MS. S. Kalpana MCA., Assistant Professor,
V.S.B Engineering College.
Karur, Tamil Nadu, India.
shanthivsb@gmail.com
-
INTRODUCTION
Location positioning technique can be developed in wireless communication as result Location Based Service (LBS) is used in a mobile data service. By the LBS we can easy to find out the nearest restaurant around five miles at any place and any time. It brings as the great convenience for information access, constraints, spatial property and mobility provides a great challenge for the location based services to the mobile users.
The main concept of LBS was dependent on the location of a mobile device, like mobile phones.Virrantus et al defined about LBS was “information can be accessed by the mobile devices through the networks and has the ability to use the location of mobile devices. LBS is very similar to the open geospatial consortium. IP service that can use geographical information to serve a mobile user that can employ the position of mobile terminal.
LBS can be access through the mobile network. LBS is an information and entertainment service with mobile device. It utilizes the make use of geographical position of a mobile device. LBS service can be used in various services such as health, work, and personal work. It is a service which is used to identify the location of a person or object. It also includes parcel tracking and vehicle tracking services.
LBS have two major actions,
1. Obining the location of user
2. Utilizing this information to provide a service.
It can be divided in to triggered service (push service) and user requested service (pull service). In a triggered push service, the location of mobile device can be retrieved when a condition is set to fulfill. For example, making a call to an emergency center. The user who enters to a specific area can delivers an advertisement messages, warning messages.
In a user requested pull service, the user wants to retrieve the location of his/her mobile device which can be used in a LBS service. It involve personal location or service location, navigation and direction is best example for PULL LBS service.
-
RELATED WORKS
Al-suwaidi and Zemerl the problems can be solved by proposing an application “Locating Friends and Family Using Mobile Phones with Global Positioning System (GPS)”.The system is based on the client server approach. The phone can register and can login to the server. The update can be stored in a database where the client can be used periodically. If they want to learn the location of another client, they must be register to login the server can be used to the location. The application was developed and locates the family members and friends. The mobile application was developed by Java and J2ME. The usage of MySQL database, PHP which can be guaranteed to the server by an overloaded function. Each client has same control and command privileges which is not continent for using child tracking applications. Internet connectivity is used in both client and server side that can be used to solve the problem.
In this paper of Almomani, Alkhalil, Ahamad and vehicle tracking and management system can be propsed.The architecture can be designed in the favor of user with the maximum accessibility and provided by the two types of end user application and web application. Architecture is based on the client-server system. From the server, it contains the GPRS, Web and an SMS server along with the database to store user details From the server it may also contain GPS tracker and GSM modem. By using GPRS servers, receives a client and forwarded back to the SMS servers, The SMS server can be forwarded to the web server. This project was designed to monitor the behavior of employs or parent monitoring drivers.
Chandra, Jain and Qadeer are used a simple Web server is approached along with SMS to solve the problem this was developed for Java enable service and GPS receptor. Client can send these locations to other clients by SMS are sharing the web server database through the internet. The clients can view the location on Google play service. The motivation of the application is to enable the user to share the location with their friends.
Anderson, Lusting, Brunette, Borriello and Kolko have proposed a solution for transportation information system using GPS and SMS System. From the client the device contains GSM modems and GPS unit. The database server can store the details and location of the mobile phone for the SMS capability. When a user wants a user requested location, it send SMS request to the server GSM phones, then it replies with the latest location which is acquired from the client. The internet connectivity for both the server is the solution for transportation system.
There are many existing solution for locating or missing the lot of children can be established and conducted. There are some solution which requires as the internet connectivity on both sides of the client and server. This solution is inconvenient connectivity for child or parent sides. The child and parent can be controlled by parent side. The child should not able to delete or modify the information without parents’ permission.
There are some approaches to solve the child locating problems which can be supported by location based services including GPS.To get the child location without the child interaction is the main feature with simple and cost effective methods. This can be done through the use of GPS and SMS only.
-
ARCHITECTURE OF LBS
To make a LBS services possible, some of the elements are including mobile devices, applications, communication network, positioning component and service centers are needed. User can access LBS services for sending and retrieving the results. Then the devices can be portable navigation devices (PND). Application is the interface for users to access the LBS service. These can be downloaded and installed on users’ mobile device. An application is developed for these services due to the restriction of mobile device (small screen size, limited processor and memory, battery capacity). These applications should be light in weight and less time saving. The transfer service request from user to service provider and requested information back to the user is provided by the communication network through the mobile network. Global system for mobile communication (GSM is most commonly used mobile networks). They are usually controlled and maintained by operators. Network provider connectivity for mobile users and charges them for data and voice transmission.
A positioning service usually needed for LBS applications to determine the location of mobile devices. Nowadays, LBS service do not require user to input location manually. Some of the positioning technologies are satellite positioning, cellular positioning, WLAN stations can be used to find out the users location.
LBS provide service servers to users which are responsible for service request and sending back results.
To calculate server position route and specific information on the user position. They do not store and maintain all the information requested by user. It is mainly responsible for correcting and storing the geographical data, location based information and other related data. The data can requested and processed and return to the users by service servers.
Fig. 1: connections among LBS components
Fig1. Shows the connections among the components. First, user can send a service request through the mobile device which can be obtained by position component (step1). Then it is proceeded to send service centers through the mobile communication network.(step2).the request can be geographic database to get the require information by the service server(step3&4). At last the information can be sent back to the user mobile phone through network (Step 5&6).
Location based service (LBS) has number of components.
It includes,
-
Maps
-
Geographic Information System (GIS) information
-
Location collection services
-
LBS application-specific subcomponents
The architecture of LBS is depicted below:
(i). LBS Application
It represents a specific application like “Find My Friends” application
It consists of two components
-
Smartphone component
-
Server component
Smartphone component has number of sensors. Server component has application-specific data such as location tagged information
(ii). LBS Middleware
LBS Middleware has the rights to access the LBS features. LBS Middleware acts as an interface to LBS application. LBS features include Location Tracking, GIS Provider and Location Collection Services.
(iii).Location Tracking
Location Tracking is the important component of Location Based Service. This component only stores the dynamic location of the individual users which helps to trace the mobile users. It contains the data that allows a user’s route to be determined and predicted.
This component has the following features:
-
Maintain the information about the user’s current and past location.
-
It notifies that when the specific user has moved or when they move out of their area.
In particular, this component would typically support the following functionalities:
-
Keep records on user’s current and past locations.
-
Notify other components when a specific user has moved, or when they move in or out of an area that means location based notifications sent to the user.
This component determines which users are within the particular range i.e., Geocasting features.
It generates “User movement model” based on the dynamic location of the user.
(iv). GIS Provider
This component offers geospatial functionality like map information, map visualization and directory services. Google Map with its API is treated as GIS provider.
(v). Location Collection Service
This component does the location collection in order to get the north-south distance of the equator and the east-west distance on the earth’s surface for the specific user.
This component is accessed in two ways:
-
LBS Middleware; Mobile network triangulation through service provider
-
Direct access; Through GPS receiver in the Smartphone
Android provides the access to the above components.
LBS services are implemented through the following classes:
-
Location Manager
-
Location Provider
-
Geocoding
-
Google-Map
(vi). Location Manager
Location manager manages all the components that are needed to design the Location based service (LBS) system.
(vii). Location Provider:
Location provider determines the physical location of the individual user is known as GIS. Location provider component determines the available location and also facilitates to select a suitable one.
To find the List of Available Location Provider
boolean enabledOnly = true;
Listproviders=locationManager.getProviders (enabled only);
Call gets providers using a Boolean to list out all providers. Boolean indicates that if we want all providers available on the device or a particular one.
In addition to this GPS provider, network provider can be accessed directly with the help of static variables which is defined in the LocationManagerclass: LocationManager.GPS_PROVIDERLocationManager.NETWORK_PROVIDER
Moreover, the provider can be found on the basis of some criteria we can use the criteria class and then can able to find the best provider for the defined criteria using the Best Provider Method as shown in the following code
Criteriacriteria=newCriteria(); criteria.setAccuracy(Criteria.ACCUR ACY_COARSE);criteria.setPowerRequirement (Criteria.POWER_LOW); // more criteria here
String best Provider = locationManager.getBestProvider (criteria, true);
If more than one provider is found, then it returns the best provider that means which provider fulfills the given criteria. If no provider is found for the defined criteria, then the criteria are loosened in order power use, Accuracy, Ability to return bearing, speed and altitude.
(viii). Geocoding
Reverse geocoding provides a way to convert the geographical coordinates (latitude, longitude) into street address forwards and geocoding gets geographical coordinates from street address. We use get Latitude () and getLongtitude () methods in forward geocoding.
Coding is depicted below:
Double latitude=location.getLatitude ();
Double longitude=location.getlongitude ();
We use getFromLocation () method with geocoder in reverse geocoding is shown below:
//geocod is geocoder variable Address=geocod.getFromLocation (latitude, longitude)
(ix). Google Map in Android
Android provides a numerous of objects to handle maps in Location Based Service like Map View. Map View displays the map. One class is used to handle this Map Activity. Overlays class will be provided in order to annotate map. It offers canvas in which one can able to create multiple layers and use even for display. Moreover, we can able to zoom the map, localize the map with the help of Map Controller.
Following is the example for Map Controller.
Android:id=”@+id/map _view”
//specify different attributes/>//map controller
Map Controller=myMapView.getController ();
mapController.setCenter (point);
mapController.setZoom (1);
//List of parent overlays
Listoverlays=mapView.getOverlay ();
//Adding a new overlays
MyOverlaymyOverlay=newMyOverlay ();
Overlays. Add (my Overlay);
mapView.postInvaliddate ();
4. CHALLENGES OF MOBILE SECURITY
a. Threats
A smart phone user can get the various threats when he uses his phone. These threats can disturb the operation of a smart phone which is used to transmit and modify the user data. From this, it must guaranteed by three reasons are privacy, integrity, availability. They could behave themselves as a malware. From this activity , their activity and functionality should be limited.(for example, accessing location information via GPS, address book, transmitting data on the network, sending SMS that are charged, etc.).
There are three targets which gets threatened for users
Data: The device which is used for data management. They may contain sensitive data like credit card numbers, bank account number, a ATM pin number, private information, activity logs.
Identity: the devices which are highly customizable and contents are associated with specific person. For example, the device which can transmit information by the owner on the mobile phone contract and an attacker steal the identity of information in a mobile phone.
Availability: smart phone can be attacked by limiting the access and deprive the information which is carried by the owner.
Many sources are attacked by hackers which are found in the non mobile computing space.
-
Professionals, they focus on only above three targets, whether it is based on commercial or military purpose. Sensitive data can be sealed from public. Professional will also use the identity of attacked to achieve other attacks.
-
Thieves, they want to gain income through data or information that can be stolen. To increase their potential income many people’s are attacked.
-
Black hat hackers, their motivation is to develop virus can cause to damage to device. It specifically attacks availability. Hackers have an interest on stealing data in the mobile devices.
-
Grey hat hackers, they motivation is to expose the vulnerabilities software device. They do not intend on damage the device or stealing the data from the device.
b. Consequences
Smart phone can be attacked by a attacker, they can attempt several things.
The hacker can manipulate the smart phone by a zombie machine (which can communicate and send commands user to send the messages).
The attacker can easily make the phone call by Microsoft, which collects the telephone numbers from any source such as yellow pages. They can also use call paid service which results in a charges to owner of the smart phone. It is very danger because the emergency services can be disturbed.
Well recognized smart phone can record the conversation between the user and send them to a third party. It can be caused by industrial security problem.
-
The hacker can steal the user identify like copy of the sim,telephone numbers, etc. by doing this he can easily steal the bank account, ATM pin numbers, credit cards.
-
By discharging the battery the attacker can reduce the utility of the smart phone. For example, he can use the various applications that will run continuously on the RAM and requires the lot of energy by draining the battery. Traditional PC performances are limited.
-
The attacker can prevent the operation system which can be unused. Attacker cans delete the boot scripts, operating system where a smart phone can be unusable. If startup application could not be embedded due to empty the battery life.
-
The attacker can remove the personal or professional data of the user.
c. Attack based on SMS & MMS
Some of the attacks are derived from the management are SMS and MMS.
Some mobile phones will phase the problem in managing the binary SMS messages. It can cause the phone to restart. Leading to several attacks. If a message contains Chinese character, it will leads to the denial of services. This can be replaced by a Nokia mail service, which can be replaced by a 32 characters. This leads to complete dice function of email handler. These attacks called as “curse of silence”. The SMS can be send from the internet can be used to perform denial of services, which attack mobile telecommunication network. They can attack employ of the delay which is used to deliver the messages.
The attack is based on MMS with an attachment when it is attached by virus, the smart phone can be destroyed. If the attachment can be opened in the mobile, then it can be attacked. This will destroys the all the contacts in the address book. The best example of this attacks are the virus can uses the address book and send MMS messages including infected file to senders. The virus can immediately send the messages to recipients from the address book.
5. APPLICATION DEVELOPMENT
A. Requirements
It requires designing only for parents and children. The minimum requirement in smart phone wants to support GPS and SMS service. SMS is a basic service which contains in normal smart phone but GPS found new smart phones. This application is used for parents to locate the children. The development of the system by using Android SDK tools and eclipse which supports on Android. The main reason of using the Android OS is to reach the more users. Now a day’s Android are mostly used OS in the market.
B.Application Architecture
The solution for this problem was mainly based on GPS and GSM technology. There are two main advantages are offered in advanced smart mobile platform. The advantages are location service based on GPS and telephone service based on SMS.The implementation that supports Android platforms that can be solved easily. The simple way to propose a system was based on the use of SMS communication between parent and child. So it designed in a simple way that can involve few elements and less interaction. This result was based on easy use and implement with simple way and making it user-friendly.
Fig. 2: GPS Location finding
References
[1]. Virrantaus, K., Markkula, J., Garmash, A., Terziyan, V., Veijalainen, J., Katanosov, A., and Tirri, H. Developing gissupported location-based services. In Web Information Systems Engineering (2001), IEEE, pp. 66_75.
[2]. Consortium, O. G. Open location services 1.1, 2005.
[3].D'Roza, T., and Bilchev, G. An overview of location-based services. BT Technology Journal 21, 1 (2003), 20_27
[4].Schwinger, W., Grin, C., Prll1, B., and Retschitzegger, W. A light-weight framework for location-based services. In Lecture Notes in Computer Science (Berlin, 2005), Springer, pp. 206_210
[5].Zeimpekis, V., Giaglis, G., and Lekakos, G. A taxonomy of indoor and outdoor positioning techniques for mobile location services. SIGecom Exch. 3, 4 (2003), 19_27
[6] “.Survey of location based wireless services Mohapatra, D.; Suma, S.B.; Personal Wireless Communications, 2005.