A Review of Wireless Positioning From Past and Current to Emerging Technologies

Author(s):  
Joar Blom Rydell ◽  
Oliver Otterlind ◽  
Amanda Sjöö

Many techniques for wireless positioning have existed for years, but with emerging technologies like 5G and ultra wideband, wireless positioning is becoming more accurate than ever. On the one hand, improved accuracy implies increased usefulness. It will open up new application areas and lead to advances in areas like internet of things (IoT), self-driving cars, and contact tracing. Furthermore, decision support systems can benefit from better positioning techniques. On the other hand, the ability to track connected devices with sub-meter precision brings some privacy and security concerns. This chapter aims to review indoor and outdoor positioning technologies and how they can be used for contact tracing. It then further discusses some of the data management, privacy, and security concerns that follow. To that end, this chapter studies the main techniques for wireless positioning, cellular-based positioning using 5G, and their use to contact tracing. Finally, the authors provide some insight into how 5G and UWB might help the area of positioning and contact tracking in the future.

2021 ◽  
Vol 13 (5) ◽  
pp. 105
Author(s):  
Mohamed Yousif ◽  
Chaminda Hewage ◽  
Liqaa Nawaf

The COVID-19 pandemic provided a much-needed sanity check for IoT-inspired frameworks and solutions. IoT solutions such as remote health monitoring and contact tracing provided support for authorities to successfully manage the spread of the coronavirus. This article provides the first comprehensive review of key IoT solutions that have had an impact on COVID-19 in healthcare, contact tracing, and transportation during the pandemic. Each sector is investigated in depth; and potential applications, social and economic impact, and barriers for mass adaptation are discussed in detail. Furthermore, it elaborates on the challenges and opportunities for IoT framework solutions in the immediate post-COVID-19 era. To this end, privacy and security concerns of IoT applications are analyzed in depth and emerging standards and code of practices for mass adaptation are also discussed. The main contribution of this review paper is the in-depth analysis and categorization of sector-wise IoT technologies, which have the potential to be prominent applications in the new normal. IoT applications in each selected sector are rated for their potential economic and social impact, timeline for mass adaptation, and Technology Readiness Level (TRL). In addition, this article outlines potential research directions for next-generation IoT applications that would facilitate improved performance with preserved privacy and security, as well as wider adaptation by the population at large.


2014 ◽  
Vol 28 (3) ◽  
pp. 261-276 ◽  
Author(s):  
Jawahitha Sarabdeen ◽  
Gwendolyn Rodrigues ◽  
Sreejith Balasubramanian

2021 ◽  
Author(s):  
Paul M. Garrett ◽  
Yuwen Wang ◽  
Joshua P. White ◽  
Yoshihisa Kashima ◽  
Simon Dennis ◽  
...  

BACKGROUND Governments worldwide have introduced COVID-19 tracing technologies. Taiwan, a world leader in controlling the virus’ spread, has introduced the Taiwan ‘Social Distancing App’ to facilitate COVID-19 contact tracing. However, for these technologies to be effective, they must be accepted and used by the public. OBJECTIVE Our study aimed to determine public acceptance for three hypothetical tracing technologies: a centralized Government App, a decentralized Bluetooth App (e.g., Taiwan’s Social Distancing App), and a Telecommunication tracing technology; and model what factors contributed to their acceptance. METHODS Four nationally representative surveys were conducted in April 2020 sampling 6,000 Taiwanese residents. Perceptions and impacts of COVID-19, government effectiveness, worldviews, and attitudes towards and acceptance of one-of-three hypothetical tracing technologies were assessed. RESULTS Technology acceptance was high across all hypothetical technologies (67% - 73%) and improved with additional privacy measures (82% - 88%). Bayesian modelling (using 95% highest density credible intervals) showed data sensitivity and perceived poor COVID-19 policy compliance inhibited technology acceptance. By contrast, technology benefits (e.g., returning to activities, reducing virus spread, lowering the likelihood of infection), higher education, and perceived technology privacy, security, and trust, were all contributing factors to overall acceptance. Bayesian ordinal probit models revealed higher COVID-19 concern for other people than for one’s self. CONCLUSIONS Taiwan is currently using a range of technologies to minimize the spread of COVID-19 as the country returns to normal economic and social activities. We observed high acceptance for COVID-19 tracing technologies among the Taiwanese public, a promising and necessary finding for the successful introduction of Taiwan’s new ‘Social Distancing App’. Policy makers may capitalize on this acceptance by focusing attention towards the App’s benefits, privacy and security measures, making the App’s privacy measures transparent to the public, and emphasizing App uptake and compliance among the public. CLINICALTRIAL Not applicable.


2015 ◽  
Vol 46 (4) ◽  
pp. 326-344 ◽  
Author(s):  
Govert Valkenburg ◽  
Irma van der Ploeg

What concepts such as ‘security’ and ‘privacy’ mean in practice is not merely a matter of policy choices or value concepts, but is inherently tied up with the socio-material and technological arrangement of the practices in which they come to matter. In this article, one trajectory in the implementation of a security regime into the sociotechnical arrangement of airport security checking is reconstructed. During this trajectory, gradual modifications or ‘translations’ are performed on what are initially defined as the privacy and security problems. The notion of translation is used to capture the modifications that concepts undergo between different stages of the process: the initial security problem shifts, transforms and comes to be aligned with several other interests and values. We articulate how such translations take place in the material realm, where seemingly technical and natural-scientific givens take part in the negotiations. On the one hand, these negotiations may produce technologies that perform social inequalities. On the other hand, it is in this material realm that translations of problem definitions appear as simply technical issues, exempted from democratic governance. The forms of privacy and security that emerge in the end are thus specific versions with specific social effects, which do not follow in an obvious way from the generic, initial concepts. By focusing on problem definitions and their translations at various stages of the development, we explain how it is possible for potentially stigmatizing and privacy-encroaching effects to occur, even though the security technologies were introduced exactly to preclude those effects.


2019 ◽  
Vol 8 (2S11) ◽  
pp. 3801-3808

‘Privacy, privacy everywhere but not a safety method to implement it’: a harsh reality of today’s world. With the precipitation of more data (2 x 1019 bits of data is created in every 86400 seconds) in computer networks, involvement of meta-data in the form of images is essential. To keep data safe and secure in order to inculcate privacy, to eradicate any kind of eavesdropping, and to maintain confidentiality, integrity and availability of it, certain security measures are needed to make in account for. So in order to make it available, we required a technique through which we can securely transfer any kind of data over a network. In practise the information security can be achieved either by using Cryptography or Steganography. The process described in this paper is not a mediocre it is more scrupulous towards the security because it involves image encryption, steganography and image stitching. Initially we are encrypting an image using Blowfish algorithm then we are embedding the secret text into this encrypted image by modifying the least significant bit (LSB) of the image by our data. Moreover, to enhance the privacy and security we are stitching the above resultant image with the red, green and blue (RGB) components of a host image and thereby producing an image more secure than the one which the existing systems can form for data transmission..


2022 ◽  
pp. 164-183
Author(s):  
George Leal Jamil

In this chapter, the author aim to approach new ways to understand how emerging technologies can better be applied in organizational contexts. For this purpose, collaborative methodological approaches were addressed—multi, inter, and transdisciplinary paradigms—aiming to promote a better level both of comprehension and adoption of technologies, paying special attention to the healthcare sector and to the One Health initiative, just defined as an interdisciplinary front. As an overall goal for the chapter, the adoption of those methodological principles is advised to the reader, enabling a better understanding of those technologies and their way to be effectively implemented.


Sign in / Sign up

Export Citation Format

Share Document