(Syed A. Ahson, Mohammad Ilyas) Location-Based Ser
(Syed A. Ahson, Mohammad Ilyas) Location-Based Ser
Services
Handbook
Applications, Technologies,
and Security
Location-Based
Services
Handbook
Applications, Technologies,
and Security
Edited by
Syed A. Ahson and Mohammad Ilyas
CRC Press
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts
have been made to publish reliable data and information, but the author and publisher cannot assume
responsibility for the validity of all materials or the consequences of their use. The authors and publishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize to
copyright holders if permission to publish in this form has not been obtained. If any copyright material has
not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmit-
ted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented,
including photocopying, microfilming, and recording, or in any information storage or retrieval system,
without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.
com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood
Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that provides licenses and
registration for a variety of users. For organizations that have been granted a photocopy license by the CCC,
a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used
only for identification and explanation without intent to infringe.
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
v
vi Contents
Mobile devices today are boasting processing power and memory on par
with that found in desktop computers. Wireless connectivity has become
much more readily available. Many metropolitan areas feature large-scale
wireless networks, and cellular or satellite connections are accessible in many
remote areas. Furthermore, we are seeing a continuous decrease in the cost
of hardware—the mobile devices themselves, as well as accessories, such as
global positioning system (GPS) units. As people are increasingly mobile in
terms of lifestyle and occupational behavior, and there is a demand for deliv-
ering information to them according to their geographical location, a new
system known as location-based services (LBSs) was developed by integrat-
ing satellite navigation, mobile networking, and mobile computing to enable
such services. Such a system combines the location information of the end
user with intelligent application in order to provide related services. The LBS
system has become popular since the beginning of this decade mainly due to
the release of GPS signals for use in civilian applications.
With the continuous decrease in the cost of these devices, we see not
only the use of the location-aware devices proliferating in an increasing
number of civilian and military applications, but also a growing demand
for continuously being informed while on the road, in addition to staying
connected. Many of these applications require efficient and highly scalable
system architecture and system services for supporting dissemination of
location-dependent resources and information over a large and growing
number of mobile users. Meanwhile, depending on wireless positioning,
geographic information systems (GIS), application middleware, applica-
tion software, and support, the LBS is in use in every aspect of our lives. In
particular, the growth of mobile technology makes it possible to estimate
the location of the mobile station in LBS. In the LBS, we tend to use posi-
tioning technology to register the movement of the mobile station and use
the generated data to extract useful knowledge, so that it can defi ne a new
research area that has both technological and theoretical underpinnings.
The subject of wireless positioning in LBS has drawn considerable attention.
In the wireless systems in LBS, transmitted signals are used for positioning.
By using characteristics of the transmitted signal itself, the location estima-
tion technology can estimate how far one terminal is from another or where
that terminal is located. In addition, location information can help optimize
resource allocation and improve cooperation in wireless networks. While
wireless service systems aim at providing support to the tasks and interac-
tions of humans in physical space, accurate location estimation facilitates a
variety of applications, which include areas of personal safety, industrial mon-
itoring and control, and a myriad of commercial applications, e.g., emergency
vii
viii Preface
Syed Ahson
Seattle, Washington, USA
Mohammad Ilyas
Boca Raton, Florida, USA
xiii
xiv Contributors
CONTENTS
1.1 Introduction ....................................................................................................2
1.1.1 Overview of localization systems....................................................3
1.2 Geometric Principles for Location Estimation .......................................... 5
1.2.1 Trilateration ........................................................................................6
1.2.2 Multilateration ....................................................................................6
1.2.3 Triangulation ...................................................................................... 8
1.2.4 Comparison between trilateration, multilateration, and
triangulation ....................................................................................... 8
1.3 Main Localization Techniques ..................................................................... 9
1.3.1 Time of arrival ....................................................................................9
1.3.1.1 Radiofrequency technologies .......................................... 10
1.3.1.2 Laser technology ............................................................... 12
1.3.1.3 Ultrasound technology .................................................... 13
1.3.1.4 Sounds technology ........................................................... 14
1.3.2 Time difference of arrival ............................................................... 14
1.3.3 Received signal strength indication .............................................. 15
1.3.3.1 Common localization technologies based on
received signal strength indication fingerprinting ...... 17
1.3.3.2 Common localization technologies based
on received signal strength indication with
theoretical propagation models ...................................... 18
1.3.4 Angle of arrival ................................................................................ 19
1.4 Other Localization Methods ...................................................................... 21
1.4.1 Inertial navigation systems ............................................................ 21
1.4.2 Proximity-based methods ..............................................................22
1.4.2.1 Convex positioning ...........................................................22
1.4.2.2 Centroid .............................................................................. 23
1.4.2.3 Center of gravity of overlapping areas .......................... 23
1.4.2.4 Probabilistic techniques ................................................... 24
1.4.2.5 Hop-count based methods .............................................. 24
1
2 Location-Based Services Handbook
1.1 Introduction
Mobile devices today boast processing power and memory on par with
that found in desktop computers. Wireless connectivity has become much
more readily available. Many metropolitan areas feature large-scale wire-
less networks and cellular or satellite connections are accessible in many
remote areas. Furthermore, we are seeing a continuing decrease in the cost
of hardware—the mobile devices themselves, as well as accessories, such
as global positioning system (GPS) units. What was once a cost-prohibitive,
underpowered, immature technology is now a reality.
With the continued decrease in the prices of these devices, we see not only
the use of the location-aware devices escalating in an increasing number of
civilian and military applications, but also a growing demand for continuously
being informed while on the road, in addition to staying connected. Many of
these applications require an efficient and highly scalable system architecture
and system services to support dissemination of location-dependent resources
and information over a large and growing number of mobile users.
Consider a metropolitan area with hundreds of thousands of vehicles.
Drivers and passengers in these vehicles are interested in information rel-
evant to their trips. For example, a driver would like her vehicle to display
continuously on a map the list of Starbucks coffee shops within 10 miles
around the current location of the vehicle. Another driver may be inter-
ested in the available parking spaces near the destination, say the Atlanta
Fox Theater, in the next 30 min. Some driver may also want to monitor the
traffic conditions five miles ahead (e.g., average speed). Such information or
resources are important for drivers to optimize their travel and alleviate traf-
fic congestion by better planning of their trip and avoiding wasteful driving.
A key challenge is how to disseminate effectively the location-dependent
information (traffic conditions) and resources (parking spaces, Starbucks
Positioning Technologies in Location-Based Services 3
User moving
FIGURE 1.1
Basic representation of a generic infrastructure to allow the estimation of the user’s location.
1.2.1 Trilateration
Trilateration is a method used to determine the intersection of three sphere
surfaces given the centers and radii of the three spheres. The trilateration
principle is used specially for ToA and RSSI. By trilateration, the location
point of a mobile object is obtained through the intersection of three spheres,
or so-called beacons, provided that the centers and the radii of the spheres
are known. This technique usually relies on the use of the RSSI or ToA of a
signal between two nodes in order to obtain the radius of each sphere. In
the case of ToA, the clocks in both ends of the communication must be syn-
chronized; otherwise, the method to use is multilateration. Mathematically,
the estimated location in a three-dimensional (3D) space (x, y, z) will be the
solution of the following system of equations:
r2 2 = ( x − xc 2 ) + ( y − yc 2 ) + ( z − zc 2 ) ,
2 2 2
r3 2 = ( x − xc 3 ) + ( y − yc 3 ) + ( z − zc 3 ) ,
2 2 2
where (xc1, yc1, zc1), (xc2, yc2, zc2), and (xc3, yc3, zc3) represent the locations of the
three beacons to which a mobile object is referencing its location; these coor-
dinates are the centers of the spheres whose intersection will represent the
estimated location of the object. On the other hand, r1, r2, and r3 denote the
calculated distances from the object to each of the three beacons, represent-
ing the radii of the spheres.
1.2.2 Multilateration
Multilateration is a position estimation principle using measurements of
TDoA at (or from) three or more sites. Multilateration is also known as hyper-
bolic positioning and it refers to the process of locating an object through the
intersection of hyperboloids, which result either from accurately computing
the TDoA of a signal sent from that object and arriving at three or more
receivers, or by measuring the TDoA of a signal transmitted from three or
Positioning Technologies in Location-Based Services 7
t1 =
c
( x − xc 2 )2 + ( y − yc 2 ) + ( z − zc 2 )2
2
t2 = ,
c
( x − xc 3 )2 + ( y − yc 3 ) + (z − zc 3 )2
2
t3 = ,
c
( x − xc 4 )2 + ( y − yc 4 ) + (z − zc4 )2
2
t4 = .
c
( xc 4 , yc 4 , zc 4 ) = (0 , 0 , 0).
Now, by obtaining the TDoA between the signals arriving at the beacon at
the origin and those arriving at the other beacons:
Δt1 = t1 − t4 = ,
c
( x − xc 2 )2 + ( y − yc 2 ) + ( z − zc 2 )2 − ( x )2 + ( y) + ( z )2
2 2
Δt2 = t2 − t4 = ,
c
( x − xc 3 )2 + ( y − yc 3 ) + ( z − zc 3 )2 − ( x )2 + ( y) + ( z )2
2 2
Δt3 = t3 − t4 = .
c
8 Location-Based Services Handbook
1.2.3 Triangulation
In contrast to trilateration, which uses distances or absolute measurements
of time-of-flight from three or more sites, or with multilateration, which uses
measurements of TDoA at (or from) three or more sites, triangulation is the
process of determining the location point of an object by measuring angles to
the object’s location from two or more beacons of known locations at either
end of a fixed baseline, rather than measuring distances to the object’s loca-
tion point directly. The location point of the object can then be fixed as the
third point of a triangle with one known side and two known angles.
The triangulation principle is based on the laws of plane trigonometry,
which state that, if one side and two angles of a triangle are known, the other
two sides and angle can be readily calculated (Britannica 2009), and the loca-
tion of a point is generally determined by measuring angles from beacons of
known locations, and solving a triangle. The trigonometric laws of sines and
cosines ruling this process are (Poovendran et al. 2006):
b
C A
a c
B
A B C
Sines Rule: = = .
sin a sin b sin c
C 2 = A2 + B2 + 2 AB cos( c)
Cosines Rule: B2 = A2 + C 2 − 2 CA cos( b) .
A 2 = B2 + C 2 − 2B C cos( a)
terms of security, the use of ToA is considered the most appropriate method
(Clulow et al. 2006), since RSSI and AoA can be easily spoofed. Even if tri-
lateration (making use of ToA over short distances, typical in indoor envi-
ronments) may endure large errors due to synchronization limitations
(Krishnamachari 2005), it can still outperform RSSI techniques in terms of
precision and robustness (Poovendran et al. 2006). As a matter of fact, even
multilateration through TDoA can achieve higher accuracy than techniques
based on RSSI (Niculescu and Nath 2003).
Distance
Speed of signal = .
ToA
Acoustic and US signals, thanks to their relatively low speed, can deliver sub-
meter accuracy at the expense of security and dedicated hardware (Capkun
et al. 2008; Sedighpour et al. 2005). When ToA is used only with RF signals in
indoor environments, the high speed of these signals can help enhance the
security of the localization system, but very precise clock synchronization
between transmitters and receivers is required to avoid large errors. In par-
ticular, clock synchronization should be in the range of nanoseconds, which
could represent an important hurdle in terms of cost. An alternative could
10 Location-Based Services Handbook
A-GPS (assisted GPS) (Feng and Law 2002; Fuente 2007; Palenius
and Wigren 2009): mobile terminals equipped to receive GPS signals
relay the calculated position (or the captured information from the
satellites, in case the terminals do not compute their own location)
through the cellular network, where a location server will help the
mobile terminal to improve the accuracy and reduce the latency of
the location estimation to a few seconds (Lo Piccolo et al. 2007). Goze
et al. (2008) have analyzed the performance improvements brought
12 Location-Based Services Handbook
Regarding Wi-Fi, although the clock precision of typical IEEE 802.11 b and
g cards does not allow good precision to be obtained when ToA is applied for
localization, Gunther and Christian (2005) show that the round-trip time can
be useful under certain circumstances to estimate distances between nodes,
reporting errors of a few meters. Nevertheless, using round-trip times of a
packet to calculate distances to several Wi-Fi access points in order to esti-
mate locations is usually a software-based solution, since generic Wi-Fi plat-
forms lack high precision hardware for this type of measurement, thereby
making the results inaccurate (Loschmidt et al. 2007).
In relation to DTV, the Advanced Television System Committee (ATSC)
DTV signals include a new feature, a pseudorandom sequence that can be
used as an RF watermark, and that can be uniquely assigned to each DTV
transmitter for identification purposes (Wang et al. 2006). By means of rel-
atively simple signal processing, DTV signals from different transmitters
can be identified. Since the locations of the DTV transmitters are known,
this information can be used to locate a receiver. Similar techniques can be
applied to digital video broadcasting-terrestrial systems (Wang et al. 2006).
In comparison with GPS, DTV signals have a much higher effective radiated
power, and use lower frequencies, making them suitable for indoor localiza-
tion; however, co-channel interference may introduce large errors. Making
use of these signals, Wang et al. (2006) propose a new localization technique
leveraging the time synchronization between DTV transmitters and receiver.
In particular, the ToA of the signals from the DTV transmitters to the receiver
is measured with the help of the sync field of the ATSC signal frames. Possible
sources of errors include: clock error for the DTV stations and synchroniza-
tion errors between transmitters and receiver (these two types of errors could
be mitigated with the use of atomic clocks), errors due to multipath (could
be minimized by time averaging), and errors due to variable atmospheric
conditions (could be tackled with the use of empirical models for specific
weather and geographic conditions).
Active bats: developed in 1999 by AT&T (Harter et al. 1999) for in-
building localization, a network of US receptors connected to a cen-
tral RF transmitter is placed on the ceiling of rooms. The person or
object to be tracked must carry a small US transmitter called a bat.
When this bat receives a RF trigger signal from the central transmit-
ter, it broadcasts a US signal. At the same time that the bat receives
the RF trigger signal, all the US receptors receive an electromagnetic
pulse for synchronization. The time elapsed between the transmis-
sion of the US signal by the bat and the reception of it by the US
receptors is used to estimate the bat’s position. The system achieves
a precision of 9 cm, 95% of the time.
Cricket: similar to “active bats” but providing privacy, since the US
sensors placed on the ceiling are transmitters instead of receptors,
and consequently, the calculation of the location is performed at
the local level, within the mobile terminal. Moreover, the number
of required nodes is smaller. There are two versions of the system,
Cricket (Priyantha et al. 2000) and Cricket Compass (Balakrishnan
and Priyantha 2003), with precisions ranging from 2 to 30 cm.
14 Location-Based Services Handbook
Dolphin (Fukuju et al. 2003): with the intention to improve active bats
and “Cricket,” this system simplifies the configuration of the fixed
nodes through a distributed algorithm, achieving precisions of up
to 15 cm.
Hexamite (2009): making use of transmitters, receptors, and control-
lers, this system can work as active bats or Cricket; although a large
amount of fixed nodes is required, it can achieve precisions of 1 cm.
Cellular communications technologies can also make use of the TDoA prin-
ciple to estimate locations, and the two main techniques are uplink time dif-
ference of arrival (U-TDOA) and enhanced observed time difference (E-OTD):
systems, as shown in Ali and Nobel (2007) and references therein. Examples
of technologies working with this concept include:
Wi-Fi: Ali and Nobel (2007) show recent research in the use of 802.11
b/g standards for localization, focusing on a propagation-based
approach, reporting errors below 2 m.
Bluetooth: in comparison with Wi-Fi, the shorter range of Bluetooth
can provide more accurate positioning at the expense of higher
infrastructure requirements in terms of the number of base stations
(Hazas et al. 2003). Figueiras et al. (2005) present a propagation-
based indoor localization system making use of RSSI values, obtain-
ing errors around 3 m or lower in 90% of the cases analyzed.
RFID: one of the first projects developed with the idea of RFID tags,
SpotON (Hightower et al. 2000), uses RSSI to estimate distances
between readers and tags, and calculates the position of the object
through trilateration. It achieves a precision of around 3 m, very
dependent on the environment, and the time required to estimate
locations varies around 10–20 sec (Subramanian et al. 2008). An evo-
lution of the SpotON idea is presented in Landmarc (Ni et al. 2003),
using active RFID tags, and reporting precision errors above 1 m.
Nevertheless, these systems still suffer from long scanning and com-
puting latencies (Subramanian et al. 2008). Other recent localization
systems make use of a robot carrying an RFID reader that detects
RFID tags previously deployed in the area of interest at precisely
known locations. The location estimation errors can be reduced by
increasing the number of tags, or using optimum tag deployments
outperforming the conventional square patterns (Han et al. 2007).
Zigbee: Mendalka et al. (2008) show the practical implementation
of a localization algorithm for wireless sensor networks based on
Zigbee. Making use of RSSI values available in the transceiver chips
and the known positions of beacon nodes, locations are estimated
through trilateration. In the same sense, Noh et al. (2008) propose the
estimation of locations using trilateration, through the experimen-
tal calculation of a relationship between RSSI and distance for the
particular area of interest. Chen and Meng (2006) show that the use
of a theoretic signal propagation model and the elimination of the
costly training phase inherent to fingerprinting techniques can still
provide good accuracies (close to 1 m) if cooperation between nodes
is applied to improve the localization algorithm.
signals from beacon nodes. Several researchers rely on this approach because
of the inherent inaccuracies in RSSI, the risk of large errors due to synchro-
nization inexactitudes in ToA and TDoA when only RF signals are used in
indoor environments, or the extra hardware requirement of the latter tech-
niques when US signals are used to improve their accuracy. Nevertheless,
when AoA is used with RF signals, since the general radio propagation
function from where the angles are obtained is the same one employed in
the RSSI approach, AoA will share security vulnerabilities with RSSI, in
addition to the variability or possible errors in the antennas’ gains, which
could be maliciously used to spoof locations. Other possible sources of errors
include the fact that radio waves can experience a change of direction due to
differences in the conducting and reflecting properties of different types of
terrain, particularly land and water. From a general security point of view,
these systems could be easily spoofed by making use of reflections (Clulow
et al. 2006).
One of the first radio navigation systems, the radio direction finder
(Bowditch 2004), used a directional antenna to find the direction of broad-
casting antennas. Obtaining two directions and knowing the distance
between the two broadcasting antennas, the receiver’s position can be calcu-
lated, solving the triangle. A practical implementation of the AoA principle
for localization in wireless sensor networks can be found in Nasipuri and Li
(2002), where nodes estimate their locations with respect to a set of beacons
that cover the area in study with powerful directional antennas continu-
ously transmitting a unique signal on a narrow beam rotated at a constant
angular speed. The main drawbacks of this approach are the errors due to
the non-zero width of the directional antenna beam (could be acceptable for
beam widths within 15 degrees), and the costly implementation of the spe-
cial beacon nodes. Another example of the use of AoA for localization can be
found in Niculescu and Nath (2003), where it is also interesting to note that
the authors hint at the need for multimode operation in order to enhance the
performance of positioning algorithms, suggesting the combination of AoA
with ranging (distance estimation), compasses and accelerometers.
Computer vision and simultaneous localization and mapping (SLAM) can
be employed to estimate locations through triangulation, since it is possible
to calculate angles to landmark sightings with the help of cameras (Chen
et al. 2007). Computer vision makes use of a matching process with a pre-
compiled database of images (Kourogi and Kurata 2003). These systems are
appealing in the sense that they do not require users to wear any kind of tag
(Hazas et al. 2003). However, the main disadvantage of this approach is the
potential need for very large databases. For example, Chhaniyara et al. (2007)
present a self-localization approach aimed at vehicles that can place easily
recognizable markers in the environment, which are used by on-board com-
puter vision sensors to orient the vehicle. Furthermore, the light or visual
information captured by a camera (Hightower and Borriello 2001, 2) can also
be processed to significantly enhance accuracy (Darrell et al. 1998). SLAM is
Positioning Technologies in Location-Based Services 21
similar to the computer vision approach, but without the need for precom-
piled databases. In particular, SLAM is used by autonomous vehicles and
robots building up a map within an unknown environment while keeping
track of their own location. For example, Folkesson et al. (2006) describe the
use of SLAM in the context of robot navigation in an office using a camera.
Statistical techniques used in SLAM to handle localization uncertainties and
to improve signal-to-noise ratio include Kalman filters (Gutmann 2002; Chen
et al. 2007), particle filters (Marzorati et al. 2007; Elinas et al. 2006), and scan
matching of range data (Huang and Song 2008). In comparison with com-
puter vision systems making use of large databases, SLAM is not as reliable
and may accrue errors over distance and time, especially in poor visibility or
unfavorable light conditions (Ojeda and Borenstein 2007).
Within RF technologies, all those that can use arrays of antennas, either
at the base station or at the mobile terminal, are candidates for AoA local-
ization. The implementation of arrays of antennas at the base station
(e.g., cellular communications) could have a good return on investment
depending on factors such as the number of users or type of applications.
On the other hand, the implementation of arrays of antennas at the mobile
terminal would require the use of high enough frequencies to achieve spa-
tial diversity within the mobile terminal’s size constraints (Ramachandran
2007); in this sense, technologies such as UWB or Wimax represent good
candidates.
be corrected by some other system (Grewal et al. 2001), which makes them
ideal candidates to complement other navigation or localization systems
in a multimode approach. For example, Popa et al. (2008) analyze the com-
bination of INS and the Cricket localization system (Priyanta et al. 2000)
for indoor environments or GPS for outdoors. Actually, INS and GPS have
been successfully integrated not only in air navigation (Grewal et al. 2001),
but also in many other circumstances including train navigation (Mazl
and Preucil 2003). More recently, Zmuda et al. (2008) hint at the effective-
ness of integrating multiple localization methodologies to compensate for
the possible inadequacies of each other, and show that a joint approach of
RSSI together with INS is superior to the use of either method individu-
ally. In the same sense, Evennou and Marx (2006) and Wang et al. (2007)
examine the combination of WLAN fi ngerprinting localization with INS,
resulting in an improvement in localization accuracy, and Sczyslo et al.
(2008) study the combination of UWB localization and INS, showing an
increase in accuracy and robustness for the integrated solution. All these
recent multimode approaches are being facilitated by the progressive
price reduction of micro electrical mechanical systems (MEMS), which
are the basis for inertial sensors (Sczyslo et al. 2008).
1.4.2.2 Centroid
Anchor nodes of known location or beacons broadcast their position to
neighbors, which keep records of all received beacons. Making use of this
proximity information, a centroid model is applied to estimate the location
of the non-anchor nodes (Bulusu et al. 2000). The formula summarizing this
technique in three dimensions is:
⎛ N N N
⎞
⎜ ∑ ∑ ∑ z ⎟⎟
xi yi i
where (xi, yi, zi) represent the coordinates of each beacon, and N is the
number of beacons that can be listened from the node in study. One of
the main drawbacks of the algorithm proposed in Bulusu et al. (2000)
is the assumption that the reference nodes should be placed uniformly
throughout the network, thereby making the system prone to attacks.
∑ (x − x ) + ( y ) ( )
2 2 2
i j i − y j + zi − z j
i=1
di = N ,
∑h
j =1
j
where (xi, yi, zi) and (xj, yj, zj) represent the coordinates of different beacons,
and hj is the distance, in hops, from beacon j to beacon i. Niculescu and Nath
(2003) propose further variations of this method, working as an extension
of distance vector routing. In general, each node keeps a list of the beacon
nodes and its distances to them in number of hops. A similar approach is
also followed in Savarese et al. (2002). The main drawback of this technique
is that it only works for isotropic networks (same graph properties in all
directions).
location can be easily inferred without the need to apply complicated and
error-prone measurements or geometric principles. Several authors have
already hinted at the need to distinguish this type of technique as a sepa-
rate group (Hightower and Borriello 2001; Kaiser et al. 2009; Abielmona and
Groza 2007). Moreover, Anjum and Mouchtaris (2007) show the need to dis-
tinguish between two main types of localization techniques: “measurement
based” and “observation based”, since the vulnerabilities of each type are
different. Examples of these environment-based techniques are listed as
follows:
• The BTS informs the unknown location mobile phones about the
presence of located nodes. To prevent privacy issues, the identifica-
tion of located mobile phones will only reveal data about the physi-
cal channels they are using.
• The unknown location mobile phones will perform power measure-
ments on the frequencies and time slots corresponding to the located
phones and transmit these values to the network.
• The network estimates the position of the unknown location mobile
phones through “propagation model-based” trilateration. In fact,
the network considers the located phones as beacons and the dis-
tance in between beacons and mobile phones of unknown locations
can be estimated through power measurements and propagation
models.
ToA
RF
fToA(d,ToA) Trilateration ( intersection of spheres)
Signals: US distance (d) location
IR
Laser
n RF, IR, Laser
n = d Where
ToA {
n US, Sound ≈ 340 m/s
TDoA
Same physical principle as ToA, but no synchronization is required between Receiver and Transmitters.
Uses multilateration (intersection of hyperboloids) instead of trilateration.
RSSI
Pr = Pt l nG G
4pd t t
FIGURE 1.2
Measured magnitudes and associated geometric principles to estimate locations.
Positioning Technologies in Location-Based Services 33
angles from the signals on which the localization system is based. In general,
distances can be estimated through the ToA, TDoA, or RSSI of different types
of signals originating from or arriving at reference beacons. Directions to ref-
erence beacons can be obtained through the estimation of the AoA of the
signals. As shown in Figure 1.2, the same principle can be applied to different
technologies and/or signals of different nature.
Figure 1.3 summarizes the set of technologies that use either range-
based or proximity-based location estimation methods. Table 1.1 also
provides a comparison of common technologies employed in LBBs for
localization.
1.6 Conclusions
We have reviewed a set of positioning technologies suitable for LBSs. Apart
from the most commonly known GPS, the users of new communication ser-
vices can benefit from a growing range of available technologies that can be
leveraged to provide location estimation, whenever some minimum hard-
ware requirements are met. Our survey covers the three geometry principles
that are considered fundamental for positioning technologies. We describe
the most representative set of location sensing technologies, including range-
based localization methods, proximity-based localization methods, and
environment-based location estimation methods. We also discuss the role of
multimode localization techniques. We argue that an increase in the number
of localization alternatives can further improve the accuracy of localization
and enhance the quality of service for a variety of LBSs.
FIGURE 1.3
Common technologies used in geometry-based localization.
TABLE 1.1
34
to tens of system)
meters
Hyperbolic TDoA Usually Usually Medium Medium Poor (hundreds Gradually
navigation kilometers outdoors of meters) substituted by
systems GPS
Bluetooth RSSI 1–20 m Room, indoors Low Medium Good (meters) Cheap but high
fingerprinting, scalability costs
RSSI
propagation
model
35
(Continued)
TABLE 1.1 (Continued)
36
cheap
Positioning Technologies in Location-Based Services 37
Acknowledgments
This work is partially supported by a grant from Intel Research Council,
and grants from NSF Cybertrust program, NetSE program, and an IBM SUR
grant. The first author performed this work during his visit to Distributed
Data Intensive Systems Lab (DiSL), College of Computing, Georgia Tech,
under a Spain Government Scholarship.
References
3GPP TR 45.811, 2002, Feasibility study on uplink TDOA in GSM and GPRS, release 6,
2002, http://www.3gpp.org/ftp/specs/html-info/45811.htm.
Abielmona, R., and Groza, V., 2007, Indoor Sensor Networks: Localization Schemes,
Electrical and Computer Engineering, 2007. IEEE CCECE 2007. Canadian
Conference on, April 22–26, pp. 1078–81. (IEEE Press)
Ali, S., and Nobel, P., 2007, A Novel Indoor Location Sensing Mechanism for IEEE
802.11 b/g Wireless LAN, 4th Workshop on Positioning, Navigation and
Communication.
Andrew, 2009, http://www.commscope.com/andrew/eng/product/geometrix/ April.
Anjum, F., and Mouchtaris, P., 2007, Security for Wireless Ad Hoc Networks, Wiley-
Interscience, Hoboken, NJ.
Apple, 2009, http://www.apple.com, April.
Appleyard, S. F., Linford, R. S., Yarwood, P. J., and Grant G. A. A., 1988, Marine
Electronic Navigation, Routledge, New York.
Armesto, L., and Tornero, J., 2006, Robust and Efficient Mobile Robot Self Localization
using Laser Scanner and Geometrical Maps, Proceedings of the 2006 IEEE/RSJ
International Conference on Intelligent Robots and Systems, Beijing, October.
Bachrach, J., Nagpal, R., Salib, M., and Shrobe, H., 2003, Experimental results and
theoretical analysis of a self-organizing global coordinate system for ad hoc sen-
sor networks, Telecommunications Systems Journal, Special Issue on Wireless System
Networks 26 (2–4): 213–24.
Bahl, P., and Padmanabhan, V., 2000, RADAR: An In-Building RF-based User Location
and Tracking System, Proceeding of the IEEE Infocom.
Bahl, P., Padmanabhan, V., and Balachandran, A., 2000, Enhancements to the RADAR
user location and tracking system, Technical Report MSR-TR-00-12, Microsoft
Research, February.
Balakrishnan, H., and Priyantha, N., 2003, The Cricket Indoor Location System:
Experience and Status, ACM Int. Workshop on Location-Aware Computing (ubicomp
2003), vol. 1, pp. 7–9. (ACM Press)
Barahim, M., Doomun, M., and Joomun, N., 2007, Low-Cost Bluetooth Mobile
Positioning for Location-based Application, Internet, 2007. ICI 2007. 3rd IEEE/
IFIP International Conference in Central Asia on, September 26–28, pp. 1–4. (IEEE
Press)
38 Location-Based Services Handbook
Bertoni, H. L., and Suh, J. W., 2005, Ray Simulations for Evaluating Different Methods
used to Locate Mobiles in Cities, Antennas and Propagation Society International
Symposium, 2005 (IEEE Press), vol. 4B, July 3–8, pp. 401–4.
Borkowski, J., Niemela, J., and Lempiainen, J., 2004, Enhanced Performance of Cell
ID+RTT by Implementing Forced Soft Handover Algorithm, Vehicular Technology
Conference, 2004. VTC 2004, 2004 (IEEE Press) 60th, vol. 5, September 26–29,
pp. 3545–49.
Bouet, M., and Pujolle, G., 2008, 3-D Localization Schemes of RFID Tags with Static
and Mobile Readers, Lecture Notes in Computer Science, No. 4982, pp. 112–123.
(Springer Verlag)
Bowditch, N. 2004, The American Practical Navigator, Paradise Cay Publications,
Arcata, CA.
Brida, P., Cepel, P., and Duha, J., 2005, Geometric Algorithm for Received Signal
Strength Based Mobile Positioning, Proc. of Czech and Slovak Technical Universities
and URSI Committees, vol. 14, No. 2.
Britannica, 2009, www.britannica.com, April.
Broustis, I., Faloutsos, M., and Krishnamurthy, S., 2006, Overcoming the Challenge
of Security in a Mobile Environment, Conference Proceedings of the 25th IEEE
International Performance, Computing, and Communications Conference, pp. 617–22.
(IEEE Presss)
Brscic, D., and Hashimoto, H., 2008, Mobile robot as physical agent of intelligent
space, Journal of Computing and Information Technology 17 (1): 81–94. (International
Science Press)
Bshara, M., Deblauwe, N., and Biesen, L., 2008, Localization in Wimax Networks
Based on Signal Strength Observations, IEEE Globecom08, December.
Bulusu, N., Heidemann, J., and Estrin, D., 2000, GPS-less low-cost outdoor localiza-
tion for very small devices, IEEE Personal Communications [see also IEEE Wireless
Communications] 7 (5): 28–34.
Capkun, S., Rasmussen, K., Cagalj, M., and Srivastava, M., 2008, Secure location
verification with hidden and mobile base stations, IEEE Transactions on Mobile
Computing 7 (4): 470–83.
Chen, W., and Meng, X., 2006, A Cooperative Localization Scheme for Zigbee-
based Wireless Sensor Networks, Networks. ICON ‘06. 14th IEEE International
Conference on, vol. 2, pp. 1–5. (IEEE Press)
Chen, Z., Samarabandu, J., and Rodrigo, R., 2007, Recent advances in simultaneous
localization and map-building using computer vision, Advanced Robotics 21
(3–4): 233–65.
Chhaniyara, S., Althoefer, K., Zweiri, Y., and Seneviratne, L., 2007, A Novel Approach
for Self-Localization based on Computer Vision and Artificial Marker Deposition,
Networking, Sensing and Control, 2007 IEEE International Conference on, April,
15–17, pp. 139–44. (IEEE Press)
Chieh, L., et al., 2008, Reliability improvement for an RFID-based psychiatric patient
localization system, Computer Communications 31 (10): 2039–48.
Chintalapudi, K., Dhariwal, A., Govindan, R., and Sukhatme, G., 2004, Localization
Using Ranging and Sectoring, Proceedings of IEEE INFOCOM, March.
Clulow, J., Hancke, G., Kuhn, M., and Moore, T., 2006, So Near and Yet so Far: Distance-
bounding Attacks in Wireless Networks, European Workshop on Security and Privacy
in Ad-Hoc and Sensor Networks (ESAS), September, Hamburg, Germany, vol. 4357,
pp. 83–97. Lecture Note in Computer Science (LNCS 4572), Springer Verlag.
Positioning Technologies in Location-Based Services 39
Darrell et al., 1998, Integrated Person Tracking using Stereo, Color, and Pattern
Detection, IEEE Proceedings of Int. Conf. Computer Vision and Pattern Recognition
(CVPR 1998), pp. 601–608. (IEEE Press)
Dempster, A., Li, B., and Quader, I., 2008, Errors in Deterministic Wireless
Fingerprinting Systems for Localization, Proceedings of the 3rd International
Symposium on Wireless Pervasive Computing, (ISWPC 2008), 7–9 May, 2008,
pp. 111–15. (IEEE Press)
Doherty, L., Pister, K., and Ghaoui, L., 2001, Convex Position Estimation in Wireless
Sensor Networks, Proceedings of IEEE INFOCOM, April.
Ekahau, 2009, http://www.ekahau.com, April.
Elinas, P., Sim, R., and Little, J., 2006, SLAM: Stereo Vision SLAM using the Rao-
Blackwellised Particle Filter and a Novel Mixture Proposal Distribution,
Robotics and Automation, 2006. Proceedings of the 2006 IEEE International
Conference on Robotics and Automation (ICRA 2006), May 15-19, 2006, Orlando,
Florida, USA. pp. 1564–70. (IEEE Press)
ETSI Technical Specification GSM 03.71, Release 1999, Location Services (LCS);
Functional description.
Evennou, F., and Marx, F., 2006, Advanced integration of Wi-Fi and inertial naviga-
tion systems for indoor mobile positioning, EURASIP Journal on Applied Signal
Processing 2006 (1): 164.
Fang, S., and Lin, T., 2008, Indoor location system based on discriminant-adaptive
neural network in IEEE 802.11 environments, IEEE Transactions on Neural
Networks 19 (11): 1973–78.
Feng, S., and Law, C., 2002, Assisted GPS and its Impact on Navigation in Intelligent
Transportation Systems. Proceedings of the IEEE 5th International Conference on,
pp. 926–31.
Figueiras, J., Schwefel, H.-P., and Kovacs, I., 2005, Accuracy and Timing Aspects of
Location Information based on Signal-strength Measurements in Bluetooth,
Personal, Indoor and Mobile Radio Communications. PIMRC 2005. IEEE 16th
International Symposium on, vol. 4, September 11–14, pp. 2685–90.
Folkesson, J., Jensfelt, P., and Christensen, H., 2005, Vision SLAM in the Measurement
Subspace, Robotics and Automation. ICRA 2005. Proceedings of the 2005 IEEE
International Conference on, April 18–22, pp. 30–35.
Fontana, R., 2004, Recent system applications of short-pulse ultra-wideband (UWB)
technology, IEEE Transactions on Microwave Theory and Techniques 52 (9):
2087–2104.
——— 2007, Ultra Wideband Technology – Obstacles and Opportunities, Plenary
Talk, European Microwave Conference, October 8, 2007, Munich, Germany.
Fontana, R., Foster, L., Fair, B., and Wu, D., 2007, Recent Advances in Ultra Wideband
Radar and Ranging Systems. IEEE International Conference on Ultra-Wideband,
ICUWB, pp. 19–25.
Fontana, R., and Richley, E., 2007, Observations on Low Data Rate, Short Pulse
UWB Systems. 2007 IEEE International Conference on Ultra-Wideband, ICUWB,
pp. 334–38.
Fox, D., Burgard, W., Kruppa, H., and Thrun, S., 2000, A probabilistic approach to
collaborative multi-robot localization, Autonomous Robots 8 (3): 325–44.
Fuente, C., 2007, Use of Assisted GPS for Vehicle and Trailer Tracking Systems, The
Institution of Engineering and Technology Seminar on Location Technologies,
December 6, 2007. pp. 1–16. (IET, London)
40 Location-Based Services Handbook
Fukuju, Y., Minami, M., Morikawa, H., and Aoyama, T., 2003, DOLPHIN: An
Autonomous Indoor Positioning System in Ubiquitous Computing Environment,
Software Technologies for Future Embedded Systems. IEEE Workshop on, May
15–16, pp. 53–56.
Ghilani, C. D., and Wolf, P. R., 2008, Elementary Surveying: An Introduction to Geomatics,
Prentice Hall, Upper Saddle River, NJ.
Google Latitude 2009, www.google.com/latitude, April.
Goze, T., Bayrak, O., Barut, M., and Sunay, M., 2008, Secure User-Plane Location
(SUPL) Architecture for Assisted GPS (A-GPS), Proceedings of the 4th Advanced
Satellite Mobile Systems Conference (ASMS 2008), August 26–28, 2008, pp. 229–
34. (ASMS organization)
Grewal, M., Weill, L., and Andrews, A., 2001, Global Positioning Systems, Inertial
Navigation, and Integration, Wiley, New York.
GSM world, 2009, http://www.gsmworld.com/newsroom/market-data/market_
data_summary.htm, April.
Gunther, A., and Christian, H., 2005, Measuring Round Trip Times to Determine the
Distance between WLAN Nodes, Proceedings of Networking, Lecture Notes in
Computer Science (LNCS volume 3462), (Springer 2005), pp. 768–79.
Gutmann, J., 2002, Markov-Kalman Localization for Mobile Robots, Proceedings
of the 16th International Conference on Pattern Recognition (ICPR 2002), vol. 2,
August 11–15, 2002, pp. 601–4. (IEEE Computer Society)
Haeberlen, A., Flannery, E., Ladd, A., Rudys, A., Wallach, D., and Kavraki, L., 2004,
Practical Robust Localization over Large-scale 802.11 Wireless Networks, ACM
MOBICOM, September, pp. 70–84. (ACM Press)
Halonen, T., García R., and Melero, J., 2003, GSM, GPRS and EDGE Performance:
Evolution Towards 3G/UMTS, Wiley.
Han, S., Lim, H., and Lee, J., 2007, An efficient localization scheme for a differen-
tial-driving mobile robot based on RFID system, IEEE Transactions on Industrial
Electronics 54: 3362–69.
Harter, A., et al. 1999, The Anatomy of a Context-Aware Application, Proceedings of
the 5th Annual ACM International Conference on Mobile Computing and Networking
(MobileCom), pp. 59–68.
Hazas, M., Scott, J., and Krumm, J., 2004, Location-aware computing comes of age,
Computer 37 (2): 95–97.
He, T., Huang, C., Blum, B., Stankovic, J., and Abdelzaher, T., 2003, Range-free localiza-
tion schemes for large scale sensor networks, MobiCom ‘03. Proceedings of the
9th Annual International Conference on Mobile Computing and Networking.
Hexamite 2009, http://www.hexamite.com.
Hightower, J., and Borriello, G., 2001a, Location sensing techniques, Technical Report,
University of Washington, CSE-01-07-01, August.
Hightower, J., and Borriello, G., 2001b, Location systems for ubiquitous computing,
Computer 34 (8): 57–66.
——— 2001, Location systems for ubiquitous computing, Computer 34 (8): 57–66.
Hightower, J., Want, R., and Borriello, G., 2000, SpotON: An Indoor 3D Location
Sensing Technology Based on RF Signal Strength, UW CSE 2000-02-02, University
of Washington, Seattle, WA, February.
Huang, F., and Song, K., 2008, Vision SLAM using Omni-directional Visual Scan
Matching, Intelligent Robots and Systems. IROS 2008. IEEE/RSJ International
Conference on, September 22–26, pp. 1588–93.
Positioning Technologies in Location-Based Services 41
Jimenez, A., Seco, F., Prieo, C., and Roa, J., 2005, Tecnologías sensoriales de local-
ización para entornos inteligentes, I Congreso Español de Informática, UCAmI 05,
September, pp. 1–11.
Kaiser, T., Oppermann, I., and Porcino, D., 2009, Editorial: Wireless location technolo-
gies and applications, EURASIP Journal on Applied Signal Processing 2006: 153.
King, T., Kopf, S., Haenselmann, T., Lubberger, C., and Effelsberg, W., 2006,
COMPASS: A Probabilistic Indoor Positioning System Based on 802.11
and Digital Compasses, 1st ACM International Workshop on Wireless Network
Testbeds, Experimental Evaluation and CHaracterization (WiNTECH), September,
pp. 34–40.
Kourogi, M., and Kurata, T., 2003, Personal Positioning Based on Walking Locomotion
Analysis with Self-contained Sensors and a Wearable Camera, Proceedings
Second IEEE and ACM International Symposium on Mixed and Augmented Reality,
October 7–10, pp. 103–12. (IEEE Press)
Krishnamachari, B., 2005, Networking Wireless Sensors, Cambridge University Press,
New York.
Krumm, J., Cermak, G., and Horvitz, E., 2003, RightSPOT: A Novel Sense of Location
for Smart Personal Objects, Proceedings of ACM Conference on Ubiquitous
Computing (Ubicomp 2003), pp. 1–8. (ACM Press)
Kunczier, H., and Anegg, H., 2004, Enhanced Cell ID Based Terminal Location for
Urban Area Location Based Applications, Proceedings of the 1st Int. Conf. on
Consumer Communications and Networking Conference (CCNC 2004). January 5–8,
pp. 595–99. (IEEE Press).
LaMarca, A., Hightower, J., Smith, I., and Consolvo, S., 2005, Self-Mapping in 802.11
Location Systems, Proceedings of the ACM Conference on Ubiquitous Computing
(Ubicomp 2005), vol. 3660, August 2005.
Laser Based Listening Systems, 2009, http://www.dpl-surveillance-equipment.
com/2181255.html, April.
Lazos, L., and Poovendran, R., 2005, SeRLoc: Robust localization for wireless sensor
networks, ACM Transactions on Sensor Networks 1 (1): 73–100.
——— 2006, HiRLoc: Hi-resolution robust localization for wireless sensor networks,
IEEE JSAC, Special Issue on Wireless Security 24 (2): 233–46.
Leinmuller, T., Schoch, E., and Kargl, F., 2006, Position verification approaches for
vehicular ad hoc networks, IEEE Wireless Communications 13 (5): 16–21.
Lin, C., Song, K., Kuo, S., Tseng, Y., and Kuo, Y., 2006, Visualization Design for
Location-Aware Services, Systems, Man and Cybernetics. SMC ‘06. IEEE
International Conference on, vol. 5, October 8–11, pp. 4380–85.
Lo Piccolo, F., 2008, A New Cooperative Localization Method for UMTS Cellular
Networks, Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008.
IEEE, November 30 to December 4, pp. 1–5.
Lo Piccolo, F., Melazzi, N., and Giustiniano, D., 2007, Power-measurement-based
Relative Localization in GSM Cellular Networks, International Workshop on
Satellite and Space Communications, 2007 (IWSSC ’07), September, 13–14, pp.
294–98. (IEEE Press)
Loschmidt, P., Gaderer, G., and Sauter, T., 2007, Clock Synchronization for Wireless
Positioning of COTS Mobile Nodes, Precision Clock Synchronization for
Measurement, Control and Communication, Proceedings of the IEEE
International Symposium on Personal and Commercial Spaceflight (ISPCS 2007),
October 1–3, 2007, pp. 64–69. (IEEE Press).
42 Location-Based Services Handbook
Mahtab, A., Hien, N., Yunye, J., and Wee-Seng, S., 2007, Indoor Localization Using
Multiple Wireless Technologies, IEEE International Conference on Mobile Adhoc
and Sensor Systems, 2007 (MASS 2007), October 8–11, pp. 1–8. (IEEE Press)
Marzorati, D., Matteucci, M., and Sorrenti, D., 2007, Particle-based Sensor Modeling
for 3D-Vision SLAM, 2007 IEEE International Conference on Robotics and
Automation, April 10–14, pp. 4801–6. (IEEE Press)
Mazl, R., and Preucil, L., 2003, Sensor Data Fusion for Inertial Navigation of Trains
in GPS-dark Areas, Proceedings of IEEE Intelligent Vehicles Symposium (IV 2003),
2003, June 9–11, pp. 345–50. (IEEE Press)
Mendalka, M., Kulas, L., and Nyka, K., 2008, Localization in Wireless Sensor Networks
based on ZigBee Platform, Proceedings of the 17th International Conference on
Microwaves, Radar and Wireless Communications (MIKON 2008), May 19–21,
2008, pp. 1–4. (IEEE Press)
Mineno, H., Hida, K., Mizutani, M., Miyauchi, N., Kusunoki, K., Fukuda, A., and
Mizuno, T., 2005, Position Estimation for Goods Tracking System Using Mobile
Detectors, Proceedings of Knowledge-Based Intelligent Information and
Engineering Systems, Lecture Notes in Computer Science (LNCS 3681), 2005.
pp. 431–37. (Springer)
Multispectral Solutions, 2009, http://www.multispectral.com, April.
Nasipuri, A., and Li, K., 2002, A directionality based location discovery scheme for
wireless sensor networks, Proceedings of the 1st ACM international Workshop on
Wireless Sensor Networks and Applications, September, pp. 105–11.
Ni, L. M., Liu, Y., Yiu, C., and Patil, A. P., 2003, LANDMARC: Indoor Location Sensing
Using Active RFID, Pervasive Computing and Communications, 2003. (PerCom
2003). Proceedings of the First IEEE International Conference on March 23–26, pp.
407–15.
Niculescu, D., and Nath, B., 2003, DV based positioning in ad hoc networks,
Telecommunication Systems 22 (1–4): 267–280. (Springer Netherlands)
Noh, A.S.-I., Lee, W. J., and Ye, J. Y., 2008, Comparison of the Mechanisms of the
Zigbee’s Indoor Localization Algorithm, Proceedings of the Ninth ACIS
International Conference on Software Engineering, Artificial Intelligence,
Networking, and Parallel/Distributed Computing (SNPD ’08), August 6–8,
2008, pp. 13–18. (IEEE Press)
Ojeda, L., and Borenstein, J., 2007, Personal Dead-reckoning System for GPS-denied
Environments, IEEE International Workshop on Safety, Security and Rescue
Robotics (SSRR 2007), September 27–29, 2007, pp. 1–6. (IEEE Press)
Orr, R. J., and Abowd, G. D., 2000, The smart floor: A mechanism for natural user
identification and tracking, GVU Technical Report, GIT-GVU-00-02; http://hdl.
handle.net/1853/3321.
Otsason, V., Varshavsky, A., Lamarca, A., and De Lara, E., 2005, Accurate GSM Indoor
Localization, Proceedings of ACM UbiComp 2005, pp. 141–58.
Palenius, T., and Wigren, T., 2009, Optimized search window alignment for A-GPS, IEEE
Transactions on vehicular technology. Oct. 2009, Volume: 58 Issue 8, pp. 4670 – 4675.
Patwari, N., O’Dea, R., and Wang, Y., 2001, Relative Location in Wireless Networks,
Proceedings of IEEE Vehicular Technology Conference (VTC-Spring), May.
Popa, M., Ansari, J., Riihijarvi, J., and Mahonen, P., 2008, Combining Cricket System
and Inertial Navigation for Indoor Human Tracking, Proceedings of 2008 IEEE
Wireless Communications and Networking Conference (WCNC 2008). pp. 3063–68.
(IEEE Press)
Positioning Technologies in Location-Based Services 43
Priyantha, N., Chakraborty, A., and Balakrishnan, H., 2000, The Cricket Location-
Support System, Proceedings of the Sixth Annual ACM International Conference
on Mobile Computing and Networking (MOBICOM), August.
Proc, J., 2007, Hyperbolic Radionavigation Systems, http://www.jproc.ca/hyperbolic/.
Poovendran, R., Wang, C., and Roy, S., 2006, Secure Localization and Time Synchronization
for Wireless Sensor and Ad Hoc Networks, Springer, New York.
Ramachandran, A., 2007, Diversity Techniques for Signal-Strength based Indoor
Location Determination, Master of Science Thesis, University of Missouri-Rolla.
Rodrıguez, M., Pece, J., and Escudero, C., 2006, Blueps: Sistema de localización
en interiores utilizando Bluetooth, Departamento de Electrónica e Sistemas
Universidade da Coruña.
Roxin, A., Gaber, J., Wack, M., and Nait-Sidi-Moh, A., 2007, Survey of Wireless
Geolocation Techniques, 2007 IEEE Globecom Workshops, November 26–30,
pp. 1–9. (IEEE Press)
Sanpechuda, T., and Kovavisaruch, L., 2008, A Review of RFID Localization:
Applications and Techniques, Proceedings of the IEEE 5th International Conference
on Electrical Engineering/Electronics, Computer, Telecommunications and
Information Technology (ECTI-CON 2008), vol. 2, May 14–17, pp. 769–72.
Sastry, N., Shankar, U., and Wagner, D., 2003, Secure Verification of Location Claims,
Proceedings of the Workshop on Wireless Security, pp. 1–10. (IEEE Press)
Savarese, C., Rabaey, J., and Langendoen, K., 2002, Robust Positioning Algorithms
for Distributed Ad-Hoc Wireless Sensor Networks, Usenix 2002 Annual Technical
Conference, pp. 317–27. (Usenix Press)
Sczyslo, S., Schroeder, J., Galler, S., and Kaiser, T., 2008, Hybrid Localization using
UWB and Inertial Sensors, IEEE International Conference on Ultra-Wideband
(ICUWB 2008), vol. 3, September 10–12, 2008, pp. 89–92. (IEEE Press)
Sedighpour, S., Capkun, S., Ganeriwal, S., and Srivastava, M., 2005, Distance
Enlargement and Reduction Attacks on Ultrasound Ranging, Proceedings of the
3rd International Conference on Embedded Networked Sensor Systems, San Diego,
CA, pp. 312–12. (IEEE Press)
Siddiqui, F., 2004, A Hybrid Framework for Localization and Convergence in Indoor
Environments, IEEE Engineering, Science and Technology, Student Conference,
vol. 2 December, pp. 12–18. (IEEE Press)
Singelee, D., and Preneel, B., 2005, Location Verification using Secure Distance
Bounding Protocols, 2nd IEEE International Conference on Mobile Ad-hoc and
Sensor Systems (MASS 2005), pp. 834–40. (IEEE Press)
Singh, K., and Ismail, M., 2005, OTDOA Location Determining Technology for
Universal Intelligent Positioning System (UIPS) Implementation in Malaysia,
Networks, 2005. Jointly held with the 2005 IEEE 7th Malaysia International
Conference on Communication. 2005, vol. 2, November 16–18. (IEEE Press)
Singh, R., Gandetto, M., Guainazzo, M., Angiati, D., and Ragazzoni, C., 2004, A novel
positioning system for static location estimation employing WLAN in indoor
environment, IEEE PIMRC 3: 1762–66.
Skolnik, M. I., 2008, Radar Handbook, McGraw-Hill Professional, New York.
Skyhook Wireless, 2009, http://www.skyhookwireless.com/howitworks/, April.
Spirito, M., Poykko, S., and Knuuttila, O., 2001, Experimental Performance of
Methods to Estimate the Location of Legacy Handsets in GSM, Proceedings of
the IEEE Int. Conf. on Vehicular Technology (VTC 2001), October 7–11, pp. 2716–20.
(IEEE Press).
44 Location-Based Services Handbook
Stoleru, R., He, T., Stankovic, A., and Luebke, D., 2005, A High-accuracy Low Cost
Localization System for Wireless Sensor Networks, ACM Conference on
Embedded Networked Sensor Systems (SenSys) (2005).
Stoleru, R., He, T., and Stankovic, A., 2004, Walking GPS: A Practical Localization
System for Manually Deployed Wireless Sensor Networks. ZEEE Workshop on
Embedded Networked Sensors (EmNetS) (2004).
Subramanian, S. P., Sommer, J., Schmitt, S., and Rosenstiel, W., 2008, RIL — Reliable
RFID-based Indoor Localization for Pedestrians, Software, Proceedings of
the IEEE 16th International Conference on Telecommunications and Computer
Networks (SoftCOM 2008), September 25–27, 2008, pp. 218–22. (IEEE Press).
Tadakamadla, S., 2006, Indoor Local Positioning System For ZigBee, Based on RSSI,
M.Sc. Thesis report, Mid Sweden University, October.
Thongthammachart, S., and Olesen, H., 2003, Bluetooth Enables In-door Mobile
Location Services Proceedings of the 57th IEEE Semiannual Vehicular Technology
Conference (VTC 2003), vol. 3, April 22–25, 2003, pp. 2023–27. (IEEE press)
Tippenhauer, N., and Capkun, S., 2008, UWB-based secure ranging and localization,
Technical Report 586, ETH Zürich, System Security Group, January.
Tippenhauer, N., Rasmussen, K., Pöpper, C., and Srdjan, C., 2008, iPhone and
iPod location spoofing: Attacks on public WLAN-based positioning systems,
Technical Report 599, ETH Zürich, System Security Group, April.
Ubisense 2009, http://www.ubisense.net, April.
Varshavsky, A., LaMarca, A., Hightower, J., and Lara, E., 2007, The SkyLoc Floor
Localization System, Proceedings of the Fifth Annual IEEE International
Conference on Pervasive Computing and Communications (PerCom ’07), March
19–23, 2007, pp. 125–34. (IEEE Press).
Varshavsky, A., Lara, E., Hightower J., Lamarca, A., and Otsason, V., 2007, GSM
indoor localization, Pervasive and Mobile Computing 3 (6): 698–720. (Springer)
Vora, A., and Nesterenko, M., 2006, Secure location verification using radio broadcast,
IEEE Transactions on Dependable and Secure Computing 3 (4): 377–85.
Wang, S., Green, M., and Malkawi, M., 2001, Analysis of Downlink Location Methods
for WCDMA and cdma2000, Vehicular Technology Conference, 2001. VTC 2001
Spring. IEEE VTS 53rd, vol. 4, May 6–9, pp. 2580–84.
Wang, S., Min, J., and Yi, B., 2008, Location Based Services for Mobiles: Technologies
and Standards, IEEE International Conference on Communications, Beijing,
China. 2008. (IEEE Press).
Wang, S., and Wylie-Green, M., 2004, Geolocation Propagation Modeling for Cellular-
based Mobile Positioning, Vehicular Technology Conference, 2004. VTC2004-Fall.
2004 IEEE 60th, vol. 7, September 26–29, pp. 5155–59.
Wang, X., Wu, Y., and Chouinard, J., 2006, A new position location system using DTV
transmitter identification watermark signals, EURASIP Journal on Applied Signal
Processing 2006: 155–65.
Want, R., Hopper, A., Falcao, V., and Gibbons J., 1992, The Active Badge location sys-
tem, ACM Transactions on Information Systems 10 (1): 91–102.
Xiaopai, B., Wenhai, G., and Zuwang, R., 2003, E-OTD Positioning Algorithm
Performance Improvement, Proceedings of the International Conference on
Communication Technology Proceedings (ICCT 2003), vol. 2, April 9–11, 2003,
pp. 953–57. (IEEE Press).
Youssef, M., 2004, HORUS: A WLAN-based indoor location determination system,
Ph.D. Dissertation, University of Maryland.
Positioning Technologies in Location-Based Services 45
Youssef, M., and Agrawala, A., 2004, Handling samples correlation in the horus sys-
tem, IEEE INFOCOM 2: 1023–31.
Zhao, H., and Shibasaki, R., 2005, A novel system for tracking pedestrians using mul-
tiple single-row laser-range scanners, IEEE Transactions on Systems, Man and
Cybernetics – Part A: Systems and Humans 35 (2): 283–91.
Zmuda, M., Elesev, A., and Morton, Y., 2008, Robot Localization Using RF and Inertial
Sensors, Proceedings of the 2008 IEEE National Aerospace and Electronics
Conference (NAECON 2008), July 16–18, 2008, pp. 343–48. (IEEE Press).
2
Wireless Location Technology
in Location-Based Services
CONTENTS
2.1 Introduction .................................................................................................. 48
2.2 Study on the Estimation of Position-Related Parameters (or Data
Collection) ..................................................................................................... 49
2.2.1 Cell of origin ..................................................................................... 50
2.2.2 Time of arrival .................................................................................. 51
2.2.3 Time difference of arrival ............................................................... 52
2.2.4 Angle of arrival ................................................................................ 53
2.2.5 Received signal strength ................................................................. 55
2.3 Infrastructure of Positioning in Cellular Network ................................. 56
2.3.1 Cellular network fundamentals .................................................... 57
2.3.2 Classification of positioning infrastructures ............................... 58
2.3.2.1 Integrated and stand-alone infrastructures .................. 58
2.3.2.2 Network-based and terminal-based positioning ......... 58
2.3.2.3 Satellites, cellular, and indoor infrastructures ............. 59
2.4 Cellular Networks........................................................................................ 59
2.4.1 Global positioning system solution ............................................... 60
2.4.2 Cell identification ............................................................................. 60
2.4.3 Problems and solutions in cellular network positioning ........... 60
2.4.3.1 Narrowband networks ..................................................... 61
2.4.3.2 Code division multiple access ......................................... 61
2.4.3.3 Global system for mobile communications ................... 61
2.5 Precision and Accuracy............................................................................... 62
2.5.1 Study of the multi-path promulgate..............................................63
2.5.2 Non-line-of-sight promulgate ........................................................63
2.5.3 Code division multiple access multi-address access
interference .......................................................................................63
2.5.4 Other sources of positioning error ................................................64
2.6 Conclusion ....................................................................................................64
References...............................................................................................................64
47
48 Location-Based Services Handbook
2.1 Introduction
Over the last decade, wireless communications has expanded significantly,
with an annual increase of cellular subscribers averaging about 40%
worldwide. Currently, it is estimated that there are between 36 and 46 mil-
lion cellular users in the United States alone, representing over 20% of the
U.S. population. In the next few years, it is expected that a total of about
200 million wireless telephones will be in use worldwide, and that in the
next 10 years, the demand for mobility will make wireless technology the
main source for voice communication, with a total market penetration of
50%–60% [4].
Meanwhile, depending on wireless positioning, geography information
systems (GIS), application middleware, application software, and support,
the location-based service (LBS) is in use in every aspect of our lives. In par-
ticular, the growth of mobile technology makes it possible to estimate the
location of the mobile station (MS) in the LBS. In the LBS, we tend to use
positioning technology to register the movement of the MS and use the gen-
erated data to extract knowledge that can be used to define a new research
area that has both technological and theoretical underpinnings.
Nowadays, the subject of wireless positioning in the LBS has drawn con-
siderable attention. While wireless service systems aim to provide support
to the tasks and interactions of humans in physical space, accurate loca-
tion estimation facilitates a variety of applications that include areas of per-
sonal safety, industrial monitoring and control, and a myriad of commercial
applications, e.g., emergency localization, intelligent transport systems,
inventory tracking, intruder detection, tracking of fire-fighters and miners,
and home automation. Besides applications, various methods are used for
obtaining location information from a wireless link. However, although a
variety of different methods may be employed for the same type of appli-
cation, factors including complexity, accuracy, and environment play an
important role in determining the type of distance measurement system
applied for a particular use [3].
In the wireless systems in the LBS, transmitted signals are used in posi-
tioning. By using characteristics of the transmitted signal itself, the location
estimation technology can estimate how far one terminal is from another or
estimate where that terminal is located. In addition, location information can
help optimize resource allocation and improve cooperation between wire-
less networks [1–3].
The remainder of the chapter is organized as follows. In Section 2.2, esti-
mation of position-related parameters (or data collection) is studied. Section
2.3 introduces cellular network fundamentals. In Section 2.4, the cellular net-
work, including fundamentals, cellular LBSs, etc., will be applied. Section 2.5
shows the location precision of the systems. Section 2.6 provides conclusion
of the whole chapter.
Wireless Location Technology in Location-Based Services 49
(a)
(b)
FIGURE 2.1
(a) Direct positioning, (b) two-step positioning [1].
50 Location-Based Services Handbook
in the first step, the position of the target node is estimated. Additionally,
in the second step of position estimation, techniques such as fingerprint-
ing approaches, geometric or statistical, can be used because of the accuracy
requirements and system constraints [1].
In addition, in considering how to determine the location of a mobile
user, the system can also be divided into two categories: tracking and
positioning.
If a sensor network determines the location, we talk about tracking, while
if the wireless system determines the location itself, we talk about position-
ing. When using tracking, users have to wear a specific tag that allows the
sensor network to track the user’s position. The location information is first
available in the sensor network; and in the mobile system, the location infor-
mation is directly available and does not have to be transferred wirelessly
when using positioning. In addition, the positioning system does not have to
consider privacy problems because the location information is not readable
by other users.
Systems using tracking as well as positioning are based on the following
basic techniques, or a combination of these techniques.
d3
BS3 (x3,y3)
MS(x,y)
d2
d1
BS1(0,0) BS2(0,x2)
FIGURE 2.2
Determine the location of a target mobile station using TOA.
52 Location-Based Services Handbook
d1 = x 2 + y 2 , (2.1)
d2 = (x − x2 ) + y 2 ,
2
(2.2)
d3 = (x − x3 ) + ( y − y 3 ) .
2 2
(2.3)
These equations can be solved directly for x, y, which are the coordinates
of the MS:
d12 − d 22 + x22
x= , (2.4)
2 ⋅ x2
d1 d2
FIGURE 2.3
A TDOA measurement defines a hyperbola passing through the target node with foci at the
reference nodes.
the position of the target node on a hyperbola, with foci at the two reference
nodes, as shown in Figure 2.3 [1].
In Figure 2.3, d1 and d2 are the estimations of TOA for each signal travel-
ing between the target node and a BS. We can then obtain the difference
between the two distances. Since the target node and the reference nodes
are not synchronized, the TOA estimates include a timing offset, which is
the same in all estimates as the reference nodes are synchronized, in addi-
tion to the TOF. Therefore, the parameters of the estimated TDOA can be
obtained as
τ TDOA = τ1 − τ 2 , (2.6)
where τi for i = 1, 2, shows the estimated TOA for the signal traveling between
the target node and the ith fix stations.
Although the cross-correlation-based TDOA estimation works well for
single path channels and white noise models, its performance can degrade
considerably over multi-path channels and colored noise.
D tan (α 2 )
x= , (2.7)
tan (α 2 ) − tan (α 1 )
(x, y)
(0, 0) (D, 0) x
BS1
BS2
FIGURE 2.4
Triangulation in two dimensions.
Wireless Location Technology in Location-Based Services 55
BS1 BS2
FIGURE 2.5
Position uncertainty due to antenna beam width.
( x − xˆ )2 + ( y − yˆ )
2
error = . (2.9)
other regions in the world, it is these commercial services that are generating
location inclusion capability in the cellular networks [3].
TABLE 2.1
Comparison of several parameters in different cellular systems
Feature GSM CDMA IS-95
Major frequency band Uplink Downlink Uplink Downlink
890–915 MHz 935–960 824–849 MHz 869–894
MHz MHz
1710–1785 MHz 1805–1880
MHz
1850–1910 MHz 1930–1990
MHz
Symbol/chip rate 270.8 kb/s 1288 kb/s
Channel width 200 kHz 1250 kHz
Multiple access Time division (TDMA) Code division (CDMA)
Modulation GMSK (Gaussian Minimum Phase shift keying
Shift Keying)
Power control Yes Yes
Feature WCDMA (UMTS) CDMA2000
Major frequency bands Uplink Downlink Uplink Downlink
920–1980 MHz 2110–2170 821–835 MHz 866–880
MHz MHz
Symbol/chip rate 4096 kb/s 3686.4 kb/s
Channel width 5000 kHz 4500 kHz
Multiple access Code division (CDMA) Code division (CDMA)
Modulation Phase shift keying Phase shift keying
Power control Yes Yes
58 Location-Based Services Handbook
To protect the signal, the value of the used code is pseudo-random, which
appears random, but is actually deterministic. In this case, the receivers can
rebuild the code for synchronous detection [network7].
data services. The bandwidth of a GSM signal is 200 kHz, which makes it
potentially more accurate than that of AMPS or time division multiple access
(TDMA) in TDOA positioning.
A GSM network is a public land mobile network (PLMN), which also
includes the TDMA and CDMA networks. GSM uses the following to distin-
guish it from the PLMN:
positioning services, which will be the basic function for the cellular net-
work, especially the 3G network.
users are continuous; in addition, the joining and leaving of users are sto-
chastic. All of these factors result in the received signal’s properties chang-
ing continuously. Additionally, in recent years, various types of Multi-carrier
CDMA systems have been employed. Under appropriate conditions, the sig-
nals of Multi-carrier CDMA will propagate through multi-path channels
with little loss. The system using only a few subcarriers to deal with the
intersymbol interference and the interchip interference is introduced in. In
a channel of a typical indoor environment, this system is more optimal than
the Rake receiver. [9]
2.6 Conclusion
In this chapter, we presented the basic principle, techniques , and systems of
wireless location technology in location-based services.
GNSS is widely used to determine the current location in many LBS.
GNSS receivers are cheap, and the corresponding location result is accurate.
However, location only works if a direct line of sight between the satellites
and the receivers is given. Cellular location are often viewed as the most
promising technology for LBS, as it can cover a large geographic area and
have a high number of mobile subscriber. Different location technologies are
proposed in the corresponding industry association, e.g. 3GPP and 3GPP2.
Indoor location is based on radio, infrared, or ultrasound technologies with a
small coverage, such as in a single building. This chapter will serve as foun-
dation for understanding the implementation of LBS in subsequent chapters.
References
1. Sinan Gezici 2008. “A Survey on Wireless Position Estimation”, Wireless Personal
Communications: An International Journal 44 (3): 263–82.
2. Richard J. Barton, Rong Zheng, Sinan Gezici and Venugopal V. Veeravalli
2008. “Signal Processing for Location Estimation and Tracking in Wireless
Environments”, EURASIP Journal on Advances in Signal Processing 2008: 1–3.
Wireless Location Technology in Location-Based Services 65
CONTENTS
3.1 Introduction .................................................................................................. 68
3.2 Techniques Based on Cell Identity ............................................................ 70
3.3 Fingerprinting .............................................................................................. 71
3.3.1 Matching algorithms ....................................................................... 72
3.3.2 Relevant approaches ........................................................................ 72
3.3.3 Performance characteristics ........................................................... 73
3.3.4 Current trends .................................................................................. 73
3.4 Received Signal Strength Indicator-Based Ranging and Trilateration 74
3.4.1 Received signal strength indicator-based ranging ..................... 75
3.4.2 Performance characteristics ........................................................... 76
3.5 Time of Arrival-Based Ranging/Trilateration ......................................... 76
3.5.1 Estimating time of arrival at the physical layer ..........................77
3.5.2 Estimating time of arrival at upper layers ...................................77
3.5.3 Performance characteristics ........................................................... 79
3.6 Time Difference of Arrival ......................................................................... 79
3.6.1 Relevant proposals...........................................................................80
3.6.2 Performance characteristics ...........................................................80
3.7 Angle of Arrival or Direction of Arrival .................................................. 81
3.7.1 Relevant proposals........................................................................... 81
3.7.2 Performance characteristics ........................................................... 82
3.8 Assisted Global Positioning System ..........................................................83
3.9 Discussion .....................................................................................................84
3.10 Commercial Solutions .................................................................................85
3.10.1 Ekahau Real Time Location System ..............................................85
3.10.2 Aeroscout Visibility System ........................................................... 86
3.10.3 Skyhook Wireless Wi-Fi Positioning System ............................... 86
References............................................................................................................... 87
67
68 Location-Based Services Handbook
3.1 Introduction
The development of localization technologies and the growing importance
of ubiquitous and context-aware computing have led to a growing business
interest in location-based applications and services. Most applications need
to locate or track physical assets inside buildings accurately, thus the avail-
ability of advanced indoor positioning has become a key requirement in
some markets. Unfortunately, this requirement cannot be met by the global
positioning system (GPS), which is unable to provide valid location infor-
mation in most existing indoor environments—especially far indoors—
because the signals transmitted from the GPS satellites are blocked by walls.
In addition, the GPS often fails in urban canyons due to buildings obstruct-
ing the path between the receiver and the satellites. Possible alternatives
include wide area cellular-based positioning systems such as global system
for mobile communications (GSM), general packet radio service (GPRS),
and universal mobile telecommunications system (UMTS), but they are
not accurate enough for some stringent location-based applications. Hence,
localization techniques specifically designed for use indoors are currently
being researched and developed in order to complement the GPS so that
the continuous tracking of mobile targets, regardless of their environments,
becomes feasible.
Indoor positioning systems provide localization in a limited area, acting
as local systems. They face major challenges, such as coping with the harsh
environment caused by radio signal propagation (e.g., multi-path and fading)
and changing environmental dynamics (e.g., relative humidity level, human
presence, and furniture variations). Thus, research on indoor positioning
technologies has produced a vast literature since the mid-nineties. During
the early years, research focused on the use of new infrastructures for geo-
location, entailing the development of a network of reference sensors and a
signaling system. These approaches were intended to work in small areas,
and most of the time they were accurate. The main problems were high costs,
complex deployment, and difficulties scaling to large indoor areas. Some
important examples include Cricket, Active Bats, and the ad hoc location
system (AHLOS) (Tauber 2002). Several technologies were available—e.g.,
infrared, ultrasound, optical, and radio frequency—but none presented as
a total solution. Years later, advances in wireless communications technolo-
gies enabled the use of communications protocols to build new indoor posi-
tioning systems. In this way, cost-efficient solutions can be achieved, since
any device compliant with the selected communications standard can be
used. Modularity and flexibility are high because the network infrastructure
can also support communication services such as data transfer, which can
be combined with location modules. Because these technologies were not
designed for positioning, however, additional challenges emerge when try-
ing to achieve accurate and robust solutions.
Location in Wireless Local Area Networks 69
Highest
Fingerprinting
Accuracy
GPS
AoA
TDoA
ToA
RSSI
Lowest Cell - ID
FIGURE 3.1
Classification of location techniques.
70 Location-Based Services Handbook
3.3 Fingerprinting
Most currently available WLAN location solutions are based on this family
of methods, also called the radio-map-based technique. The idea behind this
method is to use the RSSI received from specific access points as a location-
dependent parameter. The calculation of the position consists of measur-
ing the RSSI from several access points and then attempting to match these
measurements with the RSSI values of previously calibrated location points
stored in a database. This database, or radio map, has to be built before the
system is operational. Hence, the method works in two phases: an offline
training phase and an online positioning phase. In the first phase, RSSI mea-
surements must be obtained by placing the mobile device at each reference
point and measuring the RSSI from all applicable access points. This way,
the fingerprint of each point is stored as a set of RSSI figures in the database
along with the known point’s coordinates. In the second phase, the target’s
localization can be estimated: the device measures the RSSI from the access
points and compares these measurements with the data recorded in the data-
base by means of a matching algorithm. The output of this process yields the
likeliest location of the device. Figure 3.2 illustrates this second phase.
Access Points
Beacons
Measurements
Searching in the database
Position computation
Position
FIGURE 3.2
Online positioning phase in fi ngerprinting.
72 Location-Based Services Handbook
d2 e2
e1 d1
d3 e3
User location
FIGURE 3.3
Trilateration for position computation.
Data frame
Ttx data frame
Tp data frame
Tp ACK
Ttx ACK
ACK
FIGURE 3.4
RTT measurement at the mobile device with data-ACK.
Location in Wireless Local Area Networks 79
Access point 2
2
d
Measurement
d1 error margin
Access point 1
d3
FIGURE 3.5
TDOA trilateration for position computation.
estimated range difference gives a hyperbola with foci at the reference point
receivers where the target can be located (Figure 3.5). A trilateration algo-
rithm is then employed to estimate the position where at least two hyperbo-
lae intersect.
a1
a2
FIGURE 3.6
Positioning with AOA.
82 Location-Based Services Handbook
GP S
satel GPS information
lites
GPS location
server
GPS information
Internet
A ss is
tance
info r GPS information
m ation
Terrestrial
cellular network
FIGURE 3.7
Architecture of A-GPS-based location systems.
84 Location-Based Services Handbook
Positions obtained from A-GPS and other WLAN location techniques can
also be combined to enhance positioning accuracy. In this case, the position
obtained through any other WLAN method is used to perform a classical
loose hybridization with the GPS, such as a simple weighted average of both
positions (Singh et al. 2004).
3.9 Discussion
Although it was difficult to envision years ago when the first IEEE 802.11
networks were deployed, current advancements in indoor positioning using
WLAN infrastructures are producing location systems with high perfor-
mance levels. The objective remains to develop a technique that is able to
provide all of the following: good positioning accuracy; performance robust-
ness and responsiveness to environmental changes (e.g., furniture, people,
cars); quick and flexible deployment; a software-only solution on standard
WLAN-enabled devices; and good scalability to both large numbers of users
and large indoor areas. At present, achieving all these goals with a single
technique remains a challenge.
After analyzing the basic principles and characteristics of each location
technique, achieving all these goals seems difficult considering the intrin-
sic limitations of each technique (Table 3.1). For example, fingerprinting
presents good positioning accuracy, a software-based solution, and good
scalability; however, dependence on a radio-map makes it vulnerable to
environmental changes, and the significant task of building a database can
prevent quick system deployments. The other RSSI-based technique, RSSI
ranging-trilateration, allows easier deployments and more resilience
in response to environmental changes, but accuracy is poor compared
with the fingerprinting technique. TOA-based methods have emerged as
TABLE 3.1
Capabilities of the main location techniques.
Response
Technique Accuracy time Consistency Yield Scalability Maintenance
Cell ID Poor Excellent Poor Good Excellent Excellent
Fingerprinting Good Fair Good Good Good Fair
RSSI Poor/Fair Good Poor Fair Excellent Good
TOA/TDOA Good Fair Fair Good Fair/ Excellent
Good
AOA/DOA Fair Good Fair Fair Good Good
A-GPS Good Fair Fair Poor Excellent Excellent
UWB Excellent Fair Fair Good Fair/ Good
Good
Location in Wireless Local Area Networks 85
1. TDOA: The system employs this technique for outdoor and open
indoor environments. Specific fixed hardware equipment (i.e.,
AeroScout location receivers) is required. These receivers read the
beacons sent by the targets and perform TDOA measurements. They
send the measurements to the location server applications, which
perform the position calculation. The signals employed for the TDOA
measurements are standard IEEE 802.11 beacons. AeroScout tags use
a unique “beaconing” method that communicates with minimal dis-
ruption to the network and allows scalability, unlike the competing
“association” method. A patented clear channel assessment mecha-
nism is employed to ensure that traffic does not interfere with other
Wi-Fi traffic.
2. RSSI-based technique: In this case, IEEE 802.11 access points mea-
sure the RSSI with modified AeroScout firmware.
3. Active RFID: Specific fixed hardware equipment (i.e., AeroScout
Exciters) is needed. Using AeroScout Exciters, a tag’s passage through
a defined area such as a gate or doorway can be detected. Exciters
trigger very precise and immediate notification that a tag passed a
certain threshold or is located within a very small area. These data
are then added to the real-time location data coming from the Wi-Fi
access points and can add both clarity and immediacy where needed.
References
3GPP TS 03.71 2002. Functional Stage 2 Description of Location Services (LCS).
http://www.3gpp.org.
3GPP TS 23.271 2004. Functional Stage 2 Description of Location Services (LCS) R6.
http://www.3gpp.org.
IEEE 802.11 WG 2006. Part 11: Wireless Medium Access Control (MAC) and Physical
Layer (PHY) Specifications: Amendment v: Wireless Network management.
IEEE P802.11v/D0.02. In Draft Amendment to Standard for Telecommunications and
Information Exchange Between Systems—LAN/MAN Specific Requirements. New
York: The Institute of Electrical and Electronics Engineers.
RFC2138 1997. RADIUS: Remote Authentication Dial In User Service. ftp://ftp.
ietf.org/rfc/rfc2138.txt.
RFC1157 1990. SNMP: Simple Network Management Protocol. ftp://ftp.ietf.org/rfc/
rfc1157.txt.
88 Location-Based Services Handbook
Aassie A. and A. S. Omar 2005. Time of Arrival Estimation for WLAN Indoor
Positioning Systems using Matrix Pencil Super Resolution Algorithm. Proc.
Workshop on Positioning, Navigation and Communication (WPNC), 11–20. Published
by IEEE.
Abusubaih M., B. Rathke and A. Wolisz 2007. A Dual Distance Measurement
Scheme for Indoor IEEE 802.11 Wireless Local Area Networks. Proc. IFIP/IEEE
International Conference on Mobile and Wireless Communication Networks (MWCN).
Published by IFIP/IEEE.
Ali S. and P. Nobles 2007. A Novel Indoor Location Sensing Mechanism for IEEE 802.11
b/g Wireless LAN. Proc. Workshop on Positioning, Navigation and Communication
(WPNC), 9–15. Published by IEEE.
Al-Jazzar S. and M. Ghogho 2007. A Joint TOA/AOA Constrained Minimization
Method for Locating Wireless Devices in Non-Line-of-Sight Environment. Proc.
IEEE Vehicular Technology Conference Fall (VTC), 496–500. Published by IEEE.
Bahl P. and V. Padmanabhan 2000. Radar: An In-Building RF-based User Location
and Tracking System. Proc. IEEE Conference on Computer Communications
(INFOCOM), 775–84. Published by IEEE.
Castro P., P. Chiu, T. Kremenek and R. Muntz 2001. A Probabilistic Room Location
Service for Wireless Networked Environments. Proc. Ubiquitous Computing
(UbiComp), 18–34. Published by ACM.
Chai X. and Q. Yang 2005. Reducing the Calibration Effort for Location Estimation
Using Unlabeled Samples. Proc. IEEE Pervasive Computing and Communications,
95–104. Published by IEEE.
Chen Y., Y. Chan and C. She 2003. Enabling Location-Based Services on Wireless
LANs. Proc. 11th IEEE International Conference on Networks (ICON), 567–72.
Published by IEEE.
Chen Y., J. Chiang, H. Chu, P. Huang and A. Tsui 2005. Sensor-Assisted Wi-Fi
Indoor Location System for Adapting to Environmental Dynamics. Proc. ACM
International Symposium on Modeling, Analysis and Simulation of Wireless and
Mobile Systems (MSWIN), 118–25. Published by ACM.
Ciurana M., F. Barcelo and S. Cugno 2006. Multipath Profile Discrimination in
TOA-Based WLAN Ranging with Link Layer Frames. Proc. ACM International
Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization
(Wintech), 73–79. Published by ACM.
Ciurana M., F. Barcelo-Arroyo and F. Izquierdo 2007. A Ranging System with IEEE
802.11 Data Frames. Proc. IEEE Radio and Wireless Symposium, 133–36. Published
by IEEE.
Elnahrawy E., J. Austen-Francisco and R. P. Martin 2007. Adding Angle of Arrival
Modality to Basic RSS Location Management Techniques. Proc. IEEE International
Symposium on Wireless Pervasive Computing (ISWPC). Published by IEEE.
Evennou F., F. Marx and E. Novakov 2005. Map-aided indoor mobile positioning
system using particle filter. Proc. IEEE Wireless Communications and Networking
Conference (WCNC), vol. 4, 2490–94. Published by IEEE.
Golden S. A. and S. S. Bateman 2007. Sensor measurements for Wi-Fi location with
emphasis on time-of-arrival ranging. IEEE Transactions on Mobile Computing, 6
(10): 1185–98.
Günther A. and C. Hoene 2005. Measuring round trip times to determine the distance
between WLAN nodes. Lecture Notes in Computer Science. Networking, 768–79.
Location in Wireless Local Area Networks 89
Ibraheem A. and J. Schoebel 2007. Time of Arrival Prediction for WLAN Systems Using
Prony Algorithm. Proc. Workshop on Positioning, Navigation and Communication
(WPNC), 29–32. Published by IEEE.
Kotanen A., M. Hannikainen, H. Leppakoski and T.D. Hamalainen 2003. Positioning
with IEEE 802.11b Wireless LAN. Proc. IEEE International Symposium on Personal,
Indoor and Mobile Radio Communications (PIMRC), vol. 3, 2218–22. Published by
IEEE.
Küpper A. 2005. Location-Based Services: Fundamentals and Operation. New York: Wiley.
Ladd A., K. Bekris, A. Rudys, L. Kavraki and D. Wallach 2002. Robotics-Based
Location Sensing Using Wireless Ethernet. Proc. ACM International Conference
on Mobile Computing and Networking (MOBICOM), 227–38. Published by ACM.
Lang V. and C. Gu 2005. A Locating Method for WLAN Based Location Service.
Proc. IEEE International Conference on e-Business Engineering (ICEBE), 427–31.
Published by IEEE.
Lassabe F., P. Canalda, P. Chatonnay and F. Spies 2005. A Friis-Based Calibrated
Model for Wi-Fi Terminals Positioning. Proc. IEEE World of Wireless Mobile and
Multimedia Networks, 382–87. Published by IEEE.
Li X. and K. Pahlavan 2004. Super-resolution TOA estimation with diversity for
indoor geolocation. IEEE Transactions on Wireless Communications, 3 (1): 224–34.
Lim H., L-C. Kung, J. C. Hou and H. Luo 2006. Zero-Configuration, Robust Indoor
Localization: Theory and Experimentation. Proc. IEEE Conference on Computer
Communications (INFOCOM), 1–12. Published by IEEE.
McCrady D. D., L. Doyle, H. Forstrom, T. Dempsey and M. Martorana 2000. Mobile
ranging using low-accuracy clocks. IEEE Transactions on Microwave Theory and
Techniques, 48 (6): 951–58.
Niculescu D. and B. Nath 2004. VOR Base Stations for Indoor 802.11 Positioning. Proc.
ACM International Conference on Mobile Computing and Networking (MOBICOM),
58–69. Published by ACM.
Reddy H. and G. Chandra 2007. An Improved Time-of-Arrival Estimation for WLAN-
Based Local Positioning. Proc. International Conference on Communication Systems
software and middleware (COMSWARE). Published by ACM.
Saha S., K. Chaudhuri, D. Sanghi and P. Bhagwat 2003. Location Determination of
a Mobile Device using IEEE 802.11 Access Point Signals. Proc. IEEE Wireless
Communications and Networking Conference (WCNC), 1987–92. Published by IEEE.
Seidel S. Y. and T. S. Rapport 1992. 914 MHz path loss prediction model for indoor
wireless communications in multi-floored buildings. IEEE Transactions on
Antennas and Propagation, 40 (2): 207–17.
Singh R., M. Guainazzo and C. S. Regazzoni 2004. Location Determination Using
WLAN in Conjunction with GPS Network (Global Positioning System). Proc.
IEEE Vehicular Technology Conference (VTC), vol. 5, 2695–99. Published by IEEE.
Tauber J. A. 2002. Indoor Location Systems for Pervasive Computing. MIT Report.
Venkatraman S. and J. Caffery 2004. Hybrid TOA/AOA Techniques for Mobile
Location in Non-Line-of-Sight Environments. Proc. IEEE Wireless Communications
and Networking Conference (WCNC), vol. 1, 274–78. Published by IEEE.
Wang Y., X. Jia and H. K. Lee 2003. An Indoors Wireless Positioning System Based on
Wireless Local Area Network Infrastructure. Proc. International Symposium on
Satellite Navigation. Publisher not found. Maybe because these proceedings were
only in electronic format.
90 Location-Based Services Handbook
Winkler F., E. Fischer, E. Grab and G. Fischer 2005. A 60 GHz OFDM Indoor
Localization System Based on DTDOA. 1st Mobile & Wireless Communications
Summit. Published by IST.
Yamasaki R., A. Ogino, T. Tamaki, T. Uta, N. Matsuzawa and T. Kato 2005. TDOA
Location System for IEEE 802.11b WLAN. Proc. IEEE Wireless Communications
and Networking Conference (WCNC), vol. 4, 2338–43. Published by IEEE.
Youssef M. 2004. Horus: A WLAN-Based Indoor Location Determination System.
PhD thesis, University of Maryland at College Park.
4
Radio Frequency Identification Positioning
CONTENTS
4.1 Introduction .................................................................................................. 91
4.2 RFID Tags as Location Reference Points .................................................. 93
4.3 Location Estimation Techniques................................................................ 94
4.4 Applications .................................................................................................. 96
4.5 Facilitating Deployment.............................................................................. 98
4.6 Security and Privacy ................................................................................. 100
4.7 Real-World Deployment............................................................................ 101
4.7.1 Prototype implementation............................................................ 101
4.7.2 Preliminary experiments .............................................................. 102
4.7.3 Field experiment ............................................................................ 104
4.8 Conclusion .................................................................................................. 106
References............................................................................................................. 106
4.1 Introduction
As people increasingly use location-aware devices for various applications
including wayfinding (Arikawa et al., 2007; Navitime, 2009) and safety-
enhancement (Enhanced 911, 2009), there is a tangible need for better infra-
structural support of location-based services. Localization has been and is
one of the most prominent areas of ubiquitous networking research. Early
location systems (e.g., the Active Badge Location System [Want et al., 1992])
were built to allow people in closed experimental environments to access
location-relevant information and services, and, since then, there has been
a great increase in the number of global positioning system (GPS)-enabled
devices, including location-aware mobile phones, in our everyday environ-
ments. Today, location-based services can be deployed on these devices to
support various activities in everyday life.
There are numerous localization techniques for location-aware services
(Hightower and Borriello, 2001); however, most of them require relatively
expensive, dedicated devices, thereby incurring high deployment costs. In
addition, different localization techniques are used under different physical
91
92 Location-Based Services Handbook
constraints, and their varied accuracy levels also make the design of loca-
tion-aware applications a complex task. Advances in global navigation sat-
ellite systems (GNSS, such as GPS) (Raper et al., 2007), together with the
ubiquity of GPS-enabled mobile devices including mobile phones, are mak-
ing the GPS an oft-chosen position determination technology for wide-scale
location-aware computing in outdoor spaces. However, systems that rely
solely on GPS technology do not work well in indoor/underground spaces
and urban canyons. A widely usable localization technology in indoor
spaces could therefore complement the GPS and enable continuous services
in indoor and outdoor spaces.
To support application scenarios such as urban wayfinding, emergency
communication and rescue, public safety (Konomi et al., 2007), and urban
sensing (Cuff et al., 2008), it is highly desirable that people can use accu-
rate location information at any place. Our experiences (Sezaki and Konomi,
2006, 2007, 2009) show that radio frequency identification (RFID) positioning
is a feasible approach to a seamlessly usable large-scale infrastructure for
location-based services.
In this chapter, we introduce an RFID-based positioning infrastructure
and discuss various issues around its deployment and use. We first discuss
a localization technique that exploits RFID location reference points that are
embedded in sidewalks, walls, ceilings, and other physical spaces. A naïve
approach may simply retrieve a unique serial number from an embedded
RFID tag and convert it to a geographic coordinate. However, this approach
is problematic when RFID reference points are sparsely deployed, since one
would be unable to obtain any location information when not in proximity
with any tags. To address this limitation, Pedestrian Dead Reckoning tech-
nology can be used to complement RFID positioning and provide location
information at any place. Moreover, we can improve the accuracy of RFID
positioning by having co-located users share their location information.
These additional techniques together can make RFID positioning seamlessly
usable, regardless of the density of RFID tags.
We then discuss new classes of location-based services that RFID position-
ing enables. Since many of these services require a location-based mecha-
nism to disseminate information, we extend and integrate Geocast and delay
tolerant networks (DTN) techniques with the RFID positioning to deliver
information reliably to relevant places using ad hoc communication.
Moreover, we discuss the deployment of RFID-based positioning infra-
structure. Based on two complementary deployment models, we consider
the issues of quality assurance and end-user participation. We also intro-
duce various techniques for facilitating deployment, including RFID Tape
(Sezaki et al., 2008) and so-called reverse estimation (Sangratanachaikul
et al., 2008). We also discuss the ucode standard (Sakamura, 2008) that facil-
itates the use of various kinds of RFID tags and location-relevant repre-
sentations, and enhances scalability by using the distributed ID-resolution
architecture.
Radio Frequency Identification Positioning 93
We also examine privacy and security issues around the uses of RFID
positioning (Sangratanachaikul et al., 2007) and discuss various techniques
for enhancing privacy and security. In particular, we introduce a network
addressing scheme called spatiotemporal addressing (STA), which provides
low-level infrastructural support of privacy preservation in location-aware
computing.
Finally, we discuss some important results from our field experiments.
The proposed RFID positioning works in the real world, and it can comple-
ment the GPS technology in indoor and outdoor spaces.
ucode relation
database
Mobile
device
FIGURE 4.1
Distributed mechanism to obtain location information using RFID.
(1) Users wear a pedestrian dead reckoning module that can detect the
direction and distance of their locomotion
(2) Users’ mobile devices can exchange their location information using
ad hoc communication networks
For example, we can use our estimation technique on the hardware plat-
form that is illustrated in Figure 4.2. GPS can be used optionally in combi-
nation with the RFID positioning. It is implicit in the first assumption that
we support pedestrians. However, part of the proposed technique, such as
cooperative location estimation, could also be used by bikers, car drivers,
and so on.
With the pedestrian dead reckoning module, the user’s device can continu-
ously update its location information even when there are no RFID location
reference points in proximity. However, the device’s location information
can gradually become less accurate and less precise as the pedestrian keeps
Existence range
GPS Receiver
RFID Reader
Pedestrain Dead
Reckoning Module
FIGURE 4.2
Sample hardware platform for the proposed location estimation technique.
96 Location-Based Services Handbook
4.4 Applications
It is not only location but also spatial zones and temporal phases that fun-
damentally influence human activities and needs. As is apparent in the
discussions by Palen and Liu (2007), such consideration is important in
understanding the particular needs and social/technical infrastructural
capabilities in emergency situations. We extend and integrate Geocast (Ko
and Vaidva, 2002; Lim and Kim, 2001) and delay tolerant networks (DTN)
(Fall, 2003) techniques into the RFID positioning mechanism by consider-
ing the requirements of emergency communication in which critical safety
information must be disseminated to relevant spatial zones throughout a
certain phase of a disaster. The proposed mechanism works on mobile ad
hoc networks, and therefore does not require a static communication infra-
structure that may not be available in the event of a disaster.
Existing Geocast techniques (Ko and Vaidva, 2002; Lim and Kim, 2001)
do not fully consider spatial zones and temporal phases in relation to the
dynamics of pedestrian mobility. Consequently, they are unable to dis-
seminate information reliably in certain situations. For example, one cannot
receive information if there happens to be no peer devices in proximity at
the moment of information announcement, or if he/she arrives in the area
after the announcement. This is problematic if it is, for example, information
about a safe evacuation route that can save lives during a wildfire disaster.
Radio Frequency Identification Positioning 97
u2 u2
u1
u1 30 seconds later
u3 u3
30 seconds later
u4
FIGURE 4.3
An extended Geocast technique.
Step 1. The sender transmits a data packet to the target area using the
Location-Based Multicast (LBM) (Ko and Vaidva, 2002), a flooding-
based Geocast technique. A node (or a user’s mobile device), upon
receiving the data packet, compares the node location and the area
description in the packet header. If the node is within the area, it for-
wards the packet to other nodes. Unlike the conventional flooding-
based Geocast technique, the node does not discard the packet at
this point: it keeps the packet for the duration specified in the packet
header.
Step 2. Nodes that have all relevant packets proceed to this second
step and “retransmit” the packets to other nodes. Each node trans-
mits Hello packets to mutually detect peer nodes in proximity. From
the header portion of a received Hello packet, a node can tell if the
corresponding nearby peer node is in the target area. If the peer is
in the target area, and the node has never sent an Inquiry packet
to the peer, the node sends the peer an Inquiry packet to ask if the
peer needs any packets. The peer, upon receiving the Inquiry packet,
98 Location-Based Services Handbook
100
Proposed mechanism
80
Packet arrival rate
60
40
20 Geo-flooding
0
0 100 200 300 400 500 600 700
Elapsed time (s)
FIGURE 4.4
Packet delivery rate in the target area over time.
checks the packets it has, and if in need of any packets, asks the
node to send the needed packets by an Inquiry Reply packet with
the sequence numbers of the needed packets. If the peer is not in
need of any packets, it simply discards the Inquiry Packet without
sending back an Inquiry Reply packet. The node, upon receiving the
Inquiry Reply packet, sends the requested packets to the peer one
after another.
These two steps are iteratively executed for the specified duration in the
packet header.
We have analyzed the performance of the proposed mechanism using a
computer-based simulation with NS-2 [www.isi.edu/nsnam/ns], which
involved 400 nodes that moved according to the Random Waypoint model
(maximum speed: 2 m/sec). The communication range was 100 m, and the
sender stayed at the center of the circular target area with the radius of
500 m. The result shows that the proposed mechanism can disseminate
information to a target area much more thoroughly than the flooding-based
Geocast technique (see Figure 4.4), thereby supporting the kind of informa-
tion flow regulation required in emergency communication and other appli-
cation domains.
STA
FIGURE 4.5
Embedding an STA address in an IPv6 address.
Radio Frequency Identification Positioning 101
Extended
Geocast
Location
Middleware
STA Management
FIGURE 4.6
Overview of the system architecture.
102 Location-Based Services Handbook
RFID Tag
FIGURE 4.7
Hardware platform.
Laser range
scanner
FIGURE 4.8
Preliminary experiment of the proposed positioning mechanism.
Radio Frequency Identification Positioning 103
LMS 200 and LMS 291) that captured participants’ foot positions during the
experiment. Because of various constraints, this preliminary experiment
was carried out without RFID reference points, focusing on the feasibility
of cooperative location estimation. The result showed that cooperation can
reduce cumulative positioning errors. The accuracy of location information
from the DRM devices varied from person to person, which could have been
due to the different ways the participants wore the devices. The impact of
such variability can be substantially reduced by RFID location reference
points.
In 2007, we integrated the extended Geocast protocol with the prototype
and tested it in January 2008 (see Figure 4.9). Additionally, we further devel-
oped software components for RFID, including the ucode-based mechanism
to retrieve location information from a database, as well as the maximum
likelihood estimation (MLE) based mechanism (Sangratanachaikul et al.,
2008) for supporting end-user deployment of RFID location markers.
The preliminary experiment shown in Figure 4.9 was carried out to test the
feasibility of the extended Geocast protocol in an inner-city park in Tokyo.
There are two critical factors to make this protocol work successfully: avail-
ability of accurate location information and understanding of wireless com-
munication range “in the wild.” Since the experiment was carried out in an
outdoor park, we only used GPS for determining each participant’s location;
however, the location information from the GPS was not always accurate
enough for the proposed protocol, therefore RFID-based positioning can be
useful for outdoor spaces as well. A node in the target area could not receive
data packets when the flooding-based Geocast protocol was used. However,
this node could receive the packets when the proposed Geocast protocol was
used.
FIGURE 4.9
Preliminary experiment of the extended Geocast protocol. We reduced the communication
range of the IEEE 802.11 device using the software-based control together with the physically
based control with the metal boxes.
104 Location-Based Services Handbook
Box containing
Elementary
active RFID tag
school
Train
station
Shopping
mall
route
FIGURE 4.10
Photo of the train station and a map of the RFID location reference points.
Radio Frequency Identification Positioning 105
Total Station
(Survey workers
use this equipment
to determine the
location of active
RFID tags)
Passive RFID tag embedded in a survey benchmark
FIGURE 4.11
RFID-chipped land-survey benchmark. Total Station receives the tag’s ID and retrieves highly
accurate geographic coordinates from GSI’s server.
Our intention here was to examine the performance of the RFID-based posi-
tioning in different physical environments and with different RFID density
levels. After the second experimental session, we asked each participant to
fill out a short survey form.
The result shows that the proposed RFID positioning works in an every-
day environment, and its positioning accuracy can be substantially better
Elementary Elementary
school school
Train station Train station
Shopping Shopping
mall mall
FIGURE 4.12
Visualization of pedestrian trajectories.
106 Location-Based Services Handbook
than the GPS not only for indoor but also outdoor spaces. Seven participants
perceived that the system was useful in indoor environments without GPS
reception. Figure 4.12 shows sample pedestrian trajectories that were cap-
tured during the field experiment. The two sample GPS trajectories in Figure
4.12a deviate wildly from the route, and in one of the trajectories, the GPS
could not provide any location information on the right side of the shop-
ping mall. By contrast, the trajectories captured by using the proposed RFID-
based positioning mechanism (see Figure 4.12b) roughly correspond to the
route that the participants walked.
4.8 Conclusion
To support city-wide location-aware computing, we cannot merely rely on
GPS, which does not function well in certain physical environments, includ-
ing indoor spaces. We discussed various RFID-based mechanisms that sup-
port seamless, continuous positioning as well as location-based information
dissemination. We also described the field trials that support the usefulness
of RFID positioning.
We also discussed broad social and technical issues around RFID posi-
tioning. Without considering security, privacy, deployment costs, scalability,
radio propagation, and human mobility patterns, sophisticated algorithms
and protocols would not be able to solve real problems in our everyday lives.
References
Arikawa, M., Konomi, S., and Ohnishi, K. (2007) NAVITIME: Supporting pedestrian
navigation in the real world, IEEE Pervasive Computing, Special Issue on Urban
Computing, 6 (3), 21–29.
Becker, C. and Durr, F. (2005) On location models for ubiquitous computing, Personal
and Ubiquitous Computing 9, 21–31.
Bessho, M., Kobayashi, S., Koshizuka, N., and Sakamura, K. (2007) A pedestrian navi-
gation system using multiple space-identifying devices based on a unique iden-
tifier frameworks, Proc. Int’l Conf. Machine Learning and Cybernetics 2007 (ICMLC
2007), 2100–5. IEEE, Los Alamitos.
Burke, J., Estrin, D., Hansen, M., Parker, A., Ramanathan, N., Reddy, S., and Srivastava,
M.B. (2006) Participatory sensing, Proc. WSW 2006.
Camp, T., Boleng, J., and Davies, V. (2002) A survey of mobility models for ad hoc
network research, Wireless Communications and Mobile Computing 2 (5), 483–502.
Cuff, D., Hansen, M., and Kang, J. (2008) Urban sensing: Out of the woods,
Communications of the ACM 51 (3), 24–33.
Radio Frequency Identification Positioning 107
Haosheng Huang
CONTENTS
5.1 Introduction ................................................................................................ 110
5.2 Related Work .............................................................................................. 111
5.2.1 Location-based services in a smart environment ..................... 112
5.2.2 Location-based services in Web 2.0............................................. 112
5.2.3 Mobile navigation .......................................................................... 113
5.3 Smart Environment ................................................................................... 114
5.3.1 Indoor positioning ......................................................................... 114
5.3.2 Wireless infrastructure ................................................................. 115
5.4 User Interaction and Annotation ............................................................. 116
5.4.1 User-generated content ................................................................. 117
5.4.2 Motivation and data quality of user-generated content ........... 118
5.5 Collective Intelligence-Based Route Calculation .................................. 118
5.5.1 Data modeling ................................................................................ 119
5.5.2 Collective intelligence-based route calculation ......................... 119
5.5.2.1 Route calculation for mobile navigation ...................... 120
5.5.2.2 Different kinds of best routes ........................................ 120
5.5.3 Discussion ....................................................................................... 122
5.6 Context-Aware Adaptation on Software Architecture and
Destination Selection................................................................................. 122
5.6.1 Software architecture .................................................................... 123
5.6.2 Destination selection ..................................................................... 126
5.7 Conclusions and Future Work ................................................................. 126
Acknowledgment ................................................................................................ 127
References............................................................................................................. 127
109
110 Location-Based Services Handbook
5.1 Introduction
The ubiquity of mobile devices (such as cell phones and personal digital
assistants [PDAs]) has led to the introduction of location-based services
(LBS), or location-aware services. A system can be called a LBS when the
position of a mobile device—and therefore the position of the user—is
somehow part of an information system (Gartner 2007). LBS aim at provid-
ing information and services relevant to the current location and context of
a mobile user.
In this chapter, we will focus on one of the most important LBS applica-
tions—mobile navigation services, which provide wayfinding guidance in
an unfamiliar environment. In our daily life, we may encounter wayfind-
ing problems when arriving in a new place, such as “what’s the way from
Train station to City hall.” Usually, we ask people in the surrounding area
for advice, or plan our trip in advance on paper maps or web maps (such as
Google map). With the help of mobile navigation services (e.g., employing
global positioning system [GPS] or other positioning technologies), users can
easily find their way in a new environment. One of the successful mobile
navigation systems is car navigation, which is widely used and trusted by
car drivers all over the world. Recently, the increasing ubiquity of personal
mobile devices (such as cell phones and PDAs) has triggered a move toward
mobile pedestrian navigation systems.
The technology available today is rich. Currently, with the rapid
advances in enabling technologies for ubiquitous computing, more and
more active or passive devices and sensors are augmented in the physical
environment, our environment has become smarter. This abundance of
technologies has given place to the new notions of “smart environment
(SmE)” and “ambient intelligent (AmI).” The basic idea behind SmE and
AmI is that “by enriching an environment with technology (sensor, pro-
cessor, actuators, information terminals, and other devices interconnected
through a network), a system can be built such that based on the real-time
information gathered and the historical data accumulated, decisions can
be taken to benefit the users of that environment” (Augusto and Aghajan
2009). One of the most popular instantiations of these areas is the con-
cept of smart home. With the increasing ubiquity of SmEs, the question of
how mobile pedestrian navigation systems can benefit from SmE and AmI
should be carefully investigated. However, to our knowledge, little work
has been done on these aspects.
The Web is gradually evolving from 1.0 to 2.0. Compared to “Web-as-
information-source” in Web 1.0, Web 2.0 adopts the notion of “Web-as-
participation-platform” (Wikipedia 2009a). In Web 2.0, users can actively
contribute to the web. However, the concept of “Web 2.0” has not been intro-
duced to mobile navigation services. Most of the current mobile navigation
systems are limited to provide richer, just-in-time information (navigation
Supporting Smart Mobile Navigation in a Smart Environment 111
instructions) for users. However, many users are not satisfied with simply
being passive consumers, but rather they want to be active contributors
(Kang et al. 2008). By encouraging users to annotate physical space with
experiences, questions, and opinions during navigation, which reflect the
perspective of the people who navigate in the space and the activities that
occur there, the mobile navigation services can fulfill users’ intrinsic desire
to share their experiences (with friends, or even with other people they
don’t really know), thereby providing users with a new experience during
wayfinding.
In the era of Web 2.0, users are encouraged to contribute to the web. As
a result, the term user-generated content (UGC) has been in mainstream
usage since 2005 (Wikipedia 2009b). It refers to “various kinds of media con-
tent, publicly available, that are produced by end users.” UGC on the web
reflects users’ collective intelligence, and can be viewed as the “wisdom of
the crowds” (Surowiecki 2005). How can UGC be used to generate value/
benefits for mobile navigation services? Recommendation systems from the
E-commerce field (such as Amazon.com) may be one of the most promising
solutions to this question. Recommendation systems can help to make col-
lective intelligence useful. However, little work has been done on applying
recommendation technology to generate value from UGC for mobile naviga-
tion services.
This chapter addresses the issues of incorporating SmE and Web 2.0 into
mobile navigation. We propose that mobile navigation systems in SmE can
help to collect (gather and accumulate) related information (information
about users and the system, UGC, etc.), thereby providing users with a new
experience and smart wayfinding support (e.g., context-awareness and “col-
lective intelligence”-based route services).
The rest of this chapter is structured as follows. Section 5.2 presents
the related research. In Section 5.3, we deploy some devices/sensors to
our office building and set up a SmE as a testbed for our mobile navigation
service. Section 5.4 discusses the issue of users’ interaction and annotation.
In Section 5.5, we investigate how UGC can be used to provide collective
intelligence-based route services. Section 5.6 discusses some issues on the
context-awareness of our mobile navigation service. Finally, Section 5.7
draws conclusions and presents future work.
The widely available UGC brings some challenges: (1) The sheer volume
of UGC makes it more and more difficult for users to find and access rel-
evant information; (2) How can UGC be used to generate value/benefits?
Recommendation system is one of the most promising solutions for these
challenges. It is usually used in E-commerce; some examples are “Customers
who bought this item also bought” and “Best seller lists” on the Amazon
website, “Most viewed” on YouTube, etc. In daily life, when people make
decisions on different options that they have no prior experience of, they
usually seek advice from others who have such experience (word-of-mouth).
UGC reflects users’ experience, and can be viewed as “wisdom of the
crowd.” From these aspects, users can benefit from these kinds of collective
intelligence-based recommendations.
The combination of LBS and Web 2.0 is a trend. Web 2.0 can enhance LBS
with rich and real-time UGC, which can be used to provide better services
in LBS. There are some researches on exploring the idea of incorporating
content created by users into LBS systems (Espinoza et al. 2001; Burrell et al.
2002). Some researchers used recommendation technology to make UGC
useful, e.g., event recommendations (de Spindler et al. 2006), tourist destina-
tion recommendations (Hinze and Junmanee 2006), restaurant recommenda-
tions (Dunlop et al. 2004), gas recommendations (Woerndl et al. 2009).
systems are still in the early development stage. Currently, mobile pedestrian
navigation systems often employ GPS (outdoor) or radio signal (indoor), such
as Wi-Fi, Bluetooth, radio frequency identification (RFID), for positioning,
which may suffer from the problems of poor reliability and stability. How to
provide reliable and stable position information in a complex and changing
environment is a very challenging task. Sensor fusion may be an option. For
route calculation, shortest and fastest routes are often employed in current
mobile pedestrian navigation systems. However, there are different kinds of
best routes: fastest, shortest, least traffic, most scenic, etc. As a result, when
calculating a route for users, users’ context should be considered. Most of the
researches in route communication focus on evaluating the suitability and
efficiency of varied presentation forms for mobile pedestrian navigation.
TABLE 5.1
Overview of connection possibility.
Frequency Data rate Range Connection
spectrum (bps) (m) type, direction Application
Bluetooth 2.4–2.485 GHz 1M–3M 1–10–100 Multipoint, Cell phone,
omni- PDA
directional
UWB 3.1–10.6 GHz 70M–1G 10 Multipoint, Family
omni- multimedia
directional
ZigBee 2.4–2.485 GHz 250K 50 Multipoint, Sensor
omni- network
directional
IrDA Infrared 115K–4M 1–3 Point-to-point, Cell phone,
line of sight PDA
Wireless LAN 2.4–2.485 11M– 300 Multipoint, Mobile
GHz, 5 GHz 54M omni- devices,
directional Internet
services
technology because of its wide availability, high data rate, and wide coverage
range. In addition, a central server was introduced to the SmE. It is respon-
sible for providing indoor navigation services, gathering and recording real-
time messages (such as users’ moving track, UGC).
The SmE is very simple, but it is sufficient as a testbed to support effec-
tively the entire indoor navigation process, including indoor positioning,
route calculation, and route presentation. Additionally, the SmE enables
users’ interaction and annotation. For other applications, other sensors, such
as temperature sensors and noise sensors, may be integrated into the SmE to
facilitate context gathering. (See Huang and Gartner [2009c] for the hardware
layout of the proposed SmE.)
landmarks and visualize them in the route map. In order to protect their
privacy, users can use the system anonymously.
However, the proposed mobile navigation system allows users to do more
than just receive navigation guidance. They are also encouraged to interact
and annotate with the SmE while using the navigation service. The data cre-
ated by users’ interaction and annotation can be viewed as UGC.
where Ri(s, e) is user i’s rating for route segment (s, e), and n is the total num-
ber of ratings for (s, e).
Note that Equation 5.1 uses the mean rating. In order to improve results,
weighted mean and adjusted weighted mean can be used (see Adomavicius
and Tuzhilin [2005] for more detail).
+ (1 − λ 0 − λ 1 ) ⋅ D ist(current, next),
where λ0 determines the weight of the impact for the ratings for decision
points, λ1 determines the weight of the impact for the ratings for route seg-
ments, R_E(current, next) and R_DP(previous, current, next) are the rating
122 Location-Based Services Handbook
for route segment and decision point, respectively, and Dist(current, next) is
the Euclidean length of route segments.
Similar to the above algorithm, the optimal route can be calculated by the
classical Dijkstra’s algorithm based on the pseudo-dual graph.
In order to achieve a better result, λ0 and λ1 have to be calibrated. They
may be different for different environments. The method proposed by
Haque et al. (2007) may be used to find out the optimum value for λ0 and
λ1. It compares the results for different λ0 and λ1 values with those obtained
from the separate algorithms (e.g., route with minimal route segment rating
and route with least complexity). More detail about the above route calculation
algorithms can be found in Huang and Gartner (2009c).
5.5.3 Discussion
In commercial mobile navigation systems, the shortest route and the fast-
est route are often implemented for guiding users from origin to destina-
tion. These kinds of routes may not always be suitable for some situations.
In the research area, some papers focus on calculating different routes for
users. For example, the route with minimal number of turns, the route
with minimal angle by Winter (2002); the route with least instruction
complexity by Duckham and Kulik (2003); the reliable route that mini-
mizes the number of complex intersections with turn ambiguities by
Haque et al. (2007). However, all the above routes are based mainly on
the geometric characteristics of the road network. The proposed collec-
tive intelligence-based algorithms are based on users’ UGC, which refl ects
users’ navigation experiences in the environment. As a result, compared to
other route algorithms, our algorithms will provide results that are more
suitable to the users.
In this chapter, we use indoor navigation as a testbed. However, the pro-
posed algorithms can also be applied to outdoor pedestrian navigation ser-
vices and car navigation services.
differs in each occasion of the activity.” Based on the SmE, our navigation
system provides the following context-aware adaptations.
Mapping
table
Bluetooth
beacon Building
Data
2
Wayfinding
1 Services
3 Central Server
6
Mobile device
4 Moving
Mobile device
Bluetooth
beacon
FIGURE 5.1
Server-side solution.
for his/her current position. The central server may connect to the
Internet to obtain some context parameters.
4. The user walks along the suggested path.
5. When the mobile device receives a new beacon ID, it forwards the ID
to the central server.
6. The central server checks the user’s current position and verifies if
he/she is still along the right route. If the user strays from the sug-
gested route, a new path is calculated and sent to the mobile device
automatically. If the user is on the right route, a new guidance corre-
sponding to the current position is forwarded to the mobile device.
The navigation services in the users’ mobile devices can also operate on the
client side. Figure 5.2 depicts the work flow of client-side solution.
Bluetooth
beacon
1
2
3
Central Server
Mapping table
Building Data
Wayfinding
Services
5
Mobile device 3
Mobile device
5
Bluetooth
beacon
FIGURE 5.2
Client-side solution.
the better they get. Also, more work on applying collaborative filtering into
mobile navigation will be done.
Acknowledgment
This work has been supported by the UCPNavi project (Ubiquitous
Cartography for Pedestrian Navigation, funded by Austrian FWF), which
issues the problem of indoor navigation in a smart ambient intelligent
environment.
References
Adomavicius, G., and E. Tuzhilin. 2005. Toward the next generation of recom-
mender systems: A survey of the state-of-the-art and possible extensions. IEEE
Transactions on Knowledge and Data Engineering 17: 734–49.
Augusto, J., and H. Aghajan. 2009. Editorial: Inaugural issue. Journal of Ambient
Intelligence and Smart Environments 1 (1): 1–4.
Baus, J., K. Cheverst, and C. Kray. 2005. A survey of map-based mobile guides. In
Map-Based Mobile Services, ed. L. Meng, A. Zipf, and T. Rechenbacher, 193–209.
Berlin: Springer.
Brunner-Friedrich, B., and V. Radoczky. 2005. Active Landmarks in Indoor
Environments. In VISUAL 2005, ed. S. Bres, and R. Laurini, 203–15. Berlin/
Heidelberg: Springer LNCS 3736.
Burrell, J., G.K. Gay, K. Kubo, and N. Farina. 2002. Context-Aware Computing: A
Test Case. In UbiComp 2002, ed. G. Borriello and L.E. Holmquist, 1–15. Berlin/
Heidelberg: Springer LNCS 2498.
Dey, A.K., and G.D. Abowd. 1999. Towards a Better Understanding of Context and
Context-Awareness. College of Computing, Georgia Institute of Technology,
Tech. Rep. GIT-GVU-99-22.
de Spindler, A., M.C Norrie, M. Grossniklaus, and B. Signer. 2006. Spatio-Temporal
Proximity as a Basis for Collaborative Filtering in Mobile Environments. In
Proceedings of UMICS’06, ed. M.C. Norrie, S. Dustdar, and H. Gall, 912–925.
CEUR-WS.org, CEUR Workshop Proceedings, vol. 242, Luxemburg, June 5–9.
Dijkstra, E.W. 1959. A note on two problems in connexion with graphs. Numerische
Mathematik 1: 269–71.
Downs, R.M., and D. Stea. 1977. Maps in Minds: Reflections on Cognitive Mapping. New
York: Harper & Row.
Duckham, M., and L. Kulik. 2003. “Simplest” Paths: Automated Route Selection for
Navigation. In COSIT 2003, ed. W. Kuhn, M.F. Worboys, and S. Timpf, 169–85.
Berlin/Heidelberg: Springer LNCS 2825.
128 Location-Based Services Handbook
Yiming Ji
CONTENTS
6.1 Introduction ................................................................................................ 132
6.2 Signal Strength Distortion Model ........................................................... 134
6.3 Dynamic Localization Mechanisms ....................................................... 135
6.3.1 Signal-location map ....................................................................... 135
6.3.2 Indoor radio propagation modeling ........................................... 136
6.3.3 Signal distance mapping .............................................................. 137
6.3.4 Distance fitting ............................................................................... 138
6.3.5 Distance-based location search.................................................... 139
6.4 Simulations and System Comparison ..................................................... 140
6.4.1 Testing environments .................................................................... 140
6.4.2 Experimental strategy ................................................................... 142
6.4.3 Simulations results ........................................................................ 142
6.4.3.1 Distance estimation ........................................................ 143
6.4.3.2 Localization results ......................................................... 143
6.4.4 Dependence on number of deployed sniffers and
reference measurements ............................................................... 144
6.4.4.1 Number of deployed sniffers ........................................ 144
6.4.4.2 Dependence on the number of reference
measurements.................................................................. 146
6.4.5 Robustness to signal strength distortion and security attacks147
6.4.6 Computation efficiency and scalability ...................................... 149
6.5 Related Research ........................................................................................ 150
6.6 Conclusion .................................................................................................. 151
References............................................................................................................. 151
131
132 Location-Based Services Handbook
6.1 Introduction
Location determination and mobility management are critical issues for
location-based services. For more than a decade, researchers have proposed
and studied various mechanisms for both indoor and outdoor localizations,
focusing on finding an efficient localization technique that is accurate, cheap,
and is able to provide reliable services to common applications. The underly-
ing principle of most research relies on either range or angle measurements,
using one or a combination of techniques such as lateration, triangulation,
database mapping, and dead reckoning.
For indoor location determination, the latest research has shown great
interest in Wi-Fi networks, where received signal strength (RSS) values
(instead of the time or angles from proprietary hardware sensors) would be
exploited for the location determination process. However, Wi-Fi signals are
noisy because of building structures, multipath transmission, human popu-
lation, and other environmental factors such as temperature and humidity.
Therefore, reported accuracies from existing systems are not directly com-
parable because the distortions and conditions under which most of the tests
were carried out could have been very different. Thus, very limited testing
cases and the lack of benchmark standards have greatly restricted the evalu-
ation of existing systems. Consequently, despite advances in data processing
techniques and micro-sensor technologies, most indoor localization technol-
ogies are not well understood.
These challenges have been raised and researchers have begun to develop
benchmark theories [1] as well as common data sets for all indoor systems
[2, 3]. It appears that two different approaches would contribute to indoor
localization research: first, analyze individual (environmental) factor and
develop a dependence formula between each factor and the indoor system [4];
and second, introduce representative factors in a given environment and
evaluate the performance of various systems in that testbed. The first method
is valuable in that it would provide standard insight into various compo-
nents in a system through which the performance of the system would be
improved by adjusting each individual parameter. On the other hand, the
second method considers an integral indoor system that integrates a wide
range of system information, which would be a more practical approach to
study the algorithm’s robustness and evaluate the performance of various
systems.
Obviously, neither objective is a simple task that can be easily solved by
a single research effort. Instead, sincere collaborations among research
groups from the indoor localization community must be carried out in order
to understand and appreciate the merits of existing systems and further to
guide future research. This chapter contributes one of the first such research
in this direction: first, it introduces, for the first time, a convenient signal
strength distortion model to describe the dynamic effects (or deliberate
Indoor Location Determination 133
TABLE 6.1
Dynamic localization mechanisms
Dynamic indoor localization
Distance estimation 1. Radio propagation modeling (RM) Lateration
2. Signal distance mapping (SD)
3. Distance fitting (DF)
Database mapping 4. Signal-location map construction (SLM) Mapping
ρ = (μ,σ ) , (6.1b)
Indoor Location Determination 135
where SSm and SStrue represent, respectively, the measured (distorted) and
true signal strength values; δ is the maximum distortion rate that is deter-
mined by the environment or user’s device; and ℘ is the probability between
0 and 1 that the signal strength would be modified at the sniffer. The perfor-
mance metrics is –ρ, and μ and σ are average localization errors and standard
deviation, respectively.
Nr,j
P= ∑ (P − 20 log 10(d ) − γ •N
i=1
0 i i,ref − α•Ni,trans),
136 Location-Based Services Handbook
where P is the power (in decibels) at receiver, Nr,j is the total number of
rays received at the receiver j; P0 is the power (in decibels) at a distance
of 1 m; di, Ni,ref, and Ni,trans represent overall transmission distance, total
number of reflections, and the number of (wall) transmissions of the ith
ray, respectively. The reflection coefficient is γ, and α is the transmission
coefficient. In the equation, site-specific parameters (Nr,j, di, Ni,ref, and Ni,trans)
are obtained directly from the ray-tracing process. For an indoor system
with at least three sniffers, the other three parameters (P0, γ, and α) would
be determined with only one RSS measurement from all sniffers at a given
reference location.
Based on the model, a SLM could be generated over a grid of locations
inside the building. To pinpoint a mobile client inside the building, a sim-
ple method is to search the SLM for the current RSS values from the client.
If there is a match in the table, the corresponding location will be used to
denote the client’s position. Otherwise, if an exact match is not obtained, the
location with the closest signal strength values to the measurement would
be selected as an estimate. A general comparison metric is the least mean
square error:
⎧ ⎛ n
⎞
1/2
⎫
⎪1 ⎪
D = min N
j =1 ⎨n ⎜
⎪⎩ ⎝
∑
k =1
(SSk , m − SSk , ID ) ⎟
2
⎠
⎬,
⎪⎭
(6.3)
where D is the least mean square error, N is the total number of records in
the SLM table, and n is the number of sniffers.
To improve the mapping process, ARIADNE [6] proposed a clustering-
based method for best performance. Many other methods also exist, for
example, Prasithsangaree et al. [13] used a closeness elimination scheme,
Pandey et al. [14] used the second lowest MSE to assist the estimation, and
Youssef et al. [15] proposed a similar clustering mechanism based on RSS
values from nearby sniffers.
⎛ d⎞
P( d)[dB ] = P( d0 )[dB ] − 10 × n × log 10 ⎜ ⎟ , (6.4)
⎝ d0 ⎠
Indoor Location Determination 137
where P(d) is the power at distance d to the transmitter in meters; P(d0) is the
power at a reference distance d0, usually set to 1 m. The attenuation exponent
is n, which is often statistically determined to provide a best fit with mea-
surement readings.
Based on considered parameters in the radio propagation model, most
radio propagation models can be grossly grouped into three categories: (1)
simple attenuation model, (2) partition model, and (3) site-specific model.
The simple attenuation model is in the form of Equation 6.4, and it is the
base model for most others. Hills et al. [17] used this model as a part of an
automated design tool to estimate the coverage areas for a set of APs. The
partition model, on the other hand, reduces the path loss effect from the
attenuation exponent by additional consideration of attenuation effects from
indoor partitions, like walls and floors. Many successful models belong to
this group, for example, the wall attenuation factor model in RADAR [10]
considers attenuation effects from walls using direct radio paths between a
transmitter and a receiver. The site-specific model is similar to the partition
model except that it exploits path loss from site-specific parameters such as
geometrics, materials, and partition thickness. The model in Equation 6.2
belongs to this category. Other representative models include Hassan-Ali and
Pahlavan’s probability model [18], and Lott and Forkel’s multi-wall and -floor
model [19]. Compared with the other models, the site-specific model is more
sophisticated, but it generally works well in most building environments.
The partition model and site-specific model would usually generate bet-
ter range estimation, however, they are complex and require extra informa-
tion (such as structure and materials) as well as specialized data processing
techniques. Consequently, the distance-RSS relationship from these meth-
ods is not straightforward. As a result, many researchers [20, 21] still con-
sider the simple attenuation model for simplicity and computation efficiency.
This chapter will also evaluate this model in order to derive the T-R distance
directly from RSS values.
S ⋅ T = D, (6.5)
T = ( S⋅ ST )−1 ⋅ ST ⋅ D, (6.6a)
This mechanism was reported by Gwon and Jainin [22] and Lim et al.
[7]. Originally, the SD method considers only the RSS and T-R distance val-
ues among a set of reference APs, and therefore both matrixes S and D are
symmetric square matrixes with zero diagonal entries. Clearly, for a com-
plex indoor environment, a lot of APs must be deployed in order to provide
decent distance estimates for positions at different distances and angles to
APs inside the building. For a floor plan with only three APs (where S, D,
and T are all 3 × 3 matrixes), positions outside the AP triangle may not be
correctly estimated.
Consequently, the modification in Equation 6.5 is a more general expres-
sion. Using three sniffers (not APs and thus less deployment requirement) to
record SS values at multiple reference positions (say, n,n > 3) across the build-
ing, including the perimeter locations, this new approach will provide better
coverage for indoor localization. In this case, the dimension of matrixes S
and D will be 3 × n. Note that a typical office environment usually contains
a lot of computers in offices and conference rooms that could regularly send
signals to sniffers (for reference purposes), in other words, the number of ref-
erence positions could be very large (and free too), consequently, the trans-
formation matrix T will be able to provide a more comprehensive map that
links reference RSS values to every representative position across the whole
building, and thus a better performance is expected from this mechanism.
d = A ⋅ Si2 + B ⋅ Si + C, (6.7)
Indoor Location Determination 139
⺨ = ( AT A)−1 A T B. (6.8)
∑ [d
2
φ= ij − δ ij ] . (6.9)
MDS has several versions, but classical MDS is a metric MDS technique
first developed by Young and Housholder [24] in the 1930s. MDS has been
widely used in many areas including social science, chemical modeling, eco-
nomics, and because of its simplicity and the wide availability of the soft-
ware package in various programming languages, this method has also
been used in wireless sensor networks recently [25, 26]. In this research, this
method will be adapted to indoor environments and its performance will be
compared with the lateration method.
140 Location-Based Services Handbook
(a)
FIGURE 6.1
Testing buildings.
Indoor Location Determination 141
1 2 3 4 5 6 7
101 A’ A 104 107 109 110 112
C
8 9 10 11 12
19.16m
13
14 15 B 17 18 19
16
D E
102 103 105 106 108 111
20 21 22
43.07 m
FIGURE 6.1
(Continued).
and emergency supplies) and many construction columns that provide extra
supports to the building. Room 101 serves as a computer classroom, and
room 110 is a computer laboratory with metal cabinets (1–1.7 m) around the
room. Rooms 107, 109, 111, and 112 are classrooms and the rest are offices or
laboratories shared by graduate students. Typical office equipment and fur-
niture include desktop computers, servers, as well as bookshelves and cabi-
nets of various configurations and materials. In this building, two different
deployment strategies (with three and five sniffers) are considered for a total
of twenty-two data validation positions.
Table 6.2 illustrates various measurement methods for both buildings,
including hardware, software, and data collection methods. All the data val-
idation positions in Building I are located in hallways, but the second data
set in Building II considers both offices/classrooms and corridors.
TABLE 6.2
Measurement methods, hardware and software
Building I Building II
Sniffers 3 3 or 5
Sniffer hardware IBM T30 ThinkPad, RedHat 9 HP Pavilion V2000, Linux Fedora II
Mobile device Toshiba laptop, Linksys WAP 11 HP Pavilion V2000, Orinoco
Golden
Data collection 100 sample packets in 0.5 sec, six Data packets in 10 sec, four
days period; for 30 positions months period; for 22 positions
142 Location-Based Services Handbook
TABLE 6.3
Simulation strategies
Distance estimation or map
construction Location search
Simulation Reference RSS
scenarios Sniffers measurements Sniffers Building
(A) 3 Varies 3 I and II
(B) 5 Varies 3 II
(C) 5 Varies 5 II
Indoor Location Determination 143
TABLE 6.4
Distance estimation results (Scenario A, error in meters)
Building I Building II
Error in percentile Error in percentile
Mean Mean
error 50% 70% 85% 90% error 50% 70% 85% 90%
RM 3.1 2.7 4.2 5.1 5.5 4.7 2.7 4.8 7.6 10.2
SD 2.4 1.6 3.0 3.9 4.5 2.9 2.3 3.2 4.8 5.6
DF 2.5 1.4 2.5 5.4 5.5 3.2 2.7 2.8 5.2 5.8
*
Section 6.4.4 studies other settings where less reference positions would be selected in this
process.
144 Location-Based Services Handbook
TABLE 6.5
Location estimation results (Scenario A; error in meters)
Building I Building II
Error in percentile Error in percentile
Mean Mean
error 50% 70% 85% 90% error 50% 70% 85% 90%
RM Lateration 5.5 4.0 8.2 9.8 10.8 34.2 – – – –
MDS 4.4 4.2 5.2 5.7 6.0 11.2 8.0 12.8 20.3 21.3
SD Lateration 3.9 3.5 4.6 5.5 6.5 5.8 4.5 7.7 8.9 9.4
MDS 3.8 3.0 4.4 5.0 7.9 6.4 4.5 7.7 9.4 10.8
DF Lateration 6.7 6.0 8.3 13.8 14.5 9.3 7.5 11.3 12.4 14.8
MDS 5.8 4.0 6.8 10.2 12.0 7.6 6.5 8.2 12.3 13.2
SLM 3.7 3.5 4.6 6.2 6.7 4.1 3.7 6.3 7.5 7.8
15
5 sf, average: 2.6m
10 3 sf, average: 2.9m
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Average Distance Estimation Errors (m)
15
5 sf, average: 3.9m
10 3 sf, average: 3.2m
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Distance Distribution Probability (DF)
30
5 sf, average: 5.2m
10
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Distance Distribution Probability (RM)
FIGURE 6.2
Distance estimation errors using different sniffers.
see that more deployed sniffers do not “significantly” improve the accuracy
of the distance estimation. For all mechanisms, more deployed sniffers do
provide slightly better (or similar) results when distribution probability is
within 90%; at a larger probability, the results become more complex, and
estimation errors from all five deployed sniffers seem to increase faster for
both DF and RM, eventually resulting in larger average errors (see Figure
6.2 legends).
Based on the estimated distance values, the location of the client would be
determined using two different techniques: using all five sniffers positions
as reference (scenario (C) in Table 6.3) or selecting only the three best refer-
ence positions from all five sniffers (scenario (B)). Table 6.6 presents the aver-
age localization errors for both techniques (column 4 and column 5). Column
3 references the results from Table 6.5 (see Section 6.4.3.2).
146 Location-Based Services Handbook
TABLE 6.6
Dependence on the number of sniffers: localization errors
Building II
Five deployed sniffers
Three deployed Three selected All five
sniffers positions positions
RM Lateration 34.2 11.1 40.0
MDS 11.2 7.4 13.6 –
SD Lateration 5.8 4.4 4.6
MDS 6.4 4.5 4.6 –
DF Lateration 9.3 10.5 13.6
MDS 7.6 8.4 10.8 –
SLM 4.1 – 3.2 –
It can be seen that while the deployment of more sniffers would greatly
improve the localization performance for the SLM mechanism, for distance-
based indoor systems (i.e., RM, SD, and DF), the impact of the number of
deployed sniffers on these systems is not straightforward. It appears that
only the SD method welcomes the extra deployed sniffers. For the other two
methods (RM and DF), average results from all five sniffers may actually
overshadow certain critical location parameters and therefore will bring
considerable errors to the location determination. On the other hand, if five
sniffers are used to determine the parameter of the models, the selection
of three closer sniffers as reference positions in the location determination
process would improve the performance of all methods. This is verified
in Table 6.6 between column 4 (three selected positions) and column 5 (all
five deployed sniffers).
1. For the SLM system, the result is somewhat interesting: one refer-
ence measurement would yield estimates as good as results from 2,
3, or 10 reference measurements. This result is consistent with the
original ARIADNE system [27].
2. Different from the SLM approach, distance-based mechanisms
would require more validation positions to be referenced in order
to achieve reasonable distance estimation performance (and thus
Indoor Location Determination 147
TABLE 6.7
Distance errors with various reference positions (Building II with five sniffers)
Number of validation positions
All 22 positions Five positions Ten positions
RM 5.2 5.4 5.3
SD 2.6 19.7 2.8
DF 2.4 11.7 11.1
TABLE 6.8
Localization results under signal strength distortion and attacks
Distance errors Localization errors (MDS/lateration)
Building\
distortions Zero 5% Zero 5% 10%
I RM 3.1 4.9 4.4/5.5 7.8/11.0 14.3/24.4
SD 2.4 3.5 3.8/3.9 6.1/6.8 10.1/11.8
DF 2.5 4.1 5.8/6.7 7.0/7.7 10.0/10.4
SLM – – 3.7 5.4 8.2
RM 4.7 5.1 11.2/34.2 11.7/36.9 14.0/–
II SD 2.9 3.1 6.4/5.8 6.8/6.7 7.8/8.6
DF 3.2 3.4 7.6/9.3 7.9/10.0 9.3/11.9
SLM – – 4.1 4.7 5.8
10 0.4
20 0.5
5 0.2
0 0 0 0
3 4 5 6 7 8 9 10 11 12 2 3 4 5 6 7 8 9 10
Localization Errors (m) (RM) Localization Errors (m) (SD)
Normal Plot, μ = 5.3223, σ = 0.68923
Normal Plot, μ = 7.0023, σ = 0.7066
40 1 200 1
(c) (d)
Histogram
Histogram
0 0 0 0
3 4 5 6 7 8 9 10 11 1 2 3 4 5 6 7 8 9
Localization Errors (m) (DF) Localization Errors (m) (SLM)
FIGURE 6.3
Performance metrics for all four systems.
Indoor Location Determination 149
6.6 Conclusion
This chapter delivers one of the first studies in this field that identify and
analyze critical environmental parameters for RSS-based indoor localiza-
tion systems. Using measurement data over two very different building
environments, this work improved and evaluated four RSS-based dynamic
indoor localization systems. It can be seen that the SLM mechanism, which
is a database mapping method, delivers better results and relies less on
the reference SS measurements. However, it requires the map construction
process. On the other hand, the distance-based systems, including indoor
RM, SD, and DF, generate location estimates with less overhead, but they
require a large number of reference SS measurements that should be care-
fully selected across the building. Of the three distance-based systems,
SD achieves better results than those from RM and DF, and to search the
mobile’s location, the MDS method delivers better estimation than the lat-
eration. Moreover, if more sniffers are deployed on site, the performance
of most systems will be improved, and for distance-based systems, refer-
enced locations for signal measurement will have to be carefully selected
in order to better estimate the parameters and to obtain optimal location
estimation.
This chapter also provides, for the first time, a signal strength distortion
model, as well as a performance metrics, which could be used to measure the
robustness of various systems under dynamic environments or radio signal
attacks. It is clear that a system (such as SLM and SD), which delivers bet-
ter location determination results under a common dynamic environment,
would be preferred over all other systems.
All actual measurements in this chapter are based on our previous work.
We hope this research effort will encourage more active involvement from
other research groups, and eventually a collaborative effort will help identify
a set of good mechanisms that will provide reliable and scalable services for
common users.
References
1. M. Wallbaum and S. Diepolder, “Benchmarking wireless lan location sys-
tems wireless lan location systems,” in WMCS ’05. IEEE Computer Society,
Washington, DC, 2005, pp. 42–51.
2. IEEE ICDM, “2007 data mining contest.” [Online], http://www.ist.unomaha.edu/
icdm2007/contest.
3. N. Patwari and S. Kasera, “CRAWDAD utah CIR measurements,” Dartmouth
College, http://crawdad.cs.dartmouth.edu/index.php.
152 Location-Based Services Handbook
4. Y. Ji, S. Biaz, S. Wu, and B. Qi, “Optimal sniffers deployment for wireless
indoor localization,” in Proceedings of 16th International Conference on Computer
Communications and Networks, ICCCN'07. IEEE Proceedings, August 2007.
5. Y. Chen, K. Kleisouris, X. Li, W. Trappe, and R.P. Martin, “A security and robust-
ness performance analysis of localization algorithms to signal strength attacks,”
ACM Transactions on Sensor Networks, vol. 5, no. 1, pp. 1–37, 2009.
6. Y. Ji, S. Biaz, S. Pandey, and P. Agrawal, “ARIADNE: A dynamic indoor signal
map construction and localization system,” in Proceedings of the 4th international
conference on Mobile systems, applications and services, ACM MobiSys, June 2006.
7. H. Lim, L. Chuan Kung, R. Doverspike, and J. Hou, “Zero-configuration, robust
indoor localization: Theory and experimentation,” in 25th IEEE International
Conference on Computer Communications, InfoCom'06. IEEE Proceedings, 2006.
8. D. Sánchez, S. Afonso, E.M. Macías, and A. Suárez, “Devices location in 802.11
infrastructure networks using triangulation,” in IMECS, 2006, pp. 938–42.
9. A. Smailagic, D.P. Siewiorek, J. Anhalt, D. Kogan, and Y. Wang, “Location sens-
ing and privacy in a context-aware computing environment,” IEEE Wireless
Communications, vol. 9, pp. 10–17, 2001.
10. P. Bahl and V. Padmanabhan, “RADAR: An in-building RF-based user location
and tracking system,” Nineteenth Annual Joint Conference of the IEEE Computer
and Communications Societies, InfoCom'00. IEEE Proceedings, pp. 775–84, 2000.
11. Z. Ji, B.-H. Li, H.-X. Wang, H.-Y. Chen, and T.K. Sarkar, “Efficient ray-tracing
methods for propagation prediction for indoor wireless communications,” in
IEEE Antennas and Propagation Magazine, vol. 43, April 2001.
12. K. Dowsland,“Simulated annealing,” in Modern Heuristic Techniques for
Combinatorial Problems, chapter 2. C.R. Reeves, Ed. McGraw-Hill Book Company,
Maidenhead, 1995.
13. P. Prasithsangaree, P. Krishnamurthy, and P. Chrysanthis, “On indoor position
location with wireless LANs,” in 13th IEEE Int. Symposium on Personal, Indoor and
Mobile Radio Communications. IEEE Proceedings, September 2002, pp. 720–24.
14. S. Pandey, B. Kim, F. Anjum, and P. Agrawal, “Client assisted location data
acquisition scheme for secure enterprise wireless networks,” in IEEE Wireless
Communications and Networking Conference (WCNC'05). IEEE Proceedings, 2005.
15. M. Youssef, A. Agrawala, and A. Udaya Shankar, “WLAN location determina-
tion via clustering and probability distributions,” Proceedings of the First IEEE
International Conference on Pervasive Computing and Communications (PerCom'03).
IEEE Proceedings, March 2003.
16. T.S. Rappaport, Wireless Communications: Principles and Practice, 2nd edn.
Prentice Hall, Upper Saddle River, NJ, 2001.
17. A. Hills, J. Schlegel, and B. Jenkins, “Estimating signal strengths in the design of
an indoor wireless network,” IEEE Transactions on Wireless Communications, vol.
3, no. 1, pp. 17–19, 2004.
18. M. Hassan-Ali and K. Pahlavan, “A new statistical model for site-specific indoor
radio propagation prediction based on geometric optics and geometric prob-
ability,” IEEE Transactions on Wireless Communications, vol. 1, pp. 112–24, 2002.
19. M. Lott and I. Forkel, “A multi-wall-and-floor model for indoor radio propaga-
tion,” Vehicular Technology Conference, IEEE Proceedings, vol. 1, pp. 464–68, May
2001.
20. A.Vijay, C. Ellis, and X. Fan, “Experiences with an inbuilding location tracking
system: Uhuru,” 2003. [Online], citeseer.ist.psu.edu/abhijit03experiences.html.
Indoor Location Determination 153
21. A.M. Hossain, H.N. Van, Y. Jin, and W.-S. Soh, “Indoor localization using mul-
tiple wireless technologies,” in IEEE Mobile Adhoc and Sensor. Systems. IEEE
Proceedings, 2007, pp. 1–8.
22. Y. Gwon and R. Jain, “Error characteristics and calibration-free techniques for
wireless lan-based location estimation,” in MobiWac ’04. ACM, New York, 2004,
pp. 2–9.
23. J. Yin, Q. Yang, and L. Ni, “Adaptive temporal radio maps for indoor location
estimation,” in Third IEEE International Conference on Pervasive Computing and
Communications, PerCom'05. IEEE Proceedings, 2005.
24. G. Young and A. Householder, “Discussion of a set of points in terms of their
mutual distances,” Psychometrika, vol. 3, pp. 19–22, 1938.
25. S. Biaz and Y. Ji, “Precise distributed localization algorithms for wireless net-
works,” in Sixth IEEE International Symposium on World of Wireless Mobile and
Multimedia Networks, WoWMoM'05. IEEE Proceedings, June 2005.
26. J.A. Costa, N. Patwari, and Alfred O. Hero I, “Distributed weighted-multidi-
mensional scaling for node localization in sensor networks,” ACM Transactions
on Sensor Networks, vol. 2, no. 1, pp. 39–64, 2006.
27. Y. Ji, Location Determination within Wireless Networks, Dynamic indoor/outdoor
Localization Systems: Algorithm Design, Performance Analysis and Comparison
Study. VDM, Saarbrücken, Germany, March 2009.
7
Location-Aware Access Control: Scenarios,
Modeling Approaches, and Selected Issues
Michael Decker
CONTENTS
7.1 Introduction ................................................................................................ 155
7.2 Application Scenarios................................................................................ 157
7.3 Basics of Access Control ............................................................................ 160
7.3.1 Discretionary access control......................................................... 161
7.3.2 Role-based access control ............................................................. 162
7.3.3 Mandatory access control ............................................................. 163
7.4 Generic Location-Aware Access Control Models .................................. 164
7.4.1 Role-based access control ............................................................. 165
7.4.2 Discretionary access control......................................................... 168
7.4.3 Mandatory access control ............................................................. 169
7.5 Application-Specific Location-Aware Access Control Models ............ 170
7.5.1 Process-aware access control........................................................ 170
7.5.2 Access control for database systems ........................................... 172
7.6 Prevention of Location Spoofing ............................................................. 175
7.7 Miscellaneous Aspects .............................................................................. 179
7.7.1 Access control for geospatial data ............................................... 179
7.7.2 Access control for location privacy.............................................. 180
7.7.3 Proximity-based access control with radio frequency
identification technology .............................................................. 181
7.8 Summary and Outlook ............................................................................. 182
References............................................................................................................. 183
7.1 Introduction
“Access control is the process of mediating every request to resources and
data maintained by a[n information] system and determining whether the
request should be granted or denied” (Di Vimercati, Paraboschi and Samarati
2003). More formally, this can be expressed as follows:
isAccessAllowed(Subject, Object, Operation) → {true, false}
155
156 Location-Based Services Handbook
In this formula, the parameter “location” represents the user’s location that
might be determined by a locating system like the global positioning system
(GPS) or cell-of-origin. A short discussion of locating systems from the view-
point of LAAC is given in Section 7.6.
An example of LAAC policy would be to forbid all requests by non-executive
employees for access to confidential documents stored on a file server if the
user’s current location is outside the premises of the company; however, if
the request is made by a subject at executive level then access is granted as
long as the current location lies within the home country of that company.
Section 7.2 provides further application scenarios for LAAC.
An extreme case of LAAC would be only to consider the user’s location for
the access control decision:
In the introduction, we mentioned LBA: in this case, only the user’s cur-
rent location is considered but not the identity of the user, so no authen-
tication is necessary. This is advantageous if access should be granted to
unknown users (e.g., walk-in customers in a shop or gastronomic establish-
ment). Further, LBA can also be advantageous from the perspective of data
protection, because the user’s identity is unknown to the information sys-
tem so it is not possible to learn about the usage patterns of individual users;
e.g., it could be concluded that employee Alice always arrives late to work if
there is never a request recorded in the information system’s logfile that has
a timestamp earlier than ten o’clock in the morning and was created with
her user account. LBA for such application scenarios can be applied when
the stay at a particular location implies that the respective user is allowed
to perform particular accesses, e.g., if the rooms of a particular department
in a company are secured by walls, fences, locked doors, and/or human
guards, so that it can be assumed that unauthorized subjects cannot enter
these rooms.
The considerations in this section have so far only been concerned with
different security issues. However, ergonomic issues are another impor-
tant challenge of mobile computing. These issues stem from the fact that
160 Location-Based Services Handbook
because of their mobility, small size, and weight, mobile computers only
have a small display of limited quality with regard to contrast, resolution,
and color depth. Further, mobile computers offer only rudimentary means
for data input: many types of mobile computers don’t have a full keyboard,
but only a few buttons. LAAC can also help to support the human-com-
puter interaction: first, data items (e.g., records, columns, documents) and
options (e.g., buttons, menu items) that are not relevant for the user at a
particular location can simply be hidden, so the number of objects to be
displayed on the already limited display is reduced; further, if unneces-
sary option and data items are hidden, this also reduces the number of
interaction steps (e.g., buttons to press) necessary to reach the information
or option of interest.
is implemented by
FIGURE 7.1
The access control stack.
• Access control lists (ACL) are lists attached to each object. The ele-
ments of such a list are pairs of subjects and objects, e.g., “Alice-read,”
which means that Alice has the right to read that object. If a subject
isn’t allowed to perform any operation on that object (i.e., the corre-
sponding element of the matrix is empty), then no entry concerning
that user will appear in this list. A single ACL can be seen as a single
column of an access control matrix where the empty elements are
omitted. ACLs are used for the file systems of Unix-based operat-
ing systems and Microsoft Windows (Di Vimercati, Paraboschi and
Samarati 2003).
• Capabilities lists are the “line-wise” view on an access control
matrix. A capability list is attached to a subject and contains an ele-
ment for each operation the subject is allowed to perform on that
object. In distributed information systems, some parties may have a
capability list called a “token,” which they use to prove that they are
allowed to perform certain operations on a computer system.
needs to do that job. For example, there could be a role “manager” with the
permission to access the project database and the payroll file. Other roles
could be “secretary” or “software developer.” If new employees are hired
or employees are promoted or leave the organization, it is sufficient to (re-)
assign the respective roles to their account. Usually, this greatly reduces the
workload when compared to the effort that would be necessary to assign
several hundred permissions to a subject.
A further feature supported by most RBAC variants that can found in
research literature is the support for inheritance hierarchies for roles: it is
then possible that a role inherits from another role. For example, the role
“senior developer” could inherit all the rights from a role “developer.”
Contemporary RBAC models (including the ANSI RBAC standard) also
support the definition of mutually exclusive roles to support the well-known
security principle of “separation of duties” (SoD). SoD means that to perform
particular activities it should be required that several subjects are involved,
i.e., it is not possible that a single subject performs the activity. The purpose
of SoD is to prevent frauds and omissions. For example, a company could
apply SoD by enforcing that each order with a value more than 1000 Euros
is signed by two managers (“two-eyes principle”). In RBAC there are usually
two types of SoD, namely, static SoD (SSoD) and dynamic SoD (DSoD). For
both forms, a set of at least two roles is defined as mutually exclusive, but the
meaning of these sets differ:
• For SSoD the set of mutually exclusive roles means that a subject is
not allowed to have more than one of these roles at the same time.
For example, SSoD could be used to guarantee that no user holds the
roles “cashier” and “cash auditor” at the same time because it doesn’t
make much sense that a cashier assesses himself/herself.
• If a set of mutually exclusive roles is used for DSoD it is still allowed
to assign two or even all of these roles to a single subject. However,
the subject is not allowed to activate more than one of these roles dur-
ing a “session.” An example would be that a single user is allowed
to have the roles “author” and “reviewer,” but it is forbidden that the
subject plays both roles for the same submitted paper.
scenes.” In MAC the access control rules are formulated based on security
labels assigned to subjects and objects. If a security label is assigned to a
subject it is called “clearance” and if it is assigned to an object it is called
“classification.” There are two basic types of security labels:
The most famous MAC model is the “Bell-LaPadula” model, which was
devised for the purpose of guaranteeing confidentiality (Bell 2005; Bell and
LaPadula 1976). But MAC can also be applied to enforce the integrity of data;
see the Biba model for example (Biba 1976). The Biba model can help to pre-
vent subjects “polluting” documents of a higher classification with informa-
tion of insufficient quality.
The first implementation of MAC systems can be found in the domain
of information systems for military organizations and secret services.
Meanwhile, there are implementations for civil users, e.g., “Security
Enhanced Linux” (SELinux), AppArmor, or “Label-Based Security” in IBM’s
database management systems “DB2.”
FIGURE 7.2
Overview of generic and application-specific location-aware access control models.
• The upper row shows generic LAACM while the lower row is for the
application-specific LAACM.
• Each column stands for one of the basic approaches for the ACM,
namely, DAC, MAC, and RBAC.
• For the generic RBAC models, we mention the names of the model
while for all the other models, references to the papers are shown.
• In the lower row it is also stated for which class of applications
the respective model was designed (“WfMS” stands for workflow
management systems, “DBMS” stands for database management
systems).
• The table shows that most works in the area of LAACM are based on
generic RBAC models.
and reactivates the component if the spatial region is entered again. For
example, in the GEO-RBAC model (Damiani, Bertino and Perlasca 2007),
location constraints can be assigned to roles, so depending on the mobile
user’s current location the roles are enabled or disabled. If the subject stays
outside the region defi ned by the location constraint, then he/she cannot
use the permissions assigned to roles with that location constraint. An
example given by the authors of GEO-RBAC to motivate their work is the
role “taxi driver” that enables the user of a mobile information system to
query latest traffic information and maps. These taxi driver roles can be
restricted to the region or city where a taxi driver is allowed to operate
according to his/her license, e.g., there could be roles “Taxi Driver Rome”
and “Taxi Driver Milan,” which can only be activated when the driver with
his/her taxi is within the boundaries of the respective city. Another ACM
with location-aware roles is the location-aware role-based ACM (LRBAC)
(Ray et al. 2006).
Other authors propose to assign location constraints at different compo-
nents of the RBAC model:
Ray and Toahchoodee (2008) also describe how delegation in access control
can be made location aware. Delegation in the sense of access control means
that the delegator temporarily transfers access rights to a so-called delegatee.
In this approach, the delegation of roles to other subjects can be restricted
with respect to the location or time. For example, Ray and Toahchoodee state
the case where the supervisor of a laboratory can delegate the role “supervi-
sor” to a student within the laboratory; however, the student can use this role
only within a particular area of the laboratory.
are only allowed to view the documents) then a location-based service (LBS)
that could be called “virtual graffiti” is obtained: a user could place such
graffiti documents with messages he/she wants to share with other people
(e.g., “don’t visit this pub, their beer is horrible”), but these messages cannot
be edited by other people. Finally, if a document bound to a particular loca-
tion is only accessible for the creator of that document then a service that
could be called “personal reminder” is obtained; e.g., a document place in
front of a grocery could pop up on the user’s mobile device to remind him/
her that he/she intended to buy some milk. The special feature in this model
is that each document instance is assigned to exactly one document class,
which is a straightforward concept from the viewpoint of object-oriented
programming. If a new document instance is created it is seen as an instance
of a particular document class. This class has a default configuration of per-
missions that is copied for the newly created instance; following the DAC
concept this configuration can be altered by the owner of the document dur-
ing the lifetime of the document. However, the initial default configuration
of permissions for a document instance help to create different types of ser-
vices depending on which user group gets which permissions and how big
the radius around the document’s center point is, where the document is
accessible.
customer’s premises, e.g., writing the report after the maintenance work or
ordering replacement parts.
Location constraints at instance level are especially interesting because
they have to be assigned during the runtime of a process and not at admin-
istration time before a process instance is created, like for constraints at
schema level. Runtime constraints are also called “dynamic constraints,”
while schema constraints are called “static constraints.” There are different
ways to create a dynamic constraint during the runtime of a process instance
(Decker et al. 2009):
• The simplest idea is to have a human operator who assigns the con-
straint manually. For example, the call-center operator who received
the customer’s call assigns a location constraint for the on-site activi-
ties based on the customer’s address.
• A more advanced method to obtain location constraints would be
to query a backend information system that stores geographic infor-
mation. For example, nowadays most companies maintain a data-
base with the addresses of all their customers. Based on this address
information a workflow system could automatically compute loca-
tion constraints for on-site activities.
• As last method to generate location constraints, we consider rules
that are triggered by particular activities in a workflow. The loca-
tion where this “trigger activity” is performed is then the base for
the creation of a new location constraint that is assigned to another
activity (called “target activity”) that may have to be performed dur-
ing the execution of that process instance.
CRM-DB
A2
... A1 A4 A5 ...
A3
1 km
Berlin
FIGURE 7.3
Example process of UML activity diagram annotated with different types of location
constraints.
172 Location-Based Services Handbook
data records are stored as rows in tables. Further, it is possible that a column
points to another table, i.e., it is demanded that the value for a row of that
column is a value to be found in the referenced table; this is called “foreign
key constraint” (Elmasri and Navathe 2004).
Database systems are the mean of choice when large amounts of struc-
tured data have to be managed in an efficient way. This includes, especially,
that read or even write access to this data is provided for many concur-
rent users while maintaining the integrity of the data. Modern database
systems usually support a dialect of the Structured Query Language (SQL)
to formulate queries for the retrieval of data from the database. But SQL
also allows management of the schema level of the database (e.g., create
new tables, alter column of existing tables), to insert new rows, or to update
existing data rows. SQL even includes some commands for access control,
namely, the commands “GRANT” and “REVOKE” to configure the DAC
provided by most database systems. Using this command it is possible to
grant and revoke permissions to database objects (e.g., tables, trigger, stored
procedures, and sequence generators) to individual users or group of users.
For example, user Alice could have the right to perform the SELECT state-
ment on a particular table, which allows querying data from a table; there
are further permissions for write operations on tables like INSERT (for the
creation of new rows in a table) and UPDATE (to change fields of existing
rows in a table).
To the best of our knowledge, only the work by Gallagher (2002) proposes
a location-aware extension for DAC in database systems. The basic concept
is that a permission can be assigned together with a location constraint to a
user so that the user can only use that permission when he/she stays within
a particular spatial extent. For this, the SQL is extended by a few new con-
structs like the INSIDE clause used in the following example:
Table2
Berlin City
Vienna NULL
...
Seattle
NULL
... ... ... ...
Table3
Table1
U.K. Country
... ... ... ...
Poland
... ... ... France ...
FIGURE 7.4
Mandatory access control (MAC) for a database system.
higher than that of the C/A-code based on this code higher location
accuracy can be obtained. Further, an adversary who isn’t aware of Y
cannot generate fake PPS signals. However, since the PPS carries the
same navigation message as the SPS, the P(Y)-code is prone to be bro-
ken by a so-called known plaintext attack. Further, nowadays several
methods are known to obtain the higher location accuracy provided
by the PPS even without knowing the secret Y (so called “codeless
receivers”). Considering this information, it can be concluded that
neither the SPS nor the PPS is protected against spoofing.
• A simple form to mount a spoofing attack against a GPS receiver
would be to broadcast faked signals with earth-bound senders, so-
called pseudolites (pseudo-satellites). The signals of these pseudo-
lites would arrive at the GPS receiver’s antenna at a much higher
level than the genuine signals so the receiver would calculate his/
her location based on the faked signals and ignore the “overwritten”
signals out of space. This could be detected by the GPS receiver if
the absolute level of the received signals is monitored (Warner and
Johnston 2003). However, a more advanced form of attack would be
to use signals that have a slightly greater strength than the origi-
nal signals; to detect such attacks the receiver should monitor the
relative strength of the signals. Another characteristic of the signals
generated by pseudolites is that they arrive at equal strength at the
receiver’s antenna while the genuine signals don’t, because accord-
ing to the distances they had to travel they are influenced by indi-
vidual degrees of attenuation and other effects. This property of GPS
could also be exploited to detect spoofing attacks.
• A further feature of the GPS can be utilized for a consistency check
of the received signals: the approximate orbits of the individual
satellites are published several months in advance as a so-called
almanac. A receiver could then check if the satellite constellation
that is visible at its alleged location is consistent with the configura-
tion that should be visible at that location according to the almanac.
Nowadays there are special antennas available that can detect the
direction from which radio signals arrive; if such antennas are used,
it is possible to detect if signals from alleged satellites originate from
a terrestrial sender rather than from a satellite in outer space.
• All the approaches for the detection of location spoofing considered
so far are based on an evaluation of the received “raw signals.” But
there are also methods to prevent spoofing on the level of the calcu-
lated location. One idea is to check if the alleged location, track, or
the speed of the receiver are plausible. If additional sensors for dead
reckoning are available, then their measurements could be checked
for consistency with the location calculated by GPS. Examples for
such sensors are odometers, (gyro-) compasses, or speedometers.
178 Location-Based Services Handbook
All the approaches for the prevention of GPS spoofing so far are not applica-
ble in the case that a LBS provider wants to have the evidence that the mobile
user with his/her GPS-equipped device is actually at the alleged location. If
the (not necessarily legal) possessor of the mobile device performs a spoofing
attack, we talk about “internal spoofing,” while the case mentioned so far is
called “external spoofing” and assumes that a third-party attacker wants to
manipulate the system. A GPS receiver provides the calculated location in
the form of a simple text string (NMEA format), so it is trivial for the pos-
sessor of the device to spoof the location: he/she just has to textually replace
the coordinates of the actual location with the coordinates of the pretended
location. This way, LAAC could be circumvented.
To tackle this problem, an extension for GPS, called “CyberLocator,” can
be found in literature (Denning and MacDoran 1996). The basic idea is that
the mobile computer has to forward the “raw signals” (radio fingerprint)
received from the GPS satellites to the LBS provider along with the calculated
coordinates. This idea is based on the fact that the radio signals broadcast by
a satellite are influenced by many random factors, e.g., deviations from the
trajectory or atmospheric distortions of the signals caused by weather condi-
tions or the ionosphere. This means that it is impossible to calculate or simu-
late the actual radio fingerprint on a given location, even if the current orbits
of the satellites and the weather conditions at the alleged location are known.
The LBS provider compares the radio fingerprint reported by the mobile
computer with the radio fingerprint reported by a trusted reference sta-
tion next to the alleged location of the mobile user. Denning and MacDoran
state that the maximum distance between the reference station and the GPS
receiver should be in the range of 2000–3000 km; unfortunately, they do not
explain how these values were calculated. If the difference between the two
radio fingerprints is beyond a particular threshold value then the mobile
computer’s claim to be at the alleged location is rejected.
Location-Aware Access Control 179
• ACMs for geospatial data like maps because these models are also
used to define access control policies that evaluate information about
geographic locations.
• Location privacy is concerned with special data protection prob-
lems that arise when location technology is employed to determine
the whereabouts of mobile users. LAACM can help to tackle these
problems.
• A LAAC that is specially designed based on the peculiarities of
RFID technology.
The availability of new locating technologies for mobile computers and the
great success of personal navigation devices are currently paving the way
for the adoption of LAAC in future commercial products. Therefore, further
research is necessary to provide a solid foundation for this development.
References
Anderson, J.P. 1972. Computer Security Technology Planning Study (Volume II). Technical
Report ESD-TR-73-51. Bedford, MA: Hanscom AFB.
Atluri, V. and Chun, S. 2004. An Authorization Model for Geospatial Data. IEEE
Transactions on Dependable and Secure Computing 1 (4): 238–54.
Bell, D.E. 2005. Looking Back at the Bell-LaPadula Model. In Proceedings of the 21st Annual
Computer Security Applications Conference (ACSAC 2005). Tucson, AZ, 337–51. Los
Alamitos, USA: IEEE Computer Society.
184 Location-Based Services Handbook
Bell, D.E. and LaPadula, L.J. 1976. Secure Computer System: Unified Exposition and Multics
Interpretation. Technical Report MTR-2997. Bedford, MA: The MITRE Corporation.
Belussi, A., Bertino, E., Catania, B., Damiani, M.L., and Nucita, A. 2004. An
Authorization Model for Geographical Maps. In Proceedings of the 12th ACM
International Workshop on Geographic Information Systems (ACM-GIS 2004).
Washington, DC, 82–91. New York, USA: ACM.
Benantar, M. 2006. Access Control Systems: Security, Identity Management and Trust
Models. New York: Springer.
Bertino, E., Bonatti, P., and Ferrari, E. 2000. TRBAC: A Temporal Role-based Access
Control Model. In Proceedings of the 5th ACM Workshop on Role-based Access
Control (RBAC ‘00). Berlin, 21–30. New York, USA: ACM.
Bertino, E., Ferrari, E., and Atluri, V. 1999. The Specification and Enforcement of
Authorization Constraints in Workflow Management Systems. ACM Transactions
on Information and Systems Security 2 (1): 65–104.
Bhatti, R., Damiani, M.L., Bettis, D.W., and Bertino, E. 2008. Policy Mapper: Administering
Location-based Access-Control Policies. IEEE Internet Computing 12 (2): 38–45.
Biba, K.J. 1976. Integrity Considerations for Secure Computer Systems. Technical Report
MTR-3153. Bedford, MA: The MITRE Corporation.
Capkun, S., Cagalj, M., and Srivastava, M. 2006. Secure Localization with Hidden and
Mobile Base Stations. In Proceedings of the 25th IEEE International Conference on
Computer Communications (INFOCOMM 2006). Barcelona, 1–10. Los Alamitos,
USA: IEEE Computer Society.
Chandran, S.M. and Joshi, J.B.D. 2005. LoT-RBAC: A Location and Time-based RBAC
Model. In Proceedings of the 6th International Conference on Web Information Systems
Engineering (WISE ‘05). New York, 361–75. Berlin, Germany: Springer.
Cho, Y., Bao, L., and Goodrich, M.T. 2006. LAAC: A Location-Aware Access Control
Protocol. In Proceedings of the Third Annual International Conference on Mobile and
Ubiquitous Systems: Networking & Services (MOBIQUITOUS 2006). San Jose, CA,
1–7. Los Alamitos, USA: IEEE Computer Society.
Damiani, M.L., Bertino, E., and Perlasca, P. 2007. Data Security in Location-Aware
Applications: An Approach Based on RBAC. International Journal of Information
and Computer Security 1 (1/2): 5–38.
Decker, M. 2008a. An Access-Control Model for Mobile Computing with Spatial
Constraints — Location-aware Role-based Access Control with a Method for
Consistency Checks. In Proceedings of the International Conference on e-Business
(ICE-B 2008). Porto (Portugal), 185–90. Setubal, Portugal: INSTICC Press.
———. 2008b. A Security Model for Mobile Processes. In m-business 2008: In
Proceedings of the 7th International Conference on Mobile Business (ICMB 08).
Barcelona, 221–30. Los Alamitos, USA: IEEE Computer Society.
———. 2008c. Location-Aware Access Control for Mobile Information Systems.
In Collaboration and the Knowledge Economy: Issues, Applications, Case Studies.
Proceedings of eChallenges 2008, ed. P. Cunningham and M. Cunningham.
Stockholm: IOS Press, 1273–80.
———. 2008d. Location Privacy – An Overview. In m-business 2008: Proceedings of
the 7th International Conference on Mobile Business (ICMB 08). Barcelona: IEEE,
221–30.
———. 2008e. Requirements for a Location-Based Access Control Model. In
Proceedings of the 6th International Conference on Advances in Mobile Computing
and Multimedia (MoMM 2008): Third International Workshop on Broadband and
Location-Aware Access Control 185
Humphreys, T.E., Ledvina, B.M., Psiaki, M.L., O’Hanlon, B.W., and Kintner, P.M.
2008. Assessing the Spoofing Threat: Development of a Portable GPS Civilian
Spoofer. In Proceedings of the 2008 ION GNSS Conference. Savannah, GA. Virginia,
USA: ION, Fairfax.
Jing, J., Huff, K., Hurwitz, B., Sinha, H., Robinson, B., and Feblowitz, M. 2000.
WHAM: Supporting Mobile Workforce and Applications in Workflow
Environments. In Proceedings of 10th International Workshop on Research Issues in
Data Engineering (RIDE ‘00). San Diego, CA, 31–38. Los Alamitos, USA: IEEE
Computer Society.
Junglas, I.A. and Spitzmüller, C. 2005. A Research Model for Studying Privacy
Concerns Pertaining to Location-Based Services. In Proceedings of the 38th
Annual Hawaii International Conference on Systems Sciences (HICSS). Big Island,
HI, 1–10. Los Alamitos, USA: IEEE Computer Society.
Lampson, B.W. 1974. Protection. Operating Systems Review 8 (1): 18–24. Los Alamitos,
USA: IEEE Computer Society.
Leonhardt, U. and Magee, J. 1998. Security Considerations for a Distributed Location
Service. Journal of Network and Systems Management 6 (1): 51–70.
Mundt, T. 2005. Location Dependent Digital Rights Management. In Proceedings of
the 10th IEEE Symposium on Computers and Communications (ISCC 2005). Murcia,
617–622. Los Alamitos, USA: IEEE Computer Society.
Myles, G., Friday, A., and Davies, N. 2003. Preserving Privacy in Environments with
Location-Based Applications. IEEE Pervasive Computing 2 (1): 56–64.
Ni, L., Liu, Y., Lau, Y.-C., and Patil, A.P. 2004. LANDMARC: Indoor Location Sensing
using Active RFID. Wireless Networks 10 (6): 701–10.
Oberweis, A. 2005. Person-to-Application Processes: Workflow Management
(Chapter 2). In Process-Aware Information System — Bridging People and Software
Though Process Technology, ed. M. Dumas, W.v.d. Aalst, and A.H.M. ter Hofstede.
Hoboken, NJ: Wiley Interscience.
Osborn, S., Sandhu, R., and Munawer, Q. 2000. Configuring Role-Based Access
Control to Enforce mandatory and Discretionary Access Control Policies. ACM
Transactions on Information and System Security 3 (2): 85–106.
Prasad, R. and Ruggieri, M. 2005. Applied Satellite Navigation using GPS, GALILEO and
Augmentation Systems. Boston, MA: Artech House.
Ray, I., Kumar, M., and Yu, L. 2006. LRBAC: A Location-Aware Role-Based Access
Control Model. In Proceedings of the Second International Conference on Information
Systems Security (ICISS). Kolkata (India), 147–61. Berlin, Germany: Springer.
Ray, I. and Toahchoodee, M. 2008. A Spatio-temporal Access Control Model
Supporting Delegation for Pervasive Computing Applications. In Proceedings
of the 5th International Conference on Trust, Privacy and Security in Digital Business
(TrustBus 2008). Turin, 48–58. Berlin, Germany: Springer.
Roberts, C.M. 2006. Radio frequency identification (RFID). Computers & Security 25
(1): 18–26.
Samarati, P. and De Capitani Di Vimercati, S. 2001. Access Control: Policies, Models,
and Mechanisms. In FOSAD ’00: Revised Versions of Lectures Given during the
IFIP WG 1.7 International School on Foundations of Security Analysis and Design.
London: Springer, 137–96.
Strembeck, M. and Neumann, G. 2004. An Integrated Approach to Engineer and
Enforce Context Constraints in RBAC Environments. Transactions on Information
and System Security 7 (3): 392–427.
Location-Aware Access Control 187
Tippenhauer, N.O., Rasmussen, K.B., Pöpper, C., and Capkun, S. 2009. Attacks on
Public WLAN-based Positioning Systems. In Proceedings of the 7th International
Conference on Mobile Systems (MobiSys ’09). Wroclaw, 29–40. New York, USA:
ACM.
Warner, J.S. and Johnston, R.G. 2003. GPS Spoofing Countermeasures. Technical Report
LAUR-03-6163. Los Alamos, NM: Los Alamos National Laboratory.
Wullems, C.J. 2004. Engineering Trusted Location Services and Context-aware
Augmentations for Network Authorization Models. PhD Thesis. Queensland
University of Technology.
8
Location-Based Services and Privacy
Nabil Ajam
CONTENTS
8.1 Location-based Services............................................................................ 190
8.2 Satellite Systems ......................................................................................... 191
8.2.1 Global positioning system ............................................................ 191
8.2.2 Galileo.............................................................................................. 192
8.2.3 Satellites system limits .................................................................. 192
8.3 Positioning in Wi-Fi Networks ................................................................ 193
8.3.1 Limits ............................................................................................... 194
8.4 Cellular Positioning Techniques .............................................................. 194
8.4.1 Location service ............................................................................. 194
8.4.2 Assisted-global navigation satellite system ............................... 195
8.4.3 Cell ID .............................................................................................. 195
8.4.4 Observed time difference ............................................................. 196
8.4.5 Uplink time difference of arrival................................................. 196
8.4.6 Architecture of location service in cellular networks .............. 197
8.4.6.1 Added nodes .................................................................... 197
8.4.6.2 Location service architecture in cellular networks .... 198
8.4.6.3 Added functionalities in existing nodes ..................... 198
8.5 Location Information Threats .................................................................. 200
8.6 Location Privacy Policy ............................................................................. 201
8.6.1 Privacy definition ........................................................................... 201
8.6.2 Privacy in location-based services .............................................. 202
8.6.3 Privacy enforcement in cellular networks ................................. 203
8.6.4 Shortcomings of privacy protection in cellular networks ....... 204
8.6.5 Service provider access to location information ....................... 204
8.6.6 Privacy enhancement for location service in cellular
networks .......................................................................................... 204
8.7 Conclusion .................................................................................................. 205
References............................................................................................................. 206
189
190 Location-Based Services Handbook
• A filter: when users request the search of a service, only results that
are close to the user location are returned to users.
• A pointer: location information can appear as a dot on a map. The
map is the requested service by the user and his/her location is just
supplementary information to the service.
• A definer: when users enter a defined area such as cinema or restau-
rant some alarms are launched to alert users about activities in this
area.
3GPP defines those applications as provided services that utilize the loca-
tion information of a terminal and are offered by third parties (Kupper 2005).
It is noted that LBSs consist of two phases:
Generally, these two phases are provided by two different providers, e.g., a
cellular network provider and a service provider.
The GSM Association, which is a consortium of 600 GSM network
operators, identifies three types of LBS (GSM 2003):
8.2.2 Galileo
Galileo is a European project. It is a satellite positioning system, and is the
competing product to the GPS system. Initially, GPS is a military system
however Galileo is a civil positioning system. Galileo aims to provide more
accurate positions than existing systems. It consists of 27 satellites that circu-
late the earth on three orbits. It works basically as the GPS in terms of signal
modulation (Kupper 2005). The Galileo project aims to be interoperable with
GPS to offer higher performances. Accuracy can be up to 1 m. Four services
are defined depending on the availability of the system, integrity, and accu-
racy: the Open service, the Commercial service, the Public regulated service,
and the Safety-of-life service. A safety service is proposed by defining the
Search and Rescue service. It consists of the detection by the satellites of dis-
tress messages emitted by transmitters.
8.3.1 Limits
Positioning based on Wi-Fi networks suffers from two principal limits:
the techniques in the following sections (Tayal 2005; 3GPPa; 3GPPb; 3GPPc).
Then, we will focus on changes in core networks.
• Power consumption
• Procedure time: because start-up and acquisition times will be
reduced
8.4.3 Cell ID
This technique is similar to the proximity sensing technique of Wi-Fi
networks. The user position is overcome with the position of the
base station location. Some improvement is made to give an accurate
position:
OTDOA is not applicable if the user is quite close to the transmitter and its
receiver is blocked by strong local transmissions. This problem is known as
the “hearability” problem.
The same reasoning applies for the E-OTD positioning method in the GSM
network.
with existing user terminals without any change, however, it requires special
LMUs in the geographic vicinity of the user terminal to measure accurately
the TOA of the bursts. Since the geographical coordinates of the receivers
are known, the mobile position can be calculated via hyperbolic trilateration
(3GPPb). Because of the transmission path, the signal received by different
LMUs is affected by 3GPPc:
• Measurements
• Position calculation
• Provide location information to service logic within operator net-
work or to service provider outside operator network
Standalone SMLC
Iucs Lg
Uu
Node B Iub
SRNC HSS
Associated LMU Internal SMLC Iups
Lh
OSA API
Proprietary
Lh Externat
LCS Client
UMTS Network
User equipment GMLC
GSM/GPRS Network
Lid
Lh
Uu Lpp
Ls
SMLC 2G MSC PMD
HLR
Ld A
BTS PPR
Abis
Uu Gb
LMU Type B BSC
2G SGSN
LMU Type A
FIGURE 8.1
LCS architecture.
From previous attacks, users are still scared when using LBS. Barkhuus
(2004) presents two interesting case studies and shows the user’s point of
view about LBS and privacy. The case studies are based on a questionnaire of
students and people who experience real and “imaginary” LBSs. The finding
of this research is that some of the participants express their concern about
user tracking. One third of the participants in the first case study claim that
they would never use tracking services. However, some of participants of the
second case study indicate that they would never set their profile to “visible
to all.” On the other hand, the case studies show that there is a coolness fac-
tor because users see the advantages of location services as well. The author
concludes that a balance must be found between what technology can offer
and what users are willing to accept. Users must be informed about how
location information is measured, stored, and used, so that they can choose
how and when a LBS will be used. Bohm et al. (2004) point out that trustwor-
thiness and transparency are keys to the success of LBSs. Potential subscrib-
ers are attracted by value-added service and also by the feeling of safety
when they disclose location information to service providers. The authors
propose to exploit the existing trust between subscribers and the operator.
The operator should supply users with as much information as possible to
inform them about practices and uses of location information.
Moreover, users can control which service types are allowed to access
personal information by third parties (3GPPd). When evaluating user’s
preferences, a combination of service type option and service classes
can take place. The privacy attributes of the location service consist of
(3GPPd):
The privacy check is based on user preferences. The user mainly defines
the privacy exception list, the privacy classes, the service types, and the pol-
icy of allowing or denying access. The policy also includes if there is a user
verification, which is the final step before handing the location information
to the service provider. The user verifies if the position can be delivered or
not. Based on these parameters, the evaluator identifies the nature of the
service provider and enforces the user policy.
204 Location-Based Services Handbook
For example, after the privacy check, the evaluator of the user’s privacy
preferences, which is the home GMLC/PPR, indicates for call/session-related
or unrelated class the following possible decisions (3GPPa):
On the other hand, the proposed web service may manage the privacy
policy of service composition. This feature is used when the subscriber has,
for example, two service sessions simultaneously, location and presence ser-
vices. In these circumstances, when pseudonymity is used for the location
service, the privacy web service will interrogate the presence service after
being asked the PMD functionality.
8.7 Conclusion
In this chapter, we focused on the location service. We presented some
positioning methods that have different privacy requirements. The satellite
system method is the safest with regard to privacy requirements. The user
has full control over his/her location information. We studied in detail the
location service in cellular networks, how the location is computed, the
architecture within the operator network, and the privacy procedure. We
pointed out the shortcoming of the existing standards: lack of formaliz-
ing privacy and lack of ensuring privacy principals as defi ned by different
legislations. Then, we proposed our solution to enhance privacy protec-
tion when service providers retrieve location information from operator
networks. Privacy remains a challenging issue for operator networks to
gain user acceptance. The next challenge for the operator is to propose
mechanisms to ensure the usage control of location information by service
providers. Digital rights management and provisional obligations can be
considered in the future to constrain service provider access to the location
information of subscribers.
206 Location-Based Services Handbook
References
3GPPa. 3rd Generation Partnership Project, “Functional stage 2 description of
Location Service (LCS)”, 3GPP TS 23.271.
3GPPb. 3rd Generation Partnership Project, “Functional stage 2 description of
Location Service (LCS) in GERAN”, 3GPP TS 43.059.
3GPPc. 3rd Generation Partnership Project, “Stage 2 functional specification of User
Equipment (UE) Positioning in UTRAN”, 3GPP TS 25.305.
3GPPd. 3rd Generation Partnership Project: “Study on a generalized privacy capabil-
ity”, 3GPP TR 22.949.
Ajam N. 2008. “Privacy Based Access to Parlay X Location Services”, in Proceedings
of the Fourth International Conference on Networking and Services, ICNS 2008,
Guadeloupe, March, pp. 204–206, IEEE Computer Society, Washington.
Barkhuus L. 2004. “Privacy in Location-Based Services, Concern vs. Coolness”, in
Proceedings of the Mobile HCI Workshop on Location Systems: Privacy and
Control, Scotland, pp. 24–29.
Bohlm A., T. Leiber, and B. Reufenheuser 2004. “Trust and Transparency in Location-
Based Services: Making Users Lose their Fair of Big Brother”, in Proceedings of
the Mobile HCI Workshop on Location Systems: Privacy and Control, Scotland,
pp. 14–17.
Gorlach A., A. Heinemann, and W.W. Terpstra 2005. “Survey on Location Privacy
in Pervasive Computing”. In “Privacy Security and Trust within the Context of
Pervasive Computing”, The Springer International Series in Engineering and
Computer Science, Vol. 780, pp. 23–34, Springer, USA.
GSM 2003. GSM Association, “Location Based Services”, Permanent Reference
Document PRD SE. 23, January.
Kupper A. 2005. Location-based Services Fundamentals and Operation, Wiley, New York.
Pedersen J. 2004. “Privacy and Location Technologies”, in Proceedings of the Mobile
HCI Workshop on Location Systems: Privacy and Control, Scotland, pp. 18–23.
Tayal M. 2005. “Location Services in the GSM and UMTS Networks”, in Proceedings
of the International Conference on Personal Wireless Communications, ICPWC,
pp. 373–378, New Delhi, India.
Wegdam M., J. Van Bemmel, K. Lagerberg, and P. Leijdekkers 2004. “An Architecture
for User Location in Heterogeneous Mobile Networks”, in Proceedings of the
7th IEEE International Conference on High Speed Networks and Multimedia
Communications, HSNMC, July, pp. 479-491, Springer, Berlin/Heidelberg.
Zuidweg M. 2003. “A P3P-based privacy architecture for a context-aware services
platform”, University of Twente, Netherlands, August, Master’s thesis.
9
Protecting Privacy in Location-
Based Applications
CONTENTS
9.1 Introduction ................................................................................................ 208
9.2 Selecting a Location System to Support Privacy ................................... 209
9.3 Cloaking to Protect Online Privacy ........................................................ 209
9.3.1 Previous work in online location privacy .................................. 210
9.3.2 Mathematical foundation of cloaking......................................... 211
9.3.3 Cloaking system ............................................................................. 212
9.3.3.1 Rounding .......................................................................... 213
9.3.3.2 Truncating ........................................................................ 213
9.3.3.3 Geodetic resolution ......................................................... 213
9.3.3.4 Randomization ................................................................ 215
9.3.4 System analysis .............................................................................. 217
9.3.5 Resources ........................................................................................ 217
9.3.5.1 Power ................................................................................ 218
9.3.5.2 Memory ............................................................................ 219
9.3.5.3 Run-time memory ........................................................... 219
9.3.5.4 Bandwidth ........................................................................ 219
9.4 Problems with Corporate Tracking ......................................................... 220
9.5 Protecting Privacy by Using Prediction ................................................. 221
9.5.1 Location determination................................................................. 221
9.5.1.1 Symbolic location ............................................................222
9.5.2 Related work in location prediction ............................................222
9.5.2.1 MavHome .........................................................................222
9.5.2.2 Using the global positioning system to determine
significant locations ........................................................223
9.5.2.3 Dartmouth College mobility predictions ....................223
9.5.2.4 Predicting future times of availability......................... 224
207
208 Location-Based Services Handbook
9.5.3
Prediction based on text compression ........................................ 224
9.5.3.1 Prediction by partial match ...........................................225
9.5.4 An experiment in prediction........................................................ 226
9.5.4.1 Location determination .................................................. 226
9.5.4.2 Representations ............................................................... 227
9.5.4.3 Protecting privacy during the prediction process ..... 228
9.6 Conclusion .................................................................................................. 229
References............................................................................................................. 229
9.1 Introduction
Location-based systems (LBSs) will have a dramatic impact in the future,
as clearly indicated by market surveys. The demand for navigation services
is predicted to rise by a combined annual growth rate of more than 104%
between 2008 and 2012 (RNCOS 2008). This anticipated growth in LBSs will
be supported by an explosion in the number of location-aware devices avail-
able to the public at reasonable prices. An in-Stat market survey estimated
the number of global positioning system (GPS) devices and IEEE 802.11
(Wi-Fi) devices in the United States in 2005 to be approximately 133 and 120
million, respectively (Kolodziej 2006). The report also estimated market pen-
etration would increase to approximately 137 million by 2006 for GPS and
430 million by 2009 for Wi-Fi.
Many of today’s handheld devices include both navigation and communi-
cation capabilities, e.g., GPS and Wi-Fi. This convergence of communication
and navigation functions is driving a shift in the device market penetra-
tion from GPS-only navigation devices (90% in 2007) to GPS-enabled hand-
sets (78% by 2012) (RNCOS 2008). These new, multi-function devices can
use several sources for location information, including GPS and applications
like Navizon (Navizon) and Place Lab (Place Lab), to calculate an estimate of
the user’s location. Navizon and Place Lab both use multiple inputs, includ-
ing GPS and Wi-Fi, to generate estimates of the user’s current location.
With this growth in location-aware personal devices, user privacy becomes
an important concern. This chapter presents two approaches to protecting
personal location information. One approach, intended to protect against
Internet voyeurs, is to cloak location-aware Internet queries to hide the
user’s true location. The other approach protects against corporate misuse
of employee tracking by predicting an employee’s likely future locations in
order to manage resources.
This chapter begins in section 9.2, with a discussion on how the selection
of the positioning system itself can conceal or reveal someone’s location,
thereby protecting or hampering privacy. Section 9.3 describes an effec-
tive approach to cloaking location-aware Internet queries to protect privacy.
Protecting Privacy in Location-Based Applications 209
commercial service, or a third party AP. In all these cases, it is both reason-
able and prudent to assume that an observer exists who has access to the
user’s information. Several attacks on user location privacy are presented
in Kong, Hong, and Gerla (2003), Deng, Han, and Mishra (2005), Cheng
et al. (2006), and Cvrcek and Vaclav (2004). The intersection attack (Cvrcek
and Vaclav 2004) is of great interest because it correlates several pieces of
data that are common in Internet queries and responses. For this research,
we assume that an observer cannot collect the radio frequency (RF) signals
between device and wireless AP because this would disclose the user’s
location to within about 300 m—the transmission range of an AP.
The presence of a location estimate on the device allows the user to send
queries to Internet-based LBSs to retrieve various pieces of information,
including specific services like restaurants, gas stations, hotels, etc. Once the
device sends the query, the user has no control over the information included
in the query. Any observer with access to the query information can use that
data to estimate the user’s location. This creates a unique issue of location
privacy that must be addressed.
In order to address this privacy issue, the system presented here applies a
user’s privacy threshold to reduce the observer’s ability to estimate the user’s
true location. Artificial location information is sent to the LBS to confuse or
overwhelm any observer who may be lurking.
Kido et al. (2005) create and send false position data (“dummies”) to LBSs
to anonymize the user’s location. Their work uses an anonymity set con-
struct to determine how to distribute the locations for the dummies based on
the number and distribution of users in a region.
None of these cases addresses the solitary user because they all require
the presence of other users within a specific region within some calculated
time interval. If there are no other users in the region, then these techniques
cannot provide location privacy for the user. Our cloaking system does not
require the presence of additional users in the area at the same time, but their
presence adds to the amount of analysis and deconfliction that the observer
has to complete.
1/2
⎡ J
⎛ δu ⎞
2
⎤
su = ⎢
⎢ ∑ ⎜ δx ⎟
⎝ j⎠
s x j
2⎥
⎥
. (9.1)
⎣ j=1 ⎦
∑σ
1
savg = 2
xi , (9.2)
j i =1
212 Location-Based Services Handbook
∑ nσ
j
swt _ avg = i
. (9.3)
∑n
j x1
randomization. All these techniques adjust the seed location’s latitude (lat)
and longitude (lon) components. Examples are provided using a seed loca-
tion of lat: –80.83441, lon: 36.96321.
9.3.3.1 Rounding
This is a straightforward technique where the lat and lon values are rounded
to reduce the accuracy of the estimate. Table 9.1 shows the resulting list of
false locations and the distance from the seed location. Notice that there are
very few points provided and the distance from the seed grows rapidly with
each iteration. The main problem with this technique is that an observer
would likely recognize the pattern and be able to work backwards to the
most accurate location (point “A” in this case) to attempt to locate the user.
9.3.3.2 Truncating
Truncating is similar to the rounding technique and produces correspond-
ing results. The lat and lon values are truncated to reduce the accuracy of
the estimate. Table 9.2 shows the resulting list of bogeys. Again, this process
drives the observer to use the location estimate with the greatest number of
significant digits, point “A.”
TABLE 9.1
Results of the rounding technique to generate the list of bogeys.
Point Lat Lon Distance from seed (m)
Seed –80.83441 36.96321 –
A –80.83440 36.96320 0.90
B –80.83400 36.96300 45.53
C –80.83000 36.96000 493.58
D –80.80000 37.00000 3,882.53
E –81.00000 37.00000 18,430.12
214 Location-Based Services Handbook
TABLE 9.2
Results of the truncating technique to generate the list of bogeys.
Point Lat Lon Distance from seed (m)
Seed –80.83441 36.96321 –
A –80.8344 36.9632 0.90
B –80.834 36.963 45.53
C –80.83 36.96 493.58
D –80.8 36.9 3,988.27
E –81 36 25,005.36
bogey. This produces a list of bogeys that are within an area that is both large
enough that the user’s privacy threshold can be met and yet small enough
that the observer would have to consider each location as a valid possibility
for the user’s true location. That said, some of the initial bogeys are unrealis-
tically far from the true location and could provide evidence to the observer
that the user’s location is being adjusted. Therefore, the list is trimmed from
the top by removing those bogeys. In order to prevent the observer from pre-
dicting the bogeys for the next run based on a constant change in r, the value
of r is selected randomly for each run of the cloaking system. Table 9.3 shows
the results of a sample run using the geodetic formula. This list would be
finalized by removing bogeys “A” and “B” because they are unrealistically
TABLE 9.3
Results of the geodetic resolution formula to generate bogeys.
Point Resolution Lat Lon Distance from seed (m)
Seed –80.83441 36.96321 –
A 0.709507 –80.33745 36.64515 55,578.56
B 1.419014 –81.04216 36.64515 23,770.83
C 2.128522 –80.80726 37.11496 4,045.94
D 2.838029 –80.68981 36.99751 16,095.67
E 3.547536 –80.90122 36.92704 7,458.98
F 4.257043 –80.80726 36.88006 3,360.93
G 4.966551 –80.74014 37.04785 10,592.84
H 5.676058 –80.86599 36.99751 3,564.35
I 6.385565 –80.80726 36.95836 3,021.01
J 7.095072 –80.90122 36.92704 7,458.98
K 7.804579 –80.84997 36.90141 2,047.57
L 8.514087 –80.80726 36.99751 3,080.51
M 9.223594 –80.87954 36.97041 5,021.36
N 9.933101 –80.84082 36.94717 767.34
O 10.64261 –80.80726 36.92704 3,087.23
P 11.35212 –80.86599 36.99751 3,564.35
Q 12.06162 –80.83489 36.97678 246.54
Protecting Privacy in Location-Based Applications 215
far from the seed and “Q” because that bogey is inside the distance threshold
(300 m for this example).
FLOOR(n * r + 0.5)
n′ = . (9.4)
r
9.3.3.4 Randomization
In this technique, the bogeys are generated with random numbers used
to determine the direction and distance from the seed value. As with the
geodetic formula, this produces a list of bogeys that are within an area
large enough to meet the user’s privacy threshold and small enough for
the observer to consider each location as a valid possibility for the user’s true
location. However, there is no need to trim the list because all the bogeys
area reasonable distance from the true location. Table 9.4 presents an exam-
ple bogey list generated by the application.
A possible first action for the observer could be to plot all the locations
he/she gains access to while eavesdropping on the network. The graphs for
the four techniques are shown in Figure 9.1. While each of these techniques
could be used to generate the bogey list, the trimmed list from the geodetic
formula and the randomization list are really the only viable options to gen-
TABLE 9.4
Results of the randomization process to generate bogeys.
Point Lat Lon Distance from seed (m)
Seed –80.83441 36.96321 –
A –80.77836 36.99602 6,261.35
B –80.80086 36.986 3,753.72
C –80.79328 37.00356 4,630.42
D –80.77184 36.93656 6,975.66
E –80.8231 36.97955 1,290.50
F –80.81087 36.99274 2,669.66
G –80.79659 36.96155 4,206.17
H –80.83809 36.99278 665.07
I –80.81313 37.01123 2,514.87
J –80.7854 36.98873 5,470.32
K –80.84272 36.96575 925.37
L –80.83401 36.96974 123.85
M –80.77856 36.97517 6,215.82
N –80.781 36.96256 5,940.59
O –80.83265 36.97962 350.60
P –80.84138 36.98952 904.55
216 Location-Based Services Handbook
Longitude
36.60
36.98
36.40
36.20
36.96
36.00
36.94 35.80
–81.20 –81.00 –80.80 –80.60 –81.20 –81.00 –80.80 –80.60
Latitude Latitude
A B C D E Seed A B C D E Seed
37.00
37.00
Longitude
Longitude
36.98
36.96
36.80
36.94
36.60 36.92
–81.20 –81.00 –80.80 –80.60 –80.40 –80.20 –81.0044 –80.8427 –80.6810
Latitude Latitude
A B C D E F G H I
J K L M N O P Q Seed A B C D E F G H I J K L M N O P Seed
FIGURE 9.1
Comparison of techniques to generate bogey list.
erate enough bogeys in the region to cause the observer to consider multiple
points as he/she tries to locate the user.
The bogey list is used to validate that the area represented meets several
criteria. Our application uses the bogey list to generate queries predefined
for several services: restaurants, gas stations, and hotels. The format for each
query is the same except for identifying which service the user desires. An
example query for hotels in the area would be:
“http://www.google.com/maps?hl=en&q=hotels&near=”+ bogeys.locL
at[bogeysIndex]+”%2C”+bogeys.locLon[bogeysIndex];
where locLat and locLon represent the latitude and longitude for each
bogey.
The results of the queries are used to verify both facets of the privacy
threshold.
Finally, individual standard deviations are calculated for each location
(seed, bogey, response) and zip codes in the response set. These standard
deviations are combined using Equations 9.2 and 9.3 to calculate the stan-
dard deviation for both combining functions: average and weighted aver-
age. The standard deviation of the weighted average uses a common factor
of the smallest component standard deviation and is therefore always more
conservative than the standard deviation of the average. Therefore, the swt_avg
Protecting Privacy in Location-Based Applications 217
must be greater than TD, then the system presents the user with the results of
his/her request. If this is not the case, additional bogeys are generated until
all conditions are met.
9.3.5 Resources
Three critical resources on portable devices are power, memory, and net-
work bandwidth. Details of the resource analysis are summarized here and
presented in Bowen, Martin, and Raymond (submitted).
TABLE 9.5
Average values of p(select) for each device for a given minimum number of bogeys.
Minimum number of bogeys
Device 5 10 12 15 20
iPAQ 4150 0.018 0.016 0.009 0.016 0.015
iPAQ 4155 0.018 0.017 0.012 0.014 0.020
Axim X30(i) 0.009 0.016 0.013 0.022 0.021
Axim X30(s) 0.010 0.010 0.023 0.017 0.013
Axim X51(s) 0.011 0.015 0.020 0.018 0.012
Axim X51(t) 0.020 0.014 0.017 0.011 0.019
Qtek9100 0.014 0.017 0.020 0.011 0.014
Combined average 0.014 0.015 0.016 0.016 0.016
Maximum value 0.109 0.118 0.105 0.128 0.093
218 Location-Based Services Handbook
TABLE 9.6
Standard deviations (m) for components and the weighted average function on the
iPAQ 4155.
Minimum number of bogeys
Component 5 10 12 15 20
Seed Lat 5,434.68 5,318.67 5,334.82 5,430.54 5,450.03
Seed Lon 5,601.83 5,456.08 5,387.12 5,384.90 5,410.90
Bogeys Lat 7,468.00 7,671.38 8,846.97 8,438.52 8,490.70
Bogeys Lon 8,963.89 8,712.62 8,694.05 8,880.01 8,963.34
Responses Lat 5,978.26 6,398.72 6,455.63 6,027.02 5,627.54
Responses Lon 8,463.97 7,335.64 5,628.45 6,583.98 6,001.445
Zips Lat 7,893.70 10,351.21 7,298.18 7,307.37 7,569.937
Zip Lon 12,420.30 14,140.88 10,939.53 10,477.75 12,639.68
Weighted average 1,989.80 1,904.85 1,724.453 1,878.37 1,726.19
9.3.5.1 Power
Data from the smart battery are used to calculate energy consumption both
with and without the cloaking mechanism in place. Samples were acquired
from the smart battery driver using the SYSTEM_POWER_STATUS_EX2
(MSDN Library) class, which is part of the Microsoft Compact Framework
standard library. In order to determine the impact of the cloaking system
on the power consumption of each device, 20 tests were run with increas-
ing values for the number of bogeys (of at least x, where x = 5, 10, 12, 15,
or 20). Each test was a single run of the cloaking system that accessed the
Internet through a Wi-Fi router built into the 5 Mbps fiber optic modem
connection.
The power impact is determined by calculating a weighted power con-
sumption rate and comparing that to data collected on power consump-
tion without the cloaking system running. The weighting is determined
by the percentage of time that the cloaking system is running. For all
devices, the execution times observed during testing averaged less than
2.5 min. The ratio between the average execution time for each device and
the charge lifetime without the cloaking system running is calculated to
determine a percentage of usage time for a single run of the cloaking sys-
tem across each type of device. In all cases, the usage time for a single run
was no greater than 2.3%, as shown in Table 9.7. The increase in power
consumption from the idle state was less than 1% for all PDAs and 1.63%
for the Qtek 9100 phone. This is to be expected, as the slow processor
extended the elapsed time on each run.
In the final analysis, the short execution times allow for the calculation of
a weighted average power consumption rate that is less than 2% more than if
the device remained idle for the entire time. With power consumption under
control, the next concern is on-device memory usage.
Protecting Privacy in Location-Based Applications 219
TABLE 9.7
Values of usage time and the associated weighted average power consumption for
at least 10 bogeys.
Weighted power Increase in power
Device Usage time (%) consumption consumption (%)
iPAQ 4150 2.3 1.392 0.49
iPAQ 4155 2.1 1.404 0.50
Axim X30(i) 1.0 0.720 0.48
Axim X30(s) 1.1 0.748 0.54
Axim X51(s) 2.0 1.573 0.56
Axim X51(t) 2.1 1.756 0.63
Qtek 9100 2.3 0.822 1.63
9.3.5.2 Memory
On-device memory is another limited resource for consideration. The two
main components of memory that must be analyzed are storage and run-time
RAM. As part of the deployed cloaking system, there are several files that are
stored on a device, including the cloaking application itself and seven data
files. These files include the name, longitude, and latitude of the different
pieces of information, including zip codes, cities, counties, etc. Other data
files begin as empty files and are appended with each run, building a histori-
cal file for each data element. The entire package is just over 1.52 MB. This
should be easily manageable on all the devices used because the smallest
amount of memory for storage present on these devices is 32 MB.
9.3.5.4 Bandwidth
The use of multiple queries in rapid succession has a minimal impact on
bandwidth consumption. On average, each query took 3.8 sec to complete.
This is measured by elapsed time between start of each query and the end
of the response for the last query and dividing that time by the number of
220 Location-Based Services Handbook
queries sent. The average numbers of Mbps sent and received were 0.000234
and 0.203942, respectively.
A review of the firewall logs of the supporting infrastructure did not indi-
cate any impact on the network, including disruption or flooding on the
Internet connection. Additionally, the multiple queries did not cause the
device to be identified as one of the “top 10 talkers” monitored by the secu-
rity administrators. This indicates that the cloaking application did not meet
their criteria for a flooding attack.
Overall, the results of our tests indicate that the traditional concerns of
resource constraints in mobile computing are adequately addressed and the
use of our application does not negatively impact the user’s ability to con-
tinue using the device with respect to power, memory, bandwidth, and user’s
time.
taking a legitimate detour that takes him/her outside preset digital bound-
aries. The ability to track people will only increase in the future, with the
sale of GPS-enabled devices projected to reach 560 million in 2012 (Berg
Insight 2008).
if the location information is kept on the user’s device and not broadcasted.
Currently, location estimation by AP is the only globally available solution
that works indoors, where most of us work and live.
There are a few disadvantages with using APs to determine location. To
use an AP as a reference point, its exact location must be known. Currently,
most APs are installed without records of their exact locations. Corporate
users, such as universities, record AP locations for maintenance purposes.
If the use of voice-over-Internet-protocol (VoIP) on mobile devices continues
to grow, E-911 regulations will require that the device can be located in case
of an emergency. It seems a logical conclusion that future APs may be pro-
grammed to broadcast their locations.
Environmental factors can affect how strongly the AP signal is received
by the mobile device. Because of these variations in received signal strength,
location estimates using 802.11 APs are not very precise (compared to GPS),
determining location within approximately 32 m (Kim, Fielding, and Kotz
2006).
9.5.2.1 MavHome
The MavHome (Managing an Adaptive Versatile Home) at The University of
Texas at Arlington is a smart home that seeks to “maximize inhabitant com-
fort and minimize operation cost” (Das et al. 2002). The inside and surround-
ing area of the home is divided into zones in order to track the inhabitants’
locations. The MavHome uses location prediction in order to know which
motion sensors to poll to find the inhabitant. The prediction serves two pur-
poses, reducing the number of sensors that need to be polled and allowing
Protecting Privacy in Location-Based Applications 223
longer time periods between location polls. In addition, the predictions can
be used to allocate resources, such as adjusting the lights and temperature in
rooms that are soon to be occupied (Cook et al. 2003).
Prediction is done using the LeZi-update algorithm (Bhattacharya and Das
1999), an update scheme based on the dictionary-based LZ78 compression
algorithm (Ziv and Lempel 1978). Movement history is stored as a string of
zones, e.g., mamcmrkdkdgoog. The LZ78 compression algorithm encodes vari-
able length string segments using fixed length dictionary indices, updating
the dictionary as new “phrases” are seen. For example, the string of zones
above would be parsed into the unique phrases m, a, mc, mr, k, d, kd, g, o, og.
Common phrases represent common paths through the house. The phrases
and their frequencies are stored in a tree and used to calculate the probabili-
ties of each phrase, given the movement history. Recent results (Roy, Das,
and Basu 2007) report prediction success rates of ~94% for a retired person,
~90% for an office employee, and ~85% for a graduate student. The current
implementation of this model predicts the next location and path.
was implemented that allowed the predictor to use shorter and shorter con-
text strings until it could make a prediction. This approach is similar to the
prediction-by-partial-match (PPM) algorithm used in our experiments. This
fallback procedure improved accuracy, resulting in a total accuracy of 65%–
72% for the second-order Markov predictor with fallback.
This project is the only large-scale project using IEEE 802.11 positioning
of a large number of users. The result of 65%–72% prediction is the baseline
for our experiments. Our goal is to see if adding temporal information to a
prediction model will improve the predictions and allow us to ask questions
about the users’ locations farther into the future.
algorithms were able to recognize the patterns in the music. The specifica-
tion of music correlates with the specification of a user’s path throughout the
day, which consists of locations, starting times, and durations. The goal of
our project described below is to embed temporal and place information in
a string of single variables that will be used to build a model based on data
compression to predict both location and time.
Begleiter et al. (2004) found that the prediction by partial match (PPM) and
context tree weighting (CTW) algorithms resulted in the lowest average log-
loss when tested on MIDI (music) files. Our project focuses on using the PPM
algorithm to predict both time and location.
TABLE 9.8
PPM-C model after training on the string abracadabra.
Second order First order Zeroth order
Prediction Count Prob. Prediction Count Prob. Prediction Count Prob.
ab→r 2 2/3 a→b 2 2/7 →a 5 5/16
ab→ESC 1 1/3 a→c 1 1/7 →b 2 2/16
a→d 1 1/7 →c 1 1/16
ac→a 1 1/2 a→ESC 3 3/7 →d 1 1/16
ac→ESC 1 1/2 →r 2 2/16
b→r 2 2/3 →ESC 5 5/16
ad→a 1 1/2 b→ESC 1 1/3
ad→ESC 1 1/2
c→a 1 ½
br→a 2 2/3 c→ESC 1 ½
br→ESC 1 1/3
d→a 1 ½
ca→d 1 1/2 d→ESC 1 ½
ca→ESC 1 1/2
r→a 2 2/3
da→b 1 1/2 r→ESC 1 1/3
da→ESC 1 1/2
ra→c 1 1/2
ra→ESC 1 1/2
Note: The Count column is the count of the number of times that a character (or set of charac-
ters) occurred in the training string in the given context. The Prob. column is the probabil-
ity of that character occurring in the given context. Escape characters are returned to tell
the model to drop to a lower order.
Past Location
Translate
Data: Time1,
location
Location1, 1A,2B,... Train Algorithm Tree Test Algorithm Results
information into a
Time2,
representation
Location2, ...
Test Data
FIGURE 9.2
Prediction algorithm.
(places). While the implementation of these steps may be different for each
location system selected, the general result is that any location system could
be used for prediction.
In our experiment, location is determined using nearby APs as loca-
tion beacons. The advantages of this technique are that APs are pervasive
throughout a campus environment and can be sensed both indoors and out-
doors. The location is calculated on the user’s device, which supports the
user’s privacy. This experiment used real-world data collected at UCSD. As
part of the Wireless Topology Discovery (WTD) project at UCSD, researchers
issued PDAs to 300 freshmen and collected movement traces (McNett and
Voelker 2005). The data were collected during an 11-week trace period from
September 9, 2002, to December 8, 2002. For this experiment, we selected six
users, the three most mobile users (with over 70 unique locations visited)
and three mobile users (with 33 unique locations visited). We used the first
five weeks of data for training and then used the sixth week for testing the
predictions. For the three users who had logs for week #10, we used weeks
5 through 9 for training and tested against week #10. This gave us nine data-
sets of training and testing data that were used in the experiments.
9.5.4.2 Representations
The location and time information is translated into a sequence of characters
called the representation. Several different combinations of representations
were tried, from the simplest sequence of locations only, to combinations that
included times and session durations. The original implementation of the
basic PPM-C data compression algorithm in C (Nelson 1991) was expanded
to support 16-bit symbols. This model will support an alphabet size of 65,535,
which is enough for the several hundred locations and possibly thousands of
timeslots to be mapped to single character values.
An experiment was run to determine the effect of using different types
of representations for someone’s location and time information. One rep-
resentation performed better than the rest. It recorded the users’ locations
(if known) at 10-min intervals. For example, if Bob’s morning is shown in
Table 9.9 and the time-of-day is translated using Table 9.10, his representation
is aAbAcAdBeBfC.
228 Location-Based Services Handbook
TABLE 9.9
Bob’s morning.
Starting time Location Duration (mins)
9:00 a.m. A 30
10:00 a.m. B 20
Noon C 10
The test was run over nine datasets covering six users. The PPM model
was trained using the five weeks of training data and then asked to predict
the locations for the following week, which were compared against the test-
ing data to see how many predictions were correct.
Initially, the model was asked to predict the next location. The following
test asked the model to predict not only the location, but also the time associ-
ated with that location. The results, shown in Figure 9.3, show that 84% of the
time, the PPM-C model correctly predicted the next location. When asked to
predict the next location and the time associated with it, the PPM-C model
was correct 65% of the time, which meets the baseline set by the Dartmouth
study.
TABLE 9.10
Examples of how time of day is translated into single characters.
Time Translation
9:00 a
9:10 b
9:20 c
10:00 d
10:10 e
Noon f
Protecting Privacy in Location-Based Applications 229
50
40
30
20
10
0
Predict next location Predict next time and location
Type of prediction
FIGURE 9.3
Percentage of correct predictions when predicting time and location.
9.6 Conclusion
The demand and opportunity for LBSs is increasing dramatically. While
these are useful and vital services, care must be taken to protect sensitive,
private location information. This chapter presented two approaches to pro-
tecting a user’s location information. First, cloaking can be used to create
Internet queries that camouflage the user’s true location. Secondly, predic-
tion of location can be used instead of true location, especially in employee-
tracking applications.
References
Ashbrook, Daniel, and Thad Starner. 2002. Learning significant locations and predict-
ing user movement with GPS. In Sixth IEEE International Symposium on Wearable
Computers: 101–108.
———. 2003. Using GPS to learn significant locations and predict movement across
multiple users. Personal and Ubiquitous Computing 7 (5): 275–286.
230 Location-Based Services Handbook
Begleiter, Ron, Ran El-Yaniv, and Golan Yona. 2004. On Prediction Using Variable
Order Markov Models. Journal of Artificial Intelligence Research 22: 385–421.
Beresford, Alastair R., and Frank Stajano. 2003. Location privacy in pervasive com-
puting. IEEE Pervasive Computing 2 (1): 46–55.
Berg Insight. 2008. 2008 [cited 1 April 2008]. Available from http://www.bergin-
sight.com/News.aspx?m_m=6&s_m=1.
Bhattacharya, Amiya, and Sajal K. Das. 1999. LeZi-update: an information-theoretic
approach to track mobile users in PCS networks. In 5th annual ACM/IEEE inter-
national conference on Mobile computing and networking: 1–12. Seattle, Washington,
United States: ACM Press.
Bowen, Calvert L. and Thomas L. Martin. 2006. Combining Position Estimates to
Enhance User Localization. Paper read at WPMC 06, September 17–20, 2006, at
San Diego, California.
———. 2007. Preserving User Location Privacy Based on Web Queries and LBS
Responses. Paper read at The 8th Annual IEEE Systems, Man and Cybernetics
(SMC) Information Assurance Workshop, 2007, June 20–22, 2007, at United
States Military Academy, West Point, New York.
Bowen, Calvert L., Thomas L. Martin, and David R. Raymond. Preserving location
privacy while using location based systems on wireless devices. Ubiquitous
Computing and Communication Journal (submitted for review).
Chen, I-Cheng K., John T. Coffey, and Trevor N. Mudge. 1996. Analysis of branch
prediction via data compression. In Proceedings of the seventh international con-
ference on Architectural support for programming languages and operating systems.
Cambridge, Massachusetts, United States: ACM.
Cheng, Reynold, Y. Zhang, E. Bertino, and Sunil Prabhakar. 2006. Preserving User
Location Privacy in Mobile Data Management Infrastructures. Paper read at
PET 2006, June 28–30, 2006, at Cambridge, United Kingdom.
Cleary, John G. and Ian H. Witten. 1984. Data Compression Using Adaptive Coding
and Partial String Matching. IEEE Transactions on Communications 32 (4): 396–402.
Cook, Diane J., Michael Youngblood, Edwin O. Heierman, III, Karthick Gopalratnam,
Sira Rao, Andrey Litvin, and Farhan Khawaja. 2003. MavHome: an agent-based
smart home. Paper read at the First IEEE International Conference on Pervasive
Computing and Communications, 2003. (PerCom 2003).
Cvrcek, Daniel, and Matyas Vaclav. 2004. On the Role of Contextual Information
for Privacy Attacks and Classification. Paper read at Workshop on Privacy
and Security Aspects of Data Mining, November 1, 2004, at Brighton, United
Kingdom.
Das, Sajal K., Diane J. Cook, Amiya Battacharya, Edwin O. Heierman, III, and Tze-
Yun Lin. 2002. The role of prediction algorithms in the MavHome smart home
architecture. IEEE Wireless Communications 9 (6): 77–84.
Deng, Jing, Richard Han, and Shivakant Mishra. 2005. Countermeasures Against
Traffic Analysis in Wireless Sensor Networks. Paper read at SecureComm 05,
September 5–9, 2005, at Athens, Greece.
Deshpande, Mukund, and George Karypis. 2004. Selective Markov models for pre-
dicting Web page accesses. ACM Press. ACM Transactions on Internet Technology
4 (2): 163–84.
Eltman, Frank. 2007. GPS Helps Cities Catch Goof-Offs. ABC News, http://abc-
news.go.com/Technology/wireStory?id=3872325.
Protecting Privacy in Location-Based Applications 231
Geller, Adam. 2005. Bosses keep sharp eye on mobile workers via GPS. USA Today.
Google Maps. 2008. 2008 [cited 31 March 2008]. Available from maps.google.com.
Grimes, John G. 2009. Directive-Type Memorandum (DTM) 08-039: Commercial
Wireless Metropolitan Area Network (WMAN) Systems and Technologies.
edited by Defense.
Gruber, Jeremy. 2005. On Your Tracks: GPS Tracking in the Workplace. Princeton, NJ:
The National Workrights Institute.
Gruteser, Marco, and Dirk Grunwald. 2003. Anonymous usage of location-based ser-
vices through spatial and temporal cloaking. Paper read at MobiSys 2003, May
5–8, 2003, at San Francisco, California.
Hightower, Jeffrey, and Gaetano Borriello. 2001. Location systems for ubiquitous
computing. Computer 34 (8): 57–66.
Hightower, Jeffrey, Sunny Consolvo, Anthony LaMarca, Ian Smith, and Jeff Hughes.
2005. Learning and Recognizing the Places We Go. Paper read at Ubicomp 2005,
September, 2005.
Hill, Rosco, and James Begole. 2003. Activity rhythm detection and modeling. In
CHI ‘03 extended abstracts on Human factors in computing systems. Ft. Lauderdale,
Florida, USA: ACM Press.
Kido, Hidetoshi, Yutaka Yanagisawa, and Tetsuji Satoh. 2005. An anonymous com-
munication technique using dummies for location-based services. Paper read at
IEEE ICPS’05, July 11–14, 2005, at Santorini, Greece.
Kim, Minkyong, Jeffrey J. Fielding, and David Kotz. 2006. Risks of using AP locations
discovered through war driving. Paper read at Fourth International Conference
on Pervasive Computing (Pervasive), at Dublin, Ireland.
Kolodziej, Krzysztof. Advances in GPS: NAVIZON, October 31, 2006. 2006 [cited June
11, 2007]. Available from http://www.lbszone.com/content/view/1171/45/.
Kong, Jiejun, Xiaoyan Hong, and Mario Gerla. 2003. A New Set of Passive Routing
Attacks in Mobile Ad-hoc Networks. Paper read at MILCOM 2003, October
13–16, 2003, at Boston, Massachusetts.
LaMarca, Anthony, Yatin Chawathe, Sunny Consolvo, Jeffrey Hightower, Ian Smith,
James Scott, Tim Sohn, James Howard, Jeff Hughes, Fred Potter, Jason Tabert,
Pauline Powledge, Gaetano Borriello, and Bill Schilit. 2005. Place Lab: Device
Positioning Using Radio Beacons in the Wild. In Pervasive 2005. Munich,
Germany.
MacKay, David J. C. 2002. Information Theory, Inference & Learning Algorithms. 1st edi-
tion ed: Cambridge University Press.
MapQuest. 2008. [cited 31 March 2008]. Available from www.mapquest.com.
McNett, Marvin, and Geoffrey M. Voelker. 2005. Access and mobility of wireless PDA
users. SIGMOBILE Mob. Comput. Commun. Rev. 9 (2): 40–55.
Nelson, Mark. 1991. Arithmetic Coding + Statistical Modeling = Data Compression.
Dr. Dobb’s Journal, February, 1991.
Parratt, Lyman G. 1971. Probability and Experimental Errors in Science; an Elementary
Survey. New York: Dover Publications, Inc.
Petzold, Jan, Faruk Bagci, Wolfgang Trumler, and Theo Ungerer. 2005. Next Location
Prediction Within a Smart Office Building. In Workshop on Exploiting Context
Histories in Smart Environments - Pervasive 2005. Munich, Germany.
Priyantha, Nissanka, Anit Chakraborty, and Hari Balakrishnan. 2000. The Cricket
Location-Support System. In MOBICOM. Boston, MA: ACM.
RNCOS. 2008. World GPS Market Forecast to 2012. Delhi, India.
232 Location-Based Services Handbook
Roy, Abhishek, Sajal K. Das, and Kalyan Basu. 2007. A Predictive Framework for
Location-Aware Resource Management in Smart Homes. IEEE Transactions on
Mobile Computing 6 (11): 1284–1283.
Schulzrinne, Henning, Hannes Tschofenig, John B. Morris, Jorge R. Cuellar, and James
Polk. 2007. 6.5.2. Geodetic Location Profile. In Geolocation Policy: A Document
Format for Expressing Privacy Preferences for Location Information (Internet Draft
13): Internet Engineering Task Force.
Skyhook Wireless. 2008. 2008 [cited February 11 2008]. Available from www.skyhook-
wireless.com.
Song, Libo, David Kotz, Ravi Jain, and Xiaoning He. 2004. Evaluating location predic-
tors with extensive Wi-Fi mobility data. In Twenty-third Annual Joint Conference
of the IEEE Computer and Communications Societies INFOCOMM 2004.
SYSTEM_POWER_STATUS_EX2. Microsoft Developer Network.
Vitter, Jeffrey Scott, and P. Krishnan. 1996. Optimal prefetching via data compression.
J. ACM 43 (5): 771–793.
Want, Roy, Andy Hopper, Veronica Falcao, and Jonathan Gibbons. 1992. The Active
Badge Location System. ACM Transactions on Information Systems 10 (1): 91–102.
Wolfowitz, Paul. 2004 (Recertified 2007). Department of Defense Directive 8100.02: Use
of Commercial Wireless Devices, Services and Technologies in the Department
of Defense (DoD) Global Information Grid (GIG). edited by Defense.
Zhou, Changqing, Pamela Ludford, Dan Frankowski, and Loren Terveen. 2005. An
experiment in discovering personally meaningful places from location data. In
CHI ‘05 extended abstracts on Human factors in computing systems. Portland, OR,
USA: ACM Press.
Ziv, Jacob, and Abraham Lempel. 1978. Compression of individual sequences via
variable-rate coding. IEEE Transactions on Information Theory 24 (5): 530–536.
10
Presence Services for the Support
of Location-Based Applications
CONTENTS
10.1 Introduction ................................................................................................234
10.2 Presence-Based LBS Infrastructures: Background and Open Issues . 236
10.2.1 Reference IMPP PS......................................................................... 236
10.2.2 IMPS................................................................................................. 237
10.2.3 XMPP ............................................................................................... 239
10.2.4 IMS PS.............................................................................................. 241
10.2.5 Discussion ....................................................................................... 243
10.3 State-of-the-Art of Management Solutions for IMS PS Scalability ..... 246
10.3.1 Local scope...................................................................................... 247
10.3.2 Intra-domain scope........................................................................ 247
10.3.3 Inter-domain scope ........................................................................ 248
10.3.4 State-of-the-art summary ............................................................. 249
10.4 IHMAS for IMS PS Scalability ................................................................. 249
10.4.1 Design guidelines and architectural model for enhanced
scalability of IMS PS ...................................................................... 250
10.4.1.1 Filtering criteria and session state management ........ 250
10.4.1.2 Intra-domain dynamic load balancing and data-
centric sessions ................................................................ 250
10.4.1.3 Service-aware static balancing to partition intra-
domain load ..................................................................... 251
10.4.1.4 Inter-domain transmission optimizations .................. 251
10.4.2 IHMAS load-balancing solutions ................................................ 252
10.5 Presence-Based Infrastructures for LBS Support: Next Steps ............. 253
10.5.1 Real-time monitoring of IMS infrastructure .............................254
10.5.2 Virtualized PSs for scalable composition of presence
information .....................................................................................254
233
234 Location-Based Services Handbook
10.1 Introduction
A growing number of mobile users demand seamless access to their services
while they move across heterogeneous wireless infrastructures, spanning
from IEEE 802.11 and Bluetooth to cellular 3G and beyond. Even if device
and network capabilities are growing, the development of mobile location-
based services (LBS) applications over this fully integrated wireless provi-
sioning infrastructure remains a very challenging task because of the ‘hard’
service requirements of quality of service (QoS) and high scalability. For
instance, disaster recovery scenarios, such as earthquakes and natural disas-
ters, require prompt and scalable retrieval of user location information about
many citizens to be timely delivered with soft real-time QoS constraints to
many different information systems (e.g., emergency response team systems,
fire fighters systems, etc.). In addition, high user mobility further stresses
service requirements by producing frequent location update notifications,
thereby forcing consideration of innovative solutions for scalable location
data dissemination. In the last years, presence services (PSs), traditionally
exploited to keep only the online status of users in the traditional wired
Internet, are gaining the ambitious role of maintaining and disseminating
the whole context of users/services in IP-based mobile networks, including
location information (Shacham et al. 2007).
Given the recognized need to support interoperable PSs and presence data
dissemination over converged all-IP wireless networks, various standard-
ization efforts have been carried out during the last decade to overcome the
interoperability problems of the (several) proprietary specifications already
available in the fixed Internet, such as Microsoft Messenger, AOL Instant
Messenger, Yahoo! Messenger, and Skype instant messaging. Nowadays, it is
recognized that the three main emerging PS standards are: (i) the instant mes-
saging and presence services (IMPS)—formerly Wireless Village—from Open
Mobile Alliance (OMA), (ii) the extensible messaging and presence protocol
(XMPP)—the core protocol for Jabber—from Internet Engineering Task Force
(IETF), and (iii) the IP Multimedia Subsystem (IMS) PS—a conjunct standard-
ization effort from 3rd Generation Partnership Project (3GPP), 3rd Generation
Partnership Project 2 (3GPP2), IETF, and OMA (OMA IMPS 2007; IETF RFC3920
2004; IETF RFC3921 2004; Camarillo and García-Martín 2006). These three stan-
dards start from the idea of simplifying the design and implementation of
Presence Services for the Support of Location-Based Applications 235
Presence Service
Presence
Protocol
Presentity Watcher
Presence Watcher
User Agent User Agent
FIGURE 10.1
General PS model.
general PS model, together with the primary interactions among all the
main entities introduced above.
The PS model introduces additional functions to regulate access to the PS
state. In particular, it introduces access rules that permit presentities to limit
the visibility of published presence information to a subset of watchers. In
addition, PS maintains subscription information about all subscribers and,
more generally, watcher information, in order to maintain the interaction state
between PS and fetchers. Similar to access rules, specific visibility rules can
limit the visibility of watcher information. (For additional details about the
PS model and terminology, please refer to IETF RFC2778 [2000] and IETF
RFC2779 [2000].)
10.2.2 IMPS
The IMPS standard has been designed and tailored to provide interoperable
PS and instant messaging in converged (fixed and mobile) environments.
IMPS was initially proposed by the Wireless Village Initiative and founded
by cellular vendors such as Motorola, Nokia, and Ericsson; since 2002, IMPS
has been merged into OMA IMPS (WV IMPS 2002; OMA IMPS 2007). The
design of IMPS is heavily inspired by and shares many similarities with the
IETF IMPP reference model; for instance, presence information representa-
tions and presence methods to publish/subscribe/notify presence changes
are similar to those defined in IETF RFC2778 (2000) and IETF RFC2779 (2000).
Figure 10.2 depicts the client-server distributed architecture of IMPS.
The core IMPS functional entities are:
• IMPS server, which is the core component and coordinates the inter-
action of all IMPS entities. The IMPS server offers four main services,
namely, PS, instant messaging service, group service, and content
service, implemented as service elements accessible via the service
access point (SAP). The specification also defines open XML-based
interconnection protocols to enable IMPS server interaction with
IMPS-compliant clients (client-server protocol—CSP), other IMPS
238 Location-Based Services Handbook
IMPS Server
Service Element-n
Service Element-…
Service Element-1
Proprietary
PS
IMPS
Service Access Point
Client
Proprietary Gateway
Mobile Core Network Service Access Point
IMPS
Service Access Point
Client IMPS
Client
Service Element-n
Service Element-…
Service Element-1
IMPS Server
FIGURE 10.2
The IMPS distributed architecture.
FIGURE 10.3
IMPS protocol stack.
Let us finally note that IMPS has open issues in the field of network
and service management. First, to the best of our knowledge, none of the
existing standard and research efforts on IMPS tackle scalability issues,
especially for inter-domain deployments in wide-area wireless networks.
For instance, when a watcher subscribes to multiple presentities in dif-
ferent domains, IMPS is forced to deliver multiple notifications (one for
each watcher-presentity pair). Second, even if point-to-point encryption
is deployed, it does not support end-to-end secure message delivery. (For
additional details about OMA IMPS, please refer to OMA IMPS [2007].)
10.2.3 XMPP
The XMPP is an open standard for presence-aware near-real-time mes-
saging and was initially designed for (traditional) fixed Internet environ-
ments. Originally developed in the Jabber open-source community and
subsequently formalized by IETF, XMPP has also been influenced by IETF
IMPP work (IETF RFC3920 2004; IETF RFC3921 2004; Saint-Andre 2009;
IETF RFC2778 2000; IETF RFC2779 2000). XMPP adopts a client-server
architecture (see Figure 10.4) and exploits long-lived transmission control
protocol (TCP) connections and incremental XML parsing techniques to
enable open, extensible, and efficient exchange of basic and rich presence
elements.
In particular, XMPP entities do not exchange complete XML documents,
but well-defined chunks of XML, called XML streams. XML streams contain
so-called XML stanzas (first-level child elements). XMPP defines three core
stanza types, corresponding to the three main delivery semantics needed:
message to enable “push” instant messaging, presence for PS communica-
tions according to the IETF IMPP model, and iq to enable a request-response
mechanism similar to HTTP.
The main XMPP entities are:
XMPP Server
domainC
FIGURE 10.4
The XMPP distributed architecture.
10.2.4 IMS PS
3GPP, 3GPP2, IETF, and OMA have agreed to define the IMS to support
mobile services over all-IP wireless networks by adopting an application-
layer approach based on SIP to harmonize session control. IMS recognizes
PS as a core support facility for any novel mobility-enabled service (3GPP
PS 2008; 3GPP2 PS 2008; OMA SIMPLE 2008). IMS PS is based on both IETF
IMPP and IETF SIP for instant messaging and presence leveraging exten-
sions (SIMPLE) working group standards (IETF RFC2778 2000; IETF RFC2779
2000; IETF SIMPLE 2009). To understand fully both the survey on IMS PS
optimizations presented in the second part of this chapter and our original
242 Location-Based Services Handbook
IHMAS solution, let us provide some background about the IMS and IMS PS
components.
With respect to IMPS and XMPP, IMS PS adopts a more complex and decen-
tralized proxy-based architecture derived from IMS, with the following core
functional entities. The IMS client controls session setup and media trans-
port via SIP extensions specified by the IETF and 3GPP IMS-related stan-
dards. The proxy-call session control function (P-CSCF) establishes secure
associations with mobile clients and routes out/ingoing SIP messages to the
inner IMS infrastructure on their behalf. The interrogating-CSCF (I-CSCF)
is responsible for securely interconnecting and routing SIP messages among
different IMS domains. The application server (AS) allows the introduction
of new IMS-based services; for instance, the IMS-based PS is realized as a
specific AS and any IMS domain runs at least one IMS PS server. The home
subscriber server (HSS) stores authentication data and profiles for registered
clients. Finally, the session-CSCF (S-CSCF) is the core component enabling
the coordinated interaction of all IMS entities. S-CSCF initially registers IMS
clients by interacting with HSS. Moreover, depending on filters/triggers spec-
ified by client profiles, S-CSCF can differentiate the routing of specific types
of SIP messages to different ASs. For instance, S-CSCF identifies PS-specific
messages and forwards them to the interested PS server instance. Figure 10.5
shows the deployment of the above components in a general scenario of inter-
domain PS subscriptions (across two IMS domains, namely, A and B): core
IMS components are in gray and PS servers are in white.
The specific core components of IMS-based PS are:
Wi-Fi
BT AP
PSA HSSA
Internet HS SB PS B AP
P B. 1
WB. 3 IMS Domain A IMS Domain B
WA.1 (Home d omain for WA.1 , WA.3 ; (Home d omain for P B.1 , P B.4
WA.3 visi ted domain for
or WB.3) visi ted domain for WA.2)
WA.2
P B. 4
HSS: Home Subscriber Server Each IMS domain provides authorization functions
P-CSCF: Proxy-Call Session Control Function and services to all its subscribed users. Each IMS
S-CSCF: Session-Call Session Control Function domain includes at least one of all the core IMS
I-CSCF: Interrogating-Call Session Control Function components, i.e., HSS, P-/S-/I-CSCF, and one PS.
PS: Presence Server
W: watcher
P: presentity
FIGURE 10.5
The IMS PS distributed architecture.
Presence Services for the Support of Location-Based Applications 243
10.2.5 Discussion
In Table 10.1, we compare all the presented proposals to provide a sum-
marized overview of current standardization efforts. The table sums up
244
TABLE 10.1
Comparison of PS open standards
Solution Architectural model Location data model Security Mobility Interoperability Scalability
OMS IMPS Client/server Presence info: × point-to-point (not √ √ √
GeoLocation+ end-to-end)
address
XMPP Client/server Geoloc extension (out of √ × (BOSH ext.) √ Partially
(peer-to-peer) presence info)
IMS PS Client/server+IMS Presence info (PIDF)+ √ √ √ Various
proxy-based infr. GEOPRIV emerging
(peer-to-peer) solutions
Location-Based Services Handbook
Presence Services for the Support of Location-Based Applications 245
all presence solutions, analyzed by means of the six main evaluation crite-
ria: architectural model, location data model, security, mobility, interoper-
ability, and scalability. A first important observation is about the adopted
architectural models. The surveyed presence standards adopt a client-server
architecture, but with some non-negligible differences. In IMPS and XMPP,
inter-domain interactions are always mediated by local domain PS, in order
to make the system more manageable. In IMS PS, instead, watchers usu-
ally connect directly to the presentity’s server. IMS PS derives from IMS a
proxy-based architecture and hop-by-hop message routing. In addition, both
XMPP and IMS PS recognize the importance of supporting direct peer-to-
peer (serverless) interactions and have proposed related extensions (XSF
XEP-0174 2008; IETF P2PSIP 2009).
By specifically focusing on LBS support, all solutions recognize the impor-
tance of specifying one location data model among standard core specifica-
tions/extensions. However, while IMPS and IMS PS consider location as a
part of presence information, XMPP has a different approach because, “loca-
tion can change independently of network availability” (OMA PA XML 2007;
IETF RFC4119 2005; XSF XEP-0080 2009). Accordingly, XMPP disseminates
location updates by using alternative distribution systems such as its pub-
lish-subscribe service. Those differences could relevantly complicate XMPP
integration with other PS standards and systems. Regarding security, XMPP
and IMS PS frameworks include effective methods to enable secure end-to-
end message delivery. IMPS, instead, fails to meet some usual security needs
as it is unable to guarantee end-to-end security inside the whole network.
Another relevant management issue is, of course, mobility. IMPS and IMS
PS were specifically designed for mobile environments and adopt refined
solutions both at transport and session/application layers. For instance,
the use of UDP permits fast reaction to intermittent disconnections that
may occur owing to client roaming or abrupt interferences of the wireless
medium. XMPP uses long-lived TCP connections to minimize communica-
tion overhead. However, this design choice is unsuitable for mobile wireless
environments (confirming that XMPP was primarily conceived for the fixed
Internet). Even if some recent XMPP extensions, such as BOSH, are trying
to overcome these shortcomings, XMPP still seems more suitable for fixed
environments only.
Another interesting aspect (which we deliberately neglected in the previ-
ous sections for the sake of brevity) is standard interoperability. Some semi-
nal research efforts are addressing interoperability among PS standards by
following two main directions. On the one hand, some specifications by stan-
dardization bodies and research efforts by academia are aimed at solving
the problems related to PS protocol/data model interworking, by defining
mappings from one PS standard (and information model, including location)
to another (IETF RFC3922 2004; OMA IMPS PS/SIMPLE-interworking 2005;
Zhang et al. 2007). On the other hand, other ongoing work is trying to define
a common set of protocol-neutral application programming interfaces (APIs)
246 Location-Based Services Handbook
First, a few queuing theory studies aimed at modeling IMS networks and
at optimizing specific utility functions and design parameters (Rajagopal
and Devetsikiotis 2006). As regards real-world deployments, a core semi-
nal research contribution is Singh and Schulzrinne (2007), which presents a
highly scalable SIP-based telephony solution. A first stage of SIP proxy serv-
ers, selected via load balancing-enabled DNS, performs request load balanc-
ing and routing to a second set of clustered servers. Each cluster guarantees
high reliability with ad hoc primary-backup configurations. This solution
has been demonstrated to be effective; however, as better detailed in Section
10.4, there is the need for additional work to clarify how it could be applied
to novel IMS-based scenarios.
The second category (Amirante et al. 2007) is a load-balancing solution for
IMS-compliant conference services. This proposal shares two main similari-
ties with our approach, called IHMAS and presented in Section 10.4. First, it
exploits specific service characteristics and alternative protocols to split effec-
tively the service load among intra-domain AS nodes. Then, it recognizes the
importance of optimizing the creation and management of overlays used
to disseminate intra-domain service load. IETF draft-SIMPLE-intradomain
(2009) follows the same design guidelines and partitions the load of IMS PS
in intra-domain deployment scenarios. Similarly, Pack et al. (2006) use a com-
pletely decentralized P2P SIP-based infrastructure and a two-tier caching
scheme to improve scalability and fault-tolerance of MN location registration
and mobility management for SIP-based voice calls.
Third, several research efforts have focused on reducing traffic on the last
hop in wired-wireless integrated networks. This applies to both generic IMS
signaling, e.g., via signaling compression, and to specific services. For exam-
ple, some solutions are available to optimize PS-related traffic via IMS PS
resource lists for multiple subscriptions through a single SUBSCRIBE mes-
sage, or via pull-based interactions through standard SUBSCRIBE messages
with null expiry time, or via partial notifications to reduce NOTIFY message
length (OMA SIMPLE 2008).
HSS
DB SSD
DBM Servic e
HSS PMS HSS
HS S DBDB
11 22
M
DNS
HSS SSD PLB
LBC PS PMS PS PLB
Dynam ic
PSAS PMSPMS
PS 11PS PS Dynam Load
Dynamic ic
Static Load PS PMS Balancer
AS
PS 1 1PS Load
Balancer
I-CSCF PMS I-CSCF PS11 Balancer
I-CSCF PMS I-CSCF AS group 1
I-CSCF PS group 11
I-CSCF 11
Infrastructure
DNS S-CSCF PMS CSCF
P-CSCF PMS
P-CSCF PMS P- CSCF S-CSCF PMS S- S- CSCF
P- CSCF CSCF
P-CSCF
P-CSCF 1 S-CSCF
11 S-CSCF11 1
Wireless access
networks
(e.g., Wi-Fi or UMTS) IC 4
IC 1 IC 2 IC 3
IC: IMS Client LBC: Load-Balancing Console PMS: Proactive Monitoring Stub
IC PLB: Partition Load Balancer SSD: Service Session-state Distribution
FIGURE 10.6
The IHMAS distributed load-balancing architecture.
Presence Services for the Support of Location-Based Applications 253
10.6 Conclusions
This chapter presents an updated overview of all the main presence-based
open standards for LBSs. The first part of the chapter compares and dis-
cusses the three main standards that are currently available (IMPS, XMPP,
and IMS); the second part focuses on IMS PS, the enabling PS standard for
next generation converged networks, by analyzing the latest research efforts
on IMS PS and by presenting our latest achievements accomplished within
Presence Services for the Support of Location-Based Applications 257
References
3GPP PS. 2008. 3rd Generation Partnership Project. Presence Service: Architecture and
Functional Description, TS 23.141 v. 8.0.0.
3GPP TS23.167. 2009. 3rd Generation Partnership Project. IMS Emergency Sessions, TS
23.167 v. 9.1.0.
3GPP TS23.509. 2008. 3rd Generation Partnership Project. NGN Architecture to Support
Emergency Communication from Citizen to Authority, TS 23.509 v. 8.0.0.
3GPP2 PS. 2008. 3rd Generation Partnership Project 2. Presence Stage 3, X.S0027-003-0
v. 1.0.
Acharya A., X. Wang, C. Wright, N. Banerjee, and B. Sengupta. 2007. Real-time moni-
toring of SIP infrastructure using message classification. ACM Work. on Mining
Network Data (MineNet07). ACM.
Acharya A., et al. 2008. Presence Virtualization Middleware for Next-Generation
Converged Applications. ACM Middleware Conf. Companion. ACM.
Acharya A., et al. 2009. Presence Virtualization Middleware for Next-Generation
Context-based Applications. IEEE Int. Conf. on Pervasive Computing and
Communications (Percom’09). IEEE Computer Society.
Agrawal P., J.-H. Yeh, J.-C. Chen, and T. Zhang. 2008. IP Multimedia Subsystems
in 3GPP and 3GPP2: Overview and Scalability Issues. IEEE Communications
Magazine 46 (1): 138–45.
Alam M. T. and Z. D. Wu. 2006. Admission Control Approaches in the IMS Presence
Service. International Journal of Computer Science 1 (4): 299–314.
Amirante A., T. Castaldi, L. Miniero, and S. P. Romano. 2007. Improving the scal-
ability of an IMS-compliant conferencing framework through presence and
event notification. ACM Int. Conf. on Principles, Systems and Applications of IP
Telecommunications (IPTCOMM07). ACM.
Balasubramaniyan V. A., et al. 2008. SERvartuka: Dynamic Distribution of State to
Improve SIP Server Scalability. IEEE Int. Conf. on Distributed Computing Systems
(ICDCS’08).
258 Location-Based Services Handbook
Bellavista P., A. Corradi, and L. Foschini. 2009a. IMS-based Presence Service with
Enhanced Scalability and Guaranteed QoS for Inter-Domain Enterprise Mobility.
IEEE Wireless Communications Magazine, SI on Enterprise Mobility Services 16
(3): 16–23.
———. 2009b. Enhancing the Scalability of IMS-based Presence Service for LBS
Applications. IEEE Int. Computer Software and Applications Conf. (COMPSAC’09).
IEEE Computer Society.
———. 2009c. Understanding and Enhancing the Scalability of IMS-based Services
for Wireless Local Networks. IEEE International Workshop on Wireless Local
Networks (WLN’09). IEEE.
Camarillo G. and M. A. García-Martín. 2006. The 3G IP Multimedia Subsystem (IMS) –
Second Edition. Wiley.
Cortes M., J. O. Esteban, and H. Jun. 2006. Towards Stateless Core: Improving SIP
Proxy Scalability. IEEE Global Telecommunications Conference (GLOBECOM’06).
IEEE.
Din G., R. Petre, and I. Schieferdecker. 2007. A Workload Model for Benchmarking IMS
Core Networks. IEEE Global Telecommunications Conference (GLOBECOM’07).
IEEE.
El Barachi M. E., R. Glitho, and R. Dssouli. 2007. Context-Aware Signaling for Call
Differentiation in IMS-Based 3G Networks. IEEE Int. Symp. on Computer and
Communications (ISCC’07). IEEE Computer Society.
El Barachi M., A. Kadiwal, R. H. Glitho, F. Khendek, and R. Dssouli. 2008. An
Architecture for the Provision of Context-Aware Emergency Services in the IP
Multimedia Subsystem. IEEE Vehicular Technology Conference (VTC Spring’08).
IEEE.
Hammer M. and W. Franx. 2006. Redundancy and Scalability in IMS. Int.
Telecommunications Network Strategy and Planning Symp. IEEE.
IETF draft-SIMPLE-interdomain 2008. Houri A., E. Aoki, S. Parameswar, T. Rang,
V. Singh, and H. Schulzrinne. 2008. Presence Interdomain Scaling Analysis for
SIP/SIMPLE, Internet-Draft draft-ietf-simple-interdomain-scaling-analysis-04.
Internet Engineering Task Force.
IETF draft-SIMPLE-intradomain 2009. Rosenberg J., A. Houri, C. Smyth, and
F. Audet. 2009. Models for Intra-Domain Presence and Instant Messaging (IM)
Bridging, Internet-Draft draft-ietf-simple-intradomain-federation-03. Internet
Engineering Task Force.
IETF draft-SIMPLE-scaling 2007. Houri A. et al. 2007. Presence Interdomain Scaling
Analysis for SIP/SIMPLE, Draft draft-ietf-simple-interdomain-scaling-analysis-07.
Internet Engineering Task Force.
IETF draft-SIP-sec 2009. Jennings C., K. Ono, R. Sparks, B. Hibbard. 2009. Example Call
Flows using Session Initiation Protocol (SIP) Security Mechanisms, Draft draft-ietf-
sipcore-sec-flows-00. Internet Engineering Task Force.
IETF draft-XMPP-PS 2008. Saint-Andre P. 2008. Interdomain Presence Scaling Analysis
for the Extensible Messaging and Presence Protocol (XMPP), Draft draft-saintandre-
xmpp-presence-analysis-03. Internet Engineering Task Force.
IETF P2PSIP 2009. Rosen B. and D. Bryan (chairs). 2009. Peer-to-Peer Session Initiation
Protocol (p2psip) Working Group. Internet Engineering Task Force.
IETF RFC2778 2000. Day M., J. Rosenberg, and H. Sugano. 2000. A Model for Presence
and Instant Messaging, RFC 2778. Internet Engineering Task Force.
Presence Services for the Support of Location-Based Applications 259
IETF RFC2779 2000. Day M., S. Aggarwal, G. Mohr, and J. Vincent. 2000. Instant Messaging/
Presence Protocol Requirements, RFC 2779. Internet Engineering Task Force.
IETF RFC3863 2004. Sugano H., G. Klyne, A. Bateman, W. Carr, and J. Peterson. 2004.
Presence Information Data Format (PIDF), RFC 3863. Internet Engineering Task
Force.
IETF RFC3920 2004. Saint-Andre P. 2004. Extensible Messaging and Presence Protocol
(XMPP): Core, RFC 3920. Internet Engineering Task Force.
IETF RFC3921 2004. Saint-Andre P. 2004. Extensible Messaging and Presence Protocol
(XMPP): Instant Messaging and Presence, RFC 3921. Internet Engineering Task
Force.
IETF RFC3922 2004. Saint-Andre P. 2004. Mapping the Extensible Messaging and Presence
Protocol (XMPP) to Common Presence and Instant Messaging (CPIM), RFC 3922.
Internet Engineering Task Force.
IETF RFC3923 2004. Saint-Andre P. 2004. End-to-End Signing and Object Encryption
for the Extensible Messaging and Presence Protocol (XMPP), RFC 3923. Internet
Engineering Task Force.
IETF RFC4119 2005. Peterson J. 2005. A Presence-based GEOPRIV Location Object
Format, RFC 4119. Internet Engineering Task Force.
IETF RFC4976 2007. Jennings C., R. Mahy, and A. B. Roach. 2007. Relay Extensions for
the Message Session Relay Protocol (MSRP), RFC 4976. Internet Engineering Task
Force.
IETF SIMPLE 2009. Khartabil H. and B. Campbell (chairs). 2009. SIP for Instant
Messaging and Presence Leveraging Extensions (simple) Working Group. Internet
Engineering Task Force.
IHMAS 2009. IHMAS Project. 2009. http://lia.deis.unibo.it/Research/IHMAS/.
Kurilin I., V. Safonov, J. Buford, and A. Kaplan. 2006. Design of a Reference
Implementation of a Standard Java API for Instant Messaging and Presence.
IEEE Int. Symp. on Consumer Electronics (ISCE’06). IEEE.
OMA CS Transport 2007. Open Mobile Alliance. 2007. Client-Server Protocol Transport
Bindings, Approved Version 1.3.
OMA IMPS 2007. Open Mobile Alliance. 2007. IMPS Architecture, Approved Version
1.3.
OMA IMPS PA 2008. Open Mobile Alliance. 2008. Presence Attributes,
TS-IMPS_PA-V1_3-20070123-A.
OMA IMPS PS/SIMPLE-interworking 2005. Open Mobile Alliance. 2005. IMPS SIP/
SIMPLE Interworking Function Requirements, Draft Version 1.0.
OMA PA XML 2007. Open Mobile Alliance. 2007. Presence Attributes XML Syntax,
Approved Version 1.3.
OMA SIMPLE 2008. Open Mobile Alliance. 2008. Presence SIMPLE Specification,
TS-Presence_SIMPLE-V1_1-20080128-C.
OMG DDS 2007. OMG. 2007. Data Distribution Service for Real-Time Systems Specification,
v 1.2. www.omg.org/docs/formal/07-01-01.pdf.
OpenIMSCore 2009. OpenIMSCore Project. 2009. http://www.openimscore.org/.
OpenSIPS 2009. OpenSIPS Project. 2009. http://www.opensips.org/.
Pack S., K. Park, A. Kwon, and Y. Choi. 2006. SAMP: Scalable Application-Layer
Mobility Protocol. IEEE Communications Magazine 44 (6): 86–92.
Rajagopal N. and M. Devetsikiotis. 2006. Modeling and Optimization for the Design
of IMS Networks. IEEE Annual Simulation Symp. (ANSS’06). IEEE.
260 Location-Based Services Handbook
Saint-Andre P. 2009. XMPP: Lessons Learned from Ten Years of XML Messaging. IEEE
Communications Magazine 47 (4): 92–96.
Shacham R, W. Kellerer, H. Schulzrinne, and S. Thakolsri. 2007. Composition for
Enhanced SIP Presence. IEEE Int. Symp. on Computer and Communications
(ISCC’07). IEEE Computer Society.
Singh K. and H. Schulzrinne. 2007. Failover, load sharing and server architecture in
SIP telephony. Elsevier Computer Communications 30 (5): 927–42.
Tonesi D. S., L. Salgarelli, Yan Sun, and T. F. La Porta. 2008. Evaluation of Signaling
Loads in 3GPP Networks. IEEE Wireless Communications 15 (1): 92–100.
Varma V. K., T. Magedanz, and K. C. Chua (eds). 2007. Special Issue on IMS as Service
Delivery Platform for Converged Networks: Architecture, Protocols, and
Applications. IEEE Vehicular Technology Magazine 2 (1).
Vingarzan D., P. Weik, and T. Magedanz. 2005. Design and Implementation of an
OpenIMS Core. Mobility Aware Technologies and Applications (MATA’05). Springer,
Lecture Notes in Computer Science (LNCS).
WV IMPS 2002. Wireless Village – The Mobile IMPS Initiative. 2002. System Architecture
Model, Version 1.1.
XSF XEP-0080 2009. Hildebrand J. and P. Saint-Andre. 2009. User Location, XMPP XEP-
0080 ver. 1.6. XMPP Software Foundation.
XSF XEP-0124 2005. Paterson I. et al. 2005. Bidirectional-Streams over Synchronous
HTTP, XSF XEP-0124. XMPP Software Foundation.
XSF XEP-0174 2008. Saint-Andre P. 2008. Serverless Messaging, XSF XEP-0174.
Zhang Y., J. Liao, X. Zhu, W. Wu, and J. Ma. 2007. Inter-working between SIMPLE and
IMPS. Elsevier Computer Standards & Interfaces 29 (5): 584–600.
11
Data-Flow Management for
Location-Based Service Applications
Using the Zoning Concept
CONTENTS
11.1 Introduction ................................................................................................ 261
11.2 Static Zone-Based Update Mechanism ................................................... 263
11.2.1 Evaluation and testing .................................................................. 264
11.2.1.1 Measuring the downloading time ................................ 267
11.2.1.2 Measuring the average throughput.............................. 267
11.2.1.3 Measuring the packet loss ............................................. 269
11.2.1.4 Database server evaluation ............................................ 269
11.3 Dynamic Zone-Based Update Mechanism ............................................ 271
11.3.1 Evaluation and testing .................................................................. 274
11.3.2 Discussion ....................................................................................... 275
11.4 Conclusion .................................................................................................. 276
References............................................................................................................. 277
11.1 Introduction
The world has undergone a major revolution in information and communi-
cation technology (ICT) over the last decade. This was mainly driven by the
advancement and evolution of internet and satellite telecommunications,
which resulted in transforming our way of life (Kubber, 2005). For example, the
demand for accessing information is becoming increasingly important and the
need to have “anytime-anywhere” connectivity has also emerged. Thanks to
advanced wireless and mobile networks, which are becoming more than a
medium for voice and short messages services (SMS), rich data like video, web
browsing, and other multimedia contents can be transmitted to the end-user
mobile device, while the user is moving from one place to another.
As people are increasingly mobile in terms of lifestyle and occupational
behavior, and there is a demand for delivering information to them according
to their geographical location, a new system, namely, location-based services
(LBS), was developed by integrating satellite navigation, mobile network, and
261
262 Location-Based Services Handbook
mobile computing to enable such services (Kubber, 2005). Ratti and Frenchman
(2006) defined LBS as “a set of applications that exploit the knowledge of the
geographical position of a mobile device in order to provide services based
on that information”. Such a system combines the location information of
the end user with intelligent application in order to provide related services
(Gartner, 2004). The LBS system has become popular since the beginning of
this decade mainly due to the release of global positioning system (GPS) sig-
nals for use in civilian applications. The impact of that has been clearly seen
in in-car navigation systems. However, the applications for pedestrians’ LBS
are still below expectations. This is mainly due to the challenges inherited
from the components of LBS, or the challenges that have emerged along with
the system development itself. For instance, GPS accuracy and signal availa-
bility are not sufficient for pedestrian users in urban environments with high
buildings (Theiss & Yuan, 2005). Mobile networks’ quality of service (QoS)
could degrade due to the congestion created by having a number of users
in urban areas. Moreover, mobile devices continue to suffer from short bat-
tery life, small memory size, and low processor performance (Lee et al., 2005;
Mountain & Raper, 2002). Also, the LBS server is experiencing problems with
managing the huge volume of information stored in the database. The issues
with LBS systems are illustrated in Figure 11.1 (Almasri et al., 2009).
The three aforementioned issues (mobile network, mobile device, and LBS
server) can be crucial when rich data (i.e., high data rate) are used in LBS,
whether for improving the usability as a solution for not using the traditional
Public Internet or
Intranet
FIGURE 11.1
LBS system architecture and its current issues.
Data-Flow Management for LBS Applications Using the Zoning Concept 263
Map size
High
Discharge
rate
Bandwidth
Memory Battery
Zone size
Low
Discharge
rate
FIGURE 11.2
Summary of the impact of the static zone-based update mechanism on LBS server, wireless
networks, and mobile devices (memory and battery).
important issues, which is the battery power of the mobile device. The
zone-based update mechanism contributes to reducing the power con-
sumption by reducing the time taken by downloading data.
GPS System
Co
nne
c tio
nA
AP
FIGURE 11.3
A simplified prototype connected to the available network architecture of Anglia Ruskin
University.
The first test was conducted by sending 120 internet control message
protocol (ICMP) messages to the server while the system was in an idle
mode in order to measure the round-trip time (RTT) (delay). As shown in
Figure 11.5, the delay increases according to the number of connected users.
In the idle scenario, while the LBS server is not communicating with any
mobile user, the average RTT was only 8.08 msec, which is the best situa-
tion. In the second scenario, where only one user is communicating with
the server, the average RTT was 348.12 msec, which is acceptable. In the next
scenarios, where two mobile users communicate with the LBS server, the
average RTT was 981.39 msec. Finally, the system was tested in the worst
scenario, when four users communicate with the server simultaneously. The
average RTT in this case was 1554.25 msec.
The results of this test confirm the relationship between the wireless net-
work throughput and the number of mobile users sharing the network.
266 Location-Based Services Handbook
FIGURE 11.4
Testing the impact on the mechanism of sharing the network by connecting four laptops
simultaneously.
2500
Idle Scenario (No users)
Scenario 2 (One User)
2000 Scenario 3 (Two Users)
Round Trip Time (ms)
1500 1554.25
1000 981.39
500 348.12
0 8.08
1 10 19 28 37 46 55 64 73 82 91 100 109 118
Average
FIGURE 11.5
The results of round-trip time in all different scenarios.
Data-Flow Management for LBS Applications Using the Zoning Concept 267
time slot only in order to free the network bandwidth and reduce the server
processing time.
8
7
User No. 1
6
Time (Minutes)
User No. 2
5
User No. 3
4
User No. 4
3
2
1
0 Full Map Micro-Zone Full Map Micro-Zone Full Map Micro-Zone Full Map Micro-Zone
Scenario 1 (One User) Scenario 2 (Two Users) Scenario 3 (Three Users) Scenario 4 (Four Users)
FIGURE 11.6
The time taken to download either the full map or a small micro-zone in different scenarios.
268
TABLE 11.1
The average results obtained from performing the experimental tests on private WLAN for different numbers of users
Scenario 1 (one user) Scenario 2 (two users) Scenario 3 (three users) Scenario 4 (four users)
Full Map Micro-zone Full map Micro-zone Full map Micro-zone Full map Micro-zone
Average downloading 2.125 0.6 3.0625 1.1875 4.375 2 6.25 2.75
time (min)
Average throughput (kB/ 96.34 53.38 38.05 21.63
sec)
Packet loss 0 0 0 0 1 0 3 1
Calculated power –31875 –9000 –45938 –17813 –65625 –30000 –93750 –41250
discharge (mWatt)
Location-Based Services Handbook
Data-Flow Management for LBS Applications Using the Zoning Concept 269
X G1 − XG 2
t= ,
SG2 1 + SG2 2
n −1
where n is the number of trials, XG1 is the mean of Group 1 (400 m), XG2 is the
mean of Group 2 (200 m), SG1 is the standard deviation of Group 1, and SG2 is
the standard deviation of Group 2.
270 Location-Based Services Handbook
FIGURE 11.7
A screen shot of the result of a query to retrieve data within 400.
Hence,
This value must be compared with the tabled t-value, which can be retrieved
from the distribution table. The degree of freedom is n1 + n2 − 2 = 18, and the
confidence level is α = 0.0005, so:
Since t is much larger than t.0005,18, the null hypothesis is rejected and it is
concluded that there is a significant difference between the two groups. This
result therefore tends to support the alternative hypothesis that “reducing
the size of the map decreases the time to retrieve records from the database.”
As can be seen in Figure 11.8, the zone-based update mechanism has
contributed to organizing and minimizing the server processing time
Data-Flow Management for LBS Applications Using the Zoning Concept 271
TABLE 11.2
The results obtained by running the query on two differently sized areas
Trial 400 m radius (sec) 200 m radius (sec)
1 10.60 7.30
2 10.90 7.80
3 10.90 7.50
4 10.90 7.00
5 9.80 7.50
6 10.50 7.50
7 10.00 7.90
8 10.10 8.00
9 10.80 7.40
10 10.50 7.20
Average 10.50 7.51
Standard deviation 0.41 0.31
significantly. Thus, the saved time could be used for serving another user,
which enhances the overall LBS performance accordingly.
12.00
10.50
10.00
8.00 7.51
Time (seconds)
6.00
4.00
2.00
0.00
1000 records 30,000 records
FIGURE 11.8
Reducing the number of retrieved records from the database enhances the query processing
time.
272 Location-Based Services Handbook
User Request
FIGURE 11.9
Dynamic zone-based update mechanism using the IRM method.
Data-Flow Management for LBS Applications Using the Zoning Concept 273
TABLE 11.3
The five categories of the mobile device status, with specifications
Available resources Illustrated area Supplementary Maximum size
category radius (miles) objects (MB)
Cat 1 0 Nothing 0
Cat 2 1 POIs 2.5
Cat 3 1.5 POIs and images 3
Cat 4 2 POIs and images 4
Cat 5 2 POIs, images, and 5 + (5 for video)
videos
As can be seen in Table 11.3, the status of the mobile device could be classi-
fied according to five categories. Each category has been defined according to
the size of data that can be transferred from the server to the client. However,
the size could be customized if needed according to the user’s needs.
The total data size that can be downloaded to the end-user’s device is equal
to the summation of the map size for the given radius and total size of objects
(PoIs, images, videos, etc.) within a radius of the same area. For example, for
“Cat 1” category, no data could be streamed due to insufficient resources;
whereas for “Cat 5,” high quality objects could be streamed to the end users
as there are sufficient resources to allow that. For other categories between
“Cat 1” and “Cat 5,” the type and size of data that can be obtained varies
accordingly (i.e., the higher the category, the larger the size of data), as shown
in Figure 11.10.
As the concern of this study is LBS for pedestrian users, the system has
been configured to collect data only within a 2-mile radius. This area size
could be customized if necessary (i.e., the system administrator can make the
area smaller or larger). This size of zone can only be streamed over categories
5
Maximum Size (Mbytes)
0
Cat 1 Cat 2 Cat 3 Cat 4 Cat 5
Category
FIGURE 11.10
The higher the category of mobile device, the larger the size of data received.
274 Location-Based Services Handbook
“Cat 4” and “Cat 5,” and is considered to be sufficient to provide users with
enough information concerning the surrounding area. Once the user is out
of that zone, information about the new zone will be acquired.
The maximum radius of the zone in category “Cat 3” will decrease to 1.5
miles, and the radius for category “Cat 2” will be limited to only 1 mile.
In such a way, the end user will be supported with the most suitable size
according to the category of the available resources of their mobile device.
Furthermore, the end users with the highest category (“Cat 5”) are sup-
ported with supplementary objects such as images, videos, and POIs. Each
one of these objects is plotted on a GIS layer (Chang & Tsou, 2008). The first
layer is the map itself, the second is the POIs layer, the third is the images
layer, and the last is the videos layer.
100.00
90.00
80.00
70.00
Time [Seconds]
60.00
50.00 IRM Disabled
IRM Enabled
40.00
30.00
20.00
10.00
0.00
<128 KB/s <128 KB/s 256 KB/s 704 KB/s 768 KB/s
FIGURE 11.11
Response time stability while enabling/disabling IRM application.
the first task, but in this case the user received richer data, with about 38.9%
extra information.
The last scenario was performed when the speed was 768 kB/sec (the
highest in this evaluation test). IRM classified this speed as “Cat 5,” so the
size of data was increased, unlike in the first task where the size of data was
static. The time taken to download information related to this category was
26.75 sec.
The outcome of this evaluation test has shown that the average download-
ing time scale using the IRM was almost stable, whereas in the static mode,
when the IRM application was disabled, the downloading time was depen-
dent on the category of the network speed (see Figure 11.11). This result is
very important according to Foxford Services (2004): stabilized response
times will result in usability enhancement, because users get annoyed or
abandon a site if a service takes longer than expected.
11.3.2 Discussion
To compare the difference between the two mechanisms statistically, a cor-
relation test between the mobile status category and the downloading time
for each case was conducted. This test is known as Pearson Product-Moment
Correlation Coefficient (PMCC) (Lomax, 2000). The correlation results were
calculated using Statistical Package for the Social Sciences (SPSS) (Field,
2005).
During the first test, when the IRM was disabled, there were five categories
in the system (“Cat 1” to “Cat 5”), thus n = 5. Hence, the degree of freedom
df = n − 2, which equals 3. The level of significance is considered as a com-
mon alpha, α = 0.05.
276 Location-Based Services Handbook
The critical value in the table of PMCC was 0.88. This means that if
the correlation r is less than −0.88, or greater than + 0.88, then there is a
significant relation between the two tested groups, otherwise there is no
relation.
The result of the correlation test between the category and the response
time was r = −0.93. This value is outside the boundaries (−0.88 and + 0.88),
thus it is concluded that there is a relation between the category of the mobile
status and the response time.
In the second test, when the IRM was enabled, there were four catego-
ries (“Cat 2” to “Cat 5”), as no data is downloaded to the end user if his/
her mobile has been classified as “Cat 1.” In this case n = 4, and the degree
of freedom, df = 2. The critical value calculated from the table of PMCC
was 0.95.
The result of the correlation test between the category and the response
time was r = −0.697. As this value is within the range (greater than −0.95 and
less than + 0.95), it is concluded that there is no statistical relation between
the category of the mobile status and the downloading time. Therefore, there
is a difference between the two methods (IRM disabled and IRM enabled).
This significant difference proves that the size of data changes slightly
according to the connection speed. Therefore, the IRM mechanism provides
a steady and intelligent service, which increases the efficiency of the wireless
network and prevents any congestion. Consequently, the IRM provides bet-
ter quality services, which leads to an efficient LBS system.
11.4 Conclusion
The strategy explained in this chapter, which is aimed at tackling the prob-
lem with the volume of data, was based on the zoning concept, which can
be appropriate for LBS applications in micro-environments. This was inves-
tigated via chopping the large area database into smaller fixed-sized enti-
ties based on the pedestrian’s average walking distance. The results of this
investigation have shown a very positive impact on each element of the LBS
system, as well as overall performance.
It has been concluded that the static zoning concept could not be the
proper strategy in some cases, as when no sufficient resources are available
to handle that specific micro-zone, which could lead to wasting time, money,
etc. Hence, a new dynamic approach has been designed and evaluated. This
new mechanism was designed to perform as an intelligent system that can
monitor the available resources and decide accordingly the volume of data
that can be streamed successfully to the end user in order to avoid the short-
comings of the static zoning approach. It is anticipated that this new method
will contribute to the success and deployment of LBS applications.
Data-Flow Management for LBS Applications Using the Zoning Concept 277
References
Almasri, S., Alnabhan, M., Hunaiti, Z. and Sedoyeka, E., 2009. Location-based ser-
vices (LBS) in micro-scale navigation: Shortcomings and recommendations.
International Journal of E-Services and Mobile Applications, 1 (4), 51–71.
Almasri, S. and Hunaiti, Z., 2009. The impact of zoning concept on data-flow manage-
ment within LBS system components. International Journal of Handheld Computing
Research (IJHCR), 1 (1), 43–63.
Artem, G., 2000. Management of Geographic Information in Mobile Environments.
Department of Computer Science and Information Systems, University of
Jyväskylä. FIN p. 107.
Chang, H. and Tsou, M., 2008. New Approaches for Integrating GIS Layers and Remote
Sensing Imagery for Online Mapping Services. Springer, Berlin Heidelberg.
Field, A., 2005. Discovering Statistics Using SPSS. Sage, London.
Foxford Services (2004). Web usability guide. http://www.foxfordservices.co.uk/
ASSETS/Documents/Designing_Web_Usability_v4.pdf (retrieved April 1,
2009).
Gartner, G., 2004. Location-based mobile pedestrian navigation services – the role of
multimedia cartography. Paper presented at the International Joint Workshop
on Ubquitous, Pervasive and Internet Mapping (UPIMap), Tokyo, Japan.
Kubber, A., 2005. Location Based Services. Wiley, Chichester.
Lee, D., Zhu, M. and Hu, H., 2005. When location based services meet databases.
Mobile Information Systems, 1 (2), 81–90.
Lomax, R., 2000. An Introduction to Statistical Concepts for Education and Behavioral
Sciences. Lawrence Erlbaum Associates, Mahwah, NJ.
Mobile Commerce and Services (WMCS’06), IEEE Computer Society, 504–11. San
Francisco, CA.
Mountain, D. and Raper, J., 2002. Location-based services in remote areas. AGI
Conference at GeoSolutions, B05.3.
Ratti, C. and Frenchman, D., 2006. Mobile landscapes: Using location data from cell
phones for urban analysis. Environment and Planning B: Planning and Design, 33,
727–48.
Renault, S., Le Meur, A. and Meizel, D., 2005. GPS/GIS localization for management
of vision referenced navigation in urban environments. Intelligent Transportation
Systems, IEEE, 608–13. Vienna, Austria.
Sedoyeka, E., Hunaiti, Z., Almasri, S., Cirstea, M. and Rahman, A., 2008. Evaluation
of HSDPA (3.5G) mobile link quality. International Symposium on Industrial
Electronics, 2008, ISIE 2008, IEEE, June 30, 1446–51. Cambridge, UK.
Theiss, A., David, C. and Yuan, C., 2005. Global positioning systems: An analysis
of applications, current development and future implementations. Computer
Standards & Interfaces, 27 (2), 89–100.
Weiss, D., Krämer, I., Treu, G. and Küpper, A., 2006. Zone services – An approach for
location-based data collection. Proceedings of Third IEEE International Workshop
on mobile Commerce and Services (WMCS’06), IEEE Computer Society, 504–11.
San Francisco, CA.
12
Assisted Global Navigation Satellite
Systems: An Enabling Technology for High
Demanding Location-Based Services
CONTENTS
12.1 Introduction ................................................................................................ 279
12.2 Assisted Global Positioning System and the Open Mobile
Alliance-Secure User Plane Location Approach ................................... 281
12.2.1 Overview on the secure user plane location architecture ....... 283
12.2.2 Procedures for positioning ........................................................... 283
12.2.3 Mobile originated trellis ...............................................................284
12.3 Infrastructure for Practical Tests ............................................................. 285
12.3.1 SAT-SURF & SAT-SURFER ........................................................... 285
12.3.1.1 SAT-SURF hardware platform ...................................... 286
12.3.1.2 SAT-SURFER software suite .......................................... 286
12.4 Trials and Parameters under Test ............................................................ 289
12.5 Concluding Remarks ................................................................................. 297
References............................................................................................................. 298
12.1 Introduction
Enabling factors for a new generation of location-based services (LBS) are a
combination/fusion of information and communication technologies (ICT)
(i.e., communication and navigation, sensors) as well as a good framework
for partnerships among companies belonging to different sectors merging
their knowledge (ICT, Automotive, Electronic systems and services). Good
examples are concrete actions of TelCo providers with car manufacturers
grouping with the aim to hit the market of in-car telematic services that
require position and in most cases always-on connectivity.
Regardless of the specific mobile LBS (see Ref. [8]), critical issues that have
to be taken into account in the application design are:
• The accuracy of the user position, which is not very stringent in all cases;
279
280 Location-Based Services Handbook
It is well known that most of today’s LBS use the global positioning sys-
tem (GPS) that, considering the present performance of component off the
shelf (COTS) receivers, normally takes around 25 sec to fix the user’s location.
However, under critical signal in space conditioning (e.g., urban canyon), the
receiver could take minutes to provide useful and reliable information. This
is, of course, a very limiting factor for LBS that in most cases need a response
time of around a few seconds.
Assisted global navigation satellite system (A-GNSS; including GPS and
Galileo) techniques have been designed for two main purposes (see Refs.
[6,8]): to reduce the TTFF and to increase the sensitivity of the receiver in harsh
environments (e.g., indoors). The core idea is to provide assistance data to the
terminal via a wireless network. Such aids include but are not limited to:
• Control plane in which assistance data are sent via pre-defined cel-
lular network signal structures, like GSM and WCDMA;
• User plane in which assistance data are sent via a general TCP/IP
data connection, thus not requiring any wireless standard specific
messages.
Assisted GNSS: An Enabling Technology for High Demanding LBS 281
Solutions for the user-plane A-GNSS approaches have been developed and
standardized by the Open Mobile Alliance [2].
Note that the user-plane approach allows, in principle, the creation of a
local assistance infrastructure, using, for example, a wireless ad hoc/sensor
network having a positioning server available at the network management
level. This approach can be employed in peer-to-peer relative positioning,
where sensors are distributing external navigation augmentations among
them.
Due to market potentials, several papers available in the literature present
the results of assisted-GPS (A-GPS) employment in mobile phone using assis-
tance data generated by the communication provider (see, e.g., Refs. [6,7,10]).
Alternatively, this chapter shows the capabilities of A-GNSS when applied
on embedded solutions where, usually, the flexibility in controlling the navi-
gation performances is higher. In addition, working on embedded systems
can prove the capabilities of the technology in alternative markets like auto-
motive black-box or more in general tracking and tracing systems. One of
the key issues in carrying out R&D activities on A-GNSS is the availability of
tools enabling practical measurements of performances. Results reported in
the following (see section 12.4) have been achieved using a tool developed by
the NavSAS group, named SAT-SURF & SAT-SURFER, which has been made
available to several research institutions worldwide.
SAT-SURF & SAT-SURFER can be seen as extended evaluation kit for dif-
ferent mass-market GPS modules (of different manufacturers), allowing the
maximum level of flexibility in terms of usage of assistance data and log of
all the raw data of both the GPS and general packet radio service (GPRS)
(when GPRS is used to establish the link with the assistance server).
Standardization Location
Network body Specification technology
GSM/EDGE 3GPP – GERAN TS 44.031 A-GPS/E-OTD
(2G/2.5G)
WCDMA/UMTS 3GPP – RAN TS 25.331 A-GPS/OTDOA
(3G/3.9G)
282 Location-Based Services Handbook
Even if some differences can be found in the GERAN (i.e., for GSM) vs. RAN
(i.e., for UMTS) specifications, from a general standpoint the assistance
parameters that can be potentially employed by GNSS receivers are
Assistance Description
Reference time Time information (time of week and week number) to be
used by the GPS receiver for its initialization. It is the GPS
time for the GPS receiver start-up
Reference position A rough estimate of the terminal position usually computed
by the cellular network (e.g., Cell-ID approach)
GPS navigation model Mainly ephemeris to speed up the satellite positions
computation
GPS almanac Almanac of GPS constellation
GPS acquisition assistance Mainly Doppler and code-phase estimation
GPS ionospheric model Parameters for the estimate of the ionospheric delay
• Reference time
• Reference position
• Ephemeris assistance
• Ionospheric model assistance
The impact on their usage has been evaluated during field tests employing
SAT-SURF & SAT-SURFER tools.
Another feature related to A-GNSS is the possibility of having the final
position of the terminal computed not only at the receiver level, but also at
the network level. The following sections will clarify the assistance proce-
dure requests to communicate to the server the so-called observables (i.e.,
pseudo-ranges computed by the terminal), so the sever (serving mobile loca-
tion center using the terminology of 3GPP) itself can compute the final x, y,
z position. Considering that most terminals able to measure the observables
have also enough computation capabilities for the x, y, z evaluation, this sec-
ond approach is employed in situations where higher precision is required.
In these cases, the server integrates data coming from the terminal with the
available corrections reaching a meter-level precision.
Assisted GNSS: An Enabling Technology for High Demanding LBS 283
1. Assistance messages are fed in the SET. Then SET is computing the
observables and the position by itself.
2. Assistance messages are fed in the SET. Then SET is computing
the observables and these measurements are sent to the SLP. The
SLP is computing the position (some additional augmentation like
EGNOS/EDAS may apply) and then it is sent back to the SET.
Figure 12.1 shows the two possibilities. Both approaches have been consid-
ered during the field tests.
Time To Observable
(a) (b)
FIGURE 12.1
Procedure MO. (a) The position is computed by the receiver with assistance coming from the
SLP; this situation concludes with a SUPL END message, but it is not significant with respect
to position computation. (b) The receiver is sending the observables (i.e., pseudo-ranges) to the
SLP that computes the position. Both cases have been considered in the test campaign.
Assisted GNSS: An Enabling Technology for High Demanding LBS 285
For the second bullet above a R&D cooperation between the NavSAS
Group and a TelCo Operator has been set up, while for the testing terminal,
a specific HW + SW platform has been employed (aforementioned SAT-SURF
& SAT-SURFER).
FIGURE 12.2
SATSURF box, including connectors, GSM, and GPS antennas.
286 Location-Based Services Handbook
FIGURE 12.3
Screenshot of the SAT-SUFER graphical user interface.
Assisted GNSS: An Enabling Technology for High Demanding LBS 287
with the related GPS time stamp in different formats such as Matlab, Excel,
Rinex, and many others.
The main functionalities of this software suite are summarized in the
following:
• Support for multiple GPS receivers protocols, both NMEA and pro-
prietary binary
• Display of the most important GNSS raw data and positioning infor-
mation in real time
• Support for obtaining EGNOS raw data from multiple data sources
(i.e., EGNOS Data Access Service (EDAS))
• Support for obtaining DGPS/RTK local corrections and raw data
from NTRIP networks
• Extended data logging capabilities with the possibility to log all the
supported GNSS data (a complete list is provided in Table 12.1) in dif-
ferent formats. The available file formats are: ASCII text, MATLAB®,
Microsoft Office Excel®, binary, RINEX 2/3, and KML
TABLE 12.1
Parameters logged by SAT-SURFER.
Name Description
Positions • Position (m), the three components
• Velocity, (m/s), the three components
• Latitude
• Longitude
• Altitude
• Error 3D
• Position type is how the RX computed the position. It can be
STANDALONE, SBAS, DGPS, RTK FIX, or RTK FLOAT
• Speed, the amplitude of the velocity vector
Satellites information • Number of satellites in view
• Number of satellites in fix, meaning satellites used for the
computation of the position, velocity, and time (PVT)
• List of satellites in view
• List of satellites used for PVT computation
GNSS time • Week number (WN)
• Time of week (TOW)
• GPS time
• Time to first fix
• Leap seconds
Dilution of precision • GDOP
• PDOP
• HDOP
• VDOP
(Continued)
288 Location-Based Services Handbook
• Full support for A-GPS MO/MT procedure. The interface toward the
local element is compliant with the SUPL 3GPP standard
• Possibility to interface SAT-SURFER with different inertial measure-
ment unit (IMU)
• Possibility to load a PVT engine developed by the users on the base
of a software model provided with the SAT-SURFER for real-time
tests and comparison of custom user solutions
• Possibility to interface the SAT-SURFER toward external tools
through a network dispatcher
• Exploitation of the communication (COM) interface provided by the
GSM quad-band modem for advanced functionalities (DGPS, AGPS,
network dispatching of raw data, etc.)
SAT-SURFER
SULP Agent
and data logger
SET to SLP
SAT-SURF TCP/IP link SLP
HW element To network
SULP server
GPS + GPRS
FIGURE 12.4
Architecture employed for tests.
290 Location-Based Services Handbook
FIGURE 12.5
Aerial view of the open sky site (ISMB premises). The black X is the position of the antenna on
the roof.
Referring to Figure 12.4, the link SET to SLP is achieved via a standard
TCP/IP connection. This can be set up using GPRS or UMTS, and also via
WLAN. So, a complete AGPS solution can be designed for local purposes in
case there is the capability to set up an assistance server (thus not using the
COM provider for the AGPS service).
The first goal of the performance testing campaign has been the assess-
ment of the following standard metrics:
• Mean TTFF
• Mean number of satellites in view and number of satellites employed
for the PVT computation (a subset of the satellites in view)
• Mean GDOP
Assisted GNSS: An Enabling Technology for High Demanding LBS 291
FIGURE 12.6
Light indoor tests close to a window.
• Mean accuracy, this is the mean difference between the true position
and the position computed by the standalone GPS or A-GPS
All tests have been conducted from a cold start condition of the GPs receiver.
Numbers have been collected in two different environments: open sky and
light indoor (Figure 12.5 shows the location of the open sky antenna while
Figure 12.6 is one of the testing sites for the light indoor trials). Moreover, it
has to be highlighted that the tests have been conducted with consecutive
sessions in time, hence the comparison can be slightly affected by the satel-
lite constellation changes.
More interesting are the non-standard tests that have been done on the
following metrics:
• Mean time to observable (TTO), see Figure 12.1 related to the trellis
• Mean number of satellites for which the SET receives the assistance
from the SLP (i.e., satellites in view at the reference receiver inte-
grated in the SLP)
292 Location-Based Services Handbook
• Mean of the difference between the computed GPS position and the
reference position (usually based on Cell-ID)
• Mean of the difference between the computed GPS position by the SET
and the computed GPS position by the SLP (i.e., case B of Figure 12.1)
Other important tests have been conducted selecting the assistance data to
be applied by the SET. Three cases have been taken into consideration:
Even if SAT-SURFER (i.e., SUPL agent) can enable or disable any combina-
tion of aiding, the three cases have been motivated by the recent activities on
long-term ephemeris prediction, also named self-assistance, that can be seen
as an evolution of A-GPS [13,14].
Figures 12.7 and 12.8 show a comparison between TTFF and TTO when
assistance data are used or not. A-GPS in case of open sky reduces both
elapse times to one-third of the case when GPS has no aiding. The gain in
the case of an indoor environment is even greater because of the relatively
low power of the received signals. A-GPS can in fact increase the sensitivity
of the receiver, allowing the acquisition of low C/N0 satellites.
Figures 12.9 and 12.10 refer to the same trials as in Figures 12.7 and 12.8,
but report the position accuracy. In both cases, the position is computed
by the SET. In both A-GPS and GPS standalone, the accuracy related to the
indoor case is poor because of the high value of GDOP (a common situation
when the sky visibility is limited). Note that the values in meters reported
here correspond to the 3D errors (absolute value of the 3D vector).
9
8
7
6
5
TTFF (s)
4
TTO (s)
3
2
1
0
Open sky Indoor
FIGURE 12.7
Case of assisted-GPS, all assistance parameters employed. Mean values over 75 trials.
Assisted GNSS: An Enabling Technology for High Demanding LBS 293
60
50
40
30 TTFF (s)
TTO (s)
20
10
0
Open sky Indoor
FIGURE 12.8
GPS standalone, no assistance parameters employed. TTO is obtained without any assistance
so it is the true time for acquisition, tracking, data demodulation, and PVT computation. Mean
values over 75 trials.
45
40
35
30
25
Accuracy (m)
20
GDOP
15
10
5
0
Open sky Indoor
FIGURE 12.9
Case of assisted-GPS, all assistance parameters employed. Mean value of accuracy and GDOP.
40
35
30
25
20 Accuracy (m)
15 GDOP
10
5
0
Open sky Indoor
FIGURE 12.10
GPS standalone, no assistance parameters employed.
294 Location-Based Services Handbook
12
10 N of satellites in
view
8
Used satellites
6
0
Open sky Indoor
FIGURE 12.11
Number of satellites in view and number of satellites used for PVT computation (a subset of
the satellites in view).
Referring to the trials previously reported, Figure 12.11 shows that the
number of satellites for which the assistance is available is higher with
respect to the number of satellites in view (at the SET). This is because, usu-
ally, the reference receiver located at the SLP is installed in a very good open
sky condition. Note also that common mass-market receivers do not always
use all the satellites in view to compute the position, but a subset (e.g., due to
elevation considerations or low C/N0 values).
One of the most important assistance parameters is the reference position
that SLP sends to the SET. In the case of the GPRS/UMTS network, such a
position usually corresponds to the position of the serving cell (i.e., Cell-ID).
Figure 12.12 shows the comparison between the reference position received
as assistance and the final position computed by the SET. The better the ref-
erence position, the faster the convergence time of the receiver toward a good
estimate of the final position.
300
250
200
Computed
150 position (m)
Reference
100 position (m)
50
0
Open sky Indoor
FIGURE 12.12
A-GPS on, comparison between the reference position computed by the network (usually
Cell-ID) vs. the position computed by the assisted-GPS SET.
Assisted GNSS: An Enabling Technology for High Demanding LBS 295
350
300
250
200 SLP computed
position (m)
150
SET position (m)
10
50
0
Open sky Indoor
FIGURE 12.13
A-GPS on, comparison between the position computed by the SLP (on the basis of the observa-
bles received by the SET) vs. the position computed by the assisted-GPS SET.
As already stated, the SLP not only provides assistances, but it can also
compute the SET position on the basis of the observables (see Figure 12.11).
Figure 12.13 shows the comparison between the position computed by the
SET and the one computed by the SLP. The difference in accuracy depends
on the number of observables available for positioning. The SUPL specifica-
tions do not report the number of pseudo-ranges that SET has to send to
SLP, therefore there can be a case in which the SET measures eight pseudo-
distances, but sends only four of them to the SLP. Clearly, if the SLP has high-
precision positioning as a requirement, all the available pseudo-distances
have to be sent.
45
40 SLP computed
position using
35 EGNOS
30 corrections (m)
25 SLP computed
position using
20
local differential
15 corrections (m)
10 SET position (m)
5
0
Open sky Indoor
FIGURE 12.14
Comparison between the position computed by the SLP using EGNOS data, by the SLP using
local differential corrections data (code corrections), and by the SET when all the available
pseudo-ranges are sent to the SLP.
296 Location-Based Services Handbook
300
Reference
250 position
computed by
200 the network
(Cell-ID) (m)
150
Computed
100 position by SLP
(m)
50
0
Open sky Indoor
FIGURE 12.15
A-GPS on, comparison between the reference position computed by the network (usually
Cell-ID) vs. the position computed by the SLP (on the basis of the observables received by the
SET).
1. The SET communicates to the SLP the first set of four observables
in order to speed up the whole procedure. Figure 12.13 refers to this
trial.
2. The SET communicates to the SLP all the available pseudo-ranges.
The SLP gets the pseudo-ranges and performs the augmentation
60
Ephemeris +
50 reference time
(TTFF in s)
40 Ephemeris +
reference time +
reference
30 position
(TTFF in s)
20 All parameters
(TTFF in s)
10
0
Open sky Indoor
FIGURE 12.16
A-GPS on, comparison of TTFF in three situations: SAT-SURF using all the assistance param-
eters, SAT-SURF using ephemeris and reference time, SAT-SURF using ephemeris, reference
time, and reference position.
Assisted GNSS: An Enabling Technology for High Demanding LBS 297
• It is not yet clear if the LBS providers intend to rely on TelCo for the
generation of assistance data
• It is not clear which is the revenue model for TelCo; so who is going
to pay for such assistances?
References
1. EGNOS and EDAS, EGNOS and EDAS Helpdesk, http://egnos-edas.gsa.
europa.eu.
2. Open Mobile Alliance, User Plane Location Protocol Candidate Version 1.0,
OMA-TS-ULP-V1_0-20070122-C, January 22, 2007.
3. Secure User Plane Location Architecture, OMA-AD-SUPL-V1_0-20070122-C,
V1.0, January 22, 2007.
4. UserPlane Location Protocol, OMA-TS-ULP-V1_0-20070122-C, V1.0, January
22, 2007.
5. 3GPP Technical Specification TS 44.031.
6. O. Bayrak, T. Goze, M. Barut, M. O. Sunay, “Analysis of SUPL A-GPS (Secure
User Plane Location) in Indoor Areas”, IEEE International Conference on
Computational Technologies in Electrical and Electronics Engineering,
SIBIRCON 2008.
7. B. Li, P. Mumford, A.G. Dempster, C. Rizos, “Secure User Plane Location:
Concept and Performance”, GPS Solution, May 2009.
8. F. van Diggelen, A-GPS: Assisted GPS, GNSS, and SBAS, Artech House, Boston,
MA, 2009.
9. F. Dominici, P. Mulassano, D. Margaria, K. Charqane, “SAT-SURF and SAT-
SURFER: Novel Hardware and Software Platform for Research and Education
on Satellite Navigation”, ENC 2009, Naples, May 2009.
10. NavSAS Group, www.navsas.eu.
11. G. Falco, F. Dovis, G. Marucco, A. Defina, “A Comparative Sensitivity Analysis
of GPS Receivers”, ENC 2009 Conference, Naples.
12. SAT-SURF The Training Board for GNSS − User Manual, SAT-SURF-1-NAV-08,
Issue 1.0, Date: 27/10/2008.
13. SAT-SURFER Software Suite for GNSS Training − User Manual, SAT-SURFER-1-
NAV-08, Issue 1.0, Date: 27/10/2008.
14. S. Turunen, “Acquisition Performance of Assisted and Unassisted GNSS
Receivers with New Satellite Signals”, ION GNSS, Forth Worth, TX, September
2007.
15. P. Matthos, “Hotstart Every Time – Compute the Ephemeris on the Mobile”,
ION GNSS, Savannah, MS, 2008.
Index
299
300 Index