20,99 €
inkl. MwSt.

Versandfertig in 6-10 Tagen
  • Broschiertes Buch

Localization of mobile phones brings opportunities for example in crime prevention or rescue operations. However, it also has the capacity to intrude the user's privacy, especially in conjunction with data retention (Vorratsdatenspeicherung). This work exploits the possibility to locate mobile phones based on their received signal strength of surrounding stations. It introduces a particular passive localization method. A detailed description about the theory and functionality is presented and an estimation of its accuracy is shown based on experiments. As the introduced localization is done on…mehr

Produktbeschreibung
Localization of mobile phones brings opportunities for example in crime prevention or rescue operations. However, it also has the capacity to intrude the user's privacy, especially in conjunction with data retention (Vorratsdatenspeicherung). This work exploits the possibility to locate mobile phones based on their received signal strength of surrounding stations. It introduces a particular passive localization method. A detailed description about the theory and functionality is presented and an estimation of its accuracy is shown based on experiments. As the introduced localization is done on the network side - and not by the mobile phone -, a user is not able to detect if his location was calculated. The localization depends only on informations already available to a mobile telephony network. Thus, not only currently active connections are locatable but also locations where past phone calls originated. The result cannot be of arbitrary precision because uncertainties arise by signal strength measurements. The developed model on which the localization depends, considers these uncertainties. It is based on data gained by presented experiments and measurements. The model and its accuracy is discussed in this work.
Autorenporträt
Richard Zahoransky got his Master degree in Computer Science at the University of Freiburg in 2012. As a graduate student he first worked on federated identity management and mobile networks. His actual research fields are security, compliance and resilience of business processes.