چارچوبی برای ممانعت از ورود تبلیغات هرزنامه به دستگاههای سیار هوشمند در شبکه IoT

نوع مقاله : مقاله پژوهشی

نویسندگان

قم

چکیده

صنعت رو به رشد فناوری‌های مبتنی بر اینترنت اشیاء (IoT) امروزه در بسیاری از زمینه‌ها رو به گسترش است. ازجمله فناوری‌های پایه و بنیادی در به‌کارگیری تجهیزات مورد استفاده در IoT تگ‌های RFID می‌باشند. تگ‌های RFID از زنجیره‌ تأمین تا مسائل امنیتی و گذرنامه الکترونیکی مورد استفاده قرار می‌گیرند. دستگاه‌های تلفن همراه می‌توانند نقش بزرگی را در عرصه‌ تبلیغات سیار ایفا کنند و به‌عنوان دریافت‌کننده‌ تبلیغات از تگ‌هایی که در محیط اطراف نصب‌ شده است، استفاده کنند، اما به‌دلیل هزینه‌های پایین استفاده از این درگاه جدید، تبلیغات به‌قدری گسترده می‌شود که دستگاه‌های سیار هوشمند هم مستعد ورود تبلیغات هرزنامه تبدیل شوند. هدف از این مقاله پیشنهاد چارچوبی به‌منظور جلوگیری از ورود تبلیغات هرزنامه به دستگاه‌های سیار موجود در شبکه اینترنت اشیاء است. چارچوب و پروتکل بیان‌شده در این مقاله نسل جدیدی از آگهی سیار (M-Advertising) را که آن، آگهی هوشمند سیار (IM-Advertising) نامیده می‌شود، معرفی می‌کند. این راهکار برخلاف راهکارهای دیگر جلوگیری از ورود هرزنامه مانند پست الکترونیکی به‌جای کاهش قدرت آگهی، آگهی را قدرتمندتر می‌سازد و به‌طور هوشمندی مشتری‌های بیشتری را جذب می‌کند. مشتری فقط تبلیغاتی را دریافت میکند که خودش، از نظر دسته و مزایا، تعیین کرده است و سایر تبلیغات نمی‌تواند به دستگاه هوشمند سیار او وارد شود. همچنین نیاز به وجود سامانه تشخیص هرزنامه وجود ندارد و می‌تواند پایه‌ای کاملاً قانونی داشته باشد و نرخ پذیرش تبلیغات مطلوب برای هر مشتری را افزایش داده و هزینه‌ها را کاهش دهد. این چارچوب می‌تواند اطلاعات بازاریابی بسیار مفیدتری را در اختیار بازاریابان قرار دهد.

کلیدواژه‌ها


عنوان مقاله [English]

An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT

نویسندگان [English]

  • Seyyed Mortaza Pournaghi
  • Yaqoub Farjami
چکیده [English]

Today, technologies based on IoT are growing in many industrial areas. One of the most Fundamental technologies in IoT devices is RFID industry that has been widespread in many other fields of technology. RFID tags are used from supply chain to security issues and electronic passports. Cellular phones can play a significant role in the area of mobile advertising and they can operate as advertisement receivers from RFID tags that have been installed on objects in the environment. However, due to lower costs of this new advertising technology, advertisements in this channel will be more widespread; and then we would have a new portal for spams. The purpose of this article is suggesting a framework for advertising to smart mobile devices on IoT while preventing spam in ad-box. Framework and protocols expressed in this article have introduced a new generation of Mobile Advertising for which we call “Intelligent Mobile Advertising” or IM-Advertising. Unlike other spam prevention solutions that are used in other portals such as e-mail, our solution will power Ads and also it captures customer attention in an intelligent style. The Customer will only receive the ads which he specified, by type and benefits, and other ads will not enter his smart mobile system as spams. Also our suggested solution would not need any spam detection system and it is based on a fully legal framework. It makes our customer interested and at the same time collects valuable marketing information.

کلیدواژه‌ها [English]

  • IoT
  • RFID (Radio Frequency Identification)
  • Cellular phone
  • Intelligence Mobile Advertising and Electronic Commerce
   [1]      M. Sutherland and A. K. Sylvester, Advertising and the mind of the consumer: what works, what doesn’t and why. Kogan Page Publishers, 2000.##
   [2]      U. Dombrowski and C. Engel, “Impact of electric mobility on the after sales service in the automotive industry,” Procedia CIRP, vol. 16, pp. 152–157, 2014.##
   [3]      S. Z. Asif, Next generation mobile communications ecosystem: Technology management for mobile communications. John Wiley & Sons, 2011.##
   [4]      F. Gillani, E. Al-Shaer, and B. AsSadhan, “Economic metric to improve spam detectors,” J. Netw. Comput. Appl., vol. 65, pp. 131–143, 2016.##
   [5]      P. P. K. Chan, C. Yang, D. S. Yeung, and W. W. Y. Ng, “Spam filtering for short messages in adversarial environment,” Neurocomputing, vol. 155, pp. 167–176, 2015.##
   [6]      A. Heydari, M. ali Tavakoli, N. Salim, and Z. Heydari, “Detection of review spam: A survey,” Expert Syst. Appl., vol. 42, no. 7, pp. 3634–3642, 2015.##
   [7]      The CISCO website, “Security Annual Report,” 2017. Available: http://www.cisco.com/go/acr2017/##
   [8]      The Technology & Humanity website, “The Evolution of our Sense of Community,” 2106.  Available: http://www.ferris.com/##
   [9]      L. Li, B. Qin, W. Ren, and T. Liu, “Document representation and feature combination for deceptive spam review detection,” Neurocomputing, vol. 254, pp. 33–41, 2017.##
[10]      M. Chakraborty, S. Pal, R. Pramanik, and C. R. Chowdary, “Recent developments in social spam detection and combating techniques: A survey,” Inf. Process. Manag., vol. 52, no. 6, pp. 1053–1073, 2016.##
[11]      C. Laorden, X. Ugarte-Pedrero, I. Santos, B. Sanz, J. Nieves, and P. G. Bringas, “Study on the effectiveness of anomaly detection for spam filtering,” Inf. Sci. (Ny)., vol. 277, pp. 421–444, 2014.##
[12]      I. Yevseyeva, V. Basto-Fernandes, D. Ruano-OrdáS, and J. R. MéNdez, “Optimising anti-spam filters with evolutionary algorithms,” Expert Syst. Appl., vol. 40, no. 10, pp. 4010–4021, 2013.##
[13]      N. J. King, “When Mobile Phones are RFID-Equipped-Finding Eu-US solutions to protect consumer privacy and facilitate mobile commerce,” Mich. Telecomm. Tech. L. Rev., vol. 15, p. 107, 2008.##
[14]      H. A. Al-Ofeishat and M. A. A. Al Rababah, “Near field communication (NFC),” Int. J. Comput. Sci. Netw. Secur., vol. 12, no. 2, p. 93, 2012.##
[15]      H. Du, “NFC technology: Today and tomorrow,” Int. J. Futur. Comput. Commun., vol. 2, no. 4, p. 351, 2013.##
[16]      The Fujitsu website, “Launch of Corporate Advertisements: Human Centric Innovation in Action,” 2017. Available: http://www.fujitsu.com/global/news/pr/archives/month/2200/20080109-01.html/##
[17]      The United Nations Statistics Division website, “Detailed structure and explanatory notes,” 2013.Available: http://unstats.un.org/unsd/cr/registry/cpc-2.asp/##
 [18]      M. A. Shareef, Y. K. Dwivedi, V. Kumar, and U. Kumar, “Content design of advertisement for consumer exposure: Mobile marketing through short messaging service,” Int. J. Inf. Manage, vol. 37, no. 4, pp. 257–268, 2017.##
[19]      V. Basto-Fernandes, I. Yevseyeva, J. R. Méndez, J. Zhao, F. Fdez-Riverola, and M. T. M. Emmerich, “A spam filtering multi-objective optimization study covering parsimony maximization and three-way classification,” Appl. Soft Comput., vol. 48, pp. 111–123, 2016.##
[20]      A. Wilson, V. A. Zeithaml, M. J. Bitner, and D. D. Gremler, “Services marketing: Integrating customer focus across the firm,” no. 2nd Eu. McGraw Hill, 2012.##
[21]      The United Nations Statistics Division website, “Central Product Classification (CPC) Ver.2,” 2103.  Available: http://unstats.un.org/unsd/cr/registry/cpc-2.asp/##
[22]      S. M. Pournaghi, M. Barmshori, and M. Gardeshi, “An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs,” Journal of Electronical & Cyber Defence, vol. 3, no. 2, pp. 1-12, 2015. (In Persian)##
[23]      L. Carrara, G. Orsi, and L. Tanca, “Semantic pervasive advertising,” in International Conference on Web Reasoning and Rule Systems, 2013, pp. 216–222.##
[24]      L. Carrara and G. Orsi, “A new perspective in pervasive advertising,” Tech. Report, Dep. Comput. Sci., 2011.##
[25]      L. Carrara, “PervADs: pervasive, semantic and context aware advertising,” 2011.##
[26]      S. Ghesmati, A. Yazdan varjani, “Manage spam on social networks using content tagging,” Journal of Electronical & Cyber Defence, vol. 2, no. 2, pp. 52-62, 2014. (in Persian)##
[27]      M. Shadkam, “Consumer’s attitude to receive and response to SMS advertising,” Int. J. Bus. Inf. Syst., vol. 24, no. 1, pp. 69–90, 2017.##
[28]      C. F. Foozy, R. Ahmad, M.F. Abdollah, and C. C. Wen, “A Comparative Study with RapidMiner and WEKA Tools over some Classification Techniques for SMS Spam,” Materials Science and Engineering Conference Series., vol. 226, no 1,  2017.##