Bluetooth Low Energy in Wireless PKI Deployments

Total Page:16

File Type:pdf, Size:1020Kb

Bluetooth Low Energy in Wireless PKI Deployments Bluetooth Low Energy in Wireless PKI deployments mToken BLE ecosystem White Paper All rights reserved 1 Introduction | Century Longmai Technology Co., Ltd CONTENTS 1. INTRODUCTION.................................................................................................... 3 WHO SHOULD READ THIS DOCUMENT? ................................................................................ 3 DEFINITIONS ............................................................................................................................ 4 2. BLUETOOTH OVERVIEW .................................................................................. 4 HOW BLUETOOTH WORKS ....................................................................................................... 5 FREQUENCY HOPPING.............................................................................................................. 5 POWER CONSUMPTION ............................................................................................................ 6 SECURITY ................................................................................................................................ 6 BLUETOOTH CORE SPECIFICATION 4.2 ..................................................................................... 6 Features and Benefits .......................................................................................................... 6 BLUETOOTH ARCHITECTURE ................................................................................................... 8 BLE Application services .................................................................................................... 8 3. NEW GENERATION (NG) WIRELESS TOKEN ............................................... 8 BACKGROUND ......................................................................................................................... 8 Structural Design ................................................................................................................ 9 Model Appearance ............................................................................................................ 10 STRONG TWO FACTOR AUTHENTICATION (2FA) .................................................................... 11 Scalable portfolio of authentication devices ..................................................................... 11 New Smart card based Security ........................................................................................ 11 Exchange & Storage of Sensitive Data ............................................................................. 11 Portability & Usability ..................................................................................................... 12 Mobility Convenience& Compatibility ............................................................................. 12 Multiple applications Security & Flexibility..................................................................... 13 Card Operating System Features ...................................................................................... 13 4. MTOKEN BLE-B1 OVERVIEW ......................................................................... 14 OVERVIEW............................................................................................................................. 14 Design ............................................................................................................................... 14 Operation .......................................................................................................................... 15 Important Notes ................................................................................................................ 17 5. APPENDIX A: GLOSSARY ................................................................................. 18 6. APPENDIX B: DOCUMENT REVISION HISTORY ....................................... 20 7. ABOUT CENTURY LONGMAI .......................................................................... 20 2 Introduction | Century Longmai Technology Co., Ltd 1. Introduction The evolution of mobile applications and mobile payment industries is accompanied by two technologies i.e. Bluetooth Low Energy (BLE) and host card emulation (HCE) with Near Field Communication (NFC). With the increasing consumer demands for greater privacy of their communications, network security problems have drawn much attention, especially in government telecom, and financial industries. In this paper, we define Bluetooth from the technical and organizational context, and discuss the security and privacy designs when using this technology in Public key infrastructure. Bluetooth silently connects so many of our gadgets together, it’s easy to forget it’s a pretty impressive piece of technology on its own. It helps us listen to music, talk on our phones, and play video games, all without being frustrated by miles of cables strewn around the place. We present Century Longmai’s newly launched wireless token series that utilize the Bluetooth communication protocol to secure a wide range of applications and realize robust identity authentication functions especially in mobile and wireless transaction markets. As one of the leading digital Information security device manufacturers in China, Century Longmai is always excited on best informing those in IT security and related industries about technologies used in our innovative products. Who Should Read This Document? Because this document comprises conceptual and future mobile payment market security, its audience is broad. This document sets the stage with an overview of Bluetooth technology. Then, it describes how Century Longmai implements Bluetooth technology in its Public Key Infrastructure (PKI) tokens to meet end-users’ mobility needs. If you are unfamiliar with Bluetooth technology in general, you can read this document for a high-level summary. If you are primarily interested in learning about Century Longmai mToken BLE ecosystem product series, you will find a thorough description and application scenarios in this document. Finally, if you are involved in deploying mobile payment solutions that utilize wireless Public Key Infrastructure or communicate with Bluetooth enabled devices, you should read this document to discover your options. Get more technical information on Bluetooth technology including core specifications, FAQs and Quick Reference Guides. Links to tools and information: o Quick Reference Guide o Frequently Asked Questions o Bluetooth Brand Guide Getting Additional Information Century Longmai provides reference documentation for the mToken BLE ecosystem wireless PKI token products series that utilizes Bluetooth low energy. If you have any questions 3 Introduction | Century Longmai Technology Co., Ltd regarding mToken BLE ecosystem, review our frequently asked Questions at http://lm- infosec.com/about-us/faqs/ ; if you would like to request for technical assistance or would like to provide feedback about our products and solutions, visit Contact Us Page at http://lm- infosec.com/contact/ Definitions o Bluetooth is a technology that makes short-range wireless connections between devices at distances up to 10 meters (33 feet). o Bluetooth Smart refers to qualified products incorporating Bluetooth Core Specification Version 4.0 (or higher) with a Low Energy Core Configuration or Basic Rate and Low Energy Combined Core Configuration and using the GATT-based architecture to enable particular functionality of the product. o Bluetooth Smart Ready refers to qualified products incorporating Bluetooth Core Specification Version 4.0 (or higher) with a Basic Rate and Low Energy Combined Core Configuration, and using the GATT-based architecture to provide a means by which the end user can choose to update the Bluetooth Smart Ready product with the functionality of a Bluetooth Smart product. o Bluetooth Smart technology is a wireless communications system intended to replace the cables connecting many types of devices, from mobile phones and headsets to hear monitors and medical equipment. Learn more about how Bluetooth Smart increases opportunities for developers to make consumers' lives easier. 2. Bluetooth Overview This section seeks to give you an overview of the Bluetooth technology. If you’re already familiar with the Bluetooth specification and how Bluetooth devices work, you might choose to skip ahead to mToken BLE ecosystem. Bluetooth is an open specification that enables low-bandwidth, short-range wireless connections between computers and peripherals, such as keyboard, mouse, Smartphone, and personal data assistant (PDA). The appeal of the Bluetooth model lies in its convenience for wirelessly transferring information and small data files between devices. Meanwhile, the Core Bluetooth framework enables support for communication between applications and Bluetooth devices. For example, when a health monitoring app can discover, explore, and interact with peripheral devices, such as heart rate monitors, digital thermostats, and even other multi-platform based devices. 4 Bluetooth Overview | Century Longmai Technology Co., Ltd How Bluetooth Works Bluetooth devices operate at 2.4 GHz in the license-free, globally available Industrial, Scientific, and Medical (ISM) radio band. Bluetooth chips produce wavelengths that are bound to frequencies operating within a range specifically set aside for short-range communication. The advantage of operating in this band is worldwide availability and compatibility; but the potential
Recommended publications
  • The Benefits and Trends of Sub-Ghz Wireless IC Systems Among Various
    Key Priorities for Sub-GHz Wireless Deployment Silicon Laboratories Inc., Austin, TX Introduction To build an advanced wireless system, most developers will end up choosing between two industrial, scientific and medical (ISM) radio band options—2.4GHz or sub-GHz frequencies. Pairing one or the other with the system’s highest priorities will provide the best combination of wireless performance and economy. These priorities can include: • Range • Power consumption • Data rates • Antenna size • Interoperability (standards) • Worldwide deployment Wi-Fi®, Bluetooth® and ZigBee® technologies are heavily marketed 2.4GHz protocols used extensively in today’s markets. However, for low-data-rate applications, such as home security/automation and smart metering, sub-GHz wireless systems offer several advantages, including longer range, reduced power consumption and lower deployment and operating costs. Sub-GHz radios Sub-GHz radios can offer relatively simple wireless solutions that can operate uninterrupted on battery power alone for up to 20 years. Notable advantages over 2.4GHz radios include: Range— The narrowband operation of a sub-GHz radio enables transmission ranges of a kilometer or more. This allows sub-GHz nodes to communicate directly with a distant hub without hopping from node to node, as is often required using a much shorter-range 2.4GHz solution. There are three primary reasons for sub-GHz superior range performance over 2.4GHz applications: • As radio waves pass through walls and other obstacles, the signal weakens. Attenuation rates increase at higher frequencies, therefore the 2.4GHz signal weakens faster than a sub-GHz signal. • 2.4GHz radio waves also fade more quickly than sub-GHz waves as they reflect off dense surfaces.
    [Show full text]
  • Internet of Things (Iot): Protocols White Paper
    INTERNET OF THINGS (IOT): PROTOCOLS WHITE PAPER 11 December 2020 Version 1 1 Hospitality Technology Next Generation Internet of Things (IoT) Security White Paper 11 December 2020 Version 1 About HTNG Hospitality Technology Next Generation (HTNG) is a non-profit association with a mission to foster, through collaboration and partnership, the development of next-generation systems and solutions that will enable hoteliers and their technology vendors to do business globally in the 21st century. HTNG is recognized as the leading voice of the global hotel community, articulating the technology requirements of hotel companies of all sizes to the vendor community. HTNG facilitate the development of technology models for hospitality that will foster innovation, improve the guest experience, increase the effectiveness and efficiency of hotels, and create a healthy ecosystem of technology suppliers. Copyright 2020, Hospitality Technology Next Generation All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the copyright owner. For any software code contained within this specification, permission is hereby granted, free-of-charge, to any person obtaining a copy of this specification (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the above copyright notice and this permission notice being included in all copies or substantial portions of the Software.
    [Show full text]
  • Evaluation of Wireless Acquisition of Vibration Data Over Bluetooth in Harsh Environments
    Evaluation of wireless acquisition of vibration data over Bluetooth in harsh environments William Eriksson Computer Science and Engineering, master's level 2018 Luleå University of Technology Department of Computer Science, Electrical and Space Engineering Evaluation of wireless acquisition of vibration data over Bluetooth in harsh environments William Eriksson Lule˚aUniversity of Technology Dept. of Computer Science, Electrical and Space Engineering Div. of Computer Science May, 2018 ABSTRACT Bluetooth is a standard for short-range communication and is already used in a wide range of applications. Transferring vibration data in industrial environments for performing machine health monitoring is an application that Bluetooth potentially is suitable for. In this thesis the energy requirements and the performance of a system featuring an accelerometer and a flash memory device in conjunction with a microcontroller with Bluetooth Low Energy capabilities is evaluated. Literature, the Bluetooth Low Energy specification, and datasheets of the selected hardware are reviewed in order to theoretically estimate the expected energy consump- tion according to selected user scenarios. The energy consumption is then evaluated in practical tests on real hardware. The performance of Bluetooth Low Energy is evaluated by testing throughput and received signal strength in different environments including industrial environments. The results show that the evaluated hardware can be operated with low energy con- sumption. The required energy for the most demanding of the selected user scenarios which involves actively using the hardware for about 8 hours requires 1.1 ·10−2 Wh. In- cluding potential losses of a voltage regulator, a Li-ion battery with a capacity of only roughly 5.5 mAh can supply the system for the whole user scenario.
    [Show full text]
  • Introduction
    Cambridge University Press 978-0-521-89847-8 - Dynamic Spectrum Access and Management in Cognitive Radio Networks Ekram Hossain, Dusit Niyato and Zhu Han Excerpt More information Part I Introduction © in this web service Cambridge University Press www.cambridge.org Cambridge University Press 978-0-521-89847-8 - Dynamic Spectrum Access and Management in Cognitive Radio Networks Ekram Hossain, Dusit Niyato and Zhu Han Excerpt More information 1 Wireless communications systems Wireless communications technology has become a key element in modern society. In our daily life, devices such as garage door openers, TV remote controllers, cellular phones, personal digital assistants (PDAs), and satellite TV receivers are based on wireless communications technology. Today the total number of users subscribing to cellular wireless services have surpassed the number of users subscribing to the wired telephone services. Besides cellular wireless technology, cordless phones, wireless local area networks (WLANs), and satellites are being extensively used for voice- as well as data-oriented communications applications and entertainment services. In 1895, Guglielmo Marconi demonstrated the feasibility of wireless communica- tions by using electromagnetic waves. In 1906, the first radio broadcast was done by Reginald Fessenden to transmit music and voice over the air. In 1907, the commer- cial trans-Atlantic wireless transmission was launched. In 1946, the first public mobile telephone systems were introduced in several American cities. The first analog cellu- lar system, the Nordic Mobile Telephone System (NMT), was introduced in Europe in 1981. In 1983, the first cellular wireless technology, the advanced mobile phone sys- tem (AMPS), was deployed for commercial use. During the last two decades there has been significant research and development in wireless communications technology.
    [Show full text]
  • INA1620 Hi-Fidelity Audio Op Amplifier with Integrated Thin-Film
    Product Order Technical Tools & Support & Folder Now Documents Software Community INA1620 SBOS859B –MARCH 2018–REVISED JULY 2018 INA1620 High-Fidelity Audio Operational Amplifier With Integrated Thin-Film Resistors and EMI Filters 1 Features 3 Description The INA1620 integrates 4 precision-matched thin-film 1• High-Quality Thin-Film Resistors Matched to 0.004% (Typical) resistor pairs and EMI filtering on-chip with a low- distortion, high output current, dual audio operational • Integrated EMI Filters amplifier. The amplifier achieves a very low, • Ultra-low Noise: 2.8 nV/√Hz at 1 kHz 2.8-nV/√Hz noise density with an ultra-low THD+N of • Ultra-low Total Harmonic Distortion + Noise: –119.2 dB at 1 kHz and drives a 32-Ω load at 150- –119 dB THD+N (142 mW/Ch Into 32 Ω/Ch) mW output power. The integrated thin-film resistors are matched to within 0.004% and can be used to • Wide Gain Bandwidth Product: create a large number of very high-performance 32 MHz (G = +1000) audio circuits. • High Slew Rate: 10 V/μs The INA1620 operates over a very wide supply range • High Capacitive-Load Drive Capability: > 600 pF of ±2 V to ±18 V on only 2.6 mA of supply current per • High Open-Loop Gain: 136 dB (600-Ω Load) channel. The INA1620 also has a shutdown mode, • Low Quiescent Current: 2.6 mA per Channel allowing the amplifiers to be switched from normal operation to a standby current that is typically less • Low-Power Shutdown Mode With Reduced Pop- than 5 µA.
    [Show full text]
  • Service Discovery and Device Identification in Cognitive Radio
    1 Service Discovery and Device Identification in Cognitive Radio Networks Rob Miller, Wenyuan Xu, Pandurang Kamat, Wade Trappe Wireless Information Network Laboratory (WINLAB), Rutgers University. Email: f wenyuan, pkamat, trappe [email protected] Abstract— Cognitive Radios (CR) will be able to commu- incompatible. Such communication can aid in interfer- nicate adaptively in an effort to optimize spectral efficiency. ence avoidance and therefore result in more efficient An integral step towards this goal involves obtaining a spectral collaboration. Cognitive radios (CR) achieve this representative view of the various services operating in level of cross-protocol communication since they expose a local area. Although it is possible to load different the lower-layers of the protocol stack to researchers and software modules to identify each potential service, such an approach is needlessly inefficient. Instead, rather than use developers. a collection of complete protocols on a CR, we believe that Because cognitive radios support dynamic physical it is essential to have a separate identification module that layer adaptation, future wireless networks will consist of is capable of reliably identifying services and devices while various wireless devices communicating with each other minimizing the code needed. In particular, by effectively using one or more protocols. Figure 1 shows a future leveraging protocol-specific properties, we show that it is wireless network where WiFi and Bluetooth devices are possible to utilize data from narrowband spectral sampling in order to identify broader band services and individual operating amongst cognitive radios. In this scenario, devices. We demonstrate the feasibility of such service and WiFi device W can communicate with CR C and CR device identification using GNU Radio and the Universal D via 802.11.
    [Show full text]
  • How We Made Bluetooth Bluetooth Allows Electronic Devices to Communicate Over Short Distances and Is Used by Billions of Devices Worldwide
    reverse engineering How we made Bluetooth Bluetooth allows electronic devices to communicate over short distances and is used by billions of devices worldwide. Jaap Haartsen recalls the developments that led to the establishment of the Bluetooth wireless technology standard. Jaap Haartsen n 1990, after completing my PhD at Delft uncertainty by not using all 79 carriers University of Technology, I was hired by during connection establishment, but INils Rydbeck who had just started the only 32 carriers. Since this did not satisfy Ericsson–GE mobile phone division in the FCC Part 15 requirements for FH, Research Triangle Park, North Carolina, spreading codes were used at connection USA. Rydbeck also headed the Ericsson establishment to satisfy the FCC’s hybrid mobile phone division in Lund, Sweden, and FH/DS spreading requirements. had created an ideal environment for young Early in 1995, Sven Mattisson joined engineers to play around with different ideas the Ericsson division in Lund. An expert and technologies without being restricted by on radio implementations, he started to commercial barriers. My first manager was work on the hardware development of the Paul Dent, a great inventor who taught me radio. The intent was to make a low-power how to map ideas into patent applications. radio in complementary metal–oxide– I initially worked on digital cellular semiconductor (CMOS) technology without telephony, but after a while I moved to Credit: Ibrandify / Alamy Stock Vector any external components. With the hardware indoor communications. team, I worked on system solutions to create In the summer of 1994, I moved to Lund, a full CMOS implementation.
    [Show full text]
  • Why Tempest Wireless Intercom?
    Why Tempest®? Why Tempest Wireless Intercom? Objective: This document is a guide for understanding Temepest Wireless Intercom. Questions: • Why was Tempest Wireless developed? • Is Tempest Wireless different than the intercom system I am using now? • Why are digital communications important? • Is Tempest Wireless compatible with my current wired intercom system? • Is Tempest Wireless compatible with my current wireless intercom system? • Understanding Federal Communications Commision (FCC) changes in the available radio frequencies • Is Tempest 2.4GHz Wireless a Wi-Fi device? • My current wireless system is working fine. Should I be concerned? • What are some of the unique features of Tempest Wireless? • Is Tempest Wireless the answer to all of my wireless communication needs? Why was Tempest Wireless developed? Tempest Wireless was developed by CoachComm, LLC., the leading supplier of sports intercom communications for 1A and 1AA football, and for thousands of college and high school football teams. In the past, the wireless portion of these intercom systems was based on traditional, 40-year-old commercially available UHF (Ultra High Frequency) wireless radio technology. While these products were consid- ered mature and reliable from a user prospective, there were a number of factors that drove the development of Tempest. Traditional UHF products are limited in features, can require Federal Communications Commission (FCC) licensing, need frequent repairs and maintenance, and can suffer from interference from other UHF systems. One common solution to the interference issue is to perform complicated frequency coordination for all wireless systems at a given venue. Because of the need to share the UHF radio spectrum with other users, frequency coordination often requires a reduction in the available useable frequencies (channels) for many users during a given event or show.
    [Show full text]
  • RURAL BROADBAND MOBILE COMMUNICATIONS: SPECTRUM OCCUPANCY and PROPAGATION MODELING in WESTERN MONTANA Erin Wiles Montana Tech
    Montana Tech Library Digital Commons @ Montana Tech Graduate Theses & Non-Theses Student Scholarship Spring 2017 RURAL BROADBAND MOBILE COMMUNICATIONS: SPECTRUM OCCUPANCY AND PROPAGATION MODELING IN WESTERN MONTANA Erin Wiles Montana Tech Follow this and additional works at: http://digitalcommons.mtech.edu/grad_rsch Part of the Electrical and Electronics Commons, Electromagnetics and Photonics Commons, and the Other Electrical and Computer Engineering Commons Recommended Citation Wiles, Erin, "RURAL BROADBAND MOBILE COMMUNICATIONS: SPECTRUM OCCUPANCY AND PROPAGATION MODELING IN WESTERN MONTANA" (2017). Graduate Theses & Non-Theses. 119. http://digitalcommons.mtech.edu/grad_rsch/119 This Thesis is brought to you for free and open access by the Student Scholarship at Digital Commons @ Montana Tech. It has been accepted for inclusion in Graduate Theses & Non-Theses by an authorized administrator of Digital Commons @ Montana Tech. For more information, please contact [email protected]. RURAL BROADBAND MOBILE COMMUNICATIONS: SPECTRUM OCCUPANCY AND PROPAGATION MODELING IN WESTERN MONTANA by Erin Wiles A thesis submitted in partial fulfillment of the requirements for the degree of Masters of Science Electrical Engineering Montana Tech 2017 ii Abstract Fixed and mobile spectrum monitoring stations were implemented to study the spectrum range from 174 to 1000 MHz in rural and remote locations within the mountains of western Montana, USA. The measurements show that the majority of this spectrum range is underused and suitable for spectrum sharing. This work identifies available channels of 5-MHz bandwidth to test a remote mobile broadband network. Both TV broadcast stations and a cellular base station were modelled to test signal propagation and interference scenarios. Keywords: spectrum monitoring, propagation modeling, spectrum management, mobile communication, remote mobile broadband, spectrum occupancy iii Dedication This work is dedicated to those who work hard and never give up.
    [Show full text]
  • Bob Mertens Applications Outphasing Transmitter for 2.45 Ghz ISM Band
    Design of an Efficient Textile Antenna Based Chireix Outphasing Transmitter for 2.45 GHz ISM Band Applications Bob Mertens Supervisors: Prof. dr. ir. Dries Vande Ginste, Prof. dr. ir. Johan Bauwelinck Counsellors: Ir. Gert-Jan Stockman, Ir. Martijn Huynen, Dr. ir. Guy Torfs, Ramses Pierco Master's dissertation submitted in order to obtain the academic degree of Master of Science in Electrical Engineering Department of Information Technology Chairman: Prof. dr. ir. Daniël De Zutter Faculty of Engineering and Architecture Academic year 2014-2015 Design of an Efficient Textile Antenna Based Chireix Outphasing Transmitter for 2.45 GHz ISM Band Applications Bob Mertens Supervisors: Prof. dr. ir. Dries Vande Ginste, Prof. dr. ir. Johan Bauwelinck Counsellors: Ir. Gert-Jan Stockman, Ir. Martijn Huynen, Dr. ir. Guy Torfs, Ramses Pierco Master's dissertation submitted in order to obtain the academic degree of Master of Science in Electrical Engineering Department of Information Technology Chairman: Prof. dr. ir. Daniël De Zutter Faculty of Engineering and Architecture Academic year 2014-2015 Preface This master's dissertation forms the last stage of a five-year journey at the Faculty of Engineer- ing and Architecture of Ghent University. During this last year, I've been assisted by many wonderful people, whom I like to thank here for their help. First of all, I would like to thank prof. dr. ir. D. Vande Ginste and prof. dr. ir. J. Bauwelinck for offering me the opportunity to carry out this thesis research at the Electromagnetics Group and the INTEC design group of the Department of Information Technology, and for providing me with the infrastructure and material to complete this research.
    [Show full text]
  • GRAPHENE RADIO Text Final
    1 GRAPHENE RADIO: DETECTING RADIOWAVES WITH A SINGLE ATOM SHEET M. Dragoman 1, D. Neculoiu 2, A. Cismaru 1, G. Deligeorgis 3, G. Konstantinidis 4, D. Dragoman 5* 1 National Institute for Research and Development in Microtechnology (IMT), P.O. Box 38-160, 023573 Bucharest, Romania, 2 Politehnica University of Bucharest, Electronics Dept., 1-3 Iuliu Maniu Av., 061071 Bucharest, Romania, 3LAAS CNRS, 7 Avenue du Colonel Roche, 31077 Toulouse Cedex 4, France, 4Foundation for Research & Technology Hellas (FORTH) P.O. BOX 1527,Vassilika Vouton, Heraklion 711 10, Crete, Greece, 5Univ. Bucharest, Physics Dept., P.O. Box MG-11, 077125 Bucharest, Romania. Abstract We present the experimental evidence of RF demodulation by a graphene monolayer embedded in a coplanar structure. The demodulator was tested in the frequency range from 100 MHz to 25 GHz using amplitude modulated input signals. An input power of 0 dBm (1 mW) was used which is the typical power emitted for short range wireless communication systems, such as Bluetooth. The graphene demodulator exhibits good signal response in the frequency range associated to industrial, scientific and medical (ISM) radio band (2.4 GHz). ______________________________________________________________ *Corresponding author: [email protected] 2 The radio is moving ahead towards nanoscale devices and is termed as nanoradio. Its extremely miniature dimensions pave the way for new applications of nanoradio are opened not only in free-space (Bluetooth devices or RFID tags) but in blood stream for controlled drug delivery , implant monitoring 1,2 and energy harvesting 3. Up to now, the nanoradio was based on NEMS (nano-electromechanical systems) based on carbon nanotubes which are 4-5 orders of magnitude smaller than the actual radios implemented with advanced Si technologies.
    [Show full text]
  • Technical Overview of Frequency Assignment for Radio Broadcasting in Nigeria
    IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-ISSN: 2278-1676,p-ISSN: 2320-3331, Volume 11, Issue 5 Ver. I (Sep - Oct 2016), PP 01-05 www.iosrjournals.org Technical Overview of Frequency Assignment For Radio Broadcasting In Nigeria ¹ Okorogu V. N.,² Alumona T. L., ³Onwuka P.E., 4Emenike C. J. ¹,2Department of Electronic & Computer Engineering, NAU Awka ³St. Patrick Secondary School, ICT Department, Okoti-Odekpe, Anambra 4Bobo Food & Beverages Limited, ICT Department, Agege Lagos Abstract: In Nigeria, the VHF and UHF frequency bands of the electromagnetic spectrum are mainly occupied by television services, while radio broadcasting is transmitted in the low frequency, medium frequency and high frequency bands. Therefore, it is important to manage the allocated spectrum for these services to ensure that radio stations, cellular network and television broadcast stations do not interfere in signal transmission . The governance of spectrum use on a global basis is a core responsibility of the International Telecommunication Union (ITU) and in particular, its Radio communication Sector (ITU-R).At the national level, the Radio Frequency Spectrum is managed by the following organs of government which include Ministry of Information and Communications (MoIC); National Frequency Management Council (NFMC); Nigerian Communications Commission (NCC) and National Broadcasting Commission (NBC).Frequency assignment and management is less stringent with good planning and monitoring. Radio wave propagation are affected by transmission impairment , if not well planned will results in signal degradations on the system. Hence, this paper reviews the technicalities involved in frequency assignment taking a holistic view at the existing spectrum management. Keyword: Frequency assignment, ITU, MoIC, NFMC, NCC, NBC, ISM, RF.
    [Show full text]