ibeacon Spoofing Security and Privacy Implications of ibeacon Technology Karan Singhal

Size: px
Start display at page:

Download "ibeacon Spoofing Security and Privacy Implications of ibeacon Technology Karan Singhal"

Transcription

1 ibeacon Spoofing Security and Privacy Implications of ibeacon Technology Karan Singhal ABSTRACT Apple introduced ibeacons with ios 7, revolutionizing the way our phones interact with real- life places and objects. ibeacons leverage Bluetooth Low Energy (BLE) to broadcast a unique identifier and two 8- bit integers known as the major and minor numbers. These components are used to identify the ibeacon. Typical use cases include indoor micro- location and interaction with real- world objects. However, it is trivial to spoof a beacon by broadcasting the same UUID and same major and minor numbers. Thus, Apple stresses that ibeacons should not be used to transfer sensitive details such as credit card information they should only be used for identification of objects or places. To safeguard against spoofing, beacon detection can be verified by additional security measures (such as physically scanning a QR code). Apart from the security implications of using an easily spoofable Bluetooth signal, ibeacons also create a privacy concern. As an example, retail stores could tag products with ibeacons and record which users pick up which products. They could later use this data to create targeted advertisements or track your location in their store. My research shows that current ibeacon implementations in the wild are not widely used for sensitive data, limiting the potential motivation for exploiters. However, the privacy concerns with the platform are warranted and could result in dire consequences.

2 INTRODUCTION On June 10 th, 2013 Apple released ios 7 and unveiled ibeacons to the world. For many developers, this was a new and unique way to integrate real world objects into mobile applications. Apple provided ranging, proximity, and many other algorithms which abstracted away the complexities of finding or advertising Bluetooth Low Energy (BLE) devices. Because this technology is backward compatible to the iphone 4S, support and implementation occurred rapidly. Just a few months later, on July 24 th, 2013 Google released Android 4.3, with support for Bluetooth Low Energy in the central role and provides APIs that apps can use to discover devices, query for services, and read/write characteristics. 1 With both major smartphone platforms able to detect and broadcast as ibeacons, the adoption of ibeacon technology is on the rise. Of course, in order for any of the myriad of ibeacon applications to work, there has to be a beacon broadcasting. Any compatible device can be used 1 "Bluetooth Low Energy." Android Developers. Google Inc. Web. 1 Dec < le.html>.

3 as a broadcasting ibeacon, and there are a growing number of companies that manufacture BLE hardware. Retail stores, supermarkets, and many other businesses are finding innovative ways to improve their customer experience by integrating ibeacons. The possibilities are endless airports are integrating ibeacons to save passengers time and money. 2 Simply by walking up to a checkpoint, your smartphone would recognize an ibeacon and automatically pull up your boarding pass. By walking by a currency exchange counter you could qualify for a special discount that other travelers would never receive. The possibilities for innovative ibeacon implementations are endless, but the security and privacy concerns could be immense as well. TO THE COMMUNITY 2 Virgin Atlantic Unveils New Airport Terminal Experience Powered by Apple's IBeacon." AppleInsider, 2 May Web. 2 Dec < atlantic- unveils- new- airport- terminal- experience- powered- by- apples- ibeacon>.

4 Since the release of ibeacon, over 270 million iphones 3 have been sold all compatible with the Bluetooth 4.0 standard, and thus ibeacon- enabled. When combined with BLE- capable Android devices, the number of ibeacon- capable smartphones is staggering. Since each of these devices can download and install applications that interact with beacons, most smartphone owners today could be vulnerable to security and privacy concerns of ibeacon. Common use cases of ibeacons typically employ the technology to facilitate indoor micro- location. Sometimes, the detection of a beacon is used to push special discounts or offers to the user if they pass a certain virtual checkpoints. In these scenarios, someone can simply spoof the ibeacon by using their own hardware and broadcasting the same UUID, major number, and minor number to their device thereby bypassing the purpose of the promotion. I believe that this specific ibeacon security issue has the greatest potential for abuse. 3 "Apple IPhone: Global Sales , by Quarter." Statista. Web. 2 Dec < apple- iphone- sales- since- 3rd- quarter- 2007/>.

5 Here follows an example of a possible way to abuse this system. A new application called Howler is leveraging ibeacon technology to create realtime deals, notifications, and opportunities delivered directly to your device from businesses within eye sight. 4 Their cloud server accumulates this data and charges their business partners on a per- visit basis. It would be trivial to replicate the ibeacon from any given business and have your smartphone discover it several times, thereby causing Howler to charge the business for these fake visits. From a privacy viewpoint, ibeacons have a potential for abuse as well. Any interaction that an application has with an ibeacon can be recorded. This means, for example, that the retail store application that helps you find the right aisle in their store using indoor ibeacon micro- location can track your location. VULNERABILITIES AND DEFENSES 4

6 In 2014, the Consumer Electronics Show (CES) hosted a scavenger hunt that used ibeacon technology. They placed 9 ibeacons around the building, and offered a reward to those who could locate them all. Alsaidar Allan and Sandeep Mistry from Makezine outline an innovative way to win the hunt, without ever having to go to CES. 5 In their article, they demonstrate how someone can duplicate the ibeacons, set up some BLE hardware broadcasting identically to the 9 official beacons, and claim the prize from anywhere in the world. To do so, they downloaded the Android version of the CES mobile application and decompiled it. Without too much digging they were able to find the UUID with which the beacons were broadcasting, because the application must know the UUID to recognize and identify the beacons. The decompiled source also shows the minor numbers that the app was waiting to recognize (major number was ignored in the Android CES ibeacon implementation). Instead of decompiling the application, Apple notes that since a beacon device is advertising using BLE, it is possible for the UUID to be sniffed off the air and once that UUID is 5 Allan, Alasdair, and Sandeep Mistry. "Hacking the CES Scavenger Hunt." Makezine. 3 Jan Web. 2 Dec < the- ces- scavenger- hunt/>.

7 known, it could be used by other apps. 6 Now, they could simply set up 9 custom beacons that spoof the official beacons, and their phone would recognize them. The CES mobile application then presents them with the prize. This example clearly depicts the biggest security flaw with ibeacons since the UUID and major and minor numbers have to be specified in order to find beacons, the source code gives away all three. Anybody can replicate any beacon from the comfort of their home and claim discounts, prizes, or other rewards, bypassing the intended goal of the promotion. So how do you safeguard against this vulnerability? The most practical way is to do a physical verification check that is similar to two- factor authentication (which is becoming a standard for OAuth and other forms of virtual authentication). For example, the CES application could have prompted the user to scan a QR code or enter a secret number written next to each of the CES beacons. This would verify that the user was actually on 6 "Getting Started with IBeacon." Apple Developer. Apple Inc., 2 June Web. 1 Dec < Started- with- ibeacon.pdf>.

8 location (or at worst he received the code/number from a friend there), so the risk of a spoofing attack could be significantly mitigated. Of course, physical verification doesn t eliminate the risk, but it removes the low- hanging fruit and deters hacking hobbyists from trying to exploit an ibeacon implementation. From the privacy standpoint there is only one real option that keeps your ibeacon interactions from being used maliciously but it is only possible on ios and comes with a big tradeoff. ibeacon applications will not work until the user allows the application to use Bluetooth. This is Apple s implementation and it appears as a simple popup that occurs when the application tries to use Bluetooth. Users can simply accept or deny the request. Of course, if you deny the request you miss out on the significant benefits of the technology.

9 SUMMARY All in all, ibeacons are an innovative and useful tool to integrate smartphone apps with the real world. Developers implementing ibeacon functionality must be extremely careful not to transfer sensitive data using ibeacons, or use physical verification to supplement the ibeacon transaction. The main vulnerability of ibeacon devices is the ability to spoof them using your own hardware and bypass their intended purpose. Implementing physical verification in addition to ibeacons can mitigate this risk. The privacy concerns cannot be overlooked either your interaction with ibeacons can be recorded by the application, and this data could be used to track your location without your knowledge or consent. It is very common and easy to overlook Apple s warning that the application uses Bluetooth, so users may be unaware that their application uses ibeacons at all, and that is the only safeguard preventing your privacy from being invaded. Users should take steps to be informed about why applications want to use their location or their devices Bluetooth capabilities and should trust the applications they approve to do so.

10 SUPPORTING MATERIAL Provided alongside this article is the source code for the ibeacon pairing component in an ios application that uses ibeacon technology to pair two devices. The full source code can be provided upon request. This is a proof of concept of the physical verification step that could mitigate the risk of a spoof attack. This application (SpotLight Parking) provides an on- demand valet service to park your car. A customer requests a valet at a specific location and drives there. Upon arrival, the customer s iphone looks for the valet s iphone, which is broadcasting as an ibeacon. When found, it prompts the user to enter a 4- digit verification code that is located on the valet s application and changes for each request. This step ensures that nobody can masquerade as a valet and steal the customer s car.

11 REFERENCES [1] "Getting Started with IBeacon." Apple Developer. Apple Inc., 2 June Web. 1 Dec < Started- with- ibeacon.pdf>. [2] "Apple IPhone: Global Sales , by Quarter." Statista. Web. 2 Dec < apple- iphone- sales- since- 3rd- quarter- 2007/>. [3] "Bluetooth Low Energy." Android Developers. Google Inc. Web. 1 Dec < le.html>. [4] Virgin Atlantic Unveils New Airport Terminal Experience Powered by Apple's IBeacon." AppleInsider, 2 May Web. 2 Dec < atlantic- unveils- new- airport- terminal- experience- powered- by- apples- ibeacon>. [5] "IBeacon Security Part 2: Beacon Privacy and Security." Twocanoes, 29 May Web. 2 Dec < security- part- 2- beacon- privacy- and>. [6] Allan, Alasdair, and Sandeep Mistry. "Hacking the CES Scavenger Hunt." Makezine. 3 Jan Web. 2 Dec < the- ces- scavenger- hunt/>.

ARUBA LOCATION SERVICES

ARUBA LOCATION SERVICES ARUBA LOCATION SERVICES Powered by Aruba Beacons The flagship product of the product line is Aruba Beacons. When Aruba Beacons are used in conjunction with the Meridian mobile app platform, they enable

More information

A Simple Smart Shopping Application Using Android Based Bluetooth Beacons (IoT)

A Simple Smart Shopping Application Using Android Based Bluetooth Beacons (IoT) Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 5 (2017), pp. 885-890 Research India Publications http://www.ripublication.com A Simple Smart Shopping Application Using

More information

Comparison ibeacon VS Smart Antenna

Comparison ibeacon VS Smart Antenna Comparison ibeacon VS Smart Antenna Introduction Comparisons between two objects must be exercised within context. For example, no one would compare a car to a couch there is very little in common. Yet,

More information

Senion IPS 101. An introduction to Indoor Positioning Systems

Senion IPS 101. An introduction to Indoor Positioning Systems Senion IPS 101 An introduction to Indoor Positioning Systems INTRODUCTION Indoor Positioning 101 What is Indoor Positioning Systems? 3 Where IPS is used 4 How does it work? 6 Diverse Radio Environments

More information

The definitive guide for purchasing Bluetooth Low Energy (BLE) Beacons at scale

The definitive guide for purchasing Bluetooth Low Energy (BLE) Beacons at scale The definitive guide for purchasing Bluetooth Low Energy (BLE) Beacons at scale If you re working on an enterprise Request For Quote (RFQ) or Request For Proposal (RFP) for BLE Beacons using any of the

More information

DYNAMIC BLUETOOTH BEACONS FOR PEOPLE WITH DISABILITIES

DYNAMIC BLUETOOTH BEACONS FOR PEOPLE WITH DISABILITIES DYNAMIC BLUETOOTH BEACONS FOR PEOPLE WITH DISABILITIES A journey from ibeacon to IoT beacons, InfinIT Summit 2017 BLUETOOTH BEACONS Short information sent by radio A few times per second Kind of radio

More information

USER GUIDE CUBEACON TOOLS MOBILE ANDROID APP

USER GUIDE CUBEACON TOOLS MOBILE ANDROID APP USER GUIDE CUBEACON TOOLS MOBILE ANDROID APP CONNET YOUR IDEAS TO WORLD Version 1.2 Mei 17 About CUBEACON Cubeacon : ibeacon bluetooth technology is to meet the full bene ts of signal transmission required

More information

How to implement proximity marketing campaigns without an app

How to implement proximity marketing campaigns without an app How to implement proximity marketing campaigns without an app Generate more revenue from current customers & attract new visitors by using Eddystone beacons Table of Contents: Why Eddystone will be a game

More information

Beacons Proximity UUID, Major, Minor, Transmission Power, and Interval values made easy

Beacons Proximity UUID, Major, Minor, Transmission Power, and Interval values made easy Beacon Setup Guide 2 Beacons Proximity UUID, Major, Minor, Transmission Power, and Interval values made easy In this short guide, you ll learn which factors you need to take into account when planning

More information

1. Product Introduction FeasyBeacons are designed by Shenzhen Feasycom Technology Co., Ltd which has the typical models as below showing: Model FSC-BP

1. Product Introduction FeasyBeacons are designed by Shenzhen Feasycom Technology Co., Ltd which has the typical models as below showing: Model FSC-BP ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, FeasyBeacon Getting Started Guide Version 2.5 Feasycom Online Technical Support: Skype: Feasycom Technical Support Direct Tel: 086 755 23062695 Email:

More information

IoT. Indoor Positioning with BLE Beacons. Author: Uday Agarwal

IoT. Indoor Positioning with BLE Beacons. Author: Uday Agarwal IoT Indoor Positioning with BLE Beacons Author: Uday Agarwal Contents Introduction 1 Bluetooth Low Energy and RSSI 2 Factors Affecting RSSI 3 Distance Calculation 4 Approach to Indoor Positioning 5 Zone

More information

eventzee Scavenger Hunt Guide

eventzee Scavenger Hunt Guide eventzee Scavenger Hunt Guide You Did It. You ve just made one of the better decisions of your life: You ve signed up to host an Eventzee scavenger hunt. So now that the hard part is out of the way it

More information

Round shape, white case with 3M adhesive sticker, including 2pcs ER12450 battery and industrial package, special for indoor location, RoHS

Round shape, white case with 3M adhesive sticker, including 2pcs ER12450 battery and industrial package, special for indoor location, RoHS Beacon / ibeacon / MiniBeacon FCC Statement This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to Part 15 of the FCC Rules. These limits are designed

More information

Indoor Positioning 101 TECHNICAL)WHITEPAPER) SenionLab)AB) Teknikringen)7) 583)30)Linköping)Sweden)

Indoor Positioning 101 TECHNICAL)WHITEPAPER) SenionLab)AB) Teknikringen)7) 583)30)Linköping)Sweden) Indoor Positioning 101 TECHNICAL)WHITEPAPER) SenionLab)AB) Teknikringen)7) 583)30)Linköping)Sweden) TechnicalWhitepaper)) Satellite-based GPS positioning systems provide users with the position of their

More information

CSRmesh Beacon management and Asset Tracking Muhammad Ulislam Field Applications Engineer, Staff, Qualcomm Atheros, Inc.

CSRmesh Beacon management and Asset Tracking Muhammad Ulislam Field Applications Engineer, Staff, Qualcomm Atheros, Inc. CSRmesh Beacon management and Asset Tracking Muhammad Ulislam Field Applications Engineer, Staff, Qualcomm Atheros, Inc. CSRmesh Recap Bluetooth Mesh Introduction What is CSRmesh? A protocol that runs

More information

Paper number ITS-EU-SP0127. Experimenting Bluetooth beacon infrastructure in urban transportation

Paper number ITS-EU-SP0127. Experimenting Bluetooth beacon infrastructure in urban transportation 11 th ITS European Congress, Glasgow, Scotland, 6-9 June 2016 Paper number ITS-EU-SP0127 Jukka Ahola (jukka.ahola@vtt.fi) 1*, Samuli Heinonen (samuli.heinonen@vtt.fi) 1 1. VTT Technical Research Centre

More information

Splunking ibeacon (BLE) for Profit and Pleasure

Splunking ibeacon (BLE) for Profit and Pleasure Copyright 2014 Splunk Inc. Splunking ibeacon (BLE) for Profit and Pleasure Cody Harris Stefan Sievert SE Manager Client Architect Disclaimer During the course of this presentajon, we may make forward looking

More information

Hack Your Ride With Beacon Technology!

Hack Your Ride With Beacon Technology! Hack Your Ride With Beacon Technology! #kontakt_io Trevor Longino Head of Marketing & PR @trevorlongino @kontakt_io We help build the world s best proximity solutions 10 thousand+ clients! Welcome to the

More information

Pervasive Indoor Localization and Tracking Based on Fingerprinting. Gary Chan Professor, CSE HKUST

Pervasive Indoor Localization and Tracking Based on Fingerprinting. Gary Chan Professor, CSE HKUST Pervasive Indoor Localization and Tracking Based on Fingerprinting Gary Chan Professor, CSE HKUST 2 Catchphrase: Location, Location, Location! 3 Outdoor Location-Based Services (LBS) Based on GPS (Global

More information

CYBER SECURITY GUIDELINES FOR COMPUTER BASED GAMING APPLICATIONS

CYBER SECURITY GUIDELINES FOR COMPUTER BASED GAMING APPLICATIONS CYBER SECURITY GUIDELINES FOR COMPUTER BASED GAMING APPLICATIONS Document Control Version: 1.0 Author: CS Policies and Standards Section - MOTC Classification: Public Date of Issue: November 2016 Contents

More information

DocuSign for ios: For Field Sales & Field Services

DocuSign for ios: For Field Sales & Field Services DocuSign for ios: For Field Sales & Field Services How DocuSign for ios enables field sales and field services to transact business anytime, anywhere on ios devices Key Challenges FOR FIELD SALES AND SERVICES

More information

Enhancing Bluetooth Location Services with Direction Finding

Enhancing Bluetooth Location Services with Direction Finding Enhancing Bluetooth Location Services with Direction Finding table of contents 1.0 Executive Summary...3 2.0 Introduction...4 3.0 Bluetooth Location Services...5 3.1 Bluetooth Proximity Solutions 5 a.

More information

Design of MDM System using BLE Beacon and Extended Kalman Filter

Design of MDM System using BLE Beacon and Extended Kalman Filter Indian Journal of Science and Technology, Vol 9(29), DOI: 10.17485/ijst/2016/v9i29/94761, August 2016 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 Design of MDM System using BLE Beacon and Extended

More information

Pixie Location of Things Platform Introduction

Pixie Location of Things Platform Introduction Pixie Location of Things Platform Introduction Location of Things LoT Location of Things (LoT) is an Internet of Things (IoT) platform that differentiates itself on the inclusion of accurate location awareness,

More information

Apple created ibeacons utilizing Bluetooth low-energy (BLE) technology, offering a new

Apple created ibeacons utilizing Bluetooth low-energy (BLE) technology, offering a new Angela Hart Linda Huber Mia Gao Wenting Mai Laura Werthmann Abstract: Apple created ibeacons utilizing Bluetooth low-energy (BLE) technology, offering a new method to interact with customers utilizing

More information

Concept of the application supporting blind and visually impaired people in public transport

Concept of the application supporting blind and visually impaired people in public transport Academia Journal of Educational Research 5(12): 472-476, December 2017 DOI: 10.15413/ajer.2017.0714 ISSN 2315-7704 2017 Academia Publishing Research Paper Concept of the application supporting blind and

More information

Geo-fence Tracking Device User Manual

Geo-fence Tracking Device User Manual Geo-fence Tracking Device User Manual home8care.com 1-844-800-6482 support@home8care.com V1.1 2017 1 Table of Contents Table of Contents... 1 Chapter 1. Introduction... 2 1.1 System Requirement... 2 Chapter

More information

Beacon Indoor Navigation System. Group 14 Andre Compagno, EE. Josh Facchinello, CpE. Jonathan Mejias, EE. Pedro Perez, EE.

Beacon Indoor Navigation System. Group 14 Andre Compagno, EE. Josh Facchinello, CpE. Jonathan Mejias, EE. Pedro Perez, EE. Beacon Indoor Navigation System Group 14 Andre Compagno, EE. Josh Facchinello, CpE. Jonathan Mejias, EE. Pedro Perez, EE. Motivation GPS technologies are not effective indoors Current indoor accessibility

More information

Technical Disclosure Commons

Technical Disclosure Commons Technical Disclosure Commons Defensive Publications Series November 22, 2017 Beacon-Based Gaming Laurence Moroney Follow this and additional works at: http://www.tdcommons.org/dpubs_series Recommended

More information

AP Computer Science Principles

AP Computer Science Principles 2018 AP Computer Science Principles Sample Student Responses and Scoring Commentary Inside: Performance Task Explore RR Scoring Guideline RR Scoring Commentary Student Samples provided separately College

More information

of Nebraska - Lincoln

of Nebraska - Lincoln University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Faculty Publications, UNL Libraries Libraries at University of Nebraska-Lincoln 9-2011 Emerging Ideas on Emerging Technologies.

More information

IOT: IMPACT OF THE PHYSICAL WEB AND BEACONS

IOT: IMPACT OF THE PHYSICAL WEB AND BEACONS IOT: IMPACT OF THE PHYSICAL WEB AND BEACONS Dr. Debasis Bha,acharya, Mario Canul, Saxon Knight ICS Faculty University of HawaiʻI Maui College debasisb@hawaii.edu (808) 984-3619 maui.hawaii.edu/cybersecurity

More information

TRBOnet Mobile. User Guide. for ios. Version 1.8. Internet. US Office Neocom Software Jog Road, Suite 202 Delray Beach, FL 33446, USA

TRBOnet Mobile. User Guide. for ios. Version 1.8. Internet. US Office Neocom Software Jog Road, Suite 202 Delray Beach, FL 33446, USA TRBOnet Mobile for ios User Guide Version 1.8 World HQ Neocom Software 8th Line 29, Vasilyevsky Island St. Petersburg, 199004, Russia US Office Neocom Software 15200 Jog Road, Suite 202 Delray Beach, FL

More information

A CASE FOR CONNECTION:

A CASE FOR CONNECTION: A CASE FOR CONNECTION: Redefining the Real-Time Customer Experience with Beacons In Balance 1 Table of Contents Introduction...3 Key Takeaways...4 What are beacons?...5 How do beacons work?...7 Discovery...8

More information

Introduction to Mobile Sensing Technology

Introduction to Mobile Sensing Technology Introduction to Mobile Sensing Technology Kleomenis Katevas k.katevas@qmul.ac.uk https://minoskt.github.io Image by CRCA / CNRS / University of Toulouse In this talk What is Mobile Sensing? Sensor data,

More information

Smart Beacon Management with BlueRange

Smart Beacon Management with BlueRange Smart Beacon Management with BlueRange Version 1.1 Status 01/2018 This article describes the need for Smart Beacon Management, demonstrates innovative ways to manage and control it efficiently, and shows

More information

THE BASICS OF BEACONS

THE BASICS OF BEACONS 10 MINDBLOWING M-COMMERCE ibeacon CASE STUDIES THE BASICS OF BEACONS BEACON: SIMPLY PUT, IT CONSISTS OF TWO PARTS: A BROADCASTER (BEACON DEVICE) AND A RECEIVER (SMARTPHONE OR WEARABLE). WHAT IS A BEACON?

More information

THE ETHERNIA PROJECT

THE ETHERNIA PROJECT ddddd THE ETHERNIA PROJECT Ethernia is the first open world MMO, multi-platform game that is powered by the Ethereum blockchain. It s a new ERA of gaming. Each step of exploration will be at your own

More information

TaleBlazer: Using ibeacons for Indoor Location-Based Augmented Reality Games. Ellen Yongin Finch

TaleBlazer: Using ibeacons for Indoor Location-Based Augmented Reality Games. Ellen Yongin Finch TaleBlazer: Using ibeacons for Indoor Location-Based Augmented Reality Games by Ellen Yongin Finch Submitted to the Department of Electrical Engineering and Computer Science in partial fulfillment of the

More information

Running head: THE IMPACT OF COMPUTER ENGINEERING 1

Running head: THE IMPACT OF COMPUTER ENGINEERING 1 Running head: THE IMPACT OF COMPUTER ENGINEERING 1 The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015 THE IMPACT OF COMPUTER ENGINEERING 2 Abstract The purpose of this paper

More information

AIMICT.ORG AIMICT Newsletter

AIMICT.ORG AIMICT Newsletter SEPTEMBER 2018 AIMICT.ORG 1 IN THIS ISSUE AIMICT Conducts ISO 9001 Lead Auditor Course AIMICT Conducts ILM s Training of Trainers Program in Irbid AIMICT Organizes Professional Quality Manager Program

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 38 Attendance system using Beacon Technology 1 Varshini A, 2 Indhurekha S 1 UG Scholar, 2 Assistant Professor, Computer

More information

INTRODUCTION CHAPTER 1 CRITIQUING DESIGN Practice Questions CHAPTER 2 DESIGNING A DESKTOP APPLICATION... 21

INTRODUCTION CHAPTER 1 CRITIQUING DESIGN Practice Questions CHAPTER 2 DESIGNING A DESKTOP APPLICATION... 21 Table of Contents INTRODUCTION... 10 CHAPTER 1 CRITIQUING DESIGN... 12 Practice Questions... 13 Answers... 13 How do you like LinkedIn s endorse feature?... 13 Tell me about a product you like and use

More information

Introduction. What is Kraken Coin. Why invest in Kraken Coin

Introduction. What is Kraken Coin. Why invest in Kraken Coin Table of Contents INTRODUCTION 2 What is Kraken Coin 2 Why invest in Kraken Coin 2 Features 3 Kraken Coin Specifications 4 Invest in masternodes to generate cryptocurrency yields 5 Masternodes building

More information

Lecture 7 Ethics, Privacy, and Politics in the Age of Data

Lecture 7 Ethics, Privacy, and Politics in the Age of Data Lecture 7 Ethics, Privacy, and Politics in the Age of Data Module Roadmap Representation Technologies Digital workplaces Ethics, Privacy and Politics Digital Workplaces and Capitalist Accumulation tbc

More information

Always stay in touch with your home!

Always stay in touch with your home! Always stay in touch with your home! 01 Meet Cockpit Fulfill your dream of a functional intelligent home Can you imagine life without smartphones, tablets or any other portable device that facilitate your

More information

MOBILE COMPUTING 1/29/18. Cellular Positioning: Cell ID. Cellular Positioning - Cell ID with TA. CSE 40814/60814 Spring 2018

MOBILE COMPUTING 1/29/18. Cellular Positioning: Cell ID. Cellular Positioning - Cell ID with TA. CSE 40814/60814 Spring 2018 MOBILE COMPUTING CSE 40814/60814 Spring 2018 Cellular Positioning: Cell ID Open-source database of cell IDs: opencellid.org Cellular Positioning - Cell ID with TA TA: Timing Advance (time a signal takes

More information

ibeacons Bible 1.0 For the latest version of this document, please visit

ibeacons Bible 1.0 For the latest version of this document, please visit ibeacons Bible 1.0 Andy Cavallini (Gaia-Matrix) andy.cavallini@gaia-matrix.com http://www.gaia-matrix.com For the latest version of this document, please visit http://www.gaia-matrix.com Contents Preface

More information

WELLCORE R ibeacon Series

WELLCORE R ibeacon Series WELLCORE R ibeacon Series Product Specification V1.0 March-2016 NOTE: INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH WELLCORE PRODUCTS, NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE,

More information

BTLE beacon for 8262 DECT handset Engineering Rules

BTLE beacon for 8262 DECT handset Engineering Rules BTLE beacon for 8262 DECT handset Engineering Rules 8AL90346ENAAed01 April 2017 Table of content 1. INTRODUCTION... 3 2. LIST OF ACRONYMS... 3 3. RECOMMENDED USE CASES... 3 3.1 BEACON EVENT... 3 3.2 LOCATION

More information

Bluetooth Low Energy Sensing Technology for Proximity Construction Applications

Bluetooth Low Energy Sensing Technology for Proximity Construction Applications Bluetooth Low Energy Sensing Technology for Proximity Construction Applications JeeWoong Park School of Civil and Environmental Engineering, Georgia Institute of Technology, 790 Atlantic Dr. N.W., Atlanta,

More information

Indoor Navigation System with Beacons

Indoor Navigation System with Beacons Indoor Navigation System with Beacons Fall 2014Group 14 Andre Compagno Josh Facchinello Jonathan Mejias Pedro Perez May 1, 2015 Table of Contents 1.0 Executive Summary Page 1 2.0 Project Description 2.1

More information

Workplace Service. Contents

Workplace Service. Contents Topic: Mobile Issues: What technologies and architectures make up a mobile ecosystem? Authors: Jim Lundy, David Mario Smith What are the trends affecting mobile computing? Aragon Research Technology Arc

More information

FastPass A Harmonized Modular Reference System for Automated Border Crossing (ABC)

FastPass A Harmonized Modular Reference System for Automated Border Crossing (ABC) FastPass A Harmonized Modular Reference System for Automated Border Crossing (ABC) EAB - Research Project Conference, Darmstadt, September 19 th, 2016 Presented by Markus Clabian Senior Research Engineer,

More information

SHOPPING IN MOTION HOW POSITIONING, INDOOR NAVIGATION AND PERSONALIZED MOBILE MARKETING SET STATIONARY TRADE IN MOTION.

SHOPPING IN MOTION HOW POSITIONING, INDOOR NAVIGATION AND PERSONALIZED MOBILE MARKETING SET STATIONARY TRADE IN MOTION. SHOPPING IN MOTION HOW POSITIONING, INDOOR NAVIGATION AND PERSONALIZED MOBILE MARKETING SET STATIONARY TRADE IN MOTION. Nowadays customers are provided with various channels for shopping and for getting

More information

Parents Guide to Fortnite

Parents Guide to Fortnite Parents Guide to Fortnite The craze for Fortnite, especially its multiplayer standalone mode Fortnite Battle Royale, has exploded recently especially amongst children. So, what do you need to know about

More information

Catalog

Catalog - 1 - Catalog 1. Description...- 3-2. Features...- 3-3. Application...- 3-4. Block Diagram...- 3-5. Electrical Characteristics... - 4-6. Operation... - 4-1) Power on Reset...- 4-2) Setting Mode... - 5-3)

More information

TABLE OF CONTENTS. Introduction 1. Abstract 3. Features 5. What makes the DixiHub project different 6. The Gaming Industry 8. Roadmap 9.

TABLE OF CONTENTS. Introduction 1. Abstract 3. Features 5. What makes the DixiHub project different 6. The Gaming Industry 8. Roadmap 9. TABLE OF CONTENTS Introduction 1 Abstract 3 Features 5 What makes the DixiHub project different 6 The Gaming Industry 8 Roadmap 9 Bounties 10 Coin Information 11 INTRODUCTION Gamers are constantly scraping

More information

COMPATIBILITY TESTING FOR MOBILE GAMES

COMPATIBILITY TESTING FOR MOBILE GAMES WHITEPAPER COMPATIBILITY TESTING FOR MOBILE GAMES Ensuring smooth performance of games across platforms and devices by testing their performance comprehensively 1 THE PLATFORM VARIATIONS The mobile phone

More information

Using ibeacon for Intelligent In-Room Presence Detection

Using ibeacon for Intelligent In-Room Presence Detection Using ibeacon for Intelligent In-Room Presence Detection Yang Yang, Zhouchi Li and Kaveh Pahlavan Center for Wireless Information Network Studies (CWINS) Worcester Polytechnic Institute (WPI), Worcester,

More information

On Practical Selective Jamming of Bluetooth Low Energy Advertising

On Practical Selective Jamming of Bluetooth Low Energy Advertising On Practical Selective Jamming of Bluetooth Low Energy Advertising S. Brauer, A. Zubow, S. Zehl, M. Roshandel, S. M. Sohi Technical University Berlin & Deutsche Telekom Labs Germany Outline Motivation,

More information

Accurate Real-time Indoor Navigation

Accurate Real-time Indoor Navigation Accurate Real-time Indoor Navigation 1 Table of Content 1 Overview... 3 2 Market... 3 3 Indoor Localisation Technologies... 4 3.1 GPS/Assisted GPS... 4 3.2 Wi-Fi Trilateration Low Accuracy... 5 3.3 Hardware

More information

A Beacon of Hope: The Event Intelligence Revolution

A Beacon of Hope: The Event Intelligence Revolution A Beacon of Hope: The Event Intelligence Revolution Beacon technology has dramatically shifted the landscape of almost every industry, and the potential for the event marketing world is limitless. Game

More information

1.1. INTRODUCTION PURPOSE COIN SPECIFICATION ALGORITHM COIN TYPE MASTERNODE FEATURES

1.1. INTRODUCTION PURPOSE COIN SPECIFICATION ALGORITHM COIN TYPE MASTERNODE FEATURES 1 1.1. INTRODUCTION 3 2.1. PURPOSE 3 3.1. COIN SPECIFICATION 4 4.1. ALGORITHM 5 5.1. COIN TYPE 5 6.1. MASTERNODE 6 7.1. FEATURES 7 8.1. MARKETING 7 9.1. COIN OWNERSHIP 8 10.1 COIN DISTRIBUTION 8 10.2.

More information

Book Searching Navigation in Libraries Based on ibeacon Technology

Book Searching Navigation in Libraries Based on ibeacon Technology Journal of Computer Sciences and Applications, 2019, Vol. 7, No. 1, 10-15 Available online at http://pubs.sciepub.com/jcsa/7/1/2 Published by Science and Education Publishing DOI:10.12691/jcsa-7-1-2 Book

More information

BI TRENDS FOR Data De-silofication: The Secret to Success in the Analytics Economy

BI TRENDS FOR Data De-silofication: The Secret to Success in the Analytics Economy 11 BI TRENDS FOR 2018 Data De-silofication: The Secret to Success in the Analytics Economy De-silofication What is it? Many successful companies today have found their own ways of connecting data, people,

More information

Table of Contents. Introduction 3. How it Works 4. Who Can Benefit From GPT Sites 5. Getting Started 6

Table of Contents. Introduction 3. How it Works 4. Who Can Benefit From GPT Sites 5. Getting Started 6 Table of Contents Introduction 3 How it Works 4 Who Can Benefit From GPT Sites 5 Getting Started 6 Tips to Help You Maximize Your Profits Through Trial Offers 7 Site Registration 9 Completing Your First

More information

PEAK GAMES IMPLEMENTS VOLTDB FOR REAL-TIME SEGMENTATION & PERSONALIZATION

PEAK GAMES IMPLEMENTS VOLTDB FOR REAL-TIME SEGMENTATION & PERSONALIZATION PEAK GAMES IMPLEMENTS VOLTDB FOR REAL-TIME SEGMENTATION & PERSONALIZATION CASE STUDY TAKING ACTION BASED ON REAL-TIME PLAYER BEHAVIORS Peak Games is already a household name in the mobile gaming industry.

More information

Make Your Local Government A Lean, Green, Constituent-Centric Machine

Make Your Local Government A Lean, Green, Constituent-Centric Machine Make Your Local Government A Lean, Green, Constituent-Centric Machine Best Practices for Local Government Entities WEBINAR SUMMARY Make Your Local Government A Lean, Green, Constituent-Centric Machine

More information

Aruba Beacons Validated Reference Design

Aruba Beacons Validated Reference Design Aruba Beacons Validated Reference Design Copyright 2015 Hewlett Packard Enterprise Development LP Open Source Code This product includes code licensed under the GNU General Public License, the GNU Lesser

More information

clash of clans gem hack download no survey mac ACCESS GENERATOR HERE

clash of clans gem hack download no survey mac ACCESS GENERATOR HERE +@ clash of clans gem hack download no survey mac ================>

More information

Presented by JOHN RAVLIC Ravim RBC

Presented by JOHN RAVLIC Ravim RBC Leveraging Technology: Digitising Services Presented by JOHN RAVLIC Ravim RBC Introduction UK findings used to explore the Australian and New Zealand context Telephone interviews with local government

More information

idocent: Indoor Digital Orientation Communication and Enabling Navigational Technology

idocent: Indoor Digital Orientation Communication and Enabling Navigational Technology idocent: Indoor Digital Orientation Communication and Enabling Navigational Technology Final Proposal Team #2 Gordie Stein Matt Gottshall Jacob Donofrio Andrew Kling Facilitator: Michael Shanblatt Sponsor:

More information

Evaluating the Impact of Malicious Spoofing Attacks on Bluetooth Low Energy Based Occupancy Detection Systems

Evaluating the Impact of Malicious Spoofing Attacks on Bluetooth Low Energy Based Occupancy Detection Systems Evaluating the Impact of Malicious Spoofing Attacks on Bluetooth Low Energy Based Occupancy Detection Systems William Oliff Computing and Information Systems University of Greenwich, UK Email: william.oliff@gre.ac.uk

More information

PS4 Remote Play review: No Farewell to Arms, but a Moveable Feast

PS4 Remote Play review: No Farewell to Arms, but a Moveable Feast PS4 Remote Play review: No Farewell to Arms, but a Moveable Feast PlayStation 4 is the most fantastic console in the Universe! Why do we say so? Because PS4 is the most popular gaming console ever. Accordingly

More information

SHOP&NAV: ibeacon based indoor assistance and Navigation System

SHOP&NAV: ibeacon based indoor assistance and Navigation System International Journal of Scientific and Research Publications, Volume 6, Issue 11, November 2016 71 SHOP&NAV: ibeacon based indoor assistance and Navigation System K.A.D.K.N Peiris,S.A Asmina, A.A.T.K.K

More information

Project Marvin: A Social Networking Program for Android

Project Marvin: A Social Networking Program for Android Project Marvin: A Social Networking Program for Android Washington University Department of Computer Science and Engineering CSE 537S Mobile Computing Spring 2008 Brandon Morgan Katherine Maschmeyer Mamta

More information

How to Pair AbiBird Sensor with App and Account

How to Pair AbiBird Sensor with App and Account How to Pair AbiBird Sensor with App and Account By pairing your AbiBird sensor with your AbiBird app and account, you make it posible for signals to pass from the sensor, via the Cloud, to the AbiBird

More information

River slots app download

River slots app download River slots app download Search 28-5-2014 Play the best FREE slots game on mobile! River Otter Slots. River Otter Slots. Get the best multi- slot experience on Android! Download now for free!. Riverslot

More information

11 ASTONISHINGLY SIMPLE WAYS TO ATTRACT CUSTOMERS USING POKÉMON GO

11 ASTONISHINGLY SIMPLE WAYS TO ATTRACT CUSTOMERS USING POKÉMON GO 11 ASTONISHINGLY SIMPLE WAYS TO ATTRACT CUSTOMERS USING POKÉMON GO Be it a fad or the new normal, Pokémon GO an augmented reality computer game has taken the world by storm. To put things into perspective,

More information

GOOD GAME PLATFORM GAMING IS ALWAYS BETTER WITH FRIENDS

GOOD GAME PLATFORM GAMING IS ALWAYS BETTER WITH FRIENDS GOOD GAME PLATFORM GAMING IS ALWAYS BETTER WITH FRIENDS The Vision The platform in 5 years Facts 2 billion gamers More than in the world Facts 140 $128.5 billion 120 100 80 60 40 20 The market is expected

More information

WHITE PAPER A Global Crypto currency

WHITE PAPER A Global Crypto currency WHITE PAPER A Global Crypto currency CONTENTS 1. Introduction a. What is Capricot Coin 2. Capricot Coin Specification 3. Capricot Coin Distribution a. Capricot Coin Pre Sale b. Capricot Coin Pre Sale Target

More information

Decentralized Protocol for Self-Sovereign Identities with Embedded Compliance

Decentralized Protocol for Self-Sovereign Identities with Embedded Compliance Decentralized Protocol for Self-Sovereign Identities with Embedded Compliance A self-sovereign identity portal for regulated industries and the Internet of Everything guy.davies@blockpass.org www.blockpass.org

More information

Design and Implementation of Distress Prevention System using a Beacon

Design and Implementation of Distress Prevention System using a Beacon Design and Implementation of Distress Prevention System using a Beacon Imsu Lee 1, Kyeonhoon Kwak 1, Jeonghyun Lee 1, Sangwoong Kim 1, Daehan Son 1, Eunju Park 1 and Hankyu Lim 1.a 1 Department of Multimedia

More information

Experimental Evaluation of Precision of a Proximity-based Indoor Positioning System

Experimental Evaluation of Precision of a Proximity-based Indoor Positioning System Experimental Evaluation of Precision of a Proximity-based Indoor Positioning System Sylvia T. Kouyoumdjieva and Gunnar Karlsson School of Electrical Engineering and Computer Science KTH Royal Institute

More information

PSoC Academy: How to Create a PSoC BLE Android App Lesson 9: BLE Robot Schematic 1

PSoC Academy: How to Create a PSoC BLE Android App Lesson 9: BLE Robot Schematic 1 1 All right, now we re ready to walk through the schematic. I ll show you the quadrature encoders that drive the H-Bridge, the PWMs, et cetera all the parts on the schematic. Then I ll show you the configuration

More information

20 WAYS TO IMPROVE YOUR FINANCES IN UNDER 20 MINUTES

20 WAYS TO IMPROVE YOUR FINANCES IN UNDER 20 MINUTES 20 WAYS TO IMPROVE YOUR FINANCES IN UNDER 20 MINUTES We are all busy, sometime it is really difficult to take the time to think about and act on ways to improve our finances. In the past, I have repeatedly

More information

User Guide. PTT Radio Application. ios. Release 8.3

User Guide. PTT Radio Application. ios. Release 8.3 User Guide PTT Radio Application ios Release 8.3 March 2018 1 Table of Contents 1. Introduction and Key Features... 5 2. Application Installation & Getting Started... 6 Prerequisites... 6 Download... 6

More information

Performance Evaluation of Beacons for Indoor Localization in Smart Buildings

Performance Evaluation of Beacons for Indoor Localization in Smart Buildings Performance Evaluation of Beacons for Indoor Localization in Smart Buildings Andrew Mackey, mackeya@uoguelph.ca Petros Spachos, petros@uoguelph.ca University of Guelph, School of Engineering 1 Agenda The

More information

NETWORK CONNECTIVITY FOR IoT. Hari Balakrishnan. Lecture #5 6.S062 Mobile and Sensor Computing Spring 2017

NETWORK CONNECTIVITY FOR IoT. Hari Balakrishnan. Lecture #5 6.S062 Mobile and Sensor Computing Spring 2017 NETWORK CONNECTIVITY FOR IoT Hari Balakrishnan Lecture #5 6.S062 Mobile and Sensor Computing Spring 2017 NETWORKING: GLUE FOR THE IOT IoT s technology push from the convergence of Embedded computing Sensing

More information

Specification history

Specification history Specification history Version Date Author Change comment 0.1 04.10.2016 Kristel-Maria Kadajane, Liina Land, Liis Ojokas 0.2 10.10.2016 Kristel-Maria Kadajane, Liina Land, Liis Ojokas 0.3 18.10.2016 Kristel-Maria

More information

How to Configure ibeacons in Jamf Pro

How to Configure ibeacons in Jamf Pro What is an ibeacon? ibeacon is a communication protocol developed by Apple on top of Bluetooth Smart technology. It allows developers to create mobile apps aware of location context provided by beacons.

More information

Lavalier microphone for smartphones USER MANUAL

Lavalier microphone for smartphones USER MANUAL Lavalier microphone for smartphones and tablets USER MANUAL Contents Table of Contents Contents 2 English 3 irig Mic Lav 3 Register your irig Mic Lav 3 Installation and setup 4 Mounting irig Mic Lav on

More information

QuizeRo - Recipe for a successful QR-Code Scavenger hunt

QuizeRo - Recipe for a successful QR-Code Scavenger hunt QuizeRo - Recipe for a successful QR-Code Scavenger hunt Marcus Birkenrahe, Kai Erenli 1 1 FH des bfi Wien, Film-, TV- und Medienproduktion, Maria Jacobigasse 1/3.4, A-1030 Wien, Austria kai.erenlifh-vie.ac.at

More information

Healthcare Solutions

Healthcare Solutions Healthcare Solutions PaperCut Helping you exceed your HIPAA compliance guidelines. PAPERCUT FEATURES FOR HEALTHCARE Secure Print Release Follow Me Printing Centralized Reporting ios Print/Google Cloud

More information

Q1 Under the subject "Future of Work and the New Economy", which topics do you find important?

Q1 Under the subject Future of Work and the New Economy, which topics do you find important? Q1 Under the subject "Future of Work and the New Economy", which topics do you find important? Answered: 78 Skipped: 5 How can the Internet be... structure... Will the lack of security... How will domestic...

More information

SPTF: Smart Photo-Tagging Framework on Smart Phones

SPTF: Smart Photo-Tagging Framework on Smart Phones , pp.123-132 http://dx.doi.org/10.14257/ijmue.2014.9.9.14 SPTF: Smart Photo-Tagging Framework on Smart Phones Hao Xu 1 and Hong-Ning Dai 2* and Walter Hon-Wai Lau 2 1 School of Computer Science and Engineering,

More information

Beacons Collect Information from Users : Unpacking People s Misunderstandings of Bluetooth Beacon Technology

Beacons Collect Information from Users : Unpacking People s Misunderstandings of Bluetooth Beacon Technology Yaxing Yao SALT Lab School of Information Studies Syracuse University Syracuse, NY 13244, USA yyao08@syr.edu Yun Huang SALT Lab School of Information Studies Syracuse University Syracuse, NY 13244, USA

More information

08/2017 Technical application guide EINSTONE module Light is OSRAM

08/2017 Technical application guide EINSTONE module Light is OSRAM www.osram.com/einstone 08/2017 Technical application guide EINSTONE module Light is OSRAM EINSTONE module Contents Contents 1 Introduction 03 1.1 System overview 03 1.2 Versions 04 1.3 Nomenclature 04

More information

5 Drawing Management Mistakes You re Making. And How to Avoid Them

5 Drawing Management Mistakes You re Making. And How to Avoid Them 5 Drawing Management Mistakes You re Making And How to Avoid Them 2 Table of Contents THE TOP FIVE MOST COMMON DRAWING MANAGEMENT MISTAKES I. Paper-based Drawings II. Drawing Management System Without

More information