{"id":9079,"date":"2023-12-05T09:03:36","date_gmt":"2023-12-05T09:03:36","guid":{"rendered":"https:\/\/www.beaconzone.co.uk\/blog\/?p=9079"},"modified":"2023-12-05T09:56:41","modified_gmt":"2023-12-05T09:56:41","slug":"hybrid-ai-based-ibeacon-indoor-positioning-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.beaconzone.co.uk\/blog\/hybrid-ai-based-ibeacon-indoor-positioning-cybersecurity\/","title":{"rendered":"Hybrid-AI-Based iBeacon Indoor Positioning Cybersecurity"},"content":{"rendered":"\n<p>New research &#8220;<a href=\"https:\/\/www.mdpi.com\/1424-8220\/23\/4\/2159\" target=\"_blank\" rel=\"noreferrer noopener\">Hybrid-AI-Based iBeacon Indoor Positioning Cybersecurity: Attacks and Defenses<\/a>&#8221; by Wei-Tzu Hung, focuses on the cybersecurity aspects of iBeacon systems, particularly in the context of indoor positioning and navigation. iBeacon is increasingly used in very large and important public spaces for indoor navigation, using the Bluetooth Low Energy (BLE) in mobile phones. However, the security of these systems is sometimes a concern, especially against cyberattacks. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"866\" src=\"https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2023\/11\/taipeibeaconapp-1024x866.webp\" alt=\"\" class=\"wp-image-9081\" style=\"width:354px;height:auto\" srcset=\"https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2023\/11\/taipeibeaconapp-1024x866.webp 1024w, https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2023\/11\/taipeibeaconapp-300x254.webp 300w, https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2023\/11\/taipeibeaconapp-768x649.webp 768w, https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2023\/11\/taipeibeaconapp-1536x1299.webp 1536w, https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2023\/11\/taipeibeaconapp-1200x1015.webp 1200w, https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2023\/11\/taipeibeaconapp.webp 1760w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure><\/div>\n\n\n<p>The study uses the iBeacon system at Taipei Main Station, a major transportation hub, as a case study. This station experiences a high daily traffic flow, making it a critical area for such technology. The research explores potential attacks on the iBeacon system and investigates defence technologies, incorporating AI techniques and human participation. <\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"335\" src=\"https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2023\/11\/ibeaconsystem-1024x335.png\" alt=\"\" class=\"wp-image-9080\" srcset=\"https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2023\/11\/ibeaconsystem-1024x335.png 1024w, https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2023\/11\/ibeaconsystem-300x98.png 300w, https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2023\/11\/ibeaconsystem-768x251.png 768w, https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2023\/11\/ibeaconsystem-1536x503.png 1536w, https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2023\/11\/ibeaconsystem-2048x671.png 2048w, https:\/\/www.beaconzone.co.uk\/blog\/wp-content\/uploads\/2023\/11\/ibeaconsystem-1200x393.png 1200w\" sizes=\"(max-width: 709px) 85vw, (max-width: 909px) 67vw, (max-width: 1362px) 62vw, 840px\" \/><\/figure><\/div>\n\n\n<p>The study looks into various aspects of iBeacon technology, including its mechanisms, related work in the field and specific challenges in information security. It also discusses the design of the iBeacon system at Taipei Main Station, potential attacks by hackers and methods to defend against these attacks. <\/p>\n\n\n\n<p>The paper concludes with insights into future studies in this area. Key findings include the necessity of incorporating information security technology and rolling coding encryption in the early stages of iBeacon system planning. These methods are currently the best defence strategies. The research suggests that rolling coding is the most cost-effective defence, but for critical infrastructure, a more secure method, such as predictable and encrypted rolling coding, can be used.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>New research &#8220;Hybrid-AI-Based iBeacon Indoor Positioning Cybersecurity: Attacks and Defenses&#8221; by Wei-Tzu Hung, focuses on the cybersecurity aspects of iBeacon systems, particularly in the context of indoor positioning and navigation. iBeacon is increasingly used in very large and important public spaces for indoor navigation, using the Bluetooth Low Energy (BLE) in mobile phones. However, the &hellip; <a href=\"https:\/\/www.beaconzone.co.uk\/blog\/hybrid-ai-based-ibeacon-indoor-positioning-cybersecurity\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Hybrid-AI-Based iBeacon Indoor Positioning Cybersecurity&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[61],"tags":[],"_links":{"self":[{"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/posts\/9079"}],"collection":[{"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=9079"}],"version-history":[{"count":4,"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/posts\/9079\/revisions"}],"predecessor-version":[{"id":9121,"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/posts\/9079\/revisions\/9121"}],"wp:attachment":[{"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=9079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=9079"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.beaconzone.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=9079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}