Spotique: A New Approach to Local Messaging

  • Manfred Sneps-Sneppe
  • Dmitry Namiot
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7889)


This paper describes a new approach to local messaging. Our application combines passive monitoring for smart phones and cloud based messaging for mobile OS (operational system). Passive monitoring can determine the location of mobile subscribers (mobile phones, actually) without the active participation of the users. Mobile users do not need to mark own location on social networks (check-in), they do not need to run on their phones the location track applications. In the same time, Cloud Messaging allows interested parties to directly deliver their information to mobile users who find themselves near a selected point. This is the main content of the service - how to combine the monitoring and notifications.


Wi-Fi monitoring proximity location messaging 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Schilit, G., Theimer, B.: Disseminating Active Map Information to Mobile Hosts. IEEE Network 8(5), 22–32 (1994)CrossRefGoogle Scholar
  2. 2.
    Namiot, D., Sneps-Sneppe, M.: Context-aware data discovery. In: 2012 16th International Conference on Intelligence in Next Generation Networks (ICIN), pp. 134–141 (2012), doi:10.1109/ICIN.2012.6376016Google Scholar
  3. 3.
    Šikšnys, L., Thomsen, J., Šaltenis, S., Yiu, M.: Private and Flexible Proximity Detection in Mobile Social Networks. In: 2010 Eleventh International Conference on Mobile Data Management (MDM), pp. 75–84 (2010)Google Scholar
  4. 4.
    Mascetti, S., Bettini, C., Freni, D., Wang, X.S., Jajodia, S.: Privacy-aware proximity based services. In: MDM, pp. 31–40 (2009)Google Scholar
  5. 5.
    Ruppel, P., Treu, G., Küpper, A., Linnhoff-Popien, C.: Anonymous User Tracking for Location-Based Community Services. In: Hazas, M., Krumm, J., Strang, T. (eds.) LoCA 2006. LNCS, vol. 3987, pp. 116–133. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  6. 6.
    Namiot, D., Sneps-Sneppe, M.: Where Are They Now – Safe Location Sharing. In: Andreev, S., Balandin, S., Koucheryavy, Y. (eds.) NEW2AN/ruSMART 2012. LNCS, vol. 7469, pp. 63–74. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  7. 7.
    Mathur, S., Miller, R., Varshavsky, A., Trappe, W., Mandayam, N.: ProxiMate: Proximity-based Secure Pairing using Ambient Wireless Signals. In: MobiSys 2011 Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, pp. 211–224 (2011), doi:10.1145/1999995.2000016Google Scholar
  8. 8.
    Namiot, D., Schneps-Schneppe, M.: About location-aware mobile messages. In: International Conference and Exhibition on Next Generation Mobile Applications, Services and Technologies (NGMAST), September 14-16, pp. 48–53 (2011), doi:10.1109/NGMAST.2011.19Google Scholar
  9. 9.
    Rekimoto, J., Miyaki, T., Ishizawa, T.: LifeTag: WiFi-Based Continuous Location Logging for Life Pattern Analysis. In: Hightower, J., Schiele, B., Strang, T. (eds.) LoCA 2007. LNCS, vol. 4718, pp. 35–49. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  10. 10.
    Chen, Y., Chawathe, Y., LaMarca, A., Krumm, J.: Accuracy characterization for metropolitan-scale Wi-Fi localization. In: ACM MobiSys (2005)Google Scholar
  11. 11.
    Namiot, D., Sneps-Sneppe, M.: Using Network Proximity for Context-aware Browsing. International Journal on Advances in Telecommunications 5(3&4), 163–172 (2012)Google Scholar
  12. 12.
    Gast, M.: 802.11 Wireless Networks: The Definitive Guide, 654 p. O’Reilly Media, Inc. (2005)Google Scholar
  13. 13.
    Wi-Fi probe request, (retrieved: January 2013)
  14. 14.
    Musa, A., Eriksson, J.: Tracking Unmodified Smartphones Using Wi-Fi Monitors. In: SenSys 2012, Toronto, November 6-9 (2012)Google Scholar
  15. 15.
    Lubelium routers, (retrieved: January 2013)
  16. 16.
    Google Cloud Messaging, (retrieved: January 2013)
  17. 17.
  18. 18.
    Microsoft Inc. Push Notifications Overview for Windows Phone, (retrieved: January 2013)
  19. 19.
    Reserach In Motion Inc. Blackberry push service, (retrieved: January 2013)
  20. 20.
    Nokia Inc. Notifications api, (retrieved: January 2013)
  21. 21.
    Zhao, S., Lee, P., Lui, J., Guan, X., Ma, X., Tao, J.: Cloud-Based Push-Styled Mobile Botnets: A Case Study of Exploiting the Cloud to Device Messaging Service. In: ACSAC 2012, Orlando, Florida, USA, December 3-7 (2012)Google Scholar
  22. 22.
    Namiot, D.: Context-Aware Browsing – A Practical Approach. In: 2012 6th International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST), pp. 18–23 (2012), doi:10.1109/NGMAST.2012.13Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Manfred Sneps-Sneppe
    • 1
  • Dmitry Namiot
    • 2
  1. 1.Ventspils International Radioastronomy CentreVentspils University CollegeVentspilsLatvia
  2. 2.Faculty of Computational Mathematics and CyberneticsLomonosov Moscow State UniversityMoscowRussia

Personalised recommendations