hasta 100 metros, pero su seguridad se ha visto afectada por usuarios maliciosos, atentando en especial dispositivos celulares. Los fabricantes de bluetoot...
Bluetooth technology has part of this modern society. The availability of different mobile phones, game controllers, Personal Digital Assistant (PDA) and other personal computers has made Bluetooth a popular technology for small distance wireless communication. However, as the Bluetooth technology becomes widespread, security protocols are increasing which can be dangerous to the privacy of a user's personal information. The security issues of Bluetooth have been worked on for the last few years. This paper presents security protocols of this technology along with some past security threats reported in the literatures which have been surveyed and summarized in this paper. It also presents some tips that end-users can implement immediately to become more cautious about their private information and future security enhancements that can be implemented in the Bluetooth standard.
Visión electrónica, 2020
Digital devices are presented several vulnerabilities because when making a connection your information can be compromised. Bluetooth is a means of wireless communication that allows you to transfer files with distances of up to 100 meters, but its security has been seen as malicious users, attacking special cell phones. The Bluetooth manufacturers have improved their security but it has not been enough to control the vulnerabilities. The security of the Bluetooth connection has been directed by the manufacturers, but the user has not been able to carry out a control of this security.
2016
Instructor(s) Anssi Ikonen, Head of Degree Programme This project consisted of two tasks. The first one was to provide a theoretical documentation of the Bluetooth Low Energy (BLE) device whose first generational versions emerged in 2010. The theoretical documentation basically covers the protocol stack of the device, which consists of the Controller, Host and Application layer, all of which govern how communication should ensue. The controller layer is the point of BLE to BLE interface, while the host layers have to do with the internal logics, security management, data storage and manipulation, client and server role of the device. The application layer is the user to BLE interface. The second task was to create an Android mobile application to establish a communication link with the BLE peripherals. The specimen BLE module used in this project was the serial Bluetooth 4.0 module from the vendor TinySine, which was supported on the Arduino platform. The generic attribute GATT of the BLE is responsible for data storage, and to access the GATT from application programs the service and characteristic UUID is required. This is a framework for educational purposes. The future trend is that the BLE peripheral used in this project would be replaced by BLE sensors in similar projects, establishing communication links with a central device and reporting their respective measurements to them.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.