Contents | 6 |
Contributors | 12 |
Acknowledgements | 15 |
Preface | 17 |
Chapter 1 Location Based Services | 20 |
1. INTRODUCTION | 20 |
2. LOCATION BASED SERVICES | 21 |
3. LBS PROTOTYPES | 22 |
4. APPLICATION PROGRAMMING INTERFACES | 23 |
4.1 CDMA2000 LBS Applications | 23 |
4.2 MLP | 26 |
5. SUMMARY | 29 |
6. REFERENCES | 30 |
Chapter 2 Geolocation on Cellular Networks | 32 |
1. INTRODUCTION | 32 |
2. EXISTING AND FUTURE CELLULAR NETWORK TECHNOLOGIES | 33 |
3. GSM AND ITS SUCCESSORS | 35 |
4. THE GSM LOCATION SERVICES FRAMEWORK | 40 |
5. MOBILE POSITIONING METHODS | 45 |
5.1 Cell Identity | 46 |
5.2 Time of Arrival and Time Difference of Arrival | 47 |
5.3 Enhanced Observed Time Difference | 49 |
5.4 Observed Time Difference of Arrival with Idle Periods in the Downlink | 51 |
5.5 Advanced Forward Link Trilateration | 51 |
5.6 (Assisted) Global Positioning System | 52 |
5.7 Comparison of the Positioning Methods | 54 |
6. GEOGRAPHICAL AREA DESCRIPTION | 56 |
7. POSITIONING PROCEDURES IN THE LOCATION SERVICES FRAMEWORK | 58 |
7.1 Mobile Originating Location Request (MO-LR) | 59 |
7.2 Mobile Terminating Location Request (MT-LR) | 61 |
7.3 Mobile Terminating Deferred Location Request (Deferred MT-LR) | 63 |
7.4 Network Induced Location Request (NI-LR) | 64 |
8. SUMMARY | 64 |
REFERRED STANDARDS | 67 |
Chapter 3 Location Service in CDMA2000 Networks | 70 |
1. INTRODUCTION | 70 |
2. LOCATION SERVICE BASED ON IS-41 NETWORK | 72 |
2.1 IS-41 Based Network Reference Model for Location Service | 72 |
2.2 Location Service Control | 73 |
2.3 Position Determination | 74 |
2.4 Location Service Procedure | 75 |
2.4.1 Registration Procedure | 75 |
2.4.2 Location Information Retrieval Procedure | 75 |
2.4.3 MS Assisted Position Determination Procedure | 77 |
2.5 Application Examples | 79 |
2.5.1 Find Nearest McDonald Restaurant | 79 |
2.5.2 Emergency Service Call | 80 |
3. LOCATION SERVICE IN ALL-IP NETWORK | 81 |
3.1 All-IP Network Reference Model for Location Service | 81 |
3.2 Position Service Registration in All-IP Network | 83 |
3.3 Location Service Scenario | 84 |
4. CONCLUSION | 85 |
References | 86 |
Chapter 4 Application of Location Information to SIP | 88 |
1. INTRODUCTION | 88 |
2. THE SESSION INITIATION PROTOCOL | 89 |
2.1 The SIP Protocol | 90 |
2.2 The SIP Architecture | 91 |
2.3 SIP in Wired Networks | 94 |
2.3.1 SIP within ISP | 94 |
2.3.2 Providing Location Data in Wired Networks | 94 |
2.4 SIP in Wireless Networks | 95 |
2.4.1 UMTS Architecture | 95 |
2.4.2 Provisioning Location Data in UMTS networks | 98 |
3. SIP SERVICE PROVISIONING | 98 |
3.1 SIP Mechanisms for Services Provisioning | 99 |
3.2 SIP Services Provisioning | 100 |
3.3 Architecture and Data Formats for Location Information | 100 |
3.3.1 Location Interoperability Forum | 101 |
3.3.1.1 Mobile Location Protocol Specification | 104 |
3.3.1.2 LIF Service Example | 105 |
3.3.1.3 LIF Location Structure | 106 |
3.3.2 WAP Forum | 107 |
3.3.2.1 WAP Service Example | 109 |
3.3.2.2 WAP Location Structure | 110 |
3.3.3 Spatial Location Information in Fixed IP Networks | 111 |
3.4 Location Based Services Scenarios | 113 |
3.4.1 Emergency Call | 114 |
3.4.2 Location Based Supplementary Services | 118 |
3.4.2.1 Push Services | 118 |
3.4.2.2 Pull Services | 119 |
3.4.3 Service Discovery | 121 |
3.4.4 Security at SIP Layer | 121 |
4. CONCLUSION | 123 |
4.1 Security | 123 |
5. REFERENCES | 124 |
Chapter 5 Protocols for Updating Highly Accurate Location Information | 130 |
1. INTRODUCTION | 130 |
2. BACKGROUND | 132 |
2.1 Positioning Sensors | 132 |
2.2 Network Environment | 132 |
3. UPDATE PROTOCOLS | 133 |
3.1 Classification | 134 |
3.1.1 Querying Protocols | 134 |
3.1.2 Reporting Protocols | 136 |
3.1.3 Combined Protocol | 139 |
3.2 Behavior in Case of Disconnection | 140 |
3.2.1 Querying Protocols | 141 |
3.2.2 Reporting Protocols | 141 |
3.2.3 Combined Protocol | 141 |
3.3 Summary | 141 |
4. ANALYTICAL COMPARISON OF THE PROTOCOLS | 142 |
4.1 Location and Uncertainty Model | 144 |
4.2 Querying Protocols | 146 |
4.3 Reporting Protocols | 147 |
4.4 Combined Protocol | 149 |
4.5 Discussion | 150 |
5. SIMULATION RESULTS | 154 |
6. CONCLUSION | 158 |
Literature | 159 |
Chapter 6 Geographic Search Engines | 162 |
1. INTRODUCTION | 162 |
2. HTML MARKUP | 163 |
3. WEB TRAVERSAL AND INDEXING | 164 |
4. SEARCH ALGORITHM | 165 |
5. PRESENTATION14 | 166 |
6. MAP CACHING | 168 |
7. MOBILE APPLICATIONS | 169 |
8. GEOGRAPHIC DATUM | 170 |
9. ADVANCED GEOGRAPHIC SEARCHING | 170 |
9.1 Keywordless Searching | 171 |
9.2 Keywordless Search Algorithms | 172 |
9.3 Applications of Keywordless Search | 173 |
9.4 Zipcode Searching | 176 |
10. PROPERTY RIGHTS ISSUES | 177 |
11. REFERENCES | 177 |
Chapter 7 The Elements of Location Tracking and Privacy Protection | 182 |
1. THE CRITICAL NEED FOR PRIVACY PROTECTION | 182 |
2. DIVERSITY OF LOCATION SERVICE SCENARIOS | 184 |
2.1 Open or Closed Location Environments | 184 |
2.2 Tracking a Person or a Thing | 185 |
2.3 Fixed or Mobile Locations | 185 |
2.4 Private or Public Raw Location Data | 186 |
3. THE ELEMENTS OF LOCATION COMPUTATION | 187 |
3.1 A Framework to Describe Location Computation Scenarios | 187 |
3.2 The Basic Location Computation Scenarios | 189 |
3.3 Examples of Scenarios | 190 |
4. AFTER THE LOCATION COMPUTATION | 191 |
5. PRIVACY RULES AND THEIR ENFORCEMENT | 192 |
5.1 General Elements of Privacy | 192 |
5.2 Specific Elements of Location Privacy | 193 |
5.3 A Critical Need for Strong Default Privacy Rules | 194 |
5.4 Implications of the Location Computation Scenarios | 195 |
5.5 Possible Technological Considerations | 196 |
6. CONCLUSION | 197 |
7. REFERENCES | 197 |
Chapter 8 Location Information Privacy | 198 |
1. OVERVIEW | 198 |
2. MOTIVATION: THE PROBLEM | 200 |
3. FRAMEWORK: ENTITIES, FLOWS, SCENARIOS | 201 |
3.1 Entities | 201 |
3.2 Data | 204 |
3.2.1 Sighting | 204 |
3.2.2 Location | 205 |
3.2.3 Identities and Credentials | 206 |
3.2.4 Policies | 207 |
3.3 Data Flows | 208 |
3.4 Scenarios | 209 |
3.4.1 Scenario 1: The Handset-based Solution | 210 |
3.4.2 Scenario 2: A Network-Based Location Data Source | 211 |
3.4.3 Scenario 3: External Location Server | 212 |
3.4.4 Scenario 4: External Location Server and Location Recipients | 213 |
3.4.5 Scenario 5: External Location Data Source and Location Server | 214 |
3.4.6 Scenario 6: Untrusted Local Location Server | 216 |
4. IDENTITY MANAGEMENT | 216 |
4.1 Privacy: Definitions | 216 |
4.1.1 Other considerations | 218 |
4.1.1.1 Traffic Analysis | 218 |
4.1.1.2 Related Privacy-Protecting Efforts | 218 |
4.2 Identity of Users, Location Recipients | 219 |
4.2.1 Public Identities | 219 |
4.2.2 Private Identifiers | 222 |
4.2.3 Some Realizations of the Identity/credential Requirements | 224 |
5. SUMMARY OF REQUIREMENTS | 225 |
6. REFERENCES | 227 |
Index | 232 |
More eBooks at www.ciando.com | 0 |