PPT on Bluetooth Based Wireless Sensor Networks

Post on 19-May-2015

36.678 views 7 download

Transcript of PPT on Bluetooth Based Wireless Sensor Networks

BLUETOOTHBASED WIRELESS

SENSOR NETWORKS

Contents Introduction Blutooth Specification Blutooth Basics Blutooth Topology Blutooth Software Blutooth Keyboard Blutooth Protocol Stack Blutooth Security Blutooth Based Sensor N/W Sensor N/W Implementation Blutooth Hardware

Architecture Algorithms For Operation Of

Networks Merits Demerits

Introduction Bluetooth Wireless Technology (BWT) was developed in

1994 at Ericsson in Sweden. It is named for Harald Blaatand. Bluetooth-Wireless and Automatic technology simplifying

art of communication. Frequency used is 2.45 GHz, same used in ISM devices. Purpose – Originally it was build to eliminate the need for

cable connections between PDAs and notebook PCs. Later the goals were to enable different devices through a commonly accepted standard for wireless connectivity . Ericsson on advent of BWT conceptualized a Radio Technology through a wireless personal area network (WPAN).

Bluetooth Specification

Bluetooth-Wireless technology providing link between mobile and electronic devices.

It operates on 2.45 GHz radio signals using frequency hopping spread spectrum.

Technology of Bluetooth concentrates on short range of communication.

Bluetooth Specification

•Standard: IEEE 802.15•ISM Band Frequency: 2.4 GHz•Range: 10 – 100 meters•Channel Bandwidth: 1 Mbps•Maximum Asymmetric Data Transfer

Rate: 721 Kbps

Types of Bluetooth Wireless Technology

Depending on the power consumption and range of the device, there are 3 Bluetooth Classes as:

•Class 1: Max Power – 100mW ; Range – 100 m

•Class 2: Max Power – 2.5mW ; Range – 10 m•Class 3: Max Power – 1mW ; Range – 1 m

Why the name Bluetooth?

The name was adopted as a tribute to the tenth-century vikingking Harald Blatand who peacefully united Denmark and Norway.

Harald liked to eat blueberries,which gave his teeth the coloration

that lead to the nickname "Bluetooth."

How to reduce interference?

•BWT devices hop randomly between frequencies up to 1600 times per second.

•So,if another device using a 2.4 GHz frequency (e.g.:cordless phone) ,

then the interference with the BWT network lasts only for about 1/1600 of a second.

•By then, the devices hop to another frequency.

.

Applications

Laptops PDA’s Headphones Wireless printer

adapter Onboard Bluetooth

adapter.

Bluetooth Basics

Bluetooth is low powered and low cost. All the devices follow a uniform structure Devices Connect through network called

Pico nets. Strength lies in handling data and video

transmission simultaneously.

Bluetooth Basics

Specification- Bluetooth specification gives developers data link and application layer definitions

Spectrum-Bluetooth operates between 2.4 and 2.485 GHz using a frequency hopping spread spectrum.

Interference- is reduced using Adaptive Frequency Hopping allowing a better efficiency and greater performance.

Bluetooth Topology

2 main topologies are as:

i.PICONET TOPOLOGY, & ii.SCATTERNET TOPOLOGY

i.Piconet Topology

•A piconet consists of upto 8 BWT-enabled devices.

•When piconet is established, one device sets up frequency-hopping pattern and other devices synchronize their signals to the same pattern.

•Each piconet has a different frequency-hopping pattern.

Piconet Topology

ii.Scatternet Topology•Scatternet consists of several piconets

connected by devices participating in multiple piconet.

• There is a ‘BRIDGE’ connecting 2 piconets which is also a slave in individual piconets.

Advantages of Scatternet :•Higher throughput•Multi-hop connections between

devices indifferent piconets

Network Topologies?

Bus Network

17

Tree Network

Star Network

Ring Network

Ad Hoc Network

There are SO many technical questions: such as…

Future Of Bluetooth

•BROADCAST CHANNELS:Adoption of Bluetooth into mobile phones and enable advertising models based on users pulling information from the information points.

•TOPOLOGY MANAGEMENT:Automatic configuration of piconet topologies in scatternet situations.

Bluetooth Software

Bluetooth software can be installed and used on Bluetooth capable devices.

There exists different software for different devices like PDA , personal computer.

Enables the device to use technology at its fullest.

Best example is Bluesoleil.

Bluetooth software Bluesoleil can be installed on

personal computer or on

personal digital assistant also

On a PC, it provides a lot of Extra wireless features.

It also has a graphical user interface (GUI).

On a PDA, provides basic

Bluetooth profiles such as headset and hands free profile, personal networking (PAN) profile

How Bluetooth works? They normally operate at 2.45GHZ in license free globally available ISM radio band. Advantage-worldwide availability and compatibility. Disadvantage- devices must share the band with other RF emitters including automobile security systems, noise sources such as Microwaves Solution- Frequency Hopping Spread Spectrum.

Frequency Hopping Spread Spectrum (FHSS)

Frequency hopping is jumping from one frequency to another within the ISM radio band.

Efficient use of entire bandwidth.

Low Interference

Provides basic level of security.

Working of FHSS

There exists a master-slave relation between devices.

A device in master mode can communicate with upto seven slave devices.

Bluetooth devices work in a short range to

conserve the battery power.

Technical operations

High speed, low powered wireless technology. Circuits are Contained on a 0.9 cm square. This offers 1MB link with security. Each device offers unique 48 bit address from

IEEE 802.15 standard. Authentification is via a 128 bit key. Supports up to 721KBps along with 3 voice

channels.

Bluetooth Keyboard Bluetooth keyboard is one of major applications of

Bluetooth technology. It was first developed by Microsoft in 2002. Today most of companies offer this type of

keyboard, some of which companies include Dell, Apple..

A Bluetooth keyboard and mouse combination will allow the user to work at distances of up to 30 feet.

There are mainly two types in this-wireless keyboard and virtual keyboard.

Wireless and Virtual keyboard Wireless keyboard, called

Optical Desktop Elite offered by Microsoft work with 2.4 GHz Bluetooth technology.

Apple wireless keyboard is a sleek and compact design and makes a secure, reliable connection with Mac.

Foldable types are another type of Bluetooth keyboards.

It ranges in full size keyboard to mini keyboard.

Virtual keyboard Virtual keyboard is projected

on a flat, non reflective surface and keystrokes are accompanied by key clicking sounds that are simulated.

The keyboard has 63 keys and it measures only 295*95 mm with a height of 3.5 inches.

Keyboard works by producing a red diode laser light when keyboard is projected on surface.

Potential Bluetooth Markets

28

Bluetooth Market Forecast

29Nov’03: 100M Bluetooth compliant devices worldwide

Bluetooth Protocol Stack Adopted Protocols

• PPP(Point-To-Point Protocol)• TCP/UDP/IP• OBEX-Session Protocol for IrDA(Infrared Data

Association)• Contents Fromat(e.g. vCard, vCalendar)• WAP-Wireless Application Protocol

Bluetooth Security Supports Unidirectional or Mutual Encryption based

on a Secret Link key Shared Between Two Devices Security Defined In 3 modes:

• Mode1- No Security• Mode 2 - Service Level Security: Not Established

Before Channel is Established at L2CAP• Mode 3 - Link Level Security: Device Initiates

Security Before LMP Link is Setup

Bluetooth Security 3 Levels of Service Access

• Require Authorization and Authenication• Require Authentication Only• Default Security for Legacy Applications

32

Bluetooth Based Sensor Networks

•One such application is : WIRELESS SENSOR NETWORKS (WSN)

•Important features of WSN:Collaboration of network nodes during execution and Data Centric nature.

•Many smart sensor nodes scattered in the field collect data and send it to users via ‘gateway’ using multi-hop routes.

Wireless Sensor Networks (WSN)

WSN consists of number of small devices equipped with asensing unit, microprocessors, wireless communication interfaceand power source.

Sensor Network Implementation

•OBJECTIVE: To build a Hardware platform and generic Software Solutions to serve for research in WSN protocols.

•Components of Sensor Network: Smart Sensor Nodes and Gateway

Example: Pressure SensorFor implementation of Pressure Sensor

as Bluetooth Node, following components are important:

•Bluetooth Device•Sensors•Microcontroller

Blutooth Hardware Architecture

Bluetooth Hardware consists of 3 main functional modules:

•2.4 GHz Bluetooth RF Transceiver Unit•Link Management Unit•Host Controller Interface

Industrial CyberSecurity

The Case of Vitek Boden

On October 31, 2001 Vitek Boden was convicted of:• 26 counts of will fully using a restricted computer to

cause damage• 1 count of causing serious environment harm

The facts of the case:• Vitek worked for the contractor involved in the

installation of Maroochy Shire sewage treatment plant.

• Vitek left the contractor in December 1999 and approached the shire for employment. He was refused.

• Between Jan 2000 and Apr 2000 the sewage system experienced 47 unexplainable faults, causing millions of liters of sewage to be spilled.

How did he do it?

On April 23, 2000 Vitek was arrested with stolen radio equipment, controller programming software on a laptop and a fully operational controller.

Vitek is now in jail…

Disgruntled Contractor

PLC PLC

Sewage Plant

Rogue Radio

Algorithms For Operation Of Networks

•Initialization of gateway and Bluetooth Inquiry Procedure.

•Discovery of Bluetooth device and Checking of major and minor devices.

•Setting of parameters and assigning type of devices and sensors.

•Description by Service-Class Field.•Discarding of non-smart nodes.

•Else, service database of the discovered smart node is searched for sensor services.

•If no current sensor profile, then database is searched for serial port connection parameters.

•Lastly, Bluetooth link is established and data exchange with smart node starts.

Sensor Market: $11B in 2001Installation (wiring) costs:

>$100B

43

Freedonia Group report on Sensors, April 2002

• Fragmented market platform opportunity

• Installation cost limits penetration

reducing installation cost increases market size

Slide courtesy of Rob Conant, Dust

Highly FragmentedSensor Market

Firewall Architectures

44

The external router blocks attempts to use the underlying IP layer to break security (e.g. IP spoofing, source routing, packet fragments, etc) and forces all traffic to the proxy.

The proxy firewall handles potential security holes in the higher layer protocols.

The internal router blocks all traffic except to the proxy server.

Internal RouterInternet

External Router

Statistics on Types of Attacks

0 20 40 60 80 100 120

Theft of Propriety Info

Sabotage

Telecom Evesdropping

System Penetration

Insider Abuse of Net Access

Finacial Fraud

Virus

Unauthorized Insider Access

Telecom Fraud

Active Wiretap

Laptop Theft

Denial of Service

1997

1998

1999

2000

2001

2002

*Source: “2002 CSI/FBI Computer Crime and Security Survey” Computer Security Institute - www.gocsi.com/losses.

% of Respondents

There’s lot of “Wireless”

From cellphones to PDAs to WiFi to Satellite-based

Wireless LAN Standards

Merits Wireless Inexpensive Automatic Interoperability Low interference and energy consumption. Share voice and data Instant PAN Upgradeable Long lasting technology. Easy link establishment

Demerits Data rate and security More susceptible to Interception and

attack Less range Average Speed Short Life

Thank You