Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
Critical analysis and error determination of locating-finding techniques in GSM.
Buchanan, William J; Raja, A; Munoz, Jose
Authors
A Raja
Jose Munoz
Abstract
GPS is a well-established technique for location-finding, but mobile phone-based methods are generally less expensive to implement, and can give reasonable accuracies. These techniques can thus be useful to network operators in providing services based on geographical locations, and also to users. This paper reviews the main handset location techniques used within a GSM network, and critically appraises them. The main techniques covered include Cell-ID, E-CGI, TDOA, AOA, TOA, OTA and Timing Advance (TA). It also outlines a practical experiment in the UK in locating finding, which uses TA signal to locate the handset. The results show how an experiment can be conducted to determine the error in the location measurement.
Citation
Buchanan, W. J., Raja, A., & Munoz, J. (2005). Critical analysis and error determination of locating-finding techniques in GSM. International Journal of Mobile Communications, 3, 165-182. https://doi.org/10.1504/IJMC.2005.005905
Journal Article Type | Article |
---|---|
Publication Date | Jan 1, 2005 |
Deposit Date | May 26, 2008 |
Publicly Available Date | May 26, 2008 |
Print ISSN | 1470-949X |
Electronic ISSN | 1741-5217 |
Publisher | Inderscience |
Peer Reviewed | Peer Reviewed |
Volume | 3 |
Pages | 165-182 |
DOI | https://doi.org/10.1504/IJMC.2005.005905 |
Keywords | Computing Science; Applications and Software; Communications and Mobile Technology; GPS; GSM; Location finding; Meausrements; Cell ID; TDOA: AOA; TOA; OTD; timing advance; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/1766 |
Publisher URL | http://dx.doi.org/10.1504/IJMC.2005.005905 |
Contract Date | May 26, 2008 |
Files
IJMC1534_new[1].pdf
(568 Kb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
You might also like
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
Chaotic Quantum Encryption to Secure Image Data in Post Quantum Consumer Technology
(2024)
Journal Article
Detection of Ransomware
(2024)
Patent
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2024
Advanced Search