Search results

1 – 10 of over 1000
Article
Publication date: 1 June 2004

Olaf Diegel, Glen Bright and Johan Potgieter

The integration of humans and machines can be achieved using Bluetooth ubiquitous networks. Ideally, the interface between users and machines should be completely seamless and…

2068

Abstract

The integration of humans and machines can be achieved using Bluetooth ubiquitous networks. Ideally, the interface between users and machines should be completely seamless and transparent. A user should not need to take any physical action to have a machine react to commands. A novel application area for Bluetooth communication technology is being developed in the Massey University Smart House project, in New Zealand. The creation of a Bluetooth ubiquitous network allows the house users to be tracked and monitored throughout the house. Their specific preferences or needs can automatically be taken care of by a control computer. This paper outlines and describes this seamless application.

Details

Assembly Automation, vol. 24 no. 2
Type: Research Article
ISSN: 0144-5154

Keywords

Article
Publication date: 10 June 2014

Stevan Stankovski, Gordana Ostojic, Nikola Djukic, Srdjan Tegeltija and Aleksandar Milojkovic

– The purpose of this paper is to describe an approach of using mobile phones with Bluetooth technology to enter/exit restricted area.

Abstract

Purpose

The purpose of this paper is to describe an approach of using mobile phones with Bluetooth technology to enter/exit restricted area.

Design/methodology/approach

Applied Bluetooth technology implemented in mobile phones enables the user to perform the identification and the state of presence while entering/exiting the parking space without stopping the vehicle. For the successful implementation of this method for presence detection and proper identification, it is necessary to determine the values of the Bluetooth signal.

Findings

This paper discuses a case study that has been done at entry/exit of parking lots. The obtained experimental results show that mobile phones with the Bluetooth technology can be successfully applied as presence detection sensors, as well as in processes for the identification of the user/object in the move.

Practical implications

The paper gives a primer how mobile phones with Bluetooth technology, in addition to their basic purpose, can be used as identification devices to enter/exit restricted area.

Originality/value

The users have possibilities to access restricted area using a common device – a mobile phone with Bluetooth technology. Successful implementation of developed access control system is based on determining the proper value of the Bluetooth signal strength field that extends around the control cabinet in which the Bluetooth devices are situated.

Details

Sensor Review, vol. 34 no. 3
Type: Research Article
ISSN: 0260-2288

Keywords

Article
Publication date: 23 November 2012

Margaret Tan and Kathrine Sagala Aguilar

Various research investigations have found that students' awareness of information security issues continues to be poor and this is indeed a concern especially when students use…

2035

Abstract

Purpose

Various research investigations have found that students' awareness of information security issues continues to be poor and this is indeed a concern especially when students use information technologies pervasively to communicate, to socialize as well as to work on academic assignments. As it is important to understand students' behaviors towards information security and safety in the digital cyberspace, the purpose of this paper is to investigate their awareness and perception, in particular, of Bluetooth security threats and risks, and whether they are able to take preventive measures to protect themselves from such security vulnerabilities. Bluetooth technology is used in this study as it is a widely used form of wireless networks that facilitates computing resources to be connected anytime anywhere; however, it has security weaknesses like any other digital networks.

Design/methodology/approach

A field survey was conducted to collect the empirical data from students at a local university. The survey instrument/questionnaire was developed based on various literatures on Bluetooth applications, Bluetooth security vulnerabilities, and users' usage and perception on computer security and safety.

Findings

The results show that most students do not take precautions to mitigate against security vulnerabilities; however, there is a difference on students' perceptions based on their academic major or domain knowledge, for instance, engineering students have demonstrated significant awareness of security risks compared to students from the business and social science colleges. It is therefore not surprising to note that engineering students are more cautious users of Bluetooth, hence are more secure users of technologies.

Practical implications

The findings provide useful information for academic institutions to understand students' behavior towards security risks especially in terms of identity theft, unsecured systems and inadequate security practices. Indeed, the findings of this study highlight or emphasize the importance of promoting security awareness to student cohorts especially on the use of mobile computing applications such as Bluetooth or wireless. Perhaps, universities should design curriculum to incorporate the study of information and cyber security so as to inculcate a culture of cyber safety as well as to prepare these prospective employees as more secured users when they enter the workplace. Indeed, considering the increasing number of users who tend to be naïve on security vulnerabilities, this research adds a critical message also to manufacturers and software developers to design more robust security features so as to minimize security breaches.

Originality/value

This paper provides further evidence to the body of research investigations on information and computing security threats and students' perceptions and behavior towards security risks and vulnerabilities. More important, this paper confirms that most students are not secure users, and it seems they not very capable of protecting themselves from security threats.

Details

Information Management & Computer Security, vol. 20 no. 5
Type: Research Article
ISSN: 0968-5227

Keywords

Article
Publication date: 1 May 2005

Leping Huang, Hongyuan Chen, T.V.L.N. Sivakumar, Tsuyoshi Kashima and Kaoru Sezaki

To utilize Bluetooth as a layer 2 multi‐hop subnet for global IP network, there are two missing protocols in current Bluetooth stack: network formation and routing. In this paper…

Abstract

To utilize Bluetooth as a layer 2 multi‐hop subnet for global IP network, there are two missing protocols in current Bluetooth stack: network formation and routing. In this paper, we propose our network formation and routing protocols optimized for such Bluetooth subnset usage scenarios to fill this gap. In this paper, we first present some observations on performance degradations of Bluetooth PAN due to network topologies and topology change when radio independant protocols are implemented. And then we analyze the reason of performance degradation. Based on our analysis, we first propose a flexible scatternet formation algorithm under conference scenario for multi‐hop communication. By using proposed method, scatternet can be formed flexibly with star, mesh, or linked line based on several parameters like number of maximum piconets that a gateway Bluetooth device can participate, and whether loops are needed in the resulting scatternet to achieve better network performance. To utilize topology information in multi‐hop communication, we propose a Cross‐layer Optimized Routing for Bluetooth (CORB) CORB is a QoS‐extended AODV routing protocol with mainly two optimizations between networking layer and underlying Bluetooth MAC layer. The first optimization is to use a new load metric. (LM) in QoS routing protocol instead of number of hops in conventional best effort routing. LM is derived from estimation of nodes’ link bandwidth, which reflects the different roles of nodes in Bluetooth scatternet. This proposal helps routing protocol to bypass heavily loaded nodes, and find route with larger bandwidth. The second optimization is to adjust LM and some MAC layer parameters in response to the unstable network topology caused by movement and change of indoor radio condition. Finally, We present some simulation and experiment results based on implementation, which prove the effectiveness of our protocols.

Details

International Journal of Pervasive Computing and Communications, vol. 1 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 May 2006

Abdul Malik S. Al‐Salman

Wireless technologies have enhanced applications mobility in no small way. They have created new and increasing number of human‐related challenges particularly in the areas of…

Abstract

Wireless technologies have enhanced applications mobility in no small way. They have created new and increasing number of human‐related challenges particularly in the areas of wireless‐based applications such as Mobile Marketing (Marketing). Bluetooth wireless technology is a completely new method through which devices within a short radius can communicate effectively. This paper explores wireless technologies world for marketing purposes, focusing on Bluetooth as an example to build a system that provides an interactive Bluetooth station for marketing purposes. The Bluetooth station includes Bluetooth profile (OBEX), server, and client applications.

Details

International Journal of Web Information Systems, vol. 2 no. 2
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 31 December 2006

Hye Hwan Ahn, Hee Yang Youn, Eung Je Lee and Chang Won Park

Bluetooth wireless technology is a low power, low cost and short‐range RF technology that permits communication between bluetooth enabled devices, and focuses on replacement of…

Abstract

Bluetooth wireless technology is a low power, low cost and short‐range RF technology that permits communication between bluetooth enabled devices, and focuses on replacement of cables between electronic devices. Communication between Bluetooth devices follows a strict master‐slave scheme. Each master device can have up to 7 active slaves and forms a so called piconet. In Bluetooth employing conventional scheduling policies such as Round Robin (RR), POLL or NULL packet is sent when the Master or Slave node does not have any data to send which causes a significant waste of resources. The DRR (Deficit Round Robin) scheduling algorithm can avoid the waste of time and slot of the RR scheduling at the sacrifice of fairness. In this paper we propose an improved DRR (IDRR) scheduling algorithm which effectively combines the DRR and bin packing algorithm. Computer simulation reveals that slot utilization is increased up to about 60% while the total number of used slots is decreased up to about 100%. The proposed IDRR scheduling is thus effective for not only basic data transmission but also real‐time multimedia data transmission.

Details

International Journal of Pervasive Computing and Communications, vol. 2 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 October 2005

T.M. Kwan

To present a combination of Bluetooth handoff techniques and scatternet formation to adapt to varying topologies and traffic changes.

1311

Abstract

Purpose

To present a combination of Bluetooth handoff techniques and scatternet formation to adapt to varying topologies and traffic changes.

Design/methodology/approach

Through ad hoc networking with Bluetooth, devices could participate in multiple piconets, which form the scatternet. Although the details of scatternet implementation are not specified in the Bluetooth specification, much research has been carried out to propose different models of implementation. This paper presents a combination of the techniques of handoff and scatternet formation to adapt to varying topologies and traffic changes. Analysis of network performance is presented to confirm the feasibility of real implementation.

Findings

Provides a novel and practical design, compatible with Bluetooth specification, which is shown by experimental results to be an efficient design in providing a scatternet formation approach, while at the same time maintaining a low data error rate to support data and voice.

Originality/value

This paper presents Bluetooth handoff and scatternet formation techniques to extend geographical coverage and increase system capacity with adaptation to varying topologies and traffic changes. The techniques presented are compatible with Bluetooth specifications 1.0, 1.1 and 1.2.

Details

The Electronic Library, vol. 23 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 31 December 2006

K. Persson and D. Manivannan

A Bluetooth scatternet is a network topology that is formed by inter‐connecting piconets. A piconet is a starshaped ad‐hoc networking unit that can accommodate eight Bluetooth

Abstract

A Bluetooth scatternet is a network topology that is formed by inter‐connecting piconets. A piconet is a starshaped ad‐hoc networking unit that can accommodate eight Bluetooth devices, a master and up to seven slaves. By designating certain piconet nodes as bridges, or gateways, we can interconnect piconets by forcing the bridge nodes to interleave their participation in multiple piconets. Bridge nodes form an auxiliary relay connection between adjacent piconet masters and are fundamental for establishing scatternets. In this paper we present a new fault‐tolerant approach to scatternet formation that is selfhealing and operates in a multi‐hop environment. Our Bluetooth Distributed Scatternet Formation Protocol (BTDSP) establishes a flat scatternet topology, allows incremental node arrival, and automatically heals scatternet partitions by re‐incorporating disconnected nodes. By maintaining neighbor associations in soft state, existing links can also be re‐established quickly upon disconnection due to intermittent wireless connectivity. By only using slave/slave bridges, the algorithm is resilient to both node failure and wireless interference. It also prevents time‐slot waste due to master/slave bridges being away from their piconets.

Details

International Journal of Pervasive Computing and Communications, vol. 2 no. 2
Type: Research Article
ISSN: 1742-7371

Keywords

Content available
Article
Publication date: 1 February 2001

Sagar Gohel

50

Abstract

Details

European Business Review, vol. 13 no. 1
Type: Research Article
ISSN: 0955-534X

Keywords

Article
Publication date: 10 July 2020

Anto Arockia Rosaline R., Lalitha R., Hariharan G. and Lokesh N.

Because of the outbreak of Covid 19, the entire world is thinking of new strategies, preventive measures to safeguard the human life from the widespread of the pandemic. The areas…

587

Abstract

Purpose

Because of the outbreak of Covid 19, the entire world is thinking of new strategies, preventive measures to safeguard the human life from the widespread of the pandemic. The areas where people are affected are marked as containment zones and people are not allowed to exit out of those areas. Similarly, new people are not allowed to enter inside those areas. Hence, the purpose of this paper is to propose a methodology to track the Covid zones, to enhance and tighten the security measures. A geo-fence is created for the containment zone. The person who enters or exits out of that particular zone will be monitored and alert message will be sent to that person’s mobile.

Design/methodology/approach

After tracking the location of a suspicious individual, the geo-fenced layer is mapped in the area and then the virtual perimeter is used for further trapping process. This geo-fenced layer can be viewed by the citizens as soon as it is updated by the Covid monitoring team. The geo-fencing is a concept of building a virtual perimeter area. This virtual perimeter monitoring system helps in monitoring the containment zones effectively. It reduces operational costs by using an automated system based on wireless infrastructure. It also alerts the authorities immediately to catch the violators. Thus, it helps to speed up the process of inspecting the containment zones and monitoring the individuals who violate the rules given by government.

Findings

The proposed methodologies will be an effective way to track the Covid’s communal spread. But the workflow of the system demands the required data sets and permission in legal manner to set up the environment that maintains the constitutional law and order in practice. The application developed was a prototype to display how it works if the required data sets are provided by the government. There are several tracking models that are released across the world such as Aarogya setu (India), Trace together (Singapore) and Hagmen (Israel). All these models are based on Bluetooth proximity identification; though Bluetooth proximity identification is helpful for high range in a short distance, the privacy concern is debatable one. Using modern technology, it is so easy to crack the individual gadgets and with Bluetooth enabling it makes things even worse. Thus, it is important to maintain the tracking a safer and secure one, and another issue with those Bluetooth-based applications is that tracking can be done only if the user enabled the Bluetooth option, if not the entire functioning would become a mess. The proposed methodology of tracking without Bluetooth will ensure data security also.

Originality/value

This was developed as a project by our third-year students of the Department of Information Technology of our college.

Details

International Journal of Pervasive Computing and Communications, vol. 16 no. 5
Type: Research Article
ISSN: 1742-7371

Keywords

1 – 10 of over 1000