Limit search to available items
Book Cover
E-book

Title Location-based services handbook : applications, technologies, and security / edited by Syed A. Ahson and Mohammad Ilyas
Published Boca Raton, FL : CRC Press, ©2011
Online access available from:
ProQuest Ebook Central (owned titles)    View Resource Record  

Copies

Description 1 online resource (xiv, 313 pages) : illustrations
Contents Machine generated contents note: 1. Positioning Technologies in Location-Based Services / Matthew Weber -- 1.1. Introduction -- 1.1.1. Overview of localization systems -- 1.2. Geometric Principles for Location Estimation -- 1.2.1. Trilateration -- 1.2.2. Multilateration -- 1.2.3. Triangulation -- 1.2.4. Comparison between trilateration, multilateration, and triangulation -- 1.3. Main Localization Techniques -- 1.3.1. Time of arrival -- 1.3.1.1. Radiofrequency technologies -- 1.3.1.2. Laser technology -- 1.3.1.3. Ultrasound technology -- 1.3.1.4. Sounds technology -- 1.3.2. Time difference of arrival -- 1.3.3. Received signal strength indication -- 1.3.3.1. Common localization technologies based on received signal strength indication fingerprinting -- 1.3.3.2. Common localization technologies based on received signal strength indication with theoretical propagation models -- 1.3.4. Angle of arrival -- 1.4. Other Localization Methods -- 1.4.1. Inertial navigation systems -- 1.4.2. Proximity-based methods -- 1.4.2.1. Convex positioning -- 1.4.2.2. Centroid -- 1.4.2.3. Center of gravity of overlapping areas -- 1.4.2.4. Probabilistic techniques -- 1.4.2.5. Hop-count based methods -- 1.4.2.6. Amorphous localization -- 1.4.2.7. Main technologies using proximity for localization -- 1.4.3. Environment-based localization techniques -- 1.4.4. Multimode approach for localization -- 1.4.4.1. Introduction -- 1.4.4.2. Diversity of technologies -- 1.4.4.3. Diversity of localization techniques -- 1.4.4.4. Diversity of reference objects: Multiple neighboring terminals and cooperative localization -- 1.5. Comparison and Outlook -- 1.6. Conclusions -- Acknowledgments -- References -- 2. Wireless Location Technology in Location-Based Services / Xuexue Zhang -- 2.1. Introduction -- 2.2. Study on the Estimation of Position-Related Parameters (or Data Collection) -- 2.2.1. Cell of origin -- 2.2.2. Time of arrival -- 2.2.3. Time difference of arrival -- 2.2.4. Angle of arrival -- 2.2.5. Received signal strength -- 2.3. Infrastructure of Positioning in Cellular Network -- 2.3.1. Cellular network fundamentals -- 2.3.2. Classification of positioning infrastructures -- 2.3.2.1. Integrated and stand-alone infrastructures -- 2.3.2.2. Network-based and terminal-based positioning -- 2.3.2.3. Satellites, cellular, and indoor infrastructures -- 2.4. Cellular Networks -- 2.4.1. Global positioning system solution -- 2.4.2. Cell identification -- 2.4.3. Problems and solutions in cellular network positioning -- 2.4.3.1. Narrowband networks -- 2.4.3.2. Code division multiple access -- 2.4.3.3. Global system for mobile communications -- 2.5. Precision and Accuracy -- 2.5.1. Study of the multi-path promulgate -- 2.5.2. Non-line-of-sight promulgate -- 2.5.3. Code division multiple access multi-address access interference -- 2.5.4. Other sources of positioning error -- 2.6. Conclusion -- References -- 3. Location in Wireless Local Area Networks / Francisco Barcelo-Arroyo -- 3.1. Introduction -- 3.2. Techniques Based on Cell Identity -- 3.3. Fingerprinting -- 3.3.1. Matching algorithms -- 3.3.2. Relevant approaches -- 3.3.3. Performance characteristics -- 3.3.4. Current trends -- 3.4. Received Signal Strength Indicator-Based Ranging and Trilateration -- 3.4.1. Received signal strength indicator-based ranging -- 3.4.2. Performance characteristics -- 3.5. Time of Arrival-Based Ranging/Trilateration -- 3.5.1. Estimating time of arrival at the physical layer -- 3.5.2. Estimating time of arrival at upper layers -- 3.5.3. Performance characteristics -- 3.6. Time Difference of Arrival -- 3.6.1. Relevant proposals -- 3.6.2. Performance characteristics -- 3.7. Angle of Arrival or Direction of Arrival -- 3.7.1. Relevant proposals -- 3.7.2. Performance characteristics -- 3.8. Assisted Global Positioning System -- 3.9. Discussion -- 3.10. Commercial Solutions -- 3.10.1. Ekahau Real Time Location System -- 3.10.2. Aeroscout Visibility System -- 3.10.3. Skyhook Wireless Wi-Fi Positioning System -- References -- 4. Radio Frequency Identification Positioning / Shinichi Konomi -- 4.1. Introduction -- 4.2. RFID Tags as Location Reference Points -- 4.3. Location Estimation Techniques -- 4.4. Applications -- 4.5. Facilitating Deployment -- 4.6. Security and Privacy -- 4.7. Real-World Deployment -- 4.7.1. Prototype implementation -- 4.7.2. Preliminary experiments -- 4.7.3. Field experiment -- 4.8. Conclusion -- References -- 5. Supporting Smart Mobile Navigation in a Smart Environment / Haosheng Huang -- 5.1. Introduction -- 5.2. Related Work -- 5.2.1. Location-based services in a smart environment -- 5.2.2. Location-based services in Web 2.0 -- 5.2.3. Mobile navigation -- 5.3. Smart Environment -- 5.3.1. Indoor positioning -- 5.3.2. Wireless infrastructure -- 5.4. User Interaction and Annotation -- 5.4.1. User-generated content -- 5.4.2. Motivation and data quality of user-generated content -- 5.5. Collective Intelligence-Based Route Calculation -- 5.5.1. Data modeling -- 5.5.2. Collective intelligence-based route calculation -- 5.5.2.1. Route calculation for mobile navigation -- 5.5.2.2. Different kinds of best routes -- 5.5.3. Discussion -- 5.6. Context-Aware Adaptation on Software Architecture and Destination Selection -- 5.6.1. Software architecture -- 5.6.2. Destination selection -- 5.7. Conclusions and Future Work -- Acknowledgment -- References -- 6. Indoor Location Determination: Environmental Impacts, Algorithm Robustness, and Performance Evaluation / Yiming Ji -- 6.1. Introduction -- 6.2. Signal Strength Distortion Model -- 6.3. Dynamic Localization Mechanisms -- 6.3.1. Signal-location map -- 6.3.2. Indoor radio propagation modeling -- 6.3.3. Signal distance mapping -- 6.3.4. Distance fitting -- 6.3.5. Distance-based location search -- 6.4. Simulations and System Comparison -- 6.4.1. Testing environments -- 6.4.2. Experimental strategy -- 6.4.3. Simulations results -- 6.4.3.1. Distance estimation -- 6.4.3.2. Localization results -- 6.4.4. Dependence on number of deployed sniffers and reference measurements -- 6.4.4.1. Number of deployed sniffers -- 6.4.4.2. Dependence on the number of reference measurements -- 6.4.5. Robustness to signal strength distortion and security attacks -- 6.4.6. Computation efficiency and scalability -- 6.5. Related Research -- 6.6. Conclusion -- References -- 7. Location-Aware Access Control: Scenarios, Modeling Approaches, and Selected Issues / Michael Decker -- 7.1. Introduction -- 7.2. Application Scenarios -- 7.3. Basics of Access Control -- 7.3.1. Discretionary access control -- 7.3.2. Role-based access control -- 7.3.3. Mandatory access control -- 7.4. Generic Location-Aware Access Control Models -- 7.4.1. Role-based access control -- 7.4.2. Discretionary access control -- 7.4.3. Mandatory access control -- 7.5. Application-Specific Location-Aware Access Control Models -- 7.5.1. Process-aware access control -- 7.5.2. Access control for database systems -- 7.6. Prevention of Location Spoofing -- 7.7. Miscellaneous Aspects -- 7.7.1. Access control for geospatial data -- 7.7.2. Access control for location privacy -- 7.7.3. Proximity-based access control with radio frequency identification technology -- 7.8. Summary and Outlook -- References -- 8. Location-Based Services and Privacy / Nabil Ajam -- 8.1. Location-based Services -- 8.2. Satellite Systems -- 8.2.1. Global positioning system -- 8.2.2. Galileo -- 8.2.3. Satellites system limits -- 8.3. Positioning in Wi-Fi Networks -- 8.3.1. Limits -- 8.4. Cellular Positioning Techniques -- 8.4.1. Location service -- 8.4.2. Assisted-global navigation
Satellite system -- 8.4.3. Cell ID -- 8.4.4. Observed time difference -- 8.4.5. Uplink time difference of arrival -- 8.4.6. Architecture of location service in cellular networks -- 8.4.6.1. Added nodes -- 8.4.6.2. Location service architecture in cellular networks -- 8.4.6.3. Added functionalities in existing nodes -- 8.5. Location Information Threats -- 8.6. Location Privacy Policy -- 8.6.1. Privacy definition -- 8.6.2. Privacy in location-based services -- 8.6.3. Privacy enforcement in cellular networks -- 8.6.4. Shortcomings of privacy protection in cellular networks -- 8.6.5. Service provider access to location information -- 8.6.6. Privacy enhancement for location service in cellular networks -- 8.7. Conclusion -- References -- 9. Protecting Privacy in Location-Based Applications / Thomas L. Martin -- 9.1. Introduction -- 9.2. Selecting a Location System to Support Privacy -- 9.3. Cloaking to Protect Online Privacy -- 9.3.1. Previous work in online location privacy -- 9.3.2. Mathematical foundation of cloaking -- 9.3.3. Cloaking system -- 9.3.3.1. Rounding -- 9.3.3.2. Truncating -- 9.3.3.3. Geodetic resolution -- 9.3.3.4. Randomization -- 9.3.4. System analysis -- 9.3.5. Resources -- 9.3.5.1. Power -- 9.3.5.2. Memory -- 9.3.5.3. Run-time memory -- 9.3.5.4. Bandwidth -- 9.4. Problems with Corporate Tracking -- 9.5. Protecting Privacy by Using Prediction -- 9.5.1. Location determination -- 9.5.1.1. Symbolic location -- 9.5.2. Related work in location prediction -- 9.5.2.1. MavHome -- 9.5.2.2. Using the global positioning system to determine significant locations -- 9.5.2.3. Dartmouth College mobility predictions
Note continued: 9.5.2.4. Predicting future times of availability -- 9.5.3. Prediction based on text compression -- 9.5.3.1. Prediction by partial match -- 9.5.4. experiment in prediction -- 9.5.4.1. Location determination -- 9.5.4.2. Representations -- 9.5.4.3. Protecting privacy during the prediction process -- 9.6. Conclusion -- References -- 10. Presence Services for the Support of Location-Based Applications / Luca Foschini -- 10.1. Introduction -- 10.2. Presence-Based LBS Infrastructures: Background and Open Issues -- 10.2.1. Reference IMPP PS -- 10.2.2. IMPS -- 10.2.3. XMPP -- 10.2.4. IMS PS -- 10.2.5. Discussion -- 10.3. State-of-the-Art of Management Solutions for IMS PS Scalability -- 10.3.1. Local scope -- 10.3.2. Intra-domain scope -- 10.3.3. Inter-domain scope -- 10.3.4. State-of-the-art summary -- 10.4. IHMAS for IMS PS Scalability -- 10.4.1. Design guidelines and architectural model for enhanced scalability of IMS PS -- 10.4.1.1. Filtering criteria and session state management -- 10.4.1.2. Intra-domain dynamic load balancing and data-centric sessions -- 10.4.1.3. Service-aware static balancing to partition intra-domain load -- 10.4.1.4. Inter-domain transmission optimizations -- 10.4.2. IHMAS load-balancing solutions -- 10.5. Presence-Based Infrastructures for LBS Support: Next Steps -- 10.5.1. Real-time monitoring of IMS infrastructure -- 10.5.2. Virtualized PSs for scalable composition of presence information -- 10.5.3. Presence-based location data dissemination for emergency applications -- 10.5.4. Dynamic load balancing and PS deployment over the Cloud -- 10.6. Conclusions -- References -- 11. Data-Flow Management for Location-Based Service Applications Using the Zoning Concept / Ziad Hunaiti -- 11.1. Introduction -- 11.2. Static Zone-Based Update Mechanism -- 11.2.1. Evaluation and testing -- 11.2.1.1. Measuring the downloading time -- 11.2.1.2. Measuring the average throughput -- 11.2.1.3. Measuring the packet loss -- 11.2.1.4. Database server evaluation -- 11.3. Dynamic Zone-Based Update Mechanism -- 11.3.1. Evaluation and testing -- 11.3.2. Discussion -- 11.4. Conclusion -- References -- 12. Assisted Global Navigation Satellite Systems: An Enabling Technology for High Demanding Location-Based Services / Fabio Dovis -- 12.1. Introduction -- 12.2. Assisted Global Positioning System and the Open Mobile Alliance-Secure User Plane Location Approach -- 12.2.1. Overview on the secure user plane location architecture -- 12.2.2. Procedures for positioning -- 12.2.3. Mobile originated trellis -- 12.3. Infrastructure for Practical Tests -- 12.3.1. SAT-SURF & SAT-SURFER -- 12.3.1.1. SAT-SURF hardware platform -- 12.3.1.2. SAT-SURFER software suite -- 12.4. Trials and Parameters under Test -- 12.5. Concluding Remarks -- References
Summary Location-Based Services Handbook: Applications, and Technologies, and Security is a comprehensive reference containing all aspects of essential technical information on location-based services (LBS) technology. With broad coverage ranging from basic concepts to research-grade material, it presents a much-needed overview of technologies for positioning and localizing, including range- and proximity-based localization methods, and environment-based location estimation methods. Featuring contributions from field experts around the world, this book addresses existing and future directions of LBS technology, exploring how it can be used to optimize resource allocation and improve cooperation in wireless networks
This book offers tools to aid in determining the optimal distance measurement system for a given situation by assessing factors including complexity, accuracy, and environment. It provides an extensive survey of existing literature and proposes a novel, widely applicable, and highly scalable architecture solution. Organized into three major sections--applications, technologies, and security--this material fully covers verious location-based applications and the impact they will have on the future. --Book Jacket
Bibliography Includes bibliographical references and index
Notes English
Subject Location-based services -- Handbooks, manuals, etc
Mobile geographic information systems -- Handbooks, manuals, etc
Wireless communication systems -- Handbooks, manuals, etc
Electronics in navigation -- Handbooks, manuals, etc
TECHNOLOGY & ENGINEERING -- Radio.
TECHNOLOGY & ENGINEERING -- Mobile & Wireless Communications.
Electronics in navigation
Location-based services
Mobile geographic information systems
Wireless communication systems
Genre/Form Electronic book
Handbooks and manuals.
Form Electronic book
Author Ahson, Syed
Ilyas, Mohammad, 1953-
LC no. 2010022617
ISBN 9781420071962
1420071963
142007198X
9781420071986
9781439858530
1439858535
9781439856710
1439856710
9781439856727
1439856729
9781315222400
131522240X
1498785522
9781498785525
1138112151
9781138112155