Update cookies preferences

E-book: Location-Based Services Handbook: Applications, Technologies, and Security

Edited by (Microsoft Corporation, Bellevue, Washington, USA), Edited by (Florida Atlantic University, Boca Raton, USA)
  • Format: 327 pages
  • Pub. Date: 03-Sep-2018
  • Publisher: CRC Press Inc
  • Language: eng
  • ISBN-13: 9781498785525
Other books in subject:
  • Format - EPUB+DRM
  • Price: 87,09 €*
  • * the price is final i.e. no additional discount will apply
  • Add to basket
  • Add to Wishlist
  • This ebook is for personal use only. E-Books are non-refundable.
  • Format: 327 pages
  • Pub. Date: 03-Sep-2018
  • Publisher: CRC Press Inc
  • Language: eng
  • ISBN-13: 9781498785525
Other books in subject:

DRM restrictions

  • Copying (copy/paste):

    not allowed

  • Printing:

    not allowed

  • Usage:

    Digital Rights Management (DRM)
    The publisher has supplied this book in encrypted form, which means that you need to install free software in order to unlock and read it.  To read this e-book you have to create Adobe ID More info here. Ebook can be read and downloaded up to 6 devices (single user with the same Adobe ID).

    Required software
    To read this ebook on a mobile device (phone or tablet) you'll need to install this free app: PocketBook Reader (iOS / Android)

    To download and read this eBook on a PC or Mac you need Adobe Digital Editions (This is a free app specially developed for eBooks. It's not the same as Adobe Reader, which you probably already have on your computer.)

    You can't read this ebook with Amazon Kindle

Location-Based Services Handbook: Applications, Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of technologies for positioning and localizing, including range- and proximity-based localization methods, and environment-based location estimation methods. Featuring valuable contributions from field experts around the world, this book addresses existing and future directions of LBS technology, exploring how it can be used to optimize resource allocation and improve cooperation in wireless networks.

It is a self-contained, comprehensive resource that presents:











A detailed description of the wireless location positioning technology used in LBS Coverage of the privacy and protection procedure for cellular networksand its shortcomings An assessment of threats presented when location information is divulged to unauthorized parties Important IP Multimedia Subsystem and IMS-based presence service proposals

The demand for navigation services is predicted to rise by a combined annual growth rate of more than 104 percent between 2008 and 2012, and many of these applications require efficient and highly scalable system architecture and system services to support dissemination of location-dependent resources and information to a large and growing number of mobile users.

This book offers tools to aid in determining the optimal distance measurement system for a given situation by assessing factors including complexity, accuracy, and environment. It provides an extensive survey of existing literature and proposes a novel, widely applicable, and highly scalable architecture solution. Organized into three major sectionsapplications, technologies, and securitythis material fully covers various location-based applications and the impact they will have on the future.
Preface vii
Editors xi
Contributors xiii
1 Positioning Technologies in Location-Based Services
1(46)
Eladio Martin
Ling Liu
Michael Covington
Peter Pesti
Matthew Weber
1.1 Introduction
2(3)
1.1.1 Overview of localization systems
3(2)
1.2 Geometric Principles for Location Estimation
5(4)
1.2.1 Trilateration
6(1)
1.2.2 Multilateration
6(2)
1.2.3 Triangulation
8(1)
1.2.4 Comparison between trilateration, multilateration, and triangulation
8(1)
1.3 Main Localization Techniques
9(12)
1.3.1 Time of arrival
9(1)
1.3.1.1 Radiofrequency technologies
10(2)
1.3.1.2 Laser technology
12(1)
1.3.1.3 Ultrasound technology
13(1)
1.3.1.4 Sounds technology
14(1)
1.3.2 Time difference of arrival
14(1)
1.3.3 Received signal strength indication
15(2)
1.3.3.1 Common localization technologies based on received signal strength indication fingerprinting
17(1)
1.3.3.2 Common localization technologies based on received signal strength indication with theoretical propagation models
18(1)
1.3.4 Angle of arrival
19(2)
1.4 Other Localization Methods
21(11)
1.4.1 Inertial navigation systems
21(1)
1.4.2 Proximity-based methods
22(1)
1.4.2.1 Convex positioning
22(1)
1.4.2.2 Centroid
23(1)
1.4.2.3 Center of gravity of overlapping areas
23(1)
1.4.2.4 Probabilistic techniques
24(1)
1.4.2.5 Hop-count based methods
24(1)
1.4.2.6 Amorphous localization
24(1)
1.4.2.7 Main technologies using proximity for localization
25(1)
1.4.3 Environment-based localization techniques
26(2)
1.4.4 Multimode approach for localization
28(1)
1.4.4.1 Introduction
28(1)
1.4.4.2 Diversity of technologies
29(1)
1.4.4.3 Diversity of localization techniques
29(1)
1.4.4.4 Diversity of reference objects: Multiple neighboring terminals and cooperative localization
30(2)
1.5 Comparison and Outlook
32(1)
1.6 Conclusions
33(4)
Acknowledgments
37(1)
References
37(10)
2 Wireless Location Technology in Location-Based Services
47(20)
Junhui Zhao
Xuexue Zhang
2.1 Introduction
48(1)
2.2 Study on the Estimation of Position-Related Parameters (or Data Collection)
49(7)
2.2.1 Cell of origin
50(1)
2.2.2 Time of arrival
51(1)
2.2.3 Time difference of arrival
52(1)
2.2.4 Angle of arrival
53(2)
2.2.5 Received signal strength
55(1)
2.3 Infrastructure of Positioning in Cellular Network
56(3)
2.3.1 Cellular network fundamentals
57(1)
2.3.2 Classification of positioning infrastructures
58(1)
2.3.2.1 Integrated and stand-alone infrastructures
58(1)
2.3.2.2 Network-based and terminal-based positioning
58(1)
2.3.2.3 Satellites, cellular, and indoor infrastructures
59(1)
2.4 Cellular Networks
59(3)
2.4.1 Global positioning system solution
60(1)
2.4.2 Cell identification
60(1)
2.4.3 Problems and solutions in cellular network positioning
60(1)
2.4.3.1 Narrowband networks
61(1)
2.4.3.2 Code division multiple access
61(1)
2.4.3.3 Global system for mobile communications
61(1)
2.5 Precision and Accuracy
62(2)
2.5.1 Study of the multi-path promulgate
63(1)
2.5.2 Non-line-of-sight promulgate
63(1)
2.5.3 Code division multiple access multi-address access interference
63(1)
2.5.4 Other sources of positioning error
64(1)
2.6 Conclusion
64(1)
References
64(3)
3 Location in Wireless Local Area Networks
67(24)
Marc Ciurana
Israel Martin-Escalona
Francisco Barcelo-Arroyo
3.1 Introduction
68(2)
3.2 Techniques Based on Cell Identity
70(1)
3.3 Fingerprinting
71(3)
3.3.1 Matching algorithms
72(1)
3.3.2 Relevant approaches
72(1)
3.3.3 Performance characteristics
73(1)
3.3.4 Current trends
73(1)
3.4 Received Signal Strength Indicator-Based Ranging and Trilateration
74(2)
3.4.1 Received signal strength indicator-based ranging
75(1)
3.4.2 Performance characteristics
76(1)
3.5 Time of Arrival-Based Ranging/Trilateration
76(3)
3.5.1 Estimating time of arrival at the physical layer
77(1)
3.5.2 Estimating time of arrival at upper layers
77(2)
3.5.3 Performance characteristics
79(1)
3.6 Time Difference of Arrival
79(2)
3.6.1 Relevant proposals
80(1)
3.6.2 Performance characteristics
80(1)
3.7 Angle of Arrival or Direction of Arrival
81(2)
3.7.1 Relevant proposals
81(1)
3.7.2 Performance characteristics
82(1)
3.8 Assisted Global Positioning System
83(1)
3.9 Discussion
84(1)
3.10 Commercial Solutions
85(2)
3.10.1 Ekahau Real Time Location System
85(1)
3.10.2 Aeroscout Visibility System
86(1)
3.10.3 Skyhook Wireless Wi-Fi Positioning System
86(1)
References
87(4)
4 Radio Frequency Identification Positioning
91(18)
Kaoru Sezaki
Shinichi Konomi
4.1 Introduction
91(2)
4.2 RFID Tags as Location Reference Points
93(1)
4.3 Location Estimation Techniques
94(2)
4.4 Applications
96(2)
4.5 Facilitating Deployment
98(2)
4.6 Security and Privacy
100(1)
4.7 Real-World Deployment
101(5)
4.7.1 Prototype implementation
101(1)
4.7.2 Preliminary experiments
102(2)
4.7.3 Field experiment
104(2)
4.8 Conclusion
106(1)
References
106(3)
5 Supporting Smart Mobile Navigation in a Smart Environment
109(22)
Haosheng Huang
5.1 Introduction
110(1)
5.2 Related Work
111(3)
5.2.1 Location-based services in a smart environment
112(1)
5.2.2 Location-based services in Web 2.0
112(1)
5.2.3 Mobile navigation
113(1)
5.3 Smart Environment
114(2)
5.3.1 Indoor positioning
114(1)
5.3.2 Wireless infrastructure
115(1)
5.4 User Interaction and Annotation
116(2)
5.4.1 User-generated content
117(1)
5.4.2 Motivation and data quality of user-generated content
118(1)
5.5 Collective Intelligence-Based Route Calculation
118(4)
5.5.1 Data modeling
119(1)
5.5.2 Collective intelligence-based route calculation
119(1)
5.5.2.1 Route calculation for mobile navigation
120(1)
5.5.2.2 Different kinds of best routes
120(2)
5.5.3 Discussion
122(1)
5.6 Context-Aware Adaptation on Software Architecture and Destination Selection
122(4)
5.6.1 Software architecture
123(3)
5.6.2 Destination selection
126(1)
5.7 Conclusions and Future Work
126(1)
Acknowledgment
127(1)
References
127(4)
6 Indoor Location Determination: Environmental Impacts, Algorithm Robustness, and Performance Evaluation
131(24)
Yiming Ji
6.1 Introduction
132(2)
6.2 Signal Strength Distortion Model
134(1)
6.3 Dynamic Localization Mechanisms
135(5)
6.3.1 Signal-location map
135(1)
6.3.2 Indoor radio propagation modeling
136(1)
6.3.3 Signal distance mapping
137(1)
6.3.4 Distance fitting
138(1)
6.3.5 Distance-based location search
139(1)
6.4 Simulations and System Comparison
140(10)
6.4.1 Testing environments
140(2)
6.4.2 Experimental strategy
142(1)
6.4.3 Simulations results
142(1)
6.4.3.1 Distance estimation
143(1)
6.4.3.2 Localization results
143(1)
6.4.4 Dependence on number of deployed sniffers and reference measurements
144(1)
6.4.4.1 Number of deployed sniffers
144(2)
6.4.4.2 Dependence on the number of reference measurements
146(1)
6.4.5 Robustness to signal strength distortion and security attacks
147(2)
6.4.6 Computation efficiency and scalability
149(1)
6.5 Related Research
150(1)
6.6 Conclusion
151(1)
References
151(4)
7 Location-Aware Access Control: Scenarios, Modeling Approaches, and Selected Issues
155(34)
Michael Decker
7.1 Introduction
155(2)
7.2 Application Scenarios
157(3)
7.3 Basics of Access Control
160(4)
7.3.1 Discretionary access control
161(1)
7.3.2 Role-based access control
162(1)
7.3.3 Mandatory access control
163(1)
7.4 Generic Location-Aware Access Control Models
164(6)
7.4.1 Role-based access control
165(3)
7.4.2 Discretionary access control
168(1)
7.4.3 Mandatory access control
169(1)
7.5 Application-Specific Location-Aware Access Control Models
170(5)
7.5.1 Process-aware access control
170(2)
7.5.2 Access control for database systems
172(3)
7.6 Prevention of Location Spoofing
175(4)
7.7 Miscellaneous Aspects
179(3)
7.7.1 Access control for geospatial data
179(1)
7.7.2 Access control for location privacy
180(1)
7.7.3 Proximity-based access control with radio frequency identification technology
181(1)
7.8 Summary and Outlook
182(1)
References
183(6)
8 Location-Based Services and Privacy
189(18)
Nabil Ajam
8.1 Location-based Services
190(1)
8.2 Satellite Systems
191(2)
8.2.1 Global positioning system
191(1)
8.2.2 Galileo
192(1)
8.2.3 Satellites system limits
192(1)
8.3 Positioning in Wi-Fi Networks
193(1)
8.3.1 Limits
194(1)
8.4 Cellular Positioning Techniques
194(6)
8.4.1 Location service
194(1)
8.4.2 Assisted-global navigation satellite system
195(1)
8.4.3 Cell ID
195(1)
8.4.4 Observed time difference
196(1)
8.4.5 Uplink time difference of arrival
196(1)
8.4.6 Architecture of location service in cellular networks
197(1)
8.4.6.1 Added nodes
197(1)
8.4.6.2 Location service architecture in cellular networks
198(1)
8.4.6.3 Added functionalities in existing nodes
198(2)
8.5 Location Information Threats
200(1)
8.6 Location Privacy Policy
201(4)
8.6.1 Privacy definition
201(1)
8.6.2 Privacy in location-based services
202(1)
8.6.3 Privacy enforcement in cellular networks
203(1)
8.6.4 Shortcomings of privacy protection in cellular networks
204(1)
8.6.5 Service provider access to location information
204(1)
8.6.6 Privacy enhancement for location service in cellular networks
204(1)
8.7 Conclusion
205(1)
References
206(1)
9 Protecting Privacy in Location-Based Applications
207(26)
Calvert L. Bowen III
Ingrid Burbey
Thomas L. Martin
9.1 Introduction
208(1)
9.2 Selecting a Location System to Support Privacy
209(1)
9.3 Cloaking to Protect Online Privacy
209(11)
9.3.1 Previous work in online location privacy
210(1)
9.3.2 Mathematical foundation of cloaking
211(1)
9.3.3 Cloaking system
212(1)
9.3.3.1 Rounding
213(1)
9.3.3.2 Truncating
213(1)
9.3.3.3 Geodetic resolution
213(2)
9.3.3.4 Randomization
215(2)
9.3.4 System analysis
217(1)
9.3.5 Resources
217(1)
9.3.5.1 Power
218(1)
9.3.5.2 Memory
219(1)
9.3.5.3 Run-time memory
219(1)
9.3.5.4 Bandwidth
219(1)
9.4 Problems with Corporate Tracking
220(1)
9.5 Protecting Privacy by Using Prediction
221(8)
9.5.1 Location determination
221(1)
9.5.1.1 Symbolic location
222(1)
9.5.2 Related work in location prediction
222(1)
9.5.2.1 MavHome
222(1)
9.5.2.2 Using the global positioning system to determine significant locations
223(1)
9.5.2.3 Dartmouth College mobility predictions
223(1)
9.5.2.4 Predicting future times of availability
224(1)
9.5.3 Prediction based on text compression
224(1)
9.5.3.1 Prediction by partial match
225(1)
9.5.4 An experiment in prediction
226(1)
9.5.4.1 Location determination
226(1)
9.5.4.2 Representations
227(1)
9.5.4.3 Protecting privacy during the prediction process
228(1)
9.6 Conclusion
229(1)
References
229(4)
10 Presence Services for the Support of Location-Based Applications
233(28)
Paolo Bellavista
Antonio Corradi
Luca Foschini
10.1 Introduction
234(2)
10.2 Presence-Based LBS Infrastructures: Background and Open Issues
236(10)
10.2.1 Reference IMPP PS
236(1)
10.2.2 IMPS
237(2)
10.2.3 XMPP
239(2)
10.2.4 IMS PS
241(2)
10.2.5 Discussion
243(3)
10.3 State-of-the-Art of Management Solutions for IMS PS Scalability
246(3)
10.3.1 Local scope
247(1)
10.3.2 Intra-domain scope
247(1)
10.3.3 Inter-domain scope
248(1)
10.3.4 State-of-the-art summary
249(1)
10.4 IHMAS for IMS PS Scalability
249(4)
10.4.1 Design guidelines and architectural model for enhanced scalability of IMS PS
250(1)
10.4.1.1 Filtering criteria and session state management
250(1)
10.4.1.2 Intra-domain dynamic load balancing and data-centric sessions
250(1)
10.4.1.3 Service-aware static balancing to partition intra-domain load
251(1)
10.4.1.4 Inter-domain transmission optimizations
251(1)
10.4.2 IHMAS load-balancing solutions
252(1)
10.5 Presence-Based Infrastructures for LBS Support: Next Steps
253(3)
10.5.1 Real-time monitoring of IMS infrastructure
254(1)
10.5.2 Virtualized PSs for scalable composition of presence information
254(1)
10.5.3 Presence-based location data dissemination for emergency applications
255(1)
10.5.4 Dynamic load balancing and PS deployment over the Cloud
256(1)
10.6 Conclusions
256(1)
References
257(4)
11 Data-Flow Management for Location-Based Service Applications Using the Zoning Concept
261(18)
Suleiman Almasri
Ziad Hunaiti
11.1 Introduction
261(2)
11.2 Static Zone-Based Update Mechanism
263(8)
11.2.1 Evaluation and testing
264(3)
11.2.1.1 Measuring the downloading time
267(1)
11.2.1.2 Measuring the average throughput
267(2)
11.2.1.3 Measuring the packet loss
269(1)
11.2.1.4 Database server evaluation
269(2)
11.3 Dynamic Zone-Based Update Mechanism
271(5)
11.3.1 Evaluation and testing
274(1)
11.3.2 Discussion
275(1)
11.4 Conclusion
276(1)
References
277(2)
12 Assisted Global Navigation Satellite Systems: An Enabling Technology for High Demanding Location-Based Services
279(20)
Paolo Mulassano
Fabio Dovis
12.1 Introduction
279(2)
12.2 Assisted Global Positioning System and the Open Mobile Alliance-Secure User Plane Location Approach
281(4)
12.2.1 Overview on the secure user plane location architecture
283(1)
12.2.2 Procedures for positioning
283(1)
12.2.3 Mobile originated trellis
284(1)
12.3 Infrastructure for Practical Tests
285(4)
12.3.1 SAT-SURF & SAT-SURFER
285(1)
12.3.1.1 SAT-SURF hardware platform
286(1)
12.3.1.2 SAT-SURFER software suite
286(3)
12.4 Trials and Parameters under Test
289(8)
12.5 Concluding Remarks
297(1)
References
298(1)
Index 299
Syed Ahson is a senior software design engineer with Microsoft. As part of the Mobile Voice and Partner Services group, he is busy creating new and exciting end-to-end mobile service and applications. Prior to Microsoft, Syed was a senior staff software engineer with Motorola, where he contributed signifcantly in leading roles toward the creation of several iDEN, CDMA, and GSM cellular phones. Syed has extensive experience with wireless data protocols, wireless data applications, and cellular telephony protocols. Prior to joining Motorola, Syed was a senior software design engineer with NetSpeak Corporation (now part of Net2Phone), a pioneer in VoIP telephony software. Syed has published more than ten books on emerging technologies such as cloud computing, mobile web 2.0, and service delivery platforms. His recent books include Cloud Computing and Software Services: Theory and Techniques and Mobile Web 2.0: Developing and Delivering Services to Mobile Phones. Syed has authored several research papers and teaches computer engineering courses as adjunct faculty at Florida Atlantic University, Boca Raton, Florida, where he introduced a course on Smartphone technology and applications. Syed received his MS degree in computer engineering in July 1998 at Florida Atlantic University. Syed received his BSc degree in electrical engineering from Aligarh University, India, in 1995.

Dr. Mohammad Ilyas is associate dean for research and industry relations at the College of Engineering and Computer Science at Florida Atlantic University, Boca Raton, Florida. Previously, he has served as chair of the Department of Computer Science and Engineering and interim associate vice president for research and graduate studies. He received his Ph.D degree from Queens University in Kingston, Canada. His doctoral research was about switching and fl ow control techniques in computer communication networks. He received his BSc degree in electrical engineering from the University of Engineering and Technology, Pakistan, and his MS degree in electrical and electronic engineering at Shiraz University, Iran. Dr. Ilyas has conducted successful research in various areas, including traffic management and congestion control in broadband/high-speed communication networks traffic characterization, wireless communication networks, performance modeling, and simulation. He has published over 25 books on emerging technologies, and over 150 research articles. His recent books include Cloud Computing and Software Services: Theory and Techniques (2010) and Mobile Web 2.0: Developing and Delivering Services to Mobile Phones (2010). He has supervised 11 PhD dissertations and more than 37 MS theses to completion. He has been a consultant to several national and international organizations. Dr. Ilyas is an active participant in several IEEE technical committees and activities. He is a senior member of IEEE and a member of ASEE.