Abstract

A number of approaches for capturing and processing location information of mobile users have been proposed in the past; however, only with the latest advances in the handset technology, a terminal-based positioning approach, using overlay SIP signaling on top of a packet switched bearer and area notification as basic functionality becomes feasible for mass applications. Especially in electronic commerce scenarios, in which users often interact with non-trusted services and shops, any location-based solution has to consider privacy aspects as well. The terminal-centric model presented in the paper leads to a simple and efficient way to achieve tunable privacy: mobile users define own "zones" and selectively disclose them to their buddies and to external services. As a result, localization can be performed only in the allowed places and by the allowed watchers, both parameters being configured by the user herself on her mobile terminal. We describe the system architecture, protocols and present representative technical scenarios.

Highlights

  • The Location Based Services (LBS) in operation nowadays provide added value mainly by using the physical position of mobile users

  • For the prototype realization we selected a GSM/UMTS mobile terminal running the mobile platform for Java (J2ME), a built-in session initiation protocol (SIP) stack and API according to the JSR 180 [9] and a Bluetooth location interface according to JSR 179 [10] to connect to an external GPS receiver (SiRF Star III Chip)

  • The scenarios we address vary from the community service of type "find your friend", the emergency-based scenario up to the m-advertising scenario saying for instance "when I pass the coffee shop, advertise discounted coffee prices"

Read more

Summary

Introduction

The Location Based Services (LBS) in operation nowadays provide added value mainly by using the physical position of mobile users. This location data may consist of geographical coordinates, access point cell IDs, or civil location in form of postal addresses. The same applies for trusted services run by the employer of the user in the health or logistics sector, for emergency or insurance services. In case of an emergency service the business model could be the following: as a part of an insurance contract, the user allows the service provider to subscribe to location events restricted to the visited zone (e.g. ski region, mountaineering, safari, etc). The scheme described in this paper applies for all the applications mentioned above and delivers user tunable privacy

Architectural prerequisites
Contributions of this work
Location semantics and zone management
Location service architecture and protocol
System extensions to support watcher applications
System extensions to support non-trusted applications
A server-based solution to reduce the radio traffic
Prototype realization
Related work
Findings
Concluding remarks and further research

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.