Secure Tracking -                GSM, GNSS and Beyond                                         by                          ...
Introduction to CCww        Communications Consultants Worldwide Ltd.                 Bournemouth, UK        Long histo...
Why Do We Track?                                   In order to                                       protect valuable as...
Introduction to Secure Tracking        What are the generic weaknesses in most tracking solutions?        How are these ...
Strategy-1: GNSS        Most tracking systems use GNSS systems                 GPS is most common: free access, reasonab...
Strategy-2: Cell-ID                                      Send base station information to                                ...
Strategy-3: Wireless Beacon                                          Tracker uses intermittent                           ...
Strategy-4: Pin-Point Tracking                                   Uses continuous radio beacon                            ...
Strategy 5: Other Techniques        Wi-Fi                 Tracker unit has Wi-Fi receiver                 captures loca...
Demonstration By Use-Cases         Review 2 use-cases to highlight hybrid tracking in practice                 Vulnerabl...
Devices         TracSure™ 100                 uses 433MHz proprietary radio beacon                 stand-alone and opti...
Vulnerable Person-1                                             Beacon Receiving Stations      E         BRS             ...
Vulnerable Person-2                                               Wearer now moved to      E         BRS                 ...
Vulnerable Person-3                                                  Wearer now outside                                  ...
Next… Asset Tracking(C) 2013 CCww   Slide: 15
Asset Tracking-1                                           Assets stored in building                                     ...
Asset Tracking-2                                             Accelerometer detects                                       ...
Asset Tracking-3                                                Asset last observed                                      ...
Conclusions                 Tracking made more secure and resilient by using hybrid techniques                 Not just ...
Thank you for your kind attention                  Join us for networking and refreshments after this session             ...
Upcoming SlideShare
Loading in...5
×

Secure Tracking - GSM, GNSS and Beyond

486

Published on

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
486
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
33
Comments
0
Likes
2
Embeds 0
No embeds

No notes for slide

Secure Tracking - GSM, GNSS and Beyond

  1. 1. Secure Tracking - GSM, GNSS and Beyond by Richard Carter CEO & Founder of CCww UKTI & ICT KTN IoT and M2M for open and secure new services and applications MWC2013, Barcelona, 25 February(C) 2013 CCww Slide: 1
  2. 2. Introduction to CCww  Communications Consultants Worldwide Ltd.  Bournemouth, UK  Long history in cellular systems design  Developers of embedded protocol stack software  license stacks to integrators & manufacturers  (>1B devices)  use our stacks in our own product families  Custom Cellular Services  Feature phone, smart-phone and custom product design for customers world-wide  from spec to proof-of-concept to volume production  M2M solutions  STAR-Let 200 GSM/GPRS modem module  TracSure™ tracker product family(C) 2013 CCww Slide: 2
  3. 3. Why Do We Track?  In order to  protect valuable assets  maintain knowledge of stock-list  off-set insurance costs  retrieve mislaid or stolen items  protect professionals engaged in high- risk activities  improve the quality of life for the vulnerable  secure the irreplaceable(C) 2013 CCww Slide: 3
  4. 4. Introduction to Secure Tracking  What are the generic weaknesses in most tracking solutions?  How are these weaknesses overcome?(C) 2013 CCww Slide: 4
  5. 5. Strategy-1: GNSS  Most tracking systems use GNSS systems  GPS is most common: free access, reasonably reliable, very accurate, fast TTFF with assistance (A-GPS)  but, like all GNSS, it has weaknesses J A A A X ✓ X(C) 2013 CCww Slide: 5
  6. 6. Strategy-2: Cell-ID  Send base station information to server  Server uses database lookup and returns estimated location  More resilient than GNSS, but less accurate & more variable A A A ✓ ✓ ✓(C) 2013 CCww Slide: 6
  7. 7. Strategy-3: Wireless Beacon  Tracker uses intermittent radio beacon: works in buildings and not subject to GPS-jamming E BRS  Signal information received by BRS; Ethernet back-haul  Server calculates position  Range 25m to 200m  Locates to within few metres A BRS E E X E BRS(C) 2013 CCww Slide: 7
  8. 8. Strategy-4: Pin-Point Tracking  Uses continuous radio beacon  Signal picked up by Pin-Point Tracker  Guides operator towards asset  Ultimate pin-point to 100mm A PPT PPT PPT(C) 2013 CCww Slide: 8
  9. 9. Strategy 5: Other Techniques  Wi-Fi  Tracker unit has Wi-Fi receiver  captures local AP SSIDs, MAC addresses  sends data to server  receives estimated position by analysis of AP locations  Network timing information  observed time difference, and timing advance  measured by UE and sent to server with cell-IDs  server uses timing information plus BS locations to calculate and return estimated position(C) 2013 CCww Slide: 9
  10. 10. Demonstration By Use-Cases  Review 2 use-cases to highlight hybrid tracking in practice  Vulnerable person  Valuable asset retrieval(C) 2013 CCww Slide: 10
  11. 11. Devices  TracSure™ 100  uses 433MHz proprietary radio beacon  stand-alone and option for other TracSure™ trackers  TracSure™ 200  GPRS/ A-GPS tracker watch (bracelet, fob)  option incorporates beacon: =‘on’  TracSure™ 400  GPRS/ A-GPS tracker unit with accelerometer  option incorporates beacon: =‘on’(C) 2013 CCww Slide: 11
  12. 12. Vulnerable Person-1  Beacon Receiving Stations E BRS send data on beacons in range to server  Watch has beacon activated  Wearer in normal area BRS E  Server monitors habitual movement so can alert anomalies E X E BRS(C) 2013 CCww Slide: 12
  13. 13. Vulnerable Person-2  Wearer now moved to E BRS corridor  For most vulnerable, this might trigger an amber alert BRS E E X E BRS(C) 2013 CCww Slide: 13
  14. 14. Vulnerable Person-3  Wearer now outside  A-GPS switched on  Beacon in low-rep mode GPRS =>  This triggers red alert  If wearer returns indoors, GPS turned off; alert issued; revert to beacon E BRS tracker GPRS => X BRS E(C) 2013 CCww Slide: 14
  15. 15. Next… Asset Tracking(C) 2013 CCww Slide: 15
  16. 16. Asset Tracking-1  Assets stored in building Protected by TracSure™ 400 with optional beacon TracSure™ is in deep sleep to save battery A A A A A A ZZZ-ZZ-Z(C) 2013 CCww Slide: 16
  17. 17. Asset Tracking-2  Accelerometer detects movement, and turns on modem + A-GPS unit  Alert message sent to server, with location/time information  Security guard follows by car/on-foot Crickey! GPRS => A A A X A A GPRS =>(C) 2013 CCww Slide: 17
  18. 18. Asset Tracking-3  Asset last observed position close to building entrance  Operator guesses asset in building & turns on beacon  Security guard uses PPT PPT unit to home-in on and Phew! PPT recover asset X PPT PPT(C) 2013 CCww Slide: 18
  19. 19. Conclusions  Tracking made more secure and resilient by using hybrid techniques  Not just GNSS, but  Cell-ID  observed time difference+ timing advance  radio beacon for macro positioning  radio beacon for pin-point location  Wi-Fi AP information  Intelligent switching between modes extends battery life  Appropriate use of Hybrid solutions  enhance tracking accuracy  enhance resilience  for environmental obstacles as well as intentional denial of service(C) 2013 CCww Slide: 19
  20. 20. Thank you for your kind attention Join us for networking and refreshments after this session Visit our stand/ booth in Hall 7 7B90  For further information, contact:  Richard Carter: carter@ccww.co.uk  Anthony Cutler: cutler@ccww.co.uk  +44 1202 318161  www.ccww.co.uk(C) 2013 CCww Slide: 20
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×