On a New Approach to Neighbor Discovery as Data Sharing Tool

  • Dmitry Namiot
  • Manfred Sneps-SneppeEmail author
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 1140)


In this paper, we propose and discuss a new approach to data sharing among mobile subscribers. Our idea is to use the neighbor discovery phase in wireless networks. It simulates a peer-to-peer network that will work without any telecommunication infrastructure. A single mobile phone (smartphone) will be sufficient both for creating a node of such telecommunication network and for publishing (distributing) information. What is important here, the usage of the standard neighbor discovery mechanism does not assume the preloading some mobile applications. Our idea is to share user-defined information during the basic neighbor discovery phase. In this case, the parties involved in the process should be able to read the shared data directly from the process of discovering for neighboring nodes. Our proposal is the further development of ideas related to context-aware systems based on network proximity principles.


WiFi Bluetooth Network proximity BLE Services 


  1. 1.
    Angelosante, D., Biglieri, E., Lops, M.: Full length article: neighbor discovery in wireless networks: a multiuser-detection approach. Phys. Commun. 3(1), 28–36 (2010). Scholar
  2. 2.
    Cornejo, A., Viqar, S., Welch, J.L.: Reliable neighbor discovery for mobile ad hoc networks. Ad Hoc Netw. 12, 259–277 (2014). Scholar
  3. 3.
    Gu, Z., Wang, Y., Hua, Q.-S., Lau, Francis C.M.: Neighbor discovery in wireless sensor networks. Rendezvous in Distributed Systems, pp. 243–251. Springer, Singapore (2017). Scholar
  4. 4.
    Lavanya, C.B., Asha, K.N., Asha, R.K.P.: A study on energy efficient routing techniques for wireless adhoc network. Int. J. Sci. Eng. Res. 6(3), 648–651 (2015)Google Scholar
  5. 5.
    ICMPv6 Router Advertisement and Router Solicitation Messages. Accessed 16 Oct 2018
  6. 6.
    IPv6 Configuration Guide, Cisco IOS Release 15.2 M&T. Accessed 16 Oct 2018
  7. 7.
    Bland, A.: FireChat – the messaging app that’s powering the Hong Kong protests. The Guardian, 29 (2014)Google Scholar
  8. 8.
    Namiot, D.: On mobile mesh networks. Int. J. Open Inf. Technol. 3(4), 38–41 (2015)Google Scholar
  9. 9.
  10. 10.
    Kopekar, S., Kumar, A.: A study of ad-hoc wireless networks: various issues in architectures and protocols. Int. J. Comput. Appl. 122(6), 36–40 (2015). Scholar
  11. 11.
    Bill, D.S.: Wireless social networking. U.S. Patent no. 7,720,037, 18 May 2010Google Scholar
  12. 12.
    Namiot, D., Sneps-Sneppe, M.: On Bluetooth proximity models. In: Advances in Wireless and Optical Communications (RTUWO), Riga, pp. 80–84 (2016).
  13. 13.
  14. 14.
    Sneps-Sneppe, M., Namiot, D.: On physical web models. In: Proceedings of the 2016 International Siberian Conference on Control and Communications (SIBCON), Moscow, pp. 1–6 (2016).
  15. 15.
    Namiot, D., Sneps-Sneppe, M.: Context-aware data discovery. In: Proceedings of the 2012 16th International Conference on Intelligence in Next Generation Networks, Berlin, pp. 134–141 (2012).
  16. 16.
    Namiot, D., Sneps-Sneppe, M.: On mobile wireless tags. Autom. Control. Comput. Sci. 49(3), 159–166 (2015). Scholar
  17. 17.
    Koühne, M., Sieck, J.: Location-based services with iBeacon technology. In: Proceedings of the 2014 2nd International Conference on Artificial Intelligence, Modelling and Simulation, Madrid, pp. 315–321 (2014).
  18. 18.
    Namiot, D., Zubareva, E.: On one approach to delivering information to mobile users. Int. J. Open Inf. Technol. 5(8), 12–17 (2017). (in Russian).
  19. 19.
    Chandra, R., Padhye, J., Ravindranath, L., Wolman, A.: Beacon-stuffing: Wi-Fi without associations. In: Eighth IEEE Workshop on Mobile Computing Systems and Applications, Tucson, AZ, pp. 53–57 (2007).
  20. 20.
    Zehl, S., Karowski, N., Zubow, A., and Wolisz, A.: LoWS: a complete open source solution for Wi-Fi beacon stuffing based Location-based Services. In: Proceedings of the 2016 9th IFIP Wireless and Mobile Networking Conference (WMNC), Colmar, pp. 25–32 (2016).
  21. 21.
    Liu, Z., Wu, M., Zhu, K., Zhang, L.: SenSafe: a smartphone-based traffic safety framework by sensing vehicle and pedestrian behaviors. Mob. Inf. Syst. 2016, 7967249, 13 p. (2016). Scholar
  22. 22.
    Maffei, L.: Using a Wi-Fi Network’s Name To Broadcast A Political Message (2017). Accessed 16 Oct 2018
  23. 23.
    Scott, D.M.: Cyber graffiti with WiFi network names as advertising (2011). Accessed 16 Oct 2018
  24. 24.
    Chen, J.: Clever SSIDs That Scare Off Leeches Or Send A Message (2011). Accessed 16 Oct 2018
  25. 25.
    Aylward, L., Gallagher, S.: Scare your neighbors with a spooky Halloween network name (2014). Accessed 16 Oct 2018
  26. 26.
    Agarwal, A.: Let Others Contact You Through Your Own Wi-Fi Network (2012). Accessed 16 Oct 2018
  27. 27.
    Huseynov, E., Seigneur, J.: Beacon authpath: augmented human path authentication. In: Proceedings of the 2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT), Baku, pp. 1–5 (2016).
  28. 28.
    Liu, J., Chen, C., Ma, Y.: Modeling neighbor discovery in bluetooth low energy networks. IEEE Commun. Lett. 16(9), 1439–1441 (2012). Scholar
  29. 29.
    Warne, W.: Bluetooth low energy - It starts with advertising (2017). Accessed 16 Oct 2018
  30. 30.
    Android Bluetooth Advertisements. Accessed 16 Oct 2018
  31. 31.
    Liu, J., Chen, C., Ma, Y.: Modeling and performance analysis of device discovery in bluetooth low energy networks. In: Proceedings of the 2012 IEEE Global Communications Conference (GLOBECOM), Anaheim, CA, pp. 1538–1543 (2012).
  32. 32.
    Wi-Fi Aware Overview. Accessed 16 Oct 2018

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.Lomonosov Moscow State UniversityMoscowRussia
  2. 2.Ventspils University of Applied SciencesVentspilsLatvia

Personalised recommendations