• Title/Summary/Keyword: location information

Search Result 7,740, Processing Time 0.039 seconds

Data acquisition and computation methods for improved location awareness in the indoor location system (실내 위치 시스템에서의 향상된 위치 인식을 위한 데이터 수집 및 연산 기법)

  • Yoon, Chang-Pyo;Hwang, Chi-Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.270-271
    • /
    • 2015
  • Recently, There is Increasing interest in the intelligent services using the Internet of Things indoor positioning technologies that enable the communication of information between the objects. In particular Applications and demand for the indoor location based services using smart devices has made active. An indoor location positioning technology for this purpose BLE (Bluetooth Low Energy) has been a lot of interest in technology increases. If iBeacon of BLE(Bluetooth Low Energy) is made available to provide a signal for the indoor location information measurement then reliability of Indoor location information is lowered by signal interference. In this paper, Proposes a technique for data acquisition method for obtaining reliable position information and reliable position information calculation method from signal information data of iBeacon.

  • PDF

A Study on the Active Location Acquisition Terminal Using Base-station Location Information and GPS Module (기지국 위치정보와 GPS 모듈을 이용한 능동형 위치획득 단말 연구)

  • Ha, Seung-Il;Lee, Hyun-Jae;Oh, Chang-Heon
    • Journal of Digital Contents Society
    • /
    • v.9 no.3
    • /
    • pp.483-490
    • /
    • 2008
  • In this paper, we propose an active location acquisition terminal needing to construct an infrastructure based on a LBS and analyze the performance in real field. The proposed terminal is compounded with a GPS module and a CDMA module, so it can get the location information independently using satellite GPS signal and the proposed terminal can decide a user location with the location information of a base station in satellite GPS shadowed area. This is the distinguishable location acquisition method from the conventional A-GPS, and it complements a disadvantage of the conventional GPS. From these results, we can confirm that the proposed active location acquisition terminal is suitable to the requirements for the LBS which are the independent location acquisition ability, the continuity in the location information acquisition and the maintenance in the location information security.

  • PDF

TCA: A Trusted Collaborative Anonymity Construction Scheme for Location Privacy Protection in VANETs

  • Zhang, Wenbo;Chen, Lin;Su, Hengtao;Wang, Yin;Feng, Jingyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3438-3457
    • /
    • 2022
  • As location-based services (LBS) are widely used in vehicular ad-hoc networks (VANETs), location privacy has become an utmost concern. Spatial cloaking is a popular location privacy protection approach, which uses a cloaking area containing k-1 collaborative vehicles (CVs) to replace the real location of the requested vehicle (RV). However, all CVs are assumed as honest in k-anonymity, and thus giving opportunities for dishonest CVs to submit false location information during the cloaking area construction. Attackers could exploit dishonest CVs' false location information to speculate the real location of RV. To suppress this threat, an edge-assisted Trusted Collaborative Anonymity construction scheme called TCA is proposed with trust mechanism. From the design idea of trusted observations within variable radius r, the trust value is not only utilized to select honest CVs to construct a cloaking area by restricting r's search range but also used to verify false location information from dishonest CVs. In order to obtain the variable radius r of searching CVs, a multiple linear regression model is established based on the privacy level and service quality of RV. By using the above approaches, the trust relationship among vehicles can be predicted, and the most suitable CVs can be selected according to RV's preference, so as to construct the trusted cloaking area. Moreover, to deal with the massive trust value calculation brought by large quantities of LBS requests, edge computing is employed during the trust evaluation. The performance analysis indicates that the malicious response of TCA is only 22% of the collaborative anonymity construction scheme without trust mechanism, and the location privacy leakage is about 32% of the traditional Enhanced Location Privacy Preserving (ELPP) scheme.

A Study on Development of A GPS navigation system based on RFID which contains location information (위치정보가 기록된 RFID를 이용한 택배차량용 내비게이션 시스템 개발에 관한 연구)

  • Shim, Jin-Bum;Han, Yeong-Geun
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.1
    • /
    • pp.113-118
    • /
    • 2010
  • "Domestic delivery service" is defined the service to deliver goods or packages from point of senders to point of receiver. With the characteristics of door to door, it is must a service provider should know the exact location of destination assuring best utilization of moving path. Generally, location information consist of postal code and address only, which result in difficulties to identify the precise location of destination. It is relatively less correlated between the information that address refers and practical location in Korea address system. For example, the next door to house number 100 is not always house number 101. Therefore, a delivery man additionally uses a paper map or a GPS navigation which carry extra job to input every code of location to the device in order to know precise location. It is also very inconvenient that every delivery man identify the location that address information refers and make a personal decision of the optimum moving path dropping each destination without calculating provisioning process of whole delivery path. As explained above, it is inefficient to find information delivery service required and to generate the optimum path. In results, these difficulties bring in delay of service and increase of cost. In this point, the contents of the thesis suggest a GPS navigation system easy to obtain accuracy of delivery information which enables to automate optimum moving path based on RFID which contains location information.

Design and Implementation of a Location Privacy System supporting Privacy Self Controls (프라이버시 자기제어를 지원하는 위치정보 프라이버시 시스템의 설계 및 구현)

  • Lee, Eung-Jae;Ju, Yong-Wan;Nam, Kwang-Woo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.853-862
    • /
    • 2010
  • As the mobile device and broadband wireless internet such as WiBro, HSDPA is widely spreading, various types of advertisement and services based on personal location information can be provided. However, with convenience supported by these services, it is possible to be increased an invasion of privacy such as personal location and moving pattern. In this paper, we analysis an essential element for protection of privacy related on location information in mobile environment and propose location privacy protocol for managing location privacy self-control. And we design and implementation prototype of location privacy self-control system which is able to manage user's location privacy condition oneself using the proposed location privacy protocol.

Optimal Design of Mobile Controlled Location Update Subsystem

  • Kang, Hye-Won;Park, Cheon-Won
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.25-28
    • /
    • 1999
  • Consider connection-oriented wireless cellular net-works. To establish a circuit or virtual circuit in such a network, a paging message is broadcast over a region at which the destined mobile station is presumed to reside, (identified as a paging area). For an effective paging mechanism, it is desirable to provide the location information of mobile stations to the network. In this paper, we consider a mobile controlled location update scheme under which each mobile station periodically reports its current location information to the network by using an inherent timer (without measuring the power of signals transmitted from base stations). Based on the latest information about a mobile station's location, a paging area is selected to page the mobile station. Note that under this scheme, a mobile station may not yet have reported its location change while sojourning out of the current paging area. In such situation, the mobile station can not receive a paging message destined to it. Frequent location updates can reduce the paging failure rate incurred by mobile stations'sojourning out of the paging area. However, larger bandwidth is needed for location update as the location update rate is increased. On the other hand, as the size of the paging area is increased, the paging failure rate is decreased, while larger bandwidth is required for paging. Thus, we first present a model for mobility, paging and location update processes, and secondly investigate the effect of network parameters on the paging failure rate and the amount of bandwidth used for paging and location update. Finally, we formulate problems to find proper values for the location update rate and paging area size under the constraints on the bandwidth usage levels for location update and paging.

  • PDF

The Effects of Consumers' Perceived Privacy Control on Perceived Privacy Risk in Location-Based Services

  • Lee, Joohee;Kim, Songmi;Kim, Wonjoon
    • International Journal of Contents
    • /
    • v.13 no.1
    • /
    • pp.22-30
    • /
    • 2017
  • The diffusion of advanced mobile technology has introduced new types of personal information or 'location data'. These new data mean new opportunities for businesses, such as location-based services (LBS), but have resulted in new consumer anxieties regarding disclosure of personal information. This study examines the effects of the consumers' perceived control over "time-andplace" information in location-aware services on their perceived privacy risk. A total of 270 respondents participated in this study. Conditions of perceived privacy control were operationalized over time-and-place information, in a $2{\times}2$ factorial design. Results indicate that the perceived control over time-and-place personal information is a significant predictor of perceived risk, and control assurances over time-and-place information enhances the perception of control, thus alleviating the perceived risk. In addition, the effect is much more significant when time and place were combined.

Place Information System for Missing Children using Embedded Board (임베디드 보드를 이용한 미아 위치 정보 시스템)

  • Lee, Hyeon-Tae;Lee, Goo-Yeon
    • Journal of Industrial Technology
    • /
    • v.29 no.B
    • /
    • pp.157-163
    • /
    • 2009
  • In this paper, we implement a place information system for missing children using embedded board. In the implementation, the embedded board receives location information from GPS satellites, parsing GGA information which includes current time and location coordinates from the satellite information and sends them to the location management server. The server locates a missing child using the location information from embedded board together with server database. We implement an application program for the system. The program shows current location of a child and its moving path and browses the corresponding map from coordinates mapping.

  • PDF

Position Information Storage System based on RDBMS

  • Jang, In-Sung;Cho, Dae-Soo;Park, Jong-Hyun
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.897-899
    • /
    • 2003
  • Recently, owing to the rapid progress of Telecommunication technology, the increase of wireless internet’s subscriber and diffusion of wireless device, LBS (Location Based Services) which take advantage of user's location information and receive information in concerning with user’s location to be essential services. Location Based Services are related the moving objects which change their locations through time. Therefore, to provide location-based services efficiently, it is required that an efficient system which could acquire, store, and query the large number of locations. In this paper, we design management system to insert and search a huge number of Moving Object based on Legacy Relational Database.

  • PDF

Location-aware visualization of VRML models in indoor location tracking system

  • Yang, Chi-Shian;Chung, Wan-Young
    • Journal of Sensor Science and Technology
    • /
    • v.16 no.3
    • /
    • pp.220-228
    • /
    • 2007
  • For many applications particularly in navigation system, a three-dimensional representation improves the usability of information. This paper introduces 3D Graphical User Interface (GUI) of indoor location tracking system, 3D Navigation View. The application provides users a 3D visualization of the indoor environments they are exploring, synchronized with the physical world through spatial information obtained from indoor location tracking system. It adopts widely used Virtual Reality Modeling Language (VRML) to construct, represent, distribute and render 3D world of indoor environments over Internet. Java, an all-purpose programming language is integrated to comprehend spatial information received from indoor location tracking system. Both are connected through an interface called External Authoring Interface (EAI) provided by VRML. Via EAI, Java is given the authority to access and manipulate the 3D objects inside the 3D world that facilitates the indication of user's position and viewpoint in the constructed virtual indoor environments periodically.