ibeacon Spoofing Security and Privacy Implications of ibeacon Technology Karan Singhal
|
|
- Deirdre Powell
- 5 years ago
- Views:
Transcription
1 ibeacon Spoofing Security and Privacy Implications of ibeacon Technology Karan Singhal ABSTRACT Apple introduced ibeacons with ios 7, revolutionizing the way our phones interact with real- life places and objects. ibeacons leverage Bluetooth Low Energy (BLE) to broadcast a unique identifier and two 8- bit integers known as the major and minor numbers. These components are used to identify the ibeacon. Typical use cases include indoor micro- location and interaction with real- world objects. However, it is trivial to spoof a beacon by broadcasting the same UUID and same major and minor numbers. Thus, Apple stresses that ibeacons should not be used to transfer sensitive details such as credit card information they should only be used for identification of objects or places. To safeguard against spoofing, beacon detection can be verified by additional security measures (such as physically scanning a QR code). Apart from the security implications of using an easily spoofable Bluetooth signal, ibeacons also create a privacy concern. As an example, retail stores could tag products with ibeacons and record which users pick up which products. They could later use this data to create targeted advertisements or track your location in their store. My research shows that current ibeacon implementations in the wild are not widely used for sensitive data, limiting the potential motivation for exploiters. However, the privacy concerns with the platform are warranted and could result in dire consequences.
2 INTRODUCTION On June 10 th, 2013 Apple released ios 7 and unveiled ibeacons to the world. For many developers, this was a new and unique way to integrate real world objects into mobile applications. Apple provided ranging, proximity, and many other algorithms which abstracted away the complexities of finding or advertising Bluetooth Low Energy (BLE) devices. Because this technology is backward compatible to the iphone 4S, support and implementation occurred rapidly. Just a few months later, on July 24 th, 2013 Google released Android 4.3, with support for Bluetooth Low Energy in the central role and provides APIs that apps can use to discover devices, query for services, and read/write characteristics. 1 With both major smartphone platforms able to detect and broadcast as ibeacons, the adoption of ibeacon technology is on the rise. Of course, in order for any of the myriad of ibeacon applications to work, there has to be a beacon broadcasting. Any compatible device can be used 1 "Bluetooth Low Energy." Android Developers. Google Inc. Web. 1 Dec < le.html>.
3 as a broadcasting ibeacon, and there are a growing number of companies that manufacture BLE hardware. Retail stores, supermarkets, and many other businesses are finding innovative ways to improve their customer experience by integrating ibeacons. The possibilities are endless airports are integrating ibeacons to save passengers time and money. 2 Simply by walking up to a checkpoint, your smartphone would recognize an ibeacon and automatically pull up your boarding pass. By walking by a currency exchange counter you could qualify for a special discount that other travelers would never receive. The possibilities for innovative ibeacon implementations are endless, but the security and privacy concerns could be immense as well. TO THE COMMUNITY 2 Virgin Atlantic Unveils New Airport Terminal Experience Powered by Apple's IBeacon." AppleInsider, 2 May Web. 2 Dec < atlantic- unveils- new- airport- terminal- experience- powered- by- apples- ibeacon>.
4 Since the release of ibeacon, over 270 million iphones 3 have been sold all compatible with the Bluetooth 4.0 standard, and thus ibeacon- enabled. When combined with BLE- capable Android devices, the number of ibeacon- capable smartphones is staggering. Since each of these devices can download and install applications that interact with beacons, most smartphone owners today could be vulnerable to security and privacy concerns of ibeacon. Common use cases of ibeacons typically employ the technology to facilitate indoor micro- location. Sometimes, the detection of a beacon is used to push special discounts or offers to the user if they pass a certain virtual checkpoints. In these scenarios, someone can simply spoof the ibeacon by using their own hardware and broadcasting the same UUID, major number, and minor number to their device thereby bypassing the purpose of the promotion. I believe that this specific ibeacon security issue has the greatest potential for abuse. 3 "Apple IPhone: Global Sales , by Quarter." Statista. Web. 2 Dec < apple- iphone- sales- since- 3rd- quarter- 2007/>.
5 Here follows an example of a possible way to abuse this system. A new application called Howler is leveraging ibeacon technology to create realtime deals, notifications, and opportunities delivered directly to your device from businesses within eye sight. 4 Their cloud server accumulates this data and charges their business partners on a per- visit basis. It would be trivial to replicate the ibeacon from any given business and have your smartphone discover it several times, thereby causing Howler to charge the business for these fake visits. From a privacy viewpoint, ibeacons have a potential for abuse as well. Any interaction that an application has with an ibeacon can be recorded. This means, for example, that the retail store application that helps you find the right aisle in their store using indoor ibeacon micro- location can track your location. VULNERABILITIES AND DEFENSES 4
6 In 2014, the Consumer Electronics Show (CES) hosted a scavenger hunt that used ibeacon technology. They placed 9 ibeacons around the building, and offered a reward to those who could locate them all. Alsaidar Allan and Sandeep Mistry from Makezine outline an innovative way to win the hunt, without ever having to go to CES. 5 In their article, they demonstrate how someone can duplicate the ibeacons, set up some BLE hardware broadcasting identically to the 9 official beacons, and claim the prize from anywhere in the world. To do so, they downloaded the Android version of the CES mobile application and decompiled it. Without too much digging they were able to find the UUID with which the beacons were broadcasting, because the application must know the UUID to recognize and identify the beacons. The decompiled source also shows the minor numbers that the app was waiting to recognize (major number was ignored in the Android CES ibeacon implementation). Instead of decompiling the application, Apple notes that since a beacon device is advertising using BLE, it is possible for the UUID to be sniffed off the air and once that UUID is 5 Allan, Alasdair, and Sandeep Mistry. "Hacking the CES Scavenger Hunt." Makezine. 3 Jan Web. 2 Dec < the- ces- scavenger- hunt/>.
7 known, it could be used by other apps. 6 Now, they could simply set up 9 custom beacons that spoof the official beacons, and their phone would recognize them. The CES mobile application then presents them with the prize. This example clearly depicts the biggest security flaw with ibeacons since the UUID and major and minor numbers have to be specified in order to find beacons, the source code gives away all three. Anybody can replicate any beacon from the comfort of their home and claim discounts, prizes, or other rewards, bypassing the intended goal of the promotion. So how do you safeguard against this vulnerability? The most practical way is to do a physical verification check that is similar to two- factor authentication (which is becoming a standard for OAuth and other forms of virtual authentication). For example, the CES application could have prompted the user to scan a QR code or enter a secret number written next to each of the CES beacons. This would verify that the user was actually on 6 "Getting Started with IBeacon." Apple Developer. Apple Inc., 2 June Web. 1 Dec < Started- with- ibeacon.pdf>.
8 location (or at worst he received the code/number from a friend there), so the risk of a spoofing attack could be significantly mitigated. Of course, physical verification doesn t eliminate the risk, but it removes the low- hanging fruit and deters hacking hobbyists from trying to exploit an ibeacon implementation. From the privacy standpoint there is only one real option that keeps your ibeacon interactions from being used maliciously but it is only possible on ios and comes with a big tradeoff. ibeacon applications will not work until the user allows the application to use Bluetooth. This is Apple s implementation and it appears as a simple popup that occurs when the application tries to use Bluetooth. Users can simply accept or deny the request. Of course, if you deny the request you miss out on the significant benefits of the technology.
9 SUMMARY All in all, ibeacons are an innovative and useful tool to integrate smartphone apps with the real world. Developers implementing ibeacon functionality must be extremely careful not to transfer sensitive data using ibeacons, or use physical verification to supplement the ibeacon transaction. The main vulnerability of ibeacon devices is the ability to spoof them using your own hardware and bypass their intended purpose. Implementing physical verification in addition to ibeacons can mitigate this risk. The privacy concerns cannot be overlooked either your interaction with ibeacons can be recorded by the application, and this data could be used to track your location without your knowledge or consent. It is very common and easy to overlook Apple s warning that the application uses Bluetooth, so users may be unaware that their application uses ibeacons at all, and that is the only safeguard preventing your privacy from being invaded. Users should take steps to be informed about why applications want to use their location or their devices Bluetooth capabilities and should trust the applications they approve to do so.
10 SUPPORTING MATERIAL Provided alongside this article is the source code for the ibeacon pairing component in an ios application that uses ibeacon technology to pair two devices. The full source code can be provided upon request. This is a proof of concept of the physical verification step that could mitigate the risk of a spoof attack. This application (SpotLight Parking) provides an on- demand valet service to park your car. A customer requests a valet at a specific location and drives there. Upon arrival, the customer s iphone looks for the valet s iphone, which is broadcasting as an ibeacon. When found, it prompts the user to enter a 4- digit verification code that is located on the valet s application and changes for each request. This step ensures that nobody can masquerade as a valet and steal the customer s car.
11 REFERENCES [1] "Getting Started with IBeacon." Apple Developer. Apple Inc., 2 June Web. 1 Dec < Started- with- ibeacon.pdf>. [2] "Apple IPhone: Global Sales , by Quarter." Statista. Web. 2 Dec < apple- iphone- sales- since- 3rd- quarter- 2007/>. [3] "Bluetooth Low Energy." Android Developers. Google Inc. Web. 1 Dec < le.html>. [4] Virgin Atlantic Unveils New Airport Terminal Experience Powered by Apple's IBeacon." AppleInsider, 2 May Web. 2 Dec < atlantic- unveils- new- airport- terminal- experience- powered- by- apples- ibeacon>. [5] "IBeacon Security Part 2: Beacon Privacy and Security." Twocanoes, 29 May Web. 2 Dec < security- part- 2- beacon- privacy- and>. [6] Allan, Alasdair, and Sandeep Mistry. "Hacking the CES Scavenger Hunt." Makezine. 3 Jan Web. 2 Dec < the- ces- scavenger- hunt/>.
ARUBA LOCATION SERVICES
ARUBA LOCATION SERVICES Powered by Aruba Beacons The flagship product of the product line is Aruba Beacons. When Aruba Beacons are used in conjunction with the Meridian mobile app platform, they enable
More informationA Simple Smart Shopping Application Using Android Based Bluetooth Beacons (IoT)
Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 5 (2017), pp. 885-890 Research India Publications http://www.ripublication.com A Simple Smart Shopping Application Using
More informationComparison ibeacon VS Smart Antenna
Comparison ibeacon VS Smart Antenna Introduction Comparisons between two objects must be exercised within context. For example, no one would compare a car to a couch there is very little in common. Yet,
More informationSenion IPS 101. An introduction to Indoor Positioning Systems
Senion IPS 101 An introduction to Indoor Positioning Systems INTRODUCTION Indoor Positioning 101 What is Indoor Positioning Systems? 3 Where IPS is used 4 How does it work? 6 Diverse Radio Environments
More informationThe definitive guide for purchasing Bluetooth Low Energy (BLE) Beacons at scale
The definitive guide for purchasing Bluetooth Low Energy (BLE) Beacons at scale If you re working on an enterprise Request For Quote (RFQ) or Request For Proposal (RFP) for BLE Beacons using any of the
More informationDYNAMIC BLUETOOTH BEACONS FOR PEOPLE WITH DISABILITIES
DYNAMIC BLUETOOTH BEACONS FOR PEOPLE WITH DISABILITIES A journey from ibeacon to IoT beacons, InfinIT Summit 2017 BLUETOOTH BEACONS Short information sent by radio A few times per second Kind of radio
More informationUSER GUIDE CUBEACON TOOLS MOBILE ANDROID APP
USER GUIDE CUBEACON TOOLS MOBILE ANDROID APP CONNET YOUR IDEAS TO WORLD Version 1.2 Mei 17 About CUBEACON Cubeacon : ibeacon bluetooth technology is to meet the full bene ts of signal transmission required
More informationHow to implement proximity marketing campaigns without an app
How to implement proximity marketing campaigns without an app Generate more revenue from current customers & attract new visitors by using Eddystone beacons Table of Contents: Why Eddystone will be a game
More informationBeacons Proximity UUID, Major, Minor, Transmission Power, and Interval values made easy
Beacon Setup Guide 2 Beacons Proximity UUID, Major, Minor, Transmission Power, and Interval values made easy In this short guide, you ll learn which factors you need to take into account when planning
More information1. Product Introduction FeasyBeacons are designed by Shenzhen Feasycom Technology Co., Ltd which has the typical models as below showing: Model FSC-BP
,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, FeasyBeacon Getting Started Guide Version 2.5 Feasycom Online Technical Support: Skype: Feasycom Technical Support Direct Tel: 086 755 23062695 Email:
More informationIoT. Indoor Positioning with BLE Beacons. Author: Uday Agarwal
IoT Indoor Positioning with BLE Beacons Author: Uday Agarwal Contents Introduction 1 Bluetooth Low Energy and RSSI 2 Factors Affecting RSSI 3 Distance Calculation 4 Approach to Indoor Positioning 5 Zone
More informationeventzee Scavenger Hunt Guide
eventzee Scavenger Hunt Guide You Did It. You ve just made one of the better decisions of your life: You ve signed up to host an Eventzee scavenger hunt. So now that the hard part is out of the way it
More informationRound shape, white case with 3M adhesive sticker, including 2pcs ER12450 battery and industrial package, special for indoor location, RoHS
Beacon / ibeacon / MiniBeacon FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed
More informationIndoor Positioning 101 TECHNICAL)WHITEPAPER) SenionLab)AB) Teknikringen)7) 583)30)Linköping)Sweden)
Indoor Positioning 101 TECHNICAL)WHITEPAPER) SenionLab)AB) Teknikringen)7) 583)30)Linköping)Sweden) TechnicalWhitepaper)) Satellite-based GPS positioning systems provide users with the position of their
More informationCSRmesh Beacon management and Asset Tracking Muhammad Ulislam Field Applications Engineer, Staff, Qualcomm Atheros, Inc.
CSRmesh Beacon management and Asset Tracking Muhammad Ulislam Field Applications Engineer, Staff, Qualcomm Atheros, Inc. CSRmesh Recap Bluetooth Mesh Introduction What is CSRmesh? A protocol that runs
More informationPaper number ITS-EU-SP0127. Experimenting Bluetooth beacon infrastructure in urban transportation
11 th ITS European Congress, Glasgow, Scotland, 6-9 June 2016 Paper number ITS-EU-SP0127 Jukka Ahola (jukka.ahola@vtt.fi) 1*, Samuli Heinonen (samuli.heinonen@vtt.fi) 1 1. VTT Technical Research Centre
More informationSplunking ibeacon (BLE) for Profit and Pleasure
Copyright 2014 Splunk Inc. Splunking ibeacon (BLE) for Profit and Pleasure Cody Harris Stefan Sievert SE Manager Client Architect Disclaimer During the course of this presentajon, we may make forward looking
More informationHack Your Ride With Beacon Technology!
Hack Your Ride With Beacon Technology! #kontakt_io Trevor Longino Head of Marketing & PR @trevorlongino @kontakt_io We help build the world s best proximity solutions 10 thousand+ clients! Welcome to the
More informationPervasive Indoor Localization and Tracking Based on Fingerprinting. Gary Chan Professor, CSE HKUST
Pervasive Indoor Localization and Tracking Based on Fingerprinting Gary Chan Professor, CSE HKUST 2 Catchphrase: Location, Location, Location! 3 Outdoor Location-Based Services (LBS) Based on GPS (Global
More informationCYBER SECURITY GUIDELINES FOR COMPUTER BASED GAMING APPLICATIONS
CYBER SECURITY GUIDELINES FOR COMPUTER BASED GAMING APPLICATIONS Document Control Version: 1.0 Author: CS Policies and Standards Section - MOTC Classification: Public Date of Issue: November 2016 Contents
More informationDocuSign for ios: For Field Sales & Field Services
DocuSign for ios: For Field Sales & Field Services How DocuSign for ios enables field sales and field services to transact business anytime, anywhere on ios devices Key Challenges FOR FIELD SALES AND SERVICES
More informationEnhancing Bluetooth Location Services with Direction Finding
Enhancing Bluetooth Location Services with Direction Finding table of contents 1.0 Executive Summary...3 2.0 Introduction...4 3.0 Bluetooth Location Services...5 3.1 Bluetooth Proximity Solutions 5 a.
More informationDesign of MDM System using BLE Beacon and Extended Kalman Filter
Indian Journal of Science and Technology, Vol 9(29), DOI: 10.17485/ijst/2016/v9i29/94761, August 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Design of MDM System using BLE Beacon and Extended
More informationPixie Location of Things Platform Introduction
Pixie Location of Things Platform Introduction Location of Things LoT Location of Things (LoT) is an Internet of Things (IoT) platform that differentiates itself on the inclusion of accurate location awareness,
More informationApple created ibeacons utilizing Bluetooth low-energy (BLE) technology, offering a new
Angela Hart Linda Huber Mia Gao Wenting Mai Laura Werthmann Abstract: Apple created ibeacons utilizing Bluetooth low-energy (BLE) technology, offering a new method to interact with customers utilizing
More informationConcept of the application supporting blind and visually impaired people in public transport
Academia Journal of Educational Research 5(12): 472-476, December 2017 DOI: 10.15413/ajer.2017.0714 ISSN 2315-7704 2017 Academia Publishing Research Paper Concept of the application supporting blind and
More informationGeo-fence Tracking Device User Manual
Geo-fence Tracking Device User Manual home8care.com 1-844-800-6482 support@home8care.com V1.1 2017 1 Table of Contents Table of Contents... 1 Chapter 1. Introduction... 2 1.1 System Requirement... 2 Chapter
More informationBeacon Indoor Navigation System. Group 14 Andre Compagno, EE. Josh Facchinello, CpE. Jonathan Mejias, EE. Pedro Perez, EE.
Beacon Indoor Navigation System Group 14 Andre Compagno, EE. Josh Facchinello, CpE. Jonathan Mejias, EE. Pedro Perez, EE. Motivation GPS technologies are not effective indoors Current indoor accessibility
More informationTechnical Disclosure Commons
Technical Disclosure Commons Defensive Publications Series November 22, 2017 Beacon-Based Gaming Laurence Moroney Follow this and additional works at: http://www.tdcommons.org/dpubs_series Recommended
More informationAP Computer Science Principles
2018 AP Computer Science Principles Sample Student Responses and Scoring Commentary Inside: Performance Task Explore RR Scoring Guideline RR Scoring Commentary Student Samples provided separately College
More informationof Nebraska - Lincoln
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Faculty Publications, UNL Libraries Libraries at University of Nebraska-Lincoln 9-2011 Emerging Ideas on Emerging Technologies.
More informationIOT: IMPACT OF THE PHYSICAL WEB AND BEACONS
IOT: IMPACT OF THE PHYSICAL WEB AND BEACONS Dr. Debasis Bha,acharya, Mario Canul, Saxon Knight ICS Faculty University of HawaiʻI Maui College debasisb@hawaii.edu (808) 984-3619 maui.hawaii.edu/cybersecurity
More informationTRBOnet Mobile. User Guide. for ios. Version 1.8. Internet. US Office Neocom Software Jog Road, Suite 202 Delray Beach, FL 33446, USA
TRBOnet Mobile for ios User Guide Version 1.8 World HQ Neocom Software 8th Line 29, Vasilyevsky Island St. Petersburg, 199004, Russia US Office Neocom Software 15200 Jog Road, Suite 202 Delray Beach, FL
More informationA CASE FOR CONNECTION:
A CASE FOR CONNECTION: Redefining the Real-Time Customer Experience with Beacons In Balance 1 Table of Contents Introduction...3 Key Takeaways...4 What are beacons?...5 How do beacons work?...7 Discovery...8
More informationIntroduction to Mobile Sensing Technology
Introduction to Mobile Sensing Technology Kleomenis Katevas k.katevas@qmul.ac.uk https://minoskt.github.io Image by CRCA / CNRS / University of Toulouse In this talk What is Mobile Sensing? Sensor data,
More informationSmart Beacon Management with BlueRange
Smart Beacon Management with BlueRange Version 1.1 Status 01/2018 This article describes the need for Smart Beacon Management, demonstrates innovative ways to manage and control it efficiently, and shows
More informationTHE BASICS OF BEACONS
10 MINDBLOWING M-COMMERCE ibeacon CASE STUDIES THE BASICS OF BEACONS BEACON: SIMPLY PUT, IT CONSISTS OF TWO PARTS: A BROADCASTER (BEACON DEVICE) AND A RECEIVER (SMARTPHONE OR WEARABLE). WHAT IS A BEACON?
More informationTHE ETHERNIA PROJECT
ddddd THE ETHERNIA PROJECT Ethernia is the first open world MMO, multi-platform game that is powered by the Ethereum blockchain. It s a new ERA of gaming. Each step of exploration will be at your own
More informationTaleBlazer: Using ibeacons for Indoor Location-Based Augmented Reality Games. Ellen Yongin Finch
TaleBlazer: Using ibeacons for Indoor Location-Based Augmented Reality Games by Ellen Yongin Finch Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the
More informationRunning head: THE IMPACT OF COMPUTER ENGINEERING 1
Running head: THE IMPACT OF COMPUTER ENGINEERING 1 The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015 THE IMPACT OF COMPUTER ENGINEERING 2 Abstract The purpose of this paper
More informationAIMICT.ORG AIMICT Newsletter
SEPTEMBER 2018 AIMICT.ORG 1 IN THIS ISSUE AIMICT Conducts ISO 9001 Lead Auditor Course AIMICT Conducts ILM s Training of Trainers Program in Irbid AIMICT Organizes Professional Quality Manager Program
More informationInternational Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN
International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 38 Attendance system using Beacon Technology 1 Varshini A, 2 Indhurekha S 1 UG Scholar, 2 Assistant Professor, Computer
More informationINTRODUCTION CHAPTER 1 CRITIQUING DESIGN Practice Questions CHAPTER 2 DESIGNING A DESKTOP APPLICATION... 21
Table of Contents INTRODUCTION... 10 CHAPTER 1 CRITIQUING DESIGN... 12 Practice Questions... 13 Answers... 13 How do you like LinkedIn s endorse feature?... 13 Tell me about a product you like and use
More informationIntroduction. What is Kraken Coin. Why invest in Kraken Coin
Table of Contents INTRODUCTION 2 What is Kraken Coin 2 Why invest in Kraken Coin 2 Features 3 Kraken Coin Specifications 4 Invest in masternodes to generate cryptocurrency yields 5 Masternodes building
More informationLecture 7 Ethics, Privacy, and Politics in the Age of Data
Lecture 7 Ethics, Privacy, and Politics in the Age of Data Module Roadmap Representation Technologies Digital workplaces Ethics, Privacy and Politics Digital Workplaces and Capitalist Accumulation tbc
More informationAlways stay in touch with your home!
Always stay in touch with your home! 01 Meet Cockpit Fulfill your dream of a functional intelligent home Can you imagine life without smartphones, tablets or any other portable device that facilitate your
More informationMOBILE COMPUTING 1/29/18. Cellular Positioning: Cell ID. Cellular Positioning - Cell ID with TA. CSE 40814/60814 Spring 2018
MOBILE COMPUTING CSE 40814/60814 Spring 2018 Cellular Positioning: Cell ID Open-source database of cell IDs: opencellid.org Cellular Positioning - Cell ID with TA TA: Timing Advance (time a signal takes
More informationibeacons Bible 1.0 For the latest version of this document, please visit
ibeacons Bible 1.0 Andy Cavallini (Gaia-Matrix) andy.cavallini@gaia-matrix.com http://www.gaia-matrix.com For the latest version of this document, please visit http://www.gaia-matrix.com Contents Preface
More informationWELLCORE R ibeacon Series
WELLCORE R ibeacon Series Product Specification V1.0 March-2016 NOTE: INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH WELLCORE PRODUCTS, NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE,
More informationBTLE beacon for 8262 DECT handset Engineering Rules
BTLE beacon for 8262 DECT handset Engineering Rules 8AL90346ENAAed01 April 2017 Table of content 1. INTRODUCTION... 3 2. LIST OF ACRONYMS... 3 3. RECOMMENDED USE CASES... 3 3.1 BEACON EVENT... 3 3.2 LOCATION
More informationBluetooth Low Energy Sensing Technology for Proximity Construction Applications
Bluetooth Low Energy Sensing Technology for Proximity Construction Applications JeeWoong Park School of Civil and Environmental Engineering, Georgia Institute of Technology, 790 Atlantic Dr. N.W., Atlanta,
More informationIndoor Navigation System with Beacons
Indoor Navigation System with Beacons Fall 2014Group 14 Andre Compagno Josh Facchinello Jonathan Mejias Pedro Perez May 1, 2015 Table of Contents 1.0 Executive Summary Page 1 2.0 Project Description 2.1
More informationWorkplace Service. Contents
Topic: Mobile Issues: What technologies and architectures make up a mobile ecosystem? Authors: Jim Lundy, David Mario Smith What are the trends affecting mobile computing? Aragon Research Technology Arc
More informationFastPass A Harmonized Modular Reference System for Automated Border Crossing (ABC)
FastPass A Harmonized Modular Reference System for Automated Border Crossing (ABC) EAB - Research Project Conference, Darmstadt, September 19 th, 2016 Presented by Markus Clabian Senior Research Engineer,
More informationSHOPPING IN MOTION HOW POSITIONING, INDOOR NAVIGATION AND PERSONALIZED MOBILE MARKETING SET STATIONARY TRADE IN MOTION.
SHOPPING IN MOTION HOW POSITIONING, INDOOR NAVIGATION AND PERSONALIZED MOBILE MARKETING SET STATIONARY TRADE IN MOTION. Nowadays customers are provided with various channels for shopping and for getting
More informationParents Guide to Fortnite
Parents Guide to Fortnite The craze for Fortnite, especially its multiplayer standalone mode Fortnite Battle Royale, has exploded recently especially amongst children. So, what do you need to know about
More informationCatalog
- 1 - Catalog 1. Description...- 3-2. Features...- 3-3. Application...- 3-4. Block Diagram...- 3-5. Electrical Characteristics... - 4-6. Operation... - 4-1) Power on Reset...- 4-2) Setting Mode... - 5-3)
More informationTABLE OF CONTENTS. Introduction 1. Abstract 3. Features 5. What makes the DixiHub project different 6. The Gaming Industry 8. Roadmap 9.
TABLE OF CONTENTS Introduction 1 Abstract 3 Features 5 What makes the DixiHub project different 6 The Gaming Industry 8 Roadmap 9 Bounties 10 Coin Information 11 INTRODUCTION Gamers are constantly scraping
More informationCOMPATIBILITY TESTING FOR MOBILE GAMES
WHITEPAPER COMPATIBILITY TESTING FOR MOBILE GAMES Ensuring smooth performance of games across platforms and devices by testing their performance comprehensively 1 THE PLATFORM VARIATIONS The mobile phone
More informationUsing ibeacon for Intelligent In-Room Presence Detection
Using ibeacon for Intelligent In-Room Presence Detection Yang Yang, Zhouchi Li and Kaveh Pahlavan Center for Wireless Information Network Studies (CWINS) Worcester Polytechnic Institute (WPI), Worcester,
More informationOn Practical Selective Jamming of Bluetooth Low Energy Advertising
On Practical Selective Jamming of Bluetooth Low Energy Advertising S. Brauer, A. Zubow, S. Zehl, M. Roshandel, S. M. Sohi Technical University Berlin & Deutsche Telekom Labs Germany Outline Motivation,
More informationAccurate Real-time Indoor Navigation
Accurate Real-time Indoor Navigation 1 Table of Content 1 Overview... 3 2 Market... 3 3 Indoor Localisation Technologies... 4 3.1 GPS/Assisted GPS... 4 3.2 Wi-Fi Trilateration Low Accuracy... 5 3.3 Hardware
More informationA Beacon of Hope: The Event Intelligence Revolution
A Beacon of Hope: The Event Intelligence Revolution Beacon technology has dramatically shifted the landscape of almost every industry, and the potential for the event marketing world is limitless. Game
More information1.1. INTRODUCTION PURPOSE COIN SPECIFICATION ALGORITHM COIN TYPE MASTERNODE FEATURES
1 1.1. INTRODUCTION 3 2.1. PURPOSE 3 3.1. COIN SPECIFICATION 4 4.1. ALGORITHM 5 5.1. COIN TYPE 5 6.1. MASTERNODE 6 7.1. FEATURES 7 8.1. MARKETING 7 9.1. COIN OWNERSHIP 8 10.1 COIN DISTRIBUTION 8 10.2.
More informationBook Searching Navigation in Libraries Based on ibeacon Technology
Journal of Computer Sciences and Applications, 2019, Vol. 7, No. 1, 10-15 Available online at http://pubs.sciepub.com/jcsa/7/1/2 Published by Science and Education Publishing DOI:10.12691/jcsa-7-1-2 Book
More informationBI TRENDS FOR Data De-silofication: The Secret to Success in the Analytics Economy
11 BI TRENDS FOR 2018 Data De-silofication: The Secret to Success in the Analytics Economy De-silofication What is it? Many successful companies today have found their own ways of connecting data, people,
More informationTable of Contents. Introduction 3. How it Works 4. Who Can Benefit From GPT Sites 5. Getting Started 6
Table of Contents Introduction 3 How it Works 4 Who Can Benefit From GPT Sites 5 Getting Started 6 Tips to Help You Maximize Your Profits Through Trial Offers 7 Site Registration 9 Completing Your First
More informationPEAK GAMES IMPLEMENTS VOLTDB FOR REAL-TIME SEGMENTATION & PERSONALIZATION
PEAK GAMES IMPLEMENTS VOLTDB FOR REAL-TIME SEGMENTATION & PERSONALIZATION CASE STUDY TAKING ACTION BASED ON REAL-TIME PLAYER BEHAVIORS Peak Games is already a household name in the mobile gaming industry.
More informationMake Your Local Government A Lean, Green, Constituent-Centric Machine
Make Your Local Government A Lean, Green, Constituent-Centric Machine Best Practices for Local Government Entities WEBINAR SUMMARY Make Your Local Government A Lean, Green, Constituent-Centric Machine
More informationAruba Beacons Validated Reference Design
Aruba Beacons Validated Reference Design Copyright 2015 Hewlett Packard Enterprise Development LP Open Source Code This product includes code licensed under the GNU General Public License, the GNU Lesser
More informationclash of clans gem hack download no survey mac ACCESS GENERATOR HERE
+@ clash of clans gem hack download no survey mac ================>
More informationPresented by JOHN RAVLIC Ravim RBC
Leveraging Technology: Digitising Services Presented by JOHN RAVLIC Ravim RBC Introduction UK findings used to explore the Australian and New Zealand context Telephone interviews with local government
More informationidocent: Indoor Digital Orientation Communication and Enabling Navigational Technology
idocent: Indoor Digital Orientation Communication and Enabling Navigational Technology Final Proposal Team #2 Gordie Stein Matt Gottshall Jacob Donofrio Andrew Kling Facilitator: Michael Shanblatt Sponsor:
More informationEvaluating the Impact of Malicious Spoofing Attacks on Bluetooth Low Energy Based Occupancy Detection Systems
Evaluating the Impact of Malicious Spoofing Attacks on Bluetooth Low Energy Based Occupancy Detection Systems William Oliff Computing and Information Systems University of Greenwich, UK Email: william.oliff@gre.ac.uk
More informationPS4 Remote Play review: No Farewell to Arms, but a Moveable Feast
PS4 Remote Play review: No Farewell to Arms, but a Moveable Feast PlayStation 4 is the most fantastic console in the Universe! Why do we say so? Because PS4 is the most popular gaming console ever. Accordingly
More informationSHOP&NAV: ibeacon based indoor assistance and Navigation System
International Journal of Scientific and Research Publications, Volume 6, Issue 11, November 2016 71 SHOP&NAV: ibeacon based indoor assistance and Navigation System K.A.D.K.N Peiris,S.A Asmina, A.A.T.K.K
More informationProject Marvin: A Social Networking Program for Android
Project Marvin: A Social Networking Program for Android Washington University Department of Computer Science and Engineering CSE 537S Mobile Computing Spring 2008 Brandon Morgan Katherine Maschmeyer Mamta
More informationHow to Pair AbiBird Sensor with App and Account
How to Pair AbiBird Sensor with App and Account By pairing your AbiBird sensor with your AbiBird app and account, you make it posible for signals to pass from the sensor, via the Cloud, to the AbiBird
More informationRiver slots app download
River slots app download Search 28-5-2014 Play the best FREE slots game on mobile! River Otter Slots. River Otter Slots. Get the best multi- slot experience on Android! Download now for free!. Riverslot
More information11 ASTONISHINGLY SIMPLE WAYS TO ATTRACT CUSTOMERS USING POKÉMON GO
11 ASTONISHINGLY SIMPLE WAYS TO ATTRACT CUSTOMERS USING POKÉMON GO Be it a fad or the new normal, Pokémon GO an augmented reality computer game has taken the world by storm. To put things into perspective,
More informationGOOD GAME PLATFORM GAMING IS ALWAYS BETTER WITH FRIENDS
GOOD GAME PLATFORM GAMING IS ALWAYS BETTER WITH FRIENDS The Vision The platform in 5 years Facts 2 billion gamers More than in the world Facts 140 $128.5 billion 120 100 80 60 40 20 The market is expected
More informationWHITE PAPER A Global Crypto currency
WHITE PAPER A Global Crypto currency CONTENTS 1. Introduction a. What is Capricot Coin 2. Capricot Coin Specification 3. Capricot Coin Distribution a. Capricot Coin Pre Sale b. Capricot Coin Pre Sale Target
More informationDecentralized Protocol for Self-Sovereign Identities with Embedded Compliance
Decentralized Protocol for Self-Sovereign Identities with Embedded Compliance A self-sovereign identity portal for regulated industries and the Internet of Everything guy.davies@blockpass.org www.blockpass.org
More informationDesign and Implementation of Distress Prevention System using a Beacon
Design and Implementation of Distress Prevention System using a Beacon Imsu Lee 1, Kyeonhoon Kwak 1, Jeonghyun Lee 1, Sangwoong Kim 1, Daehan Son 1, Eunju Park 1 and Hankyu Lim 1.a 1 Department of Multimedia
More informationExperimental Evaluation of Precision of a Proximity-based Indoor Positioning System
Experimental Evaluation of Precision of a Proximity-based Indoor Positioning System Sylvia T. Kouyoumdjieva and Gunnar Karlsson School of Electrical Engineering and Computer Science KTH Royal Institute
More informationPSoC Academy: How to Create a PSoC BLE Android App Lesson 9: BLE Robot Schematic 1
1 All right, now we re ready to walk through the schematic. I ll show you the quadrature encoders that drive the H-Bridge, the PWMs, et cetera all the parts on the schematic. Then I ll show you the configuration
More information20 WAYS TO IMPROVE YOUR FINANCES IN UNDER 20 MINUTES
20 WAYS TO IMPROVE YOUR FINANCES IN UNDER 20 MINUTES We are all busy, sometime it is really difficult to take the time to think about and act on ways to improve our finances. In the past, I have repeatedly
More informationUser Guide. PTT Radio Application. ios. Release 8.3
User Guide PTT Radio Application ios Release 8.3 March 2018 1 Table of Contents 1. Introduction and Key Features... 5 2. Application Installation & Getting Started... 6 Prerequisites... 6 Download... 6
More informationPerformance Evaluation of Beacons for Indoor Localization in Smart Buildings
Performance Evaluation of Beacons for Indoor Localization in Smart Buildings Andrew Mackey, mackeya@uoguelph.ca Petros Spachos, petros@uoguelph.ca University of Guelph, School of Engineering 1 Agenda The
More informationNETWORK CONNECTIVITY FOR IoT. Hari Balakrishnan. Lecture #5 6.S062 Mobile and Sensor Computing Spring 2017
NETWORK CONNECTIVITY FOR IoT Hari Balakrishnan Lecture #5 6.S062 Mobile and Sensor Computing Spring 2017 NETWORKING: GLUE FOR THE IOT IoT s technology push from the convergence of Embedded computing Sensing
More informationSpecification history
Specification history Version Date Author Change comment 0.1 04.10.2016 Kristel-Maria Kadajane, Liina Land, Liis Ojokas 0.2 10.10.2016 Kristel-Maria Kadajane, Liina Land, Liis Ojokas 0.3 18.10.2016 Kristel-Maria
More informationHow to Configure ibeacons in Jamf Pro
What is an ibeacon? ibeacon is a communication protocol developed by Apple on top of Bluetooth Smart technology. It allows developers to create mobile apps aware of location context provided by beacons.
More informationLavalier microphone for smartphones USER MANUAL
Lavalier microphone for smartphones and tablets USER MANUAL Contents Table of Contents Contents 2 English 3 irig Mic Lav 3 Register your irig Mic Lav 3 Installation and setup 4 Mounting irig Mic Lav on
More informationQuizeRo - Recipe for a successful QR-Code Scavenger hunt
QuizeRo - Recipe for a successful QR-Code Scavenger hunt Marcus Birkenrahe, Kai Erenli 1 1 FH des bfi Wien, Film-, TV- und Medienproduktion, Maria Jacobigasse 1/3.4, A-1030 Wien, Austria kai.erenlifh-vie.ac.at
More informationHealthcare Solutions
Healthcare Solutions PaperCut Helping you exceed your HIPAA compliance guidelines. PAPERCUT FEATURES FOR HEALTHCARE Secure Print Release Follow Me Printing Centralized Reporting ios Print/Google Cloud
More informationQ1 Under the subject "Future of Work and the New Economy", which topics do you find important?
Q1 Under the subject "Future of Work and the New Economy", which topics do you find important? Answered: 78 Skipped: 5 How can the Internet be... structure... Will the lack of security... How will domestic...
More informationSPTF: Smart Photo-Tagging Framework on Smart Phones
, pp.123-132 http://dx.doi.org/10.14257/ijmue.2014.9.9.14 SPTF: Smart Photo-Tagging Framework on Smart Phones Hao Xu 1 and Hong-Ning Dai 2* and Walter Hon-Wai Lau 2 1 School of Computer Science and Engineering,
More informationBeacons Collect Information from Users : Unpacking People s Misunderstandings of Bluetooth Beacon Technology
Yaxing Yao SALT Lab School of Information Studies Syracuse University Syracuse, NY 13244, USA yyao08@syr.edu Yun Huang SALT Lab School of Information Studies Syracuse University Syracuse, NY 13244, USA
More information08/2017 Technical application guide EINSTONE module Light is OSRAM
www.osram.com/einstone 08/2017 Technical application guide EINSTONE module Light is OSRAM EINSTONE module Contents Contents 1 Introduction 03 1.1 System overview 03 1.2 Versions 04 1.3 Nomenclature 04
More information5 Drawing Management Mistakes You re Making. And How to Avoid Them
5 Drawing Management Mistakes You re Making And How to Avoid Them 2 Table of Contents THE TOP FIVE MOST COMMON DRAWING MANAGEMENT MISTAKES I. Paper-based Drawings II. Drawing Management System Without
More information