1 / 29

Loc -Blue: Location Verification Using Bluetooth Low Energy A DISSERTATION Proposal

Loc -Blue: Location Verification Using Bluetooth Low Energy A DISSERTATION Proposal. By Ehab ashary University of Colorado at Colorado Springs Spring 2017. outline. - Introduction - Background : Bluetooth - Proposed Work - TimeLine. Indoor Positioning System (IPS). What is IPS?

tennille
Download Presentation

Loc -Blue: Location Verification Using Bluetooth Low Energy A DISSERTATION Proposal

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Loc-Blue: Location Verification Using Bluetooth Low EnergyA DISSERTATION Proposal By Ehabashary University of Colorado at Colorado Springs Spring 2017

  2. outline - Introduction - Background: Bluetooth - Proposed Work - TimeLine

  3. Indoor Positioning System (IPS) • What is IPS? Is a navigation system, which is made of network devices to locate objects or people inside indoor environment (S.Ingram, 2006). • Uses of IPS? • Location based authentication. • E911 • Navigation inside buildings • Special offers alerts • Gaming Loc-Blue / E. Ashary

  4. Indoor Positioning System technologies • WIFI • Bluetooth • Infrared • Radio Frequency Identification • Ultrasound • Ultra Wideband • Camera Loc-Blue / E. Ashary

  5. Where are you? Representation of location information: • Physical • Geographic coordinates (38°53'36.7"N, 104°48'04.4"W) • Symbolic • In the coffee shop, in the second floor or at home • Absolute • A shared reference grid is used to allocate an object • Relative • The proximity to known reference points Loc-Blue / E. Ashary

  6. Positioning Techniques • Triangulation • Lateration: Measure distance between device and reference points (Chai et al, 2016) • Angulation: Angle of the signals between device and reference points • Fingerprinting (Faragher and Harle, 2015) • Offline training phase • Online position determination phase • Proximity (Lin et al, 2015) • The location of an object when it nears a known location Loc-Blue / E. Ashary

  7. Bluetooth Low Energy • Bluetooth operates in the 2.4GHZ ISM band that extends from 2402MHz to 2480MHz. • Bluetooth Classic v2.0/2.1 • Bluetooth Smart / Bluetooth Low Energy (BLE) v4.0/4.1/4.2 in 2010 • BLE Vs Classic • Power consumption: 0.01 to 0.5W Vs 1 W • Lower cost : BLE chips are 60 to 80% cheaper than Bluetooth classic chips • Faster connection: in BLE devices can connect in 3ms, Bluetooth Classic needs more than 100 ms Loc-Blue / E. Ashary

  8. Why Bluetooth Low Energy? • BLE could provide more accurate localization than WiFi with lower power consumption and cost (Zhao et al, 2014). • It is a new technology and there is potential growth in adopting BLE for indoor positioning system. by 2019 BLE beacon will create a 60 million unit market (Gallen. 2014). • Localization through BLE is available on all platforms that support BLE, while other technologies like WiFi, localization information may be blocked in order to protect the user privacy. Loc-Blue / E. Ashary

  9. Bluetooth Low Energy Beacon • Beacons are devices consist of microcontroller and BLE radio chips that use BLE in order to broadcast stored data at regular time intervals. • Usually operate on coin-cell batteries, however, AA batteries or external power supply can be used. • Features that impact the battery life: • Transmitting Power (TX power)/Broadcasting Power: • The power that a beacon broadcasts a signal and given in dBm • Typically ranges between -40 dBm and +10dBm • Advertising Interval: • The rate that a beacon broadcast a signal • Typically ranges between 100ms to 2000 ms Loc-Blue / E. Ashary

  10. Bluetooth Low Energy Beacon • A BLE beacon is transmit-only device, completely unaware of any mobile device that around it. • BLE beacons typically do not have WiFi and other network interfaces. • BLE beacons use received signal strength for distance calculation. • BLE beacons do not store users data. Loc-Blue / E. Ashary

  11. How does BLE beacons work? • BLE beacons periodically transmitting an advertisement packet that contains the pre-calibrated signal strength one meter away from it and numerical identifiers. • When an eligible mobile app enters the beacon’s signal coverage, corresponding actions can be triggered. Loc-Blue / E. Ashary

  12. Bluetooth Low Energy Protocols Two of the BLE dominate protocols: • iBeacon • Apple announced iBeacon in December 2013 • One advertisement packet contains, iBeacon ID and transmission power (TX) • Eddystone • Google announced Eddystone protocol in July 2015 • Eddystone-UID: identify a particular beacon • Eddystone-URL: broadcast up to 17 bytes size URL • Eddystone-TLM (Telemetry): broadcast telemetry data includes the battery voltage, temperature, advertising packet counter, and beacon uptime. Loc-Blue / E. Ashary

  13. Research goals • Investigate how Bluetooth Low Energy and beacon technologies can compute more precise locations, in room accuracy, for the indoor positioning. • Design and develop a location verification service based on BLE to prevent a user from claiming a false location in order to receive enhanced location services, or gaining access to a network or resource that it could not otherwise obtained. • Develop a detection system against physical attacks on the system, including stealing, tampering and replacing of Bluetooth Low Energy beacons. • Lay the foundation for others to enhance the security and accuracy of the BLE based localization and develop the related security and privacy-preserving applications. Loc-Blue / E. Ashary

  14. Task #1: Using BLE for Indoor Positioning • Goals: • Accuracy study on indoor positing with the BLE technology. • Design and develop a localization system based on BLE. • Methodology: • BLE beacon signal coverage region will be used to represent a location. • A user is in a location if (S)he is within that region. Loc-Blue / E. Ashary

  15. Task #1: Using BLE for Indoor Positioning • Challenges: • Indoor environments: building geometry and the presence of various obstacles could lead to multi-path and delay problems. non-line-of-sight (NLOS)could cause inconsistent time delays at the receiver • How many beacons are needed to cover a specific area and how precise in terms of error margin the system can defined and detect? • There will also be an increase in signal fluctuation with the increase in the transmitting power to achieve long range (Dong and Dargie, 2012). Therefore, we need to find out the experimental accuracy and effective range of BLE beacon unit. • How far or close we can get to the region boundary and we still consider outside the region for different configured transmitting power. Loc-Blue / E. Ashary

  16. Task #1: BLE for Indoor Positioning SystemArchitecture Loc-Blue / E. Ashary

  17. Task #1: Using BLE for Indoor Positioning • Design tool for specifying the region of interest. • Investigate the resolution or precision we can achieve given the BLE technology. • Find the relation between the transmitting power and effective distance. • Investigate the effect of the beacon locations on accuracy for the indoor positioning and the region boundary detection. • Investigate the effect of the user’s body. • Investigate the effect of the user’s orientation. Loc-Blue / E. Ashary

  18. Task #1: Using BLE for Indoor Positioning • Investigate the Interference from multiple beacons. • Document the process and findings. • Find the smoothing filter to be used for collected RSSI values. • Determine the minimum beacons required to represent a region • Develop a mobile application that implement the localization techniques/algorithms and evaluate its accuracy, precision and processing time. Loc-Blue / E. Ashary

  19. Task #2: Using BLE for Location Verification • What is location verification? Two type of devices: • untrusted device, prover • a trusted device,verifier • The location verification has three steps • getting the location claim from a prover • collection distance information measurement between the verifier and the prover • verifying the location : in region or single point. Loc-Blue / E. Ashary

  20. Task #2: Using BLE for Location Verification: Goal • Goal: • Delver an algorithm that uses BLE for location verification. • Preliminary work: • Our original approach was to use both absolute positioning approach and WiFi technology for positioning and location verification • Our testbed located on EAS building with two floors • There is 5.90 dBm average difference between the collected RSSI • Aruba system has accuracy about five meters , 2 minutes to update the user location due to the Aruba system limitatio. Loc-Blue / E. Ashary

  21. Task #2: Using BLE for Location Verification : Methodology • Methodology: • This proposal adopts in-region verification not in single verification (Vora and Nesterenko, 2006). • The prover claims to be in a particular region, which could be a room, a building, or other physical area, and the verifier accepts or rejects the claim. Loc-Blue / E. Ashary

  22. Task #2: Using BLE for Location Verification : distance Loc-Blue / E. Ashary

  23. Task #2: Using BLE for Location Verification: Architecture Loc-Blue / E. Ashary

  24. Task #2: Using BLE for Location Verification: SUBTASKS • Determine the minimum number of verifiers required and locations, given a room configuration. • Develop the needed algorithm to validate if a prover is within the claimed interested region. • Test the proposed algorithm and calculate its accuracy, precision and time. • Identify the components of a threat model in order to expand the areas of development and research. Loc-Blue / E. Ashary

  25. Task #3: Detect Physical Attacks Against BLE Beacons: GOALS Provide a set of algorithms and techniques that could be used to detect physical attacks against the used beacons. (Liu et al, 2016) • Broken attack • Moving attack • Switch attack • Duplicate attack Loc-Blue / E. Ashary

  26. Task #3: Detect Physical Attacks Against BLE Beacons: METHODOLOGY • Use of fixed trustworthy BLE enabled devices that could be used for collecting the beacons profiles and RSS values and save it for comparison . • Periodically collect the profile data and compare against the saved data. • Subtasks: • Investigate the effect of moving beacons on the collected RSSI value. • Develop the needed algorithm to monitor the beacons movements in order to detect physical attacks against BLE beacon. • Test the proposed algorithm and calculate its accuracy, precision, time, and the false positive rate. Loc-Blue / E. Ashary

  27. Task #4: develop the integrated system Loc-Blue / E. Ashary

  28. SCHEDULE

  29. Thank You!Q&A

More Related