23.03.2017 Views

wilamowski-b-m-irwin-j-d-industrial-communication-systems-2011

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

49-6 Industrial Communication Systems<br />

(a)<br />

(b)<br />

Master<br />

Slave<br />

FIGURE 49.2<br />

Bluetooth piconets.<br />

master device. The master device is used as the reference for <strong>communication</strong> between all the piconets,<br />

while any device can belong to multiple piconets. A piconet offers the same frequency-hopping channel<br />

to the connected devices.<br />

49.2.8.2 Scatternet<br />

Once a device belongs to multiple piconets, the master devices of the corresponding piconets need to be<br />

connected among themselves in order to make this access available, which ultimately forms a scatternet.<br />

The frequency distribution is simple and can work without interfering with others, as each piconet is<br />

responsible for the distribution to its connected devices (Figure 49.2).<br />

49.2.9 Bluetooth Security<br />

There are three modes of security for Bluetooth access between two devices.<br />

• Security Mode 1: Nonsecure<br />

• Security Mode 2: Service-level enforced security<br />

• Security Mode 3: Link-level enforced security<br />

It is the responsibility of the vendor to implement the security mode. The devices have a two-level<br />

security consisting of “trusted devices” and “un-trusted devices.” The trusted device can pair with any<br />

of the devices and has unrestricted access to the services.<br />

There are different levels of security in services as well, such as<br />

• Services that require authorization and authentication<br />

• Services that require authentication only<br />

• Services that are open to all devices<br />

In general, a personal identification number (PIN) is selected by the user, which must be a 48 bit<br />

number. Additionally, a private link key (128 bit random numbers) and a private encryption key (8–128<br />

bit) are used as a security measure for data transfer.<br />

49.3 Bluetooth Protocol Stack<br />

A protocol stack (often referred to as a <strong>communication</strong>s stack) designates a software implementation<br />

of a computer networking protocol suite. The modularization within the definition (suite) of protocols<br />

enhances design and evaluation. These protocols are commonly described as layers in a stack of protocols,<br />

the lowest protocol always being the low-level, physical interaction of the hardware, all the way to<br />

© <strong>2011</strong> by Taylor and Francis Group, LLC

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!