• Title/Summary/Keyword: mobile peer-to-peer service

Search Result 55, Processing Time 0.022 seconds

MobPrice: Dynamic Data Pricing for Mobile Communication

  • Padhariya, Nilesh;Raichura, Kshama
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.2
    • /
    • pp.86-96
    • /
    • 2015
  • In mobile communication, mobile services [MSs] (e.g., phone calls, short/multimedia messages, and Internet data) incur a cost to both mobile users (MUs) and mobile service providers (MSPs). The proposed model MobPrice consists of dynamic data pricing schemes for mobile communication in order to achieve optimal usage of MSs at minimal prices. MobPrice inspires MUs to subscribe MSs with flexibility of data sharing and intra-peer exchanges, thereby reducing overall cost. The main contributions of MobPrice are three-fold. First, it proposes a novel k-level data-pricing (kDP) scheme for MSs. Second, it extends the kDP scheme with the notion of service-sharing-based pricing schemes to a collaborative peer-to-peer data-pricing (pDP) scheme and a cluster-based data-pricing (cDP) scheme to incorporate the notion of 'cluster' (made up of two or more MUs) in mobile communication. Third, our performance study shows that the proposed schemes are indeed effective in maximizing MS subscriptions and minimizing MS's price/user.

Design and Analysis of Fabrication Threat Management in Peer-to-Peer Collaborative Location Privacy

  • Jagdale, Balaso;Sugave, Shounak;Kolhe, Kishor
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.399-408
    • /
    • 2021
  • Information security reports four types of basic attacks on information. One of the attacks is named as fabrication. Even though mobile devices and applications are showing its maturity in terms of performance, security and ubiquity, location-based applications still faces challenges of quality of service, privacy, integrity, authentication among mobile devices and hence mobile users associated with the devices. There is always a continued fear as how location information of users or IoT appliances is used by third party LB Service providers. Even adversary or malicious attackers get hold of location information in transit or fraudulently hold this information. In this paper, location information fabrication scenarios are presented after knowing basic model of information attacks. Peer-to-Peer broadcast model of location privacy is proposed. This document contains introduction to fabrication, solutions to such threats, management of fabrication mitigation in collaborative or peer to peer location privacy and its cost analysis. There are various infrastructure components in Location Based Services such as Governance Server, Point of interest POI repository, POI service, End users, Intruders etc. Various algorithms are presented and analyzed for fabrication management, integrity, and authentication. Moreover, anti-fabrication mechanism is devised in the presence of trust. Over cost analysis is done for anti-fabrication management due to nature of various cryptographic combinations.

A Communication Platform for Mobile Group Peer-to-Peer Services (모바일 그룹 P2P 응용 서비스를 위한 통신 플랫폼)

  • Song, Ji-Hwan;Kang, Kyung-Ran;Cho, Young-Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.4
    • /
    • pp.389-400
    • /
    • 2008
  • As the wireless network technologies and the capability of the mobile terminals are evolving, advanced peer to peer applications for mobile users are attracting interests. In this paper, we propose the mobile P2P communication platform(MPCP) which provides transparency to the wireless network technologies and solutions to the limited resources of the mobile terminals. MPCP classifies the connection into two levels: a virtual channel and a session. A virtual channel is the network layer connection between the terminals whereas a session is the application layer connection. MPCP classifies the sessions into four types and applies different scheduling priority and data processing policies such as segmentation and reassembly. It selects proper wireless network technologies depending on the distance between the communication endpoints. To acquire dynamically changed access address, we harness the Session Initiation Protocol. We implemented MPCP on embedded Linux simulator and utilized the implementation in mobile P2P service development. For the quantitative analysis, we compared the performance of MPCP with that of ftp. Regardless of the number of simultaneous sessions, MPCP maintains the relative performance.

JXTA based P2P Framework using Mobile Agents (모바일 에이전트를 이용한 JXTA 기반의 P2P 프레임워크)

  • Min, Su-Hong;Cho, Dong-Sub
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.384-387
    • /
    • 2003
  • In this paper, we have designed the integrated wire and wireless P2P framework using mobile agents to share efficiently resources as media file. Most of the P2P applications are used on the wire network. We propose the integrated wire and wireless P2P framework. Proposed P2P platform is based on JXTA of Sun Microsystems. But JXTA is pure peer-to-peer network model, so it sends message other peers as broadcast style to request resources. In this way, there are some problems as massage overload, bandwidth loss, etc. In order to solve this problem, we propose a hybrid peer-to-peer network model using mobile agent. Proposed scheme also solve existing hybrid pEp model's flaws which have the delay and low rate due to concentrated server. In proposed scheme, mobile agents that have autonomy and mobility are used to search the location of resources. Besides, mobile agents could solve the loss problem of the search result. To improve P2P QoS(Quality of Service), we could monitor peer's state information using PIP(Peer Information Protocol) of JXTA.

  • PDF

Efficient Mobile P2P Structure for Content Search Services (콘텐츠 검색 서비스를 위한 효율적인 이동 P2P 구조)

  • Kwak, Dong-Won;Bok, Kyoung-Soo;Kang, Tae-Ho;Yeo, Myung-Ho;Yoo, Jae-Soo;Joe, Ki-Hung
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.1
    • /
    • pp.30-44
    • /
    • 2009
  • In this paper, we propose the mobile P2P structure supporting content searches for mobile peers efficiently. The proposed mobile P2P structure is a 3-tier structure which consists of a mobile peer, a mobile super peer, and a stationary super peer to reduce the content search cost of mobile P2P service. For content searches, mobile peer searches content in the communication range and performs hierarchical content searches which is using mobile super peer, stationary super peer for expansion of query region. In order to support hierarchial content searches and the continuity of services according to peer mobilities, peer's join/leave processes are explicitly stored by supporting message structures to the upper layer It is shown through experimental evaluation that the proposed structure improves about 32% contents search performance over the existing 2-tier structure. Since it also reduces the messages transferred to the stationary super peers, it reduced about 25% search loads of them.

Enhancing Location Privacy through P2P Network and Caching in Anonymizer

  • Liu, Peiqian;Xie, Shangchen;Shen, Zihao;Wang, Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.5
    • /
    • pp.1653-1670
    • /
    • 2022
  • The fear that location privacy may be compromised greatly hinders the development of location-based service. Accordingly, some schemes based on the distributed architecture in peer-to-peer network for location privacy protection are proposed. Most of them assume that mobile terminals are mutually trusted, but this does not conform to realistic scenes, and they cannot make requirements for the level of location privacy protection. Therefore, this paper proposes a scheme for location attribute-based security authentication and private sharing data group, so that they trust each other in peer-to-peer network and the trusted but curious mobile terminal cannot access the initiator's query request. A new identifier is designed to allow mobile terminals to customize the protection strength. In addition, the caching mechanism is introduced considering the cache capacity, and a cache replacement policy based on deep reinforcement learning is proposed to reduce communications with location-based service server for achieving location privacy protection. Experiments show the effectiveness and efficiency of the proposed scheme.

Adoption of Mobile Peer-to-Peer Payment: Enabling Role of Substitution and Social Aspects

  • Clement Jun Feng Lim;Byungwan Koh;Dongwon Lee
    • Asia pacific journal of information systems
    • /
    • v.29 no.4
    • /
    • pp.571-590
    • /
    • 2019
  • Despite the growing amount of mobile peer-to-peer (P2P) payment applications available on mobile app stores, these applications are still in their infancy and have yet to see mass adoption. This study aims to explore the factors that influence the adoption of such mobile P2P payment applications by using a large-scale data set based on the tracking of users' actual mobile application usage behavior. Our main findings reveal that the duration of each session that users use of traditional bank application has a significant relationship with their adoption of mobile P2P payment applications. In addition, we explore the social aspect of such mobile P2P payment applications by analyzing their social network applications usage and found that the amount of social network service applications used and usage duration positively impacted one's adoption of mobile P2P payment applications. These findings have important theoretical and practical implications for stakeholders of mobile P2P payment solution providers as well as intermediaries/banks who provide their own payment applications to their customers.

Peer-to-Peer System using Super Peers for Mobile Environments (모바일 환경에서 슈퍼 피어를 이용한 피어-투-피어 시스템)

  • Han, Jung-Suk;Song, Jin-Woo;Lee, Kwang-Jo;Yang, Sung-Bong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.286-290
    • /
    • 2008
  • As the number of mobile device users increases, many researches on peer-to-peer(P2P) systems in mobile environments have been carried out. In this paper, we propose a couple of double-layered P2P file sharing systems to overcome the 'flooding' problem in previous mobile P2P systems. We classify peers into two groups, super peers and sub-peers to establish new routing tables. A super peer manages its sub-peers in the systems. The first proposed system partitions the service area into small cells, each of which is a square. Each super peer is located near the center of the square. The second system selects super peers which have the largest number of adjacent peers. As file transmission and file searches are managed mainly by super peers, unnecessary multi-broadcasting could be avoided. The experimental results show that the proposed systems outperform a typical file sharing system in terms of the amount of message traffic with about $1.2{\sim}1.6$ times improvement on the average.

Conferencing Service Interworking in Peer-to-Peer and IMS Networks

  • Sim, Jinsub;Kim, Younghan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2136-2152
    • /
    • 2012
  • The growth of Internet technologies and the widespread use of mobile devices have been paving the way for the increasing use of conferencing services. Two types of systems have been designed to provide conferencing services: 1) a conferencing system using session control over a peer-to-peer (P2P) network and 2) an IP Multimedia Subsystem (IMS) conferencing system. The IMS conferencing system was developed to adapt to a server-based centralized system, whereas the benefits of the P2P operational model in providing such conference services are widely acknowledged. However, each system provides conferencing services only to its own users. Therefore, in this paper, we propose an interworking model to support multimedia conferencing service between the P2P environment and IMS networks. We also introduce protocol architecture and some service scenarios. To verify this system model and the design architecture, we perform an actual implementation and show experienced test results.

Novel Pre-pushing & Downloading Model in Mobile Peer-assisted Streaming Network

  • Lin, Fuhong;Zhou, Xianewi;Chen, Changjia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3135-3148
    • /
    • 2013
  • The popularization of streaming networks and mobile devices brings a new kind of network called mobile peer-assisted streaming network. In this network, service provider not only offers downloading services, but also pre-pushes resources to users for caching. Users can download their demanded resources while working as servers for uploading the cached data. Also the mobile characteristic makes high package losing probability in this network. So we study how the service provider pre-pushes or the user downloads resources efficiently and effectively while considering the package losing in this paper. We build utility models for service provider and user, and solve the models using Bellman's theory to achieve Nash Equilibrium which shows the service provider's optimal pre-pushing speed and user's optimal downloading speed. The numerical simulation demonstrates the efficiency and effectiveness of our proposed pre-pushing and downloading scheme by comparing to the traditional scheme.