SlideShare a Scribd company logo
1 of 10
Download to read offline
Viral Message Passing Framework for Crowd and
              Sensor Applications

                   Eiman Kanjo1, Elizabeth Platzer2, Christian Kittl2
             1
                 Information Systems Department, CCIS, King Saud University
                                        Riyadh, KSA
                                     ekanjo.c@ksu.edu.sa
                                   2
                                     Evolaris, Austria, UK



      Abstract. Bluetooth, WiFi, and NFC are considered to be low power, af-
      fordable and available on most mobile handsets. However, these types of
      wireless mediums are classified as short links since their communication
      ranges are limited to ~100meters for WiFi and ~10 meters in the case of Blu-
      etooth which seems to stifle the full usefulness of the service. In this paper, we
      propose a new wireless network concept called ViralNet, solely dependent on
      the mobile devices in the vicinity using principles of opportunistic networking.
      ViralNet allow new type of communications beyond the short-range limit
      which can be used to connect to other phones and sensors distributed in the en-
      vironment. A message or sensor reading can be turned instantly viral. An au-
      thentic user or a monitoring device sends a message to others nearby and they
      do the same without internet connection. This can open the door to com-
      pletely new type of applications ranging from emergency evacuation in
      crowded areas and animal monitoring to citizen reportage, if the authori-
      ties want to keep an image from escaping the scene, they must confiscate hun-
      dreds or thousands of mobile phones.


      Keywords: Wireless networks, Mobile Sensing, Message Routing Protocols,
      Short-range communications.




1     Introduction

Internet, phones and mobile devices, such as mobile phones, enable an alternative
mode of communication to users, achieving global connectivity via infrastructure
networks (cellular, WLAN). However, centralised infrastructures are not always
available. During the recent revolutions in the Arabic world, governments have shut
down both Internet and Mobile phone services in an attempt to quell protests and
control communication among demonstrators. In addition, during natural disasters,
people have been left without means of finding out the latest news regarding emer-
gency services.
Local connectivity among portable devices may be obtained by forming ad-hoc
networks (Johnson et al., 2006) since the mobile devices are more or less always
turned on and have the necessary radio interfaces, processing power, storage capacity,
and battery lifetime to act as routers.
   Such sparse ad-hoc networks generally cannot support the type of end-to-end con-
nectivity required by large number of crowd spread widely in space beyond the indi-
vidual’s communication link, e.g. Bluetooth and WiFi.
   Instead, new techniques are required to expand these connections to reach most of
the people in the hot zone. Looping data between devices with one or more of these
wireless interfaces to disseminate information can create new adventurous communi-
cation scenarios.
   In this paper, we propose and analyze a fully distributed system based on short-link
wireless communications which allow an ephemeral message to be spread in a viral
manner to nearby nodes which in return connect to other nodes in epidemic manner.
   In short-time, a sharable message can float from one device to another and it’s
solely dependent on mobile devices and sensors in the vicinity using principles of
opportunistic networking.
   This new framework doesn’t just track and monitor people flow, it also sends sav-
able multimedia messages wirelessly which can alert to special announcements,
emergency call, environmental condition, new chants or the number of current people
in a queue.
   To protect privacy and to prevent spammers taking advantages of this system. Only
authorized users may create messages, e.g. policemen or event managers. The initia-
tor’s device starts disseminating the message to its neighbours within range, as do
other nodes, until the wireless range is extended from few meters to hundreds. This
work will be reported fully once the evaluation phase has fully completed.


2      The need for ViralNETs

There are billions of Bluetooth and WIFI chips embedded in portable and mobile
device. However short-range radio is considered as underutilized and used by the
least number of people (pcworld, 2011). The abundance of these devices in urban
areas could open up new possibilities for sensor data gathering and analysis.
    This has inspired many researchers to devise new concepts in order to utilise short
range radio in the last few years. The Bluetooth Specification (Bluetooth SIG, 2011)
describes the concept of a ScatterNet. A ScatterNet is defined as two or more Pico-
Nets joined together through the mechanism of a common node (bridging node).
There is also a growing body of research being conducted with the goal of developing
algorithms to efficiently form ScatterNets (Donegan et al., 2007). The MMPI library
was created to allow for parallel computing across Bluetooth enabled mobile devices
(Doolan et al., 2002). Bluetooth mobile advertising system is developed by (Aalto et
al., 2004) which used Bluetooth for delivering permission-based location- aware ad-
vertisements to mobile phones. More recent work, (Davidrajuh et al., 2007) described
building a wireless information system by using the Bluetooth wireless technology.
Another relating system is ZebraNet. ZebraNet is a mobile, wireless sensor network in
which nodes carried by animals move throughout an environment working to gather
and process information about their surroundings. Each node is equipped with a GPS
unit in order to log position information. This information is then passed from zebra to
zebra using peer-to-peer protocols until it reaches a base station where it can be
                       peer
processed and analyzed. These systems suffer from similar limitations, as they are
limited to the short range link and messages can’t reach people in a large venue.
   What we propose here is a new light and affordable framework in order to uti-         ut
lise the short range radio in mobile and proposed ViralNet is more portable d            de-
vices. The suitable for spreading messages between users on the move or in crowded
zones. For example it can help people at the back of a crowd or queue to have a pic-
    es.                                                                                 pi
ture of their position of overall structure. This will stop them from contributing un-   u
knowingly to the forces which can build up, reaching crushing levels at the front of
the crowd. It is completely Ad hoc in the way the messages are spread between mo
       owd.                   Ad-hoc                                                  mov-
ing or stationary users without using any centralised base-station or fixed infrastruc-
                                                          base station           infrastru
ture. The communication is at application level and between individual devices which
are preconfigured with the custom software. There is no need for PicoNets and all act
           figured
both as a server and a client, and that the server and client parts share a persistent mes-
                                                                                       me
sage pool between them.




    Fig. 1. ViralNet topology b
                              based mainly on mobile devices with short-range radio capability
                                                                                             y.


3         Design Concepts

In our deployments, ViralN nodes use short- range wireless protocol. We use Blu-
                           alNet                                                 B
etooth primarily because t ease of development and configuration. As a commod
                            the                                                  odi-
ty protocol, it is available on most modern mobile phones at very low cost. Ultimat
                                                                                 ate-
ly we look for Bluetooth 4.0 to combine low-power rendezvous and 802.11-speed
                          th                                                      eed
communication.
WiFi-based messaging is not ideal for viral messaging since it is associated with
high power demands, difficulty in set up and maintenance, small market penetration
of suitable handsets and difficulty in convincing users to leave handset WiFi turned
on. However with most people using their phones to access the Internet, the ViralNet
message could be broadcasted through a mobile phone with a WiFi friendly name.
Then the unit will broadcast out the message to the WiFi network. When a user sees
the network and connects to it, the message will be played. WiFi works with phones,
laptops and tablet PC's meaning a greater reach to users.
   Bluetooth capabilities of most mobile phones and similarly-powered devices are
typically limited to a transmission range of approximately 10 metres. Each device can
be uniquely identified within the system; however we set the Bluetooth name to be
the same on all the participating devices. If a user’s Bluetooth device is in range, a
message can be routed and pushed to the mobile device. The message can then
be accepted or rejected by the user. Mobile Nodes only store messages temporarily,
before it re-transmitted again to a new neighbouring node which is within the Blu-
etooth range of the second device. Other mobile node d1 subscribed to the service
will be able to obtain a copy when it gets “in range R1”, this turns the new device d2
into data mule which in return disseminates the message to other devices in range.
One of the main questions in implementation feasibility is that ViralNet capable of
operating without user intervention. This implies three points divided in three parts:
first, the transfer of messages must be allowed without needing the user to acknowl-
edge each transfer. Second, there should be no need to pair or authenticate the devices
to each other. Third, it should be possible to run the ViralNet application in the back-
ground.
   The following are three additional design concepts that we have taken into consid-
eration at the development stage:
• Privacy and security control – users need comprehensive control of their privacy
    and security settings by allowing them to reject a sender/service. ViralNet is NOT
    considered a spam as it is completely permission based so the mobile user will re-
    ceive an invitation to accept the message, if they choose to accept it, it will then be
    viewed and downloaded to their phone. If they decline the invitation, the advert
    will NOT be sent so the mobile user is in complete control and will not be offered
    that same message to their mobiles again unless they choose to.
• Fast and simple interface - People are unlikely to be able to give their full atten-
    tion to interacting with their mobile phones while walking. An easy and conve-
    nient method such as sound recording allows event managers to spend less time on
    creating their messages.
• Free-of-charge - People are concerned about the costs of sharing content such as
    access fees. Bluetooth-enabled mobile phones without additional equipments and
    service charge can encourage the use of the service of this type in the exuberant
    information context.
4      Sensor Data Collection and Dissemination

Sensors have begun to infiltrate people's everyday lives. Generally, sensors provide
information about various aspects of the real world and they form a new para-
digm e.g. the personal sensor network such as heart monitors, and body tempera-
ture in which the individual becomes the sensor hub.
   ViralNet brings sensors and wireless networks fruitfully in one network. It will
allow people to cross-reference publicly available spatially and temporally data -
traffic, weather, air quality, -within their vicinity and feel rhythms of their communi-
ty. We are interested in exploring this possibility by linking sensors to short-link
enabled devices such mobile phones and hence passing sensor data to other de-
vices in proximity which in turns can pass the data to other devices. This structure
facilitates collaborative and affordable data collection system as well as informa-
tion dissemination tailored to communities This will be particularly useful in passing
environmental data produced by sensors to nearby users even without a centralised
phone infrastructure.


5      Technical Framework

In this work, we developed ViralNet as custom mobile application written in Java
targeting Android Mobile phones platform 2.1 onward. However, mobile platforms
with API higher than 10 (a.k.a.2.3.3 or Gingerbread), are preferred since it allow in-
secure Bluetooth socket connection over RECOMM Serial Protocol, which effec-
tively can establish a connection without explicit pairing.
   Our system runs at the application layer in the Bluetooth stack which consists
of the protocols that are run over the host protocol layers. We currently use serial
port emulation through RFCOMM to transfer data. Also we are interested in the
TCP/IP protocol stack which is enabled over PPP over RFCOMM, and the object
exchange protocol, OBEX, which is also run over RFCOMM.
   The Viral network formation is initiated by a single node ‘the initiator’ that
searches for other nodes in its vicinity to acquire a connection in order to send the
message. This in turn pages its nearest neighbour to pass the floating message to it and
so on. In this case the Bluetooth range can be extended to wider geographical area,
(see Fig 2).
   Each floating message is timed by its originator according to the content of the
message. For example, a message sent to fan in sport event might be relevant only for
few minutes. All nodes are given the same Bluetooth friendly name “ViralNet”. As
mentioned above, mobile phones with API higher than 10 can be paired automatically.
Unfortunately the latest android platforms impose security restrictions on Bluetooth
connections which is governed by the ability of the device to find other nodes with
their discoverability manually turned on every five minutes. The discovery process
usually involves an inquiry scan of about 12 seconds, followed by a page scan of each
found device to retrieve its Bluetooth name. However, Pre-paired devices or connec-
tion using MAC address doesn’t require the target node to be visible. In addition, we
believe advanced development platforms for mobile devices are emerging and these
will hopefully enable developers to set Bluetooth discovery visibility as required (this
was possible with Nokia S series).
                        S60




                               Fig. 2. ViralNet message path.


6      User Interface

Since the floating messages could be audio files, sensor readings, text messages, im-   i
ages, video or even sequence of vibrations, a dedicated interface is built to allow mes-
                                                                                      me
sage initiators to broadcast their messages on the go. ViraNet interface includes sim-si
ple tools to help users to create and edit their text or media files such as voice record-
                                                                                   recor
er, and image editor, text editor and paintbrush type of applications, (see Fig. 3). In
addition, the interface can grab sensor data from a previously built MobSens applica-
                                                                                  applic
tion (Kannjo, 2009). The sensor data can be transmitted as a sensor reading message
                    ).                         transmitted
when the message initiator selects this option.
   In addition, a dedicated service is being implemented in order to allow the so
                       icated                                                          oft-
ware to work in the backg   kground without UI or with bind service method which al-
lows simple widget to a      appear on the screen to provide communication with it   ith
through simplified interface exposed by the service.
                            ace
   To fully test the domi effect of the system in passing messages, one need a
                             ino                                                      ds
significant number of mob devices (far in excess of eight) to cover a 100 squ
                            obile                                                      uare
meter zone. Such resources were unavailable at the time of implementation, but we
                            ces
have a plan to get more devices for extensive evaluation process which will be re-
ported in a future publicati
                        lication.
Fig. 3 A screenshot of ViralNet mobile interface.
                          3.

    The development phas was carried out mainly tested on four Android phone
                           se                                                 es.
These are HTC Desire HD, HTC Desire, Nexus S and LG Optimus, and LG Opti-
                      e
mus 3D. We found that th system performs well on Samsung Nexus and LG Opti-
                           he
mus, nevertheless, we faced some difficulties with the HTC phones. The HTC D
                         aced                                            C De-
sire HD was performing well when a request is made to connect to the device to
                         g                                                ice
deliver a message. Howev the same device failed to initiate a Bluetooth conne
                        wever                                                ec-
tion with other phones.


7      Message Passing: High level Description

Everything begins when a message is created. The messages can either be a sensor
reading or it can be created using the phone interface. The sensor reading mes-    me
sage is usually created automatically using mobile or stationary sensors available on
the phone or in a particular area. As far as ViralNet is concerned, there is no restric-
                                                                                restri
tion of what kind of message is being delivered. The size of the message may be an
                                                                    message
issue, though, and the data types used partly dictate what kind of protocol can be used
to deliver this message to the final recipient. The message is injected by a local sys-
                                                                                   sy
tem to the message pool. From this point onwards, the message is like just any other
message in ViralNet. It does not receive any preferential treatment.
We consider the forward   rding of the message m between k mobile nodes, wh        hich
represent community mem   mbers.
   Since the direct path between the sender s and the receiver r is not alwa        ays
available, our network bel  elongs to the Delay Tolerant and opportunistic network orks
(Fall, 2003). This means Messages and sensor readings can be sent in a one- w
                          s                                                        way
system due to the fact that routing is opportunistic and the message path cannot be
                            at
guaranteed to be valid at any future point in time, bi- directionality is very hard to
attain.
   In message flooding scenario, a node n2 will receive a copy of message m once in
contact with node n1 the current carrier of the message. Flooding (Zhang, 2006) can
potentially return the highest success rate in passing a message through the network,
however the large amount of data generated by large number of nodes can lead
to exorbitant demands for network bandwidth processing time and energy. Care
would be needed to ensure that a given node was not saturated with connection
requests from a series of nearby handsets. Therefore, we are working on a simple and
intelligent protocol that selects nodes with higher delivery probability, i.e. nodes that
meet large number of other nodes, or nodes at the edge of the current node range. In
other words, the number of connections should be reduced dramatically by inverting
the connection criteria to furthest node in the range instead of the nearest. This will
minimise the number of connection to one per each Bluetooth zone. In this case the
algorithm will be selective and only small percentage of users -who are evenly dis-
tributed- will receive the message which in turn can distribute this message verbally
directly to the people right next to them. This means that not all nodes need to be
connected to. Instead coming to contact with fewer nodes might be enough.
   At the time t of the forwarding process, assuming that m is carried by a
                                        n1-2      n1-3
mobile n1 which meets n2 and n3, if P          t>P       t, then n1 transmits m to n3 by the
delivery deadline Dm.
    And since our objective is to route the message m between k mobile nodes
from s to r, we will be developing our message forwarding algorithm as the optimi-
zation solution, which maximizes the delivery probability Pnt of the message m
from s to r and meets the delivery deadline Dm as follows:
                                       max Pnt                                          (1)

                                    s.t. Tm <Dm                                         (2)
    By using one or more of Bluetooth metrics such as RSSI it will be possible to de-
cide which node to send the message to RSSI (Signal Strength Indicator).
RSSI measurement is helpful since, it does not involve sending extra data wirelessly
and so it does not consume power at the mobile device (Bandara, 2004).
     The floating message should be forwarded only to new devices; cross-sending
(i.e. sending the message twice or more to the same recipient) is not permitted. As
long as there are enough mobile devices around to receive and disseminate a piece
of content, it floats. When the node density becomes too low (even temporarily—
longer than the expiry threshold), the content disappears, unless it was reactivated
by the initiator.
    A robust forwarding algorithm is needed to make ViralNets functional, since any
algorithm that requires keeping global information is not suitable since the Blu-
etooth nodes are resource constrained and there is a large number of nodes which
can add to quickly to the message overhead. To avoid a situation where a message is
passed back and forth between two devices, the receiving party stores the sending
device’s Bluetooth device address with the message when it is put in the pool. This
is checked before sending the message. The address is deleted immediately after the
message has been forwarded. Also, the sender of the message should retain the Blu-
etooth device address of the last device it communicated with and avoid sending
messages to it again. This way, all messages are not sent through the same route,
also the sizes of packet overhead when forwarding the message between nodes is
kept to minimum.


8      Conclusions and Outlook

This paper discusses the design tradeoffs and early experiences in developing a viral
framework for message passing in crowded places whether its sensor reading in wild-
life field or observation of people movements in crowded zones.
    We concluded that there is a potential for ViralNet approach. We intend to develop
our message passing algorithm further and evaluate the functionality system through a
set of experiments at the user and sensor levels. We are planning to conduct a user
test on number of participants this summer in Graz, Austria and Cambridge, UK to
test usability and user experiences.
    The expert interviews and the discussion will lead to several new requirements for
the acceptance of viral short-range broadcast services. They will be considered in the
further development of the framework as soon as they are validated.
    Looking forward, we believe that advanced development platforms for mobile de-
vices are emerging and these will hopefully provide low level access to handset sub-
systems such as Bluetooth.
    This in turn will permit handsets to be more active in the viral short range message
passing process since APIs and behaviors will standardize and applications will be
easier to deploy.


9      Acknowledgement

   This research project was supported by a grant awarded to the Software and Know-
ledge Engineering Research Group from the Research Center of the Malaz Scientific
and Medical Colleges Center (RGP-VPP-157) and the College of Computer and In-
formation Sciences in King Saud University.


References
 1. Aalto, L., GĂśthlin, N., Korhonen, J. and Ojala, T.: Bluetooth and WAP push based lo-
    cation aware mobile advertising system, The Proceedings of the 2nd International Con-
    ference on Mobile systems, Applications and Services. Boston, MA. USA (2004)
 2. Bandara U., Hasegawa, M., Inoue, M., Morikawa, H., Aoyama, T.: Design and implemen-
    tation of a Bluetooth signal strength based location sensing system, IEEE Radio   and
    Wireless Conference, pp.319– 322. Atlanta USA (2004)
3. Bluetooth       SIG,     Bluetooth      Baseband     Specification      Version   1.0B,
    http://www.bluetooth.com, retrieved on October, (2011)
 4. Davidrajuh, R.: Exploring the use of bluetooth in building wireless information sys-
    tems, Int. J. Mobile Communications, Vol. 5, pp.1–10 (2007)
 5. Donegan B., Doolan D., Tabirca S.: Mobile Message Passing using a Scatternet Frame-
    work, International Journal of Communications & Control (2007)
 6. Doolan, D. C., Tabirca S., and Yang. L. T.: Mobile Parallel Computing, In 5th Interna-
    tional Symposium on Parallel and Distributed Computing (ISPDC06), pp 161–167, Timi-
    soara, Romania (2006)
 7. Fall K.: A Delay Tolerant Network Architecture for Challenged Internets, ACM
    SIGCOMM, pp 27-34 (2003)
 8. Johnson D.B. and Maltz D.A.,: Dynamic Source Routing in mobile ad hoc networks,
    Mobile Computing, (Ed. T. Imielinski and H. Korth), Kluwer Academic (1996)
 9. Kanjo E., Bacon J., Roberts D., Landshoff P., "MobSens: Making Smart Phones Smarter,"
    IEEE Pervasive Computing, vol. 8, no. 4, pp. 50-57 doi:10.1109/MPRV.2009.79, October
    ( 2009).
10. Matuszewski, M., Beijar, N., Lehtinen, J., Hyyrylainen, T.: Understanding Attitudes To-
    wards Mobile Peer-to-Peer Content Sharing Services, In: Portable Information
    Devices, 2007. PORTABLE07. IEEE International Conference on. pp. 1-5 (2007)
11. Srdjan K.: Bluetooth based wireless sensor networks implementation issues and solu-
    tions. 10th Telecommunications Forum (TELEFOR) (2002)
12. www.pcworld.com/article/129926/bluetooth_chip_to_get_makeover.html, retrieved on
    December, (2011)
13. Zhang, Y., Fromherz, M. P. J.: A robust and efficient flooding-based routing for wire-
    less sensor networks. Journal of Interconnection Networks, 7 (4): 549-568 (2006)

More Related Content

What's hot

The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)ainizbahari97
 
The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communicationHashtag IV
 
A Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a Review
A Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a ReviewA Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a Review
A Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a Reviewiosrjce
 
Mobile Ad Hoc Network
Mobile Ad Hoc NetworkMobile Ad Hoc Network
Mobile Ad Hoc NetworkAmanSharma1061
 
Light Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking TechnologyLight Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking Technologyvivatechijri
 
Manet overview
Manet overviewManet overview
Manet overviewAmalia Nurani
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocolijsrd.com
 
The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communicationRizwan Razman
 
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET Journal
 
Takeshi kato
Takeshi katoTakeshi kato
Takeshi katosafaeinfo
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architectureSwapnali Pawar
 
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET Journal
 

What's hot (18)

The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)The latest development networks and communications (Microsoft Word)
The latest development networks and communications (Microsoft Word)
 
The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communication
 
27 32
27 3227 32
27 32
 
ICTL
ICTLICTL
ICTL
 
H010524049
H010524049H010524049
H010524049
 
Manika
ManikaManika
Manika
 
211
211211
211
 
Networking
NetworkingNetworking
Networking
 
A Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a Review
A Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a ReviewA Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a Review
A Hybrid Approach for Performance Enhancement of VANET using CSMA-MACA: a Review
 
Mobile Ad Hoc Network
Mobile Ad Hoc NetworkMobile Ad Hoc Network
Mobile Ad Hoc Network
 
Light Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking TechnologyLight Fidelity(LiFi)- Wireless Optical Networking Technology
Light Fidelity(LiFi)- Wireless Optical Networking Technology
 
Manet overview
Manet overviewManet overview
Manet overview
 
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV ProtocolA Protocol/Scheme to mitigate DDos attacks using AODV Protocol
A Protocol/Scheme to mitigate DDos attacks using AODV Protocol
 
The latest development in network and communication
The latest development in network and communicationThe latest development in network and communication
The latest development in network and communication
 
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
IRJET- Reduction of Packet Data Loss in Wireless Mesh Network using Path Mech...
 
Takeshi kato
Takeshi katoTakeshi kato
Takeshi kato
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architecture
 
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
IRJET- Mobile Ad Hoc Network (MANET): Applications, Benefits and Performance ...
 

Similar to Viral Message Framework Extends Crowd Sensor Reach

Iaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd Iaetsd
 
module-1 part a.pptx
module-1 part a.pptxmodule-1 part a.pptx
module-1 part a.pptxSanthosh Krishna
 
Mobile computing
Mobile computingMobile computing
Mobile computingJeha Ryhan
 
Bluetooth technology_new.pptx
Bluetooth technology_new.pptxBluetooth technology_new.pptx
Bluetooth technology_new.pptxSumitSabale4
 
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologiesChandrakant Choure
 
Pan seminar
Pan seminarPan seminar
Pan seminarNaveen Vyas
 
A Review Paper On Viral Mobile Communications System
A Review Paper On Viral Mobile Communications SystemA Review Paper On Viral Mobile Communications System
A Review Paper On Viral Mobile Communications SystemMichele Thomas
 
44.pptx
44.pptx44.pptx
44.pptxjakjak36
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in ManetProf Ansari
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Saravana Kumar
 
module -1 fuill notes.pdf
module -1 fuill notes.pdfmodule -1 fuill notes.pdf
module -1 fuill notes.pdfSanthosh Krishna
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontationirjes
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & NetworkMaulen Bale
 
Report on 5 g technology
Report on 5 g technologyReport on 5 g technology
Report on 5 g technologyATUL YADAV
 
An Introduction To Computer Networking A Survey
An Introduction To Computer Networking  A SurveyAn Introduction To Computer Networking  A Survey
An Introduction To Computer Networking A SurveyCheryl Brown
 

Similar to Viral Message Framework Extends Crowd Sensor Reach (20)

A017220112
A017220112A017220112
A017220112
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Iaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networksIaetsd bluetooth based smart sensor networks
Iaetsd bluetooth based smart sensor networks
 
module-1 part a.pptx
module-1 part a.pptxmodule-1 part a.pptx
module-1 part a.pptx
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Bluetooth technology_new.pptx
Bluetooth technology_new.pptxBluetooth technology_new.pptx
Bluetooth technology_new.pptx
 
X25119123
X25119123X25119123
X25119123
 
Wireless communication technologies
Wireless communication technologiesWireless communication technologies
Wireless communication technologies
 
Pan seminar
Pan seminarPan seminar
Pan seminar
 
A Review Paper On Viral Mobile Communications System
A Review Paper On Viral Mobile Communications SystemA Review Paper On Viral Mobile Communications System
A Review Paper On Viral Mobile Communications System
 
Q0173299104
Q0173299104Q0173299104
Q0173299104
 
44.pptx
44.pptx44.pptx
44.pptx
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
Ichci13 submission 104 (1)
Ichci13 submission 104 (1)Ichci13 submission 104 (1)
Ichci13 submission 104 (1)
 
module -1 fuill notes.pdf
module -1 fuill notes.pdfmodule -1 fuill notes.pdf
module -1 fuill notes.pdf
 
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and ConfrontationInterference Revelation in Mobile Ad-hoc Networks and Confrontation
Interference Revelation in Mobile Ad-hoc Networks and Confrontation
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Report on 5 g technology
Report on 5 g technologyReport on 5 g technology
Report on 5 g technology
 
Essay On Wireless Technology
Essay On Wireless TechnologyEssay On Wireless Technology
Essay On Wireless Technology
 
An Introduction To Computer Networking A Survey
An Introduction To Computer Networking  A SurveyAn Introduction To Computer Networking  A Survey
An Introduction To Computer Networking A Survey
 

Recently uploaded

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 

Viral Message Framework Extends Crowd Sensor Reach

  • 1. Viral Message Passing Framework for Crowd and Sensor Applications Eiman Kanjo1, Elizabeth Platzer2, Christian Kittl2 1 Information Systems Department, CCIS, King Saud University Riyadh, KSA ekanjo.c@ksu.edu.sa 2 Evolaris, Austria, UK Abstract. Bluetooth, WiFi, and NFC are considered to be low power, af- fordable and available on most mobile handsets. However, these types of wireless mediums are classified as short links since their communication ranges are limited to ~100meters for WiFi and ~10 meters in the case of Blu- etooth which seems to stifle the full usefulness of the service. In this paper, we propose a new wireless network concept called ViralNet, solely dependent on the mobile devices in the vicinity using principles of opportunistic networking. ViralNet allow new type of communications beyond the short-range limit which can be used to connect to other phones and sensors distributed in the en- vironment. A message or sensor reading can be turned instantly viral. An au- thentic user or a monitoring device sends a message to others nearby and they do the same without internet connection. This can open the door to com- pletely new type of applications ranging from emergency evacuation in crowded areas and animal monitoring to citizen reportage, if the authori- ties want to keep an image from escaping the scene, they must confiscate hun- dreds or thousands of mobile phones. Keywords: Wireless networks, Mobile Sensing, Message Routing Protocols, Short-range communications. 1 Introduction Internet, phones and mobile devices, such as mobile phones, enable an alternative mode of communication to users, achieving global connectivity via infrastructure networks (cellular, WLAN). However, centralised infrastructures are not always available. During the recent revolutions in the Arabic world, governments have shut down both Internet and Mobile phone services in an attempt to quell protests and control communication among demonstrators. In addition, during natural disasters, people have been left without means of finding out the latest news regarding emer- gency services.
  • 2. Local connectivity among portable devices may be obtained by forming ad-hoc networks (Johnson et al., 2006) since the mobile devices are more or less always turned on and have the necessary radio interfaces, processing power, storage capacity, and battery lifetime to act as routers. Such sparse ad-hoc networks generally cannot support the type of end-to-end con- nectivity required by large number of crowd spread widely in space beyond the indi- vidual’s communication link, e.g. Bluetooth and WiFi. Instead, new techniques are required to expand these connections to reach most of the people in the hot zone. Looping data between devices with one or more of these wireless interfaces to disseminate information can create new adventurous communi- cation scenarios. In this paper, we propose and analyze a fully distributed system based on short-link wireless communications which allow an ephemeral message to be spread in a viral manner to nearby nodes which in return connect to other nodes in epidemic manner. In short-time, a sharable message can float from one device to another and it’s solely dependent on mobile devices and sensors in the vicinity using principles of opportunistic networking. This new framework doesn’t just track and monitor people flow, it also sends sav- able multimedia messages wirelessly which can alert to special announcements, emergency call, environmental condition, new chants or the number of current people in a queue. To protect privacy and to prevent spammers taking advantages of this system. Only authorized users may create messages, e.g. policemen or event managers. The initia- tor’s device starts disseminating the message to its neighbours within range, as do other nodes, until the wireless range is extended from few meters to hundreds. This work will be reported fully once the evaluation phase has fully completed. 2 The need for ViralNETs There are billions of Bluetooth and WIFI chips embedded in portable and mobile device. However short-range radio is considered as underutilized and used by the least number of people (pcworld, 2011). The abundance of these devices in urban areas could open up new possibilities for sensor data gathering and analysis. This has inspired many researchers to devise new concepts in order to utilise short range radio in the last few years. The Bluetooth Specification (Bluetooth SIG, 2011) describes the concept of a ScatterNet. A ScatterNet is defined as two or more Pico- Nets joined together through the mechanism of a common node (bridging node). There is also a growing body of research being conducted with the goal of developing algorithms to efficiently form ScatterNets (Donegan et al., 2007). The MMPI library was created to allow for parallel computing across Bluetooth enabled mobile devices (Doolan et al., 2002). Bluetooth mobile advertising system is developed by (Aalto et al., 2004) which used Bluetooth for delivering permission-based location- aware ad- vertisements to mobile phones. More recent work, (Davidrajuh et al., 2007) described building a wireless information system by using the Bluetooth wireless technology.
  • 3. Another relating system is ZebraNet. ZebraNet is a mobile, wireless sensor network in which nodes carried by animals move throughout an environment working to gather and process information about their surroundings. Each node is equipped with a GPS unit in order to log position information. This information is then passed from zebra to zebra using peer-to-peer protocols until it reaches a base station where it can be peer processed and analyzed. These systems suffer from similar limitations, as they are limited to the short range link and messages can’t reach people in a large venue. What we propose here is a new light and affordable framework in order to uti- ut lise the short range radio in mobile and proposed ViralNet is more portable d de- vices. The suitable for spreading messages between users on the move or in crowded zones. For example it can help people at the back of a crowd or queue to have a pic- es. pi ture of their position of overall structure. This will stop them from contributing un- u knowingly to the forces which can build up, reaching crushing levels at the front of the crowd. It is completely Ad hoc in the way the messages are spread between mo owd. Ad-hoc mov- ing or stationary users without using any centralised base-station or fixed infrastruc- base station infrastru ture. The communication is at application level and between individual devices which are preconfigured with the custom software. There is no need for PicoNets and all act figured both as a server and a client, and that the server and client parts share a persistent mes- me sage pool between them. Fig. 1. ViralNet topology b based mainly on mobile devices with short-range radio capability y. 3 Design Concepts In our deployments, ViralN nodes use short- range wireless protocol. We use Blu- alNet B etooth primarily because t ease of development and configuration. As a commod the odi- ty protocol, it is available on most modern mobile phones at very low cost. Ultimat ate- ly we look for Bluetooth 4.0 to combine low-power rendezvous and 802.11-speed th eed communication.
  • 4. WiFi-based messaging is not ideal for viral messaging since it is associated with high power demands, difficulty in set up and maintenance, small market penetration of suitable handsets and difficulty in convincing users to leave handset WiFi turned on. However with most people using their phones to access the Internet, the ViralNet message could be broadcasted through a mobile phone with a WiFi friendly name. Then the unit will broadcast out the message to the WiFi network. When a user sees the network and connects to it, the message will be played. WiFi works with phones, laptops and tablet PC's meaning a greater reach to users. Bluetooth capabilities of most mobile phones and similarly-powered devices are typically limited to a transmission range of approximately 10 metres. Each device can be uniquely identified within the system; however we set the Bluetooth name to be the same on all the participating devices. If a user’s Bluetooth device is in range, a message can be routed and pushed to the mobile device. The message can then be accepted or rejected by the user. Mobile Nodes only store messages temporarily, before it re-transmitted again to a new neighbouring node which is within the Blu- etooth range of the second device. Other mobile node d1 subscribed to the service will be able to obtain a copy when it gets “in range R1”, this turns the new device d2 into data mule which in return disseminates the message to other devices in range. One of the main questions in implementation feasibility is that ViralNet capable of operating without user intervention. This implies three points divided in three parts: first, the transfer of messages must be allowed without needing the user to acknowl- edge each transfer. Second, there should be no need to pair or authenticate the devices to each other. Third, it should be possible to run the ViralNet application in the back- ground. The following are three additional design concepts that we have taken into consid- eration at the development stage: • Privacy and security control – users need comprehensive control of their privacy and security settings by allowing them to reject a sender/service. ViralNet is NOT considered a spam as it is completely permission based so the mobile user will re- ceive an invitation to accept the message, if they choose to accept it, it will then be viewed and downloaded to their phone. If they decline the invitation, the advert will NOT be sent so the mobile user is in complete control and will not be offered that same message to their mobiles again unless they choose to. • Fast and simple interface - People are unlikely to be able to give their full atten- tion to interacting with their mobile phones while walking. An easy and conve- nient method such as sound recording allows event managers to spend less time on creating their messages. • Free-of-charge - People are concerned about the costs of sharing content such as access fees. Bluetooth-enabled mobile phones without additional equipments and service charge can encourage the use of the service of this type in the exuberant information context.
  • 5. 4 Sensor Data Collection and Dissemination Sensors have begun to infiltrate people's everyday lives. Generally, sensors provide information about various aspects of the real world and they form a new para- digm e.g. the personal sensor network such as heart monitors, and body tempera- ture in which the individual becomes the sensor hub. ViralNet brings sensors and wireless networks fruitfully in one network. It will allow people to cross-reference publicly available spatially and temporally data - traffic, weather, air quality, -within their vicinity and feel rhythms of their communi- ty. We are interested in exploring this possibility by linking sensors to short-link enabled devices such mobile phones and hence passing sensor data to other de- vices in proximity which in turns can pass the data to other devices. This structure facilitates collaborative and affordable data collection system as well as informa- tion dissemination tailored to communities This will be particularly useful in passing environmental data produced by sensors to nearby users even without a centralised phone infrastructure. 5 Technical Framework In this work, we developed ViralNet as custom mobile application written in Java targeting Android Mobile phones platform 2.1 onward. However, mobile platforms with API higher than 10 (a.k.a.2.3.3 or Gingerbread), are preferred since it allow in- secure Bluetooth socket connection over RECOMM Serial Protocol, which effec- tively can establish a connection without explicit pairing. Our system runs at the application layer in the Bluetooth stack which consists of the protocols that are run over the host protocol layers. We currently use serial port emulation through RFCOMM to transfer data. Also we are interested in the TCP/IP protocol stack which is enabled over PPP over RFCOMM, and the object exchange protocol, OBEX, which is also run over RFCOMM. The Viral network formation is initiated by a single node ‘the initiator’ that searches for other nodes in its vicinity to acquire a connection in order to send the message. This in turn pages its nearest neighbour to pass the floating message to it and so on. In this case the Bluetooth range can be extended to wider geographical area, (see Fig 2). Each floating message is timed by its originator according to the content of the message. For example, a message sent to fan in sport event might be relevant only for few minutes. All nodes are given the same Bluetooth friendly name “ViralNet”. As mentioned above, mobile phones with API higher than 10 can be paired automatically. Unfortunately the latest android platforms impose security restrictions on Bluetooth connections which is governed by the ability of the device to find other nodes with their discoverability manually turned on every five minutes. The discovery process usually involves an inquiry scan of about 12 seconds, followed by a page scan of each found device to retrieve its Bluetooth name. However, Pre-paired devices or connec- tion using MAC address doesn’t require the target node to be visible. In addition, we
  • 6. believe advanced development platforms for mobile devices are emerging and these will hopefully enable developers to set Bluetooth discovery visibility as required (this was possible with Nokia S series). S60 Fig. 2. ViralNet message path. 6 User Interface Since the floating messages could be audio files, sensor readings, text messages, im- i ages, video or even sequence of vibrations, a dedicated interface is built to allow mes- me sage initiators to broadcast their messages on the go. ViraNet interface includes sim-si ple tools to help users to create and edit their text or media files such as voice record- recor er, and image editor, text editor and paintbrush type of applications, (see Fig. 3). In addition, the interface can grab sensor data from a previously built MobSens applica- applic tion (Kannjo, 2009). The sensor data can be transmitted as a sensor reading message ). transmitted when the message initiator selects this option. In addition, a dedicated service is being implemented in order to allow the so icated oft- ware to work in the backg kground without UI or with bind service method which al- lows simple widget to a appear on the screen to provide communication with it ith through simplified interface exposed by the service. ace To fully test the domi effect of the system in passing messages, one need a ino ds significant number of mob devices (far in excess of eight) to cover a 100 squ obile uare meter zone. Such resources were unavailable at the time of implementation, but we ces have a plan to get more devices for extensive evaluation process which will be re- ported in a future publicati lication.
  • 7. Fig. 3 A screenshot of ViralNet mobile interface. 3. The development phas was carried out mainly tested on four Android phone se es. These are HTC Desire HD, HTC Desire, Nexus S and LG Optimus, and LG Opti- e mus 3D. We found that th system performs well on Samsung Nexus and LG Opti- he mus, nevertheless, we faced some difficulties with the HTC phones. The HTC D aced C De- sire HD was performing well when a request is made to connect to the device to g ice deliver a message. Howev the same device failed to initiate a Bluetooth conne wever ec- tion with other phones. 7 Message Passing: High level Description Everything begins when a message is created. The messages can either be a sensor reading or it can be created using the phone interface. The sensor reading mes- me sage is usually created automatically using mobile or stationary sensors available on the phone or in a particular area. As far as ViralNet is concerned, there is no restric- restri tion of what kind of message is being delivered. The size of the message may be an message issue, though, and the data types used partly dictate what kind of protocol can be used to deliver this message to the final recipient. The message is injected by a local sys- sy tem to the message pool. From this point onwards, the message is like just any other message in ViralNet. It does not receive any preferential treatment. We consider the forward rding of the message m between k mobile nodes, wh hich represent community mem mbers. Since the direct path between the sender s and the receiver r is not alwa ays available, our network bel elongs to the Delay Tolerant and opportunistic network orks (Fall, 2003). This means Messages and sensor readings can be sent in a one- w s way system due to the fact that routing is opportunistic and the message path cannot be at
  • 8. guaranteed to be valid at any future point in time, bi- directionality is very hard to attain. In message flooding scenario, a node n2 will receive a copy of message m once in contact with node n1 the current carrier of the message. Flooding (Zhang, 2006) can potentially return the highest success rate in passing a message through the network, however the large amount of data generated by large number of nodes can lead to exorbitant demands for network bandwidth processing time and energy. Care would be needed to ensure that a given node was not saturated with connection requests from a series of nearby handsets. Therefore, we are working on a simple and intelligent protocol that selects nodes with higher delivery probability, i.e. nodes that meet large number of other nodes, or nodes at the edge of the current node range. In other words, the number of connections should be reduced dramatically by inverting the connection criteria to furthest node in the range instead of the nearest. This will minimise the number of connection to one per each Bluetooth zone. In this case the algorithm will be selective and only small percentage of users -who are evenly dis- tributed- will receive the message which in turn can distribute this message verbally directly to the people right next to them. This means that not all nodes need to be connected to. Instead coming to contact with fewer nodes might be enough. At the time t of the forwarding process, assuming that m is carried by a n1-2 n1-3 mobile n1 which meets n2 and n3, if P t>P t, then n1 transmits m to n3 by the delivery deadline Dm. And since our objective is to route the message m between k mobile nodes from s to r, we will be developing our message forwarding algorithm as the optimi- zation solution, which maximizes the delivery probability Pnt of the message m from s to r and meets the delivery deadline Dm as follows: max Pnt (1) s.t. Tm <Dm (2) By using one or more of Bluetooth metrics such as RSSI it will be possible to de- cide which node to send the message to RSSI (Signal Strength Indicator). RSSI measurement is helpful since, it does not involve sending extra data wirelessly and so it does not consume power at the mobile device (Bandara, 2004). The floating message should be forwarded only to new devices; cross-sending (i.e. sending the message twice or more to the same recipient) is not permitted. As long as there are enough mobile devices around to receive and disseminate a piece of content, it floats. When the node density becomes too low (even temporarily— longer than the expiry threshold), the content disappears, unless it was reactivated by the initiator. A robust forwarding algorithm is needed to make ViralNets functional, since any algorithm that requires keeping global information is not suitable since the Blu- etooth nodes are resource constrained and there is a large number of nodes which can add to quickly to the message overhead. To avoid a situation where a message is
  • 9. passed back and forth between two devices, the receiving party stores the sending device’s Bluetooth device address with the message when it is put in the pool. This is checked before sending the message. The address is deleted immediately after the message has been forwarded. Also, the sender of the message should retain the Blu- etooth device address of the last device it communicated with and avoid sending messages to it again. This way, all messages are not sent through the same route, also the sizes of packet overhead when forwarding the message between nodes is kept to minimum. 8 Conclusions and Outlook This paper discusses the design tradeoffs and early experiences in developing a viral framework for message passing in crowded places whether its sensor reading in wild- life field or observation of people movements in crowded zones. We concluded that there is a potential for ViralNet approach. We intend to develop our message passing algorithm further and evaluate the functionality system through a set of experiments at the user and sensor levels. We are planning to conduct a user test on number of participants this summer in Graz, Austria and Cambridge, UK to test usability and user experiences. The expert interviews and the discussion will lead to several new requirements for the acceptance of viral short-range broadcast services. They will be considered in the further development of the framework as soon as they are validated. Looking forward, we believe that advanced development platforms for mobile de- vices are emerging and these will hopefully provide low level access to handset sub- systems such as Bluetooth. This in turn will permit handsets to be more active in the viral short range message passing process since APIs and behaviors will standardize and applications will be easier to deploy. 9 Acknowledgement This research project was supported by a grant awarded to the Software and Know- ledge Engineering Research Group from the Research Center of the Malaz Scientific and Medical Colleges Center (RGP-VPP-157) and the College of Computer and In- formation Sciences in King Saud University. References 1. Aalto, L., GĂśthlin, N., Korhonen, J. and Ojala, T.: Bluetooth and WAP push based lo- cation aware mobile advertising system, The Proceedings of the 2nd International Con- ference on Mobile systems, Applications and Services. Boston, MA. USA (2004) 2. Bandara U., Hasegawa, M., Inoue, M., Morikawa, H., Aoyama, T.: Design and implemen- tation of a Bluetooth signal strength based location sensing system, IEEE Radio and Wireless Conference, pp.319– 322. Atlanta USA (2004)
  • 10. 3. Bluetooth SIG, Bluetooth Baseband Specification Version 1.0B, http://www.bluetooth.com, retrieved on October, (2011) 4. Davidrajuh, R.: Exploring the use of bluetooth in building wireless information sys- tems, Int. J. Mobile Communications, Vol. 5, pp.1–10 (2007) 5. Donegan B., Doolan D., Tabirca S.: Mobile Message Passing using a Scatternet Frame- work, International Journal of Communications & Control (2007) 6. Doolan, D. C., Tabirca S., and Yang. L. T.: Mobile Parallel Computing, In 5th Interna- tional Symposium on Parallel and Distributed Computing (ISPDC06), pp 161–167, Timi- soara, Romania (2006) 7. Fall K.: A Delay Tolerant Network Architecture for Challenged Internets, ACM SIGCOMM, pp 27-34 (2003) 8. Johnson D.B. and Maltz D.A.,: Dynamic Source Routing in mobile ad hoc networks, Mobile Computing, (Ed. T. Imielinski and H. Korth), Kluwer Academic (1996) 9. Kanjo E., Bacon J., Roberts D., Landshoff P., "MobSens: Making Smart Phones Smarter," IEEE Pervasive Computing, vol. 8, no. 4, pp. 50-57 doi:10.1109/MPRV.2009.79, October ( 2009). 10. Matuszewski, M., Beijar, N., Lehtinen, J., Hyyrylainen, T.: Understanding Attitudes To- wards Mobile Peer-to-Peer Content Sharing Services, In: Portable Information Devices, 2007. PORTABLE07. IEEE International Conference on. pp. 1-5 (2007) 11. Srdjan K.: Bluetooth based wireless sensor networks implementation issues and solu- tions. 10th Telecommunications Forum (TELEFOR) (2002) 12. www.pcworld.com/article/129926/bluetooth_chip_to_get_makeover.html, retrieved on December, (2011) 13. Zhang, Y., Fromherz, M. P. J.: A robust and efficient flooding-based routing for wire- less sensor networks. Journal of Interconnection Networks, 7 (4): 549-568 (2006)