Geofencing: Definition, Types, and How It Works
Advertisement
This page provides an overview of geofencing, covering topics like its definition and how it functions. This guide will help you understand geofencing and how it can be implemented in various IoT security applications.
What is Geofencing?
A geofence is a virtual perimeter surrounding a physical location, configured using a service like Google Maps. This defined region is established to monitor the entry or exit of a person, child, or asset.
Geofence regions are often circular, but other polygon shapes can also be defined and used. When the defined entry/exit criteria are met, an action or notification, such as an SMS message, is generated and sent to registered mobile numbers. This entire process is known as geofencing. Geofences can be predefined sets of boundaries, such as school zones or neighborhood limits.
There are two primary types of geofencing: active and passive. Geofencing relies on technologies like GPS, cellular data, or WiFi to track devices against these defined geofences.
Active vs. Passive Geofencing
There are two main types of geofencing: active and passive.
-
Active Geofencing: In active geofencing, the user’s application is open on their mobile device. Because this application continuously uses GPS, it can drain the device’s battery more quickly.
-
Passive Geofencing: Passive geofencing doesn’t require the application to be constantly running; instead, it operates in the background. Moreover, passive geofencing generally avoids using GPS.
Both types have their specific applications. Passive geofencing is frequently used to collect customer data but isn’t suitable for directly pushing ads to the user’s mobile device.
Applications of Geofencing
Here are some common applications of geofencing:
- Event Management
- Logistics Management
- Tracking Competitors
- Store Automation
- Asset Management
- Human or Kid Tracking
How Geofencing Works
Let’s explore how geofencing actually functions:
- Geofence Definition: Geofences are initially marked on a map platform like Google Maps.
- Initial Position: The starting position of the user with the mobile phone or tracking device is recorded as a reference point.
- Position Updates: As the device moves, its new position is calculated using cellular data, WiFi, GPS, and Bluetooth beacons.
- Geofence Comparison: The software on the phone compares the updated position with the geofence parameters to determine if the user has entered or left the geofenced area.
- Action/Notification Trigger: The entry/exit event triggers a corresponding action or notification as defined by the system’s design.
Some geofence use cases don’t involve actions or notifications. Instead, they work in the background, collecting data from the shopper’s mobile device, such as the frequency of visits and time spent in specific areas of a mall. This data is invaluable for marketing purposes.
While the specific working details may vary slightly depending on the application, the core principles remain the same.
Conclusion
This guide on how geofencing works should assist in implementing geofencing in IoT security applications.