scholarly journals Phoenix: A Collaborative Location-Based Notification System for Mobile Networks

2014 ◽  
Vol 2014 ◽  
pp. 1-12 ◽  
Author(s):  
Yongping Xiong ◽  
Yubo Deng ◽  
Wendong Wang ◽  
Jian Ma

Location-based notification (LBN) aims to alert the users in a target area to their interested information. With a wide range of applications, LBN has been gaining more and more attraction among wireless users and service providers. The mainstream centralized solution based on cellular networks may incur high service cost. In this paper, we present an innovative scheme called Phoenix, which does not rely on any infrastructure, to implement location-based notification service. In our design, devices (users) across the target area form a dynamic peer-to-peer network, where a user can be a message source, a message carrier, or a message subscriber. When a user meets the message carrier, he will get a copy of the message. Phoenix keeps messages of interest being circulated in the target area; hence users are being notified. To achieve desired notification performance, Phoenix adaptively controls when a user should take the carrier role and help disseminating a message in order to keep the message “alive,” given the fact that message carriers may leave the target area and drop the message. Extensive simulations have been conducted to show the efficacy of Phoenix notification system.

2021 ◽  
Author(s):  
Burcu Sakız ◽  
Ayşen Hiç Gencer

Blockchain technology is a disruptive innovation with the potential to replace existing business models that rely on centralized systems and third parties for trust. Even if there are a lot of application areas, blockchain used primarily for cryptocurrencies. Satoshi Nakamoto implemented the first blockchain application and invented the world’s first digital currency which is named as Bitcoin in 2008. Fundementally Bitcoin relies on cryptographic “proof of work” mechanism, digital signatures, and peer to peer distributed networking layer in order to provide a distributed ledger holding transactions. In 2014, a second generation of blockchains allow to program and execute them over distributed networks such as Ethereum project. The code to program any asset stored in blockchain’s peer-to-peer network is called as "smart contract" and smart contracts gives a powerful tool to developers for decentralized applications. There are various types of tokens that anyone can built on top of Ethereum and by combining smart contracts and new tokens, this paved the way of possibility to build a wide range of decentralized projects. One of the disruptive blockchain based innovation impacting intellectual property is called non-fungible-tokens or NFTs firstly introcuced in late 2017 on Ethereum network. This research contends that blockchain and non-fungible tokens (NFTs) which are cryptographically unique, scarce, non-replicable digital assets created through smart contracts and provably digital collectible assets. Our objective is to give NFT taxonomy, review NFT platforms and discuss technical challenges as well as recent advances in tackling the challenges. Moreover, this paper also aims to point out the future directions for NFT technology.


2018 ◽  
Vol 7 (3.12) ◽  
pp. 296 ◽  
Author(s):  
Swathi Singh ◽  
Suguna R ◽  
Divya Satish ◽  
Ranjith Kumar MV

The paper gives an insight on cryptography within digital money used in electronic commerce. The combination of digital currencies with cryptography is named as cryptocurrencies or cryptocoins. Though this technique came into existence years ago, it is bound to have a great future due to its flexibility and very less or nil transaction costs. The concept of cryptocurrency is not new in digital world and is already gaining subtle importance in electronic commerce market. This technology can bring down various risks that may have occurred in usage of physical currencies. The transaction of cryptocurrencies are protected with strong cryptographic hash functions that ensure the safe sending and receiving of assets within the transaction chain or blockchain in a Peer-to-Peer network. The paper discusses the merits and demerits of this technology with a wide range of applications that use cryptocurrency.  


Author(s):  
Wilfred Ng ◽  
Mark Levene

This chapter discusses how the capabilities of database languages are enhanced to manipulate user-defined data orderings within the framework of the Ordered Relational Model (the ORM), which incorporates partial orderings into data domains. The motivation for applying the ORM in data warehousing environment is that business queries in an enterprise usually involve order. We have already defined and implemented Ordered SQL (OSQL), which allows users to capture the underlying semantics of the ordering of the data for a given application. Herein we demonstrate that OSQL aided with a package discipline can be an effective means to manage the inter-related operations and the underlying data domains of a wide range of advanced applications that are vital in data warehousing, such as temporal, incomplete, and fuzzy information. We also discuss the employment of OSQL system with three packages of OSQL_TIME, OSQL_INCOMP, and OSQL_FUZZY over a Peer-to-Peer network. Using our suggested framework, the data content of a data warehouse can be better adapted in a dynamic environment.


Entropy ◽  
2019 ◽  
Vol 21 (11) ◽  
pp. 1077
Author(s):  
Denis Horvath ◽  
Juraj Gazda ◽  
Eugen Slapak ◽  
Taras Maksymyuk

Attempts to develop flexible on-demand drone-assisted mobile network deployment are increasingly driven by cost-effective and energy-efficient innovations. The current stage opens up a wide range of theoretical discussions on the management of swarm processes, networks and other integrated projects. However, dealing with these complex issues remains a challenging task, although heuristic approaches are usually utilized. This article introduces a model of autonomous and adaptive drones that provide the function of aerial mobile base stations. Its particular goal is to analyze post-disaster recovery if the network failure takes place. We assume that a well-structured swarm of drones can re-establish the connection by spanning the residual functional, fixed infrastructure, and providing coverage of the target area. Our technique uses stochastic Langevin dynamics with virtual and adaptive forces that bind drones during deployment. The system characteristics of the swarms are a priority of our focus. The assessment of parametric sensitivity with the insistence on the manifestation of adaptability points to the possibility of improving the characteristics of the swarms in different dynamic situations.


2014 ◽  
Vol 24 (8) ◽  
pp. 2132-2150
Author(s):  
Hong-Yan MEI ◽  
Yu-Jie ZHANG ◽  
Xiang-Wu MENG ◽  
Wen-Ming MA

2013 ◽  
Vol 9 ◽  
pp. 215-225 ◽  
Author(s):  
Tadeu Classe ◽  
Regina Braga ◽  
Fernanda Campos ◽  
José Maria N. David

2021 ◽  
Vol 54 (3) ◽  
pp. 1-28
Author(s):  
Jun Huang ◽  
Debiao He ◽  
Mohammad S. Obaidat ◽  
Pandi Vijayakumar ◽  
Min Luo ◽  
...  

Voting is a formal expression of opinion or choice, either positive or negative, made by an individual or a group of individuals. However, conventional voting systems tend to be centralized, which are known to suffer from security and efficiency limitations. Hence, there has been a trend of moving to decentralized voting systems, such as those based on blockchain. The latter is a decentralized digital ledger in a peer-to-peer network, where a copy of the append-only ledger of digitally signed and encrypted transactions is maintained by each participant. Therefore, in this article, we perform a comprehensive review of blockchain-based voting systems and classify them based on a number of features (e.g., the types of blockchain used, the consensus approaches used, and the scale of participants). By systematically analyzing and comparing the different blockchain-based voting systems, we also identify a number of limitations and research opportunities. Hopefully, this survey will provide an in-depth insight into the potential utility of blockchain in voting systems and device future research agenda.


Network ◽  
2021 ◽  
Vol 1 (2) ◽  
pp. 75-94
Author(s):  
Ed Kamya Kiyemba Edris ◽  
Mahdi Aiash ◽  
Jonathan Loo

Fifth Generation mobile networks (5G) promise to make network services provided by various Service Providers (SP) such as Mobile Network Operators (MNOs) and third-party SPs accessible from anywhere by the end-users through their User Equipment (UE). These services will be pushed closer to the edge for quick, seamless, and secure access. After being granted access to a service, the end-user will be able to cache and share data with other users. However, security measures should be in place for SP not only to secure the provisioning and access of those services but also, should be able to restrict what the end-users can do with the accessed data in or out of coverage. This can be facilitated by federated service authorization and access control mechanisms that restrict the caching and sharing of data accessed by the UE in different security domains. In this paper, we propose a Data Caching and Sharing Security (DCSS) protocol that leverages federated authorization to provide secure caching and sharing of data from multiple SPs in multiple security domains. We formally verify the proposed DCSS protocol using ProVerif and applied pi-calculus. Furthermore, a comprehensive security analysis of the security properties of the proposed DCSS protocol is conducted.


2018 ◽  
Vol 26 ◽  
pp. 1180-1192 ◽  
Author(s):  
Atin Angrish ◽  
Benjamin Craver ◽  
Mahmud Hasan ◽  
Binil Starly

Sign in / Sign up

Export Citation Format

Share Document