Skip to main content
Log in

An energy-conserving approach for data formatting and trusted document exchange in resource-constrained networks

  • Regular Paper
  • Published:
Knowledge and Information Systems Aims and scope Submit manuscript

Abstract

Lightweight data formatting and document exchanging schemes are of interest in conserving energy while exchanging documents, particularly in the resource constrained networks (RCNs). This paper presents an energy-conserving, lightweight method for data representation and trusted document exchange. It is based on a format derived from the YAML Ain’t Markup Language (YAML), a lightweight data serialization language and includes a schema extraction process to separate data from its structure. The resultant schema is useful for thinning the data format and also for checking the rewriting attacks. The rewriting attack is checked using a two-tiered approach. It is observed that the proposed document format is less verbose and more energy conserving than XML and other popular non-binary formats. The format can be used to represent non-document data also.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Li H (2000) XML and industrial standards for electronic commerce. Knowl Inform Syst 2(4): 487–497

    Article  MATH  Google Scholar 

  2. Hanslo WS, MacGregor KJ (2003) Using XML messaging for wireless middleware communication. In: Proceedings of the South African telecommunication network & applications conference, (SATNAC ’03), Southern African telecommunication networks and applications conference, Southern Cape, South Africa, September 2003. North-Holland Publishing Co

  3. Kangasharju J, Lindholm T, Tarkoma S (2007) XML messaging for mobile devices: from requirements to implementation. Int J Comput Telecommun Netw 51(16): 4634–4654

    MATH  Google Scholar 

  4. Lee H-H, Lee W-S (2010) Consistent collective evaluation of multiple continuous queries for filtering heterogeneous data streams. Knowl Inform Syst 22(2): 185–210

    Article  Google Scholar 

  5. Ng W, Lam W-Y, Wood PT, Levene M (2005) XCQ: a queriable XML compression system. Knowl Inform Syst 4: 421–452

    Google Scholar 

  6. Gupta M, Tu M, Khan L, Bastani F, Yen I-L (2005) A study of the model and algorithms for handling location-dependent continuous queries. Knowl Inform Syst 8: 414–437

    Article  Google Scholar 

  7. Michael MP (2005) Energy awareness for mobile devices. In: Research seminar on energy awareness. University of Helsinki

  8. Potlapally N, Ravi S, Raghunathan A, Niraj K (2006) Heterogeneous grid computing for energy constrained mobile device. IEEE Trans Mobile Comput 5: 128–143

    Article  Google Scholar 

  9. Gu GQ, Lu J-Z (2008) Some issues of computer networks: architecture and key technologies. J Comput Sci Technol 21(5): 708–722

    Article  Google Scholar 

  10. Artail H, Shihab M, Safa H (2009) A distributed mobile database implementation on pocket PC mobile devices communicating over Bluetooth. J Netw Comput Appl 32(1): 96–115

    Article  Google Scholar 

  11. Orthogonal frequency-division multiplexing. Available at http://en.wikipedia.org/wiki/OFDM/

  12. Lai Y-X, Chen Y-L, Chen H (2008) PEJA: progressive energy-efficient join processing for sensor networks. J Comput Sci Technol 6(6): 957–972

    Article  Google Scholar 

  13. Kangasharju J, Lindholm T, Tarkoma S (2008) XML security with binary XML for mobile web services. Int J Web Serv Res 5(3): 1–19

    Article  Google Scholar 

  14. Botia JA, Gomez-Skarmeta AF, Doung HH, Demeure I (2010) A context-sware data sharing service over MANet to enable spontaneous collaboration. In: Proceedings of the IEEE workshop on enabling technologies: infrastructure for collaborative enterprises (WETICE ’08), 17th workshop on enabling technologies: infrastructure for collaborative enterprises. IEEE Computer Society, Washington, DC, USA, pp 159–164

  15. Blaya JAB, Demeure I, Gianrossi P, Lopez PG, Navarro JAM, Meyer EM, Pelliccione P, Tastet-Cherel F (2009) POPEYE: providing collaborative services for ad hoc and spontaneous communities. Service oriented computing and applications, vol 3, no 1. Springer, London, pp 25–45

  16. Leite B, Bezerra D, de Assis F, de Carvalho T (2010) Symbolic data analysis tools for recommendation systems. Knowl Inform Syst 26(3): 385–418

    Google Scholar 

  17. Mrida D, Baldiris S, Fabregat R, Velez J, Huerva D (2007) A user model that incorporates characteristics of access devices in MAS-SHAAD. In: Proceedings of the TUMAS-A workshop (UM 2007), 11th international conference on user modeling, Corf, Greece, pp 51–55

  18. Rosaci D, Sarné GML, Garruzzo S (2009) MUADDIB: a distributed recommender system supporting device adaptivity. ACM Trans Inform Syst 27: 1–41

    Article  Google Scholar 

  19. Mrida D, Fabregat R, Prat X, Huerva D, Velez J (2008) A dynamic content generator for adaptation in hypermedia systems. Lecture notes in computer science, vol 5149. Springer, Berlin, pp 320–323

  20. Göksedef M, Şule G-O (2010) A dynamic content generator for adaptation in hypermedia systems. Lecture notes in computer science, vol 37, no 4. Pergamon Press Inc, pp 2911–2922

  21. Rosaci D, Sarn GML (2006) MASHA: a multi-agent system handling user and device adaptivity of Web sites. User modeling and user-adapted interaction, vol 16, no 5. Springer, the Netherlands, pp 435–462

  22. Malandrino D, Mazzoni F, Riboni D, Bettini C, Colajanni M, Scarano V (2009) MIMOSA: context-aware adaptation for ubiquitous web access. Person Ubiq Comput 14(4): 301–320

    Article  Google Scholar 

  23. Beach A, Gartrell M, Xing X, Han R, Lv Q, Mishra S, Seada K (2010) A context-sware data sharing service over MANet to enable spontaneous collaboration. In: Proceedings of the workshop on mobile computing systems & applications (WETICE ’08), eleventh workshop on mobile computing systems & applications. Annapolis, Maryland ACM, New York, NY, USA, pp 60–65

  24. Tamine-Lechani L, Boughanem M, Daoud M (2009) Evaluation of contextual information retrieval effectiveness: overview of issues and research. Knowl Inform Syst 24(1): 1–34

    Article  Google Scholar 

  25. Kumar A, Shankar R, Momaya K, Gupte S (2010) The market for wireless electricity: the case of India. Ener Policy 38(3): 1537–1547

    Article  Google Scholar 

  26. Tella A, Oluyemisi DY (2010) The future of ICT in developing world: forecasts on sustainable solutions for global development. Ind J Lib Inform Sci 4(2): 115–131

    Google Scholar 

  27. United Nations Development Programme: (2010) Energy for a sustainable future. The secretary-generals advisory group on energy and climate change summary report and recommendations. UNDP, New York

    Google Scholar 

  28. Aker JC, Mbiti IM (2010) Mobile phones and economic development in Africa. J Econ Perspect 24(3): 207–232

    Article  Google Scholar 

  29. Snoli L (2010) The rise of the ultra-low-cost mobile phone. Available at http://www.itworld.com/personal-tech/130741/the-rise-ultra-low-cost-mobile-phone

  30. Kounavis C (2010) Access to mobile networks available to over 90% of world population 143 countries offer 3G services. Available at http://www.wirelessresearch.eu/archives/349

  31. Benameur A, Kadir FA, Fenet S (2008) XML rewriting attacks: existing solutions and their limitations. In: Proceedings of the international conference on applied computing (IADIS 2008). Algarve, Portugal, CoRR, IADIS Press. Available at http://arxiv.org/abs/0812.4181

  32. Bartel M, Boyer J, Fox B, LaMacchia B, Simon E (2008) XML signature syntax and processing, 2nd edn. W3C recommendation. Available at http://www.w3.org/TR/xmldsig-core/

  33. Sinha SK, Benameur A (2008) A formal solution to rewriting attacks on SOAP messages. In: Proceedings of the 2008 ACM workshop on secure web services (SWS ’08) Alexandria, Virginia, USA, 2006, November. ACM, New York, pp 53–60

  34. Rahaman MA, Rits M, Schaad A (2006) An inline approach for secure SOAP requests and early validation. In: Proceedings of the OWASP Europe 2006 conference (OWASP ’06). Leuven, Belgium, pp 19–33

  35. Eggenberger M, Prakash N, Matsumoto K, Thurmond D (2009) Policy based messaging framework systems. Lecture notes in computer science, vol 4749. Springer, Berlin, pp 497–505

  36. Zhao G, Chadwick D (2005) Trust infrastructure for policy based messaging in open environments. In: Proceedings of the 14th IEEE international workshops on enabling technologies: infrastructure for collaborative enterprise, (WETICE ’05). IEEE Computer Society, Washington, DC, pp 144–149

  37. Chandramouli R, Subbalakshmi P (2001) Wireless LAN: issues and challenges. Available at http://www.ece.stevens-tech.edu/~mouli/WSTAarticle1.doc

  38. Girardot M, Sundaresan N (2000) Millau: an encoding format for efficient representation and exchange of XML over the Web. Comput Netw 33(1–6): 747–765

    Article  Google Scholar 

  39. Cai M, Ghandeharizadeh S, Girardot M, Schmidt R, Song S (2004) Xebu: a binary format with schema-based optimizations for XML data. In: Proceedings of the 13th international conference on database and expert systems applications (DEXA 2002). LNCS vol 2453. Springer, Berlin, pp 269–289

  40. Kangasharju J, Tarkoma S, Lindholm T (2005) Xebu: a binary format with schema-based optimizations for XML data. In: Proceedings of the international conference on web information systems engineering (WISE ’05), sixth international conference on web information systems engineering. LNCS vol 3806. Springer, New York, pp 528–535

  41. Martin B, Jano B (2007) WAP Binary XML content format. W3C note, June 1999. Available at http://www.w3.org/TR/wbxml/

  42. Ben-Kiki O, Evans C, dt Net I (2010) YAML Aint́ markup language (YAML) version 1.2, 3rd edn. Available at http://www.yaml.org/spec/1.2/spec.html

  43. Crockford D (2007) The application/json Media Type for JavaScript Object Notation (JSON). Available at http://tools.ietf.org/html/rfc4627

  44. Jacobs S (2005) Open node syntax version 0.6.9. Available at http://www.seairth.com/web/onx/onx.html

  45. Simple Outline XML: SOX (2002) WAP binary XML content format. Available at http://www.langdale.com.au/SOX/

  46. Bajaj S, Box D, Chappell D, Curbera F, Daniels G, Hallam-Baker P, Hondo M, Kaler C, Langworthy D, Malhotra A, Nadalin A, Nagaratnam N, Nottingham M, Prafullchandra H, von Riegen C, Schlimmer J, Sharp C, Shewchuk J (2004) Web services policy framework (WS-Policy). Available at http://www.ibm.com/developerworks/library/specification/ws-polfram/

  47. Nadalin A, Kaler C, Hallam-Baker P, Monzillo R (2004) Web services security: SOAP message security 1.0 (WS-Security 2004). Available at http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0.pdf

  48. Bhargavan K, Fournet C, Gordon AD, O’Shea G (2005) An advisor for web services security policies. In: Proceedings of the 2005 workshop on secure web services (SWS ’05). ACM, Fairfax, pp 1–9

  49. Rahaman MA, Rits M, Schaad A (2007) SOAP-based secure conversation and collaboration. In: Proceedings of the 2007 IEEE international conference on web services (ICWS 2007). IEEE Computer Society, Salt Lake City, pp 471–480

  50. Gajek S, Liao L, Schwenk J (2007) Breaking and fixing the inline approach. In: Proceedings of the 2007 ACM workshop on secure web services, (SWS ’07). ACM, New York, pp 37–43

  51. Abdul Haleem PP, Sebastian MP (2008) An alternative approach for slicing down the message size and enhancing the security in wireless mobile network. Mediterr J Comput Netw 5(4): 148–159

    Google Scholar 

  52. Qin J, Taffet MD (2004) Vocabulary use in XML standards in the financial market domain. Knowl Inform Syst 6: 269–289

    Article  Google Scholar 

  53. Lanka S, Parikh P (2000) XML shredding. Midterm project. New York University, Courant

    Google Scholar 

  54. Unal O, Afsarmanesh H (2010) Semi-automated schema integration with SASMINT. Knowl Inform Syst 23(1): 421–452

    Article  Google Scholar 

  55. Box D, Hondo M, Kaler C, Maruyama H, Nadalin A, Nagaratnam N, Patrick P, von Riegen C, Shewchuk J (2003) Web services policy assertions language (WS-PolicyAssertions). Available at http://xml.coverpages.org/ws-policyassertionsV11.pdf

  56. Della-Libera G, Gudgin M, Hallam-Baker P, Hondo M, Granqvist H, Kaler C, Maruyama H, McIntosh M, Nadalin A, Nagaratnam N, Philpott R, Prafullchandra H, Shewchuk J, Walter D, Zolfonoon R (2005) Web services security policy language (WS-SecurityPolicy). Available at http://specs.xmlsoap.org/ws/2005/07/securitypolicy/ws-securitypolicy.pdf

  57. White G, Kangasharju J, Brutzman D, Williams S (2007) Efficient XML interchange measurements note. Available at http://www.w3.org/TR/exi-measurements/

  58. Feeney LM, Nilsson M (2001) Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In: Proceedings of the annual joint conference of the IEEE computer and communications societies, (INFOCOM 2001), twentieth annual joint conference of the IEEE computer and communications societies, vol 3. Alaska, pp 1548–1557

  59. Allard G, Minet P, Nguyen D-Q, Shrestha N (2006) Evaluation of the energy consumption in MANET. Lecture notes in computer science, vol 4104. Springer, Berlin, pp 170–183

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to P. P. Abdul Haleem.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Abdul Haleem, P.P., Sebastian, M.P. An energy-conserving approach for data formatting and trusted document exchange in resource-constrained networks. Knowl Inf Syst 32, 559–587 (2012). https://doi.org/10.1007/s10115-011-0450-0

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10115-011-0450-0

Keywords

Navigation