Mobil Peer-To-Peer Ağlarda Bluetooth Üzerinden Anlık Mesajlaşma Protokolü: IMOB

Servis tabanlı yazılım geliştirmede servis sağlayıcılar servislerini servis istemcilerinin kullanımına sunarlar. Bu, servis istemcilerinin kaynakların yetmemesi durumunda bir avantaj sağlar. Bu çalışmada servis tabanlı yazılım geliştirme ve mobil peer-to-peer ağlar incelenip anlık mesajlaşma protokolü olan IMOB geliştirilmiştir. Bu protokol açıklanıp örnek olarak servis sağlayıcı rolü modellenmiştir.

___

  • [1] M. P. Singh, “Pering at peer-to-peer computing”, IEEE Internet Computing, 05(1):4–5, 2001.
  • [2] G. Gehlen, and L. Pham, “Mobile Web Services for Peer-to-Peer Applications”, Consumer Communications and Networking Conference, 2005.
  • [3] G. Kortuem, J. Schneider, D. P. Thaddeus, G. C. Thompson, S. Fickas, and Z. Segall, “When Peer-toPeer comes Face-to-Face: Collaborative Peer-toPeer Computing in Mobile Ad hoc Networks”, First International Conference on Peer-to-Peer Computing, Link¨oping, Sweden, 27-29 August 2001.
  • [4] N. Maibaum, and T. Mundt, “JXTA: A Technology Facilitating Mobile Peer-To-Peer Networks”, International Mobility and Wireless Access Workshop (MobiWac’02), pp. 7-13, Fort Worth, Texas, USA, 12 October 2002.
  • [5] B. A. Miller, and C. Bisdikian, Bluetooth Revealed, Addison-Wesley, 2 edition, 2002.
  • [6] M. Wiberg, and A. Grönlund, “Exploring Mobile CSCW: Five areas of questions for further research”, Proceedings of IRIS23 (Information Research in Scandinavia), Trollhattan, Sweden, 2000.
  • [7] A. I. Wang, T. Bjørnsgård, and K. Saxlund, “Peer2Me - Rapid Application Framework for Mobile Peer-to-Peer Applications”, 2007 International Symposium on Collaborative Technologies and Systems (CTS 2007), page 10, Orlando, Florida, USA, May 21-25, 2007.
  • [8] Wikipedia, https://en.wikipedia.org/, 2018.
  • [9] V. Shmatikov and J. C. Mitchell, “Analysis of a Fair Exchange Protocol”, http://www.isoc.org/isoc/conferences/ndss/2000/proceedings/001.pdf, 2000.
  • [10] P. H. Drielsma and S. Mödersheim, “The ASW Protocol Revisited: A Unified View”, http://www.avispa-project.org/papers/asw-arspa04-entcs05.pdf, 2003.
  • [11] J. A. Onieva, J. Zhou and J. Lopez, “Analysis of an Asynchronous Multi-Party Contract Signing Protocol”, http://jerry.c-lab.de/ubisec/publications/indocrypt05.pdf, 2005.
  • [12] K. Ogata and K. Futatsugi, “Formal Analysis of the NetBill Electronic Commerce Protocol”, http://www.yonezaki.cs.titech.ac.jp/Workshop/isss2003/slides/Ogata.pdf, 2003.
  • [13] M. Carbone, K. Honda and N. Yoshida, “Structured Communication-Centred Programming for Web Services”, http://www.dcs.qmul.ac.uk/~carbonem/cdlpaper/submission.pdf, 2007.
  • [14] G. Kovan, “SPP Secure Payment Protocol: Protocol Analysis, Implementation and Extensions”, http://etd.uwaterloo.ca/etd/gkovan2005.pdf, 2005.
  • [15] L. Buttyan and J. P. Hubaux, “Rational Exchange”, www.hit.bme.hu/~buttyan/courses/ BMEVIHI9367/June12_rex.ppt.
  • [16] A. D. Rubin and P. Honeyman, “Formal Methods for the Analysis of Authentication Protocols”, http://www.citi.umich.edu/techreports/reports/citi-tr-93-7.pdf, 1993.
  • [17] S. Islam and M. A. Zaid, “Probabilistic Analysis and Verification of the ASW Protocol using PRISM”, http://ijns.femto.com.tw/contents/ijns-v7-n3/ijns-2008-v7-n3-p388-396.pdf, 2008.
  • [18] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker., “A scalable content-addressable network”, In Proc. of SIGCOMM, pp. 161–172, San Diego, CA, USA, August 2001.
  • [19] A. Rowstron and P. Druschel., “Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems”, In Proc. of the IFIP/ACM Middleware, Heidelberg, Germany, November 2001.
  • [20] I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan., “Chord: A scalable peer-to-peer lookup service for internet applications”, In Proc. of SIGCOMM, pp. 149–160, San Diego, CA, USA, August 2001.
  • [21]B. Y. Zhao, J. Kubiatowicz, and A. D. Joseph., “Tapestry: An infrastructure for fault-tolerant wide-area location and routing”, Technical Report UCV/CSD-01-1141, Computer Science Division, University of California, Berkeley, CA, USA, April 2001.
  • [22] F. E. Bustamante, Y. Qiao, “Friendships that Last: Peer Lifespan and its Role in P2P Protocols”, In: Douglis F., Davison B.D. (eds) Web Content Caching and Distribution. Springer, Dordrecht, 2004.
  • [23] I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong., “Freenet: A distributed anonymous information storage and retrieval system”, In Proc. ICSI Workshop on Design Issues in Anonymity and Unobservability, pp. 43–58, Berkeley, CA, USA, July 2000.
  • [24] Kazaa, http://www.kazaa.com, 2001.
  • [25] T. Klingberg and R. Manfredi., “Gnutella 0.6. RFC”, The Gnutella RFC, June 2002.
  • [26] Clip2, “The Gnutella protocol specification v0.4. RFC”, The Gnutella RFC, 2000.