Architecture of a Bluetooth IoT Application

by Oct 4, 2020Communication Protocols

What is Bluetooth?

To understand the architecture of Bluetooth first lets understand what actually Bluetooth is. Bluetooth is a radio-wave technology that is mainly designed to enable wireless communications over short distances. The frequency of these waves ranges between 2.400 and 2.485 GHz, which can extend a maximum of 164 feet between two devices. Every Bluetooth device has a Transmitter and a Receiver. The power of the device transmitter governs the range over which a Bluetooth device can operate in other words transmitter decides the range of communication.

How does it work?

Architecture of Bluetooth has two network types :

The Architecture of a Bluetooth IoT Application

Bluetooth in iot

Firstly, we must first dive into the Bluetooth “stack” to understand why recent shifts in Bluetooth standards are significant for IoT applications The evolution of Bluetooth from a replacement for RS-232 data cables to a powerful and massive IoT connectivity solution is a story of adding new layers to the stack. The newest Bluetooth specification for IoT—Bluetooth mesh—must be engineered upon either the BLE 4.xx or 5.xx stack—an extension of the Bluetooth Core (“classic”) specification. The emerging Bluetooth mesh stack, therefore, comprises three-stack layers: Core, then BLE, and mesh on top.

Bluetooth Topologies: Pair, Broadcast, Mesh

Network topologies

https://www.bluetooth.com/blog/introducing-bluetooth-mesh-networking/

  • Pair: Bluetooth as a means of pairing two devices
    • For Example, a computer paired with a wireless mouse
  • Broadcasting: Bluetooth as a means of having one device broadcast information to many devices or vice versa
    • For Example: Playing music on smart speakers and simultaneously casting photos to a projector—both using a single iPhone
  • Mesh: Bluetooth as a way of connecting many devices to many others as if in a spider’s web
    • For Example: Connecting 1,278 overhead lights in a warehouse to each other to dim and brighten lights automatically based upon activity and personal preferences.

Bluetooth Protocol Types

The main function of the Bluetooth is a Bluetooth protocol stack in architecture of bluetooth . In other words, It defines and provides different types of layers and functionalities. Bluetooth can run the different applications over different protocol stacks, but, each one of these protocol stacks uses the same Bluetooth link and physical layers.

The below diagram shows a complete Bluetooth protocol stack. It shows the relationship between the protocols that use the services of other protocols when there is a payload to be transferred in the air. Anyhow, the protocols have many other relationships between the other protocols – for example, some protocols (L2CAP, TCS Binary) use the LMP to control the link manager.

The complete protocol stack architecture of Bluetooth is made up of both Bluetooth specific protocols like object exchange protocols (OBEX) and user datagram protocol (UDP).

The main principle is to minimize the reuse of current protocols for different purposes at higher layers as if re-inventing circle once again. The protocol re-use is helpful for the legacy applications to work with the Bluetooth technology to measure the smooth operations and interoperability of applications. Hence, many applications are being developed to take immediate advantage of the software and hardware.

Bluetooth Architecture
Protocol layersProtocol in the stacks
Bluetooth Core ProtocolBaseband, LMP, L2CAP, SDP
Cable Replacement ProtocolRFCOMM
Telephony Control ProtocolTCS Binary, AT- commands
Adopted ProtocolsPPP, OBEX, UDP/TCP/IP, WAP, Vcard, Vcall, IrMC, WAE

Layers of Architecture of Bluetooth :

Host Controller InterfaceA command interface for the controller and for the link manager, which allows access to the hardware status and control registers.
Logical Link Control and Adaptation ProtocolIt is also known as the heart of the Bluetooth protocol stack. It allows the communication between the upper and lower layers of the Bluetooth protocol stack.
Radio (RF) layer
It performs modulation/demodulation of the data into RF signals.
Baseband Link layerIn short, it performs the connection establishment within a piconet.
SDP layerIt is short for Service Discovery Protocol. It allows for discovering the services available on another Bluetooth enabled device.
WAPIt is short for Wireless Access Protocol. It is used for internet access.
TCSIt is short for Telephony Control Protocol. It provides a telephony service.
Application layerIn short , it enables the user to interact with the application.

Advantages of Bluetooth Protocols

  • Bluetooth offers economic wireless solutions (both data & voice) but, for short distances
  • On the other hand, Mobile and stationary environment use Bluetooth protocol.
  • There is no setup file to install the Bluetooth, in other words, it is an inbuilt device.
  • Above all, They are up-gradable

Characteristics of Bluetooth Protocols

  • In short, Up to eight devices including the master can communicate in the Piconet by using Bluetooth.
  • Bluetooth signals are Omnidirectional as a result devices don’t point at each other.
  • Governments regulated worldwide because it is possible to utilize the same standard.
  • In short , Signals can transmit through walls and briefcases.

Bluetooth Security

Bluetooth security

Firstly, the security of any wireless technology is very important. With hackers gaining access to an ever-increasing number of systems, as a result,Bluetooth security is increasingly important.

Bluetooth security must also address more specific Bluetooth related attacks that target known vulnerabilities in Bluetooth implementations and specifications. In other words, these may include attacks against improperly secured Bluetooth implementations which can provide attackers with unauthorized access.

Many users may not believe there is an issue with Bluetooth security, but hackers may be able to gain access to information from phone lists to more sensitive information that others may hold on Bluetooth enabled phones and other devices.

Firstly, there are three basic means of providing Bluetooth security:

  • Authentication:   In this process, that is to say,the identity of the communicating devices is verified. But ,user authentication is not part of the main Bluetooth security elements of the specification.
  • Confidentiality:   In Short, this process prevents the information from being eavesdropped by ensuring that only authorized devices can access and view the data.
  • Authorization:   This process prevents access by ensuring that a device is authorized to use a service before enabling it to do so.

Common Bluetooth security issues

Bluetooth Security
  • Bluejacking: In short, Sending spam messages to discoverable Bluetooth enabled devices. However, this form of hacking is harmless. In short, the best way to defend against it is to keep Bluetooth settings to invisible or non-discoverable.
  • Bluesnarfing: It is more serious than bluejacking because it can reveal private information on a smartphone and is capable of happening even when invisible/non-discoverable mode is enabled.
  • Bluebugging: In short, it’s capable of accessing all the information such as photos, apps, contacts, etc. It’s more dangerous than bluejacking and bluesnarfing.

In Conclusion, Some prevention tips for Bluetooth hacks are to set invisible mode. Therefore, makes it more difficult for hackers to gain access to your data. Lastly, stay awake from the open Wi-Fi networks in busy or untrusted locations, so that you can minimize the risk of falling victim to hackers.

Creating a multiplication Skill in Alexa using python

Written By Monisha Macharla

Hi, I'm Monisha. I am a tech blogger and a hobbyist. I am eager to learn and explore tech related stuff! also, I wanted to deliver you the same as much as the simpler way with more informative content. I generally appreciate learning by doing, rather than only learning. Thank you for reading my blog! Happy learning!

RELATED POSTS

How to use a GSM/GPRS Module as an IoT device?

How to use a GSM/GPRS Module as an IoT device?

The convergence of physical objects and the digital world is known as IoT. IoT stands for the Internet of Things. It has been a trending field in the world of technology. In addition, the IoT describes the network of physical objects known as “things” that are...

Longwave Wireless Communication

Longwave Wireless Communication

Longwave wireless communication acts as a foundation for a Low power Wide Area Network. Mostly low energy is consumed in these types of networks. The reason is that most sensors are used for extracting data. These data are used for transmitting in long-range...

Most Commonly Used Web Frameworks

Most Commonly Used Web Frameworks

Web Frameworks are software frameworks that are designed to help create Web apps, Web APIs and other resources. Web Frameworks help us solve two of the major hurdles of developing web apps - templates and routing. Now that we know what web frameworks are, lets get...

Communication between XBee modules

Communication between XBee modules

The wireless networking device, XBee is a user friendly, popular and is a technology worth knowing about. It can transmit and receive data wirelessly, and thus can be used for many IoT applications. As the popularity of the XBee module has grown massively, there are...

Role of WiFi in IoT

Role of WiFi in IoT

Internet of Things(IoT) applications has diverse connectivity requirements in terms of range, data throughput, energy efficiency, and device cost. WiFi is often an obvious choice in-building WiFi coverage is almost ubiquitous. It is not always an appropriate...

VIDEOS – FOLLOW US ON YOUTUBE

EXPLORE OUR IOT PROJECTS

IoT Smart Gardening System – ESP8266, MQTT, Adafruit IO

Gardening is always a very calming pastime. However, our gardens' plants may not always receive the care they require due to our active lifestyles. What if we could remotely keep an eye on their health and provide them with the attention they require? In this article,...

How to Simulate IoT projects using Cisco Packet Tracer

In this tutorial, let's learn how to simulate the IoT project using the Cisco packet tracer. As an example, we shall build a simple Home Automation project to control and monitor devices. Introduction Firstly, let's quickly look at the overview of the software. Packet...

All you need to know about integrating NodeMCU with Ubidots over MQTT

In this tutorial, let's discuss Integrating NodeMCU and Ubidots IoT platform. As an illustration, we shall interface the DHT11 sensor to monitor temperature and Humidity. Additionally, an led bulb is controlled using the dashboard. Besides, the implementation will be...

All you need to know about integrating NodeMCU with Ubidots over Https

In this tutorial, let's discuss Integrating NodeMCU and Ubidots IoT platform. As an illustration, we shall interface the DHT11 sensor to monitor temperature and Humidity. Additionally, an led bulb is controlled using the dashboard. Besides, the implementation will be...

How to design a Wireless Blind Stick using nRF24L01 Module?

Introduction Let's learn to design a low-cost wireless blind stick using the nRF24L01 transceiver module. So the complete project is divided into the transmitter part and receiver part. Thus, the Transmitter part consists of an Arduino Nano microcontroller, ultrasonic...

Sending Temperature data to ThingSpeak Cloud and Visualize

In this article, we are going to learn “How to send temperature data to ThingSpeak Cloud?”. We can then visualize the temperature data uploaded to ThingSpeak Cloud anywhere in the world. But "What is ThingSpeak?” ThingSpeak is an open-source IoT platform that allows...

Amaze your friend with latest tricks of Raspberry Pi and Firebase

Introduction to our Raspberry Pi and Firebase trick Let me introduce you to the latest trick of Raspberry Pi and Firebase we'll be using to fool them. It begins with a small circuit to connect a temperature sensor and an Infrared sensor with Raspberry Pi. The circuit...

How to implement Machine Learning on IoT based Data?

Introduction The industrial scope for the convergence of the Internet of Things(IoT) and Machine learning(ML) is wide and informative. IoT renders an enormous amount of data from various sensors. On the other hand, ML opens up insight hidden in the acquired data....

Smart Display Board based on IoT and Google Firebase

Introduction In this tutorial, we are going to build a Smart Display Board based on IoT and Google Firebase by using NodeMCU8266 (or you can even use NodeMCU32) and LCD. Generally, in shops, hotels, offices, railway stations, notice/ display boards are used. They are...

Smart Gardening System – GO GREEN Project

Automation of farm activities can transform agricultural domain from being manual into a dynamic field to yield higher production with less human intervention. The project Green is developed to manage farms using modern information and communication technologies....