Preface |
|
vii | |
Editors |
|
xi | |
Contributors |
|
xiii | |
|
1 Positioning Technologies in Location-Based Services |
|
|
1 | (46) |
|
|
|
|
|
|
|
2 | (3) |
|
1.1.1 Overview of localization systems |
|
|
3 | (2) |
|
1.2 Geometric Principles for Location Estimation |
|
|
5 | (4) |
|
|
6 | (1) |
|
|
6 | (2) |
|
|
8 | (1) |
|
1.2.4 Comparison between trilateration, multilateration, and triangulation |
|
|
8 | (1) |
|
1.3 Main Localization Techniques |
|
|
9 | (12) |
|
|
9 | (1) |
|
1.3.1.1 Radiofrequency technologies |
|
|
10 | (2) |
|
|
12 | (1) |
|
1.3.1.3 Ultrasound technology |
|
|
13 | (1) |
|
1.3.1.4 Sounds technology |
|
|
14 | (1) |
|
1.3.2 Time difference of arrival |
|
|
14 | (1) |
|
1.3.3 Received signal strength indication |
|
|
15 | (2) |
|
1.3.3.1 Common localization technologies based on received signal strength indication fingerprinting |
|
|
17 | (1) |
|
1.3.3.2 Common localization technologies based on received signal strength indication with theoretical propagation models |
|
|
18 | (1) |
|
|
19 | (2) |
|
1.4 Other Localization Methods |
|
|
21 | (11) |
|
1.4.1 Inertial navigation systems |
|
|
21 | (1) |
|
1.4.2 Proximity-based methods |
|
|
22 | (1) |
|
1.4.2.1 Convex positioning |
|
|
22 | (1) |
|
|
23 | (1) |
|
1.4.2.3 Center of gravity of overlapping areas |
|
|
23 | (1) |
|
1.4.2.4 Probabilistic techniques |
|
|
24 | (1) |
|
1.4.2.5 Hop-count based methods |
|
|
24 | (1) |
|
1.4.2.6 Amorphous localization |
|
|
24 | (1) |
|
1.4.2.7 Main technologies using proximity for localization |
|
|
25 | (1) |
|
1.4.3 Environment-based localization techniques |
|
|
26 | (2) |
|
1.4.4 Multimode approach for localization |
|
|
28 | (1) |
|
|
28 | (1) |
|
1.4.4.2 Diversity of technologies |
|
|
29 | (1) |
|
1.4.4.3 Diversity of localization techniques |
|
|
29 | (1) |
|
1.4.4.4 Diversity of reference objects: Multiple neighboring terminals and cooperative localization |
|
|
30 | (2) |
|
1.5 Comparison and Outlook |
|
|
32 | (1) |
|
|
33 | (4) |
|
|
37 | (1) |
|
|
37 | (10) |
|
2 Wireless Location Technology in Location-Based Services |
|
|
47 | (20) |
|
|
|
|
48 | (1) |
|
2.2 Study on the Estimation of Position-Related Parameters (or Data Collection) |
|
|
49 | (7) |
|
|
50 | (1) |
|
|
51 | (1) |
|
2.2.3 Time difference of arrival |
|
|
52 | (1) |
|
|
53 | (2) |
|
2.2.5 Received signal strength |
|
|
55 | (1) |
|
2.3 Infrastructure of Positioning in Cellular Network |
|
|
56 | (3) |
|
2.3.1 Cellular network fundamentals |
|
|
57 | (1) |
|
2.3.2 Classification of positioning infrastructures |
|
|
58 | (1) |
|
2.3.2.1 Integrated and stand-alone infrastructures |
|
|
58 | (1) |
|
2.3.2.2 Network-based and terminal-based positioning |
|
|
58 | (1) |
|
2.3.2.3 Satellites, cellular, and indoor infrastructures |
|
|
59 | (1) |
|
|
59 | (3) |
|
2.4.1 Global positioning system solution |
|
|
60 | (1) |
|
2.4.2 Cell identification |
|
|
60 | (1) |
|
2.4.3 Problems and solutions in cellular network positioning |
|
|
60 | (1) |
|
2.4.3.1 Narrowband networks |
|
|
61 | (1) |
|
2.4.3.2 Code division multiple access |
|
|
61 | (1) |
|
2.4.3.3 Global system for mobile communications |
|
|
61 | (1) |
|
2.5 Precision and Accuracy |
|
|
62 | (2) |
|
2.5.1 Study of the multi-path promulgate |
|
|
63 | (1) |
|
2.5.2 Non-line-of-sight promulgate |
|
|
63 | (1) |
|
2.5.3 Code division multiple access multi-address access interference |
|
|
63 | (1) |
|
2.5.4 Other sources of positioning error |
|
|
64 | (1) |
|
|
64 | (1) |
|
|
64 | (3) |
|
3 Location in Wireless Local Area Networks |
|
|
67 | (24) |
|
|
|
|
|
68 | (2) |
|
3.2 Techniques Based on Cell Identity |
|
|
70 | (1) |
|
|
71 | (3) |
|
3.3.1 Matching algorithms |
|
|
72 | (1) |
|
3.3.2 Relevant approaches |
|
|
72 | (1) |
|
3.3.3 Performance characteristics |
|
|
73 | (1) |
|
|
73 | (1) |
|
3.4 Received Signal Strength Indicator-Based Ranging and Trilateration |
|
|
74 | (2) |
|
3.4.1 Received signal strength indicator-based ranging |
|
|
75 | (1) |
|
3.4.2 Performance characteristics |
|
|
76 | (1) |
|
3.5 Time of Arrival-Based Ranging/Trilateration |
|
|
76 | (3) |
|
3.5.1 Estimating time of arrival at the physical layer |
|
|
77 | (1) |
|
3.5.2 Estimating time of arrival at upper layers |
|
|
77 | (2) |
|
3.5.3 Performance characteristics |
|
|
79 | (1) |
|
3.6 Time Difference of Arrival |
|
|
79 | (2) |
|
|
80 | (1) |
|
3.6.2 Performance characteristics |
|
|
80 | (1) |
|
3.7 Angle of Arrival or Direction of Arrival |
|
|
81 | (2) |
|
|
81 | (1) |
|
3.7.2 Performance characteristics |
|
|
82 | (1) |
|
3.8 Assisted Global Positioning System |
|
|
83 | (1) |
|
|
84 | (1) |
|
3.10 Commercial Solutions |
|
|
85 | (2) |
|
3.10.1 Ekahau Real Time Location System |
|
|
85 | (1) |
|
3.10.2 Aeroscout Visibility System |
|
|
86 | (1) |
|
3.10.3 Skyhook Wireless Wi-Fi Positioning System |
|
|
86 | (1) |
|
|
87 | (4) |
|
4 Radio Frequency Identification Positioning |
|
|
91 | (18) |
|
|
|
|
91 | (2) |
|
4.2 RFID Tags as Location Reference Points |
|
|
93 | (1) |
|
4.3 Location Estimation Techniques |
|
|
94 | (2) |
|
|
96 | (2) |
|
4.5 Facilitating Deployment |
|
|
98 | (2) |
|
|
100 | (1) |
|
4.7 Real-World Deployment |
|
|
101 | (5) |
|
4.7.1 Prototype implementation |
|
|
101 | (1) |
|
4.7.2 Preliminary experiments |
|
|
102 | (2) |
|
|
104 | (2) |
|
|
106 | (1) |
|
|
106 | (3) |
|
5 Supporting Smart Mobile Navigation in a Smart Environment |
|
|
109 | (22) |
|
|
|
110 | (1) |
|
|
111 | (3) |
|
5.2.1 Location-based services in a smart environment |
|
|
112 | (1) |
|
5.2.2 Location-based services in Web 2.0 |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
114 | (2) |
|
|
114 | (1) |
|
5.3.2 Wireless infrastructure |
|
|
115 | (1) |
|
5.4 User Interaction and Annotation |
|
|
116 | (2) |
|
5.4.1 User-generated content |
|
|
117 | (1) |
|
5.4.2 Motivation and data quality of user-generated content |
|
|
118 | (1) |
|
5.5 Collective Intelligence-Based Route Calculation |
|
|
118 | (4) |
|
|
119 | (1) |
|
5.5.2 Collective intelligence-based route calculation |
|
|
119 | (1) |
|
5.5.2.1 Route calculation for mobile navigation |
|
|
120 | (1) |
|
5.5.2.2 Different kinds of best routes |
|
|
120 | (2) |
|
|
122 | (1) |
|
5.6 Context-Aware Adaptation on Software Architecture and Destination Selection |
|
|
122 | (4) |
|
5.6.1 Software architecture |
|
|
123 | (3) |
|
5.6.2 Destination selection |
|
|
126 | (1) |
|
5.7 Conclusions and Future Work |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
127 | (4) |
|
6 Indoor Location Determination: Environmental Impacts, Algorithm Robustness, and Performance Evaluation |
|
|
131 | (24) |
|
|
|
132 | (2) |
|
6.2 Signal Strength Distortion Model |
|
|
134 | (1) |
|
6.3 Dynamic Localization Mechanisms |
|
|
135 | (5) |
|
6.3.1 Signal-location map |
|
|
135 | (1) |
|
6.3.2 Indoor radio propagation modeling |
|
|
136 | (1) |
|
6.3.3 Signal distance mapping |
|
|
137 | (1) |
|
|
138 | (1) |
|
6.3.5 Distance-based location search |
|
|
139 | (1) |
|
6.4 Simulations and System Comparison |
|
|
140 | (10) |
|
6.4.1 Testing environments |
|
|
140 | (2) |
|
6.4.2 Experimental strategy |
|
|
142 | (1) |
|
6.4.3 Simulations results |
|
|
142 | (1) |
|
6.4.3.1 Distance estimation |
|
|
143 | (1) |
|
6.4.3.2 Localization results |
|
|
143 | (1) |
|
6.4.4 Dependence on number of deployed sniffers and reference measurements |
|
|
144 | (1) |
|
6.4.4.1 Number of deployed sniffers |
|
|
144 | (2) |
|
6.4.4.2 Dependence on the number of reference measurements |
|
|
146 | (1) |
|
6.4.5 Robustness to signal strength distortion and security attacks |
|
|
147 | (2) |
|
6.4.6 Computation efficiency and scalability |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
151 | (1) |
|
|
151 | (4) |
|
7 Location-Aware Access Control: Scenarios, Modeling Approaches, and Selected Issues |
|
|
155 | (34) |
|
|
|
155 | (2) |
|
7.2 Application Scenarios |
|
|
157 | (3) |
|
7.3 Basics of Access Control |
|
|
160 | (4) |
|
7.3.1 Discretionary access control |
|
|
161 | (1) |
|
7.3.2 Role-based access control |
|
|
162 | (1) |
|
7.3.3 Mandatory access control |
|
|
163 | (1) |
|
7.4 Generic Location-Aware Access Control Models |
|
|
164 | (6) |
|
7.4.1 Role-based access control |
|
|
165 | (3) |
|
7.4.2 Discretionary access control |
|
|
168 | (1) |
|
7.4.3 Mandatory access control |
|
|
169 | (1) |
|
7.5 Application-Specific Location-Aware Access Control Models |
|
|
170 | (5) |
|
7.5.1 Process-aware access control |
|
|
170 | (2) |
|
7.5.2 Access control for database systems |
|
|
172 | (3) |
|
7.6 Prevention of Location Spoofing |
|
|
175 | (4) |
|
7.7 Miscellaneous Aspects |
|
|
179 | (3) |
|
7.7.1 Access control for geospatial data |
|
|
179 | (1) |
|
7.7.2 Access control for location privacy |
|
|
180 | (1) |
|
7.7.3 Proximity-based access control with radio frequency identification technology |
|
|
181 | (1) |
|
|
182 | (1) |
|
|
183 | (6) |
|
8 Location-Based Services and Privacy |
|
|
189 | (18) |
|
|
8.1 Location-based Services |
|
|
190 | (1) |
|
|
191 | (2) |
|
8.2.1 Global positioning system |
|
|
191 | (1) |
|
|
192 | (1) |
|
8.2.3 Satellites system limits |
|
|
192 | (1) |
|
8.3 Positioning in Wi-Fi Networks |
|
|
193 | (1) |
|
|
194 | (1) |
|
8.4 Cellular Positioning Techniques |
|
|
194 | (6) |
|
|
194 | (1) |
|
8.4.2 Assisted-global navigation satellite system |
|
|
195 | (1) |
|
|
195 | (1) |
|
8.4.4 Observed time difference |
|
|
196 | (1) |
|
8.4.5 Uplink time difference of arrival |
|
|
196 | (1) |
|
8.4.6 Architecture of location service in cellular networks |
|
|
197 | (1) |
|
|
197 | (1) |
|
8.4.6.2 Location service architecture in cellular networks |
|
|
198 | (1) |
|
8.4.6.3 Added functionalities in existing nodes |
|
|
198 | (2) |
|
8.5 Location Information Threats |
|
|
200 | (1) |
|
8.6 Location Privacy Policy |
|
|
201 | (4) |
|
|
201 | (1) |
|
8.6.2 Privacy in location-based services |
|
|
202 | (1) |
|
8.6.3 Privacy enforcement in cellular networks |
|
|
203 | (1) |
|
8.6.4 Shortcomings of privacy protection in cellular networks |
|
|
204 | (1) |
|
8.6.5 Service provider access to location information |
|
|
204 | (1) |
|
8.6.6 Privacy enhancement for location service in cellular networks |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
9 Protecting Privacy in Location-Based Applications |
|
|
207 | (26) |
|
|
|
|
|
208 | (1) |
|
9.2 Selecting a Location System to Support Privacy |
|
|
209 | (1) |
|
9.3 Cloaking to Protect Online Privacy |
|
|
209 | (11) |
|
9.3.1 Previous work in online location privacy |
|
|
210 | (1) |
|
9.3.2 Mathematical foundation of cloaking |
|
|
211 | (1) |
|
|
212 | (1) |
|
|
213 | (1) |
|
|
213 | (1) |
|
9.3.3.3 Geodetic resolution |
|
|
213 | (2) |
|
|
215 | (2) |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
|
219 | (1) |
|
9.4 Problems with Corporate Tracking |
|
|
220 | (1) |
|
9.5 Protecting Privacy by Using Prediction |
|
|
221 | (8) |
|
9.5.1 Location determination |
|
|
221 | (1) |
|
9.5.1.1 Symbolic location |
|
|
222 | (1) |
|
9.5.2 Related work in location prediction |
|
|
222 | (1) |
|
|
222 | (1) |
|
9.5.2.2 Using the global positioning system to determine significant locations |
|
|
223 | (1) |
|
9.5.2.3 Dartmouth College mobility predictions |
|
|
223 | (1) |
|
9.5.2.4 Predicting future times of availability |
|
|
224 | (1) |
|
9.5.3 Prediction based on text compression |
|
|
224 | (1) |
|
9.5.3.1 Prediction by partial match |
|
|
225 | (1) |
|
9.5.4 An experiment in prediction |
|
|
226 | (1) |
|
9.5.4.1 Location determination |
|
|
226 | (1) |
|
|
227 | (1) |
|
9.5.4.3 Protecting privacy during the prediction process |
|
|
228 | (1) |
|
|
229 | (1) |
|
|
229 | (4) |
|
10 Presence Services for the Support of Location-Based Applications |
|
|
233 | (28) |
|
|
|
|
|
234 | (2) |
|
10.2 Presence-Based LBS Infrastructures: Background and Open Issues |
|
|
236 | (10) |
|
|
236 | (1) |
|
|
237 | (2) |
|
|
239 | (2) |
|
|
241 | (2) |
|
|
243 | (3) |
|
10.3 State-of-the-Art of Management Solutions for IMS PS Scalability |
|
|
246 | (3) |
|
|
247 | (1) |
|
10.3.2 Intra-domain scope |
|
|
247 | (1) |
|
10.3.3 Inter-domain scope |
|
|
248 | (1) |
|
10.3.4 State-of-the-art summary |
|
|
249 | (1) |
|
10.4 IHMAS for IMS PS Scalability |
|
|
249 | (4) |
|
10.4.1 Design guidelines and architectural model for enhanced scalability of IMS PS |
|
|
250 | (1) |
|
10.4.1.1 Filtering criteria and session state management |
|
|
250 | (1) |
|
10.4.1.2 Intra-domain dynamic load balancing and data-centric sessions |
|
|
250 | (1) |
|
10.4.1.3 Service-aware static balancing to partition intra-domain load |
|
|
251 | (1) |
|
10.4.1.4 Inter-domain transmission optimizations |
|
|
251 | (1) |
|
10.4.2 IHMAS load-balancing solutions |
|
|
252 | (1) |
|
10.5 Presence-Based Infrastructures for LBS Support: Next Steps |
|
|
253 | (3) |
|
10.5.1 Real-time monitoring of IMS infrastructure |
|
|
254 | (1) |
|
10.5.2 Virtualized PSs for scalable composition of presence information |
|
|
254 | (1) |
|
10.5.3 Presence-based location data dissemination for emergency applications |
|
|
255 | (1) |
|
10.5.4 Dynamic load balancing and PS deployment over the Cloud |
|
|
256 | (1) |
|
|
256 | (1) |
|
|
257 | (4) |
|
11 Data-Flow Management for Location-Based Service Applications Using the Zoning Concept |
|
|
261 | (18) |
|
|
|
|
261 | (2) |
|
11.2 Static Zone-Based Update Mechanism |
|
|
263 | (8) |
|
11.2.1 Evaluation and testing |
|
|
264 | (3) |
|
11.2.1.1 Measuring the downloading time |
|
|
267 | (1) |
|
11.2.1.2 Measuring the average throughput |
|
|
267 | (2) |
|
11.2.1.3 Measuring the packet loss |
|
|
269 | (1) |
|
11.2.1.4 Database server evaluation |
|
|
269 | (2) |
|
11.3 Dynamic Zone-Based Update Mechanism |
|
|
271 | (5) |
|
11.3.1 Evaluation and testing |
|
|
274 | (1) |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
277 | (2) |
|
12 Assisted Global Navigation Satellite Systems: An Enabling Technology for High Demanding Location-Based Services |
|
|
279 | (20) |
|
|
|
|
279 | (2) |
|
12.2 Assisted Global Positioning System and the Open Mobile Alliance-Secure User Plane Location Approach |
|
|
281 | (4) |
|
12.2.1 Overview on the secure user plane location architecture |
|
|
283 | (1) |
|
12.2.2 Procedures for positioning |
|
|
283 | (1) |
|
12.2.3 Mobile originated trellis |
|
|
284 | (1) |
|
12.3 Infrastructure for Practical Tests |
|
|
285 | (4) |
|
12.3.1 SAT-SURF & SAT-SURFER |
|
|
285 | (1) |
|
12.3.1.1 SAT-SURF hardware platform |
|
|
286 | (1) |
|
12.3.1.2 SAT-SURFER software suite |
|
|
286 | (3) |
|
12.4 Trials and Parameters under Test |
|
|
289 | (8) |
|
|
297 | (1) |
|
|
298 | (1) |
Index |
|
299 | |