Open Access. Powered by Scholars. Published by Universities.®

Digital Communications and Networking Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 13 of 13

Full-Text Articles in Digital Communications and Networking

Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan May 2022

Using Bluetooth Low Energy And E-Ink Displays For Inventory Tracking, David Whelan

Computer Science and Computer Engineering Undergraduate Honors Theses

The combination of Bluetooth Low energy and E-Ink displays allow for a low energy wire-less display. The application of this technology is far reaching especially given how the Bluetooth Low Energy specification can be extended. This paper proposes an extension to this specification specifically for inventory tracking. This extension combined with the low energy E-Ink display results in a smart label that can keep track of additional meta data and inventory counts for physical inventory. This label helps track the physical inventory and can help mitigate any errors in the logical organization of inventory.


Intelligent Internet Of Things Frameworks For Smart City Safety, Dimitrios Sikeridis Nov 2021

Intelligent Internet Of Things Frameworks For Smart City Safety, Dimitrios Sikeridis

Electrical and Computer Engineering ETDs

The emerging Smart City ecosystem consists of a vast edge network of Internet of Things (IoT) devices that continuously interact with mobile devices carried by its citizens. In this setting, the IoT infrastructure, apart from the main communications facilitator, acts as a crowdsourcing mechanism that collects massive amounts of user data, and can support public safety applications for the Smart City. In this thesis, we design and analyze learning mechanisms that extract intelligence from crowd interactions with the wireless IoT infrastructure, and optimize its energy efficiency while operating as a public safety network. First, we deploy a multi-story facility testbed …


Enumerating And Locating Bluetooth Devices For Casualty Recovery In A First-Responder Environment, Justin M. Durham Mar 2021

Enumerating And Locating Bluetooth Devices For Casualty Recovery In A First-Responder Environment, Justin M. Durham

Theses and Dissertations

It is difficult for first-responders to quickly locate casualties in an emergency environment such as an explosion or natural disaster. In order to provide another tool to locate individuals, this research attempts to identify and estimate the location of devices that would likely be located on or with a person. A variety of devices, such as phones, smartwatches, and Bluetooth-enabled locks, are tested in multiple environments and at various heights to determine the impact that placement and interference played in locating the devices. The hypothesis is that most Bluetooth devices can be successfully enumerated quickly, but cannot be accurately located …


Long Distance Bluetooth Low Energy Exploitation On A Wireless Attack Platform, Stephanie L. Long Mar 2021

Long Distance Bluetooth Low Energy Exploitation On A Wireless Attack Platform, Stephanie L. Long

Theses and Dissertations

In the past decade, embedded technology, known as the Internet of Things, has expanded for many uses. The smart home infrastructure has drastically grown to include networked refrigerators, lighting systems, speakers, watches, and more. This increase in the use of wireless protocols provides a larger attack surface for cyber actors than ever before. Wireless loT traffic is susceptible for sniffing by an attacker. The attack platform skypie is upgraded to incorporate Bluetooth Low Energy (BLE) beacon collection for pattern-of-life data, as well as device characteristic enumeration and potential characteristic modification. This platform allows an attacker to mount the skypie to …


Fitness Plug, Evan Lee Ashley Jun 2020

Fitness Plug, Evan Lee Ashley

Computer Engineering

My parents only allowed me to play videogames or watch television for a certain number of minutes or hours per day. By limiting screen time, they encouraged me to be active and find other things to do outside of television or videogames. The Fitness Plug aims to do both by converting time exercised to entertainment time; you can only watch television or play videogames for as long as you have exercised.


Oluso, Diego Fernandez, Tyler Heucke, Nishant Mattu, Michael Roesch Jun 2016

Oluso, Diego Fernandez, Tyler Heucke, Nishant Mattu, Michael Roesch

Computer Engineering

Oluso is a new startup offering affordable, inexpensive technology to empower the individual. Our product is designed to keep the user in contact with someone close to them in emergency situations. Over the course of the past several months we have performed interviews with both individuals who may be interested in this product as well as organizations who may be interested in purchasing this product for their members. Our product is nearing completion and all of the companies we have interviewed have displayed a significant amount of interest in our product. The combination of easy communication and peace of mind …


A Multi-Carrier Collaborative Solution To Minimize Connectivity-Loss, Michael Wong Jun 2016

A Multi-Carrier Collaborative Solution To Minimize Connectivity-Loss, Michael Wong

Master's Theses

Nearly two-thirds of Americans own a smart phone, and 19% of Americans rely on their smartphone for either accessing valuable information or staying connected with their friends and family across the globe [15]. Staying always-on and always-connected to the Internet is one of the most important and useful features of a smartphone. This connection is used by almost every single application on the device including web browsers, email clients, messaging applications, etc. Unfortunately, the cellular networks on our smartphones are not perfect and do not always have cellular signal. Our devices often lose Internet connection when users are on the …


Bluelock: A Secure Bluetooth Operated Padlock, Trever Mckee Jun 2013

Bluelock: A Secure Bluetooth Operated Padlock, Trever Mckee

Computer Engineering

For this project a secure, battery operated, Bluetooth operated padlock was created. The project included both the hardware to integrate with a padlock and an Android application used to interface with the hardware. In order to make the padlock secure both AES encryption and challenge response authentication were used for secure message passing between the device and the Android phone. The project also included power consumption and sustainability tuning including exploring Arduino sleep states and integrating the project with a solar charging unit.


Bluebeats, Jake Muir, Aaron Martinez, Mishal Shah, Richard Wissemann May 2012

Bluebeats, Jake Muir, Aaron Martinez, Mishal Shah, Richard Wissemann

Computer Engineering

Our group’s senior project is called BlueBeats. The BlueBeats product was created in order to provide a wireless audio gateway between Bluetooth enabled devices. Users of BlueBeats can use an Android or computer application to interface with the BlueBeats device. The Android and computer applications allow the user to easily scan for devices, add/remove devices from their personal list, and pair/connect with a selected Bluetooth enabled device. Once the user is connected to the BlueBeats device, he/she has two options. The first option occurs when the user connects the BlueBeats device to a device with speakers (using 3.5mm audio jack …


Bluebeats, Aaron Martinez, Jake Muir, Mishal Shah, Richard Wissemann May 2012

Bluebeats, Aaron Martinez, Jake Muir, Mishal Shah, Richard Wissemann

Computer Science and Software Engineering

Our group’s senior project is called BlueBeats. The BlueBeats product was created in order to provide a wireless audio gateway between Bluetooth enabled devices. Users of BlueBeats can use an Android or computer application to interface with the BlueBeats device. The Android and computer applications allow the user to easily scan for devices, add/remove devices from their personal list, and pair/connect with a selected Bluetooth enabled device. Once the user is connected to the BlueBeats device, he/she has two options. The first option occurs when the user connects the BlueBeats device to a device with speakers (using 3.5mm audio jack …


Bluemote!, Philip Kaye Mar 2012

Bluemote!, Philip Kaye

Computer Engineering

In today’s society, our mobile phones are an extremely useful device when we are on the go and away from our homes; however, when we return home, our smart phone becomes just a communication tool again. Home automation is inevitable, and it will find its way into every house. The first person to commercialize it to the point where it is as easy to set-up and as affordable as a home router will end up breaking this slow trend. The key to this success is the smart phone; this should end up being the most expensive piece of hardware for …


Bluetooth "Clicker": Response Pads For Large Classes, Using Bluetooth Devices, Dana Goyette Jun 2010

Bluetooth "Clicker": Response Pads For Large Classes, Using Bluetooth Devices, Dana Goyette

Computer Engineering

When teaching classes with many students, many teachers opt to use “Clicker” devices to electronically poll students. This project aims to replace these “Clicker” devices with standard Bluetooth devices. The overall goal of this project is to create a framework for two-way communications between a base station and multiple remote devices.


Computational Public Safety In Emergency Management Communications, Cristina Ribeiro, Alexander Ferworn Jan 2010

Computational Public Safety In Emergency Management Communications, Cristina Ribeiro, Alexander Ferworn

Publications and Scholarship

Communications are very important in any situation but in emergency management it is imperative that the communications be reliable and responsive to the evolving situation. In emergency management there are many different types of networks with different objectives. It is of immense value to have the ability to seamlessly integrate other networks and computing resources into one interconnected heterogeneous network. The entire management team should be able to access any of the individual networks and their resources. In this paper we discuss various wireless network communication options in the context of their viability for use in emergency management. We analyze …