You are on page 1of 5

IJIRST –International Journal for Innovative Research in Science & Technology| Volume 4 | Issue 1 | June 2017

ISSN (online): 2349-6010

Comparative Analysis of Indoor Positioning


System using Bluetooth and Wi-Fi
A. M. Chandrashekhar Thejaswini S
Assistant Professor M. Tech. Student
Department of Computer Science & Engineering Department of Computer Science & Engineering
Sri Jayachamarajendra College of Engineering(SJCE), JSS Sri Jayachamarajendra College of Engineering(SJCE), JSS
S&T University Campus, Mysore, Karnataka, India S&T University Campus, Mysore, Karnataka, India

Abstract
An indoor positioning system (IPS) is defined as the network of devices which is widely used to wirelessly locate objects under
the same roof using radio waves, acoustic signals, magnetic fields and other sensory information grasped by mobile devices.
Reliable indoor positioning is a base for emerging indoor location based services. Bluetooth - Indoor Positioning System is said to
be the intersection of Indoor Positioning Systems and Bluetooth Technology. Similarly, Wi-Fi Indoor Positioning System is the
intersection of Indoor Positioning Systems and Wi-Fi Technology. This paper presents a comparative analysis of Wi-Fi and
Bluetooth using IPS.
Keywords: Indoor Positioning System, Bluetooth, and Wi-Fi
_______________________________________________________________________________________________________

I. INTRODUCTION

An indoor positioning system (IPS) is dependent on the nearby anchors i.e. nodes with a known position, they either provide
environment context or actively locate tags for devices to sense. The localized nature of an IPS results in design fragmentation
which has systems that makes use of various radios, optical or even acoustic technologies[2][5].
Since GPS does not work on indoors, Wi-Fi and Bluetooth are good alternatives for indoor positioning and indoor navigation.
Indoor navigation uses Wi-Fi and senses when it has to replace GPS in buildings. This paper uses Bluetooth and Wi-Fi and aims
at providing the comparative analysis of Indoor positioning system [5].
 Bluetooth - A wireless technology standard to exchange the data overshot distances (via ISM band from 2400-2480 MHZ in
short-wavelength radio transmissions) from mobile and fixed devices. It creates personal area networks for high level security.
 Wi-Fi - Any wireless local network product which is based on the IEEE 802.11 standards. The merit of Wi-Fi over Bluetooth
is that it essentially needs no infrastructure effort to track applications if the indoor area is covered through Wi-Fi signal.
The merits of using a wireless solution in industrial applications are as follows:
1) Higher mobility and greater possibility to move devices and eventually connect to tablets or smart phones freely without
constraining to cables,
2) Elimination of costly transmission media and its maintenance like the swivels, flexible cables and by-passing long distances
areas where cables could not be practically fit
3) For quick and easy installation process,
4) For higher flexibility if a need arises to modify an existing installation
5) To increase the personnel safety by maintaining distance between devices during maintenance and configuration
6) To simplify integration of devices inside the network.

II. LITERATURE SURVEY

Bluetooth is said to provide a reliable solution to the interior location [3]. Another working group is called for local positioning
which was set up to develop a Bluetooth description. The type and format of information not only allows the Bluetooth device to
exchange the location information, but also the co-ordinates of the algorithm [5]. Anyhow, it takes enough time before the group
with personal data, since the author is presently engaged in a project to grasp the performance of local Bluetooth positioning.
Many research & tests for the usage of Wi-Fi communication for indoor navigation has been done in the long past through
optimized and advanced versions of algorithms [7]. Through dense network of access points and by RSSI measurements over the
Wi-Fi signals one can determine the distance of user’s device using individual access points, and finally applying the trilateration
technique for precise position determination. This gives a clear picture in estimating the mobile device’s location in indoor setting.
There is a growing organization for research work mainly concerned with indoor positioning, primarily driven by the desire to
personalize or augment the users experience in a contextual range. Currently, one of the promising works has mentioned the fact
that despite the excessive use of smart phones and technology infrastructures which has the potential to provide precise positioning
is it reliable with respect to positioning? It’s still an on-going research question.

All rights reserved by www.ijirst.org 117


Comparative Analysis of Indoor Positioning System using Bluetooth and Wi-Fi
(IJIRST/ Volume 4 / Issue 1/ 020)

III. RELATED WORK

Among the different existing proposals for indoor positioning, Wi-Fi and Bluetooth are two widely used wireless technologies.
We briefly review Wi-Fi based and Bluetooth based indoor positioning.
Wi-Fi Based Indoor Positioning
Wi-Fi refers to a wireless technology that stands for Wireless Fidelity which allows devices to communicate over a wireless signal.
IEEE standard 802.11 also known as Wi-Fi; uses the centralized router devices for sharing Wi-Fi signal with the inclusion of other
additional standards such as 802.11a, 802.11b, 802.11g and 802.11n.Wi-Fi supports additional features: Power management
(802.11h) and Security mechanisms (802.11) include WPA/WPA2/WEP. For the transfer of data with high speed over short
distances, waves are been used by the Wi-Fi networking technology.
Like Ethernet and token ring siblings (fig 1), Wi-Fi is designed for use in limited geographical areas such as home, office
buildings, campuses, by allowing local area networks (LANs) to process without wiring and cables.

Fig. 1: Wi-Fi using hotspot

For many modern devices such as tablets, computers, laptops and mobiles the wireless broadband internet access is provided by
Wi-Fi with authentication. With the functionalities of Wi-Fi, high data transfer rate can be accessed by broad band internet
connection (fig 2). The major attractive feature of Wi-Fi is that it provides broadband connection for wireless communication
within a specific geographic space.

Fig. 2: Wi-Fi connection

Bluetooth Based Indoor Positioning


Bluetooth technology is beneficial when information needs to be transferred between many devices that are nearby and when the
speed is not the issue, such as printers, modems, smart phones and telephones. It is most suitable for the applications which
specifically uses lower-bandwidth for transfer of data within précised geographical boundary, such as transferring audio
information with telephones i.e., with a Bluetooth headset or with hand-held systems for (transferring files) for byte-data or mice
and keyboard. In order to enable positioning the deployment of Bluetooth hotspots in indoor space was practiced.

All rights reserved by www.ijirst.org 118


Comparative Analysis of Indoor Positioning System using Bluetooth and Wi-Fi
(IJIRST/ Volume 4 / Issue 1/ 020)

Since Bluetooth hotspots relatively covers limited space, the proximity analysis is been employed by the Bluetooth based indoor
positioning systems for position estimation. Specifically, the locations deployed by Bluetooth hotspots are tracked as reference
positions. These reference positions are returned as the user’s position estimates when a Bluetooth-enabled device of the user enters
a specific hotspot’s range, the hotspot of the device identified (or vice versa).
It is even possible to utilize the range of detection of a Bluetooth hotspot to nearly approximate a user’s present position. In this
case, (fig 3)when the multiple Bluetooth hotspots are detected paralelly at a location, intersection of all the hotspot detection ranges
or band can be used to approximate the user’s location. However, these techniques are most complex in nature as they might return
erratic regions as location estimates; this even involves expensive geometrical calculations.
For application in industry, wireless technology has to be compatible when the environment is noisy. Bluetooth utilizes the
features of Adaptive Frequency Hopping (AFH) and Forward Error Correction (FEC) to operate. It gives a universal short range
wireless capability. It operates within the 2.4 GHz frequency band and devices within 10m from each other can share data upto
720Kbps of its capacity. Before making the connection between the devices, this technology or system which is an authenticated
one sends the acknowledgement from receiver to transmitter.

Fig. 3: Bluetooth connection

IV. BLUETOOTH V/S WI-FI

Formulation
The invention of Bluetooth technology has been credited to Ericsson in the year 1994 which then launched it as an alternative to
wireless communication to RS232.
Though Wi-Fi had researches since mid 80s, it was officially launched in 1997. A separate committee for the development of
Wi-Fi was then set in the year 1990 head by, Mr. Victor Hayes – The Father of Wi-Fi.
Standards of IEEE
Bluetooth which was initially defined under IEEE 802.15.1 standard is now taken care under a special interest group (SIG).
Wi-Fi, which was defined under 802.11.x series of protocols and is presently maintained under the same protocol. Various
companies have founded a Wi-Fi alliance, which tests and authorizes gadgets to be compatible with Wi-Fi.
Frequency
Wi-Fi based networks work at 2.4, 3.6 and 5GHz. Whereas Bluetooth works at 2.4GHz frequency.
Range
Bluetooth based wireless connection has a maximum range of 30m whereas for Wi-Fi it can extend almost upto 100m. In Wi-Fi,
the range is dependent on the versions of its Wi-Fi protocol applied and addition of antennas in communication system. While no
such range concerns or extra antennae are so much known in case of Bluetooth.
Connection of Devices
In Bluetooth, upto 8 devices can be connected to one another. Whilst in the case of Wi-Fi, the number of maximum connections
depends on Wi-Fi router. The routers can simultaneously accommodate one to several communicating devices.

All rights reserved by www.ijirst.org 119


Comparative Analysis of Indoor Positioning System using Bluetooth and Wi-Fi
(IJIRST/ Volume 4 / Issue 1/ 020)

Security
In Bluetooth, the earlier versions were encryption and till date Bluetooth security is limited to key matching. Whilst in Wi-Fi, the
standards of security have been inclusively provided with new versions. Wi-Fi Protected Access (WPA) and Wireless Equivalent
Privacy (WEP) are the most used security accesses in Wi-Fi.
Table - 1
Wi-Fi vs Bluetooth
Parameter Wi-Fi Bluetooth
Cost High Low
Authority of specifications IEEE , WACA Bluetooth SIG
Security More secure Less secure
Development year 1991 1994
Latency 150 ms 200 ms
Bit-rate 600 ms 2.1 ms
Typical link length 100 m 10 m
Power consumption High Low
Latency 150 ms 200 ms
Wired technology analogy Ethernet USB
Bluetooth
Hardware requirement Wireless access points, Wireless adaptors on all devices of the networks
Adaptor on all the devices
Wi-Fi security strategies are:
 Block your Service Set Identifier (SSID) from being broadcast.
 SSID that allows identifying the service network: it is a 32 bytes character string of a variable size.
 SSID is used in order to guarantee the authentication and the identification between an AP and a client.
 Wireless beacon so PCs can easily find the access point. Change the default network name in the access point.
 Change the default access point password.
Center the access point in the middle of the building, house or any other place.
Power Consumption
Can work at longer distances and capable of being loaded with high quality security protocols? This makes Wi-Fi a power
consuming protocol when compared to Bluetooth.

V. CONCLUSION

To summarize, it can be said that amongst the two Indoor Positioning System, Wi-Fi outmaneuvers the other i.e. the Bluetooth
system through its capability and compatibility in different work environment. Overall, Wi-Fi uses better protocols and algorithms
to deliver better performance i.e. from its location determination of a mobile user to the Quality of output. And also the security
provided by Wi-Fi is more compared to Bluetooth, for this Wi-Fi uses WPA (Wi-Fi Protected Access) and WEP security protocols.
Follow-up work will concentrate on the further analysis and system improvement of the models and on the integration with
other protocols to deliver better quality signals to smart phones.

REFERENCES
[1] G.-Y. Jin, X.-Y. Lu, and M.-S. Park. An indoor localization mechanism using active RFID tag. In Proc. SUTC, pp. 40–43, 2006.
[2] H.-Y. Kang, J.-S. Kim, and K.-J. Li. Strack: tracking in indoor symbolic space with RFID sensors. In Proc. GIS, pp. 502–505, 2010.
[3] M. B. Kjaergaard. A taxonomy for radio location fingerprinting. In Proc. LoCA, pp. 139–156, 2007.
[4] M. B. Kjærgaard and C. V. Munk. Hyperbolic location fingerprinting: A calibration-free solution for handling differences in signal strength (concise
contribution). In Proc. PerCom, pp. 110–116, 2008.
[5] T.-N. Lin and P.-C. Lin. Performance comparison of indoor positioning techniques based on location fingerprinting in wireless networks. In Proc. IWCMC,
pp. 1569–1574, 2005.
[6] H. Liu, H. Darabi, P. Banerjee, and J. Liu. Survey of wireless indoor positioning techniques and systems. IEEE TSMC, Part C: Applications and Reviews,
37(6):1067–1080, 2007.
[7] K. Muthukrishnan, M. E. Lijding, and P. J. M. Havinga. Towards smart surroundings: Enabling techniques and technologies for localization. In Proc. LoCA,
pp. 350–362, 2005.
[8] A. M. Chandrashekhar and K. Raghuveer, “Confederation of FCM Clustering, ANN and SVM Techniques of Data mining to Implement Hybrid NIDS
Using Corrected KDD Cup Dataset”, Communication and Signal Processing (ICCSP) IEEE International Conference,2014, Page 672-676.
[9] AM. Chandrashekhar and K. Raghuveer , “Improvising Intrusion detection precision of ANN based NIDS by incorporating various data Normalization
Technique – A Performance Appraisal”, IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr-May,
2014.
[10] A. M Chandrashekhar A M and K. Raghuveer, “Diverse and Conglomerate modi-operandi for Anomaly Intrusion Detection Systems”, International Journal
of Computer Application (IJCA) Special Issue on “Network Security and Cryptography (NSC)”, 2011
[11] A. M Chandrashekhar A M and K. Raghuveer, “Hard Clustering Vs. Soft Clustering: A Close Contest for Attaining Supremacy in Hybrid NIDS
Development”, Proceedings of International Conference on Communication and Computing (ICCC - 2014), Elsevier science and Technology Publications.

All rights reserved by www.ijirst.org 120


Comparative Analysis of Indoor Positioning System using Bluetooth and Wi-Fi
(IJIRST/ Volume 4 / Issue 1/ 020)

[12] A. M. Chandrashekhar and K. Raghuveer, “Amalgamation of K-means clustering algorithem with standard MLP and SVM based neural networks to
implement network intrusion detection system”, Advanced Computing, Networking, and Informatics –Volume 2(June 2014), Volume 28 of the series Smart
Inovation, Systems and Technologies pp 273-283.
[13] A. M. Chandrashekhar and K. Raghuveer, “Fusion of Multiple Data Mining Techniques for Effective Network Intrusion Detection – A Contemporary
Approach”, Proceedings of Fifth International Conference on Security of Information and Networks (SIN 2012), 2012, Page 178-182.
[14] A. M. Chandrashekhar, Jagadish Revapgol, Vinayaka Pattanashetti, “Big Data Security Issues in Networking”, International Journal of Scientific Research
in Science, Engineering and Technology (IJSRSET), Volume 2, Issue 1, JAN-2016.
[15] Puneeth L Sankadal, A. M Chandrashekhar, Prashanth Chillabatte, “Network Security situation awareness system” International Journal of Advanced
Research in Information and Communication Engineering(IJARICE), Volume 3, Issue 5, May 2015.
[16] P. Koushik, A.M.Chandrashekhar, Jagadeesh Takkalakaki, “Information security threats, awareness and cognizance” International Journal for Technical
research in Engineering (IJTRE), Volume 2, Issue 9, May 2015.
[17] A.M.Chandrashekhar, Yadunandan Huded, H S Sachin Kumar, “Advances in Information security risk practices” International Journal of Advanced Research
in data mining and Cloud computing (IJARDC), Volume 3, Issue 5, May 2015.
[18] A. M. Chandrashekhar,Muktha G, Anjana D, “Cyberstalking and Cyberbullying: Effects and prevention measures”, Imperial Journal of Interdisciplinary
Research (IJIR), Volume 2, Issue 2, JAN-2016.
[19] A.M.Chandrashekhar, Syed Tahseen Ahmed, Rahul N, “Analysis of Security Threats to Database Storage Systems” International Journal of Advanced
Research in data mining and Cloud computing (IJARDC), Volume 3, Issue 5, May 2015.
[20] A.M.Chandrashekhar, K.K. Sowmyashree, RS Sheethal, “Pyramidal aggregation on Communication security” International Journal of Advanced Research
in Computer Science and Applications (IJARCSA), Volume 3, Issue 5, May 2015.
[21] A.M.Chandrashekhar, Rahil kumar Gupta, Shivaraj H. P, “Role of information security awareness in success of an organization” International Journal of
Research(IJR), Volume 2, Issue 6, May 2015.
[22] A.M.Chandrashekhar, Huda Mirza Saifuddin, Spoorthi B.S, “Exploration of the ingredients of original security” International Journal of Advanced Research
in Computer Science and Applications(IJARCSA), Volume 3, Issue 5, May 2015.
[23] A.M.Chandrasekhar, Ngaveni Bhavi, Pushpanjali M K, “Hierarchical Group Communication Security”, International journal of Advanced research in
Computer science and Applications (IJARCSA), Volume 4, Issue 1,Feb-2016.

All rights reserved by www.ijirst.org 121

You might also like