Data Transmission Efficiency in Bluetooth Low Energy Versions

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Opportunistic Sensor Data Collection with Bluetooth Low Energy

Bluetooth Low Energy (BLE) has gained very high momentum, as witnessed by its widespread presence in smartphones, wearables and other consumer electronics devices. This fact can be leveraged to carry out opportunistic sensor data collection (OSDC) in scenarios where a sensor node cannot communicate with infrastructure nodes. In such cases, a mobile entity (e.g., a pedestrian or a vehicle) equip...

متن کامل

Mathematical Analysis of Bluetooth Energy Efficiency

In this paper, we propose a mathematical framework for the analysis of Bluetooth systems energy efficiency. The dynamic of the system is modelled by means of a finite state Markov chain (FSMC). Hence, we resort to the renewal reward theory to derive an estimation of the average throughput and energy efficiency achieved by the different packet formats, both for AWGN and Rician fading radio chann...

متن کامل

Bluetooth: With Low Energy Comes Low Security

We discuss our tools and techniques to monitor and inject packets in Bluetooth Low Energy. Also known as BTLE or Bluetooth Smart, it is found in recent high-end smartphones, sports devices, sensors, and will soon appear in many medical devices. We show that we can effectively render useless the encryption of any Bluetooth Low Energy link.

متن کامل

Mechanisms for improving throughput and energy efficiency of Bluetooth Low Energy for multi node environment

Bluetooth Low Energy (BLE) is a recently developed energy-efficient shortrange radio communication technology, which is nowadays vastly becoming more and more popular. The technology aims to provide an energy-efficient low-cost wireless communication mechanism for a wide range of resource-limited consumer electronic devices and applications. In this paper we focus on the networking aspects of t...

متن کامل

Bypassing Passkey Authentication in Bluetooth Low Energy

Since the attack runs on the Security Manager layer, it can reuse a lot of the existing network stack that is already in place for this approach. This namely concerns everything bellow HCI [1]. Actually, the whole procedure starting with the authentication bypass and continuing to data injection (which would be a regular communication anyway) can be done using a general Bluetooth 4.0 Smart Read...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Sensors

سال: 2019

ISSN: 1424-8220

DOI: 10.3390/s19173746