PAPER ONE MODEL OF GEO-LOCATION SERVICES FOR TELECOM OPERATORS One Model of Geo-Location Services for Telecom Operators http://dx.doi.org/10.3991/ijim.v10i2.5189 Yousef Ibrahim Daradkeh1, Mujahed Aldhaifallah1 and Dmitry Namiot2 1 Prince Sattam bin Abdulaziz University at Wadi Aldawaser, KSA 2 Lomonosov Moscow State University, Moscow, Russia Abstract—This paper discusses location-based service for telecom providers. Most of the location-based services in the mobile networks are introduced and deployed by Internet companies. It leaves for telecom just the role of the data channel. Telecom providers should use their competitive advantages and offer own solutions. In our article, we dis- cuss the sharing location information via geo messages. Geo messages let mobile users share location information as signatures to the standard messages (e.g., email, SMS). Rather than let some service constantly monitor (poll) the user’s location (as the most standalone services do) or share location info within any social circle (social network check- in, etc.) The Geo Messages approach lets users share loca- tion data on the peer to peer basis. Users can share own location info with any existing messaging systems. And messaging (e.g., SMS) is the traditional service for telecom. Index Terms—geocoding, LBS, location, messaging, telecom, OMA SUPL I. INTRODUCTION It is obvious, that the question “where are you” is one of the most often asked during the communications. 600 billion text messages per year in the US ask "where are you?" – as per Location Business Summit 2010 data. A vast amount of mobile services is actually being built around this question so their main feature is a user’s loca- tion exchange [1]. In the most cases, the location ex- change presents the ability to the mobile user (mobile phone owner) to save own location information in the some special place (e.g., special data store, supported via some mobile application). So, the second party in this exchange process will be able to read saved data. But it means, of course, that a user must be registered with this service and (in the most cases) download a priori some special application. What is even more important here – both parties in the location exchange process must use the same service too. In practice, this leads to a parallel coex- istence a set of conceptually similar services. There are several models for location information shar- ing in the mobile services. On the first hand, it is passive location monitoring. The typical example is Google Lati- tude [2]. The word “passive” here describes the system from the end-user’s point of view. Passive location shar- ing model does not require specific actions from mobile users. Accumulated data become available some API. The privacy is probably the biggest issue with this approach. All potential users should be aware that some third party tool is constantly monitoring their location and saves it on the some external server. And, of course, the shortened life of the handset’s battery is the second biggest issue with this approach. Note that in many cases this is not necessarily associat- ed with the installation the special application. Such moni- toring can be done and the service provider (mobile opera- tor, etc.). But because we are talking about data exchange, there is a big question: how to use such automatically collected data in third party services? Actually, we suggest a possible model for this use case below. Another model is a voluntary location sharing. The typ- ical example is check-in [3]. Check-in is a special type for the record (status) in some social network. It could be an active (e.g. Facebook, Swarm), when the user directly sets his/her current location or passive (e.g., Twitter), when location information could be added as an additional at- tribute to the current status. Of course, for sharing location information, both parties must be registered in the same network. And here we can see “all or nothing” problem with location sharing. Shared location info could be visi- ble to all friends, but in the real cases for most of them, it is just a noise. The location info could be actually interest- ed only for the physical friends. E.g., for the majority of twitter followers my location info (Foursquare status in Twitter timeline), is just a noise. The idea of the signed geo messages service (geo mail, geo SMS) is based on the ability to add user’s location info to the standard messages like SMS or email [1]. So, as the answer for the above-mentioned question ‘Where are you?’, someone may just send a message. And the target party does not need to use any additional service in order to get information about the sender’s location. He will simply read SMS or email. Speaking more broadly, this service separates location information and identity information. The message itself contains the identity. And location sharing data contain the location information only. Only the combination of both elements lets us associate location data with identity. Obviously, it is peer to peer sharing and it does not re- quire any social network. For example, the geo signature may have a form of the map with the marker at the shared location. And what is important here – the map itself has no information about the sender and recipient. That infor- mation exists only in the message itself. The map (marker) has no information about the creator for example. That is all about the privacy. This model is probably the easiest way for sharing loca- tion information. It does not require any application down- loading or registration in social networks from the poten- tial users. This approach provides a smooth extension for the existing communication services. iJIM ‒ Volume 10, Issue 2, 2016 19 PAPER ONE MODEL OF GEO-LOCATION SERVICES FOR TELECOM OPERATORS There are several services that implement Geo Messag- es approach. Originally, Geo Message approach has been described by Dmitry Namiot [1]. And this paper summa- rizes the latest development, as well as discusses the pos- sible extensions. II. PROBLEM FORMATION The main idea behind Geo Messages is how to deliver location info via the standard messaging (SMS and Email). This approach borrowed the ideas from SMS- based content delivery. Typically, when the mobile users request some service via SMS, they will get as the re- sponse some link within the text message. This link leads to the downloading service for pictures, ringtones, etc. And this approach uses the simple fact that all native SMS clients nowadays are smart enough to discover links (just http://something_is_here text chunks) within the text and allow one-click Internet access for opening that link. So, for delivering location information, we can use the same approach. The location info could be presented as a link, leads to the appropriate map. So, as soon as the sender will be able to automatically add such a link to the message, the re- ceiver will be able with just one click open the map with the sender’s location. By default, this map will show two POI (point of interests) - the sender’s location and the receiver’s location. Alternatively, we can provide a link to some specially created landing page, probably with a map or any other location related info. Our original development targeted feature phones and was implemented as an application for SIM-cards (Java- card applet). It includes the following steps: 1. The location info could be requested right from the SIM-card (smart card) as Cell ID info. This information exists always and Java-card applet can read it (local info). 2. Cell ID information could be translated into “hu- man”-readable form of (latitude, longitude) pair. There are several public services over the Net that let us do that. The typical example is OpenCellID [4]. Actually, it is just a public HTTP based API. 3. Using the data obtained in step 2, we can create a link to the map. Original development used Google Static Map. The Google Static Maps API lets applications em- bed a Google Maps image on your webpage without re- quiring JavaScript or any dynamic page loading. In our case, Google Static Maps API lets us build a map (actually – an image with a) based on the latitude – longitude pair obtained through the step 2. For the smartphones, we can create the similar link with Google Maps API (there are no more JavaScript’s limitations). 4. URL shortening service could be deployed. In order to make sure our geo-related URL’s complies with SMS restrictions (simply – they are no more than 140 symbols), we can deploy URL shortening service and make our signature smaller. It is very important also, that the URL shortening service lets obtain statistics for the deployed URLs. In case of mobile messaging with geo-coding, it leads to the context-aware statistics (when and where some link has been opened) 5. In order to add our location aware URL to the mes- sage (to SMS or to email), we will deploy URI Scheme for GSM Short Message Service and the mailto URL scheme [1]. So, our final step included dynamical genera- tion of the mobile web page with links for messaging: sms:?body=our_geo_aware_URL and mailto:?body=our_geo_aware_URL As soon as the mobile user will hit one of the links, the native (it is very important!) messaging client (e.g., the native SMS client) will be launched with the text (body) field being pre-populated with the given URL. So, it is enough just to select the target phone (address) from the address book, add some text (optionally, of course) and send the message. After all, this service presented a mo- bile mashup (mobile web mashup) that passes user through the series of screens where the last one offers for the user customized messages sending links. And the whole process is a) completely automated b) does not require any authorization in external ser- vices c) completely portable and will work on any mobile phone For HTML5 applications, we can use its geo- capabilities [6]. The modified web client is illustrated in Figure 1. The link in the signature may include a map with some pin, map’s snapshot (static picture with map’s snapshot), a special landing page or just a text with geo-coordinates. The text is useful for putting data into navigation devices. The landing page is, obviously, a direct way for telecom operator to monetize this location service. The landing page could be generated automatically and present some mini-portal for geo-point in question. It may include a map, some text information, and advertising. Figure 2 illustrates the delivered map. Obviously, it is a user-friendly sharing (the location is visible as a part of the message). But by the same princi- ples, we can deliver location information in the header of the message. We will explain how this feature could be implemented. Figure 1. Geo Mail client 20 http://www.i-jim.org PAPER ONE MODEL OF GEO-LOCATION SERVICES FOR TELECOM OPERATORS Figure 2. The delivered map And the key question is how to get location information for this modified messaging client. Originally [1][5], we present our solutions in the web-mashup style. It is appli- cation level approach. Below we will try to show that this solution could be an ideal application for telecom opera- tors. This model lets operators replace Over-The-Top messages (OTT) with the classical telecom services and avoid the perspective to be a dump pipe for Internet com- panies. It is the main idea, presented in this paper – deploy geo-messaging on the operator’s level. III. GEO MESSAGING FOR TELECOM The main idea behind geo-messages is actually very simple. Shortly, geo message means pre-filled (pre- populated) messaging client. The key question is how to obtain data for this initial filling? And here we see the important role of OMA SUPL [6]. SUPL defines a way, the mobile device can obtain location information via the own mobile network. In GSM networks, we can mention two different types of protocols and localization measurements: Control Plane (C-plane) and User Plane (U-plane). The main difference is in the underlying networks. C-Plane protocols work in the signaling layer. So, they do not depend on end-user devices (mobile terminals). C- Plane protocols do not require a special support from the end-user’s device point of view (e.g., there is no need for TCP/IP support). This protocol does not touch the applica- tion layer. By this reason, this approach is actually very fast. A disadvantage of C-Plane localization is the need for network-specific upgrades on the provider’s site. Also, a provider needs to reserve dedicated channels and frequen- cies for positioning, depending on the measurement used for locating a handset [7]. The main usage (deployment) for C-Plane protocols is, for example, the E-911. It is obvious, because not every mobile terminal supports TCP/IP but it still needs the localization. Vice versa, U-Plane protocols work in the application layer. They are independent of the underlying network type and use TCP/IP for positioning determination. For example, they will work in Wi-Fi networks too. SUPL (Secure User Plane Location) is U-Plane protocol. SUPL works is Wi-Fi and GSM networks. As per its definition, SUPL is so-called ”Enabler”, which uses standards and protocols ”where available and possible” [8] to determine the position of a mobile device. SUPL was developed by the OMA (Open Mobile Alliance) to support the creation of interoperable end-to-end mobile services to standardize the communication between the SUPL network and a client device. So, originally, it was suggested as a portable solution for application development. SUPL network here is operator’s network (e.g., GSM mobile network). The client device is some mobile terminal (mobile phone). It works in the U-plane. SUPL support various positioning methods: Assisted GPS, Autonomous GPS, E-OTD, En- hanced Cell/Sector ID [9]. There are two modes for using SUPL depends on the initiator. The location request could be initiated either by the mobile terminal (SET in SUPL’s terminology), or by the network itself. In the latest version SUPL introduces triggered posi- tioning procedures. In other words, it is possible to set actions when a mobile terminal entered an area or send periodic signals of the SUPL enabled device’s location. It is illustrated in Figure 3. There are four different ways for creating (initializing) SUPL session: OMA Push, SMS, UDP/IP, SIP Push. Actually, developers can choose any of the above-listed approaches depending on the mobile terminal capabilities and network’s circumstances. For our tasks, we are inter- ested in UDP/IP sessions. Figure 3. SUPL triggers [8] To create a terminal-initiated session, a mobile terminal (an application) initializes a TCP/IP connection to Secure Location Platform (SLP). To create a network-initiated SUPL session to a mobile the SLP can send a push mes- sage to the device with the IP address of the SLP. The mobile device then has to initialize a TCP/IP connection to the SLP with the provided IP address. The sequence diagram for the terminal-initiated sessions is presented in Figure 4. iJIM ‒ Volume 10, Issue 2, 2016 21 PAPER ONE MODEL OF GEO-LOCATION SERVICES FOR TELECOM OPERATORS Figure 4. SUPL UDP/IP session [10] As seems to us, SUPL being initially oriented to mobile developers is actually a first class instrument for telecom operators. They should use it with the redesigned messag- ing client. SUPL network is under full operator’s control. So, it looks pretty logical to add an own client for this network. This client is just an extension of the existing SMS client, for example. This geo-SMS client will open pre-filled SMS messenger. And default text could be the above-mentioned geo-signature exactly. This client will initiate SUPL session, obtain geo-coordinates, convert then into one of the above-mentioned forms. Note, that this new client could easily use a bit more optimized strategy than simply initiate a new session with SLP during the each call. We can use the accelerometer for detecting device movement and use previously re- quested data as soon as the device is not moved (or does not move significantly). It is a pretty standard task for smartphones – implement some form of inertial navigation system [11]. And accelerometer here is a good fit due to its low energy consumption [12]. The above-mentioned paper [5] extends a generic one to one relation in geo messages with a one-to-many mod- el. Any user can simultaneously support several peer-to- peer location sharing flows. Obviously, the basic princi- ples are the same and this model could benefit from SUPL too. In the description above, we’ve followed to the original development of geo-messages. It was a human readable link in the text message. But we can send geo-location in the header for the email too. It could be processed pro- grammatically. This approach could be useful for some automated tasks. For example, an automated email could be used as a replacement for HTTP post with data, etc. There is a standard way of adding new headers for email and HTTP requests. It is so-called "X-" convention [13]. We can follow to GeoRSS concept [14] and directly place a pair of (latitude, longitude) as a new custom header. E.g.: X-GEO: latitude longitude Alternatively, for setting a special header we can follow to the concepts of geo hash [15] and geo-cookies [16]. The Geo-hash is a simple method for geo-coding a pair of latitude/longitude coordinates into a shorter hash. This encoding is achieved by recursively dividing the latitude and longitude into two intervals. In the first step intervals are -900 - 00 and 00 - 900. The lover interval corresponds to the binary 0 and the upper interval corresponds to bina- ry 1. In the second step the each interval should be divided again. E.g., it could be 00 to 450 and 450 to 900, and so on. The two resulting bit sequences are then alternately interleaved. The result could be encoded and presented as a string. Two hashes with the same prefix present the same region. So, we can directly use geo-hash for proxim- ity estimation. Also, this approach lets easily change the precision for geo-coding. It could be used in the traditional privacy-related settings for location based systems [17]. E.g., it could be an area-wide geo-coding, city-wide geo- coining, street level, etc. So, depends on the privacy (secu- rity) settings, the users may see the same shared location with the different precision [18]. It is so-called location obfuscation [19]. By our opinion, the modified messaging client will be able to replace OTT messengers [20]. We can propose a more interesting model with dynamic messages. In this case, our message will have SET identi- fication instead of the static location. The idea allows for messaging client (e.g., SMS client) to request the current location any time the message is opened. Think, for ex- ample, about this use case. User A is going to meet user B. User A sets an initial messaging about his intention to come. This message (e.g., SMS) contains SET ID for user A. User B opens the message and can see the current loca- tion for user A. So, we can display on the map the current locations for both users A and B, estimate the distance, estimate the time for approaching, etc. And it is not an application. Vice versa, it is a “standard” messaging cli- ent. OMA introduced support for indoor navigation in its recent Enablers Secure User Plane Location (SUPL 3.0) and LTE Positioning Protocol Extensions (LPPe 1.0) [21]. The goals of SUPL 3.0 and LPPe 1.0 are to improve the user experience through better service and new features, specifically including, improved Indoor Location Accura- cy. As an example for the special requirements arising from indoor location issues, we can mention the support for floor level information as well as the use of relative instead of global coordinates. SUPL 3.0 describes the following blocks for indoor navigation support: 1) Decentralized Location Server (D-SLP: Discovered SUPL Location Platform) for Assistance Data Delivery and Position Calculation. 2) Positioning Protocol supports indoor navigation as- sistance data (map information, etc.). D-SLP is an additional element of H-SLP (Home SUPL Location Platform). The idea is to introduce a special server for Indoor Positioning support. So, SET (mobile terminal) may choose a special source for indoor data. Also, it lets vendors add own D-SLP services for own venues. The common schema for access follows the fol- lowing algorithm: 1) The SET discovers a local SLP (D-SLP) which is able to provide Indoor Positioning service within a de- fined service area (e.g., within a shopping mall). 2) The SET requests authorization for accessing the D- SLP from its home server (H-SLP). 3) The H-SLP authorizes access within a defined ser- vice area, access network, and time window. 4) While the SET is within the service area, time win- dow and the authorized access network of the D-SLP, it may access the D-SLP and obtain Indoor Positioning Services. 22 http://www.i-jim.org PAPER ONE MODEL OF GEO-LOCATION SERVICES FOR TELECOM OPERATORS For our explanation, it is important that for the indoor environment, both parties in the message exchange will be covered by the same local SLP. It means, we can continue to share location info (indoor location info in this case) with the messaging. Another important step is the possible replacement for a so-called server-side push with SMS for indoor proximity notifications. Server-side push (or cloud messages) is a service from mobile OS vendors for sending notifications to mobile users. For example, Google Cloud Messaging for Android (GCM) is a service that allows developers to send data the own server to users' Android-powered device. This could be a lightweight message telling your app there is new data to be fetched from the server (for instance, a movie uploaded by a friend), or it could be a message containing up to 4kb of payload data (so apps like instant messaging can consume the message directly) [22]. The GCM service handles all aspects of queuing of messages and delivery to the target Android application running on the target device. GCM is completely free no matter how big your messaging needs are, and there are no quotas. But of course, it is free from the vendor’s point of view. For telecom, this OTT message has got some cost, of course. There are conceptually similar services from other ven- dors (e.g., Apple, Microsoft, Nokia). Architectures of these push noti!cation services have common features. On the first hand, application servers send a noti!cation mes- sage with an intended receiver (or the target mobile de- vice) to one of the cloud-based messaging servers. Mes- saging servers push the message to the target mobile de- vice. The push noti!cation service eliminates the needs of application servers to keep track of the state of a mobile device (i.e., online or of"ine). Furthermore, mobile devic- es do not need to periodically probe (poll) the application servers for messages. It reduces the workloads of the ap- plication servers and seriously accelerates the mobile application development. Conceptually, any such service replaces telecom notifications (e.g., SMS). For Bluetooth tag, the distance estimation could be based on RSSI measurements. On practice, it is the ratio of the tag’s signal strength (RSSI) over the calibrated transmitter power. The calibrated transmitter power here is the known measured signal strength in RSSI at 1 meter away. So, each Bluetooth tag (e.g., iBeacon in a case of iOS) must be calibrated with this power at a distance of 1 meter. This calibration lets us estimate the distance. Let's suppose that this calibrated value is R1. The listen- ing device will measure the RSSI of the device. Let's suppose it is R2. Since these numbers are in dBm, the ratio of the power is actually the difference in dB. So: dBm_ratio = R1-R2 (1) To convert that into a linear ratio, we use the standard formula: LinearRatio = 10^(dBm_ratio / 10) (2) If we take into account the conservation of energy, then the signal strength must fall off as 1/r2 (r here is a dis- tance). So: R = R1 / r 2 (3) r = oLinearRati (4) For indoor location based services push notifications are very often used as a core mechanism for proximity- based information delivery. For example, Bluetooth Low Energy tags from Apple (iBeacons) could be used by mobile applications for proximity detection (Figure 5). As soon as proximity is detected, the service will send a push notification to the mobile user (actually – to some application installed on the user’s device). As we wrote above, it is a vendor-based notification (yet another OTT service). With D-SUPL, we can use it as a proximity sen- sor and send notifications (e.g., SMS rather than OTT messages) to all mobile users covered currently by the current D-SUPL. And any such message could have loca- tion related data as a signature again. It is yet another example where the telecom operator can replace OTT messages with own stuff (SMS in this case). For OTT messages subject of subscription is some mobile applica- tion (in other words, mobile users should previously in- stall an application), for SMS messages subject of sub- scription is the mobile device itself. We do not need an application. And having location information in the signa- ture lets us provide a consistent experience for our users – there is a constant place for location data for both outdoor and indoor applications. We should mention in this con- text also other proposed standards for location measure- ments. One notable example is GEOPRIV [24]. RFC 3963 describes the basic architecture for GEOPRIV. But at this moment, GEOPRIV describes in RFC3693 only a top- level concept of what is required for a secure transfer of geographical localization data within a network. It does however not define any protocols or data formats on the implementation level. So, we think that OMA SUPL is the most developed standard at this moment and the most suitable for the telecom operators. Figure 5. RSSI-based distance iJIM ‒ Volume 10, Issue 2, 2016 23 PAPER ONE MODEL OF GEO-LOCATION SERVICES FOR TELECOM OPERATORS IV. CONCLUSION Originally, OMA Secure User Plane model was pro- posed for application development. In this paper, we ex- plain SUPL usage for telecom operators. By our sugges- tion, this model could be used as the main tool for telecom operators with the idea to redesign messaging clients. Adding the geo-location sharing to messaging could be easily adopted by mobile users and can present a winning application for telecom providers. Our experiments with Geo Messages model (it is a pro- totype for the suggested approach) show very positive results. It is a practical way to increase messages traffic for telecom operators. The future work can include, for example, the modified SMPP server. It will automatically add geo-signature to outgoing messages. An early version of this proposal has been posted in our pre-print [25]. REFERENCES [1] D. Namiot, “Geo Messages,” in Ultra Modern Telecommunica- tions and Control Systems and Workshops (ICUMT), Moscow, pp. 14-19, 2010. Available: http://dx.doi.org/10.1109/ICUMT. 2010.5676665 [2] N. Li, G. Chen, “Analysis of a location-based social network,” in Computational Science and Engineering, Vancouver, pp. 263- 270., 2009. Available: http://dx.doi.org/10.1109/CSE.2009.98 [3] D. Namiot, M. Sneps-Sneppe, “Customized check-in procedures,” Smart Spaces and Next Generation Wired/Wireless Networking, Lecture Notes in Computer Science, vol. 6869, pp. 160-164, 2011. Available: http://dx.doi.org/10.1007/978-3-642-22875-9_14 [4] G. Yang, “Discovering Significant Places from Mobile Phones–A Mass Market Solution,” Mobile Entity Localization and Tracking in GPS-less Environnments, Lecture Notes in Computer Science, vol. 5801, pp. 34-49, 2009. Available: http://dx.doi.org/10.1007/ 978-3-642-04385-7_3 [5] D. Namiot, M. Sneps-Sneppe, "Where Are They Now–Safe Loca- tion Sharing," Internet of Things, Smart Spaces, and Next Genera- tion Networking., Lecture Notes in Computer Science, vol. 7469, pp. 63-74, 2012. Available: http://dx.doi.org/10.1007/978-3-642- 32686-8_6 [6] S. Cherian, A. Rudrapatna, “LTE Location Technologies and Delivery Solutions,” Bell Labs Technical Journal, vol. 18, no. 2, pp. 175-194, 2013. Available: http://dx.doi.org/10.1002/bltj.21612 [7] B. Wang, J. Min, “Location based services for mobiles: Technolo- gies and standards,” in IEEE International Conference on Com- munication, Beijing, pp. 35-38, 2008. [8] J. Willaredt, “Wifi and cell-id based positioning - protocols, standards and solutions,” TU Berlin, pp. 1-10, 2011. [9] Y. Zhao, “Standardization of mobile phone positioning for 3G systems,” Communications Magazine, vol. 40, no. 7, pp. 108-116, 2002. Available: http://dx.doi.org/10.1109/MCOM.2002.1018015 [10] T. Goze, O. Bayrak, M. Barut, M. Sunay, “Secure user-plane location (supl) architecture for assisted gps (a-gps),” in Advanced Satellite Mobile Systems, pp. 229-234, 2008. Available: http://dx.doi.org/10.1109/ASMS.2008.46 [11] M. Alzantot, M. Youssef, “UPTIME: Ubiquitous pedestrian tracking using mobile phones,” in Wireless Communications and Networking Conference, Shanghai, pp. 3204-3209, 2012. Availa- ble: http://dx.doi.org/10.1109/WCNC.2012.6214359 [12] D. Namiot, M. Sneps-Sneppe, “On Open Source Mobile Sensing,” in Internet of Things, Smart Spaces, and Next Generation Net- works and Systems, Lecture Notes in Computer Science, vol. 8638, pp. 82-94, 2014. Available: http://dx.doi.org/10.1007/978-3- 319-10353-2_8 [13] J. Paglierani, M. Mabey, G. Ahn, “Towards comprehensive and collaborative forensics on email evidence,” in Collaborative Com- puting: Networking, Applications and Worksharing (Collaborate- com), Austin, pp. 11-20, 2013. [14] R. Power, B. Robinson, C. Wise, “Comparing web feeds and tweets for emergency management,” in Proceedings of the 22nd international conference on World Wide Web companion, Rio de Janeiro, pp. 1007-1010, 2013. [15] K. Ali, D. Al-Yaseen, A. Ejaz, T. Javed, H. Hassanein, “Crowdits: Crowdsourcing in intelligent transportation systems,” in Wireless Communications and Networking Conference, Shanghai, pp. 3307-3311, 2012. Available: http://dx.doi.org/10.1109/WCNC. 2012.6214379 [16] P. Ruppel, A. Kupper, “Geocookie: a space-efficient representa- tion of geographic location sets,” TU Berlin, pp. 1-6, 2014. [17] P. Wightman, W. Coronell, D. Jabba, M. Jimeno, M. Labrador, “Evaluation of location obfuscation techniques for privacy in loca- tion based information systems,” in Communications (LATINCOM), Belem do Para, pp. 1-6, 2011. Available: http://dx.doi.org/10.1109/LatinCOM.2011.6107399 [18] D.Namiot, M.Sneps-Sneppe, “Wireless Networks Sensors and Social Streams,” in Advanced Information Networking and Appli- cations Workshops (WAINA), Barselona, pp. 413-418, 2013. Available: http://dx.doi.org/10.1109/WAINA.2013.27 [19] M.Duckham, L.Kulik,”A formal model of obfuscation and negoti- ation for location privacy,” Pervasive computing, pp.152-170, 2005. Available: http://dx.doi.org/10.1007/11428572_10 [20] K. O'Hara, M. Massimi, R. Harper, S. Rubens, J. Morris, “Every- day dwelling with WhatsApp,” in Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, Baltimore, pp. 1131-1143, 2014. Available: http://doi.acm.org/10.1145/2531602.2531679 [21] OMA Work Program http://openmobilealliance.org/static/oma- annual-reports/pages/oma_2013_AR_wp_location.html Retrieved: Oct, 2014 [22] Namiot, D. (2013). GeoFence services. International Journal of Open Information Technologies, 1(9), 30-33. [23] iBeacon experiments (2014) http://blog.nerdery.com/2013/11/ nerdery-labs-ibeacon-experiments/ Received: Jun, 2014. [24] Rentschler, Markus, and Philip Henzler. "Towards Location Management for future Industrial Networks." [25] Namiot, Dmitry, and Manfred Sneps-Sneppe. "On Geo Location Services for Telecom Operators." arXiv preprint arXiv:1505.01111 (2015) AUTHORS Yousef Ibrahim Daradkeh is with the College of En- gineering, Prince Sattam bin Abdulaziz University at Wadi Aldawaser, 18611, KSA (daradkehy@yahoo.ca). Mujahed Aldhaifallah is with the College of Engi- neering, Prince Sattam bin Abdulaziz University at Wadi Aldawaser, 18611, KSA (m.aldhaifallah@psau.edu.sa). Dmitry Namiot is with the Faculty of Comp. Math and Cybern, Lomonosov Moscow State University, Moscow, 119991, Russia (dnamiot@gmail.com). The project was supported by the deanship of scientific research at Prince Sattam bin Abdulaziz University (Kingdom of Saudi Arabia) under the research project #2014/1/863. Submitted 03 November 2015. Published as resubmitted by the authors 15 January 2016. 24 http://www.i-jim.org iJIM – Vol. 10, No. 2, 2016 One Model of Geo-Location Services for Telecom Operators