Feeds

Bluetooth formally adopts low power standard

Starts certification for Version 4.0

Website security in corporate America

The Bluetooth Special Interest Group has formally adopted the standard's Core Specification Version 4.0, which targets very low power networks, potentially vying with other systems like ZigBee. The new spec, originally released in January, is targeted at markets such as sensors for healthcare, and security and home networks.

The SIG has now opened its qualification program to any products claiming to support Version 4.0. "The finalization of Bluetooth low energy wireless technology within the Core Specification is a monumental achievement," said Michael Foley, executive director of the SIG.

The new technology, which is based on the WiBree platform originally developed by Nokia, will allow Bluetooth devices to run for years on standard coin-cell batteries. The standard also features enhanced range.

Kirsten West, principal analyst with WTRS, commented: "Bluetooth low energy will be a significant contributor to the overall wireless sensor network market, representing nearly half of all shipments in 2015. The advantage to this new protocol is that it is totally optimized for low power battery operation."

The technology supports short data packets (from eight to 27 octets) transmitted at 1Mbps, minimizing interference with the adaptive frequency hopping technique that is used in all versions of Bluetooth. Latency is a few milliseconds and range can exceed 100 meters, with AES-128 strong encryption and authentication.

Among the Bluetooth chip vendors supporting Version 4.0 are CSR and Broadcom. The former will use its modular BlueCore architecture to support both single- and dual-mode low power gadgets. The dual-mode chipsets will add a low power mode to cellphones and PCs, alongside classic Bluetooth (the current release is 3Mbps EDR). After that, single-mode chips will be targeted at specific products like sensors. Texas Instruments, Nordic Semiconductor and EML have also showed silicon.

Copyright © 2010, Wireless Watch

Wireless Watch is published by Rethink Research, a London-based IT publishing and consulting firm. This weekly newsletter delivers in-depth analysis and market research of mobile and wireless for business. Subscription details are here.

Internet Security Threat Report 2014

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
ISPs' post-net-neutrality world is built on 'bribes' says Tim Berners-Lee
Father of the worldwide web is extremely peeved over pay-per-packet-type plans
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Turnbull: NBN won't turn your town into Silicon Valley
'People have been brainwashed to believe that their world will be changed forever if they get FTTP'
Google+ GOING, GOING ... ? Newbie Gmailers no longer forced into mandatory ID slurp
Mountain View distances itself from lame 'network thingy'
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.