A Peer-to-Peer e-Market Organized within Mobile Devices Based on Distributed Services

Author(s):  
Zhou Yu ◽  
Zhiyuan Fang ◽  
Li Ning
2012 ◽  
Vol 8 (4) ◽  
pp. 117 ◽  
Author(s):  
Luca Mainetti ◽  
Luigi Patrono ◽  
Roberto Vergallo

The evolution of modern mobile devices towards novel Radio Frequency (RF) capabilities, such as Near Field Communication, leads to a potential for delivering innovative mobile services, which is still partially unexplored. Mobile proximity payment systems are going to enhance the daily shopping experience, but the access to payment security resources of a mobile device (e.g. the “Secure Element”) by third party applications is still blocked by smartphone and Operating System manufacturers. In this paper, the IDA-Pay system is presented, an innovative and secure NFC micro-payment system based on Peer-to-Peer NFC operating mode for Android mobile phones. It allows to deliver mobile-to-POS micro-payment services, bypassing the need for special hardware. A validation scenario and a system evaluation are also reported to demonstrate the system effectiveness and performance.


Mobile adhoc networks (MANETs) have drawn attention to multitudinous consideration because of the univerality of mobile devices as well as the developments in wireless era. MANET is a peer-to-peer multi hop cellular wireless era community which does not have both difficult and speedy infrastructure and a relevant server. Every vertex of a MANET performs like a router and communicates with every unique. There exist numerous information duplication strategies which were presented to reduce the execution squalor. All are concluded that everyone cell vertices cooperate completely from the perspective of sharing their memory vicinity. But, via a few methods few vertices might additionally behave selfishly and determine simplest to cooperate in part or never with different vertices. The selfish vertices ought to then lessen the overall information approachability within the network. From this work, we try to take a look at the influence of selfish vertices in a mobile ad hoc community in terms of reproduction issuance i.e Selfish nodes are dealt with in replica allocation.


2011 ◽  
pp. 203-230
Author(s):  
Kin Choong Yow ◽  
Nitin Mittal

The evolution in mobile messaging and mobile devices has made it possible to provide multimedia rich messaging capabilities to personal digital assistants (PDAs). The need for this arises simply because mobile service providers want to provide an enhanced messaging experience to the user. It also opens up new avenues for business, such as a shopping mall scenario. This chapter discusses the development of a multimedia messaging client for a PDA and a kiosk providing multimedia messages composition, search, share, and sending capabilities. This chapter also discusses the various messaging technologies, enabling wireless technologies, and the peer-to-peer model. The peer-to-peer technology used was Jxta, an XML-based and language agnostic peer-to-peer platform specification from Sun Microsystems. The peers (PDA client and the kiosk) were implemented using the application programming interfaces provided by the Personal Java reference implementation and the Jxta platform’s Personal Java port.


2008 ◽  
pp. 129-150
Author(s):  
K. C. Yow ◽  
N. Mittal

The evolution in mobile messaging and mobile devices has made it possible to provide multimedia rich messaging capabilities to personal digital assistants (PDAs). The need for this arises simply because mobile service providers want to provide an enhanced messaging experience to the user. It also opens up new avenues for business, such as a shopping mall scenario. This chapter discusses the development of a multimedia messaging client for a PDA and a kiosk providing multimedia messages composition, search, share, and sending capabilities. This chapter also discusses the various messaging technologies, enabling wireless technologies, and the peer-to-peer model. The peer-to-peer technology used was Jxta, an XML-based and language agnostic peer-to-peer platform specification from Sun Microsystems. The peers (PDA client and the kiosk) were implemented using the application programming interfaces provided by the Personal Java reference implementation and the Jxta platform’s Personal Java port.


2017 ◽  
Vol 2017 ◽  
pp. 1-21 ◽  
Author(s):  
Pieter Robyns ◽  
Bram Bonné ◽  
Peter Quax ◽  
Wim Lamotte

We present two novel noncooperative MAC layer fingerprinting and tracking techniques for Wi-Fi (802.11) enabled mobile devices. Our first technique demonstrates how a per-bit entropy analysis of a single captured frame allows an adversary to construct a fingerprint of the transmitter that is 80.0 to 67.6 percent unique for 50 to 100 observed devices and 33.0 to 15.1 percent unique for 1,000 to 10,000 observed devices. We show how existing mitigation strategies such as MAC address randomization can be circumvented using only this fingerprint and temporal information. Our second technique leverages peer-to-peer 802.11u Generic Advertisement Service (GAS) requests and 802.11e Block Acknowledgement (BA) requests to instigate transmissions on demand from devices that support these protocols. We validate these techniques using two datasets, one of which was recorded at a music festival containing 28,048 unique devices and the other at our research lab containing 138 unique devices. Finally, we discuss a number of countermeasures that can be put in place by mobile device vendors in order to prevent noncooperative tracking through the discussed techniques.


2015 ◽  
Vol 764-765 ◽  
pp. 950-954
Author(s):  
Chih Kun Ke ◽  
Zheng Hua Lin

In previous work, we have proposed a service mechanism which automatically syncs the file resources among discrete mobile devices. The mechanism includes four modules. The role-based access control module (RBAC) defined an organization policy which constructs some rules for file resources accessing. The user identification module dispatches a user some specific role (s) with relevant permission (s) and constraint (s) to access organization file resources. The en-capsulation/de-capsulation module enforces the JXTA protocol to sync the file resource synchronization over a mobile peer-to-peer network. The knowledge base module stores various organization file resources in the proposed service mechanism. However, the service mechanism faces an important challenge about data security. How to securely sync organization file resources among discrete mobile devices is worth exploring. In this study, we enforces some cryptographic techniques, including advanced encryption standard (AES), Triple data encryption standards (Triple-DES), and data encryption standards (DES), to examine secure synchronization of organization file resources among discrete mobile devices. The experiment results show the proposed mechanism is secure to automatically sync file resources among discrete mobile devices. The contribution of this work is to solve data security issue in syncing organization file resources among discrete mobile devices. We also strengthen an organization mobility to acquire the file resources by a mobile device in anywhere.


2009 ◽  
Vol 16 (2) ◽  
pp. 30-36 ◽  
Author(s):  
Chien-Chun Huang-Fu ◽  
Yi-Bing Lin ◽  
H. Rao
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document