You are on page 1of 35

VISVESVARAYA TECHNOLOGICAL UNIVERSITY

“JNANASANGAMA” BELAGAVI-590018
KARNATAKA

TECHNICAL SEMINAR REPORT


ON
“BLUETOOTH MESH NETWORKING”

SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS


FORTHE AWARD OF THE DEGREE OF

BACHELOR OF ENGINEERING
IN
ELECTRONICS AND COMMUNICATION ENGINEERING

Submitted by:
VARSHINI SL
1CG17EC095

Under the Guidance of HOD

Mrs. Ankitha B M Dr. Nagananda M S M.Tech., PhD


Assistant Professor, Professor& Head,
Dept. of ECE Dept. of ECE,
C.I.T,Gubbi,Tumkur C.I.T,Gubbi,Tumkur

Channabasaveshwara Institute of Technology


(Affiliated to VTU, Belagavi & Approved by AICTE, New Delhi)
(NAAC Accredited &ISO 9001:2015 Certified Institution)
NH 206 (B.H. Road), Gubbi, Tumkur – 572216. Karnataka

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING


2020-21
Channabasaveshwara Institute of Technology
(Affiliated to VTU, Belagavi & Approved by AICTE, New Delhi)
(NAAC Accredited &ISO 9001:2015 Certified Institution)
NH 206 (B.H. Road), Gubbi, Tumkur – 572216. Karnataka.

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING


2020-21

CERTIFICATE

This is to certify that the technical seminar entitled “Bluetooth Mesh


Networking” has been carried out by Varshini S L -[1CG17EC095]
bonafide student of CHANNABASAVESHWARA INSTITUTE OF
TECHNOLOGY, GUBBI, TUMKUR, in partial fulfillment of the
requirement for the award of the degree Bachelor of Engineering in
ELECTRONICS AND COMMUNICATION ENGINEERING from the
Visvesvaraya Technological University, Belagavi during the year 2020-
21. It is certified that all corrections/suggestions indicated during Internal
Assessment have been incorporated in the report. The technical seminar
report has been approved as it satisfies the academic requirements in respect
of Technical Seminar prescribed for the said degree.

Signature of Guide Signature of the seminar Coordinator

Mrs. Ankitha B M Mr. Sekar


Assistant Professor, Assistant Professor,
Dept., of ECE Dept., of ECE
C.I.T, Gubbi. C.I.T, Gubbi.

Signature of HOD Signature of Principal

Dr. Nagananda SM M.Tech, PhD Dr. Suresh D S MTech. PhD


Professor & Head, Director & Principal
Dept., of ECE, C.I.T, Gubbi ,Tumkur
C.I.T, Gubbi, Tumkur
.
C.I.T, Gubbi.
Channabasaveshwara Institute of Technology
(Affiliated to VTU, Belagavi & Approved by AICTE, New Delhi)
(NAAC Accredited &ISO 9001:2015 Certified Institution)
NH 206 (B.H. Road), Gubbi, Tumkur – 572216. Karnataka.

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING

2020-21

UNDERTAKING

I VARSHINI SL bearing 1CG17EC095, student of VIII Semester


B.E. in ELECTRONICS AND COMMUNICATION ENGINEERING, C.I.T,
GUBBI, TUMKUR hereby declare that technical seminar entitled
“Bluetooth Mesh Networking” embodies the report of my technical
seminar work carried out independently by me under the guidance of
Mrs. ANKITHA B M, ASSISTANT PROFESSOR, DEPT. OF
ELECTRONICS AND COMMUNICATION ENGINEERING, CIT, Gubbi as

partial fulfillment of requirements for the award of the degree Bachelor


of Engineering by Visvesvaraya Technological University, Belagavi
during the academic year 2020-21.

Place: GUBBI VARSHINI SL


Date: 12-06-2021 1CG17EC095
Channabasaveshwara Institute of Technology
(Affiliated to VTU, Belgaum & Approved by AICTE, New Delhi)
(NAAC Accredited &ISO 9001:2015 Certified Institution)
NH 206 (B.H. Road), Gubbi, Tumkur – 572216. Karnataka.

DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING


2020-21

BONAFIDE CERTIFICATE

This is to certify that the technical seminar entitled “BLUETOOTH MESH


NETORKING” is a bonafide work of VARSHINI S L - 1CG17EC095,
student of VIII semester B.E. in ELECTRONICS AND COMMUNICATION
ENGINEERING carried out at Channabasaveshwara Institute of
Technology, Gubbi, Tumkur, in partial fulfillment of the requirements for
the award of degree B.E., in ELECTRONICS AND COMMUNICATION
ENGINEERING of Visvesvaraya Technological University, Belagavi

under my supervision and guidance.

Guide

Mrs. Ankitha B M
Assistant. Professor
Dept., of ECE
C.I.T, Gubbi.
ACKNOWLEDGEMENT

A GREAT DEAL OF TIME AND LOT OF EFFORTS have gone into completing this

technical seminar and documenting it. The number of hours spent in getting through

various books and other on-line materials related to this topic chosen by me have

reaffirmed its power and utility in CIT-Learning Resource Centre, CIT, Gubbi .

Several special people have contributed significantly to this effort. First of all, I am

grateful to my institution, Channabasaveshwara Institute of Technology, Gubbi,

which provides me an opportunity in fulfilling my most cherished desire of reaching my

goal.

I acknowledge and express my sincere thanks to our beloved Director & Principal, Dr.

Suresh D S, for his many valuable suggestion and continued encouragement by

supporting me in my academic endeavors.

I, express my sincere gratitude to Mr.Nagananda M S, Professor and Head,

Department of Electronics and Communication Engineering for providing his

constructive criticisms and suggestions.

I, extend my gratitude to my seminar guide Mrs.Ankitha B M, Assistant Professor,

Department of Electronics and Communication Engineering, for her guidance,

support and suggestions throughout the period of this technical seminar.

Finally, I would like to express my sincere thanks to all our teaching and non-teaching

staff; they were extremely helpful in assisting me in using the excellent facilities of the

institute.

Varshini S L [1CG17EC095]
BLUETOOTH MESH NETWORKING

Abstract:

Bluetooth is a wireless which exchanges the data for short distance without the need of
wires or cables. Bluetooth mesh is a connecting of the low energy devices. Bluetooth
mesh network is a many to many connection for large devices. Bluetooth is used for
commercial building, factories; mobile phones etc.It will be operate to surround the
message for communication. Mesh network is sensor which has a capability of collecting
the information such as temperature, humidity, pressure, gas. In past few years, factories
have changed their mind set to improve their productivity by machines other than the man
kind. So, they choose different technologies such as Smart Factory.

Smart Factory is a self improvement or it works automatically. Connectivity in


smart factory is the main thing which enables the effective information to increase the
controlling of the machines in a factory. It is mainly the production of products with the
use of machines but it doesn’t use the workers .In this smart factory, machines reduces
the time and makes the better production at lower costs. IoT is used for the managers to
get the information and to think about the details to make the decision about the
efficiency of the productivity. Indoor positioning is used to find the exact position of
people or the objects. It will be providing new sensors to the mesh network. Downstream
communication with the sensor devices it can also be carried out. The data can be sending
from the network service provider to the customers. This can be implemented from the
sensors and also the machinery instantaneously.

Smart Factory improves the production, provides greater access to the information
and new method, it also saves money which can also be invests to the products
development. Industries are always looked up for new technologies which brings profit
for which they invest money for the products. It is one of the main things for the future
industry using bluetooth technology. After the collection of the information through
sensors, robots and machines these are used simultaneously. Augmented reality
Dashboard activates the who gives the security for the smart factory to know the sensors
situation at a particular position at instantaneously. The main issues in the industry to
develop rules and regulations are how the accuracy is restricting for the technique which
is already adopted by the industry. In this way, Smart Factory is used for the industries to
get profit at less time with less amount of money. 1
TABELS OF CONTENTS

Chapters Particulars Page No.

1 Introduction 1-4

Bluetooth Mesh Standard


2.1. Bluetooth Mesh Concept 5
6
2.2. Bluetooth Mesh Topology
8
2.3. Bluetooth Mesh Stack 9
2 2.4.Bluetooth Mesh Communication
Basics

3 Smart Factory 10-13

4 Methodology 14-15
Smart Manufacturing Using Bluetooth 16-18
5 Mesh Networking

6 Bluetooth Security 19-21

7 Conclusion 22
References 23
LIST OF FIGURES

Sl Figures Figures Page


No. No. No.
1 1.1 Bluetooth Mesh 1
2 1.2 Machines Connected By Bluetooth Mesh 3
2.1 Conceptual definition of the Bluetooth Mesh Standard
3 through a publish/subscribe model 5
4 2.2 An example of each optional feature within the 6
Bluetooth Mesh standard.
5 2.3 The layered architecture of the Bluetooth Mesh 8
Standard
An example of the underlying wireless communication 9
6 2.4 between two nodes in a Bluetooth Mesh network
7 3.1 Architecture of Smart Factory 10
8 3.2 Smart workstation 12
3.3 Five key points of Smart Factory 13
9
4.1 Methodology 14
10
Architectural Overview of Smart Manufacturing based 16
11 5.1 on Bluetooth Mesh Networking

12 5.2 Sensor data of Smart Factory 18


13 6.1 Man-in-the-Middle (MITM) attack on Bluetooth. 20
BLUETOOTH MESH NETWORKING [2020-21]

CHAPTER 1
INTRODUCTION
Bluetooth which is a recently proposed standard for wireless communication over
short range is consuming less power. Initially, it was thought of as a wire replacement
technology. Most commonly described application of Bluetooth is its use as a “cordless
computer” which consists of several devices that include a Personal Computer (PC) that
possibly may be a laptop, mouse, keyboard, printer, joystick, scanner, etc., each of which is
equipped with a Bluetooth card. No cable connections are there between these devices and
Bluetooth enables seamless wireless communication link between all of them, importantly
replacing which is today achieved through use of combination of parallel and serial cables or
infrared links. Apart from this Bluetooth has the potential to be used for much more than a
technology for wire replacement. Low cost and low power consumption make it an attractive
solution typically for the mobile devices. Fact is that, every Bluetooth device is having both
master and slave hardware. The network is called as piconet, which means a small network.
When number of slaves is only one, then link is called as point-to-point. In a point-to-
multipoint configuration up to seven active slaves can be controlled by a master. Slaves never
communicate directly with each other but instead communicate with the master only. Because
of timing piconet members cannot transmit simultaneously, hence jam problem is not there
between these devices.

Fig 1.1: Bluetooth Mesh

Dept.of ECE, CIT, Gubbi Page 1


BLUETOOTH MESH NETWORKING [2020-21]

Smart Factory is a term that describes “an environment where machinery and
equipment are able to improve processes through automation and self-optimization”. With
this, different parts of the production system, in particular the shop-floor can now be
connected via Internet of Things (IoT) technologies, thus enabling the exchange of
information and actuation of commands in real time to optimize the operations. Over the
years, factory manufacturing has evolved to increase efficiency in operations transiting from
manual work processes to the introduction of machinery. Industry 4.0 is regarded as a new
way of manufacturing today, as it has the capability to exploit digital technology with
machinery to optimize operations and collection of data to accelerate automation in a factory
setting. Real-time data can be collected through smart sensors, robots and machines that are
used simultaneously in the production and assembly line. The collected data are then used for
further analysis to optimize the production workflow, to perform predictive maintenance, and
to keep track of the factory production processes in real time.

Even though, it has been years since the introduction of the Industry 4.0 in, there has
been multiple challenges in integrating it into the current manufacturing systems within the
factories of today. Industry is slow to adopt this technology because replacing existing assets
with Industry 4.0-enabled assets can be complex and that it requires time. Activities around
the management of production processes include a low-level control layer (LLC) which
facilitates real time responsiveness and a high-level control (HLC) layer which makes
decisions that impact the overall goals of the system as a whole. The LLC is responsible for
providing information about the state of the production at current time and important
diagnostics data, e.g., errors and failures, to the HLC which then triggers the HLC to make
intelligent decisions automatically, e.g., scheduling of machine maintenance. This paper
proposes the use of Bluetooth wireless mesh networking to implement smart factory
connectivity, with an aim to

● Establish a sensor network to collect data to be analyzed by an IoT platform


● Enable downstream communication from the IoT platform to the sensor devices.
● Create a digital twin of the shop-floor and its process, accompanied by an interactive
visualization of the smart factory and
● Ensure secure communication in the mesh network to guarantee data integrity and
authenticity. Additionally, we have also integrated an indoor localization mechanism to
provision new sensors into the mesh network and to facilitate the installation of new sensors
in the smart factory in an efficient manner.

Dept.of ECE, CIT, Gubbi Page 2


BLUETOOTH MESH NETWORKING [2020-21]

Fig 1.2: Machines Connected By Bluetooth Mesh

With the rapid development of electric and electronic technology, information


technology and advanced manufacturing technology, the production mode of manufacturing
enterprises is being transferred from digital to intelligent. The new era that combines virtual
reality technology based on the Cyber-Physical System (CPS) is coming. Due to the new
challenges, the advantages of traditional manufacturing industries have been gradually
diminished. Consequently, the intelligent manufacturing technology is one of high
technology areas where industrialized countries highly pay more attention to. Europe 2020
strategy, Industry 4.0 strategy and China manufacturing 2025 have been proposed. United
States has gradually accelerated the speed of reindustrialization and manufacturing reflow.
The transformation of intelligent manufacturing intrigued the profound and lasting effect on
the future manufacturing worldwide. In the context of intelligent manufacturing, it is
important to establish the smart factory to achieve advanced manufacturing based on network
technologies and manufacturing data. In addition, the implementation of smart factory should
take into account the status quo and manufacturing requirements. Due to the different
characteristics of manufacturing field and information field, there are still many technical
problems to be solved in order to accelerate the path of smart factory.

Dept.of ECE, CIT, Gubbi Page 3


BLUETOOTH MESH NETWORKING [2020-21]

Important Points :
1. Gandhi et al. [3] proposed a simple Bluetooth infrastructure for Smart Factory. A
number of Bluetooth connected stationary nodes are deployed on the entire factory
floor to collect data from Bluetooth enabled industrial sensors through polling. It
relies on point-to-point connectivity, and it is seen as not scalable as compared to the
newer Bluetooth mesh networking.
2. Garrido-Hidalgo et al. [4] proposed a collaborative BLE mesh network that has been
deployed and evaluated, showing that mesh network can fulfill Industry 4.0
requirements with zero failures. The green I3A smart factory (Green ISF) scenario
was used, highlighting the contribution of Opera BLE towards a sustainable
digitalization of Industry 4.0.
3. Martinez et al. [6] presented a proof-of-concept implementation of Bluetooth Mesh to
automate a smart doorbell. They have demonstrated the feasibility of Bluetooth as a
technology that can be used for automation solutions.
4. Zafari et al. [11] reviewed many different indoor localization techniques such as
Angle of Arrival (AoA), Time of Flights (ToF), Return Time of Flight (RToF),
Received Signal Strength Indicator (RSSI), etc. It is found that RSSI has low
localization accuracy though it is the easiest to implement. Among all the wireless
localization techniques, although Bluetooth has low localization accuracy as
compared to others, its seamless integration with BLE mesh network for data
collection can be seen as an advantage for smart manufacturing.
5. Bertuletti et al. [1] tested a few regression models that can be used to convert RSSI
into distance. The polynomial model has shown to be more accurate than the other
models. In addition, Li et al. [5] proposed a more advanced technique, i.e., neural
network based RSSI distance model, that greatly improves the localization accuracy.

Dept.of ECE, CIT, Gubbi Page 4


BLUETOOTH MESH NETWORKING [2020-21]

CHAPTER 2
BLUETOOTH MESH STANDARD
Overview :How this standard operates, performs and how it tackles other issues concerning
BLE mesh networking is missing. It investigates this new technology thoroughly and
evaluates its performance by means of three approaches, namely an experimental evaluation,
a statistical approach and a graph-based simulation model, which can be used as the basis for
future research. Apart from showing that consistent results are achieved by means of all three
approaches, we also identify possible drawbacks and open issues that need to be dealt with.
2.1. Bluetooth Mesh Concept
Conceptually, the Bluetooth Mesh Standard is defined as a publish/subscribe model where
publishers can publish to a certain topic and subscribers can subscribe to one or more topics
of interest. This is illustrated in Figure, where switches can publish to a specific topic and
lamps can subscribe to one or more topics. This concept is used as an inspiration for the
implementation in the standard. A node in a Bluetooth Mesh network can subscribe to one or
more addresses (stored in the subscriber list) and publish to one specific address (stored in the
publish address). The standard defines two main types of addresses: a unicast and group
address. A unicast address is given to each node when it becomes part of the network and
uniquely identifies this node. A group address represents a group of nodes. Each node has its
unicast address in the subscriber list. If the node wants to join a specific group, it has to add
the corresponding group address to the subscriber list as well. Another node can send a
message to this node using its specific unicast address or using a group address that the node
has subscribed to. This information is stored in the publish address of the sending node.

Fig 2.1: Conceptual definition of the Bluetooth Mesh Standard through a publish/subscribe
model

Dept.of ECE, CIT, Gubbi Page 5


BLUETOOTH MESH NETWORKING [2020-21]

2.2. Bluetooth Mesh Topology

To be able to connect these different publishers and subscribers, a mesh topology is created.
The remainder of this section gives a step by step overview of all different types of nodes
present in such a topology. The standard uses BLE advertising and scanning as an underlying
technology to implement communication. To communicate in a Bluetooth Mesh network, a
flooding mechanism is used. By default, a flooding mechanism ensures that each node in the
network repeats incoming messages, so that they are relayed further, until the destination
node is reached. Compared to normal BLE advertising, Bluetooth Mesh nodes do not send
their packets according to an advertising interval. They send their packets directly after a
random generated back off time. To scan the advertisement channels for incoming packets,
the mesh nodes use a 100% duty cycle. This means that nodes in the mesh are always
scanning, unless they are sending a packet. For scanning, the scan interval and window are
still used. The scan window is equal to the scan interval, to ensure that a node never stops
scanning. The scan interval makes sure that a node switches between the advertisement
channels to scan. The standard uses a new type of BLE advertisement packet to communicate
in a mesh network, which is only supported by devices that support both BLE and Bluetooth
Mesh. Fortunately, the standard also defines a backwards compatibility feature to ensure that
BLE devices which do not support Bluetooth Mesh can also be part of a Bluetooth Mesh
network. This feature is based on BLE connections. Next to this, a Bluetooth Mesh node can
implement some optional features, meant to manage and enhance communication, as
indicated by Figure . The features are explained in the following subsections.

Fig 2.2: An example of each optional feature within the Bluetooth Mesh standard.

Dept.of ECE, CIT, Gubbi Page 6


BLUETOOTH MESH NETWORKING [2020-21]

2.3. Bluetooth Mesh Stack


Each device in a Bluetooth Mesh network implements the Bluetooth Mesh stack shown in
Figure .This stack is made up as a layered architecture, consisting of the following layers:
Bluetooth Low Energy Core Specification: The standard is built on top of the BLE
specification and uses both the advertising and connection oriented mechanisms.
Bearer layer: This layer defines an abstraction for the underlying BLE specification towards
the layers above. These abstractions are called bearers and denote the bearer of information
used to carry information into the network. The standard defines two bearers: ADV bearer
and GATT bearer. The ADV bearer abstracts the mechanism that uses BLE advertising and
the GATT bearer abstracts the mechanism that uses BLE connections.
Network layer: This layer is responsible for relaying, network level security, etc.
Transport layer: Segmenting bigger messages and reassembling segmented messages is
done on this layer. Application level security is handled here as well.
Access layer: Defines the glue between the more application focused layers (application,
model and foundation model) and the more technical layers below. It ensures that the correct
parts of the application receive incoming messages from the technical layers and that
outgoing messages from the application are correctly forwarded to the technical layers below.
(Foundation) model layer: The two highest layers comprise the definition of so called
models. A model is a standardization of a specific scenario. This can relate to the
configuration and management capabilities of the mesh network (foundation models), as well
as to specific user scenarios commonly used (e.g., standardization of a light switch). On these
higher layers, a Bluetooth Mesh device can be defined as a combination of both the
foundation models and several other models. Each of these models represents a part of the
application and together they form a representation of the device as a whole.
On top of this stack, an application is implemented. The standard also defines several
compulsory security measures (network and application layer security, key refresh, etc.) and
mechanisms for both provisioning and configuring a device to be part of a mesh network.
These aspects of the standard are beyond the scope of this paper. In our experiments, we
always assumed a fully provisioned and configured mesh network.

Dept.of ECE, CIT, Gubbi Page 7


BLUETOOTH MESH NETWORKING [2020-21]

Fig2.3: The layered architecture of the Bluetooth Mesh Standard

2.4. Bluetooth Mesh Communication Basics


As the goal of this paper is to evaluate the performance of the Bluetooth Mesh standard in
terms of communication latencies, it is important to understand the different steps in the
communication flow that influence these latencies. Figure shows the communication flow of
a reliable communication event between two directly connected mesh nodes. First, an event
on the application layer of the sending node (e.g., pressing a button) triggers the need to send
a message to another node. It takes some processing time for that message to be sent from top
to bottom in the stack. Before the message is sent over the air, a random back-off mechanism
is used that holds the message for a random time between 0 ms and t maximum (configurable
by the user). Ultimately, the back-off expires and the message is broadcasted. This is done via
normal BLE advertising. To recap, a message is advertised on channels 37, 38 and 39
sequentially and a receiving node is scanning on one of these channels, switching from one
channel to another channel at a fixed interval. The message is sent on the three advertising
channels. The time required to send a message on one channel depends on the size of the
packet and the configured bit rate of the BLE radio. The time to switch between channels also
needs to be taken into account (disabling the radio, switching the channel and turning the
radio back on).
The other node in the communication flow is scanning for packets. Depending on
which channel the receiving node is listening during the transmission of the packet, it takes a

Dept.of ECE, CIT, Gubbi Page 8


BLUETOOTH MESH NETWORKING [2020-21]

specific amount of time until the packet is being received. For example, in Figure , the
receiving node receives the message on channel 39, which means that the full transmit time
for the sending node needs to be taken into account. After receiving the message, the
receiving node passes the message up to the application layer, where possibly other events
are triggered (e.g., turning on a lamp) after which the node sends an acknowledgement to the
sending node. This acknowledgement follows the same pattern as before. However, now the
message corresponding to the acknowledgement is received on channel 38, which means that
only the transmit time for channels 37 and 38 (as well as the channel switch time) needs to be
taken into account. Finally, the sending node processes this acknowledgement, which
concludes the communication flow.

Fig 2.4: An example of the underlying wireless communication between two nodes in a
Bluetooth Mesh network

Dept.of ECE, CIT, Gubbi Page 9


BLUETOOTH MESH NETWORKING [2020-21]

CHAPTER 3
SMART FACTORY
In the context of Industry 4.0, the intelligent manufacturing attracts enormous interest
from government, enterprises and academic researchers. Therefore, the construction patterns
of smart factory are widely discussed.

● Architecture: However, the standards for smart factory implementation have not been
established yet. Benkamoun et al. proposed a class diagram which can be used to represent
the manufacturing system from different perspectives of entities and functions. Radziwon et
al. expounded former research from the concept of smart factory, and they pointed out that
smart factory is actually an exploring of adaptive and flexible manufacturing. Lin et al.
proposed architecture for cloud manufacturing systems oriented to aerospace conglomerate,
which facilitates optimal configuration of manufacturing resources. The above-mentioned
authors provided guidance architecture for smart factory. In summary, the smart factory,
which is based on digital and automated factory, uses information technology (e.g., cloud
platform and (IoT) to improve the management of manufacturing resources and QoS. In order
to build the smart factory, manufacturing enterprises should improve production and
marketing, enhance controllability of production process, and reduce manual intervention in
workshop. Through the analysis of manufacturing data, the smart factory can realize flexible
manufacturing, dynamic reconfiguration, and production optimization, which are aimed to
adapt the system to the changes of business model and consumer shopping behavior.

Fig 3.1: Architecture of Smart Factory

Dept.of ECE, CIT, Gubbi Page 10


BLUETOOTH MESH NETWORKING [2020-21]

In the implementation of smart factory, the IoT is employed to integrate the underlying
equipment resources. Accordingly, the manufacturing system has abilities of perception,
interconnection and data integration. The data analysis and scientific decision are used to
achieve production scheduling, equipment service and quality control of products in smart
factory. Further, the Internet of services is introduced to virtualize the manufacturing
resources from a local database to the cloud server. Through the human-machine interaction,
the global collaborative process of intelligent manufacturing oriented to the order-driven
market is built. Therefore, the smart factory represents an engineering system that mainly
consists of three aspects: interconnection, collaboration and execution. As shown in Fig 3, the
architecture of smart factory includes four layers, namely physical resource layer, network
layer, data application layer, and terminal layer. With the aim to convert modern factory into
smart factory, key technologies involved in all layers have to be studied in detail.

●Requirements of a Smart Factory:


In this section, a framework is suggested to help identifying and describing the smart
factory system. We suggest requirements that a factory should fulfils to increase its
smartness. Most of the literature is focused on the design principles of the smart factory. We
have tried to look to the future as possible, but emphasis is concentrated on what is possible
today with existing technology. We considered these principles, which are presented below,
as guidelines for our suggested requirements. Design Principles of a Smart Factory
The design principles of a smart factory help designers build new smart factories or upgrade
existing traditional factories to be smart. Herman et al. presented an overview of these
principles in terms of the general scope of I4.0. In this section, we will investigate and
analyze these principles in terms of the scope of the smart factory. These principles are
illustrated as follows:
Modularity: This refers to the design of system components. Modularity can be defined
as the capability of system components to be separated and combined easily and quickly.
System components are loosely coupled and can be reconfigured on a plug-and-play principle
.For example, modules can be added, rearranged or relocated in the production line on time.
The smart factory should possess high modularity, allowing the rapid integration of modules
that can be supplied by multiple vendors . Modularity enables the real-time capability to
allow the system to respond to changing customer requirements and to overcome internal
system malfunctions.
Interoperability: This refers to both the ability to share technical information within system

Dept.of ECE, CIT, Gubbi Page 11


BLUETOOTH MESH NETWORKING [2020-21]

components, including products and to the ability to share business information between
manufacturing enterprises and customers. CPS enable connection over the IoT and the IoS.
Standardized mechanical, electrical and communication information is essential to enhancing
interoperability. In communication, semantic technologies show promise in enabling
interoperability for the smart factory, and many ontologies have been developed around this
issue . Another crucial enabler of interoperability is a controller that can be integrated more
flexibly with other systems and is generally quicker to pick up new interoperability features
such as OPC UA. Smart PLCs have an advantage in this regard, allowing greater integration
between the PLC and IT programs.
Decentralization: System elements (modules, material handling, products, etc.) will make
decisions on their own, unsubordinated to a control unit. A decision will be made
autonomously in real time without violating the overall organizational goal. In these systems,
employees make decisions about ordinary matters on time and change their strategy and
direction according to the change in business situations and environments . Embedded
computers enable autonomous CPS .
Virtualization: This refers to both creating an artificial factory environment with CPS
similar to the actual environment and to being able to monitor and simulate physical
processes. Information transparency in CPS and the aggregation of sensor data enable the
creation of such an environment.

Fig 3.2 : Smart workstation

Dept.of ECE, CIT, Gubbi Page 12


BLUETOOTH MESH NETWORKING [2020-21]

Fig 3.3: Five key characterized points of Smart Factory

Dept.of ECE, CIT, Gubbi Page 13


BLUETOOTH MESH NETWORKING [2020-21]

CHAPTER 4
METHODOLOGY

The methodology of the study is divided into three interrelated parts. The first part presents
only the workplace and the differences between the traditional and the smart manual
assembly station where the laboratory experiment was carried out. The second part deals with
the experiment and the third part with the ergonomic evaluation in the viral environment in
Siemens Jack 9.0

Fig 4.1 : Methodology

Dept.of ECE, CIT, Gubbi Page 14


BLUETOOTH MESH NETWORKING [2020-21]

Workplaces and products


The experiment involves the manual assembly of two different products at two different
manual assembly workstations (traditional and smart). The aim is to determine the
advantages and disadvantages of a smart manual assembly workstation in terms of assembly
time, number of errors and ergonomics. The functionalities of our traditional workstations
are: (i) seated workstation, (ii) height adjustable classic chair, (iii) workbench at fixed
height, (iv) fixed position and angle of the grab containers.
Procedure of the experiment
At each assembly workstation (Traditional and Smart), 20 experiments were carried out, 10
for each product. The experiments were performed by doctoral students and laboratory staff.
They conducted the experiment for the first time and were recruited on a voluntary basis. The
experiment was performed by 40 subjects (N = 40, gender: 22 male, 14 female). Their mean
(SD) anthropometric data were: age 31.7 (7.4) years; height 1780 (90 mm). Everyone was
instructed to perform the experiment at a speed that could be performed by the entire
industrial shift, the entire working life of a human being. Experiments were recorded for
further processing.
DHM modelling of the ergonomic analysis
To evaluate the ergonomics, we used the Siemens Jack DHM software package, into which
we import CAD models of both work- stations. We used a predefined avatar (male, height:
1774 mm) as a virtual human and performed a motion analysis/reach analysis for
the entire assembly process of the product P1.

Dept.of ECE, CIT, Gubbi Page 15


BLUETOOTH MESH NETWORKING [2020-21]

CHAPTER 5
SMART MANUFCTURING USING BLUETOOTH MESH
NETWORKING

Smart manufacturing has components, namely:


●Bluetooth Mesh Network: this collects and sends sensor data to the IoT Platform.
●IoT platform: serving as the backbone of the system where data is stored, processed
and analysed.
●Visualization: dashboard which allows real time sensor data and the location of Intelligent
Guided Vehicle (IGV) to be tracked.

Fig 5.1: Architectural Overview of Smart Manufacturing based on Bluetooth Mesh


Networking

A. Bluetooth Mesh Network


The Bluetooth mesh network consists of Mesh Nodes and a Gateway that bridges the
communication between the mesh network and the cloud. The mesh node is a sensor capable
of collecting sensor data such as temperature, humidity, pressure, gas, and acceleration in a
smart factory setting. Each mesh node supports the following communication mechanisms:

Dept.of ECE, CIT, Gubbi Page 16


BLUETOOTH MESH NETWORKING [2020-21]

●Upstream communication – Data collected from all the primary and secondary sensor in the
mesh node will be read and published to the gateway using a sensor status message.
●Downstream communication – When a mesh node receives a message from the IoT
Platform via the gateway, it will execute the operation encapsulated in the message.
● Machine to machine communication – A mesh node is able to communicate directly with
another mesh node without relying on a central server. The Gateway mediates the
communications between the mesh nodes and the cloud securely. It operates on a publish
subscribe mechanism in which it subscribes to the IoT platform for attribute updates of the
sensor device via MQTT. If the gateway application receives a message to send an actuation
command to the specified sensor device, the message will be delivered through the mesh
network. Conversely, when the gateway application receives data from the sensor devices,
the sensor data will be parsed, formatted and then published to the IoT platform through
MQTT.

B. IoT Platform (Things Board): The IoT Platform is required to store, process and analyse
the data collected from the smart factory. In order to facilitate big data processing, both
relational and NoSQL databases are supported by the IoT Platform. In addition, it has the
capability to perform device management tasks such as getting the status of sensors and
issuing actuation commands. Things Board is equipped with a powerful rule engine to
process and analyse the data collected. This enables the average temperature, humidity and
pressure for each sensor to be computed automatically, and then visualized on the dashboard
for monitoring purposes.

C. Visualization and Augmented Reality Dashboard: A smart factory interactive map is


used to illustrate the real-time status of sensors and the IGV, thus creating a digital twin of
the shop-floor. The IGV has four different states of automation, namely Sending, Loading,
Waiting/Charging, and Collecting. Furthermore, the location of IGV is dynamically updated
in real-time, and status information such as battery level, payload, and state will be shown
requested.
Based on the sensor data stored in the IoT Platform, the dashboard is able to display time
series chart that is updated every 1000 ms in real time. The chart also shows the minimum
and maximum baselines which indicate the range of each sensor value. With the baselines,
the user can easily visualize the data output to ensure that the machine is running within the
expected range as shown in Figure.

Dept.of ECE, CIT, Gubbi Page 17


BLUETOOTH MESH NETWORKING [2020-21]

There is a augmented reality (AR) dashboard in the proposed system to allow for the user to
visualize the status of sensors and machines in real-time using a AR headset when he/she
physically walks around the factory. As the mesh nodes deployed on the shop-floor emit
Bluetooth signals, the augmented reality dashboard made use of the signal strength of the
mesh nodes to derive the physical location of the user within the mesh network in the factory
using trilateration technique.

Fig 5.2: Sensor data of Smart Factory

Dept.of ECE, CIT, Gubbi Page 18


BLUETOOTH MESH NETWORKING [2020-21]

CHAPTER 6
BLUETOOTH SECURITY

There are billions of Bluetooth devices in use today. These devices are exposed to di_erent
types of threats. Bluetooth security solutions need to constantly evolve to mitigate emerging
threats. Similar to any other wireless communication systems, Bluetooth transmissions can be
deliberately jammed or intercepted. False or modified information can be passed to the
devices by malicious users. Security threats in Bluetooth can be divided into three major
categories as follows :
Disclosure threat: The information can leak from the target system to an eavesdropper that is
not authorized to access the information.
Integrity threat: The information can be deliberately altered to mislead the recipient.
Denial of Service (DoS) threat: The users can be blocked from gaining access to a service by
making it either unavailable or severely limiting its availability to an authorized user.
Bluetooth devices are exposed to malicious intervention during the process of pairing with
another device. These weaknesses are primarily due to flaws in the link key establishment
protocol which is required for devices to pair (i.e., establish a trusted relationship), and
because session encryption is not mandatory. Therefore, attacks can occur prior to the
completion of pairing. Link keys can still be singed after the pairing completes and used to
perform illegal authentication or Man-in-the-Middle (MITM) attacks. We present a summary
of Bluetooth attacks below.
PIN cracking
For data exchange between Bluetooth devices, trust has to be established between them. This
process is known as pairing and is implemented by exchanging secret codes, often referred to
as the Personal Identification Number (PIN). PIN length can be up to 8 bytes. Pairing is
implemented in the following steps:
Initialization, Link key Generation, Authentication, and Encryption. An attacker can
eavesdrop the entire process of pairing and authentication and collect all the messages. The
attacker can then use a brute force algorithm to identify the PIN used. If the device’s Media
Access Control (MAC) address is known, then by using a 128-bit guessed number, an
accurate initialization key could be identified. The next step is to find the shared session link
key by using all the collected data. Provided the data gathered is accurate, the PIN is
determined without much abort. After cracking the pin, the attacker can pair with the target
device and access information illegally .

Dept.of ECE, CIT, Gubbi Page 19


BLUETOOTH MESH NETWORKING [2020-21]

MAC spoofing
Spoofing is done prior to encryption and when the piconet forms. Devices can authenticate
each other by producing link-keys. While the attack is ongoing, attackers could impersonate
an alternative client. There is a possibility for attackers to end connections or modify data
during transmission utilizing certain hacking tools .
Man-In-The-Middle (MITM) Attack
The first MITM intrusion was developed on the idea that the hackers are aware of the shared
key used by the Bluetooth devices. It is also possible to get the link key by other methods
such as eaves dropping and brute-forcing the PIN. A hack that utilizes manipulating the
Bluetooth clock, involves devices that require the same hopping sequence on different clocks.
A hack can be achieved by replying to the page request of the master device ahead of the
slave. This restarts the paging with the slave using a different clock. MITM attacks can be
launched during Secure Simple Pairing (SSP). One type of attack during the SSP process
focuses on wrong data transmitted during the initial steps of SSP called the Input/ Output
(IO) phase in which devices that are interested in pairing perform an exchange of IO
capabilities [. Another type of SSP attack needs a visual contact with the victim’s Bluetooth
devices (such as direct line-of-sight or possibly a video camera that is hidden) to guarantee
that a lower security association model choice is made by the Bluetooth device user. Once the
attacker (MITM) has visual access to the victim’s devices, the attacker acts before the
legitimate user to establish Bluetooth connections to both victims’ devices and to initiate the
IO phase in which the less secure association model can be forcefully selected.

Fig 6.1 : Man-in-the-Middle (MITM) attack on Bluetooth.

Dept.of ECE, CIT, Gubbi Page 20


BLUETOOTH MESH NETWORKING [2020-21]

Blue Printing attack


Blue printing is a method to remotely extract information from Bluetooth-enabled devices.
Blueprinting can be used for generating statistics about manufacturers and models and to find
out whether there are devices in range that have weak Bluetooth security.
Safety procedures include switching of Bluetooth functionality whenever not in use,
employing authentication and encryption whenever possible, and never pairing with an
unknown device.
Backdoor attack
The backdoor attack involves establishing a trust relationship through the “pairing”
mechanism but ensuring that it no longer appears in the target’s register of paired devices. In
this way, unless the owner is actually observing their devices at the precise moment a
connection is established, they are unlikely to notice anything unusual, and the attacker may
be free to continue to use any resource that a trusted relationship with that device grants
access to. This means that not only can data be retrieved from the phone, but other services,
such as modems, or Internet, Wireless Application Protocol (WAP)and General Packet Radio
Service (GPRS) gateways could be used .
The Backdoor attack can only be implemented if the target device’s BT_ADDR is known.
Therefore, this attack can be mitigated by hiding the Bluetooth devices BT_ADDR (for
example by enabling encryption while establishing Bluetooth connections).
Reflection/Relay
An intruder need not be aware of any confidential data as only relays sensitive data from one
node to the other in the authentication phase. Security Risks Specific to Bluetooth Low
Energy. The main security threats related to the process of pairing and to BLE as such are
passive identity tracking, MITM, and eavesdropping. Inactive snooping occurs when a third
device eavesdrops information transmitted amongst paired devices. BLE mitigates the threat
by implementing various encryption types such as Advanced Encryption Standard (AES)-
Counter with Cipher Block Chaining Message Authentication Code(CBC-MAC) (CCM)
cryptography, etc.

Dept.of ECE, CIT, Gubbi Page 21


BLUETOOTH MESH NETWORKING [2020-21]

CHAPTER 7
CONCLUSION
A reliable connectivity is crucial to ensure the success of smart factory. We have
demonstrated the feasibility of Bluetooth mesh networking to facilitate data collection from
the sensor devices to an IoT cloud as well as downstream communication. With a reliable
communication infrastructure, management tasks can then be efficiently implemented, this
includes visualization of sensor and machinery status in real time, tracking of physical
location of the user and IGV on the shop-floor, and performing remote configuration of the
sensors through downstream communication. The developed prototype system also shows
that Bluetooth Mesh has an added advantage over other competing mesh networking
technologies, as it is interoperable with many devices in the market. In particular, the
augmented reality dashboard is only possible as every smart phone comes with Bluetooth
connectivity. Even though the current prototype system has not been deployed in a real
factory setting, the architecture is scalable and it fulfills the requirements of a smart factory.

Dept.of ECE, CIT, Gubbi Page 22


BLUETOOTH MESH NETWORKING [2020-21]

REFERENCES
1. S. Bertuletti, A. Cereatti, U. Della, M. Caldara, and M. Galizzi. Indoor distance estimated
from Bluetooth low energy signal strength: Comparison of regression models. In 2016 IEEE
Sensors Applications Symposium (SAS), pages 1–5, April 2016.
2. B. Chen, J. Wan, L. Shu, P. Li, M. Mukherjee, and B. Yin. Smart factory of industry 4.0:
Key technologies, application case, and challenges. IEEE Access, 6:6505–6519, 2018.
3. M. Gandhi, H. Kour, D. Tandur, R. Gore, and A. Varghese. Bluetooth iot infrastructure
network with immersive experience. In 2017 9th International Conference on
4.Communication Systems and Networks (COMSNETS), pages 425–426, Jan 2017. C.
Garrido-Hidalgo, D. Hortelano, L. Roda-Sanchez, T. Olivares, M. C.Ruiz, and V. Lopez. Iot
heterogeneous mesh network deployment forhuman-in-the-loop challenges towards a social
and sustainable industry4.0. IEEE Access, 6:28417–28437, 2018.
5.G. Li, E. Geng, Z. Ye, Y. Xu, J. Lin, and Y. Pang. Indoor Positioning Algorithm Based on
the Improved RSSI Distance Model. Sensors, 18:2820, Aug. 2018.
6.C. Martínez, L. Eras, and F. Domínguez. The Smart Doorbell: A proof of- concept
Implementation of a Bluetooth Mesh Network. In 2018 IEEE Third Ecuador Technical
Chapters Meeting (ETCM), pages 1–5, Oct. 2018.
7.M. Moore. What is industry 4.0? https://www.techradar.com/news/ what-is-industry-40-
everything-you-need-to-know, Apr 2018.
8.Silicon-Labs. An1137: Bluetooth mesh network performance.
9.C. Team. What is the smart factory and its impact on manufacturing?
https://ottomotors.com/blog/what-is-the-smart-factory-manufacturing, June 2018.
10. P. Vrba, P. Kadera, V. Jirkovsky, M. Obitko, and V. Marik. New trends of visualization
in smart production control systems. In Holonic and Multi- Agent Systems for
Manufacturing. HoloMAS 2011. Lecture Notes in Computer Science, vol 6867. Springer,
Berlin, Heidelberg, page Chapter7. Springer, Berlin, Heidelberg, 2011.
11.F. Zafari, A. Gkelias, and K. K. Leung. A Survey of Indoor Localization Systems and
Technologies. IEEE Communications Surveys Tutorials, pages 1–1, 2019.
12. Internet Source

Dept.of ECE, CIT, Gubbi Page 23


BLUETOOTH MESH NETWORKING [2020-21]

APPENDIX

Dept.of ECE, CIT, Gubbi Page 24


BLUETOOTH MESH NETWORKING [2020-21]

Bluetooth Mesh
by Varshini S L

Dept.of ECE, CIT, Gubbi Page 25


BLUETOOTH MESH NETWORKING [2020-21]

Submission date: 19-May-2021 01:08PM (UTC+0530)


Submission ID: 1589385303
File name: Bluetooth_Mesh_Networking.pdf (267.01K)
Word count: 406
Character count: 2106

Dept.of ECE, CIT, Gubbi Page 26


BLUETOOTH MESH NETWORKING [2020-21]

Dept.of ECE, CIT, Gubbi Page 27

You might also like