Advertisement

On a New Approach to Neighbor Discovery as Data Sharing Tool

  • Dmitry Namiot
  • Manfred Sneps-SneppeEmail author
Conference paper
  • 18 Downloads
Part of the Communications in Computer and Information Science book series (CCIS, volume 1140)

Abstract

In this paper, we propose and discuss a new approach to data sharing among mobile subscribers. Our idea is to use the neighbor discovery phase in wireless networks. It simulates a peer-to-peer network that will work without any telecommunication infrastructure. A single mobile phone (smartphone) will be sufficient both for creating a node of such telecommunication network and for publishing (distributing) information. What is important here, the usage of the standard neighbor discovery mechanism does not assume the preloading some mobile applications. Our idea is to share user-defined information during the basic neighbor discovery phase. In this case, the parties involved in the process should be able to read the shared data directly from the process of discovering for neighboring nodes. Our proposal is the further development of ideas related to context-aware systems based on network proximity principles.

Keywords

WiFi Bluetooth Network proximity BLE Services 

References

  1. 1.
    Angelosante, D., Biglieri, E., Lops, M.: Full length article: neighbor discovery in wireless networks: a multiuser-detection approach. Phys. Commun. 3(1), 28–36 (2010).  https://doi.org/10.1016/j.phycom.2009.08.005CrossRefGoogle Scholar
  2. 2.
    Cornejo, A., Viqar, S., Welch, J.L.: Reliable neighbor discovery for mobile ad hoc networks. Ad Hoc Netw. 12, 259–277 (2014).  https://doi.org/10.1016/j.adhoc.2012.08.009CrossRefGoogle Scholar
  3. 3.
    Gu, Z., Wang, Y., Hua, Q.-S., Lau, Francis C.M.: Neighbor discovery in wireless sensor networks. Rendezvous in Distributed Systems, pp. 243–251. Springer, Singapore (2017).  https://doi.org/10.1007/978-981-10-3680-4_19CrossRefGoogle Scholar
  4. 4.
    Lavanya, C.B., Asha, K.N., Asha, R.K.P.: A study on energy efficient routing techniques for wireless adhoc network. Int. J. Sci. Eng. Res. 6(3), 648–651 (2015)Google Scholar
  5. 5.
    ICMPv6 Router Advertisement and Router Solicitation Messages. http://www.tcpipguide.com/free/t_ICMPv6RouterAdvertisementandRouterSolicitationMess.htm. Accessed 16 Oct 2018
  6. 6.
    IPv6 Configuration Guide, Cisco IOS Release 15.2 M&T. https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/ipv6/configuration/15-2mt/ip6-15-2mt-book/ip6-neighb-disc.html. Accessed 16 Oct 2018
  7. 7.
    Bland, A.: FireChat – the messaging app that’s powering the Hong Kong protests. The Guardian, 29 (2014)Google Scholar
  8. 8.
    Namiot, D.: On mobile mesh networks. Int. J. Open Inf. Technol. 3(4), 38–41 (2015)Google Scholar
  9. 9.
  10. 10.
    Kopekar, S., Kumar, A.: A study of ad-hoc wireless networks: various issues in architectures and protocols. Int. J. Comput. Appl. 122(6), 36–40 (2015).  https://doi.org/10.5120/21708-4824CrossRefGoogle Scholar
  11. 11.
    Bill, D.S.: Wireless social networking. U.S. Patent no. 7,720,037, 18 May 2010Google Scholar
  12. 12.
    Namiot, D., Sneps-Sneppe, M.: On Bluetooth proximity models. In: Advances in Wireless and Optical Communications (RTUWO), Riga, pp. 80–84 (2016).  https://doi.org/10.1109/rtuwo.2016.7821860
  13. 13.
  14. 14.
    Sneps-Sneppe, M., Namiot, D.: On physical web models. In: Proceedings of the 2016 International Siberian Conference on Control and Communications (SIBCON), Moscow, pp. 1–6 (2016).  https://doi.org/10.1109/sibcon.2016.7491675
  15. 15.
    Namiot, D., Sneps-Sneppe, M.: Context-aware data discovery. In: Proceedings of the 2012 16th International Conference on Intelligence in Next Generation Networks, Berlin, pp. 134–141 (2012).  https://doi.org/10.1109/icin.2012.6376016
  16. 16.
    Namiot, D., Sneps-Sneppe, M.: On mobile wireless tags. Autom. Control. Comput. Sci. 49(3), 159–166 (2015).  https://doi.org/10.3103/S0146411615030062CrossRefGoogle Scholar
  17. 17.
    Koühne, M., Sieck, J.: Location-based services with iBeacon technology. In: Proceedings of the 2014 2nd International Conference on Artificial Intelligence, Modelling and Simulation, Madrid, pp. 315–321 (2014).  https://doi.org/10.1109/aims.2014.58
  18. 18.
    Namiot, D., Zubareva, E.: On one approach to delivering information to mobile users. Int. J. Open Inf. Technol. 5(8), 12–17 (2017). (in Russian). http://injoit.ru/index.php/j1/article/view/472/448
  19. 19.
    Chandra, R., Padhye, J., Ravindranath, L., Wolman, A.: Beacon-stuffing: Wi-Fi without associations. In: Eighth IEEE Workshop on Mobile Computing Systems and Applications, Tucson, AZ, pp. 53–57 (2007).  https://doi.org/10.1109/hotmobile.2007.16
  20. 20.
    Zehl, S., Karowski, N., Zubow, A., and Wolisz, A.: LoWS: a complete open source solution for Wi-Fi beacon stuffing based Location-based Services. In: Proceedings of the 2016 9th IFIP Wireless and Mobile Networking Conference (WMNC), Colmar, pp. 25–32 (2016).  https://doi.org/10.1109/wmnc.2016.7543926
  21. 21.
    Liu, Z., Wu, M., Zhu, K., Zhang, L.: SenSafe: a smartphone-based traffic safety framework by sensing vehicle and pedestrian behaviors. Mob. Inf. Syst. 2016, 7967249, 13 p. (2016).  https://doi.org/10.1155/2016/7967249Google Scholar
  22. 22.
    Maffei, L.: Using a Wi-Fi Network’s Name To Broadcast A Political Message (2017). http://www.npr.org/sections/alltechconsidered/2017/02/07/513240428/using-a-wi-fi-networks-name-to-broadcast-a-political-message. Accessed 16 Oct 2018
  23. 23.
    Scott, D.M.: Cyber graffiti with WiFi network names as advertising (2011). http://www.webinknow.com/2011/02/cyber-graffiti-with-wifi-network-names-as-advertising.html. Accessed 16 Oct 2018
  24. 24.
    Chen, J.: Clever SSIDs That Scare Off Leeches Or Send A Message (2011). https://www.lifehacker.com.au/2011/10/clever-ssids-that-scare-off-leeches-or-send-a-message/. Accessed 16 Oct 2018
  25. 25.
    Aylward, L., Gallagher, S.: Scare your neighbors with a spooky Halloween network name (2014). https://arstechnica.com/information-technology/2014/10/scare-your-neighbors-with-a-spooky-halloween-network-name/. Accessed 16 Oct 2018
  26. 26.
    Agarwal, A.: Let Others Contact You Through Your Own Wi-Fi Network (2012). https://www.labnol.org/internet/share-wifi-with-neighbors/21024/. Accessed 16 Oct 2018
  27. 27.
    Huseynov, E., Seigneur, J.: Beacon authpath: augmented human path authentication. In: Proceedings of the 2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT), Baku, pp. 1–5 (2016).  https://doi.org/10.1109/icaict.2016.7991702
  28. 28.
    Liu, J., Chen, C., Ma, Y.: Modeling neighbor discovery in bluetooth low energy networks. IEEE Commun. Lett. 16(9), 1439–1441 (2012).  https://doi.org/10.1109/LCOMM.2012.073112.120877CrossRefGoogle Scholar
  29. 29.
    Warne, W.: Bluetooth low energy - It starts with advertising (2017). http://blog.bluetooth.com/bluetooth-low-energy-it-starts-with-advertising. Accessed 16 Oct 2018
  30. 30.
    Android Bluetooth Advertisements. https://github.com/googlesamples/android-BluetoothAdvertisements. Accessed 16 Oct 2018
  31. 31.
    Liu, J., Chen, C., Ma, Y.: Modeling and performance analysis of device discovery in bluetooth low energy networks. In: Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, pp. 1538–1543 (2012).  https://doi.org/10.1109/glocom.2012.6503332
  32. 32.
    Wi-Fi Aware Overview. https://developer.android.com/guide/topics/connectivity/wifi-aware. Accessed 16 Oct 2018

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Lomonosov Moscow State UniversityMoscowRussia
  2. 2.Ventspils University of Applied SciencesVentspilsLatvia

Personalised recommendations