Advertisement

On Proximity-Based Information Delivery

  • Dmitry Namiot
  • Manfred Sneps-Sneppe
Conference paper
Part of the Communications in Computer and Information Science book series (CCIS, volume 919)

Abstract

In this paper, we propose and discuss one approach to a data sharing among mobile subscribers. Our idea is to use the identification of wireless networks to simulate some analogue for a peer-to-peer network that will work in the absence of telecommunications infrastructure. A single mobile phone (smartphone) will be sufficient both for creating a node of such telecommunications network and for publishing (disseminating) information. Our proposal is the further development of ideas related to context-aware systems based on network proximity principles. The proposed model allows mobile users to create information hubs directly at the location of the mobile phone of the publisher, which will distribute information for mobile subscribers in the immediate vicinity of it.

Keywords

Bluetooth Network proximity BLE Services 

References

  1. 1.
    Bland, A.: FireChat-the messaging app that’s powering the Hong Kong protests. Guardian 29 (2014)Google Scholar
  2. 2.
    Namiot, D.: On mobile mesh networks. Int. J. Open Inf. Technol. 3(4) (2015)Google Scholar
  3. 3.
  4. 4.
    Kopekar, S., Kumar, A.: A study of ad-hoc wireless networks: various issues in architectures and protocols. Int. J. Comput. Appl. 122(6) (2015)Google Scholar
  5. 5.
    Yousefi, S., Mousavi, M.S., Fathy, M.: Vehicular ad hoc networks (VANETs): challenges and perspectives. In: 2006 6th International Conference on ITS Telecommunications Proceedings. IEEE (2006)Google Scholar
  6. 6.
    Bill, D.S.: Wireless social networking. US Patent No. 7,720,037 18 May 2010Google Scholar
  7. 7.
    Namiot, D., Sneps-Sneppe, M.: On Bluetooth proximity models. In: Advances in Wireless and Optical Communications (RTUWO). IEEE (2016)Google Scholar
  8. 8.
    Namiot, D., Sneps-Sneppe, M.: Context-aware data discovery. In: 16th International Conference on Intelligence in Next Generation Networks (ICIN). IEEE (2012)Google Scholar
  9. 9.
    Sneps-Sneppe, M., Namiot, D.: On physical web models. In: 2016 International Siberian Conference on Control and Communications (SIBCON). IEEE (2016)Google Scholar
  10. 10.
    Koühne, M., Sieck, J.: Location-based services with iBeacon technology. In: 2014 2nd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS). IEEE (2014)Google Scholar
  11. 11.
    This Google-backed startup wants to make millennials read local news. https://thenextweb.com/insider/2017/07/25/are-bluetooth-beacons-the-savior-of-local-news/. Accessed Apr 2018
  12. 12.
    Chandra, R., et al.: Beacon-stuffing: Wi-fi without associations. In: Eighth IEEE Workshop on Mobile Computing Systems and Applications, HotMobile 2007. IEEE (2007)Google Scholar
  13. 13.
    Zehl, S., et al.: LoWS: a complete open source solution for Wi-Fi beacon stuffing based Location-based Services. In: 2016 9th IFIP Wireless and Mobile Networking Conference (WMNC). IEEE (2016)Google Scholar
  14. 14.
    Liu, Z., et al.: SenSafe: a smartphone-based traffic safety framework by sensing vehicle and pedestrian behaviors. In: Mobile Information Systems 2016 (2016)Google Scholar
  15. 15.
  16. 16.
    Cyber graffiti with WiFi network names as advertising. http://www.webinknow.com/2011/02/cyber-graffiti-with-wifi-network-names-as-advertising.html. Accessed Apr 2018
  17. 17.
    Clever SSIDs that Scare Off Leeches or Send a Message. https://www.lifehacker.com.au/2011/10/clever-ssids-that-scare-off-leeches-or-send-a-message/. Accessed Apr 2018
  18. 18.
    Scare your neighbors with a spooky Halloween network name. https://arstechnica.com/information-technology/2014/10/scare-your-neighbors-with-a-spooky-halloween-network-name/. Accessed Apr 2018
  19. 19.
    Let Others Contact You Through Your Own Wi-Fi Network. https://www.labnol.org/internet/share-wifi-with-neighbors/21024/. Accessed Apr 2018
  20. 20.
    Huseynov, E., Seigneur, J.-M.: Beacon authpath: augmented human path authentication. In: 2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT). IEEE (2016)Google Scholar
  21. 21.
    Namiot, D., Sneps-Sneppe, M.: CAT-cars as tags. In: 2014 7th International Workshop on Communication Technologies for Vehicles (Nets4Cars-Fall). IEEE (2014)Google Scholar
  22. 22.
    Namiot, D., Sneps-Sneppe, M.: Customized check-in procedures. In: Balandin, S., Koucheryavy, Y., Hu, H. (eds.) NEW2AN/ruSMART -2011. LNCS, vol. 6869, pp. 160–164. Springer, Heidelberg (2011).  https://doi.org/10.1007/978-3-642-22875-9_14CrossRefGoogle Scholar
  23. 23.
    Liu, J., Chen, C., Ma, Y.: Modeling and performance analysis of device discovery in bluetooth low energy networks. In: Proceedings of the IEEE on Global Communications Conference (GLOBECOM), Anaheim, CA, USA, 3–7 December 2012, pp. 1538–1543 (2012)Google Scholar
  24. 24.
    Liu, J., Chen, C., Ma, Y.: Modeling neighbor discovery in bluetooth low energy networks. IEEE Commun. Lett. 16, 1439–1441 (2012)CrossRefGoogle Scholar
  25. 25.
    Hernández-Solana, Á., Perez-Diaz-de-Cerio, D., Valdovinos, A., Valenzuela, J.L.: Proposal and evaluation of BLE discovery process based on new features of bluetooth 5.0. Sensors 17(9), 1988 (2017)Google Scholar
  26. 26.
    3GPP TR 22.803: Feasibility study for Proximity Services (ProSe) (Release 12), v. 12.2.0, June 2013Google Scholar
  27. 27.
    Doumiati, S., Artail, H., Gutierrez-Estevez, D.M.: A framework for LTE-A proximity-based device-to-device service registration and discovery. Procedia Comput. Sci. 34, 87–94 (2014)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  1. 1.Faculty of Computational Mathematics and CyberneticsLomonosov Moscow State UniversityLeninskiye GoryRussia
  2. 2.Ventspils International Radio Astronomy CentreVentspils University CollegeVentspilsLatvia

Personalised recommendations