SlideShare une entreprise Scribd logo
1  sur  18
Geofence and Network
Proximity
Dmitry Namiot Lomonosov Moscow State University
dnamiot@gmail.com
Manfred Sneps-Sneppe ZNIIS, M2M Competence Center
manfreds.sneps@gmail.com
RUSMART 2013
• Many of modern location-based services are often
based on an area or place as opposed to an
accurate determination of the precise location.
• Geo-fencing approach is based on the observation
that users move from one place to another and then
stay at that place for a while.
• As per geo-fencing approach they could be
described (defined) as some geographic areas
bounded by polygons.
• In this article we replace geo-based boundaries
with network proximity rules.
About
Contents
Introduction
Passive Wi-Fi monitoring
Cloud Messaging
Local area messaging mashup
Conclusion
Passive Wi-Fi monitoring
• Wi-Fi probe request
• Client (even not
connected) can send
requests to AP
• AP can analyze
requests
• We can collect MAC-
addresses for clients
Advantages and disadvantages
for passive monitoring
• It does not require special mobile applications
• For mobile users it works automatically and
transparently
• It is anonymous monitoring. MAC address is
used for re-identification only. It could be
replaced with some hash-code (privacy)
• It is not 100% reliable. There is no warranty
that Wi-Fi client will send probe request. Our
own experiments and references show 70%-80%
detection rate.
Passive monitoring examples
Navizon
Passive monitoring examples.
Cisco MSE
Passive monitoring examples.
Libelium
Examples: visits per hour
Examples: devices
Cloud Messaging
• Cloud infrastructure
from vendor
• Google, Apple,
Microsoft, Nokia –
own cloud based
infrastructures for
notifications
• Google message: 4
Kb payload delivery
Google Cloud Messages
Key moments for Cloud Messaging
• Application registers with Cloud Messaging
• Application provides a key from Cloud
Messaging server (subscribes) to the particular
application (Sender)
• Sender saves keys and uses them later for
delivering notifications
• Key moment – subscription is activated from the
mobile application on the particular phone.
Spotique mashup
• Let us extend the subscription process
• Mobile application (mobile phone, actually)
will provide a key for notification and MAC-
address for identification
• Sender can compare saved MAC-
addresses with the MAC-addresses,
collected by the passive monitoring
• Key idea: get subscribers who are nearby
at this moment
Spotique mashup - 2
• Server-side based schema for our SpotEx
model
• Sender can deliver notifications to those,
who are nearby only.
• It is real-time detection
• MAC-address is used for the re-
identification only. So, it could be replaced
with some hash-code (privacy)
Use cases
• Proximity marketing
• Deliver local area messages in retail
• Hyper-local news delivery in campuses.
Tested in Lomonosov Moscow State
University
• Smart Cities information delivery
Conclusion
• A new mashup based on passive Wi-Fi monitoring forA new mashup based on passive Wi-Fi monitoring for
mobile devices and cloud based notifications.mobile devices and cloud based notifications.
• Passive monitoring uses probe requests from Wi-FiPassive monitoring uses probe requests from Wi-Fi
specifications for detecting nearby clients.specifications for detecting nearby clients.
• Notification module uses cloud messaging (pushNotification module uses cloud messaging (push
notifications) from mobile operational systems.notifications) from mobile operational systems.
• This application does not publish location info in theThis application does not publish location info in the
social network (it is not a check-in).social network (it is not a check-in).
• Custom messages will target online subscribers inCustom messages will target online subscribers in
the nearby area only.the nearby area only.
About us
International team: Russia - LatviaInternational team: Russia - Latvia ((Moscow –Moscow –
Riga – VentspilsRiga – Ventspils).). Big history of developingBig history of developing
innovative telecom and software services,innovative telecom and software services,
international contests awardsinternational contests awards
Research areas are:Research areas are:
open API for telecom,open API for telecom,
web access for telecom data,web access for telecom data,
Smart Cities,Smart Cities,
M2M applications, context-aware computingM2M applications, context-aware computing..

Contenu connexe

En vedette

Location Based Marketing: what's in for me?
Location Based Marketing: what's in for me?Location Based Marketing: what's in for me?
Location Based Marketing: what's in for me?
Rik Lagey
 
How to Get More Customers to Your Restaurant with Mobile Marketing
How to Get More Customers to Your Restaurant with Mobile MarketingHow to Get More Customers to Your Restaurant with Mobile Marketing
How to Get More Customers to Your Restaurant with Mobile Marketing
Purplegator
 

En vedette (20)

How Geo-Fencing Can Help Your Business
How Geo-Fencing Can Help Your BusinessHow Geo-Fencing Can Help Your Business
How Geo-Fencing Can Help Your Business
 
Mobile marketing for geo fencing.
Mobile marketing for geo fencing. Mobile marketing for geo fencing.
Mobile marketing for geo fencing.
 
Using geo-fencing, chat, push notifications and video calling to engage your ...
Using geo-fencing, chat, push notifications and video calling to engage your ...Using geo-fencing, chat, push notifications and video calling to engage your ...
Using geo-fencing, chat, push notifications and video calling to engage your ...
 
Management of Geo-Fencing - Alarm Zones & User's Location - Technical Approaches
Management of Geo-Fencing - Alarm Zones & User's Location - Technical ApproachesManagement of Geo-Fencing - Alarm Zones & User's Location - Technical Approaches
Management of Geo-Fencing - Alarm Zones & User's Location - Technical Approaches
 
Location Based Services 101
Location Based Services 101Location Based Services 101
Location Based Services 101
 
infinions.io - The Internet of Things - Geo Fencing
infinions.io - The Internet of Things - Geo Fencinginfinions.io - The Internet of Things - Geo Fencing
infinions.io - The Internet of Things - Geo Fencing
 
Location Based Marketing: what's in for me?
Location Based Marketing: what's in for me?Location Based Marketing: what's in for me?
Location Based Marketing: what's in for me?
 
GrowCommerce 2016 — Fireside Chat on Proximity Marketing
GrowCommerce 2016 — Fireside Chat on Proximity MarketingGrowCommerce 2016 — Fireside Chat on Proximity Marketing
GrowCommerce 2016 — Fireside Chat on Proximity Marketing
 
Leveraging Geo-Fencing in Campaigns – Driving Conversions
Leveraging Geo-Fencing in Campaigns – Driving ConversionsLeveraging Geo-Fencing in Campaigns – Driving Conversions
Leveraging Geo-Fencing in Campaigns – Driving Conversions
 
How to Get More Customers to Your Restaurant with Mobile Marketing
How to Get More Customers to Your Restaurant with Mobile MarketingHow to Get More Customers to Your Restaurant with Mobile Marketing
How to Get More Customers to Your Restaurant with Mobile Marketing
 
GrowthStack 2016 — Scale and Acquire New Users: Growth Workshop, Led by Facebook
GrowthStack 2016 — Scale and Acquire New Users: Growth Workshop, Led by FacebookGrowthStack 2016 — Scale and Acquire New Users: Growth Workshop, Led by Facebook
GrowthStack 2016 — Scale and Acquire New Users: Growth Workshop, Led by Facebook
 
Beacon, proximity marketing e user experience - Todi Appy Days 2015
Beacon, proximity marketing e user experience - Todi Appy Days 2015Beacon, proximity marketing e user experience - Todi Appy Days 2015
Beacon, proximity marketing e user experience - Todi Appy Days 2015
 
MaxAxion & StrikeAd Geo-fencing and Geo-Audiences
MaxAxion & StrikeAd Geo-fencing and Geo-AudiencesMaxAxion & StrikeAd Geo-fencing and Geo-Audiences
MaxAxion & StrikeAd Geo-fencing and Geo-Audiences
 
Geofencing for mobile applications
Geofencing for mobile applicationsGeofencing for mobile applications
Geofencing for mobile applications
 
GPS & Geo-Fencing
GPS & Geo-FencingGPS & Geo-Fencing
GPS & Geo-Fencing
 
Thailand's Mobile Market Information 2014
Thailand's Mobile Market Information 2014Thailand's Mobile Market Information 2014
Thailand's Mobile Market Information 2014
 
Location Based Mobile Marketing | Non-App Geofencing By Thumbvista
Location Based Mobile Marketing | Non-App Geofencing By ThumbvistaLocation Based Mobile Marketing | Non-App Geofencing By Thumbvista
Location Based Mobile Marketing | Non-App Geofencing By Thumbvista
 
Location-based services and startups: Trends, observations and investment themes
Location-based services and startups: Trends, observations and investment themesLocation-based services and startups: Trends, observations and investment themes
Location-based services and startups: Trends, observations and investment themes
 
Your Guide to Planning a Successful Beacon Pilot
Your Guide to Planning a Successful Beacon PilotYour Guide to Planning a Successful Beacon Pilot
Your Guide to Planning a Successful Beacon Pilot
 
Geo-Location/Geo-Fencing
Geo-Location/Geo-FencingGeo-Location/Geo-Fencing
Geo-Location/Geo-Fencing
 

Similaire à Geofence and Network Proximity

Similaire à Geofence and Network Proximity (20)

Proximity as a service
Proximity as a serviceProximity as a service
Proximity as a service
 
Wi-Fi proximity and context-aware browsing
Wi-Fi proximity and context-aware browsingWi-Fi proximity and context-aware browsing
Wi-Fi proximity and context-aware browsing
 
Bluetooth Data Points
Bluetooth Data PointsBluetooth Data Points
Bluetooth Data Points
 
Wireless Networks Sensors and Social Streams
Wireless Networks Sensors and Social Streams  Wireless Networks Sensors and Social Streams
Wireless Networks Sensors and Social Streams
 
Wi-Fi proiximity as a service
Wi-Fi proiximity as a serviceWi-Fi proiximity as a service
Wi-Fi proiximity as a service
 
On hyper-local web pages
On hyper-local web pagesOn hyper-local web pages
On hyper-local web pages
 
Cars as Tags
Cars as TagsCars as Tags
Cars as Tags
 
M2M.pptx
M2M.pptxM2M.pptx
M2M.pptx
 
On Crowd-sensing back-end
On Crowd-sensing back-endOn Crowd-sensing back-end
On Crowd-sensing back-end
 
Wap & WML
Wap & WMLWap & WML
Wap & WML
 
Hotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and ChallengesHotspot 2.0 - Concept and Challenges
Hotspot 2.0 - Concept and Challenges
 
Indoor Positioning Systems
Indoor Positioning SystemsIndoor Positioning Systems
Indoor Positioning Systems
 
Context-Aware Data Discovery
Context-Aware Data DiscoveryContext-Aware Data Discovery
Context-Aware Data Discovery
 
LBS-2011: a new model for getting local content
LBS-2011: a new model for getting local contentLBS-2011: a new model for getting local content
LBS-2011: a new model for getting local content
 
IoT and m2m
IoT and m2mIoT and m2m
IoT and m2m
 
Chapter-3.pptx
Chapter-3.pptxChapter-3.pptx
Chapter-3.pptx
 
Context-aware mobile messages
Context-aware mobile messagesContext-aware mobile messages
Context-aware mobile messages
 
Chapter-3.pdf
Chapter-3.pdfChapter-3.pdf
Chapter-3.pdf
 
Chapter-3.pdf
Chapter-3.pdfChapter-3.pdf
Chapter-3.pdf
 
iot course a hand on approach internet of things
iot course a hand on approach internet of thingsiot course a hand on approach internet of things
iot course a hand on approach internet of things
 

Plus de Coldbeans Software

Plus de Coldbeans Software (20)

On Internet of Things education
On Internet of Things educationOn Internet of Things education
On Internet of Things education
 
Стандарты в цифровой экономике
Стандарты в цифровой экономикеСтандарты в цифровой экономике
Стандарты в цифровой экономике
 
On Internet of Things programming models
On Internet of Things programming modelsOn Internet of Things programming models
On Internet of Things programming models
 
IoT education
IoT educationIoT education
IoT education
 
On Physical Web models
On Physical Web modelsOn Physical Web models
On Physical Web models
 
Безопасный город
Безопасный городБезопасный город
Безопасный город
 
Twitter as a Transport Layer Platform
Twitter as a Transport Layer Platform Twitter as a Transport Layer Platform
Twitter as a Transport Layer Platform
 
On data model for context–aware services
On data model for context–aware servicesOn data model for context–aware services
On data model for context–aware services
 
On time-series databases
On time-series databasesOn time-series databases
On time-series databases
 
On Web-based Domain-Specific Language for Internet of Things
On Web-based Domain-Specific Language for Internet of ThingsOn Web-based Domain-Specific Language for Internet of Things
On Web-based Domain-Specific Language for Internet of Things
 
ON THE SYNERGY OF CIRCUITS AND PACKETS
ON THE SYNERGY OF CIRCUITS AND PACKETS ON THE SYNERGY OF CIRCUITS AND PACKETS
ON THE SYNERGY OF CIRCUITS AND PACKETS
 
Базы данных для временных рядов
Базы данных для временных рядовБазы данных для временных рядов
Базы данных для временных рядов
 
Метаданные в модели REST
Метаданные в модели RESTМетаданные в модели REST
Метаданные в модели REST
 
ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.
ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.
ОБ ИСПОЛЬЗОВАНИИ BLUETOOTH ДЛЯ ПРЕДСТАВЛЕНИЯ ЛОКАЛЬНЫХ ДАННЫХ.
 
From Jules Verne’s Moon landing dream in 1865 to “Star Wars” now
From Jules Verne’s Moon landing dream in 1865 to “Star Wars” nowFrom Jules Verne’s Moon landing dream in 1865 to “Star Wars” now
From Jules Verne’s Moon landing dream in 1865 to “Star Wars” now
 
Sensing
SensingSensing
Sensing
 
ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI
ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI
ON SOFTWARE STANDARDS FOR SMART CITIES: API OR DPI
 
On Database for Mobile Phones Ownership
On Database for Mobile Phones OwnershipOn Database for Mobile Phones Ownership
On Database for Mobile Phones Ownership
 
Выделение групп пользователей в данных мобильного мониторинга
Выделение групп пользователей в данных мобильного мониторингаВыделение групп пользователей в данных мобильного мониторинга
Выделение групп пользователей в данных мобильного мониторинга
 
Mining Groups in Mobile Monitoring Log
Mining Groups in Mobile Monitoring LogMining Groups in Mobile Monitoring Log
Mining Groups in Mobile Monitoring Log
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Geofence and Network Proximity

  • 1. Geofence and Network Proximity Dmitry Namiot Lomonosov Moscow State University dnamiot@gmail.com Manfred Sneps-Sneppe ZNIIS, M2M Competence Center manfreds.sneps@gmail.com RUSMART 2013
  • 2. • Many of modern location-based services are often based on an area or place as opposed to an accurate determination of the precise location. • Geo-fencing approach is based on the observation that users move from one place to another and then stay at that place for a while. • As per geo-fencing approach they could be described (defined) as some geographic areas bounded by polygons. • In this article we replace geo-based boundaries with network proximity rules. About
  • 3. Contents Introduction Passive Wi-Fi monitoring Cloud Messaging Local area messaging mashup Conclusion
  • 4. Passive Wi-Fi monitoring • Wi-Fi probe request • Client (even not connected) can send requests to AP • AP can analyze requests • We can collect MAC- addresses for clients
  • 5. Advantages and disadvantages for passive monitoring • It does not require special mobile applications • For mobile users it works automatically and transparently • It is anonymous monitoring. MAC address is used for re-identification only. It could be replaced with some hash-code (privacy) • It is not 100% reliable. There is no warranty that Wi-Fi client will send probe request. Our own experiments and references show 70%-80% detection rate.
  • 11. Cloud Messaging • Cloud infrastructure from vendor • Google, Apple, Microsoft, Nokia – own cloud based infrastructures for notifications • Google message: 4 Kb payload delivery
  • 13. Key moments for Cloud Messaging • Application registers with Cloud Messaging • Application provides a key from Cloud Messaging server (subscribes) to the particular application (Sender) • Sender saves keys and uses them later for delivering notifications • Key moment – subscription is activated from the mobile application on the particular phone.
  • 14. Spotique mashup • Let us extend the subscription process • Mobile application (mobile phone, actually) will provide a key for notification and MAC- address for identification • Sender can compare saved MAC- addresses with the MAC-addresses, collected by the passive monitoring • Key idea: get subscribers who are nearby at this moment
  • 15. Spotique mashup - 2 • Server-side based schema for our SpotEx model • Sender can deliver notifications to those, who are nearby only. • It is real-time detection • MAC-address is used for the re- identification only. So, it could be replaced with some hash-code (privacy)
  • 16. Use cases • Proximity marketing • Deliver local area messages in retail • Hyper-local news delivery in campuses. Tested in Lomonosov Moscow State University • Smart Cities information delivery
  • 17. Conclusion • A new mashup based on passive Wi-Fi monitoring forA new mashup based on passive Wi-Fi monitoring for mobile devices and cloud based notifications.mobile devices and cloud based notifications. • Passive monitoring uses probe requests from Wi-FiPassive monitoring uses probe requests from Wi-Fi specifications for detecting nearby clients.specifications for detecting nearby clients. • Notification module uses cloud messaging (pushNotification module uses cloud messaging (push notifications) from mobile operational systems.notifications) from mobile operational systems. • This application does not publish location info in theThis application does not publish location info in the social network (it is not a check-in).social network (it is not a check-in). • Custom messages will target online subscribers inCustom messages will target online subscribers in the nearby area only.the nearby area only.
  • 18. About us International team: Russia - LatviaInternational team: Russia - Latvia ((Moscow –Moscow – Riga – VentspilsRiga – Ventspils).). Big history of developingBig history of developing innovative telecom and software services,innovative telecom and software services, international contests awardsinternational contests awards Research areas are:Research areas are: open API for telecom,open API for telecom, web access for telecom data,web access for telecom data, Smart Cities,Smart Cities, M2M applications, context-aware computingM2M applications, context-aware computing..