2019
DOI: 10.3390/fi11090194
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: Bluetooth technology started off as a wireless, short-range cable replacement technology but it has undergone significant developments over the last two decades. Bluetooth radios are currently embedded in almost all computing devices including personal computers, smart phones, smart watches, and even micro-controllers. For many of us, Bluetooth is an essential technology that we use every day. We provide an insight into the history of Bluetooth and its significant design developments over the last 25 years. We… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
18
0
2

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 41 publications
(20 citation statements)
references
References 41 publications
0
18
0
2
Order By: Relevance
“…Several technologies can be deployed for connecting IoT devices at the physical level [2,[16][17][18][19]. The new 802.11ax standard [20] is considered the most suitable standard for IoT, allowing high throughput and reducing the connected devices' energy consumption.…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…Several technologies can be deployed for connecting IoT devices at the physical level [2,[16][17][18][19]. The new 802.11ax standard [20] is considered the most suitable standard for IoT, allowing high throughput and reducing the connected devices' energy consumption.…”
Section: Proposed Algorithmmentioning
confidence: 99%
“…Zeadally et al. in [11] has provided a detailed discussion on issues and possible attacks on Bluetooth technology. GPS, on the other hand is not secure by its inherent nature.…”
Section: Issues and Challenges In Mobile Contact Tracingmentioning
confidence: 99%
“…Though Zeadally et al. in [11] has categorized and further discussed a full taxonomy of attacks on Bluetooth. For brevity, we discuss some attacks that we feel are common to this setting and then we briefly write about its possible countermeasures.…”
Section: Possible Attacks On Contact Tracing Solutions and Their Counmentioning
confidence: 99%
“…Bear in mind that, although initially the main requirement for the reach of the system was to cover an area of 50 × 50 square meters, XBee PRO S1 802.15.4 communication modules provide a longer reach, which allows the system to be deployed in wider areas. This is in contrast to other short-range wireless technologies, like Bluetooth, which despite providing higher data rates, have less reach and a higher power consumption [12,[51][52][53]. The software developed for the base station constitutes a visual interface to control and monitor the wireless wind sensing devices during an on-field data-acquisition session.…”
Section: Wireless Wind Sensing Devices Each Wireless Wind Sensing Devmentioning
confidence: 99%