<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>A. Novytskyi); v.sokolov@kubg.edu.ua (V. Sokolov); l.kriuchkova@kubg.edu.ua
(L. Kriuchkova); p.skladannyi@kubg.edu.ua (P. Skladannyi)</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Determining the error distribution of BLE beacons at antenna near and far fields</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv Metropolitan University</institution>
          ,
          <addr-line>Bulvarno-Kudriavska Str., 18/2, Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <volume>000</volume>
      <fpage>9</fpage>
      <lpage>0009</lpage>
      <abstract>
        <p>This paper investigates the error distribution and packet loss characteristics of Bluetooth Low Energy (BLE) beacons across near-field and far-field antenna zones. A custom experimental setup was developed using ESP32-based transmitters and an Ubertooth One receiver, supported by automated data collection scripts and time-synchronized measurements. The study quantifies how environmental conditions, distance, and transmission power afect BLE signal stability, particularly focusing on packet reception rates and RSSI behavior over distances from 0 to 2 meters. Cubic regression was employed to model the error distribution, highlighting a critical peak within the near-field boundary. The results emphasize the importance of adaptive beacon power management and advanced filtering for precise indoor positioning, especially in industrial and interference-prone environments.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Bluetooth Low Energy</kwd>
        <kwd>near-field</kwd>
        <kwd>far-field</kwd>
        <kwd>RSSI</kwd>
        <kwd>packet loss</kwd>
        <kwd>error distribution</kwd>
        <kwd>Ubertooth One</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        BLE beacon errors in indoor positioning systems are primarily caused by environmental factors such as
multipath efects, signal fading, and interference from metallic objects, which distort the Received Signal
Strength Indicator (RSSI) and lead to inaccurate distance estimations. Advanced methods like beacon
weighting, Bayesian filtering, and location fingerprinting have been shown to reduce these errors. For
instance, beacon weighting based on RSSI distributions can lower mean distance errors by over 66%
compared to traditional three-point positioning, achieving errors as low as 0.45 meters [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Bayesian
ifltering techniques, including Kalman and particle filters, can improve proximity estimation accuracy by
up to 30% when the beacon and receiver are within 3 meters, efectively mitigating environmental noise
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Location fingerprinting, especially with dense beacon deployment, can achieve sub-2.6-meter errors
95% of the time, outperforming WiFi-based systems [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. In challenging environments like factories,
selecting beacons based on RSSI variance helps exclude non-line-of-sight signals, reducing average
positioning errors [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Adjusting beacon transmission power and using multiple power levels can
also keep estimation errors below one meter [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ]. Overall, minimizing BLE beacon errors requires
a combination of optimized beacon placement, advanced signal processing algorithms, and adaptive
ifltering to ensure reliable and precise indoor positioning across diverse environments [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        While previous papers have addressed interference issues in Wi-Fi [
        <xref ref-type="bibr" rid="ref7 ref8 ref9">7, 8, 9</xref>
        ], Bluetooth [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], and
ZigBee [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] wireless networks, the goal of this paper is to determine the impact of near-field and
far-field antenna zones on packet loss.
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Sources review</title>
      <p>
        Using multiple transmission power levels in BLE beacons can significantly influence error rates in
industrial environments, where obstacles, metallic surfaces, and interference often challenge signal
propagation. Studies show that higher transmission power (e.g., +4 dBm) generally improves
positioning accuracy, as stronger signals are less susceptible to attenuation and multipath efects. Still, the
improvement over the lowest power settings (e.g., –20 dBm) may be modest—sometimes only around
12%—depending on the environment and beacon density [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ]. Customizing transmission power for
each beacon, rather than a uniform setting, can enhance localization accuracy by adapting to specific
site conditions and reducing overlap or interference between beacons [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Employing multiple power
levels at each beacon point can also help keep estimation errors below one meter, allowing the system
to balance coverage and precision dynamically [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. However, in complex industrial settings, even with
optimal power settings, RSSI-based distance estimation remains vulnerable to environmental noise,
and additional filtering techniques (such as Gaussian or Kalman filters) are often needed to recover or
maintain accuracy [
        <xref ref-type="bibr" rid="ref13 ref15">13, 15</xref>
        ]. Moreover, while higher power increases coverage, it can also introduce
more interference and reduce battery life, so a trade-of must be managed [
        <xref ref-type="bibr" rid="ref12 ref3">3, 12</xref>
        ]. Overall, using multiple
and adaptive transmission power levels, advanced filtering, and careful beacon placement can minimize
BLE beacon error rates and improve reliability in industrial environments [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ].
      </p>
      <p>
        Distance significantly impacts BLE packet loss, with the probability of successful packet reception
generally decreasing as the distance between devices increases. Empirical models show that packet
reception probability can be described as a quadratic function of distance, beacon power, and advertising
frequency, with greater distances leading to higher packet loss rates and lower received signal strength
(RSSI) values; for example, mean RSSI drops from about –65.5 dBm at 1 meter to –90.8 dBm at 16
meters, indicating weaker signals and more frequent packet loss at longer ranges [
        <xref ref-type="bibr" rid="ref16 ref17 ref18">16, 17, 18</xref>
        ]. In
addition, environmental factors such as interference, human presence, and device orientation can
further exacerbate packet loss, with interference alone reducing packet delivery rates by 13% to 40%
in some scenarios [
        <xref ref-type="bibr" rid="ref18 ref19 ref20">18, 19, 20</xref>
        ]. Overcrowded environments can also cause substantial signal strength
and coverage fluctuations, with distance estimation accuracy dropping by up to 41% in highly crowded
settings [
        <xref ref-type="bibr" rid="ref21 ref22">21, 22</xref>
        ]. These findings highlight the importance of considering distance and environmental
conditions when designing BLE-based systems, especially for applications like indoor localization,
where packet loss directly afects accuracy [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. Design of the experimental setup</title>
      <p>To conduct the experiment, a BLE packet transmitter (with the required frequency, signal level, and
content), a receiver and a controller were used, as shown in Figure 1.</p>
      <p>For ease of synchronization, the transmitter and receiver (Figure 2) were connected to the controller
directly, minimizing measurement errors.</p>
      <p>However, additional software modifications were required to experiment.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Transmitter hardware selection</title>
      <p>When selecting available boards for the transmitter, Software Defined Radios, Bluetooth dongles, and
single-board computers were considered. However, for miniaturization and the availability of SDK and
code examples, the choice fell on the family of single-board computers in the ESP32 series. Table 1
shows the characteristics of the board modifications.</p>
      <p>According to the table above, the choice of the ESP32-S3 N16R8 Type-C board is advantageous: the
dual-core LX7 processor allows you to handle several tasks in parallel (for example, receiving commands
and generating packets), and a large amount of SRAM and Flash memory makes it possible to cache a
suficient amount of data, and the program code can be more functional, so make this board universal for
surveillance tasks. With all the available boards on sale, the ESP32-S3 N16R8 Type-C board is the most
universal for a dual-core processor. In addition, some boards are equipped with Micro-SMA connectors,
which allow the use of external antennas.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Transmitter software preparation</title>
      <p>To secure work from BLE, use external libraries:</p>
      <p>
        1. NimBLE-Arduino is a BLE stack based on Apache Mynewt, which provides an API for transmitting
advertising packages and securing connections [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ].
      </p>
      <p>
        2. U8g2 for OLED screen (optional) [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ].
      </p>
      <p>Example of packet generation:
#include &lt;Arduino.h&gt;
#include &lt;NimBLEDevice.h&gt;
#include &lt;NimBLEExtAdvertising.h&gt;
String mac;
void setup() {
Serial.begin(115200);
while(!Serial) delay(10);
NimBLEDevice::init("ESP32_Beacon");
NimBLEDevice::setPower(ESP_PWR_LVL_N24);
}
void loop() {
static NimBLEExtAdvertising* pExtAdv = NimBLEDevice::getAdvertising();
if (Serial.available()) {
String ts = Serial.readStringUntil(’n’);
ts.trim();
NimBLEExtAdvertisement extAdv;
extAdv.setLegacyAdvertising(true);
extAdv.setManufacturerData(ts.c_str());
if (pExtAdv-&gt;isAdvertising()) {
pExtAdv-&gt;stop();
delay(10);
}
pExtAdv-&gt;removeInstance(0);
if (!pExtAdv-&gt;setInstanceData(0, extAdv)) {
Serial.println("Bad data func setInstanceData()");
return;
}
if (pExtAdv-&gt;start(0, /*duration=*/0, /*maxEvents=*/1)) {
unsigned long start = millis();
while (pExtAdv-&gt;isAdvertising() &amp;&amp; (millis() - start &lt; 500)) {
delay(10);
}
if (!pExtAdv-&gt;isAdvertising()) {
Serial.println("Advertised done (confirmed via polling)");
} else {
Serial.println("Timed out waiting for adv complete");
pExtAdv-&gt;stop();
}
}
}
}</p>
      <p>The strength of the signal is set to the additional NimBLEDevice::setPower(ESP_PWR_LVL_N24),
which will send packets that receive the following values:</p>
      <p>ESP_PWR_LVL_N24 = 0 (corresponding to –24 dBm)
ESP_PWR_LVL_N21 = 1 (–21 dBm)
...</p>
      <p>ESP_PWR_LVL_N0 = 8 (0 dBm)
...</p>
      <p>ESP_PWR_LVL_P18 = 14 (+18 dBm)
ESP_PWR_LVL_P21 = 15 (+21 dBm)
To assemble the code, PlatformIO was used with the commands:
1. pio run (build the project in “release” mode).
2. pio run -e esp_env -t debug (build the project in “debug” mode).</p>
      <p>Basic setup of platformio.ini:
[env:esp32-s3-devkitm-1]
platform = espressif32
board = esp32-s3-devkitm-1
framework = arduino
lib_deps = h2zero/NimBLE-Arduino@2ˆ.3.2
build_type = release
build_flags =
-O3
-function-sections
-fdata-sections
-Wl,–gc-sections
-DNDEBUG
-DCONFIG_BT_NIMBLE_ROLE_BROADCASTER=1
-DCONFIG_BT_NIMBLE_EXT_ADV=1</p>
      <p>Also in Visual Studio Code is an extension called Platformio, which allows you to automate and
visualize all configurations and commands.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Receiver hardware selection and software preparation</title>
      <p>
        To collect packets, you can use standard BLE modules (for example, the utility BlueZ Bluemoon [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ]),
but they limit the controllability of the process of saving packets. Similar limitations are inherent in
hardware packet snifers (for example, nRF52833/40 [
        <xref ref-type="bibr" rid="ref28">28</xref>
        ] or TI CC2540 [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ]). Therefore, the flexible
open-source Ubertooth One platform was chosen [
        <xref ref-type="bibr" rid="ref30">30</xref>
        ].
      </p>
      <p>Ubertooth-btle is a utility used by Ubertooth One to store and analyze BLE trafic. The utility is
compiled in C and, if changes are necessary, it must be recompiled. The standard view of the software
looks like this:
printf("systime=%u freq=%d addr=%08x delta_t=%.03f ms rssi=%dn",
systime, rx-&gt;channel + 2402, lell_get_access_address(pkt),
ts_dif / 10000.0, rx-&gt;rssi_min - 54);</p>
      <p>The systime is in seconds, which does not match our world’s accuracy level. There is a need to increase
the accuracy by adding the nanosystime parameter, which will represent the hour in nanoseconds.</p>
      <p>Such changes are made to improve the accuracy. Programming through the Python library could also
be done. Still, daily filtering by the device’s MAC address on the hardware level, only on the software
level, would enhance the processing package and increase the loss of time.</p>
    </sec>
    <sec id="sec-7">
      <title>7. Automation of the data collection process</title>
      <p>To control the process of sending packages to software packages, a Python script that sends packages
through the Serial port (via USB) to the ESP32 transmission:
import serial
import time
SERIAL_PORT = ’/dev/ttyACM0’
BAUDRATE = 115200
ITERATIONS = 1000
idle_timeout = 10
def measure_one(ser, num_iter):
sent_ts = time.time_ns()
ser.write(f"{sent_ts}n".encode())
last_try = time.time()
num_try = 0
while True:
num_try += 1
print(f"Try #{num_try} for {sent_ts} ## {num_iter} item")
timeout = idle_timeout - int((time.time() - last_try))
if timeout &lt;= 0:
break
line = ser.readline()
if line and str(line).startswith("b’Advertised done"):
break
return 1
def main():
ser = serial.Serial(SERIAL_PORT, BAUDRATE, timeout=1)
try:
for i in range(ITERATIONS):
measure_one(ser, i)
ifnally:
ser.close()
if __name__ == ’__main__’:
main()</p>
      <p>The function measure_one(ser, num_iter) is a whole block of code that sends just one packet and
synchronously reads the ESP32 output about the capture and processing of the packet.</p>
      <p>Here’s a Bash script to make it easier to carry out the experiment:
#!/bin/bash
START_NUM=${1:-0}
INCREMENT=5
CURR_NUM=$START_NUM
echo "Starting from number: $CURR_NUM"
while true; do
echo "Starting Ubertooth and Python storage..."
ubertooth-btle -t 10:20:ba:4b:b1:41 -n &gt; recieved_packets.txt &amp;
PID_UBER=$!
python3 send_packets.py &gt; sented_packets.txt
echo "Python has finished. Waiting for 3 seconds..."
sleep 3
echo "Completing Ubertooth (PID=$PID_UBER)..."
kill $PID_UBER
wait $PID_UBER 2&gt;/dev/null
FOLDER_NAME="$CURR_NUM cm"
mkdir -p "$FOLDER_NAME"
mv recieved_packets.txt "$FOLDER_NAME/"
mv sented_packets.txt "$FOLDER_NAME/" 2&gt;/dev/null || echo "sended_packets.txt not found"
echo "Files moved to $FOLDER_NAME"
read -p "Press Enter to start the cycle..."
CURR_NUM=$((CURR_NUM + INCREMENT))
done</p>
      <p>Shard measurements were carried out at 5 cm intervals of 2 m, the script allows you to simplify the
time required to save data, and itself:</p>
      <p>1. START_NUM=${1:-0} is specified tracking number, which will be in cm.
2. Ubertooth-btle -t 10:20:ba:4b:b1:41 -n &gt; recieved_packets.tx – launch the modified command
ubertooth-btle, which is used to catch packets sent from the ESP32.</p>
      <p>3. Python3 send_packets.py &gt; sented_packets.txt This runs the package sending script and redirects
its output to a text file.</p>
      <p>4. “mv recieved_packets.txt "$FOLDER_NAME/"" and "mv sented_packets.txt "$FOLDER_NAME/"
2&gt;/dev/null || echo "sended_packets.txt not found" are automated movement of created result files of
robot programs to a directory under the name that coincides with the location in cm.</p>
      <p>5. CURR_NUM=$((CURR_NUM + INCREMENT)) increase the cycle number according to the duration
in cm.</p>
    </sec>
    <sec id="sec-8">
      <title>8. Features and implementation problems</title>
      <p>During the implementation, some problems arose. For example, the issue of bufering the subprocess
output and parallelism with threads when transferring data is that Python has limited true
parallelism, which entails alternating code execution by diferent threads, which reduces the accuracy of
measurements.</p>
      <p>It should be noted that the launch order matters; if you start sending packets first and then
ubertoothbtle, packet loss may occur when scanning through the utility, since the initialization of the
ubertoothbtle software tool takes some time.</p>
      <p>When using a standard BLE stack based on BLEDevice and BLEAdvertising, there is a problem of
controlling the number of sent packets (events): instead of controlling the number of events, only
advertising time control is available — as a result, if the advertising time is too short, no packets are
sent, and if it is too long, several are sent.</p>
    </sec>
    <sec id="sec-9">
      <title>9. Verification of the experimental results</title>
      <p>An experiment was conducted using the established experimental setup. One thousand time-stamped
Beacon packets were sent at diferent distances, and the number of lost packets was measured (see
Table 2). The time delay between the received packets was also calculated.</p>
      <p>The delay value was ignored since the first packet incorrectly returns its time. The results can be
approximated using the cubic regression equation
() = 3 + 2 +  + ,
(1)
where  is the distance between receiver and transmitter, , , , and  are the coeficients. To calculate
the coeficients, we will make a system of equations
⎧    
⎪⎪⎪  ∑︁ 3 +  ∑︁ 2 +  ∑︁  +  = ∑︁ 
⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪⎪  ∑︁ 4=+1  ∑︁ 3=+1  ∑︁ 2=+1  ∑︁  = ∑=︁1 
⎪⎨ =1 =1 =1 =1 =1</p>
      <p>⎪⎪⎪⎪ ∑︁ 5 +  ∑︁ 4 +  ∑︁ 3 +  ∑︁ 2 = ∑︁ 2
⎪⎪⎪⎪⎪⎪⎪  =1  =1  =1  =1  =1
⎪⎪⎪⎪ ∑︁ 6 +  ∑︁ 5 +  ∑︁ 4 +  ∑︁ 3 = ∑︁ 3
⎩ =1 =1 =1 =1 =1
Then, fill out Table 3 with the summarization results.</p>
      <p>And obtain Equation (2) with sums from Table 2, a system of linear equations
⎧ 84.050  + 55.350  + 41  + 41  = 11135
⎪
⎪⎨⎪ 136.133  + 84.050  + 55.350  + 41  = 9265.200
⎪ 229.667  + 136.133  + 84.050  + 55.350  = 12717.905
⎪
⎪⎩398.514  + 229.667  + 136.133  + 84.050  = 19616.834
The total sought cubic regression equation is as follows:</p>
      <p>() ≈ 71 3 − 196 2 + 151 + 189.</p>
      <p>From the experimental plot and graph, the regression equations are presented in Figure 3. The
experiments were conducted on the 37 BLE channel corresponding to the frequency 2.402 GHz. Let’s
calculate the antenna far-field limits for this frequency, because the linear size of the antenna is less than
its linear dimensions, so we use the formula for approximate calculation  ∼ 6...10,  = 0.75...1.25 m.
The regression plot shows a local maximum of errors within the near-field boundary.</p>
      <p>To assess the significance of regression and correlation parameters, we determine the average number
of errors</p>
      <p>Let’s determine the correlation index
 = 1 ∑︁  = 220.5.</p>
      <p>=1
⎯
⎸
⎸
 = ⎷⎸1 −
∑︀=1 ︁(  − ̂︀︁) 2
∑︀=1 ︀(  − )︀ 2 ≈ 0.834
from where we obtain the determination index 2 &gt; 0.5, which means that the approximation of
the function can be used to represent the law of distribution of errors depending on the range of the
receiver. The average error of approximation left
(2)
(3)
(4)
(5)
(6)
1 ∑=︁1 ⃒⃒⃒⃒⃒  − ̂︀ ⃒⃒⃒⃒⃒ · 100% ≈ 4.1%.
where the indices are calculated from the sampling parameters 1 = 3 and 2 =  −  1 − 1 = 37 . The
value of Fisher’s criterion indicates that for the sample, we can only observe the type of process, but it
does not correspond to the approximated function.</p>
      <p>Also when calculating the actual Durbin-Watson criterion we get:
 = ∑︀=1∑(︀ −  −1 )2 ≈ 0.27 &lt; 2, (9)</p>
      <p>=1 2
where  is the deviation from the mean error rate. The criterion value indicates a positive
autocorrelation, which indirectly confirms the conclusion about the qualitative assessment of the investigated
process.
10. Conclusions
The work involved selecting the tools, preparing software for the experiment, and conducting the
experiment itself in a distance range of up to 2 meters. Since the near zone for a frequency of 2.402 GHz
is about 1 meter, the selected distance covers the transition from the near to the far zone of the antenna.
When approximating the measurement results, it was shown that in the center of the near zone, the
number of errors increases slightly, and decreases when moving to the far zone, which indicates the
formation of an electromagnetic wave front at the junction of zones. The calculated coeficients confirm
the reliability of the approximation results.</p>
      <p>Further studies are planned to be carried out to check the rate of signal loss at significant distances
and compare the results obtained by diferent packet snifers.</p>
    </sec>
    <sec id="sec-10">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Takagi</surname>
          </string-name>
          , T. Kushida,
          <source>Accurate indoor positioning based on beacon weighting using RSSI</source>
          ,
          <year>2022</year>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>031</fpage>
          -20936-
          <issue>9</issue>
          _
          <fpage>2</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>A.</given-names>
            <surname>Mackey</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Improving</surname>
            <given-names>BLE</given-names>
          </string-name>
          <article-title>beacon proximity estimation accuracy through Bayesian filtering</article-title>
          ,
          <source>IEEE Internet Things J</source>
          .
          <volume>7</volume>
          (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .1109/JIOT.
          <year>2020</year>
          .
          <volume>2965583</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>R.</given-names>
            <surname>Faragher</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Harle</surname>
          </string-name>
          ,
          <article-title>Location fingerprinting with Bluetooth Low Energy beacons</article-title>
          ,
          <source>IEEE J. Sel. Areas Commun</source>
          .
          <volume>33</volume>
          (
          <year>2015</year>
          ). doi:
          <volume>10</volume>
          .1109/JSAC.
          <year>2015</year>
          .
          <volume>2430281</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>K.</given-names>
            <surname>Yuzawa</surname>
          </string-name>
          , T. Fujii,
          <article-title>Indoor positioning using BLE beacons and user equipments in factory environment</article-title>
          ,
          <source>in: 2024 15th Int. Conf. on Ubiquitous and Future Networks (ICUFN)</source>
          ,
          <year>2024</year>
          . doi:
          <volume>10</volume>
          . 1109/ICUFN61752.
          <year>2024</year>
          .
          <volume>10625482</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>M.</given-names>
            <surname>Sie</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Kuo</surname>
          </string-name>
          ,
          <article-title>Indoor location estimation using BLE beacon with multiple transmission power levels</article-title>
          ,
          <source>in: 2017 IEEE Int. Conf. on Consumer Electronics-Taiwan (ICCE-TW)</source>
          ,
          <year>2017</year>
          . doi:
          <volume>10</volume>
          .1109/ ICCE-CHINA.
          <year>2017</year>
          .
          <volume>7991126</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>O.</given-names>
            <surname>Ivashchuk</surname>
          </string-name>
          , et al.,
          <article-title>A configuration analysis of Ukrainian flight routes network</article-title>
          ,
          <source>in: Experience of Designing and Application of CAD Systems in Microelectronics (CADSM)</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>6</fpage>
          -
          <lpage>10</lpage>
          . doi:
          <volume>10</volume>
          .1109/CADSM52681.
          <year>2021</year>
          .
          <volume>9385263</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Astapenya</surname>
          </string-name>
          ,
          <article-title>Wi-Fi interference resistance to jamming attack</article-title>
          ,
          <source>in: IEEE 5th Int. Conf. on Advanced Information and Communication Technologies</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/AICT61584.
          <year>2023</year>
          .
          <volume>10452687</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Mazur</surname>
          </string-name>
          ,
          <article-title>Wi-Fi repeater influence on wireless access</article-title>
          ,
          <source>in: IEEE 5th Int. Conf. on Advanced Information and Communication Technologies</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>33</fpage>
          -
          <lpage>36</lpage>
          . doi:
          <volume>10</volume>
          .1109/AICT61584.
          <year>2023</year>
          .
          <volume>10452421</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Platonenko</surname>
          </string-name>
          ,
          <article-title>Jump-stay jamming attack on Wi-Fi systems</article-title>
          ,
          <source>in: IEEE 18th Int. Conf. on Computer Science and Information Technologies</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . doi:
          <volume>10</volume>
          .1109/ CSIT61576.
          <year>2023</year>
          .
          <volume>10324031</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Astapenya</surname>
          </string-name>
          ,
          <article-title>Bluetooth Low-Energy beacon resistance to jamming attack</article-title>
          ,
          <source>in: IEEE 13th Int. Conf. on Electronics and Information Technologies</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>270</fpage>
          -
          <lpage>274</lpage>
          . doi:
          <volume>10</volume>
          .1109/ELIT61488.
          <year>2023</year>
          .
          <volume>10310815</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          , N. Korshun,
          <article-title>ZigBee network resistance to jamming attacks</article-title>
          ,
          <source>in: IEEE 6th Int. Conf. on Information and Telecommunication Technologies and Radio Electronics</source>
          ,
          <year>2023</year>
          , pp.
          <fpage>161</fpage>
          -
          <lpage>165</lpage>
          . doi:
          <volume>10</volume>
          .1109/UkrMiCo61577.
          <year>2023</year>
          .
          <volume>10380360</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>G. de Blasio</surname>
          </string-name>
          , et al.,
          <article-title>Beacon-related parameters of Bluetooth Low Energy: Development of a semi-automatic system to study their impact on indoor positioning systems</article-title>
          ,
          <source>Sensors</source>
          <volume>19</volume>
          (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .3390/s19143087.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>F.</given-names>
            <surname>Suzanayanti</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Alaydrus</surname>
          </string-name>
          ,
          <article-title>Optimization BLE power beacon for indoor locations static smart device with gaussian filter</article-title>
          ,
          <source>J. Telekom. Komput</source>
          . (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .22441/INCOMTECH.V11I1.9811.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>M.</given-names>
            <surname>Castillo-Cara</surname>
          </string-name>
          , et al.,
          <article-title>An empirical study of the transmission power setting for Bluetooth-based indoor localization mechanisms</article-title>
          ,
          <source>Sensors</source>
          <volume>17</volume>
          (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .3390/s17061318.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>R.</given-names>
            <surname>Ramirez</surname>
          </string-name>
          , et al.,
          <article-title>A practice of BLE RSSI measurement for indoor positioning</article-title>
          ,
          <source>Sensors</source>
          <volume>21</volume>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .3390/s21155181.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>S.</given-names>
            <surname>De</surname>
          </string-name>
          , et al.,
          <article-title>Finding by counting: A probabilistic packet count model for indoor localization in BLE environments</article-title>
          ,
          <source>in: 11th Workshop on Wireless Network Testbeds, Experimental evaluation and CHaracterization</source>
          ,
          <year>2017</year>
          . doi:
          <volume>10</volume>
          .1145/3131473.3131482.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Strzoda</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Grochla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Połys</surname>
          </string-name>
          ,
          <article-title>Variability of BLE advertisement packets received signal strength and delivery probability in the presence of interferences</article-title>
          ,
          <source>in: 12th ACM Int. Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications</source>
          ,
          <year>2022</year>
          . doi:
          <volume>10</volume>
          .1145/3551662. 3560933.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>S.</given-names>
            <surname>De</surname>
          </string-name>
          , R. Kravets,
          <article-title>Finding by counting: A packet count based indoor localization technique using BLE sensors</article-title>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>I.</given-names>
            <surname>Ostroumov</surname>
          </string-name>
          , et al.,
          <article-title>Relative navigation for vehicle formation movement</article-title>
          ,
          <source>in: IEEE 3rd KhPI Week on Advanced Technology</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          . doi:
          <volume>10</volume>
          .1109/KhPIWeek57572.
          <year>2022</year>
          .
          <volume>9916414</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>F.</given-names>
            <surname>Yanovsky</surname>
          </string-name>
          ,
          <article-title>Inferring microstructure and turbulence properties in rain through observations and simulations of signal spectra measured with doppler-polarimetric radars, in: NATO Science for Peace and Security Series C: Environmental Security</article-title>
          , volume
          <volume>117</volume>
          ,
          <year>2011</year>
          , pp.
          <fpage>501</fpage>
          -
          <lpage>542</lpage>
          . doi:
          <volume>10</volume>
          . 1007/
          <fpage>978</fpage>
          -94-007-1636-0_
          <fpage>19</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>A.</given-names>
            <surname>Morgan</surname>
          </string-name>
          , G. Humaid,
          <string-name>
            <given-names>A.</given-names>
            <surname>Moustafa</surname>
          </string-name>
          ,
          <article-title>Using Bluetooth Low Energy for positioning systems within overcrowded environments: A real in-field evaluation</article-title>
          ,
          <source>Comput. Electr. Eng</source>
          .
          <volume>93</volume>
          (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .1016/j.compeleceng.
          <year>2021</year>
          .
          <volume>107314</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>N. S.</given-names>
            <surname>Kuzmenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I. V.</given-names>
            <surname>Ostroumov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Marais</surname>
          </string-name>
          ,
          <article-title>An accuracy and availability estimation of aircraft positioning by navigational aids</article-title>
          ,
          <source>in: IEEE 5th International Conference on Methods and Systems of Navigation and Motion Control (MSNMC)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>36</fpage>
          -
          <lpage>40</lpage>
          . doi:
          <volume>10</volume>
          .1109/MSNMC.
          <year>2018</year>
          .
          <volume>8576276</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Espressif</surname>
            <given-names>Systems</given-names>
          </string-name>
          , Chip series comparison,
          <year>2022</year>
          . URL: https://docs.espressif.com/projects/esp-idf/ en/v5.0/esp32s3/hw-reference/chip-series-comparison.html.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Espressif</surname>
            <given-names>Systems</given-names>
          </string-name>
          , Product comparison,
          <year>2025</year>
          . URL: https://products.espressif.com/#/ product-comparison?type=SoC&amp;names=
          <fpage>ESP32</fpage>
          -
          <lpage>C6</lpage>
          ,
          <fpage>ESP32</fpage>
          -
          <lpage>H2FH4S</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>R.</given-names>
            <surname>Powell</surname>
          </string-name>
          , Nimble-arduino,
          <year>2025</year>
          . URL: https://github.com/h2zero/NimBLE-Arduino.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Olikraus</surname>
          </string-name>
          ,
          <year>u8g2</year>
          ,
          <year>2025</year>
          . URL: https://github.com/olikraus/U8g2.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>OfSec</given-names>
            <surname>Services Limited</surname>
          </string-name>
          , Packages and binaries: Bluetooth,
          <year>2025</year>
          . URL: https://www.kali.org/tools/ bluez/.
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Nordic</surname>
            <given-names>Semiconductor,</given-names>
          </string-name>
          <article-title>nrf snifer for bluetooth le</article-title>
          .
          <source>development tool</source>
          ,
          <year>2025</year>
          . URL: https://www. nordicsemi.com/Products/Development-tools/
          <article-title>nrf-snifer-for-bluetooth-le.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Texas</surname>
            <given-names>Instruments</given-names>
          </string-name>
          ,
          <article-title>Smartrf packet snifer. user's manual</article-title>
          ,
          <year>swru187g</year>
          ,
          <year>2014</year>
          . URL: https://www.ti. com/lit/ug/swru187g/swru187g.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Great</surname>
            <given-names>Scott Gadgets</given-names>
          </string-name>
          , Ubertooth one,
          <year>2023</year>
          . URL: https://greatscottgadgets.com/ubertoothone/.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>