Geofencing: The ultra-low power frontier for the Internet of Things

Free-range for devices


Internet of Lawnmowers How are the next 10 billion devices going to connect to the internet of today, tomorrow? Having all of these gizmos talk to one another over your standard 2.4Ghz Wi-Fi is not going to happen, so how will all those gizmos connect to the wider internet, and how will we keep them all safe, happy and updated?

The internet of things will rely on short and medium range wireless networking protocols. From geofencing your lawnmower or Roomba with infrared beacons to Zigbee, Bluetooth, 60Ghz and even visible light networking. Every iota of spectrum the general public can pry out of the hands of regulators will be used, but how is it all going to work?

Geofencing

Geofencing is a critical set of concepts for the internet of things. It not only provides the basic technologies to stop our "things" from working outside of our secured environments, it also serves as a great start to explain the basic communications technologies.

Like "cloud computing", however, geofencing means different things depending on who you talk to.

The first use of geofencing – constraining a device to a given location – comes in two forms. This covers devices that simply won't work outside of the geofence, for example a corporate e-mail client that only works when on corporate premises. The second use of geofencing is devices that freak out when removed from the geofence. Think of the little radio tags that retail stores use for high value items.

These forms of geofencing see practical uses in my everyday life. For the first, I use little infrared beacons to confine a Roomba to a given room. For the second, my Galaxy Note 2 contains a near field radio and the stylus an RFID tag. If I leave the stylus behind, the phone freaks out and reminds me to find the stylus before I get too far away.

The third use of the term geofence – activate when you detect a widget in range – is almost always about advertising. Think creepy Minority Report-style retail stores but here, now and using Bluetooth.

Geofencing used to use GPS. For large enough geographical areas, and clients that have lots of available power, such as truckers, GPS is still viable. Nowadays, however, geofencing is done with ultra-low power beacons.

Beacons are devices that "squawk" small amounts of data every second or so, either directionally or omnidirectionally. Directional beacons (like an infrared beam) are used to make virtual "walls". Omnidirectional beacons are information-based.

Beacons can come in all sizes. The cellular network, for example, consists of mobiles and cell towers that continually advertise themselves to one another via signalling beacons used to control voice telephone traffic.

Advertising beacons on a cellular network occurs at regular intervals, whether or not there is signalling data to be sent. SMS was developed to be able to send text messages through these beacons when there was no signalling data to send.

It's why text messages on older networks get delivered nearly instantaneously when you're out in the middle of nowhere and take forever when you're in a really crowded location such as a stadium.

Google has a patent that is worth a read. Here's another, not by Google, also worth a read.

Beacons can be thought of as a highly localised GPS. If you know enough about where the beacons are placed and when they are supposed to squawk then you can do some maths and pinpoint position down to the centimetre.

Some applications use beacons that – like GPS – just squawk time (and/or location) in order to make this sort of positioning possible. In this manner beacons can be used in combination with an app to do the same sort of geofencing you'd normally rely on "virtual walls" or GPS for.

If you're interested in playing around with beacon-based geofencing and have an iPhone, iBeacon will be worth looking up. You might want to give the privacy implications a thought, however, as well as consider what happens if your geofence decides to move around by 300m or so of its own volition.

Next time, I’ll look at the individual communications technologies that will be used by Internet of Things devices for the next several years. ®

Similar topics


Other stories you might like

  • Yet again, Cream Finance skimmed by crooks: $130m in crypto assets stolen

    Third time's the unlucky charm for loan outfit

    Decentralized finance biz Cream Finance became further decentralized on Wednesday with the theft of $130m worth of crypto assets from its Ethereum lending protocol.

    Cream (cream.finance and not creamfinance.com) reported the loss via Twitter, the third such incident for the loan platform this year.

    "Our Ethereum C.R.E.A.M. v1 lending markets were exploited and liquidity was removed on October 27, 1354 UTC," the Taiwan-based biz said. "The attacker removed a total of ~$130m USD worth of tokens from these markets, using this address. No other markets were impacted."

    Continue reading
  • OpenID-based security features added to GitHub Actions as usage doubles

    Single-use tokens and reusable workflows explained at Universe event

    GitHub Universe GitHub Actions have new security based on OpenID, along with the ability to create reusable workflows, while usage has nearly doubled year on year, according to presentations at the Universe event.

    The Actions service was previewed three years ago at Universe 2018, and made generally available a year later. It was a huge feature, building automation into the GitHub platform for the first time (though rival GitLab already offered DevOps automation).

    It require compute resources, called runners, which can be GitHub-hosted or self-hosted. Actions are commands that execute on runners. Jobs are a sequence of steps that can be Actions or shell commands. Workflows are a set of jobs which can run in parallel or sequentially, with dependencies. For example, that deployment cannot take place unless build and test is successful. Actions make it relatively easy to set up continuous integration or continuous delivery, particularly since they are cloud-hosted and even a free plan offers 2,000 automation minutes per month, and more than that for public repositories.

    Continue reading
  • REvil gang member identified living luxury lifestyle in Russia, says German media

    Die Zeit: He's got a Beemer, a Bitcoin watch and a swimming pool

    German news outlets claim to have identified a member of the infamous REvil ransomware gang – who reportedly lives the life of Riley off his ill-gotten gains.

    The gang member, nicknamed Nikolay K by Die Zeit newspaper and the Bayerische Rundfunk radio station, reportedly owns a €70,000 watch with a Bitcoin address engraved on its face and rents yachts for €1,300 a day whenever he goes on holiday.

    "He seems to prefer T-shirts from Gucci, luxurious BMW sportscars and large sunglasses," reported Die Zeit, which partly identified him through social media videos posted by his wife.

    Continue reading

Biting the hand that feeds IT © 1998–2021