<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Smart indoor evacuation using real-time beacons⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Muzychuk</string-name>
          <email>o.muzychuk23@gmail.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Victoria Vysotska</string-name>
          <email>victoria.a.vysotska@lpnu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktor Vasylenko</string-name>
          <email>Vasylenko_Viktor@ukr.net</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mykhailo Tsuranov</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Heorhii Zemlianko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Inna Khavina</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yurii Gnusov</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Information Systems and Networks Department, Lviv Polytechnic National University</institution>
          ,
          <addr-line>Stepan Bandera Street 12 79013 Lviv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Kharkiv National University of Internal Affairs</institution>
          ,
          <addr-line>L. Landau Avenue 27 61080 Kharkiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <abstract>
        <p>The proliferation of «smart» environments raises the question of the need for accurate and reliable indoor positioning systems (IPS) for critical applications in logistics, health care and security. Traditional technologies, such as GPS and Wi-Fi, demonstrate their inadequacy due to signal attenuation and multibeam propagation in the rooms. This paper provides an in-depth analysis of positioning systems based on mobile beacons, with a focus on Bluetooth Low Energy (BLE) and Ultra-Wideband (UWB) technologies, as well as assessing their resistance to cyber attacks. The study systematizes key technologies, breaking down in detail the trade-offs between economical and scalable BLE and UWB centimeter accuracy. The solution is a hybrid deployment model that uses artificial intelligence (AI) to compensate for signal and adapt to dynamic changes in the environment. The vulnerability analysis reveals serious threats to unencrypted beacon protocols, including spoofing, signal cloning and denial of service (DoS) attacks. To counter these risks, a comprehensive cyber protection model is proposed. It includes functions such as dynamically changing identifiers, the use of AI to detect anomalies and the integration of cyber-physical systems (CPS) with digital doubles for proactive monitoring and simulation of attacks. The effectiveness of the proposed system was tested under a pilot evacuation scenario. The results show that the use of a special pre-configured mobile application in conjunction with the beacon infrastructure reduces the evacuation time for people unfamiliar with the building's layout by 30% and for people who know the building's internal structure efficiency 8%. This confirms the practical relevance of the system for improving safety of life in emergency situations.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;indoor positioning system (IPS)</kwd>
        <kwd>Bluetooth low energy (BLE)</kwd>
        <kwd>ultra-wideband (UWB)</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>emergency evacuation</kwd>
        <kwd>anomaly detection</kwd>
        <kwd>autonomous navigation 1</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        The modern world is undergoing a rapid transformation toward "smart" environments, where
accurate and reliable positioning of objects, assets, and people is becoming a critically important
element of infrastructure. While in the past "smart" referred primarily to household appliances, in
the modern world, entire cities are becoming smart. The concept of "smart" cities, university
campuses, industrial enterprises, and medical institutions is based on the systems' ability to collect
and analyze real-time data, which is unachievable without precise spatial referencing and stable
connectivity among smart system components [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        In the field of logistics and industry, the need for positioning manifests in asset management,
work process control, and inventory optimization. The application of mobile sensors allows for
tracking the location of costly equipment, tools, and inventory, preventing their loss or misuse.
This contributes to increasing operational efficiency and reducing capital and operating
expenditures (CAPEX and OPEX) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Similar systems are used for condition monitoring of objects,
for example, in the food and pharmaceutical industries, where beacons equipped with temperature
and humidity sensors ensure compliance with storage conditions [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ].
      </p>
      <p>
        In medicine, positioning technologies are used for tracking personnel, such as doctors and
nurses, which allows for a quick response to emergencies. Furthermore, these systems help locate
critical equipment (wheelchairs, infusion pumps), thereby improving patient safety and staff
operational efficiency [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Positioning also plays a key role in ensuring the accessibility of the
urban environment for people with disabilities, guiding them to exits, elevators, or safe zones using
acoustic and light beacons [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        For educational institutions, beacon-based systems create "smart campuses," providing
interactive navigation, automating the process of attendance tracking, and enabling targeted
distribution of educational materials and emergency alerts [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. These technologies allow for
process optimization, reduction of administrative costs, and enhancement of student and faculty
safety in emergencies by quickly determining the location of every individual [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>Society has become accustomed to relying on Global Navigation Satellite Systems (GNSS),
which ensure the safety of road transport, container shipping, and even food delivery. However,
satellite positioning systems provide virtually no accurate results indoors, nor do they function
reliably in combat conditions due to the active use of Electronic Warfare (EW) countermeasures.</p>
      <p>The relevance of the topic thus extends beyond a simple technological capability. It is driven by
economic and operational feasibility, as automation based on precise positioning allows companies
and organizations to minimize labor costs, increase productivity, and ensure a high level of safety,
while also enhancing the efficiency of informing and evacuating employees during hostilities and
air raids.</p>
      <p>The use of beacon technologies is extensive and widespread, but the crisis situation in Ukraine
opens up new opportunities for targeted technology in the field of human security.</p>
      <p>The goal of this article is to conduct a comprehensive analysis of the current state of
technologies and solutions based on mobile beacon sensor infrastructure. The study will present a
classification of existing standards and technologies, review their key characteristics and
application areas, and perform a comparative analysis of their effectiveness.</p>
      <p>A central element of the work will be a detailed analysis of vulnerabilities and threats to such
systems, based on which a comprehensive approach to their cyber defense will be proposed,
including innovative mechanisms such as the application of cyber-physical systems and digital
twins.</p>
      <p>The article will also consider the possibility of applying beacon technology for the evacuation of
personnel during air raid alerts.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Related works</title>
      <p>
        Ensuring accurate and reliable positioning is one of the key tasks in creating intelligent urban
environments and infrastructure. Before the advent of beacon technology, classical navigation
methods (GPS) or common wireless networks (Wi-Fi) were used, and some organizations tried to
adapt infra-red technologies for intra-positional navigation. More advanced industrial enterprises
and companies tried to develop their own technologies for navigation inside buildings and offices.
However, the shortcomings of the above technologies have led to the emergence of beacons [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ].
      </p>
      <p>In this paper we consider the fundamental shortcomings of classical technologies, their
limitations: the physical propagation of their signals, which were presented graphically in Figure 1,
with a more detailed description. It is also justified to use technologies based on mobile beacons
(beacons) as a more promising direction for the organization of navigation in closed spaces and in
real time.</p>
      <p>
        The GPS (Global Positioning System), which operates in the decimeter wavelength range, is
critically dependent on a direct line of sight to satellites. Its signal is easily attenuated or
completely blocked by physical obstacles, such as thick building walls, dense foliage, and even
heavy cloud cover. This renders GPS unsuitable for accurate navigation in "urban canyons,"
basements, tunnels, and inside buildings, where the signal is reflected or completely lost [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>
        Wi-Fi-based positioning also faces a number of fundamental challenges that reduce its accuracy
and reliability. The key one is multipath propagation, where radio waves are repeatedly reflected
off walls, furniture, and other objects indoors before reaching the receiver. Unlike GPS, where the
signal propagates via line of sight, in Wi-Fi environments the measured signal path length is
always greater than the actual distance, which introduces significant error into calculations. This is
a fundamental obstacle because technologies of IEEE 802.11n/ac standards (MIMO, MRC, BF)
deliberately use reflections to enhance throughput, creating a contradiction between optimization
for data transmission and for positioning [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        Furthermore, Wi-Fi positioning is characterized by an unpredictable data update frequency,
which can reach tens of seconds or even minutes, rendering the system unreliable for critical
applications requiring real-time tracking. Achieving acceptable accuracy (approximately 2–3
meters) necessitates a very high density of access points, which must be distributed in a dense,
staggered pattern throughout the entire perimeter, significantly increasing deployment and
maintenance costs [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ].
      </p>
      <p>
        To overcome the limitations of traditional navigation systems, technologies based on mobile
beacon sensors (beacons) have been actively developed and implemented. These devices are
inexpensive, energy-efficient transmitters that utilize short-range technologies, such as Bluetooth
Low Energy (BLE), to determine location with accuracy up to several meters in environments
where GPS and Wi-Fi prove ineffective [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ].
      </p>
      <p>BLE beacons are capable of operating autonomously for extended periods on small batteries,
making them ideal for high-density indoor deployment. They can be easily integrated into existing
infrastructure or deployed from scratch with minimal capital expenditure. Their ability to provide
accurate and reliable indoor positioning opens up new opportunities for a wide range of
applications—from navigation and marketing to asset management and security.</p>
      <p>The initial configuration process for beacons is quite complex and lengthy, and there is also a
need for preliminary setup of user devices. However, if these processes are automated and a
training procedure for beacon usage is organized, it could significantly enhance the efficiency of
personnel in emergency situations. This is because the technology is capable of providing the most
relevant information, not only about an employee's location within a facility but also about their
subsequent actions for successful evacuation. Furthermore, the technologies discussed in the article
will significantly simplify the work of law enforcement and rescue services personnel in critical
situations.</p>
      <p>Beacon-based technologies are already successfully applied in various fields, solving specific
tasks.</p>
      <p>
        Indoor Navigation and Wayfinding: Beacons assist visitors in navigating large and complex
spaces, such as shopping centers, museums, railway stations, and university campuses (Figure 2). In
conjunction with mobile applications, they provide interactive maps and step-by-step instructions,
making it easy to locate required auditoriums, stores, or emergency exits [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        Asset Tracking and Logistics: In industry and healthcare, beacons are used for tracking valuable
equipment, inventory, and even personnel. Beacons attached to objects allow for real-time
determination of their location, which optimizes inventory processes, reduces search time, and
helps prevent theft [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. For example, in hospitals, beacons enable the rapid location of necessary
medical equipment, and in schools, they track laptops and laboratory instruments (Figure 2) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        Interactive Marketing and Customer Engagement: In retail environments, beacons are employed
for contactless marketing (Figure 3). When a shopper approaches a specific product, the system can
send a contextual notification to their smartphone containing product information, a discount, or a
special offer. This enables the personalization of the shopping experience, influencing decisions at
the “moment of truth,” and collecting valuable data on customer behavior [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ].
      </p>
      <p>
        Security Systems: Beacons play a crucial role in ensuring safety and access control. They can be
utilized for the automated verification of employee entry into designated areas [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] or for
emergency incident notification [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]. In the event of a fire or other emergency, beacons can guide
people toward the nearest exits, ensuring rapid and safe evacuation (Figure 3) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ].
      </p>
      <p>Despite their diversity, all these use cases rely on the same fundamental functionality: the
system’s ability to accurately determine location and initiate an action based on this data. This
underscores the versatility of beacon technology as a foundational component for creating
contextaware smart environments.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Materials and methods</title>
      <sec id="sec-3-1">
        <title>3.1. Comparative analysis of positioning technologies</title>
        <p>
          The choice of positioning technology is always a trade-off between accuracy, cost, power
consumption, and scalability. None of the existing technologies is universally superior for all
scenarios. This paper presents a comparative study of key beacon-based positioning technologies
(BLE, UWB, Wi-Fi RTT), as well as the modern RFID tag technology [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ].
        </p>
        <p>The comparative analysis is presented in a table format, which allows for an objective
assessment of the strengths and weaknesses of each technology and determining their applicability
in various practical tasks:</p>
        <p>
          BLE (Bluetooth Low Energy) technology is characterized by low latency (less than 10 ms)
and high energy efficiency, which ensures a long battery life in devices. BLE is supported
by most modern smartphones, facilitating its widespread adoption in consumer
applications. Scalability is achieved through the use of mesh networks, allowing coverage
of large areas and supporting simultaneous interaction of a large number of devices. For
security, AES-128 encryption is used. Ease of deployment and integration with IoT
platforms make BLE an attractive solution for mass-market scenarios, such as indoor
navigation in shopping centers and contextual marketing, where positioning accuracy at
the level of 1–3 m is considered sufficient [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. However, the technology is sensitive to
electromagnetic interference and multipath effects, which can reduce operational stability
in complex radio environments [
          <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
          ].
Interference Robustness Low (Sensitive to High (Resistant
multipath) to multipath)
        </p>
        <p>Medium
(Environment</p>
        <p>Medium
(Frequency/Method
Ease of Deployment
Device Compatibility</p>
        <p>Security
IoT Integration</p>
        <p>Scalability
Standardization</p>
        <p>Applicability</p>
        <p>Privacy
Throughput
Infrastructure</p>
        <p>Requirements
Multipath/NLOS</p>
        <p>Resistance
Sensor fusion
Implementation</p>
        <p>Examples</p>
        <p>High (Mesh,
thousands of</p>
        <p>devices)
Bluetooth SIG,
ISO/IEC 18305</p>
        <p>Navigation,
Marketing,</p>
        <p>Healthcare
Implementation
dependent,
BLE</p>
        <p>privacy
Up to 2 Mbps</p>
        <p>(BLE 5.x)
Tag/Device Power</p>
        <p>Supply</p>
        <p>Months/Years</p>
        <p>(Battery)
High (Simple
installation)</p>
        <p>Complex
(Requires
calibration)</p>
        <p>Very High
(Smartphones,</p>
        <p>IoT)</p>
        <p>Growing
(Smartphones,</p>
        <p>IoT, automotive)
AES-128, ECDH, High
(DistanceRegular updates bounding,</p>
        <p>Encryption)
Medium (AP
dependent)
High (Android 9+,</p>
        <p>Wi-Fi 6 AP)
WPA2/WPA3, FTM</p>
        <p>Authentication</p>
        <p>dependent)
High (Passive), Medium</p>
        <p>(Active)
Requires RFID readers</p>
        <p>Encryption,
Authentication,
Killcommands
Excellent (Mesh, Excellent (Sensor
standard profiles) networks, API)</p>
        <p>Excellent (Wi-Fi,
API, sensor fusion)</p>
        <p>High (Standards,</p>
        <p>middleware)
High (100+ Medium
tags/anchors) (Channel/AP limited)</p>
        <p>Very High (Thousands</p>
        <p>of tags)
IEEE 802.15.4z,
FiRa, ISO/IEC</p>
        <p>18305
Industry, AGV,</p>
        <p>Security
High (Low
power, short</p>
        <p>pulse)
High (Wide
spectrum)</p>
        <p>Months
(Accumulator),</p>
        <p>Low power</p>
        <p>IEEE 802.11mc/az,</p>
        <p>Wi-Fi Alliance</p>
        <p>ISO/IEC 18000, 24730,</p>
        <p>18305
Offices, Smart</p>
        <p>Buildings,
Navigation</p>
        <p>Logistics, Warehouse,</p>
        <p>Inventory</p>
        <p>Requires access
control, privacy API</p>
        <p>Deactivation,</p>
        <p>Pseudonymization
40/80 MHz (Wi-Fi
5/6)</p>
        <p>Low (Passive), Higher</p>
        <p>(Active)
Mains (AP), Battery
(Client)</p>
        <p>None (Passive), Battery</p>
        <p>(Active)
Medium (Improved
by ML/filtering)</p>
        <p>Medium (Environment
dependent)
BLE Beacons,</p>
        <p>Gateways</p>
        <p>Anchors,
Controllers, Tags</p>
        <p>Wi-Fi 6 AP with</p>
        <p>FTM</p>
        <p>RFID Readers, Tags
Low/Medium</p>
        <p>Very High
Yes (IMU, PIR,</p>
        <p>Ultrasound)</p>
        <p>Yes (IMU, other
sensors)</p>
        <p>Yes (IMU, BLE,</p>
        <p>UWB)</p>
        <p>Yes (Temperature,</p>
        <p>Humidity, etc.)
Shopping centers,
Hospitals, Smart
homes</p>
        <p>Factories,
Warehouses,
Automotive,</p>
        <p>Medicine</p>
        <p>Offices, Campuses,</p>
        <p>Airports</p>
        <p>Warehouses, Retail,</p>
        <p>
          Medicine
2. The Ultra-Wideband (UWB) technology provides high positioning accuracy at the level of
10–30 cm and is characterized by low latency (within milliseconds). A key advantage of
UWB is its high resistance to radio interference and multipath propagation, which is due to
wideband signal transmission. This technology supports distance-bounding and encryption
functions, which increases the security level of localization. In recent years, there has been
rapid growth in UWB support in smartphones and Internet of Things (IoT) devices.
However, the deployment of UWB systems requires significant capital investments and is
accompanied by high infrastructure implementation complexity. Due to these features,
UWB is primarily used in industrial and critical scenarios, such as for the navigation of
Autonomous Guided Vehicles (AGVs) or the tracking of tools on assembly lines [
          <xref ref-type="bibr" rid="ref15 ref16 ref17">15–17</xref>
          ].
3. Wi-Fi RTT (Round Trip Time) is a technology that implements location determination
based on measuring the signal propagation time between a device and Wi-Fi 6 access points
supporting FTM (Fine Timing Measurement). Positioning accuracy reaches 1–2 m, and
latency is 100–500 ms. The advantages of Wi-Fi RTT include a high degree of compatibility
with devices on the Android platform, as well as the possibility of integration with existing
IoT systems and support for modern security protocols (WPA2/WPA3). Operational
reliability can be reduced due to interference and multipath effects, however, the
technology demonstrates moderate resilience to these phenomena. To increase accuracy,
calibration is required, aimed at eliminating systematic errors. Due to the low infrastructure
costs (where Wi-Fi 6 is already present), Wi-Fi RTT is often used in offices and smart
buildings, where optimization of capital expenditure is important [
          <xref ref-type="bibr" rid="ref15 ref18 ref19">15, 18, 19</xref>
          ].
4. Radio Frequency Identification (RFID) technology allows for zonal positioning with an
accuracy of 1–5 meters. Passive RFID tags are characterized by an operating range of up to
10 meters, while active tags can reach over 100 meters. The main advantages of RFID
include the low cost of passive tags, high scalability, and ease of integration with existing
industrial IoT systems. Standardization according to ISO/IEC ensures compatibility between
devices from various manufacturers. Privacy concerns are addressed through tag
deactivation and the use of data pseudonymization. This technology is effective for tasks
involving zonal object tracking, especially in warehouse and production logistics, where the
identification of a large quantity of goods or equipment is required [
          <xref ref-type="bibr" rid="ref20 ref21">20, 21</xref>
          ].
        </p>
        <p>As can be seen from Table 1, UWB technology is the most accurate and promising; however, its
power consumption is relatively high, which is critical in emergency situations. Furthermore, the
application of UWB technology is constrained because it necessitates the use of modern
smartphones, which significantly reduces the effectiveness of the alerting under extreme
conditions. Therefore, to ensure maximum user coverage in emergency circumstances, BLE
(Bluetooth Low Energy) technology is the optimal choice, as its long market presence ensures
maximum coverage of user devices and offers sufficiently low power consumption. It should also be
noted that the widespread use of fitness trackers, smartwatches, and wireless headphones
encourages users to keep the BLE transmitter constantly activated.</p>
      </sec>
      <sec id="sec-3-2">
        <title>3.2. Conceptual model for deployment and use of lighthouse-based infrastructure</title>
        <p>Multi-Layer System Architecture. An effective beacon-based positioning system features a complex
multi-layered architecture, where each component performs its unique function.</p>
        <p>
          Physical Layer: this layer comprises the mobile sensor-beacons themselves, which are placed
within the physical environment (e.g., on walls, shelves, or equipment). In addition to stationary
beacons, this layer also includes wearable devices (tags) attached to assets or personnel to track
their movements. The beacons transmit signals with unique identifiers and, in some cases, with
sensor data (temperature, humidity) [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
        </p>
        <p>
          Network Layer: this layer consists of receivers that capture the beacon signals. The receivers
can be either specialized BLE Beacon Gateways or common mobile devices (smartphones, tablets).
These receivers collect data, such as the beacon ID, Received Signal Strength Indicator (RSSI), and
reception time, and transmit them to the server layer for further processing [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
        <p>
          Server Layer: this layer is the "brain" of the entire system. Data received from the receivers is
processed centrally at this level. Complex positioning algorithms (e.g., tri-lateration, fingerprinting,
or tri-angulation) are executed here to calculate the precise coordinates of the beacons in real time.
The server layer is also responsible for database management, historical data storage, analytics, and
integration with other information systems [
          <xref ref-type="bibr" rid="ref10 ref22">10, 22</xref>
          ].
        </p>
        <p>
          Application Layer: this is the end-user interaction interface. It can be implemented as a mobile
application, a web dashboard, or specialized software. At this layer, location data is visualized, and
various actions are initiated, such as sending notifications, activating interactive content, or
generating analytical reports [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].
        </p>
        <p>Technology Selection and Deployment Strategy (Hybrid Approach). Effective deployment of
beacon infrastructure requires not a blind choice of a single technology, but a strategic, hybrid
approach that leverages the strengths of each one. For instance, within a single facility, such as a
“smart” university campus, the following multi-layered strategy can be applied:


</p>
        <p>
          UWB (Ultra-Wideband) can be used in zones requiring sub-meter accuracy and high
reliability: in laboratories for tracking high-value scientific equipment or in areas adjacent
to chemical storage for personnel safety assurance [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
        <p>
          Wi-Fi RTT (Round Trip Time) is ideally suited for navigating students and faculty within
common areas, such as classrooms and libraries, as well as for people flow analytics. Since
Wi-Fi infrastructure often already exists in most campuses, this approach provides savings
on capital expenditures [
          <xref ref-type="bibr" rid="ref15">15</xref>
          ].
        </p>
        <p>
          BLE (Bluetooth Low Energy) beacons can be placed at points of interest, such as bookstores,
cafes, or information stands. Their low cost and energy efficiency make them ideal for
contextual marketing and sending notifications about events, schedules, or promotions, as
well as for alerting users about emergency situations and evacuation routes [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ].
        </p>
        <p>Thus, instead of relying on a single protocol, the hybrid approach allows for the optimization of
performance and costs, ensuring the necessary level of accuracy and reliability for each specific
task.</p>
        <p>Mitigating Multipath Propagation and Dynamic Interference. Traditional RSSI-based
positioning methods are extremely sensitive to multipath propagation and interference. AI offers
intelligent approaches to combat these problems.</p>
        <p>Human Body “Shadowing” Compensation: One of the main sources of dynamic interference in
indoor environments is the human body. Research indicates that an AI model can be trained to
recognize the characteristic pattern of simultaneous signal attenuation that occurs across three BLE
advertising channels (37, 38, and 39) when a person passes between the beacon and the receiver.
Thus, the model can distinguish this "shadowing" from other types of interference and correct the
RSSI values, which significantly increases positioning accuracy in dynamic and crowded
environments [23].</p>
        <p>Filtering and Algorithms: AI enables the optimization of traditional filtering methods. Kalman
filters, median filters, and moving averages can be integrated with AI algorithms to stabilize
unstable RSSI readings. Instead of merely discarding anomalous values, AI learns to treat
interference not as errors, but as a complex, yet recognizable, part of the input data that can be
utilized to improve the model [23, 24].</p>
        <p>Adaptation to Changes and Device Heterogeneity. Traditional positioning systems require
frequent manual recalibration. AI renders these systems autonomous and self-adapting:
1. Self-Adapting Models: AI enables the creation of models that can dynamically adapt to
environmental changes (e.g., furniture rearrangement or changes in pedestrian flow)
without the necessity of manual recalibration. Machine learning models continuously train</p>
        <p>on new data, allowing them to adjust their internal parameters to maintain accuracy. This
significantly enhances the reliability and scalability of the system [25].</p>
        <p>Addressing Device Heterogeneity: Device heterogeneity is a key problem that reduces
positioning accuracy. Deep learning-based solutions, for instance, utilizing autoencoders,
allow for the creation of "device-agnostic" RSSI (Received Signal Strength Indicator)
representations. These models learn to extract the essential characteristics of the signal
while ignoring variations caused by the unique features of a specific device. This ensures
consistent positioning accuracy regardless of the smartphone model or other device [26].</p>
        <p>AI also plays a vital role in optimizing the energy consumption of devices, which is critical for
battery-powered beacons and mobile devices.</p>
        <p>Intelligent algorithms can analyze the device's state and activity to determine the optimal time
for position updates. For example, if a user is in a static position, the scanning frequency can be
reduced, saving battery power. This extends the autonomous operating time of beacons and mobile
devices, making the solutions more practical and economically beneficial [25].</p>
        <p>Optimal beacon placement is a complex task that affects the accuracy, coverage, and cost of the
entire system. Traditional methods often lead to inefficient solutions.</p>
        <p>The problem of optimal beacon placement belongs to the class of NP-hard problems, making it
virtually unsolvable manually. To address it, AI algorithms such as evolutionary algorithms (e.g.,
OPTILOD), genetic algorithms, or Particle Swarm Optimization (PSO) are applied. These
algorithms automatically determine the minimum number of beacons and their best location to
achieve maximum coverage and minimize positioning error [27].</p>
        <p>AI algorithms optimize several interconnected parameters simultaneously, including the
number of beacons, coverage area, and Geometric Dilution of Precision (GDOP). Thus, AI finds a
balance between deployment cost (by minimizing the number of beacons) and positioning
accuracy, allowing for the achievement of the best results. This differs from the naive approach of
"the more beacons, the better," since, after reaching a certain threshold, increasing their number
can, conversely, negatively affect accuracy due to increased interference [24, 27].</p>
      </sec>
      <sec id="sec-3-3">
        <title>3.3. Cyber Protection and Security of Beacon-based Positioning Systems</title>
        <p>Vulnerabilities and threats to lighthouse-based systems. Despite their advantages, lighthouse-based
systems are exposed to a number of serious vulnerabilities, many of which stem from the very
nature of their operation – data transmission «in open form» for simplicity and energy efficiency.
1. Signal Interception and Spoofing (Spoofing): since many protocols, such as iBeacon,
broadcast their identifiers without encryption, an attacker can easily intercept and record
them. The attacker can then create a fake beacon with the same identifier and retransmit
the signal, potentially at a different physical location. A user application receiving the fake
signal cannot distinguish it from the genuine one, which can lead to user redirection to a
malicious site, data compromise, or even financial loss [28]. Another type of attack,
“piggybacking”, involves an attacker using the infrastructure of legitimate beacons for their
own purposes without the owner’s consent [29]. These vulnerabilities extend to various
forms of deception, including spoofing and jamming, which can severely compromise the
integrity and availability of positioning services by introducing false signals or disrupting
legitimate ones [30, 31]. Furthermore, sophisticated attackers may leverage hardware
behavioral fingerprinting techniques to impersonate legitimate devices, thereby
circumventing traditional security measures and enabling data exfiltration or privilege
escalation within IoT ecosystems [32].
2. Denial of Service (DoS) Attacks: beacon-based systems can be attacked by creating radio
interference on the same frequency as BLE, which disrupts the operation of both beacons
and receivers. A more sophisticated DoS attack, known as "silencing," involves an attacker
using cloned beacons with higher transmitter power to flood the airwaves with fake signals.
This distorts the distance estimation to the real beacon, rendering the positioning system
inoperable [29]. Such denial-of-service attacks, especially those involving signal spoofing,
present a significant challenge for autonomous systems, akin to GPS spoofing where fake
signals manipulate perceived location [33, 34]. This vulnerability extends to broader
cyberphysical systems, where the injection of forged commands or the generation of malicious
network traffic can impair system functionality and integrity, thereby affecting the
availability of critical services [34].
3. Privacy Concerns: beacon systems collect user location data, which raises serious ethical
and legal issues. The key problem is that users may feel that their movements are being
tracked without their explicit consent [35]. This necessitates system developers to ensure
transparency and mandatory consent for data collection. Moreover, the aggregation of such
location data, especially when combined with other personal identifiers, raises concerns
about mass surveillance and potential misuse by centralized service providers. This
highlights a critical need for robust data governance frameworks that prioritize user control
over personal information and ensure transparency in data collection and utilization
practices [36].
4. Lack of Encryption and Authentication: a fundamental vulnerability is that many beacons
do not utilize built-in encryption mechanisms to protect transmitted data [37]. This not
only makes them susceptible to spoofing but also allows for the interception of confidential
information if it is transmitted via the beacon. The “hijacking” attack, in which an attacker
intercepts the password sent for beacon configuration and changes it, completely deprives
the legitimate owner of control over the device [37]. The vulnerability is also evident in the
possibility of “over-the-air” reprogramming of beacons without proper authentication,
which can lead to DoS attacks or content substitution [29]. These vulnerabilities are
exacerbated in cloud-based SCADA systems, where the public cloud environment
introduces additional threats such as distributed denial-of-service and man-in-the-middle
attacks, further compromising data integrity and system availability. Consequently,
unauthorized access to sensitive data and improper access control mechanisms represent
critical attack vectors that can lead to severe operational disruptions and privacy breaches
within these interconnected environments [38].</p>
        <p>Existing threats are not merely isolated hacking incidents, but fundamental risks inherent to
the technology itself, as the simplicity and low cost that make beacons attractive are also the
source of their vulnerability. With the increasing complexity and interconnectedness of hybrid
positioning systems, cybersecurity risks also escalate. Beacon devices, especially BLE (Bluetooth
Low Energy), are vulnerable to various attacks. A spoofing attack involves faking the beacon’s
identifier, which can lead to providing false information or redirecting the user to malicious
resources. Other threats include cloning (copying identifiers) and jamming—signal suppression that
can cause a Denial of Service (DoS) [28]. Furthermore, side-channel attacks, which exploit
information leakage from the physical implementation of beacon devices, pose a significant threat,
enabling the extraction of sensitive data like cryptographic keys through analysis of power
consumption, electromagnetic emanations, or acoustic signatures [40].</p>
        <p>Many IoT devices feature weak authentication mechanisms, use unencrypted communication
channels, and possess firmware vulnerabilities, making them easy targets. Malicious actors can
exploit these vulnerabilities for data theft, network hacking, or launching distributed DoS attacks
[41]. This expanded attack surface, coupled with the resource constraints and diverse design of
many IoT devices, renders them particularly susceptible to compromise, making them prime
targets for botnets or espionage [40, 42]. To develop an effective cyber defense strategy, it is
necessary to systematize the main threats faced by beacon-based systems (Table 2) [references to
our two articles, conceptual security model, and smart city]. This classification provides a
foundation for understanding the various attack vectors and vulnerabilities inherent in beacon
technology, enabling the development of targeted security countermeasures.</p>
        <p>Jamming Disruption of the radio Loss of coverage, BNT-attack,
(Suppressi channel, blocking of positioning laboratory
on) signal transmission. failures. attacks.</p>
        <p>BNT-attack, Monitoring, anomaly ISO/IEC 18305,
laboratory detection, physical AI-based
attacks. protection, frequency detection</p>
        <p>redundancy.</p>
        <p>Experimenta</p>
        <p>l attacks.</p>
        <p>Described in
reviews.</p>
        <p>Mutual
authentication,
TLS/SSL for backend,
integrity checks.</p>
        <p>Tamper-resistant
hardware, restricted
access, monitoring</p>
        <p>Beacon-based positioning systems are susceptible to a wide range of cyberthreats, including
spoofing, replay, DoS, MitM, privacy attacks, and physical tampering. Effective protection requires
a comprehensive approach: the implementation of cryptographic protocols (rolling code, AES, EID),
authentication, monitoring, physical security, and adherence to industry standards [43]. The
heterogeneous nature of IoT devices, coupled with their often limited computational resources and
extended operational lifecycles, exacerbates these vulnerabilities, making conventional security
paradigms inadequate. Vulnerabilities in beacon-based systems require a comprehensive approach
to cybersecurity that extends beyond traditional methods and includes both software and
organizational measures (Figure 4).
too small, this may indicate a DoS or spoofing attack [45]. Comparing the time and location
of signal transmission with reference data also allows for the identification of counterfeit
beacons [28, 45].</p>
        <p>
          The Role of Cyber-Physical Systems (CPS) and Digital Twins (DT): integrating
beaconbased systems into the architecture of Cyber-Physical Systems and Digital Twins is an
advanced approach to ensuring security. A Digital Twin is a virtual, real-time synchronized
copy of the physical environment. It enables:
Remote monitoring: modeling the physical environment and the status of beacons in a
virtual space, which allows for prompt identification of anomalies without the need for
physical inspection [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ].
        </p>
        <p>
          Reducing personnel risk: using autonomous data-collecting robots, controlled via the
Digital Twin, to monitor dangerous or hard-to-reach environments (e.g., at nuclear
facilities). This allows for accurate positioning data collection, significantly increasing
personnel safety [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]. Furthermore, AI/ML-powered defense systems can leverage this
realtime analysis from digital twins to automatically update existing software and prevent
large-scale cybersecurity attacks, while also enhancing forensic capabilities for
postincident analysis.
        </p>
        <p>Proactive defense: simulating various types of attacks and testing the effectiveness of
countermeasures in a virtual environment before their implementation in the real system.</p>
        <p>This approach shifts the paradigm from reactive defense to proactive risk management. It
should be noted that when using beacons as means of notification and evacuation assistance, the
most effective measures will be organizational security measures, such as inconspicuous placement
of beacons so that the majority of users are unaware of their location, territorial control, and
regular patrols to monitor the information being broadcasted by the beacons.</p>
        <p>Of the technical means of protection, the possibility of establishing a video surveillance system
should be noted, which will allow for the identification of a potential intruder and significantly
reduce the possibility of unintentional insider interference.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Case study</title>
      <p>In order to test the possibilities of using beacons for navigation, the authors decided to install them
on the first floor of the training building, which is characterized by a narrow, dark corridor with no
natural light (Figure 5). The beacons are shown as dots on the diagram, near the exits from the
classrooms.</p>
      <p>Initially, it was planned to use beacons to inform students about the characteristics of the
classrooms and conduct cyber quests with applicants. That’s why the beacons were installed in
almost every audience. However, since the end of February 2022, the use of beacons as information
stands has become irrelevant. The task of informing students and visitors about evacuation routes
and finding shelters in the building has become much more urgent. When using beacons as
information stands, their use turned into a small quest, the user had to install a browser with
corporate functions – Physic Web and allow this function interaction with cyber-physical systems
(Figure 6). Which greatly increased the access time to beacons especially in the initial setting.</p>
      <p>When redesigning the layout of the beacons to be used for evacuation purposes, the authors had
some questions:
1. Will the beacons be able to work and interact with smartphones without the internet?
2. If there is no electricity, will this circuit with beacons be operational?
3. Is a personal app necessary for this or will it be enough without the internet browser?
In experiments with different types of beacons browsers and smartphones, the following
answers were obtained:
1. Autonomous Operation and Data Transmission: beacons, particularly those based on
Bluetooth Low Energy (BLE) technology, can operate and interact with smartphones fully
autonomously, without requiring an internet connection. The beacon’s principle of
operation involves continuously transmitting (broadcasting) radio signals containing a
small volume of data. This data typically includes a unique identifier (e.g., UUID, Major,
Minor) or a web address (URL). The beacon essentially functions as a “digital lighthouse”. If
Bluetooth is enabled on a smartphone, it continuously scans the airwaves for such signals.
Upon detecting a signal from a beacon, it retrieves this unique identifier. All subsequent
actions, such as localization and information display, occur locally on the smartphone itself.</p>
      <p>This process does not require an internet connection.
2. Resilience to Power Outages: in the majority of cases, the beacons will continue to operate
because they are powered by their own integrated energy sources (batteries) and are thus
independent of the building's centralized electrical grid. Since the beacons simply transmit a
signal, their local operation does not depend on external power sources, servers, or the
configuration of IT equipment. They will remain functional until their battery is depleted.
3. Application vs. Browser Limitations for Localization: built-in browser functions, such as
Progressive Web Apps (PWA), allow caching web pages for offline access. However, for a
mapping application to successfully interact with beacons and accurately determine the
user's location, it requires the ability to continuously scan for Bluetooth signals in the
background. This functionality is native to the smartphone’s operating system and is
primarily accessible to specialized, dedicated mobile applications. A standard browser
generally cannot access beacon data without an internet connection, unless the web page is
designed with a complex architecture for specific offline data caching and usage.</p>
      <p>A dedicated application, in contrast to a browser, can be configured for continuous background
scanning for beacon signals. When the application receives a signal, it matches the beacon's
identifier against data stored in its own local database (cache), which contains the building map
and evacuation routes. It may also utilize other smartphone sensors, such as the accelerometer, for
additional location refinement. This entire process occurs on the user's device, ensuring the system
is fully autonomous and independent of external networks. If a beacon broadcasts an Eddystone
URL, internet access would be required to open the link. Therefore, for autonomous operation, it is
preferable to use beacons that only transmit a unique identifier (e.g., iBeacon or Eddystone UID).
The dedicated application on the smartphone already “knows” what to do with this identifier,
having all necessary information, including evacuation routes, pre-loaded into memory.</p>
      <p>During the experiments conducted using beacons, the authors recorded the time required for
evacuation from the furthest classroom, which is numbered 101 in Figure 7. The experiments were
performed with two distinct groups of participants: those who were well-familiar with the building
and those who were in the building for the first time.</p>
      <p>As shown in Figure 7, the evacuation time significantly increases in both groups of individuals
during the initial configuration of the application (browser) for utilizing the information broadcast
by the beacons. The use of a pre-configured browser allows for a slight acceleration of the
evacuation of individuals unfamiliar with the building layout or visiting it for the first time.</p>
      <p>The traditional use of beacons for smartphones requires an Internet connection; otherwise, the
browser cannot retrieve information from the beacon. To enable a beacon-based evacuation system
operation in offline mode, it must be implemented via a dedicated native application. All essential
information, including maps and routes, must be pre-cached in the smartphone's memory. In this
architecture, beacons serve merely as triggers, with all logic and navigation processes executed
locally on the user’s device. A specialized application for building evacuation was developed by the
authors (Figure 8). After installing the developed application for evacuation using beacons on
smartphones of two groups of users, the experiment with evacuation was repeated. The time of
evacuation is shown in Figure 9.</p>
      <p>As shown in Figure 9, the gain from using beacons and a specially developed application is
about 8% for the group that knows the scheme of the building, which is insignificant. However, in a
critical situation every second counts. For a group of people who do not know the building when
using beacons and the application, the evacuation time is reduced by 30% and approaching the time
of a group of people who know the schematics of the building. This greatly increases the chances
of a successful evacuation. In fact, the use of beacons allows to instill confidence and knowledge of
the building people for the first time in this building.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Discussions</title>
      <p>The conducted research affirms that the foundational challenge in indoor positioning lies in
navigating the trade-off between positioning accuracy and the total cost of ownership (TCO).
While UWB technology offers superior, centimeter-level accuracy essential for critical industrial
applications like Autonomous Guided Vehicles (AGV) and asset tracking, its high infrastructure
cost and complex deployment limit its mass applicability. Conversely, BLE technology emerges as
the optimal choice for mass-market deployment—such as in university campuses and retail—due to
its low power consumption, cost-effectiveness, and near-universal compatibility with modern user
devices. This dichotomy necessitates a hybrid deployment strategy as the most efficient path
forward. Such a strategy strategically places high-accuracy UWB anchors only in mission-critical
zones (e.g., laboratories, chemical storage), while relying on widespread, low-cost BLE beacons for
general navigation and contextual alerting.</p>
      <p>A key contribution of this work is demonstrating how Artificial Intelligence mitigates the
fundamental technical weaknesses of these radio-frequency systems. Traditional positioning
methods are severely compromised by multipath effects, Non-Line-of-Sight (NLoS) conditions, and
device heterogeneity. However, AI models can be trained to recognize and compensate for signal
perturbations, such as “shadowing” caused by the human body, correcting RSSI values in real time.
Furthermore, AI enables the creation of self-adapting models that eliminate the need for costly and
labor-intensive manual recalibration a significant drawback of traditional fingerprinting methods
by dynamically adjusting to changes in the environment.</p>
      <p>Critical to the implementation of any beacon-based system is a robust cyber defense framework.
The inherent vulnerability of many beacon protocols (such as the unencrypted transmission of
identifiers) makes them susceptible to simple but devastating attacks, including spoofing, jamming,
and cloning, which could entirely compromise the system's integrity during an emergency. The
proposed defense strategy shifts the security paradigm from reactive to proactive, advocating for
the mandatory use of end-to-end encryption, dynamic identifier changing (Secure Shuffling), and
leveraging the Digital Twin concept. By modeling the physical and cyber state in a virtual
environment, the Digital Twin allows for remote monitoring of device anomalies, real-time testing
of countermeasures, and enhanced forensic analysis following an incident.  The practical
significance of this integrated approach was quantitatively validated in the emergency evacuation
experiment. While users familiar with the building saw an acceleration of evacuation time by
approximately 8%, the impact on individuals unfamiliar with the building was profound: the use of
the beacon-assisted application reduced their evacuation time by 30%. This empirical result
provides a strong validation of the system's value, transforming a simple navigation tool into a
lifesaving safety component, particularly for transient populations in large, complex facilities.</p>
    </sec>
    <sec id="sec-6">
      <title>6. Conclusions</title>
      <p>The research successfully achieved its objectives by analyzing the current state of mobile beacon
infrastructure, classifying key technologies, detailing their vulnerabilities, and proposing an
integrated cyber-physical defense model.</p>
      <p>The comparative analysis (Table 1) clearly established the operational parameters of BLE, UWB,
Wi-Fi RTT, and RFID, confirming that no single technology is optimal for all scenarios. The key
finding is that the implementation of BLE-based positioning, secured by robust software and AI
algorithms, is the most pragmatic solution for large-scale safety applications, such as emergency
evacuation. The experimental data unequivocally demonstrate the life-saving potential of the
developed system. The observed 30% reduction in evacuation time for people unfamiliar with the
building, achieved through a dedicated, pre-configured application, validates the proposed
methodology and underscores its ability to provide crucial guidance and stability during moments
of panic. Even the seemingly small time savings for knowledgeable users (approximately 8%) can
be critical in real-world air raids or other time-sensitive crises. The system thus instills both
confidence and practical knowledge, effectively turning unfamiliar visitors into informed evacuees.</p>
      <p>Future research should focus on further enhancing the system’s resilience by:


</p>
      <p>Deepening the application of AI and Machine Learning for automated, real-time detection
and prediction of sophisticated cyberattacks, transitioning from anomaly detection to
predictive attack forecasting;
Developing standardized protocols for the seamless integration of BLE positioning data
with Digital Twin platforms for advanced real-time situational awareness and post-incident
reconstruction;
Investigating the system's resilience and operational performance in environments
subjected to active Electronic Warfare (EW) countermeasures, building upon the initial
concerns regarding GNSS reliability in contested areas.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.
[23] S. Naghdi, K. O’Keefe, Human obstacle mitigation in BLE trilateration, Sensors 20 (2020) 1350.</p>
      <p>https://doi.org/10.3390/s20051350
[24] J. Wisanmongkol, L. Klinkusoom, T. Sanpechuda, L.-O. Kovavisaruch, BLE multipath
mitigation, in: ISCIT 2019, IEEE, 2019. https://doi.org/10.1109/ISCIT.2019.8905164
[25] How AI contributes to indoor geolocation performance, Pole Star. URL:
https://www.polestar.eu/blog/use-of-artificial-intelligence-ai-in-indoor-geolocation-solutions
[26] S. Tiku, A. Mittal, S. Pasricha, CNN framework for indoor localization, in: Machine Learning
for Indoor Localization and Navigation, 2023, 159–176. DOI: 10.1007/978-3-031-26712-3_7
[27] A. Famili, A. Stavrou, H. Wang, J.-M. Park, OPTILOD: Optimal beacon placement, Sensors 24
(2024) 1865. https://doi.org/10.3390/s24061865
[28] Detection of spoof attacks on location broadcasting beacons, Google Patents. URL:
https://patents.google.com/patent/US20170026408A1/en
[29] A. C. Chan, R. M. Chung, Security and privacy of wireless beacon systems, arXiv (2021)
abs/2107.05868.
[30] V. Pevnev, M. Tsuranov, H. Zemlianko, O. Amelina, Conceptual model of information security,
in: Lecture Notes in Networks and Systems, 2021, 158–168. DOI: 10.1007/978-3-030-66717-7_14
[31] L. Xiao, X. Wan, C. Dai, X. Du, X. Chen, M. Guizani, Edge caching security via RL, IEEE</p>
      <p>Wireless Communications 25 (2018) 116–122. https://doi.org/10.1109/MWC.2018.1700291
[32] P. M. Sánchez Sánchez, J. M. Jorquera Valero, A. Huertas Celdrán, G. Bovet, M. Gil Pérez, G. M.</p>
      <p>Pérez, Hardware fingerprinting of SBCs, J. Netw. Comput. Appl. 212 (2023) 103579.
https://doi.org/10.1016/j.jnca.2022.103579
[33] M. Mouzai, M. A. Riahla, A. Keziou, GPS spoofing detection using ML, Sensors 25 (2025) 4045.</p>
      <p>https://doi.org/10.3390/s25134045
[34] R. Singh, K. P. Sharma, L. K. Awasthi, ML ensemble for IoT security, Cluster Computing
(2024). https://doi.org/10.1007/s10586-024-04519-y
[35] Z. Ayaz, BLE beacons for retail behavior analytics, J. Theor. Appl. Electron. Commer. Res. 20
(2025) 55. https://doi.org/10.3390/jtaer20020055
[36] J. H. Ziegeldorf, O. G. Morchon, K. Wehrle, Privacy in IoT, Security and Communication</p>
      <p>Networks 7 (2013) 2728–2742. https://doi.org/10.1002/sec.795
[37] Beacon security – protect your infrastructure. URL: https://kontakt.io/blog/beacon-security
[38] M. Rahaman, C.-Y. Lin, P. Pappachan, B. B. Gupta, C.-H. Hsu, Privacy-centric AI for smart
farming, Sensors 24 (2024) 4157. https://doi.org/10.3390/s24134157
[39] M. I. Ibrahim, M. Y. Darus, DDoS analysis in smart home IoT, JOIV 8 (2024) 2104.</p>
      <p>https://doi.org/10.62527/joiv.8.4.2175
[40] What are the security challenges of 5G and IoT?, Fortinet Blog. URL:
https://www.fortinet.com/blog/industry-trends/the-security-implications-for-5g-and-iot
[41] U. Tariq, I. Ahmed, A. K. Bashir, K. Shaukat, IoT cybersecurity review, Sensors 23 (2023) 4117.</p>
      <p>https://doi.org/10.3390/s23084117
[42] S. Holcer, J. Torres-Sospedra, M. Gould, I. Remolar, Privacy in indoor positioning, in:
ICL</p>
      <p>GNSS 2020, IEEE, 2020. https://doi.org/10.1109/ICL-GNSS49876.2020.9115496
[43] I. H. Putro, T. Ahmad, R. M. Ijtihadie, MQTT intrusion detection with ML, IEEE Open J.</p>
      <p>Commun. Soc. 1 (2025). https://doi.org/10.1109/OJCOMS.2025.3610132
[44] A. Mart, U. Zurutuza, R. Uribeetxeberria, M. Fern, J. Lizarraga, A. Serna, I. V, Beacon spoofing
detection, in: ARES 2008, IEEE, 2008. https://doi.org/10.1109/ARES.2008.130
[45] V. Pevnev, A. Frolov, M. Tsuranov, H. Zemlianko, Data integrity in infocommunication
systems, International Journal of Computing 21 (2022) 228–233. DOI: 10.47839/ijc.21.2.2591</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>[1] What is beacon technology? The uses of beacon technology, MOKOBlue</article-title>
          . URL: https://www.mokoblue.com/en/beacon-technology
          <article-title>-for-a-connected-world</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Beacon</surname>
          </string-name>
          technology
          <article-title>- how it works and how it can be used, MOKOSmart</article-title>
          . URL: https://www.mokosmart.com/beacon-technology
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>[3] BLE beacon location tracking solutions, Dusun IoT</article-title>
          . URL: https://www.dusuniot.com/blog/blebeacon-location
          <article-title>-tracking-for-asset-management</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Tomitsch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Schlögl</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Grechenig</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Wimmer</surname>
          </string-name>
          , T. Költringer,
          <article-title>Accessible real-world tagging through audio-tactile location markers</article-title>
          ,
          <source>in: 5th Nordic Conference on HumanComputer Interaction</source>
          , ACM,
          <year>2008</year>
          . https://doi.org/10.1145/1463160.1463242
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>[5] 11 helpful ways beacons are changing education, TechGrid</article-title>
          . URL: https://techgrid.com/blog/11- helpful
          <article-title>-ways-beacons-are-changing-education</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M. Z.</given-names>
            <surname>Karakuşak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Kivrak</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Watson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. K.</given-names>
            <surname>Ozdemir</surname>
          </string-name>
          ,
          <string-name>
            <surname>Cyber-WISE</surname>
          </string-name>
          :
          <article-title>A cyber-physical indoor positioning system and digital twin approach</article-title>
          ,
          <source>Sensors</source>
          <volume>23</volume>
          (
          <year>2023</year>
          )
          <article-title>9903</article-title>
          . https://doi.org/10.3390/s23249903
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>M.</given-names>
            <surname>Vlasova</surname>
          </string-name>
          ,
          <string-name>
            <surname>Indoor</surname>
            <given-names>GPS</given-names>
          </string-name>
          |
          <article-title>Alternatives to GPS inside building</article-title>
          ,
          <source>Navigine</source>
          (
          <year>2023</year>
          ). URL: https://navigine.com/blog/why-is
          <article-title>-gps-ineffective-inside-buildings</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Do</surname>
            <given-names>Wi-</given-names>
          </string-name>
          <article-title>Fi indoor positioning systems still make sense in 2025?, Mapsted Blog</article-title>
          . URL: https://mapsted.com/blog/wifi
          <article-title>-positioning-system-explained</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>[9] Beacon in education: Intelligent and digital development</article-title>
          . URL: https://www.mokoblue.
          <article-title>com/ how-beacon-technology-can-be-applied-in-the-education-industry</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V.</given-names>
            <surname>Pevnev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Plakhteev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Tsuranov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Zemlianko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Leichenko</surname>
          </string-name>
          ,
          <article-title>Smart city technology: Conception and security issues</article-title>
          , in: Integrated Computer Technologies in Mechanical Engineering 2021, Springer,
          <year>2022</year>
          ,
          <fpage>207</fpage>
          -
          <lpage>218</lpage>
          . https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -94259-5_
          <fpage>19</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>[11] ISO/IEC 18305:2016 - introduction, NIST. URL: https://www.nist.gov/ctl/pscr/isoiec-18305- 2016-introduction</mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <article-title>UWB vs Bluetooth: Which indoor positioning technology wins?, MOKOSmart</article-title>
          . URL: https://www.mokosmart.
          <article-title>com/uwb-vs-bluetooth-indoor-positioning-guide</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <article-title>Exploring the role of Bluetooth in IoT device communication</article-title>
          ,
          <source>MoldStud</source>
          . URL: https://moldstud.com/articles/p
          <article-title>-exploring-the-role-of-bluetooth-in-iot-device-communicationenhancing-connectivity-and-efficiency</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>H.</given-names>
            <surname>Wang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G.</given-names>
            <surname>Ganesh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zon</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Ghosh</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Siu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Q.</given-names>
            <surname>Fang</surname>
          </string-name>
          ,
          <article-title>BLE-based indoor positioning for aging-in-place</article-title>
          ,
          <source>PLOS Digital Health</source>
          <volume>4</volume>
          (
          <year>2025</year>
          )
          <article-title>e0000774</article-title>
          . https://doi.org/10.1371/journal.pdig.0000774
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>UWB vs Wi-Fi</surname>
            <given-names>RTT</given-names>
          </string-name>
          :
          <article-title>Precision positioning showdown, RTLS Alliance</article-title>
          . URL: https://www.rtlsalliance.com/resources/uwb
          <article-title>-vs-wifi-rtt-precision-showdown</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>C. S.</given-names>
            <surname>Álvarez-Merino</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H. Q.</given-names>
            <surname>Luo-Chen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. J.</given-names>
            <surname>Khatib</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Barco</surname>
          </string-name>
          ,
          <string-name>
            <surname>Wi-Fi</surname>
            <given-names>FTM</given-names>
          </string-name>
          ,
          <article-title>UWB and cellular fusion for indoor positioning</article-title>
          ,
          <source>Sensors</source>
          <volume>21</volume>
          (
          <year>2021</year>
          )
          <article-title>7020</article-title>
          . https://doi.org/10.3390/s21217020
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Panyov</surname>
          </string-name>
          , UWB technology (
          <year>2025</year>
          guide),
          <source>Navigine</source>
          (
          <year>2020</year>
          ). URL: https://navigine.com/blog/uwb-technology
          <article-title>-features-examples-of-application</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>C.</given-names>
            <surname>Ma</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Wu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Poslad</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. R.</given-names>
            <surname>Selviah</surname>
          </string-name>
          ,
          <article-title>Wi-Fi RTT ranging and positioning</article-title>
          ,
          <source>IEEE Trans. Mob. Comput</source>
          .
          <volume>1</volume>
          (
          <year>2020</year>
          ). https://doi.org/10.1109/TMC.
          <year>2020</year>
          .3012563
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>M.</given-names>
            <surname>Orfanos</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Perakis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Gikas</surname>
          </string-name>
          , G. Retscher,
          <string-name>
            <given-names>T.</given-names>
            <surname>Mpimis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>I.</given-names>
            <surname>Spyropoulou</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Papathanasopoulou</surname>
          </string-name>
          ,
          <article-title>Wi-Fi RTT for personal mobility</article-title>
          ,
          <source>Sensors</source>
          <volume>23</volume>
          (
          <year>2023</year>
          )
          <article-title>2829</article-title>
          . https://doi.org/10.3390/s23052829
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>H.</given-names>
            <surname>Gomes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Navio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. D.</given-names>
            <surname>Gaspar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. N. G. J.</given-names>
            <surname>Soares</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. M. L. P.</given-names>
            <surname>Caldeira</surname>
          </string-name>
          ,
          <article-title>RFID traceability system in industry</article-title>
          ,
          <source>Applied Sciences</source>
          <volume>13</volume>
          (
          <year>2023</year>
          )
          <article-title>12943</article-title>
          . https://doi.org/10.3390/app132312943
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>L.</given-names>
            <surname>Profetto</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Gherardelli</surname>
          </string-name>
          ,
          <string-name>
            <surname>E. Iadanza,</surname>
          </string-name>
          <article-title>RFID in healthcare: A review, Health and Technology (</article-title>
          <year>2022</year>
          ). https://doi.org/10.1007/s12553-022-00696-1
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>C.</given-names>
            <surname>Munoz-Ausecha</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Ruiz-Rosero</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Ramirez-Gonzalez, RFID applications and security</article-title>
          ,
          <source>Computation</source>
          <volume>9</volume>
          (
          <year>2021</year>
          )
          <article-title>69</article-title>
          . https://doi.org/10.3390/computation9060069
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>