Data Transmission Efficiency in Bluetooth Low Energy Versions
نویسندگان
چکیده
منابع مشابه
Opportunistic Sensor Data Collection with Bluetooth Low Energy
Bluetooth Low Energy (BLE) has gained very high momentum, as witnessed by its widespread presence in smartphones, wearables and other consumer electronics devices. This fact can be leveraged to carry out opportunistic sensor data collection (OSDC) in scenarios where a sensor node cannot communicate with infrastructure nodes. In such cases, a mobile entity (e.g., a pedestrian or a vehicle) equip...
متن کاملMathematical Analysis of Bluetooth Energy Efficiency
In this paper, we propose a mathematical framework for the analysis of Bluetooth systems energy efficiency. The dynamic of the system is modelled by means of a finite state Markov chain (FSMC). Hence, we resort to the renewal reward theory to derive an estimation of the average throughput and energy efficiency achieved by the different packet formats, both for AWGN and Rician fading radio chann...
متن کاملBluetooth: With Low Energy Comes Low Security
We discuss our tools and techniques to monitor and inject packets in Bluetooth Low Energy. Also known as BTLE or Bluetooth Smart, it is found in recent high-end smartphones, sports devices, sensors, and will soon appear in many medical devices. We show that we can effectively render useless the encryption of any Bluetooth Low Energy link.
متن کاملMechanisms for improving throughput and energy efficiency of Bluetooth Low Energy for multi node environment
Bluetooth Low Energy (BLE) is a recently developed energy-efficient shortrange radio communication technology, which is nowadays vastly becoming more and more popular. The technology aims to provide an energy-efficient low-cost wireless communication mechanism for a wide range of resource-limited consumer electronic devices and applications. In this paper we focus on the networking aspects of t...
متن کاملBypassing Passkey Authentication in Bluetooth Low Energy
Since the attack runs on the Security Manager layer, it can reuse a lot of the existing network stack that is already in place for this approach. This namely concerns everything bellow HCI [1]. Actually, the whole procedure starting with the authentication bypass and continuing to data injection (which would be a regular communication anyway) can be done using a general Bluetooth 4.0 Smart Read...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Sensors
سال: 2019
ISSN: 1424-8220
DOI: 10.3390/s19173746