Please use this identifier to cite or link to this item: https://accedacris.ulpgc.es/handle/10553/119681
Title: BLE Beacon System for Smartphone Secure Tracking
Authors: Hernández Goya, C.
Cruz Rodríguez, D.
Aguasca Colomo, Ricardo 
Caballero Gil, P.
UNESCO Clasification: 1203 Ciencia de los ordenadores
3307 Tecnología electrónica
Keywords: BLE beacon
Secure tracking
RPA
Lightweight cryptography
Issue Date: 2022
Publisher: Springer 
Project: Research supported by the CDTI (Centre for the Development of Industrial Technology), the Ministry of Economy Industry and Competitiveness, Celtic-Plus EUREKA and the European Regional Development Fund, under Project IMMINENCE C2020/2-2
Journal: Lecture Notes in Networks and Systems 
Conference: 14th International Conference on Ubiquitous Computing and Ambient Intelligence (UCAmI 2022)
Abstract: Applications with mobile devices are growing exponentially, as their communication capabilities improve. Therefore, it is necessary to guarantee their reliability and security. This contribution presents an aerial tracking application for these devices, with the aim of providing a tool for tracking and tracing in certain situations. To ensure the reliability of the application, information protection mechanisms to guarantee confidentiality and integrity are included. Three main parts have been considered for the application design: a Web application, an Android application and the backend. The system follows a microservice structure over containers, allowing simple management and distribution. Two modes of operation are supported on the Android application, a Tracker Mode, which will be executed on a smartphone on board a drone (RPA), and a Client Mode executed by mobile devices on the ground. Users in Client Mode employ the Bluetooth Low Energy (BLE) beacon mode to transmit information related to their positioning and trajectory. The user obtains this data via BLE and relays it using the 4G/5G network to a web server. The server allows the graphical representation of the data and its exploitation. Deployment is proposed in different scenarios, such as the supervision and control of public areas with capacity control or the tracking and localization of people in isolated environments.
URI: https://accedacris.ulpgc.es/handle/10553/119681
ISBN: 978-3-031-21332-8
ISSN: 2367-3370
DOI: 10.1007/978-3-031-21333-5_103
Source: Lecture Notes in Networks and Systems [ISSN 2367-3370], v. 594 LNNS, p. 1031–1040, (Noviembre 2022)
Appears in Collections:Actas de congresos
Adobe PDF (1,76 MB)
Show full item record

Page view(s)

122
checked on Feb 22, 2025

Download(s)

11
checked on Feb 22, 2025

Google ScholarTM

Check

Altmetric


Share



Export metadata



Items in accedaCRIS are protected by copyright, with all rights reserved, unless otherwise indicated.