scispace - formally typeset


About: Bluetooth is a(n) research topic. Over the lifetime, 31204 publication(s) have been published within this topic receiving 240720 citation(s). more


Proceedings ArticleDOI: 10.1145/1182807.1182821
Bret Hull1, Vladimir Bychkovsky1, Yang Zhang1, Kevin Chen1  +5 moreInstitutions (1)
31 Oct 2006-
Abstract: CarTel is a mobile sensor computing system designed to collect, process, deliver, and visualize data from sensors located on mobile units such as automobiles. A CarTel node is a mobile embedded computer coupled to a set of sensors. Each node gathers and processes sensor readings locally before delivering them to a central portal, where the data is stored in a database for further analysis and visualization. In the automotive context, a variety of on-board and external sensors collect data as users drive.CarTel provides a simple query-oriented programming interface, handles large amounts of heterogeneous data from sensors, and handles intermittent and variable network connectivity. CarTel nodes rely primarily on opportunistic wireless (e.g., Wi-Fi, Bluetooth) connectivity to the Internet, or to "data mules" such as other CarTel nodes, mobile phone flash memories, or USB keys-to communicate with the portal. CarTel applications run on the portal, using a delay-tolerant continuous query processor, ICEDB, to specify how the mobile nodes should summarize, filter, and dynamically prioritize data. The portal and the mobile nodes use a delay-tolerant network stack, CafNet, to communicat.CarTel has been deployed on six cars, running on a small scale in Boston and Seattle for over a year. It has been used to analyze commute times, analyze metropolitan Wi-Fi deployments, and for automotive diagnostics. more

Topics: Node (computer science) (56%), Wireless sensor network (56%), Mobile phone (55%) more

1,166 Citations

Open accessProceedings ArticleDOI: 10.1109/IECON.2007.4460126
01 Nov 2007-
Abstract: Bluetooth (over IEEE 802.15.1), ultra-wideband (UWB, over IEEE 802.15.3), ZigBee (over IEEE 802.15.4), and Wi-Fi (over IEEE 802.11) are four protocol standards for short- range wireless communications with low power consumption. From an application point of view, bluetooth is intended for a cordless mouse, keyboard, and hands-free headset, UWB is oriented to high-bandwidth multimedia links, ZigBee is designed for reliable wirelessly networked monitoring and control networks, while Wi-Fi is directed at computer-to-computer connections as an extension or substitution of cabled networks. In this paper, we provide a study of these popular wireless communication standards, evaluating their main features and behaviors in terms of various metrics, including the transmission time, data coding efficiency, complexity, and power consumption. It is believed that the comparison presented in this paper would benefit application engineers in selecting an appropriate protocol. more

  • Fig. 1. IBSS and ESS configurations of Wi-Fi networks.
    Fig. 1. IBSS and ESS configurations of Wi-Fi networks.
  • Fig. 6. Comparison of the normalized energy consumption for each protocol.
    Fig. 6. Comparison of the normalized energy consumption for each protocol.
  • Fig. 5. Comparison of the power consumption for each protocol.
    Fig. 5. Comparison of the power consumption for each protocol.
  • + 5

Topics: NeuRFon (69%), Inter-Access Point Protocol (65%), IEEE 802.11b-1999 (64%) more

1,017 Citations

Journal ArticleDOI: 10.1109/98.824570
Jacobus Cornelis Haartsen1Institutions (1)
Abstract: A few years ago it was recognized that the vision of a truly low-cost, low-power radio-based cable replacement was feasible. Such a ubiquitous link would provide the basis for portable devices to communicate together in an ad hoc fashion by creating personal area networks which have similar advantages to their office environment counterpart, the local area network. Bluetooth/sup TM/ is an effort by a consortium of companies to design a royalty-free technology specification enabling this vision. This article describes the radio system behind the Bluetooth concept. Designing an ad hoc radio system for worldwide usage poses several challenges. The article describes the critical system characteristics and motivates the design choices that have been made. more

Topics: Bluetooth (62%), Local area network (51%)

727 Citations

Open accessJournal ArticleDOI: 10.1109/COMST.2019.2911558
Abstract: Indoor localization has recently witnessed an increase in interest, due to the potential wide range of services it can provide by leveraging Internet of Things (IoT), and ubiquitous connectivity. Different techniques, wireless technologies and mechanisms have been proposed in the literature to provide indoor localization services in order to improve the services provided to the users. However, there is a lack of an up-to-date survey paper that incorporates some of the recently proposed accurate and reliable localization systems. In this paper, we aim to provide a detailed survey of different indoor localization techniques, such as angle of arrival (AoA), time of flight (ToF), return time of flight (RTOF), and received signal strength (RSS); based on technologies, such as WiFi, radio frequency identification device (RFID), ultra wideband (UWB), Bluetooth, and systems that have been proposed in the literature. This paper primarily discusses localization and positioning of human users and their devices. We highlight the strengths of the existing systems proposed in the literature. In contrast with the existing surveys, we also evaluate different systems from the perspective of energy efficiency, availability, cost, reception range, latency, scalability, and tracking accuracy. Rather than comparing the technologies or techniques, we compare the localization systems and summarize their working principle. We also discuss remaining challenges to accurate indoor localization. more

Topics: Location-based service (52%), Bluetooth (50%)

692 Citations

Open accessJournal ArticleDOI: 10.1109/JPROC.2016.2558521
Yulong Zou1, Jia Zhu1, Xianbin Wang2, Lajos Hanzo3Institutions (3)
10 May 2016-
Abstract: Due to the broadcast nature of radio propagation, the wireless air interface is open and accessible to both authorized and illegitimate users. This completely differs from a wired network, where communicating devices are physically connected through cables and a node without direct association is unable to access the network for illicit activities. The open communications environment makes wireless transmissions more vulnerable than wired communications to malicious attacks, including both the passive eavesdropping for data interception and the active jamming for disrupting legitimate transmissions. Therefore, this paper is motivated to examine the security vulnerabilities and threats imposed by the inherent open nature of wireless communications and to devise efficient defense mechanisms for improving the wireless network security. We first summarize the security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues. Next, a comprehensive overview of security attacks encountered in wireless networks is presented in view of the network protocol architecture, where the potential security threats are discussed at each protocol layer. We also provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems. Then, we discuss the state of the art in physical-layer security, which is an emerging technique of securing the open communications environment against eavesdropping attacks at the physical layer. Several physical-layer security techniques are reviewed and compared, including information-theoretic security, artificial-noise-aided security, security-oriented beamforming, diversity-assisted security, and physical-layer key generation approaches. Since a jammer emitting radio signals can readily interfere with the legitimate wireless users, we also introduce the family of various jamming attacks and their countermeasures, including the constant jammer, intermittent jammer, reactive jammer, adaptive jammer, and intelligent jammer. Additionally, we discuss the integration of physical-layer security into existing authentication and cryptography mechanisms for further securing wireless networks. Finally, some technical challenges which remain unresolved at the time of writing are summarized and the future trends in wireless security are discussed. more

  • Fig. 8. Flow chart of Bluetooth authorization.
    Fig. 8. Flow chart of Bluetooth authorization.
  • Table 2 Main Protocols and Specifications of the Wireless OSI Layers
    Table 2 Main Protocols and Specifications of the Wireless OSI Layers
  • Fig. 3. Relationship between the wired and wireless attacks.
    Fig. 3. Relationship between the wired and wireless attacks.
  • Table 3 Main Types of Wireless Attacks at the PHY Layer
    Table 3 Main Types of Wireless Attacks at the PHY Layer
  • Fig. 14. EAP-based authentication process.
    Fig. 14. EAP-based authentication process.
  • + 26

Topics: Wireless security (67%), Wireless network (62%), Cryptographic protocol (53%) more

684 Citations

No. of papers in the topic in previous years

Top Attributes

Show by:

Topic's top 5 most impactful authors

Lu Zhou

70 papers, 244 citations

Xiong Kaifu

53 papers, 148 citations

Huang Xin

20 papers, 24 citations

Chen Liuzhang

19 papers, 59 citations

Guo Guangli

17 papers, 21 citations

Network Information
Related Topics (5)

133.4K papers, 1.9M citations

92% related
Wireless sensor network

142K papers, 2.4M citations

92% related
Key distribution in wireless sensor networks

59.2K papers, 1.2M citations

90% related
Mobile wireless sensor network

26.5K papers, 621.7K citations

90% related
Wireless network

122.5K papers, 2.1M citations

90% related