IJIRST –International Journal for Innovative Research in Science & Technology| Volume 4 | Issue 1 | June 2017 ISSN (online): 2349-6010
Comparative Analysis of Indoor Positioning System using Bluetooth and Wi-Fi A. M. Chandrashekhar Assistant Professor Department of Computer Science & Engineering Sri Jayachamarajendra College of Engineering(SJCE), JSS S&T University Campus, Mysore, Karnataka, India
Thejaswini S M. Tech. Student Department of Computer Science & Engineering Sri Jayachamarajendra College of Engineering(SJCE), JSS S&T University Campus, Mysore, Karnataka, India
Abstract An indoor positioning system (IPS) is defined as the network of devices which is widely used to wirelessly locate objects under the same roof using radio waves, acoustic signals, magnetic fields and other sensory information grasped by mobile devices. Reliable indoor positioning is a base for emerging indoor location based services. Bluetooth - Indoor Positioning System is said to be the intersection of Indoor Positioning Systems and Bluetooth Technology. Similarly, Wi-Fi Indoor Positioning System is the intersection of Indoor Positioning Systems and Wi-Fi Technology. This paper presents a comparative analysis of Wi-Fi and Bluetooth using IPS. Keywords: Indoor Positioning System, Bluetooth, and Wi-Fi _______________________________________________________________________________________________________ I.
INTRODUCTION
An indoor positioning system (IPS) is dependent on the nearby anchors i.e. nodes with a known position, they either provide environment context or actively locate tags for devices to sense. The localized nature of an IPS results in design fragmentation which has systems that makes use of various radios, optical or even acoustic technologies[2][5]. Since GPS does not work on indoors, Wi-Fi and Bluetooth are good alternatives for indoor positioning and indoor navigation. Indoor navigation uses Wi-Fi and senses when it has to replace GPS in buildings. This paper uses Bluetooth and Wi-Fi and aims at providing the comparative analysis of Indoor positioning system [5]. Bluetooth - A wireless technology standard to exchange the data overshot distances (via ISM band from 2400-2480 MHZ in short-wavelength radio transmissions) from mobile and fixed devices. It creates personal area networks for high level security. Wi-Fi - Any wireless local network product which is based on the IEEE 802.11 standards. The merit of Wi-Fi over Bluetooth is that it essentially needs no infrastructure effort to track applications if the indoor area is covered through Wi-Fi signal. The merits of using a wireless solution in industrial applications are as follows: 1) Higher mobility and greater possibility to move devices and eventually connect to tablets or smart phones freely without constraining to cables, 2) Elimination of costly transmission media and its maintenance like the swivels, flexible cables and by-passing long distances areas where cables could not be practically fit 3) For quick and easy installation process, 4) For higher flexibility if a need arises to modify an existing installation 5) To increase the personnel safety by maintaining distance between devices during maintenance and configuration 6) To simplify integration of devices inside the network. II. LITERATURE SURVEY Bluetooth is said to provide a reliable solution to the interior location [3]. Another working group is called for local positioning which was set up to develop a Bluetooth description. The type and format of information not only allows the Bluetooth device to exchange the location information, but also the co-ordinates of the algorithm [5]. Anyhow, it takes enough time before the group with personal data, since the author is presently engaged in a project to grasp the performance of local Bluetooth positioning. Many research & tests for the usage of Wi-Fi communication for indoor navigation has been done in the long past through optimized and advanced versions of algorithms [7]. Through dense network of access points and by RSSI measurements over the Wi-Fi signals one can determine the distance of user’s device using individual access points, and finally applying the trilateration technique for precise position determination. This gives a clear picture in estimating the mobile device’s location in indoor setting. There is a growing organization for research work mainly concerned with indoor positioning, primarily driven by the desire to personalize or augment the users experience in a contextual range. Currently, one of the promising works has mentioned the fact that despite the excessive use of smart phones and technology infrastructures which has the potential to provide precise positioning is it reliable with respect to positioning? It’s still an on-going research question.
All rights reserved by www.ijirst.org
117
Comparative Analysis of Indoor Positioning System using Bluetooth and Wi-Fi (IJIRST/ Volume 4 / Issue 1/ 020)
III. RELATED WORK Among the different existing proposals for indoor positioning, Wi-Fi and Bluetooth are two widely used wireless technologies. We briefly review Wi-Fi based and Bluetooth based indoor positioning. Wi-Fi Based Indoor Positioning Wi-Fi refers to a wireless technology that stands for Wireless Fidelity which allows devices to communicate over a wireless signal. IEEE standard 802.11 also known as Wi-Fi; uses the centralized router devices for sharing Wi-Fi signal with the inclusion of other additional standards such as 802.11a, 802.11b, 802.11g and 802.11n.Wi-Fi supports additional features: Power management (802.11h) and Security mechanisms (802.11) include WPA/WPA2/WEP. For the transfer of data with high speed over short distances, waves are been used by the Wi-Fi networking technology. Like Ethernet and token ring siblings (fig 1), Wi-Fi is designed for use in limited geographical areas such as home, office buildings, campuses, by allowing local area networks (LANs) to process without wiring and cables.
Fig. 1: Wi-Fi using hotspot
For many modern devices such as tablets, computers, laptops and mobiles the wireless broadband internet access is provided by Wi-Fi with authentication. With the functionalities of Wi-Fi, high data transfer rate can be accessed by broad band internet connection (fig 2). The major attractive feature of Wi-Fi is that it provides broadband connection for wireless communication within a specific geographic space.
Fig. 2: Wi-Fi connection
Bluetooth Based Indoor Positioning Bluetooth technology is beneficial when information needs to be transferred between many devices that are nearby and when the speed is not the issue, such as printers, modems, smart phones and telephones. It is most suitable for the applications which specifically uses lower-bandwidth for transfer of data within prĂŠcised geographical boundary, such as transferring audio information with telephones i.e., with a Bluetooth headset or with hand-held systems for (transferring files) for byte-data or mice and keyboard. In order to enable positioning the deployment of Bluetooth hotspots in indoor space was practiced.
All rights reserved by www.ijirst.org
118
Comparative Analysis of Indoor Positioning System using Bluetooth and Wi-Fi (IJIRST/ Volume 4 / Issue 1/ 020)
Since Bluetooth hotspots relatively covers limited space, the proximity analysis is been employed by the Bluetooth based indoor positioning systems for position estimation. Specifically, the locations deployed by Bluetooth hotspots are tracked as reference positions. These reference positions are returned as the user’s position estimates when a Bluetooth-enabled device of the user enters a specific hotspot’s range, the hotspot of the device identified (or vice versa). It is even possible to utilize the range of detection of a Bluetooth hotspot to nearly approximate a user’s present position. In this case, (fig 3)when the multiple Bluetooth hotspots are detected paralelly at a location, intersection of all the hotspot detection ranges or band can be used to approximate the user’s location. However, these techniques are most complex in nature as they might return erratic regions as location estimates; this even involves expensive geometrical calculations. For application in industry, wireless technology has to be compatible when the environment is noisy. Bluetooth utilizes the features of Adaptive Frequency Hopping (AFH) and Forward Error Correction (FEC) to operate. It gives a universal short range wireless capability. It operates within the 2.4 GHz frequency band and devices within 10m from each other can share data upto 720Kbps of its capacity. Before making the connection between the devices, this technology or system which is an authenticated one sends the acknowledgement from receiver to transmitter.
Fig. 3: Bluetooth connection IV. BLUETOOTH V/S WI-FI Formulation The invention of Bluetooth technology has been credited to Ericsson in the year 1994 which then launched it as an alternative to wireless communication to RS232. Though Wi-Fi had researches since mid 80s, it was officially launched in 1997. A separate committee for the development of Wi-Fi was then set in the year 1990 head by, Mr. Victor Hayes – The Father of Wi-Fi. Standards of IEEE Bluetooth which was initially defined under IEEE 802.15.1 standard is now taken care under a special interest group (SIG). Wi-Fi, which was defined under 802.11.x series of protocols and is presently maintained under the same protocol. Various companies have founded a Wi-Fi alliance, which tests and authorizes gadgets to be compatible with Wi-Fi. Frequency Wi-Fi based networks work at 2.4, 3.6 and 5GHz. Whereas Bluetooth works at 2.4GHz frequency. Range Bluetooth based wireless connection has a maximum range of 30m whereas for Wi-Fi it can extend almost upto 100m. In Wi-Fi, the range is dependent on the versions of its Wi-Fi protocol applied and addition of antennas in communication system. While no such range concerns or extra antennae are so much known in case of Bluetooth. Connection of Devices In Bluetooth, upto 8 devices can be connected to one another. Whilst in the case of Wi-Fi, the number of maximum connections depends on Wi-Fi router. The routers can simultaneously accommodate one to several communicating devices.
All rights reserved by www.ijirst.org
119
Comparative Analysis of Indoor Positioning System using Bluetooth and Wi-Fi (IJIRST/ Volume 4 / Issue 1/ 020)
Security In Bluetooth, the earlier versions were encryption and till date Bluetooth security is limited to key matching. Whilst in Wi-Fi, the standards of security have been inclusively provided with new versions. Wi-Fi Protected Access (WPA) and Wireless Equivalent Privacy (WEP) are the most used security accesses in Wi-Fi.
Parameter Cost Authority of specifications Security Development year Latency Bit-rate Typical link length Power consumption Latency Wired technology analogy
Table - 1 Wi-Fi vs Bluetooth Wi-Fi High IEEE , WACA More secure 1991 150 ms 600 ms 100 m High 150 ms Ethernet
Hardware requirement
Wireless access points, Wireless adaptors on all devices of the networks
Bluetooth Low Bluetooth SIG Less secure 1994 200 ms 2.1 ms 10 m Low 200 ms USB Bluetooth Adaptor on all the devices
Wi-Fi security strategies are: Block your Service Set Identifier (SSID) from being broadcast. SSID that allows identifying the service network: it is a 32 bytes character string of a variable size. SSID is used in order to guarantee the authentication and the identification between an AP and a client. Wireless beacon so PCs can easily find the access point. Change the default network name in the access point. Change the default access point password. Center the access point in the middle of the building, house or any other place. Power Consumption
Can work at longer distances and capable of being loaded with high quality security protocols? This makes Wi-Fi a power consuming protocol when compared to Bluetooth. V. CONCLUSION To summarize, it can be said that amongst the two Indoor Positioning System, Wi-Fi outmaneuvers the other i.e. the Bluetooth system through its capability and compatibility in different work environment. Overall, Wi-Fi uses better protocols and algorithms to deliver better performance i.e. from its location determination of a mobile user to the Quality of output. And also the security provided by Wi-Fi is more compared to Bluetooth, for this Wi-Fi uses WPA (Wi-Fi Protected Access) and WEP security protocols. Follow-up work will concentrate on the further analysis and system improvement of the models and on the integration with other protocols to deliver better quality signals to smart phones. REFERENCES [1] [2] [3] [4]
G.-Y. Jin, X.-Y. Lu, and M.-S. Park. An indoor localization mechanism using active RFID tag. In Proc. SUTC, pp. 40–43, 2006. H.-Y. Kang, J.-S. Kim, and K.-J. Li. Strack: tracking in indoor symbolic space with RFID sensors. In Proc. GIS, pp. 502–505, 2010. M. B. Kjaergaard. A taxonomy for radio location fingerprinting. In Proc. LoCA, pp. 139–156, 2007. M. B. Kjærgaard and C. V. Munk. Hyperbolic location fingerprinting: A calibration-free solution for handling differences in signal strength (concise contribution). In Proc. PerCom, pp. 110–116, 2008. [5] T.-N. Lin and P.-C. Lin. Performance comparison of indoor positioning techniques based on location fingerprinting in wireless networks. In Proc. IWCMC, pp. 1569–1574, 2005. [6] H. Liu, H. Darabi, P. Banerjee, and J. Liu. Survey of wireless indoor positioning techniques and systems. IEEE TSMC, Part C: Applications and Reviews, 37(6):1067–1080, 2007. [7] K. Muthukrishnan, M. E. Lijding, and P. J. M. Havinga. Towards smart surroundings: Enabling techniques and technologies for localization. In Proc. LoCA, pp. 350–362, 2005. [8] A. M. Chandrashekhar and K. Raghuveer, “Confederation of FCM Clustering, ANN and SVM Techniques of Data mining to Implement Hybrid NIDS Using Corrected KDD Cup Dataset”, Communication and Signal Processing (ICCSP) IEEE International Conference,2014, Page 672-676. [9] AM. Chandrashekhar and K. Raghuveer , “Improvising Intrusion detection precision of ANN based NIDS by incorporating various data Normalization Technique – A Performance Appraisal”, IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr-May, 2014. [10] A. M Chandrashekhar A M and K. Raghuveer, “Diverse and Conglomerate modi-operandi for Anomaly Intrusion Detection Systems”, International Journal of Computer Application (IJCA) Special Issue on “Network Security and Cryptography (NSC)”, 2011 [11] A. M Chandrashekhar A M and K. Raghuveer, “Hard Clustering Vs. Soft Clustering: A Close Contest for Attaining Supremacy in Hybrid NIDS Development”, Proceedings of International Conference on Communication and Computing (ICCC - 2014), Elsevier science and Technology Publications.
All rights reserved by www.ijirst.org
120
Comparative Analysis of Indoor Positioning System using Bluetooth and Wi-Fi (IJIRST/ Volume 4 / Issue 1/ 020) [12] A. M. Chandrashekhar and K. Raghuveer, “Amalgamation of K-means clustering algorithem with standard MLP and SVM based neural networks to implement network intrusion detection system”, Advanced Computing, Networking, and Informatics –Volume 2(June 2014), Volume 28 of the series Smart Inovation, Systems and Technologies pp 273-283. [13] A. M. Chandrashekhar and K. Raghuveer, “Fusion of Multiple Data Mining Techniques for Effective Network Intrusion Detection – A Contemporary Approach”, Proceedings of Fifth International Conference on Security of Information and Networks (SIN 2012), 2012, Page 178-182. [14] A. M. Chandrashekhar, Jagadish Revapgol, Vinayaka Pattanashetti, “Big Data Security Issues in Networking”, International Journal of Scientific Research in Science, Engineering and Technology (IJSRSET), Volume 2, Issue 1, JAN-2016. [15] Puneeth L Sankadal, A. M Chandrashekhar, Prashanth Chillabatte, “Network Security situation awareness system” International Journal of Advanced Research in Information and Communication Engineering(IJARICE), Volume 3, Issue 5, May 2015. [16] P. Koushik, A.M.Chandrashekhar, Jagadeesh Takkalakaki, “Information security threats, awareness and cognizance” International Journal for Technical research in Engineering (IJTRE), Volume 2, Issue 9, May 2015. [17] A.M.Chandrashekhar, Yadunandan Huded, H S Sachin Kumar, “Advances in Information security risk practices” International Journal of Advanced Research in data mining and Cloud computing (IJARDC), Volume 3, Issue 5, May 2015. [18] A. M. Chandrashekhar,Muktha G, Anjana D, “Cyberstalking and Cyberbullying: Effects and prevention measures”, Imperial Journal of Interdisciplinary Research (IJIR), Volume 2, Issue 2, JAN-2016. [19] A.M.Chandrashekhar, Syed Tahseen Ahmed, Rahul N, “Analysis of Security Threats to Database Storage Systems” International Journal of Advanced Research in data mining and Cloud computing (IJARDC), Volume 3, Issue 5, May 2015. [20] A.M.Chandrashekhar, K.K. Sowmyashree, RS Sheethal, “Pyramidal aggregation on Communication security” International Journal of Advanced Research in Computer Science and Applications (IJARCSA), Volume 3, Issue 5, May 2015. [21] A.M.Chandrashekhar, Rahil kumar Gupta, Shivaraj H. P, “Role of information security awareness in success of an organization” International Journal of Research(IJR), Volume 2, Issue 6, May 2015. [22] A.M.Chandrashekhar, Huda Mirza Saifuddin, Spoorthi B.S, “Exploration of the ingredients of original security” International Journal of Advanced Research in Computer Science and Applications(IJARCSA), Volume 3, Issue 5, May 2015. [23] A.M.Chandrasekhar, Ngaveni Bhavi, Pushpanjali M K, “Hierarchical Group Communication Security”, International journal of Advanced research in Computer science and Applications (IJARCSA), Volume 4, Issue 1,Feb-2016.
All rights reserved by www.ijirst.org
121