Aim/Objective: The project aim is to design a system that replaces standard Bluetooth Device Discovery model to detect nearby mobile services, our system relies on machine-readable visual tags for out-of-band device and service selection. The system designed develops unique coded visual tags for end-to-end mobile discovery. The project is designed to overcome issues of large discovery time, high power consumption in Mobiles due to excessive Bluetooth usage. The system uses anonymous method for sharing the files with the desired mobile in a multi user environment. This project demonstrates that tag-based connectionestablishment technique offers order of magnitude time improvements over the standard Bluetooth Device Discovery model and significantly easier to use in a variety of realistic scenarios. The overall aim is designing a novel technology that works more efficient than Bluetooth for discovering mobile devices. Broad Research Area: Wireless Networks and Mobile Computing. Research Methodology : In the following phases involved in sharing services between any two end-toend mobiles the Bluetooth model is replaced by Visual Tag based Model developed in this project. 1. Inquiry Phase: A Mobile user inquires whether device with the appropriate features and services are available. 2. Device Discovery: A Mobile user identifies the specific user with necessary services in a Multi user environment. 3. Services Selection: A Sender lists the services available for sharing and the receiver selects the required service.
Existing Scenario In the existing environment, the sender switches on Bluetooth in his/her phone. Then sender searches for receiver which has to be listed in his/her phone. The sender selects the appropriate user and waits for permission from the receiver. The sender sends the required file to be shared to the receiver. The file is transferred to the receiver via Bluetooth. SHORTCOMINGS: 1.
High Response Time: Though Bluetooth is efficient for file transfer. The scroll down time and device discovery time required to find out the required device in a multi user environment is large. In today’s fast world, this delay is very much significant and important.
2.
High Power Consumption: The power consumed in mobiles for working with blue tooth is virtually large. So working for long hours with Bluetooth for file transfer is practically not feasible in many cases.
3.
Handling Users With Same Names: The Bluetooth enabled phones is available with almost all mobile Phones. There may be cases of a many users having the same name for their Bluetooth profiles. It may cause confusion and may result in file transfer to inappropriate user.
Proposed Scenario: In the system that is to be developed, we are designing a 2 dimensional binary bits coded tag containing device address which is unique for each mobile device. The tag reader is a MIDP application that has to be embedded in the receiver. The receiver has to focus on the tag of the sender through his camera lens. The tag reader software of the receiver decodes the device address in the tag. Then the permission is obtained for the necessary file transfer. The file is transferred via the Bluetooth to the appropriate receiver.
Key points of Proposed Scenario: 1. Reduced Discovery Time: The device discovery time is greatly reduced. The discovery time is 13.57 seconds when used with Bluetooth whereas it is 0.56 seconds in the proposed system. 2. Out of Band Device Selection: The binary coded visual tags can be used for message transfer in devices that need not be Bluetooth device (Web server, Stock Querying, Game Vending Machine). 3. Anonymous Device Selection: The sender and receiver have their Bluetooth device name abstracted from each other. When there are multiple users in single environment, selecting the device by name may be tedious. 4. Very Much Commodity Software: The proposed system is very much useful in today’s Mobile phone. It can be easily implemented in the Camera Phones. 5. A Unique feature: The visual tag technology is an attractive and unique for all camera mobile phone users.
VISUAL TAGS: There are two different types of tags that are being tried out in this project. They are Circular Tags and Rectangular tags. The one that performs well to the test cases and integrates well with the application will be decided in the final stages of the project. The key difference is the shape and encoding procedure used. The visual tags contain the message/information in binary form ie., bits 0 &1. These tags are in machine readable form. The tags can serve a variety of purposes and not restricted to be used for application mentioned in this project.
CIRCULAR TAGS:
Circular Bar Codes- 4 Data Rings & 21 Sectors 1) Bits in the data rings are encoded by using a white block to indicate a value of 1 and a black block to indicate a value 0. 2) The outermost ring contains a sync-marker (the bit pattern 11) which is used to specify the orientation of the tag 3) 5-bit checksum is used to detect decoding errors. The checksum is encoded using the bit pattern 00 to represent a 0 and the bit pattern 10 to represent a 1. 4) The checksum is encoded in a clockwise direction with the most significant bit located directly after the sync-marker. 5) In the 3 inner data-rings, bits are assigned to sectors radially, outside-in and in a clockwise direction. 6) The most significant bit of data is located in the outer-most data ring of the sector below the first bit of the sync-marker. 7) In the 63 bits of data encoded in each tag, 48 bits specify a Bluetooth Device ADDRess (BD_ADDR) 8) 15 bits are used for application-specific purposes.
RECTANGULAR TAGS:
2-Dimensional Bar Code Structure High Speed Reading: It is also known as Quick Response or QR Tags. These codes are designed to allow its contents to be decoded at high speed High Capacity & High Density: A single can store upto a maximum of 4,296 alphanumeric characters and 7,089 numeric characters. Error Correcting Capacity: QR Code has error correction capability. Data can be restored even if the symbol is partially dirty or damaged. A maximum 30% of codewords can be restored Structured Append Feature: Information stored in multiple QR Code symbols can be reconstructed as single data symbols. Readable in any direction around 360 degrees: QR Code is capable of 360 degree (Omni-directional), high speed reading. QR Code accomplishes this task through position detection patterns located at the three corners of the symbol. Encoding pattern: The message is encoded using the “finder” pattern and “timing” pattern.
System Architecture:
BD_ADDR, FILE ID
TAG
SERVICE SEARCH REQUEST TO OBEX SERVER
SERVICE SEARCH REPLY
SERVICE ATTRIBUTE TRANSACTION
MOBILE PHONE
AUTHENTICATION REQUEST
AUTHENTICATION RESPONSE
CAMERA PHONE
System Modules: Module 1: ALGORITHM DEVELOPMENT The module involves developing an algorithm to encode the needed message (BD_ADDR) into the visual tag. The application specific data which are to be encrypted is also decided. The pattern to encode the message to be implemented is studied. Module 2: CREATING VISUAL TAG The module implements the algorithm developed to create the visual tag. It is to develop a GUI to create a visual tag in which the message is provided by the user as input. The GUI Application can be developed using Java Applet class/Java Server Page/MIDP Class. Module 3: DEVELOPING VISUAL TAG READER The module creates the MIDP application which reads the Visual tag reader and decodes the message in the Visual Tag. The MIDP application is copied as a .jar file extension into the mobiles for use. Module 4: DEVELOPING SESSION KEY ALGORITHM The module is designed to provide the connection level authentication to access the services. A simple authentication mechanism is proposed to be developed to handle security and prevent illegal access. CURRENT STATUS: Working and implementing Module 1.
REFERENCES: 1. Bluetooth specifications www.bluetooth.com.
2. David Scott, Richard Sharp, Anil Madhavapeddy and Eben Upton In Proceedings of IEEE using Visual Tags to Bypass Bluetooth device Discovery(May-2000) .
3. Tim Kindberg, John Barton, Jeff Morgan, Gene Becker, Debbie Caswell, Philippe Debaty, Gita Gopal, Marcos Frid, Venky Krishnan, Howard Morris, John Schettino, Bill Serra, and Mirjana Spasojevic. People, Places, Things: Web Presence for the Real World. In Proceedings of the third IEEE Workshop on Mobile Computing Systems and Applications (WMCSA’00). IEEEPress.