BlueVoice: Voice communications over Bluetooth Low Energy in the Internet of Things scenario

2016 ◽  
Vol 89-90 ◽  
pp. 51-59 ◽  
Author(s):  
M. Gentili ◽  
R. Sannino ◽  
M. Petracca
IEEE Network ◽  
2014 ◽  
Vol 28 (6) ◽  
pp. 83-90 ◽  
Author(s):  
Johanna Nieminen ◽  
Carles Gomez ◽  
Markus Isomaki ◽  
Teemu Savolainen ◽  
Basavaraj Patil ◽  
...  

Author(s):  
Tomasz Zieliński

The main purpose of the work was to analyze sensory platform solutions for use on the Internet of Things. Emphasis was placed on the literature study on Sensor Platforms, Internet of Things, Bluetooth Low Energy Communication Protocol, serial digital and analog interfaces most commonly used in sensory platforms. Analysis of sensory platform solutions was carried out in terms of their functionality and efficiency. The SensorTag CC2650 sensing platform by Texas Instruments, turned out to be the best and has been used to build the hub model. The hub model was based on hardware and software implementation, which resulted in the expansion of the sensor platform with 6 additional analog inputs and a Bluetooth Low Energy data transmission profile. Testing the correctness of the software produced in the laboratory environment has made it possible to determine the correct functioning of the concentrator model.


Author(s):  
Smita Sanjay Ambarkar ◽  
Rakhi Dattatraya Akhare

This chapter focuses on the comprehensive contents of various applications and principles related to Bluetooth low energy (BLE). The internet of things (IoT) applications like indoor localization, proximity detection problem by using Bluetooth low energy, and enhancing the sales in the commercial market by using BLE have the same database requirement and common implementation idea. The real-world applications are complex and require intensive computation. These computations should take less time, cost, and battery power. The chapter mainly focuses on the usage of BLE beacons for indoor localization. The motive behind the study of BLE devices is that it is supported by mobile smart devices that augment its application exponentially.


2015 ◽  
Vol 13 (1) ◽  
pp. 14-21 ◽  
Author(s):  
Wade Trappe ◽  
Richard Howard ◽  
Robert S. Moore

Electronics ◽  
2021 ◽  
Vol 10 (19) ◽  
pp. 2335
Author(s):  
Dong-Suk Ryu ◽  
Yeung-Mo Yeon ◽  
Seung-Hee Kim

As the growth rate of the internet-of-things (IoT) sensor market is expected to exceed 30%, a technology that can easily collect and processing a large number of various types of sensor data is gradually required. However, conventional multilink IoT sensor communication based on Bluetooth low energy (BLE) enables only the processing of up to 19 peripheral nodes per central device. This study suggested an alternative to increasing the number of IoT sensor nodes while minimizing the addition of a central processor by expanding the number of peripheral nodes that can be processed per central device through a new group-switching algorithm based on Bluetooth low energy (BLE). Furthermore, this involves verifying the relevancy of application to the industry field. This device environment lowered the possibility of data errors and equipment troubles due to communication interference between central processors, which is a critical advantage when applying it to industry. The scalability and various benefits of a group-switching algorithm are expected to help accelerate various services via the application of BLE 5 wireless communication by innovatively improving the constraint of accessing up to 19 nodes per central device in the conventional multilink IoT sensor communication.


Fog Computing ◽  
2018 ◽  
pp. 54-81
Author(s):  
Mahmoud Elkhodr ◽  
Seyed Shahrestani ◽  
Hon Cheung

This Chapter provides several comparable studies of some of the major evolving and enabling wireless technologies in the Internet of Things (IoT). Particularly, it focuses on the ZigBee, 6lowpan, Bluetooth Low Energy, LTE, and the different versions of Wi-Fi protocols including the IEEE 802.11ah. The studies, reported in this chapter, evaluate the capabilities and behaviors of these technologies in terms of various metrics including the data range and rate, network size, RF Channels and Bandwidth, Antenna design considerations, Power Consumption, and their Ecosystem. It is concluded that the requirements of each IoT application play a significant role in the selection of a suitable wireless technology.


2021 ◽  
Vol 27 (2) ◽  
Author(s):  
O.C. Ngige ◽  
C.E. Chibudike ◽  
D.O. Omotosho

This paper accesses the Internet of Things (IoT) in conjunction with the emergence of Wireless Technologies. Internet of Things (IoT) refers to a type of network to connect anything with the Internet, based on stipulated protocols through information sensing equipment to conduct information exchange and communications; in order to achieve smart recognitions, positioning, tracing, monitoring, and administration. This investigates the Internet of Things (IoT) and its incorporation of multiple long-range, short-range, and personal area wireless networks and technologies into the designs of IoT applications. Particularly, it focuses on ZigBee, 6LoWPAN, Bluetooth Low Energy, LoRa, and so on. This enables numerous business opportunities in fields as diverse as e-health, smart cities, and smart homes, among many others. This research briefly discussed about IoT, some of the major evolving and enabling wireless technologies in the IoT, Smart Environnent Application Domain, and Application of IoT. Benefits and Challenges of IoT.


Author(s):  
Rohit Chawla, Et. al.

The interpretability and secured communication are major challenge in internet of things. The embedding of wireless device has low energy and bandwidth. The low energy and bandwidth cannot effort computational overhead and compromised with security threats. Primary the conventional cryptography algorithm is applied for generation and sharing of key for mode of communication. The conventional cryptography algorithms have several bottleneck issues related to generation of key and distribution of key. The NIST models provides the secured communication channel in the environments of mobility. Lack of integrity, confidentiality and authorization process of data transmitted over the network of internet of things used the concept of key generation and allocation. The process of key generation and authentication provides the authorization and authentication of data over the internet of things. In this paper present the review of security threats of internet of things.


Sign in / Sign up

Export Citation Format

Share Document