Beruflich Dokumente
Kultur Dokumente
ISBN: 978-967-11851-5-5
1.0.
Introduction
ISBN: 978-967-11851-5-5
that more; and how much people need wireless connectivity. In so doing information needs to
be passed from one person to another. The broader scope of the internet of things and
Bluetooth is very vast so the author is going to lessen the scope and pertain only to innovation
that can spring forth which is expressed in section (IV) and security concerns on the existing
technology. Therefore section (I) will describe a brief introduction to Bluetooth, Section (II) will
illustrate and describe existing technologies and uses of Bluetooth and how it encompass to the
Internet of Things, Section (III) will talk about the problems faced in the technology, Section (IV)
will illustrate the methodology employed, potential ideas and innovation between Bluetooth
and how it can bring greater connectivity with Internet of Things, Section (V) will conclude on
the research and references.
1.1
Objectives
Literature Review
The internet of things is an idea that started over a decade ago and has since seen a rise
in the development by various communities in the field. How can Bluetooth improve or
contribute to such technology can be seen in Bluetooth Smart a new technology that encompass
low use of Bluetooth technology and increase distance using mesh-technology (Bluetooth.com),
users can be able to control basis home automated devices using current device present without
any changes (Naveen Erasala, 2002). Due to the fact that Bluetooth currently is supported by
many mobile devices, it makes it easier to be able to provide connectivity among these cross
platform in addition such connectivity can be accessed from any device around the globe not
necessarily that you have to be extremely close to the connected device but once close, wireless
connectivity can still take place. Over the years, Bluetooth and many online developers has
come up with ingenious ideas that change how we look at everyday devices, application and
everyday appliances can become ubiquitous and with the application of Bluetooth along with
wireless network and Wireless sensors. How these things (Stankovic, 2012) can function
together goes a long way to describe why we need connectivity among devices that we use daily
in our everyday endeavours. Beacon Technology in conjunction with Bluetooth Smart are now
leading a frontier in the internet of Things bringing along Bluetooth technology into the mix,
making things identifiable easily.
Page 2
ISBN: 978-967-11851-5-5
Problem Statement
One of the greatest risk or rather ethical issues around Bluetooth technology is its
security and privacy concern. The questions baffling critics has been, how secure is this
Bluetooth technology? And over the years since it has suffice, there has been glitches of how
information has been swindled and how it has been hacked. Never-the-less No great technology
hasnt faced the tyranny demolished by security flaws or bugs that might be thwacked on any
system. In line of trying to get Bluetooth as a frontier in the Internet of Things also comes with
its own dilemma. Likewise the Internet of Things as promising as it could seems raises some
privacy concern and security issues that deal with weak password and cross site scripting as
examined by (Hewlett-Packard Development Company, 2014) report. The Internet of Things
describes a future whereby all things are connected by means of wireless/wired to the internet,
and when the author says Things it refers to items of the physical world which are attached or
within sensors of these items connected to a network (Steve Hodges, 2013). Kevin Ashton
layered the groundwork for the IoT at MITs AutoID lab by making this ground statements "If we
had computers that knew everything there was to know about thingsusing data they gathered
without any help from us -- we would be able to track and count everything, and greatly reduce
waste, loss and cost. We would know when things needed replacing, repairing or recalling, and
whether they were fresh or past their best. We need to empower computers with their own
means of gathering information, so they can see, hear and smell the world for themselves, in all
Page 3
ISBN: 978-967-11851-5-5
its random glory. RFID and sensor technology enable computers to observe identify and
understand the worldwithout the limitations of human-entered data. (Lopez Research, 2013)
By this time Bluetooth technology was at the brink of its Era, never knowing that one day, could
also be relied on to achieve such spectacular features.
Privacy/Health Concerns
Weak Password
Susceptible to Hacking ( Man-in-the-Middle Attack)
MAC Spoofing Attacks
PIN Cracking Attacks
The above mentioned problems are what are considered when Bluetooth technology
takes a leap into a broader network structure albeit we wont go into details as it is outside the
scope of this research (Nateq Be-Nazir Ibn Minar, 2011). Privacy concern will raise an issue in
the sense that, once more and more devices are connected to the internet, where this
information goes to, who stores them and what if that information is used against a particular
individual(s). Thus this will raise a concern for individual who will plan to use the future
technology of Bluetooth and with so much radio waves been emitted in the environment, its
only sceptical that ones health might or might not be affected due to the emission of radio
waves every moment of the day. Weak password will also raise concern as well, as many things
are connected to the internet especially when such things uses Bluetooth technology to collect
data, definitely such system or software must encompass a model that is able to provide greater
security identification pattern. Since all devices uses microchip sets or microcontrollers,
therefore, there is a possibility that this technology could be susceptible to some form of
hacking, although there are known threats and those unknown threats at the moment but when
a technology becomes rapidly available then trends to find out loop holes will emerged to find
out the plausibility of either by means of manipulation or control. Identifying devices and how
these devices can be spoofed from their manufactures identity or located using a devices MAC
Address poses tension as well when a new technology is to be used this raising issues of
information leakage as well.
4.0.
Research Methodology
In the implementation of this research, the author of this research decided to follow a
mixed methodology. First of all, a Secondary Methodology will be employed followed by an
Empirical methodology. Thus, this is to ensure that information that is gotten is properly used,
data is analyzed and results can be gotten to be used in the continuous effort of improving the
entire research idea. Secondly in terms of creating or developing a system that is ready, an Agile
Methodology can be employed to tackle the system development cycle of this research thus, if
any given system is used in place to expand this research, this methodology is a preferred
solution in place to follow. Using such concept, the author will base most of the preliminary
finding on observation and how the hardware aspect of Bluetooth will interact to achieve the
authors designs. The concept is relatively simple, and it employs basic fundamental or rather
rudimentary aspect of technology we all know and use which is mobile devices.
4.1
The authors preliminary work plans includes designing a compatible mobile application,
which is able to use the Bluetooth schema from a mobile phone or mobile device in
communication pattern with other Bluetooth compatible devices. What the author envisions is
to enable and use the internet in conjunction with Bluetooth technology to provide
communication among different individuals as well as enable those devices to be able to
interact with the users. What the author is targeting as an innovative aspect of this research is
described below:
Page 4
ISBN: 978-967-11851-5-5
Bluetooth Voice Calls Providing wireless voice calls between Bluetooth enable
devices, original audio waves will be transferred within a PAN and WAN Network.
Bluetooth File Sharing over Cloud Technology Enabling a way whereby connected
devices can have access to files or share files with each other or with other devices
even after physically Bluetooth connected has been lost. This is rather carried over an
Internet Protocol.
Bluetooth Video Calls Enables the mobile devices to be able to make video calls in as
much the same way a voice call would be implemented, even when not in a PAN area,
information is securely transmitted over the Internet.
Device Searching by means of a Unique Identifier one of the ways the author is
targeting would be by using an email address as the unique identifier in identifying
other Bluetooth devices that are connected over the Internet. Thus tagging the
devices MAC address and tying it up with a Central Database to identify devices.
Sharing of Internet connectivity and Device Lock Mechanism (which include physical
structures with sensor ability) with the aid of Bluetooth and Internet technology.
With the aid of Bluetooth Smart currently version 4.2, Bluetooth technology will be able
to perform with the below specification (Bluetooth.com):
An intelligent wireless connection to authenticate and manage interactions
An extremely power-efficient connection that doesn't drain the user's phone battery
Nearly ubiquitous support from phone manufacturers and mobile operating systems
Thus the author has come with an idea to create an application able to render services of
which these Bluetooth devices will be able to conform with and allow the users to be able to
control, use and interact with well known object. Preliminary areas of interest include:
Universities/Schools
Offices
Homes
These areas were targeted to ensure that communication is rapidly dispersed among
individuals who normally lurk or engage in activities. An illustrative architecture below will
demonstrate the authors vision in this given research project.
Page 5
ISBN: 978-967-11851-5-5
5.0.
Conclusion
In the process of advancing science and technology an innovation must spring forth in
order to drive the frontier in the quest for greater knowledge and for the betterment of
mankind. Bluetooth technology shows a prospectus in bringing each and every devices
connected to the Internet, and making the Internet of Things a reality. Albeit the finalization
might not be too far ahead, the construct and idea the technology promises makes it an ideal
candidate in improving the lives of individuals and how they communicate with one another
and how computers can interact with users. In so doing, combining Bluetooth technology and
the internet can help in various aspect of the Industrial and Academic sector. For starter,
consumers will be able to share much more information easily at their own convenience,
students can be able to communication of a free scale around campus areas, and information
can be communicated to them at the same time. The possibility is vast but brings and reduces
cost of communication on the long run. This way we can curb the cost it will take to talk over the
internet as well as pay for using such services especially when such prices are statistically
placed value of using such a service. This way communication will be on an open medium that
binds connectivity. Reducing cost of communication, providing security of information and
Page 6
ISBN: 978-967-11851-5-5
expanding experience; on how mobile devices can learn, react and provide better information
especially between people or individual who uses them on an everyday scale. With the help of
Sensors, Bluetooth and the Internet, information can be easily passed across, there would be
less restriction on how information can be used and in what form it can be used. The internet
and Bluetooth will change the way we see our everyday lives by bringing it one step closer
together when multiple devices are able to communicate with less hassle and when such
communication will make mankind interact more with others.
References
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
Page 7