Conference PaperPDF Available

Managing Mobile Relays for Secure E2E Connectivity of Low-Power IoT Devices

Authors:

Abstract and Figures

The widespread Internet of Things (IoT) ecosystems empower the deployment of various Bluetooth Low Energy (BLE) sensor nodes in many ambient assisted living (AAL) type applications. Regardless of their limitations, these low-power IoT sensor nodes need pervasive and secure connections to transfer the aggregated data to the central servers located in remote clouds which will perform further processing and storing functions. The common practice is to use one or multiple dedicated gateways to assist the communication between the sensor and the cloud. This paper presents a mobile-based relay assistance solution for establishing secure end-to-end (E2E) connectivity between low-power IoT sensors and cloud servers without using a dedicated gateway. The performance of proposed solution is analyzed by using the simulations and the prototype implementation with commercial off-the-shelf devices. The prototype implementation and the described security features verify the technical readiness of the proposed solution.
Content may be subject to copyright.
Managing Mobile Relays for Secure E2E
Connectivity of Low-Power IoT Devices
Pawani Porambage, Ahsan Manzoor,
Madhsanka Liyanage, Mika Ylianttila
University of Oulu, Finland
Email: {firstname.lastname}@oulu.fi
Andrei Gurtov
Link¨
oping University, Sweden
Email: gurtov@acm.org
Abstract—The widespread Internet of Things (IoT)
ecosystems empower the deployment of various Bluetooth
Low Energy (BLE) sensor nodes in many ambient assisted
living (AAL) type applications. Regardless of their limi-
tations, these low-power IoT sensor nodes need pervasive
and secure connections to transfer the aggregated data
to the central servers located in remote clouds which
will perform further processing and storing functions.
The common practice is to use one or multiple dedicated
gateways to assist the communication between the sen-
sor and the cloud. This paper presents a mobile-based
relay assistance solution for establishing secure end-to-
end (E2E) connectivity between low-power IoT sensors
and cloud servers without using a dedicated gateway. The
performance of proposed solution is analyzed by using
the simulations and the prototype implementation with
commercial off-the-shelf devices. The prototype imple-
mentation and the described security features verify the
technical readiness of the proposed solution.
I. INTRODUCTION
With the proliferation of the Internet of Things (IoT)
technologies, in addition to the key purpose of using
a particular smart object, people are fascinated to ac-
cess or obtain multiple other services from the same
device [1]. Moreover, the seamless connectivity and
increased quality of experience are highly regarded for
better user experiences. Many IoT devices in health-
care and Ambient Assisted Living (AAL) applications
are equipped with unlicensed band short-range radio
access technologies, including Bluetooth Low Energy
(BLE), HaLow, ZigBee, and Smart Utility Networks
(SUNs). [2]. Among them, BLE is the best-known and
most used low-power communication technology that
supports connectivity for Body Area Networks (BANs)
and a large number of medical IoT devices which
operate with coin cell batteries [3]. Although the Low
Power Wide Area Network (LPWAN) radio technolo-
gies such as Narrow Band IoT (NB-IoT) and LoRaWAN
are recently becoming popular, they are not widely
deployed in medical and wearable IoT applications.
BLE is a stateless protocol where the requests are
independently transmitted and it allows a very flexible
topology which can be adjusted to fit into a large
number of use cases. The resource-constrained IoT
devices that use standalone BLE for communication
purposes require dedicated nodes that serve as local
gateways (GWs) to provide back-end connectivity with
the remote IoT cloud/data centers. In the typical AAL
applications the BLE wearables pair with the user’s
mobile phone which is acting as the GW to obtain
end-to-end (E2E) connectivity with the cloud servers.
Instead of using a committed single GW, if the wearable
can get the data forwarding services from unknown
relaying nodes in the closest proximity, it will provide
high user mobility even to foreign environments.
The exploitation of mobile-based relays for the back-
end connectivity of BLE devices is described for an
AAL use case in Figure 1. The elderly or the people
with chronic conditions may require continuous moni-
toring of their health records or localize with the help of
different BLE sensor wearables. The interested parties
(e.g., family or caretakers) can track their behavior
or examine the health conditions based on the data
retrieved from the remote central cloud. By using a ded-
icated mobile phone, the back-end connectivity between
the BLE wearable sensor and the cloud data center may
drop when the user is going beyond the comfort zone
or the phone-battery is dead. The uninterrupted E2E
connectivity can be maintained between the wearable
and the cloud data centers with the help of some random
mobile users who are performing as relays. In order
to keep the in-line with this mechanism, the unknown
mobile user needs to be rewarded by the remote cloud
for his relaying service.
Fig. 1. Usecase scenario
Our key contributions of this paper include the de-
sign and development of on-demand sharing network
instantiation for universal accessibility of BLE sensors
with the help of mobile relays. The simulation results
and the implementation with the commercial off-the-
shelf devices prove the the technical readiness of the
proposal. The security considerations of the protocol are
discussed along with the possible attack scenarios. To
the best of our knowledge, this will be the first attempt
of exploiting third-party unknown mobile relays for the
forwarding of medical data generated by BLE sensors.
The remainder of the paper is organized as follows:
Section II provides the related work. Section III and IV
describe the proposed network architecture and pro-
tocol. Section V and VI present the simulation and
implementation results, and the security considerations
of the protocol. Finally, Section VII concludes the paper
by drawing the future research directions.
II. RE LATED WO RK
BLE version 5.0 is the latest addition from the Blue-
tooth Special Interest Group [4]. It is a wireless personal
area networking technology that can be exploited in a
very broad range of applications including healthcare,
fitness and elderly care, smart homes, smart cities,
etc. BLE plays a vital role in many other short-range
wireless communication protocols such as Zigbee, Near
Field Communication (NFC), 6LoWPAN [5]. The coex-
istence of BLE with many varieties of devices ranging
from mobile phones to resource-constrained medical
sensors has proven its usability as an IoT technology. As
presented in [3], it is feasible to implement a complete
IP-based protocol stack on constrained BLE devices
and enable gateway operations covering global IPV6
connectivity and proxy-cache functionality.
The proposed relay-assisted E2E connection estab-
lishment for low-power IoT devices was initiated by
the idea behind collaborative on-demand Wi-Fi shar-
ing (COWS) appeared in [6]. The ubiquitous access to
the foreign private Wi-Fi network is mostly prohibited
since the private Access Points (APs) have no means of
authenticating foreign users before granting access to
their network. COWS comprehensively discover roam-
ing networks by opportunistically broadcasting connec-
tion requests and offers 802.11 authentications at private
APs by embedding user credentials. At the end of suc-
cessful authentication at private APs, the Internet traffic
is tunneled through the user’s Home Provider (HP).
Although COWS has a rather small footprint in terms of
communication, it is not really designed for resource-
constrained devices. Simply, we commenced this work
as an extension of COWS for IoT sensors. In our design,
we intend to adopt the message flow of COWS and
tailor it according to protocol specifications of BLE.
Instead of APs in COWS, the intermediary needs to
be the smartphone which supports BLE and has the
connectivity to the Internet.
In [7], Raza et. al. present a design of a novel open
hardware platform for BLE and discuss the possibil-
ity of implementing 6LoWPAN-connected Bluetooth
Smart. They use nRF24Cheep, the custom designed
BLE beacon platform, to perform experiments on ad-
justing BLE message formats. Moreover, they provide
Contiki operating system port to the same open BLE
broadcast platform. Although this work is in very ab-
stract form, it provides an initial guidance on how to
establish a BLE connected IoT setup and its prototyping
for a full open-source BLE stack.
The newly introduced edge computing paradigms
(E.g. Fog computing and Multi-Access Mobile Edge
Computing) leverage the low-latency requirements of
IoT applications. The work presented in [8] describe
the exploitation of smart e-health gateways, called UT-
GATE, at the edge of healthcare IoT in clinical environ-
ments. According to their proposed fog-assisted system
architecture, the smart e-health gateway provides an
intermediary layer of intelligence between sensor nodes
and cloud. The resource consuming tasks of the sensors
can be outsourced at the gateway and support ubiquitous
characteristics such as mobility, energy efficiency, scal-
ability, and reliability issues. They have demonstrated
the functionality of UT-GATE with different network
topologies such as mesh and star and using wireless
sensor technologies like 6LoWPAN, Wi-Fi, and BLE.
However, this solution still lacks the universal connec-
tivity in the roaming situations.
Another research followed by Haus et. al., in [9],
investigate the usability of an iConfig edge-driven
platform for IoT device management including BLE
beacons in smart cities. In this experiment, the user
with a smartphone running the iConfig edge module
will assist the BLE beacons, emitted by IoT devices,
in three phases namely registration, configuration, and
maintenance. The automatic configuration and further
processing are performed by the edge module with
the minimal user interaction. This particular work does
not address how the IoT sensors can maintain E2E
connectivity with back-end cloud data centers.
With the advent of technological upgrades, BLE
will no longer support only the monitoring and data
collecting applications. The researches are underway
to investigate its applicability for different areas such
as multimedia streaming [10]. However, in any case,
security is a mandatory property to guarantee in E2E
IoT communication scenarios [11].
III. USE CA SE , NET WO RK ARCHITECTURE AND
ASSUMPTIONS
This section describes the network architecture, key
assumptions, and prerequisites.
A. Network Architecture
The network architecture is illustrated in Figure 2.
BLE sensor advertises its availability of data. One or
many anonymous mobile phones may receive the adver-
tisement and accept to cooperate with further commu-
nication as a relay node. The best relay node is selected
based on the received signal strength indicator (RSSI).
The link between the mobile and the central server (CS)
in IoT cloud will be securely established over the Inter-
net in a conventional manner (e.g., Hypertext Transfer
Protocol Secured (HTTPS)). When the data is received
from the BLE device, CS will update the database which
is dedicated to that particular user (or device).
Fig. 2. The network architecture
B. Pre-requisites and Assumptions
The BLE device should undergo an initial registration
with the CS, which can be performed offline or via
a trusted third party (e.g., trusted GW). The sensor
should have the identity of the CS and the CS should
maintain the records of all the legitimate sensors and
their functioning databases. In order to maintain E2E
secure communication, the BLE device and CS should
share the cryptographic keys for data encryption and
decryption, and the authentication credentials (e.g., User
ID (UID) and hash chain).
Throughout the protocol, we consider the guaranteed
link quality for all the communication channels. Fur-
thermore, it is assumed that the connections remain
uninterrupted over the period of communication and
the mobile device will operate in the same proximity.
No mutual or transitive trusts are required between the
relay device and the other entities (i.e., sensor and CS).
However, the mobile phone can always proceed the
relaying functions (forwarding sensed data OR traffic)
as long as it is rewarded. For the sake of rewarding
mechanism, the mobile needs to be registered with CS
in advance and the secure links (i.e. Transport Layer
Security (TLS) protocol) should be established between
the two entities. The functionality of CS is utterly
trusted which will grant the incentives to the relay
device at the end of successful service.
IV. PROTOC OL
The message flow of the protocol is illustrated in
Figure 3 and described in this section.
Fig. 3. Message flow of the proposed protocol
1) Phase 1: When the data is available with the
BLE sensor it creates an advertising HELLO packet
and broadcasts to find a mobile as a relay node. This
HELLO packet includes device MAC address, appli-
cation ID (i.e., Universal Unique Identifier (UUID)
128bit) and timestamp. This step is the initiation of
non-connectable status to connectable status between
the sensor and the relay mobile.
2) Phase 2: Upon receiving the HELLO message
from the sensor, one or multiple mobile phones (i.e.,
which have the healthcare application) in the closest
proximity may respond. If the acceptances are received
by multiple mobile phones during a predefined time-out,
the best relay among them is elected based on the RSSI
value. If the sensor does not receive any connection
acceptance messages during that time-out, it will repeat
Phase 1 again.
3) Phase 3: Once the connection between the sensor
and the mobile is established, the sensor sends another
connection request (CR) message to the central CS via
the mobile relay. This message includes the CS address
as plain text and the connection request to CS in an en-
crypted format. Advanced Encryption Standard-Counter
with Cipher Block Chaining-Message Authentication
Code (AES-CCM) is used for symmetric encryption
whereas the keys are shared off-line between the sensor
and CS. A timestamp is also contained, in order to keep
the freshness of the connection request. Upon receiving
the connection request and sensor MAC address, the CS
will authenticate the sensor and validate its legitimacy
by decrypting the message with corresponding keys.
4) Phase 4: If the connection request has been
received by a legitimate user, and the message freshness
is encountered, the CS will continue the communication
and send back the connection approving the message.
5) Phase 5: Once the connection is established, the
BLE sensor sends the encrypted data packets to CS
via the mobile relay. When the buffered data is over,
the sensor will send a request to cease the connection.
After receiving this, the CS will reply with an acknowl-
edgment for ceasing the connection which ensures the
successful reception of data. Finally, the BLE sensor
will send the last Ack message and terminate the
connection. This final two-way handshake is performed
in order to guarantee the successful data transmission
from the sensor to the cloud and to validate the genuine
support from the mobile relay.
6) Phase 6: At the end of successful data forwarding
process, the mobile user has to be rewarded for his
service. The reward is automatically calculated by the
application depending on the amount of data uploaded
by the sensor. Based on the sensor acknowledgment
about the completion of data forwarding, the CS will
grant the computed reward to the mobile user. Due to
the rewarding mechanism, the initial user authentication
is important. Furthermore, we consider that the remote
CS is an entirely trusted entity where the final reward
is guaranteed to the mobile user for his service.
V. SIMULATION AND IMPLEMENTATION
A. Simulation
In order to justify the applicability and the reliability
of this protocol in a real environment, we performed
simulations in MATLAB. For that, we estimate the
probability for a successful meeting with at least one
mobile user who is willing to act as a relay. The BLE
sensor needs to meet a mobile user before its data buffer
overflows. The arrival of mobile users can be modeled
as a Poisson process with the expected value λ, the
number of mobile users arrive during ttime interval,
where t=B/λ0:Bis the data buffer size (KB) of the
BLE sensor and λ0is the data generating rate of the
sensor (Kbps). The probability (P) of meeting at least
one mobile user (i.e., the probability of successful data
transmission) during ttime period is expressed as eq. 1.
P= 1 e
λB
λ0/8(1)
In the first simulation, as shown in Figure 4, we illus-
trate how the probability distribution affects at different
mobile arrival rates with a constant data generation
rate of 0.2 Kbps (where λ0= 0.2Kbps) at varying
buffer size. We use CC2650 for the experimental setup
as it is a very common platform for BLE application
development. Since CC2650 has 128 KB Flash memory,
the maximum possible buffer size will be limited to that
value. When the buffer size is increased, the probability
of meeting a mobile user will reach to one with a less
mobile arrival rate. With the maximum buffer size of
128 KB, the probability of success Pwill be one if
three mobile users arrive per hour. When buffer size is
changed to 100 KB, Pwill reach one for the arrival of
five users per hour.
As shown in Figure 4, we illustrate how the probabil-
ity distribution affects at different mobile arrival rates
with a constant data generation rate (λ0= 0.2kbps).
For instance wearable sensors have the potential to
generate big datasets like 156 MB of data per day [12].
By varying the allocated buffer size of CC2650 Flash
memory, we plotted multiple graphs. Since CC2650 has
128KB Flash memory the maximum possible buffer size
will be limited to that value. When the buffer size is
increased, the probability of meeting a mobile user will
reach to one with a less mobile arrival rate. With the
maximum buffer size of 128KB, the probability Pwill
be one if three mobile users arrive per hour.
0 20 40 60 80 100
Mobile arrival rate (users per hour)
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Probability of meeting a mobile user
B=5KB
B=10KB
B=20KB
B=50KB
B=100KB
B=128KB
0246810
0
0.2
0.4
0.6
0.8
1
Fig. 4. Probability distribution of meeting a mobile user for varying
buffer size
Figure 5 illustrates the results of the second experi-
ment with the probability distribution for varying sensor
data generation rates. The buffer size is kept constant as
100 KB. Accordingly, if the data generation rate of the
sensor is low, the highest success rate can be achieved
with a low arrival rate of mobile user. For instance when
λ0= 0.2Kbps, the probability of success Pwill reach
one with arrival of five mobile users per hour.
In the third experiment, we try to find the proximity
requirement to hold the assumption of holding an unin-
terrupted communication link between the BLE sensor
and mobile relay. In order to maintain an uninterrupted
communication link between the BLE sensor and mo-
bile relay, the RSSI value should be above the minimum
detectable level throughout the data transmission time.
Consequently, the distance between those two should
0 20 40 60 80 100
Mobile arrival rate (users per hour)
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
Probability of meeting a mobile user
0.2Kbps
0.4Kbps
0.8Kbps
1.6Kbps
3.2Kbps
4.8Kbps
0246810
0
0.2
0.4
0.6
0.8
1
Fig. 5. Probability distribution of meeting a mobile user for varying
data generation rate
be less than or equal to the maximum threshold. This
distance is estimated using the signal attenuation of BLE
beacons that can be described by the commonly used
logarithmic path loss model [13] given by eq. 2.
RSSID=RSSID0+ 10nlog D
D0
+X(0, σ)(2)
The two values RSSIDand RSS ID0respectively
represent the RSSI (dBm) at the distance D(m) and the
reference distance D0(m). The path loss exponent (n) is
dependent on many environmental factors and obstacles
such as walls, objects, and people. The zero-mean Gaus-
sian noise with variance σ2is represented by X(0, σ).
According to the empirical analysis given in [14], for
BLE communication, the path loss exponent varies from
1.35 to 3 for indoor and outdoor environments. As stated
in [14], the reason for the lower path loss exponent
could be that the indoor environments could be acting
like a wave-guide, resulting in constructive interference.
TABLE I
PATH LOS S EX PO NE NT nVALU ES F OR BLE COMMUNICATION IN
INDOOR AND OUTDOOR ENVIRONMENTS [14]
Environment Category n
Indoor Line of sight 1.98
Non line of sight 1.35
Outdoor 02.89
453.00
902.47
Considering the reference values observed from
CC2650, RSSID0value was measured as -72 dBm at
1m distance D0when the transmission power at the
sensor is adjusted to the minimum of -21 dBm. In
line with the manufacturer specifications of the CC2650
platform, the lowest identifiable RSSI is -100 dBm.
We use these values along with the path loss model
to estimate the distance between the BLE sensor and
the mobile phone in order to maintain an uninterrupted
service. As shown in Figure 6, the plots are drawn
by varying the path loss exponent which increases
with the growth of available obstacles between two
communicating entities. Accordingly, for an uninter-
-100 -90 -80 -70 -60 -50 -40 -30 -20
RSSI (dBm)
0
20
40
60
80
100
120
Distance between sensor and relay (m)
n=1.35
n=1.98
n=2.47
n=2.89
n=3.00
-100 -95 -90 -85 -80
0
20
40
60
80
100
120
Fig. 6. Distribution of distance with the RSSI for varying path loss
exponents
rupted data transfer in the indoor environments, the
distance between the sensor and the mobile needs to
be maintained less than 120 m during the entire time
which the connection is working. In contrast, at the
outdoor environments, the sensor and the mobile have to
keep at most 9m proximity to maintain the connection.
Thereby, we can conclude that our protocol will support
higher user mobility in the indoor environments than in
outdoors.
B. Implementation
In order to show the feasibility of this protocol,
we have accomplished the prototype implementation
on a testbed with a BLE sensor, mobile, and cloud
platform (Figure 7). The Internet access was achieved
by the general university WiFi network (i.e., PanOULU
network).
Fig. 7. Testbed setup
Texas Instrument sensor tag CC2650 and Samsung
Galaxy Note 8 were respectively used as the sensor
and mobile hardware platforms. In accordance with
the protocol, we slightly modified the BLE stack 2.2.1
on CC2650 using SmartRF Flash programmer 2. The
mobile application was developed on Android 7.1.1 op-
erating system using Android Studio 3.0 libraries. This
mobile application scans in the background to discover
devices and connects to the BLE sensors. This BLE
sensor is then paired with the mobile automatically,
using the passcode 0000. After paring, sensor initiates
data uploading directly to the Cloud platform. The last
part of the implementation was to deploy the cloud
server on Google Firebasewhere the user of the mobile
application can authenticate himself and the sensor can
upload the sensed data to a JSON database. The user
needs to login the application for authentication by CS
and the collection of rewards. The application monitors
the amount of data transferred from the sensor to the
cloud and after the confirmation from the CS, the
application automatically credits the reward to the user
account. In order to keep the reward mechanism simple
and profitable, for transferring every 1 KB of data, the
user gets one point which can later be used for different
purposes (e.g., convert into digital currency). Moreover,
Firebase uses HTTPS connection over TLS for secure
communications between the mobile and cloud server
along with real-time database security.
TABLE II
BLE CO NFIG UR ATIO N SE TT IN GS F OR CC2650
Attribute Configured values
Transmission power 0 dB
Number of running services 6 services
Periodic event 1000 ms
Advertising interval 100 ms
Connection timeout 1000 ms
Broadcast delay 500 ms
Packet size 18 byte
Under normal network conditions, we measured the
maximum response time of the mobile to discover a
sensor, authenticate the sensor from the cloud, establish
connection and discover one service, upload data, and
terminate the connection. Each experiment was per-
formed ten times and the average was taken. In order to
synchronize the clock time between sensor and mobile,
computer clock time was sent to sensor when flashing
the modified BLE stack. The application data inside
one packet, which is 18 byte, is equivalent to one data
reading. Figure 8 shows the distribution of timing values
for those five operations. Accordingly, the total response
time for the mobile was computed as 5.4 s.
The durations for connection initializing (2.8 s) (i.e.,
including sensor discovery, authentication, connection
establishment, and service discovery) and termination
(0.2 s) will remain constant, irrespective of the amount
of data transferred.
The power consumption for Android application run-
ning on the mobile was reported as 33 mAh. Therefore,
with 3.85 v nominal voltage, the power consumption of
Discovery
Authentication
Con. establishment
Data upload
Con. termination
0
0.5
1
1.5
2
2.5
Time (s)
Fig. 8. Time distribution for the protocol operations
the application on the mobile is 127.05 mW per hour.
It is only 1% of battery. Thus energy consumption is
quite low for our implementation. The distribution of
power consumption of CC2650 sensor was observed
from Monsoon power monitor tool , as depicted in
Figure 9. The average power consumption values of
the sensor during the connection establishment and data
upload to the cloud were recorded as 239 mW and
262 mW. On an average, the sensor uploads the data
to cloud server once every hour. We assume that every
transaction takes approximately 1 minute and the sensor
deactivates its BLE until the next transaction. With the
Cell capacity of 300mAh, the sensor uses approximately
0.5% of battery for each transaction and it can upload
data 200 times without recharging the sensor.
Fig. 9. Distribution of sensor power consumption
VI. SECURITY CONSIDERATION
Passive eavesdropping can be a critical issue in these
kinds of relay-based systems. Passive eavesdropper can
learn about users’ privacy information (e.g. location and
current health condition) from the sensed data. He can
also obtain the network parameters of the CS to perform
network-level attacks such as TCP reset attacks. In order
to eliminate the risk of passive eavesdropping, we use
AES-CCM for E2E data encryption. AES-CCM is an
authenticated encryption algorithm designed to provide
both authentication and confidentiality. In brief, since
the cryptography of the protocol takes ”authenticate-
then-encrypt” approach, the risks of eavesdropping at-
tacks are prevented. Furthermore, the establishment of
secure E2E connections between the source (BLE sen-
sor) and destination (CS) will eliminate the prerequisite
for the trustworthiness of the mobile relay.
MITM attacks can be imposed either on the link
between the BLE sensor and the mobile relay, or on
the link between the mobile relay and CS. In the first
scenario, a malicious relay mobile can collect the sensor
data, but it will not forward the collected traffic to the
CS. As explained in figure 3, the sensor node will not
delete the transmitted data until it receives an acknowl-
edgment from CS. If the sensor does not receive an
acknowledgment within a predefined timeout value, the
sensor will select another relay to transmit the data and
blacklist the malicious relay which is unable to complete
the transmission. Since we use E2E encryption between
the sensor node and the cloud server, it is not possible
for the mobile relay to generate an acknowledgement. In
the second case, a malicious relay can try to alter the
data or augment bogus data to receive extra rewards
from CS. Since we use E2E encryption between the
sensor node and the cloud server, it is not possible
for the relay node to generate new data or alter the
data without the consent of the cloud server. If the CS
notices such attempts by a relay node, it will blacklist
and remove the corresponding mobile relay from the
system. Furthermore, by including the timestamp values
to the messages generated by the sensor, the message
freshness is guaranteed and the CS will identify if there
is an attempt to impose replay attacks.
Identity tracking occurs when a malicious entity
associates the address of a BLE device with a specific
user and then physically tracks that user based on the
presence of the BLE device. These attacks are prevented
by periodically changing the BLE device address.
As the CS is responsible for storing sensor data
of different individuals, it becomes the most potential
attack point. The attackers will try to act as legitimate
sensors or relays. These kinds of impersonate attacks
can be also eliminated by using a strong authentication
process between the mobile and the CS. The application
running on the mobile should contain the login creden-
tials for authentication which are acquired during the
pre-registration phase with the CS. The pre-shared keys
between the sensor and the CS will also provide an
implicit authentication.
VII. CONCLUSIONS
Under the proliferation of low-power IoT technolo-
gies and their applications, universal accessibility is
a noteworthy attribute that needs to be possessed by
the sensors. Throughout this paper, we have addressed
how to provide such an ubiquity for the low-power
BLE sensors with the help of mobile relay nodes.
According to our experimental evaluations, the protocol
will successfully work even with the arrival of three
mobile users per an hour for the proximity of 120 m for
indoor and 9 m for outdoor environments. Finally, the
prototype implemented verified the technical readiness
of the proposed solution. Experiments revealed that
Texas Instrument sensor tag CC2650 can upload data
for 200 times without recharging the sensor. Moreover,
mobile phone uses only 1% battery power for one hour
of operation. As the future work, we intend to extend
the very same idea of exploiting mobile relay nodes
with drone technologies.
REFERENCES
[1] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and
M. Ayyash, “Internet of things: A survey on enabling tech-
nologies, protocols, and applications,” IEEE Communications
Surveys & Tutorials, vol. 17, no. 4, pp. 2347–2376, 2015.
[2] N. Xia, H.-H. Chen, and C.-S. Yang, “Radio resource manage-
ment in machine-to-machine communications-a survey,” IEEE
Communications Surveys & Tutorials, 2017.
[3] J. Nieminen, C. Gomez, M. Isomaki, T. Savolainen, B. Patil,
Z. Shelby, M. Xi, and J. Oller, “Networking solutions for con-
necting bluetooth low energy enabled machines to the internet
of things,” IEEE network, vol. 28, no. 6, pp. 83–90, 2014.
[4] “Bluetooth Core Specification Version 5.0,” Bluetooth Special
Interest Group (SIG).
[5] Z. Shelby and C. Bormann, 6LoWPAN: The wireless embedded
Internet. John Wiley & Sons, 2011, vol. 43.
[6] H. Wirtz, T. Zimmermann, M. Serror, and K. Wehrle, “Collabo-
rative on-demand wi-fi sharing,” in 2015 IEEE 40th Conference
on Local Computer Networks (LCN), Oct 2015, pp. 19–27.
[7] S. Raza, P. Misra, Z. He, and T. Voigt, “Building the internet
of things with bluetooth smart,” Ad Hoc Networks, vol. 57, pp.
19–31, 2017.
[8] A. M. Rahmani, T. N. Gia, B. Negash, A. Anzanpour, I. Azimi,
M. Jiang, and P. Liljeberg, “Exploiting smart e-health gateways
at the edge of healthcare internet-of-things: a fog computing
approach,” Future Generation Computer Systems, vol. 78, pp.
641–658, 2018.
[9] M. Haus, A. Y. Ding, and J. Ott, “Managing iot at the edge:
The case for ble beacons,” in Proceedings of 3rd Workshop
on Experiences with the Design and Implementation of Smart
Objects, ser. MobiCom SMARTOBJECTS ’17. New York, NY,
USA: ACM, 2017, pp. 41–46.
[10] M. Gentili, R. Sannino, and M. Petracca, “Bluevoice: Voice
communications over bluetooth low energy in the internet of
things scenario,” Computer Communications, vol. 89, pp. 51–
59, 2016.
[11] S. R. Moosavi, T. N. Gia, E. Nigussie, A. M. Rahmani,
S. Virtanen, H. Tenhunen, and J. Isoaho, “End-to-end security
scheme for mobility enabled healthcare internet of things,”
Future Generation Computer Systems, vol. 64, pp. 108–124,
2016.
[12] S. Redmond, N. Lovell, G. Yang, A. Horsch, P. Lukowicz,
L. Murrugarra, and M. Marschollek, “What does big data mean
for wearable sensor systems?: Contribution of the imia wearable
sensors in healthcare wg,” Yearbook of medical informatics,
vol. 9, no. 1, p. 135, 2014.
[13] M. Hata, “Empirical formula for propagation loss in land mobile
radio services,” IEEE transactions on Vehicular Technology,
vol. 29, no. 3, pp. 317–325, 1980.
[14] X. Zhao, Z. Xiao, A. Markham, N. Trigoni, and Y. Ren, “Does
btle measure up against wifi? a comparison of indoor location
performance,” in Proceedings of 20th European Wireless Con-
ference. VDE, 2014, pp. 1–6.
... In Table 2, a list of abbreviations used in this article and their meanings are given, and some key features of cellular and IoT relaying are provided in Table 3. Our survey is not limited to a particular IoT connectivity technology because the use of relays has been considered for various connectivity solutions, such as LoRaWAN [30], NB-IoT [31], and Bluetooth low energy [32]. ...
... Furthermore, asymmetric synchronization between the relay and IoT end devices is proposed without a real-time clock to guarantee time synchronization. Unlike the works in [8] and [115], where modified IoT end devices were used as relays in practical relay enabled IoT networks, in [32], a prototype of a mobile phone relay was presented. In so doing, no modification is needed on the relay's physical features. ...
... In so doing, no modification is needed on the relay's physical features. The work in [32] used a smartphone to forward medical data from a sensor to a central server without the use of a gateway. BLE is used as the connectivity technology between the sensor and the smartphone that accesses the central server using an IP network. ...
Article
Full-text available
The deployment of relays between Internet of Things (IoT) end devices and gateways can improve link quality. In cellular-based IoT, relays have the potential to reduce base station overload. The energy expended in single-hop long-range communication can be reduced if relays listen to transmissions of end devices and forward these observations to gateways. However, incorporating relays into IoT networks faces some challenges. IoT end devices are designed primarily for uplink communication of small-sized observations toward the network; hence, opportunistically using end devices as relays needs a redesign of both the medium access control (MAC) layer protocol of such end devices and possible addition of new communication interfaces. Additionally, the wake-up time of IoT end devices needs to be synchronized with that of the relays. For cellular-based IoT, the possibility of using infrastructure relays exists, and noncellular IoT networks can leverage the presence of mobile devices for relaying, for example, in remote healthcare. However, the latter presents problems of incentivizing relay participation and managing the mobility of relays. Furthermore, although relays can increase the lifetime of IoT networks, deploying relays implies the need for additional batteries to power them. This can erode the energy efficiency gain that relays offer. Therefore, designing relay-assisted IoT networks that provide acceptable trade-offs is key, and this goes beyond adding an extra transmit RF chain to a relay-enabled IoT end device. There has been increasing research interest in IoT relaying, as demonstrated in the available literature. Works that consider these issues are surveyed in this paper to provide insight into the state of the art, provide design insights for network designers and motivate future research directions.
... Many associated works based on IoT systems for healthcare are already available, and some use mobile phones for connection establishment. One such piece of work is in [8] [9], which introduces a mobile-based relay assistance system for establishing a secure end-to-end (E2E) connection between lowpower IoT sensors and cloud servers without using any specific and dedicated gateway. It proposes a basic prototype to accomplish communication tasks and E2E connection establishment through a secure AES-CCM encryption technique. ...
... But this system is not fully compatible with resource-constrained devices such as those that have power limitations. Besides, [8], all the other related works are using a dedicated gateway for data transmission. ...
... Moreover, the proposed solution in [8] supports a single relay for real-time data transmission only. This approach implies that it can fail when there is no relay nearby during an incident since critical data is dropped or is not available on time. ...
Article
Full-text available
Typical wearable devices use a dedicated mobile phone as relay node to transfer the collected sensor data to a server. However, such relay nodes can be faulty or inactive due to various reasons, leading to interruptions of the communication link. To mitigate this challenge, we propose a novel security-enhanced emergency situation detection system, where 3\textsuperscript{rd} party unknown mobile relays are used instead of dedicated gateways as opposed to many existing solutions for IoT healthcare applications. The proposed underlying key agreement and authentication scheme ensures anonymity and untraceability for both sensors (wearable devices) and relay nodes, and relies on symmetric key-based operations to function under resource-constrained environments. We have also developed a prototype of the system using commercial off-the-shelf devices to verify the proposed method's validity and evaluate the performance advantage over existing approaches. Bluetooth Low Energy (BLE) communication technology is used to connect sensor nodes (wearable devices) and mobile relays. After sending medical data to the cloud server, the relay node is responsible for emergency detection and alert generation.
... The work presented in [4] [5] introduces a mobile-based relay assistance system for the establishment of a secure End to End (E2E) connection between low-power IoT sensors and cloud servers without using any specific and dedicated gateway. This work proposes a basic prototype to accomplish the communication task and the E2E connection establishment is done through a secure AES-CCM encryption technique. ...
... Other than [4], all the other related works use a dedicated gateway for data transmission. ...
... Moreover, the proposed solution in [4] supports a single relay for real-time data transmission only. If there is no relay nearby during the incident, the model proposed in [4] will not work. ...
Conference Paper
Full-text available
This paper proposes “An Emergency Situation Detection System for Ambient Assisted Living (AAL)”, to support elderly people and patients with chronic conditions and potential health-related emergencies to live independently. It implements an Internet of Things (IoT) network that continuously monitors the health conditions of these people. The network includes mobile phones, to transmit the data generated by the IoT sensors to the cloud server. Especially, the paper proposes the 3\textsuperscript{rd} party unknown mobile relays instead of dedicated gateways as opposed to many existing solutions for IoT healthcare applications. The wireless communication technology used to provide the connectivity between the sensor nodes and mobile relays is Bluetooth Low Energy (BLE). To establish a secure end-to-end connectivity between low power IoT sensor nodes and cloud servers, the paper proposes several techniques. After the medical data transmission to the cloud server, it is responsible for emergency detection and alert generation accordingly. The type of emergency is not limited to a specific health issue, but new emergency situations can be defined and added to the proposed system. Ultimately, the interested parties such as family members, caretakers and doctors receive these alerts. The development of a prototype of the system as a part of the work using commercial off-the-shelf devices verifies the validity of the proposing system and evaluates the performance advantage over the existing systems.
... BLE is a commonly used stateless protocol where the requests are independently transmitted. Moreover, BLE allows a flexible topology that can be adjusted to accommodate in many applications [6]. The IoT sensor nodes that use standalone BLE for communication purposes require dedicated nodes that serve as local gateways (GWs) to provide back-end connectivity with the central cloud servers. ...
... The IoT sensor nodes that use standalone BLE for communication purposes require dedicated nodes that serve as local gateways (GWs) to provide back-end connectivity with the central cloud servers. In our previous work, we presented a mobile-based relay assistance solution for establishing secure End-to-End (E2E) connectivity between low-power IoT sensors and cloud servers without using a dedicated gateway [6], [7]. ...
... The proposed system supports edge computing architecture to provide both insight and remote processing capabilities to the remotely located IoT sensor networks. Instead of using mobile phone as the relay in [6], here we use a drone accompanied by a Raspberry Pi to perform as an edge processor. We have proven the viability of the proposed solution by providing the comprehensive analysis of the simulation results. ...
Conference Paper
Full-text available
The proliferation of the Internet of Things (IoT) technologies have strengthen the self-monitoring and autonomous characteristics of the sensor networks deployed in numerous application areas. The recent developments of the edge computing paradigms have also enabled on-site processing and managing the capabilities of sensor networks. In this paper, we introduce a system model that enables end-to-end secure connectivity between low-power IoT devices and UAVs, that helps to manage the data processing tasks of heterogeneous wireless sensor networks. The performance of proposed solution is analyzed by using simulation results. Moreover, in order to demonstrate the practical usability of the proposed solution, the prototype implementation is presented using commercial off-the-shelf devices.
... Typical use cases of UAVs were also discussed, including UAVaided delay-tolerant data collection from a large number of distributed wireless devices, such as in precision agriculture applications. Porambage et al. [7] have presented a solution to establish end-to-end secure connectivity between low-power IoT sensors and the cloud server by employing a mobilebased relay. For ambient assisted living application, they have simulated and implemented E2E secure connectivity for CC2650 SensorTag nodes with the cloud server through mobile phone relays. ...
... In general, the signal attenuation in BLE is expressed with Received Signal Strength Indicator (RSSI) value. Therefore, the signal attenuation at a distance d can be determined by employing the commonly used logarithmic path loss model [7]. ...
... Typical use cases of UAVs were also discussed, including UAVaided delay-tolerant data collection from a large number of distributed wireless devices, such as in precision agriculture applications. Porambage et al. [7] have presented a solution to establish end-to-end secure connectivity between low-power IoT sensors and the cloud server by employing a mobilebased relay. For ambient assisted living application, they have simulated and implemented E2E secure connectivity for CC2650 SensorTag nodes with the cloud server through mobile phone relays. ...
... In general, the signal attenuation in BLE is expressed with Received Signal Strength Indicator (RSSI) value. Therefore, the signal attenuation at a distance d can be determined by employing the commonly used logarithmic path loss model [7]. ...
Article
Full-text available
The ever-increasing number of mobile end-user devices and the enormous amount of data processing have been the driving forces behind the growth of mobile cloud computing By integrating cloud computing capabilities into the mobile environment, MCC technology makes it possible for mobile users to make full advantage of cloud resources [2-8]. It is possible to meet the processing requirements of mobile devices by using resources at cloud providers other than the mobile devices themselves to host the execution of mobile applications. This is accomplished by offloading the computation data to the clouds. Mobile cloud computing is a kind of cloud computing infrastructure in which data processing and storage are performed off-site using mobile devices. The name "mobile cloud" alludes to this concept. Cellular core networks may be used by mobile user equipment (UEs) in order to get access to cloud computing services. Therefore, the elastic processing power and storage that is offered by the clouds can support a wide variety of applications that are designed for mobile user equipment (UEs) that have limited resources. By transferring computational tasks from user equipment (UEs) to infrastructure-based cloud servers, MCC has the potential to reduce the amount of energy that UEs use and improve the performance of mobile applications. During the course of the last several decades, cloud computing has seen rapid expansion as an efficient computing platform. This expansion is mostly attributable to the growing processing and computational requirements of various client devices. Considering the significant developments that have been made in networking and communication technologies, users are expecting higher quality standards in addition to the enormous computing requirements.
Chapter
Full-text available
In a world with “things” and devices interconnected at every level, from wearables to home and building automation, to smart cities and infrastructure, to smart industries, and to smart‐everything, the Internet of Things (IoT) security plays a central role with no margin for error or shortage on supply. Securing, including authentication of these devices, will become everyone's priority, from manufacturers to silicon vendors (or IP developers), to software and application developers, and to the final consumer, the beneficiaries of the security “recipe” that will accompany these IoT products. Together, all consumers of these products need to adapt to the market demands, innovate, and improve processes, grasp new skills and learn new methods, raise awareness and embrace new training and curricula programs. In this article, we provide a thorough survey and classification of the existing vulnerabilities, exploitable attacks, possible countermeasures as well as access control mechanisms including authentication and authorization. These challenges are addressed in detail considering both the technologies and the architecture used. Furthermore, this work also focuses also on IoT intrinsic vulnerabilities as well as the security challenges at every layer. In addition, solutions for remediation of the compromised security, as well as methods for risk mitigation, with prevention and suggestions for improvement are discussed.
Chapter
The successful existence of the Internet, its proven potential to cater to day‐to‐day needs of people from all walks of life and its indispensability to society at large, together have propelled the evolution of the current Internet to the next level termed as the Internet of Things (IoT). As a witness to the dawn of IoT revolution, what we are experiencing (and will continue in to do so in the near future at an exponential and astonishing rate) is the intelligent presence and communication of the physical objects or things around us with themselves (M2M) and/or with humans (M2H). Emergence of such a kind of pervasive inter‐networking ecosystem has enormous scope in terms of market growth and applications which have (to some extent) and will prove with greater force its efficacy to improve quality of life. Though it is bit early to precisely define the depth of coverage and the long‐term impact of IoT applications, nevertheless particularly in domains like healthcare, agriculture, city and home/office automation, industrial and energy management, etc. the immediate applications of IoT are easily conceivable. For realization and rapid development of such IoT applications, formal establishment of IoT architecture and standardization of related protocol suites are vital as they ensure co‐existence and co‐operation of cross‐vendor devices as well as applications. Nevertheless, as with any other hyped research area, IoT has also become victim of its own success and hitherto no one architecture is globally accepted with a common consensus. In the midst of this, this chapter intends to introduce IoT in a pedagogical manner to the readers. More specifically, the chapter guides the reader through the evolution of IoT, discusses the pertinent taxonomy and proposed architectures, probes the various efforts for standardization of IoT and illustrates some of the popular applications of IoT. While dealing with promising IoT applications, the chapter presents a comprehensive view comprised of the constituent components and major stakeholders to fit‐in, characteristics and key factors to focus, enabling technologies to leverage and categorize each application to understand the various viewpoints.
Chapter
Full-text available
In a world with “things” and devices interconnected at every level, from wearables to home and building automation, to smart cities and infrastructure, to smart industries, and to smart‐everything, the Internet of Things (IoT) security plays a central role with no margin for error or shortage on supply. Securing, including authentication of these devices, will become everyone's priority, from manufacturers to silicon vendors (or IP developers), to software and application developers, and to the final consumer, the beneficiaries of the security “recipe” that will accompany these IoT products. Together, all consumers of these products need to adapt to the market demands, innovate, and improve processes, grasp new skills and learn new methods, raise awareness and embrace new training and curricula programs. In this chapter, we provide a thorough survey and classification of the existing vulnerabilities, exploitable attacks, possible countermeasures as well as access control mechanisms including authentication and authorization. These challenges are addressed in detail considering both the technologies and the architecture used. Furthermore, this work also focuses on IoT intrinsic vulnerabilities as well as the security challenges at every layer. In addition, solutions for remediation of the compromised security, as well as methods for risk mitigation, with prevention and suggestions for improvement are discussed.
Conference Paper
Full-text available
Internet of Things(IoT) devices need pervasive and secure connections to transfer the aggregated data to the central servers located in remote clouds where the collected data further processed and stored. However, most of low-power IoT devices can not transmit the collected the data directly to such servers due the limited transmission power and range. Thus, third-party devices such as smart mobile phones are used as an relay to establish the communication link between IoT devices and the cloud server. This paper demonstrate a mobile-based relay assistance solution for secure end-to-end connectivity between low-power IoT sensors and cloud servers by using Bluetooth Low Energy(BLE) technology. The prototype implementation verifies the technical readiness of the proposed solution.
Article
Full-text available
Current developments in ICTs such as in Internet-of-Things (IoT) and Cyber-Physical Systems (CPS) allow us to develop healthcare solutions with more intelligent and prediction capabilities both for daily life (home/office) and in-hospitals. In most of IoT-based healthcare systems, especially at smart homes or hospitals, a bridging point (i.e., gateway) is needed between sensor infrastructure network and the Internet. The gateway at the edge of the network often just performs basic functions such as translating between the protocols used in the Internet and sensor networks. These gateways have beneficial knowledge and constructive control over both the sensor network and the data to be transmitted through the Internet. In this paper, we exploit the strategic position of such gateways at the edge of the network to offer several higher-level services such as local storage, real-time local data processing, embedded data mining, etc., presenting thus a Smart e-Health Gateway. We then propose to exploit the concept of Fog Computing in Healthcare IoT systems by forming a Geo-distributed intermediary layer of intelligence between sensor nodes and Cloud. By taking responsibility for handling some burdens of the sensor network and a remote healthcare center, our Fog-assisted system architecture can cope with many challenges in ubiquitous healthcare systems such as mobility, energy efficiency, scalability, and reliability issues. A successful implementation of Smart e-Health Gateways can enable massive deployment of ubiquitous health monitoring systems especially in clinical environments. We also present a prototype of a Smart e-Health Gateway called UT-GATE where some of the discussed higher-level features have been implemented. We also implement an IoT-based Early Warning Score (EWS) health monitoring to practically show the efficiency and relevance of our system on addressing a medical case study. Our proof-of-concept design demonstrates an IoT-based health monitoring system with enhanced overall system intelligence, energy efficiency, mobility, performance, interoperability, security, and reliability.
Article
In futuristic wireless communications, a massive number of devices need to access networks with diverse quality of service (QoS) requirements. It is estimated that the number of connected devices will exceed twenty billions in 2020, and machine-to-machine (M2M) devices will account for nearly half of total connected devices. However, existing cellular systems and wireless standards, designed primarily for human-to-human (H2H) communications focusing on reducing access latency, increasing data rate and system throughput, are not well suited for M2M communications that require massive connections, diverse QoS requirements, and low energy consumption. Radio resource management (RRM) in conventional H2H communications aims at improving spectrum efficiency (SE) and energy efficiency (EE). Similarly, RRM also plays a vital role in M2M communications. In this paper, we make a comprehensive survey on state-of-the-art research activities on RRM in M2M communications. First, we discuss the issues on RRM for MTC in LTE/LTE-A cellular networks including access control, radio resource allocation, power management, and the latest 3GPP standards supporting M2M communications. Acknowledging the fact that a single technology can not support all M2M applications, we discuss RRM issues for unlicensed band radio access technologies (RATs) in M2M capillary networks, including IEEE 802.11ah, Bluetooth Low Energy (BLE), ZigBee, and smart metering networks (SUNs). We also survey M2M RRM methods in heterogeneous networks consisting of cellular networks, capillary networks, and ultra dense networks (UDNs). Finally, we review recent standard activities and discuss the open issues and research challenges.
Conference Paper
Managing IoT devices in urban areas is becoming crucial because the majority of people living in cities and the number of deployed IoT devices are steadily increasing. In this paper we present iConfig, an edge-driven platform dedicated to manage IoT devices in smart cities. The goal is to address three major issues in current IoT management: registration, configuration, and maintenance. The core of iConfig is its programmable edge module, which can be deployed across smartphones, wearables, and smart boards to configure and interact with physically proximate IoT devices. Through testbed experiments and usability studies, we reveal the hardship and hidden pitfalls in managing IoT devices, especially for low budget devices like Bluetooth Low Energy (BLE) beacons. Our system evaluation shows that iConfig can effectively address the aforementioned IoT management challenges by harnessing the mobile and edge cooperation. To inspire community contributions, we further present concrete use cases to illustrate how iConfig can reduce operational cost and facilitate future edge-centric IoT research.
Article
The Internet of Things, or the IoT, is an emerging, disruptive technology that enables physical devices to communicate across disparate networks. IP has been the de facto standard for seamless interconnectivity in the traditional Internet; and piggybacking on the success of IP, 6LoWPAN has been the first standardized technology to realize it for networks of resource-constrained devices. In the recent past Bluetooth Low Energy (BLE) a.k.a Bluetooth Smart - a subset of the Bluetooth v4.0 and the latest v4.2 stack, has surfaced as an appealing alternative, with many competing advantages over available low-power communication technologies in the IoT space such as IEEE 802.15.4. However, BLE is a closed standard and lacks open hardware and firmware support, something that hinders innovation and development in this field. In this article, we aim to overcome some of the constraints in BLE’s core building blocks by making three contributions: first, we present the design of a new open hardware platform for BLE; second, we provide a Contiki O.S. port for the new platform; and third, we identify research challenges and opportunities in 6LoWPAN-connected Bluetooth Smart. We believe that the knowledge and insights will facilitate IoT innovations based on this promising technology.
Article
Bluetooth Low Energy (Bluetooth LE) is a key technology in the envisioned Internet of Things (IoT) scenario. In fact, its extremely low-power characteristics make it one of the most suitable solutions to enable wireless communications among battery powered IoT objects ubiquitously deployed in the field with the aim of building smart environments. Although Bluetooth LE specification targets a specific set of applications mainly devoted to monitoring purposes, innovative solutions can lead to the adoption of such technology in different applications, such as multimedia streaming, allowing IoT objects to exploit new functionalities. In this direction this article presents BlueVoice, an application targeted to Bluetooth LE devices to enable speech streaming services.
Article
Bluetooth low energy(BTLE) is an emerging lowpower wireless communication technology which is expected to be of great potential in the next few years. In this paper, we propose several empirical propagation models for BTLE in different conditions: indoor/outdoor, line-of-sight (LOS)/non-line-ofsight (NLOS). Then we compare the propagation characteristics between BTLE and WiFi. It is demonstrated in our experiments that BTLE propagation model can better relate RSSI to range than WiFi, which indicates that BTLE can be more accurate when used in localization scenarios. Extensive experiments in indoor environments have been conducted to explicitly compare the localization accuracy between BTLE and WiFi with nearly identical external environments and conditions. BTLE is proved to be more accurate than WiFi by around 27 percent. We also discuss various underlying reasons why BTLE outperforms WiFi in localization scenarios. We believe that such an accurate and low-cost technique will enable practical and ubiquitous indoor localization.