An energy-conserving approach for data formatting and trusted document exchange in resource-constrained networks

Lightweight data formatting and document exchanging schemes are of interest in conserving energy while exchanging documents, particularly in the resource constrained networks (RCNs). This paper presents an energy-conserving, lightweight method for data representation and trusted document exchange. It is based on a format derived from the YAML Ain’t Markup Language (YAML), a lightweight data serialization language and includes a schema extraction process to separate data from its structure. The resultant schema is useful for thinning the data format and also for checking the rewriting attacks. The rewriting attack is checked using a two-tiered approach. It is observed that the proposed document format is less verbose and more energy conserving than XML and other popular non-binary formats. The format can be used to represent non-document data also.

[1]  陈红,et al.  PEJA: Progressive Energy-Efficient Join Processing for Sensor Networks , 2008 .

[2]  Mark Levene,et al.  XCQ: A queriable XML compression system , 2006, Knowledge and Information Systems.

[3]  Andrew D. Gordon,et al.  An advisor for web services security policies , 2005, SWS '05.

[4]  Daniel Roth,et al.  Web Services Policy Framework (WS- Policy) , 2002 .

[5]  Mark Bartel,et al.  Xml-Signature Syntax and Processing , 2000 .

[6]  Giuseppe M. L. Sarnè,et al.  MUADDIB: A distributed recommender system supporting device adaptivity , 2009, TOIS.

[7]  Jörg Schwenk,et al.  Breaking and fixing the inline approach , 2007, SWS '07.

[8]  M. P. Michael Energy Awareness for Mobile Devices , 2022 .

[9]  Antonio F. Gómez-Skarmeta,et al.  A Context-Sware Data Sharing Service over MANet to Enable Spontaneous Collaboration , 2008, 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[10]  Sasu Tarkoma,et al.  XML messaging for mobile devices: From requirements to implementation , 2007, Comput. Networks.

[11]  Byron Leite Dantas Bezerra,et al.  Symbolic data analysis tools for recommendation systems , 2011 .

[12]  Azzedine Benameur,et al.  XML Rewriting Attacks: Existing Solutions and their Limitations , 2008, ArXiv.

[13]  Isabelle M. Demeure,et al.  POPEYE: providing collaborative services for ad hoc and spontaneous communities , 2009, Service Oriented Computing and Applications.

[14]  Hyun-Ho Lee,et al.  Consistent collective evaluation of multiple continuous queries for filtering heterogeneous data streams , 2010, Knowledge and Information Systems.

[15]  David W. Chadwick,et al.  Trust infrastructure for policy based messaging in open environments , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).

[16]  Haifei Li XML and Industrial Standards for Electronic Commerce , 2000, Knowledge and Information Systems.

[17]  Hassan Artail,et al.  A distributed mobile database implementation on Pocket PC mobile devices communicating over Bluetooth , 2009, J. Netw. Comput. Appl..

[18]  Martin Nilsson,et al.  Investigating the energy consumption of a wireless network interface in an ad hoc networking environment , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[19]  Hui Wang,et al.  Heterogeneous Grid Computing for Energy Constrained Mobile Device , 2004, EUC.

[20]  J. Aker,et al.  Mobile Phones and Economic Development in Africa , 2010 .

[21]  Ramón Fabregat,et al.  A Dynamic Content Generator for Adaptation in Hypermedia Systems , 2008, AH.

[22]  Sasu Tarkoma,et al.  Xebu: A Binary Format with Schema-Based Optimizations for XML Data , 2005, WISE.

[23]  Junzhou Luo,et al.  Some Issues on Computer Networks: Architecture and Key Technologies , 2006, Journal of Computer Science and Technology.

[24]  Bette Hileman,et al.  ENERGY FOR A SUSTAINABLE FUTURE , 2006 .

[25]  Hamideh Afsarmanesh,et al.  Semi-automated schema integration with SASMINT , 2009, Knowledge and Information Systems.

[26]  R. Shankar,et al.  The market for wireless electricity: The case of India , 2010 .

[27]  Giovanni Della-Libera,et al.  Web Services Security Policy Language (WS-SecurityPolicy) , 2002 .

[28]  Phillip Hallam-Baker,et al.  Web services security: soap message security , 2003 .

[29]  Giuseppe M. L. Sarnè,et al.  MASHA: A multi-agent system handling user and device adaptivity of Web sites , 2006, User Modeling and User-Adapted Interaction.

[30]  Mohammad Ashiqur Rahaman An inline approach for secure SOAP requests and early validation , 2006 .

[31]  Douglas Crockford,et al.  The application/json Media Type for JavaScript Object Notation (JSON) , 2006, RFC.

[32]  Andreas Schaad,et al.  SOAP-based Secure Conversation and Collaboration , 2007, IEEE International Conference on Web Services (ICWS 2007).

[33]  R. Fabregat,et al.  A User Model that incorporates characteristics of Access Devices in MAS-SHAAD , 2009 .

[34]  Neel Sundaresan,et al.  Millau: an encoding format for efficient representation and exchange of XML over the Web , 2000, Comput. Networks.

[35]  Claudio Bettini,et al.  MIMOSA: context-aware adaptation for ubiquitous web access , 2009, Personal and Ubiquitous Computing.

[36]  I. Methodology,et al.  Using XML Messaging for Wireless Middleware Communication ( Work in Progress ) , 2022 .

[37]  Sasu Tarkoma,et al.  XML Security with Binary XML for Mobile Web Services , 2008, Int. J. Web Serv. Res..

[38]  Azzedine Benameur,et al.  A formal solution to rewriting attacks on SOAP messages , 2008, SWS '08.

[39]  Srivaths Ravi,et al.  A study of the energy consumption characteristics of cryptographic algorithms and security protocols , 2006, IEEE Transactions on Mobile Computing.

[40]  Jian Qin,et al.  Vocabulary Use in XML Standards in the Financial Market Domain , 2003, Knowledge and Information Systems.

[41]  Mohand Boughanem,et al.  Evaluation of contextual information retrieval effectiveness: overview of issues and research , 2010, Knowledge and Information Systems.

[42]  Latifur Khan,et al.  A study of the model and algorithms for handling location-dependent continuous queries , 2005, Knowledge and Information Systems.

[43]  Pascale Minet,et al.  Evaluation of the Energy Consumption in MANET , 2006, ADHOC-NOW.

[44]  Koji Matsumoto,et al.  Policy Based Messaging Framework , 2007, ICSOC.