i-manager's Journal on Mobile Applications and Technologies (JMT)


Volume 1 Issue 3 August - October 2014

Research Paper

Technological Diffusion of Near Field Communication (NFC)

Tom Page*
Senior Lecturer, Electronic Product Design, Loughborough Design School, Loughborough University, United Kingdom
Page, T. (2014). Technological Diffusion of Near Field Communication (NFC). i-manager’s Journal on Mobile Applications and Technologies, 1(3), 1-15. https://doi.org/10.26634/jmt.1.3.3272

Abstract

This paper aims to assess how Near Field Communication (NFC) technology will impact on everyday life. Literature on this subject focuses on mobile payments as this was the original purpose for NFC. However, on further investigation there are other areas where NFC has a key role. Recent developments in Medical and ticketing based NFC applications show promise of being the so called “Catalyst” for NFC's integration. Both questionnaire and interview methods were used to gain further insight into the current standing of NFC. The focus of this paper was to determine if mobile payments will be the catalyst for widespread integration of NFC into society. Or will there be another area that will give the platform for NFC?

Research Paper

Detection Of Sybil Attack For P2P Security In MANETs

M. Reshma* , V. Sowmya Devi**
* M.Tech Scholar, Department of Computer Science and Engineering, GITAM University, Hyderabad, India.
** Assistant Professor, Department of Computer Science and Engineering, GITAM University, Hyderabad, India.
Reshma, M., and Devi, V.S. (2014). Detection Of Sybil Attack For P2P Security In MANETs . i-manager’s Journal on Mobile Applications and Technologies, 1(3), 16-20. https://doi.org/10.26634/jmt.1.3.3273

Abstract

A MANET is an infrastructure-less type network, which consists of the number of mobile nodes with wireless network interfaces. Sybil attack is a serious threat for today's wireless adhoc networks. In sybil attack, a single node pretends several other nodes using various malicious means. Here the authors considered the Topology based routing protocols like DSDV and DSR for the detection of sybil attacks in P2P system. Performance metrics such as packet delivery fraction, throughput and end-to-end delay are evaluated using NS-2.

Research Paper

A Scalable Server Architecture for Mobile Presence Services in Social Network Applications

Addala Radha Krishna*
* Associate Professor, Computer Science & Engineering, VSL Engineering College, Kakinada, Andhra Pradesh, India.
** Professor, Computer Science & Engineering, SIT, JNTU, Hyderabad, Andhra Pradesh, India.
Krishna, A.R., and Sekharaiah, K.C. (2014). A Scalable Server Architecture for Mobile Presence Services in Social Network Applications. i-manager’s Journal on Mobile Applications and Technologies, 1(3), 21-27. https://doi.org/10.26634/jmt.1.3.3274

Abstract

The use of social network is becoming gradually more popular on mobile devices. The important component of a social network application is a mobile presence service as it continuously uploads the existence information of each user's resembling online or offline, GPS site keep posting of friends information continually. In large-scale mobile presence services, if continuously keeping up to date information, then the huge number of messages shared out by the presence server may show the way to a scalability problem. So, the authors planned for an well-organized and scalable server design called Presence Cloud, to address the problems. Presence Cloud allows mobile presence services to support for the social network applications. Presence Cloud finds the existence of his/her companion and inform them of his/her appearance when a mobile user joins a network. For efficient presence searching, Presence Cloud categorizes presence servers categorized interested in a quorum-based server to server design in support of well-organized existence penetrating presence Cloud. To achieve small constant search latency like Directed search algorithms and a one-hop caching strategy, is also controlled by it. The authors scrutinized the presentation of Presence Cloud in periods of the search rate and search approval levels. Overall messages produced by the presence server when a user appears is called as the search rate. Search approval stage is characterized as the instance it obtains to find the new or in words user's companion catalog. The consequences of replications exhibit that Presence Cloud accomplishes presentation in the search rate without compromising search approval.

Research Paper

Energy Based Geographic Routing in Mobile Ad Hoc Networks

Vemana Chary* , P. Padmanabham**, Bhima Prabhakara Rao***
* Professor & HOD, Department of Electronics & Communication Engineering, Malla Reddy College of Engineering, Hyderabad, Telangana, India.
** Professor, Department of Computer Science Engineering, Bharat Institute of Engineering & Technology, Ibrahimpatnam, Hyderabad, Telangana, India.
*** Rector & Professor, JNTU Kakinada University Campus, Kakinada, Andhra Pradesh, India.
Chary, V., Padmanabham, and Rao, B.P. (2014). Energy Based Geographic Routing in Mobile Ad Hoc Networks. i-manager’s Journal on Mobile Applications and Technologies, 1(3), 28-35. https://doi.org/10.26634/jmt.1.3.3276

Abstract

In MANET (Mobile Adhoc Network), power is one of the major issue. MANET devices depend on limited battery power. However, routing in mobile networks is a challenging task and requires specialized routing protocols that are designed to cater to mobile environment factors, such as node connectivity, life time of node mobility, data transmission and Packet Delivery Ratio. This paper proposed a new scheme called Enhance Adaptive Position Update (E-APU) routing protocol which improves the existing on-demand routing protocols by introducing a power efficient scheme in the whole MANET. The main goal of this paper is not only to extend the lifetime of each node, but provides the lifetime of each node connection with low power consumption.

The paper presents a qualitative comparative study of geographic position based routing protocols with forwarding strategies for energy consumption and end to end delay. With the growing popularity of positioning devices, geographic routing protocols are one of the choices for use in Mobile Ad hoc Network. Periodic broadcasting of packets that contain the geographic location coordinates of the nodes is a popular method used by most Geographic routing (GEO) protocols to maintain neighbor positions. Ultimate aim is to reduce the energy consumption and receive more packets at minimum end to end delay with adaptive position updates. In addition, this proposed Enhance Adaptive Position Update (E-APU) scheme dynamically gives better solution for node movements.

Research Paper

Design of Secure Location And Message Sharing System For Android Platform

Juby Mathew*
Assistant Professor, MCA Department, Amal Jyothi College of Engineering, Kanjirapally, Kerala, India.
Mathew, J. (2014). Design of Secure Location And Message Sharing System For Android Platform. i-manager’s Journal on Mobile Applications and Technologies, 1(3), 36-46. https://doi.org/10.26634/jmt.1.3.3277

Abstract

Recently, there is a substantial surge in usage of mobile internet. Thanks to wide range of new Smart phones which are significantly capable to display full websites on small screens than ever before. Android stands out more than others because of its Multitasking, Ease of Notification, and Easy access to thousands of applications via the Google Android App Market, diverse Phone options. Present android-based location and message sharing system asks to input the personal information which fails to protect the privacy of information, has no centralized database which is causing the problem of data management and portability, and one main drawback is unable to have a secured two way communication between web server and android based application.

The Navel Security based approach of integrating group communication and navigation in android gadgets provides effective group communication and navigation. The system intends to achieve two major functions. First function is the effective group communication which provides all registered users to create friend groups, implement real-time communication. Second function is navigation which provides Map service and navigation function on the mobile client for users. It can support the surrounding query, location, path planning etc. Meanwhile, the two parts of the system can be integrated to locate the friend's position and implant path planning between friends. Security is the major concern for such group communication, in this proposed approach an encryption scheme is implemented to ensure secure communication. When a new user comes for registration, a set of images will be provided to him for selection. The user has to enter his username and an image is also required to select. When the user selects the image, that will be compared with the one that he has already selected. If the current image and the selected one match, then he would be allowed to enter the password. Hence, proper security for the system can be ensured.