1. Trang chủ
  2. » Công Nghệ Thông Tin

Enabling Technologies for Wireless E-Business phần 1 doc

40 298 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Nội dung

Enabl i n g Technolo gi es for W i reless E-Bus i nes s ABC Weidong Kou Yelena Yesha (Eds.) Wi th 141 F ig ures and 15 Table s Technologies for Wireless E-Business Enabling  c We i don g Ko u C hinese State Ke y Laborator y of ISN 2 South Taibai Road Xi an, Shaanxi, 710071 ’ a P eo p les Re p ublic of China Y elena Yesh a D epartment of Computer Sc i ence and E lectr i cal Eng i neer i ng U n i vers i ty of Maryland Balt i more County 1 000 H i lltop C i rcl e B alt i more, Maryland 21250, US A yeyes h a@um b c.e d u Library of Congress Control Number: 2005937332 I SBN-10 IS BN-1 3 T his work is sub j ect to cop y ri g ht. All ri g hts are reserved, whether the whole or part of the material is concerned, specificall y the ri g hts of translation, reprintin g , reuse of illustrations, recitation, broad - castin g , reproduction on microfilm or in an y other wa y , and stora g e in data banks. Duplication o f t his publication or parts thereof is permitted only under the provisions of the German Copyrigh t Law of September 9, 1965, in its current version, and permission for use must always be obtained from Spr i nger, V i olat i ons are l i able for prosecut i on under the German Copyr i ght Law. S pr i nger i s a part of Spr i nger Sc i ence+Bus i ness Med ia s pr i nger.co m S pr i nger-Verlag Berl i nHe i delberg 200 6 Pr i nted i n The Netherlands T he use of g eneral descr i pt i ve names, re gi stered names, trademarks, etc. i nth i s publ i cat i on does not i mpl y , even i n the absence of a spec i f i c statement, that such names are exempt from the relevant protective laws and re g ulations and therefore free for g eneral use . Cover desi g n: KünkelLopka, Heidelber g Printed on acid-free paper 45/ 3100/ SPI 5 4 3 2 1 0 A CM Classification: C.2 , C.3 , H.4 , J.1 Ty pesettin g : SPI Publisher Services usin g Sprin g er Word makropacka ge 3 -540-30449-5 Springer Berlin Heidelberg New York Editors 978-3-540-30449-4 Springer Berlin Heidelberg New York SPIN: 10959497 kou_weidong@yahoo.com.cn Foreword T he ke y messa g e that we have for readers is that wireless is bloomin g . The f ollowing statistics can show rea d ers that this is definitely true: y A ccordin g to Strate gy Anal y tics and UK-based Portio Research, at the end of 2005 there were over 2.1 billion m obile subscribers in the world. B y t h e en d of 2006 t h e mo bil e su b scr i b ers w ill reac h to t h e l eve l of 2.5 billions, and this fi g ure is expected t o in c r e a se t o c l ose t o 4 b illi o n by 2012. The worldwide mobile phone penet ration is predicted to easily t t p ass t h e 50% mar k b y t h e en d of 2009. y The Ministr y of Informat i on Industr y of China reported that at the en d o f 2005, the number of mobile subscr i bers in the country was close to 4 00 m illi ons. It i s pre di cte d t h at b y t h e en d of 2006, t h e num b er o f mobile subscribers in China can reach 440 millions. In addition, the n umber of short messages sent in China in 2005 was over 300 billions, a nd the associated revenue was close to $ 4 billion US dollars. y A ccordin g to LaNetro Zed based in Madrid of S p ain, at the end of 2005, West Euro p e has over 270 millions of wirele s s subscribers. G ermany i s t h e l argest mar k et for mo b il e p h ones i n Europe, w i t h 74.1 million users, and it has a penetration rate of 90%; Ital y is the secon d l argest market in Europe, with over 65.3 million mobile subscribers a n d a penetrat i on rate of 114%, t h e hi g h est i n t h e wor ld ; t h e Un i te d K in g dom has 64 million subscribers and a mobile phone penetration r ate of 106%; the p enetration ra t e in Finland stands at 100 % with n ear l y 5.2 m illi on su b scr ib ers. y I n 2005 t o tal n u m be r o f m ob il e se r v i ce subsc ri be r s in R uss ia ha s grown by 70 percent and reached 125.8 million, according to a recent r eport i n 2006 from A C&M consu l t i ng b ureau. y A ccordin g to Mobile Marketin g Ass o c iation, in the U nited States the n umber of wireless subscribers was over 200 millions. The data on the M o bil ep h one di scuss.com Forums s h ows th at 66% of US h ouse h o ld s o wn cell p hones. y I n Canada , with the number of subscribers to wireless p roducts an d s erv i ce tota li ng c l ose to 1 3.9 m illi on b y m id -2004, a l most 43% o f Canadians now have access to a wireless device. B y the end of 2005, it was estimated that this number is probably over 50%. y Gl o b a l w i re l ess serv i ce revenue i s e x pecte d to r i se 11% to $ 623.9 b illion. The g lobal wireless service industr y is expected to g enerate $ 800 billion in revenue in 2010, with emerging markets accounting for a b out 42% of t h e tota l . y W orldwide shi p ments of mobile p hones reached a record 242 million un i ts i n Q4 2005, surpass i n g t h e pr e vi ous pea k of 200 m illi on un i ts i n Q 4 2004, accordin g to iSuppli. For all of 2005, 813 million units were s hi pp ed, u p 14% from 713 million in 2004. T he list of statistics can g o on and on. The rapid g rowth in the number of wireless s ubscribers along with the emergence of new wireless technologies such as 3G an d W i -F i , a ll ow i ng for hi g h er transm i ss i on rates w ill l ea d to an exp l os i on of new e-business applications and services generally referred to as “wireless e-business”. y Wi re l ess e- b us i ness a ll ows peop l e to con d uc t b us i ness w i re l ess l y w i t h out p h ys i ca l connectivit y . A variet y of different d e v ices can be used for wireless e-business, i ncluding mobile phones, pagers, palm- p owered p ersonal c o mp uters (PCs), p ocket PCs, l aptop computers, an d ot h er mo bil e d ev i ces or d ev i ces connecte d to t h e w ir e l ess n e t wo rk s. Because w i re l ess e- b us i ness h o ld s t h e prom i se to res h ape t h e way b us i nesses conducted, and because it has a hu g e customer base, the advanta g es of wireless e -business are endless. The key is that people can break free from spatial an d tempora l constra i nts an d commun i cate an d transact i n b us i ness anyt i me an d an y w h ere. However, t h ere are a num b er of g reat c h a ll en g es, i nc l u di n g pro bl ems of s ustaining connectivity, l i mited resources such a s limited bandwidth and limited f requency spectrum, as we ll as t h e i ssues of secur i ty an d pr i vacy i n a w i re l ess e nv i ronment. To a dd ress t h ese pro bl ems an d i ssues, h u g e efforts h ave b een ma d e to develop a variety of e nabling technologies, in c luding new wireless communi- cat i on tec h no l og i es, w i re l ess secur i ty, w i re l ess app li cat i on protoco l s, mo bil e p a y ment protoco l s, mo bil e d ata mana g emen t , mo bil e a g ents, mo bil e pa y ment, mobile computin g , mobile services, a n d RFID technolo g ies. Drs. Weidon g Kou an d Ye l ena Yes h a h ave e di te d t hi s b oo k, w i t h ass i stance from t h e c h apter contr ib utors to cover t h ese tec h no l o gi es. I b e li eve t hi s i s an exce ll ent b oo k for b us i ness managers, e- b us i ness d eve l opers, aca d em i c researc h ers, un i vers i t y stu d ents, professors, an d profess i ona l consu l tants to acquire comprehensive knowled g e on en a blin g technolo g ies for the bloomin g w i re l ess e- b us i ness. I hi g hl y recommen d t hi s b oo k ! Ro b ert May b erry Vi ce Pres id ent , Sensors an d Actuators I BM Software Grou p VI Foreword Table of Contents 1 Introduction to Enabling Technologies for Wireless E-Business W . Kou and Y. Yesha 1 1 .1 Intro d uct i on 1 1. 2 A bou t T his B ook 3 R e f erences 5 2 Fundamentals o f Wi reless C ommun i cat i ons D. Shen an d V.O.K. L i 7 2.1 Intro d uct i on 7 2.2 Global S y stem for Mobile Communication 7 2.3 G enera l Pac k et Ra di o S erv i ce 15 2.4 Code Division Multiple Access S y stems 22 2.5 S ummar y 41 Re f e r e n ces 41 3 Wireless Securit y 4 4 3.1 Intro d uct i on 44 3.2 Mobile Certificate 46 3.3 E lli pt i c Curve Cryptograp h y for Mo bil e Comput i ng 51 3.4 Server Assisted Mobile Securit y Infrastructure 62 3.5 Summary 72 R eferences 7 3 4 Wireless A pp lication Protocol W . Kou 76 4.1 Introduction 76 4.2 W i re l ess App li cat i on Protoco l 76 4.3 Wireless Application Security 85 4.4 S ummary 86 4.5 A pp endix 86 R e f erences 8 7 W . - B. Lee T able of Contents 5 RFID Technolo gi es and Appl i cat i ons D. Kou, K. Zhao, Y. Tao and W. Ko u . 89 5.1 Introduction 89 5.2 C omponents 92 5.3 Middleware Technology 99 5.4 S tan d ar d s 102 5.5 Summar y 107 Re f e r e n ces 108 6 S o f tware In f rastructure f or C ontext-Aware Mob i le C omput i n g C.L. Wang, X.L. Z h ang, N. Be l aramani , P.L. Siu , Y. C h ow , and F. C .M. Lau 109 6 .1 Introduction 10 9 6 .2 Context-aware Mo bil e Comput i n g Infrastructure 111 6 .3 A Case Stud y – The Sparkle Pro j ect 115 6 .4 S ummar y 128 References 12 9 7 Data Mana g ement for Mobile Ad-Hoc Networks F . Perich , A. Joshi , an d R. Chirkova 132 7 .1 Introduction 132 7 .2 Ori g ins of Mobile Peer-to-Peer Computin g Model 133 7 .3 Challenges 135 7 .4 Peer-to-Peer Data Mana g ement Model 156 7 .5 Future Work 169 7 .6 S ummar y 170 R e f erences 171 8 Mobile Agents: The State of the Art B. Yang an d J. Li u 1 77 8.1 Intro d uct i on 1 77 8.2 System Facilities 178 8.3 M i grat i on an d P l ann i ng 180 8.4 Communication an d Interoperability 184 8.5 Secur i ty 190 8.6 Summary 194 Re f erences 197 VII I Table of Content s 9 Mult i agent C ommun i cat i on f or e-Bus i ness us i ng Tuple S paces H .F. Li , T. Ra d hakrishnan, an d Y. Zhan g . 199 9 .1 Intro d uct i on 1 99 9.2 Com p utation and Tu p le S p aces 200 9.3 Examp l es of A g ent Coor di nat i on i n e-Commerce 204 9.4 A Tuple Space Based Framework for A g ent C ommun i cat i on 207 9.5 A Case Stu dy i n e-Commerce Us i n g Tup l e Spaces 217 9.6 Summary 230 R e f e r e n ces 231 10 Mob i le Pa y ment Y . Liu, X. Cao, and L. Dan g 233 1 0 . 1 Intr oduc ti o n 233 1 0.2 Ch aracter i st i cs 233 1 0.3 A g ents 236 1 0.4 Secur i ty for Mo bil e Payment 244 1 0.5 Summar y 251 Re f erences 252 11 Mob i le C ontent Del i very Technolog i es Y . Yang, an d R. Yan 253 1 1 . 1 Intr oduc ti o n 253 1 1.2 Short Message Service 253 1 1 . 3 M u ltim ed ia M essa g in g Service 262 1 1.4 Transcoding Techni q ues 275 1 1.5 S ummar y 292 Re f erences 292 12 Mobile Services Computing L . Zhang, B. Li, an d Y. Song 2 99 1 2.1 W e b S erv i ces O verv i ew 299 1 2.2 Extending Web Services to Mobile Services 299 1 2.3 G enera l Arc hi tecture of Mo bil e S erv i ces 303 1 2.4 Two General A pp roaches to Develo p Web/Mobile Services 306 1 2.5 Case Stu d y – WAS ( W i re l ess A l arm System ) 306 1 2.6 Summar y 309 Re f erences 310 IX T a bl e of C ontents 13 Location-Aware Services and its Infrastructure Su pp ort Y. Chen and D. Liu 3 12 1 3.1 Introduction 312 1 3.2 Location Operatin g Reference Model and Infrastructure 313 1 3.3 Location Server 317 1 3.4 Movin g Ob j ect Databases 322 1 3.5 Spat i a l Pu bli s h/ Su b scr ibe En gi ne 326 1 3.6 Related Works 330 1 3.7 S ummary 332 R e f e r e n ces 332 14 Mobile Commerce and Wireless E-Business A pp lications S . S on g 335 1 4.1 Introduction 335 1 4.2 Mobile C ommerce 336 1 4.3 Wireless e-Business A pp lications 344 1 4.4 Case Stud y 354 1 4.5 Summary 359 References 35 9 G lossar y 361 A bout the Editor s 371 C ontr i butor s 3 7 3 , X I n d ex 379 1 Introduction to Enabling Technologies for Wireless E-Business *+ * + Department of E l ectr i ca l Eng i neer i ng an d Computer Sc i ences, Un i vers i ty of Mary l an d , B altimore Count y , USA 1.1 Introduction W ireless e-business allows p eo p le to communicate and transact in business vi a wireless technolo gy , without ph y sical connectivit y , such as wires or cablin g . W ireless e-business uses m a n y devices, includin g mob i le phones, pa g ers, palm- p owered p ersonal com p u t ers (PCs), p ocket PCs, la p to p com p uters, and other mo- b ile devices or devices connec t ed to the wireless networks. A dvancements in wireless t echnologies hold the pro m ise to reshape the way b us i nesses con d ucte d . Wi t h w i re l ess tec h no l og i es, peop l e can b rea k free from spa - ti a l an d tempora l constra i nts, as t h ey are a bl e to use t h ese tec h no l og i es to wor k anyw h ere an d anyt i me. W i t h w i re l ess e- b us i ness, compan i es can l ocate i nventory i tems, an y time, an y where; emer g enc y units are able to res p ond in real time; an d u niversities are able to mana g e communications across campuses. The rapi d g rowth in mobile telephony in recent years has provided a strong model for the ado p tion of undeterred wireless e-busi n ess. A number of consulting firms have made various estimations on the growth o f the number of mobile p hone users wor ld w id e. T h ese est i mat i ons are certa i n l y conf i rme d b y t h e h uge i ncrease i n t h e num b er of mo bil e p h one users i n C hi na – th e country current l y h as over 300 m il - li on mo bil e p h one users, more t h an t h e ent i re popu l at i on of t h e USA. T h e rap id tran si t io n fr o m f i x ed to mo bil e te l ep h on y w ill a l most certa i n ly b e fo ll owe d by a si m il ar trans i t i on from con d uct i n g e - b us i ness t h rou gh d es k to p com p uters v i a phy s i ca l connect i v i t y to wi re l ess e- b us i ness t h rou gh a var i et y of mo bil e d ev i ces via wireless communication networks in the near future. To make wireless e-business work effectively, a variety o f enabling technolo - g ies are needed. First, one mus t be connected wirelessly. This means that wireless commun i cat i ons networ k s must b e i n p l ace. From t h e f i rst commerc i a l G l o b a l System for Mobile Communication (GSM) net work launched in 1992 to 3G ser- t t v i ces l aunc h e d i n Hong K ong, UK, an d Ita l y i n recent years, w i re l ess commun i ca- t i on networ k s h ave penetrate d a l most ever y part of t h e wor ld . T h e 2G / 2.5G an d 3 G w i re l ess commun i cat i on s y stems are t h e cornerstones of w i re l ess commun i ca - t i ons. In a ddi t i on, t h ere are ot h er w i r e l ess networ k s, suc h as W i -F i , W i -Max, Bluetooth, and infrared. Wireless securit y i s c r uc ial f o r w ir e l ess e - bus in ess. A c - cessin g the Internet, di g itall y si g n i n g e-commerce transactions, authentication, and W. Kou and Y. Yasha * ISN Nat i ona l Key La b oratory, X idi an Un i vers i ty, X i ’an, C hi n a [...]... versions: A5 /1 and A5/2 A5 /1 is a proprietary 64-bit stream cipher, while A5/2 can be viewed as a weakened version of A5 /1 The schematic of A5 /1 is plotted in Fig 2.9 A5 /1 is mainly composed of three LSFRs of lengths 19 , 22, and 23 (totally 64), and denoted as R1, R2, and R3 The taps of feedback for R1 are at the bit positions of 13 , 16 , 17 , 18 ; for R2 they are 20, 21; and for R3at 7, 20, 21, 22 Then... SDU corrupt probability 1 10 −9 10 −9 10 −9 10 −9 2 10 −4 10 −5 10 −5 10 −6 3 10 −2 10 −5 10 −5 10 −2 Three delay classes are also defined, as presented in Table 2.2 Therefore, Classes 1 3 can offer guaranteed delay, while Class 4 corresponds to the best effort traffic with no delay guarantee 22 D Shen and V.O.K Li Table 2.2 Delay classes in GPRS delay (maximum values) SDU size: 12 8 octets delay classes... agents, and presents important technologies for implementing mobile agent systems Chapter 9 extends the discussions of mobile agents, by presenting how the coordination and information sharing among multiple agents can be done through the tuple space-based coordination model 1 Introduction to Enabling Technologies for Wireless E-Business 5 Mobile payment is crucial to wireless e-business, simply because... contribute to this book From wireless communication fundamentals to wireless applications, the book covers the major subjects related to enabling technologies for wireless e-business, including wireless security, mobile agents, mobile payment, mobile computing, mobile data management, location-based services, software infrastructure, wireless applir cation protocol, and RFID technologies Chapter 2 presents... are, the wireless e-business cannot survive Chapter 10 presents a variety of mobile payment technologies f Chapter 11 deals with mobile content delivery technologies, including messaging services technologies, such as short message service (SMS) and multimedia message service (MMS), and existing transcoding technologies of image, video, audio, and Web pages Web service is an effective technique for improving... used in neighboring bands Therefore, it is possible for a MS to connect to more than one BS at the same time An 2 Fundamentals of Wireless Communications Walsh code for user 1 25 Based station PN code Walsh code for user 2 Modulation User coded data Walsh code for user 1 Based station PN code Demodulation Walsh code for user 2 Based station PN code Demodulation Fig 2 .14 Downlink spreading using Walsh... is composed of either fiftyone 26-frame multiframes or twenty-six 51- frame multiframes, and lasts for 6 .12 s Then 2,038 superframes are grouped as a hyperframe, corresponding to a period of 3 h 28 min 53.760 s The organization of frames is plotted in Fig 2.3 n Hyperframe 0 Superframe 1 0 0 1 2 2046 2047 1 25 49 50 0 1 Frame 0 1 50 1 2 3 4 5 24 25 6 7 A time slot Fig 2.3 Organization of frames The cellular... future 1. 2 About This Book As doing e-business wirelessly is becoming a new trend and as there is a huge demand from business executives and managers, technological practitioners, students, and teachers who wish to know how e-business can be done wirelessly, and what the technologies to support wireless e-business are, this book is a response to this demand by providing readers with comprehensive information... channels Over the forward link it is used for data scrambling In Fig 2 .16 , we plot the block diagrams of the forward link Convolutional code adopted as the forward error correction scheme is IS-95 The long PN code is used for scrambling Walsh code is used as the spreading code The short PN code is adopted in quadrature spreading The modulation scheme over the forward link is QPSK Fig 2 .16 Forward link block... gross data rate for a time slot is 22.8 kbps With different degrees of puncturing, CS 1 has a net data rate of 9.05 kbps for each time slot, CS 2 has 13 .4 kbps, CS 3 has 15 .6 kbps, and CS 4 has 21. 4 kbps Obviously, CS 1 has the best error resilient capability, while CS 4 has the worst The CS modes give users the ability to adapt to channel conditions When the channel condition is bad, CS 1 should be used; . Grou p VI Foreword Table of Contents 1 Introduction to Enabling Technologies for Wireless E-Business W . Kou and Y. Yesha 1 1 .1 Intro d uct i on 1 1. 2 A bou t T his B ook 3 R e f erences. F. C .M. Lau 10 9 6 .1 Introduction 10 9 6 .2 Context-aware Mo bil e Comput i n g Infrastructure 11 1 6 .3 A Case Stud y – The Sparkle Pro j ect 11 5 6 .4 S ummar y 12 8 References 12 9 7 . Chen and D. Liu 3 12 1 3 .1 Introduction 312 1 3.2 Location Operatin g Reference Model and Infrastructure 313 1 3.3 Location Server 317 1 3.4 Movin g Ob j ect Databases 322 1 3.5 Spat i a l

Ngày đăng: 07/08/2014, 21:20