Provisioning a Bluetooth Mesh Network Part 2

mesh illustration over office buildings

Chapter 10 of the Bluetooth Mesh Networking Series In part 1 of this article, I introduced the provisioning bearer layer and the first three phases of the Bluetooth mesh provisioning process: beaconing, invitation, and exchange public keys. Beaconing: The unprovisioned device sends an unprovisioned device beacon if the PB-ADV bearer is supported, or it sends a connectable advertising packet if PB-GATT is instead being used. This indicates to the provisioner that it is ready to be provisioned. Invitation: Continue Reading

Provisioning a Bluetooth Mesh Network Part 1

mesh illustration in automotive factory

Chapter 9 of the Bluetooth Mesh Networking Series In May 2017, WannaCry, the world’s most notorious ransomware, actively attacked computers around the world and held user data for ransom. The attack effected millions of computers in 150 countries, with the software demanding ransom payments in the cryptocurrency Bitcoin. Without a robust standards-based security system design, comparable situations could happen with the Internet of Things (IoT). It’s not hard to imagine how users of IoT devices... Continue Reading

Bluetooth Mesh Networking: Friendship

woman in warehouse with tablet

Chapter 5 of the Bluetooth Mesh Networking Series Bluetooth Low Energy (LE) is one of the world's most power-efficient, short-range wireless communications technologies. Its low power consumption is widely praised by developers and consumers. With the release of Bluetooth mesh networking, developers may be wondering whether Bluetooth mesh has also been designed with low power consumption in mind. Does it inherit the beauty of the low power consumption of Bluetooth LE? The answer is yes, definitely! Continue Reading

What Bluetooth Developers Should Know About Android O

Android Robot

Google officially announced Android O on May 17 at its developer conference, Google I/O. Android O is now available to ordinary users. As in the past, Google had initially released a developer preview version, to give them an overview of the next generation of Android[1]. Let’s take a look at what Android O means for Bluetooth developers. First of all, I’d like to tell you how Android versions are named. Google uses letters of the alphabet, allocated at each new release in alphabetical order. Those... Continue Reading

Smart IoT 2017, Hong Kong

An audience enthralled with a Bluetooth SIG speaking engagement

Smart IoT Hong Kong is coming up on 24 May at the HKCEC and I have the pleasure of joining the event as a speaker.  At 14:10 on the 24th, I will speak on Bluetooth 5 and how it will power the beacon market. This is a topic I am passionate about as I have been blown away by the way the beacon market has become so popular.. Bluetooth beacons are specifically popular in the retail market.  According to ABI Research, the number of beacons will surpass 565 million by 2021. Beacon applications not only... Continue Reading

Bluetooth Pairing Part 5, Legacy Pairing – Out of Band

Bluetooth Pairing Part 5, Legacy Pairing – Out of Band

In previous blogs, we touched on topics such as Passkey Entry and Numeric Comparison which are two types of pairing methods. Today, I will introduce another one, out of band. The out of band (OOB) association model is designed for scenarios where an out of band mechanism is used to both discover the devices as well as to exchange or transfer cryptographic information which would be used in the pairing process. Out of band is a flexible option for developers that allows you to define some of your... Continue Reading

Exploring Bluetooth 5 - How Fast Can It Be?

Bluetooth 5 is here and it’s a major step up from the current standard for wireless connectivity, Bluetooth v4.2, with its 4-times longer range, 2-times higher speed, plus 8-times larger advertisement packet length for data. Developers can visit the Bluetooth SIG website and download the latest Bluetooth core spec here. Right after Bluetooth 5 was released, a developer asked me, “with the higher bandwidth feature, how fast can Bluetooth 5 be?” Today, we will have an inside look at Bluetooth low... Continue Reading

Bluetooth Pairing Part 4: LE Secure Connetions - Numeric Comparison

Part 3, we had an overview about LE Legacy pairing with passkey. Other than LE Legacy pairing, LE Secure Connections is the other option for pairing. LE Secure Connections is an enhanced security feature introduced in Bluetooth v4.2. It uses a Federal Information Processing Standards (FIPS) compliant algorithm called Elliptic Curve Diffie Hellman (ECDH) for key generation. For LE Secure Connections, it support four association models: Just Works Numeric Comparison (Only for LE Secure Connections) Continue Reading

How to Deploy Bluetooth Secure Gateway on Intel Edison

Bluetooth SIG released an advanced toolkit, the Bluetooth Secure Gateway, last September. With this toolkit, you can learn how to connect your Bluetooth devices to the Internet of Things. The hands-on labs in this kit will help you familiarize yourself with how to set up the popular ARM-based Raspberry Pi2/Pi3 to act as a secure gateway for your Bluetooth low energy devices. I became curious to see if there any other popular dev boards which could run the Bluetooth Secure Gateway aside from one... Continue Reading