Geographic Location in the Internet / Edition 1

Geographic Location in the Internet / Edition 1

by Behcet Sarikaya
     
 

ISBN-10: 1402070977

ISBN-13: 9781402070976

Pub. Date: 06/30/2002

Publisher: Springer US

This text discusses how to find the location of mobile devices in the wireless Internet, specifically those that involve the determination of the geographic location of mobile devices. It offers exclusive coverage of the technical aspects of privacy such as linkability, anonymity and identity management.

Overview

This text discusses how to find the location of mobile devices in the wireless Internet, specifically those that involve the determination of the geographic location of mobile devices. It offers exclusive coverage of the technical aspects of privacy such as linkability, anonymity and identity management.

Product Details

ISBN-13:
9781402070976
Publisher:
Springer US
Publication date:
06/30/2002
Series:
The Springer International Series in Engineering and Computer Science, #691
Edition description:
2002
Pages:
240
Product dimensions:
6.10(w) x 9.25(h) x 0.02(d)

Table of Contents

Contributorsxi
Acknowledgementsxv
Prefacexvii
Chapter 1.Location Based Services
1.Introduction1
2.Location Based Services2
3.Lbs Prototypes3
4.Application Programming Interfaces4
4.1CDMA2000 LBS Applications4
4.2MLP7
5.Summary10
6.References11
Chapter 2.Geolocation on Cellular Networks
1.Introduction13
2.Existing and Future Cellular Network Technologies14
3.GSM and its Successors16
4.The GSM Location Services Framework21
5.Mobile Positioning Methods26
5.1Cell Identity27
5.2Time of Arrival and Time Difference of Arrival28
5.3Enhanced Observed Time Difference30
5.4Observed Time Difference of Arrival with Idle Periods in the Downlink32
5.5Advanced Forward Link Trilateration32
5.6(Assisted) Global Positioning System33
5.7Comparison of the positioning methods35
6.Geographical Area Description37
7.Positioning Procedures in the Location Services Framework39
7.1Mobile Originating Location Request (MO-LR)40
7.2Mobile Terminating Location Request (MT-LR)42
7.3Mobile Terminating Deferred Location Request (Deferred MT-LR)44
7.4Network Induced Location Request (NI-LR)45
8.Summary45
References46
Chapter 3.Location Service in CDMA2000 Networks
1.Introduction51
2.Location Service Based on IS-41 Network53
2.1IS-41 Based Network Reference Model for Location Service53
2.2Location Service Control54
2.3Position Determination55
2.4Location Service Procedure56
2.4.1Registration Procedure56
2.4.2Location Information Retrieval Procedure56
2.4.3MS Assisted Position Determination Procedure58
2.5Application Examples60
2.5.1Find Nearest McDonald Restaurant60
2.5.2Emergency Service Call61
3.Location Service in All-IP Network62
3.1All-IP Network Reference Model for Location Service62
3.2Position Service Registration in All-IP Network64
3.3Location Service Scenario65
4.Conclusion66
References67
Chapter 4.Application of Location Information to SIP
1.Introduction69
2.The Session Initiation Protocol70
2.1The SIP protocol71
2.2The SIP architecture72
2.3SIP in wired networks75
2.3.1SIP within ISP75
2.3.2Providing Location Data in Wired Networks75
2.4SIP in wireless networks76
2.4.1UMTS Architecture76
2.4.2Provisioning Location Data in UMTS networks79
3.SIP Service Provisioning79
3.1SIP mechanisms for Services provisioning80
3.2SIP services provisioning81
3.3Architecture and Data Formats for Location Information81
3.3.1Location Interoperability Forum82
3.3.2WAP Forum88
3.3.3Spatial Location Information in Fixed IP Networks92
3.4Location Based Services Scenarios94
3.4.1Emergency Call95
3.4.2Location Based Supplementary Services99
3.4.3Service Discovery102
3.4.4Security at SIP Layer102
4.Conclusion104
4.1Security104
5.References105
Chapter 5.Protocols for Updating Highly Accurate Location Information
1.Introduction111
2.Background113
2.1Positioning Sensors113
2.2Network Environment113
3.Update Protocols114
3.1Classification115
3.1.1Querying Protocols115
3.1.2Reporting Protocols117
3.1.3Combined Protocol120
3.2Behavior in Case of Disconnection121
3.2.1Querying Protocols122
3.2.2Reporting Protocols122
3.2.3Combined Protocol122
3.3Summary122
4.Analytical Comparison of the Protocols123
4.1Location and Uncertainty Model125
4.2Querying Protocols127
4.3Reporting Protocols128
4.4Combined Protocol130
4.5Discussion131
5.Simulation Results135
6.Conclusion139
References140
Chapter 6.Geographic Search Engines
1.Introduction143
2.HTML Markup144
3.Web Traversal and Indexing145
4.Search Algorithm146
5.Presentation147
6.MAP Caching149
7.Mobile Applications150
8.Geographic Datum151
9.Advanced Geographic Searching151
9.1Keywordless Searching152
9.2Keywordless Search Algorithms153
9.3Applications of Keywordless Search154
9.4Zipcode searching157
10.Property Rights Issues158
11.References158
Chapter 7.The Elements of Location Tracking and Privacy Protection
1.The Critical Need for Privacy Protection163
2.Diversity of Location Service Scenarios165
2.1Open or Closed Location Environments165
2.2Tracking a Person or a Thing166
2.3Fixed or Mobile Locations166
2.4Private or Public Raw Location Data167
3.The Elements of Location Computation168
3.1A Framework to Describe Location Computation Scenarios168
3.2The Basic Location Computation Scenarios170
3.3Examples of Scenarios171
4.After the Location Computation172
5.Privacy Rules and Their Enforcement173
5.1General Elements of Privacy173
5.2Specific Elements of Location Privacy174
5.3A Critical Need for Strong Default Privacy Rules175
5.4Implications of the Location Computation Scenarios176
5.5Possible Technological Considerations177
6.Conclusion178
7.References178
Chapter 8.Location Information Privacy
1.Overview179
2.Motivation: The Problem181
3.Framework: Entities, Flows, Scenarios182
3.1Entities182
3.2Data185
3.2.1Sighting185
3.2.2Location186
3.2.3Identities and Credentials187
3.2.4Policies188
3.3Data Flows189
3.4Scenarios190
3.4.1Scenario 1: The Handset-based Solution191
3.4.2Scenario 2: A Network-Based Location Data Source192
3.4.3Scenario 3: External Location Server193
3.4.4Scenario 4: External Location Server and Location Recipients194
3.4.5Scenario 5: External Location Data Source and Locati Server195
3.4.6Scenario 6: Untrusted Local Location Server197
4.Identity Management197
4.1Privacy: Definitions197
4.1.1Other considerations199
4.2Identity of Users, Location Recipients200
4.2.1Public Identities200
4.2.2Private Identifiers203
4.2.3Some realizations of the identity/credential requirements205
5.Summary of Requirements206
6.References208

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >