|
Contents |
6 |
|
|
Contributors |
12 |
|
|
Acknowledgements |
15 |
|
|
Preface |
17 |
|
|
Chapter 1 Location Based Services |
20 |
|
|
1. INTRODUCTION |
20 |
|
|
2. LOCATION BASED SERVICES |
21 |
|
|
3. LBS PROTOTYPES |
22 |
|
|
4. APPLICATION PROGRAMMING INTERFACES |
23 |
|
|
4.1 CDMA2000 LBS Applications |
23 |
|
|
4.2 MLP |
26 |
|
|
5. SUMMARY |
29 |
|
|
6. REFERENCES |
30 |
|
|
Chapter 2 Geolocation on Cellular Networks |
32 |
|
|
1. INTRODUCTION |
32 |
|
|
2. EXISTING AND FUTURE CELLULAR NETWORK TECHNOLOGIES |
33 |
|
|
3. GSM AND ITS SUCCESSORS |
35 |
|
|
4. THE GSM LOCATION SERVICES FRAMEWORK |
40 |
|
|
5. MOBILE POSITIONING METHODS |
45 |
|
|
5.1 Cell Identity |
46 |
|
|
5.2 Time of Arrival and Time Difference of Arrival |
47 |
|
|
5.3 Enhanced Observed Time Difference |
49 |
|
|
5.4 Observed Time Difference of Arrival with Idle Periods in the Downlink |
51 |
|
|
5.5 Advanced Forward Link Trilateration |
51 |
|
|
5.6 (Assisted) Global Positioning System |
52 |
|
|
5.7 Comparison of the Positioning Methods |
54 |
|
|
6. GEOGRAPHICAL AREA DESCRIPTION |
56 |
|
|
7. POSITIONING PROCEDURES IN THE LOCATION SERVICES FRAMEWORK |
58 |
|
|
7.1 Mobile Originating Location Request (MO-LR) |
59 |
|
|
7.2 Mobile Terminating Location Request (MT-LR) |
61 |
|
|
7.3 Mobile Terminating Deferred Location Request (Deferred MT-LR) |
63 |
|
|
7.4 Network Induced Location Request (NI-LR) |
64 |
|
|
8. SUMMARY |
64 |
|
|
REFERRED STANDARDS |
67 |
|
|
Chapter 3 Location Service in CDMA2000 Networks |
70 |
|
|
1. INTRODUCTION |
70 |
|
|
2. LOCATION SERVICE BASED ON IS-41 NETWORK |
72 |
|
|
2.1 IS-41 Based Network Reference Model for Location Service |
72 |
|
|
2.2 Location Service Control |
73 |
|
|
2.3 Position Determination |
74 |
|
|
2.4 Location Service Procedure |
75 |
|
|
2.4.1 Registration Procedure |
75 |
|
|
2.4.2 Location Information Retrieval Procedure |
75 |
|
|
2.4.3 MS Assisted Position Determination Procedure |
77 |
|
|
2.5 Application Examples |
79 |
|
|
2.5.1 Find Nearest McDonald Restaurant |
79 |
|
|
2.5.2 Emergency Service Call |
80 |
|
|
3. LOCATION SERVICE IN ALL-IP NETWORK |
81 |
|
|
3.1 All-IP Network Reference Model for Location Service |
81 |
|
|
3.2 Position Service Registration in All-IP Network |
83 |
|
|
3.3 Location Service Scenario |
84 |
|
|
4. CONCLUSION |
85 |
|
|
References |
86 |
|
|
Chapter 4 Application of Location Information to SIP |
88 |
|
|
1. INTRODUCTION |
88 |
|
|
2. THE SESSION INITIATION PROTOCOL |
89 |
|
|
2.1 The SIP Protocol |
90 |
|
|
2.2 The SIP Architecture |
91 |
|
|
2.3 SIP in Wired Networks |
94 |
|
|
2.3.1 SIP within ISP |
94 |
|
|
2.3.2 Providing Location Data in Wired Networks |
94 |
|
|
2.4 SIP in Wireless Networks |
95 |
|
|
2.4.1 UMTS Architecture |
95 |
|
|
2.4.2 Provisioning Location Data in UMTS networks |
98 |
|
|
3. SIP SERVICE PROVISIONING |
98 |
|
|
3.1 SIP Mechanisms for Services Provisioning |
99 |
|
|
3.2 SIP Services Provisioning |
100 |
|
|
3.3 Architecture and Data Formats for Location Information |
100 |
|
|
3.3.1 Location Interoperability Forum |
101 |
|
|
3.3.1.1 Mobile Location Protocol Specification |
104 |
|
|
3.3.1.2 LIF Service Example |
105 |
|
|
3.3.1.3 LIF Location Structure |
106 |
|
|
3.3.2 WAP Forum |
107 |
|
|
3.3.2.1 WAP Service Example |
109 |
|
|
3.3.2.2 WAP Location Structure |
110 |
|
|
3.3.3 Spatial Location Information in Fixed IP Networks |
111 |
|
|
3.4 Location Based Services Scenarios |
113 |
|
|
3.4.1 Emergency Call |
114 |
|
|
3.4.2 Location Based Supplementary Services |
118 |
|
|
3.4.2.1 Push Services |
118 |
|
|
3.4.2.2 Pull Services |
119 |
|
|
3.4.3 Service Discovery |
121 |
|
|
3.4.4 Security at SIP Layer |
121 |
|
|
4. CONCLUSION |
123 |
|
|
4.1 Security |
123 |
|
|
5. REFERENCES |
124 |
|
|
Chapter 5 Protocols for Updating Highly Accurate Location Information |
130 |
|
|
1. INTRODUCTION |
130 |
|
|
2. BACKGROUND |
132 |
|
|
2.1 Positioning Sensors |
132 |
|
|
2.2 Network Environment |
132 |
|
|
3. UPDATE PROTOCOLS |
133 |
|
|
3.1 Classification |
134 |
|
|
3.1.1 Querying Protocols |
134 |
|
|
3.1.2 Reporting Protocols |
136 |
|
|
3.1.3 Combined Protocol |
139 |
|
|
3.2 Behavior in Case of Disconnection |
140 |
|
|
3.2.1 Querying Protocols |
141 |
|
|
3.2.2 Reporting Protocols |
141 |
|
|
3.2.3 Combined Protocol |
141 |
|
|
3.3 Summary |
141 |
|
|
4. ANALYTICAL COMPARISON OF THE PROTOCOLS |
142 |
|
|
4.1 Location and Uncertainty Model |
144 |
|
|
4.2 Querying Protocols |
146 |
|
|
4.3 Reporting Protocols |
147 |
|
|
4.4 Combined Protocol |
149 |
|
|
4.5 Discussion |
150 |
|
|
5. SIMULATION RESULTS |
154 |
|
|
6. CONCLUSION |
158 |
|
|
Literature |
159 |
|
|
Chapter 6 Geographic Search Engines |
162 |
|
|
1. INTRODUCTION |
162 |
|
|
2. HTML MARKUP |
163 |
|
|
3. WEB TRAVERSAL AND INDEXING |
164 |
|
|
4. SEARCH ALGORITHM |
165 |
|
|
5. PRESENTATION14 |
166 |
|
|
6. MAP CACHING |
168 |
|
|
7. MOBILE APPLICATIONS |
169 |
|
|
8. GEOGRAPHIC DATUM |
170 |
|
|
9. ADVANCED GEOGRAPHIC SEARCHING |
170 |
|
|
9.1 Keywordless Searching |
171 |
|
|
9.2 Keywordless Search Algorithms |
172 |
|
|
9.3 Applications of Keywordless Search |
173 |
|
|
9.4 Zipcode Searching |
176 |
|
|
10. PROPERTY RIGHTS ISSUES |
177 |
|
|
11. REFERENCES |
177 |
|
|
Chapter 7 The Elements of Location Tracking and Privacy Protection |
182 |
|
|
1. THE CRITICAL NEED FOR PRIVACY PROTECTION |
182 |
|
|
2. DIVERSITY OF LOCATION SERVICE SCENARIOS |
184 |
|
|
2.1 Open or Closed Location Environments |
184 |
|
|
2.2 Tracking a Person or a Thing |
185 |
|
|
2.3 Fixed or Mobile Locations |
185 |
|
|
2.4 Private or Public Raw Location Data |
186 |
|
|
3. THE ELEMENTS OF LOCATION COMPUTATION |
187 |
|
|
3.1 A Framework to Describe Location Computation Scenarios |
187 |
|
|
3.2 The Basic Location Computation Scenarios |
189 |
|
|
3.3 Examples of Scenarios |
190 |
|
|
4. AFTER THE LOCATION COMPUTATION |
191 |
|
|
5. PRIVACY RULES AND THEIR ENFORCEMENT |
192 |
|
|
5.1 General Elements of Privacy |
192 |
|
|
5.2 Specific Elements of Location Privacy |
193 |
|
|
5.3 A Critical Need for Strong Default Privacy Rules |
194 |
|
|
5.4 Implications of the Location Computation Scenarios |
195 |
|
|
5.5 Possible Technological Considerations |
196 |
|
|
6. CONCLUSION |
197 |
|
|
7. REFERENCES |
197 |
|
|
Chapter 8 Location Information Privacy |
198 |
|
|
1. OVERVIEW |
198 |
|
|
2. MOTIVATION: THE PROBLEM |
200 |
|
|
3. FRAMEWORK: ENTITIES, FLOWS, SCENARIOS |
201 |
|
|
3.1 Entities |
201 |
|
|
3.2 Data |
204 |
|
|
3.2.1 Sighting |
204 |
|
|
3.2.2 Location |
205 |
|
|
3.2.3 Identities and Credentials |
206 |
|
|
3.2.4 Policies |
207 |
|
|
3.3 Data Flows |
208 |
|
|
3.4 Scenarios |
209 |
|
|
3.4.1 Scenario 1: The Handset-based Solution |
210 |
|
|
3.4.2 Scenario 2: A Network-Based Location Data Source |
211 |
|
|
3.4.3 Scenario 3: External Location Server |
212 |
|
|
3.4.4 Scenario 4: External Location Server and Location Recipients |
213 |
|
|
3.4.5 Scenario 5: External Location Data Source and Location Server |
214 |
|
|
3.4.6 Scenario 6: Untrusted Local Location Server |
216 |
|
|
4. IDENTITY MANAGEMENT |
216 |
|
|
4.1 Privacy: Definitions |
216 |
|
|
4.1.1 Other considerations |
218 |
|
|
4.1.1.1 Traffic Analysis |
218 |
|
|
4.1.1.2 Related Privacy-Protecting Efforts |
218 |
|
|
4.2 Identity of Users, Location Recipients |
219 |
|
|
4.2.1 Public Identities |
219 |
|
|
4.2.2 Private Identifiers |
222 |
|
|
4.2.3 Some Realizations of the Identity/credential Requirements |
224 |
|
|
5. SUMMARY OF REQUIREMENTS |
225 |
|
|
6. REFERENCES |
227 |
|
|
Index |
232 |
|
|
More eBooks at www.ciando.com |
0 |
|