0% found this document useful (0 votes)
59 views14 pages

Beacon Based Secured Detection

This document proposes a system to securely track and monitor elderly or disabled individuals indoors using Bluetooth beacons and an Android application. Beacons placed throughout the indoor environment transmit Bluetooth signals to determine the individual's location. The proposed system aims to authenticate access to location data and prevent unauthorized access, in order to address security issues with IoT devices. It uses an Arduino board, beacons, and an encrypted database on a server to securely detect the individual's position and generate alerts if they enter restricted areas or remain in one place too long.

Uploaded by

softroniics
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views14 pages

Beacon Based Secured Detection

This document proposes a system to securely track and monitor elderly or disabled individuals indoors using Bluetooth beacons and an Android application. Beacons placed throughout the indoor environment transmit Bluetooth signals to determine the individual's location. The proposed system aims to authenticate access to location data and prevent unauthorized access, in order to address security issues with IoT devices. It uses an Arduino board, beacons, and an encrypted database on a server to securely detect the individual's position and generate alerts if they enter restricted areas or remain in one place too long.

Uploaded by

softroniics
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

BEACON BASED SECURED

DETECTION
ABSTRACT

• Tracking and control of elderly or handicapped people in an indoor environment


• Special box using an Arduino board and a mobile application on Android
• Determines location of the target using beacons
• Beacons transmit Bluetooth Low Energy signals in the required areas
• Systems determine position of person
• Monitor any event that would cause an alert
• long stay in a fixed position, or
• entry into predefined forbidden zones
ABSTRACT

• Location data stored in database


• Alerts can trigger messages to be sent to local authorities and/or relatives of the
people
• IoT security is of much important these days
• Authenticated access is ensured in the system put forward
• Location of tracked person is not passed to anyone anonymous
• Info can be accessed only by people with particular key
INTRODUCTION

• BLE
• Wireless personal area network
• Less power, cheaper, higher speed, wide support by smart devices
• 40 channels and three channels (i.e., 37, 38, and 39) used for broadcasting
advertisement messages
• RSSI(Received Signal Strength Indicator) : Used for estimating target’s location
• BLE beacons use small lithium chip batteries – great battery life
BEACONS

• Beacons: Small and cheap devices


• Transmit signals (Bluetooth 4.0 Low Energy standard specification)
• Repeatedly broadcast Universally Unique Identifier (UUID)
• Received by BLE receivers including all sorts of smart devices
• Signals used to identify unique id, subgroups and individual ones in subgroups
EXISTING SYSTEM

• Beacons are used as transmitters


• Detected by both Android and iOS devices
• Receivers used :
• Android smart phone
• Arduino Mega microcontroller board with BLE receiver module
EXISTING SYSTEM

• Both are programmed to scan the available BLE signals “on the air”
• RSSI values: Determine distance of receiver to each of the beacons
• Location of receiver estimated & stored in database
• Navigation of receiver also tracked
• Alerts generated for movements or excessively long stays in a position or area
EXISTING SYSTEM
IOT ISSUES
IOT CHALLENGES

• IoT is applied without consideration for security issues


• A common assumption is that data is stored in the cloud, it remains safe
• Cloud may be unhackable and app fully encrypted
• Even the most secure software isn’t secure enough when the hardware is
vulnerable
• Sensitive data or enabling features need secure infrastructure to protect the
data
• If not, the results may be disastrous
PROPOSED SYSTEM

• System based on beacons for detection of lost people is not an authenticated


process
• Security is required for IoT device
• Proposed system prevent hijacking by introducing authenticity for the system
• Anyone who seeks the location will not be provided with the exact data
• Location data is encrypted and hence whoever tries to access the info can’t
retrieve it properly
• Authenticated users are only provided with the data
PROPOSED SYSTEM

PERSON TO BE TRACKED BEACON SERVER

BLUETOOTH
RECEIVER
MODULE DATABASE

Wi-Fi KEY
ARDUINO MEGA
EXCHANGE

LED SET
ANDROID
CONCLUSION

• Perform position estimation, location estimation and alert generation


• Beacons are positioned to perform extensive measurements
• Systems send alert message if:
• Target goes to the forbidden zone or
• Remains at a location for a long time
• System gives better results for location estimation than exact positioning due to
non-ideal effects
• Hardware and software systems can be combined for the purpose
FUTURE WORK

• More accurate and efficient measurements


• Controlling the signal levels of transmitters
• Calibration made according to the location
• Track target using different kinds of signal such as ultra-wide band technology
• More research and development
• Obtain reliable products

You might also like