Está en la página 1de 52

CHAPTER -

INTRODUCTIO
N

1.1 I BEACON
As the name says Beacon, they transmit packets of data in regular intervals of time,
and this data can be picked up by devices like smart phones or tablets. These are tiny low-cost
hardware which are small enough to attach to any surface be it a wall, door or any indoor area,
they use battery friendly, low-energy Bluetooth connections to transmit their messages. I
Beacon, a micro-location technology was released by Apple while the iOS7 was launched in
Sept 2013. By iBeacon, people are able to interact digitally with their physical environments, a
shop, a museum ect. Beacon is a kind of short- range, low power, low cost and tiny transmitters
that can push information or notification to the smart mobile devices within 100 meters. Its a
small device which uses Bluetooth Low Energy (BLE), an open standard makes it available to
enable short-range wireless communication by a fraction of the power of the standard Bluetooth.
This small device is low cost (from $5to $30) with low energy.
Apple announced iBeacon technology to help smartphones identify their position and location in
indoor spaces. The technology is based on the standard Bluetooth Low Energy (BLE) protocol,
and is supported on all major smartphones including both Android and iPhone.

iBeacon refers to tiny battery powered devices which emit Bluetooth LE signals. The iBeacons,
or just beacons, transmit a unique signal multiple times every second which can be received by
phones within a few meter radius. Phones can accurately position themselves by receiving
signals from all nearby beacons. The mechanism is very similar to how ships used to use
lighthouses the lighthouse would emit light which was picked up by passing by ships.

Unlike GPS, beacons can be used for accurate positioning indoors. Numerous applications have
emerged including indoor navigation, location based marketing, location based customer
service, clienteling, and personalized assistance. Since the beacons use standard Bluetooth LE, it
is supported well on both Android and iOS.

1
As the name suggests, the Low Energy variant of Bluetooth is extremely power efficient. In our
previous report, we examined the impact of beacons on both iPhone and Android. Under real-
life scenarios,a phones battery drain should be less than 1% because of nearby beacons. In this
report, we examine battery life of beacons themselves.

Beacons have been gaining popularity recently. Numerous beacons exist in the market. The
majority of them are powered by battery. In this report we present the first comprehensive
comparison of various beacon hardware available in the market. Beacons come in all form and
shapes, with diverse chipsets, battery sizes and firmware. We have stress tested beacons from 26
different vendors over past nine months, examining every aspect of them under different
conditions. In our previous report, we compared the impact on the phone battery (link), in this
report we compare the beacons themselves across different parameters.

Battery consumption behavior of beacons is very important, especially when deploying them in
a large enterprise setting. With thousands of beacons in field, monitoring for their battery levels
and replacing them as battery drains can be a significant undertaking. It is therefore desirable to
use beacons with longer battery life.

There are two main modes that a Beacon works, advertising and connecting. iBeacon uses the
former. Advertising is a one-way discovery mechanism. By advertising, Beacons will transmit
packets of data in different intervals from 20ms to 10 seconds in order to let other smart devices
in certain areas.

It has ability to run for one or two years on standard coin-cell batteries. iBeacon technology
works with the Bluetooth Low Energy (BLE) technology, also known as Bluetooth Smart.
Beacon is a small device use only the advertisement channel, and transmit data packets in a
regular intervals (several seconds for example), then, the data broadcasted by Beacons can be
received by devices, take smart phones for example. When the smart devices (with iOS 7 or 8)
picked up the data sent by iBeacon, the application installed in devices will make some certain
responses.

That is to say, iBeacons broadcast data by using BLE standard. The signals (data) will
trigger some APP functionalities to perform some specific actions on a certain Smart device at
2
exactly a specific time or location.Beacons are pretty platform independent. Earlier Apple did
come out with IBeacon protocol. You can have various different layouts from different
manufacturers.

The IBeacon is proprietary to Apple, but that doesnt mean that Android devices and
other devices cannot see those beacons. Were heading towards other types of packet layouts
being available like AltBeacon and Eddystone. In a nutshell beacons and beacons are not really
just for Apple devices;

you can use them across any platform, which make them really significant. There is
something called received signal strength which is the line of sight from the devices Bluetooth
antenna to the beacon. The disadvantage in iOS, is that it only works in the foreground. We
cannot do ranging and distances when the app is in the background. So, when the screen is off it
very difficult to determine location.

Even when the screen is on, it can be a bit unreliable. There will be a jitter that it will
think youre immediate, far, within short range, and it moves around. Hence it shouldnt be used
for accurate targeting. But this can be achieved using multiple beacons. Consider beacons over
your location, adjust the antenna power of each beacon to suit individual use case.

You can tune the Transmission Power of your beacons at different ranges. When you get
an entry for a particular beacon, thats when you deliver the push notification or thats when you
take that event in and produce the action.

By this way approximate distance can be found discover them easily. Of course, the
shorter the intervals, the faster the Beacon can be found, and the higher the energy consumption
is, the battery life is shorter correspondingly. By this way approximate distance can be found
discover them easily. Of course, the shorter the intervals, the faster the Beacon can be found, and
the higher the energy consumption is, the battery life is shorter correspondingly. You can tune
the Transmission Power of your beacons at different ranges. When you get an entry for a
particular beacon, thats when you deliver the push notification or thats when you take that
event in and produce the action.

3
Fig: 1.1Working process of I Beacon technology

1.1.1 FEATURES OF I BEACON


IBeacon is a new technology that complements the location-based services within your
iOS and Android smartphone. It will send alerts to your device and push content based on your
proximity to a Bluetooth beacon. iBeacon are devices working with BLE Bluetooth Light
Energy also known as Bluetooth 4.0. iBeacon was coined by Apple but is not a piece of
hardware. In fact, iBeacon is what Apple calls their BLE technology that is installed in every
device with iOS 7.0 and up. Apples mobile devices, including the iPad, can become an

iBeacon. . It will send alerts to your device and push content based on your proximity to a
Bluetooth beacon. iBeacon are devices working with BLE Bluetooth Light Energy also
known as Bluetooth 4.0. iBeacon was coined by Apple but is not a piece of hardware.

In-store retail and offline payments are in the first wave of beacon
applications. Retail outlets are adopting beacons to provide customers with product
information, flash sales or deals, and to speed up the checkout process with a completely
contactless payments system.

4
Consumers seem receptive to beacons as a way to enhance their in-store shopping
experience. Half of American adults already utilize their mobile devices in stores.
Consumers could also use them to inexpensively automate their homes. For example,
beacons could turn on lights in a room as soon as someone with a smartphone has
entered them, or open doors or window shades.

The applications go beyond retail: We expect beacons to be deployed all over airports
and ground transit hubs so that notifications on departures, delays, and gate and platform
assignments can be delivered instantly to passenger phones.

1.1.2 DEFINING IBEACONS

I BEACON (an Apple Trademark) is a new location-based technology built inside the
Apple iOS. However, the latest Android phones with BLE capability can also utilize iBeacon
application. This mobile advancement works with Bluetooth Low Energy (BLE): an updated
version of Bluetooth also known as Bluetooth 4.0. An iBeacon is a device that sends out a signal
via BLE. It can be either a mobile device or a standalone device with a BLE chip and power
source.

The BLE provides information to the receiving BLE device (i.e. an app installed on a users
smartphone) based on location of the signaling BLE device. In order to receive a notification,
the users smartphone needs to have Bluetooth enabled. Once the smartphone receives the signal
from the BLE device, it can then prompt the user to receive or gather data from a corresponding
cloud-based server.

Many companies are building a BLE-powered device, often called an iBeacon. iBeacons can be
presented as USB drives, coin-cell powered devices, or software installed on a mobile device,
but the full system consists of a signaling iBeacon device, an app on the smartphone, and a
cloud-based server for storing data. All three components work hand-in-hand to provide a first-
class experience to the end user in an indoor, closed environment.

1.1.3 BLE PACKET FORMAT

The data packets in no more than 47 bytes in length and composed of 4 parts

5
Packets sent by a Beacon consist of 4 parts:

1) Preamble All Link Layer packets have one byte preamble.

The preamble is used in the receiver to perform frequency synchronization, symbol


timing estimation, and Automatic Gain Control (AGC) training.

2) Access address

The Access Address for all advertising channel packets shall be 0x8E89BED6. For data
channels, it is different for each Link Layer connection between two Devices

3) Advertising channel PDU has four types:

a) ADV_IND: connectable undirected advertising event


b) ADV_DIRECT_IND: connectable directed advertising event
c) ADV_NONCONN_IND: non-connectable undirected advertising event
d) ADV_SCAN_IND: scannable undirected advertising event

4) CRC error detection

The BLE provides information to the receiving BLE device (i.e. an app installed on a users
smartphone) based on location of the signaling BLE device. In order to receive a notification,
the users smartphone needs to have Bluetooth enabled. Once the smartphone receives the signal

6
from the BLE device, it can then prompt the user to receive or gather data from a corresponding
cloud-based server.

Many companies are building a BLE-powered device, often called an iBeacon. iBeacons can be
presented as USB drives, coin-cell powered devices, or software installed on a mobile device,
but the full system consists of a signaling iBeacon device, an app on the smartphone, and a
cloud-based server for storing data. All three components work hand-in-hand to provide a first-
class experience to the end user in an indoor, closed environment.

To state the obvious: Modern, smartphone-toting humans spend most of their time indoors. But
indoor spaces often block cell signals and also make it nearly impossible to locate devices via
GPS. Beacons are a solution.

Beacons are a low-cost piece of hardware - small enough to attach to a wall or countertop- that
utilize battery-friendly Bluetooth connections to transmit messages or prompts directly to a
smartphone or tablet. They are poised to transform how retailers, event organizers, transit
systems, enterprises, and educational institutions communicate with people indoors. Consumers
might even want to deploy them as part of home automation systems.

In a new report from BI Intelligence, we explain what beacons are, how they work, and how
Apple - with its iBeacon implementation - is championing this new paradigm for indoor mobile
communication. We also take a look at the barriers in the way of widespread adoption.

Here are some of our findings:

In-store retail and offline payments are in the first wave of beacon applications.
Retail outlets are adopting beacons to provide customers with product information, flash
sales or deals, and to speed up the checkout process with a completely contactless
payments system.

Consumers seem receptive to beacons as a way to enhance their in-store shopping


experience. Half of American adults already utilize their mobile devices in stores.

7
But there's a barrier to wide adoption of beacon technology: several layers of
permissions. Customers have to turn on Bluetooth, accept location services on the
relevant app and opt-in to receive in-store or indoor notifications.

People are confused about Apple iBeacon because it has yet to take a true physical
form. Apple hasn't manufactured a physical beacon. Instead, Apple's iBeacon is built
into its devices and iOS7 mobile operating system. Already, 200 million iOS devices can
already serve as transmitters and receivers. But third-party manufacturers have built
beacons that can send iBeacon messages to Apple devices.

The beacon wars are heating up. PayPal and Qualcomm are gearing up to challenge
Apple with beacon hardware of their own. Smaller vendors like Estimote, Swirl, and
GPShopper are entering the mix with beacon management and consulting on top of
hardware or software platforms.

The applications go beyond retail: We expect beacons to be deployed all over airports
and ground transit hubs so that notifications on departures, delays, and gate and platform
assignments can be delivered instantly to passenger phones.

The report has charts and data that can be easily downloaded and put to use.

In full, the report:

Makes the case that beacons will take off once a handful of major retailers roll them out.

Includes the points-of-view of executives at several start-up beacon-focused firms.

Dives into the data on consumer attitudes toward location-based notifications, and
whether beacon-powered alerts will be welcomed or resisted.

Lists many of the possible applications for beacons, and how some large retailers and
organizations have already tried them.

Explains why beacons powered by Bluetooth low energy is much more effective than
Wi-Fi or GPS for powering notifications indoors.

Breaks down Apple's innovative strategy of making all of its devices potential receivers
and transmitters in any implementation.
8
1.2 ATMEL AVR

The AVR is a modified Harvard architecture8-bitRISC single chip microcontroller


which was developed by Atmel in 1996. The AVR was one of the first microcontroller
families to use on-chip flash memory for program storage, as opposed to one-time
programmable ROM, EPROM, or EEPROM used by other microcontrollers at the time.

1.2.1 DEVICE OVERVIEW

The AVR is a modified Harvard architecture machine where program and data are
stored in separate physical memory systems that appear in different

Address spaces, but having the ability to read data items from program memory using
special instructions.

1.2.2 BASIC FAMILIES

AVRs are generally classified into following:


Tiny AVR the A Tiny series
o 0.516 kb program memory
o 632-pin package
o Limited peripheral set
Mega AVR the AT mega series
o 4512 kb program memory
o 28100-pin package
o Extended instruction set (multiply instructions and instructions for handling
larger program memories)
o Extensive peripheral set
XMEGA the ATxmega series
o 16384 kb program memory
o 4464100-pin package (A4, A3, A1)

9
o Extended performance features, such as DMA, "Event System", and
cryptography support.
o Extensive peripheral set with ADCs
Application-specific AVR

o mega AVRs with special features not found on the other members of the AVR
family, such as LCD controller, USB controller, advanced PWM, CAN, etc.
FPSLIC (AVR with FPGA)
o FPGA 5K to 40K gates
o SRAM for the AVR program code, unlike all other AVRs
o AVR core can run at up to 50 MHz
32-bit AVRs

The AVR is a modified Harvard architecture8-bitRISC single chip microcontroller which was
developed by Atmel in 1996. The AVR was one of the first microcontroller families to use
on-chip flash memory for program storage, as opposed to one-time programmable ROM,
EPROM, or EEPROM used by other microcontrollers at the time.The AVR is a modified
Harvard architecture8-bitRISC single chip microcontroller which was developed by Atmel
in 1996. The AVR was one of the first microcontroller families to use on-chip flash memory
for program storage, as opposed to one-time programmable ROM, EPROM, or EEPROM
used by other microcontrollers at the time.

Many companies are building a BLE-powered device, often called an iBeacon. iBeacons can
be presented as USB drives, coin-cell powered devices, or software installed on a mobile
device, but the full system consists of a signaling iBeacon device, an app on the smartphone,
and a cloud-based server for storing data. All three components work hand-in-hand to provide
a first-class experience to the end user in an indoor, closed environment. The AVR is a
modified Harvard architecture8-bitRISC single chip microcontroller which was developed by
Atmel in 1996. The AVR was one of the first microcontroller families to use on-chip flash
memory for program storage, as opposed to one-time programmable ROM, EPROM, or
EEPROM used by other microcontrollers at the time.

10
ATMEGA16

Fig1.2.1 Pin diagram of ATMEGA 8


SUMMARY

The ATmega8 is an upgrade path for AT90S/LS4433. One of the most interesting
aspects is the small size of the MLF package; being only 5x5mm gives this device a very
high performance in a small package. Adding the fact. That this device can run at 16MHz
really makes this a very interesting device! This device is also available in a 3V version,
ATmega8L

OVERVIEW FEATURES

Flash EEPROM SRAM Speed Volts


8kB 512B 1024B 0 - 16MHz 4.5 - 5.5V

Fig1.3.2 Table of ATMEGA8 features

11
FEATURES
1] High-performance, Low-power AVR 8-bit Microcontroller
2] Advanced RISC Architecture
- 130 Powerful Instructions - Most Single Clock Cycle Execution
- 32 x 8 General Purpose Working Registers
- Up to 6 MIPS Throughput at 16MHz
- Fully Static Operation
- On-chip 2-cycle Multiplier
3] Nonvolatile Program and Data Memories
- 8k Bytes of In-System Self-Programmable Flash
- Optional Boot Code Section with Independent Lock Bits
- 512K Bytes EEPROM
- Programming Lock for Software Security
- 1K Byte Internal SRAM
4] Peripheral Features
-On-chip Analog Comparator

- Programmable Watchdog Timer with Separate On-chip Oscillator


- Master/Slave SPI Serial Interface
- Two 8-bit Timer/Counters with Separate Pre scalar, Compare
- One 16-bit Timer/Counter with Separate Pre scalar, Compare and Capture mode
- Real Time Counter with Separate Oscillator
- Three PWM Channels
- 8-channel ADC in TQFP and MLF package
- 6-channel ADC in PDIP package
- Byte-oriented Two-wire Serial Interface
- Programmable Serial USART
5] Special Microcontroller Features
- Power-on Reset and Programmable Brown-out Detection
- Internal Calibrated RC Oscillator
- External and Internal Interrupt Sources
- Five Sleep Modes: Idle, ADC Noise Reduction, Power-save, Power-down and
Standby
6] I/O and Packages
- 23 Programmable I/O Lines
12
- 28-lead PDIP, 32-lead TQFP, 32-pad MLF
7] Operating Voltages
- 4.5-5.5V for ATmega8
8] Speed Grades
- 0-16 MHz for ATMEGA

9] Power Consumption at 4 MHz, 3V, 35 C


- Active: 3.6mA
- Idle Mode: 10mA
- Power-down Mode: 0.5 A

PIN DESCRIPTION
Pin number Pin Description
1 (RESET) PC6
2 (RXD) PD0
3 (TXD) PD1
4 (INT0) PD2
5 (INT1) PD3
6 (XCK/T0) PD4
7 VCC
8 GND
9 (XTAL1/T0SC1) PB6
10 (XTAL2/TOSC2) PB7
11 (T1) PD5
12 (AIN0) PD6
13 (AIN1) PD7
14 (ICP1) PB0
15 (OCIA) PB1
16 (SS/OC1B) PB2
17 (MOSI/OC2) PB3
13
18 (MISO) PB4
19 (SCK) PB5
20 AVCC
21 AREF
22 GND
23 (ADC0) PC0
24 (ADC1) PC1
25 (ADC2) PC2
26 (ADC3) PC3
27 (ADC4/SDA) PC4
28 (ADC5/SCL) PC5

Fig 1.2 : PIN description of ATmega8

1.3 BLUETOOTHTECHNOLOGY

Bluetooth is a wireless technology standard for exchanging data over short


distances (using short-wavelength UHF radio waves in the ISM band from2.4 to 2.485
GHz) from fixed and mobile devices, and building personal area networks (PANs).

Invented by telecom vendor Ericsson in 1994,[3] it was originally conceived as a wireless


alternative to RS-232 data cables. It can connect several devices, overcoming problems
of synchronization.
Bluetooth devices that are within range of each othera primary 0 dB link
gives 10m range and 20 dB link gives 30m rangecan establish connections on an
ad-hoc basis and can form, disconnect, and re-form without user intervention. Two or
more Bluetooth devices that establish a connection, and share a channel, form a small
wireless network

14
1.3.2 WIRELESS BLUETOOTH RS232 TTL
TRANSCEIVER MODULE

This is the EGBT-046S Bluetooth Modem module that we use in our HT Bluetooth
Module.
These modems work as a serial (RX/TX) connection, and are a great wireless
replacement for serial cables. Any serial stream from 1200 to 115200bps can be passed
seamlessly from your computer to your target. The module has a pin spacing of 1.5mm. This
is a 3.3V device and should not be connected to 5V systems without level conversion.

1.3.3 PRIOR RANGE-FREE LOCALIZATION ALGORITHMS

In this section, prior range-free localization algorithms for mobile WSNs are reviewed.
In subsequent discussion, each anchor node sends a beacon (which carries its location
information) to its one-hop neighbours (called one-hop-beacon-broadcasting) [25] or its one-hop
and two-hop neighbours (called two-hop-beacon broadcasting) or all nodes [18]. Normal node _
collects beacons from anchor nodes to determine its location. We use r to denote the
communication radius of an anchor/normal node, and v max to denote the maximal moving
distance of a normal node during a time slot. Among prior range-free localization algorithms for
mobile WSNs, two-hop-beacon broadcasting [16][19], [21], normal node location exchange
[17], [21], statistical models [21], [25], fuzzy logic [26], and RSS ordering [27] were used to
improve the localization accuracy.
In [16], the Monte Carlo Localization (MCL) algorithm was proposed, where _ is located within
the intersection (called the anchor-constrained region of _ in [21]) of the communication ranges
of _s one-hop neighbouring anchor nodes and ring areas. Each point in a ring area has distance
to a _s two-hop neighbouring anchor node within (r; 2r]. The MCL algorithm randomly
generates a set of points (called valid samples at time slot 0) in the deployment area, and then
performs two phases: prediction and filtering, in each time slot. Consider time slot i with i > 0.
In the prediction phase, a sample at timeslot i (for _) is a point randomly picked from a sample
circle. A sample circle has radius equal to v max and is centred at a valid sample generated at
previous time slot (i 1). The MCL algorithm considers a sample (at time slot i) invalid (valid)
for _, if it is outside (inside) the anchor constrained region of _ (at time slot i). In then filtering
phase, invalid samples (generated at time slot i) for _ are filtered out. The location of _ (at time
slot i) is then estimated as the centroid of all valid samples (at time slot i). For example, v max =
15
1, r = 2, and points at(1, 1), (1, 0), and (0.5, 0.5) are chosen as valid samples at time slot 0 for _.
Then there are three samples at time slot 1, each of which is randomly picked from a sample
circle which has radius = 1 and is centred at one valid sample at time slot 0. Suppose that points
at (1.5, 1.5), (0.5, 0), and (0, 0.5) are chosen as samples at time slot 1. Assume that _ has a one-
hop neighbouring anchor node _ at (0,0) and no two-hop neighbour, i.e., the anchor constrained
region of _ is _s communication range (i.e., the circle which has radius = 2 and is centred at (0,
0)) at time slot 1. Hence, there are two valid samples at time slot 1, i.e., points at (0.5, 0) and (0,
0.5). So, the location of _ at time slot 1 is estimated as (0.25, 0.25). A defect of the MCL
algorithm is that valid samples generated in the prediction phase may be not enough to estimate
the location of _ accurately [19]. Besides, in sparse anchor node environments, MCL has low
localization accuracy. In [19], the Monte Carlo localization Boxed (MCB) algorithm was
proposed. In MCB, one-hop communication ranges (of one-hop neighbouring anchor nodes) and
two-hop communication ranges (of two-hop neighbouring anchor nodes) are simplified as 2r _
2r square areas and 4r _ 4r square areas, respectively. The intersection of these square areas is
referred to as the anchor box. The samples that are generated in the prediction phase are from
the intersection of the anchor box and the sample box (i.e., a box that covers the sample circle
described in the MCL algorithm). Since the anchor box is a bare approximation of the anchor-
constrained region, more valid samples may remain after the filtering phase. However, when the
anchor density is high, the MCB algorithm may generate much more valid samples than
necessary for estimating the location of _ [21].
In the Mobile Static sensor network Localization (MSL_) algorithm [17], _ is required to
exchange location information with its one-hop and two-hop neighbouring normal nodes in
each time slot. The MSL_ algorithm considers a sample invalid (valid) for _, if it is outside
(inside) the intersection of the anchor-constrained region. In the Mobile Static sensor network
Localization (MSL_) algorithm [17], _ is required to exchange location information with its one-
hop and two-hop neighbouring normal nodes in each time slot. The MSL_ algorithm considers
a sample invalid (valid) for _, if it is outside (inside) the intersection of the anchor-constrained
region.
In the Mobile Static sensor network Localization (MSL_) algorithm [17], _ is required to
exchange location information with its one-hop and two-hop neighbouring normal nodes in
each time slot. The MSL_ algorithm considers a sample invalid (valid) for _, if it is outside
(inside) the intersection of the anchor-constrained region.

16
1.3.4 THE PROPOSED RANGE-FREE LOCALIZATION
ALGORITHM
In this paper, we introduce a range-free localization algorithm, Hit Ball, for mobile
sensor networks. Throughout this paper, mobile sensor networks are assumed to have mobile
normal nodes and mobile anchor nodes. Each anchor node is assumed to broadcast a beacon that
carries its location information to its one-hop neighbouring normal nodes per slot (i.e., one-hop-
beacon broadcasting).Each normal node _ can determine the possible region (of its location) by
the aid of collected beacons. A possible region of _s location is a region which covers _s
location. Clearly, a smaller possible region implies higher localization accuracy. A beacon is
called a current beacon if it is delivered in the current time slot, and a historical beacon
otherwise (i.e., prior to the current time slot). Associated with each current beacon, there is a
one-hop anchor- constrained region, which is the communication range of the anchor node when
it sent out the beacon. Besides, associated with each historical beacon, there is a historical-
anchor-constrained region, which is a circle centred at the anchor node that sent out the beacon.
If the historical beacon was delivered t time slots ago, then the circle has a radius of r +v max_t,
where r is the communication radius of an anchor node and v max is the maximum moving
distance of a normal node during a time slot. The Hit Ball algorithm and MCL-based range-free
localization algorithms determine the possible region of _s location by finding the intersection
of all one-hop-anchor-constrained regions of _ with others constrained regions (e.g., historical
anchor- constrained regions and ring areas centred at two-hop neighbouring anchor nodes of _
[16], [19]). In these algorithms, more constrained regions can determine a smaller possible
region of _s location and hence improve the localization accuracy. In this paper, we introduce
three RSS-constrained regions (explained later) for _. Our possible region of _s location is the
intersection of one-hop-anchor-constrained regions, historical anchor- constrained regions, and
the proposed three RSS constrained regions.

1.3.5 THE HIT BALL ALGORITHM


For ease of discussion, we have the following definitions. Let bt;i denote a beacon which
is received by normal node _ in time slot t from an anchor node _i. If _ receives beacons b1;1,
b1;2, b2;2, and b2;3 in the first two time slots, then there are two historical beacons (i.e., b1;1
and b1;2) with respect to time slot 2, and four historical beacons with respect to time slot 3. For
a node p, let Lt(p) be the location of node p in time slot t. For a beacon bt;i, let Lt(bt;i) be the
location of the anchor node _i when it sent out bt;i, and let Lj(bt;i) = null if j 6= t. Our algorithm
is a refinement of MCL and consists of three phases, sample generating phase, sample filtering
17
phase, and location estimation phase. In the sample generating phase, _ determines samples
from the intersection of all one-hop-anchor-constrained regions and historical-anchor-
constrained regions. However, the intersection mentioned above is difficult to calculate for
resource-limited normal nodes [21]. Thus, in our algorithm, each one hop-anchor-constrained
region Xc (or historical-anchor-constrained region Xh) is replaced with a minimum square Sc
(or Sh) which can cover Xc (or Xh). In the sample filtering phase, normal node _ filters out
invalid samples by the aid of the proposed RSS constrained regions (see Section 3.2). In the
location estimation phase, _ estimates Lk(_) to be the centroid of all valid samples .

1.3.4 POSITIONING BASED ON BEACONS

Most global positioning techniques rely on beacons, whose


locations are known, and perform positioning by triangulation or
trilateration. In the context of positioning, a beacon is a discernible
object in the environment, which may be natural or artificial, passive
or active; our system, which is known as BeAMS, uses active beacons,
and its principle is illustrated in Triangulation is the process of
determining the location of a point by measuring angles from that
point to known locations (beacons) (see Fig. 2). This contrasts with the
trilateration technique which measures distances from the point to
known locations. Because of its robustness, accuracy, and flexibility,
triangulation with active beacons is widely used for robots [38].
Another advantage of triangulation versus trilateration is that the
robot can compute its orientation (heading), in addition to its location
[15], [17], [34], which can be as important as the robot position for
most applications. The description of an algorithm that uses angle
measurements to compute a position or to navigate can be found in
many papers, but is not our focus. Triangulation methods using three
angle measurements can be found in [10], [14], [15], [17], [27], and
[34], and methods using more than three angle measurement In the
context of positioning, a beacon is a discernible object in the
environment, which may be natural or artificial, passive or active; our

18
system, which is known as BeAMS, uses active beacons, and its
principle is illustrated in Triangulation is the process of determining the
location of a point by measuring angles from that point to known
locations (beacons) (see Fig. 2). This contrasts with the trilateration
technique which measures distances from the point to known
locations. In the context of positioning, a beacon is a discernible object
in the environment, which may be natural or artificial, passive or
active; our system, which is known as BeAMS, uses active beacons,
and its principle is illustrated in Triangulation is the process of
determining the location of a point by measuring angles from that
point to known locations (beacons) (see Fig. 2). This contrasts with the
trilateration technique which measures distances from the point to
known locations.

EMBEDDED SYSTEM

An embedded system is a computer system with a dedicated function within a larger


mechanical or electrical system, often with real-time computing constraints. It is embedded as
part of a complete device often including hardware and mechanical parts. By contrast, a
general-purpose computer, such as a personal computer (PC), is designed to be flexible and to
meet a wide range of end-user needs. Embedded systems control many devices in common
use today.

Modern embedded systems are often based on microcontrollers (i.e. CPUs with integrated
memory and/or peripheral interfaces) but ordinary microprocessors (using external chips for
memory and peripheral interface circuits) are also still common, especially in more complex
systems. In either case, the processor(s) used may be types ranging from rather general
purpose to very specialized in certain class of computations, or even custom designed for
the application at hand. A common standard class of dedicated processors is the digital signal
processor (DSP).

The key characteristic, however, is being dedicated to handle a particular task. Since the
embedded system is dedicated to specific tasks, design engineers can optimize it to reduce the
19
size and cost of the product and increase the reliability and performance. Some embedded
systems are mass-produced, benefiting from economies of scale.

Physically, embedded systems range from portable devices such as digital watches and MP3
players, to large stationary installations like traffic lights, factory controllers, and largely
complex systems like hybrid vehicles, MRI etc.

Variety of Embedded Systems

Embedded systems are commonly found in consumer, cooking, industrial, automotive,


medical, commercial and military applications. Telecommunications systems employ
numerous embedded systems from telephone switches for the network to cell phones at the
end-user. Computer networking uses dedicated routers and network bridges to route data.

Consumer electronics include personal digital assistance, mp3 players, mobile phones,
videogame consoles, digital cameras, DVD players, GPS receivers, and printers. Household
appliances, such as microwave ovens, washing machines and dishwashers, include
embedded systems to provide flexibility, efficiency and features.

Transportation systems from flight to automobiles increasingly use embedded systems.


Medical equipment uses embedded systems for vital signs monitoring, electronic stethoscopes
for amplifying sounds, and various medical imaging for non-invasive internal inspections.
Embedded Wi-Fi modules provide a simple means of wirelessly enabling any device which
tne of the very first recognizably modern embedded systems was the Apollo Guidance
Computer, developed by Charles Stark Draper at the MIT Instrumentation Laboratory. At the
project's inception, the Apollo guidance computer was considered the riskiest item in the
Apollo project as it employed the then newly developed monolithic integrated circuits to
reduce the size and weight. At the project's inception, the Apollo guidance computer
was considered.

User Interface

20
Embedded systems range from no user interface a t all, in systems dedicated only to one
task, to complex graphical user interfaces that resemble modern computer desktop operating
systems. Simple embedded devices use buttons, LEDs, graphic or character LCDs (for
example popular HD44780 LCD) with a simple menu system.

More sophisticated devices which use a graphical screen with touch sensing or screen-edge
buttons provide flexibility while minimizing space used: the meaning of the buttons can
change with the screen, and selection involves the natural behavior of pointing at what's
desired. Handheld systems often have a screen with a "joystick button" for a pointing device.

Processors in Embedded Systems

Embedded processors can be broken into two broad categories. Ordinary microprocessors use
separate integrated circuits for memory and peripherals. Microcontrollers have on-chip
peripherals, thus reducing power consumption, size and cost.

Peripherals

Embedded Systems talk with the outside world via peripherals such as,

1. Serial Communication Interfaces : RS-232, RS-422, RS-485 etc.

2.Synchronous Serial Communication Interface: I2C, SPI, SSC and ESSI,USB

3. Multi Media Cards (SD Cards, Compact Flash etc

4. Networks: Ethernet, LAN Works, etc.

5. Fieldbuses: CAN-Bus, LIN-Bus, PROFIBUS, etc.


Timers: PLL(s), Capture/Compare and Time Processing Units

6. Discrete IO: General Purpose Input/Output

21
Embedded systems range from no user interface a t all, in systems dedicated only to one
task, to complex graphical user interfaces that resemble modern computer desktop operating
systems. Simple embedded devices use buttons, LEDs, graphic or character LCDs (for
example popular HD44780 LCD) with a simple menu system.

More sophisticated devices which use a graphical screen with touch sensing or screen-edge
buttons provide flexibility while minimizing space used: the meaning of the buttons can
change with the screen, and selection involves the natural behavior of pointing at what's
desired. Handheld systems often have a screen with a "joystick button" for a pointing device.

A microcontroller is a small computer on a single integrated circuit containing a processor


core, memory, and programmable input/output peripheral . Program memory in the form of
NOR flash or OTP ROM is also often included on chip, as well as a typically small amount of
RAM. Microcontrollers are designed for embedded applications, in contrast to the
microprocessors used in personal computers or other general purpose applications.

CHAPTER-2

LITERATURE REVIEW

2.1: REAL TIME TRACKING MANAGEMENT SYSTEM USING GPS, GPRS AND
GOOGLE EARTH N CHADIL, A WANG, PHONGSAK
KEERATIWINTAKORN(2008)

Due to the high cost of fossil-based energy, several methods are proposed to reduce
the usage of the energy in logistics and fleet management to be even more. GPS tracking system
is a common approach to get vehicle location information in real-time for fleet planning. We
proposed a GPS tracking system called Goo-Tracking that is composed of commodity hardware,
open source software and an easy-to-manage user interface via a Web server with Google Map
or via Google Earth software. The system includes a GPS/GPRS module to location acquisition
and message transmission, MMC to temporary store location information, and an 8-bit AVR
microcontroller. Our system prototype is shown and tested on a trip from Bangkok to Chonburi.
It has shown great stability and also robust message transfer protocol that most of locations are
accurately acquired and transmitted to the server in real-time.
22
2.2:A COMPARATIVE SURVEY OF WLAN LOCATION FINGERPRINTING
METHODS, VILLE HONKAVIRTA, TOMMI PEARL AND ROBERT PICHE(2009)

The term location finger printing covers a wide variety of methods for determining receiver
position using databases of radio signal strength measurements from different sources. In this
work we present a survey of location fingerprinting methods, including deterministic and
probabilistic methods for static estimation, as well as filtering methods based on Bayesian filter
and Kalman filter. We present a unified mathematical formulation of radio map database and
location estimation, point out the equivalence of some methods from the literature, and present
some new variants. A set of tests in an indoor positioning scenario using WLAN signal
strengths is performed to determine the influence of different calibration and location method
parameters. In the tests, the probabilistic method with the kernel function approximation of
signal strength histograms was the best static positioning method. Moreover, all filters
improved the results significantly over the static method

2.3:AN INNOVATIVE METHOD USING GPS TRACKING, WINS


TECHNOLOGIES FOR BORDER SECURITY AND TRACKING OF VEHICLES.
PERUGU ANDPRATHUSH (2010)

This paper proposes a new system that provides security to the mother land by using
concepts of Wireless Integrated Network Sensors, GPS tracking and object and metal detection
and tacking of vehicles with in the country. It provides a new monitoring and control capability
for monitoring the borders of the country. Using this concept we can easily identify a stranger
or any object crossing the border where the army cannot reach in regular. Using the satellite
communication and GPS tracking the area will be identified. By Object identification system
we will be able to get the pictures of that particular area where the strangers has come as well as
the details of objects or people who are present there. And later the metal detecting sensors and
bomb detection signals will detect the existence of explosives and weapons(metals) with them.
The border area is divided into number of nodes. Each node is in contact with each other and
with the main node. The noise produced by the foot-steps of the stranger is collected using the
sensor. This sensed signal then sends appropriate signals and the frequency measured by that
sensor to the main node. Thus the stranger is identified at the main node. Hence it is reasonably
faster. On a global scale, WINS will permit monitoring of land, water, and air resources for
23
environmental monitoring. With this we will be able to identify the objects and the movement,
direction of their movement and the kind of metals they have. After discussing with the military
authorities we will be able to plan the actions to be taken against them. Presently the Indian
government is planning to implement the same technology for tracking the vehicles with in the
country which carry illegal commodities ( like government issued sugar , rice to be distributed
among masses but send to other states without legal permission). The vehicles which carry
explosive materials for industrial purposes can be tracked. The missing vehicles during
transportation due to var- - ious reasons(terrorists attacks) can be easily identified.

2.4:A NOVEL WI-FI AP LOCALIZATION METHOD US IN MONTE CARLO PATH-


LOSS MODEL FITTING SIMULATION MYUNGIN JI,JOOYOUNG KIM,
YOUNGSU CHO, YANGKOO LEE, SANGJOON PARK (2013)

Wi-Fi-based localization is one of the most promising technologies for indoor


location-based services. However, it is still a difficult task to construct a positioning database to
provide high accuracy and vast coverage, especially in probabilistic-based algorithms such as
fingerprint-based localization. On the other hand, positioning methods that use the location
database of the positioning infrastructure, such as the weighted centroid method, can support
terminal-based localization due to lower computational complexity and small database size.
Terminal-based positioning has the advantages not only of protecting personal location
information, but also of maintaining the network topology among the terminals. The only weak
point for positioning database-based methods is that the accurate location of the infrastructure
should be known in advance. In this paper, we propose a novel algorithm to estimate the
location of infrastructure, especially for Wi-Fi access points. We developed and employed a
smartphone application to collect Wi-Fi signals by just walking around the test area. Then, the
locations of Wi-Fi access points are estimated efficiently and accurately by selection of the
maximum likelihood position that has the most similar path-loss model corresponding to the
signal acquisition points. The estimated locations are processed as infrastructure database to
support terminal-based positioning. The simulation and experiment result validate the
feasibility of the proposed algorithm. The estimated location of access points is within 10 m
accuracy in most cases and also the terminal-based positioning results achieve competitive
performance comparing with other positioning methods

24
2.5:SIMPLE LOCATION-BASED ONE-TIME PASSWORDS ROLAND VAN RIJSWIJK-
DEIJ (2013)
As the mobile networks are springing up, mobile devices become a must gadget
in our daily life. People can easily access Internet application services anytime and anywhere
via the hand-carried mobile devices. Most of modern mobile devices are equipped with a GPS
module, which can help get the real-time location of the mobile device. In this paper, we
propose a novel authentication scheme which exploits volatile passwords - One-Time
Passwords (OTPs) based on the time and location information of the mobile device to
transparently and securely authenticate users while accessing Internet services, such as online
banking services and e-commerce transactions. Compared to a permanent password base
scheme, an OTP based one can prevent users from being eavesdropped. In addition to a
memory less feature, the scheme restricts the validness of the OTP password not only in a
certain time period but also in a tolerant geometric region to increase the security protection.
However, if a legitimate user is not in the anticipated tolerant region, the user may fail to be
authenticated. Hence, a Short Message Service (SMS) based mutual authentication mechanism
is also proposed in the article to supplement the unexpected misjudgment. The proposed
method with a volatile time/location-based password features more secure and more
convenient for user authentication

2.6:LOCATION-BASED SERVICES WITH IBEACON TECHNOLOGY


MARKUSKHNE, JRGEN SIECK (2014)

iBeacons are a new way to interact with hardware. An iBeacon is a Bluetooth Low
Energy device that only sends a signal in a specific format. They are like a lighthouse that sends
light signals to boats. This paper explains what an iBeacon is, how it works and how it can
simplify your daily life, what restriction comes with iBeacon and how to improve this
restriction., as well as, how to use Location-based Services to track items. E.g., every time you
touchdown at an airport and wait for your suitcase at the luggage reclaim, you have no
information when your luggage will arrive at the conveyor belt. With an iBeacon inside your
suitcase, it is possible to track the luggage and to receive a push notification about it even
before you can see it. This is just one possible solution to use them. iBeacon can create a
completely new shopping experience or make your home smarter. This paper demonstrates the
luggage tracking use case and evaluates its possibilities and restrictions.

25
The idea of Internet of Things is gaining wide scale attention, however a concept of such
transcending effect has certain issues associated with it. Ultra low power communication is one
of essential needs of the IoT [1] which can be satisfied using the Bluetooth Low Energy (BLE).
BLE is the latest radio technology of the Bluetooth Special Interest Group (SIG) and is also
known as the Bluetooth smart. It has been particularly designed to keep the energy consumption
low while providing higher throughput, lower latency, but with a comparatively shorter range
(up to 50m). The low energy consumption would allow the sensor or other entities to
communicate with other devices using a coin cell battery for a time span of up to two years.
Location Based Services (LBS) have been around for quite a while but the first generation of the
LBS did not receive much attention due to its network centric approach. However, the second
generation of the LBS is more user centric and is therefore finding its use on a large scale in the
smart building domain. Realizing the significance of LBS, Apple introduced the iBeacons in
Worldwide Developers Conference (WWDC) 2013 as part of its iOS 7.0. The beacon is the
device that emits BLE signals whereas the iBeacon is the name of the proprietary protocol. This
technology standard allows the mobile applications (apps) running on either iOS or Android
platform to receive these BLE signals. The signals can be used for identifying proximity as well
as provisioning of contextual aware services. Despite the relevant infancy of iBeacons, it is
considered to be a revolutionary product that will penetrate the consumer market to a great
extent.

II. RELATED WORK

LBS are widely used in a number of outdoor facilities for navigation services. However
providing highly accurate positioning services in indoor/GPS constrained environments is a
challenging task due to the presence of obstacles and the inherent complexities in an indoor
environment [4], [5]. There are a number of different techniques that can be used for indoor
positioning such as Time Of Arrival (TOA), Return Time Of Flight (RTOF), Time Difference of
Arrival (TDOA), RSS-based, Received Signal Phase Method, Angle of Arrival (AOA), Scene
Analysis and Proximity algorithms [6]. RSSI based methods have been used extensively in [7]
[9]. More specifically, Zigbee, Wireless Local Area Networks (WLANs) and other similar
wireless technologies have been used to track the users in an indoor environments. However, the
problem with such protocols is that the access points require constant energy, and the protocols
have been designed towards faster access rather than proximity based services. For reducing the
RSS index drift, [9] uses both Heron-bilateration location estimation and Kalman-filter drift
26
removal. This also reduces the positioning error as well as computation complexity. Such an
approach further causes a decrease in the cost of deploying an RFID based indoor tracking
system without jeopardizing the accuracy and granularity of localization. A hybrid indoor
localization estimation technique that utilizes extended Kalman filter is presented in [10]. The
presented technique integrates fingerprinting and trilateration resulting in a simple and robust
approach for localization. Rather than converting the value of RSSI into distance, the Euclidean
distance formula is used. In contrast with [9], [10], for improving the performance of the system,
we utilize particle filters (PF) which tend to perform better than Kalman filters [11] and
Unscented Kalman Filters (UKF) [7]. Furthermore our model is computationally efficient as it
utilizes only particle filtering rather a combination of techniques as done in [12], [13] for
improving the accuracy. Finally, we did not modify any of the core architecture of the BLE stack
as was done with WLAN in [13]. PF is also used in [14] for localization using the Radio
Frequency Identification (RFID) tags. The RFID system operates on Ultra High Frequency
(UHF) and consists of a standard RFID reader, the passive tags that serve as the reference
points. Proprietary designed semi-passive tag are attached to the object for tracking purposes.
The semi-passive tag uses backscatter modulation for transferring the sensed information to the
reader. While their setup was verified in a smaller space, we used comparatively extensive set of
experiments to verify the accuracy of our model in a smaller and comparatively larger space.
Our proposed system attains an accuracy as high as 0.27 meters which is higher than Magnetic
Field Mapping (up to 2 meters), WLAN (3 meters), Zigbee (3 meters), GPS (for outdoor
environments and 10 meters), and hybrid of RF and IR or RF and Ultrasonic technologies (1
meters).

III. BLUETOOTH LOW ENERGY AND IBEACONS

A. BLUETOOTH LOW ENERGY

The low energy version of the Bluetooth that is specified in version 4 is known as
Bluetooth Low Energy/Bluetooth smart [1]. In BLE, as opposed to the classic Bluetooth, the
slave device advertises on either one or several of the three allocated advertisement channels for
discovery purposes. The Master periodically scans the channels for discovering slaves. Once the
slave device is discovered, the data transfer takes place in form of periodic connection events
where both the slave and master wake up in synchronized manner for exchanging various
frames. The devices save energy by sleeping for the rest of the time. In Bluetooth smart the core
27
specifications have been enhanced to allow two different types of implementations, the single
mode and the dual mode [15]. Overall, the BLE technology has a huge potential and will
certainly be an important part of future IoT. Table I provides a summary of the specifications of
BLE.

B. IBEACONS
Apples iBeacon is a protocol that is meant to be used with the BLE enabled beacons.
This technology assists the mobile applications in recognizing that any BLE enabled receiver is
in the proximity of the BLE beacon. These beacons can communicate with any BLE enabled
receiver and transmit data. The feature is included in iOS 7 and beyond. Similarly the Android
4.3+ systems also supports the iBeacons. It is a novel exciting technology that can enable the
applications with better location awareness. The Beacon can be used for creating a region,
known as geofence, around an entity that will allow the iOS or the Android system to identify
when it either enters or exits the location.
2. 1 Existed application in commercial scenario

As an indoor positioning system, iBeacons are popular in commercial fields. Push


information about whats on sale. With an iBeacon, the software in a smart device or
smartphone, can find where they are, and get notifications from the items nearby that are on
sale. Even more, customers can pay at the point of sale (POS) without touching their credit
cards or wallets at all. Control the shoppers behaviors via recommending services automatically
by iBeacons. In a store, the retailer can sense shoppers interests via the calculation of time a
shopper in front of a specific item in the store, and then, the software in shoppers smartphone
will show the other color or style of this item, or even let shopper access to the online shop to
compare the price and style at real time. If the shopper does not buy an item, they will get some
advertisements or coupons relevant to this item later. Promote O2O commercial actions. The
retailers can gather shoppers behavior info, for instance, the shopper have ever seen the same
goods in the other store of the same chain online or onsite with iBeacon technology. And then,
push the good coupons info at the store, mean while, show the shopper this goods in their online
shop, so as to guide shoppers make purchase online or offline. iBeacon technology brings many
chances for the retailors to keep broadcasting the items/events info automatically by smartphone
APP of users; to tracing users interests or potential demands; to contextualize shoppers
purchase tendency. All these, no doubt, will be great help in commercial fields.And it also can
be worked well in other scenarios, take museum for instance. . If the shopper does not buy an
28
item, they will get some advertisements or coupons relevant to this item later. Promote O2O
commercial actions. The retailers can gather shoppers behavior info, for instance, the shopper
have ever seen the same goods in the other store of the same chain online or onsite with iBeacon
technology. And then, push the good coupons info at the store, meanwhile, show the shopper
this goods in their online shop, so as to guide shoppers make purchase online or offline. iBeacon
technology brings many chances for the retailors to keep broadcasting the items/events info
automatically by smartphone APP of users; to tracing users interests or potential demands
If the shopper does not buy an item, they will get some advertisements or coupons relevant to
this item later. Promote O2O commercial actions. The retailers can gather shoppers behavior
info, for instance, the shopper have ever seen the same goods in the other store of the same chain
online or onsite with iBeacon technology. And then, push the good coupons info at the store.

CHAPTER 3

PROPOSED DESIGN

3.1. THEORETICAL STUDIES

Beacon is an indoor positioning system provided by Apple based on BLE (Bluetooth


Low Energy) technology. Smart devices, such as iPhone or Android phone can detect
advertising signals sent by the low energy consumption tiny device. Notifications will be
pushed automatically to the user when smart device with iBeacon Apps come to certain areas.
It provides promising and portfolio usage scenarios for business, such as retail stores, to push
related information about customers interested items with the awareness of customers
location. This technology also can be used in museum scenario. In this research, we
described the principle of iBeacon, and addressed a design of interaction system between
visitors and collections supported by iBeacon technology.

29
Fig 3.1: Block diagram of proposed method

It mainly consists of an iBeacon module encapsulated with a microcontroller and interfaced with
mobile application. The missing modules are identified with unique ID and password that can be
accessed from anywhere in the world using GPRS. This technology overcomes the drawback of
global positioning system that consumes lot of power and energy and it can never be resized
within free limit. This technology can also be implemented in retail shops where the customer
himself could identify the price and offers of related collectables.

3.2DESIGN AND IMPLEMENTATION

30
Fig 3.2.1: user section circuit diagram

Fig3.2.2: vehicle section circuit diagram

31
For designing of system, there is a need of hardware components like resistors

capacitors, iBeacon module, Bluetooth Module etc. and also AvrStudio4 software is used to
write the embedded C programming is installed in the microcontroller with the help of
compiler Xtreme Burner so as to operate it in required way by which it can handle the
operation of hardware components.
The application for the mobile phone is either created is visual basic or android. In the
shown model , the application is created in visual basic and is simulated in a computer by
pairing it with the iBeacon module using a Bluetooth dongle.

3.3 DATAFLOW DIAGRAM


The operation of the whole project has a specific pattern according to the action takes
place of which software has developed. The whole operation takes place according to the
following flowchart as shown below.

Fig 3.3.1 Data Flow Diagram

32
Fig.3 shows the data flow diagram for the iBeacon module connected to the microcontroller
which can interfaced with mobile application. The missing modules are identified with unique
ID and password that can be accessed from anywhere in the world using GPRS.

3.4 WORKING
Circuit diagram and hardware implementation shows the major parts of whole system.
Beacons are small battery powered devices. They emit a BLE signal. The signal is picked up
by the phone, and often transmitted to a cloud server via the internet. The backend cloud
server processes the information and performs further analysis guiding specific location
based behaviors in the mobile device. The hardware consists of a microcontroller with a
Bluetooth LE radio chip and a battery. Coin cell batteries are the most popular choice for most
beacons. These batteries are dense Lithium Ion cells and provide several months of battery
life in a very small form factor. Typically, a cloud based application backed parses all received
beacon signals and takes actions, acting as the brain behind all operations.

3.5. REAL TIME DEMO

We implement our project in real time demo using the basic hardware components. The basic
components includes two microcontrollers embedded with some modules and motor. Our
project is segmented into two basic sections:
1) Vehicle section
2) User section
3) PC section

3.5.1. VEHICLE SECTION


Our mobile section includes an AVR Atmega8 microcontroller, Timer, Bluetooth
and an iBeacon module.

Timer

Beacon

33
Bluetooth

Fig3.5.1: Mobile section

3.5.1.1TIMER
Timer is a clock that controls the sequence of an event while counting in fixed intervals
of time. A timer is used for producing precise time delay. Secondly, it can be used to repeat or
initiate on action after/at a known period of time. This feature is very commonly used in several
applications. An example could be setting up an alarm which triggers at a point of time or after a
period of time. Most of the processors/controllers have inbuilt timers. Timers in a
processor/controller not only generate time delays but they can also be used as counters. They
are used to count an action or event. The value of counter increases by one, every time its
corresponding action or event occurs. Timers in a processor/controller are inbuilt chips that are
controlled by special function registers (SFRs) assigned for timer operations.

3.5.1.2 I BEACON MODULE


IBeacon uses Bluetooth low energy proximity sensing to transmit a universally unique
identifier picked up by a compatible app (or) operating system. The identifier and several bytes
sent with it can be used to determined the devices physical location, track customers or trigger a
location based action on the device such as a check-in on social media or a push notification.
One application is distributing messages at a specific point of interest. For example, a store, a
bus stop, a room or a more specific location like a piece of furniture or a vending machine. This
is similar to previously used geo push technology based on GPS, but with a much reduced
impact on battery life and much extended precision.

WORKING OF IBEACON

iBeacons transmit a unique identifier (UUID) that can be picked up by a compatible app
installed on a users smartphone. Then, this will turn the smartphone into a physical location that
the iBeacon can detect. The iBeacon can send notifications or push the app to grab data from
another data source (usually a web-server). The iBeacon will continue to send out signals to the
34
smartphone and push different notifications or content based on the proximity between the
smartphone and the iBeacon.

Another set of identifiers (the Major and Minor ID) will allow a system to identify, tag and
assign content to each specific iBeacon.

iBeacon is a protocol developed by Apple and introduced at the Apple Worldwide Developers
Conference in 2013. Various vendors have since made iBeacon-compatible hardware
transmitters - typically called beacons - a class of Bluetooth low energy (LE) devices that
broadcast their identifier to nearby portable electronic devices. The technology enables
smartphones, tablets and other devices to perform actions when in close proximity to an
iBeacon.

iBeacon uses Bluetooth low energy proximity sensing to transmit a universally unique identifier
picked up by a compatible app or operating system. The identifier and several bytes sent with it
can be used to determine the device's physical location, track customers, or trigger a location-
based action on the device such as a check-in on social media or a push notification.

One application is distributing messages at a specific Point of Interest, for example a store, a bus
stop, a room or a more specific location like a piece of furniture or a vending machine. This is
similar to previously used geopush technology based on GPS, but with a much reduced impact
on battery life and much extended precision.

Another application is an indoor positioning system, which helps smartphones determine their
approximate location or context. With the help of an iBeacon, a smartphone's software can
approximately find its relative location to an iBeacon in a store. Brick and mortar retail stores
use the beacons for mobile commerce, offering customers special deals through mobile
marketing, and can enable mobile payments through point of sale systems.

iBeacon differs from some other location-based technologies as the broadcasting device
(beacon) is only a 1-way transmitter to the receiving smartphone or receiving device, and
necessitates a specific app installed on the device to interact with the beacons. This ensures that
only the installed app (not the iBeacon transmitter) can track users, potentially against their will,
as they passively walk around the transmitters.

35
iBeacon compatible transmitters come in a variety of form factors, including small coin cell
devices, USB sticks, and generic Bluetooth 4.0 capable USB dongles.

3.5.1.3FUNCTIONS

Bright beacon plus An iBeacon deployment consists of one or more iBeacon devices that
transmit their own unique identification number to the local area. Software on a receiving device
may then look up the iBeacon and perform various functions, such as notifying the user.
Receiving devices can also connect to the iBeacons to retrieve values from iBeacon's GATT
(generic attribute profile) service. iBeacons do not push notifications to receiving devices (other
than their own identity). However, mobile software can use signals received from iBeacons to
trigger their own push notifications

3.5.1.4 REGION MONITORING


Region monitoring is limited to 20 regions and can function in the background (of the listening
device) and has different delegates to notify the listening app (and user) of entry/exit in the
region - even if the app is in the background or the phone is locked. Region monitoring also
allows for a small window in which iOS gives a closed app an opportunity to react to the entry
of a region.

3.5.1.5 RANGING

Bright iBeacon Base Station


As opposed to monitoring, which enables users to detect movement in-and-out of range of the
beacons, ranging provides a list of beacons detected in a given region, along with the estimated
distance from the user's device to each beacon. Ranging works only in the foreground but will
return (to the listening device) an array (unlimited) of all iBeacons found along with their
properties (UUID, etc.)

An iOS device receiving an iBeacon transmission can approximate the distance from the
iBeacon. The distance (between transmitting iBeacon and receiving device) is categorized into 3
distinct ranges:

Immediate: Within a few centimeters

Near: Within a couple of meters

36
Far: Greater than 10 meters away

An iBeacon broadcast has the ability to approximate when a user has entered, exited, or lingered
in region. Depending on a customer's proximity to a beacon, they are able to receive different
levels of interaction at each of these three ranges.

The maximum range of an iBeacon transmission will depend on the location and placement,
obstructions in the environment and where the device is being stored (e.g. in a leather handbag
or with a thick case). Standard beacons have an approximate range of 70 meters. Long range
beacons can reach up to 450 meters.

3.5.2 USER SECTION


Our user section includes some components like Buzzer, LCD and PC with internet. It
also consists of two AVR Atmega8 microcontrollers. This section is the major interface
between the users mobile phone and the iBeacon module. It obtains the information from
both the vehicle on the mobile phone.

PC With
Internet

Microcontroller LCD

Fig3.5.2: User section

3.5.3 PC SECTION

This section elaborates the interface between the mobile phone and the vehicle
which consists of an iBeacon module. An application is developed in a mobile phone which
always interacts with the microcontroller placed in a vehicle. It states that only if the
Bluetooth is enabled with the microcontroller, if anyone theft the vehicle then it can be

37
identified by using the iBeacon application in the mobile. It can be monitored by using the
PC section.

Mobile
(iOS/Android/
Windows)

Fig 3.5.3: PC Section

38
CHAPTER 4

SOFTWARE DESCRIPTION

As a result an Embedded based iBeacon technology system is designed, simulated and


implemented in the real time. The processed results are as follows:

1. The plans are designed in the first phase of the project.


2. A schematic block is made to process the first stage.
3. The plans are made to avoid the vehicle theft and kidnapping that are prevented.
4. The choice of equipments and materials were made and the literature reviews
were studied.

4.1 BEACON IDENTIFICATION IN ANDROID APP


There is something called received signal strength which is the line of sight from the devices
Bluetooth antenna to the beacon. The disadvantage in iOS, is that it only works in the
foreground. We cannot do ranging and distances when the app isin the background. So, when
the screen is off it very difficult to determine loation. Even when the screen is on, it can be a bit
unreliable. There will be a jitter that it will think youre immediate, far, within short range, and
it moves around. Hence it shouldnt be used for accurate targeting. But this can be achieved
using multiple beacons. Consider beacons over your location, adjust the antenna power of each
beacon to suit individual use case. You can tune the Transmission Power of your beacons at
different ranges. When you get an entry for a particular beacon, thats when you deliver the push
notification or thats when you take that event in and produce the action. By this way
approximate distance can be found.

4.2 ATMEL STUDIO 6


The Studio to Design All Embedded Systems
Debugging/Simulation
C/C++ Compiler/Editor
Q Touch Tools
Software Library

Atmel Studio 6 is the integrated development platform (IDP) for developing and debugging
Atmel ARM Cortex -M and Atmel AVR microcontroller (MCU) based applications. The Atmel
Studio 6 IDP gives you a seamless and easy-to-use environment to write, build and debug your
applications written in C/C++or assembly code.

Atmel Studio 6 is free of charge and is integrated with the Atmel Software Framework (ASF)
a large library of free source code with 1,600 ARM and AVR project examples. ASF
strengthens the IDP by providing, in the same environment, access to ready-to-use code that
minimizes much of the low-level design required for projects. Use the IDP for our wide variety
of AVR and ARM Cortex-Microprocessor-based MCUs, including our broadened portfolio of
Atmel SAM3 ARM Cortex-M3 and M4 Flash devices.

Atmel Studio 6.2 is now available, adding advanced debugging features such as Data and
Interrupt Trace, improved RTOS integration, and better ability to debug code that has been
optimized.

With the introduction of Atmel Gallery and Atmel Spaces, Atmel Studio6 further simplifies
embedded MCU designs to reduce development time and cost. Atmel Gallery is an online apps
store for development tools and embedded software. Atmel Spaces is a cloud-based
collaborative development workspace allowing you to host software and hardware projects
targeting Atmel MCUs.

In summary, standard integrated development environments

1. Facilitates reuse of existing software and, by doing so, enables design


differentiation.
2. Supports the product development process with easy access to integrated tools
and software extensions through Atmel Gallery.

3. Reduces time to market by providing advanced features, an inextensible


software eco-system, and powerful debug integration.

4.2.1 Software Libraries and Device Support

The Atmel Software Frame work is a collection of production-ready source code such as
drivers, communication stacks, graphic services and touch functionality. Tap into 1,600project
examples with source code to accelerate development of new applications.

4.2.2 Atmel Gallery

It can be downloaded and securely purchased with both Atmel and third- party compilers,
advanced debugging tools, real-time operating systems, communication systems and other
extensions and plug-ins straight from the Atmel Studio 6 development platform and via
gallery.atmel.com. The Atmel Gallery app store provides development tools and embedded
software for MCU- based application design.

When a need is encountered for a tool in the midst of the development process, or is seeking
some basic source code, user doesnt have to leave the environment to search for your
solution. From Atmel Gallery, it can also download a plug-in that will give you direct access
to Atmel Spaces, our new collaborative workspace.

4.2.3 Atmel Spaces Collaborative Workspace

With embedded applications easily topping tens of thousands of lines of code often written by
designers dispersed around the globe efficient collaboration is critical for a project's success.
Atmel Spaces provides a cloud- based work space where you can securely share and track
open-source, community-developed embedded design projects with your peers.
With access control, version control, bug and feature trackers, mailing lists and wikis, Atmel
Spaces provides a secure and efficient place for sharing design tips, tricks and resources and
for tracking progress of projects with your peers. User can access Atmel Spaces at
spaces.atmel.com or directly from Atmel Studio with an extension available in Atmel Gallery.
User can access Atmel Spaces at spaces.atmel.com or directly from Atmel Studio with an
extension available in Atmel Gallery.

4. 2.4 Extreme Burner

Extreme Burner PIC is a High Quality but low cost USB port based programmer for the
popular PIC18F and PIC16F series MCUs (from Microchip Inc.).The main advantage of
Extreme Burner PIC over other programmer is the USB connectivity. These days Laptops are
becoming popular among students and professionals. Modern Laptops and even desktops does
not have any legacy ports like Parallel and Serial Ports and therefore many device
programmers cannot be used with them. So solve this problem we have designed a
programmer that is far ahead of these programmers and perfectly fits in modern days

4.3 PROTEUS (DESIGN SOFTWARE)

Proteus is software for microprocessor simulation, schematic capture, and printed circuit board
(PCB) design. It is developed by Lab center electronics. The X Game Station Micro Edition
was designed using Lab center's Proteus schematic entry and PCB layout tools.

4.3.1 System Components

1] ISIS Schematic Capture


Isis Schematic Capture is a tool for entering designs.

2]PRO SPICE Mixed mode SPICE simulation


Its a industry standard SPICE3F5 simulator combined with a digital simulator.

3] ARES PCB Layout


PCB design system with automatic component placer, rip-up and retry auto-router and
interactive design rule checking
4] VSM

Virtual System Modeling lets co simulate embedded software for popular micro-
controllers alongside hardware design. System Benefits Integrated package with common user
interface and fully context sensitive help.

4.4 SOFTWARE LANGUAGE

4.4.1 Embedded C

Embedded C is a set of language extensions for the C programming language by the C


standards committee to address commonality issues that exist between C extensions for
different embedded systems. Historically, Embedded C programming requires nonstandard
extensions to the C language in order to support exotic features such as fixed-point arithmetic,
multiple distinct memory banks, and basic I/O operations.

The C standard committee extended the C language to address these issues by providing a
common standard for all implementations to adhere to. It includes a number of features not
available in normal C, such as, fixed-point arithmetic named address spaces, and basic I/O
hardware addressing.

Embedded C use most of the syntax and semantics of standard C, e.g., main () function,
variable definition, data type declaration, conditional statements (if, switch, case), loops (while,
for), functions, arrays and strings, structures and union, bit operations, macros, unions, etc.
Embedded C is used for microcontroller based applications applicable in Embedded Systems.
Embedded C has to use with the limited resources (RAM, ROM, I/Os) on an embedded
processor unlike that of desktop systems like PC where we need not bother about memory.
Embedded C requires compilers to create files to be downloaded to the microcontrollers where
it needs to run. Embedded C uses most of the syntax and functions of standard C, eg, main(),
variable definition, data type declaration, conditional statements( if, switch, case), loops (while,
for), functions, arrays and strings, bit operations etc..

4.4.2 Advantages:
1. It is small and reasonably simpler to learn, understand, program and debug.

2. Compared to assembly language, C code written is more reliable and scalable, more
portable between different platforms.

3. C compilers are available for almost all embedded devices in use today, and there is a large
pool of experienced C programmers.

4. Unlike assembly, C has advantage of processor-independence and is not


specific to any particular microprocessor/ microcontroller or any system. This makes it
convenient for a user to develop programs that can run on most of the systems.

5. As C combines functionality of assembly language and features of high level languages, C


is treated as a middle-level computer language or high-level assembly language.

6. It is fairly efficient.

7. It supports access to I/O and provides ease of management of large embedded projects.
CHAPTER - 5

RESULTS AND DISCUSSION

FIG: 5.1 OUTPUT

The circuit consists transformer, a microcontroller, a LCD display and a iBeacon module which
will be fitted with the vehicle section. The transformer converts the 220V input from the main
supply and steps it down to 5Vwich in given to the micro controller. The microcontroller
controls the working of LCD display and it provides platform for the addition of a timer and
buzzer and other devices. The iBeacon module keeps on sending a data using an inbuilt
Bluetooth and which will be received by the nearby android phones Bluetooth within 50 m
range using an application called 42 assert tracking. The data received by the application will be
will then trigger GPS of the phone and the location of the module is determined and the data in
sent to the main server and stored there. In order to access this data each module has an inbuilt
and unique username and password. By logging in to the site
http://smartmsg.orbmixtechnologies.com/login we can obtain this information. Thus the module
and in turn the vehicle or person or thing which in embedded with the module can also be found.
5.2 ASSERT TRACKING Application:

The Assert Tracking is nothing but the iBeacon application that the user can findout the
thefted vehicle. When the vehicle can be thefted, then the iBeacon module send the requests to
all the iBeacon users. The range of the iBeacon module is about 50 to 100 meters in range. From
the range itself, the module can send the request to all the iBeacon users. The assert tracking
application supports in android, windows and iOS mobile platforms.

The iBeacon module is encapsulated with the vehicle, if someone theft the vehicle we
can find the vehicle that can kept anywhere. Although the iBeacon is a future technology, it also
prevents the kidnapping of child also. Every I Beacon module having the user name and
password to access the theft of the vehicle.

The user can monitored the location of the vehicle by using PC that can be connected
with internet connection. The missing modules can send the request or notification to all the
iBeacon users. The nearby range of the application that can be used by the persons location can
be traced out and it can be send it to the user. Then the user having the link and the user can log
onto to the link and traced out the thefted vehicle. The latitude and longitude Position ns of the
locations are always notified. Then the user can identify the missing vehicle by using iBeacon
technology.

The above figure shows that the implementation of the iBeacon technology. The type of
microcontroller used in this project is AVR ATMEGA8. The Liquid Crystal Display is used to
notify the operation of the iBeacon technology.
Figure 5.2: Assert Tracking Application Accessed in Mobile Phone

The figure shows that the assert tracking application that can be installed by the android,
windows and iOS platforms. The missing modules can be identified by the nearby application
that can be send to the user.
Figure 5.3: Location of the iBeacon module

The figure explains that the location of the missing iBeacon modules that can be traced out by
using the iBeacon assert tracking application. Then the user can identify the missing vehicle by
using iBeacon technology.

As a result an Embedded based iBeacon technology system is designed, simulated and


implemented in the real time.
CHAPTER 6

CONCLUSION AND FUTURE WORK

The iBeacon is a low cost, low energy consumption tiny devicewith BLE technology is
widely used in commercial fields, especially I retail areas and tracking. Its characteristics makes
it available to be applied in museum scenario, and provide visitors with chance to interact with
collection of an exhibition ultimate supports at real time.

In this research, we addressed a system design in which iBeacon is utilized, to be used


for tracking of vehicles and people. It gives a very efficient tracking system. In this paper we
have implemented this iBeacons application that used in tracking for preventing theft of
vehicles and kidnapping.

We have analyzed the iBeacon system that are much more efficient than the existing
system and its Accuracy in case of indoor positioning in pretty high. We also analyzed the
characteristics of the BLE signal and obtained practical path loss model by conducting with two
types of BLE beacons.

Because of the BLE operated in low power, the overall received signal strength is clearly
low compared to the Wi-Fi, and the signal attenuation coefficient was relatively small. We also
analyzed on the relationship between the number of installed beacon and its positioning
accuracy. The iBeacon is a future technology with various opportunities and not limited to
tracking application as it can be further implemented in variety of scenarios
REFERENCES

[1] Dmitry Namiot, On Indoor Positioning, International Journal of Open Information


Technologies, vol. 3, no. 3, 2015

[2] Jonathan Chung, Adiyan Mujibiya, Shuriken: User Grouping and Data Transfer for
Collaborative Shopping and Offline Meetings Based on Inter-Device Relative Positioning,
Proceedings of the 18th ACM Conference Companion on Computer Supported Cooperative
Work & Social Computing , Pages 151-154.

[3] M Ji, J.Kim, Y.Cho, Y.Lee, S.Park, A Novel Wi-Fi AP Localization Method Using Monte
Carlo Path-loss Model Fitting Simulation, in Proceedings of IEEE 24th International
Symposium on Personal Indoor and Mobile Radio Communications (PIMRC), Sep. 2013.

[4] Markus Khne, Location-based Services with iBeacon Technology, International


Conference on Artificial Intelligence,Modelling and Simulation, 2014.

[5] N Chadil, Real Time tracking management system using GPS, GPRS and Google Earth,
International Journal of Research in Computer and Communication Technology, Vol 3, Issue 10,
October 2014.

[6] Perugu and Prathusha, An innovative method using GPS tracking WINS technologies for
border security and Tracking of vehicles, International Journal of Engineering Research and
Science and Technology, vol. 1, no. 1, March 2015.

[7] Roland van Rijswijk-Deij, Simple Location-Based One-time Passwords, Proceedings of


the 6th workshop on positioning, navigation and communication 2013.

[8] V. Honkavirta, T. Perala, S. Ali-Loytty, and R. Piche, A Comparative Survey of WLAN


Location Fingerprinting Methods, Workshop on Positioning, Navigation and Communication,
Mar. 2009.

[9] Ville HONKAVIRTA, A Comparative Survey of WLAN Location Fingerprinting Methods,


Proceedings of the 6th workshop on positioning, navigation and communication 2009.

También podría gustarte