SlideShare uma empresa Scribd logo
1 de 30
Baixar para ler offline
Beyond GPS
     Neogeography Data Collection




Andrew Turner - andrew@mapufacture.com
OpenStreetMap
OpenStreetMap
What’s Next?
Tracking
WiFi
gsmloc
nike+
the packet level (including checksum verification); and log-
                                                      ging what sensors have been seen and when. See Figure 8.
                                                      Logs for multiple serial port traces are interleaved so that
                                                      one may see the data exchange or protocol of two devices
                                                      (in our case, the iPod and the receiver).

                                                      Our tool also provides a graphical interface for: sending and
                                                      receiving binary data in hex format over up to two serial
                                                      ports; viewing hex and ASCII representation of incoming
                                                      packets; and viewing what sensors have been seen and when
                                                      new packets for those sensors arrive. Our sensor visualiza-
                                                      tion consists of a blue rectangle for each seen sensor with
                                                      its UID in hex and the last time it was seen. Each time
                                                      the sensor is seen the box for that sensor becomes red and
                                                      slowly becomes blue (from top to bottom) over the follow-
                                                      ing five seconds. This allows one to get a sense of which
                                                      awake sensors are in range and how many of their packets
                                                      are arriving uncorrupted.

                                                      Optionally, our tool can take a picture whenever a new sen-
                                                      sor is discovered using most USB cameras and make that
                                                      photo the background of the blue box in the sensor visual-
                                                      ization. This application can also serve as a data collection
                                                      node in a larger surveillance network. To support this task,
                                                      the tool can upload to a SQL server sensor events including
                                                      UID, optional photo, timestamp, latitude, and longitude.        Figure 9: A Microsoft SPOT Watch receiving
                                                      (Latitude and longitude are currently set manually by the       Nike+iPod sensor IDs from an iMote2 over wireless
                                                      user; one could, however, imagine linking a bluetooth GPS       bluetooth.
                                                      receiver so that a mobile receiver on a car or bike could do
                                                      accurate data collection.)
                                                                                                                      on his or her watch. See Figure 9.
                                                      The tool can also SMS or email sensor information to users.
                                                      This tool is implemented in approximately 2000 lines of C#      The sensor events logged to file can also be manually up-
                                                      and XAML on Microsoft .NET 3.0 for Microsoft Windows            loaded to a central server for aggregation with sensor infor-
                                                      XP or later.                                                    mation from the Serial Communication Tool. A straight-
                                                                                                                      forward extension to this device would be for the iMote2
                                                                                                                      to obtain real-time location information from a bluetooth
                                                      4.3 Intel Motes
                                                                                                                      GPS sensor; this would enable an attacker to collect accu-
                                                      In addition to our serial communication tool for Windows we
                                                                                                                      rate sensor location information while the attacker is mo-
                                                      have also created an embedded module for logging and track-
                                                                                                                      bile. Another straightforward extension would be to create
                                                      ing Nike+iPod sensors using version 2 of the Intel Motes
                                                                                                                      a large, distributed surveillance sensor network consisting of
                                                      (iMote2). This module consists of an iMote2, an unmodified
                                                                                                                      multiple iMote2 nodes, and to upload surveillance data in
                                                      Nike+iPod receiver, female iPod connector, and an iMote2
                                                                                                                      real-time to some central SQL server. Rather than imple-
                                                      utility daughter board with bluetooth. The assembled pack-
                                                                                                                      ment this latter capability in our iMote2s, we do so with our
                                                      age is 5cm x 3.8cm x 2.5cm, weighs 2.3 ounces, and has a
                                                                                                                      gumstix in Section 4.4.
                                                      storage capacity of 2GB via a Mini Secure Digital card.

                                                                                                                      4.4 Gumstixs
                                                      The iMote2 runs the Linux operating system and our soft-
                                                      ware is written in C. The iMote2 communicates with the          We have also implemented a cheap Nike+iPod surveillance
                                                      receiver using a serial port. On boot, the iMote2 sends ini-    device using the Linux-based gumstix computers. This mod-
                                                      tialization and link commands to the receiver and begins        ule consists of an unmodified $29 Nike+iPod receiver, a $109




                                           nike+
                                                      logging sensor events to a file. Optionally, the software can    gumstix connex 200xm motherboard, a $79 wifistix, a $27.50
                                                      turn on an LED when the iMote2 detects that one or more         gumstix breakout board, and a $2.95 female iPod connector.
                                                      prespecified sensors are nearby. The set of target sensors is    The assembled package is 8cm x 2.1cm x 1.3cm and weighs
                                                      specified in a configuration file. One can imagine using the       1.1 ounces; see Figure 10.
                                                      LED-based alarm as a discrete mechanism for visually noti-
                                                      fying a user when a target victim’s sensor is nearby. There     Our gumstix-based module runs the same surveillance soft-
                                                      are obvious audio (buzzer) and physical (vibrate) extensions.   ware that our iMote2s run, except that (1) the software on
                                Figure 11: A screenshot of our GoogleMaps-based                                       the gumstix module uses WiFi to wirelessly transmit real-
                                                We have instrumented our iMote2 to communicate the UIDs               time surveillance data to a centralized back-end server and
                                surveillance webof application. SPOT Watch over blue-
                                                   sensors in range to a Microsoft                                    (2) our gumstixs do not pair with a Microsoft SPOT Watch.
-based Nike+iPod surveillance                         tooth. Using our system, an adversary could put the iMote2      The real-time reporting capability allows the gumstix mod-
                                                      and receiver in his or her backpack, purse, or pocket, and      ule to be part of a larger real-time surveillance system. If an
eless capabilities.                                   still continuously monitor information about nearby sensors     adversary does not need this real-time capability, then the



                                To illustrate the power of aggregating sensor information
                                from multiple physical locations, we created a GoogleMaps-
RFID
AIS
Imagery
Quakr
Quakr
OpenStreetView
            http://icanhascheezburger.com/2007/06/19/o-hai-googlz/
Kite Photography
Kite Photography
DIYDrones
+        =




    Pict’Earth
Pict’Earth
OpenAerialMap
Environmental
Urban Atmospheres
AIR
PigeonBlog
Fuel Economy
               T.J. Giuli
BioMapping
Satellites
GeoBliki
Links

 http://del.icio.us/tags/BeyondGPS




Andrew Turner - andrew@mapufacture.com

Mais conteúdo relacionado

Mais procurados

A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkA simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkeSAT Publishing House
 
From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing IJORCS
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...AM Publications
 
Human interface guidelines_v1.8.0
Human interface guidelines_v1.8.0Human interface guidelines_v1.8.0
Human interface guidelines_v1.8.0Lisandro Mierez
 
Secure Data Sharing with ABE in Wireless Sensor Networks
Secure Data Sharing with ABE in Wireless Sensor NetworksSecure Data Sharing with ABE in Wireless Sensor Networks
Secure Data Sharing with ABE in Wireless Sensor NetworksComputer Science Journals
 
Kinect for Windows SDK - Programming Guide
Kinect for Windows SDK - Programming GuideKinect for Windows SDK - Programming Guide
Kinect for Windows SDK - Programming GuideKatsuhito Okada
 
Protocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkProtocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkIOSR Journals
 
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor NetworksA Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networksambitlick
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...IRJET Journal
 
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...Mokpo National University
 
Some empirical evaluations of a temperature forecasting module based on Art...
Some empirical evaluations of a temperature forecasting module   based on Art...Some empirical evaluations of a temperature forecasting module   based on Art...
Some empirical evaluations of a temperature forecasting module based on Art...Francisco Zamora-Martinez
 
A virtual honeypot framework
A virtual honeypot frameworkA virtual honeypot framework
A virtual honeypot frameworkUltraUploader
 
Sophisticated Sensor - Video UNit (SSVU)
Sophisticated Sensor - Video UNit (SSVU)Sophisticated Sensor - Video UNit (SSVU)
Sophisticated Sensor - Video UNit (SSVU)Nightcolt
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Texecom wireless --ricochet-leaflets
Texecom wireless --ricochet-leafletsTexecom wireless --ricochet-leaflets
Texecom wireless --ricochet-leafletsmayur_32
 

Mais procurados (20)

A simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor networkA simple and effective scheme to find malicious node in wireless sensor network
A simple and effective scheme to find malicious node in wireless sensor network
 
From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing From Physical to Virtual Wireless Sensor Networks using Cloud Computing
From Physical to Virtual Wireless Sensor Networks using Cloud Computing
 
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
A Case Study on Authentication of Wireless Sensor Network based on Virtual Ce...
 
Human interface guidelines_v1.8.0
Human interface guidelines_v1.8.0Human interface guidelines_v1.8.0
Human interface guidelines_v1.8.0
 
Secure Data Sharing with ABE in Wireless Sensor Networks
Secure Data Sharing with ABE in Wireless Sensor NetworksSecure Data Sharing with ABE in Wireless Sensor Networks
Secure Data Sharing with ABE in Wireless Sensor Networks
 
Kinect for Windows SDK - Programming Guide
Kinect for Windows SDK - Programming GuideKinect for Windows SDK - Programming Guide
Kinect for Windows SDK - Programming Guide
 
182 185
182 185182 185
182 185
 
Protocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor networkProtocols for detection of node replication attack on wireless sensor network
Protocols for detection of node replication attack on wireless sensor network
 
[IJET-V1I3P15] Authors :Deeksha S.
[IJET-V1I3P15] Authors :Deeksha S.[IJET-V1I3P15] Authors :Deeksha S.
[IJET-V1I3P15] Authors :Deeksha S.
 
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor NetworksA Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
A Privacy-Preserving Location Monitoring System for Wireless Sensor Networks
 
IRJET - Identification and Classification of IoT Devices in Various Appli...
IRJET -  	  Identification and Classification of IoT Devices in Various Appli...IRJET -  	  Identification and Classification of IoT Devices in Various Appli...
IRJET - Identification and Classification of IoT Devices in Various Appli...
 
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
Integrating Wireless Sensor Network into Cloud Services for Real-time Data Co...
 
Some empirical evaluations of a temperature forecasting module based on Art...
Some empirical evaluations of a temperature forecasting module   based on Art...Some empirical evaluations of a temperature forecasting module   based on Art...
Some empirical evaluations of a temperature forecasting module based on Art...
 
A virtual honeypot framework
A virtual honeypot frameworkA virtual honeypot framework
A virtual honeypot framework
 
Self Healing
Self HealingSelf Healing
Self Healing
 
Sophisticated Sensor - Video UNit (SSVU)
Sophisticated Sensor - Video UNit (SSVU)Sophisticated Sensor - Video UNit (SSVU)
Sophisticated Sensor - Video UNit (SSVU)
 
complet finalised
complet finalisedcomplet finalised
complet finalised
 
Bh35333338
Bh35333338Bh35333338
Bh35333338
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Texecom wireless --ricochet-leaflets
Texecom wireless --ricochet-leafletsTexecom wireless --ricochet-leaflets
Texecom wireless --ricochet-leaflets
 

Destaque (15)

Threading Game Engines: QUAKE 4 & Enemy Territory QUAKE Wars
Threading Game Engines: QUAKE 4 & Enemy Territory QUAKE WarsThreading Game Engines: QUAKE 4 & Enemy Territory QUAKE Wars
Threading Game Engines: QUAKE 4 & Enemy Territory QUAKE Wars
 
GPS en verplaatsingsgedrag
GPS en verplaatsingsgedrag GPS en verplaatsingsgedrag
GPS en verplaatsingsgedrag
 
Doom3
Doom3Doom3
Doom3
 
Shadow Techniques for Real-Time and Interactive Applications
Shadow Techniques for Real-Time and Interactive ApplicationsShadow Techniques for Real-Time and Interactive Applications
Shadow Techniques for Real-Time and Interactive Applications
 
Implementing Server Side Data Synchronization for Mobile Apps
Implementing Server Side Data Synchronization for Mobile AppsImplementing Server Side Data Synchronization for Mobile Apps
Implementing Server Side Data Synchronization for Mobile Apps
 
Hageman id software project
Hageman id software projectHageman id software project
Hageman id software project
 
Introduction to MAPS,Coordinate System and Projection System
Introduction to MAPS,Coordinate System and Projection SystemIntroduction to MAPS,Coordinate System and Projection System
Introduction to MAPS,Coordinate System and Projection System
 
Geographic coordinate system & map projection
Geographic coordinate system & map projectionGeographic coordinate system & map projection
Geographic coordinate system & map projection
 
map projections
map projectionsmap projections
map projections
 
Understanding Coordinate Systems and Projections for ArcGIS
Understanding Coordinate Systems and Projections for ArcGISUnderstanding Coordinate Systems and Projections for ArcGIS
Understanding Coordinate Systems and Projections for ArcGIS
 
Map Projections
Map ProjectionsMap Projections
Map Projections
 
Gps ppt
Gps pptGps ppt
Gps ppt
 
GPS ppt.
GPS ppt. GPS ppt.
GPS ppt.
 
BSPTreesGameEngines-1
BSPTreesGameEngines-1BSPTreesGameEngines-1
BSPTreesGameEngines-1
 
BSPTreesGameEngines-2
BSPTreesGameEngines-2BSPTreesGameEngines-2
BSPTreesGameEngines-2
 

Semelhante a Beyond GPS - Neogeograpy Data Collection

Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...eSAT Journals
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTIJRTEMJOURNAL
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT journal ijrtem
 
iMouse
iMouseiMouse
iMouseeeshak
 
Real time approach of piezo actuated beam for wireless
Real time approach of piezo actuated beam for wirelessReal time approach of piezo actuated beam for wireless
Real time approach of piezo actuated beam for wirelesseSAT Publishing House
 
Smart agriculture based on data acquisition and monitoring systems
Smart agriculture based on data acquisition and monitoring systemsSmart agriculture based on data acquisition and monitoring systems
Smart agriculture based on data acquisition and monitoring systemsSachin Pal
 
Seminar Report on Wisenet Technology
Seminar Report on Wisenet TechnologySeminar Report on Wisenet Technology
Seminar Report on Wisenet TechnologyVivek Soni
 
A ZigBee Based Wireless Sensor Network for an Agricultural Environment
A ZigBee Based Wireless Sensor Network for an Agricultural EnvironmentA ZigBee Based Wireless Sensor Network for an Agricultural Environment
A ZigBee Based Wireless Sensor Network for an Agricultural Environmentijsrd.com
 
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALABluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALASaikiran Panjala
 
Monitoring in IOT enabled devices
Monitoring in IOT enabled devicesMonitoring in IOT enabled devices
Monitoring in IOT enabled devicesEswar Publications
 
Network Robots - Abhijeet
Network Robots - AbhijeetNetwork Robots - Abhijeet
Network Robots - AbhijeetAbhijeet Kalsi
 
Secured smart system desing in pervasive computing environment using vcs
Secured smart system desing in pervasive computing environment using vcsSecured smart system desing in pervasive computing environment using vcs
Secured smart system desing in pervasive computing environment using vcsijujournal
 
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSSECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSijujournal
 
S ECURED S MART S YSTEM D ESING IN P ERVASIVE C OMPUTING E NVIRONMENT U...
S ECURED  S MART  S YSTEM  D ESING  IN  P ERVASIVE  C OMPUTING E NVIRONMENT U...S ECURED  S MART  S YSTEM  D ESING  IN  P ERVASIVE  C OMPUTING E NVIRONMENT U...
S ECURED S MART S YSTEM D ESING IN P ERVASIVE C OMPUTING E NVIRONMENT U...ijujournal
 
actuator device configuration by NFC
actuator device configuration by NFCactuator device configuration by NFC
actuator device configuration by NFCSandeep P M
 
WSN Based Temperature Monitoring System for Multiple Locations in Industry
WSN Based Temperature Monitoring System for Multiple Locations in IndustryWSN Based Temperature Monitoring System for Multiple Locations in Industry
WSN Based Temperature Monitoring System for Multiple Locations in Industryijtsrd
 
NetSim Technology Library- Iot wsn
NetSim Technology Library- Iot wsnNetSim Technology Library- Iot wsn
NetSim Technology Library- Iot wsnVishal Sharma
 

Semelhante a Beyond GPS - Neogeograpy Data Collection (20)

I Mouse
I MouseI Mouse
I Mouse
 
Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...Real time approach of piezo actuated beam for wireless seismic measurement us...
Real time approach of piezo actuated beam for wireless seismic measurement us...
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoTDesign and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT	Design and Implementation of Smart Bell Notification System using IoT
Design and Implementation of Smart Bell Notification System using IoT
 
iMouse
iMouseiMouse
iMouse
 
Real time approach of piezo actuated beam for wireless
Real time approach of piezo actuated beam for wirelessReal time approach of piezo actuated beam for wireless
Real time approach of piezo actuated beam for wireless
 
Smart agriculture based on data acquisition and monitoring systems
Smart agriculture based on data acquisition and monitoring systemsSmart agriculture based on data acquisition and monitoring systems
Smart agriculture based on data acquisition and monitoring systems
 
Seminar Report on Wisenet Technology
Seminar Report on Wisenet TechnologySeminar Report on Wisenet Technology
Seminar Report on Wisenet Technology
 
A ZigBee Based Wireless Sensor Network for an Agricultural Environment
A ZigBee Based Wireless Sensor Network for an Agricultural EnvironmentA ZigBee Based Wireless Sensor Network for an Agricultural Environment
A ZigBee Based Wireless Sensor Network for an Agricultural Environment
 
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALABluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
 
Design of Remote Video Monitoring and Motion Detection System based on Arm-Li...
Design of Remote Video Monitoring and Motion Detection System based on Arm-Li...Design of Remote Video Monitoring and Motion Detection System based on Arm-Li...
Design of Remote Video Monitoring and Motion Detection System based on Arm-Li...
 
Monitoring in IOT enabled devices
Monitoring in IOT enabled devicesMonitoring in IOT enabled devices
Monitoring in IOT enabled devices
 
Network Robots - Abhijeet
Network Robots - AbhijeetNetwork Robots - Abhijeet
Network Robots - Abhijeet
 
Secured smart system desing in pervasive computing environment using vcs
Secured smart system desing in pervasive computing environment using vcsSecured smart system desing in pervasive computing environment using vcs
Secured smart system desing in pervasive computing environment using vcs
 
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCSSECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
SECURED SMART SYSTEM DESING IN PERVASIVE COMPUTING ENVIRONMENT USING VCS
 
S ECURED S MART S YSTEM D ESING IN P ERVASIVE C OMPUTING E NVIRONMENT U...
S ECURED  S MART  S YSTEM  D ESING  IN  P ERVASIVE  C OMPUTING E NVIRONMENT U...S ECURED  S MART  S YSTEM  D ESING  IN  P ERVASIVE  C OMPUTING E NVIRONMENT U...
S ECURED S MART S YSTEM D ESING IN P ERVASIVE C OMPUTING E NVIRONMENT U...
 
WIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORKWIRELESS SENSOR NETWORK
WIRELESS SENSOR NETWORK
 
actuator device configuration by NFC
actuator device configuration by NFCactuator device configuration by NFC
actuator device configuration by NFC
 
WSN Based Temperature Monitoring System for Multiple Locations in Industry
WSN Based Temperature Monitoring System for Multiple Locations in IndustryWSN Based Temperature Monitoring System for Multiple Locations in Industry
WSN Based Temperature Monitoring System for Multiple Locations in Industry
 
NetSim Technology Library- Iot wsn
NetSim Technology Library- Iot wsnNetSim Technology Library- Iot wsn
NetSim Technology Library- Iot wsn
 

Mais de Andrew Turner

GeoDC June 2012 - GeoCommons
GeoDC June 2012 - GeoCommonsGeoDC June 2012 - GeoCommons
GeoDC June 2012 - GeoCommonsAndrew Turner
 
Charlottesville Data bootcamp 2017
Charlottesville Data bootcamp 2017Charlottesville Data bootcamp 2017
Charlottesville Data bootcamp 2017Andrew Turner
 
State of the Map 2015
State of the Map 2015State of the Map 2015
State of the Map 2015Andrew Turner
 
Crisis Cartography - AAG 2013
Crisis Cartography - AAG 2013Crisis Cartography - AAG 2013
Crisis Cartography - AAG 2013Andrew Turner
 
OpenGovHub - Mapping Social Infrastructure with Social Media
OpenGovHub - Mapping Social Infrastructure with Social MediaOpenGovHub - Mapping Social Infrastructure with Social Media
OpenGovHub - Mapping Social Infrastructure with Social MediaAndrew Turner
 
OK festival Lightning Talk - Collaborative Open Geospatial Data
OK festival Lightning Talk - Collaborative Open Geospatial DataOK festival Lightning Talk - Collaborative Open Geospatial Data
OK festival Lightning Talk - Collaborative Open Geospatial DataAndrew Turner
 
GeoIQ Stack - Where 2012
GeoIQ Stack - Where 2012GeoIQ Stack - Where 2012
GeoIQ Stack - Where 2012Andrew Turner
 
Geospatial Archiving - Society of American Archivists
Geospatial Archiving - Society of American ArchivistsGeospatial Archiving - Society of American Archivists
Geospatial Archiving - Society of American ArchivistsAndrew Turner
 
Playful Explorations of Public and Personal Data - OSCON Data 2011
Playful Explorations of Public and Personal Data - OSCON Data 2011Playful Explorations of Public and Personal Data - OSCON Data 2011
Playful Explorations of Public and Personal Data - OSCON Data 2011Andrew Turner
 
Conversing around Data with Collaborative Analysis - Where2011
Conversing around Data with Collaborative Analysis - Where2011Conversing around Data with Collaborative Analysis - Where2011
Conversing around Data with Collaborative Analysis - Where2011Andrew Turner
 
tech tools for global collaboration 4 good
tech tools for global collaboration 4 goodtech tools for global collaboration 4 good
tech tools for global collaboration 4 goodAndrew Turner
 
Where2.0 That Matters
Where2.0 That MattersWhere2.0 That Matters
Where2.0 That MattersAndrew Turner
 
Humanitarian Mapping - Interaction ICCC
Humanitarian Mapping - Interaction ICCCHumanitarian Mapping - Interaction ICCC
Humanitarian Mapping - Interaction ICCCAndrew Turner
 
Open Access to Multi-Domain Collaborative Geospatial Analysis - AGU 2009
Open Access to Multi-Domain Collaborative Geospatial Analysis - AGU 2009Open Access to Multi-Domain Collaborative Geospatial Analysis - AGU 2009
Open Access to Multi-Domain Collaborative Geospatial Analysis - AGU 2009Andrew Turner
 
Crisis Mapping Lightning Talk Geo Commons
Crisis Mapping Lightning Talk   Geo CommonsCrisis Mapping Lightning Talk   Geo Commons
Crisis Mapping Lightning Talk Geo CommonsAndrew Turner
 
How Neogeography Killed GIS
How Neogeography Killed GISHow Neogeography Killed GIS
How Neogeography Killed GISAndrew Turner
 
Where2.0+Gov2.0 - Gov2.0 Summit
Where2.0+Gov2.0 - Gov2.0 SummitWhere2.0+Gov2.0 - Gov2.0 Summit
Where2.0+Gov2.0 - Gov2.0 SummitAndrew Turner
 
Library of Congress - Neogeography and Geospatial data preservation
Library of Congress - Neogeography and Geospatial data preservationLibrary of Congress - Neogeography and Geospatial data preservation
Library of Congress - Neogeography and Geospatial data preservationAndrew Turner
 
GeoCommons Open-Source GeoCoder
GeoCommons Open-Source GeoCoderGeoCommons Open-Source GeoCoder
GeoCommons Open-Source GeoCoderAndrew Turner
 
Geospatial Analysis in the Cloud
Geospatial Analysis in the CloudGeospatial Analysis in the Cloud
Geospatial Analysis in the CloudAndrew Turner
 

Mais de Andrew Turner (20)

GeoDC June 2012 - GeoCommons
GeoDC June 2012 - GeoCommonsGeoDC June 2012 - GeoCommons
GeoDC June 2012 - GeoCommons
 
Charlottesville Data bootcamp 2017
Charlottesville Data bootcamp 2017Charlottesville Data bootcamp 2017
Charlottesville Data bootcamp 2017
 
State of the Map 2015
State of the Map 2015State of the Map 2015
State of the Map 2015
 
Crisis Cartography - AAG 2013
Crisis Cartography - AAG 2013Crisis Cartography - AAG 2013
Crisis Cartography - AAG 2013
 
OpenGovHub - Mapping Social Infrastructure with Social Media
OpenGovHub - Mapping Social Infrastructure with Social MediaOpenGovHub - Mapping Social Infrastructure with Social Media
OpenGovHub - Mapping Social Infrastructure with Social Media
 
OK festival Lightning Talk - Collaborative Open Geospatial Data
OK festival Lightning Talk - Collaborative Open Geospatial DataOK festival Lightning Talk - Collaborative Open Geospatial Data
OK festival Lightning Talk - Collaborative Open Geospatial Data
 
GeoIQ Stack - Where 2012
GeoIQ Stack - Where 2012GeoIQ Stack - Where 2012
GeoIQ Stack - Where 2012
 
Geospatial Archiving - Society of American Archivists
Geospatial Archiving - Society of American ArchivistsGeospatial Archiving - Society of American Archivists
Geospatial Archiving - Society of American Archivists
 
Playful Explorations of Public and Personal Data - OSCON Data 2011
Playful Explorations of Public and Personal Data - OSCON Data 2011Playful Explorations of Public and Personal Data - OSCON Data 2011
Playful Explorations of Public and Personal Data - OSCON Data 2011
 
Conversing around Data with Collaborative Analysis - Where2011
Conversing around Data with Collaborative Analysis - Where2011Conversing around Data with Collaborative Analysis - Where2011
Conversing around Data with Collaborative Analysis - Where2011
 
tech tools for global collaboration 4 good
tech tools for global collaboration 4 goodtech tools for global collaboration 4 good
tech tools for global collaboration 4 good
 
Where2.0 That Matters
Where2.0 That MattersWhere2.0 That Matters
Where2.0 That Matters
 
Humanitarian Mapping - Interaction ICCC
Humanitarian Mapping - Interaction ICCCHumanitarian Mapping - Interaction ICCC
Humanitarian Mapping - Interaction ICCC
 
Open Access to Multi-Domain Collaborative Geospatial Analysis - AGU 2009
Open Access to Multi-Domain Collaborative Geospatial Analysis - AGU 2009Open Access to Multi-Domain Collaborative Geospatial Analysis - AGU 2009
Open Access to Multi-Domain Collaborative Geospatial Analysis - AGU 2009
 
Crisis Mapping Lightning Talk Geo Commons
Crisis Mapping Lightning Talk   Geo CommonsCrisis Mapping Lightning Talk   Geo Commons
Crisis Mapping Lightning Talk Geo Commons
 
How Neogeography Killed GIS
How Neogeography Killed GISHow Neogeography Killed GIS
How Neogeography Killed GIS
 
Where2.0+Gov2.0 - Gov2.0 Summit
Where2.0+Gov2.0 - Gov2.0 SummitWhere2.0+Gov2.0 - Gov2.0 Summit
Where2.0+Gov2.0 - Gov2.0 Summit
 
Library of Congress - Neogeography and Geospatial data preservation
Library of Congress - Neogeography and Geospatial data preservationLibrary of Congress - Neogeography and Geospatial data preservation
Library of Congress - Neogeography and Geospatial data preservation
 
GeoCommons Open-Source GeoCoder
GeoCommons Open-Source GeoCoderGeoCommons Open-Source GeoCoder
GeoCommons Open-Source GeoCoder
 
Geospatial Analysis in the Cloud
Geospatial Analysis in the CloudGeospatial Analysis in the Cloud
Geospatial Analysis in the Cloud
 

Último

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

Beyond GPS - Neogeograpy Data Collection

  • 1. Beyond GPS Neogeography Data Collection Andrew Turner - andrew@mapufacture.com
  • 9. the packet level (including checksum verification); and log- ging what sensors have been seen and when. See Figure 8. Logs for multiple serial port traces are interleaved so that one may see the data exchange or protocol of two devices (in our case, the iPod and the receiver). Our tool also provides a graphical interface for: sending and receiving binary data in hex format over up to two serial ports; viewing hex and ASCII representation of incoming packets; and viewing what sensors have been seen and when new packets for those sensors arrive. Our sensor visualiza- tion consists of a blue rectangle for each seen sensor with its UID in hex and the last time it was seen. Each time the sensor is seen the box for that sensor becomes red and slowly becomes blue (from top to bottom) over the follow- ing five seconds. This allows one to get a sense of which awake sensors are in range and how many of their packets are arriving uncorrupted. Optionally, our tool can take a picture whenever a new sen- sor is discovered using most USB cameras and make that photo the background of the blue box in the sensor visual- ization. This application can also serve as a data collection node in a larger surveillance network. To support this task, the tool can upload to a SQL server sensor events including UID, optional photo, timestamp, latitude, and longitude. Figure 9: A Microsoft SPOT Watch receiving (Latitude and longitude are currently set manually by the Nike+iPod sensor IDs from an iMote2 over wireless user; one could, however, imagine linking a bluetooth GPS bluetooth. receiver so that a mobile receiver on a car or bike could do accurate data collection.) on his or her watch. See Figure 9. The tool can also SMS or email sensor information to users. This tool is implemented in approximately 2000 lines of C# The sensor events logged to file can also be manually up- and XAML on Microsoft .NET 3.0 for Microsoft Windows loaded to a central server for aggregation with sensor infor- XP or later. mation from the Serial Communication Tool. A straight- forward extension to this device would be for the iMote2 to obtain real-time location information from a bluetooth 4.3 Intel Motes GPS sensor; this would enable an attacker to collect accu- In addition to our serial communication tool for Windows we rate sensor location information while the attacker is mo- have also created an embedded module for logging and track- bile. Another straightforward extension would be to create ing Nike+iPod sensors using version 2 of the Intel Motes a large, distributed surveillance sensor network consisting of (iMote2). This module consists of an iMote2, an unmodified multiple iMote2 nodes, and to upload surveillance data in Nike+iPod receiver, female iPod connector, and an iMote2 real-time to some central SQL server. Rather than imple- utility daughter board with bluetooth. The assembled pack- ment this latter capability in our iMote2s, we do so with our age is 5cm x 3.8cm x 2.5cm, weighs 2.3 ounces, and has a gumstix in Section 4.4. storage capacity of 2GB via a Mini Secure Digital card. 4.4 Gumstixs The iMote2 runs the Linux operating system and our soft- ware is written in C. The iMote2 communicates with the We have also implemented a cheap Nike+iPod surveillance receiver using a serial port. On boot, the iMote2 sends ini- device using the Linux-based gumstix computers. This mod- tialization and link commands to the receiver and begins ule consists of an unmodified $29 Nike+iPod receiver, a $109 nike+ logging sensor events to a file. Optionally, the software can gumstix connex 200xm motherboard, a $79 wifistix, a $27.50 turn on an LED when the iMote2 detects that one or more gumstix breakout board, and a $2.95 female iPod connector. prespecified sensors are nearby. The set of target sensors is The assembled package is 8cm x 2.1cm x 1.3cm and weighs specified in a configuration file. One can imagine using the 1.1 ounces; see Figure 10. LED-based alarm as a discrete mechanism for visually noti- fying a user when a target victim’s sensor is nearby. There Our gumstix-based module runs the same surveillance soft- are obvious audio (buzzer) and physical (vibrate) extensions. ware that our iMote2s run, except that (1) the software on Figure 11: A screenshot of our GoogleMaps-based the gumstix module uses WiFi to wirelessly transmit real- We have instrumented our iMote2 to communicate the UIDs time surveillance data to a centralized back-end server and surveillance webof application. SPOT Watch over blue- sensors in range to a Microsoft (2) our gumstixs do not pair with a Microsoft SPOT Watch. -based Nike+iPod surveillance tooth. Using our system, an adversary could put the iMote2 The real-time reporting capability allows the gumstix mod- and receiver in his or her backpack, purse, or pocket, and ule to be part of a larger real-time surveillance system. If an eless capabilities. still continuously monitor information about nearby sensors adversary does not need this real-time capability, then the To illustrate the power of aggregating sensor information from multiple physical locations, we created a GoogleMaps-
  • 10. RFID
  • 11. AIS
  • 13. Quakr
  • 14. Quakr
  • 15. OpenStreetView http://icanhascheezburger.com/2007/06/19/o-hai-googlz/
  • 19. + = Pict’Earth
  • 24. AIR
  • 26. Fuel Economy T.J. Giuli