android titles adrit solutions

18
Contact Us: #42/5, 1 st Floor, 18 th Cross, 21 st Main, Vijayanagar, Bangalore-40 Land Mark: Near Maruthi Mandir ; www.adritsolutions.com ADRIT SOLUTIONS Ph: 7676768124 ; 9886878569 Email: [email protected] ANDROID APPLICATIONS IEEE TITLES - 2016-17 1. IEEE 2016: Dummy-Based User Location Anonymization Under Real-World Constraints Abstract: According to the growth of mobile devices equipped with a GPS receiver, a variety of location-based services (LBSs) have been launched. Since location information may reveal private information, preserving location privacy has become a significant issue. Previous studies proposed methods to preserve a users' privacy; however, most of them do not take physical constraints into consideration. In this paper, we focus on such constraints and propose a location privacy preservation method that can be applicable to a real environment. In particular, our method anonymizes the user's location by generating dummies which we simulate to behave like real human. It also considers traceability of the user's locations to quickly recover from an accidental reveal of the user's location. We conduct an experiment using five users' real GPS trajectories and compared our method with previous studies. The results show that our method ensures to anonymize the user's location within a pre- determined range. It also avoids fixing the relative positions of the user and dummies, which may give a hint for an LBS provider to identify the real user. In addition, we conducted a user experiment with 22 participants to evaluate the robustness of our method against humans. We asked participants to observe movements of a user and dummies and try to and the real user. As a result, we conformed that our method can anonymize the users' locations even against human's observation. 2. IEEE 2016: SBVLC: Secure Barcode-Based Visible Light Communication for Smartphones

Upload: adrit-techno-solutions

Post on 11-Jan-2017

38 views

Category:

Engineering


0 download

TRANSCRIPT

Page 1: Android titles adrit solutions

Contact Us: #42/5, 1st Floor, 18

th Cross, 21

st Main, Vijayanagar, Bangalore-40

Land Mark: Near Maruthi Mandir ; www.adritsolutions.com

ADRIT SOLUTIONS Ph: 7676768124 ; 9886878569 Email: [email protected]

ANDROID APPLICATIONS IEEE TITLES - 2016-17

1. IEEE 2016: Dummy-Based User Location Anonymization Under Real-World

Constraints

Abstract: According to the growth of mobile devices equipped with a GPS receiver, a

variety of location-based services (LBSs) have been launched. Since location

information may reveal private information, preserving location privacy has become a

significant issue. Previous studies proposed methods to preserve a users' privacy;

however, most of them do not take physical constraints into consideration. In this

paper, we focus on such constraints and propose a location privacy preservation

method that can be applicable to a real environment. In particular, our method

anonymizes the user's location by generating dummies which we simulate to behave

like real human. It also considers traceability of the user's locations to quickly recover

from an accidental reveal of the user's location. We conduct an experiment using five

users' real GPS trajectories and compared our method with previous studies. The

results show that our method ensures to anonymize the user's location within a pre-

determined range. It also avoids fixing the relative positions of the user and dummies,

which may give a hint for an LBS provider to identify the real user. In addition, we

conducted a user experiment with 22 participants to evaluate the robustness of our

method against humans. We asked participants to observe movements of a user and

dummies and try to and the real user. As a result, we conformed that our method can

anonymize the users' locations even against human's observation.

2. IEEE 2016: SBVLC: Secure Barcode-Based Visible Light Communication for

Smartphones

Page 2: Android titles adrit solutions

Contact Us: #42/5, 1st Floor, 18

th Cross, 21

st Main, Vijayanagar, Bangalore-40

Land Mark: Near Maruthi Mandir ; www.adritsolutions.com

Abstract: 2D barcodes have enjoyed a significant penetration rate in mobile

applications. This is largely due to the extremely low barrier to adoption—almost every

camera-enabled smartphone can scan 2D barcodes. As an alternative to NFC

technology, 2D barcodes have been increasingly used for security-sensitive mobile

applications including mobile payments and personal identification. However, the

security of barcode-based communication in mobile applications has not been

systematically studied. Due to the visual nature, 2D barcodes are subject to

eavesdropping when they are displayed on the smartphone screens. On the other hand,

the fundamental design principles of 2D barcodes make it difficult to add security

features. In this paper, we propose SBVLC—a secure system for barcode-based visible

light communication (VLC) between smartphones. We formally analyze the security of

SBVLC based on geometric models and propose physical security enhancement

mechanisms for barcode communication by manipulating screen view angles and

leveraging user-induced motions. We then develop three secure data exchange schemes

that encode information in barcode streams. These schemes are useful in many

security-sensitive mobile applications including private information sharing, secure

device pairing, and contactless payment. SBVLC is evaluated through extensive

experiments on both Android and iOS smartphones.

3. IEEE 2016: Mobile attendance using Near Field Communication and One-Time

Password

Page 3: Android titles adrit solutions

Contact Us: #42/5, 1st Floor, 18

th Cross, 21

st Main, Vijayanagar, Bangalore-40

Land Mark: Near Maruthi Mandir ; www.adritsolutions.com

Abstract: This paper introduces a Near Field Communication (NFC) supported College

M-Attendance system for University Students. Near Field Communication (NFC)

is one of the latest technologies in radio communications and being a subset of RFID

technology, it is growing at an enormous pace. NFC technology provides the fastest way

to communicate between two devices and it happens within a fraction of a second. It

has several applications in Mobile Communications and transactions. An NFC-

supported College M-Attendance system for University Students is discussed

as one potential use of this technology. The proposed framework replaces manual roll

calls and hence, making it resilient to forgery. It gives parents and professors

information about the students' attendance. The marking of attendance is quick,

unsupervised, and makes use of a One Time Password (OTP) to enhance the security of

the system and takes away the possibility of proxy attendance. This paper discusses

NFC as a technology that is more secure and convenient than the prevalent technology

of Bluetooth, and also elaborates on the proposed framework of the M-

Attendance system that makes use of this advantage that NFC has over other

technologies.

4. IEEE 2016: Context-Aware Mobile Cloud Computing and Its Challenges

Abstract: Cloud computing is gaining popularity due to virtually unlimited resources,

low capital cost, ease of adoption, flexible resource provisioning, and high scalability.

Considering these benefits, researchers envision the usage

of cloud computing for mobile devices to overcome the ever-increasing computational

and energy demands of smartphone applications. However, this requires specialized

context-ware application development models that can facilitate the development

of cloud-enabled applications capable of making context-aware computation offloading

decisions. This article provides an overview of mobile cloud computing technology,

focusing on its context-awareness aspects and challenges.

5. IEEE 2016: STAMP: Enabling Privacy-Preserving Location Proofs for Mobile

Users

Page 4: Android titles adrit solutions

Contact Us: #42/5, 1st Floor, 18

th Cross, 21

st Main, Vijayanagar, Bangalore-40

Land Mark: Near Maruthi Mandir ; www.adritsolutions.com

Abstract: Location-based services are quickly becoming immensely popular. In

addition to services based on users' current location, many potential services rely

on users' location history, or their spatial-temporal provenance. Malicious users may lie

about their spatial-temporal provenance without a carefully designed security system

for users to prove their past locations. In this paper, we present the Spatial-Temporal

provenance Assurance with Mutual Proofs (STAMP) scheme. STAMP is designed for ad-

hoc mobile users generating location proofs for each other in a distributed setting.

However, it can easily accommodate trusted mobile users and wireless access

points. STAMP ensures the integrity and non-transferability of the location proofs and

protects users' privacy. A semi-trusted Certification Authority is used to distribute

cryptographic keys as well as guard users against collusion by a light-weight entropy-

based trust evaluation approach. Our prototype implementation on the Android

platform shows that STAMP is low-cost in terms of computational and storage

resources. Extensive simulation experiments show that our entropy-based trust model

is able to achieve high collusion detection accuracy.

6. IEEE 2016: PRISM: PRivacy-aware Interest Sharing and Matching in Mobile

Social Networks

Page 5: Android titles adrit solutions

Contact Us: #42/5, 1st Floor, 18

th Cross, 21

st Main, Vijayanagar, Bangalore-40

Land Mark: Near Maruthi Mandir ; www.adritsolutions.com

Abstract: In a profile matchmaking application of mobile social networks, users need to

reveal their interests to each other in order to find the common interests. A malicious

user may harm a user by knowing his personal information. Therefore, mutual interests

need to be found in a privacy preserving manner. In this paper, we propose an efficient

privacy protection and interests sharing protocol referred to as PRivacy-aware Interest

Sharing and Matching (PRISM). PRISM enables users to discover mutual interests

without revealing their interests. Unlike existing approaches, PRISM does not require

revealing the interests to a trusted server. Moreover, the protocol considers attacking

scenarios that have not been addressed previously and provides an efficient solution.

The inherent mechanism reveals any cheating attempt by a malicious user. PRISM also

proposes the procedure to eliminate Sybil attacks. We analyze the security of PRISM

against both passive and active attacks. Through implementation, we also present a

detailed analysis of the performance of PRISM and compare it with existing approaches.

The results show the effectiveness of PRISM without any significant performance

degradation.

7. IEEE 2015: Just-in-Time Code Offloading for Wearable Computing

Page 6: Android titles adrit solutions

Contact Us: #42/5, 1st Floor, 18

th Cross, 21

st Main, Vijayanagar, Bangalore-40

Land Mark: Near Maruthi Mandir ; www.adritsolutions.com

Abstract: Wearable computing becomes an emerging computing paradigm for various

recently developed wearable devices, such as Google Glass and the Samsung Galaxy

Smart watch, which have significantly changed our daily life with new functions. To

magnify the applications on wearable devices with limited computational capability,

storage, and battery capacity, in this paper, we propose a novel three-layer architecture

consisting of wearable devices, mobile devices, and a remote cloud for code offloading.

In particular, we offload a portion of computation tasks from wearable devices to local

mobile devices or remote cloud such that even applications with a heavy computation

load can still be upheld on wearable devices. Furthermore, considering the special

characteristics and the requirements of wearable devices, we investigate

a code offloading strategy with a novel just-in-time objective, i.e., maximizing the

number of tasks that should be executed on wearable devices with guaranteed delay

requirements. Because of the NP-hardness of this problem as we prove, we propose a

fast heuristic algorithm based on the genetic algorithm to solve it. Finally, extensive

simulations are conducted to show that our proposed algorithm significantly

outperforms the other three offloading strategies.

8. IEEE 2015: Energy Cost Models of Smartphones for Task Offloading to the

Cloud

Page 7: Android titles adrit solutions

Contact Us: #42/5, 1st Floor, 18

th Cross, 21

st Main, Vijayanagar, Bangalore-40

Land Mark: Near Maruthi Mandir ; www.adritsolutions.com

Abstract: Task offloading from smartphones to the cloud is a promising

strategy to enhance the computing capability of smartphones and prolong their battery

life. However, task offloading introduces a communication cost for those devices.

Therefore, the consideration of the communication cost is crucial for the effectiveness

of task offloading. To make task offloading beneficial, one of the challenges

is to estimate the energy consumed in communication activities of task offloading.

Accurate energy estimation models will enable these devices to make the right

decisions as to whether or not to perform task offloading, based on the energy cost of

the communication activities. Simply put, if the offloading process consumes

less energy than processing the task on the device itself, then the task is offloaded

to the cloud. To design an energy-aware offloading strategy, we

develop energy models of the WLAN, third-generation, and fourth-generation interfaces

of smartphones. These models make smartphone scapable of accurately estimating

the energy cost of task offloading. We validate the models by conducting an extensive

set of experiments on five smartphones from different vendors. The experimental

results show that our estimation models accurately estimate

the energy required to offload tasks.

9. IEEE 2015: Context-Based Access Control Systems for Mobile Devices

Page 8: Android titles adrit solutions

Contact Us: #42/5, 1st Floor, 18

th Cross, 21

st Main, Vijayanagar, Bangalore-40

Land Mark: Near Maruthi Mandir ; www.adritsolutions.com

Abstract: Mobile Android applications often have access to sensitive data and

resources on the user device. Misuse of this data by malicious applications may result in

privacy breaches and sensitive data leakage. An example would be a malicious

application surreptitiously recording a confidential business conversation. The problem

arises from the fact that Android users do not have control over the application

capabilities once the applications have been granted the requested privileges upon

installation. In many cases, however, whether an application may get a privilege

depends on the specific user context and thus we need a context-

based access control mechanism by which privileges can be dynamically granted or

revoked to applications based on the specific context of the user. In this paper we

propose such an access control mechanism. Our implementation

of context differentiates between closely located sub-areas within the same location.

We have modified the Android operating system so that context-

based access control restrictions can be specified and enforced. We have performed

several experiments to assess the efficiency of our access control mechanism and the

accuracy of context detection.

10. IEEE 2015: Avatar: Mobile Distributed Computing in the Cloud

Page 9: Android titles adrit solutions

Contact Us: #42/5, 1st Floor, 18

th Cross, 21

st Main, Vijayanagar, Bangalore-40

Land Mark: Near Maruthi Mandir ; www.adritsolutions.com

Abstract: Avatar is a system that leverages cloud resources to support fast, scalable,

reliable, and energy efficient distributed computing over mobile devices. An avatar is a

per-user software entity in the cloud that runs apps on behalf of the

user's mobile devices. The avatars are instantiated as virtual machines in the cloud that

run the same operating system with the mobile devices. In this way, avatars provide

resource isolation and execute unmodified app components, which simplifies

technology adoption. Avatar apps execute over distributed and synchronized

(mobile device, avatar) pairs to achieve a global goal. The three main challenges that

must be overcome by the Avatar system are: creating a high-level programming model

and a middleware that enable effective execution of distributed applications on a

combination of mobile devices and avatars, re-designing the cloud architecture and

protocols to support billions of mobile users and mobile apps with very different

characteristics from the current cloud work loads, and explore new approaches that

balance privacy guarantees with app efficiency/usability. We have built a

basic Avatar prototype on Android devices and Android x86 virtual machines. An

application that searches for a lost child by analyzing the photos taken by people at a

crowded public event runs on top of this prototype.

11. IEEE 2015: Developing an efficient digital image watermarking for

smartphones

Page 10: Android titles adrit solutions

Contact Us: #42/5, 1st Floor, 18

th Cross, 21

st Main, Vijayanagar, Bangalore-40

Land Mark: Near Maruthi Mandir ; www.adritsolutions.com

Abstract: In recent years, Smartphone usage has been increasing rapidly to the point

where it surpassed all other electronic devices. Multimedia sharing and Image/Video

capturing are amongst the most utilized functionalities of smartphones. Smartphones

and Internet availability made the capture, transmission and storage of digital data very

easy and convenient. The simplicity, connectivity, and strong capabilities of such

devices make it very hard to protect the privacy and Intellectual Property (IP) of digital

multimedia. While all types of digital multimedia are at risk, digital images are severely

affected. Editing and converting digital images can be done quite easily, and hence

protecting them becomes even harder. Digital image watermarking is a technique used

to authenticate and protect the IP of digital images. In this paper we propose

an efficient and flexible digital watermarking system that runs on Android devices. The

system uses RAW images (a feature of the most recent Android software, called

Lollipop) to embed a watermark at an early stage before any modification and

conversion of the image. The system incorporates public-key cryptography for

increased protection. A simple and robust water marking technique is utilized for

efficiency. Other watermarking techniques are offered for flexibility. Finally, the system

uses the inherent features of the Android operating system to run in parallel and be

available to other applications.

12. IEEE 2015: Sesame: a secure and convenient mobile solution for passwords

Page 11: Android titles adrit solutions

Contact Us: #42/5, 1st Floor, 18

th Cross, 21

st Main, Vijayanagar, Bangalore-40

Land Mark: Near Maruthi Mandir ; www.adritsolutions.com

Abstract: Passwords are the main and most common method of remote authentication.

However, they have their own frustrating challenges. Users tend to

forget passwords that are chosen to be hard to guess .Password managers are an

approach to keeping our passwords safe. However, they mainly rely on one

master password to secure all of our passwords. If this master password is

compromised then all other passwords can be recovered. In this work, we

introduce Sesame: a secure yet convenient mobile-based, voice-

activated password manager. It combines all different methods of user authentication

to create a more robust digital vault for personal data. Each password is encrypted with

a new fresh key on the user's mobile device for maximum security. The keys are stored

in our servers in a protected format. The user has the option of backing up the

encrypted passwords in any cloud service. To view a password, the user only needs to

utter the name of a web service, and speaker and speech recognition are applied for

authentication. Only the key for that service is sent to the mobile application and the

password is decrypted and displayed. The biggest advantage of Sesame is that the user

need not assume any trust to neither our servers nor any cloud storage. Also, there is no

need to enter a master password every time since speaker recognition is used.

However, as an alternative to voice, users can view their passwords using a

master password in case voice is not available. We provide a brief analysis of the

security of our solution that has been implemented on Android platform and freely

available on Google Play. Sesame is an ideal and

practical solution for mobile password managers.

13. IEEE 2014: NFC based applications for visually impaired people - A review

Page 12: Android titles adrit solutions

Contact Us: #42/5, 1st Floor, 18

th Cross, 21

st Main, Vijayanagar, Bangalore-40

Land Mark: Near Maruthi Mandir ; www.adritsolutions.com

Abstract: Recent technological developments provide technical assistance that enables

supporting people with visual disabilities in their everyday tasks and improve their

quality of life. Considering that about 90% of the world visually impaired people live in

developing countries, particularly in the local context, in Saudi Arabia, there is a lack of

assistive tools and adapted environment supporting people with visual disabilities. To

overcome this problem, a wide variety of relatively inexpensive applications adapt Near

Field Communications (NFC) tagging technology in the development of assistive tools

for people with visual disabilities. In this article, we will systematically review the

current adaptation of NFC technology for visually disabled people and

introduce NFC practical applications to help them overcome challenging tasks that they

may encounter every day.

14. IEEE 2014: NFC based secure mobile healthcare system

Page 13: Android titles adrit solutions

Contact Us: #42/5, 1st Floor, 18

th Cross, 21

st Main, Vijayanagar, Bangalore-40

Land Mark: Near Maruthi Mandir ; www.adritsolutions.com

Abstract: With the recent increase in usage of mobile devices especially in developing

countries, they can be used for an efficient healthcare management. In this work, we

have proposed a novel architecture for improving healthcare system with the help of

Android based mobile devices with NFC [1] and Bluetooth interfaces, smartcard

technology on tamper resistant secure element (SE) for storing credentials and

secure data, and a Health Secure service on a hybrid cloud for security and health

record management. The main contribution of this paper is proposal of applications for

i) Secure Medical Tags for reducing medical errors and ii) Secure Health card for storing

Electronic Health Record (EHR) based on Secure NFC Tags, mobile device

using NFC P2P Mode or Card Emulation Mode. We have also briefly mentioned a basic

security framework requirement for the applications. Since NFC NDEF format is prone

to security attacks [2], we have utilized low level APIs on Android based mobile devices,

to securely access NFC tags such as MIFARE Classic tags with NFC-A (ISO 1443-3A)

properties. Simple touch of NFC enabled mobile devices can benefit both the patient as

well as the medical doctors by providing a robust and secure health flow. It can also

provide portability of devices and usability for health management in emergency

situation, overpopulated hospitals and remote locations.

15. IEEE 2014: Anti-theft application for android based devices

Page 14: Android titles adrit solutions

Contact Us: #42/5, 1st Floor, 18

th Cross, 21

st Main, Vijayanagar, Bangalore-40

Land Mark: Near Maruthi Mandir ; www.adritsolutions.com

Abstract: This paper presents a technique to improve anti-

theft for android based mobile phones by using different services like MMS instead of

SMS. As the use of smartphones, tablets, phablets based on android operating system is

increasing, many scenarios related with anti-theft have already been proposed and

many software based on anti-theft have also been developed, but most of these

software are not freely available and it's difficult to identify the thief by using these

software's e.g. GPS Tracking. We put forward a new scheme, which enhances the

present scenario, based on new technologies like Multimedia Messages. The scenario

proposed in this work is totally dependent on the hardware of your smartphone like

camera (front & back) and support for multimedia messages. Once this software is

installed, it will work in the background, stores the current SIM number in a variable

and keeps checking continuously for SIM change, whenever SIM gets changed from

mobile, it will take snapshots and record a video in the background i.e., without taking

user permission and then it will send an MMS, and number of snap shots, to an alternate

mobile number and an email id, which was provided during installation. The enviable

advantage of this software is that it is very easy to configure and it keeps running in the

background without interrupting the user. To some extent it helps the owner to identify

the thief.

16. IEEE 2014: Privacy-Preserving Optimal Meeting Location Determination on

Mobile Devices

Page 15: Android titles adrit solutions

Contact Us: #42/5, 1st Floor, 18

th Cross, 21

st Main, Vijayanagar, Bangalore-40

Land Mark: Near Maruthi Mandir ; www.adritsolutions.com

Abstract: Equipped with state-of-the-art smartphones and mobile devices, today's

highly interconnected urban population is increasingly dependent on these gadgets to

organize and plan their daily lives. These applications often rely on current (or

preferred) locations of individual users or a group of users to provide the desired

service, which jeopardizes their privacy; users do not necessarily want to reveal their

current (or preferred) locations to the service provider or to other, possibly untrusted,

users. In this paper, we propose privacy-preserving algorithms for determining

an optimal meeting location for a group of users. We perform a

thorough privacy evaluation by formally quantifying privacy-loss of the proposed

approaches. In order to study the performance of our algorithms in a real deployment,

we implement and test their execution efficiency on Nokia smartphones. By means of a

targeted user-study, we attempt to get an insight into the privacy-awareness of users

in location-based services and the usability of the proposed solutions.

17. IEEE 2014: How Long to Wait? Predicting Bus Arrival Time With Mobile Phone

Based Participatory Sensing

Page 16: Android titles adrit solutions

Contact Us: #42/5, 1st Floor, 18

th Cross, 21

st Main, Vijayanagar, Bangalore-40

Land Mark: Near Maruthi Mandir ; www.adritsolutions.com

Abstract: The bus arrival time is primary information to most city transport travelers.

Excessively long waiting time at bus stops often discourages the travelers and makes

them reluctant to take buses. In this paper, we present a bus arrival time prediction

system based on bus passengers' participatory sensing. With

commodity mobile phones, the bus passengers' surrounding environmental context is

effectively collected and utilized to estimate the bus traveling routes

and predict bus arrival time at various bus stops. The proposed system solely relies on

the collaborative effort of the participating users and is independent from

the bus operating companies, so it can be easily adopted to support universal bus

service systems without requesting support from particular bus operating companies.

Instead of referring to GPS-enabled location information, we resort to more generally

available and energy efficient sensing resources, including cell tower signals, movement

statuses, audio recordings, etc., which bring less burden to the participatory party and

encourage their participation. We develop a prototype system with different types of

Android-based mobile phones and comprehensively experiment with the NTU campus

shuttle buses as well as Singapore public buses over a 7-week period. The evaluation

results suggest that the proposed system achieves outstanding prediction accuracy

compared with those bus operator initiated and GPS supported solutions. We further

adopt our system and conduct quick trial experiments with London bus system for 4

days, which suggests the easy deployment of our system and promising system

performance across cities. At the same time, the proposed solution is more generally

available and energy friendly.

18. IEEE 2013: SPOC: A Secure and Privacy-Preserving Opportunistic Computing

Framework for Mobile-Healthcare Emergency

Page 17: Android titles adrit solutions

Contact Us: #42/5, 1st Floor, 18

th Cross, 21

st Main, Vijayanagar, Bangalore-40

Land Mark: Near Maruthi Mandir ; www.adritsolutions.com

Abstract: With the pervasiveness of smart phones and the advance of wireless body

sensor networks (BSNs),mobile Healthcare (m-Healthcare), which extends the

operation of Healthcare provider into a pervasive environment for better health

monitoring, has attracted considerable interest recently. However, the flourish of m-

Healthcare still faces many challenges including information security and privacy

preservation. In this paper, we propose a secure and privacy-

preserving opportunistic computingframework, called SPOC, for m-

Healthcare emergency. With SPOC, smart phone resources including computing power

and energy can be opportunistically gathered to process the computing-intensive

personal health information (PHI) during m-Healthcare emergency with

minimal privacy disclosure. In specific, to leverage the PHI privacy disclosure and the

high reliability of PHI process and transmission in m-Healthcare emergency, we

introduce an efficient user-centric privacy access control in SPOC framework, which is

based on an attribute-based access control and a new privacy-preserving scalar product

computation (PPSPC) technique, and allows a medical user to decide who can

participate in the opportunistic computing to assist in processing his overwhelming PHI

data. Detailed security analysis shows that the proposed SPOC framework can

efficiently achieve user-centric privacy access control in m-Healthcare emergency. In

addition, performance evaluations via extensive simulations demonstrate the SPOC's

effectiveness in term of providing high-reliable-PHI process and transmission while

minimizing the privacy disclosure during m-Healthcare emergency.

19. IEEE 2013: Wireless sensor networks using Android Virtual Devices and Near

Field Communication peer-to-peer emulation

Page 18: Android titles adrit solutions

Contact Us: #42/5, 1st Floor, 18

th Cross, 21

st Main, Vijayanagar, Bangalore-40

Land Mark: Near Maruthi Mandir ; www.adritsolutions.com

Abstract: Several new Android smartphones support Near Field Communication (NFC).

The Android SDK provides an NFC API that can be used to develop NFC applications

that conduct peer-to-peer (P2P) data exchange. The Android emulator does not support

P2P communication between instances of the Android Virtual Device (AVD). In

addition to this constraint, P2P experimentation on actual smartphones is difficult

due to limited NFC support. To fill the gap created by this minimal support, we propose

the Java Mail NFC API (JNFC). JNFC uses the Java Mail API to emulate the functionality of

the Android NFC P2P API. To evaluate the performance of JNFC, we created the

DroidWSN Wireless Sensor Network (WSN) model and implemented it as

an Android application. We design and conduct an experiment for our DroidWSN

model to measure the execution time of our Android application WSN on AVDs. We

compare our simulation results against those from a similar experiment that measured

the execution time of a WSN composed of Sun SPOT wireless devices. While the

execution time of our DroidWSN model is slower, we assert that our design is more

simple and flexible than that of our comparison study. We conclude that this benefit and

the factors of JNFC cost (it is open source), the quality and quantity

of Android smartphone sensors, and imminent Android smartphone support for NFC

P2P, combine to make JNFC and the Android AVD a platform for NFC and WSN research.

Our study also emphasizes the need for Google to create Android NFC P2P

and sensor emulation APIs.