Fact-checked by Grok 2 weeks ago

iBeacon

iBeacon is a proximity detection technology developed by Apple Inc. that enables iOS devices to interact with Bluetooth low energy (BLE) hardware transmitters, known as beacons, to provide location-based services and notifications. It uses BLE signals at 2.4 GHz to broadcast unique identifiers, allowing compatible apps to detect a device's approximate distance from a beacon and trigger actions such as displaying contextual information or personalized alerts. Introduced with iOS 7 in September 2013, iBeacon builds on BLE standards to support indoor positioning where GPS is unreliable, with compatibility extending to iPhone 4S and later models, iPad (3rd generation) and later, iPad mini, and iPod touch (5th generation) and later. The protocol defines beacon advertisements containing a 16-byte (UUID) for grouping beacons, a 2-byte major value for subdividing regions, and a 2-byte minor value for further identification, enabling precise region monitoring. iOS devices estimate proximity using the (RSSI), categorizing it as immediate (within centimeters), near (within a few meters), far (tens of meters), or unknown, though accuracy can vary due to environmental factors like walls or interference. Beacons typically operate within a range of tens of meters and can run on low-power coin cell batteries for extended periods, with apps able to monitor up to 20 regions simultaneously. Any iOS device supporting BLE can also function as an iBeacon transmitter through Core Location APIs. iBeacon has been deployed in retail environments for targeted promotions, such as notifying customers of nearby products, and in like museums and airports for guided experiences and indoor . Apple first tested iBeacon in its U.S. stores in late 2013, integrating it with features like for location-triggered passes. As of 2025, the technology remains supported in current Apple devices, including the 16 series, and contributes to a growing beacon market valued at over USD 34 billion, driven by applications in , contactless payments, and enterprise solutions.

Overview

Definition and Purpose

iBeacon is a protocol developed by Apple and introduced in 2013 as part of , enabling (BLE) beacons to broadcast unique identifiers consisting of a (UUID), major value, and minor value. These identifiers allow compatible mobile devices, especially devices running apps that support the Core Location framework, to detect the presence of nearby beacons and initiate predefined actions, such as notifications or . The primary purpose of iBeacon is to deliver proximity-based interactions in settings where GPS accuracy is limited, such as indoor environments. It supports use cases including indoor location services for , proximity to send targeted promotions to shoppers, for monitoring equipment or inventory, and contextual notifications that provide relevant information based on a user's . Key benefits of iBeacon include its low-cost deployment, as beacons are inexpensive hardware that can be easily installed without extensive infrastructure, and high , owing to BLE's low power consumption that allows batteries to last for years. Additionally, it integrates seamlessly with mobile applications to create personalized experiences, enhancing user engagement in , museums, and other venues.

Core Components

iBeacon systems rely on a combination of hardware transmitters and software frameworks to enable proximity detection via (BLE) signals. The primary hardware component is the beacon device itself, a compact transmitter that broadcasts standardized advertisement packets containing identification data. These beacons are typically small, often coin-sized, and designed for easy deployment in various environments. Beacons are powered by batteries, such as coin cell batteries that typically last 1 to 5 years depending on advertising interval and transmit settings, larger batteries for even longer durations (several years), or USB/external sources for indefinite . They utilize BLE to transmit signals at regular intervals, with a typical range extending to tens of meters, and many models feature adjustable transmission to fine-tune coverage areas. On the software side, the iOS Core Location framework serves as the foundational for detecting and interacting with iBeacons, allowing apps to monitor regions and measure proximity through methods like ranging and region monitoring. This framework requires user permission for location services and integrates seamlessly with devices supporting BLE, such as and later models. Beacon configuration is handled via tools like the uuidgen command-line utility on macOS or programmatically using NSUUID in iOS apps to generate unique identifiers, while third-party applications, such as LightBlue Explorer, enable on-device setup of beacon parameters. The overall system incorporates mobile devices as receivers that process incoming BLE signals from beacons, often in conjunction with cloud services for backend analytics, , and remote management of detected to support scalable deployments. Uniqueness in the system is achieved through UUID-based identifiers, which, along with major and minor values, allow precise differentiation of beacons within a network.

History

Origins and Launch

iBeacon was developed by Apple Inc. in 2013 as an extension of the Core Location framework within iOS 7, leveraging Bluetooth Low Energy (BLE) technology to enable precise proximity detection in indoor environments. The technology was publicly announced on June 10, 2013, during Apple's Worldwide Developers Conference (WWDC) keynote, where it was presented as one of over 1,500 new APIs in iOS 7, aimed at addressing the limitations of GPS for indoor positioning challenges. Apple's primary motivations for creating iBeacon centered on enhancing user experiences in location-constrained settings, particularly in , by enabling micro-location awareness that could deliver contextual such as shoppable maps and personalized recommendations within stores. It also positioned iBeacon as a versatile alternative to (NFC) for short-range interactions, offering broader range and battery efficiency without requiring physical taps. The initial rollout began shortly after the iOS 7 release in September 2013, with Apple activating iBeacons in all 254 of its U.S. retail stores on December 6, 2013, to provide location-aware notifications and integrate with the app. The first commercial deployments by third-party retailers occurred in late 2013 and early 2014. Macy's pioneered the technology's retail application on November 20, 2013, installing iBeacons in its () and ) stores via a partnership with Shopkick, using the shopBeacon system to automatically deliver entry greetings, location-specific deals, and rewards tied to in-app browsing history for improved . In parallel, (MLB) announced a collaboration with Apple in September 2013 to integrate iBeacon into its MLB.com At the Ballpark app, with initial installations completed at and by February 2014, enabling fans to receive customized content like seat directions, coupons, and videos near stadium landmarks for enhanced in-venue experiences.

Key Developments and Updates

Following its initial introduction, iBeacon saw significant cross-platform expansion in the mid-2010s, particularly through efforts to support devices. In 2014, Radius Networks released the open-source AltBeacon specification as an interoperable alternative to Apple's proprietary iBeacon protocol, enabling broader adoption by providing reference implementations and an updated Beacon Library for scanning and transmitting proximity data. This library allowed developers to build iBeacon-compatible applications on without relying solely on iOS ecosystems, fostering open-sourcing of beacon tools and libraries during 2014-2018. On the iOS side, privacy enhancements were introduced with in 2019, including randomized MAC addresses to prevent unauthorized tracking via BLE advertisements like those used in iBeacon. This feature requires explicit user permission for apps to access devices in the background, reducing risks of persistent location while maintaining iBeacon's core functionality for proximity detection. During 2019-2023, iBeacon gained prominence in applications, notably for amid the . Bluetooth beacons, including iBeacon-compatible devices, were deployed in systems to detect close-range interactions without relying on GPS, enabling apps to log encounters and notify users of potential exposures while preserving anonymity through rotating identifiers. iBeacon continued to rely on advertisements for its operations, but recent years have emphasized integrations with emerging technologies. From 2024 onward, AI-driven analytics have enhanced predictive proximity services, allowing systems to forecast user behaviors based on beacon data patterns for more targeted interactions. Hybrid positioning systems combining iBeacon with and GPS have also advanced indoor-outdoor accuracy, addressing limitations in dense environments. In late 2024, Apple rolled out firmware updates to expand iBeacon across third-party apps, improving capabilities. Security protocols have evolved to counter spoofing threats, with recommendations for dynamic and layers in deployments to verify legitimate signals. In the U.S., the iBeacon and market grew from $4.3 billion in 2024 to a projected $32 billion by 2032, driven by these technological adaptations and expanded use in and .

Technical Specifications

Bluetooth Low Energy Foundation

Bluetooth Low Energy (BLE) was introduced as part of the Bluetooth Core Specification version 4.0, released on June 30, 2010, by the (SIG). This technology was developed to enable low-power, short-range communication, typically achieving ranges of up to 50-100 meters in open environments, making it suitable for applications requiring minimal over moderate distances. Unlike traditional , which focuses on higher data throughput, BLE prioritizes efficiency for battery-operated devices such as sensors and wearables. BLE operates in the unlicensed 2.4 GHz Industrial, Scientific, and Medical () band, utilizing 40 channels with 2 MHz spacing and adaptive frequency hopping across 37 data channels to avoid interference and improve reliability. A core feature is its advertising mode, which allows peripheral devices to broadcast small data packets periodically without establishing a full , facilitating and one-to-many communication in a connectionless manner. For scenarios requiring data exchange, BLE employs the Generic Attribute Profile (GATT), a client-server that organizes data into services, characteristics, and descriptors, enabling structured interactions once a connection is formed. The power efficiency of BLE stems from its design principles, including deep sleep modes where devices remain inactive for most of the time and only wake briefly for transmissions or scans. This, combined with low-duty-cycle operations and infrequent advertising intervals, allows battery-powered beacons to achieve multi-year operational life on a single coin-cell battery, such as a CR2032. iBeacon utilizes this advertising mode to periodically broadcast identifiers for proximity detection.

iBeacon Protocol Details

The iBeacon protocol operates as a proprietary extension on top of Bluetooth Low Energy (BLE) advertising mode, utilizing the manufacturer-specific data field within BLE advertisement packets to broadcast location-relevant information. This data is prefixed with Apple's assigned company identifier, 0x4C00 (little-endian representation of the Bluetooth SIG-assigned value 76 for Apple Inc.), followed by the iBeacon-specific type identifier 0x02, and a length byte indicating the subsequent payload size. Central to the iBeacon protocol are three hierarchical identifiers that enable precise grouping and identification of beacons: a 16-byte (128-bit) (UUID) for broad categorization, such as associating beacons within a specific venue or application; a 2-byte (16-bit) unsigned major value for subdividing groups, like identifying floors or departments; and a 2-byte (16-bit) unsigned minor value for pinpointing individual beacons, such as specific products or points of interest. Accompanying these is a 1-byte signed representing measured , which calibrates signal strength by indicating the transmitter (in dBm) at a reference of 1 meter, allowing receiving devices to estimate relative despite environmental variations. In the detection process, compatible devices, such as or smartphones with BLE support, continuously scan for BLE advertisements containing the iBeacon prefix and identifiers matching any pre-registered beacon regions defined by an app. Upon detecting a match—typically a UUID alone or in combination with and/or values—the system triggers region entry or exit events based on internal signal strength thresholds derived from (RSSI) values, notifying the app without requiring constant active scanning to conserve power. These events enable background-aware applications, such as triggering notifications upon entering a monitored area, while the protocol ensures anonymity by not transmitting . The iBeacon advertisement packet utilizes a Bluetooth Low Energy (BLE) non-connectable undirected advertising event (ADV_NONCONN_IND) to broadcast its data, with the advertising data field limited to a maximum of 31 bytes as defined by the BLE specification. This payload encodes the essential beacon identifiers and calibration information in a manufacturer-specific format assigned to Apple, allowing compatible devices to parse and act upon the beacon's presence without establishing a connection. The structure prioritizes compactness to minimize transmission overhead while providing sufficient uniqueness for proximity-based applications. The packet's composition begins with a 3-byte flags advertising data (AD) structure, followed by a 27-byte manufacturer-specific AD structure containing the core iBeacon data. The flags indicate discoverability modes compliant with BLE standards, typically set to 0x06 to enable LE General Discoverable Mode and indicate BR/EDR support for low-energy devices. The manufacturer-specific portion starts with a length field of 0x1A (indicating 26 bytes of data), an AD type of 0xFF for proprietary data, and Apple's company identifier 0x4C00 (transmitted in little-endian byte order as 0x4C followed by 0x00). This is immediately followed by the iBeacon-specific type field 0x02 and a sub-length of 0x15 (21 bytes for the identifier fields), comprising a 16-byte (UUID), a 2-byte major value, a 2-byte minor value, and a 1-byte transmit (Tx) power value representing the calibrated (RSSI) at 1 meter distance. The following table illustrates the byte-level breakdown of the 31-byte advertising payload, with offsets relative to the start of the advertising data field (excluding the BLE PDU header, advertiser address, and ):
OffsetLength (bytes)Value/FieldDescription
010x02Length of flags AD structure
110x01AD type: Flags
210x06Flags data: General Discoverable Mode and BR/EDR Supported by Controller
310x1A of manufacturer-specific AD structure (26 bytes )
410xFFAD type: Manufacturer specific
510x4CCompany ID low byte (Apple: 0x004C)
610x00Company ID high byte
710x02iBeacon type identifier
810x15 of iBeacon (21 bytes)
9-2416Proximity UUID (128-bit identifier for beacon grouping)
25-262Major value (further subgroups within UUID)
27-282Minor value ( within major group)
291Tx power (calibrated RSSI in dBm at 1 meter, e.g., -59)
This format ensures interoperability across BLE while reserving space for the essential iBeacon elements. Variations in the structure are minimal, as the core iBeacon format has remained stable since its introduction, though some implementations include optional padding in the final byte to reach exactly 31 bytes or extended manufacturer data in non-iBeacon modes. The Tx power field specifically enables calibrated RSSI measurements for accurate ranging, with values typically ranging from -30 dBm to -100 dBm based on . Later beacon ecosystems may append optional data extensions beyond the standard 21-byte iBeacon , but these do not alter the primary packet for iBeacon .

Functions and Operations

Region Monitoring

Region monitoring in iBeacon allows applications to detect when a device enters or exits predefined geographic areas defined by (BLE) beacons, enabling event-driven responses without continuous foreground operation. Developers register these regions using the Core Location framework's CLBeaconRegion class, which requires a unique proximity UUID—a 128-bit identifier—to specify the type or organization of beacons, along with optional major (16-bit) and minor (16-bit) values to distinguish groups or individual beacons within that UUID. Once registered via the CLLocationManager's startMonitoring(for:) method, the operating system handles the monitoring in the background by scanning for BLE advertisement packets matching the region's identifiers. The operating system triggers notifications based on the presence or absence of beacon signals within the defined , rather than precise distance measurements. Entry events invoke the delegate method locationManager(_:didEnterRegion:), while exit events invoke locationManager(_:didExitRegion:), with options to customize notifications for entry, exit, or both during region creation. These events can relaunch a suspended or terminated app to handle the response, ensuring seamless operation even when the app is not active. limits monitoring to a maximum of 20 regions per application to manage system resources efficiently. This capability supports practical applications such as automatic content delivery in environments, where an might send targeted notifications—like promotions for specific store sections—upon detecting entry into a mall identified by a shared UUID and major value for departments. By focusing on binary in/out detection for larger areas, region monitoring facilitates location-aware services without requiring constant device scanning.

Ranging

Ranging in iBeacon refers to the process by which a compatible device, such as an device, actively measures the proximity to one or more beacons within a defined region to enable zoned interactions based on estimated distances. This functionality relies on the (BLE) signal strength, specifically the (RSSI), to approximate the distance between the device and the beacon. Unlike passive region monitoring, ranging provides ongoing updates during active app sessions, allowing applications to respond dynamically to changes in proximity for use cases like targeted notifications or contextual content delivery. To initiate ranging, developers use the Core Location framework's CLLocationManager class in the foreground of an app, calling the startRangingBeacons(in:) method with a CLBeaconRegion object specifying the beacon's UUID, major, and minor identifiers. The system then invokes the locationManager(_:didRangeBeacons:in:) delegate method, which delivers an array of CLBeacon objects representing detected beacons that match the region criteria. Each CLBeacon includes properties such as rssi (the current signal strength in dBm), proximity (a categorical estimate), and accuracy (a numeric estimate in meters). These updates occur only while the app is in the foreground to ensure consistent and power-efficient performance, as background ranging is not supported. The distance estimation in ranging employs a log-distance path loss model derived from the RSSI values, calibrated against the beacon's advertised measured power (the expected RSSI at 1 meter). Distances from RSSI can be approximated using the formula for the estimated distance d (in meters): d = 10^{\frac{\text{measured power} - \text{RSSI}}{10 \cdot n}} where n is the path loss exponent, typically ranging from 2 (free space) to 4 (obstructed indoor environments). This model inverts the standard path loss equation, RSSI = measured power - 10 n log10(d), to solve for distance. The accuracy value reported by the API is an estimate based on such RSSI analysis, though the exact computation is proprietary and can vary due to environmental factors. Real-world variations due to multipath fading and interference can affect reliability. Based on the computed accuracy, iBeacon ranging categorizes proximity into zones: immediate (accuracy < 0.5 m, indicating very close range such as direct contact), near (0.5–3 m, suitable for short-range interactions), and far (3–50 m, for broader detection with lower ). An unknown zone is reported when insufficient data is available, such as during initial scans. Indoors, the overall accuracy of these estimates typically varies by ±1–5 m, influenced by environmental factors like walls and human presence, making it suitable for proximity-based zoning rather than pinpoint navigation. Implementation involves periodic BLE scans managed by the operating system, with the didRangeBeacons delegate typically invoked every 1–10 seconds depending on device activity and signal stability, updating the array of beacons and their dynamic distances to reflect or signal changes. This balances responsiveness with conservation, as continuous scanning would drain power rapidly. For optimal results, apps process these updates to filter beacons by signal quality (e.g., averaging multiple RSSI readings) and trigger zoned actions, such as displaying content when entering the near zone relative to a boundary.

Configuration Settings

iBeacon beacons are configured with key identifiers to define their identity and scope. The primary identifier is a 128-bit UUID, which uniquely identifies a deployment or application, such as a specific or service. This is supplemented by a 16-bit major value for grouping related beacons, like different floors in a building, and a 16-bit minor value for finer distinctions, such as individual aisles. These identifiers can be assigned using (BLE) configuration applications, such as LightBlue, which allow users to write the values directly to the beacon's advertisement data. Hardware parameters further tune beacon performance. Transmit (Tx) power is adjustable across a range of -30 dBm to +4 dBm, influencing signal strength and detection range without altering the core . The advertising , the time between broadcast packets, spans from 20 to 10 s, with Apple's recommended setting for iBeacons at 100 to balance responsiveness and efficiency. Region parameters in the receiving application control how iBeacon events are handled. Developers can toggle notifications for entry and exit events using the notifyOnEntry and notifyOnExit properties of CLBeaconRegion, enabling selective alerting based on use case. Background monitoring is supported and can be enabled through location permissions, allowing the system to wake the app for events even when suspended. Entry notifications typically occur within seconds, while exit notifications may experience delays of 5 to 60 s due to signal persistence and system verification. Best practices emphasize and for reliable operation. Measured , a calibrated reference for RSSI at 1 meter, should be determined by averaging readings over at least 10 seconds while moving the receiver slightly to account for environmental variations, ensuring accurate proximity estimation that affects ranging zones. updates via over-the-air (OTA) methods are recommended periodically to enhance stability, fix vulnerabilities, and incorporate protocol improvements.

Performance Characteristics

Power Consumption

iBeacon devices, built on (BLE), exhibit low overall power usage due to BLE's design for intermittent transmissions rather than continuous connections. During advertising bursts, transmission power peaks at 0.01-10 mW, depending on the configured output level, which typically ranges from -20 dBm to +10 dBm in BLE implementations, though iBeacon hardware often limits to +4 dBm (about 2.5 mW) for efficiency. The average power consumption, however, remains much lower at 0.001-0.1 mW (equivalent to 1-30 μA at 3V), influenced by the of these short bursts. Several factors determine the energy usage patterns in iBeacon hardware. The transmit (Tx) power level directly scales consumption, with higher settings increasing both peak draw and overall average. Advertisement frequency, set via the interval between broadcasts (e.g., 100 ms to 10 seconds), raises average power as intervals shorten, since more frequent transmissions extend active radio time. Environmental interference, such as or obstacles, can also elevate consumption by prompting retransmission retries to maintain signal reliability. Advancements in BLE versions (e.g., + with coded PHY) can further reduce power for equivalent performance in modern devices. In idle states between advertisements, iBeacon hardware enters deep sleep modes, contributing minimally to total draw—often under 1 μA at 3V. For practical metrics, a typical CR2032 coin cell battery (225-240 mAh capacity) sustains iBeacon operation for 1-5 years when advertising at 1 Hz with low Tx power (e.g., -12 dBm), assuming standard environmental conditions and no additional sensor activity.

Battery Life and Optimization

To extend the operational duration of iBeacon devices in deployments, several configuration strategies can be employed to minimize power draw while maintaining functionality. One key approach involves adjusting the advertising interval, the time between Bluetooth Low Energy (BLE) transmissions; setting longer intervals, such as 600 milliseconds or more, reduces the frequency of broadcasts and thereby conserves energy, achieving a balance between responsiveness and longevity in low-traffic environments. Another effective technique is duty cycling using integrated motion sensors, such as accelerometers, which allow the beacon to enter a low-power sleep mode when no movement is detected and resume advertising only upon sensing activity, significantly extending battery life in static installations like retail shelves. For fixed-location deployments, such as in museums or offices, utilizing external power sources eliminates battery dependency altogether; USB-powered iBeacons can be connected to standard outlets or adapters, providing indefinite operation without the need for replacements. Estimating battery life for battery-powered iBeacons relies on a straightforward that accounts for and consumption: operational hours = battery in milliampere-hours (mAh) divided by draw in milliamperes (mA). For instance, a typical CR2032 coin cell with 220 mAh , operating at an draw of 10 µA (0.01 mA) under optimized settings, yields approximately 22,000 hours, or about 2.5 years of continuous use. This formula assumes steady-state conditions and can be refined by measuring real-world current profiles during , , and phases. Advanced optimization techniques leverage firmware updates to enable adaptive power management based on environmental traffic. For example, some modern iBeacon firmware dynamically adjusts advertising rates or transmission power in response to detected device proximity or network load, reducing unnecessary broadcasts in quiet periods and extending life by 20-30% in variable-use scenarios like event venues. In 2025 deployments, hybrid power solutions combining solar panels with USB backups are increasingly adopted for outdoor or semi-permanent installations, such as smart city asset tracking, where small photovoltaic cells recharge lithium-ion batteries during daylight, achieving near-perpetual operation in sunny regions while fallback USB ports ensure reliability during low-light conditions.

Compatibility

Apple Ecosystem Support

iBeacon is natively supported within the Apple ecosystem through the Core Location framework, which enables developers to integrate beacon detection and proximity awareness into apps. Introduced with , the framework provides key APIs such as CLBeaconRegion for defining beacon regions and CLLocationManager for initiating monitoring and ranging operations to detect entry, exit, and relative distance to iBeacons. This functionality allows apps to trigger context-aware actions, like notifications or content delivery, based on a user's proximity to beacons without constant GPS reliance. Support extends to macOS starting from version 10.10 Yosemite, where the same Core Location APIs enable iBeacon monitoring and ranging on compatible hardware, facilitating desktop and laptop applications in environments like retail or enterprise settings. On , iBeacon detection is possible from watchOS 2.0 onward using the Core Bluetooth framework for low-level BLE scanning, enabling apps to detect nearby beacons, though without the high-level Core Location APIs for simplified monitoring and ranging. This supports features such as quick access to information during workouts or navigation. Apple devices with (BLE) hardware support iBeacon functionality, including models from the onward, from the 3rd generation, and Macs featuring BLE chips (typically from 2012 models like the with ). These devices handle background scanning efficiently to preserve battery life while providing seamless integration. As of 18 and 11 (2024), iBeacon support remains unchanged via Core Location on supported devices. To enhance user privacy, iOS 14 and later versions introduced granular permissions, including an option for users to allow only approximate access, which limits the of iBeacon ranging unless precise is explicitly granted by the user. This feature requires apps to request and justify to accurate data for beacon-related tasks, reducing the risk of unauthorized tracking.

Android and Cross-Platform Integration

Support for iBeacon on primarily relies on third-party libraries due to the absence of native comparable to those on , with the open-source Android Beacon Library (commonly known as AltBeacon) serving as the most widely adopted solution for scanning and ranging iBeacons. Released in 2014 and maintained on , AltBeacon enables applications to detect iBeacon advertisements by parsing (BLE) packets, supporting formats like iBeacon and Eddystone while providing for region monitoring and ranging similar to Apple's Core Location framework. iBeacon scanning on requires devices with Bluetooth 4.0 or later , as the operates over BLE, and apps must declare permissions including BLUETOOTH_SCAN, BLUETOOTH_CONNECT (for +), and ACCESS_FINE_LOCATION to access scan results, since BLE advertisements can indirectly reveal device location. Google's Nearby Messages API, introduced in 2016, initially provided a way to integrate iBeacon-like functionality by allowing apps to subscribe to beacon attachments via the Proximity Beacon API, but support for beacons was discontinued in 2021, shifting reliance to libraries like AltBeacon. Background scanning on Android faces significant challenges, particularly for power efficiency and OS restrictions; prior to Android 8.0 (Oreo), apps could use background services for continuous scanning but were still subject to battery-saving heuristics that could throttle operations, often requiring foreground services or periodic wake-ups to maintain detection. Starting from Android 6.0 (Marshmallow) with Doze mode and app standby, and with stricter policies in Android 8.0 (Oreo) and later—including Android 9 (Pie) and Android 10+—BLE scans in the background are limited. Scans are throttled to once every 15-30 minutes unless exempted via user-approved battery optimization or using a foreground service with persistent notifications, necessitating ACCESS_BACKGROUND_LOCATION permission (deprecated in Android 14) for reliable iBeacon detection when the app is not in focus. On Android 15 (2025), BLE permissions continue to evolve with enhanced privacy controls. Cross-platform integration of iBeacon has advanced through frameworks that abstract BLE scanning across and , enabling developers to build unified applications without platform-specific code. For , libraries such as react-native-ibeacon-manager and react-native-kontaktio provide iBeacon ranging, monitoring, and transmission capabilities, handling permissions and OS differences while supporting hybrid apps that leverage iBeacon for proximity-based features like indoor navigation. Similarly, Flutter plugins like flutter_beacon (version 0.5.1) and brux88_beacon (version 0.1.6) offer comprehensive iBeacon support, including background scanning, region entry/exit events, and beacon , with built-in permission for both platforms and compatibility up to API 34 and as of 2024 updates. These frameworks facilitate cross-OS deployment, though challenges persist in aligning background behaviors due to Android's evolving restrictions; emerging 2025 developments in smart beacon ecosystems incorporate AI-driven analytics for cross-platform , such as predictive proximity modeling, to enhance unified experiences in applications like .

Hardware Compatibility

iBeacon-compatible beacons are typically built on (BLE) hardware that adheres to the iBeacon protocol profile, which requires broadcasting standardized advertisement packets containing a UUID, identifier. Leading manufacturers such as Estimote produce beacons fully certified for iBeacon operation, enabling seamless integration for proximity detection. For instance, Estimote's Proximity and Location Beacons support iBeacon alongside other formats like Eddystone, ensuring broad compatibility while maintaining the required 100 ms advertising interval for optimal performance. Similarly, Kontakt.io offers a range of iBeacon-certified beacons, including the Anchor Beacon 2, which supports iBeacon transmission and is designed for robust deployment. Generic BLE modules, such as those based on CC2640 or nRF52 chipsets, can be programmed to emulate the iBeacon profile, providing cost-effective options for custom implementations when firmware-configured to match Apple's specification. Many iBeacon beacons incorporate environmental protections for versatile use, including IP-rated enclosures suitable for both indoor and outdoor environments. Kontakt.io's Tough Beacon achieves an , protecting against and jets, while their Beacon meets IP54 standards for splash resistance, allowing deployment in varied conditions like spaces or sites. Estimote beacons feature durable enclosures operable from 0°C to 60°C (32°F to 140°F), supporting outdoor applications without explicit certification in all models. These hardware choices emphasize standards compliance, with BLE 4.0 or higher ensuring reliable up to 70 meters in optimal conditions. Receiver devices for iBeacon must support BLE 4.0 or later to scan for and process iBeacon advertisements. Smartphones running 7.0 or later on devices like and newer, or 4.3 and above with BLE-enabled hardware, serve as primary receivers through native Core Location APIs on iOS or Nearby Messages on Android. IoT platforms, such as models equipped with a compatible BLE (e.g., those using CSR8510 ), can detect iBeacons via software libraries like BlueZ, enabling custom gateway setups for broader system integration. Wearables including the (watchOS 8+) and devices with BLE capabilities, such as the Versa series, can receive iBeacon signals for proximity-based features, though detection range may be limited compared to smartphones. As of 2025, iBeacon hardware trends focus on enhanced networking for scalability in large deployments. Mesh-enabled beacons, leveraging Bluetooth Mesh protocol alongside iBeacon advertisements, extend effective range by relaying signals between devices, achieving coverage beyond individual beacon limits in environments like warehouses or campuses. Additionally, BLE hardware in beacons can support the Matter standard for smart home integration when programmed with Matter's commissioning profile, separate from iBeacon advertisements, enabling use as setup tools for Matter-certified devices and unified control via platforms like Apple Home or Google Home.

Security and Privacy

Security Vulnerabilities

iBeacon transmissions are susceptible to spoofing attacks, where adversaries broadcast advertisement packets mimicking legitimate beacons by their UUID, major, and minor identifiers. This vulnerability arises because iBeacon relies on unencrypted (BLE) advertising channels that publicly expose these identifiers, allowing any BLE-capable device to capture and replicate them. In a demonstration at CES, researchers Alasdair Allan and Sandeep Mistry spoofed multiple iBeacons to remotely claim prizes by extracting identifiers from a decompiled app and rebroadcasting them, bypassing physical proximity requirements. A proof-of-concept implementation, SpotLight Parking, highlighted this risk by pairing iBeacon detection with a 4-digit code to enforce physical presence, underscoring the ease of spoofing without such measures. Further analysis shows that spoofing can enable beacon hijacking, where malicious apps register cloned identifiers to trigger unwanted actions or advertisements, or beacon silencing, where spoofed packets with inflated measured power values skew distance calculations and suppress legitimate signals. In 2025, a vulnerability in Espressif ESP32 chips (CVE-2025-27840), widely used in BLE beacon hardware, exposes 29 hidden Host Controller Interface (HCI) commands, including memory write capabilities. This could allow attackers to manipulate beacon firmware or behavior remotely, compromising iBeacon deployments that rely on such hardware and enabling escalated spoofing or DoS attacks. Relay attacks on iBeacon involve intercepting and forwarding BLE advertisement packets to extend the effective range beyond the intended short proximity, potentially enabling remote unauthorized tracking or actions. Attackers use intermediary devices, such as paired smartphones or dedicated hardware, to capture signals from a legitimate beacon and rebroadcast them at a distant location, tricking receiver devices into perceiving the source as nearby. This exploits the open nature of BLE advertising, where packets lack authentication to verify origin or distance. In BLE-based systems like iBeacon, such relays have been shown feasible with off-the-shelf components, allowing adversaries to amplify signals over hundreds of meters without modifying the protocol. Eavesdropping poses a significant to iBeacon due to the unencrypted transmission of identifiers in advertising packets, permitting passive by any nearby BLE receiver. Adversaries can use sniffing tools to capture UUIDs, values without alerting the beacon or its targets, facilitating subsequent attacks like spoofing or . This stems from BLE's design for low-power, connectionless broadcasts, where no is applied to the publicly accessible advertisement data. Denial-of-service (DoS) attacks on iBeacon can be executed through signal , where attackers flood the 2.4 GHz BLE bands with to disrupt advertisement packet reception. This overwhelms receivers, preventing detection of legitimate beacons and rendering proximity services unavailable within the jammed area. requires minimal resources, such as a simple transmitter, and can target iBeacon's specific channels (37, 38, 39) to maximize impact on low-power devices. Additionally, spoofing-based DoS variants, like flooding with excessive fake packets, can exhaust receiver resources or skew proximity estimates to silence real beacons.

Privacy Implications

iBeacon technology raises significant privacy concerns primarily through its potential for unauthorized user tracking. The persistent broadcasting of UUIDs in iBeacon signals, which are transmitted in clear text without , allows third parties to monitor device proximity to beacons over time, enabling the creation of detailed profiles across multiple applications. This cross-app occurs as apps detect the same fixed UUIDs and log interactions, potentially revealing user behaviors without explicit . Additionally, repeated entries into iBeacon-defined regions can compile histories, inferring patterns such as habits or movement routines, which adversaries can exploit to build comprehensive dossiers on individuals. Regulatory frameworks have addressed these risks by mandating consent for location-based data collection in iBeacon deployments. In the , the General Data Protection Regulation (GDPR) requires explicit user consent for processing personal data derived from beacons, including location information, with non-compliance leading to substantial fines. Similarly, in the United States, the (CCPA) grants consumers rights to of data sales and demands transparency in how beacon-collected data is used, affecting retailers and service providers relying on iBeacon for proximity marketing. Apple's 2021 App Tracking Transparency (ATT) framework further impacts iBeacon applications by requiring developers to obtain user permission before accessing the (IDFA), which is often used in conjunction with beacon data for personalized tracking across apps and devices. As of 2025, the integration of with iBeacon data has amplified these privacy implications, particularly in and care sectors, sparking debates on . In environments, algorithms analyze beacon-sourced foot traffic and interaction data to enable hyper-personalized , predicting consumer preferences and behaviors, but this raises concerns over invasive without adequate safeguards. In healthcare, -enhanced beacon networks facilitate patient and , yet the aggregation of location data with health metrics intensifies risks of unauthorized , prompting discussions on balancing with individual rights under evolving regulations. These developments underscore the need for robust anonymization techniques to mitigate surveillance-like outcomes in -driven applications.

Protection Measures

To mitigate risks such as spoofing in iBeacon deployments, techniques focus on obfuscating broadcast identifiers to prevent unauthorized and replay attacks. One effective method involves rotating UUIDs, where beacons periodically generate new identifiers using a and , ensuring that only authorized systems can decrypt and match them to the original . For instance, solutions like Estimote's Secure UUID rotate visible IDs every approximately 17 minutes, leveraging cloud-based decryption tied to app credentials for compatibility. Authentication protocols build on initial advertisement detection by transitioning to secure for . After an iBeacon signal triggers proximity detection, devices can establish a GATT in connected mode, employing challenge-response mechanisms to the beacon using pre-shared keys or dynamic challenges, such as SHA-256 hashing, before processing location data. This approach ensures that only legitimate beacons respond correctly, thwarting impersonation attempts. In emerging hybrid systems combining iBeacon with (UWB) technology, proximity is augmented by UWB's precise ranging (accurate to centimeters), which confirms physical and , adding a hardware-level check against remote spoofing. Best practices for iBeacon security emphasize operational controls to minimize attack surfaces. Limiting advertising power reduces the effective range of broadcasts, confining signals to intended areas and complicating long-distance spoofing. Backend data transmission should route through VPNs to encrypt communications between beacons, apps, and servers, safeguarding collected proximity logs from interception. Regular compliance audits, including firmware integrity checks and configuration reviews, ensure adherence to standards like those from the Bluetooth SIG, with frequent rotations of major and minor values (e.g., every minute) to maintain dynamic security.

Applications and Market

Industry Use Cases

In , iBeacon technology enables proximity by delivering location-based notifications to shoppers' devices when they approach specific areas, such as product shelves, allowing retailers to push personalized offers or product information. For instance, beacons placed near shelves can trigger alerts for discounts or complementary items, enhancing the in-store experience without requiring manual scanning. This approach relies on iBeacon's ranging capabilities to define proximity zones, such as immediate (under 0.5 meters) or near (0.5-2 meters), for targeted triggers. A notable early deployment occurred in 2015 when piloted iBeacons in 50 U.S. stores, integrating them with its to provide contextual deals, product recommendations, and guidance based on shoppers' locations within departments. The program aimed to streamline by alerting users to nearby promotions upon app opt-in, demonstrating iBeacon's potential for real-time engagement in large retail environments. In healthcare, iBeacons facilitate for medical equipment, such as wheelchairs, infusion pumps, and monitors, by attaching small beacons to items and using receiver networks to monitor their real-time locations within facilities. This reduces search times for staff, minimizes equipment loss, and optimizes , particularly in high-demand settings like hospitals. Post-2020 implementations have expanded to support patient flow management, where iBeacons guide patients through apps to waiting areas, exam rooms, or discharge points, improving throughput and reducing congestion during peak periods like surges in emergency visits. Beyond these sectors, iBeacons power interactive audio guides in museums, automatically playing contextual narratives or content when visitors approach exhibits via a companion app. For example, the Muzze platform, deployed at over 40 museums since 2015, uses iBeacons to deliver multilingual , increasing average visit durations to about 57 minutes per user. In transportation, particularly airports, iBeacons provide gate alerts by sending push notifications to passengers' devices about boarding times, gate changes, or delays, helping to prevent missed flights in complex terminal layouts. Deployments at facilities like in utilize over 700 iBeacons for such real-time updates integrated with airline apps. iBeacon adoption in includes , where networks of beacons enable apps to offer turn-by-turn directions to classrooms, libraries, or events, aiding new students and enhancing on large grounds. Similarly, in warehouses, iBeacons support inventory management by tracking and stock movements, alerting workers to low-stock zones or misplaced items to streamline picking and replenishment processes. The iBeacon technology, as part of the broader Bluetooth beacon market, has experienced significant since its introduction. The global smart beacon market, encompassing iBeacon implementations, was valued at $3.28 billion in 2020 and is projected to reach $103.94 billion by 2030, reflecting a (CAGR) of 37.70% driven by increasing demand for proximity-based services. As of 2025, the market is valued at USD 34.43 billion. In the United States, the iBeacon and Bluetooth beacon segment is anticipated to expand from $4.3 billion in 2024 to over $32 billion by 2032, with a CAGR of 28.37%, fueled by robust in and environments. Key trends shaping the market include the integration of (AI) with beacon systems to enable advanced analytics and personalized interactions, with over 30% of deployments incorporating AI by late 2023. Post-COVID-19 has accelerated in and sectors, where contactless technologies like iBeacons support enhanced and operational efficiency following the pandemic-induced slowdown in 2020. Recent developments as of include increased integration with and for improved real-time tracking in smart cities and logistics. However, barriers such as stringent regulations, including concerns over tracking, have tempered broader implementation, necessitating compliant solutions to mitigate risks. Adoption metrics indicate substantial deployment, with more than 15 million beacons, including iBeacon-compatible devices, expected to be operational worldwide by 2025. Leading players such as Apple, the originator of the iBeacon protocol, Estimote, and have driven this expansion through hardware innovations and ecosystem integrations.

Comparable Technologies

Eddystone Protocol

Eddystone is an open-source (BLE) beacon protocol developed by and released in July 2015 as a cross-platform alternative to proprietary formats. It defines a flexible message format for proximity beacons, enabling devices to broadcast data over short distances without requiring custom applications. Unlike single-purpose identifiers, Eddystone supports multiple types to accommodate diverse use cases, including unique identifiers () for app-based lookups, uniform resource locators () for direct web access, ephemeral identifiers () for secure tracking, and (TLM) for operational diagnostics like battery levels. This structure builds on the shared BLE foundation but extends it for broader . A key advantage of Eddystone lies in its platform-agnostic design, compatible with both and devices through standard BLE APIs, eliminating dependency on any single ecosystem such as Apple's. The EID frame enhances by using rotating, encrypted identifiers that can only be decrypted by authorized parties, reducing risks of unauthorized tracking compared to static IDs. Additionally, the URL frame allows beacons to trigger directly in browsers, promoting app-free interactions and simplifying deployment for developers. Eddystone gained prominence through its integration with Google's Physical Web project, launched in 2014 to extend web URLs to physical objects via BLE beacons, enabling seamless discovery of nearby services like parking or transit information. However, in December 2018, Google discontinued support for Physical Web and Eddystone-URL notifications in and due to low user adoption. The Eddystone protocol continues to be used in app-based proximity applications and proximity marketing implementations as of 2025. This utility underscores its role in fostering open proximity experiences.

Other Proximity Standards

Wi-Fi Round Trip Time (RTT), defined in the standard (also known as fine timing measurement or FTM protocol), enables precise indoor positioning by allowing devices to measure the time-of-flight of signals between themselves and nearby access points, achieving accuracies of 1-2 meters without requiring dedicated beacons. This contrasts with iBeacon's reliance on (BLE) for meter-scale proximity detection, as RTT leverages existing infrastructure for broader coverage in environments like offices or malls. Near Field Communication (NFC) operates as a short-range wireless technology at 13.56 MHz, facilitating between devices within 4 cm or less, making it ideal for contactless payments, , and tap-to-pair interactions. Unlike iBeacon's multi-meter range via BLE advertisements, NFC's limited proximity ensures higher security for transactions but restricts its use to intentional, close-range engagements. Ultra-Wideband (UWB) provides centimeter-level positioning accuracy through time-of-flight measurements across a wide frequency spectrum, powering technologies like Apple's introduced in 2020 for precise item tracking. UWB achieves 10-30 cm resolution, far surpassing iBeacon's BLE-based estimates, and supports applications in asset location and secure ranging. By 2025, hybrid BLE-UWB systems have emerged, using BLE for initial low-power proximity detection and UWB for fine-grained localization in scenarios like digital keys and indoor navigation. Other standards include , a low-power for networks that enables device-to-device communication over extended ranges via hopping, supporting proximity-aware applications in smart homes and industrial sensors. RFID, particularly passive UHF variants, facilitates by detecting tags within short ranges (up to a few meters) for automated stock tracking and asset identification in warehouses.

References

  1. [1]
    [PDF] Getting Started with iBeacon | Apple Developer
    Jun 2, 2014 · Getting Started with iBeacon Overview. Introduced in iOS 7, iBeacon is an exciting technology enabling new location awareness.
  2. [2]
    About privacy and Location Services in iOS, iPadOS, and watchOS
    Bluetooth interacts with iBeacons to provide a way to create and monitor areas that advertise certain identifying information. iOS and iPadOS devices ...
  3. [3]
    Turning an iOS device into an iBeacon device - Apple Developer
    Any iOS device that supports sharing data using Bluetooth low energy can be turned into an iBeacon. Apps that use their underlying iOS device as an iBeacon ...
  4. [4]
    What is Apple iBeacon? Here's what you need to know - ZDNET
    Jun 10, 2014 · iBeacon is Apple's implementation of Bluetooth low-energy (BLE) wireless technology to create a different way of providing location-based information and ...
  5. [5]
    iPhone 16 Pro Max - Tech Specs - Apple Support
    Precision dual-frequency GPS (GPS, GLONASS, Galileo, QZSS, BeiDou, and NavIC). Digital compass. Wi-Fi. Cellular. iBeacon microlocation. Video Calling12.<|control11|><|separator|>
  6. [6]
    iBeacon and Bluetooth Beacon Market Size & Forecast 2035
    Mar 21, 2025 · It will grow from USD 34.43 billion in 2025 to USD 225.40 billion by 2035, with a CAGR of 27.5% during the forecast period.
  7. [7]
    Region Monitoring and iBeacon - Apple Developer
    Mar 21, 2016 · Region Monitoring and iBeacon. The Core Location framework provides two ways to detect a user's entry and exit into specific regions: ...
  8. [8]
    iBeacon - Apple Developer
    iBeacon opens a world of possibilities for location awareness, and countless opportunities for interactivity between iOS devices and iBeacon hardware.
  9. [9]
    How iBeacon Technology Works: The In-depth Breakdown
    Oct 24, 2019 · It allows different mobile apps running on different Android and iOS devices to receive signals from this device in the physical world.
  10. [10]
    Core Location | Apple Developer Documentation
    Core Location provides services that determine a device's geographic location, altitude, and orientation, or its position relative to a nearby iBeacon device.CLLocationManager · Getting the current location of... · CLLocationMissing: software | Show results with:software
  11. [11]
    What is a Beacon? A Guide to Bluetooth Beacon Technology
    Oct 11, 2022 · On June 10th, 2013, Apple introduced iBeacon as part of iOS 7 at the World Wide Developer Conference (WWDC 2013). iBeacon is a protocol ...
  12. [12]
    Apple and MLB Collaborating on iBeacon-Infused App ... - MacRumors
    Sep 26, 2013 · iBeacon was announced as one of the new 1,500 APIs in iOS 7 during Apple's WWDC keynote. They're designed to use the Bluetooth Low Energy ...
  13. [13]
    Game over for NFC as Apple's iBeacon hits world's busiest retail store
    Dec 6, 2013 · Apple said iBeacon provides apps with “a whole new level of micro-location awareness, such as trail markers in a park, exhibits in a museum ...
  14. [14]
    How Apple's iBeacon Will Change Everything For Retail Analytics
    Oct 31, 2013 · iBeacon is expected to change the way consumers interact with products and salespeople in stores, and could even alter the role that brick-and-mortar stores ...
  15. [15]
    Why Apple's iBeacon Is Better Than NFC - Fast Company
    Sep 11, 2013 · The iBeacon system could also direct you to the right part of a store to find a particular product–acting as “indoor GPS” if you like. It's also ...Missing: motivations | Show results with:motivations
  16. [16]
    iOS 7's iBeacons could solve indoor mapping, make shopping better ...
    Sep 10, 2013 · iOS 7's iBeacons could solve indoor mapping, make shopping better, and kill NFC · Jeff Blagdon. Jeff Blagdon · Apple. Apple. Posts from this topic ...Missing: motivations positioning
  17. [17]
    Macy's becomes first retailer to implement iBeacon tech
    Nov 20, 2013 · “Shopkick deployed the first iBeacon/BLE-based presence signal at any major retailer on November 20, 2013. It is called shopBeacon and is ...Missing: 2014 | Show results with:2014
  18. [18]
    MLBAM completes initial iBeacon installations | MLB.com
    Feb 14, 2014 · MLBAM completes initial iBeacon installations. Dodger Stadium & Petco Park become the first two sports venues with iBeacon. February 14, 2014.Missing: commercial deployments 2013 Macy's
  19. [19]
    New AltBeacon Standard Allows Cross-Platform Proximity Apps
    Jul 28, 2014 · The Radius Networks team has released an update to the Android Beacon library, as well as tools and reference implementations to support ...
  20. [20]
    Backward Compatibility - Android Beacon Library
    Backward Compatibility. Although support for Bluetooth LE and iBeacons started with Android 4.3 (SDK 18), there is no reason you cannot use Radius Networks' ...Missing: 2014-2018 open- sourcing Altitude<|separator|>
  21. [21]
    iOS 13's new Bluetooth privacy feature is important—but confusing
    Aug 9, 2019 · A new permission alert in iOS 13 is supposed to protect you from snooping—if you can figure out what it's trying to tell you.Missing: enhancements | Show results with:enhancements
  22. [22]
    How to block Bluetooth tracking (Beacons) in iOS 13 on an iPhone
    Oct 8, 2019 · In this video I talk about the new Bluetooth Privacy feature in iOS 13. I show you how you can block and disable apps from tracking you via ...Missing: enhancements | Show results with:enhancements
  23. [23]
    Listening to bluetooth beacons for epidemic risk mitigation - PMC
    The ongoing COVID-19 pandemic let to efforts to develop and deploy digital contact tracing systems to expedite contact tracing and risk notification.
  24. [24]
    Beacon Technology: Helping To Combat the Spread of COVID-19 ...
    Jul 30, 2020 · However, beacon technology is displaying most effect on preventing the spread of COVID-19 virus with the help of contact tracing apps. Princy A.
  25. [25]
    How Apple and Google Are Enabling Covid-19 Contact-Tracing
    Apr 10, 2020 · The tech giants have teamed up to use a Bluetooth-based framework to keep track of the spread of infections without compromising location ...
  26. [26]
    ibeacon 2025-2033 Overview: Trends, Competitor Dynamics, and ...
    Rating 4.8 (1,980) Apr 25, 2025 · Key emerging trends include the integration of iBeacons with other location technologies, such as GPS and Wi-Fi, to improve location accuracy ...
  27. [27]
    iBeacon and Bluetooth Beacon Market Size Report 2032 - SNS Insider
    The U.S. iBeacon and Bluetooth Beacon Market is set to expand from nearly USD 4.3 billion in 2024 to over USD 32.0 billion by 2032, recording a 28.37% CAGR.
  28. [28]
    Part C Version History and Acknowledgments - Bluetooth
    1. 4.0. 2010-06-30. Updated to support Low Energy. and ATT and GATT over BR/EDR ...
  29. [29]
    [PDF] UG103.14: Bluetooth® LE Fundamentals - Silicon Labs
    The typical range for Bluetooth low energy radios is as follows: TX power. RX sensitivity. Antenna gain. Range. 0 dBm. -92 dBm. -5 dB. 160 meters. 10 dBm. -92 ...
  30. [30]
    [PDF] The Bluetooth® Low Energy Primer
    Mar 15, 2024 · Bluetooth Low Energy (LE) first materialized in version 4.0 of the Bluetooth Core Specification1. This was a new version of Bluetooth ...
  31. [31]
    Bluetooth Low Energy Beacon - Silicon Labs
    They can operate for years on a coin cell battery and are suited for sending small bits of data on an infrequent basis. ... There is no Bluetooth SIG official ...
  32. [32]
    BLE_iBeacon | Mbed
    Mar 31, 2014 · Company ID's are used to make beacon UUID's unique to companies. Some example company UUID's are: 0x004C - Apple Inc. 0x0059 - Nordic ...
  33. [33]
    Determining the proximity to an iBeacon device - Apple Developer
    An iBeacon is a device that emits a Bluetooth signal that can be detected by your devices. Companies can deploy iBeacon devices in environments where proximity ...
  34. [34]
    iBeacon packets - Knowledge Base - Kontakt.io
    Apr 27, 2023 · Advertising packets for the default Kontakt.io Beacon preset are transmitted every 350ms. iBeacon packets are broadcasted as a connectable ...Missing: hardware size
  35. [35]
    iBeacon packet structure - April Brother Wiki
    Dec 27, 2020 · UUID is 16 bytes long, Major and Minor are 2 bytes long. Together they form an ID for your iBeacon. Mobile devices recognize which Beacon they ...
  36. [36]
    What is iBeacon Specification - MOKOSmart
    Nov 30, 2019 · iBeacon is a Bluetooth advertising protocol. This protocol basically guides Bluetooth beacons that what data and in what format need to advertise.
  37. [37]
    Ranging for Beacons | Apple Developer Documentation
    This sample code project configures a device to act as a beacon, and configures a device to use ranging to find surrounding beacons.
  38. [38]
    startRangingBeacons(in:) | Apple Developer Documentation
    Instance Method startRangingBeacons(in:) Starts the delivery of notifications for the specified beacon region.Startrangingbeacons(in:) · Parameters · DiscussionMissing: API foreground
  39. [39]
    locationManager(_:didRangeBeacons:in:) - Apple Developer
    The location manager calls this method when a new set of beacons becomes available in the specified region or when a beacon goes out of range.Missing: frequency | Show results with:frequency
  40. [40]
    [PDF] Enhancing the Accuracy of iBeacons for Indoor Proximity-based ...
    Jan 29, 2017 · RSSI = −10 n log10(d/d0) + C. (1). Page 3. Once the path-loss model is obtained, it efficiently character- izes the behavior of RSSI at ...
  41. [41]
    proximity | Apple Developer Documentation
    The value in this property gives a general sense of the relative distance to the beacon. Use it to quickly identify beacons that are nearer to the user rather ...
  42. [42]
    Real-Time Indoor Positioning Approach Using iBeacons and ... - MDPI
    The positioning accuracy of the iBeacon-based method is RMSE 2.75 m. When the smartphone is held steadily, the fusion positioning tests result in RMSE of 2.39 ...
  43. [43]
    iBeacon: didRangeBeacons stops getting called, must reset device ...
    Apr 8, 2014 · Everything works great but every once in a while (1-2 days) beacon ranging will stop working and didRangeBeacons will never get called. The only ...How to reduce the time interval for didRangeBeacons methoddifference between didEnterRegion and didRangeBeaconsMore results from stackoverflow.com
  44. [44]
    B005 Bluetooth Beacon User Manual - Lansitec
    Oct 14, 2025 · Use the same way to configure minor, UUID, TX power, or other parameters. Please exit LightBlue after configuration. The light stops blinking ...
  45. [45]
    Choosing the Transmitted Power - BeaconZone
    All beacons allow you to adjust the transmitted power from, for example, -30dBm to +4dBm. dBm stands for Decibel-milliwatt, a unit used to measure radio ...
  46. [46]
    Technical Q&A QA1931: Using the correct Bluetooth LE Advertising ...
    Sep 26, 2017 · First, advertise at 20 ms intervals for at least 30 seconds. If not discovered after 30 seconds, you may change to one of the following longer ...
  47. [47]
    Choosing an Advertising Interval - BeaconZone
    At one end of the scale Apple recommend iBeacons transmit at 100ms. It the other end of the scale some beacons transmit, by default, every 1000ms and their ...
  48. [48]
    iBeacon tutorial - Part 2: Background monitoring - Estimote Developer
    Beacon geofences are also more responsive: “enter” events usually take up to a few seconds to trigger, “exit” events up to 30 seconds. (Regular geofences take “ ...Missing: signal strength thresholds
  49. [49]
    A Guide to Interacting with iBeacons in iOS using Swift - Atomic Spin
    Jan 31, 2017 · For your app to use iBeacons, users must allow it to access their location. You can prompt users for permission by adding keys to your Info.<|separator|>
  50. [50]
    Fundamentals of Beacon Ranging | RadiusNetworks.com - Flybuy
    Values of RSSI are measured in dBm, and a typical one meter calibration value for a beacon transmitter will be -59 dBm.
  51. [51]
    Beacon Firmware Upgrades - Kontakt.io
    It is generally a good idea to check for new firmware updates once a month. We are continuously finding ways to improve our Beacons / iBeacon – so each ...Missing: practices | Show results with:practices
  52. [52]
    Understanding the Impact of Settings on Bluetooth Beacon Battery Life
    Jan 31, 2024 · To optimise battery usage, it's essential to configure your beacon to only advertise the type of protocol(s) needed for your specific ...Missing: optimization strategies
  53. [53]
    6 tricks to lengthen the battery life of your beacons - Accent Systems
    In summary, battery life depends on several aspects: Advertising interval –> affects to signal stability, i.e. detection capacity by devices; Transmission Power ...Missing: CR2032 1Hz
  54. [54]
    Bluetooth Beacons – Comprehensive Guide - Kontakt.io
    This duty-cycling drastically reduces power consumption and extends battery life. What is the range of a low energy Bluetooth beacon? Typically 10–30 m ...1. Asset Tracking And... · 4. Indoor Navigation And... · Why Kontakt.Io Is The Right...
  55. [55]
    Setting Up Your Own Beacons - Building Applications with iBeacon ...
    The advantage of USB power is that power adapters are cheap and plentiful, and an iBeacon can be placed anywhere that USB power is available. It is a good test ...Missing: external | Show results with:external
  56. [56]
    Bluetooth BLE iBeacon (BC-U1-MultiBeacon) – USB powered
    In stock 30-day returnsOct 12, 2021 · Our newest USB-powered beacon makes battery life a non-issue. Broadcasts your choice of iBeacon, Eddystone TLM, Eddystone URL, and/or Eddystone UID format.Missing: solar | Show results with:solar
  57. [57]
    [PDF] AN92584 Designing for Low Power and Estimating Battery Life for ...
    Mar 26, 2015 · It also guides you on how to compute the current consumption and battery life for a BLE application and provides tips and tricks to minimize the ...
  58. [58]
    Bluetooth Low Energy (BLE) Battery Life Time Calculator
    BLE Battery Life Calculator Example: Scenario: A BLE beacon with a CR2032 coin cell battery (225 mAh) advertising once every second. INPUTS: Battery Capacity = ...<|separator|>
  59. [59]
    Solar iBeacon - Real-time Tracking & Monitoring Solutions
    4.3 332 A Solar iBeacon is a compact, energy-efficient wireless device that enables precise location tracking and proximity-based communication using Bluetooth ...
  60. [60]
    Beacon Configuration Strategy Guide – Transmission Power
    This is measured in dBm (decibel-milliwatts) and corresponds to a number rating (from 0 to 7) that you change via our Admin App (0 is least powerful – 7 is most ...
  61. [61]
    CLBeaconRegion | Apple Developer Documentation
    Overview. A CLBeaconRegion object defines a region that you use to detect Bluetooth beacons conforming to the iBeacon specification.
  62. [62]
    CLLocationManager | Apple Developer Documentation
    A CLLocationManager object is the central place to manage your app's location-related behaviors. Use a location-manager object to configure, start, and stop ...desiredAccuracy · CLLocationManagerDelegate · startUpdatingLocation()
  63. [63]
    watchOS 2 Transition Guide: Available System Technologies
    Feb 2, 2016 · Extensions built specifically for watchOS 2 have access to various system frameworks and technologies. ... Core Location Framework Reference.
  64. [64]
    Requesting authorization to use location services - Apple Developer
    Core Location supports two authorization levels: When in Use authorization makes location updates available only when someone uses your app. This authorization ...
  65. [65]
    Configuring your app to use location services - Apple Developer
    Detect nearby iBeacon hardware. Determine someone's proximity to Bluetooth devices. See Determining the proximity to an iBeacon device. See Also · Essentials.
  66. [66]
    AltBeacon/android-beacon-library - GitHub
    It allows Android devices to use beacons much like iOS devices do. An app can request to get notifications when one or more beacons appear or disappear.
  67. [67]
    Android Beacon Library
    The library can easily be configured to detect iBeacon, Eddystone and other beacon formats. By default, it detects beacons meeting the open AltBeacon ...
  68. [68]
    Bluetooth permissions | Connectivity - Android Developers
    If your app uses Bluetooth scan results to derive physical location, declare the ACCESS_FINE_LOCATION permission. Otherwise, you can strongly assert that your ...Declare permissions · Target Android 12 or higher · Target Android 11 or lower
  69. [69]
    iBeacon: all you need to know - ELA Innovation
    Feb 22, 2022 · iBeacon was introduced at Apple's developer conference in June 2013 to make Bluetooth Low Energy beacons interoperable with iOS. It went live ...
  70. [70]
    Get Beacon Messages | Nearby Messages API for Android
    The platform will shut down on April 1, 2021. After this shut down, beacons will no longer be supported within the Nearby Messages API. Your app can subscribe ...
  71. [71]
    Using a foreground service - Android Beacon Library
    The library may be configured to use a foreground service to scan for beacons. A foreground service is differs from regular Android background services in ...Why Would You Want This? · How Do I Set This Up? · How Do I Customize The...<|separator|>
  72. [72]
    Background Scanning of BLE Beacons on Android
    Jan 21, 2025 · Moreover, apps must declare the ACCESS_FINE_LOCATION or ACCESS_COARSE_LOCATION permissions for BLE scanning, and starting with Android 10, the ...<|separator|>
  73. [73]
    MacKentoch/react-native-ibeacons - GitHub
    react-native-ibeacons : add beacon technology in your React Native application for both iOS and Android. This repository is born to keep alive and up to ...
  74. [74]
    react-native-kontaktio - NPM
    Oct 21, 2022 · Cross-platform React Native module for detecting beacons with Android and iOS devices. Kontakt.io SDK Versions of newest release:
  75. [75]
    brux88_beacon | Flutter package - Pub.dev
    A robust Flutter plugin for handling BLE beacons (iBeacon, AltBeacon, Eddystone) with reliable background detection and monitoring capabilities. Features #.
  76. [76]
    Smart Beacon Market Size, Trends & Forecast 2025-2035
    Over the period from 2025 to 2035, the markets will gradually move towards AI ... AI-powered analytics, and cross-platform mobile engagement tools: BlueCats ...Challenges And Opportunities · Country-Wise Outlook · Segmentation OutlookMissing: processing | Show results with:processing
  77. [77]
    What is iBeacon? - Estimote Developer
    iBeacon is a Bluetooth advertising protocol (“packet”) designed by Apple. Apple's own introduction to iBeacon is available at developer.apple.com/ibeacon.
  78. [78]
    Technical specification of Estimote Beacons and Stickers
    Sep 13, 2017 · Below you'll find technical specification for Estimote Proximity Beacons, Location Beacons, Location Beacons with UWB and Stickers.
  79. [79]
    Anchor Beacon 2 - BLE Location Anchor - Kontakt.io
    In stockBeacon standards compatibility. iBeacon Yes; Eddystone Yes; Kontakt.io Secure Profile Yes; Telemetry Yes; Kontakt.io Location Yes. Warranty. 1 year ...Missing: Estimote modules
  80. [80]
    Developing Beacons with Bluetooth Low Energy - Silicon Labs
    Bluetooth low energy devices transmit advertising packets on a selectable interval as short as 20 milliseconds or as long as several minutes. The same packet is ...<|separator|>
  81. [81]
  82. [82]
    Tough Beacon technical specifications - Knowledge Base
    Apr 24, 2025 · IP 65. Mounting. 1 ... Related articles. Tough Beacon introduction · Kontakt.io Bluetooth Low Energy (BLE) devices and Wi-Fi coexistence ...Missing: rating | Show results with:rating
  83. [83]
    [PDF] Smart Beacon - Kontakt.io
    PC + ABS white or black. IP-54 safe - V0 flammability class. 1 mounting hole logo printed on front and casing's colour no. Environmental. Requirements.
  84. [84]
    Estimote UWB Tags
    ### Summary of Estimote Beacons' Compatibility, Hardware Features, and 2025 Trends
  85. [85]
    Can RaspberryPi with BLE Dongle detect iBeacons? - Stack Overflow
    Feb 12, 2014 · Yes! You can use your Raspberry Pi to scan for iBeacons. We've put together a script below that does this, you can also do it yourself with these steps.Receive BLE beacon with Raspberry PiRaspberry iBeacon not detectingMore results from stackoverflow.com
  86. [86]
    BeaconZone Blog – iBeacon, Eddystone, Bluetooth, IoT sensor ...
    ... devices such as the FitBit, Android Wear, Apple Watch and Bluetooth headphones. These devices are classed as Personal Electronic Devices (PED). The use of ...Missing: wearables | Show results with:wearables
  87. [87]
    The Matter Standard 2025 – Taking Stock | Development
    Feb 6, 2025 · Its mesh network reacts quickly, requires little energy and grows with the requirements. In contrast to long-established alternatives such as ...Missing: iBeacon trends beacons
  88. [88]
    [PDF] iBeacon Spoofing
    Dec 1, 2014 · The main vulnerability of iBeacon devices is the ability to “spoof” them using your own hardware and bypass their intended purpose. ...
  89. [89]
    [PDF] Breaking BLE Beacons For Fun But Mostly Profit - Fengwei Zhang
    Security in BLE Beacon systems is a heavily neglected topic in research community. The work in [20] was the first one to describe a vulnerability of the iBeacon ...
  90. [90]
    [PDF] A Survey of Security Vulnerabilities in Bluetooth Low Energy Beacons
    This report consolidates current investigations into the vulnerabilities of the iBeaconTM1 protocol and examines them alongside existing use cases that employ ...Missing: 2024-2025 | Show results with:2024-2025
  91. [91]
    Integration of Hardware Security Modules into BLE Beacons
    The use case of a secure and privacy-preserving geofencing application is presented. Abstract. Bluetooth Low Energy (BLE) is a wireless technology designed for ...
  92. [92]
    [PDF] Security and Privacy of Wireless Beacon Systems 1. Introduction
    This would make the original content service associated with the beacons unavailable, which is a kind of denial of service attack. In addition, by carefully ...
  93. [93]
    How to Use Beacon Marketing: A Guide for Modern Marketers
    May 19, 2025 · User Privacy Concerns & Regulations (GDPR, CCPA): Beacons collect location and device data, so brands must be transparent, get user consent ...
  94. [94]
    App Tracking Transparency | Apple Developer Documentation
    The AppTrackingTransparency framework presents an app-tracking authorization request to the user and provides the tracking authorization status.Missing: iBeacon GDPR CCPA
  95. [95]
    Secure iBeacon advertising with Estimote Secure UUID
    Secure UUID algorithms use the Beacon Key, together with a timestamp of the most recent rotation, to encrypt and decrypt Visible Beacon IDs. A beacon itself is ...Missing: 13 | Show results with:13
  96. [96]
    A Complete Guide on How to Improve Your BLE Beacon Security
    Oct 11, 2021 · Explore proven strategies to improve beacon security, preventing piggybacking and hijacking. Learn secure communication and software lock.Missing: measures | Show results with:measures
  97. [97]
    iBeacon Data Encryption (Advertising Mode) - Stack Overflow
    Jan 7, 2017 · @Luke: iBeacon allows 31 bytes of data, while 30 bytes are generally used (9(iBeacon prefix)/16(UUID)/2(MajorId)/2(MinorId)/1(TX Power)). kvirk.How to resolve 'init(proximityUUID:identifier:)' was deprecated in iOS ...Is it possible to dynamically set UUID on iBeacon app?More results from stackoverflow.com
  98. [98]
    [PDF] GATTACKING BLUETOOTH SMART DEVICES - Black Hat
    The most common features include secure authentication (mostly following challenge-response scheme), and data encryption. Usually, only hardware supported.
  99. [99]
    BlueUp releases the most powerful and flexible BLE beacon ...
    Jan 11, 2017 · Password is written with an encrypted protocol using challenge-response technique. This means the sniffing the password is not possible.Missing: authentication | Show results with:authentication
  100. [100]
    Indoor BLE Beacon Unlocking Growth Potential: Analysis and ...
    Rating 4.8 (1,980) Jul 5, 2025 · Development of hybrid beacon solutions: Combining BLE with other technologies like UWB to leverage the advantages of both. Integration of ...
  101. [101]
    iBeacon Security Part 2: Beacon Privacy and Security
    May 30, 2014 · While an iBeacon broadcasts identifiers publicly, an iPhone does not need to connect to an iBeacon-enabled beacon to get this information.
  102. [102]
    [PDF] BEACON LOCATION SECURITY AND ENCRYPTION
    How? - Use a non-deployer unique UUID. - Ensure Major And Minor schema is not decodable by 3rd parties (random). - Change major and minor frequently ...
  103. [103]
    Beacons in Retail: 7 Use Cases, Real-life Examples, Pay-offs
    May 4, 2023 · Data collected from beacons helps improve product listings and in-store layouts, prevent queues, increase coupon usage, enhance customer care, ...
  104. [104]
    Top 7 Real-World Use Cases for Beacon Technology Solutions
    Aug 8, 2025 · Asset Tracking in Warehouses and Hospitals. IoT asset beacons connect data on critical assets, equipment, and inventory in real time for ...
  105. [105]
    Leveraging Bluetooth Beacon Technology in Hospital Applications
    For example, patients can receive personalized messages or directions to specific areas within the hospital, such as registration desks, waiting areas, or ...
  106. [106]
    Museums Embrace Beacon-Based Audio Tours - RFID JOURNAL
    Aug 26, 2015 · Users can access audio tours for a multitude of museums from a single application, saving them the hassle of downloading a different app for ...
  107. [107]
    10 Use Cases of Bluetooth iBeacon in Airport - MOKOBlue
    iBeacon in airport connects with apps on smartphones to give passengers personalized airport information, including flight delays, gate changes, or updates on ...
  108. [108]
    Beacons in Education - BeaconZone
    The two main uses of beacons in education are the automatic checkin of students and providing educational content or instructions tied to areas or zones.
  109. [109]
    Beacons in Warehousing – Inventory Benefits - Kontakt.io
    How Bluetooth Beacons Are Improving Inventory & Warehouse Management · Leverage data to optimize use of space in warehouse inventory · Increased asset utilization.
  110. [110]
    Smart Beacon Market Size and Growth Analysis Report 2030
    The global smart beacon market size is expected to reach $103.94 billion by 2030 from $3.28 billion in 2020, growing at a CAGR of 37.70% from 2021 to 2030.
  111. [111]
    Bluetooth Beacon and iBeacon Market Size, Growth, Trends, 2033
    Sep 29, 2025 · According to the latest reports, more than 15 million Bluetooth Beacons are expected to be in operation worldwide by 2025, with several major ...
  112. [112]
    Beacon Market Size, Share, and Growth Analysis
    The Beacon Market value of $13.62 billion in 2024 will climb to $343.59 billion by 2032, CAGR 49.7%.
  113. [113]
    Bluetooth Beacon and iBeacon Market Forecast 2025-35
    With more installations at financial institutions and airports, beacon deployments are also expected to rise. The report provides a detailed overview of the ...
  114. [114]
    Smart Beacon Market size is expected to reach $103.94 billion by ...
    Dec 6, 2024 · Smart Beacon Market size is expected to reach $103.94 billion by 2030 | Cisco System, Estimote ... The North America region is expected to be the ...
  115. [115]
    Growing Eddystone with Ephemeral Identifiers: A Privacy Aware ...
    Apr 14, 2016 · Last July, we launched Eddystone, an open and extensible Bluetooth Low Energy (BLE) beacon format from Google, supported by Android, iOS, and ...
  116. [116]
    Specification for Eddystone, an open beacon format from Google
    Dec 29, 2022 · Eddystone is a protocol specification that defines a Bluetooth low energy (BLE) message format for proximity beacon messages.
  117. [117]
  118. [118]
    Eddystone™: discover Google's BLE protocol - ELA Innovation
    Jun 7, 2024 · Each beacon is configured with a unique identifier and can transmit different types of packets, including unique identifiers (UID), URLs (URL), ...
  119. [119]
    What is Eddystone Protocol and Specifications - MOKOSmart
    Nov 20, 2019 · Eddystone is a cross-platform, open-source beacon format presented by Google. It defines many different frame types as compared to other beacon standards.
  120. [120]
    The Physical Web - Google
    Explore the Physical Web in 3 easy steps. Get beacons. On supported Android devices, you can use Beacon Toy to transform your phone into an Eddystone beacon.
  121. [121]
    Eddystone URL, Physical Web & iBeacon apps for Proximity Marketing
    Jun 16, 2025 · Eddystone URL: Eddystone BLE Beacons work with the existing Google Chrome Widget or the Physical Web App. You don't need to build your own app.
  122. [122]
    The Physical Web: walk up and use anything - GitHub
    Dec 29, 2022 · The Physical Web is an effort to extend the superpower of the web - the URL - to everyday physical objects.
  123. [123]
    What is WiFi RTT (round-trip time) and How it Works - NetSpot
    Rating 4.8 (969) · Free · Mac OSThe purpose of Wi-Fi RTT is to allow devices to measure the distance to nearby Wi-Fi routers and determine their indoor location with a precision of 1-2 meters.
  124. [124]
    Wi-Fi RTT Ranging Performance Characterization and Positioning ...
    Jul 28, 2020 · The aim of this research is to implement a precise Wi-Fi indoor positioning system (IPS) or localization system based upon the IEEE 802.11mc<|separator|>
  125. [125]
    Near field communication (NFC) overview - Android Developers
    Nov 14, 2024 · Near Field Communication (NFC) is a set of short-range wireless technologies, typically requiring a distance of 4 cm or less to initiate a connection.NFC basics · Advanced NFC · Host-based Card EmulationMissing: proximity | Show results with:proximity
  126. [126]
    What is NFC and how do I use it? - Samsung
    NFC transmissions are short range (from a touch to a few centimetres) and require the devices to be in close proximity. NFC is the technology in contactless ...
  127. [127]
    Apple AirTags are about so much more than finding your keys | WIRED
    Apr 22, 2021 · Ultrawide band's distance accuracy can be measured in centimetres. While some call it GPS for the indoors, UWB's fidelity is far higher. GPS ...
  128. [128]
    [PDF] Unleashing the Potential of UWB: - FiRa Consortium
    Interest in and commercial use of UWB is growing due to its unique features that include centimeter-level accuracy of positioning and high data transfer rates.
  129. [129]
    Ultra-Wideband: The Next Innovation in Location-Based Services
    Jun 17, 2025 · Often, hybrid solutions are deployed that use Bluetooth Low Energy for low-power proximity detection, followed by UWB for high-precision tasks.
  130. [130]
    The Effectiveness of UWB-Based Indoor Positioning Systems ... - MDPI
    Jun 28, 2024 · Using two different wireless networks—BLE and UWB—creates an improved spatial awareness solution. The BLE part provides an energy-efficient ...
  131. [131]
    What is Zigbee? Learn About Zigbee Wireless Mesh Technology
    The Zigbee IoT protocol allows devices to communicate data seamlessly in a variety of network topologies using extremely limited power. Thanks to Zigbee, ...
  132. [132]
    What is RFID Inventory Management? | GS1 US
    RFID technology can track and manage inventory throughout the supply chain. RFID tags for inventory management can be attached to products or pallets.What Is Rfid For Inventory... · Real-Time Visibility · Operational Efficiencies
  133. [133]
    Can RFID Tags Be Used for Proximity Detection?
    Depending on the type of RFID system you chose, you might be able to put tags on several items and determine their locations within a room.