SlideShare a Scribd company logo
1 of 48
A Study of Wireless Technology 
Based Pilgrim Tracking Systems 
Seminar Presentation 
Presented by:- 
Deepak Kumar 
IDD-CSI 
10211009 
Under the guidance of:- 
Dr. Dhaval Patel
Overview 
• Motivation 
• Wireless Technologies 
• System Designs 
• Conclusion
Motivation 
Why do track someone?
Motivation 
Lost person 
Trouble for relatives and authorities 
Language problem 
Children 
Identifying and locating among 
thousands 
A lost child [1]
Motivation 
Stampede 
Overcrowding 
Fire 
Explosion 
Leaves many dead and injured 
Sabarimala stampede [2]
Motivation 
Medical emergency 
Medical history 
Blood group 
Contact family members 
Identifying dead 
JK floods [3]
Motivation 
Flood/earthquake 
Relocating pilgrims 
How many are there? 
Direction of movement 
JK floods [4]
Wireless Technologies 
Utilizing radio waves
Wireless Technologies 
1. RFID 
2. NFC 
3. Wi-Fi 
4. Bluetooth 
5. GPS
RFID 
Radio Frequency Identification
1. Radio Frequency Identification 
• Operates in radio frequency band (3kHz to 300GHz) 
• Automated identification 
• RFID tags for each object to identify 
• Categorising RFID tags based on [6] 
• Source of power 
• Passive 
• Semi-Passive 
• Active 
• Power/data transfer 
• Near-field 
• Far-field 
Waterproof RFID Wristband [5]
Based on Source of Power 
Passive 
• Power from RFID 
reader 
• No battery 
• Short range 
• Low cost 
• Small in size 
• Transmit when read 
by an RFID reader 
Semi-Passive 
• Battery powered 
• Long range 
• Costly 
• Larger in size 
• Transmit when read 
by an RFID reader 
• Battery life around 5 
year 
Active 
• Battery powered 
• Long range 
• Costly 
• Larger size 
• Transmit 
automatically and 
when read by an RFID 
reader 
• Battery life around 5 
year
Based on Power/Data Transfer 
Near-field RFID 
Power transferred using magnetic 
induction 
Data transferred by varying current 
using load modulation 
Range is approximately: 푐/2휋푓 
Used at frequency < 100 MHz 
c: speed of light 
f: frequency of radio wave 
Figure: Near-field power/communication mechanism [6]
Based on Power/Data Transfer 
Far-field RFID 
Power transferred using 
electromagnetic wave capture 
Reflects received signal to transfer 
data by varying antenna’s 
impedance 
Energy received is proportional to 
1/푟4 
Range is 3 to 6 meters 
Used at UHF (Ultra High Frequency) 
Figure: Far-field power/communication mechanism [6]
Effects of RFID Frequency 
Factor Lower Frequency Higher Frequency 
Read range (affected by energy 
Short (in centimeters) Long (in meters) 
contained in radio wave) 
Interference (from Radio reflective 
materials, like beverages, metals) 
Less More 
Data transfer rate Less High 
Cost High Low
Effects of RFID Frequency 
Frequency 
Passive Active 
Range Cost Range Cost 
125-134.3 kHz Low Frequency (LF) 10 cm – 30 cm $1 
13.56 MHz High Frequency (HF) 10 cm – 1.5 m $5 
865-867 MHz Ultra High Frequency 
(UHF) 
1 m – 15 m $0.15 50 m $20 
2.45 or 5.8 GHz Microwave 3 m 30 m $25 
3.1–10 GHz Ultra Wide Band NA up to 200 m $5
Ultra-Wideband (UWB) RFID 
• Operates in 3.1 – 10 GHz band 
• Low power signals on a large range of frequencies instead of a strong 
signal on a particular frequency 
• Energy efficient 
• Battery powered 
• Long read range 
• Less interference 
• Cheaper than Active UHF RFID tags
2. Near Field Communication (NFC) 
• Available on high-end smartphones 
• Operating frequency: 13.56 MHz 
• Data transfer rate: 30 to 60 kbps 
• Compatible with High Frequency RFID tags 
• Can read/write HF RFID tags 
• Short range 
• Theoretical: 20 cm 
• Practical: 5cm 
Figure: Two NFC devices [7] 
• Large amount of data can be transferred by paring up Bluetooth or Wi-Fi 
• NFC chip can be read even if device is switched off
Wi-Fi 
Getting MAC Address
3. Wi-Fi 
• Operates in 2.4GHz and 5GHz bands. 
• Long range (20m to 300m) 
• High data transfer rate 
• Tracking smartphones using Wi-Fi 
• Periodic transmission of probe messages 
• Each frame contains MAC address in plain-text 
• Techniques 
• Passive 
• Active
Passive Wi-Fi Tracking 
• No transmission of frames by Wi-Fi monitor 
• Silently listen to all the frames transmitted by others 
• Problems 
• No control over the transmission time of frames 
• No guarantee of frame transmission 
• A corrupted frame might be dropped 
• More number of frames can provide better accuracy
Active Wi-Fi Tracking 
• Transmission of frames by Wi-Fi monitor to trick smartphone 
• Goal is to increase the 
• Number of devices detected 
• Number of frames transmitted 
• Techniques 
• Advertising popular access point’s SSID 
• Opportunistic access point emulation 
• Sending RTS packets
Advertising Popular Access Point’s SSID 
• Smartphones automatically try to connect to known AP 
• Broadcast beacons containing SSID of popular AP 
• E.g. “attwifi”, “tmobile” 
• No need of fully functional AP 
• Get more frames 
• Emulate fully functional AP 
• Null frames for notifying power state
Opportunistic Access Point Emulation 
• Directed probe request for known networks 
• Contains SSID of the access point, along with other parameters 
• Emulate access point with that SSID 
• Security protocol must match for secured networks 
• Security protocol information is not available in probe request 
Search 
•Probe 
request for 
SSID “A” 
Emulate 
•Emulate AP 
with SSID “A” 
Associate 
•Association 
request for 
SSID “A” 
Wait 
•Null frames 
transmission
Opportunistic Access Point Emulation 
• Emulate multiple security protocols 
• 4-way handshake required for secure 
protocols 
• Requires credentials 
• No need to complete handshake 
• Null frames transmitted until we 
complete handshake for around 10 
seconds 
• After that the process is repeated
Emulating Access Point [8]
Sending RTS Frames to Known Devices 
• No emulation of access points 
• Transmit RTS (request to send) frame to a device 
• In response we get CTS (clear to send) frame 
• CTS doesn’t have transmitter address (TA), only 
receiver address (RA) 
• Set TA to a unique address (UA) in each RTS 
RTS 
(UA, RA) 
CTS 
(UA)
Bluetooth 
Getting MAC Address
4. Bluetooth 
• Operates in 2.4 GHz band 
• Energy efficient (2.5 mW for class 2 devices) 
• Long range (10m to 30m) 
• Decent data transfer speed 
• Tracking methods 
• Inquiry based 
• Inquiry free
Inquiry Based Tracking 
• Transmit discovery packet on predefined 32 channels 
• Discoverable devices respond to this packet 
• Response follows a random delay to minimize collisions 
• Takes around 10 seconds for all devices to respond 
• Problems 
• Requires a device to be discoverable 
• Privacy risk 
• Disrupts normal communication whilst scanning a channel
Inquiry Free Tracking 
• Connection based approach 
• Requires paring up with Bluetooth monitor 
• Send inquiry targeted for a particular device 
• Requires multiple inquiry messages 
• Faster targeted discovery 
• Maximum 7 simultaneous connections to other devices
5. Global Positioning System (GPS) 
• Provides position, velocity and time 
• Position accuracy (outdoor): 2 to 10 meters 
• Position accuracy (indoor): > 100m 
• Global Navigation Satellite System (GLONASS) 
• GPS + GLONASS 
• Better accuracy 
• Faster fix 
• Assisted GPS (A-GPS) 
• Gets the almanac and ephemeris data from the Internet 
• Send the location to the central server
System Designs 
Putting all of the pieces together
System Designs 
• Scalable 
• Should handle real-time location updates of millions of people 
• Reliable 
• Inter-operable and compatible with other systems 
• Components 
• Position data collection techniques 
• Location Based Services (LBS) 
• Finding nearby ATM 
• Traffic information 
• Geographic Information System (GIS)
1. Smartphone + RFID 
• Developed for Hajj 
• RFID tag for each pilgrim 
• App for smartphones with GPS 
• Locating family members or friends 
• Requesting urgent help 
• Map of important locations 
• Control center 
• Visualizing location of all pilgrims on a map 
• Searching for pilgrims based on region, age etc. 
• Maintains database of hospitals, location history, personal information
Smartphone + RFID 
Figure: System architecture [10]
Smartphone + RFID 
• Problems 
• Read range of RFID reader was low 
• Affected by environmental factors 
• Interference from human body 
• Collocated tags 
• Taking back wristband tags 
• Conclusion 
• Not to use wristband RFID tags
2. Smartphone GPS [HajjLocator] 
• Get location from GPS 
• Send location using 
• Wi-Fi 
• 3G 
• SMS (emergency) 
• Update location after certain 
• Time period 
• Distance travelled 
• Geo-fencing 
• Searching for someone 
• Push notifications
Smartphone GPS 
Figure: System architecture [12]
3. Wireless Sensor Network (WSN) 
• Developed for Hajj 
• Need for tracking in addition to identification 
• A sensor unit for each pilgrim 
• Mobile sensor unit consists of 
• GPS 
• Microcontroller 
• Antenna 
• Battery 
• ZigBee radio 
• Fixed master units 
• Get position data from mobile sensor units 
• Send this data to central server by routing through other fixed units
Wireless Sensor Network 
• Node configurations 
• End nodes 
• Routers 
• Gateways 
• Information packet 
• UID number 
• Latitude 
• Longitude 
• Time 
• Searching for someone 
• Routing multiple queries in parallel 
• Based on previous known location 
• Very high cost 
• Comparable with smartphone 
Figure: Node configurations [9]
4. Bluetooth 
• Networked host machines with Bluetooth class 2 devices 
• Current position of all devices stored on central system 
• Ask a host which is probably near to a device 
• Frequent connection and disconnection 
• Clock synchronization for faster connection time 
• Distribute clock information to other hosts 
• Can tolerate an error up to 10.24 seconds 
• Average connection time after utilizing clock information: 0.64 seconds
5. Wi-Fi Monitors 
• Designed for tracking smartphones on a street for traffic flow and 
congestion monitoring 
• Wi-Fi monitor: standard AP with custom firmware 
• MAC address + signal strength 
• Monitors were 400 meters apart 
• Mean error: 70m 
• Problems 
• A phone may pass a monitor without transmitting any frame and remain undetected. 
• Techniques for increasing frame transmission 
• Stationary devices 
• Maintain blacklist
Wi-Fi + Bluetooth 
Figure: Meshlium Scanner [11]
Summary 
Technology Distance Power 
consumed 
Cost Remarks 
RFID (Passive) < 3 m No battery Very Low Best suited for identification 
RFID (Active) ~ 100 m Very Low Low Interference from human body 
NFC ~ 4 cm No battery High Can read/write RFID tags 
Bluetooth 10 m – 30 m Low High High availability in phones 
Wi-Fi 20 m – 200 m High High Drains battery of smartphone 
GPS + 
Networking 
Anywhere on 
earth surface 
High Very High Requires an app to be installed in 
smartphone
Conclusion 
• Passive UHF RFID tags are cost effective but their range is limited to 3 
meters. 
• UWB tags can provide long range but are more expensive. 
• Using smartphone GPS is best for real-time tracking but require active 
Internet connection. 
• Bluetooth and Wi-Fi based methods are independent of OS of 
smartphone and don’t require Internet connection. 
• None of the system discussed address the issue of scalability. 
• None of the methods are without drawbacks.
References 
1. http://www.thewonderoflight.com/fiap-awards-2/b1-lost-child/ 
2. http://news.oneindia.in/feature/2011/sabarimala-stampede-deadly-accident-for-hindu-pilgrims.html 
3. http://www.swadeshnews.com/latest/unprecedented-rains-unplanned-urbanisation-behind-jk-floods 
4. http://indiatoday.intoday.in/technology/story/kashmir-floods-live-jammu-and-kashmir-rescue-motor-boats-vaishno-devi/1/381531.html 
5. http://en.asiadcp.com/company/productinfo.php?pid=60658&upcid=10482&id=128214 
6. R. Want, “An Introduction to RFID technology,” Pervasive Computing, IEEE, vol. 5, no. 1, pp. 25-33, 2006. 
7. http://www.nokia.com/mea-en/support/product/c7-00/userguidance/?action=singleTopic&topic=GUID-0D70FE24-64A1-4DB9-A6D2- 
2355C10847D9 
8. A. Musa and J. Eriksson, “Tracking Unmodified Smartphones Using Wi-Fi Monitors,” in ACM Conference on Embedded Networked Sensor Systems 
(SenSys), 2012. 
9. M. Mohandes, M. A. Haleem, A. Abul-Hussain and K. Balakrishnan, “Pilgrims Tracking Using Wireless Sensor Network,” in International Conference 
on Advanced Information Networking and Applications (WAINA), Biopolis, 2011. 
10. R. O. Mitchell, H. Rashid, F. Dawood and A. AlKhalidi, “Hajj Crowd Management and Navigation System,” in International Conference on Computer 
Applications in Technology (ICCAT), 2013. 
11. http://www.libelium.com/meshlium-scanner-smartphone-detection-improved-iphone-android-devices-mobiles-cellulars-bluetooth-wifi/ 
12. T. Mantoro, A. D. Jaafar, M. F. M. Aris and M. A. Ayu, “HajjLocator: A Hajj Pilgrimage Tracking Framework in Crowded Ubiquitous Environment,” in 
International Conference on Multimedia Computing and Systems (ICMCS), 2011.
A Study of Wireless Technology Based Pilgrim Tracking Systems

More Related Content

What's hot

Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey915086731
 
A Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless SensorsA Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless SensorsKarthik Mohan
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksGodspowerAgbulu
 
Wireless sensor networks localization algorithms a comprehensive survey
Wireless sensor networks localization algorithms a comprehensive surveyWireless sensor networks localization algorithms a comprehensive survey
Wireless sensor networks localization algorithms a comprehensive surveyIJCNCJournal
 
Monitoring Remote Areas Using Wireless Mote Networks
Monitoring Remote Areas Using Wireless Mote NetworksMonitoring Remote Areas Using Wireless Mote Networks
Monitoring Remote Areas Using Wireless Mote NetworksDr. Jack Driscoll
 
wireless sensor networks & application :forest fire detection
 wireless sensor networks  & application :forest fire detection wireless sensor networks  & application :forest fire detection
wireless sensor networks & application :forest fire detectionMueenudheen Shafaquath V P
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksZaahir Salam
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsnnehabsairam
 
Wi-Fi based indoor positioning
Wi-Fi based indoor positioningWi-Fi based indoor positioning
Wi-Fi based indoor positioningSherwin Rodrigues
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkIOSR Journals
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKRutvik Pensionwar
 
Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksSouhaiel tekaya
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKNishant Bhardwaj
 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2gamalsallam1989
 

What's hot (20)

Localization in wsn
Localization in wsnLocalization in wsn
Localization in wsn
 
Unit1
Unit1Unit1
Unit1
 
Wireless sensor network survey
Wireless sensor network surveyWireless sensor network survey
Wireless sensor network survey
 
A Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless SensorsA Survey on Localization of Wireless Sensors
A Survey on Localization of Wireless Sensors
 
FINAL
FINALFINAL
FINAL
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
Wireless sensor networks localization algorithms a comprehensive survey
Wireless sensor networks localization algorithms a comprehensive surveyWireless sensor networks localization algorithms a comprehensive survey
Wireless sensor networks localization algorithms a comprehensive survey
 
Monitoring Remote Areas Using Wireless Mote Networks
Monitoring Remote Areas Using Wireless Mote NetworksMonitoring Remote Areas Using Wireless Mote Networks
Monitoring Remote Areas Using Wireless Mote Networks
 
wireless sensor networks & application :forest fire detection
 wireless sensor networks  & application :forest fire detection wireless sensor networks  & application :forest fire detection
wireless sensor networks & application :forest fire detection
 
Sensor Network
Sensor NetworkSensor Network
Sensor Network
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 
localization in wsn
localization in wsnlocalization in wsn
localization in wsn
 
P1121106496
P1121106496P1121106496
P1121106496
 
Wi-Fi based indoor positioning
Wi-Fi based indoor positioningWi-Fi based indoor positioning
Wi-Fi based indoor positioning
 
An Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor NetworkAn Efficient Approach for Outlier Detection in Wireless Sensor Network
An Efficient Approach for Outlier Detection in Wireless Sensor Network
 
Wsn
WsnWsn
Wsn
 
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORKComplete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
Complete report on DATA ACQUISITION SCHEME IN WIRELESS SENSOR NETWORK
 
Issues of Wireless Sensor Networks
Issues of Wireless Sensor NetworksIssues of Wireless Sensor Networks
Issues of Wireless Sensor Networks
 
Report on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORKReport on WIRELESS SENSOR NETWORK
Report on WIRELESS SENSOR NETWORK
 
Sensor Localization presentation1&2
Sensor Localization  presentation1&2Sensor Localization  presentation1&2
Sensor Localization presentation1&2
 

Viewers also liked

Optical communication system using Probability and Random Process
Optical communication system using Probability and Random ProcessOptical communication system using Probability and Random Process
Optical communication system using Probability and Random ProcessRishabh Rastogi
 
Ekahau
EkahauEkahau
EkahauMarc
 
Tracking positioning-of-mobiles
Tracking positioning-of-mobilesTracking positioning-of-mobiles
Tracking positioning-of-mobilesAnkur Kumar
 
Beacon Security
Beacon SecurityBeacon Security
Beacon Securitykontakt.io
 
Location Engine Overview
Location Engine Overview Location Engine Overview
Location Engine Overview kontakt.io
 
Mobile Beacon SDK- Getting-started (Traditional Chinese)
Mobile Beacon SDK- Getting-started (Traditional Chinese)Mobile Beacon SDK- Getting-started (Traditional Chinese)
Mobile Beacon SDK- Getting-started (Traditional Chinese)qumedia
 
Real-time asset tracking with beacons
Real-time asset tracking with beacons Real-time asset tracking with beacons
Real-time asset tracking with beacons kontakt.io
 
Magnetic Position Sensors
Magnetic Position Sensors Magnetic Position Sensors
Magnetic Position Sensors HEINZ OYRER
 
Indoor Positioning Systems
Indoor Positioning SystemsIndoor Positioning Systems
Indoor Positioning SystemsProjectENhANCE
 
What are beacons and how do they work?
What are beacons and how do they work?What are beacons and how do they work?
What are beacons and how do they work?kontakt.io
 
Vpon - 廣告效果導向為基礎的行動廣告系統
Vpon - 廣告效果導向為基礎的行動廣告系統Vpon - 廣告效果導向為基礎的行動廣告系統
Vpon - 廣告效果導向為基礎的行動廣告系統Vpon
 
Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.iCreateWorld
 
BEACON TECHNOLOGY OVERVIEW
BEACON TECHNOLOGY OVERVIEWBEACON TECHNOLOGY OVERVIEW
BEACON TECHNOLOGY OVERVIEWDonnovan Andrews
 
NFC & RFID on Android
NFC & RFID on AndroidNFC & RFID on Android
NFC & RFID on Androidtodbotdotcom
 

Viewers also liked (15)

Optical communication system using Probability and Random Process
Optical communication system using Probability and Random ProcessOptical communication system using Probability and Random Process
Optical communication system using Probability and Random Process
 
Ekahau
EkahauEkahau
Ekahau
 
Tracking positioning-of-mobiles
Tracking positioning-of-mobilesTracking positioning-of-mobiles
Tracking positioning-of-mobiles
 
Beacon Security
Beacon SecurityBeacon Security
Beacon Security
 
Location Engine Overview
Location Engine Overview Location Engine Overview
Location Engine Overview
 
Mobile Beacon SDK- Getting-started (Traditional Chinese)
Mobile Beacon SDK- Getting-started (Traditional Chinese)Mobile Beacon SDK- Getting-started (Traditional Chinese)
Mobile Beacon SDK- Getting-started (Traditional Chinese)
 
Real-time asset tracking with beacons
Real-time asset tracking with beacons Real-time asset tracking with beacons
Real-time asset tracking with beacons
 
Ultra wide band
Ultra wide bandUltra wide band
Ultra wide band
 
Magnetic Position Sensors
Magnetic Position Sensors Magnetic Position Sensors
Magnetic Position Sensors
 
Indoor Positioning Systems
Indoor Positioning SystemsIndoor Positioning Systems
Indoor Positioning Systems
 
What are beacons and how do they work?
What are beacons and how do they work?What are beacons and how do they work?
What are beacons and how do they work?
 
Vpon - 廣告效果導向為基礎的行動廣告系統
Vpon - 廣告效果導向為基礎的行動廣告系統Vpon - 廣告效果導向為基礎的行動廣告系統
Vpon - 廣告效果導向為基礎的行動廣告系統
 
Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.Location Tracking of Android Device Based on SMS.
Location Tracking of Android Device Based on SMS.
 
BEACON TECHNOLOGY OVERVIEW
BEACON TECHNOLOGY OVERVIEWBEACON TECHNOLOGY OVERVIEW
BEACON TECHNOLOGY OVERVIEW
 
NFC & RFID on Android
NFC & RFID on AndroidNFC & RFID on Android
NFC & RFID on Android
 

Similar to A Study of Wireless Technology Based Pilgrim Tracking Systems

15226131 pss7
15226131 pss715226131 pss7
15226131 pss7kayi0920
 
15226131 pss7
15226131 pss715226131 pss7
15226131 pss7kayi0920
 
BT_Wifi_NFC.pdf
BT_Wifi_NFC.pdfBT_Wifi_NFC.pdf
BT_Wifi_NFC.pdfparthasrk
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2NEEVEE Technologies
 
15224198 pps7-ans
15224198 pps7-ans15224198 pps7-ans
15224198 pps7-ansTung Ko
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level Samit Singh
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologiesInocentshuja Ahmad
 
13213652 pss7
13213652 pss713213652 pss7
13213652 pss713213652
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)Sam Bowne
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)Sam Bowne
 
15216691 pss7-ans
15216691 pss7-ans15216691 pss7-ans
15216691 pss7-ansjackylou123
 
13213652 pss7
13213652 pss713213652 pss7
13213652 pss713213652
 

Similar to A Study of Wireless Technology Based Pilgrim Tracking Systems (20)

15226131 pss7
15226131 pss715226131 pss7
15226131 pss7
 
15226131 pss7
15226131 pss715226131 pss7
15226131 pss7
 
BT_Wifi_NFC.pdf
BT_Wifi_NFC.pdfBT_Wifi_NFC.pdf
BT_Wifi_NFC.pdf
 
15200787 pss7-ans
15200787 pss7-ans15200787 pss7-ans
15200787 pss7-ans
 
Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2Internet of Things Protocol - Session 2
Internet of Things Protocol - Session 2
 
13203177 pss7
13203177 pss713203177 pss7
13203177 pss7
 
13200798 pss7
13200798 pss713200798 pss7
13200798 pss7
 
RFID Applications
RFID Applications RFID Applications
RFID Applications
 
15224198 pps7-ans
15224198 pps7-ans15224198 pps7-ans
15224198 pps7-ans
 
internet network for o level
 internet network for o level  internet network for o level
internet network for o level
 
2nd lec wireless terminologies
2nd lec   wireless terminologies2nd lec   wireless terminologies
2nd lec wireless terminologies
 
Indoor Tracking System
Indoor Tracking SystemIndoor Tracking System
Indoor Tracking System
 
13213652 pss7
13213652 pss713213652 pss7
13213652 pss7
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
 
IOT technology-standards
IOT technology-standardsIOT technology-standards
IOT technology-standards
 
15216691 pss7-ans
15216691 pss7-ans15216691 pss7-ans
15216691 pss7-ans
 
13213652 pss7
13213652 pss713213652 pss7
13213652 pss7
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 
15224902 pss7-ans
15224902 pss7-ans15224902 pss7-ans
15224902 pss7-ans
 

Recently uploaded

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...RajaP95
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 

Recently uploaded (20)

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
IMPLICATIONS OF THE ABOVE HOLISTIC UNDERSTANDING OF HARMONY ON PROFESSIONAL E...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 

A Study of Wireless Technology Based Pilgrim Tracking Systems

  • 1. A Study of Wireless Technology Based Pilgrim Tracking Systems Seminar Presentation Presented by:- Deepak Kumar IDD-CSI 10211009 Under the guidance of:- Dr. Dhaval Patel
  • 2. Overview • Motivation • Wireless Technologies • System Designs • Conclusion
  • 3. Motivation Why do track someone?
  • 4. Motivation Lost person Trouble for relatives and authorities Language problem Children Identifying and locating among thousands A lost child [1]
  • 5. Motivation Stampede Overcrowding Fire Explosion Leaves many dead and injured Sabarimala stampede [2]
  • 6. Motivation Medical emergency Medical history Blood group Contact family members Identifying dead JK floods [3]
  • 7. Motivation Flood/earthquake Relocating pilgrims How many are there? Direction of movement JK floods [4]
  • 9. Wireless Technologies 1. RFID 2. NFC 3. Wi-Fi 4. Bluetooth 5. GPS
  • 10. RFID Radio Frequency Identification
  • 11. 1. Radio Frequency Identification • Operates in radio frequency band (3kHz to 300GHz) • Automated identification • RFID tags for each object to identify • Categorising RFID tags based on [6] • Source of power • Passive • Semi-Passive • Active • Power/data transfer • Near-field • Far-field Waterproof RFID Wristband [5]
  • 12. Based on Source of Power Passive • Power from RFID reader • No battery • Short range • Low cost • Small in size • Transmit when read by an RFID reader Semi-Passive • Battery powered • Long range • Costly • Larger in size • Transmit when read by an RFID reader • Battery life around 5 year Active • Battery powered • Long range • Costly • Larger size • Transmit automatically and when read by an RFID reader • Battery life around 5 year
  • 13. Based on Power/Data Transfer Near-field RFID Power transferred using magnetic induction Data transferred by varying current using load modulation Range is approximately: 푐/2휋푓 Used at frequency < 100 MHz c: speed of light f: frequency of radio wave Figure: Near-field power/communication mechanism [6]
  • 14. Based on Power/Data Transfer Far-field RFID Power transferred using electromagnetic wave capture Reflects received signal to transfer data by varying antenna’s impedance Energy received is proportional to 1/푟4 Range is 3 to 6 meters Used at UHF (Ultra High Frequency) Figure: Far-field power/communication mechanism [6]
  • 15. Effects of RFID Frequency Factor Lower Frequency Higher Frequency Read range (affected by energy Short (in centimeters) Long (in meters) contained in radio wave) Interference (from Radio reflective materials, like beverages, metals) Less More Data transfer rate Less High Cost High Low
  • 16. Effects of RFID Frequency Frequency Passive Active Range Cost Range Cost 125-134.3 kHz Low Frequency (LF) 10 cm – 30 cm $1 13.56 MHz High Frequency (HF) 10 cm – 1.5 m $5 865-867 MHz Ultra High Frequency (UHF) 1 m – 15 m $0.15 50 m $20 2.45 or 5.8 GHz Microwave 3 m 30 m $25 3.1–10 GHz Ultra Wide Band NA up to 200 m $5
  • 17. Ultra-Wideband (UWB) RFID • Operates in 3.1 – 10 GHz band • Low power signals on a large range of frequencies instead of a strong signal on a particular frequency • Energy efficient • Battery powered • Long read range • Less interference • Cheaper than Active UHF RFID tags
  • 18. 2. Near Field Communication (NFC) • Available on high-end smartphones • Operating frequency: 13.56 MHz • Data transfer rate: 30 to 60 kbps • Compatible with High Frequency RFID tags • Can read/write HF RFID tags • Short range • Theoretical: 20 cm • Practical: 5cm Figure: Two NFC devices [7] • Large amount of data can be transferred by paring up Bluetooth or Wi-Fi • NFC chip can be read even if device is switched off
  • 19. Wi-Fi Getting MAC Address
  • 20. 3. Wi-Fi • Operates in 2.4GHz and 5GHz bands. • Long range (20m to 300m) • High data transfer rate • Tracking smartphones using Wi-Fi • Periodic transmission of probe messages • Each frame contains MAC address in plain-text • Techniques • Passive • Active
  • 21. Passive Wi-Fi Tracking • No transmission of frames by Wi-Fi monitor • Silently listen to all the frames transmitted by others • Problems • No control over the transmission time of frames • No guarantee of frame transmission • A corrupted frame might be dropped • More number of frames can provide better accuracy
  • 22. Active Wi-Fi Tracking • Transmission of frames by Wi-Fi monitor to trick smartphone • Goal is to increase the • Number of devices detected • Number of frames transmitted • Techniques • Advertising popular access point’s SSID • Opportunistic access point emulation • Sending RTS packets
  • 23. Advertising Popular Access Point’s SSID • Smartphones automatically try to connect to known AP • Broadcast beacons containing SSID of popular AP • E.g. “attwifi”, “tmobile” • No need of fully functional AP • Get more frames • Emulate fully functional AP • Null frames for notifying power state
  • 24. Opportunistic Access Point Emulation • Directed probe request for known networks • Contains SSID of the access point, along with other parameters • Emulate access point with that SSID • Security protocol must match for secured networks • Security protocol information is not available in probe request Search •Probe request for SSID “A” Emulate •Emulate AP with SSID “A” Associate •Association request for SSID “A” Wait •Null frames transmission
  • 25. Opportunistic Access Point Emulation • Emulate multiple security protocols • 4-way handshake required for secure protocols • Requires credentials • No need to complete handshake • Null frames transmitted until we complete handshake for around 10 seconds • After that the process is repeated
  • 27. Sending RTS Frames to Known Devices • No emulation of access points • Transmit RTS (request to send) frame to a device • In response we get CTS (clear to send) frame • CTS doesn’t have transmitter address (TA), only receiver address (RA) • Set TA to a unique address (UA) in each RTS RTS (UA, RA) CTS (UA)
  • 29. 4. Bluetooth • Operates in 2.4 GHz band • Energy efficient (2.5 mW for class 2 devices) • Long range (10m to 30m) • Decent data transfer speed • Tracking methods • Inquiry based • Inquiry free
  • 30. Inquiry Based Tracking • Transmit discovery packet on predefined 32 channels • Discoverable devices respond to this packet • Response follows a random delay to minimize collisions • Takes around 10 seconds for all devices to respond • Problems • Requires a device to be discoverable • Privacy risk • Disrupts normal communication whilst scanning a channel
  • 31. Inquiry Free Tracking • Connection based approach • Requires paring up with Bluetooth monitor • Send inquiry targeted for a particular device • Requires multiple inquiry messages • Faster targeted discovery • Maximum 7 simultaneous connections to other devices
  • 32. 5. Global Positioning System (GPS) • Provides position, velocity and time • Position accuracy (outdoor): 2 to 10 meters • Position accuracy (indoor): > 100m • Global Navigation Satellite System (GLONASS) • GPS + GLONASS • Better accuracy • Faster fix • Assisted GPS (A-GPS) • Gets the almanac and ephemeris data from the Internet • Send the location to the central server
  • 33. System Designs Putting all of the pieces together
  • 34. System Designs • Scalable • Should handle real-time location updates of millions of people • Reliable • Inter-operable and compatible with other systems • Components • Position data collection techniques • Location Based Services (LBS) • Finding nearby ATM • Traffic information • Geographic Information System (GIS)
  • 35. 1. Smartphone + RFID • Developed for Hajj • RFID tag for each pilgrim • App for smartphones with GPS • Locating family members or friends • Requesting urgent help • Map of important locations • Control center • Visualizing location of all pilgrims on a map • Searching for pilgrims based on region, age etc. • Maintains database of hospitals, location history, personal information
  • 36. Smartphone + RFID Figure: System architecture [10]
  • 37. Smartphone + RFID • Problems • Read range of RFID reader was low • Affected by environmental factors • Interference from human body • Collocated tags • Taking back wristband tags • Conclusion • Not to use wristband RFID tags
  • 38. 2. Smartphone GPS [HajjLocator] • Get location from GPS • Send location using • Wi-Fi • 3G • SMS (emergency) • Update location after certain • Time period • Distance travelled • Geo-fencing • Searching for someone • Push notifications
  • 39. Smartphone GPS Figure: System architecture [12]
  • 40. 3. Wireless Sensor Network (WSN) • Developed for Hajj • Need for tracking in addition to identification • A sensor unit for each pilgrim • Mobile sensor unit consists of • GPS • Microcontroller • Antenna • Battery • ZigBee radio • Fixed master units • Get position data from mobile sensor units • Send this data to central server by routing through other fixed units
  • 41. Wireless Sensor Network • Node configurations • End nodes • Routers • Gateways • Information packet • UID number • Latitude • Longitude • Time • Searching for someone • Routing multiple queries in parallel • Based on previous known location • Very high cost • Comparable with smartphone Figure: Node configurations [9]
  • 42. 4. Bluetooth • Networked host machines with Bluetooth class 2 devices • Current position of all devices stored on central system • Ask a host which is probably near to a device • Frequent connection and disconnection • Clock synchronization for faster connection time • Distribute clock information to other hosts • Can tolerate an error up to 10.24 seconds • Average connection time after utilizing clock information: 0.64 seconds
  • 43. 5. Wi-Fi Monitors • Designed for tracking smartphones on a street for traffic flow and congestion monitoring • Wi-Fi monitor: standard AP with custom firmware • MAC address + signal strength • Monitors were 400 meters apart • Mean error: 70m • Problems • A phone may pass a monitor without transmitting any frame and remain undetected. • Techniques for increasing frame transmission • Stationary devices • Maintain blacklist
  • 44. Wi-Fi + Bluetooth Figure: Meshlium Scanner [11]
  • 45. Summary Technology Distance Power consumed Cost Remarks RFID (Passive) < 3 m No battery Very Low Best suited for identification RFID (Active) ~ 100 m Very Low Low Interference from human body NFC ~ 4 cm No battery High Can read/write RFID tags Bluetooth 10 m – 30 m Low High High availability in phones Wi-Fi 20 m – 200 m High High Drains battery of smartphone GPS + Networking Anywhere on earth surface High Very High Requires an app to be installed in smartphone
  • 46. Conclusion • Passive UHF RFID tags are cost effective but their range is limited to 3 meters. • UWB tags can provide long range but are more expensive. • Using smartphone GPS is best for real-time tracking but require active Internet connection. • Bluetooth and Wi-Fi based methods are independent of OS of smartphone and don’t require Internet connection. • None of the system discussed address the issue of scalability. • None of the methods are without drawbacks.
  • 47. References 1. http://www.thewonderoflight.com/fiap-awards-2/b1-lost-child/ 2. http://news.oneindia.in/feature/2011/sabarimala-stampede-deadly-accident-for-hindu-pilgrims.html 3. http://www.swadeshnews.com/latest/unprecedented-rains-unplanned-urbanisation-behind-jk-floods 4. http://indiatoday.intoday.in/technology/story/kashmir-floods-live-jammu-and-kashmir-rescue-motor-boats-vaishno-devi/1/381531.html 5. http://en.asiadcp.com/company/productinfo.php?pid=60658&upcid=10482&id=128214 6. R. Want, “An Introduction to RFID technology,” Pervasive Computing, IEEE, vol. 5, no. 1, pp. 25-33, 2006. 7. http://www.nokia.com/mea-en/support/product/c7-00/userguidance/?action=singleTopic&topic=GUID-0D70FE24-64A1-4DB9-A6D2- 2355C10847D9 8. A. Musa and J. Eriksson, “Tracking Unmodified Smartphones Using Wi-Fi Monitors,” in ACM Conference on Embedded Networked Sensor Systems (SenSys), 2012. 9. M. Mohandes, M. A. Haleem, A. Abul-Hussain and K. Balakrishnan, “Pilgrims Tracking Using Wireless Sensor Network,” in International Conference on Advanced Information Networking and Applications (WAINA), Biopolis, 2011. 10. R. O. Mitchell, H. Rashid, F. Dawood and A. AlKhalidi, “Hajj Crowd Management and Navigation System,” in International Conference on Computer Applications in Technology (ICCAT), 2013. 11. http://www.libelium.com/meshlium-scanner-smartphone-detection-improved-iphone-android-devices-mobiles-cellulars-bluetooth-wifi/ 12. T. Mantoro, A. D. Jaafar, M. F. M. Aris and M. A. Ayu, “HajjLocator: A Hajj Pilgrimage Tracking Framework in Crowded Ubiquitous Environment,” in International Conference on Multimedia Computing and Systems (ICMCS), 2011.