SlideShare uma empresa Scribd logo
1 de 9
Baixar para ler offline
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
DOI : 10.5121/ijasuc.2018.9101 1
ANALYSING THE POTENTIAL OF BLE TO SUPPORT
DYNAMIC BROADCASTING SCENARIOS
Miran Borić1
Ana Fernández Vilas2
and Rebeca P. Díaz Redondo3
123
Information & Computing Lab., AtlantTIC Research Centre,
School of Telecommunications Engineering,
University of Vigo, 36210, Vigo(Spain)
ABSTRACT
In this paper, we present a novel approach for broadcasting information based on a Bluetooth Low Energy
(BLE) ibeacon technology. We propose a dynamic method that uses a combination of Wi-Fi and BLE
technology where every technology plays a part in a user discovery and broadcasting process. In such
system, a specific ibeacon device broadcasts the information when a user is in proximity. Using
experiments, we conduct a scenario where the system discovers users, disseminates information, and later
we use collected data to examine the system performance and capability. The results show that our
proposed approach has a promising potential to become a powerful tool in the discovery and broadcasting
concept that can be easily implemented and used in business environments.
KEYWORDS
Bluetooth Low Energy, Broadcasting, ibeacons, Internet of Things, Experiments
1. INTRODUCTION
The main characteristics of a smart environments is their adaptability and awareness of their
surroundings. Such adaptable ability provides the Internet of Things concept by its linking the
virtual with the physical world. This whole process presents a challenge since the smart
environment is heterogeneous and supported by many different technologies[1][2]. One of these
technologies on the rise is a BLE beacon, which found a place in many aspects of human needs
and living. Such technique enables smartphones, tablets, and different wearables to perform a
particular kind of action when near a beacon. Nowadays, many companies are involved in the
beacon production[3][4]. However, the price is controlling the beacon solution, especially if it
supports some enhanced capabilities. Also, many companies with the hardware part include their
application solution. That is to say; the application often comes incombination with the hardware
they offer. Because of that, beacons are not usually capable of analysing the surrounding around
them (user discovery) without some previously installed app on a user’s smartphone[5].
This paper presents a fully customized solution for user discovery and dynamic beacon
information broadcasting according to the discovered user. In our case, a single beacon device is
capable of supporting a dynamic broadcasting by predefining user profiles through the use of
some background intelligence. Therefore, without any extra equipment, a single beacon device
can serve different profiles at the same moment. Also, the possibility of monitoring user’s
movements, without any additional proprietary app installation, gives us an opportunity to gather
more information about the space analytics and user behaviour.
This solution can be used in any message dissemination environment and integrated into the
existing infrastructure with minimum investments. In our case, we have tested it as an indoor
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
2
solution for broadcasting faculty information to students, faculty visitors, and faculty personnel.
We verify the system through the experiment in a particular period and obtain the data. Later, by
analysing the data, we extract and examine the results by giving a better insight of system
performance and system usage. Furthermore, we investigate the capability of the system to
receive interactions during the experiment period and how these interactions can show different
activities in the area.
We divide this paper into several sections. Section 2 gives the related work and what motivated us
for this paper. In section 3 we give the system explanation and the architecture. Section 4 deals
with pilot experiment and shows us all the details regarding the experimented. The last part draws
the conclusions, current and future work.
2. RELATED WORK
In [6]authors offered a crowd sensing solution where users receive a corresponding information
by wearing a Bluetooth bracelet, which connects to their smartphones. Furthermore, specific
bracelets connect to the beacon devices placed along the experiment area. Also, a dedicated
server controls all the beacon devices and that way it manages a user-bracelet-beacon
interaction.However, in our case, the interaction is almost similar but without Bluetooth bracelets.
Our system makes a direct connection between beacon advertising device and a user's
smartphone, which eases the whole process.
The most significant influence and motivator of our work is a commercial solution offered by
Cisco Systems, Inc. called Cisco Connected Mobile Experience (CMX)[7]. This product presents
a solution that uses location intelligence gathered from the Wi-Fi network to help companies of
all various industries monetize their network by engaging with their clients and optimizing
marketing operations. It offers to businesses a unique way to communicate with and to better
understand their customers while improving customer experience and their venue. CMX system
can automatically detect the presence and engage their customers on their site and with tailored
messages. Based on a user’s position and by using his smart mobile device, the system can
deliver different content. Ranging from informational updated, indoor maps or any user relevant
information this location data also increases the efficiency by understanding new versus repeat
customers.
Besides being a powerful mobile solution the price can be its disadvantage. Not all organizations
are ready to invest in such solution. Implementing it usually requires a Cisco proprietary devices
and its core, e.g., Cisco 3365 Mobility Services Engine. In our case, we offer an inexpensive
system installed on a Raspberry Pi device that can discover users and distribute them the
corresponding information to improve organizational and operational efficiency. Also, it can
understand a user pattern, send different data to identified users, etc.
3. ARCHITECTURE OVERVIEW
The reason we choose BLE beacon technology is the fact that presents a lightweight protocol that
does not ask for prior connection between two devices that need to share some data. BLE beacon-
enabled device broadcasts the signal to anyone who is configured to listen. In case of the Wi-Fi
direct and classic Bluetooth, they ask for secure pairing to unknown devices[8]. Furthermore, if
we want to connect multiple clients to Wi-Fi network, devices also require a specific data routing
protocol that is self-organized[9].A beacon represents a BLE class, and sometimes it is called a
BLE flavor. It became popular thanks to its Bluetooth low power capability to stay active for
years and it is powered only by coin cell battery[10]. Among many beacon solutions[11], for our
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
system implementation, we use the Apple version (i
our pilot project. The technology is
transmit-only technology built for
configuration into the beacon device.
understandable, ibeacon, while advertising packets, it is doing nothing more than saying to
everyone around that it is present and identified by three numerical identifiers: Universal Unique
Identifier (UUID), Major number and Minor number. Comb
representa specific information, and by advertising this combined identifier, it can trigger a
particular action on a device that reads it. What is interesting
part, usually installed on a user’s phone.Such app
with the action that starts after discovering the
a user’s phone is the primary product throughout the whole
to show some information regarding advertised products in the
else more complicated.
We implement and test the solution at the Faculty of Engineering and Telecommunications
Vigo in Spain. We divide its infrastructure into two main parts, which are the front
part) and the back-end (Wi-Fi part). The front
sending multiple user info advertisements, while the back
through the Faculty Wi-Fi infrastructure to the ibeacon user profile database (see Fig. 1). Single
user, in other words, a user's device, is discovered when enters the beaconing area. Beaconing
area contains several Raspberry Pi
Module on a single Raspberry Pi device is responsible for the user discovery process and is
continually scanning for new MAC addresses over a BLE protocol. When the beacon device
discovers a user, it learns a user's device MAC address and saves it to the ibeacon database.
For this process, we are using two technologies. First, a user is discovered through the BLE
protocol and sent to the database by using a Wi
an input for a specific user, it associates the user with a beacon configuration advertisement
(UUID, Major and Minor combination) and again through the Wi
configuration advertisement to the beacon device. From that point, a
protocol to deliver configuration advertisements to a specific discovered user. User's smartphone
reads the configuration advertisement and triggers a particular action (see Fig. 1). Moreover,
ibeacon database saves all the user's in
Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
system implementation, we use the Apple version (ibeacon), which we found most suitable
The technology is pretty much straightforward to explain. It
only technology built for broadcasting data, where receiving option demands additional
device. However, the protocol itself is transmit-only. P
, while advertising packets, it is doing nothing more than saying to
everyone around that it is present and identified by three numerical identifiers: Universal Unique
Identifier (UUID), Major number and Minor number. Combining these three numbers we can
specific information, and by advertising this combined identifier, it can trigger a
particular action on a device that reads it. What is interesting about the ibeacon is the application
’s phone.Such app can read the ibeacon identifier and associate it
with the action that starts after discovering the beacon. In this manner, an application function on
phone is the primary product throughout the whole beacon process, whether it is designed
to show some information regarding advertised products in the beacon proximity or something
Figure 1. System architecture
We implement and test the solution at the Faculty of Engineering and Telecommunications
Vigo in Spain. We divide its infrastructure into two main parts, which are the front
Fi part). The front-end is taking care of the user discovery and
sending multiple user info advertisements, while the back-end connects all the beacon devices
Fi infrastructure to the ibeacon user profile database (see Fig. 1). Single
user, in other words, a user's device, is discovered when enters the beaconing area. Beaconing
area contains several Raspberry Pi beacon configured devices places along the Faculty area. BLE
Module on a single Raspberry Pi device is responsible for the user discovery process and is
continually scanning for new MAC addresses over a BLE protocol. When the beacon device
, it learns a user's device MAC address and saves it to the ibeacon database.
For this process, we are using two technologies. First, a user is discovered through the BLE
protocol and sent to the database by using a Wi-Fi protocol. Later, when ibeacon data
an input for a specific user, it associates the user with a beacon configuration advertisement
(UUID, Major and Minor combination) and again through the Wi-Fi protocol sends a
configuration advertisement to the beacon device. From that point, a beacon device uses BLE
protocol to deliver configuration advertisements to a specific discovered user. User's smartphone
reads the configuration advertisement and triggers a particular action (see Fig. 1). Moreover,
ibeacon database saves all the user's input records, and it is updated every time a user enters the
Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
3
), which we found most suitable for
straightforward to explain. It represents a
, where receiving option demands additional
only. Put it more
, while advertising packets, it is doing nothing more than saying to
everyone around that it is present and identified by three numerical identifiers: Universal Unique
ining these three numbers we can
specific information, and by advertising this combined identifier, it can trigger a
is the application
identifier and associate it
. In this manner, an application function on
r it is designed
proximity or something
We implement and test the solution at the Faculty of Engineering and Telecommunications of
Vigo in Spain. We divide its infrastructure into two main parts, which are the front-end (BLE
end is taking care of the user discovery and
cts all the beacon devices
Fi infrastructure to the ibeacon user profile database (see Fig. 1). Single
user, in other words, a user's device, is discovered when enters the beaconing area. Beaconing
beacon configured devices places along the Faculty area. BLE
Module on a single Raspberry Pi device is responsible for the user discovery process and is
continually scanning for new MAC addresses over a BLE protocol. When the beacon device
, it learns a user's device MAC address and saves it to the ibeacon database.
For this process, we are using two technologies. First, a user is discovered through the BLE
Fi protocol. Later, when ibeacon database saves
an input for a specific user, it associates the user with a beacon configuration advertisement
Fi protocol sends a
beacon device uses BLE
protocol to deliver configuration advertisements to a specific discovered user. User's smartphone
reads the configuration advertisement and triggers a particular action (see Fig. 1). Moreover,
put records, and it is updated every time a user enters the
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
4
area. It does this by keeping track of a user's beacon entrance timestamps. User discovery process
is customizable and configured according to the needs of the organization. In our case, a single
beacon device works in a discovery mode for five seconds, and after one second it restarts again.
We have to mention that when a beacon device discovers a particular user’s device, it
immediately makes a connection to the ibeacon database and saves the user’s MAC address as the
database input. It also saves the timestamp of the user’s entrance to the broadcasting (beaconing)
area.
Along the Faculty area, several beacon advertisers were implemented and continuously served
users while entering and exiting the Faculty area. For beacon devices, as already mentioned, we
use a Raspberry Pi hardware devices[12]. The reason why we choose Raspberry Pi over many
others, ready to implement commercial solutions, is the fact that they lack in customization
abilities, where Raspberry is Linux based[13], and it is open to customization. Hardware part
consists of few components. The primary element is a Raspberry Pi 3, and it represents a beacon
device, but the ibeacon database as well.Every beacon device has two pieces of Bluetooth CSR1
4.0 USB2
dongles and one Wi-Fi USB dongle installed on its chassis. The reason why we need
two BLE dongles is that of discovery and advertising process. Beacon device is continuously
scanning the beacon area on one BLE dongle why the other has a function of the advertising
process. Wi-Fi dongle connects the beacon to the internal Faculty infrastructure, and that way
communicates with the ibeacon database. For the ibeacon database, we use Raspberry Pi 3 model
B with MySQL version 5.5 but any computer that supports MySQL installation will serve the
purpose.
4. PILOT EXPERIMENT
Faculty as a building presents a complex environment, where we had to take care of the BLE
coverage, which reduces if the signal encounters an obstacle (walls, doors, inventory, etc.). After
positioning all the beacon devices and making sure that we conceived a full coverage, we
connected them all through the Faculty Wi-Fi infrastructure. The main idea was also to build a
system and satisfy the broadcasting coverage area by using a minimum number of devices. In our
case, we conceived it with 13 devices.We evaluate the performance of the proposed system by
collecting and extracting real-time data. We experiment on the premises of the Faculty and in 27
days, from 05/05/2017 to 31/05/2017, when the Faculty as an institution was in its usual working
routine process (professors dealing with students, students attending classes, exams, studying in
the Faculty library, etc.). After collecting and extracting all the data from the ibeacon database,
we discovered that the total number of inputs in the database was 70,046. This info also means
that the interactions of all the identified users and the system were the same as the number of
database inputs previously mentioned. By interaction, we express discovery and broadcasting
process altogether. Also, a total number of discovered and served users during the experiment
period was 120. It is important to mention that no influence on users was done, regarding their
smart devices and activating the BLE protocol, whatsoever.
Next, we examine a basic system usage from several points of view and divide it by days and
hours. Usage tells us at what specific time was the system involved in a message dissemination
process, as well as in the user discovery process. From Fig. 2 we can see that the peak time of
system usage was 15th of May with 8,884 total interactions. Some predictions regarding such
system behavior could be that the number of Faculty visitors was the same, but not all users had
BLE protocol activated on their phones. However, taking into account that the exam period at the
Faculty started on 15th of May, we can conclude that starting from that day, a Faculty was less
1
Cambridge Silicon Radio
2
Universal Serial Bus
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
crowded place than before. The reason for this is because not all students were taking the exams,
and by that, they were not present like in the time wh
2). More in-depth inspection of user system usage will give us a better insight of the day with the
high user interactions.
Figure 3. System usage
If we dive a little bit more into this specific date (15th of May), we see that the total number of
users involved in system usage was 24 (see Fig. 3). Figure 3 gives us a better insight into
user interaction. More specifically, two users, named Liss
in system interaction, comparing to
of the most active user and its behavior during the experiment. It is important to mention that
every user identification, in our case
the sake of user's anonymity. In a real
unique device MAC address, as well as user's device
wanted to know the hour peak time of system usage. According to Fig. 4 and the closer insight,
we can tell that the users mostly interact from 10 AM until 12 PM. Peak time also shows that the
Faculty as the institution had usual working hours convent
Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
crowded place than before. The reason for this is because not all students were taking the exams,
and by that, they were not present like in the time when they were attending their classes (see Fig.
depth inspection of user system usage will give us a better insight of the day with the
Figure 2. System usage per days
Figure 3. System usage – 15th
of May
If we dive a little bit more into this specific date (15th of May), we see that the total number of
users involved in system usage was 24 (see Fig. 3). Figure 3 gives us a better insight into
interaction. More specifically, two users, named Lissa and Suzan, were pretty much involved
in system interaction, comparing to the others. In the following part, we will give a closer insight
of the most active user and its behavior during the experiment. It is important to mention that
ation, in our case a user’s device MAC address, we changed for username, for
the sake of user's anonymity. In a real-world scenario, every username presents a specific and
unique device MAC address, as well as user's device identification (phone name
wanted to know the hour peak time of system usage. According to Fig. 4 and the closer insight,
we can tell that the users mostly interact from 10 AM until 12 PM. Peak time also shows that the
Faculty as the institution had usual working hours conventional to the world's working hours. We
Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
5
crowded place than before. The reason for this is because not all students were taking the exams,
en they were attending their classes (see Fig.
depth inspection of user system usage will give us a better insight of the day with the
If we dive a little bit more into this specific date (15th of May), we see that the total number of
users involved in system usage was 24 (see Fig. 3). Figure 3 gives us a better insight into every
a and Suzan, were pretty much involved
others. In the following part, we will give a closer insight
of the most active user and its behavior during the experiment. It is important to mention that
MAC address, we changed for username, for
world scenario, every username presents a specific and
identification (phone name). Next, we
wanted to know the hour peak time of system usage. According to Fig. 4 and the closer insight,
we can tell that the users mostly interact from 10 AM until 12 PM. Peak time also shows that the
ional to the world's working hours. We
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
can see when the day goes down
of around 850 interactions per hour until the next morning at about 8 AM. This information tells
us that the users used system resources also during non
during night time is the fact that Faculty has employees who leave their electronic equipment
(device's BLE protocol) in active mode. In the following paragraphs, we examine more closel
involved users in this system usage process.
Figure 5. User Lissa interactions with the system
The user that we examined was user Lissa. This user had the most number of interactions with the
system (20,476) during the experiment period of 27 days. From Figure 5 we notice that user was
active from 5th of May until 19th of May and usually was leaving his BLE device turned on, even
during night time when the Faculty does not operate for the public. This behavior
8th, 9th, 10th, 11th, 12th 15th and 16th of May. Notably, this action we see on 15th and 16th of
May when user's device was mostly active during night period (see Fig. 5). This why we had
deviation on these days (see Fig. 2).
Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
down, in the same manner, the system usage slowly drops to the point
of around 850 interactions per hour until the next morning at about 8 AM. This information tells
stem resources also during non-working hours. Why users use the system
during night time is the fact that Faculty has employees who leave their electronic equipment
(device's BLE protocol) in active mode. In the following paragraphs, we examine more closel
involved users in this system usage process.
Figure 4. System usage per hour
Figure 5. User Lissa interactions with the system
The user that we examined was user Lissa. This user had the most number of interactions with the
during the experiment period of 27 days. From Figure 5 we notice that user was
active from 5th of May until 19th of May and usually was leaving his BLE device turned on, even
during night time when the Faculty does not operate for the public. This behavior
8th, 9th, 10th, 11th, 12th 15th and 16th of May. Notably, this action we see on 15th and 16th of
May when user's device was mostly active during night period (see Fig. 5). This why we had
on on these days (see Fig. 2). During different periods of time the user was acting
Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
6
, in the same manner, the system usage slowly drops to the point
of around 850 interactions per hour until the next morning at about 8 AM. This information tells
working hours. Why users use the system
during night time is the fact that Faculty has employees who leave their electronic equipment
(device's BLE protocol) in active mode. In the following paragraphs, we examine more closely
The user that we examined was user Lissa. This user had the most number of interactions with the
during the experiment period of 27 days. From Figure 5 we notice that user was
active from 5th of May until 19th of May and usually was leaving his BLE device turned on, even
we notice on
8th, 9th, 10th, 11th, 12th 15th and 16th of May. Notably, this action we see on 15th and 16th of
May when user's device was mostly active during night period (see Fig. 5). This why we had
periods of time the user was acting
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
7
according to the behavior of other scanned users, either not present in the area (out of the
Faculty), or either present but with inactive BLE protocol on his device.
5. CONCLUSIONS
This paper proposes an innovative solution for broadcasting information using BLE beacons.
Field experiment shows how the system behavesto discover users and to broadcastthe information
to them. However, to correctly receive the information, a userhas to install the app that can
process a beacon signal. The results gave a closer look into system performance while users
interact with the system. The developed system is flexible and can be incorporated easily into
already built infrastructure, not ruining its scalability. The proposed system also presents an
inexpensive alternative to the Cisco CMX solution, previously mentioned in the related work
section.
Currently, the solution can offer a user profile categorization by applying a predefined user
interest taxonomy to the system and in that way using fewer devices to advertise different data to
users found in beacon proximity. That is to say, a single beacon device in our solution can operate
in a mode where it associates with different advertisements and in the same moment can
broadcast multiple information to nearby smart devices. Categorization process demands to
predetermine the users in the ibeacon database by creating separate profiles for specific user.
However, even if we do so, we have to assign them to the discovered users. That way, the system
can identify them the next time they enter the beaconing area. This process asks for applying
different methods for identifying users and predefining their profiles. We are currently working
on a method where we try to categorize the users by analysing their movements along the
building area and learning their behaviour. This way, we want to combine the dynamic
broadcasting solution with the user and space analytics.
This approach enables to obtain users’ movement around a specific area and, consequently, it
might support discovering patterns of users’ behaviour. Previously mentioned motivates as to
develop and experiment more in the area of BLE beacon message dissemination. We plan to
continue our work on this concept and combine our broadcasting system with space monitoring
where extracting data of discovered users from beacon devices can help us to understand the
surrounding behaviour, and to improve the efficiency and the logistics in the particular building.
Furthermore, this approach has some numerous cases where it can be applied, such as social
network, where people can search for other people around them and get some extra knowledge
about the others. Also, by accessing the real-time statistic, beacons can be used to recognize
different hotspots and send alerts to whom it may concern about locations that are overcrowded
and a subject to security flaws.
ACKNOWLEDGEMENT
This work is funded by: the EU Regional Development Fund, and the Galician Government under
agreement for funding the (AtlantTIC); the Spanish Ministry of Economy and Competitiveness
(TEC2014-54335-C4-3-R); and the EU Commission under the Erasmus Mundus Green-Tech-WB
project (551984-EM-1-2014-1-ES-ERA MUNDUS-EMA21).Thanks to the Communications
Department of the ATIC (UVIGO) for its collaboration in the pilot deployment
REFERENCES
[1] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, “Internet of Things for Smart Cities,”
IEEE Internet Things J., vol. 1, no. 1, pp. 22–32, Feb. 2014.
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
[2] “Bluetooth Low Energy for Use with MEM Sensors by Clinton Francis Hughes
Available: https://pdfsecret.com/download/bluetooth
clinton-francis-hughes-a-thesis-
2017].
[3] “Estimote.” [Online]. Available: http://estimote.com/. [Accessed: 28
[4] “Kontakt.io Blog,” Kontakt.io. [Online]. Available: https://kontakt.io/blog/. [Accessed: 28
[5] Shahriar, Shaffat, “Location based content delivery solution using iBeacon,” Umeå University, Faculty
of Science and Technology, Department of Computing Science.
[6] Chieh-Ming Chang, Li Szu-Chuang, and Huang Yennun, “Crowdsensing traces visualization in
bluetooth beacon-based sensor network using wearable device,” Proceeding SA 16 SIGGRAPH ASIA
2016 Posters Artic. No 5.
[7] “Cisco Mobility Express -
https://www.cisco.com/c/en/us/solutions/enterprise
[Accessed: 28-Nov-2017].
[8] S.Trifunovic, B. Distl, D. Schatzmann, and F. Legendre, “WiFi
Networking,” in Proceedings of the 6th ACM Workshop on Challenged Networks, New York, NY,
USA, 2011, pp. 37–42.
[9] D. J. Dubois, Y. Bando, K. Watanabe, and H. Holtzman, “Lightweight Self
of Opportunistic Infrastructure-
Self-Adaptive and Self-Organizing Sy
[10] N. Newman, “Apple iBeacon technology briefing,” J. Direct Data Digit. Mark. Pract., vol. 15, no. 3,
pp. 222–225, Jan. 2014.
[11] “Google Eddystone vs. Apple iBeacon: Big Clash Between Tiny Bluetooth Beacons
Tech Times.” [Online]. Available: http://www.techtimes.com/articles/68932/20150715/google
eddystone-vs-apple-ibeacon-big
[12] E. Upton and G. Halfacree, Raspberry Pi User Guide. John
[13] M. Shacklette, “Linux Operating System,” in Handbook of Computer Networks, H. B. Editor
Ed. John Wiley & Sons, Inc., 2007, pp. 78
Authors
Miran Borić
Erasmus Mundus Green-Tech-WB Ph.D. student since September 2015 at
University of Vigo (Spain). I obtained the diploma in “Multisensor Intrusion
Detection System” from the Faculty of Informational Technologies,
University of “Džemal Bijedić” Mostar, Bosnia & Herzegovina. I have
previous work experience as a Network specialist and System administrator at
UniCredit Group Bank Mostar and Faculty of Informati
Mostar. I am also an active Cisco Certified Network Academy instructor at
Cisco Local Academy Mostar since 2010. My area of interest includes Smart
network technologies, Internet of Things, Bluetooth Technologies, Switching networks, Rout
and Quality of Service in computers networks.
Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
“Bluetooth Low Energy for Use with MEM Sensors by Clinton Francis Hughes A Thesis.” [Online].
https://pdfsecret.com/download/bluetooth-low-energy-for-use-with-mem-sensors
-presented-in-_59f70296d64ab20a751134a4_pdf. [Accessed: 28
“Estimote.” [Online]. Available: http://estimote.com/. [Accessed: 28-Nov-2017].
“Kontakt.io Blog,” Kontakt.io. [Online]. Available: https://kontakt.io/blog/. [Accessed: 28
“Location based content delivery solution using iBeacon,” Umeå University, Faculty
of Science and Technology, Department of Computing Science.
Chuang, and Huang Yennun, “Crowdsensing traces visualization in
sed sensor network using wearable device,” Proceeding SA 16 SIGGRAPH ASIA
Cisco Mobility Express Solution,” Cisco. [Online]. Available:
https://www.cisco.com/c/en/us/solutions/enterprise-networks/mobility-express/mobility-
Trifunovic, B. Distl, D. Schatzmann, and F. Legendre, “WiFi-Opp: Ad-hoc-less Opportunistic
Networking,” in Proceedings of the 6th ACM Workshop on Challenged Networks, New York, NY,
D. J. Dubois, Y. Bando, K. Watanabe, and H. Holtzman, “Lightweight Self-organizing Reconfiguration
-mode WiFi Networks,” in 2013 IEEE 7th International Conference on
Organizing Systems, 2013, pp. 247–256.
N. Newman, “Apple iBeacon technology briefing,” J. Direct Data Digit. Mark. Pract., vol. 15, no. 3,
“Google Eddystone vs. Apple iBeacon: Big Clash Between Tiny Bluetooth Beacons : Business Tec
Tech Times.” [Online]. Available: http://www.techtimes.com/articles/68932/20150715/google
big-clash-between-tiny-bluetooth-beacons.htm. [Accessed: 28
E. Upton and G. Halfacree, Raspberry Pi User Guide. John Wiley & Sons, 2014.
M. Shacklette, “Linux Operating System,” in Handbook of Computer Networks, H. B. Editor
Ed. John Wiley & Sons, Inc., 2007, pp. 78–90.
WB Ph.D. student since September 2015 at
University of Vigo (Spain). I obtained the diploma in “Multisensor Intrusion
on System” from the Faculty of Informational Technologies,
ć” Mostar, Bosnia & Herzegovina. I have
previous work experience as a Network specialist and System administrator at
UniCredit Group Bank Mostar and Faculty of Informational Technologies
Mostar. I am also an active Cisco Certified Network Academy instructor at
Cisco Local Academy Mostar since 2010. My area of interest includes Smart
network technologies, Internet of Things, Bluetooth Technologies, Switching networks, Rout
and Quality of Service in computers networks.
Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
8
A Thesis.” [Online].
sensors-by-
pdf. [Accessed: 28-Nov-
“Kontakt.io Blog,” Kontakt.io. [Online]. Available: https://kontakt.io/blog/. [Accessed: 28-Nov-2017].
“Location based content delivery solution using iBeacon,” Umeå University, Faculty
Chuang, and Huang Yennun, “Crowdsensing traces visualization in
sed sensor network using wearable device,” Proceeding SA 16 SIGGRAPH ASIA
Cisco Mobility Express Solution,” Cisco. [Online]. Available:
solution.html.
less Opportunistic
Networking,” in Proceedings of the 6th ACM Workshop on Challenged Networks, New York, NY,
organizing Reconfiguration
mode WiFi Networks,” in 2013 IEEE 7th International Conference on
N. Newman, “Apple iBeacon technology briefing,” J. Direct Data Digit. Mark. Pract., vol. 15, no. 3,
 : Business Tech :
Tech Times.” [Online]. Available: http://www.techtimes.com/articles/68932/20150715/google-
beacons.htm. [Accessed: 28-Nov-2017].
M. Shacklette, “Linux Operating System,” in Handbook of Computer Networks, H. B. Editor-in-Chief,
network technologies, Internet of Things, Bluetooth Technologies, Switching networks, Routing protocols
International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018
9
Ana Fernández Vilas
I am Associate Professor at the Department of Telematics Engineering of
the University of Vigo and researcher in the Information & Computing
Laboratory (AtlantTIC Research Center). I received my PhD in Computer
Science from the University of Vigo in 2002. My research activity at I&C
lab focuses on Semantic-Social Intelligence & data mining. I look for
applying both to Ubiquitous Computing and Sensor Web; urban planning
& learning analytics. Also, I am involved in several mobility &
cooperation projects with North African countries & Western Balkans
Rebeca P. Díaz Redondo
Rebeca P. Díaz Redondo is an Associate Professor at the Department of
Telematics Engineering of the University of Vigo and researcher in the
Information & Computing Laboratory (AtlantTIC Research Center). She
received her PhD in Telecommunications Engineering from the same
university. She currently works on applying social mining and data
analysis techniques to characterize the behavior of users and communities
to design solutions in learning, smart cities and business areas. She is
currently involved in the scientific and technical activities of several
national and European research & educative projects. Besides, she is
involved in several mobility & cooperation projects with North African
countries & Western Balkans.

Mais conteúdo relacionado

Mais procurados

AndriodMobileComputingAssignment
AndriodMobileComputingAssignmentAndriodMobileComputingAssignment
AndriodMobileComputingAssignmentRebecca Patient
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Davide Cioccia
 
Eyesight Sharing in Blind Grocery Shopping: Remote P2P Caregiving through Clo...
Eyesight Sharing in Blind Grocery Shopping: Remote P2P Caregiving through Clo...Eyesight Sharing in Blind Grocery Shopping: Remote P2P Caregiving through Clo...
Eyesight Sharing in Blind Grocery Shopping: Remote P2P Caregiving through Clo...Vladimir Kulyukin
 
Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industryaap3 IT Recruitment
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...ijcisjournal
 
IRJET- Clean India Mission: Beacon Technology
IRJET- Clean India Mission: Beacon TechnologyIRJET- Clean India Mission: Beacon Technology
IRJET- Clean India Mission: Beacon TechnologyIRJET Journal
 
From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...Fread Mzee
 
Data Offload Survival Guide - Part 2
Data Offload Survival Guide - Part 2Data Offload Survival Guide - Part 2
Data Offload Survival Guide - Part 2Justus @GreenPacket
 
Machine-to-Machine Services - E2E Architecture and A View to the Trillion End...
Machine-to-Machine Services - E2E Architecture and A View to the Trillion End...Machine-to-Machine Services - E2E Architecture and A View to the Trillion End...
Machine-to-Machine Services - E2E Architecture and A View to the Trillion End...Mahbubul Alam
 
Monitoring in IOT enabled devices
Monitoring in IOT enabled devicesMonitoring in IOT enabled devices
Monitoring in IOT enabled devicesEswar Publications
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...IJCNCJournal
 

Mais procurados (18)

AndriodMobileComputingAssignment
AndriodMobileComputingAssignmentAndriodMobileComputingAssignment
AndriodMobileComputingAssignment
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
 
Article
ArticleArticle
Article
 
Eyesight Sharing in Blind Grocery Shopping: Remote P2P Caregiving through Clo...
Eyesight Sharing in Blind Grocery Shopping: Remote P2P Caregiving through Clo...Eyesight Sharing in Blind Grocery Shopping: Remote P2P Caregiving through Clo...
Eyesight Sharing in Blind Grocery Shopping: Remote P2P Caregiving through Clo...
 
Whitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco IndustryWhitepaper - Software Defined Networking for the Telco Industry
Whitepaper - Software Defined Networking for the Telco Industry
 
AD-MPEX-BRO-09Dec2014
AD-MPEX-BRO-09Dec2014AD-MPEX-BRO-09Dec2014
AD-MPEX-BRO-09Dec2014
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Android titles adrit solutions
Android titles adrit solutionsAndroid titles adrit solutions
Android titles adrit solutions
 
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Crypt...
 
IRJET- Clean India Mission: Beacon Technology
IRJET- Clean India Mission: Beacon TechnologyIRJET- Clean India Mission: Beacon Technology
IRJET- Clean India Mission: Beacon Technology
 
From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...From context aware to socially awareness computing - IEEE Pervasive Computing...
From context aware to socially awareness computing - IEEE Pervasive Computing...
 
182 185
182 185182 185
182 185
 
Data Offload Survival Guide - Part 2
Data Offload Survival Guide - Part 2Data Offload Survival Guide - Part 2
Data Offload Survival Guide - Part 2
 
Machine-to-Machine Services - E2E Architecture and A View to the Trillion End...
Machine-to-Machine Services - E2E Architecture and A View to the Trillion End...Machine-to-Machine Services - E2E Architecture and A View to the Trillion End...
Machine-to-Machine Services - E2E Architecture and A View to the Trillion End...
 
Monitoring in IOT enabled devices
Monitoring in IOT enabled devicesMonitoring in IOT enabled devices
Monitoring in IOT enabled devices
 
C04941721
C04941721C04941721
C04941721
 
Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...Towards internet of things iots integration of wireless sensor network to clo...
Towards internet of things iots integration of wireless sensor network to clo...
 
Z041106163167
Z041106163167Z041106163167
Z041106163167
 

Semelhante a ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS

Flexible Technologies for Smart Campus
Flexible Technologies for Smart CampusFlexible Technologies for Smart Campus
Flexible Technologies for Smart CampusKamal Spring
 
Beacon Technology White Paper - April 2016
Beacon Technology White Paper - April 2016Beacon Technology White Paper - April 2016
Beacon Technology White Paper - April 2016Craig Van Pelt
 
Get to know Beacons Understanding and Online & Offline Integration
Get to know Beacons Understanding and Online & Offline IntegrationGet to know Beacons Understanding and Online & Offline Integration
Get to know Beacons Understanding and Online & Offline IntegrationJohn Andric
 
mumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphonesmumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on SmartphonesAnand Bhojan
 
Providing location based information advertising for existing
Providing location based information advertising for existingProviding location based information advertising for existing
Providing location based information advertising for existingAvelin Huo
 
Participatory privacy enabling privacy in participatory sensing
Participatory privacy enabling privacy in participatory sensingParticipatory privacy enabling privacy in participatory sensing
Participatory privacy enabling privacy in participatory sensingJPINFOTECH JAYAPRAKASH
 
IRJET- A Survey on Systems using Beacon Technology
IRJET- A Survey on Systems using Beacon TechnologyIRJET- A Survey on Systems using Beacon Technology
IRJET- A Survey on Systems using Beacon TechnologyIRJET Journal
 
BLE Beacon with Data Accumulation Functionality
BLE Beacon with Data Accumulation FunctionalityBLE Beacon with Data Accumulation Functionality
BLE Beacon with Data Accumulation FunctionalityIJCNCJournal
 
BLE Beacon with Data Accumulation Functionality
BLE Beacon with Data Accumulation FunctionalityBLE Beacon with Data Accumulation Functionality
BLE Beacon with Data Accumulation FunctionalityIJCNCJournal
 
Functional requirements of intelligent object framework
Functional requirements of intelligent object frameworkFunctional requirements of intelligent object framework
Functional requirements of intelligent object frameworkijscai
 
Internet of things, and rise of ibeacons
Internet of things, and rise of ibeaconsInternet of things, and rise of ibeacons
Internet of things, and rise of ibeaconsJanusz Chudzynski
 
Developing Beacons with Bluetooth® Low Energy (BLE) Technology
 Developing Beacons with Bluetooth® Low Energy (BLE) Technology Developing Beacons with Bluetooth® Low Energy (BLE) Technology
Developing Beacons with Bluetooth® Low Energy (BLE) TechnologyPallavi Das
 
Developing Beacons with Bluetooth® Low Energy (BLE) Technology
 Developing Beacons with Bluetooth® Low Energy (BLE) Technology Developing Beacons with Bluetooth® Low Energy (BLE) Technology
Developing Beacons with Bluetooth® Low Energy (BLE) TechnologyPallavi Das
 
Developing Beacons with Bluetooth® Low Energy (BLE) Technology
 Developing Beacons with Bluetooth® Low Energy (BLE) Technology Developing Beacons with Bluetooth® Low Energy (BLE) Technology
Developing Beacons with Bluetooth® Low Energy (BLE) TechnologyPallavi Das
 
Developing Beacons with Bluetooth® Low Energy (BLE) Technology
 Developing Beacons with Bluetooth® Low Energy (BLE) Technology Developing Beacons with Bluetooth® Low Energy (BLE) Technology
Developing Beacons with Bluetooth® Low Energy (BLE) TechnologySilabs products
 
The proposed System for Indoor Location Tracking
The proposed System for Indoor Location TrackingThe proposed System for Indoor Location Tracking
The proposed System for Indoor Location TrackingEditor IJCATR
 
Widipay a cross layer design for mobile payment system over lte direct
Widipay a cross layer design for mobile payment system over lte directWidipay a cross layer design for mobile payment system over lte direct
Widipay a cross layer design for mobile payment system over lte directeSAT Journals
 

Semelhante a ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS (20)

Flexible Technologies for Smart Campus
Flexible Technologies for Smart CampusFlexible Technologies for Smart Campus
Flexible Technologies for Smart Campus
 
Beacon Technology White Paper - April 2016
Beacon Technology White Paper - April 2016Beacon Technology White Paper - April 2016
Beacon Technology White Paper - April 2016
 
Beacons
Beacons Beacons
Beacons
 
Get to know Beacons Understanding and Online & Offline Integration
Get to know Beacons Understanding and Online & Offline IntegrationGet to know Beacons Understanding and Online & Offline Integration
Get to know Beacons Understanding and Online & Offline Integration
 
mumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphonesmumble: Framework for Seamless Message Transfer on Smartphones
mumble: Framework for Seamless Message Transfer on Smartphones
 
Providing location based information advertising for existing
Providing location based information advertising for existingProviding location based information advertising for existing
Providing location based information advertising for existing
 
Participatory privacy enabling privacy in participatory sensing
Participatory privacy enabling privacy in participatory sensingParticipatory privacy enabling privacy in participatory sensing
Participatory privacy enabling privacy in participatory sensing
 
IRJET- A Survey on Systems using Beacon Technology
IRJET- A Survey on Systems using Beacon TechnologyIRJET- A Survey on Systems using Beacon Technology
IRJET- A Survey on Systems using Beacon Technology
 
BLE Beacon with Data Accumulation Functionality
BLE Beacon with Data Accumulation FunctionalityBLE Beacon with Data Accumulation Functionality
BLE Beacon with Data Accumulation Functionality
 
BLE Beacon with Data Accumulation Functionality
BLE Beacon with Data Accumulation FunctionalityBLE Beacon with Data Accumulation Functionality
BLE Beacon with Data Accumulation Functionality
 
Functional requirements of intelligent object framework
Functional requirements of intelligent object frameworkFunctional requirements of intelligent object framework
Functional requirements of intelligent object framework
 
ijais13-451015
ijais13-451015ijais13-451015
ijais13-451015
 
Project Document
Project Document Project Document
Project Document
 
Internet of things, and rise of ibeacons
Internet of things, and rise of ibeaconsInternet of things, and rise of ibeacons
Internet of things, and rise of ibeacons
 
Developing Beacons with Bluetooth® Low Energy (BLE) Technology
 Developing Beacons with Bluetooth® Low Energy (BLE) Technology Developing Beacons with Bluetooth® Low Energy (BLE) Technology
Developing Beacons with Bluetooth® Low Energy (BLE) Technology
 
Developing Beacons with Bluetooth® Low Energy (BLE) Technology
 Developing Beacons with Bluetooth® Low Energy (BLE) Technology Developing Beacons with Bluetooth® Low Energy (BLE) Technology
Developing Beacons with Bluetooth® Low Energy (BLE) Technology
 
Developing Beacons with Bluetooth® Low Energy (BLE) Technology
 Developing Beacons with Bluetooth® Low Energy (BLE) Technology Developing Beacons with Bluetooth® Low Energy (BLE) Technology
Developing Beacons with Bluetooth® Low Energy (BLE) Technology
 
Developing Beacons with Bluetooth® Low Energy (BLE) Technology
 Developing Beacons with Bluetooth® Low Energy (BLE) Technology Developing Beacons with Bluetooth® Low Energy (BLE) Technology
Developing Beacons with Bluetooth® Low Energy (BLE) Technology
 
The proposed System for Indoor Location Tracking
The proposed System for Indoor Location TrackingThe proposed System for Indoor Location Tracking
The proposed System for Indoor Location Tracking
 
Widipay a cross layer design for mobile payment system over lte direct
Widipay a cross layer design for mobile payment system over lte directWidipay a cross layer design for mobile payment system over lte direct
Widipay a cross layer design for mobile payment system over lte direct
 

Último

SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxAmanpreet Kaur
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - Englishneillewis46
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdfssuserdda66b
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structuredhanjurrannsibayan2
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 

Último (20)

SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 

ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS

  • 1. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018 DOI : 10.5121/ijasuc.2018.9101 1 ANALYSING THE POTENTIAL OF BLE TO SUPPORT DYNAMIC BROADCASTING SCENARIOS Miran Borić1 Ana Fernández Vilas2 and Rebeca P. Díaz Redondo3 123 Information & Computing Lab., AtlantTIC Research Centre, School of Telecommunications Engineering, University of Vigo, 36210, Vigo(Spain) ABSTRACT In this paper, we present a novel approach for broadcasting information based on a Bluetooth Low Energy (BLE) ibeacon technology. We propose a dynamic method that uses a combination of Wi-Fi and BLE technology where every technology plays a part in a user discovery and broadcasting process. In such system, a specific ibeacon device broadcasts the information when a user is in proximity. Using experiments, we conduct a scenario where the system discovers users, disseminates information, and later we use collected data to examine the system performance and capability. The results show that our proposed approach has a promising potential to become a powerful tool in the discovery and broadcasting concept that can be easily implemented and used in business environments. KEYWORDS Bluetooth Low Energy, Broadcasting, ibeacons, Internet of Things, Experiments 1. INTRODUCTION The main characteristics of a smart environments is their adaptability and awareness of their surroundings. Such adaptable ability provides the Internet of Things concept by its linking the virtual with the physical world. This whole process presents a challenge since the smart environment is heterogeneous and supported by many different technologies[1][2]. One of these technologies on the rise is a BLE beacon, which found a place in many aspects of human needs and living. Such technique enables smartphones, tablets, and different wearables to perform a particular kind of action when near a beacon. Nowadays, many companies are involved in the beacon production[3][4]. However, the price is controlling the beacon solution, especially if it supports some enhanced capabilities. Also, many companies with the hardware part include their application solution. That is to say; the application often comes incombination with the hardware they offer. Because of that, beacons are not usually capable of analysing the surrounding around them (user discovery) without some previously installed app on a user’s smartphone[5]. This paper presents a fully customized solution for user discovery and dynamic beacon information broadcasting according to the discovered user. In our case, a single beacon device is capable of supporting a dynamic broadcasting by predefining user profiles through the use of some background intelligence. Therefore, without any extra equipment, a single beacon device can serve different profiles at the same moment. Also, the possibility of monitoring user’s movements, without any additional proprietary app installation, gives us an opportunity to gather more information about the space analytics and user behaviour. This solution can be used in any message dissemination environment and integrated into the existing infrastructure with minimum investments. In our case, we have tested it as an indoor
  • 2. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018 2 solution for broadcasting faculty information to students, faculty visitors, and faculty personnel. We verify the system through the experiment in a particular period and obtain the data. Later, by analysing the data, we extract and examine the results by giving a better insight of system performance and system usage. Furthermore, we investigate the capability of the system to receive interactions during the experiment period and how these interactions can show different activities in the area. We divide this paper into several sections. Section 2 gives the related work and what motivated us for this paper. In section 3 we give the system explanation and the architecture. Section 4 deals with pilot experiment and shows us all the details regarding the experimented. The last part draws the conclusions, current and future work. 2. RELATED WORK In [6]authors offered a crowd sensing solution where users receive a corresponding information by wearing a Bluetooth bracelet, which connects to their smartphones. Furthermore, specific bracelets connect to the beacon devices placed along the experiment area. Also, a dedicated server controls all the beacon devices and that way it manages a user-bracelet-beacon interaction.However, in our case, the interaction is almost similar but without Bluetooth bracelets. Our system makes a direct connection between beacon advertising device and a user's smartphone, which eases the whole process. The most significant influence and motivator of our work is a commercial solution offered by Cisco Systems, Inc. called Cisco Connected Mobile Experience (CMX)[7]. This product presents a solution that uses location intelligence gathered from the Wi-Fi network to help companies of all various industries monetize their network by engaging with their clients and optimizing marketing operations. It offers to businesses a unique way to communicate with and to better understand their customers while improving customer experience and their venue. CMX system can automatically detect the presence and engage their customers on their site and with tailored messages. Based on a user’s position and by using his smart mobile device, the system can deliver different content. Ranging from informational updated, indoor maps or any user relevant information this location data also increases the efficiency by understanding new versus repeat customers. Besides being a powerful mobile solution the price can be its disadvantage. Not all organizations are ready to invest in such solution. Implementing it usually requires a Cisco proprietary devices and its core, e.g., Cisco 3365 Mobility Services Engine. In our case, we offer an inexpensive system installed on a Raspberry Pi device that can discover users and distribute them the corresponding information to improve organizational and operational efficiency. Also, it can understand a user pattern, send different data to identified users, etc. 3. ARCHITECTURE OVERVIEW The reason we choose BLE beacon technology is the fact that presents a lightweight protocol that does not ask for prior connection between two devices that need to share some data. BLE beacon- enabled device broadcasts the signal to anyone who is configured to listen. In case of the Wi-Fi direct and classic Bluetooth, they ask for secure pairing to unknown devices[8]. Furthermore, if we want to connect multiple clients to Wi-Fi network, devices also require a specific data routing protocol that is self-organized[9].A beacon represents a BLE class, and sometimes it is called a BLE flavor. It became popular thanks to its Bluetooth low power capability to stay active for years and it is powered only by coin cell battery[10]. Among many beacon solutions[11], for our
  • 3. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018 system implementation, we use the Apple version (i our pilot project. The technology is transmit-only technology built for configuration into the beacon device. understandable, ibeacon, while advertising packets, it is doing nothing more than saying to everyone around that it is present and identified by three numerical identifiers: Universal Unique Identifier (UUID), Major number and Minor number. Comb representa specific information, and by advertising this combined identifier, it can trigger a particular action on a device that reads it. What is interesting part, usually installed on a user’s phone.Such app with the action that starts after discovering the a user’s phone is the primary product throughout the whole to show some information regarding advertised products in the else more complicated. We implement and test the solution at the Faculty of Engineering and Telecommunications Vigo in Spain. We divide its infrastructure into two main parts, which are the front part) and the back-end (Wi-Fi part). The front sending multiple user info advertisements, while the back through the Faculty Wi-Fi infrastructure to the ibeacon user profile database (see Fig. 1). Single user, in other words, a user's device, is discovered when enters the beaconing area. Beaconing area contains several Raspberry Pi Module on a single Raspberry Pi device is responsible for the user discovery process and is continually scanning for new MAC addresses over a BLE protocol. When the beacon device discovers a user, it learns a user's device MAC address and saves it to the ibeacon database. For this process, we are using two technologies. First, a user is discovered through the BLE protocol and sent to the database by using a Wi an input for a specific user, it associates the user with a beacon configuration advertisement (UUID, Major and Minor combination) and again through the Wi configuration advertisement to the beacon device. From that point, a protocol to deliver configuration advertisements to a specific discovered user. User's smartphone reads the configuration advertisement and triggers a particular action (see Fig. 1). Moreover, ibeacon database saves all the user's in Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018 system implementation, we use the Apple version (ibeacon), which we found most suitable The technology is pretty much straightforward to explain. It only technology built for broadcasting data, where receiving option demands additional device. However, the protocol itself is transmit-only. P , while advertising packets, it is doing nothing more than saying to everyone around that it is present and identified by three numerical identifiers: Universal Unique Identifier (UUID), Major number and Minor number. Combining these three numbers we can specific information, and by advertising this combined identifier, it can trigger a particular action on a device that reads it. What is interesting about the ibeacon is the application ’s phone.Such app can read the ibeacon identifier and associate it with the action that starts after discovering the beacon. In this manner, an application function on phone is the primary product throughout the whole beacon process, whether it is designed to show some information regarding advertised products in the beacon proximity or something Figure 1. System architecture We implement and test the solution at the Faculty of Engineering and Telecommunications Vigo in Spain. We divide its infrastructure into two main parts, which are the front Fi part). The front-end is taking care of the user discovery and sending multiple user info advertisements, while the back-end connects all the beacon devices Fi infrastructure to the ibeacon user profile database (see Fig. 1). Single user, in other words, a user's device, is discovered when enters the beaconing area. Beaconing area contains several Raspberry Pi beacon configured devices places along the Faculty area. BLE Module on a single Raspberry Pi device is responsible for the user discovery process and is continually scanning for new MAC addresses over a BLE protocol. When the beacon device , it learns a user's device MAC address and saves it to the ibeacon database. For this process, we are using two technologies. First, a user is discovered through the BLE protocol and sent to the database by using a Wi-Fi protocol. Later, when ibeacon data an input for a specific user, it associates the user with a beacon configuration advertisement (UUID, Major and Minor combination) and again through the Wi-Fi protocol sends a configuration advertisement to the beacon device. From that point, a beacon device uses BLE protocol to deliver configuration advertisements to a specific discovered user. User's smartphone reads the configuration advertisement and triggers a particular action (see Fig. 1). Moreover, ibeacon database saves all the user's input records, and it is updated every time a user enters the Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018 3 ), which we found most suitable for straightforward to explain. It represents a , where receiving option demands additional only. Put it more , while advertising packets, it is doing nothing more than saying to everyone around that it is present and identified by three numerical identifiers: Universal Unique ining these three numbers we can specific information, and by advertising this combined identifier, it can trigger a is the application identifier and associate it . In this manner, an application function on r it is designed proximity or something We implement and test the solution at the Faculty of Engineering and Telecommunications of Vigo in Spain. We divide its infrastructure into two main parts, which are the front-end (BLE end is taking care of the user discovery and cts all the beacon devices Fi infrastructure to the ibeacon user profile database (see Fig. 1). Single user, in other words, a user's device, is discovered when enters the beaconing area. Beaconing beacon configured devices places along the Faculty area. BLE Module on a single Raspberry Pi device is responsible for the user discovery process and is continually scanning for new MAC addresses over a BLE protocol. When the beacon device , it learns a user's device MAC address and saves it to the ibeacon database. For this process, we are using two technologies. First, a user is discovered through the BLE Fi protocol. Later, when ibeacon database saves an input for a specific user, it associates the user with a beacon configuration advertisement Fi protocol sends a beacon device uses BLE protocol to deliver configuration advertisements to a specific discovered user. User's smartphone reads the configuration advertisement and triggers a particular action (see Fig. 1). Moreover, put records, and it is updated every time a user enters the
  • 4. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018 4 area. It does this by keeping track of a user's beacon entrance timestamps. User discovery process is customizable and configured according to the needs of the organization. In our case, a single beacon device works in a discovery mode for five seconds, and after one second it restarts again. We have to mention that when a beacon device discovers a particular user’s device, it immediately makes a connection to the ibeacon database and saves the user’s MAC address as the database input. It also saves the timestamp of the user’s entrance to the broadcasting (beaconing) area. Along the Faculty area, several beacon advertisers were implemented and continuously served users while entering and exiting the Faculty area. For beacon devices, as already mentioned, we use a Raspberry Pi hardware devices[12]. The reason why we choose Raspberry Pi over many others, ready to implement commercial solutions, is the fact that they lack in customization abilities, where Raspberry is Linux based[13], and it is open to customization. Hardware part consists of few components. The primary element is a Raspberry Pi 3, and it represents a beacon device, but the ibeacon database as well.Every beacon device has two pieces of Bluetooth CSR1 4.0 USB2 dongles and one Wi-Fi USB dongle installed on its chassis. The reason why we need two BLE dongles is that of discovery and advertising process. Beacon device is continuously scanning the beacon area on one BLE dongle why the other has a function of the advertising process. Wi-Fi dongle connects the beacon to the internal Faculty infrastructure, and that way communicates with the ibeacon database. For the ibeacon database, we use Raspberry Pi 3 model B with MySQL version 5.5 but any computer that supports MySQL installation will serve the purpose. 4. PILOT EXPERIMENT Faculty as a building presents a complex environment, where we had to take care of the BLE coverage, which reduces if the signal encounters an obstacle (walls, doors, inventory, etc.). After positioning all the beacon devices and making sure that we conceived a full coverage, we connected them all through the Faculty Wi-Fi infrastructure. The main idea was also to build a system and satisfy the broadcasting coverage area by using a minimum number of devices. In our case, we conceived it with 13 devices.We evaluate the performance of the proposed system by collecting and extracting real-time data. We experiment on the premises of the Faculty and in 27 days, from 05/05/2017 to 31/05/2017, when the Faculty as an institution was in its usual working routine process (professors dealing with students, students attending classes, exams, studying in the Faculty library, etc.). After collecting and extracting all the data from the ibeacon database, we discovered that the total number of inputs in the database was 70,046. This info also means that the interactions of all the identified users and the system were the same as the number of database inputs previously mentioned. By interaction, we express discovery and broadcasting process altogether. Also, a total number of discovered and served users during the experiment period was 120. It is important to mention that no influence on users was done, regarding their smart devices and activating the BLE protocol, whatsoever. Next, we examine a basic system usage from several points of view and divide it by days and hours. Usage tells us at what specific time was the system involved in a message dissemination process, as well as in the user discovery process. From Fig. 2 we can see that the peak time of system usage was 15th of May with 8,884 total interactions. Some predictions regarding such system behavior could be that the number of Faculty visitors was the same, but not all users had BLE protocol activated on their phones. However, taking into account that the exam period at the Faculty started on 15th of May, we can conclude that starting from that day, a Faculty was less 1 Cambridge Silicon Radio 2 Universal Serial Bus
  • 5. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018 crowded place than before. The reason for this is because not all students were taking the exams, and by that, they were not present like in the time wh 2). More in-depth inspection of user system usage will give us a better insight of the day with the high user interactions. Figure 3. System usage If we dive a little bit more into this specific date (15th of May), we see that the total number of users involved in system usage was 24 (see Fig. 3). Figure 3 gives us a better insight into user interaction. More specifically, two users, named Liss in system interaction, comparing to of the most active user and its behavior during the experiment. It is important to mention that every user identification, in our case the sake of user's anonymity. In a real unique device MAC address, as well as user's device wanted to know the hour peak time of system usage. According to Fig. 4 and the closer insight, we can tell that the users mostly interact from 10 AM until 12 PM. Peak time also shows that the Faculty as the institution had usual working hours convent Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018 crowded place than before. The reason for this is because not all students were taking the exams, and by that, they were not present like in the time when they were attending their classes (see Fig. depth inspection of user system usage will give us a better insight of the day with the Figure 2. System usage per days Figure 3. System usage – 15th of May If we dive a little bit more into this specific date (15th of May), we see that the total number of users involved in system usage was 24 (see Fig. 3). Figure 3 gives us a better insight into interaction. More specifically, two users, named Lissa and Suzan, were pretty much involved in system interaction, comparing to the others. In the following part, we will give a closer insight of the most active user and its behavior during the experiment. It is important to mention that ation, in our case a user’s device MAC address, we changed for username, for the sake of user's anonymity. In a real-world scenario, every username presents a specific and unique device MAC address, as well as user's device identification (phone name wanted to know the hour peak time of system usage. According to Fig. 4 and the closer insight, we can tell that the users mostly interact from 10 AM until 12 PM. Peak time also shows that the Faculty as the institution had usual working hours conventional to the world's working hours. We Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018 5 crowded place than before. The reason for this is because not all students were taking the exams, en they were attending their classes (see Fig. depth inspection of user system usage will give us a better insight of the day with the If we dive a little bit more into this specific date (15th of May), we see that the total number of users involved in system usage was 24 (see Fig. 3). Figure 3 gives us a better insight into every a and Suzan, were pretty much involved others. In the following part, we will give a closer insight of the most active user and its behavior during the experiment. It is important to mention that MAC address, we changed for username, for world scenario, every username presents a specific and identification (phone name). Next, we wanted to know the hour peak time of system usage. According to Fig. 4 and the closer insight, we can tell that the users mostly interact from 10 AM until 12 PM. Peak time also shows that the ional to the world's working hours. We
  • 6. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018 can see when the day goes down of around 850 interactions per hour until the next morning at about 8 AM. This information tells us that the users used system resources also during non during night time is the fact that Faculty has employees who leave their electronic equipment (device's BLE protocol) in active mode. In the following paragraphs, we examine more closel involved users in this system usage process. Figure 5. User Lissa interactions with the system The user that we examined was user Lissa. This user had the most number of interactions with the system (20,476) during the experiment period of 27 days. From Figure 5 we notice that user was active from 5th of May until 19th of May and usually was leaving his BLE device turned on, even during night time when the Faculty does not operate for the public. This behavior 8th, 9th, 10th, 11th, 12th 15th and 16th of May. Notably, this action we see on 15th and 16th of May when user's device was mostly active during night period (see Fig. 5). This why we had deviation on these days (see Fig. 2). Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018 down, in the same manner, the system usage slowly drops to the point of around 850 interactions per hour until the next morning at about 8 AM. This information tells stem resources also during non-working hours. Why users use the system during night time is the fact that Faculty has employees who leave their electronic equipment (device's BLE protocol) in active mode. In the following paragraphs, we examine more closel involved users in this system usage process. Figure 4. System usage per hour Figure 5. User Lissa interactions with the system The user that we examined was user Lissa. This user had the most number of interactions with the during the experiment period of 27 days. From Figure 5 we notice that user was active from 5th of May until 19th of May and usually was leaving his BLE device turned on, even during night time when the Faculty does not operate for the public. This behavior 8th, 9th, 10th, 11th, 12th 15th and 16th of May. Notably, this action we see on 15th and 16th of May when user's device was mostly active during night period (see Fig. 5). This why we had on on these days (see Fig. 2). During different periods of time the user was acting Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018 6 , in the same manner, the system usage slowly drops to the point of around 850 interactions per hour until the next morning at about 8 AM. This information tells working hours. Why users use the system during night time is the fact that Faculty has employees who leave their electronic equipment (device's BLE protocol) in active mode. In the following paragraphs, we examine more closely The user that we examined was user Lissa. This user had the most number of interactions with the during the experiment period of 27 days. From Figure 5 we notice that user was active from 5th of May until 19th of May and usually was leaving his BLE device turned on, even we notice on 8th, 9th, 10th, 11th, 12th 15th and 16th of May. Notably, this action we see on 15th and 16th of May when user's device was mostly active during night period (see Fig. 5). This why we had periods of time the user was acting
  • 7. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018 7 according to the behavior of other scanned users, either not present in the area (out of the Faculty), or either present but with inactive BLE protocol on his device. 5. CONCLUSIONS This paper proposes an innovative solution for broadcasting information using BLE beacons. Field experiment shows how the system behavesto discover users and to broadcastthe information to them. However, to correctly receive the information, a userhas to install the app that can process a beacon signal. The results gave a closer look into system performance while users interact with the system. The developed system is flexible and can be incorporated easily into already built infrastructure, not ruining its scalability. The proposed system also presents an inexpensive alternative to the Cisco CMX solution, previously mentioned in the related work section. Currently, the solution can offer a user profile categorization by applying a predefined user interest taxonomy to the system and in that way using fewer devices to advertise different data to users found in beacon proximity. That is to say, a single beacon device in our solution can operate in a mode where it associates with different advertisements and in the same moment can broadcast multiple information to nearby smart devices. Categorization process demands to predetermine the users in the ibeacon database by creating separate profiles for specific user. However, even if we do so, we have to assign them to the discovered users. That way, the system can identify them the next time they enter the beaconing area. This process asks for applying different methods for identifying users and predefining their profiles. We are currently working on a method where we try to categorize the users by analysing their movements along the building area and learning their behaviour. This way, we want to combine the dynamic broadcasting solution with the user and space analytics. This approach enables to obtain users’ movement around a specific area and, consequently, it might support discovering patterns of users’ behaviour. Previously mentioned motivates as to develop and experiment more in the area of BLE beacon message dissemination. We plan to continue our work on this concept and combine our broadcasting system with space monitoring where extracting data of discovered users from beacon devices can help us to understand the surrounding behaviour, and to improve the efficiency and the logistics in the particular building. Furthermore, this approach has some numerous cases where it can be applied, such as social network, where people can search for other people around them and get some extra knowledge about the others. Also, by accessing the real-time statistic, beacons can be used to recognize different hotspots and send alerts to whom it may concern about locations that are overcrowded and a subject to security flaws. ACKNOWLEDGEMENT This work is funded by: the EU Regional Development Fund, and the Galician Government under agreement for funding the (AtlantTIC); the Spanish Ministry of Economy and Competitiveness (TEC2014-54335-C4-3-R); and the EU Commission under the Erasmus Mundus Green-Tech-WB project (551984-EM-1-2014-1-ES-ERA MUNDUS-EMA21).Thanks to the Communications Department of the ATIC (UVIGO) for its collaboration in the pilot deployment REFERENCES [1] A. Zanella, N. Bui, A. Castellani, L. Vangelista, and M. Zorzi, “Internet of Things for Smart Cities,” IEEE Internet Things J., vol. 1, no. 1, pp. 22–32, Feb. 2014.
  • 8. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018 [2] “Bluetooth Low Energy for Use with MEM Sensors by Clinton Francis Hughes Available: https://pdfsecret.com/download/bluetooth clinton-francis-hughes-a-thesis- 2017]. [3] “Estimote.” [Online]. Available: http://estimote.com/. [Accessed: 28 [4] “Kontakt.io Blog,” Kontakt.io. [Online]. Available: https://kontakt.io/blog/. [Accessed: 28 [5] Shahriar, Shaffat, “Location based content delivery solution using iBeacon,” Umeå University, Faculty of Science and Technology, Department of Computing Science. [6] Chieh-Ming Chang, Li Szu-Chuang, and Huang Yennun, “Crowdsensing traces visualization in bluetooth beacon-based sensor network using wearable device,” Proceeding SA 16 SIGGRAPH ASIA 2016 Posters Artic. No 5. [7] “Cisco Mobility Express - https://www.cisco.com/c/en/us/solutions/enterprise [Accessed: 28-Nov-2017]. [8] S.Trifunovic, B. Distl, D. Schatzmann, and F. Legendre, “WiFi Networking,” in Proceedings of the 6th ACM Workshop on Challenged Networks, New York, NY, USA, 2011, pp. 37–42. [9] D. J. Dubois, Y. Bando, K. Watanabe, and H. Holtzman, “Lightweight Self of Opportunistic Infrastructure- Self-Adaptive and Self-Organizing Sy [10] N. Newman, “Apple iBeacon technology briefing,” J. Direct Data Digit. Mark. Pract., vol. 15, no. 3, pp. 222–225, Jan. 2014. [11] “Google Eddystone vs. Apple iBeacon: Big Clash Between Tiny Bluetooth Beacons Tech Times.” [Online]. Available: http://www.techtimes.com/articles/68932/20150715/google eddystone-vs-apple-ibeacon-big [12] E. Upton and G. Halfacree, Raspberry Pi User Guide. John [13] M. Shacklette, “Linux Operating System,” in Handbook of Computer Networks, H. B. Editor Ed. John Wiley & Sons, Inc., 2007, pp. 78 Authors Miran Borić Erasmus Mundus Green-Tech-WB Ph.D. student since September 2015 at University of Vigo (Spain). I obtained the diploma in “Multisensor Intrusion Detection System” from the Faculty of Informational Technologies, University of “Džemal Bijedić” Mostar, Bosnia & Herzegovina. I have previous work experience as a Network specialist and System administrator at UniCredit Group Bank Mostar and Faculty of Informati Mostar. I am also an active Cisco Certified Network Academy instructor at Cisco Local Academy Mostar since 2010. My area of interest includes Smart network technologies, Internet of Things, Bluetooth Technologies, Switching networks, Rout and Quality of Service in computers networks. Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018 “Bluetooth Low Energy for Use with MEM Sensors by Clinton Francis Hughes A Thesis.” [Online]. https://pdfsecret.com/download/bluetooth-low-energy-for-use-with-mem-sensors -presented-in-_59f70296d64ab20a751134a4_pdf. [Accessed: 28 “Estimote.” [Online]. Available: http://estimote.com/. [Accessed: 28-Nov-2017]. “Kontakt.io Blog,” Kontakt.io. [Online]. Available: https://kontakt.io/blog/. [Accessed: 28 “Location based content delivery solution using iBeacon,” Umeå University, Faculty of Science and Technology, Department of Computing Science. Chuang, and Huang Yennun, “Crowdsensing traces visualization in sed sensor network using wearable device,” Proceeding SA 16 SIGGRAPH ASIA Cisco Mobility Express Solution,” Cisco. [Online]. Available: https://www.cisco.com/c/en/us/solutions/enterprise-networks/mobility-express/mobility- Trifunovic, B. Distl, D. Schatzmann, and F. Legendre, “WiFi-Opp: Ad-hoc-less Opportunistic Networking,” in Proceedings of the 6th ACM Workshop on Challenged Networks, New York, NY, D. J. Dubois, Y. Bando, K. Watanabe, and H. Holtzman, “Lightweight Self-organizing Reconfiguration -mode WiFi Networks,” in 2013 IEEE 7th International Conference on Organizing Systems, 2013, pp. 247–256. N. Newman, “Apple iBeacon technology briefing,” J. Direct Data Digit. Mark. Pract., vol. 15, no. 3, “Google Eddystone vs. Apple iBeacon: Big Clash Between Tiny Bluetooth Beacons : Business Tec Tech Times.” [Online]. Available: http://www.techtimes.com/articles/68932/20150715/google big-clash-between-tiny-bluetooth-beacons.htm. [Accessed: 28 E. Upton and G. Halfacree, Raspberry Pi User Guide. John Wiley & Sons, 2014. M. Shacklette, “Linux Operating System,” in Handbook of Computer Networks, H. B. Editor Ed. John Wiley & Sons, Inc., 2007, pp. 78–90. WB Ph.D. student since September 2015 at University of Vigo (Spain). I obtained the diploma in “Multisensor Intrusion on System” from the Faculty of Informational Technologies, ć” Mostar, Bosnia & Herzegovina. I have previous work experience as a Network specialist and System administrator at UniCredit Group Bank Mostar and Faculty of Informational Technologies Mostar. I am also an active Cisco Certified Network Academy instructor at Cisco Local Academy Mostar since 2010. My area of interest includes Smart network technologies, Internet of Things, Bluetooth Technologies, Switching networks, Rout and Quality of Service in computers networks. Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018 8 A Thesis.” [Online]. sensors-by- pdf. [Accessed: 28-Nov- “Kontakt.io Blog,” Kontakt.io. [Online]. Available: https://kontakt.io/blog/. [Accessed: 28-Nov-2017]. “Location based content delivery solution using iBeacon,” Umeå University, Faculty Chuang, and Huang Yennun, “Crowdsensing traces visualization in sed sensor network using wearable device,” Proceeding SA 16 SIGGRAPH ASIA Cisco Mobility Express Solution,” Cisco. [Online]. Available: solution.html. less Opportunistic Networking,” in Proceedings of the 6th ACM Workshop on Challenged Networks, New York, NY, organizing Reconfiguration mode WiFi Networks,” in 2013 IEEE 7th International Conference on N. Newman, “Apple iBeacon technology briefing,” J. Direct Data Digit. Mark. Pract., vol. 15, no. 3,  : Business Tech : Tech Times.” [Online]. Available: http://www.techtimes.com/articles/68932/20150715/google- beacons.htm. [Accessed: 28-Nov-2017]. M. Shacklette, “Linux Operating System,” in Handbook of Computer Networks, H. B. Editor-in-Chief, network technologies, Internet of Things, Bluetooth Technologies, Switching networks, Routing protocols
  • 9. International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.9, No.1, February 2018 9 Ana Fernández Vilas I am Associate Professor at the Department of Telematics Engineering of the University of Vigo and researcher in the Information & Computing Laboratory (AtlantTIC Research Center). I received my PhD in Computer Science from the University of Vigo in 2002. My research activity at I&C lab focuses on Semantic-Social Intelligence & data mining. I look for applying both to Ubiquitous Computing and Sensor Web; urban planning & learning analytics. Also, I am involved in several mobility & cooperation projects with North African countries & Western Balkans Rebeca P. Díaz Redondo Rebeca P. Díaz Redondo is an Associate Professor at the Department of Telematics Engineering of the University of Vigo and researcher in the Information & Computing Laboratory (AtlantTIC Research Center). She received her PhD in Telecommunications Engineering from the same university. She currently works on applying social mining and data analysis techniques to characterize the behavior of users and communities to design solutions in learning, smart cities and business areas. She is currently involved in the scientific and technical activities of several national and European research & educative projects. Besides, she is involved in several mobility & cooperation projects with North African countries & Western Balkans.