Bluetooth Solution Proposed in Control Networking: Silviu Popovici
Bluetooth Solution Proposed in Control Networking: Silviu Popovici
Bluetooth Solution Proposed in Control Networking: Silviu Popovici
267 - 274
Seria Tehnic
Abstract
The main objective of this paper is to propose some solutions in control networking environment based on Bluetooth wireless technology. The research is based on desk WPAN proposed for security reason and is focused on Bluetooth connectivity and propose a management infrastructure for sensitive data.
Introduction
Bluetooth technology is a cable replacement solution for mobile devices. This technology is designed for short and medium distances and is based on RF (Radio Frequency) technology like RFID and 802.11 wireless networks. Most users think the Bluetooth is just a simple wireless connection dedicated to gadgets like music players, portable video devices, etc. Bluetooth is more than that. Its a technology wide used in wireless networking, medical care, industrial environment and more other domains. Bluetooth technology is the only one technology who sold over 2 million unit devices in 10 years.
268
Silviu Popovici
In November 2004 it was released version 2.0 of Bluetooth specifications which introduces the EDR (Enhanced Data Rate) concept for faster data transfer. Bluetooth 2.1+EDR adopted in July 2007 by Bluetooth SIG introduced more interesting features: extended inquiry response, encryption pause resume, secure simple pairing and automatic creation of secure Bluetooth connections. The future of this technology is represented by version 3.0 Seattle, announced for adoption in first semester of 2009. The main features of these specifications will be the topology management thought automatic piconet configurations, Bluetooth information point with broadcast channel, and the alternate MAC/PHY which will provide an alternate connection via low power Bluetooth connection for idle devices or via low power per bits radio when a huge amount of data has to be transmitted. The efforts will be concerned into three distinctive directions: Bluetooth low energy, Bluetooth high speed (up to 480Mbps using UWB Ultra Wide Band techniques) and Bluetooth low cost [1].
269
Base Band (BB) - specifies or implements the medium access and physical layer procedures between Bluetooth devices, Link Manager (LM) - used to control and negotiate all parameters of the operation for Bluetooth connection between two devices, Host Controller Interface (HCI) which provides a command interface to the BB and LM layers and Logical Link Control and Adaptation (L2CAP) with capabilities of support for higher level protocol multiplexing, packet segmentation and reassembling [4]. Bluetooth communication topology is designed to act as a piconet. These mean two devices who want to initiate a connection must be synchronized first, and they act like master-slave communication. One master device could control up to 7 active devices and up to 127 parked devices. Parked devices are the devices that are in idle state. These could be instantly reactivated at a synchronization signal. If we have multiple piconets and one slave from a piconet act like a master in other piconet we say we have a scatternet (figure 2). The most important layer of communications in Bluetooth is L2CAP, which manage multiple types of connections. The needed protocols are RFCOMM, BNEP, SDAP and SSP [6].
Bluetooth security
Today's wireless desiderate is that the data are being invisibly sent from device to device and this data need to be securely sent. Bluetooth wireless technology is concerning on security while making connections between devices. Developers of the Bluetooth wireless technology products have some options for implementing security. There are three modes of security for Bluetooth access: non-secure, service level enforced security and link level enforced security. For devices and services there exist different security levels. Devices have two security levels: "trusted device" and "untrusted device". A trusted device has already been paired with other devices, and has unrestricted access to services [2]. For services there are defined three levels of security: services that require authorization and authentication, services that require authentication only and services that are open to all devices.
Silviu Popovici
The purpose of this scenario is to be an alternative for wired RS232, RS422 or RS485 connection. In this case two options are provided. First is to use an external Bluetooth adapter connected to a serial port of device. Second option is to use embedded adapters, connected internally. Bluetooth adapters emulate serial port and transfer data using the RFCOMM protocol. Another cable replacement option is addressing to the advanced devices that have built-in support for TCP/IP and WEB server. In this case PAN Profile is used and the Bluetooth stack is embedded in device. These permit HMI (Human Machine Interface) devices with PAN profile to access WEB interface of the device [8]. Combine Bluetooth and Internet technologies This scenario supposes a Bluetooth adapter is attached to the device. The adapter communicates with industrial device using an industrial protocol like Modbus. The device has also embedded WEB/WAP server. The WEB/WAP pages are accessed through Bluetooth via PAN and could be used to display dynamic data and to modify parameters [8]. Industrial Access Points Industrial Access Points (AP) require creating a wireless island with Bluetooth devices already connected to an existing wired network (figure 3). The wired network could be a standard Ethernet network or an industrial network. In this scenario more options may be used. For the first the wired network could be standard Ethernet, devices have embedded WEB servers and the pages are accessed via AP, which has a WEB interface with all connected devices. Another option is described as the AP acts like a dial-in AP using a modem or a GPRS technology. Data is transferred using a high level Bluetooth protocol. The other option is to have support for PAN and embedded WEB server into AP. In this case data are accessed from a Bluetooth device using a HMI. The communication protocol is on top of the Bluetooth stack and could invoke Bluetooth on L2CAP level [8].
Wireless sensors and actuators Sensors and actuators could be of different types. Some of them may have high level built-in intelligence and other could be simple input-output devices. In these conditions requirements could differ. Intelligent devices could include local functionality to maintain the process running if Bluetooth connection is lost. That is done by dividing control algorithm one part for supervisory control executed into a remote host and one part executed locally in device (designed for critical control). That could consist in a performance solution when the requirements are higher than Bluetooth performance. Also different processes have different requirements for Bluetooth solutions [8]. Industrial Requirements on Bluetooth The Bluetooth technology of today fits many current industrial applications, but there are some additional industrial requirements that will enhance the Bluetooth possibilities.
271
Industrial applications require support for an enhanced Quality of Service (QoS). Time stamping is an important issue. The Bluetooth module used in industry should be able to work from 40 to +80 degree Celsius, and must have a robust design. Power consumption is also a major issue since power is normally not available. A pure battery solution is, in some cases, not attractive. Alternative power solutions must be considered [8].
272
Silviu Popovici
Finally IP address must be set and pan daemon must be set too to listen for connection and act like NAP (Network Access Point) master or client. In this moment we will have a working Linux Bluetooth box. Installing Windows based machine and servers Since Windows XP SP2 Microsoft enabled Bluetooth support in operating systems core. But some Bluetooth devices are not recognized from Windows. In this case is necessary to install firmware drivers and application. Unrecognized devices are installed as standard devices and some services arent available. For our tests after, Windows base operating system was installed, I installed BlueSoleil application which provides drivers and support for many type of USB Bluetooth dongles to use with Yakumo dongle. For Belkin dongle I installed Widcom \ Broadcom application suite. Like for the Linux machine, each Windows based device must have set an IP address in the same network class. It is a good idea to not let the dynamic address allocation active on devices. IP address must be static allocated and manually configured.
273
Preparing PAN environment To install the ad-hoc PAN is necessary to follow some steps. First, devices must be paired. After that, devices must be set invisible and undiscoverable for security reason. Next step is to discover available services for every device. PAN service must be installed and connection could be made. Paired devices will recognize each other after pairing process is done. A good practice is to set a strong passkey for paired devices. Another way is to build a short data base with devices: names, MAC address, IP address and services. That could be stored in each device, but these require skills to build particular programs for connections. Finally, before connecting devices one with other, even in Windows and Linux machines must be created rules in firewall to accept PAN connection. After that connections could be made. Last step is to interconnect devices. Now, the ad-hoc Bluetooth PAN is build and we could test the solution.
Testing solutions
Particular settings must be made in different servers and workstations depending on service which will be accessed. For test purpose I used a web based sever hosted into a Win2k3 server. For this I created a rule in server firewall to accept incoming connections on port 80. Depending on the desired security level, rules could be created for each particular device which may request access to the server. In this way, connections may be limited to desired devices. I connected to the web server from various clients created on Bluetooth PAN and it worked (figure 8). In the same time in every Bluetooth device I created rules for ICMP requests and answers, so it was possible to test connections with ping application. That worked too for me. Some devices could fail in sending requests and receiving answers if one or more of these steps are skipped. After tests, ICMP services must be blocked for security reason. If these services remain active, although the discoverability of devices is turned off, devices may respond on ICMP scanner requests and the network could be discovered from unwanted users.
Conclusions
Following the results of my tests I propose an ad-hoc Bluetooth PAN solution for part or entirely of control network. It is possible to build Bluetooth islands into control network environment. Depending on area of controlled network could be used combined technologies wireless and wired. If its choosing usage of Bluetooth wireless technologies, then the solution must be well documented: device compatibility, class of devices and software used. Good start
274
Silviu Popovici
points are www.bluetooth.com and www.bluetooth.org, web sites of Bluetooth SIG, which contain complete lists of tested devices and software in conformity with the Bluetooth standard. In the mean time it is recommended for control network environment to use class 1 Bluetooth devices. This will allow a straight radio signal for short distances even in perturbed environment. Next generation of Bluetooth devices will complete the robustness with speed, but, also, will be compatible with old devices. In this way the solutions will be extensible and flexible.
References
1. 2. 3. F o l e y , M . How Bluetooth and 802.11 will team up to deliver high speed wireless connections. Wireless Net DesignLine, Bluetooth SIG, 2008. *** Core Specification v2.1 + EDR How it Works Security. http://www.bluetooth.com/Bluetooth/Technology/Works/Security, Bluetooth SIG, 2009. * * * Core Specification v2.1 + EDR How it Works Core System Architecture. http://www.bluetooth.com/Bluetooth/Technology/Works/Core_System_Architecture.htm, Bluetooth SIG, 2009. * * * BLUETOOTH SPECIFICATION Version 2.1 + EDR, Bluetooth Qualification Program Reference Document (PRD). http://www.bluetooth.com, Bluetooth SIG, (26 July 2007). * * * Core Specification v2.1 + EDR How it Works Profiles Overview. http://www.bluetooth.com/Bluetooth/Technology/Works/Profiles_Overview.htm, Bluetooth SIG, 2009. M u l l e r , N . Bluetooth Demistified. McGraw-Hill, Telecom, 2001. *** Frequency-hopping spread spectrum. http://en.wikipedia.org/wiki/Frequencyhopping_spread_spectrum, WIKIPEDIA The free Encyclopedia, 2009. C o n n e c t B l u e Industrial use of Bluetooth. Connect Blue AB, Sweden, 2001. * * * Bluetooth. http://en.wikipedia.org/wiki/Bluetooth, WIKIPEDIA The free Encyclopedia, 2009.
4. 5.
6. 7. 8. 9.
Copyright of Petroleum - Gas University of Ploiesti Bulletin, Technical Series is the property of Petroleum Gas University of Ploiesti and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use.