Skip to main content

Secured and Networked Emergency Notification Without GPS Enabled Devices

  • Chapter
  • First Online:
Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 70))

  • 1352 Accesses

Abstract

Lately, many people have become aware of privacy issues that emanate from wide spread use of GPS enabled or similar systems. There are two concerns with GPS systems. On one side, many people are becoming more aware of privacy issues, and on the other hand emergency help is of great importance due to fading of signals in presence of jammers that inhibit GPS or similar systems.Thus, there is a need for location detection technique or a solution that not only helps in detecting location but also relieves the person of the privacy concern. Such systems find widespread application in military and personal communications. In this chapter, firstly introduction to various well known systems is presented, followed by existing location detection methods and technologies. The privacy issues are also highlighted. The comparative study is done to highlight strengths and weaknesses of various location detection approaches. Furthermore, various position equation methods are derived to estimate position location accuracy. In order to address privacy, a location detection system is developed for a limited geographical area as a case study. The simplicity and security of data transfer are also addressed by encryption using special purpose microcontrollers. The standardization efforts for location identification are also summarized.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Gibson, B., Cory, T.: Portable Navigation and Wireless Tracking: Western Eurpoean Markets and Forecasts 2007–2012, Juniper Research: www.juniperresearch.com. Accessed on November 11, (2010)

  2. Mohan, P., et al.: Nericell: Rich monitoring of road and traffic conditions using mobile smartphones. In: Proceedings ofthe 6th ACM Conference on Embedded Networked Sensor Systems, US (2008). doi:10.1145/1460412.1460444

  3. Brown, B.: 802.11: the security differences between b and I. IEEE Potentials 22(4), 23–27 (2003)

    Google Scholar 

  4. NBS FIPS PUB 46: Data Encryption Standard. National Bureau of Standards, US Department of Commerce (1977)

    Google Scholar 

  5. SO DIS 8730: Banking Requirements for Message Authentication (Wholesale). Association for Payment Clearing Services, London (1987)

    Google Scholar 

  6. ISO DIS 8732: Banking Key Management (Wholesale). Association for Payment Clearing Services, London (1987)

    Google Scholar 

  7. Quercia, D.: Recommending social events from mobile phone location data. IEEE Int. Conf. Data Mining 327(5971), 971–976 (2010)

    Google Scholar 

  8. Hopper, A., Harter, A., Blackie, T.: The Active Badge System. INTERCHI’93, Amsterdam (1993)

    Google Scholar 

  9. http://research.microsoft.com/en-us/projects/radar/. Accessed on April 2012

  10. LaMarca, A., et al.: Place Lab: Device Positioning System using Radio Beacons in the Wild, Intel Research, IRS-TR-04-016 (2004)

    Google Scholar 

  11. Tharp, D., Wallace, L.: Enhanced position location reporting system: legacy system provides new technology for Warfighters. Navigation and Applied Sciences, SSC San Diego Biennial Review, pp. 206–211 (2003)

    Google Scholar 

  12. Nissanka, B.P., Anit C., Hari, B.: The cricket location-support system. In: Proceedings of 6th ACM MOBICOM, Boston, MA (2000)

    Google Scholar 

  13. Karlsson, R.: Particle Filtering for Positioning and Tracking Applications. PhD Thesis, Linkoping University, SE-581–83, Sweden, Linkoping (2005)

    Google Scholar 

  14. Ananthanarayanan, G., et al.: StarTrack: A Framework for Enabling Track-Based Applications, Microsoft Research (2011)

    Google Scholar 

  15. Kannan, B., et al.: Predictive Indoor Navigation using Commercial Smart-phones. In: 28th Annual ACM Symposium on Applied Computing (2013)

    Google Scholar 

  16. LocataNet Positioning Signal Interface Control Document-2011, Locata Corporation Ltd, 111 Canberra Avenue, GRIFFITH ACT 2607, Australia (2011)

    Google Scholar 

  17. Malik, A.: RTLS For Dummies. Wiley, Hoboken (2009)

    Google Scholar 

  18. Koppers, J.: Positioning Techniques: A general model: http://www.positioningtechniques.eu/. Accessed on June 5 (2012)

  19. Torrieri, D.J.: Statistical theory of passive location systems. IEEE Trans. Aerospace Electron. Syst. 20(2), 183–198 (1984)

    Article  Google Scholar 

  20. Friedlander, B.: A passive localization algorithm and its accuracy analysis. IEEE J. Oceanic Eng. 12, 234–245 (1987)

    Article  Google Scholar 

  21. Ananthanarayanan, G., Haridasan, M., Mohomed, I., Terry, D., Thekkath, C.: StarTrack: a framework for enabling track-based applications. In: Proceedings of the 7th International Conference on Mobile Systems, Applications, and Services, Kraków, Poland (2009)

    Google Scholar 

  22. Memon, Q., Kasparis, T.: Transform coding of signals using approximate trigonometric expansions. J. Electron. Imaging 6(04), 494–503 (1997)

    Google Scholar 

  23. Svitek, M., Zelinka, T., Lokaj, Z.: ITS data security in wireless telecommunication solutions. In: IEEE Colombian Intelligent Transportation Systems Symposium, pp. 1, 6, 30–30 (2012). doi:10.1109/CITSS.2012.6336682

  24. Memon, Q., Kasparis, T., Tzannes, N.: Approximate fourier expansion with uncorrelated coefficients. In: IEEE Mediterranean Symposium on Advancements in Controls, Cyprus (1995)

    Google Scholar 

  25. Flowers, D.: Data Encryption Routines for PIC18 Microcontrollers (2011), http://www.microchip.com/stellent/idcplg?IdcService=SS_GET_PAGE&nodeId=1824&appnote=en022056. Last Accessed on Oct 4 (2012)

  26. Zhao, Y.: Standardization of mobile phone positioning for 3G systems. In: IEEE Communications Magazine, pp. 108–116 (2002)

    Google Scholar 

Download references

Acknowledgments

The author would like to express his sincere thanks to the Research Affairs unit of the College of Engineering at the United Arab Emirates University for encouragement and financial support of this project under grant code number G00000814.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qurban A. Memon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Memon, Q.A. (2014). Secured and Networked Emergency Notification Without GPS Enabled Devices. In: Hassanien, A., Kim, TH., Kacprzyk, J., Awad, A. (eds) Bio-inspiring Cyber Security and Cloud Services: Trends and Innovations. Intelligent Systems Reference Library, vol 70. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43616-5_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-43616-5_21

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-43615-8

  • Online ISBN: 978-3-662-43616-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics