Bluetooth Low Energy (BLE) Beacon Monitoring (Detection, Location, and Reporting)

June 5, 2015 - 2 Comments

One of the most captivating technology use cases to emerge in recent time is the use of Bluetooth Low Energy (BLE) devices (also see Bluetooth Smart™), distributed in a venue, to provide proximity services advertisement and discovery. The best known instantiation of BLE is the Apple iBeacon (although as a branded technology, this is literally a subset of the broader category of devices available).

A very interesting ramification of deploying these devices is how to manage and inventory them. How does a venue prevent these from being moved? Or stolen? Or having additional devices added (either as pranks or for malicious intent)?

The answer to these questions is that it is nearly impossible to prevent – therefore the next best thing, which is still pretty good, is to provide the ability for monitoring the BLE devices.

But Cisco did one better. We figured out how to do this with our existing products and we’re showcasing this in software release 8.1.

As an extension to the existing ability of CleanAir to monitor, detect, locate, and report on Bluetooth devices as interferers, this new feature enables a venue owner to both prevent the illicit deployment of BLE devices and provide asset tracking for legitimately deployed BLE devices.

The breakdown of the entire feature is tabulated below.


In summary, Cisco can demonstrate that CleanAir can monitor, detect, locate, and report on BLE devices that are “authorized” (i.e., part of a white list) and “unauthorized” (i.e., not part of a white list)

The objective is to show all BLE devices on a single map. On that single map, distinguish between categories/subcategories of:

  1. known (authorized, legitimate)
  2. missing (authorized, legitimate)
  3. moved (authorized, legitimate)
  4. unknown/rogue (unauthorized, illegitimate)

and to display each category/subcategory as a layer on the map

Conclusion: As the premiere WLAN infrastructure equipment provider, Cisco provides the ability for existing APs to detect BLE devices acting as proximity services beacons. This includes monitoring, detection, location, and reporting of so-called “rogue” proximity services beacons (i.e., BLE devices that have been deployed without the permission of the venue owner and possibly for malicious purposes) in addition to asset tracking of legitimate BLE devices (includes alerting of missing/moved BLE devices).


Please feel free to comment, share and connect with us on Facebook, Google+ and @Cisco_Mobility!

In an effort to keep conversations fresh, Cisco Blogs closes comments after 60 days. Please visit the Cisco Blogs hub page for the latest content.


  1. Great article, I am just starting to Blog as well and wrote a post when Facebook made these available for all businesses to apply for free. Facebook Beacon is designed to create more engagement for businesses. Keep up the good work, here is my article if you get a chance to check it out, This literally just came out this week so I’m one of the first to write about it and I included a link where anyone can apply for a free Bluetooth Beacon from Facebook.

  2. Very interesting