ebook img

Enabling Technologies for Wireless E-Business PDF

395 Pages·2006·10.33 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Enabling Technologies for Wireless E-Business

Enabling Technologies for Wireless E-Business Weidong Kou Yelena Yesha (Eds.) Enabling Technologies for Wireless E-Business With141 Figures and 15 Tables ABC Editors Weidong Kou Chinese State Key Laboratory of ISN 2 South Taibai Road Xi’ aan, Shaanxi, 710071 Peoples Republic of China [email protected] Yelena Yesha Department of Computer Science and Electrical Engineering University of Maryland Baltimore County 1000 Hilltop Circle Baltimore, Maryland 21250, USA [email protected] ACMClassification:C.2, C.3, H.4, J.1 LibraryofCongressControlNumber:2005937332 ISBN-10 3-540-30449-5 SpringerBerlinHeidelbergNewYork ISBN-13 978-3-540-30449-4SpringerBerlinHeidelbergNewYork Thisworkissubjecttocopyright.Allrightsarereserved,whetherthewholeorpartofthematerial is concerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation,broad- casting, reproductiononmicrofilmorinanyotherway,andstorageindatabanks.Duplicationof this publication orpartsthereofispermittedonlyundertheprovisionsoftheGermanCopyright Law of September 9, 1965,initscurrentversion,andpermissionforusemustalwaysbeobtained from Springer, Violations are liableforprosecutionundertheGermanCopyrightLaw. SpringerisapartofSpringerScience+BusinessMedia springer.com (cid:1)c Springer-VerlagBerlinHeidelberg2006 PrintedinTheNetherlands Theuseofgeneraldescriptivenames,registerednames,trademarks,etc.inthispublicationdoesnot imply, evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protective laws andregulationsandthereforefreeforgeneraluse. Typesetting: SPIPublisher Services using Springer Word makropackage Coverdesign:KünkelLopka,Heidelberg Printedonacid-freepaper SPIN: 10959497 45/3100/SPI 543210 Foreword The key message that we have for readers is that wireless is blooming. The following statistics can show readers that this is definitely true: (cid:121) According to Strategy Analytics and UK-based Portio Research, at the end of 2005 there were over 2.1 billion mobile subscribers in the world. By the end of 2006 the mobile subscribers will reach to the level of 2.5 billions, and this figure is expected to increase to close to 4 billion by 2012. The worldwide mobile phone penetttration is predicted to easily pass the 50% mark by the end of 2009. (cid:121) The Ministry of Information Industry of China reported that at the end of 2005, the number of mobile subscribers in the country was close to 400 millions. It is predicted that by the end of 2006, the number of mobile subscribers in China can reach 440 millions. In addition, the number of short messages sent in China in 2005 was over 300 billions, and the associated revenue was close to $4 billion US dollars. (cid:121) According to LaNetro Zed based in Madrid of Spain, at the end of 2005, West Europe has over 270 millions of wireless subscribers. Germany is the largest market for mobile phones in Europe, with 74.1 million users, and it has a penetration rate of 90%; Italy is the second largest market in Europe, with over 65.3 million mobile subscribers and a penetration rate of 114%, the highest in the world; the United Kingdom has 64 million subscribers and a mobile phone penetration rate of 106%; the penetration rate in Finland stands at 100% with nearly 5.2 million subscribers. (cid:121) In 2005 total number of mobile service subscribers in Russia has grown by 70 percent and reached 125.8 million, according to a recent report in 2006 from AC&M consulting bureau. (cid:121) According to Mobile Marketing Association, in the United States the number of wireless subscribers was over 200 millions. The data on the Mobilephonediscuss.com Forums shows that 66% of US households own cell phones. (cid:121) In Canada, with the number of subscribers to wireless products and service totaling close to 13.9 million by mid-2004, almost 43% of Canadians now have access to a wireless device. By the end of 2005, it was estimated that this number is probably over 50%. (cid:121) Global wireless service revenue is expected to rise 11% to $623.9 billion. The global wireless service industry is expected to generate $800 billion in revenue in 2010, with emerging markets accounting for about 42% of the total. VI Foreword (cid:121) Worldwide shipments of mobile phones reached a record 242 million units in Q4 2005, surpassing the previous peak of 200 million units in Q4 2004, according to iSuppli. For all of 2005, 813 million units were shipped, up 14% from 713 million in 2004. The list of statistics can go on and on. The rapid growth in the number of wireless subscribers along with the emergence of new wireless technologies such as 3G and Wi-Fi, allowing for higher transmission rates will lead to an explosion of new e-business applications and services generallyyreferred to as “wireless e-business”. Wireless e-business allows people to conduct business wirelessly without physical connectivity. A variety of different devices can be used for wireless e-business, including mobile phones, pagers, palm-powered personal computers (PCs), pocket PCs, laptop computers, and other mobile devices or devices connected to the wireless networks. Because wireless e-business holds the promise to reshape the way businesses conducted, and because it has a huge customer base, the advantages of wireless e-business are endless. The key is that people can break free from spatial and temporal constraints and communicate and transact in business anytime and anywhere. However, there are a number of great challenges, including problems of sustaining connectivity, limited resources such as limited bandwidth and limited frequency spectrum, as well as the issues of security and privacy in a wireless environment. To address these problems and issues, huge efforts have been made to develop a variety of enabling technologies, including new wireless communi- cation technologies, wireless security, wireless application protocols, mobile payment protocols, mobile data management, mobile agents, mobile payment, mobile computing, mobile services, and RFID technologies. Drs. Weidong Kou and Yelena Yesha have edited this book, with assistance from the chapter contributors to cover these technologies. I believe this is an excellent book for business managers, e-business developers, academic researchers, university students, professors, and professional consultants to acquire comprehensive knowledge on enabling technologies for the blooming wireless e-business. I highly recommend this book! Robert Mayberry Vice President, Sensors and Actuators IBM Software Group Table of Contents 1 Introduction to Enabling Technologies for Wireless E-Business W. Kou and Y. Yesha............................................................................. 1 1.1 Introduction............................................................................ 1 1.2 About This Book.................................................................... 3 References.............................................................................. 5 2 Fundamentals of Wireless Communications D. Shen and V.O.K. Li ........................................................................ 7 2.1 Introduction............................................................................ 7 2.2 Global System for Mobile Communication............................ 7 2.3 General Packet Radio Service................................................ 15 2.4 Code Division Multiple Access Systems............................... 22 2.5 Summary................................................................................ 41 References.............................................................................. 41 3 Wireless Security W.-B. Lee............................................................................................. 44 3.1 Introduction............................................................................ 44 3.2 Mobile Certificate.................................................................. 46 3.3 Elliptic Curve Cryptography for Mobile Computing............. 51 3.4 Server Assisted Mobile Security Infrastructure...................... 62 3.5 Summary................................................................................ 72 References.............................................................................. 73 4 Wireless Application Protocol W. Kou.................................................................................................. 76 4.1 Introduction............................................................................ 76 4.2 Wireless Application Protocol................................................ 76 4.3 Wireless Application Security................................................ 85 4.4 Summary................................................................................ 86 4.5 Appendix................................................................................ 86 References.............................................................................. 87 VIII Table of Contents 5 RFID Technologies and Applications D. Kou, K. Zhao, Y. Tao and W. Kou................................................... 89 5.1 Introduction............................................................................ 89 5.2 Components............................................................................ 92 5.3 Middleware Technology......................................................... 99 5.4 Standards................................................................................ 102 5.5 Summary................................................................................ 107 References.............................................................................. 108 6 Software Infrastructure forContext-Aware Mobile Computing C.L. Wang, X.L. Zhang, N. Belaramani, P.L. Siu, Y. Chow, and F.C.M. Lau.................................................................................... 109 6.1 Introduction............................................................................ 109 6.2 Context-aware Mobile Computing Infrastructure.................. 111 6.3 A Case Study – The Sparkle Project...................................... 115 6.4 Summary................................................................................ 128 References.............................................................................. 129 7 Data Management for Mobile Ad-Hoc Networks F. Perich, A. Joshi, and R. Chirkova................................................... 132 7.1 Introduction............................................................................ 132 7.2 Origins of Mobile Peer-to-Peer Computing Model................ 133 7.3 Challenges............................................................................... 135 7.4 Peer-to-Peer Data Management Model.................................. 156 7.5 Future Work........................................................................... 169 7.6 Summary................................................................................ 170 References.............................................................................. 171 8 Mobile Agents: The State of the Art B. Yang and J. Liu................................................................................ 177 8.1 Introduction............................................................................ 177 8.2 System Facilities.................................................................... 178 8.3 Migration and Planning.......................................................... 180 8.4 Communication and Interoperability...................................... 184 8.5 Security.................................................................................. 190 8.6 Summary................................................................................ 194 References.............................................................................. 197 Table of Contents IX 9 Multiagent Communication for e-Business using Tuple Spaces H.F. Li, T. Radhakrishnan, and Y. Zhang............................................ 199 9.1 Introduction............................................................................ 199 9.2 Computation and Tuple Spaces.............................................. 200 9.3 Examples of Agent Coordination in e-Commerce.................. 204 9.4 A Tuple Space Based Framework for Agent Communication...................................................................... 207 9.5 A Case Study in e-Commerce Using Tuple Spaces............... 217 9.6 Summary................................................................................ 230 References.............................................................................. 231 10 Mobile Payment Y. Liu, X. Cao, and L. Dang................................................................. 233 10.1 Introduction............................................................................ 233 10.2 Characteristics........................................................................ 233 10.3 Agents.................................................................................... 236 10.4 Security for Mobile Payment................................................. 244 10.5 Summary................................................................................ 251 References.............................................................................. 252 11 Mobile Content Delivery Technologies Y. Yang, and R. Yan.............................................................................. 253 11.1 Introduction............................................................................ 253 11.2 Short Message Service........................................................... 253 11.3 Multimedia Messaging Service.............................................. 262 11.4 Transcoding Techniques......................................................... 275 11.5 Summary................................................................................ 292 References.............................................................................. 292 12 Mobile Services Computing L. Zhang, B. Li, and Y. Song................................................................ 299 12.1 Web Services Overview......................................................... 299 12.2 Extending Web Services to Mobile Services......................... 299 12.3 General Architecture of Mobile Services............................... 303 12.4 Two General Approaches to Develop Web/Mobile Services..... 306 12.5 Case Study – WAS (Wireless Alarm System)........................ 306 12.6 Summary................................................................................ 309 References.............................................................................. 310 X Table of Contents 13 Location-Aware Services and its Infrastructure Support Y. Chen, and D. Liu.............................................................................. 312 13.1 Introduction............................................................................ 312 13.2 Location Operating Reference Model and Infrastructure....... 313 13.3 Location Server...................................................................... 317 13.4 Moving Object Databases...................................................... 322 13.5 Spatial Publish/Subscribe Engine........................................... 326 13.6 Related Works........................................................................ 330 13.7 Summary................................................................................ 332 References.............................................................................. 332 14 Mobile Commerce and Wireless E-Business Applications S. Song.................................................................................................. 335 14.1 Introduction............................................................................ 335 14.2 Mobile Commerce.................................................................. 336 14.3 Wireless e-Business Applications.......................................... 344 14.4 Case Study.............................................................................. 354 14.5 Summary................................................................................ 359 References.............................................................................. 359 Glossary ............................................................................................................ 361 About the Editors............................................................................................. 371 Contributors...................................................................................................... 373 Index.................................................................................................................. 379 1 Introduction to Enabling Technologies for Wireless E-Business W. Kou**and Y. Yasha+ *ISN National Key Laboratory, Xidian University, Xi’an, China +Department of Electrical Engineering and Computer Sciences, University of Maryland, Baltimore County, USA 1.1 Introduction Wireless e-business allows people to communicate and transact in business via wireless technology, without physical connectivity, such as wires or cabling. Wireless e-business uses many devices, including mobile phones, pagers, palm- powered personal computers (PCs), pocket PCs, laptop computers, and other mo- bile devices or devices connected to the wireless networks. Advancements in wireless technologies hold the promise to reshape the way businesses conducted. With wireless technologies, people can break free from spa- tial and temporal constraints, as they are able to use these technologies to work anywhere and anytime. With wireless e-business, companies can locate inventory items, anytime, anywhere; emergency units are able to respond in real time; and universities are able to manage communications across campuses. The rapid growth in mobile telephony in recent years has provided a strong model for the adoption of undeterred wireless e-business. A number of consulting firms have made various estimations on the growth of the number of mobile phone users worldwide. These estimations are certainly confirmed by the huge increase in the number of mobile phone users in China – the country currently has over 300 mil- lion mobile phone users, more than the entire population of the USA. The rapid transition from fixed to mobile telephony will almost certainly be followed by a similar transition from conducting e-business through desktop computers via physical connectivity to wireless e-business through a variety of mobile devices via wireless communication networks in the near future. To make wireless e-business work effectively, a variety of enabling technolo- gies are needed. First, one must be connected wirelessly. This means that wireless communications networks must be in place. From the first commercial Global System for Mobile Communication (GSM) netttwork launched in 1992 to 3G ser- vices launched in Hong Kong, UK, and Italy in recent years, wireless communica- tion networks have penetrated almost every part of the world. The 2G/2.5G and 3G wireless communication systems are the cornerstones of wireless communica- tions. In addition, there are other wireless networks, such as Wi-Fi, Wi-Max, Bluetooth, and infrared. Wireless security is crucial for wireless e-business. Ac- cessing the Internet, digitally signing e-commerce transactions, authentication, and

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.