Academic literature on the topic 'Bluetooth'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Bluetooth.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Dissertations / Theses on the topic "Bluetooth"

1

Ho, Johan. "Bluetooth broadcasting." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10063.

Full text
Abstract:
<p>Background: The wireless technology Bluetooth has rapidly become more commonly supported by electronic devices like mobile phones and PDAs. Several companies are currently developing Bluetooth broadcasting systems to use for marketing. This report is a result of researching the use of Bluetooth broadcasting for delivering information for more general purposes, how well Bluetooth actually works for broadcasting, and also on the topic of user privacy. Results: Broadcasting with Bluetooth did work with a few devices at the same time, since Bluetooth allows up to seven connections to one Bluetooth radio at the same time. By making a passive system where the user is the one which requests information, it also will not affect users' privacy. However, my research also found a few issues with the Bluetooth which might affect a broadcast, the most noticeable of them being the somewhat low transfer rate, an issue with device discovery not always working when a lot of users are doing device discovery at the same time. The fact that it only supports seven connections is also a limitation. Basically, while it is possible to use Bluetooth for broadcasting, it might be problematic to use it for targeting a large audience. Conclusions: Even with the problems mentioned, Bluetooth broadcasting provides quite a unique way of broadcasting, and with the newer versions of Bluetooth the issues mentioned might be less of a problem. Bluetooth broadcasting definitely has some potential.</p>
APA, Harvard, Vancouver, ISO, and other styles
2

San, Jose Ralf 1970. "Bluetooth technology." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/9207.

Full text
Abstract:
Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management, 2000.<br>Also available online at the DSpace at MIT website.<br>Includes bibliographical references.<br>Bluetooth is the codename adopted by a consortium of wireless equipment manufacturers that is working toward a low-cost, global standard for wireless communication of data and voice. It will operate in the unlicensed ISM band (industrial, scientific, and medical) with gross transfer rate up to lMbps and it will connect devices within a range of 10 or up to lOOm. The benefits of Bluetooth technology are twofold. First, it enables a user to replace the various cables between devices with a universal short-range radio link. For example, a cellular telephone and a portable computer equipped with the Bluetooth technology can interface without the need for cables. Further, they could interoperate with similarly equipped devices such as printers, fax machines, desktop computers and peripherals, and a host of other digital devices. The second major benefit of the Bluetooth technology is its ability to provide a connection between the ad hoc network and existing data networks. Bluetooth technology is designed for wireless personal area networks (WPANs), which are networks of personal electronic devices in close proximity to each other. Expectations for Bluetooth technology are that it will become a major player in the wireless data communications market, due primarily to its simplicity and its support from large companies, many of whom are integrating the technology into their products. Further, Bluetooth members are encouraging vendors to incorporate the technology into their products by waiving intellectual property royalty fees. That being said, this paper will explore the technical aspects of Bluetooth as well as the strategic rationale behind the founding companies. Since e-commerce might be heavily affected by this technology, especially business-to-consumer and consumer-to-consumer, this paper also explores the impact and possible changes in consumer and merchant behaviors.<br>by Ralf San Jose.<br>M.B.A.
APA, Harvard, Vancouver, ISO, and other styles
3

Käppeli, Daniel. "JXTA over Bluetooth." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Information and Communication Systems Research Group, 2003. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=107.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Pettersson, Alexander, and Azlan Husin. "Bluetooth and security." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3534.

Full text
Abstract:
Detta arbete behandlar hur Bluetooth fungerar samt säkerheten kring Bluetooth och några allmänt tillgängliga attack verktyg. Syftet med uppsatsen är att försöka fastställa hur säkert Bluetooth är i dagens läge. Bluetooth har länge varit tillgängligt för att utbyta data över korta avstånd. Därför har man valt att implementera det i kommunikationsenheter som mobiltelefoner och laptops med mera. Det har funnits en debatt om hur säkert Bluetooth är. För att kunna genomföra denna undersökning så har vi satt oss in i hur Bluetooth fungerar, vilka allmänt tillgängliga attacker och implementationer av dessa, som finns. Vi har även testat några implementationer av de funna attackerna. I vår undersökning testade vi nio attackverktyg mot en implementation av den senaste version av Bluetooth. Värt att tänka på är att vi inte vet om de finns andra attackverktyg som fungerar på dagens Bluetooth-teknik. Vi kan fastställa att det är säkert ifall du följer de säkerhetskriterier som vi presenterar.
APA, Harvard, Vancouver, ISO, and other styles
5

Jonsson, Björn. "Bluetooth QoS Scheduler." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93114.

Full text
Abstract:
Bluetooth is a low cost, short-range radio technology that enables electronic devices to communicate wirelessly via ad-hoc networks. Different kinds of applications may run over these networks, some of these applications with particular Quality of Service (QoS) requirements. One such application could for instance be an Audio application which need data frames to be delivered at regular interval to work properly. The communication over Bluetooth links is totally controlled by one of the participating nodes. Since this node controls the traffic and thereby controls the QoS within the network its communicating behaviour is of great importance for maintaining QoS reservations. A central part in maintaining QoS reservations is the scheduler, which prioritises between different tasks to be done such as which device that is allowed to transmit next. There is no standardised way to implement the Bluetooth scheduler. However, a Bluetooth scheduler should be able to handle QoS reservations, maintain fairness among the participating nodes, and utilise the available bandwidth efficiently. Furthermore a key requirement in Bluetooth is simplicity, therefore a Bluetooth scheduling algorithm should be of low complexity. This master thesis presents a new patented solution for an intra-piconet scheduling algorithm that is capable of maintaining QoS reservation, while being fair and also meet the low complexity requirement. This algorithm is presented in detail in the thesis and has been implemented in an ns2- based Bluetooth simulator. Simulations in this simulator are presented that verifies the scheduling algorithms functionality.<br>Bluetooth är en standard för trådlös ad-hoc kommunikation. Denna standard definierar i antalet noder begränsade nätverk (piconet) som kan kopplas samman till större nätverk (scatternet). Många olika typer av applikationer kan tänkas använda dessa nätverk, vissa av dessa med speciella krav på Quality of Service (QoS). Ett exempel så en dylik applikation är ljudöverföringar som kräver att data överförs med jämna mellanrum för att kunna fungera tillfredställande. Kommunikationen över ett Bluetooth-piconet kontrolleras helt av en av de deltagande enheterna. Eftersom denna enhet kontrollerar trafiken kontrollerar den också upprätthållandet av QoS reservationerna. En central del i detta upprätthållande är schemaläggaren, som är den del i en Bluetoothenhet som prioriterar mellan olika saker som ska utföras. Ett exempel på en sådan prioritering kan vara vilken enhet i nätverket som ska få kommunicera härnäst. Bluetooth standarden beskriver inte hur denna schemaläggare ska implementeras. Grundläggande krav på en Bluetooth schemaläggare är att den ska kunna hantera och upprätthålla QoS reservationer samtidigt som den delar den befintliga kapaciteten på ett rättvist och effektivt sätt mellan de deltagande enheterna. Vidare bör den ha en låg komplexitet eftersom enkelhet är ett krav på alla delar i ett Bluetoothsystem. Detta examensarbete presenterar en ny patenterad algoritm för schemaläggning i begränsade Bluetoothnät som är kapabel att upprätthålla QoS-reservationer, samtidigt som den distribuerar den tillgängliga kapaciteten på ett rättvist sätt. Algoritmen möter också upp till kravet på låg komplexitet. Rapporten innehåller vidare simuleringar av algoritmens funktion, dessa har utförts i en ns2-baserad Bluetooth miljö och verifierar algoritmens funktionalitet.
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Changlei, and 劉長雷. "Bluetooth network design." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B29188635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Modigh, Fredrik, and Jerry Niva. "Bluetooth-USB-adapter." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-24783.

Full text
Abstract:
Detta examensarbete gick ut på att enligt utvecklingsprocessen på Motion Control utveckla en prototyp av en kabelersättare för en produkt på företaget; USB I/O. USB I/O är en mät- och styrenhet och datainsamlingsenhet för USB-porten med flera in- och utkanaler som i flera applikationer har som nackdel att den är kabelbunden. Tanken var att göra en enhet som man ansluter USB I/O till och som kan kommunicera direkt med konventionella ”Bluetooth-dongles” som är vanligt förekommande på konsumentmarknaden.Tre undersökningar gjordes. Den första var en marknadsundersökning för att se lämpliga systemkoncept samt vilka konkurrenter som kan finnas. Denna undersökning visade på att det inte fanns många produkter på marknaden som var nära det sökta konceptet. Efter detta följde två undersökningar, vilka hade som syfte att göra lämpliga val av kretsar till prototypen. Halvvägs i examensarbetet upptäcktes att oavsett val av Bluetoothmodul, skulle den kräva en modifiering av Bluetoothprofilen HID för att kunna använda vanliga ”dongles”. Detta skulle ta mycket längre tid eller kosta mer än projektbudgeten tillät. Utifrån detta valdes att planera in utveckling av ytterligare en enhet som ansluts till datorn, för att ersätta ”dongeln”.Examensarbetet resulterade i en prototyp bestående av två delsystem färdiga för vidareutveckling. Funktionstester där USB I/O kunde trådlöst anslutas till en dator med systemet visade på att delar av den sökta funktionen uppfyllts, men en stor del utveckling kvarstod.<br>This thesis work had the intention to acoording to the processes of Motion Control develop a prototype of a wireless cable replacer for an existing product, USB I/O. USB I/O is an I/O and data collection unit with a number of in- and outputs. It has in some applications the drawback that it is connected through a USB cable. The idea for the work was to create a unit to connect to USB I/O which has the capability to connect to any existing “Bluetooth dongle” on the market.Three investigations were made. The first was a market investigation to see potential system solutions and to find out any direct competitors. It showed that the existing market did not offer any large number of active similar products. After this, two investigations were made to find suitable components for the prototype. Half way in the thesis it came obvious that whichever Bluetooth module that could be chosen, a Bluetooth profile, HID, was needed and had to be modified in order to use the conventional “Bluetooth dongles”. This would make a great cost or effort in development time than the scope of the thesis work allowed. From this, a decision was made to also include development of an additional unit to connect to the computer side, which then would replace the “dongle”.The thesis resulted in a prototype consisting of two subsystems, however in need of further development, offering partly the intended functionality. The USB I/O could be started up on a computer wirelessly using the system.
APA, Harvard, Vancouver, ISO, and other styles
8

Dunning, John Paul. "Bluetooth Threat Taxonomy." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/76883.

Full text
Abstract:
Since its release in 1999, Bluetooth has become a commonly used technology available on billions of devices through the world. Bluetooth is a wireless technology used for information transfer by devices such as Smartphones, headsets, keyboard/mice, laptops/desktops, video game systems, automobiles, printers, heart monitors, and surveillance cameras. Dozens of threats have been developed by researchers and hackers which targets these Bluetooth enabled devices. The work in this thesis provides insight into past and current Bluetooth threats along with methods of threat mitigation. The main focus of this thesis is the Bluetooth Threat Taxonomy (BTT); it is designed for classifying threats against Bluetooth enabled technology. The BTT incorporates nine distinct classifications to categorize Bluetooth attack tools and methods and a discussion on 42 threats. In addition, several new threats developed by the author will be discussed. This research also provides means to secure Bluetooth enabled devices. The Bluetooth Attack Detection Engine (BLADE) is as a host-based Intrusion Detection System (IDS) presented to detect threats targeted toward a host system. Finally, a threat mitigation schema is provided to act as a guideline for securing Bluetooth enabled devices.<br>Master of Science
APA, Harvard, Vancouver, ISO, and other styles
9

Rinaldi, Simon. "Intelligent objects (contextual Bluetooth) /." Sion, 2006. http://doc.rero.ch/search.py?recid=8310&ln=fr.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Heimer, Anders, and Jonas Seffel. "Säkerhetsanalys av Bluetooth-kommunikation." Thesis, Karlstad University, Faculty of Economic Sciences, Communication and IT, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-387.

Full text
Abstract:
<p>Detta examensarbete beskriver resultatet av en undersökning av säkerheten hos Bluetooth</p><p>samt hur användning av Bluetooth-utrustade produkter kan påverka användarnas integritet.</p><p>Undersökningen har genomförts dels genom litteraturstudier och dels genom implementation</p><p>av en forskningsprototyp. Forskningsprototypen har använts vid ett experiment där vi</p><p>utrönt vilken information en Bluetooth-utrustad produkt avslöjar till en tredje part.</p><p>Vid experimentet har vi även försökt koppla ihop Bluetooth-utrustade produkter med</p><p>fysiska personer i syfte att visa möjligheterna att kartlägga människors rörelsemönster.</p><p>Resultatet av undersökning har visat att det finns flera säkerhetsbrister hos</p><p>Bluetooth-utrustade produkter, men att merparten av dessa inte beror på</p><p>Bluetooth-standarden utan på implementationen av den. Vidare dras slutsatsen att det</p><p>går att kartlägga människors rörelsemönster med hjälp av Bluetooth.</p><p>I uppsatsen beskrivs först Bluetooth-standarden, följt av en beskrivning av säkerheten hos Bluetooth.</p><p>Slutligen beskrivs implementationen av forskningsprototypen och resultatet av experimentet.</p><br><p>This report describes the result of an experiment that studies security and privacy issues in products</p><p>using Bluetooth. The study has been carried out by performing a literature study</p><p>and by implementing a research prototype. The research prototype has been used in an</p><p>experiment in which we examined the amount of information a Bluetooth equipped product reveals</p><p>when being used. We have also tried to correlate Bluetooth equipped products with their respective owners in the experiment.</p><p>This was done to investigate the possibilities of tracking peoples' movement patterns.</p><p>The result of the study shows that there exist several security flaws in Bluetooth equipped</p><p>products. However, the main part of the flaws are not a product of the Bluetooth standard. Instead, it</p><p>is the implementations of the Bluetooth standard that contains the security flaws. Further, we concluded that it</p><p>is possible to track peoples' movement patterns using Bluetooth.</p><p>The report starts with a description of the Bluetooth standard, followed by</p><p>a description of various aspects regarding Bluetooth security. Finally, the implementation of</p><p>the research prototype and the subsequent results from the experiment are described.</p>
APA, Harvard, Vancouver, ISO, and other styles
More sources
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography