SlideShare a Scribd company logo
1 of 35
INTERNET OF THINGS
Building beacons: the next big “thing “
Ravikiran
November 28, 2015
Bangalore, India
AGENDA
 Introduction
 Industry Forecast
 Architecture
 Enabling Technologies
 Security considerations
 Applications
 Challenges and issues
 Future of IoT
INTRODUCTION
 Internet of everything
 Connected devices
 Artificial Intelligence
 Minimal human interventions
 Combination of multiple technologies: Sensors, M2M.
INTERNET OF THINGS
IOT INDUSTRY FORECAST
IOT ARCHITECTURE
ENABLING TECHNOLOGIES
BLUETOOTH LOW ENERGY
 Operates in 2.4GHz-2.48GHz ISM band
 1Mbps over the air data exchange speed (theoretical)
 7.5ms – 4 S connection interval
 Max 6 packets per connection interval
 Max packet size 20 Bytes (increased to 256 in 4.2)
 133 * 7.5 = 1000ms
 Max bytes per sec = 133 conn. intervals*6 packets*20 bytes =
15960Bps = 125Kbps
 Range up to 100meter – 2m-5m optimal
 Bluetooth 4.0+ to support LE mode
 Bluetooth smart and smart ready support (dual mode)
 Low power consumption
 Fast connection time
BT/LE ARCHITECTURE
BLE FOR IOT
 Why BLE is popular in IoT world?
 Why it consumes lesser power than classic BT?
BLE PERIPHERAL AND CENTRAL
ADVERTISEMENT
ADVERTISING PACKETS
SCAN & SCAN RESPONSE
PAIRING, CHANNEL ENCRYPTION AND LINK KEYS
 AES-128 with encryption engine
 Identity Resolving Key: for privacy
 Signing Resolving Key: authentication without
encryption
 LTK: used for encryption
 Paring encrypts the link using a temporary key
 Temporary key is derived key: pass key, nfc pair,
public key
CONNECTION ESTABLISHMENT
 Central initiates/terminates connection
 Connection is nothing but periodic exchange of data
at regular intervals
 Data exchange can be bidirectional, when connected
 FHSS – Frequency Hopping Spread Spectrum
 Channel = (current_channel+hop) mod 37
 Hop value will be communicated on successful connection.
 GFSK: Gaussian Frequency Shift Keying used to
encode bit stream over the air.
 Link layer manages the preamble, access address,
CRC, encryption, data whitening,
PROFILES VS PROTOCOLS
 Protocols:
 Protocol is the set of rules followed by different layers
 Protocol defines packets format, muxing, encoding and
decoding
 Protocols are the building blocks to assure device
conformant to bluetooth.org standard
 Profile:
 Profiles defines the basic modes of operation to be
supported by all devices conformant to bluetooth.org
standard
 These are the set of rules, which essentially define how to
use protocols
GENERIC PROFILES
 GAP:
 Defines usage model for low level radio
 Define roles & procedure to broadcast, discover, establish
connection and manage security etc.
 Top most control layer
 GATT:
 Entry point for the application to interact with protocol layer
 Enables discover, read, write and push data.
 Use case specific (GATT based):
 HRP, HID,
 PXP, FindMe
 Vendor specific:
 Apple ibeacon
SERVICES AND CHARACTERISTICS
SERVICES AND CHARACTERISTICS (CONTD…)
 Services:
 Break data into small logical entities
 Collection of characteristic entities
 16-bit/128 UUID
 Characteristics:
 Smallest data units of a service
 This is a encapsulated single data point
 Entities where actual exchange of data happens
 16-bit/128 UUID
UNIVERSAL UNIQUE IDENTIFIER:
 16-bit UUID are generally assigned by the
bluetooth.org
 128-bit UUID are custom ID’s.
 Service UUID
 Characteristics UUID
BLE FOR IOT RECAP
 Why BLE is popular in IoT world?
 Why it consumes lesser power than classic BT?
THREATS
 MITM: Man In The Middle attack
 Passive Eavesdropping
 Identity tracking
SECURITY CONSIDERATIONS
 Encryption
 Signed data
 Privacy feature
 Directed advertisement
 Private address
 Resolvable –private address
 Non resolvable private address
 Random address
BEACONS FOR BETTER USER EXPERIENCE
 Proximity based applications
 Retail
 Store notification
 System security
 Passenger navigation in airports
 Smart cities
 Medical devices
 Smart home
CHALLENGES
 Power optimization
 User experience
 Initial setup time
 Security threats
FUTURE OF IOT
 Smart cars
 Smart Couches
 Smart consumer goods
 Technology that could influence politics
 Potential opportunities and global trends
 Imagination is the limit
FAQ:
 Is BLE PHY layer is full duplex?
 No !
 What is the difference between GAT/GAP/ATT?
 ATT defines the fundamental storage unit for data in BLE.
 GATT defines server and client models
 GAP provides device information and service listing.
Enables device features like discovery, scan,
advertisement etc.
 What is the server client vs. master slave?
 Link layer defines - master/slave
 GATT defines - server/client
 GAP defines - Central/Pheripheral
 What is the MTU size limits?
 MAX=512, MIN=23
 Can slave and Master transmit on same channel?
 Yes ! On every connection it does so.
???
REFERENCES
 https://developer.bluetooth.org
 http://www.bluetooth.com/
 https://www.bluetooth.org/en-us
APPENDIX
NFC (NEAR FIELD COMMUNICATION)
NFC (CONTD…)
 Works on the basis of electro magnetic radio fields
 13.54MHz operating band – same as RFID
 Active and Passive modes of operation
 No requirement for an additional battery (passive
mode)
 Short range technology – 10cm
 Highly secure compare to any other competing
technologies - (rfid/ble)
 Smart card protocol support (contact less smart
cards)

More Related Content

What's hot

BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITYJay Nagar
 
Cisco Packet Transport Network – MPLS-TP
Cisco Packet Transport Network – MPLS-TPCisco Packet Transport Network – MPLS-TP
Cisco Packet Transport Network – MPLS-TPCisco Canada
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Siva Pradeep Bolisetti
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentationguest664c3f
 
Extending Bluetooth with Mesh Networking
Extending Bluetooth with Mesh NetworkingExtending Bluetooth with Mesh Networking
Extending Bluetooth with Mesh NetworkingSilicon Labs
 
Bluetooth low energy(ble) wireless technology
Bluetooth low energy(ble) wireless technologyBluetooth low energy(ble) wireless technology
Bluetooth low energy(ble) wireless technologyLin Steven
 
E nodeb commissioning guide(v100r005c00 04)(pdf)-en
E nodeb commissioning guide(v100r005c00 04)(pdf)-enE nodeb commissioning guide(v100r005c00 04)(pdf)-en
E nodeb commissioning guide(v100r005c00 04)(pdf)-enVugar Ali
 
Huawei GPON Fundamentals
Huawei GPON FundamentalsHuawei GPON Fundamentals
Huawei GPON Fundamentalsibrahimnabil17
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYAJAL A J
 
Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentationjogiparthyramya
 
Huawei network icon database v2
Huawei network icon database v2Huawei network icon database v2
Huawei network icon database v2Carlos Romero
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technologysai krish
 

What's hot (20)

Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth PPT Report
Bluetooth PPT ReportBluetooth PPT Report
Bluetooth PPT Report
 
Bluetooth technology
Bluetooth  technologyBluetooth  technology
Bluetooth technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
BLUETOOTH SECURITY
BLUETOOTH SECURITYBLUETOOTH SECURITY
BLUETOOTH SECURITY
 
Blue1
Blue1Blue1
Blue1
 
Bluetooth [in]security
Bluetooth [in]securityBluetooth [in]security
Bluetooth [in]security
 
Cisco Packet Transport Network – MPLS-TP
Cisco Packet Transport Network – MPLS-TPCisco Packet Transport Network – MPLS-TP
Cisco Packet Transport Network – MPLS-TP
 
Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation Bluetooth Technology -- detailed explanation
Bluetooth Technology -- detailed explanation
 
Bluetooth Presentation
Bluetooth PresentationBluetooth Presentation
Bluetooth Presentation
 
Extending Bluetooth with Mesh Networking
Extending Bluetooth with Mesh NetworkingExtending Bluetooth with Mesh Networking
Extending Bluetooth with Mesh Networking
 
Bluetooth low energy(ble) wireless technology
Bluetooth low energy(ble) wireless technologyBluetooth low energy(ble) wireless technology
Bluetooth low energy(ble) wireless technology
 
E nodeb commissioning guide(v100r005c00 04)(pdf)-en
E nodeb commissioning guide(v100r005c00 04)(pdf)-enE nodeb commissioning guide(v100r005c00 04)(pdf)-en
E nodeb commissioning guide(v100r005c00 04)(pdf)-en
 
Huawei GPON Fundamentals
Huawei GPON FundamentalsHuawei GPON Fundamentals
Huawei GPON Fundamentals
 
BLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGYBLUETOOTH TECHNOLOGY
BLUETOOTH TECHNOLOGY
 
Bluetooth presentation
Bluetooth presentationBluetooth presentation
Bluetooth presentation
 
Bluetooth Power point presentation
Bluetooth Power point presentationBluetooth Power point presentation
Bluetooth Power point presentation
 
Huawei network icon database v2
Huawei network icon database v2Huawei network icon database v2
Huawei network icon database v2
 
Bluetooth technology
Bluetooth technologyBluetooth technology
Bluetooth technology
 

Similar to Iot ble and_beacons_2015_nov28

R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth TechnologiesSaurav Kumar
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdfJoshuaKimmich1
 
Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...IJECEIAES
 
Evolution of M2M Communication
Evolution of M2M CommunicationEvolution of M2M Communication
Evolution of M2M CommunicationIndaka Raigama
 
IoT (and M2M and WoT) From the Operators (CSP) perspective
IoT (and M2M and WoT) From the Operators (CSP) perspectiveIoT (and M2M and WoT) From the Operators (CSP) perspective
IoT (and M2M and WoT) From the Operators (CSP) perspectiveSamuel Dratwa
 
Bluetooth 4.0 specification
Bluetooth 4.0 specificationBluetooth 4.0 specification
Bluetooth 4.0 specificationabhiamanchopra
 
Simple things about Internet of Things
Simple things about Internet of ThingsSimple things about Internet of Things
Simple things about Internet of ThingsMuhammad Nasr
 
What's the Right Messaging Standard for the IoT?
What's the Right Messaging  Standard for the IoT?What's the Right Messaging  Standard for the IoT?
What's the Right Messaging Standard for the IoT?Angelo Corsaro
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingsMeshDynamics
 
Bluetooth versus wi
Bluetooth versus wiBluetooth versus wi
Bluetooth versus wisher1242
 
124647123-Bluetooth.ppt
124647123-Bluetooth.ppt124647123-Bluetooth.ppt
124647123-Bluetooth.pptMEGHAB26
 
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoTModule 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoTashwini870728
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area NetworksDilum Bandara
 

Similar to Iot ble and_beacons_2015_nov28 (20)

IoT _protocols.ppt
IoT _protocols.pptIoT _protocols.ppt
IoT _protocols.ppt
 
R K 2 Bluetooth Technologies
R K 2  Bluetooth  TechnologiesR K 2  Bluetooth  Technologies
R K 2 Bluetooth Technologies
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Iot
IotIot
Iot
 
Physical Design of IoT.pdf
Physical Design of IoT.pdfPhysical Design of IoT.pdf
Physical Design of IoT.pdf
 
Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...
 
Evolution of M2M Communication
Evolution of M2M CommunicationEvolution of M2M Communication
Evolution of M2M Communication
 
IoT (and M2M and WoT) From the Operators (CSP) perspective
IoT (and M2M and WoT) From the Operators (CSP) perspectiveIoT (and M2M and WoT) From the Operators (CSP) perspective
IoT (and M2M and WoT) From the Operators (CSP) perspective
 
Bluetooth 4.0 specification
Bluetooth 4.0 specificationBluetooth 4.0 specification
Bluetooth 4.0 specification
 
Zigbee Technology
Zigbee TechnologyZigbee Technology
Zigbee Technology
 
Simple things about Internet of Things
Simple things about Internet of ThingsSimple things about Internet of Things
Simple things about Internet of Things
 
What's the Right Messaging Standard for the IoT?
What's the Right Messaging  Standard for the IoT?What's the Right Messaging  Standard for the IoT?
What's the Right Messaging Standard for the IoT?
 
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-thingssmall-dumb-cheap-and-copious-the-future-of-the-internet-of-things
small-dumb-cheap-and-copious-the-future-of-the-internet-of-things
 
Introduction to IoT - Unit I
Introduction to IoT - Unit IIntroduction to IoT - Unit I
Introduction to IoT - Unit I
 
Ch4
Ch4Ch4
Ch4
 
Bluetooth versus wi
Bluetooth versus wiBluetooth versus wi
Bluetooth versus wi
 
124647123-Bluetooth.ppt
124647123-Bluetooth.ppt124647123-Bluetooth.ppt
124647123-Bluetooth.ppt
 
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoTModule 1 notes for IoT BETCK105H (VTU) Introduction to IoT
Module 1 notes for IoT BETCK105H (VTU) Introduction to IoT
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Wireless Personal Area Networks
Wireless Personal Area NetworksWireless Personal Area Networks
Wireless Personal Area Networks
 

Recently uploaded

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 

Recently uploaded (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

Iot ble and_beacons_2015_nov28

  • 1. INTERNET OF THINGS Building beacons: the next big “thing “ Ravikiran November 28, 2015 Bangalore, India
  • 2. AGENDA  Introduction  Industry Forecast  Architecture  Enabling Technologies  Security considerations  Applications  Challenges and issues  Future of IoT
  • 3. INTRODUCTION  Internet of everything  Connected devices  Artificial Intelligence  Minimal human interventions  Combination of multiple technologies: Sensors, M2M.
  • 8. BLUETOOTH LOW ENERGY  Operates in 2.4GHz-2.48GHz ISM band  1Mbps over the air data exchange speed (theoretical)  7.5ms – 4 S connection interval  Max 6 packets per connection interval  Max packet size 20 Bytes (increased to 256 in 4.2)  133 * 7.5 = 1000ms  Max bytes per sec = 133 conn. intervals*6 packets*20 bytes = 15960Bps = 125Kbps  Range up to 100meter – 2m-5m optimal  Bluetooth 4.0+ to support LE mode  Bluetooth smart and smart ready support (dual mode)  Low power consumption  Fast connection time
  • 10. BLE FOR IOT  Why BLE is popular in IoT world?  Why it consumes lesser power than classic BT?
  • 14. SCAN & SCAN RESPONSE
  • 15. PAIRING, CHANNEL ENCRYPTION AND LINK KEYS  AES-128 with encryption engine  Identity Resolving Key: for privacy  Signing Resolving Key: authentication without encryption  LTK: used for encryption  Paring encrypts the link using a temporary key  Temporary key is derived key: pass key, nfc pair, public key
  • 16. CONNECTION ESTABLISHMENT  Central initiates/terminates connection  Connection is nothing but periodic exchange of data at regular intervals  Data exchange can be bidirectional, when connected  FHSS – Frequency Hopping Spread Spectrum  Channel = (current_channel+hop) mod 37  Hop value will be communicated on successful connection.  GFSK: Gaussian Frequency Shift Keying used to encode bit stream over the air.  Link layer manages the preamble, access address, CRC, encryption, data whitening,
  • 17. PROFILES VS PROTOCOLS  Protocols:  Protocol is the set of rules followed by different layers  Protocol defines packets format, muxing, encoding and decoding  Protocols are the building blocks to assure device conformant to bluetooth.org standard  Profile:  Profiles defines the basic modes of operation to be supported by all devices conformant to bluetooth.org standard  These are the set of rules, which essentially define how to use protocols
  • 18. GENERIC PROFILES  GAP:  Defines usage model for low level radio  Define roles & procedure to broadcast, discover, establish connection and manage security etc.  Top most control layer  GATT:  Entry point for the application to interact with protocol layer  Enables discover, read, write and push data.  Use case specific (GATT based):  HRP, HID,  PXP, FindMe  Vendor specific:  Apple ibeacon
  • 20. SERVICES AND CHARACTERISTICS (CONTD…)  Services:  Break data into small logical entities  Collection of characteristic entities  16-bit/128 UUID  Characteristics:  Smallest data units of a service  This is a encapsulated single data point  Entities where actual exchange of data happens  16-bit/128 UUID
  • 21. UNIVERSAL UNIQUE IDENTIFIER:  16-bit UUID are generally assigned by the bluetooth.org  128-bit UUID are custom ID’s.  Service UUID  Characteristics UUID
  • 22. BLE FOR IOT RECAP  Why BLE is popular in IoT world?  Why it consumes lesser power than classic BT?
  • 23. THREATS  MITM: Man In The Middle attack  Passive Eavesdropping  Identity tracking
  • 24. SECURITY CONSIDERATIONS  Encryption  Signed data  Privacy feature  Directed advertisement  Private address  Resolvable –private address  Non resolvable private address  Random address
  • 25. BEACONS FOR BETTER USER EXPERIENCE  Proximity based applications  Retail  Store notification  System security  Passenger navigation in airports  Smart cities  Medical devices  Smart home
  • 26. CHALLENGES  Power optimization  User experience  Initial setup time  Security threats
  • 27. FUTURE OF IOT  Smart cars  Smart Couches  Smart consumer goods  Technology that could influence politics  Potential opportunities and global trends  Imagination is the limit
  • 28. FAQ:  Is BLE PHY layer is full duplex?  No !  What is the difference between GAT/GAP/ATT?  ATT defines the fundamental storage unit for data in BLE.  GATT defines server and client models  GAP provides device information and service listing. Enables device features like discovery, scan, advertisement etc.  What is the server client vs. master slave?  Link layer defines - master/slave  GATT defines - server/client  GAP defines - Central/Pheripheral
  • 29.  What is the MTU size limits?  MAX=512, MIN=23  Can slave and Master transmit on same channel?  Yes ! On every connection it does so.
  • 30. ???
  • 32.
  • 34. NFC (NEAR FIELD COMMUNICATION)
  • 35. NFC (CONTD…)  Works on the basis of electro magnetic radio fields  13.54MHz operating band – same as RFID  Active and Passive modes of operation  No requirement for an additional battery (passive mode)  Short range technology – 10cm  Highly secure compare to any other competing technologies - (rfid/ble)  Smart card protocol support (contact less smart cards)