Top Banner
[ Master’s Thesis Defence ] [ Location Estimation Methods for Open, Privacy Preserving Mobile Positioning ] Brendan Johan Lee Department of Informatics University of Oslo, Norway Simula Research Laboratory [email protected] June 21, 2011
191

[Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

Aug 04, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Master’s Thesis Defence ][ Location Estimation Methods forOpen, Privacy Preserving Mobile Positioning ]

Brendan Johan Lee

Department of InformaticsUniversity of Oslo, Norway

Simula Research Laboratory

[email protected]

June 21, 2011

Page 2: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ A short terminology ]

Location Estimation - Determining devices’ physical locationusing properties of the data networks they are connected to.

Location Based Services (LBS) - Services that provide valuebased on a person’s or device’s location. (maps, augmentedreality, games, dating, etc.)

Location Provider - Service that provides an estimatedlocation using network Location Estimation

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 2 / 36 ]

Page 3: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ A short terminology ]

Location Estimation - Determining devices’ physical locationusing properties of the data networks they are connected to.

Location Based Services (LBS) - Services that provide valuebased on a person’s or device’s location. (maps, augmentedreality, games, dating, etc.)

Location Provider - Service that provides an estimatedlocation using network Location Estimation

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 2 / 36 ]

Page 4: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ A short terminology ]

Location Estimation - Determining devices’ physical locationusing properties of the data networks they are connected to.

Location Based Services (LBS) - Services that provide valuebased on a person’s or device’s location. (maps, augmentedreality, games, dating, etc.)

Location Provider - Service that provides an estimatedlocation using network Location Estimation

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 2 / 36 ]

Page 5: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Thesis’ Four Main Parts ]

1. Suggesting a privacy preserving, community sourced, openaccess mobile location provider

2. Suggesting a new location estimation method tuned towardsprivacy

3. Creating a test system for testing location estimation methodsbased on field data

4. Gathering data and testing the suggested location estimationmethod and some of the more common methods andcomparing them

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 3 / 36 ]

Page 6: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Thesis’ Four Main Parts ]

1. Suggesting a privacy preserving, community sourced, openaccess mobile location provider

2. Suggesting a new location estimation method tuned towardsprivacy

3. Creating a test system for testing location estimation methodsbased on field data

4. Gathering data and testing the suggested location estimationmethod and some of the more common methods andcomparing them

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 3 / 36 ]

Page 7: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Thesis’ Four Main Parts ]

1. Suggesting a privacy preserving, community sourced, openaccess mobile location provider

2. Suggesting a new location estimation method tuned towardsprivacy

3. Creating a test system for testing location estimation methodsbased on field data

4. Gathering data and testing the suggested location estimationmethod and some of the more common methods andcomparing them

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 3 / 36 ]

Page 8: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Thesis’ Four Main Parts ]

1. Suggesting a privacy preserving, community sourced, openaccess mobile location provider

2. Suggesting a new location estimation method tuned towardsprivacy

3. Creating a test system for testing location estimation methodsbased on field data

4. Gathering data and testing the suggested location estimationmethod and some of the more common methods andcomparing them

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 3 / 36 ]

Page 9: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Cellular Networks ]

Used to increase traffic capabilities

Network divided into smaller cellsFrequencies are re-usedCells are often sectored into three or more sectorsSuch small cells are great for location estimationTime Difference Multiple Access (TDMA) such as GSM andUMTS networks use timing data. Such timing data must becorrected for propagation delay, and can therefor be used fordetermining location.Neighboring cell information tracked and used for cellre-allocation

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 4 / 36 ]

Page 10: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Cellular Networks ]

Used to increase traffic capabilitiesNetwork divided into smaller cells

Frequencies are re-usedCells are often sectored into three or more sectorsSuch small cells are great for location estimationTime Difference Multiple Access (TDMA) such as GSM andUMTS networks use timing data. Such timing data must becorrected for propagation delay, and can therefor be used fordetermining location.Neighboring cell information tracked and used for cellre-allocation

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 4 / 36 ]

Page 11: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Cellular Networks ]

Used to increase traffic capabilitiesNetwork divided into smaller cellsFrequencies are re-used

Cells are often sectored into three or more sectorsSuch small cells are great for location estimationTime Difference Multiple Access (TDMA) such as GSM andUMTS networks use timing data. Such timing data must becorrected for propagation delay, and can therefor be used fordetermining location.Neighboring cell information tracked and used for cellre-allocation

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 4 / 36 ]

Page 12: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Cellular Networks ]

Used to increase traffic capabilitiesNetwork divided into smaller cellsFrequencies are re-usedCells are often sectored into three or more sectors

Such small cells are great for location estimationTime Difference Multiple Access (TDMA) such as GSM andUMTS networks use timing data. Such timing data must becorrected for propagation delay, and can therefor be used fordetermining location.Neighboring cell information tracked and used for cellre-allocation

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 4 / 36 ]

Page 13: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Cellular Networks ]

Used to increase traffic capabilitiesNetwork divided into smaller cellsFrequencies are re-usedCells are often sectored into three or more sectorsSuch small cells are great for location estimation

Time Difference Multiple Access (TDMA) such as GSM andUMTS networks use timing data. Such timing data must becorrected for propagation delay, and can therefor be used fordetermining location.Neighboring cell information tracked and used for cellre-allocation

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 4 / 36 ]

Page 14: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Cellular Networks ]

Used to increase traffic capabilitiesNetwork divided into smaller cellsFrequencies are re-usedCells are often sectored into three or more sectorsSuch small cells are great for location estimationTime Difference Multiple Access (TDMA) such as GSM andUMTS networks use timing data. Such timing data must becorrected for propagation delay, and can therefor be used fordetermining location.

Neighboring cell information tracked and used for cellre-allocation

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 4 / 36 ]

Page 15: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Cellular Networks ]

Used to increase traffic capabilitiesNetwork divided into smaller cellsFrequencies are re-usedCells are often sectored into three or more sectorsSuch small cells are great for location estimationTime Difference Multiple Access (TDMA) such as GSM andUMTS networks use timing data. Such timing data must becorrected for propagation delay, and can therefor be used fordetermining location.Neighboring cell information tracked and used for cellre-allocation

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 4 / 36 ]

Page 16: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation ]

Location Estimation - Using features of a network to determinethe spatial location of devices connected to said network.

Any type of network information that can be translated tolocation can be used:

Signal StrengthTiming DataID of access point in useProperties of received signal (angle, delay, etc.)

In this thesis focus on methods using GSM/UMTS and/orWLAN networks

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 5 / 36 ]

Page 17: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation ]

Location Estimation - Using features of a network to determinethe spatial location of devices connected to said network.Any type of network information that can be translated tolocation can be used:

Signal StrengthTiming DataID of access point in useProperties of received signal (angle, delay, etc.)

In this thesis focus on methods using GSM/UMTS and/orWLAN networks

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 5 / 36 ]

Page 18: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation ]

Location Estimation - Using features of a network to determinethe spatial location of devices connected to said network.Any type of network information that can be translated tolocation can be used:

Signal Strength

Timing DataID of access point in useProperties of received signal (angle, delay, etc.)

In this thesis focus on methods using GSM/UMTS and/orWLAN networks

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 5 / 36 ]

Page 19: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation ]

Location Estimation - Using features of a network to determinethe spatial location of devices connected to said network.Any type of network information that can be translated tolocation can be used:

Signal StrengthTiming Data

ID of access point in useProperties of received signal (angle, delay, etc.)

In this thesis focus on methods using GSM/UMTS and/orWLAN networks

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 5 / 36 ]

Page 20: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation ]

Location Estimation - Using features of a network to determinethe spatial location of devices connected to said network.Any type of network information that can be translated tolocation can be used:

Signal StrengthTiming DataID of access point in use

Properties of received signal (angle, delay, etc.)

In this thesis focus on methods using GSM/UMTS and/orWLAN networks

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 5 / 36 ]

Page 21: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation ]

Location Estimation - Using features of a network to determinethe spatial location of devices connected to said network.Any type of network information that can be translated tolocation can be used:

Signal StrengthTiming DataID of access point in useProperties of received signal (angle, delay, etc.)

In this thesis focus on methods using GSM/UMTS and/orWLAN networks

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 5 / 36 ]

Page 22: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation ]

Location Estimation - Using features of a network to determinethe spatial location of devices connected to said network.Any type of network information that can be translated tolocation can be used:

Signal StrengthTiming DataID of access point in useProperties of received signal (angle, delay, etc.)

In this thesis focus on methods using GSM/UMTS and/orWLAN networks

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 5 / 36 ]

Page 23: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation ]

Divided into three (often overlapping) types:

Network-basedMobile-basedMobile-assisted or hybrid

In this thesis we focus on only Mobile-based methods

Most common methods described in thesis. Here only thetested methods are shown.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 6 / 36 ]

Page 24: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation ]

Divided into three (often overlapping) types:Network-based

Mobile-basedMobile-assisted or hybrid

In this thesis we focus on only Mobile-based methods

Most common methods described in thesis. Here only thetested methods are shown.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 6 / 36 ]

Page 25: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation ]

Divided into three (often overlapping) types:Network-basedMobile-based

Mobile-assisted or hybrid

In this thesis we focus on only Mobile-based methods

Most common methods described in thesis. Here only thetested methods are shown.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 6 / 36 ]

Page 26: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation ]

Divided into three (often overlapping) types:Network-basedMobile-basedMobile-assisted or hybrid

In this thesis we focus on only Mobile-based methods

Most common methods described in thesis. Here only thetested methods are shown.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 6 / 36 ]

Page 27: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation ]

Divided into three (often overlapping) types:Network-basedMobile-basedMobile-assisted or hybrid

In this thesis we focus on only Mobile-based methods

Most common methods described in thesis. Here only thetested methods are shown.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 6 / 36 ]

Page 28: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation ]

Divided into three (often overlapping) types:Network-basedMobile-basedMobile-assisted or hybrid

In this thesis we focus on only Mobile-based methods

Most common methods described in thesis. Here only thetested methods are shown.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 6 / 36 ]

Page 29: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)

Uses only the ID of access point (cell) in useCan be based on the known position of the access point,the known coverage of the access point,the estimated coverage of the access pointor a combination of the above

Enhanced Cell Global Identity (E-CGI)Database Correlation Methods (DCM)Global Positioning System (GPS)

BTS

Estimated radius

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 30: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)Uses only the ID of access point (cell) in use

Can be based on the known position of the access point,the known coverage of the access point,the estimated coverage of the access pointor a combination of the above

Enhanced Cell Global Identity (E-CGI)Database Correlation Methods (DCM)Global Positioning System (GPS)

BTS

Estimated radius

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 31: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)Uses only the ID of access point (cell) in useCan be based on the known position of the access point,

the known coverage of the access point,the estimated coverage of the access pointor a combination of the above

Enhanced Cell Global Identity (E-CGI)Database Correlation Methods (DCM)Global Positioning System (GPS)

BTS

Estimated radius

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 32: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)Uses only the ID of access point (cell) in useCan be based on the known position of the access point,the known coverage of the access point,

the estimated coverage of the access pointor a combination of the above

Enhanced Cell Global Identity (E-CGI)Database Correlation Methods (DCM)Global Positioning System (GPS)

BTS

Estimated radius

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 33: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)Uses only the ID of access point (cell) in useCan be based on the known position of the access point,the known coverage of the access point,the estimated coverage of the access point

or a combination of the above

Enhanced Cell Global Identity (E-CGI)Database Correlation Methods (DCM)Global Positioning System (GPS)

BTS

Estimated radius

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 34: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)Uses only the ID of access point (cell) in useCan be based on the known position of the access point,the known coverage of the access point,the estimated coverage of the access pointor a combination of the above

Enhanced Cell Global Identity (E-CGI)Database Correlation Methods (DCM)Global Positioning System (GPS)

BTS

Estimated radius

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 35: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)Enhanced Cell Global Identity (E-CGI)

Enhances CGI by including a value that can be translated todistance such as rxlevel or timing valuesOther than enhancement, same as CGIIn thesis we use rxlevel since timing values generally are notavailable through standard APIs and only available duringactive conversation/data transferSectoring, if available, can also be used as enhancement

Database Correlation Methods (DCM)Global Positioning System (GPS)

BTS

Estimated radiusat given rxlevel

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 36: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)Enhanced Cell Global Identity (E-CGI)

Enhances CGI by including a value that can be translated todistance such as rxlevel or timing values

Other than enhancement, same as CGIIn thesis we use rxlevel since timing values generally are notavailable through standard APIs and only available duringactive conversation/data transferSectoring, if available, can also be used as enhancement

Database Correlation Methods (DCM)Global Positioning System (GPS)

BTS

Estimated radiusat given rxlevel

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 37: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)Enhanced Cell Global Identity (E-CGI)

Enhances CGI by including a value that can be translated todistance such as rxlevel or timing valuesOther than enhancement, same as CGI

In thesis we use rxlevel since timing values generally are notavailable through standard APIs and only available duringactive conversation/data transferSectoring, if available, can also be used as enhancement

Database Correlation Methods (DCM)Global Positioning System (GPS)

BTS

Estimated radiusat given rxlevel

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 38: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)Enhanced Cell Global Identity (E-CGI)

Enhances CGI by including a value that can be translated todistance such as rxlevel or timing valuesOther than enhancement, same as CGIIn thesis we use rxlevel since timing values generally are notavailable through standard APIs and only available duringactive conversation/data transfer

Sectoring, if available, can also be used as enhancement

Database Correlation Methods (DCM)Global Positioning System (GPS)

BTS

Estimated radiusat given rxlevel

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 39: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)Enhanced Cell Global Identity (E-CGI)

Enhances CGI by including a value that can be translated todistance such as rxlevel or timing valuesOther than enhancement, same as CGIIn thesis we use rxlevel since timing values generally are notavailable through standard APIs and only available duringactive conversation/data transferSectoring, if available, can also be used as enhancement

Database Correlation Methods (DCM)Global Positioning System (GPS)

BTS

Estimated radius

Cell angle

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 40: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)Enhanced Cell Global Identity (E-CGI)

Enhances CGI by including a value that can be translated todistance such as rxlevel or timing valuesOther than enhancement, same as CGIIn thesis we use rxlevel since timing values generally are notavailable through standard APIs and only available duringactive conversation/data transferSectoring, if available, can also be used as enhancement

Database Correlation Methods (DCM)Global Positioning System (GPS)

BTS

Estimated radiusat given rxlevel

Cell angle

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 41: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)

Enhanced Cell Global Identity (E-CGI)Database Correlation Methods (DCM)

Uses fingerprints: collection of observed or estimated networkmeasurements at a known or unknown location at a given timeUses a pre-existing database of measured or calculatedfingerprints with known locationsAlgorithm is used to compare a fingerprint measured in thefield with existing fingerprints in databaseKnown location of existing closest match is used as estimatedlocationCan be extended using heuristics and statistics

Global Positioning System (GPS)

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 42: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)

Enhanced Cell Global Identity (E-CGI)Database Correlation Methods (DCM)

Uses fingerprints: collection of observed or estimated networkmeasurements at a known or unknown location at a given time

Uses a pre-existing database of measured or calculatedfingerprints with known locationsAlgorithm is used to compare a fingerprint measured in thefield with existing fingerprints in databaseKnown location of existing closest match is used as estimatedlocationCan be extended using heuristics and statistics

Global Positioning System (GPS)

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 43: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)

Enhanced Cell Global Identity (E-CGI)Database Correlation Methods (DCM)

Uses fingerprints: collection of observed or estimated networkmeasurements at a known or unknown location at a given timeUses a pre-existing database of measured or calculatedfingerprints with known locations

Algorithm is used to compare a fingerprint measured in thefield with existing fingerprints in databaseKnown location of existing closest match is used as estimatedlocationCan be extended using heuristics and statistics

Global Positioning System (GPS)

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 44: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)

Enhanced Cell Global Identity (E-CGI)Database Correlation Methods (DCM)

Uses fingerprints: collection of observed or estimated networkmeasurements at a known or unknown location at a given timeUses a pre-existing database of measured or calculatedfingerprints with known locationsAlgorithm is used to compare a fingerprint measured in thefield with existing fingerprints in database

Known location of existing closest match is used as estimatedlocationCan be extended using heuristics and statistics

Global Positioning System (GPS)

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 45: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)

Enhanced Cell Global Identity (E-CGI)Database Correlation Methods (DCM)

Uses fingerprints: collection of observed or estimated networkmeasurements at a known or unknown location at a given timeUses a pre-existing database of measured or calculatedfingerprints with known locationsAlgorithm is used to compare a fingerprint measured in thefield with existing fingerprints in databaseKnown location of existing closest match is used as estimatedlocation

Can be extended using heuristics and statistics

Global Positioning System (GPS)

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 46: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)

Enhanced Cell Global Identity (E-CGI)Database Correlation Methods (DCM)

Uses fingerprints: collection of observed or estimated networkmeasurements at a known or unknown location at a given timeUses a pre-existing database of measured or calculatedfingerprints with known locationsAlgorithm is used to compare a fingerprint measured in thefield with existing fingerprints in databaseKnown location of existing closest match is used as estimatedlocationCan be extended using heuristics and statistics

Global Positioning System (GPS)

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 47: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)

Enhanced Cell Global Identity (E-CGI)

Database Correlation Methods (DCM)Global Positioning System (GPS)

Navigation system using signals from Geo-stationary satellitesOften considered a mobile location estimation systemHere used for two things:

Providing true location when gathering fingerprints in the fieldQuality control when testing location estimation methods

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 48: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)

Enhanced Cell Global Identity (E-CGI)

Database Correlation Methods (DCM)Global Positioning System (GPS)

Navigation system using signals from Geo-stationary satellites

Often considered a mobile location estimation systemHere used for two things:

Providing true location when gathering fingerprints in the fieldQuality control when testing location estimation methods

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 49: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)

Enhanced Cell Global Identity (E-CGI)

Database Correlation Methods (DCM)Global Positioning System (GPS)

Navigation system using signals from Geo-stationary satellitesOften considered a mobile location estimation system

Here used for two things:

Providing true location when gathering fingerprints in the fieldQuality control when testing location estimation methods

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 50: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)

Enhanced Cell Global Identity (E-CGI)

Database Correlation Methods (DCM)Global Positioning System (GPS)

Navigation system using signals from Geo-stationary satellitesOften considered a mobile location estimation systemHere used for two things:

Providing true location when gathering fingerprints in the fieldQuality control when testing location estimation methods

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 51: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)

Enhanced Cell Global Identity (E-CGI)

Database Correlation Methods (DCM)Global Positioning System (GPS)

Navigation system using signals from Geo-stationary satellitesOften considered a mobile location estimation systemHere used for two things:

Providing true location when gathering fingerprints in the field

Quality control when testing location estimation methods

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 52: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Location Estimation Methods ]

Cell Global Identity (CGI)

Enhanced Cell Global Identity (E-CGI)

Database Correlation Methods (DCM)Global Positioning System (GPS)

Navigation system using signals from Geo-stationary satellitesOften considered a mobile location estimation systemHere used for two things:

Providing true location when gathering fingerprints in the fieldQuality control when testing location estimation methods

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 7 / 36 ]

Page 53: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Privacy - Cloaking ]

Many different suggested methods

All involve somehow hiding the client from the server, hencenamed cloakingCommon methods:

Hiding one users among manyHiding data among fake dataOnion routing

Methods generally rely on a trusted third party cloakingservice, a private network of clients, or both.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 8 / 36 ]

Page 54: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Privacy - Cloaking ]

Many different suggested methods

All involve somehow hiding the client from the server, hencenamed cloaking

Common methods:Hiding one users among manyHiding data among fake dataOnion routing

Methods generally rely on a trusted third party cloakingservice, a private network of clients, or both.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 8 / 36 ]

Page 55: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Privacy - Cloaking ]

Many different suggested methods

All involve somehow hiding the client from the server, hencenamed cloakingCommon methods:

Hiding one users among manyHiding data among fake dataOnion routing

Methods generally rely on a trusted third party cloakingservice, a private network of clients, or both.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 8 / 36 ]

Page 56: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Privacy - Cloaking ]

Many different suggested methods

All involve somehow hiding the client from the server, hencenamed cloakingCommon methods:

Hiding one users among many

Hiding data among fake dataOnion routing

Methods generally rely on a trusted third party cloakingservice, a private network of clients, or both.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 8 / 36 ]

Page 57: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Privacy - Cloaking ]

Many different suggested methods

All involve somehow hiding the client from the server, hencenamed cloakingCommon methods:

Hiding one users among manyHiding data among fake data

Onion routing

Methods generally rely on a trusted third party cloakingservice, a private network of clients, or both.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 8 / 36 ]

Page 58: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Privacy - Cloaking ]

Many different suggested methods

All involve somehow hiding the client from the server, hencenamed cloakingCommon methods:

Hiding one users among manyHiding data among fake dataOnion routing

Methods generally rely on a trusted third party cloakingservice, a private network of clients, or both.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 8 / 36 ]

Page 59: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Background - Privacy - Cloaking ]

Many different suggested methods

All involve somehow hiding the client from the server, hencenamed cloakingCommon methods:

Hiding one users among manyHiding data among fake dataOnion routing

Methods generally rely on a trusted third party cloakingservice, a private network of clients, or both.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 8 / 36 ]

Page 60: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Motivation ]

Two main motivational factors behind this thesis:

1. Ownership and paymentStatus Quo: Corporations own your location. You have to payto determine your own location with your privacy.Should be: You own your own location. You should be able todetermine your location freely without selling your privacy to acorporation.

2. Crowd sourced data and cloaking do not mix. Cloakingdegrades crowd sourced data. By separating location providerfrom LBS this can be avoided, but then location provider mustbe privacy preserving by nature.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 9 / 36 ]

Page 61: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Motivation ]

Two main motivational factors behind this thesis:1. Ownership and payment

Status Quo: Corporations own your location. You have to payto determine your own location with your privacy.Should be: You own your own location. You should be able todetermine your location freely without selling your privacy to acorporation.

2. Crowd sourced data and cloaking do not mix. Cloakingdegrades crowd sourced data. By separating location providerfrom LBS this can be avoided, but then location provider mustbe privacy preserving by nature.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 9 / 36 ]

Page 62: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Motivation ]

Two main motivational factors behind this thesis:1. Ownership and payment

Status Quo: Corporations own your location. You have to payto determine your own location with your privacy.

Should be: You own your own location. You should be able todetermine your location freely without selling your privacy to acorporation.

2. Crowd sourced data and cloaking do not mix. Cloakingdegrades crowd sourced data. By separating location providerfrom LBS this can be avoided, but then location provider mustbe privacy preserving by nature.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 9 / 36 ]

Page 63: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Motivation ]

Two main motivational factors behind this thesis:1. Ownership and payment

Status Quo: Corporations own your location. You have to payto determine your own location with your privacy.Should be: You own your own location. You should be able todetermine your location freely without selling your privacy to acorporation.

2. Crowd sourced data and cloaking do not mix. Cloakingdegrades crowd sourced data. By separating location providerfrom LBS this can be avoided, but then location provider mustbe privacy preserving by nature.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 9 / 36 ]

Page 64: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Motivation ]

Two main motivational factors behind this thesis:1. Ownership and payment

Status Quo: Corporations own your location. You have to payto determine your own location with your privacy.Should be: You own your own location. You should be able todetermine your location freely without selling your privacy to acorporation.

2. Crowd sourced data and cloaking do not mix. Cloakingdegrades crowd sourced data. By separating location providerfrom LBS this can be avoided, but then location provider mustbe privacy preserving by nature.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 9 / 36 ]

Page 65: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Suggested Location Provider (Brief Summary) ]

A system was suggested and used as a basis for creating anew location estimation method

Started by determining threats to the system, and defined aset of goals

Main discovery: conclusions on how to protect system andensure privacy must be based on storage and transfermethods, which in turn must be based on location estimationmethodThe open and privacy preserving nature results in acorrelation between:

quality controltrustincentiveprecision

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 10 / 36 ]

Page 66: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Suggested Location Provider (Brief Summary) ]

A system was suggested and used as a basis for creating anew location estimation method

Started by determining threats to the system, and defined aset of goals

Main discovery: conclusions on how to protect system andensure privacy must be based on storage and transfermethods, which in turn must be based on location estimationmethodThe open and privacy preserving nature results in acorrelation between:

quality controltrustincentiveprecision

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 10 / 36 ]

Page 67: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Suggested Location Provider (Brief Summary) ]

A system was suggested and used as a basis for creating anew location estimation method

Started by determining threats to the system, and defined aset of goals

Main discovery: conclusions on how to protect system andensure privacy must be based on storage and transfermethods, which in turn must be based on location estimationmethod

The open and privacy preserving nature results in acorrelation between:

quality controltrustincentiveprecision

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 10 / 36 ]

Page 68: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Suggested Location Provider (Brief Summary) ]

A system was suggested and used as a basis for creating anew location estimation method

Started by determining threats to the system, and defined aset of goals

Main discovery: conclusions on how to protect system andensure privacy must be based on storage and transfermethods, which in turn must be based on location estimationmethodThe open and privacy preserving nature results in acorrelation between:

quality controltrustincentiveprecision

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 10 / 36 ]

Page 69: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Suggested Location Provider (Brief Summary) ]

A system was suggested and used as a basis for creating anew location estimation method

Started by determining threats to the system, and defined aset of goals

Main discovery: conclusions on how to protect system andensure privacy must be based on storage and transfermethods, which in turn must be based on location estimationmethodThe open and privacy preserving nature results in acorrelation between:

quality control

trustincentiveprecision

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 10 / 36 ]

Page 70: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Suggested Location Provider (Brief Summary) ]

A system was suggested and used as a basis for creating anew location estimation method

Started by determining threats to the system, and defined aset of goals

Main discovery: conclusions on how to protect system andensure privacy must be based on storage and transfermethods, which in turn must be based on location estimationmethodThe open and privacy preserving nature results in acorrelation between:

quality controltrust

incentiveprecision

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 10 / 36 ]

Page 71: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Suggested Location Provider (Brief Summary) ]

A system was suggested and used as a basis for creating anew location estimation method

Started by determining threats to the system, and defined aset of goals

Main discovery: conclusions on how to protect system andensure privacy must be based on storage and transfermethods, which in turn must be based on location estimationmethodThe open and privacy preserving nature results in acorrelation between:

quality controltrustincentive

precision

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 10 / 36 ]

Page 72: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Suggested Location Provider (Brief Summary) ]

A system was suggested and used as a basis for creating anew location estimation method

Started by determining threats to the system, and defined aset of goals

Main discovery: conclusions on how to protect system andensure privacy must be based on storage and transfermethods, which in turn must be based on location estimationmethodThe open and privacy preserving nature results in acorrelation between:

quality controltrustincentiveprecision

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 10 / 36 ]

Page 73: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Suggested Location Provider (Brief Summary) ]

In addition the following issues where addressed:

Data gathering:Direct uploadPre-generated database (estimated or gathered)Clients amend query results if needed

Bootstrapping: If system relies on amending queries, how tobootstrap a new area: No data exists to generate replies thatcan be amended

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 11 / 36 ]

Page 74: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Suggested Location Provider (Brief Summary) ]

In addition the following issues where addressed:Data gathering:

Direct uploadPre-generated database (estimated or gathered)Clients amend query results if needed

Bootstrapping: If system relies on amending queries, how tobootstrap a new area: No data exists to generate replies thatcan be amended

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 11 / 36 ]

Page 75: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Suggested Location Provider (Brief Summary) ]

In addition the following issues where addressed:Data gathering:

Direct upload

Pre-generated database (estimated or gathered)Clients amend query results if needed

Bootstrapping: If system relies on amending queries, how tobootstrap a new area: No data exists to generate replies thatcan be amended

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 11 / 36 ]

Page 76: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Suggested Location Provider (Brief Summary) ]

In addition the following issues where addressed:Data gathering:

Direct uploadPre-generated database (estimated or gathered)

Clients amend query results if needed

Bootstrapping: If system relies on amending queries, how tobootstrap a new area: No data exists to generate replies thatcan be amended

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 11 / 36 ]

Page 77: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Suggested Location Provider (Brief Summary) ]

In addition the following issues where addressed:Data gathering:

Direct uploadPre-generated database (estimated or gathered)Clients amend query results if needed

Bootstrapping: If system relies on amending queries, how tobootstrap a new area: No data exists to generate replies thatcan be amended

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 11 / 36 ]

Page 78: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Suggested Location Provider (Brief Summary) ]

In addition the following issues where addressed:Data gathering:

Direct uploadPre-generated database (estimated or gathered)Clients amend query results if needed

Bootstrapping: If system relies on amending queries, how tobootstrap a new area: No data exists to generate replies thatcan be amended

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 11 / 36 ]

Page 79: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method ]

Motivation: Combine the strengths of DCM with the simplicityof CGI/E-CGI

Areas are stored surrounding all observations of a uniquenetwork measurementAreas are stored as convex hulls surrounding the extremelocations hence:

Small storage fingerprintFew updates are neededNo stored data can be traced back to any individual

Suggested improvements to areas for better precision:Concave hullsLimited areas, concave or convex hulls

Location estimation: The intersection of the areas correlatingto the network measurements in incoming fingerprint iscalculated. The intersection, or the calculated center of theintersection is used as estimated location.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 12 / 36 ]

Page 80: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method ]

Motivation: Combine the strengths of DCM with the simplicityof CGI/E-CGIAreas are stored surrounding all observations of a uniquenetwork measurement

Areas are stored as convex hulls surrounding the extremelocations hence:

Small storage fingerprintFew updates are neededNo stored data can be traced back to any individual

Suggested improvements to areas for better precision:Concave hullsLimited areas, concave or convex hulls

Location estimation: The intersection of the areas correlatingto the network measurements in incoming fingerprint iscalculated. The intersection, or the calculated center of theintersection is used as estimated location.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 12 / 36 ]

Page 81: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method ]

Motivation: Combine the strengths of DCM with the simplicityof CGI/E-CGIAreas are stored surrounding all observations of a uniquenetwork measurementAreas are stored as convex hulls surrounding the extremelocations hence:

Small storage fingerprintFew updates are neededNo stored data can be traced back to any individual

Suggested improvements to areas for better precision:Concave hullsLimited areas, concave or convex hulls

Location estimation: The intersection of the areas correlatingto the network measurements in incoming fingerprint iscalculated. The intersection, or the calculated center of theintersection is used as estimated location.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 12 / 36 ]

Page 82: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method ]

Motivation: Combine the strengths of DCM with the simplicityof CGI/E-CGIAreas are stored surrounding all observations of a uniquenetwork measurementAreas are stored as convex hulls surrounding the extremelocations hence:

Small storage fingerprint

Few updates are neededNo stored data can be traced back to any individual

Suggested improvements to areas for better precision:Concave hullsLimited areas, concave or convex hulls

Location estimation: The intersection of the areas correlatingto the network measurements in incoming fingerprint iscalculated. The intersection, or the calculated center of theintersection is used as estimated location.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 12 / 36 ]

Page 83: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method ]

Motivation: Combine the strengths of DCM with the simplicityof CGI/E-CGIAreas are stored surrounding all observations of a uniquenetwork measurementAreas are stored as convex hulls surrounding the extremelocations hence:

Small storage fingerprintFew updates are needed

No stored data can be traced back to any individualSuggested improvements to areas for better precision:

Concave hullsLimited areas, concave or convex hulls

Location estimation: The intersection of the areas correlatingto the network measurements in incoming fingerprint iscalculated. The intersection, or the calculated center of theintersection is used as estimated location.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 12 / 36 ]

Page 84: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method ]

Motivation: Combine the strengths of DCM with the simplicityof CGI/E-CGIAreas are stored surrounding all observations of a uniquenetwork measurementAreas are stored as convex hulls surrounding the extremelocations hence:

Small storage fingerprintFew updates are neededNo stored data can be traced back to any individual

Suggested improvements to areas for better precision:Concave hullsLimited areas, concave or convex hulls

Location estimation: The intersection of the areas correlatingto the network measurements in incoming fingerprint iscalculated. The intersection, or the calculated center of theintersection is used as estimated location.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 12 / 36 ]

Page 85: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method ]

Motivation: Combine the strengths of DCM with the simplicityof CGI/E-CGIAreas are stored surrounding all observations of a uniquenetwork measurementAreas are stored as convex hulls surrounding the extremelocations hence:

Small storage fingerprintFew updates are neededNo stored data can be traced back to any individual

Suggested improvements to areas for better precision:

Concave hullsLimited areas, concave or convex hulls

Location estimation: The intersection of the areas correlatingto the network measurements in incoming fingerprint iscalculated. The intersection, or the calculated center of theintersection is used as estimated location.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 12 / 36 ]

Page 86: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method ]

Motivation: Combine the strengths of DCM with the simplicityof CGI/E-CGIAreas are stored surrounding all observations of a uniquenetwork measurementAreas are stored as convex hulls surrounding the extremelocations hence:

Small storage fingerprintFew updates are neededNo stored data can be traced back to any individual

Suggested improvements to areas for better precision:Concave hulls

Limited areas, concave or convex hulls

Location estimation: The intersection of the areas correlatingto the network measurements in incoming fingerprint iscalculated. The intersection, or the calculated center of theintersection is used as estimated location.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 12 / 36 ]

Page 87: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method ]

Motivation: Combine the strengths of DCM with the simplicityof CGI/E-CGIAreas are stored surrounding all observations of a uniquenetwork measurementAreas are stored as convex hulls surrounding the extremelocations hence:

Small storage fingerprintFew updates are neededNo stored data can be traced back to any individual

Suggested improvements to areas for better precision:Concave hullsLimited areas, concave or convex hulls

Location estimation: The intersection of the areas correlatingto the network measurements in incoming fingerprint iscalculated. The intersection, or the calculated center of theintersection is used as estimated location.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 12 / 36 ]

Page 88: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method ]

Motivation: Combine the strengths of DCM with the simplicityof CGI/E-CGIAreas are stored surrounding all observations of a uniquenetwork measurementAreas are stored as convex hulls surrounding the extremelocations hence:

Small storage fingerprintFew updates are neededNo stored data can be traced back to any individual

Suggested improvements to areas for better precision:Concave hullsLimited areas, concave or convex hulls

Location estimation: The intersection of the areas correlatingto the network measurements in incoming fingerprint iscalculated. The intersection, or the calculated center of theintersection is used as estimated location.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 12 / 36 ]

Page 89: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method ]

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 13 / 36 ]

Page 90: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method ]

Can fall back to E-CGI with no extra data or code when notenough data available

Can fall back to CGI little extra data and code when notenough data available

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 14 / 36 ]

Page 91: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method ]

Can fall back to E-CGI with no extra data or code when notenough data available

Can fall back to CGI little extra data and code when notenough data available

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 14 / 36 ]

Page 92: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method - Benefits ]

Low data transfer size and frequency (specially for updates)

Embodies the simplicity of CGI/E-CGI

Embodies the power of CGI/E-CGI

Small storage, memory and processing footprint

Extremely flexible and adaptive to different network equipmentand data

Used correctly ensures anonymity and privacy of stored data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 15 / 36 ]

Page 93: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method - Benefits ]

Low data transfer size and frequency (specially for updates)

Embodies the simplicity of CGI/E-CGI

Embodies the power of CGI/E-CGI

Small storage, memory and processing footprint

Extremely flexible and adaptive to different network equipmentand data

Used correctly ensures anonymity and privacy of stored data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 15 / 36 ]

Page 94: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method - Benefits ]

Low data transfer size and frequency (specially for updates)

Embodies the simplicity of CGI/E-CGI

Embodies the power of CGI/E-CGI

Small storage, memory and processing footprint

Extremely flexible and adaptive to different network equipmentand data

Used correctly ensures anonymity and privacy of stored data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 15 / 36 ]

Page 95: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method - Benefits ]

Low data transfer size and frequency (specially for updates)

Embodies the simplicity of CGI/E-CGI

Embodies the power of CGI/E-CGI

Small storage, memory and processing footprint

Extremely flexible and adaptive to different network equipmentand data

Used correctly ensures anonymity and privacy of stored data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 15 / 36 ]

Page 96: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method - Benefits ]

Low data transfer size and frequency (specially for updates)

Embodies the simplicity of CGI/E-CGI

Embodies the power of CGI/E-CGI

Small storage, memory and processing footprint

Extremely flexible and adaptive to different network equipmentand data

Used correctly ensures anonymity and privacy of stored data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 15 / 36 ]

Page 97: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Method - Benefits ]

Low data transfer size and frequency (specially for updates)

Embodies the simplicity of CGI/E-CGI

Embodies the power of CGI/E-CGI

Small storage, memory and processing footprint

Extremely flexible and adaptive to different network equipmentand data

Used correctly ensures anonymity and privacy of stored data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 15 / 36 ]

Page 98: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Intersecting Areas Methods - Limitations ]

Does not benefit the security and privacy of data transferother than reducing the amount of updates needed

By design: Precision cannot be gained using heuristics andstatistics. Such methods require storing individuals’ locationswhich is not compatible with privacy and open access

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 16 / 36 ]

Page 99: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System ]

Consists of three main parts:

1. Data collection tools2. Back-end3. Data visualization tool

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 17 / 36 ]

Page 100: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System ]

Consists of three main parts:1. Data collection tools

2. Back-end3. Data visualization tool

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 17 / 36 ]

Page 101: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System ]

Consists of three main parts:1. Data collection tools2. Back-end

3. Data visualization tool

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 17 / 36 ]

Page 102: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System ]

Consists of three main parts:1. Data collection tools2. Back-end3. Data visualization tool

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 17 / 36 ]

Page 103: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Data Collection Tools ]

Hardware

Custom logging hardwareCreated to be able to collect all information about all networkssimultaneously in an area, including non-public GSM-networksLess portable than mobile phone, but can be powered by any9-24V power source for a long time

Android, Symbian and OpenMoko PhonesExternal or internal GPS

SoftwarePC logger software for custom hardware loggerOpenMoko logger software for custom hardware loggerOpenMoko logger softwareAndroid logger softwareSymbian S60 logger software

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 18 / 36 ]

Page 104: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Data Collection Tools ]

HardwareCustom logging hardware

Created to be able to collect all information about all networkssimultaneously in an area, including non-public GSM-networksLess portable than mobile phone, but can be powered by any9-24V power source for a long time

Android, Symbian and OpenMoko PhonesExternal or internal GPS

SoftwarePC logger software for custom hardware loggerOpenMoko logger software for custom hardware loggerOpenMoko logger softwareAndroid logger softwareSymbian S60 logger software

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 18 / 36 ]

Page 105: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Data Collection Tools ]

HardwareCustom logging hardware

Created to be able to collect all information about all networkssimultaneously in an area, including non-public GSM-networks

Less portable than mobile phone, but can be powered by any9-24V power source for a long time

Android, Symbian and OpenMoko PhonesExternal or internal GPS

SoftwarePC logger software for custom hardware loggerOpenMoko logger software for custom hardware loggerOpenMoko logger softwareAndroid logger softwareSymbian S60 logger software

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 18 / 36 ]

Page 106: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Data Collection Tools ]

HardwareCustom logging hardware

Created to be able to collect all information about all networkssimultaneously in an area, including non-public GSM-networksLess portable than mobile phone, but can be powered by any9-24V power source for a long time

Android, Symbian and OpenMoko PhonesExternal or internal GPS

SoftwarePC logger software for custom hardware loggerOpenMoko logger software for custom hardware loggerOpenMoko logger softwareAndroid logger softwareSymbian S60 logger software

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 18 / 36 ]

Page 107: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Data Collection Tools ]

HardwareCustom logging hardware

Created to be able to collect all information about all networkssimultaneously in an area, including non-public GSM-networksLess portable than mobile phone, but can be powered by any9-24V power source for a long time

Android, Symbian and OpenMoko Phones

External or internal GPS

SoftwarePC logger software for custom hardware loggerOpenMoko logger software for custom hardware loggerOpenMoko logger softwareAndroid logger softwareSymbian S60 logger software

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 18 / 36 ]

Page 108: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Data Collection Tools ]

HardwareCustom logging hardware

Created to be able to collect all information about all networkssimultaneously in an area, including non-public GSM-networksLess portable than mobile phone, but can be powered by any9-24V power source for a long time

Android, Symbian and OpenMoko PhonesExternal or internal GPS

SoftwarePC logger software for custom hardware loggerOpenMoko logger software for custom hardware loggerOpenMoko logger softwareAndroid logger softwareSymbian S60 logger software

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 18 / 36 ]

Page 109: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Data Collection Tools ]

HardwareCustom logging hardware

Created to be able to collect all information about all networkssimultaneously in an area, including non-public GSM-networksLess portable than mobile phone, but can be powered by any9-24V power source for a long time

Android, Symbian and OpenMoko PhonesExternal or internal GPS

Software

PC logger software for custom hardware loggerOpenMoko logger software for custom hardware loggerOpenMoko logger softwareAndroid logger softwareSymbian S60 logger software

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 18 / 36 ]

Page 110: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Data Collection Tools ]

HardwareCustom logging hardware

Created to be able to collect all information about all networkssimultaneously in an area, including non-public GSM-networksLess portable than mobile phone, but can be powered by any9-24V power source for a long time

Android, Symbian and OpenMoko PhonesExternal or internal GPS

SoftwarePC logger software for custom hardware logger

OpenMoko logger software for custom hardware loggerOpenMoko logger softwareAndroid logger softwareSymbian S60 logger software

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 18 / 36 ]

Page 111: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Data Collection Tools ]

HardwareCustom logging hardware

Created to be able to collect all information about all networkssimultaneously in an area, including non-public GSM-networksLess portable than mobile phone, but can be powered by any9-24V power source for a long time

Android, Symbian and OpenMoko PhonesExternal or internal GPS

SoftwarePC logger software for custom hardware loggerOpenMoko logger software for custom hardware logger

OpenMoko logger softwareAndroid logger softwareSymbian S60 logger software

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 18 / 36 ]

Page 112: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Data Collection Tools ]

HardwareCustom logging hardware

Created to be able to collect all information about all networkssimultaneously in an area, including non-public GSM-networksLess portable than mobile phone, but can be powered by any9-24V power source for a long time

Android, Symbian and OpenMoko PhonesExternal or internal GPS

SoftwarePC logger software for custom hardware loggerOpenMoko logger software for custom hardware loggerOpenMoko logger software

Android logger softwareSymbian S60 logger software

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 18 / 36 ]

Page 113: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Data Collection Tools ]

HardwareCustom logging hardware

Created to be able to collect all information about all networkssimultaneously in an area, including non-public GSM-networksLess portable than mobile phone, but can be powered by any9-24V power source for a long time

Android, Symbian and OpenMoko PhonesExternal or internal GPS

SoftwarePC logger software for custom hardware loggerOpenMoko logger software for custom hardware loggerOpenMoko logger softwareAndroid logger software

Symbian S60 logger software

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 18 / 36 ]

Page 114: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Data Collection Tools ]

HardwareCustom logging hardware

Created to be able to collect all information about all networkssimultaneously in an area, including non-public GSM-networksLess portable than mobile phone, but can be powered by any9-24V power source for a long time

Android, Symbian and OpenMoko PhonesExternal or internal GPS

SoftwarePC logger software for custom hardware loggerOpenMoko logger software for custom hardware loggerOpenMoko logger softwareAndroid logger softwareSymbian S60 logger software

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 18 / 36 ]

Page 115: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Hardware logger ]

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 19 / 36 ]

Page 116: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ OpenMoko Software ]

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 20 / 36 ]

Page 117: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Android Software ]

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 21 / 36 ]

Page 118: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Symbian Series 60 Software ]

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 22 / 36 ]

Page 119: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Back-end ]

Created to gather data and test any location estimationmethod

Completely modularize so location estimation, storage andcommunication methods are implemented as plug-insFour main parts:

1. Communication interface2. Storage/Database3. Query handler4. Update handler

All communications and settings are logged so they can bere-played (possibly with different settings or estimationmethods) at a later time

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 23 / 36 ]

Page 120: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Back-end ]

Created to gather data and test any location estimationmethod

Completely modularize so location estimation, storage andcommunication methods are implemented as plug-ins

Four main parts:1. Communication interface2. Storage/Database3. Query handler4. Update handler

All communications and settings are logged so they can bere-played (possibly with different settings or estimationmethods) at a later time

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 23 / 36 ]

Page 121: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Back-end ]

Created to gather data and test any location estimationmethod

Completely modularize so location estimation, storage andcommunication methods are implemented as plug-insFour main parts:

1. Communication interface2. Storage/Database3. Query handler4. Update handler

All communications and settings are logged so they can bere-played (possibly with different settings or estimationmethods) at a later time

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 23 / 36 ]

Page 122: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Back-end ]

Created to gather data and test any location estimationmethod

Completely modularize so location estimation, storage andcommunication methods are implemented as plug-insFour main parts:

1. Communication interface

2. Storage/Database3. Query handler4. Update handler

All communications and settings are logged so they can bere-played (possibly with different settings or estimationmethods) at a later time

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 23 / 36 ]

Page 123: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Back-end ]

Created to gather data and test any location estimationmethod

Completely modularize so location estimation, storage andcommunication methods are implemented as plug-insFour main parts:

1. Communication interface2. Storage/Database

3. Query handler4. Update handler

All communications and settings are logged so they can bere-played (possibly with different settings or estimationmethods) at a later time

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 23 / 36 ]

Page 124: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Back-end ]

Created to gather data and test any location estimationmethod

Completely modularize so location estimation, storage andcommunication methods are implemented as plug-insFour main parts:

1. Communication interface2. Storage/Database3. Query handler

4. Update handler

All communications and settings are logged so they can bere-played (possibly with different settings or estimationmethods) at a later time

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 23 / 36 ]

Page 125: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Back-end ]

Created to gather data and test any location estimationmethod

Completely modularize so location estimation, storage andcommunication methods are implemented as plug-insFour main parts:

1. Communication interface2. Storage/Database3. Query handler4. Update handler

All communications and settings are logged so they can bere-played (possibly with different settings or estimationmethods) at a later time

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 23 / 36 ]

Page 126: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Back-end ]

Created to gather data and test any location estimationmethod

Completely modularize so location estimation, storage andcommunication methods are implemented as plug-insFour main parts:

1. Communication interface2. Storage/Database3. Query handler4. Update handler

All communications and settings are logged so they can bere-played (possibly with different settings or estimationmethods) at a later time

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 23 / 36 ]

Page 127: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Back-end ]

filter

filter

filter

filter

filter

filter

query filter module

query module

query logger

update filter module

update module

update logger

XML RPC server module

client client client

database module

data- base

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 24 / 36 ]

Page 128: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Visualization ]

Used for analyzing and visualizing gathered data and theresult of location estimation methods.

Renders maps or satellite imagery from web-services (Googlemaps, Bing maps, Openstreetmaps, etc.)

Renders points, tracks and areas (polygons) on top of imagery

Can fetch data directly from back-end database or load fromfiles

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 25 / 36 ]

Page 129: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Visualization ]

Used for analyzing and visualizing gathered data and theresult of location estimation methods.

Renders maps or satellite imagery from web-services (Googlemaps, Bing maps, Openstreetmaps, etc.)

Renders points, tracks and areas (polygons) on top of imagery

Can fetch data directly from back-end database or load fromfiles

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 25 / 36 ]

Page 130: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Visualization ]

Used for analyzing and visualizing gathered data and theresult of location estimation methods.

Renders maps or satellite imagery from web-services (Googlemaps, Bing maps, Openstreetmaps, etc.)

Renders points, tracks and areas (polygons) on top of imagery

Can fetch data directly from back-end database or load fromfiles

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 25 / 36 ]

Page 131: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Test System - Visualization ]

Used for analyzing and visualizing gathered data and theresult of location estimation methods.

Renders maps or satellite imagery from web-services (Googlemaps, Bing maps, Openstreetmaps, etc.)

Renders points, tracks and areas (polygons) on top of imagery

Can fetch data directly from back-end database or load fromfiles

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 25 / 36 ]

Page 132: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Tests ]

Data gathered with Android and Nokia handsets

Algorithms tested:1. rxlevel CGI based on gathered not estimated GSM/UMTS data2. rxlevel E-CGI based on gathered GSM/UMTS not estimated

data3. Simple, well described in literature DCM method, on

GSM/UMTS serving cell and WLAN4. Simple, well described in literature DCM method, on

GSM/UMTS serving cell and neighboring cells5. Simple, well described in literature DCM method, on

GSM/UMTS serving cell, neighboring cells and WLAN6. Intersecting areas on GSM/UMTS serving cell and WLAN with

and without E-CGI fall-back7. Intersecting areas on GSM/UMTS serving cell and neighboring

cells with and without E-CGI fall-back8. Intersecting areas on GSM/UMTS serving cell, neighboring

cells and WLAN with and without E-CGI fall-back

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 26 / 36 ]

Page 133: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Tests ]

Data gathered with Android and Nokia handsetsAlgorithms tested:

1. rxlevel CGI based on gathered not estimated GSM/UMTS data2. rxlevel E-CGI based on gathered GSM/UMTS not estimated

data3. Simple, well described in literature DCM method, on

GSM/UMTS serving cell and WLAN4. Simple, well described in literature DCM method, on

GSM/UMTS serving cell and neighboring cells5. Simple, well described in literature DCM method, on

GSM/UMTS serving cell, neighboring cells and WLAN6. Intersecting areas on GSM/UMTS serving cell and WLAN with

and without E-CGI fall-back7. Intersecting areas on GSM/UMTS serving cell and neighboring

cells with and without E-CGI fall-back8. Intersecting areas on GSM/UMTS serving cell, neighboring

cells and WLAN with and without E-CGI fall-back

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 26 / 36 ]

Page 134: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Tests ]

Data gathered with Android and Nokia handsetsAlgorithms tested:

1. rxlevel CGI based on gathered not estimated GSM/UMTS data

2. rxlevel E-CGI based on gathered GSM/UMTS not estimateddata

3. Simple, well described in literature DCM method, onGSM/UMTS serving cell and WLAN

4. Simple, well described in literature DCM method, onGSM/UMTS serving cell and neighboring cells

5. Simple, well described in literature DCM method, onGSM/UMTS serving cell, neighboring cells and WLAN

6. Intersecting areas on GSM/UMTS serving cell and WLAN withand without E-CGI fall-back

7. Intersecting areas on GSM/UMTS serving cell and neighboringcells with and without E-CGI fall-back

8. Intersecting areas on GSM/UMTS serving cell, neighboringcells and WLAN with and without E-CGI fall-back

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 26 / 36 ]

Page 135: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Tests ]

Data gathered with Android and Nokia handsetsAlgorithms tested:

1. rxlevel CGI based on gathered not estimated GSM/UMTS data2. rxlevel E-CGI based on gathered GSM/UMTS not estimated

data

3. Simple, well described in literature DCM method, onGSM/UMTS serving cell and WLAN

4. Simple, well described in literature DCM method, onGSM/UMTS serving cell and neighboring cells

5. Simple, well described in literature DCM method, onGSM/UMTS serving cell, neighboring cells and WLAN

6. Intersecting areas on GSM/UMTS serving cell and WLAN withand without E-CGI fall-back

7. Intersecting areas on GSM/UMTS serving cell and neighboringcells with and without E-CGI fall-back

8. Intersecting areas on GSM/UMTS serving cell, neighboringcells and WLAN with and without E-CGI fall-back

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 26 / 36 ]

Page 136: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Tests ]

Data gathered with Android and Nokia handsetsAlgorithms tested:

1. rxlevel CGI based on gathered not estimated GSM/UMTS data2. rxlevel E-CGI based on gathered GSM/UMTS not estimated

data3. Simple, well described in literature DCM method, on

GSM/UMTS serving cell and WLAN

4. Simple, well described in literature DCM method, onGSM/UMTS serving cell and neighboring cells

5. Simple, well described in literature DCM method, onGSM/UMTS serving cell, neighboring cells and WLAN

6. Intersecting areas on GSM/UMTS serving cell and WLAN withand without E-CGI fall-back

7. Intersecting areas on GSM/UMTS serving cell and neighboringcells with and without E-CGI fall-back

8. Intersecting areas on GSM/UMTS serving cell, neighboringcells and WLAN with and without E-CGI fall-back

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 26 / 36 ]

Page 137: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Tests ]

Data gathered with Android and Nokia handsetsAlgorithms tested:

1. rxlevel CGI based on gathered not estimated GSM/UMTS data2. rxlevel E-CGI based on gathered GSM/UMTS not estimated

data3. Simple, well described in literature DCM method, on

GSM/UMTS serving cell and WLAN4. Simple, well described in literature DCM method, on

GSM/UMTS serving cell and neighboring cells

5. Simple, well described in literature DCM method, onGSM/UMTS serving cell, neighboring cells and WLAN

6. Intersecting areas on GSM/UMTS serving cell and WLAN withand without E-CGI fall-back

7. Intersecting areas on GSM/UMTS serving cell and neighboringcells with and without E-CGI fall-back

8. Intersecting areas on GSM/UMTS serving cell, neighboringcells and WLAN with and without E-CGI fall-back

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 26 / 36 ]

Page 138: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Tests ]

Data gathered with Android and Nokia handsetsAlgorithms tested:

1. rxlevel CGI based on gathered not estimated GSM/UMTS data2. rxlevel E-CGI based on gathered GSM/UMTS not estimated

data3. Simple, well described in literature DCM method, on

GSM/UMTS serving cell and WLAN4. Simple, well described in literature DCM method, on

GSM/UMTS serving cell and neighboring cells5. Simple, well described in literature DCM method, on

GSM/UMTS serving cell, neighboring cells and WLAN

6. Intersecting areas on GSM/UMTS serving cell and WLAN withand without E-CGI fall-back

7. Intersecting areas on GSM/UMTS serving cell and neighboringcells with and without E-CGI fall-back

8. Intersecting areas on GSM/UMTS serving cell, neighboringcells and WLAN with and without E-CGI fall-back

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 26 / 36 ]

Page 139: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Tests ]

Data gathered with Android and Nokia handsetsAlgorithms tested:

1. rxlevel CGI based on gathered not estimated GSM/UMTS data2. rxlevel E-CGI based on gathered GSM/UMTS not estimated

data3. Simple, well described in literature DCM method, on

GSM/UMTS serving cell and WLAN4. Simple, well described in literature DCM method, on

GSM/UMTS serving cell and neighboring cells5. Simple, well described in literature DCM method, on

GSM/UMTS serving cell, neighboring cells and WLAN6. Intersecting areas on GSM/UMTS serving cell and WLAN with

and without E-CGI fall-back

7. Intersecting areas on GSM/UMTS serving cell and neighboringcells with and without E-CGI fall-back

8. Intersecting areas on GSM/UMTS serving cell, neighboringcells and WLAN with and without E-CGI fall-back

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 26 / 36 ]

Page 140: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Tests ]

Data gathered with Android and Nokia handsetsAlgorithms tested:

1. rxlevel CGI based on gathered not estimated GSM/UMTS data2. rxlevel E-CGI based on gathered GSM/UMTS not estimated

data3. Simple, well described in literature DCM method, on

GSM/UMTS serving cell and WLAN4. Simple, well described in literature DCM method, on

GSM/UMTS serving cell and neighboring cells5. Simple, well described in literature DCM method, on

GSM/UMTS serving cell, neighboring cells and WLAN6. Intersecting areas on GSM/UMTS serving cell and WLAN with

and without E-CGI fall-back7. Intersecting areas on GSM/UMTS serving cell and neighboring

cells with and without E-CGI fall-back

8. Intersecting areas on GSM/UMTS serving cell, neighboringcells and WLAN with and without E-CGI fall-back

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 26 / 36 ]

Page 141: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Tests ]

Data gathered with Android and Nokia handsetsAlgorithms tested:

1. rxlevel CGI based on gathered not estimated GSM/UMTS data2. rxlevel E-CGI based on gathered GSM/UMTS not estimated

data3. Simple, well described in literature DCM method, on

GSM/UMTS serving cell and WLAN4. Simple, well described in literature DCM method, on

GSM/UMTS serving cell and neighboring cells5. Simple, well described in literature DCM method, on

GSM/UMTS serving cell, neighboring cells and WLAN6. Intersecting areas on GSM/UMTS serving cell and WLAN with

and without E-CGI fall-back7. Intersecting areas on GSM/UMTS serving cell and neighboring

cells with and without E-CGI fall-back8. Intersecting areas on GSM/UMTS serving cell, neighboring

cells and WLAN with and without E-CGI fall-back

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 26 / 36 ]

Page 142: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Two Individual Tests ]

First test

System trained on all dataMethods tested on all data one measurement at a time

1. Remove training for tested point2. Run algorithm on measurement and log3. Re-add training for tested point

Second testSingle dataset for Android, three for Symbian Series 60Dataset randomly split in twoHalf of set used for training, half for testingRepeated on the virgin dataset 10 timesAll algorithms tested over all datasetsHence 30 Symbian and 10 Android tests for each algorithm

Each test was done individually for Android and Symbian S60data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 27 / 36 ]

Page 143: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Two Individual Tests ]

First testSystem trained on all data

Methods tested on all data one measurement at a time1. Remove training for tested point2. Run algorithm on measurement and log3. Re-add training for tested point

Second testSingle dataset for Android, three for Symbian Series 60Dataset randomly split in twoHalf of set used for training, half for testingRepeated on the virgin dataset 10 timesAll algorithms tested over all datasetsHence 30 Symbian and 10 Android tests for each algorithm

Each test was done individually for Android and Symbian S60data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 27 / 36 ]

Page 144: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Two Individual Tests ]

First testSystem trained on all dataMethods tested on all data one measurement at a time

1. Remove training for tested point2. Run algorithm on measurement and log3. Re-add training for tested point

Second testSingle dataset for Android, three for Symbian Series 60Dataset randomly split in twoHalf of set used for training, half for testingRepeated on the virgin dataset 10 timesAll algorithms tested over all datasetsHence 30 Symbian and 10 Android tests for each algorithm

Each test was done individually for Android and Symbian S60data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 27 / 36 ]

Page 145: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Two Individual Tests ]

First testSystem trained on all dataMethods tested on all data one measurement at a time

1. Remove training for tested point

2. Run algorithm on measurement and log3. Re-add training for tested point

Second testSingle dataset for Android, three for Symbian Series 60Dataset randomly split in twoHalf of set used for training, half for testingRepeated on the virgin dataset 10 timesAll algorithms tested over all datasetsHence 30 Symbian and 10 Android tests for each algorithm

Each test was done individually for Android and Symbian S60data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 27 / 36 ]

Page 146: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Two Individual Tests ]

First testSystem trained on all dataMethods tested on all data one measurement at a time

1. Remove training for tested point2. Run algorithm on measurement and log

3. Re-add training for tested point

Second testSingle dataset for Android, three for Symbian Series 60Dataset randomly split in twoHalf of set used for training, half for testingRepeated on the virgin dataset 10 timesAll algorithms tested over all datasetsHence 30 Symbian and 10 Android tests for each algorithm

Each test was done individually for Android and Symbian S60data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 27 / 36 ]

Page 147: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Two Individual Tests ]

First testSystem trained on all dataMethods tested on all data one measurement at a time

1. Remove training for tested point2. Run algorithm on measurement and log3. Re-add training for tested point

Second testSingle dataset for Android, three for Symbian Series 60Dataset randomly split in twoHalf of set used for training, half for testingRepeated on the virgin dataset 10 timesAll algorithms tested over all datasetsHence 30 Symbian and 10 Android tests for each algorithm

Each test was done individually for Android and Symbian S60data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 27 / 36 ]

Page 148: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Two Individual Tests ]

First testSystem trained on all dataMethods tested on all data one measurement at a time

1. Remove training for tested point2. Run algorithm on measurement and log3. Re-add training for tested point

Second test

Single dataset for Android, three for Symbian Series 60Dataset randomly split in twoHalf of set used for training, half for testingRepeated on the virgin dataset 10 timesAll algorithms tested over all datasetsHence 30 Symbian and 10 Android tests for each algorithm

Each test was done individually for Android and Symbian S60data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 27 / 36 ]

Page 149: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Two Individual Tests ]

First testSystem trained on all dataMethods tested on all data one measurement at a time

1. Remove training for tested point2. Run algorithm on measurement and log3. Re-add training for tested point

Second testSingle dataset for Android, three for Symbian Series 60

Dataset randomly split in twoHalf of set used for training, half for testingRepeated on the virgin dataset 10 timesAll algorithms tested over all datasetsHence 30 Symbian and 10 Android tests for each algorithm

Each test was done individually for Android and Symbian S60data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 27 / 36 ]

Page 150: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Two Individual Tests ]

First testSystem trained on all dataMethods tested on all data one measurement at a time

1. Remove training for tested point2. Run algorithm on measurement and log3. Re-add training for tested point

Second testSingle dataset for Android, three for Symbian Series 60Dataset randomly split in two

Half of set used for training, half for testingRepeated on the virgin dataset 10 timesAll algorithms tested over all datasetsHence 30 Symbian and 10 Android tests for each algorithm

Each test was done individually for Android and Symbian S60data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 27 / 36 ]

Page 151: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Two Individual Tests ]

First testSystem trained on all dataMethods tested on all data one measurement at a time

1. Remove training for tested point2. Run algorithm on measurement and log3. Re-add training for tested point

Second testSingle dataset for Android, three for Symbian Series 60Dataset randomly split in twoHalf of set used for training, half for testing

Repeated on the virgin dataset 10 timesAll algorithms tested over all datasetsHence 30 Symbian and 10 Android tests for each algorithm

Each test was done individually for Android and Symbian S60data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 27 / 36 ]

Page 152: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Two Individual Tests ]

First testSystem trained on all dataMethods tested on all data one measurement at a time

1. Remove training for tested point2. Run algorithm on measurement and log3. Re-add training for tested point

Second testSingle dataset for Android, three for Symbian Series 60Dataset randomly split in twoHalf of set used for training, half for testingRepeated on the virgin dataset 10 times

All algorithms tested over all datasetsHence 30 Symbian and 10 Android tests for each algorithm

Each test was done individually for Android and Symbian S60data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 27 / 36 ]

Page 153: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Two Individual Tests ]

First testSystem trained on all dataMethods tested on all data one measurement at a time

1. Remove training for tested point2. Run algorithm on measurement and log3. Re-add training for tested point

Second testSingle dataset for Android, three for Symbian Series 60Dataset randomly split in twoHalf of set used for training, half for testingRepeated on the virgin dataset 10 timesAll algorithms tested over all datasets

Hence 30 Symbian and 10 Android tests for each algorithm

Each test was done individually for Android and Symbian S60data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 27 / 36 ]

Page 154: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Two Individual Tests ]

First testSystem trained on all dataMethods tested on all data one measurement at a time

1. Remove training for tested point2. Run algorithm on measurement and log3. Re-add training for tested point

Second testSingle dataset for Android, three for Symbian Series 60Dataset randomly split in twoHalf of set used for training, half for testingRepeated on the virgin dataset 10 timesAll algorithms tested over all datasetsHence 30 Symbian and 10 Android tests for each algorithm

Each test was done individually for Android and Symbian S60data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 27 / 36 ]

Page 155: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Two Individual Tests ]

First testSystem trained on all dataMethods tested on all data one measurement at a time

1. Remove training for tested point2. Run algorithm on measurement and log3. Re-add training for tested point

Second testSingle dataset for Android, three for Symbian Series 60Dataset randomly split in twoHalf of set used for training, half for testingRepeated on the virgin dataset 10 timesAll algorithms tested over all datasetsHence 30 Symbian and 10 Android tests for each algorithm

Each test was done individually for Android and Symbian S60data

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 27 / 36 ]

Page 156: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Problems and Results ]

The penalty value for DCM is not static over different datasets, different areas and different handsets. Systems shouldtherefore be continuously calibrated, which highly complicatesusing DCM

The tests were comparable, only the second set of tests ispresented here

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 28 / 36 ]

Page 157: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Problems and Results ]

The penalty value for DCM is not static over different datasets, different areas and different handsets. Systems shouldtherefore be continuously calibrated, which highly complicatesusing DCM

The tests were comparable, only the second set of tests ispresented here

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 28 / 36 ]

Page 158: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Results - Training Time ]

Algorithm Time on 8218 time on L75551 .000050 .0000192 .000071 .0000386 .047350 .0171716.1 .047350 .0171717 .027986 .0243397.1 .027986 .0243398 .075265 .0414728.1 .075265 .041472

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 29 / 36 ]

Page 159: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Results - Fingerprint Processing Time ]

Algorithm Time on 8218 time on L75551 0.005383 0.0080952 0.005621 0.0089303 0.749295 11.0885244 16.210149 17.8029475 18.815485 14.6254436 0.021477 0.0239686.1 0.037931 0.0083017 0.003671 0.0039387.1 0.003632 0.0046768 0.005185 0.0051128.1 0.005067 0.006172

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 30 / 36 ]

Page 160: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Results - Success Rate ]

1 2 3 4 5 6a 6b 7a 7b 8a 8b

89

90

91

92

93

94

95

96

97

98

99

100

89.889.3

98.5

95.7

99.9

96.06

99.1

93.4

96

98.18

98.8

algorithm

succ

ess

inpe

rcen

t

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 31 / 36 ]

Page 161: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Results - Precision ]

0

100

200

300

400

500

600

1 2 3 4 5 6a 6b 7a 7b 8a 8b

met

ers

algorithm

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 32 / 36 ]

Page 162: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Conclusions ]

A privacy preserving, open access, crowd sources locationestimation system is possible and will address the issues of

PrivacyData ownership and paymentLocation cloaking services degrading location estimationservices

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 33 / 36 ]

Page 163: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Conclusions ]

A privacy preserving, open access, crowd sources locationestimation system is possible and will address the issues of

Privacy

Data ownership and paymentLocation cloaking services degrading location estimationservices

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 33 / 36 ]

Page 164: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Conclusions ]

A privacy preserving, open access, crowd sources locationestimation system is possible and will address the issues of

PrivacyData ownership and payment

Location cloaking services degrading location estimationservices

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 33 / 36 ]

Page 165: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Conclusions ]

A privacy preserving, open access, crowd sources locationestimation system is possible and will address the issues of

PrivacyData ownership and paymentLocation cloaking services degrading location estimationservices

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 33 / 36 ]

Page 166: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Conclusions ]

The Intersecting Areas method is not only suited for a privacypreserving, open access, crowd sourced location estimationsystem, but has several other benefits:

Higher precision than standard DCMMuch lower memory, storage and processing fingerprint thanstandard DCMThe problem of the varying optimal penalty value of standardDCM is non-existent.Provides a flexibility towards data, handsets, areas and futuredevices and technologies not found in the other testedmethods.Hence has a potential contribution also for other locationestimation systems than the proposed

We have discovered, and addressed, the need for a flexiblelocation estimation test system allowing tests on any locationdata with any methods by anybody.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 34 / 36 ]

Page 167: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Conclusions ]

The Intersecting Areas method is not only suited for a privacypreserving, open access, crowd sourced location estimationsystem, but has several other benefits:

Higher precision than standard DCM

Much lower memory, storage and processing fingerprint thanstandard DCMThe problem of the varying optimal penalty value of standardDCM is non-existent.Provides a flexibility towards data, handsets, areas and futuredevices and technologies not found in the other testedmethods.Hence has a potential contribution also for other locationestimation systems than the proposed

We have discovered, and addressed, the need for a flexiblelocation estimation test system allowing tests on any locationdata with any methods by anybody.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 34 / 36 ]

Page 168: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Conclusions ]

The Intersecting Areas method is not only suited for a privacypreserving, open access, crowd sourced location estimationsystem, but has several other benefits:

Higher precision than standard DCMMuch lower memory, storage and processing fingerprint thanstandard DCM

The problem of the varying optimal penalty value of standardDCM is non-existent.Provides a flexibility towards data, handsets, areas and futuredevices and technologies not found in the other testedmethods.Hence has a potential contribution also for other locationestimation systems than the proposed

We have discovered, and addressed, the need for a flexiblelocation estimation test system allowing tests on any locationdata with any methods by anybody.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 34 / 36 ]

Page 169: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Conclusions ]

The Intersecting Areas method is not only suited for a privacypreserving, open access, crowd sourced location estimationsystem, but has several other benefits:

Higher precision than standard DCMMuch lower memory, storage and processing fingerprint thanstandard DCMThe problem of the varying optimal penalty value of standardDCM is non-existent.

Provides a flexibility towards data, handsets, areas and futuredevices and technologies not found in the other testedmethods.Hence has a potential contribution also for other locationestimation systems than the proposed

We have discovered, and addressed, the need for a flexiblelocation estimation test system allowing tests on any locationdata with any methods by anybody.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 34 / 36 ]

Page 170: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Conclusions ]

The Intersecting Areas method is not only suited for a privacypreserving, open access, crowd sourced location estimationsystem, but has several other benefits:

Higher precision than standard DCMMuch lower memory, storage and processing fingerprint thanstandard DCMThe problem of the varying optimal penalty value of standardDCM is non-existent.Provides a flexibility towards data, handsets, areas and futuredevices and technologies not found in the other testedmethods.

Hence has a potential contribution also for other locationestimation systems than the proposed

We have discovered, and addressed, the need for a flexiblelocation estimation test system allowing tests on any locationdata with any methods by anybody.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 34 / 36 ]

Page 171: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Conclusions ]

The Intersecting Areas method is not only suited for a privacypreserving, open access, crowd sourced location estimationsystem, but has several other benefits:

Higher precision than standard DCMMuch lower memory, storage and processing fingerprint thanstandard DCMThe problem of the varying optimal penalty value of standardDCM is non-existent.Provides a flexibility towards data, handsets, areas and futuredevices and technologies not found in the other testedmethods.Hence has a potential contribution also for other locationestimation systems than the proposed

We have discovered, and addressed, the need for a flexiblelocation estimation test system allowing tests on any locationdata with any methods by anybody.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 34 / 36 ]

Page 172: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Conclusions ]

The Intersecting Areas method is not only suited for a privacypreserving, open access, crowd sourced location estimationsystem, but has several other benefits:

Higher precision than standard DCMMuch lower memory, storage and processing fingerprint thanstandard DCMThe problem of the varying optimal penalty value of standardDCM is non-existent.Provides a flexibility towards data, handsets, areas and futuredevices and technologies not found in the other testedmethods.Hence has a potential contribution also for other locationestimation systems than the proposed

We have discovered, and addressed, the need for a flexiblelocation estimation test system allowing tests on any locationdata with any methods by anybody.

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 34 / 36 ]

Page 173: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Future Work ]

During the work on this thesis we have found enough possiblefuture work for a small herd:

The suggested mobile location estimation system

A mathematical optimization method should be found allowingthe protection of the integrity of the training dataMore work needs to be done investigating the relations betweenquality control, system integrity, user privacy and incentive.A scheme for protecting users privacy during data transfer isneededWork needs to be done regarding convincing users to switch toa system not integrated on their device by defaultNaturally the system should be implemented and used

The Intersecting Areas location estimation methodThe location estimation test system

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 35 / 36 ]

Page 174: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Future Work ]

During the work on this thesis we have found enough possiblefuture work for a small herd:

The suggested mobile location estimation system

A mathematical optimization method should be found allowingthe protection of the integrity of the training dataMore work needs to be done investigating the relations betweenquality control, system integrity, user privacy and incentive.A scheme for protecting users privacy during data transfer isneededWork needs to be done regarding convincing users to switch toa system not integrated on their device by defaultNaturally the system should be implemented and used

The Intersecting Areas location estimation methodThe location estimation test system

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 35 / 36 ]

Page 175: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Future Work ]

During the work on this thesis we have found enough possiblefuture work for a small herd:

The suggested mobile location estimation systemA mathematical optimization method should be found allowingthe protection of the integrity of the training data

More work needs to be done investigating the relations betweenquality control, system integrity, user privacy and incentive.A scheme for protecting users privacy during data transfer isneededWork needs to be done regarding convincing users to switch toa system not integrated on their device by defaultNaturally the system should be implemented and used

The Intersecting Areas location estimation methodThe location estimation test system

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 35 / 36 ]

Page 176: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Future Work ]

During the work on this thesis we have found enough possiblefuture work for a small herd:

The suggested mobile location estimation systemA mathematical optimization method should be found allowingthe protection of the integrity of the training dataMore work needs to be done investigating the relations betweenquality control, system integrity, user privacy and incentive.

A scheme for protecting users privacy during data transfer isneededWork needs to be done regarding convincing users to switch toa system not integrated on their device by defaultNaturally the system should be implemented and used

The Intersecting Areas location estimation methodThe location estimation test system

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 35 / 36 ]

Page 177: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Future Work ]

During the work on this thesis we have found enough possiblefuture work for a small herd:

The suggested mobile location estimation systemA mathematical optimization method should be found allowingthe protection of the integrity of the training dataMore work needs to be done investigating the relations betweenquality control, system integrity, user privacy and incentive.A scheme for protecting users privacy during data transfer isneeded

Work needs to be done regarding convincing users to switch toa system not integrated on their device by defaultNaturally the system should be implemented and used

The Intersecting Areas location estimation methodThe location estimation test system

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 35 / 36 ]

Page 178: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Future Work ]

During the work on this thesis we have found enough possiblefuture work for a small herd:

The suggested mobile location estimation systemA mathematical optimization method should be found allowingthe protection of the integrity of the training dataMore work needs to be done investigating the relations betweenquality control, system integrity, user privacy and incentive.A scheme for protecting users privacy during data transfer isneededWork needs to be done regarding convincing users to switch toa system not integrated on their device by default

Naturally the system should be implemented and used

The Intersecting Areas location estimation methodThe location estimation test system

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 35 / 36 ]

Page 179: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Future Work ]

During the work on this thesis we have found enough possiblefuture work for a small herd:

The suggested mobile location estimation systemA mathematical optimization method should be found allowingthe protection of the integrity of the training dataMore work needs to be done investigating the relations betweenquality control, system integrity, user privacy and incentive.A scheme for protecting users privacy during data transfer isneededWork needs to be done regarding convincing users to switch toa system not integrated on their device by defaultNaturally the system should be implemented and used

The Intersecting Areas location estimation methodThe location estimation test system

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 35 / 36 ]

Page 180: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Future Work ]

During the work on this thesis we have found enough possiblefuture work for a small herd:

The suggested mobile location estimation systemThe Intersecting Areas location estimation method

Extend logger hardware to support UMTSSoftware needed to lock logger hardware to a single cell and logthoroughlyThe benefits of using concave hulls should be testedThe benefits of limiting areas should be testedThe precision when using timing values and other networkmanagement values should be tested

The location estimation test system

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 35 / 36 ]

Page 181: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Future Work ]

During the work on this thesis we have found enough possiblefuture work for a small herd:

The suggested mobile location estimation systemThe Intersecting Areas location estimation method

Extend logger hardware to support UMTS

Software needed to lock logger hardware to a single cell and logthoroughlyThe benefits of using concave hulls should be testedThe benefits of limiting areas should be testedThe precision when using timing values and other networkmanagement values should be tested

The location estimation test system

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 35 / 36 ]

Page 182: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Future Work ]

During the work on this thesis we have found enough possiblefuture work for a small herd:

The suggested mobile location estimation systemThe Intersecting Areas location estimation method

Extend logger hardware to support UMTSSoftware needed to lock logger hardware to a single cell and logthoroughly

The benefits of using concave hulls should be testedThe benefits of limiting areas should be testedThe precision when using timing values and other networkmanagement values should be tested

The location estimation test system

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 35 / 36 ]

Page 183: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Future Work ]

During the work on this thesis we have found enough possiblefuture work for a small herd:

The suggested mobile location estimation systemThe Intersecting Areas location estimation method

Extend logger hardware to support UMTSSoftware needed to lock logger hardware to a single cell and logthoroughlyThe benefits of using concave hulls should be tested

The benefits of limiting areas should be testedThe precision when using timing values and other networkmanagement values should be tested

The location estimation test system

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 35 / 36 ]

Page 184: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Future Work ]

During the work on this thesis we have found enough possiblefuture work for a small herd:

The suggested mobile location estimation systemThe Intersecting Areas location estimation method

Extend logger hardware to support UMTSSoftware needed to lock logger hardware to a single cell and logthoroughlyThe benefits of using concave hulls should be testedThe benefits of limiting areas should be tested

The precision when using timing values and other networkmanagement values should be tested

The location estimation test system

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 35 / 36 ]

Page 185: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Future Work ]

During the work on this thesis we have found enough possiblefuture work for a small herd:

The suggested mobile location estimation systemThe Intersecting Areas location estimation method

Extend logger hardware to support UMTSSoftware needed to lock logger hardware to a single cell and logthoroughlyThe benefits of using concave hulls should be testedThe benefits of limiting areas should be testedThe precision when using timing values and other networkmanagement values should be tested

The location estimation test system

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 35 / 36 ]

Page 186: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Future Work ]

During the work on this thesis we have found enough possiblefuture work for a small herd:

The suggested mobile location estimation systemThe Intersecting Areas location estimation methodThe location estimation test system

The same, or similar, mathematical optimization methodsuggested above should be implemented to allow filtering oftraining dataA module should be created to measure the density of trainingdata needed for individual algorithms to perform and to performoptimal.Several large datasets in different locations, both urban,sub-urban and rural should be gathered and released freelyThe system should be polished and released freely

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 35 / 36 ]

Page 187: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Future Work ]

During the work on this thesis we have found enough possiblefuture work for a small herd:

The suggested mobile location estimation systemThe Intersecting Areas location estimation methodThe location estimation test system

The same, or similar, mathematical optimization methodsuggested above should be implemented to allow filtering oftraining data

A module should be created to measure the density of trainingdata needed for individual algorithms to perform and to performoptimal.Several large datasets in different locations, both urban,sub-urban and rural should be gathered and released freelyThe system should be polished and released freely

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 35 / 36 ]

Page 188: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Future Work ]

During the work on this thesis we have found enough possiblefuture work for a small herd:

The suggested mobile location estimation systemThe Intersecting Areas location estimation methodThe location estimation test system

The same, or similar, mathematical optimization methodsuggested above should be implemented to allow filtering oftraining dataA module should be created to measure the density of trainingdata needed for individual algorithms to perform and to performoptimal.

Several large datasets in different locations, both urban,sub-urban and rural should be gathered and released freelyThe system should be polished and released freely

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 35 / 36 ]

Page 189: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Future Work ]

During the work on this thesis we have found enough possiblefuture work for a small herd:

The suggested mobile location estimation systemThe Intersecting Areas location estimation methodThe location estimation test system

The same, or similar, mathematical optimization methodsuggested above should be implemented to allow filtering oftraining dataA module should be created to measure the density of trainingdata needed for individual algorithms to perform and to performoptimal.Several large datasets in different locations, both urban,sub-urban and rural should be gathered and released freely

The system should be polished and released freely

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 35 / 36 ]

Page 190: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Future Work ]

During the work on this thesis we have found enough possiblefuture work for a small herd:

The suggested mobile location estimation systemThe Intersecting Areas location estimation methodThe location estimation test system

The same, or similar, mathematical optimization methodsuggested above should be implemented to allow filtering oftraining dataA module should be created to measure the density of trainingdata needed for individual algorithms to perform and to performoptimal.Several large datasets in different locations, both urban,sub-urban and rural should be gathered and released freelyThe system should be polished and released freely

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 35 / 36 ]

Page 191: [Master’s Thesis Defence] · [Brendan Johan Lee IFI.UiO] [Master’s Thesis Defence] [June 21, 2011][3 / 36] [Thesis’ Four Main Parts] 1.Suggesting a privacy preserving, community

[ Resources ]

This slide show is located athttp://opengsmloc.org/thesis/defence.pdf

The thesis itself is located athttp://opengsmloc.org/thesis/thesis-final-color-gloss.pdf

andhttp://opengsmloc.org/thesis/thesis-final-print.pdf

The software and code used in this thesis is located athttp://opengsmloc.org/thesis/code.tar.gz

The data used and generated in this thesis is located athttp://opengsmloc.org/thesis/data.tar.gz

[ Brendan Johan Lee IFI.UiO ] [ Master’s Thesis Defence ] [ June 21, 2011 ] [ 36 / 36 ]