Search results
1 – 10 of over 1000Olaf Diegel, Glen Bright and Johan Potgieter
The integration of humans and machines can be achieved using Bluetooth ubiquitous networks. Ideally, the interface between users and machines should be completely seamless and…
Abstract
The integration of humans and machines can be achieved using Bluetooth ubiquitous networks. Ideally, the interface between users and machines should be completely seamless and transparent. A user should not need to take any physical action to have a machine react to commands. A novel application area for Bluetooth communication technology is being developed in the Massey University Smart House project, in New Zealand. The creation of a Bluetooth ubiquitous network allows the house users to be tracked and monitored throughout the house. Their specific preferences or needs can automatically be taken care of by a control computer. This paper outlines and describes this seamless application.
Details
Keywords
Stevan Stankovski, Gordana Ostojic, Nikola Djukic, Srdjan Tegeltija and Aleksandar Milojkovic
– The purpose of this paper is to describe an approach of using mobile phones with Bluetooth technology to enter/exit restricted area.
Abstract
Purpose
The purpose of this paper is to describe an approach of using mobile phones with Bluetooth technology to enter/exit restricted area.
Design/methodology/approach
Applied Bluetooth technology implemented in mobile phones enables the user to perform the identification and the state of presence while entering/exiting the parking space without stopping the vehicle. For the successful implementation of this method for presence detection and proper identification, it is necessary to determine the values of the Bluetooth signal.
Findings
This paper discuses a case study that has been done at entry/exit of parking lots. The obtained experimental results show that mobile phones with the Bluetooth technology can be successfully applied as presence detection sensors, as well as in processes for the identification of the user/object in the move.
Practical implications
The paper gives a primer how mobile phones with Bluetooth technology, in addition to their basic purpose, can be used as identification devices to enter/exit restricted area.
Originality/value
The users have possibilities to access restricted area using a common device – a mobile phone with Bluetooth technology. Successful implementation of developed access control system is based on determining the proper value of the Bluetooth signal strength field that extends around the control cabinet in which the Bluetooth devices are situated.
Details
Keywords
Margaret Tan and Kathrine Sagala Aguilar
Various research investigations have found that students' awareness of information security issues continues to be poor and this is indeed a concern especially when students use…
Abstract
Purpose
Various research investigations have found that students' awareness of information security issues continues to be poor and this is indeed a concern especially when students use information technologies pervasively to communicate, to socialize as well as to work on academic assignments. As it is important to understand students' behaviors towards information security and safety in the digital cyberspace, the purpose of this paper is to investigate their awareness and perception, in particular, of Bluetooth security threats and risks, and whether they are able to take preventive measures to protect themselves from such security vulnerabilities. Bluetooth technology is used in this study as it is a widely used form of wireless networks that facilitates computing resources to be connected anytime anywhere; however, it has security weaknesses like any other digital networks.
Design/methodology/approach
A field survey was conducted to collect the empirical data from students at a local university. The survey instrument/questionnaire was developed based on various literatures on Bluetooth applications, Bluetooth security vulnerabilities, and users' usage and perception on computer security and safety.
Findings
The results show that most students do not take precautions to mitigate against security vulnerabilities; however, there is a difference on students' perceptions based on their academic major or domain knowledge, for instance, engineering students have demonstrated significant awareness of security risks compared to students from the business and social science colleges. It is therefore not surprising to note that engineering students are more cautious users of Bluetooth, hence are more secure users of technologies.
Practical implications
The findings provide useful information for academic institutions to understand students' behavior towards security risks especially in terms of identity theft, unsecured systems and inadequate security practices. Indeed, the findings of this study highlight or emphasize the importance of promoting security awareness to student cohorts especially on the use of mobile computing applications such as Bluetooth or wireless. Perhaps, universities should design curriculum to incorporate the study of information and cyber security so as to inculcate a culture of cyber safety as well as to prepare these prospective employees as more secured users when they enter the workplace. Indeed, considering the increasing number of users who tend to be naïve on security vulnerabilities, this research adds a critical message also to manufacturers and software developers to design more robust security features so as to minimize security breaches.
Originality/value
This paper provides further evidence to the body of research investigations on information and computing security threats and students' perceptions and behavior towards security risks and vulnerabilities. More important, this paper confirms that most students are not secure users, and it seems they not very capable of protecting themselves from security threats.
Details
Keywords
Leping Huang, Hongyuan Chen, T.V.L.N. Sivakumar, Tsuyoshi Kashima and Kaoru Sezaki
To utilize Bluetooth as a layer 2 multi‐hop subnet for global IP network, there are two missing protocols in current Bluetooth stack: network formation and routing. In this paper…
Abstract
To utilize Bluetooth as a layer 2 multi‐hop subnet for global IP network, there are two missing protocols in current Bluetooth stack: network formation and routing. In this paper, we propose our network formation and routing protocols optimized for such Bluetooth subnset usage scenarios to fill this gap. In this paper, we first present some observations on performance degradations of Bluetooth PAN due to network topologies and topology change when radio independant protocols are implemented. And then we analyze the reason of performance degradation. Based on our analysis, we first propose a flexible scatternet formation algorithm under conference scenario for multi‐hop communication. By using proposed method, scatternet can be formed flexibly with star, mesh, or linked line based on several parameters like number of maximum piconets that a gateway Bluetooth device can participate, and whether loops are needed in the resulting scatternet to achieve better network performance. To utilize topology information in multi‐hop communication, we propose a Cross‐layer Optimized Routing for Bluetooth (CORB) CORB is a QoS‐extended AODV routing protocol with mainly two optimizations between networking layer and underlying Bluetooth MAC layer. The first optimization is to use a new load metric. (LM) in QoS routing protocol instead of number of hops in conventional best effort routing. LM is derived from estimation of nodes’ link bandwidth, which reflects the different roles of nodes in Bluetooth scatternet. This proposal helps routing protocol to bypass heavily loaded nodes, and find route with larger bandwidth. The second optimization is to adjust LM and some MAC layer parameters in response to the unstable network topology caused by movement and change of indoor radio condition. Finally, We present some simulation and experiment results based on implementation, which prove the effectiveness of our protocols.
Details
Keywords
Wireless technologies have enhanced applications mobility in no small way. They have created new and increasing number of human‐related challenges particularly in the areas of…
Abstract
Wireless technologies have enhanced applications mobility in no small way. They have created new and increasing number of human‐related challenges particularly in the areas of wireless‐based applications such as Mobile Marketing (Marketing). Bluetooth wireless technology is a completely new method through which devices within a short radius can communicate effectively. This paper explores wireless technologies world for marketing purposes, focusing on Bluetooth as an example to build a system that provides an interactive Bluetooth station for marketing purposes. The Bluetooth station includes Bluetooth profile (OBEX), server, and client applications.
Details
Keywords
Hye Hwan Ahn, Hee Yang Youn, Eung Je Lee and Chang Won Park
Bluetooth wireless technology is a low power, low cost and short‐range RF technology that permits communication between bluetooth enabled devices, and focuses on replacement of…
Abstract
Bluetooth wireless technology is a low power, low cost and short‐range RF technology that permits communication between bluetooth enabled devices, and focuses on replacement of cables between electronic devices. Communication between Bluetooth devices follows a strict master‐slave scheme. Each master device can have up to 7 active slaves and forms a so called piconet. In Bluetooth employing conventional scheduling policies such as Round Robin (RR), POLL or NULL packet is sent when the Master or Slave node does not have any data to send which causes a significant waste of resources. The DRR (Deficit Round Robin) scheduling algorithm can avoid the waste of time and slot of the RR scheduling at the sacrifice of fairness. In this paper we propose an improved DRR (IDRR) scheduling algorithm which effectively combines the DRR and bin packing algorithm. Computer simulation reveals that slot utilization is increased up to about 60% while the total number of used slots is decreased up to about 100%. The proposed IDRR scheduling is thus effective for not only basic data transmission but also real‐time multimedia data transmission.
Details
Keywords
To present a combination of Bluetooth handoff techniques and scatternet formation to adapt to varying topologies and traffic changes.
Abstract
Purpose
To present a combination of Bluetooth handoff techniques and scatternet formation to adapt to varying topologies and traffic changes.
Design/methodology/approach
Through ad hoc networking with Bluetooth, devices could participate in multiple piconets, which form the scatternet. Although the details of scatternet implementation are not specified in the Bluetooth specification, much research has been carried out to propose different models of implementation. This paper presents a combination of the techniques of handoff and scatternet formation to adapt to varying topologies and traffic changes. Analysis of network performance is presented to confirm the feasibility of real implementation.
Findings
Provides a novel and practical design, compatible with Bluetooth specification, which is shown by experimental results to be an efficient design in providing a scatternet formation approach, while at the same time maintaining a low data error rate to support data and voice.
Originality/value
This paper presents Bluetooth handoff and scatternet formation techniques to extend geographical coverage and increase system capacity with adaptation to varying topologies and traffic changes. The techniques presented are compatible with Bluetooth specifications 1.0, 1.1 and 1.2.
Details
Keywords
A Bluetooth scatternet is a network topology that is formed by inter‐connecting piconets. A piconet is a starshaped ad‐hoc networking unit that can accommodate eight Bluetooth…
Abstract
A Bluetooth scatternet is a network topology that is formed by inter‐connecting piconets. A piconet is a starshaped ad‐hoc networking unit that can accommodate eight Bluetooth devices, a master and up to seven slaves. By designating certain piconet nodes as bridges, or gateways, we can interconnect piconets by forcing the bridge nodes to interleave their participation in multiple piconets. Bridge nodes form an auxiliary relay connection between adjacent piconet masters and are fundamental for establishing scatternets. In this paper we present a new fault‐tolerant approach to scatternet formation that is selfhealing and operates in a multi‐hop environment. Our Bluetooth Distributed Scatternet Formation Protocol (BTDSP) establishes a flat scatternet topology, allows incremental node arrival, and automatically heals scatternet partitions by re‐incorporating disconnected nodes. By maintaining neighbor associations in soft state, existing links can also be re‐established quickly upon disconnection due to intermittent wireless connectivity. By only using slave/slave bridges, the algorithm is resilient to both node failure and wireless interference. It also prevents time‐slot waste due to master/slave bridges being away from their piconets.
Details
Keywords
Anto Arockia Rosaline R., Lalitha R., Hariharan G. and Lokesh N.
Because of the outbreak of Covid 19, the entire world is thinking of new strategies, preventive measures to safeguard the human life from the widespread of the pandemic. The areas…
Abstract
Purpose
Because of the outbreak of Covid 19, the entire world is thinking of new strategies, preventive measures to safeguard the human life from the widespread of the pandemic. The areas where people are affected are marked as containment zones and people are not allowed to exit out of those areas. Similarly, new people are not allowed to enter inside those areas. Hence, the purpose of this paper is to propose a methodology to track the Covid zones, to enhance and tighten the security measures. A geo-fence is created for the containment zone. The person who enters or exits out of that particular zone will be monitored and alert message will be sent to that person’s mobile.
Design/methodology/approach
After tracking the location of a suspicious individual, the geo-fenced layer is mapped in the area and then the virtual perimeter is used for further trapping process. This geo-fenced layer can be viewed by the citizens as soon as it is updated by the Covid monitoring team. The geo-fencing is a concept of building a virtual perimeter area. This virtual perimeter monitoring system helps in monitoring the containment zones effectively. It reduces operational costs by using an automated system based on wireless infrastructure. It also alerts the authorities immediately to catch the violators. Thus, it helps to speed up the process of inspecting the containment zones and monitoring the individuals who violate the rules given by government.
Findings
The proposed methodologies will be an effective way to track the Covid’s communal spread. But the workflow of the system demands the required data sets and permission in legal manner to set up the environment that maintains the constitutional law and order in practice. The application developed was a prototype to display how it works if the required data sets are provided by the government. There are several tracking models that are released across the world such as Aarogya setu (India), Trace together (Singapore) and Hagmen (Israel). All these models are based on Bluetooth proximity identification; though Bluetooth proximity identification is helpful for high range in a short distance, the privacy concern is debatable one. Using modern technology, it is so easy to crack the individual gadgets and with Bluetooth enabling it makes things even worse. Thus, it is important to maintain the tracking a safer and secure one, and another issue with those Bluetooth-based applications is that tracking can be done only if the user enabled the Bluetooth option, if not the entire functioning would become a mess. The proposed methodology of tracking without Bluetooth will ensure data security also.
Originality/value
This was developed as a project by our third-year students of the Department of Information Technology of our college.
Details