CN104968004B - Indoor WLAN fingerprint locations access point deployment method based on user location secret protection - Google Patents
Indoor WLAN fingerprint locations access point deployment method based on user location secret protection Download PDFInfo
- Publication number
- CN104968004B CN104968004B CN201510376686.9A CN201510376686A CN104968004B CN 104968004 B CN104968004 B CN 104968004B CN 201510376686 A CN201510376686 A CN 201510376686A CN 104968004 B CN104968004 B CN 104968004B
- Authority
- CN
- China
- Prior art keywords
- mrow
- user
- radius
- twenty
- current
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 238000005457 optimization Methods 0.000 claims abstract description 18
- 238000012360 testing method Methods 0.000 claims description 42
- 239000011159 matrix material Substances 0.000 claims description 23
- 238000004364 calculation method Methods 0.000 claims description 7
- 230000004807 localization Effects 0.000 abstract 1
- 238000005516 engineering process Methods 0.000 description 8
- 238000010187 selection method Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000001186 cumulative effect Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000007423 decrease Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 238000010845 search algorithm Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W16/00—Network planning, e.g. coverage or traffic planning tools; Network deployment, e.g. resource partitioning or cells structures
- H04W16/18—Network planning tools
- H04W16/20—Network planning tools for indoor coverage or short range network deployment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
- H04W64/003—Locating users or terminals or network equipment for network management purposes, e.g. mobility management locating network equipment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
技术领域technical field
本发明属于无线电通信技术,具体涉及一种基于用户位置隐私保护的室内WLAN指纹定位接入点部署方法。The invention belongs to radio communication technology, and in particular relates to an indoor WLAN fingerprint positioning access point deployment method based on user location privacy protection.
背景技术Background technique
基于位置的服务(Location Based Service,LBS)是指通过移动网络和定位技术获取用户的位置信息并将与该位置相关的服务信息提供给用户的一种应用服务,通过LBS用户可以知道自己现在在哪,同时可以查询与其生活、商业和交通相关的各种信息,因此,LBS 被认为是在移动计算方面的“杀手级”业务之一,有着良好的市场价值和发展前景。Location-based service (Location Based Service, LBS) refers to an application service that obtains the user's location information through the mobile network and positioning technology and provides the service information related to the location to the user. Through LBS, the user can know where he is now. Where, at the same time, various information related to life, commerce and transportation can be queried. Therefore, LBS is considered to be one of the "killer" services in mobile computing, and has good market value and development prospects.
LBS的构成主要包含移动终端(如手机、平板电脑等)、定位系统(用于确定用户的位置信息)、移动通信网络及服务内容提供商。目前较为流行的室外无线定位系统是全球定位系统(GPS),其通过对GPS卫星信号的捕获、测量来自至少4颗在轨GPS卫星信号的到达延迟来估计终端位置,该系统可以提供覆盖近似全球范围、高精度及全天候的连续定位导航能力,但在室内复杂环境下,卫星信号会急剧衰落,定位性能并不理想。常见的室内无线定位系统有蓝牙定位系统、射频识别(RFID)定位系统、ZigBee定位系统以及WLAN 定位系统。由于目前WLAN的不断普及,基于WLAN的定位技术得到了较大的发展。目前,主流的WLAN定位技术可以分为以下四类:到达时间(或时间差)定位、到达角度(或角度差)定位、传播模型定位以及位置指纹定位。其中,位置指纹定位由于其定位精度较高且无需添加额外的硬件设备,从而得到了较为广泛的应用。The composition of LBS mainly includes mobile terminals (such as mobile phones, tablet computers, etc.), positioning systems (used to determine the location information of users), mobile communication networks and service content providers. At present, the more popular outdoor wireless positioning system is the Global Positioning System (GPS), which estimates the terminal position by capturing GPS satellite signals and measuring the arrival delay of at least 4 GPS satellite signals in orbit. This system can provide approximately global coverage. Range, high precision, and all-weather continuous positioning and navigation capabilities, but in complex indoor environments, satellite signals will decline sharply, and positioning performance is not ideal. Common indoor wireless positioning systems include Bluetooth positioning systems, radio frequency identification (RFID) positioning systems, ZigBee positioning systems and WLAN positioning systems. Due to the continuous popularization of WLAN, the positioning technology based on WLAN has been greatly developed. Currently, mainstream WLAN positioning technologies can be classified into the following four categories: time of arrival (or time difference) positioning, angle of arrival (or angle difference) positioning, propagation model positioning, and location fingerprint positioning. Among them, location fingerprint positioning has been widely used because of its high positioning accuracy and no need to add additional hardware devices.
LBS的系统流程通常为:首先,移动用户向LBS服务器提出服务请求,同时向LBS服务器上报其定位系统获取的位置信息及查询内容;然后,服务器根据上报的位置信息来处理用户的请求;最后,服务器将服务内容发送给移动用户。由于用户的位置信息及查询内容极易被第三方不法攻击者获取,然而用户为了获取LBS需要提供自己的位置信息,且用户获得LBS质量的好坏与用户上报位置信息的准确程度成正比,因此,如何合理、有效地处理LBS质量与用户位置隐私保护之间的矛盾,是LBS中用户隐私保护的关键问题之一。The system flow of LBS is usually as follows: First, the mobile user makes a service request to the LBS server, and at the same time reports the location information obtained by the positioning system and the query content to the LBS server; then, the server processes the user's request according to the reported location information; finally, The server sends the service content to the mobile user. Since the user's location information and query content are easily obtained by third-party attackers, users need to provide their own location information in order to obtain LBS, and the quality of LBS obtained by users is directly proportional to the accuracy of the location information reported by users. Therefore, , how to deal with the contradiction between LBS quality and user location privacy protection reasonably and effectively is one of the key issues of user privacy protection in LBS.
位置隐私是用户隐私的重要组成部分之一,目前大多数的研究主要考虑LBS系统流程中用户向LBS服务器上报位置信息发生泄露情况下的位置隐私保护,如区域覆盖隐私保护技术,该技术将用户的位置信息从一个点模糊化为一个空间区域,此时,即使攻击者获得了用户向LBS服务器上报的位置区域信息,也不能获知用户的准确位置。然而,在基于室内WLAN定位系统的LBS中,即使采用区域覆盖隐私保护技术,若定位阶段的用户RSS 指纹及指纹数据库同时泄露,则攻击者可使用某种定位算法(如KNN算法)缩小用户所在的区域范围,从而用户位置隐私暴露的风险将增加。基于此,本文旨在解决基于室内WLAN 指纹定位系统的LBS中,使用区域覆盖隐私保护技术而出现用户向LBS服务器上报的区域信息、用户RSS指纹及指纹数据库均泄露的情况下的位置隐私保护问题。当用户RSS指纹及指纹数据库均泄露时,攻击者可通过某种定位算法(如KNN算法)估计用户所在的位置,即找到用户的位置估计点,考虑WLAN定位系统存在一定的定位误差,用户的位置信息可以缩小到以用户位置估计点为圆心、定位误差为半径的圆域内,若该圆域内存在K个用户,则用户的位置信息可进一步缩小为这K个用户位置之一。由此可见,若系统的定位精度非常高,虽然用户的LBS质量能够得到保证,但此时用户的位置隐私也极容易泄露,而使用区域覆盖隐私保护技术时,只要用户的位置估计点在上报区域内,则可有效保证LBS质量。基于此,本发明提出一种新的AP部署方法,该方法在保护用户位置隐私的同时,还可有效保证LBS质量。Location privacy is one of the important components of user privacy. At present, most studies mainly consider the location privacy protection when the user reports location information to the LBS server in the process of the LBS system, such as the area coverage privacy protection technology. The location information of the user is blurred from a point to a spatial area. At this time, even if the attacker obtains the location area information reported by the user to the LBS server, the exact location of the user cannot be obtained. However, in the LBS based on the indoor WLAN positioning system, even if the area coverage privacy protection technology is adopted, if the user's RSS fingerprint and fingerprint database in the positioning stage are leaked at the same time, the attacker can use a certain positioning algorithm (such as the KNN algorithm) to narrow down where the user is located. Therefore, the risk of user location privacy exposure will increase. Based on this, this paper aims to solve the location privacy protection problem in the case where the area information reported by the user to the LBS server, the user's RSS fingerprint, and the fingerprint database are all leaked when the area coverage privacy protection technology is used in the LBS based on the indoor WLAN fingerprint positioning system. . When both the user's RSS fingerprint and the fingerprint database are leaked, the attacker can estimate the user's location through a positioning algorithm (such as the KNN algorithm), that is, find the user's location estimation point. Considering that there is a certain positioning error in the WLAN positioning system, the user's The location information can be narrowed down to a circle with the estimated user position as the center and the positioning error as the radius. If there are K users in the circle, the user's location information can be further narrowed down to one of the K user locations. It can be seen that if the positioning accuracy of the system is very high, although the user's LBS quality can be guaranteed, the user's location privacy is also very easy to leak at this time, and when using the area coverage privacy protection technology, as long as the user's location estimation point is reported In the area, the quality of LBS can be effectively guaranteed. Based on this, the present invention proposes a new AP deployment method, which can effectively guarantee the quality of LBS while protecting user location privacy.
发明内容Contents of the invention
本发明的目的是提供一种基于用户位置隐私保护的室内WLAN指纹定位接入点部署方法,在保证LBS质量的前提下,结合目标区域内不同的人流分布情况,能实现对用户位置隐私的保护及AP部署方式的快速优化。The purpose of the present invention is to provide an indoor WLAN fingerprint positioning access point deployment method based on user location privacy protection. On the premise of ensuring the quality of LBS, combined with different crowd distribution in the target area, the protection of user location privacy can be realized. And the rapid optimization of AP deployment methods.
本发明所述的基于用户位置隐私保护的室内WLAN指纹定位接入点部署方法,包括以下步骤:The indoor WLAN fingerprint positioning access point deployment method based on user location privacy protection according to the present invention comprises the following steps:
步骤一、设置权重系数μ、目标用户向LBS服务器上报的位置区域半径R,R单位为米;Step 1. Set the weight coefficient μ, the radius R of the location area reported by the target user to the LBS server, and the unit of R is meters;
步骤二、初始化,令i=1、E_current=0、E_best=0,其中,i为计数量,E_current为用于存储优化搜索时当前解对应的目标函数值,E_best为用于存储优化搜索时最优解对应的目标函数值;Step 2, initialization, let i=1, E_current=0, E_best=0, wherein, i is the count amount, E_current is the objective function value corresponding to the current solution when used to store the optimization search, and E_best is the best value when used to store the optimization search The objective function value corresponding to the optimal solution;
步骤三、根据AP个数,扰动产生新的AP部署方式,并将新产生的AP部署方式所对应的AP候选位置标记号存入矩阵slo_new中;Step 3. According to the number of APs, a new AP deployment mode is generated by disturbance, and the AP candidate position label number corresponding to the newly generated AP deployment mode is stored in the matrix slo_new;
步骤四、利用KNN(K-Nearest Neighbor)算法,计算在当前AP部署方式下,各测试点的位置估计点及对应的定位误差,并将其分别存入矩阵Location及errors中;Step 4. Use the KNN (K-Nearest Neighbor) algorithm to calculate the position estimation points and corresponding positioning errors of each test point under the current AP deployment mode, and store them in the matrix Location and errors respectively;
步骤五、矩阵errors中的所有元素向上取整,并存入矩阵d中;Step 5. All elements in the matrix errors are rounded up and stored in the matrix d;
步骤六、令j=1,其中j为测试点个数的计数量,假设测试点为需要LBS的用户所在位置点;Step 6, make j=1, where j is the count of the number of test points, assuming that the test point is the location point of the user who needs LBS;
步骤七、判断d(j,1)的值是否小于R,即测试点的定位误差向上取整后是否小于上报的位置区域半径R,其中,d(j,1)为测试点j处定位误差向上取整后的值;若是,则进入步骤八;若否,则进入步骤十五;Step 7. Determine whether the value of d(j,1) is less than R, that is, whether the positioning error of the test point after rounding up is smaller than the reported location area radius R, where d(j,1) is the positioning error at test point j The value after rounding up; if yes, go to step 8; if not, go to step 15;
步骤八、令k=d(j,1);其中k为计数量;Step 8, make k=d(j,1); Wherein k is counting quantity;
步骤九、以第j个测试点的位置估计点坐标Location(j,:)为圆心,k为半径,统计该圆域内用户个数,计算不同用户到圆心的欧式距离,并存入矩阵Distance中;Step 9: Take the estimated point coordinates Location(j,:) of the jth test point as the center of the circle, k as the radius, count the number of users in the circle, calculate the Euclidean distance from different users to the center of the circle, and store it in the matrix Distance ;
步骤十、假设圆域内有Uk个用户,则计算半径为k的圆域内选择为目标用户的平均信息熵,并存入矩阵H(k,1)中;Step ten, assuming that there are U k users in the circular domain, then calculating the average information entropy selected as the target user in the circular domain with a radius of k, and storing it in the matrix H (k, 1);
步骤十一、计算目标用户在测试点j时,攻击者在半径为k的圆域内选择为目标用户的匿名度Ad(k,1),该值反映了用户的隐私度;Step 11. When the target user is at the test point j, the attacker selects the anonymity degree Ad(k,1) of the target user in a circle with a radius of k, which reflects the privacy degree of the user;
步骤十二、将不同半径k下的Ad(k,1)叠加至矩阵元素AD(j,1)中,即 AD(j,1)=AD(j,1)+Ad(k,1),其中,AD(j,1)为用于存储目标用户在第j个测试点时,不同半径k下选择目标用户的总的匿名度;Step 12, superimposing Ad(k,1) under different radius k into the matrix element AD(j,1), that is, AD(j,1)=AD(j,1)+Ad(k,1), Among them, AD(j, 1) is used to store the total anonymity of the target user selected under different radius k when the target user is at the jth test point;
步骤十三、令k=k+1,其中,k等于攻击者寻找目标用户的半径,并计算每个k值所对应的匿名度;Step 13, let k=k+1, where k is equal to the radius of the attacker looking for the target user, and calculate the degree of anonymity corresponding to each value of k;
步骤十四、判断k是否小于或等于R,若是,则进入步骤九;若否,则进入步骤十六;Step 14, determine whether k is less than or equal to R, if so, proceed to step 9; if not, proceed to step 16;
步骤十五、将定位误差大于R的测试点定义为出界点,令出界点个数为r,其中,r为d(j,1)(j=1,…,Num_T)值大于R的个数;Step 15. Define the test points with positioning errors greater than R as out-of-boundary points, and set the number of out-of-boundary points to be r, where r is the number of d(j, 1) (j=1,...,Num_T) values greater than R ;
步骤十六、令j=j+1;Step sixteen, let j=j+1;
步骤十七、判断j是否小于Num_T,其中,Num_T为测试点总数;若是,则进入步骤七;若否,则进入步骤十八;Step seventeen, judge whether j is less than Num_T, wherein, Num_T is the total number of test points; if so, then enter step seven; if not, then enter step eighteen;
步骤十八、计算当前AP部署方式下用户的平均匿名度;Step 18, calculate the average anonymity degree of the user under the current AP deployment mode;
步骤十九、计算当前AP部署方式下用户的平均无效度;Step 19, calculating the average invalidity degree of users under the current AP deployment mode;
步骤二十、计算目标函数值f,f为扰动产生的新的AP部署方式下的目标函数值;Step 20, calculating the objective function value f, where f is the objective function value under the new AP deployment mode generated by the disturbance;
步骤二十一、判断f是否大于E_current;若是,则进入步骤二十二;若否,则进入步骤二十五;Step 21. Determine whether f is greater than E_current; if so, proceed to step 22; if not, proceed to step 25;
步骤二十二、令slo_current=slo_new;E_current=f,其中slo_current为用于存储优化搜索时的当前AP部署方式;slo_new为用于存储因优化搜索扰动而得到的新的AP部署方式;Step 22, set slo_current=slo_new; E_current=f, wherein slo_current is used to store the current AP deployment method during the optimization search; slo_new is used to store the new AP deployment method obtained due to the optimization search disturbance;
步骤二十三、判断f是否大于E_best;若是,则进入步骤二十四;若否,则进入步骤二十五;Step 23, judging whether f is greater than E_best; if so, proceed to step 24; if not, proceed to step 25;
步骤二十四、令slo_best=slo_new,E_best=f;其中,slo_best为用于存储优化搜索时的最优AP部署方式;Step 24, set slo_best=slo_new, E_best=f; wherein, slo_best is the optimal AP deployment method for storage optimization search;
步骤二十五、令i=i+1;Step 25, let i=i+1;
步骤二十六、判断i是否小于若是,则进入步骤三;若否,则进入步骤二十七,其中,Num_AP为AP总数,AP_candidate为AP候选位置个数;表示以排列组合方式,从AP_candidate个AP候选位置中选择Num_AP个不同AP位置的组合方式数;Step 26. Determine whether i is less than If yes, proceed to step 3; if not, proceed to step 27, where Num_AP is the total number of APs, and AP_candidate is the number of AP candidate positions; Indicates the number of combinations for selecting Num_AP different AP positions from the AP_candidate AP candidate positions in a permutation and combination manner;
步骤二十七、输出slo_best。Step 27, output slo_best.
所述矩阵d为:The matrix d is:
其中,表示向上取整。in, Indicates rounding up.
所述步骤十中,所述平均信息熵的计算公式为:In the tenth step, the calculation formula of the average information entropy is:
信息熵H(u)计算公式为:The calculation formula of information entropy H(u) is:
其中,Uk为半径k的圆内所包含的人的个数;p(u)为半径k的圆内第u个人为用户的概率; H(u)为半径k的圆内第u个人为用户的信息熵;Distance(u,1)为半径k的圆内第u个人距离圆心的欧式距离。Among them, U k is the number of people contained in the circle of radius k; p(u) is the probability that the uth person in the circle of radius k is the user; H(u) is the probability of the uth person in the circle of radius k User's information entropy; Distance(u,1) is the Euclidean distance from the uth person in a circle of radius k to the center of the circle.
所述步骤十一中,所述目标用户的匿名度Ad(k,1)的计算公式为:In the eleventh step, the formula for calculating the degree of anonymity Ad(k, 1) of the target user is:
Ad(k,1)=2H(k,1)。Ad(k,1)=2 H(k,1) .
所述步骤十八中,计算当前AP部署方式下用户的平均匿名度的公式为:In the eighteenth step, the formula for calculating the average degree of anonymity of the user under the current AP deployment mode is:
其中,Num_T为总的测试点个数。Among them, Num_T is the total number of test points.
所述步骤十九中,计算当前AP部署方式下用户的平均无效度的公式为:In the nineteenth step, the formula for calculating the average invalidity degree of the user under the current AP deployment mode is:
其中,r为出界点个数;Num_T为总的测试点个数。Among them, r is the number of out-of-boundary points; Num_T is the total number of test points.
所述步骤二十中,所述目标函数值f的计算公式为:In said step 20, the calculation formula of said objective function value f is:
f=μ·Aver_AD+(1-μ)·Aver_IDf=μ·Aver_AD+(1-μ)·Aver_ID
其中,f为扰动产生的新的AP部署方式下的目标函数值;μ为权重系数。Among them, f is the objective function value under the new AP deployment mode generated by the disturbance; μ is the weight coefficient.
本发明具有以下优点:本方法主要针对基于室内WLAN指纹定位系统的LBS中,使用区域覆盖隐私保护技术而出现用户向LBS服务器提供的区域信息、用户接收信号强度(Received Signal Strength,RSS)指纹及指纹数据库均泄露的高危情况,提出一种新的室内无线局域网(Wireless Local Area Network,WLAN)指纹定位接入点(Access Point,AP)部署方法以保护用户的位置隐私。本方法首先利用改进的匿名度和无效度来分别刻画用户的位置隐私和LBS质量,其次,根据不同的AP部署方式以及目标区域中不同的人流分布情况,计算匿名度及无效度,最后,通过赋予匿名度及无效度不同的权重来构建优化目标函数,同时得到最优的AP部署方式。由此可见,该方法在保证LBS质量的同时,保护了用户的位置隐私。本发明能够运用于室内无线电通信网络环境。The present invention has the following advantages: the method is mainly aimed at the LBS based on the indoor WLAN fingerprint positioning system, the area information provided by the user to the LBS server, the user received signal strength (Received Signal Strength, RSS) fingerprint and In the high-risk situation where the fingerprint database is leaked, a new indoor wireless local area network (Wireless Local Area Network, WLAN) fingerprint positioning access point (Access Point, AP) deployment method is proposed to protect the user's location privacy. This method first uses the improved anonymity and ineffectiveness to characterize the user's location privacy and LBS quality respectively. Secondly, according to different AP deployment methods and different crowd distribution in the target area, the anonymity and ineffectiveness are calculated. Finally, through Different weights are given to the degree of anonymity and ineffectiveness to construct the optimization objective function, and at the same time obtain the optimal AP deployment method. It can be seen that this method protects the user's location privacy while ensuring the quality of LBS. The invention can be applied to indoor radio communication network environment.
附图说明Description of drawings
图1a是本发明中步骤一到步骤十二的流程图;Fig. 1 a is the flowchart of step 1 to step 12 in the present invention;
图1b是本发明中步骤十三至步骤二十七的流程图;Fig. 1b is the flowchart of step 13 to step 27 in the present invention;
图2给出了刻画用户隐私度的匿名度计算示意图;Figure 2 shows a schematic diagram of calculating the degree of anonymity that characterizes user privacy;
图3是本发明的真实环境示意图,分为两个区域,区域1内共有参考点(标记为“·”) 38个,区域2内共有参考点(标记为“·”)15个。图中,五角星符号表示坐标原点,区域1中邻近参考点的横、纵坐标间距分别为2m和1.2m,区域2中邻近参考点的横、纵坐标间距分别为1.2m和3m,10个AP候选位置分别标记为1-10;3 is a schematic diagram of the real environment of the present invention, which is divided into two areas. There are 38 reference points (marked as "·") in area 1 and 15 reference points (marked as "·") in area 2. In the figure, the five-pointed star symbol represents the origin of the coordinates. The horizontal and vertical coordinate distances of adjacent reference points in area 1 are 2m and 1.2m respectively, and the horizontal and vertical coordinate distances of adjacent reference points in area 2 are 1.2m and 3m respectively. There are 10 AP candidate positions are marked as 1-10 respectively;
图4是在本发明实验环境中随机生成的人流分布及目标用户位置;Fig. 4 is the crowd distribution and target user position randomly generated in the experimental environment of the present invention;
图5a、5b和5c分别给出了在真实实验环境下,当权重系数u=0.7且上报半径R=10m、权重系数u=0.3且上报半径R=10m、权重系数u=0.5且上报半径R=5m时,本发明提出的基于用户位置隐私保护的室内WLAN指纹定位AP部署方法与传统的基于定位误差最小化的AP部署方法和随机选择AP部署方法的匿名度对比结果,其中,基于定位误差最小化的AP部署方法以所有测试点的平均定位误差最小时对应的AP部署方式作为最优AP部署方式,而随机选择的AP部署方法以随机选择产生的AP部署方式作为最优AP部署方式;Figures 5a, 5b and 5c respectively show that in the real experimental environment, when the weight coefficient u=0.7 and the reporting radius R=10m, the weighting coefficient u=0.3 and the reporting radius R=10m, the weighting coefficient u=0.5 and the reporting radius R = 5m, the anonymity comparison results of the indoor WLAN fingerprint positioning AP deployment method based on user location privacy protection proposed by the present invention and the traditional AP deployment method based on positioning error minimization and random selection AP deployment method, wherein, based on positioning error In the minimized AP deployment method, the AP deployment method corresponding to the minimum average positioning error of all test points is taken as the optimal AP deployment method, while in the randomly selected AP deployment method, the AP deployment method generated by random selection is used as the optimal AP deployment method;
图6a、6b和6c分别给出了在真实实验环境下,当权重系数u=0.7且上报半径R=10m、权重系数u=0.3且上报半径R=10m、权重系数u=0.5且上报半径R=5m时,本发明提出的基于用户位置隐私保护的室内WLAN指纹定位AP部署方法与传统的基于定位误差最小化的AP部署方法和随机选择AP部署方法的无效度对比结果;Figures 6a, 6b and 6c respectively show that in the real experimental environment, when the weight coefficient u=0.7 and the reporting radius R=10m, the weighting coefficient u=0.3 and the reporting radius R=10m, the weighting coefficient u=0.5 and the reporting radius R When =5m, the indoor WLAN fingerprint positioning AP deployment method based on user location privacy protection proposed by the present invention and the traditional AP deployment method based on positioning error minimization and the invalid degree comparison result of randomly selecting the AP deployment method;
图7a、7b、7c、7d、7e、7f、7g、7h和7i分别给出了在真实实验环境下,当AP个数为1、2、3、4、5、6、7、8和9时,本发明提出的基于用户位置隐私保护的室内WLAN 指纹定位AP部署方法与传统的基于定位误差最小化的AP部署方法和随机选择AP部署方法在上报半径R=10m内关于用户位置估计点的误差累积分布对比结果。由于本发明的研究背景是针对室内WLAN指纹定位系统的LBS中,使用区域覆盖隐私保护技术而出现用户向 LBS服务器提供的区域信息、用户接收信号强度指纹及指纹数据库均泄露的高危情况,在此情况下,攻击者仅需匹配上报半径R内的指纹数据,于是,若用户位置估计点的误差越大,则用户的位置隐私保护越好。基于此,本发明提出的基于用户位置隐私保护的室内 WLAN指纹定位AP部署方法具有较好的用户位置隐私保护;Figures 7a, 7b, 7c, 7d, 7e, 7f, 7g, 7h and 7i respectively show the real experimental environment, when the number of APs is 1, 2, 3, 4, 5, 6, 7, 8 and 9 , the indoor WLAN fingerprint positioning AP deployment method based on user location privacy protection proposed by the present invention, the traditional AP deployment method based on positioning error minimization and the random selection AP deployment method report the user location estimation point within the radius R = 10m Error cumulative distribution comparison results. Since the research background of the present invention is aimed at the LBS of the indoor WLAN fingerprint positioning system, the area information provided by the user to the LBS server, the user's received signal strength fingerprint, and the fingerprint database are all leaked. In this case, the attacker only needs to match the fingerprint data within the reported radius R. Therefore, if the error of the user's location estimation point is larger, the user's location privacy protection is better. Based on this, the indoor WLAN fingerprint positioning AP deployment method based on user location privacy protection proposed by the present invention has better user location privacy protection;
图8a、8b、8c、8d、8e、8f、8g、8h和8i分别给出了在真实实验环境下,当AP个数为1、2、3、4、5、6、7、8和9时,本发明提出的基于用户位置隐私保护的室内WLAN 指纹定位AP部署方法与传统的基于定位误差最小化的AP部署方法和随机选择AP部署方法在不考虑上报半径时整个目标区域内关于用户位置估计点的误差累积分布对比结果。在考虑用户位置隐私保护时,当上报半径R内数据库匹配的误差越大,系统对用户的隐私保护越好。然而,对于用户LBS质量而言,我们期望在保护用户位置隐私的同时,用户位置估计点的误差尽可能不会过大。Figures 8a, 8b, 8c, 8d, 8e, 8f, 8g, 8h and 8i respectively show the real experimental environment, when the number of APs is 1, 2, 3, 4, 5, 6, 7, 8 and 9 When the indoor WLAN fingerprint positioning AP deployment method based on user location privacy protection proposed by the present invention is different from the traditional AP deployment method based on positioning error minimization and random selection AP deployment method, the user location in the entire target area is not considered. Cumulative distribution of errors for estimated points vs. results. When considering user location privacy protection, the greater the error of database matching within the reported radius R, the better the system's privacy protection for users. However, for user LBS quality, we expect the error of user location estimation points to be as small as possible while protecting user location privacy.
具体实施方式Detailed ways
下面结合附图对本发明作进一步说明。The present invention will be further described below in conjunction with accompanying drawing.
如图1a至图8i所示的基于用户位置隐私保护的室内WLAN指纹定位接入点部署方法,包括以下步骤:The indoor WLAN fingerprint positioning access point deployment method based on user location privacy protection as shown in Figures 1a to 8i includes the following steps:
步骤一、输入权重系数μ、目标用户向LBS服务器上报的位置区域半径R,R单位为米。Step 1: Input the weight coefficient μ, the radius R of the location area reported by the target user to the LBS server, and the unit of R is meter.
步骤二、初始化,令i=1、E_current=0、E_best=0,其中,i为计数量,E_current为用于存储优化搜索时当前解对应的目标函数值,E_best为用于存储优化搜索时最优解对应的目标函数值。Step 2, initialization, let i=1, E_current=0, E_best=0, wherein, i is the count amount, E_current is the objective function value corresponding to the current solution when used to store the optimization search, and E_best is the best value when used to store the optimization search The objective function value corresponding to the optimal solution.
步骤三、根据AP个数,扰动产生新的AP部署方式,并将新产生的AP部署方式所对应的AP候选位置标记号存入矩阵slo_new中,其中,扰动过程详见“扰动产生新AP部署方式的方法”。Step 3. According to the number of APs, generate a new AP deployment mode by perturbation, and store the AP candidate location number corresponding to the newly generated AP deployment mode into the matrix slo_new. For the perturbation process, see "Disturbance Generates New AP Deployment Mode" for details. way of way".
步骤四、利用KNN(K-Nearest Neighbor)算法,计算在当前AP部署方式下,各测试点的位置估计点及对应的定位误差,并将其分别存入矩阵Location及errors中,其中,KNN算法详见“KNN算法流程”。Step 4. Use the KNN (K-Nearest Neighbor) algorithm to calculate the position estimation points and corresponding positioning errors of each test point under the current AP deployment mode, and store them in the matrix Location and errors respectively. Among them, the KNN algorithm See "KNN Algorithm Process" for details.
步骤五、矩阵errors中的所有元素向上取整,并存入矩阵d中Step 5. All elements in the matrix errors are rounded up and stored in the matrix d
公式一 formula one
其中,表示向上取整。in, Indicates rounding up.
步骤六、令j=1,其中j为测试点个数的计数量,本发明假设测试点为需要LBS服务的用户所在位置点。Step 6, set j=1, where j is the count of the number of test points, and the present invention assumes that the test points are the locations of users who need LBS services.
步骤七、判断d(j,1)的值是否小于R(即测试点的定位误差向上取整后是否小于上报区域半径),其中,d(j,1)为测试点j处定位误差向上取整后的值;若是,则进入步骤八;若否,则进入步骤十五。Step 7. Determine whether the value of d(j,1) is less than R (that is, whether the positioning error of the test point is smaller than the radius of the reported area after rounding up), where d(j,1) is the upward rounding of the positioning error at the test point j The adjusted value; if yes, go to step 8; if not, go to step 15.
步骤八、令k=d(j,1);其中k为计数量。Step 8, let k=d(j,1); where k is the counting quantity.
步骤九、以第j个测试点的位置估计点坐标Location(j,:)为圆心,k为半径,统计该圆域内用户个数,计算不同用户到圆心的欧式距离,并存入矩阵Distance中。Step 9: Take the estimated point coordinates Location(j,:) of the jth test point as the center of the circle, k as the radius, count the number of users in the circle, calculate the Euclidean distance from different users to the center of the circle, and store it in the matrix Distance .
步骤十、当攻击者通过某种定位算法(如KNN算法)得到测试点的位置估计点时,考虑存在一定的定位误差,于是以位置估计点为圆心,定位误差为半径的圆域内的用户均有一定概率选择为目标用户,假设圆域内有Uk个用户,则根据公式三计算半径为k的圆域内选择为目标用户的平均信息熵,并存入矩阵H(k,1)中;Step 10. When the attacker obtains the position estimation point of the test point through a certain positioning algorithm (such as the KNN algorithm), considering that there is a certain positioning error, the users in the circle with the position estimation point as the center and the positioning error as the radius are averaged There is a certain probability to select as the target user, assuming that there are U k users in the circle, then calculate the average information entropy selected as the target user in the circle with a radius of k according to formula 3, and store it in the matrix H (k, 1);
信息熵计算公式为:The formula for calculating information entropy is:
公式二 formula two
其中,Uk为半径k的圆内所包含的人的个数;p(u)为半径k的圆内第u个人为用户的概率; H(u)为半径k的圆内第u个人为用户的信息熵;Distance(u,1)为半径k的圆内第u个人距离圆心的欧式距离。Among them, U k is the number of people contained in the circle of radius k; p(u) is the probability that the uth person in the circle of radius k is the user; H(u) is the probability of the uth person in the circle of radius k User's information entropy; Distance(u,1) is the Euclidean distance from the uth person in a circle of radius k to the center of the circle.
由于圆内有Uk个人,因此半径为k的圆内找到用户的平均信息熵为:Since there are U k individuals in the circle, the average information entropy of users found in the circle with radius k is:
公式三 formula three
步骤十一、根据公式四,计算目标用户在测试点j时,攻击者在半径为k的圆域内选择为目标用户的匿名度Ad(k,1),该值反映了用户的隐私度:Step 11. According to Formula 4, calculate the anonymity degree Ad(k,1) of the target user selected by the attacker as the target user in the circle domain with a radius of k when the target user is at the test point j, which reflects the privacy degree of the user:
Ad(k,1)=2H(k,1) 公式四Ad(k,1)=2 H(k,1) Formula 4
步骤十二、将不同半径k下的Ad(k,1)叠加至矩阵元素AD(j,1)中,即 AD(j,1)=AD(j,1)+Ad(k,1),其中,AD(j,1)为用于存储目标用户在第j个测试点时,不同半径k下选择目标用户的总的匿名度。Step 12, superimposing Ad(k,1) under different radius k into the matrix element AD(j,1), that is, AD(j,1)=AD(j,1)+Ad(k,1), Among them, AD(j,1) is used to store the total anonymity of the target user selected under different radius k when the target user is at the jth test point.
步骤十三、令k=k+1,其中,k等于攻击者寻找目标用户的半径,由于在实际应用中,关于攻击者对于半径k的选择是未知的,因此按一定的步长(如等步长1)增加k值,并计算每个k值所对应的匿名度。Step thirteen, make k=k+1, wherein, k equals the radius that the assailant is looking for the target user, because in practical application, about the assailant is unknown for the selection of radius k, therefore according to certain step size (such as etc. Step size 1) Increase the value of k, and calculate the degree of anonymity corresponding to each value of k.
步骤十四、判断k是否小于或等于R;若是,则进入步骤九;否,则进入步骤十六。Step 14. Determine whether k is less than or equal to R; if so, go to step 9; otherwise, go to step 16.
步骤十五、此时,系统所能提供的LBS质量会受到影响,因此将定位误差大于R的测试点定义为出界点,令出界点个数为r,其中,r为d(j,1)(j=1,…,Num_T)值大于R的个数。Step 15. At this time, the quality of LBS provided by the system will be affected, so define the test point with a positioning error greater than R as the out-of-boundary point, and let the number of out-of-boundary points be r, where r is d(j, 1) (j=1,...,Num_T) is greater than the number of R.
步骤十六、j=j+1;其中j为测试点的计数量。Step sixteen, j=j+1; wherein j is the counted number of test points.
步骤十七、判断j是否小于Num_T;其中,Num_T是总的测试点个数;若是,则进入步骤七;若否,则进入步骤十八。Step 17. Determine whether j is smaller than Num_T; wherein, Num_T is the total number of test points; if yes, go to step 7; if not, go to step 18.
步骤十八、计算当前AP部署方式下用户的平均匿名度。Step eighteen, calculate the average anonymity degree of the user in the current AP deployment mode.
公式五 formula five
其中,Num_T为总的测试点个数。Among them, Num_T is the total number of test points.
步骤十九、计算当前AP部署方式下用户的平均无效度。由于出界点为定位误差大于R 的测试点,这些测试点虽然能获得较好的隐私度,但是其LBS服务质量也受到影响,因此我们用平均无效度来刻画LBS服务质量受到的影响,它定义为出界点个数的平均:Step nineteen, calculating the average invalidity degree of the users in the current AP deployment mode. Since the out-of-boundary points are test points with positioning errors greater than R, although these test points can obtain better privacy, their LBS service quality is also affected, so we use the average invalidity to describe the impact of LBS service quality, which defines is the average of the number of out-of-bounds points:
公式六 formula six
其中,r为出界点个数;Num_T为总的测试点个数。Among them, r is the number of out-of-boundary points; Num_T is the total number of test points.
步骤二十、根据公式七,计算目标函数值f:Step 20. Calculate the objective function value f according to Formula 7:
f=μ·Aver_AD+(1-μ)·Aver_ID 公式七f=μ·Aver_AD+(1-μ)·Aver_ID Formula 7
其中,f为扰动产生的新的AP部署方式下的目标函数值;μ为权重系数。Among them, f is the objective function value under the new AP deployment mode generated by the disturbance; μ is the weight coefficient.
步骤二十一、判断f是否大于E_current;若是,则进入步骤二十二;若否,则进入步骤二十五;其中,E_current用来存储优化搜索时,当前AP部署方式对应的目标函数值;Step 21. Determine whether f is greater than E_current; if so, go to step 22; if not, go to step 25; wherein, E_current is used to store the objective function value corresponding to the current AP deployment mode when optimizing the search;
步骤二十二、令slo_current=slo_new;E_current=f;其中slo_current用来存储优化搜索时的当前AP部署方式;slo_new用来存储优化搜索扰动产生的新的AP部署方式;E_current用来存储优化搜索时,当前AP部署方式对应的目标函数值。Step 22, set slo_current=slo_new; E_current=f; wherein slo_current is used to store the current AP deployment mode during the optimization search; slo_new is used to store the new AP deployment mode generated by the optimization search disturbance; E_current is used to store the optimal search time , the objective function value corresponding to the current AP deployment mode.
步骤二十三、判断f是否大于E_best;若是,则进入步骤二十四;若否,则进入步骤二十五;其中,E_best用来存储优化搜索时,最优AP部署方式对应的目标函数值。Step 23: Determine whether f is greater than E_best; if so, go to step 24; if not, go to step 25; wherein, E_best is used to store the objective function value corresponding to the optimal AP deployment mode during optimization search .
步骤二十四、令slo_best=slo_new;E_best=f;其中,slo_best用来存储优化搜索时的最优AP部署方式;slo_new用来存储优化搜索扰动产生的新的AP部署方式; E_best用来存储优化搜索时,最优AP部署方式对应的目标函数值;f为扰动产生的新的AP部署方式下的目标函数值。Step 24, set slo_best=slo_new; E_best=f; among them, slo_best is used to store the optimal AP deployment method during optimization search; slo_new is used to store the new AP deployment method generated by optimization search disturbance; E_best is used to store optimized When searching, the objective function value corresponding to the optimal AP deployment mode; f is the objective function value under the new AP deployment mode generated by the disturbance.
步骤二十五、i=i+1;其中,i为计数量。Step 25, i=i+1; wherein, i is the counting amount.
步骤二十六、判断i是否小于若是,则进入步骤三;若否,则进入步骤二十七;其中,Num_AP为总的AP个数;AP_candidate为AP的候选位置数;表示排列组合中从AP_candidate个位置中选择Num_AP个位置的组合方式数。Step 26. Determine whether i is less than If so, go to step 3; if not, go to step 27; wherein, Num_AP is the total number of APs; AP_candidate is the number of candidate positions for APs; Indicates the number of combinations for selecting Num_AP positions from AP_candidate positions in the permutation combination.
步骤二十七、输出最优AP部署方式slo_best。Step 27: Output the optimal AP deployment mode slo_best.
●扰动产生新AP部署方式的方法●The method of disturbing the new AP deployment method
本发明针对AP候选位置数不大的情况,使用穷举搜索算法来搜索最优的AP部署方式。本发明扰动产生新的AP部署方式的伪代码如下(以3个AP的情况为例):The present invention uses an exhaustive search algorithm to search for the optimal AP deployment mode when the number of AP candidate positions is not large. The pseudo code of the new AP deployment mode produced by the disturbance of the present invention is as follows (taking the situation of 3 APs as an example):
1、设定初始解1. Set the initial solution
slo_new=[123];其中,slo_new为用于存储新AP部署方式所对应的AP候选位置的标号;slo_new=[123]; wherein, slo_new is the label used to store the AP candidate position corresponding to the new AP deployment mode;
2、扰动产生新AP部署方式2. Disturbance generates a new AP deployment method
●KNN算法流程●KNN algorithm flow
1.设定参数k;1. Set parameter k;
2.计算用户RSS与数据库中各参考点RSS的距离(如欧几里德距离);2. Calculate the distance (such as Euclidean distance) between the user RSS and each reference point RSS in the database;
3.将距离按从小到大排列;3. Arrange the distances from small to large;
4.选择前k个距离所对应的参考点,并获取该k个参考点所对应的物理坐标;4. Select the reference points corresponding to the first k distances, and obtain the physical coordinates corresponding to the k reference points;
5.将k个参考点的物理坐标的几何平均作为位置估计点坐标。5. The geometric mean of the physical coordinates of the k reference points is used as the position estimation point coordinates.
如图3所示,本发明的真实环境为重庆邮电大学逸夫楼5楼过道,分为两个区域,区域1内共有参考点(标记为“·”)38个,区域2内共有参考点(标记为“·”)15个。图中,五角星符号表示坐标原点,区域1中邻近参考点的横、纵坐标间距分别为2m和1.2m,区域2中邻近参考点的横、纵坐标间距分别为1.2m和3m,10个AP候选位置分别标记为1-10。As shown in Figure 3, the real environment of the present invention is the aisle on the 5th floor of Shaw Building, Chongqing University of Posts and Telecommunications, which is divided into two areas. There are 38 reference points (marked as " ") in Area 1, and there are 38 reference points (marked as " ") in Area 2. Marked as "·") 15 pieces. In the figure, the five-pointed star symbol represents the origin of the coordinates. The horizontal and vertical coordinate distances of adjacent reference points in area 1 are 2m and 1.2m respectively, and the horizontal and vertical coordinate distances of adjacent reference points in area 2 are 1.2m and 3m respectively. There are 10 The AP candidate positions are labeled 1-10, respectively.
表一给出了在本发明真实实验环境下,10个不同AP候选位置的物理坐标及测试时放置在该候选位置处AP的MAC地址。Table 1 shows the physical coordinates of 10 different AP candidate positions and the MAC address of the AP placed at the candidate positions during the test under the real experimental environment of the present invention.
表二给出了当权重系数u=0.5或u=0.7且上报半径R=10m时,本发明方法、基于定位误差最小化方法和随机选择方法得到的最优AP候选位置、匿名度和无效度。Table 2 shows when the weight coefficient u=0.5 or u=0.7 and the reporting radius R=10m, the optimal AP candidate position, anonymity and invalidity obtained by the method of the present invention, the method based on the minimization of positioning error and the random selection method .
表三给出了当权重系数u=0.3且上报半径R=10m时,本发明方法、基于定位误差最小化方法和随机选择方法得到的最优AP候选位置、匿名度和无效度。Table 3 shows the optimal AP candidate positions, anonymity and invalidity obtained by the method of the present invention, the method based on positioning error minimization and the random selection method when the weight coefficient u=0.3 and the reporting radius R=10m.
表四给出了当权重系数u=0.5且上报半径R=5m时,本发明方法、基于定位误差最小化方法和随机选择方法得到的最优AP候选位置、匿名度和无效度。Table 4 shows the optimal AP candidate positions, anonymity and invalidity obtained by the method of the present invention, the method based on positioning error minimization and the random selection method when the weight coefficient u=0.5 and the reporting radius R=5m.
表一Table I
表二Table II
表三Table three
表四Table four
Claims (5)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510376686.9A CN104968004B (en) | 2015-07-01 | 2015-07-01 | Indoor WLAN fingerprint locations access point deployment method based on user location secret protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510376686.9A CN104968004B (en) | 2015-07-01 | 2015-07-01 | Indoor WLAN fingerprint locations access point deployment method based on user location secret protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104968004A CN104968004A (en) | 2015-10-07 |
CN104968004B true CN104968004B (en) | 2018-06-05 |
Family
ID=54221923
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510376686.9A Active CN104968004B (en) | 2015-07-01 | 2015-07-01 | Indoor WLAN fingerprint locations access point deployment method based on user location secret protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104968004B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114125702B (en) * | 2021-11-12 | 2024-03-01 | 东南大学 | Monte Carlo algorithm-based position information fingerprint protection method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102457805A (en) * | 2010-10-26 | 2012-05-16 | 中国移动通信集团辽宁有限公司 | User privacy protection method, device and system for location services |
CN104394509A (en) * | 2014-11-21 | 2015-03-04 | 西安交通大学 | High-efficiency difference disturbance location privacy protection system and method |
CN104618864A (en) * | 2015-01-26 | 2015-05-13 | 电子科技大学 | False location based privacy protection method in location service |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8594680B2 (en) * | 2011-02-16 | 2013-11-26 | Nokia Corporation | Methods, apparatuses and computer program products for providing a private and efficient geolocation system |
-
2015
- 2015-07-01 CN CN201510376686.9A patent/CN104968004B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102457805A (en) * | 2010-10-26 | 2012-05-16 | 中国移动通信集团辽宁有限公司 | User privacy protection method, device and system for location services |
CN104394509A (en) * | 2014-11-21 | 2015-03-04 | 西安交通大学 | High-efficiency difference disturbance location privacy protection system and method |
CN104618864A (en) * | 2015-01-26 | 2015-05-13 | 电子科技大学 | False location based privacy protection method in location service |
Also Published As
Publication number | Publication date |
---|---|
CN104968004A (en) | 2015-10-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kushki et al. | WLAN positioning systems: principles and applications in location-based services | |
Zandbergen | Accuracy of iPhone locations: A comparison of assisted GPS, WiFi and cellular positioning | |
US8237612B2 (en) | Inferring beacon positions based on spatial relationships | |
CN103957505B (en) | A system and method for behavior track detection analysis and service provision based on AP | |
Xiong et al. | Towards fine-grained radio-based indoor location | |
Fang et al. | Dynamic fingerprinting combination for improved mobile localization | |
CN103618997B (en) | Indoor positioning method and device based on signal intensity probability | |
CN111954874B (en) | Identify functional areas within a geographic area | |
CN103702414B (en) | Locating method, mobile equipment and base station | |
US20130205196A1 (en) | Location-based mobile application marketplace system | |
Kim et al. | Indoor positioning system techniques and security | |
CN104144493A (en) | Positioning method, positioning system and a base station positioning platform | |
CN100407852C (en) | A method for locating mobile terminal in mobile communication | |
CN102325369A (en) | Indoor single-source linear WKNN positioning method for WLAN based on reference point location optimization | |
Zhao et al. | An RSSI gradient-based AP localization algorithm | |
CN102186238A (en) | Positioning method and device based on electronic map | |
CN109068272A (en) | Similar users recognition methods, device, equipment and readable storage medium storing program for executing | |
CN102573053A (en) | System and method for realizing hybrid positioning on cloud server | |
Li et al. | Location estimation in large indoor multi-floor buildings using hybrid networks | |
CN108243495A (en) | A kind of location fingerprint database building method, device and method of locating terminal | |
Xi et al. | Locating sensors in the wild: pursuit of ranging quality | |
CN105044659B (en) | Indoor positioning device and method based on ambient light spectrum fingerprint | |
Zou et al. | WinIPS: WiFi-based non-intrusive IPS for online radio map construction | |
CN104968004B (en) | Indoor WLAN fingerprint locations access point deployment method based on user location secret protection | |
CN104683953A (en) | Indoor WLAN positioning networking method based on SimRank similar combination neighborhood graph |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |