Bluetooth
Bluetooth
For
A Thesis Report
Submitted in the partial fulfillment of the requirements
for the award of the degree of ME in Software Engineering
Submitted by
Sona Rani
ME (Software Engineering)
8013116
This is to certify that the thesis work entitled “Bluetooth Approach for Toll Tax
Application” submitted by Sona Rani, in the partial fulfillment of the requirement for the
award of the degree of Master of Engineering (Software Engineering), Thapar Institute of
Engineering and Technology (Deemed University), Patiala, is a record of candidate’s
own work carried out by her under my supervision and guidance.
2
ACKNOWLEDGEMENTS
I wish to express my sincere gratitude to Mr. Lalit Garg (Lecturer), for providing
invaluable guidance, suggestions and sympathetic attitude, which inspired me to submit
this thesis report in time. I also wish to express my gratitude to Ms. Seema Bawa, Head,
Computer Science and Engineering Department for her valuable advice and suggestions.
I would also like to thank all the staff members of Computer Science and Engineering
Department for providing me all the facilities required for the completion of this work.
I would like to extend my special thanks to Mr. Balveer Singh, Supervisor, RITS, under
NHAI, at Shambu Toll Collection station for providing me data of existing toll collection
system and for providing me timely guidance.
I also wish to express thanks to my daughter Mokshta who missed my care and attention
during this work.
And last but not least I wish to thank all my classmates for their time to time suggestions
and cooperation.
Sona Rani
8013116
M.E. (Software Engineering)
3
TABLE OF CONTENTS
Page No.
Certificate
Acknowledgement
List of Figures iv
List of Tables vi
Abstract vii
1. Introduction 1
1.1 Technology 1
1.1.6 Security 3
1.2 Goal 4
4
1.3 Features of Bluetooth 7
1.4 Security 7
1.4.5 Authentication 13
1.4.6 Encryption 14
1.4.7 Applications 16
3. Establishing Connections 42
3.2 Scatternet 44
5
3.3.1 Standby State 45
3.3.2 Inquiry 45
3.3.5 Page 47
4. Experimental Results 51
Conclusion 58
Future Enhancements 59
Appendix 60
References 63
Papers Presented 67
LIST OF FIGURES
6
1.2 Key Control 12
3.3 Scatternet 44
7
4.1 Bar Chart of Pollution Control 52
LIST OF TABLES
Table Number Table Name Page Number
2.1 Distance Based Power Control 31
3.1 Time Establishing Connection 42
4.1 Results 51
8
ABSTRACT
The bluetooth wireless technology was created to replace the cables used on
mobile devices with radio frequency waves. The technology encompasses a simple low-
cost, low-power, global radio system for integration into mobile devices, which can form
a quick ad-hoc secure “piconet” and communicate among the connected devices. This
technology creates many useful mobile usage models because the connections can occur
while mobile devices are being carried in pockets and briefcases. Therefore, there are no
line-of-sight restrictions. Bluetooth technology operates at a short-range radio frequency
(RF) and is capable of transmitting voice and data. The effective range of bluetooth
devices is 32 feet (10 meters). Bluetooth transfers data at the rate of 1 Mbps.
The bluetooth specifications use frequency-hopping spread-spectrum technology,
which entails the transmitter’s jumping from one frequency to the next at a specific
hopping rate in accordance with a pseudo-random code sequence. Bluetooth wireless
technology uses 79 hops per second displaced by 1 MHz, starting at 2.402 GHz and
stopping at 2.480 GHz. Frequency hopping makes the transmission more secure and
resistant to noise and fade. In spread spectrum technique used by bluetooth, the signal is
taken apart or “spread” so that it sounds more like noise to the casual listener. Using the
same spreading code as the transmitter, the receiver correlates and collapses the spread
signal back down to its original form. With the signal’s power spread over a larger band
of frequencies, the result is a more robust signal and it makes voice and data
communications more secure.
In my thesis work, I have implemented the bluetooth technology in the
application of toll tax system. In the current system the difficulties are time management,
payment collection and processing, long queues and manual operations. These difficulties
can be removed by implementing the system using bluetooth technology. This will make
the system automatic, secure and easier to operate and maintain.
9
CHAPTER 1
INTRODUCTION
Bluetooth is a radio frequency (RF) specification for short-range point to point
and point to multipoint voice and data transfer. Bluetooth has enabled to connect to
wide range of computing and telecommunications devices without the need for
proprietary cables that often fall short in terms of ease of use.
Bluetooth is a computing and telecommunications industry specification that
describes how mobile phones, computers, and personal digital assistants (PDAs) can
easily interconnect with each other and with home and business phones and computers
using a short-range wireless connection. Using this technology, users of cellular
phones, pagers, and personal digital assistants such as the Palm Pilot will be able to
buy a three-in-one phone that can double as a portable phone at home or in the office,
get quickly synchronized with information in a desktop or notebook computer, initiate
the sending or receiving of a fax, initiate a print-out, and, in general, have all mobile
and fixed computer devices totally coordinated.
Bluetooth requires that a low-cost transceiver chip be included in each device.
The transceiver transmits and receives in a previously unused frequency band of 2.45
GHz that is available globally (with some variation of bandwidth in different
countries). In addition to data, up to three voice channels are available. Each device
has a unique 48-bit address from the IEEE 802 standard. Connections can be point-to-
point or multipoint and can range maximum upto 10 meters exchanging data at a rate
of 1 Megabit per second (up to 2 Mbps in the second generation of the technology). A
frequency hop scheme allows devices to communicate even in areas with a great deal
of electromagnetic interference.
1.1 Technology
10
Bluetooth wireless technology is implemented in tiny, inexpensive, short-range
transceivers in the mobile devices, either embedded directly into existing component
boards or added into an adopter device such as a PC card.
Bluetooth wireless technology used the globally available unlicensed ISM
radio band of 2.4 GHz and 2.4 to 2.484GHz, which do not require an operator’ s
license from the federal communication committee or any international regulatory
authority. The use of a common frequency band waves that you can bring devices
using the bluetooth specification virtually anywhere in the world and they will be able
to link up with other such devices regardless of what country you happen to be
visiting.
11
Since the connection does not involve a telecommunications service provider, there is
no per minute usage charge.
1.1.6 Security
The Bluetooth security architecture relies on PIN codes for establishing trusted
relationships between devices. While not practical to go through all the combinations
12
of uses of PIN codes, it should be noted that once a trusted pairing is established
between devices, these codes could be stored within the device to allow more
automatic/simple connections. The key to Bluetooth simplicity will be establishing the
trusted relationship between commonly used devices. For random ad-hoc connections
that require authenticated connections (such as ensuring you are connecting to who
you think you are connecting to, something that is not always obvious with invisible
radio waves), PINs would have to be exchanged (depending on how the devices are
configured).
1.2 Goal
Bluetooth is the code name for the rapidly emerging global specification for
wireless connectivity for mobile PCs, handheld computing devices, wireless phones,
13
headsets, other wearable devices and computer peripherals including printers, in
addition to human interface devices such as data pads and mice. Led by Intel,
Ericsson, IBM, Nokia, and Toshiba, the Bluetooth Special Interest Group (SIG) was
established to create a global specification for wireless communications interface and
control software, in order to ensure device interoperability.
14
1.2.2 Low-Power Frequency Hopping Radio
A low-power radio interface was chosen, operating on the globally available
2.45 GHz band. The radio air interface features nominal antenna power of 0 dBm and
complies with FCC rules for the ISM band. Spectrum spreading is accomplished by
frequency hopping, with 79 hops spaced by 1 MHz, between 2.402 GHz and 2.480
GHz. The frequency hopping rate is 1,600 hops/sec., and the nominal radio link range
ranges up to 10 meters, although range can be extended up to 100 meters by increasing
the transmission power.
It is estimated that integrating compliant radios into device will initially cost
about $30 (USD) per unit. This includes the antenna and software components. It is
expected that unit costs will ultimately drop to the vicinity of $10 (USD) or lower,
depending on the partitioning, volumes, and certification requirements. The Bluetooth
specification targets power consumption at 30 µA in "hold" mode to a transmitting
range of 8-30 mA.
15
Bluetooth technology has been termed the "personal area network" because it
will allow users of phones and mobile computing devices to use the Internet and other
networking applications any time and anywhere they happen to be. For example:
½ With Bluetooth technology, a single phone could serve a LAN-based
intercom in the office, a portable phone at home and a mobile (cellular) phone on the
road.
½ Mobile PCs and handheld computing devices can be used to surf the Web
via either a mobile phone link, PSTN, ISDN LAN.
½ A cordless headset can keep users connected to a mobile PC, or to any
wired connection.
For developers, the best way to learn more about Bluetooth technology is to
join the 500 companies who have already become members of the Bluetooth SIG.
They are about to provide "Connected PCs to go" at the right cost, the right size, and
the right power consumption.
16
1.4 Security
The way that the Bluetooth radio system is used in mobile devices and the type
of data carried on these devices (e.g., a corporate mobile computer) makes security an
extremely important factor. While most wireless systems will claim that being a
spread spectrum radio provides security, the volumes projected for Bluetooth radios
eliminate this barrier. As such, link layer and application layer security is part of the
basic Bluetooth radio requirements.
At a link layer, the Bluetooth radio system provides Authentication,
Encryption, and Key Management of the various keys involved. Authentication
involves the user providing a Personal Identification Number (PIN) that is translated
into a 128-bit link key that can be authenticated in a one- or two-way direction. Once
the radios are authenticated, the link can be encrypted at various key lengths (up to
128-bits in 8-bit key increments). The link layer security architecture provides a
number of authentication schemes and a flexible encryption scheme that allows radios
to negotiate for key length. This is important, as radios from different countries will be
talking to each other. Security policies in these countries will dictate maximum
encryption key lengths. Bluetooth radios will negotiate to the smallest common key
length for the link (for example, if a USA radio is enabled for a 128-bit encryption key
and a Spanish radio is enabled for only a 48-bit encryption key, the radios will
negotiate a link with 48-bit encryption key). The Bluetooth architecture also supports
authorization of different services to upper software stacks. For example, when two
computers have created a Bluetooth link to exchange business cards, authorization
must be created to extend these services (such that one computer could not examine
other services on that computer unless enabled to do so).
17
automatic/simple connections. The key to Bluetooth simplicity will be establishing the
trusted relationship between commonly used devices. For random ad-hoc connections
that require authenticated connections (such as ensuring you are connecting to who
you think you are connecting to, something that is not always obvious with invisible
radio waves), PINs would have to be exchanged (depending on how the devices are
configured). Link layer security architecture is shown in figure(1.1)
E3 E3
Encryption Temporary Storage
Encryption Key Encryption Key
18
fixed relationship and its access to services is limited. An untrusted device can also
have a fixed relationship, but it is not considered as trusted. A new device is labeled as
unknown device and it is always untrusted.
Security level of services
When the connection is set there are different levels of security where the user
can choose. The security level of a service is defined by three attributes:
Authorization required:
Access is only granted automatically to trusted devices or untrusted devices
after an authorization procedure.
Authentication required:
Before connecting to the application, the remote device must be authenticated.
Encryption required:
The link must be changed to encrypted mode, before access to the service is
possible. On the lower level the services can be not to be accessible to all devices.
Usually there is a need for restrictions so the user can set the service so that it needs
authentication. When the highest level of security is needed the service can require
authorization and authentication. At this level trusted device has access to the services,
but untrusted device needs manual authorization.
19
device initiates security procedures before the channel is established (at the lower
layers).
At the same time two possibilities exist for Device’s access to services:
"Trusted Device" and "Untrusted Device".
The trusted devices have unrestricted access to all services. The untrusted
device doesn’t have fixed relationships and its access to services is limited
Link Level Security Parameters
There are 4 entities used to setup/maintain the security at the link level
The Bluetooth device address (BD_ADDR), which is a 48-bit address that is
unique for each Bluetooth device and defined and allocated by the IEEE.
Private link key, which is a 128-bit random number used for authentication
purposes.
Private encryption key, 8-128 bits in length that is used for encryption.
A Random number (RAND), which is a frequently changing 128-bit random or
pseudo-random number that is made by the Bluetooth device itself.
20
The Master key, Kmaster, is used when the master device wants to transmit to
several devices at ones. It over rides the current link key only for one session.
The Initialization key, Kinit, is used in the initialization process.
Encryption Key
Encryption key is derived from the current link key. Each time encryption is
needed the encryption key will be automatically changed. The reason for separating
the authentication key and encryption key is to facilitate the use of a shorter
encryption key without weakening the strength of the authentication procedure.
PIN code
This is a user selected or fixed number, normally 4 digits in length, but it can
be anything between 1 to 16 octets. The user can change it when it wants to and this
adds security to the system. The PIN can be used entering it into one device (fixed
PIN), but it is safer to enter it to both units.
Key Generation and Initialization
The exchange of the keys takes place during an initialization phase, which has
to be carried out separately for each two units that want to implement authentication
and encryption. All initialization procedures consists of the following (Figure 1.2)
PIN PIN
E2
E2
Authentication
Link
Link Key
Key
E2
E3
Encryption
Encrypti
Encrypti
on Key
on Key
21
v Generation of an initialization key
v Authentication
v Generation of link key
v Link key exchange
v Generating of encryption key in each unit
After this procedure the link is either built or aborted.
1.4.5 Authentication
The Bluetooth authentication scheme is essentially a challenge-response
strategy, where a 2-move protocol is used to check whether the other party knows a
shared identical secret key (a symmetric key). Basically the protocol checks that both
devices have the same key, and if they do authentication is successful. also during the
authentication procedure , an ACO value (Authenticated Ciphering Offset) is
generated and stored in both devices. This ACO value is used (in a roundabout way) to
generate the encryption key later on.
The Authentication scheme works as follows (figure 1.3).
Step 1 The verifier sends the claimant a random number to be authenticated.
BD_ADDR(B)
RAND A BD_ADDR(B)
RAND (A) E1 RAND (A) E1
SRES
ACO ACO
SRES’ SRES
22
Figure 1.3 Description of The Authentication Process
This application indicates who is to be authenticated. Note this means that the
verifier may not necessarily be the master, as some of the applications may require
only one way authentication, (only one party is authenticated), rather than mutual
authentication. If the authentication fails, there is a period of time (the waiting time)
that must pass until a new attempt at authentication can be made. This can
subsequently increase or decrease depending on the results of previous authentication
attempts (until preset timers have been exceeded).
1.4.6 Encryption
The Bluetooth encryption system systematically encrypts the payload of each
packet. (figure 1.4 )This is done with a stream cipher E0, which is re-synchronized for
every payload. The E0 stream cipher consists of 3 elements:
First the payload key generator combines the input bits in an appropriate order,
then it shifts them to the 4 LFSR (Linear Feedback Shift Registers) of the key stream
generator.
There are several encryption modes available (depending on whether a device
uses a semi-permanent link key or a master key). If a unit key or a combination key is
used, broadcast traffic is not encrypted. Point-to-point traffic can be either encrypted
or not. If a master key is used, there are three possible modes. In
Encryption mode 1, nothing is encrypted.
23
Encryption mode 2, point-to-multipoint (broadcast) traffic is not encrypted,
but point-to-point addressed traffic is encrypted with the master key.
Encryption mode 3, all traffic is encrypted with the master key.
As the encryption key size can vary from 8 to 128 bits, the size of the
encryption key used between the two devices must be negotiated, with either device
(master and slave) proposing, or rejecting each other’s key size suggestion.
BD_ADDR(A) BD_ADDR(B)
Kc Kc
24
due to the possibility that a malicious device could force a lower encryption setting to
do harm.
1.4.7 Applications
Bluetooth technology was designed to be small and inexpensive. Bluetooth
technology has no line of sight requirements making it a potential replacement for
infrared ports. Bluetooth can operate through walls or from within your briefcase.
Portable PCs can wirelessly connect to printers, transfer data to desktop PCs or PDAs
or interface with cellular phones for wireless can access to corporate networks or the
internet.
In the office and on the road, Bluetooth eliminates cabling and provides added
mobility. Users no longer have to cable a cell phone to a handheld of notebook
computer. Users no longer have to keep the computer and cell phone aligned to
maintain a connection using the infrared port. Bluetooth allows users to leave the cell
phone in a briefcase and still make that connection back to the office to update their
calendar or to the Internet for the latest stock quote. Bluetooth allows the mobile
computer to synchronize with our desktop computer when the mobile computer is
dropped off on the desk. Designed to be an extremely low cost technology, other
peripherals are likely to contain bluetooth such as fax machines, cameras alarm system
and virtually any other electronic device. Unlike other technologies available today,
bluetooth is designed to be a bubble of connectivity that moves with you.
Incorporating bluetooth into these other peripherals allows you to just walk up to the
machine and use it services or for it to detect your presence and initiate a pre
determined program or routine.
Cable Replacement
Bluetooth enables the users to connect a wide range of computing and
telecommunications devices easily and simply, without the need to buy, carry or connect
many proprietary cables. It delivers opportunities for rapid ad hoc connections, and the
possibility of automatic, unconscious connections between devices. It increases your
freedom by connecting your mouse or the keyboard wirelessly to your computer.
25
Simultaneously Linked Devices
By installing a Bluetooth network in your office you can do away with the
complex and tedious task of networking between the computing devices, yet have the
power of connected devices. No longer would you be bound to fixed locations where you
can connect to the network. Each Bluetooth device could be connected to 200 other
devices making the connection of every device with every other possible. Since it
supports both point to point and point to multipoint it will virtually make the maximum
number of simultaneously linked devices unlimited.
The Internet Bridge
We can use the laptop to surf the internet wherever you are and regardless if you
are cordlessly connected through a mobile phone( cellular) or through a wire-bound
connection.
The Automatic Synchronizer
Automatic background synchronization keeps you up to date - automatic
synchronization of your desktop, portable PC, notebook (PC- PDA) and your mobile
phone is made easier with bluetooth. For instant, as soon as you enter your office the
address list and calendar in your notebook will automatically be updated to agree with the
one in your desktop or vice versa.
Instant Transfer of Documents
Connect all participants for instant data exchange in meetings and conferences,
you can share information instantly with all participants, and without any wired
connections. You can also cordlessly run and control for instant a projector, this is not
officially supporting in the 1.0 specification, but other companies are working on this
application.
The Instant Postcard
Send instant photos and video clips from any location wirelessly connect your
camera to a portable PC. Add comments and send them instantly to a receiver anywhere
in the world
26
Still Video Images
If your digital cameras in Bluetooth enabled, you can send still or video images
from any location to any location without the hassle of connecting your camera to the
mobile phone on the wire-line phone.
Three Way Phone
Bluetooth allows us to have three way phones. At home, your phone functions as
a portable phone (fixed line charge). When you’re on the move, it functions as a mobile
phone (cellular charge). And when your phone comes within range of another mobile
phone with built-in Bluetooth wireless technology it functions as a walkie-talkie (no
telephony charge).
The Cordless Computer
Connect your portable PC to a peripherals or to the LAN- bluetooth enables a
cordless connection of your portable PC to printers, scanners and to the LAN. Increase
your sense of freedom in everyday work by cordless connection of your mouse and
keyboard to your portable PC.
Automatic Message Delivery
Compose e-mails on your portable PC while you’re on an airplane. As soon as
you’ve landed and switched on your mobile phone, all messages are immediately sent.
Email while PC is Still in the Briefcase
When your portable PC receives e-mail, you will get an alert on your mobile
phone. You can also browse all incoming e-mails and read those you select in the mobile
phone’s display.
27
CHAPTER 2
28
2.3 Why Bluetooth
In the existing system due to above limitations and problems, I have proposed the
bluetooth technology for the same. In the bluetooth system, the very first is that the
system will become automated and time management will be done efficiently and also
the cash problems will be removed. Due to its inquiry procedures, nobody will escape
from the paying the toll tax and the problem of long queues and traffic blockages will be
removed. Moreover the bluetooth chip is not so much costly and the people can afford it
easily.
In the new design, we require that bluetooth chip be included in each vehicle and
at every toll tax station, the bluetooth transmitter and receiver will be there, the credit
card system should be there and also the toll tax stations must have collaboration with the
credit card system with the networking.
As part of my thesis work, I have given the idea of implementing the bluetooth
technology in the application of toll tax system. In this system I have seen the difficulty
of payment systems and long queues and manual system. By introducing the bluetooth
technology, we can make this automatic and easier system. The bluetooth chip should be
included in each vehicle and these addresses should be stored in the database of toll tax
system. When a vehicle will come within the range coverage area the computer will give
a signal and the net balance of amount of the prepaid system will be shown on the screen.
According to the vehicle (scooter, car, jeep, bus, truck etc) toll tax amount the accounts
will be updated. The amount system should be prepaid . If the balance of a vehicle will be
lesser than the amount required, a red signal will be given for the alert and cash on the
spot will be received as shown in Figure 2.1. In this application we can solve the problem
of mismanagement of time and problem of long queues and problem of maintenance of
accounts. When the vehicle will come within the range of bluetooth receiver installed at
the toll tax stoppages, the database at the receiver will be checked and registration of the
29
passing vehicles will be done after deducting the amount from the prepaid account of that
vehicle otherwise a red alert signal will be sent.
BT Rx
BT Tx
Detected by
Vehicles
Bluetooth Rx
at toll tax
station
Database
Red Green
Signal Signal
Figure2.1 Functionality of the system
In the traffic management, the database contains the information about the
vehicles, their type, owner, vehicle no, credit card no etc as shown in figure 2.2. Road
patrol will give the indication if some rules and regulations of the traffic system is not
followed, peripheral services will contain the extra queries from the customer about the
system. In this system before billing of the vehicles, the rating of the amount of tax is
done and payment will be deducted from the card.Flow chart of the system is shown in
figure 2.3.
30
Traffic
Customer Info General
Manageme Customer Record
nt
Care
Billing Account
Peripheral Traffic Data
Services Conditions
Rating Payment
Payment
Violation
Enforceme
nt
Cash
Management
31
Algorithm of Functionality
á Input: Vehicle Number, Type, Toll Tax Amount, Credit Card Number, Balanced
Value, Name of the owner, etc.
á Range Detected
á If vehicle is detected, search out vehicle number in database.
á If it exist in then update the amount of credit card and give the green signal
á If it does not exist then alert by displaying red signal
á If the balance is not equal to or greater than the toll tax amount then also give red
signal
32
Flow Chart
Start
Input
Detect
Start Range
Yes
Search
Update Database
No
yes
yes
Required If
Balance Vehicle
Exists Number
33
2.5 Connection in the Bluetooth Based Toll Tax System
Piconet Concept
Bluetooth nodes that are in range of each other can set up an ad hoc connection
forming a so-called piconet. For the communication between nodes a frequency hopping
radio is used with a hopping rate of 1600 hops/s. Time is divided into 625 ms intervals,
which are called slots. In each slot different hop frequency is used. Consecutive slots are
alternately used for transmission and reception. Nodes participating in a piconet share the
same physical channel. One of the units of a piconet becomes the master of the piconet,
all others become slaves. Only one master can exist in a piconet at any time, but there can
be up to seven active slave devices. The nodes can change the master and slave roles.
Every unit in the piconet uses the master identity and clock to follow the hopping
channel by selecting the appropriate frequency used in the corresponding slot. To
generate the master’s clock in a slave node, the slave adds an offset to its own native
clock (Figure 2.4).
Hop
Native Selection
Clock +
Offset
Master
Address
34
A time division duplex (TDD) scheme is used where the master and slave
alternately transmit. Master starts transmissions only in even, slave only in odd
numbered time slots.
Standby
Inquiry
Page (Known
(Unknown
Address)
A bluetooth unit leaves the standby or the connection state periodically to do inquiry or
inquiry scan. Inquiry procedures enable a unit to discover which units are in range and
their device addresses and clocks. When the unit wishes to establish a connection with
35
one of the other bluetooth unit in range it initiates a paging procedure. At the end of this
procedure both units are in the connection state as either a master or a slave.
In this application when the bluetooth device at the check-post of the toll tax station
sends its inquiry messages, the devices which are in range, sends the reply and the
connection is made between them after paging procedure.
In this the inquiry is mandatory, the bluetooth device at the toll station always needs to
discover the vehicles in range.
There are four processes of inquiry and paging ( as shown in figure 2.5)
1. Inquiry
2. Inquiry scan
3. Paging
4. Paging scan
In inquiry processes, naturally several units might respond to an inquiry at the same time,
so there must be a procedure for slave inquiry response in order to avoid or minimize the
probability of collisions. When the vehicle receives an inquiry message it will generate a
random number between 0 and 1023 , freeze the current input value to the hop selection
scheme, then returns to connection or standby state for duration of random slots. The
period of inquiry scan can be 0s (continuous scan)-R0,1.28S, R1 mode or 256S-R2 mode.
In this system, we use continuous scan i.e. R0 mode because at any moment of time, any
vehicle can come. The receiver of the scanning device listens on a single frequency (toll
tax station) determined by the inquiry scan hopping sequence and the current value of the
device’ s clock. The scanning device changes its listening frequency, according to inquiry
hopping sequence, every 1.28s. When the master at the check-post wants to make a
connection to the vehicles in range, it pages that unit. Paging means sending an ID packet
with a certain DAC in it over and over again until a response is received. The master does
not know exactly when the slave wakes up and on which hop frequency, therefore it
transmits a train of identical DACs at different hop frequencies and listens in between for
responses. The master uses the slave’ s BD_ADDR and an estimate of the slave’ s clock to
determine the page hopping sequence. To compensate for the uncertainty in the
knowledge of the slave’ s clock, the master will send its page message during a short –
36
time interval on a number of wake-up frequencies. During each transmission slot the
master sequentially transmits on two different hopping frequencies. After the paging
procedure, the master at the toll tax station must poll the slaves by sending POLL or
NULL packets, to which the slave responds.
37
I have devised two techniques, namely
a) Battery power level based master-slave switch
b) Distance based power control, to increase the network lifetime in scatternets.
The master-slave switch technique is motivated by the fact that a piconet master has to
handle the packet transmissions to/from all its slaves, and hence may drain its battery
soon. I propose a role switching idea where each bluetooth device in a piconet may have
to play the master role depending on its available battery power ( as shown in Figures 2.6
and 2.7 ).
In the second technique, I propose that the bluetooth devices choose their transmit powers
based on their distances from their respective masters. A considerable gain in network
lifetime can be achieved using these two techniques.
First Technique- Battery Level Based Master-Slave Switch
The master-slave switch technique is motivated by the fact that a piconet master has to
handle the packet transmissions to/from all its slaves. If we consider all the devices in the
scatternet, including the piconet masters, to operate on, then the masters may drain their
batteries sooner than the slaves. The slaves may have substantial residual battery energy
after the master runs down its battery completely.
In order to achieve a more uniform residual battery energy profile and to increase the
network lifetime, I propose a role switching idea where each BT device in a piconet may
have to play the master role depending on its available battery power. That is, a master in
a piconet is dynamically chosen based on the available battery power. The proposed
available battery level based master-slave switch procedure is described as follows. The
current master at the toll tax station in a piconet periodically monitors its own as well as
its slave’ s available battery power levels. If its own battery power is less than a fraction
of the maximum available battery power amongst its slaves, then it initiates a master
slave switch procedure with the slave having the maximum battery power.
38
Slave
Master
Slave
Master
39
The slave then assumes the role of the master, and informs all the devices about the role
switch. The new master then will start periodically checking for the master-slave switch
criterion to be satisfied. When the criterion is satisfied another master-slave switch would
occur. This process will continue. It is noted that a finite time gets elapsed in completing
a master-slave switch. frequent master-slave switches can thus degrade the system
performance. In this study, we assume that all the nodes in a piconet are within listening
distance of each other so as to avoid reconfiguration of the topology every time a switch
takes place.
Second Technique- Distance Based Power Control
Power control can be used not only to reduce interference but also to extend the life of
battery in a device. The standards define three power classes each with a different power
transmits range. Transmit power step sizes in the range 2 to 8 dB have been specified. I
have choosen the transmit power of the master/slave based on the distance, d, between
the master and the slave (as shown in figure 2.8). It is assumed that the distance between
a master and a slave is known both to the master and the slave.
BT Rx
I devise the power control strategy in such a way that the transmitter chooses its transmit
power based on distance, according to following Table 2.1 and Figures 2.9 & 2.10 shows
the relationship between distance and power as the Bar chart representation and in the
Graphical way respectively.
40
Table 2.1 Distance Based Power Requirement
Distance, d (m) Tx. Power
d <1 0 dBm
1 < d <2 6dBm
2 < d <4 12 dBm
4<d<8 18 dBm
8 < d < 10 20 dBm
D 10
I 9
S 8
T 7
A 6
N 5
C 4
E 3
(in M) 2
1
0 6 12 18 20
POWER CONSUMPTION(dBm) P=f(D)
41
Graph of Distance V/s Power Consumption
D 10
I 9
S 8
T 7
A 6
N 5
C 4
E 3
(in M) 2
1
0 6 12 18 20
POWER CONSUMPTION(dBm)
P=f(D)
Figure2.10 Graphical Representation of Distance Based Routing System
But in this application, the technique which is applicable is the distance based power
control because the other technique of battery level based master slave switch can not be
applied because in this toll tax application, the master has to give the instructions at the
toll tax station, so we can not apply this. The only way to reduce the power consumption
is that we use distance based power control. When any vehicle at the toll tax station
reaches near the head, as the distance decreases power consumption will increase and
vice-versa. So in the routing in this application, the power transmit will be a function of
distance.
42
system, registration system and toll tax system. In the registration system the vehicles,
which are passing, are registered.
The bluetooth device (Rx) at the toll tax will inquire continuously, when some
vehicles will come in the range of the receiving station, the communication will start
automatically. The nature of routing will be adhoc in nature. When the devices will come
in range, the connection will be established simultaneously (as shown in figures 2.12
&2.13). For each type of vehicle (car, bus, scooter, truck, jeep etc.) a different bluetooth
receiver will be there for the sake of good management. There may be a single device for
responding all the devices or may be different devices for different type of vehicles. If
there is only one device, the inconvenience will be more and management will be
difficult but if the different devices for different type, good management and time saving
will be there. And suppose there is a case when the vehicles of same type will come in
parallel, then the receiver will face difficulty. So we can design the path so that only one
vehicle will be there near the receiver by making the queue near the station as such in the
manual system. In the collaboration diagram (Figure 2.14) , I have shown how the
messages will be transferred between the different modules i.e. vehicles, database,
accounts and registration.
43
Class Diagram
Accounts System
Vehicle
Account No
Type
Model
Owner
Collect No ()
Address
Payment_Info ()
Fee_Charge ()
Range ()
Registration No ()
Registration ()
Registration
Toll Tax Head
Registration No Vehicle No
Payment
Validate () Amount
Update ()
Get_Account No () Update ()
Give_Reg_No () Validate ()
44
Activity Diagram
Vehicles
Detected by
Bluetooth Rx
Register
Issue Registration No
45
Sequence Diagram
Registration
Database
System Accounts
Vehicle
Detect the
Vehicle
Information
Deduct Amount
and Update
Registration No
Confirmation
Update
46
Collaboration Diagram
Vehicle
1 Range Request
2 Display Information
7 Registration Confirmation
Database
3 Check
4 Response
Registration system
8 Update
Accounts
47
The mode of payment will be credit card or prepaid card system. There will be
credit cards, which will be issued to each vehicle. The amount of card will be dependent
on the owner of the vehicle. The owner can purchase the card of different amount
according to his requirement. When the person will purchase the card, the database will
be updated at the receiver station of toll tax simultaneously. In the database the card
number, amount and vehicle number, type, name of the owner etc all things will be there.
When the vehicle will come within the range of the receiver station at the toll tax station,
the number of the vehicle will be searched out in the database and the amount of the card
will be displayed on the screen automatically and the toll tax amount will be deducted
from the card and the balance will be updated. Suppose if some vehicle have not required
balance amount for the payment, then there will be a beep or red signal will be there for
the cash payment, which will be manual system.
48
accounting server then processes the accounting data received from the network device.
The processed accounting data is then submitted to a billing server, which typically
handles rating and invoice generation. Session records may be batched and compressed
by the accounting server prior to submission to the billing server in order to reduce the
volume of accounting data and the bandwidth required to accomplish the transfer.
Network
Device
Accounting protocol
Intra-domain records
Toll Tax
Device Billing
Billing Server
Server
49
accounting applications may experience substantial packet loss. In addition, the entities
involved in the transfers cannot be assumed to trust each other.
In this application the inter-domain records are transferred between the device and
toll tax accounting servers and intra-domain records are transferred between the
accounting and billing servers of the device and toll tax separately.
When a vehicle approaches near the toll tax station, the message between the both
are transferred as I have explained earlier. After that the billing amount is calculated
according to specific vehicle and it is deducted from the credit card number of that
vehicle and records are updated at the toll tax billing server as well as the device billing
server.
Bluetooth toll collection stations allow the traffic to flow continuously, and vehicle
having avoided stopping and starting again. This in combination with reduced fuel
consumption has positive effect on environment.
Society and the business community also gain from the system as it results in faster
transport. The system does not require special road lanes to be built at the toll stations.
50
Furthermore, only a minimum of traffic disruption is caused during installation. The
system also increases safety ,as bottlenecks and long queues are avoided.
Benefits to Operator
½ Increased capacity
½ Economy
½ Ensured payment
This system is cost-effective and easy to install, which benefits the operator. Because
traffic flows through continuously, the system increases capacity. The system’ s flexibility
makes it easy to install various payment methods and differentiated charges. No cash is
handled using the system, which means it is not open to abuse and ensures payment.
Benefits to Users
½ Time-saving
½ No queues
½ Convenient
½ Ensured payment
½ Easier to gauge travel time
Road-users save a lot of time, as the traffic flows continuously and it becomes easier to
gauge travel times. Bottlenecks and long queues are eliminated, both at the toll stations
and near slip roads. This also help increase the convenience factor, no money needed, no
need to select the right lane etc. because the system cannot be cheated, tolls can be kept
down, which also benefits road-users.
51
CHAPTER 3
ESTABLISHING CONNECTIONS
To manage connections two methods are defined the inquiry, which is optional (if
the message is to be sent to all devices in range then it is optional), and the page
procedure, which is mandatory. With the inquiry procedure the unit discovers its
neighbors in radio range. During inquiry the node sends IAC signals through the radio
interface. Other Bluetooth devices that want to be discovered and receive this signal send
an inquiry response with their own identity. If the node already knows the destination’s
identity, the page procedure is used to establish connection. The nodes use dedicated
frequencies to communicate in page mode. The unit identity determines these
frequencies, which are a subset of the total set of carriers. The nodes choose one of these
dedicated carriers pseudo-randomly according to a pseudo random hopping sequence
determined by their clocks. If the receiver node detects its access code (DAC), activates
itself and sets up a connection with the other node (Figure 3.1).
Connection
Inquiry Page
We can see the typical times associated with establishing connections in Table 3.1.
52
3.1 Connection State and Power Consumption
The master has to send packets to all slaves in Connection State periodically to
keep them synchronized to the channel. Any packet type can be used for this purpose,
since the slaves only need the channel access code to synchronize with. If the slave which
is addressed in the poll packet receives the packet, it can respond with any type of
Bluetooth packet. In the different operation modes different time periods are used to send
the poll packets.
Units can be in four operation modes during the Connection State. In active mode
the unit actively participates in the piconet. Active slaves listen in the master to slave
slots for packets addressed to them. If an active slave is not addressed, it may sleep until
the next master transmission. The type indication in the packet header shows the number
of slots the master has reserved for the following transmission. During this time the non-
addressed slaves do not have to listen to these slots. In active mode the receiver is
activated 10 ms before the start of the next slot. The receiver searches for channel access
code for 20 ms (Figure 3.2). This is called the receive window. If no correct channel
access code is received the receiver goes to sleep until the next slot. If a valid access code
is received the receiver remains open to receive the rest of the packet.
20 366
625
Figure 3.2 Receive window
Furthermore, special power-saving modes are defined to save battery when the
traffic is low. In sniff mode the master can start transmission to the slaves only in
specified time slots which are called sniff slots and are spaced regularly with an interval
of T sniff. The slave listens for the number of D sniff slots in every sniff period. If a slave
wants to enter in the sniff mode, it asks the master about the value of T sniff and D sniff .
In hold mode the unit keeps its active member address (AM ADDR), but it will not
receive any packets from the piconet. During hold mode the slave can do other things,
53
like scanning, paging, inquiring or attending another piconet. Before entering the hold
mode master and slave agree on the time duration the slave remains in the hold mode.
In park mode the slave gives up its AM ADDR. It uses two other addresses: the park
member address (PM ADDR) and the access request address (AR ADDR). The PM
ADDR is used to distinguish the parked devices and the master uses it in the master
initiated unpark procedure. The AR ADDR is used by the slave in the slave initiated
unpark procedure. The parked slave wakes up at regular intervals to listen to the channel
in order to re-synchronize to the master. The number of units participating in a piconet is
limited to 255, but maximum seven slave nodes can be in active, sniff or hold mode. The
others are in park mode, where they consume the least amount of energy. The active
slave devices can use the sniff and hold modes to deactivate their radio transceivers and
save battery power. The less the transceiver is turned on, the less power is consumed.
3.2 Scatternet
Several piconets can be created at the same place with overlapping radio areas.
The group of overlapping piconets is called scatternet (Figure 3.3). Every piconet has its
own hop sequence, and so the nodes in different piconets can simultaneously transfer
data. Because of this the throughput in a scatternet is much greater compared to the case
when every node participates in the same piconet.
headset
printer
master laptop
slave
master/slave
mouse laptop
54
A node can be slave in several piconets, but it can be master only in one, since the master
identity and clock determines the hopping sequence and this must differ in each piconet.
Changing piconets the nodes have to select the proper master identity and clock
offset to synchronize with the desired piconet. Before changing they inform the master
about the time they will not be accessible in the current piconet. A master can also
change piconets.
In this case the transmissions are stopped in the piconet until the master returns. A
multihop ad hoc network can built with nodes which are participating in several piconets.
4
3.3 State Diagram
A Bluetooth unit leaves the Standby or the Connection state periodically to do
Inquiry or Inquiry Scan. Inquiry procedures enable a unit to discover which units are in
range, and their device addresses and clocks. When the unit wishes to establish a
connection with one of the other Bluetooth units in range ( the user of the device wishes
to connect to some other device) it initiates a paging procedure. At the end of this
procedure both units are in the Connection state as either a master or a slave (Figure 3.4).
3.3.2 Inquiry
It is not specified how often a unit should leave standby or connection to perform
inquiry. It might be periodic or upon user request. These choices are left up to the
implementer. A unit that wishes to discover other bluetooth units in range enters an
inquiry substate. It continuously transmits the inquiry message at different hop
frequencies. In the inquiry state the transmitting and receiving frequencies follow the
inquiry hopping sequence and inquiry response hopping sequence and are determined by
the General Inquiry Access Code (GIAC) and the native clock of the discovering device.
55
Standby
Inquiry
Pa
Page scan
scan Inqui
Slave
Master
Respons Inquiry
Response
e Response
Connection
56
Thus, when a slave receives an inquiry message it will generate a RAND number
between 0 and 1023, freeze the current input value to the hop selection scheme, then
returns to Connection or Standby state for duration of RAND slots. Then it returns to the
Inquiry Response substrate and on the first inquiry message received it will answer with
an FHS packet.
3.3.5 Page
When a Bluetooth unit wants to make a connection to another unit it pages that
unit. Paging means sending an ID packet with a certain DAC in it over and over again
until a response is received. The Master does not know exactly when the slave wakes up
and on which hop frequency, therefore it transmits a train of identical DACs at different
hop frequencies and listens in between for responses. The master uses the slave’ s
BD_ADDR and an estimate of the slave’ s clock to determine the page hopping sequence.
57
To compensate for the uncertainty in the knowledge of a slave’ s clock, the master
will send its page message during a short time interval on a number of wake-up
frequencies. During each transmission slot the Master sequentially transmits on 2
different hopping frequencies. The page hopping sequence of 32 frequencies is divided
into two trains of 16 frequencies each, A and B. Train A includes the 16 hop frequencies
surrounding the current predicted hop frequency f(k). Thus, train A consists of f(k-8), f(k-
7), …f(k), f(k+1), f(k+2), …,f(k+7). When the difference between bluetooth clocks of the
master and the slave is between –8*1.28s and 7*1.28s, one of the frequencies used by the
Master will be the hop frequency the slave is currently listening to. Because the master
doesn’ t know when the slave will be in the page scan state, it has to repeat train A for
Npage times or until a response is received. When the difference between the bluetooth
clocks of Master and Slave is less than –8*1.28s or greater than 7*1.28s, more distant
hops must be used. Train B consists of f(k-16), f(k-15),…, f(k-9), f(k+8),
f(k+9),…,f(k+15). Alternate use of train A and B is continued until a response is received
or timeout value Page to is exceeded. Figure 3.5 shows what happens during a response
to paging procedures.
In the figure 3.5, we have a scenario where a slave responds to the first out of two
paging messages in a slot. The response packet is the same as the paging packet and is
sent on the same frequency. The master responds with an FHS packet on the next
frequency in the page hopping sequence. The master’ s FHS packet has to be
acknowledged by the slave. After that both units are in Connection state. Now the master
controls all transmissions. It polls the slave to see if it has data to send, and the slave has
to respond with a data packet if it has something to send or with a NULL packet if it
doesn’ t The slave will keep listening while FHS packet is not received until pagerespTO
is reached. Every 1.25s it will change the hop frequency according to page hop sequence.
If nothing is received the slave will return to page scan for 1 scan period. If it doesn’ t
receive any pages during this interval it continues scanning and then returns to whatever
state it was in before. If poll packet is not received by the Slave or response is not
received by the Master within new connection TO number of slots, they will return to
page/page scan states.
58
Page State Master Response Connection State
59
In order to save battery power a sniff mode can be used. In this mode the duty
cycle of slave’ s listen activity is reduced. To enter sniff mode, the master shall issue a
sniff command via the Link Manager (LM) protocol. This message will contain the sniff
interval Tsniff and an offset Dsniff. Master-to-slave sniff slots shall be initialized on the
slots for which the clock satisfies one of the following equations (depending on which
initialization procedure is used):
CLK27-1 mod Tsniff = Dsniff or (CLK27,CLK26-1) mod Tsniff = Dsniff
60
CHAPTER 4
RESULTS
The results has been performed by taking the values of data from the Shambu toll
collection station from Mr Balvir Singh . a comparison between the existing and
proposed system is made to show the benefits of implementing the bluetooth technology
in the toll collection system. The bar charts and graphical representation of the results are
drawn.
Number of vehicles passes through toll collection are 15,000 per day
System Existing System Proposed System Remarks/Saving
Arguments
* Other expenditures like electricity, telephone bill etc and facilities like transportation
for staff, refreshment etc. assumed to be same.
61
Bar Chart of Pollution created between existing and bluetooth technology
based toll collection system
A: Existing System
P B: Bluetooth Technology
O 10 Based System
L
L
U A
T
I
O (in %)
N 1
B
A: Existing System
P B: Bluetooth Technology
O Based System
L
L 10
U
T in %
I
O A
N 5
1 B
. . . . . . .
3,000 6,000 9,000 12,000 15,000
Number of cars/day
62
Bar Chart of Cash Risk during collection between existing and bluetooth
technology based toll collection system
A: Existing System
C B: Bluetooth Technology
A Based System
S Rs 5 Lacs
H
A
R
I
S
K
Rs 15,000
B
Graph of Cash Risk V/s Number of cars during collection in existing and
bluetooth technology based toll collection system
5
C ( in
A lacs)
S 4 A : Existing System
H B: Bluetooth Technology
Based System
P 3
E
R
2 A
D
A
Y 1
B
. . . . . . .
3,000 6,000 9,000 12,000 15,000
Number of cars/day
Figure 4.4 Graph of Cash Risk
63
Bar Chart of Man Power between existing and bluetooth technology based
toll collection system
P
O A
W
E 32.
R B
. . . . . . . . . . . .
0 2 4 6 8 10 12 14 16 18 20 22 24
Number of cars in thousands /day
Figure 4.6 Graph of Man Power Required
64
Bar Chart of Queue size between existing and bluetooth technology based
toll collection system
A: Existing System
10 B: Bluetooth Technology
Q Based System
U
E A Queue size on the basis of
U 15,000 cars passes toll check
E point per day
S
I
Z 1
E B
TOLL TAX SYSTEM
Graph of Queue size V/s Number of cars passes toll collection in existing
and bluetooth technology based toll collection system
65
Bar Chart of Petrol saving per month during collection between existing and
bluetooth technology based toll collection system
A: Existing System
B: Bluetooth Technology
P Based System
E in 300 litres
T L B
R i
O t
L r
e
S s
A
V
I
N
G
Nil
A
66
Bar Chart of Cost (Initial and Working) per year between existing and
bluetooth technology based system
A: Existing System = A1+A2
B: Bluetooth Technology = B1+B2
Based System
Total Cost
70
Working Cost
60
42
Initial Cost
C (Rs in 5
O Lacs) 30 6 B
S
T 7
A2 12 A
10 4 9 3
10 B
8 B
2
11 A 1
1
67
CONCLUSION
68
FUTURE SCOPE
The objective of the Bluetooth standard is to enable seamless communications of data
and voice, over short-range wireless links between both mobile and stationary devices.
The bluetooth specification can ease connection not only to the phone system or the
Internet but also between devices. Indeed, the focus of bluetooth wireless technology on
low-cost, high levels of integration and ease of configuration has the potential to change
current mobile computing and network connectivity paradigms.
I can say with confidence that the work of toll tax be an easy one when bluetooth
technology will be fixed for this purpose. Let us hope that our future experiments will be
beneficial to the whole of the world due to this technology.
This work can be further implemented in the field of Road Tax Office for the
collection for road taxes, which are applicable on motor vehicles and may be for the
collection of insurance fee of the motor vehicles.
69
APPENDIX
SCREEN SHOTS FOR BILLING OF BLUETOOTH TOLL TAX
SYSTEM
In this entry of data, the red signal is displayed because the entered registration number is
not correct.
70
In this entry green signal is displayed because the required balance is there in the credit
card as well as the registration number is correct.
71
In this entry the first four signals are green because required balance of credit card exists
and also the registration number is correct. But according to the last entry, the red signal
is displayed because the credit card account shows the less balance than the required
amount.
72
REFERENCES
73
5. Avoiding Interference
http://www.howstuffworks.com/bluetooth1.htm
6. Bluetooth Archiecture Overview.
http://www.intel.com/technology/itj/q22000/articles/art_1c.htm
7. Bluetooth Development.
http://www.ericsson.com/microe/products/bluetooth_solutions
8. Bluetooth Formalities.
http://www.bluetoothcentral.com/
9. Bluetooth Qualification Program.
http://www.celoxico.com/products/technical_papers/case_studies/cs_003_apxb.htm
10. “ Bluetooth SIG. Specification of the Bluetooth System” . Version 1.1, Feb.2001.
11. “ Bluetooth, The Bluetooth Specification” , V.1.1.
http://www.bluetooth.com/developer/specification/specification.asp
12. C. C. Chiang and M. Gerla, “ Routing and multicast in multihop, mobile wireless
networks” . In Proceedings 1997 IEEE 6th International Conference on Universal
Personal Communications, volume 2,pages 546 –551,San Diego, CA,Oct.1997.
13. C. de Morais Cordeiro,D.Sadok,and D.P.Agrawal, “ Piconet interference modeling
and performance evaluation of Bluetooth MAC protocol” . In Proceedings Global
Telecommunications Conference 2001 GLOBECOM ’ 01 ,volume 5,pages 2870 –
2874,San Antonio,TX,Nov.2001.
14. D. P. Bertsekas and R.Gallager. “ Data Networks” Prentice-Hall, Englewood Clis.
N. J, 2nd edition, 1991.
15. Diane Tang Mary Baker, “ Analysis of a Local-Area Wireless Network” .
16. Dirk Balfanz, D. K. Smetters, Paul Stewart and H. Chi Wong Talking, “ To
Strangers: Authentication in Ad-Hoc Wireless Networks” .
17. Frank Stajano and Ross Anderson “ The Resurrecting Duckling Security Issues for
Ad-hocWireless Networks” 1999 AT & T Software symposium.
18. G. C calinescu, I. Mandoiu, J. Peng-Wan, and A. Zelikovsky, “ Selecting
forwarding neighbors in wireless adhoc networks” . In Proceedings of the 5th
International Workshop on Discrete Algorithms and Methods for Mobile
Computing and Communications, pages34–43, Rome, Italy, July 2001.
74
19. General Information on Bluetooth.
http://www.mobileinfo.com/bluetooth/
20. H. Li, M. Lott, M. Weckerle, W. Zirwas, E. Schulz, “ Multihop Communications
In Future Mobile Radio Networks” .
21. Haiyun Luo, Paul Medvedev, Jerry Cheng, Songwu Lu “ A Self-Coordinating
Approach to Distributed Fair Queueing in Adhoc Wireless Networks” .
22. InfoTooth Knowledge Base.
http://www.palowireless.com/infotooth/knowbase.asp
23. Jaap Haartsen, Warren Allen, Jon Inouye, Olaf J. Joeressen, Mahmoud
Naghshineh, “ Bluetooth: Vision, Goals, and Architecture, 8 Mobile Computing
and Communications” Review, Volume 1, Number 2.
24. Jakobsson M., Wetzel S, “ Security Weakness in Bluetooth” RSA 2001
http://www.bell-labs.com/user/markusj/bt.html
25. Jean-Pierre Hubaux, Thomas Gross, Jean-Yves Le Boudec, and Martin Vetterli
Swiss Federal Institute of Technology, Lausanne and Zürich “ Toward Self-
Organized Mobile Ad Hoc Networks” : The Terminodes Project IEEE
Communications Magazine • January 2001.
26. Joseph M. Kahn, Randy Howard Katz, and Kristofer S. J. Pister, “ Emerging
Challenges: Mobile networking for Smart Dust” , Korean Institute of
Communication and Sciences 2000.
27. Jyoti Raju, J.J. Garcia-Luna-Aceves “ A New Approach to On-demand Loop-Free
Multipath Routing” .
28. Knowledge Base for Bluetooth Information
http://www.infotooth.com/
29. Laura Marie Feeney, Bengt Ahlgren, Assar Westerhund, “ Spontaneuous
Networking:An Application-oriented approach to Adhoc Networking” .
30. Markus Jakobsson and Susanne Wetzel, “ Security Weaknesses in Bluetooth” .
31. Müller T., Bluetooth Security Architecture, 1999-07-15
http://www.bluetooth.com/developer/download/download.asp?doc=174
32. N.Golmie,R.E.Van Dyck,and A.Soltanian,. “ Interference of Bluetooth and IEEE
802.11: simulation modeling and performance evaluation” . In Proceedings 4th
75
ACM international workshop on Modeling,analysis and simulation of wireless
and mobile systems ,pages 11 –18,Rome,Italy, July 2001.
33. Nathan J. Muller, Bluetooth Demystified, Tata McGraw Hill, edition 2001
34. Network Topology
http://www.intel.com/technology/itj/q22000/articles/art_1e.htm
35. Oreste Andrisano, Andrea Conti, Davide Dardari, Barbara M. Masini, and Gianni
Pasolini, “ Bluetooth And IEEE 802.11 Coexistence: Analytical Performance
Evaluation In Fading Channel” IEEE - PIMRC 2002.
36. P.Bhagwat and A.Segall, “ A routing vector method (RVM)for routing in
Bluetooth scatternets” . In Proceedings Sixth IEEE International Workshop on
Mobile Multimedia Communications (MOMUC ’ 99), pages 375 –379, San Diego,
CA, Nov.1999.
37. P.Bhagwat, I.Korpeoglu, C.Bisdikian, M.Naghshineh, and S.K.Tripathi.
“ BlueSky:a cord-less networking solution for palmtop computers” . In
Proceedings of the .fth annual ACM/IEEE international conference on Mobile
computing and networking ,pages 69 –76,Seattle,WA,1999.
38. Per Johansson, Manthos Kazantzidis, Rohit Kapoor, Mario Gerla, “ Bluetooth – an
Enabler for Personal Area Networking” .
39. S.Garg, M.Kalia, and R.Shorey, “ MAC scheduling policies for power
optimization in Bluetooth: a master driven TDD wireless system” . In Proceedings
VTC2000-Spring IEEE 51st Vehicular Technology Conference, volume 1,pages
196 –200,Tokyo,Japan,May 2000.
40. Siemens AG, “ Information and Communication Mobile” , 81730 Munich,
Germany,
41. Specification of the Bluetooth Systems, volume 1B, December 1st 1999
42. Sutherland E. “ Bluetooth has Security Issues that cannot be Ignored” , 2000-11-28
http://www.mcommercetimes.com/Technology/41
43. Thomas Muller, “ Bluetooth white paper” .
Bluetooth security architecture, version 1.0, 15 July 1999
44. Träskbäck M, “ Security in Bluetooth: An overview of Bluetooth security” , 2000-
11-2 http://www.cs.hut.fi/Opinnot/Tik-86.174/Bluetooth_Security. pdf
76
45. Ullgren T. “ Security in Bluetooth: Key management in Bluetooth”
http://www.cs.hut.fi/Opinnot/Tik-86.174/sectopics.html
46. Vainio J., “ Bluetooth Security” , 2000-05-25
http://www.niksula.cs.hut.fi/~jiitv/bluesec.html
47. Zhenyu Tang and J. J. Garcia-Luna-Aceves, “ A Protocol for Topology-Dependent
Transmission Scheduling in Wireless Networks.
48. Zhenyu Tang and J. J. Garcia-Luna-Aceves, “ Collision-Avoidance Transmission
Scheduling for Adhoc Networks” .
77
Paper Publications and Presentations
Papers Publications
1. Sona, Lalit Garg, “ Bluetooth Secutity” in the Proceedings of Institution of Engineers
(India), February 2003, Page No. 375-381.
Papers Presented
1. Sona,Lalit Garg, “ Bluetooth Revolution” Presented in Institution of
Engineers(India),National Conference at Murthal, February 2003.
2. Sona, “ E-governance- An Approach to Toll Tax Application” , National
Conference at JMIT (Yamunanagar), April 2003.
Papers Accepted
1. Sona, Lalit Garg, “ New Trend in Toll Tax Application (Bluetooth Revolution)” ,
Second National Conference at Amrita Institute of Engineering ,Coimbatore.
Papers Communicated
1. Sona, “ Bluetooth – Approach to Toll Tax Application” , IMC 2003, 18th
International Maintenance Conference, Clearwater, Beach ,Florida (USA)
78
79
80
81