Bluetooth
1. What is Bluetooth?
1.1 Introduction
Bluetooth technology provides wireless connectivity among devices to exchange data and voice. Bluetooth is used radio frequency technology. It provides similar functionality like IrDA protocol, but Bluetooth has some significant advantages compared with IrDA. IrDA is popular in PC peripherals but it has several limitations. Those are short connection distance and line-of-sight requirements for connection. Bluetooth doesn’t have these limitations because of Radio Frequencies. Bluetooth can connect devices within up to 10m and that can be increased when the transmitter power is increased. Apart from that, devices don’t need to be line of sight and Bluetooth can connect devices through walls and also through non-metal objects. The other main advantage of Bluetooth is it can simultaneously handle voice and data. This caused to use Bluetooth for hand free headsets in mobile devices and various Internet applications. Meanwhile Bluetooth is relatively inexpensive, need less energy and it is automatic. That means it is not necessary to setting up the connection or pushes the start button.
1.2 History of Bluetooth
Bluetooth is initiated by Swedish company Ericcson in 1994 to eliminate wire connections in homes and offices. Then Bluetooth special interest group (SIG) is established by joining five major companies such as Toshiba, IBM, Intel, Nokia and Ericsson to further develop Bluetooth technology and promote it for commercial acceptance in February 1998. After that, SIG went global and invite other companies to join. Meanwhile they made the free access to Bluetooth. Then lots of companies started to use this technology and in December 1999 the four major companies join with SIG as promoters. Those are Microsoft, Agere Systems, 3com and Motorola.
1.3 Advantages of Bluetooth
• No longer to bound on fixed location
• Rid cables and make free space in offices and homes
• Communicate automatically
• Safety factor- It is very dangerous and illegal to use one hand to hold the cell phone while driving
• Less complexity in computer networks
• Cost effective
• Less energy consuming
• Ability to handle data and voice simultaneously
• There is an acknowledgment system guaranteed data transmission
• Easy and efficient to use
1.4 Applications of Bluetooth
• Connect computer peripherals such as PC, printer, scanner and fax machine wirelessly
• Bluetooth enabled digital cameras allow to send images from any location to any location
• Connect wireless headsets to mobile phone
• Have automatic synchronization among notebook, Desktop and mobile phone
• Portable land phone at home
• Wireless mouse and keyboards
1.5 Limitations of Bluetooth technology
• Slow transfer rate
This is fine to talk on wireless headset or synchronizing contacts, but when the large file is being transferred, that will take much time, because Bluetooth transfers data at about 3 megabits per second.
• Short communication range (up to 100m)
• Security problems
2. Latest and domestic developments of Bluetooth technology
2.1 Introduction
According to the Bluetooth official web site, Bluetooth technology turns 10 years old this year. The first commercial product of Bluetooth appeared after 2000. SIG indicates that Bluetooth enabled products are been increased by 13 folds every year.
2.2 Bluetooth Core Specification Version 2.1
New version of the Bluetooth specification has several new features to give benefits to users.
2.2.1 Improved pairing
New version of Bluetooth has fewer steps to make an initial connection with other devices than previous. New version eliminated the users come up with long personal identification numbers (PIN). Instead of that user gets 16 digit alphanumeric codes. This version supports to pair the mobile phone and headset very easier by clicking ‘Add Headset’ from the phone menu. New enhanced version gives more security and establishes the connection in few seconds.
2.2.2 Lower power consumption
Sniff Subrating feature is used to optimize the power consumption. This can increase the battery life of mice, keyboards, and medical device by up to five times.
2.3 Future of Bluetooth Technology
2.3.1 Ultra-wideband technology
The next version of Bluetooth technology will combine with the Ultra-wideband technology. As a result of that high-speed Bluetooth channels can be created. This will help to strength the position of Bluetooth.
Ultra-wideband technology based on the WiMedia standard, and it facilitates the make high speed interconnection in wireless devices. Ultra wideband is a convergence layer that provides underlying transport mechanism for different applications.
2.3.2 Linking Bluetooth and Wi-Fi
Bluetooth Technology will gain faster service next year by linking with Wi-Fi technology. This will make easier and faster to transfer large amount of images, videos and music among wireless devices. This new technology doesn’t have a name yet. Some products, like laptops, already combine Bluetooth and Wi-Fi functions, but they work off separate chips. Most likely, manufacturers will use single chips still under development that combine Bluetooth and Wi-Fi capabilities. The combination devices will use the regular low-power Bluetooth radios to recognize each other and establish connections. If they need to transfer a large file, they will be able to turn on their Wi-Fi radios, and then turn them off to save power after finishing the transfer.
2.4 Latest Applications of Bluetooth
2.4.1 Residential microwave ovens
Now Bluetooth microwave ovens are available. Microwave ovens and Bluetooth are used same frequency brands, but there was a doubt that microwave ovens might interference the Bluetooth network, because of its high power output. Finally researches discovered the Bluetooth devices tolerate the high level of interference. Power leakages of this kind of microwave ovens are limited by concerning about the user safety.
2.4.2 Stowaway Universal Bluetooth Keyboard
Almost any device those have Bluetooth technology support this new product (smart phones, PDAs, notebooks).
3. Impacts and implications of Bluetooth in e-commerce development and management
3.1 Introduction
Bluetooth is converted e-commerce into m-commerce (Mobile commerce). Mobile commerce is known as nest generation of e-commerce. M-commerce facilitates users to access Internet without need to find a place to plug-in. Today m-commerce is a more efficient way to communicate with customers because PDAs and smart phones are so popular among them.
3.2 M-commerce
M-commerce means buying and selling of goods services using wireless devices such as cellular phones and PDAs. M-commerce enables mobile phones to change currency using applications.
3.3 Mobile cash
This is a billing platform and this is used pay for online services and products using the mobile phones. This is much same with the process of paying online transactions using credit or debit card in e-commerce. But this will allow doing online transactions those who haven’t credit or debit cards. This is much easy to use.
3.4 Mobile banking
Mobile banking means perform banking transactions through mobile phones. Major Australian banks have delayed launching a mobile banking product because they were uncertain about whether it would be successful.
3.5 Bluetooth Marketing and advertising
Bluetooth Marketing is an effective channel through which to engage with consumers via the mobile device by offering premium mobile content associated with your brand. There are a number of different environments where Bluetooth can be used to encourage brand participation including out of home advertising sites, exhibitions and events, and retail environments.
3.5.1 Magic Beamer
Magic Beamer is a mobile marketing tool that enables business to start, run and customize their mobile campaign. This use Bluetooth technology to transfer data, therefore this is high efficient, high security and low cost. This tool allows transferring advertisements and information as a digital content to mobile phones and PDAs.
3.6 Bluetooth Marketing in Australia
3.6.1 Ford Australia
Ford Australia started to do mobile marketing by creating four separate interactive Bluetooth zones on its stand to promote four separate vehicle categories such as small cars, medium to large family sedans, Ute and SUVs. This allows Bluetooth enabled visitors to download animations, videos, ringtones and m-vouchers to each of vehicle category.
3.6.2 Breeze Tech
This is wireless mobile marketing technology company in Sydney Australia. This company provides location based marketing campaigns using Bluetooth technology. This provides service for all states in Australia.
4. Effects of Bluetooth on e-commerce
4.1 Introduction
Today e-commerce is very popular among lots people around the world. It gives lots of benefits to users. Now e-commerce is embedded with Bluetooth technology. Then this new scenario is called M-commerce. M-commerce gives lots of advantages to users than e-commerce.
4.2 Advantages to adopt Bluetooth technology for e-commerce
1. Mobile commerce is rapid approaching the business forefront. According to the research details m-commerce will be the dominant force in business and the society. The following graph shows increasing speed of m-commerce sales in Europe from 2001 to 2006.
Following graph shows the number of mobile subscribes and PC Internet users from 1996 to 2005.
2. E-commerce provides facility for users to access anyone at anytime, now m-commerce extends it with providing facility to access anyone in anywhere and anytime.
3. Security- M-commerce has specific end user device, which can offers specific level of inbuilt security. In M-commerce, the SIM card commonly uses as smart card that stores confidential user information such as user’s secret authentication key.
4. Location dependent services- Registered users can be localised using GPS or GSM technologies. Then location based services can be provided including local information services about hotels, travel information and emergency calls.
5. Convenience- Mobile phones are ideal tool for perform personal tasks because of its size and weight.
6. Personalization - Mobile phones are not shared between users. Personalized services can be offered according to specified user characteristics.
4.3 Disadvantages of M-commerce
1. Mobile devices have limited capabilities. These capabilities are depending on the version of mobile phones. Therefore the service must be adjusted accordingly.
2. Mobile devices are easier to theft. According to the government report more than 700000 mobile phones are stolen in UK each year
4.4 Security Challenges in M-commerce
• Confidential data can be obtained, anonymously, and without the owner's knowledge or consent, from some Bluetooth enabled mobile phones.
• Wireless communications are susceptible to eavesdropping. Mobile devices can be easily stolen.
• Secure m-commerce solutions with Bluetooth technology
• Data needs to be encrypted to protect m-commerce transactions. Also lost or stolen devices present a problem as one needs to make sure that the only the authorised user for the device can perform the transaction.
• Toshiba’s Bluetooth m-coupon application
5. Options and Priorities of designing Bluetooth M-commerce Applications
5.1 Compatibility and Interoperability
Various kinds of Bluetooth devices are available in the M-commerce environment from different vendors. These devices have compatibility problems. These compatibility problems might be depending on the software profiles which the installed in Bluetooth devices.
5.1.2 Research at UTS
These compatibility issues have experienced during the setting up of Bluetooth mobile enterprise within an existing WLAN laboratory at the University of Technology, Sydney. Pradhan, Lawrence, Das and Newton (2004) claim this research used
• Laptop 1(W2K) used a Bluetooth PCMCIA card
• Laptop 2(W2K) used a USB Belkin Bluetooth stub
• One PDA had inbuilt Bluetooth whilst the other used a plug-in Bluetooth attachment.
• Two types of Bluetooth enabled mobile phones: Sony Ericsson T68i with a Bluetooth headset and a Nokia 7650
Research found that,
• Initial setup on most devices reasonably simple
• The researchers did find incompatibility issues with devices (in particular the Nokia phone).
• Laptops which installed a Bluetooth PCMCIA card can quickly established the connectivity with PC after separated it by two walls and a hallway.
• Mobile devices face temporary loss of network connectivity when they roam. Bluetooth operates in the 2.4 GHz frequency there is potential for interference with other devices such as the 802.11 LAN and cell phones on the same frequency.
5.2 Solutions for Compatibility and interoperability problems
5.2.1 Case Study 1
Motorola
Motorola faced challenge to achieve compatibility and operability on their Bluetooth enabled mobile phones. According to the Motorola website, careful and methodological approach of Bluetooth architecture is required to achieve operability and compatibility in among Bluetooth devices.
Therefore Motorola has implemented a five split interoperability strategies,
• Inclusive system implementation - Motorola offers a comprehensive platform whose qualified components reduce the chance of interoperability problems due to component mismatch.
• TTCN-based development test framework - Formal test scripting language is used for exercise the solution at the HCI-and-below level. That can make solid implementation of the Bluetooth protocol.
• SIG standards participation – Motorola expanded their leadership position on the Bluetooth SIG for clarify and evolve Bluetooth features and also to assure early and frequent testing of reference implementations.
• Unplug Fest participation - At the SIG-sponsored Unplug Fests around the world. Motorola uses this for interoperability and making sure the components can be expected to function seamlessly in any environment.
• Informal testing - Motorola meet regularly with leading Bluetooth developers to clarify implementation questions and verify interoperability. These efforts have paid off. Quite simply, The Bluetooth Platform Solution from Motorola can be expected to give the highest level of interoperability available anywhere.
5.2.2 Case Study 2
Dell
Development of Bluetooth wireless technology, device services vary and interoperability problems between devices are not uncommon. In addition, the Bluetooth specifications body has added many profiles that address specific devices and market scenarios. This proliferation could tend to increase interoperability problems. As the technology matures, it is expected that most device types will converge on a common set of Bluetooth services so that these Interoperability problems reduce.
Dell's integrated Bluetooth solution carefully evaluates any software that accompanies new Bluetooth devices before installing it on their systems. The Dell Bluetooth solution supports many devices without the need to install an additional or replacement Bluetooth protocol stack.
5.3 Security
Security of wireless systems is anyway less compared with wired systems. Bluetooth devices have several threats and these threats can make criminals with misusing others sensitive data.
5.3.1 Threats in Bluetooth devices
5.3.1.1 Bluetooth Pairing Attack
Paring is a very important part of Bluetooth. Eavesdropping on PIN based paring process can be happen very rapidly and can easily get the PIN. Then attacker can potentially issue commands for the other device. In this case an attacker gains full access to memory content and becomes a trusted device.
5.3.1.2 The SNARF Attack
Bluesnarfing attacks mean unauthorised access of wireless devices through Bluetooth connection. Attackers attempt to connect to weakly secured phones and grab the data. In this case some makes of device, to connect to the device without alerting the owner of the target device of the request, and gain access to restricted portions of the stored data such as business cards, properties, change log, IMEI Number, which uniquely identifies the phone to the mobile network. This is normally only possible if the device is in "discoverable" or "visible" mode.
5.3.1.3 BACKDOOR Attack
The backdoor attack involves establishing a trust relationship through the "pairing" mechanism, but ensuring that it no longer appears in the target's register of paired devices. After connection is established attacker may be free to continue to use any resource that a trusted relationship with that device grants access. This means that not only can data be retrieved from the phone, but other services, such as modems or Internet, WAP and GPRS gateways may be accessed without the owner's knowledge or consent.
5.3.1.4 BLUEBUG Attack
The Bluebug attack creates a successive profile connection to the device. In BlueBug attacks can allow an attacker full access to a device to initiate calls, including premium rate phone calls to a premium line they have set up themselves. In this case Call forwarding diverts can be set up, allowing the owner's incoming calls to be captured, either to provide a channel for calls to more expensive destinations or for identity theft by impersonation of the victim.
5.3.1.5 BLUEJACKING Attack
Bluejacking is becoming a popular mechanism for exchanging anonymous messages in public places. The technique involves abusing the Bluetooth "pairing" protocol, the system by which Bluetooth devices authenticate each other, to pass a message during the initial "handshake" phase. This is not harmful. This has used for marketing purposes.
Example –Paris Hilton
Paris Hilton’s mobile phone was hacked. That was BLUESNARF attack and her mobile phone content ended up on the Internet. Some people suggest that attacker answered to the secret question of Paris and changed the password.
5.3.2 Evidence from Nokia
ZDNet indicate that Nokia has confirmed that some of its Bluetooth-enabled mobile phones are open to to "bluesnarfing," in which an attacker exploits a flaw to read, modify and copy a phone's address book and calendar without leaving any trace of the intrusion. Nokia said that a bluesnarf attack "may happen in public places, if a device is in the visible mode and the Bluetooth functionality is switched on. The phones vulnerable to 'snarf' attack include the Nokia 6310, 6310i, 8910 and 8910i phones.
5.4 Security Challenges of Bluetooth
5.4.1 Encryption data can easily crack
Most Bluetooth devices have encryption settings but those can be easily cracked with tools and techniques that are readily available on the internet. Businesses need to think very carefully about the information they store on a phone or PDA.
5.4.2 No centralized point for control security in temporary networks
Then Bluetooth to create a temporary network, it is usually an ad hoc network. That is, computers communicate directly with each other rather than going through a wireless access point (WAP). This means no centralized point of security control, as like in a WAP. Thus, security becomes a major concern because important data can be exposed to others on the Bluetooth network.
5.4.3 Risk of using Bluetooth handsets
Two security researchers say they have discovered a technique for taking control of Bluetooth-enabled mobile phones, even when the handsets have security features switched on.
The technique is a practical implementation of a technique described by Ollie Whitehouse of security firm @Stake last year, which allows an attacker with specialized equipment to connect to a Bluetooth handset without authorization. Once the connection is established, the attacker could make calls on the target's handset, siphon off data or listen in on data transfers between the device and, for example, a PC. Some security firms recommend financial traders avoid Bluetooth handsets because of the potential attack.
5.4.4 Hack the PIN Number while pairing
The original method required an attacker to listen in on the initial connection procedure between two Bluetooth devices-- called "pairing"-- which occurs only rarely. The new attack however allows an attacker to force two devices to repeat the pairing procedure, allowing the attacker to listen in and determine the identification code (PIN) used to protect the connection.
According to the Bluetooth specification, PINs can be 8-128 bits long. Unfortunately, most manufacturers have standardized on a four decimal-digit PIN. This attack can crack that 4-digit PIN in less than 0.3 sec on an old Pentium III 450MHz computer, and in 0.06 sec on a Pentium IV 3Ghz HT computer.
5.5 Case Study 3
AnZ bank.
AnZ bank is going to launch a browser based mobile banking system. This is the first bank that introduces this kind of service for their customers in Australia. This has developed by New Zealand Company called ‘M-Com’. M-banking is a complex process and it gives facility to use mobile phones to transfer money between accounts in the AnZ bank and also between the other accounts in Australia. AnZ faced two challenges to in this implementation.
Compatibility
One challenge was application compatibility among various mobile phones. AnZ tested their application on the different kinds of mobile phones available in the market and finally it developed system compatible with 76 mobile phones.
Security
Other major challenge was the security. As a solution for this mobile bank transactions are protected using SSL encryption. Apart from that customers will also need to use a security token from the bank to verify their identity. Manufacturer of this indicates that user information wasn't stored on the phone, so if a phone was lost or stolen an M-Banking account couldn't be accessed. And also SMSs do not contain any information identifying the customer.
5.6 Conclusion
Compatibility and security are the major sections those should be consider before implementing e-commerce application with Bluetooth technology. Bluetooth e-commerce applications must be compatible with maximum number of mobile devices in the market.
5. Future development of Australian eMarket
Currently e-commerce is popular among Australian society. Today people are very busy and they don’t like to travel and send more time for shopping. On the other hand, sellers also like to promote their products on e-commerce, because it is cheaper and easier for them. They don’t get trouble handle customers and also don’t need workers to supply customer service. E-commerce provides facility to buy anything at anytime. Now Bluetooth and other wires technologies have got together with e-commerce. Therefore now it calls as M-commerce. M-commerce expand e-commerce facilities by adding new term to it. That is anything, anytime and anywhere.
Mobile devices are very popular in the society. Therefore lots of people believe that M-commerce will be more efficient than e-commerce in future, because that is very convenient. Now AnZ bank is going to launch browser based M-banking system in Australia. Then AnZ customers can easily do the mobile transactions. Other leading banks in the Australia also try to open this new door for their customers. Then in future lots of sellers will like to establish m-commerce facility for their shops.
6. Final Conclusion
Bluetooth is a cheaper wireless technology. It utilizes radio frequency. Therefore Bluetooth has several limitations. Bluetooth technology will decrease these limitations by joining with Wi-Fi and ultra-wideband technology.
Now e-commerce is going to convert into M-commerce. Bluetooth can provide significant benefits for that. Bluetooth marketing is very effective marketing method because Bluetooth can provide location based marketing using GPS technologies. But these types of marketing strategies must be compatible with higher amount of Bluetooth devices. Therefore compatibility must be tested before start this kind of thing to get more benefits.
Apart from that Bluetooth can be used to for M-banking. Security is a major issue that should be considered in M-banking. Bluetooth is a wireless technology; therefore it can be easily caused to eavesdropping. Data must be encrypted before transmitting. Apart from that authorization is necessary to identify the user.
Mobile phones can be easily stolen. Therefore sensitive data must not be stored on the mobile phones. And M-commerce user’s identity information such as PIN shouldn’t be send as SMS.
Bluetooth is a valuable technology for future m-commerce development. But there are some issues those must be carefully consider before use the Bluetooth technology for the M-commerce.
Appendix
References
Bellevue, W. A., 2007, BLUETOOTH SIG ADOPTS NEW CORE VERSION 2.1 + EDR, Bluetooth SIG, viewed 31-Jul-2007, <‘http://bluetooth.com/Bluetooth/Press/SIG/BLUETOOTH_SIG_ADOPTS_NEW_CORE_VERSION_21__EDR.htm’>.
Bhagwat, P., 2001,’ Bluetooth: technology for short-range wireless apps’, IEEE computer society, Vol. 5 Issue 3, pp 96-103.
Dunlop, J. & Amanquah, N., 2005, ’ High capacity hotspots based on Bluetooth
Technology’, Vol. 152 Issue 5, IEEE computer society, pp 521-528.
Hager, C.T. & Midkiff, S.F., 2003, ‘An analysis of Bluetooth security vulnerabilities’, IEEE computer society, Vol.3, pp 20-20.
Guillermo A. F., Aditya K., Le P. & Mehul V.,2004, ‘An empirical study of Bluetooth performance’ ACM Digital Library, pp 82-94.
Kurnia, S., Heejin Lee & Song Y., 2007, ‘Understanding Consumers' Expectations of Mobile Data Services in Australia’, IEEE computer society, pp 14-14.
Jaap,H., Mahmoud N., Jon I., Olaf J. J. & Warren A.,1998,’ Bluetooth: vision, goals, and architecture ’, ACM Digital Library, Volume 2 Issue 4,pp 42-50.
Mahesh, S., 2008, ANZ starts rush to mobile banking, Australia, Viewed on 29-March-2008, <’ http://www.australianit.news.com.au/story’>
Mindi M & Matt L, 2005, Understanding Bluetooth Technology,<’ htps://www.pffbank.com/index.htm’>.
McLane, J., 2008, BMW Bluetooth Technology, Australia, <’ http://www.motorpoint.com.au’>.
Munir, K., 2004, Nokia: Bluetooth flaw gnaws at phone security, ZDNet, UK, viewed 10-Feb- 2004, <’ http://www.zdnet.com.au/news’>.
Myra, D., 2003, ‘Bluetooth: a technical overview’, ACM Digital Library, Vol. 9 Issue 4 pp 82-94.
Pradhan, S., Lawrence, E., Das, J. & Newton, S.2004, ‘Bluetooth potential in the m-enterprise: a feasibility study’, IEEE computer society, Vol.2 Issue 38, pp 746-751.
Sairam, K. V. S. S. S. S., Gunasekaran, N. & Reddy, S. R., 2002, ‘Bluetooth in Wireless Communication’, IEEE computer society, Vol. 40 Issue 6,pp 90-97.
Savvas, A., 2007, Bluetooth 'poses serious threat to business, UK, viewed 29-March- 2007, < ‘http://www.computerweekly.com’>.
Senn, J.A, 2000, ‘The emergence of m-commerce’, IEEE computer society, Vol 33 Issue12, pp 148-150.
Shore, R., Miller, A. B., 2005, ‘The Bluetooth Technology: Merits and Limitations’, IEEE computer society, pp 80-85.
Wang, J.J.,Song, Z.; Lei, P. & Sheriff, R.E.,2005,’ Design and Evaluation of M-Commerce Applications’, IEEE computer society ,pp 745-749.
Wang, W., 2002, ‘Bluetooth: a new era of connectivity’, IEEE computer society, Vol. 3 Issue 3, pp 38-42.
Yan, S.Y. & James, G., 2005, ‘Secure Electronic and Mobile Commerce’, IEEE computer society, Vol 2, pp 654-659.
Yonghee, S., Hyori J. & Munkee C., 2006, ‘Analysis of the Consumer Preferences toward M-Commerce Applications Based on an Empirical Study’, IEEE computer society, pp 654-659.
Tuesday, June 3, 2008
Create Image Map using Applets for shopping cart
I created shopping cart using java Applets, PHP and HTML.
We need java run time to run the applet in browser. MS explorer has java console.
This is the HTML file--> In here each param value is passed according to a special format. That value tokenize using that format in the applet.
|
Subscribe to:
Posts (Atom)