scholarly journals The Bluetooth Mesh Standard: An Overview and Experimental Evaluation

Sensors ◽  
2018 ◽  
Vol 18 (8) ◽  
pp. 2409 ◽  
Author(s):  
Mathias Baert ◽  
Jen Rossey ◽  
Adnan Shahid ◽  
Jeroen Hoebeke

Mesh networks enable a many-to-many relation between nodes, which means that each node in the network can communicate with every other node using multi-hop communication and path diversity. As it enables the fast roll-out of sensor and actuator networks, it is an important aspect within the Internet of Things (IoT). Utilizing Bluetooth Low Energy (BLE) as an underlying technology to implement such mesh networks has gained a lot of interest in recent years. The result was a variety of BLE meshing solutions that were not interoperable because of the lack of a common standard. This has changed recently with the advent of the Bluetooth Mesh standard. However, a detailed overview of how this standard operates, performs and how it tackles other issues concerning BLE mesh networking is missing. Therefore, this paper investigates this new technology thoroughly and evaluates its performance by means of three approaches, namely an experimental evaluation, a statistical approach and a graph-based simulation model, which can be used as the basis for future research. Apart from showing that consistent results are achieved by means of all three approaches, we also identify possible drawbacks and open issues that need to be dealt with.

2018 ◽  
Author(s):  
Henrique Carvalho Silva ◽  
Cíntia Borges Margi

Bluetooth Low Energy (BLE for short) is among the favorites to become a de facto standard in the context of the Internet of Things (IoT). However, its main challenge is the lack of standards for efficient mesh networking. Furthermore, the literature lacks works analyzing energy consumption trade-offs for BLE mesh networks. We address this issue by experimentally evaluating three minimal topologies for linking separate BLE star networks. We aim to determine a lower boundary in terms of energy and performance costs using the metrics of energy consumption, delivery rate, and goodput. We perform our experiments using a testbed comprised of TI CC1350 nodes running Contiki OS. Our results enable us to estimate similar costs for large scale networks.


2016 ◽  
Vol 3 (1) ◽  
pp. 80-93 ◽  
Author(s):  
Lizette Weilbach ◽  
Machdel Matthee

In this paper the authors report on a socio-technical analysis of the change caused by an e-textbook implementation in a secondary school in South Africa. The Punctuated Socio-Technical Change (PSIC) model was considered because it affirms the socio-technical nature of existing educational research on ICT enabled change, and also extends it by recognising the episodic nature of change. On a vertical level the model allowed the authors to identify and distinguish between the factors and events which influenced the change in the organisation on four different levels. On a horizontal level, the model makes the disequilibrium between the socio-technical system components visible as they happen over time. Data was collected during the first phase of action research and analysed using the PSIC model. It is found that, despite the preparatory events leading to the full roll out, as well as the positive affordances of the new technology, the equilibrium of the socio-technical components of the work system was severely disrupted. The technology infrastructure did not support the e-textbook platform and the implementation of more than one platform clearly caused confusion. The experience of the teachers was that they were not offered sufficient support and that the e-textbooks they were expected to use, did not support the teaching and learning task. Consequently, the authors suggested some interventions to stabilise the socio-technical work system, of which some have already realised. As the ST-model used within the PSIC model fails to address the vertical gaps between levels in sufficient detail, the authors intend to apply ANT in future research to overcome this shortcoming.


2019 ◽  
Vol 11 (3) ◽  
pp. 1-22 ◽  
Author(s):  
Junaid Latief Shah ◽  
Heena Farooq Bhat ◽  
Asif Iqbal Khan

The Internet of Things (IoT) is seen as a novel paradigm enabling ubiquitous and pervasive communication of objects with each other and with the physical/virtual world via internet. With the exponential rise of sensor and RFID-based communication, much data is getting generated; which becomes arduous to manage given the constrained power and computation of low-powered devices. To resolve this issue, the integration of Cloud and IoT, also known as CloudIoT, is seen as panacea to create more heterogeneous smart services and handle increasing data demands. In this article, the authors examine and survey literature with a focus on the integration components of CloudIoT and present diverse applications including driving factors for CloudIoT integration. The article also identifies security vulnerabilities implied by the integration of Cloud and IoT and outlines some suggested measures to mitigate the challenge. Finally, the article presents some open issues and challenges providing potential directions for future research in this area.


Author(s):  
Kamal Arora ◽  
Deepinder Kaur

The Internet of Things (IoT) has emerged as an area of incredible impact, with the arrival of savvy homes, savvy cities, and savvy everything. For current and future research areas it is one of the hot topics involved by both industry sector and academia. The Internet of Things (IoT) also known as a web of everything or the economic Internet is a new technology paradigm imagine as a worldwide network and devices competent to interacting with each other. Privacy and security are the major challenges in the Internet of Things (IoT) security due to the distributed nature of IoT networks [1]. Internet of things (IoT) is an upheaval of the internet. IoT are often said the expansion of internet services. It provides a platform for communication between gadgets where gadgets can manage and organize themselves. The IoT allows everyone to be connected anytime and anywhere.


Sensors ◽  
2020 ◽  
Vol 20 (16) ◽  
pp. 4623
Author(s):  
Seyed Mahdi Darroudi ◽  
Carles Gomez

Bluetooth Low Energy (BLE) has become a major wireless technology for the Internet of Things (IoT). Recent efforts of academia, industry and standards development organizations have focused on creating BLE mesh network solutions. 6BLEMesh is a specification being developed by the IETF that defines an IPv6-oriented approach for BLE mesh networking. In this paper, we perform an experimental evaluation of 6BLEMesh, based on a real implementation. We evaluate latency, round trip time (RTT) and energy consumption. For the latter, we model the device current consumption, we determine the energy efficiency of communication, and we obtain the theoretical device lifetime (for battery-operated devices), for three different hardware platforms. Under the assumptions in our study (including a simple 235 mAh battery, and periodic data transmission), the maximum, asymptotic, device lifetime is 573 days, whereas battery-operated router devices can also achieve 3-digit lifetimes (in days) in many scenarios. Our results also illustrate the impact on performance of BLE-level and application-level parameter settings, adaptation layer mechanisms such as IPv6 header compression, and device hardware characteristics.


2020 ◽  
Vol 64 (1) ◽  
pp. 6-16 ◽  
Author(s):  
Sarah M. Meeßen ◽  
Meinald T. Thielsch ◽  
Guido Hertel

Abstract. Digitalization, enhanced storage capacities, and the Internet of Things increase the volume of data in modern organizations. To process and make use of these data and to avoid information overload, management information systems (MIS) are introduced that collect, process, and analyze relevant data. However, a precondition for the application of MIS is that users trust them. Extending accounts of trust in automation and trust in technology, we introduce a new model of trust in MIS that addresses the conceptual ambiguities of existing conceptualizations of trust and integrates initial empirical work in this field. In doing so, we differentiate between perceived trustworthiness of an MIS, experienced trust in an MIS, intentions to use an MIS, and actual use of an MIS. Moreover, we consider users’ perceived risks and contextual factors (e. g., autonomy at work) as moderators. The introduced model offers guidelines for future research and initial suggestions to foster trust-based MIS use.


2018 ◽  
Vol 3 (1) ◽  
pp. 22-32 ◽  
Author(s):  
Ernest Ezema ◽  
Azizol Abdullah ◽  
Nor Fazlida Binti Mohd

The concept of the Internet of Things (IoT) has evolved over time. The introduction of the Internet of Things and Services into the manufacturing environment has ushered in a fourth industrial revolution: Industry 4.0. It is no doubt that the world is undergoing constant transformations that somehow change the trajectory and history of humanity. We can illustrate this with the first and second industrial revolutions and the information revolution. IoT is a paradigm based on the internet that comprises many interconnected technologies like RFID (Radio Frequency Identification) and WSAN (Wireless Sensor and Actor Networks) to exchange information. The current needs for better control, monitoring and management in many areas, and the ongoing research in this field, have originated the appearance and creation of multiple systems like smart-home, smart-city and smart-grid. The IoT services can have centralized or distributed architecture. The centralized approach provides is where central entities acquire, process, and provide information while the distributed architectures, is where entities at the edge of the network exchange information and collaborate with each other in a dynamic way. To understand the two approaches, it is necessary to know its advantages and disadvantages especially in terms of security and privacy issues. This paper shows that the distributed approach has various challenges that need to be solved. But also, various interesting properties and strengths. In this paper we present the main research challenges and the existing solutions in the field of IoT security, identifying open issues, the industrial revolution and suggesting some hints for future research.


Author(s):  
Georg Menz

This chapter summarizes some of the book’s main arguments and provides avenues for future research. We point to the ideational turn as well as to culturally based enquiries into Comparative Political Economy as offering particular promise. Finally, this chapter additionally points to two major sources of societal and economic transformation, discussing in passing other major economic changes, such as increasing automation, advances in artificial intelligence, and the roll-out of robots across a variety of economic sectors. These two potentially explosive sources of change include energy security, a field in which the race for autarchy is juxtaposed with limits to the practical applicability of renewable energy sources. Environmental factors and environmental degradation similarly impose dramatic constraints to further economic development and might induce a dramatic reconfiguration.


Sign in / Sign up

Export Citation Format

Share Document