An Anti-Spam Framework for Advertising Targeting Smart Mobile Devices on IoT

Document Type : Original Article

Authors

Abstract

Today, technologies based on IoT are growing in many industrial areas. One of the most Fundamental technologies in IoT devices is RFID industry that has been widespread in many other fields of technology. RFID tags are used from supply chain to security issues and electronic passports. Cellular phones can play a significant role in the area of mobile advertising and they can operate as advertisement receivers from RFID tags that have been installed on objects in the environment. However, due to lower costs of this new advertising technology, advertisements in this channel will be more widespread; and then we would have a new portal for spams. The purpose of this article is suggesting a framework for advertising to smart mobile devices on IoT while preventing spam in ad-box. Framework and protocols expressed in this article have introduced a new generation of Mobile Advertising for which we call “Intelligent Mobile Advertising” or IM-Advertising. Unlike other spam prevention solutions that are used in other portals such as e-mail, our solution will power Ads and also it captures customer attention in an intelligent style. The Customer will only receive the ads which he specified, by type and benefits, and other ads will not enter his smart mobile system as spams. Also our suggested solution would not need any spam detection system and it is based on a fully legal framework. It makes our customer interested and at the same time collects valuable marketing information.

Keywords


   [1]      M. Sutherland and A. K. Sylvester, Advertising and the mind of the consumer: what works, what doesn’t and why. Kogan Page Publishers, 2000.##
   [2]      U. Dombrowski and C. Engel, “Impact of electric mobility on the after sales service in the automotive industry,” Procedia CIRP, vol. 16, pp. 152–157, 2014.##
   [3]      S. Z. Asif, Next generation mobile communications ecosystem: Technology management for mobile communications. John Wiley & Sons, 2011.##
   [4]      F. Gillani, E. Al-Shaer, and B. AsSadhan, “Economic metric to improve spam detectors,” J. Netw. Comput. Appl., vol. 65, pp. 131–143, 2016.##
   [5]      P. P. K. Chan, C. Yang, D. S. Yeung, and W. W. Y. Ng, “Spam filtering for short messages in adversarial environment,” Neurocomputing, vol. 155, pp. 167–176, 2015.##
   [6]      A. Heydari, M. ali Tavakoli, N. Salim, and Z. Heydari, “Detection of review spam: A survey,” Expert Syst. Appl., vol. 42, no. 7, pp. 3634–3642, 2015.##
   [7]      The CISCO website, “Security Annual Report,” 2017. Available: http://www.cisco.com/go/acr2017/##
   [8]      The Technology & Humanity website, “The Evolution of our Sense of Community,” 2106.  Available: http://www.ferris.com/##
   [9]      L. Li, B. Qin, W. Ren, and T. Liu, “Document representation and feature combination for deceptive spam review detection,” Neurocomputing, vol. 254, pp. 33–41, 2017.##
[10]      M. Chakraborty, S. Pal, R. Pramanik, and C. R. Chowdary, “Recent developments in social spam detection and combating techniques: A survey,” Inf. Process. Manag., vol. 52, no. 6, pp. 1053–1073, 2016.##
[11]      C. Laorden, X. Ugarte-Pedrero, I. Santos, B. Sanz, J. Nieves, and P. G. Bringas, “Study on the effectiveness of anomaly detection for spam filtering,” Inf. Sci. (Ny)., vol. 277, pp. 421–444, 2014.##
[12]      I. Yevseyeva, V. Basto-Fernandes, D. Ruano-OrdáS, and J. R. MéNdez, “Optimising anti-spam filters with evolutionary algorithms,” Expert Syst. Appl., vol. 40, no. 10, pp. 4010–4021, 2013.##
[13]      N. J. King, “When Mobile Phones are RFID-Equipped-Finding Eu-US solutions to protect consumer privacy and facilitate mobile commerce,” Mich. Telecomm. Tech. L. Rev., vol. 15, p. 107, 2008.##
[14]      H. A. Al-Ofeishat and M. A. A. Al Rababah, “Near field communication (NFC),” Int. J. Comput. Sci. Netw. Secur., vol. 12, no. 2, p. 93, 2012.##
[15]      H. Du, “NFC technology: Today and tomorrow,” Int. J. Futur. Comput. Commun., vol. 2, no. 4, p. 351, 2013.##
[16]      The Fujitsu website, “Launch of Corporate Advertisements: Human Centric Innovation in Action,” 2017. Available: http://www.fujitsu.com/global/news/pr/archives/month/2200/20080109-01.html/##
[17]      The United Nations Statistics Division website, “Detailed structure and explanatory notes,” 2013.Available: http://unstats.un.org/unsd/cr/registry/cpc-2.asp/##
 [18]      M. A. Shareef, Y. K. Dwivedi, V. Kumar, and U. Kumar, “Content design of advertisement for consumer exposure: Mobile marketing through short messaging service,” Int. J. Inf. Manage, vol. 37, no. 4, pp. 257–268, 2017.##
[19]      V. Basto-Fernandes, I. Yevseyeva, J. R. Méndez, J. Zhao, F. Fdez-Riverola, and M. T. M. Emmerich, “A spam filtering multi-objective optimization study covering parsimony maximization and three-way classification,” Appl. Soft Comput., vol. 48, pp. 111–123, 2016.##
[20]      A. Wilson, V. A. Zeithaml, M. J. Bitner, and D. D. Gremler, “Services marketing: Integrating customer focus across the firm,” no. 2nd Eu. McGraw Hill, 2012.##
[21]      The United Nations Statistics Division website, “Central Product Classification (CPC) Ver.2,” 2103.  Available: http://unstats.un.org/unsd/cr/registry/cpc-2.asp/##
[22]      S. M. Pournaghi, M. Barmshori, and M. Gardeshi, “An Improved Authentication Scheme with Conditional Privacy Preserving in VANETs,” Journal of Electronical & Cyber Defence, vol. 3, no. 2, pp. 1-12, 2015. (In Persian)##
[23]      L. Carrara, G. Orsi, and L. Tanca, “Semantic pervasive advertising,” in International Conference on Web Reasoning and Rule Systems, 2013, pp. 216–222.##
[24]      L. Carrara and G. Orsi, “A new perspective in pervasive advertising,” Tech. Report, Dep. Comput. Sci., 2011.##
[25]      L. Carrara, “PervADs: pervasive, semantic and context aware advertising,” 2011.##
[26]      S. Ghesmati, A. Yazdan varjani, “Manage spam on social networks using content tagging,” Journal of Electronical & Cyber Defence, vol. 2, no. 2, pp. 52-62, 2014. (in Persian)##
[27]      M. Shadkam, “Consumer’s attitude to receive and response to SMS advertising,” Int. J. Bus. Inf. Syst., vol. 24, no. 1, pp. 69–90, 2017.##
[28]      C. F. Foozy, R. Ahmad, M.F. Abdollah, and C. C. Wen, “A Comparative Study with RapidMiner and WEKA Tools over some Classification Techniques for SMS Spam,” Materials Science and Engineering Conference Series., vol. 226, no 1,  2017.##