Performance evaluation and analysis of effective range and data throughput for unmodified bluetooth communication devices
نویسندگان
چکیده
The DoD and the Air Force continually seek to incorporate new technology in an effort to improve communication, work effectiveness, and efficiency. Office devices utilizing Bluetooth technology simplify device configuration and communication. They provide a means to communicate wirelessly over short distances thereby eliminating the need for different vendor specific cables and interfaces. One of the key concerns involved in incorporating new communication technology is security; the fundamental security concern of wireless communication is interception. Studies focusing on IEEE 802.11b have shown vulnerability zones around many DoD installations that reflect the ranges at which wireless communications using the 802.11b standard can be intercepted. This research identifies the vulnerability zones in which Bluetooth transmissions can potentially be intercepted. Specifically, the orientation of Bluetooth device antenna and the distance between devices are varied to determine ranges at which set levels of throughput can be achieved for a specific device configuration. Throughput ranges are then mapped to graphically reflect vulnerability zones. This research shows that the range at which Bluetooth communication can occur with unmodified devices is more than twice that of the minimum standard of 10 m outlined in the core specification without degradation of the best-case throughput level measured. It is expected that the throughput ranges could be greatly extended with some device modification. This research shows that the security risk associated with interception of Bluetooth communications is legitimate and warrants further study.
منابع مشابه
Simulation and Throughput Analysis of Multiple IEEE 802.15.1 Devices in Presence of Interference
The increasing interest in wireless ad-hoc networks built by the portable devices equipped with short-range wireless network interfaces. IEEE 802.15.1 WPAN (Bluetooth) and IEEE 802.11b WLAN (Wi-Fi) are most popular and emerging wireless technologies. These technologies migrates wired system applications into the wireless domain. Applications includes, computing, sensing, and communication. In B...
متن کاملPiconet interference modeling and performance evaluation of Bluetooth MAC protocol
The emergence of Bluetooth as a default radio interface has allowed handheld electronic devices to be instantly interconnected as ad-hoc networks. These short range ad-hoc wireless networks called piconets, operate in the unlicensed 2.45 GHz ISM (Industrial-Scientific-Medical) band where up to eight devices may be used to configure single or overlapping piconets. As all piconets operating in th...
متن کاملCollocated Multi-user Gestural Interactions with Unmodified Wearable Devices
Many real-life scenarios can benefit from both physical proximity and natural gesture interaction. In this paper, we explore shared collocated interactions on unmodified wearable devices. We introduce an interaction technique which enables a small group of people to interact using natural gestures. The proximity of users and devices is detected through acoustic ranging using inaudible signals, ...
متن کاملPerformance Simulation of TCP/IP over a Bluetooth Ad-hoc Network
Abstract. Bluetooth is a short-range radio link which originally was developed to eliminate cables between portable and/or fixed communicating devices. Bluetooth wireless technology is a de facto standard, as well as a specification for small-form factor, low-cost, short range radio links between mobile PCs, mobile phones and other portable devices. Today Bluetooth is a true ad-hoc wireless net...
متن کاملModeling and evaluation of Bluetooth MAC protocol
The emergence of Bluetooth as a default radio interface allows handheld electronic devices to be instantly interconnected into ad hoc networks. These short range ad-hoc wireless networks, called piconets, operate in the unlicensed 2.45 Ghz ISM (Industrial-Scientific-Medical) band where up to eight devices may be used to configure single or overlapping piconets. This creates interference on the ...
متن کامل