• EVJOLA SPAHO Graduate School of Engineering, Fukuoka Institute of Technology (FIT) 3-30-1 Wajiro-Higashi, Higashi-Ku, Fukuoka 811-0295, Japan
  • KEITA MATSUO Fukuoka Prefectural Kaho-Sogo High School 1117-1 Haji, Keisen-Machi, Kaho-Gun, Fukuoka 820-0607, Japan
  • LEONARD BAROLLI Department of Communication and Information Engineering Fukuoka Institute of Technology (FIT) 3-30-1 Wajiro-Higashi, Higashi-Ku, Fukuoka 811-0295, Japan
  • FATOS XHAFA Department of Languages and Informatics Systems Technical University of Catalonia, C/Jordi Girona 1-3, 08034 Barcelona, Spain
  • JOAN ARNEDO-MORENO Department of Computer Science, Multimedia and Telecommunication Open University of Catalonia, Rambla del Poblenou, 156 08018 Barcelona, Spain
  • VLADI KOLICI Department of Electronics and Telecommunication Polytechnic University of Tirana, Mother Teresa Square, No.4, Tirana, Albania


P2P, JXTA-Overlay, robot control, security


In this paper, we present the evaluation and experimental results of secured robot control in a P2P system. The control system is based on JXTA-Overlay platform. We used secure primitives and functions of JXTA-Overlay for the secure control of the robot motors. We investigated the time of robot control for some scenarios with different number of peers connected in JXTA-Overlay network. All experiments are realised in a LAN environment. The experimental results show that with the join of other peers in the network, the average time of robot control is increased, but the difference between the secure and unsecure robot control average time is nearly the same.



Download data is not yet available.


F. Xhafa, R. Fernandez, T. Daradoumis, L. Barolli, S. Caballe (2007), Improvement of JXTA

Protocols for Supporting Reliable Distributed Applications in P2P Systems, Proc. of NBiS-2007

(Regensburg, Germany), LNCS, Vol. 4658, pp. 345-354.

P. Caloud, W. Choi, J. C. Latombe, C. L. Pape, M. Yim (1990), Indoor Automation with Many

Mobile Robots, Proc. of the IEEE International Workshop on Intelligent Robots and Systems, pp.


H. Asama, K. Ozaki, A. Matsumoto, Y. Ishida, I. Endo (1992), Development of Task Assign-

ment System Using Communication for Multiple Autonomous Robots, Journal of Robotics and

Mechatronics, pp. 122-127.

C. Le Pape (1990), A Combination of Centralized and Distributed Methods for Multi-agent Plan-

ning and Scheduling, Proc. of the IEEE International Conference on Robotics and Automation,

pp. 488-493.

L. E. Parker (1998), Alliance: An Architecture for Fault Tolerant Multirobot Cooperation, IEEE

Transactions on Robotics and Automation, pp. 220-240.

L. Chaimowicz, T. Sugar, V. Kumar, M. F. M. Campos (2001), An Architecture for Tightly Coupled

Multi-robot Cooperation, Proc. of IEEE International Conference on Robotics and Automation,

pp. 2992-2997.

L. Inoue, T. Nakajima (2001), Cooperative Object Transportation by Multiple Robots with Their

Own Objective Tasks, Journal of the Robotics Society of Japan, pp. 888-896.

K. Ozaki, H. Asama, Y. Ishida, A. Matsumoto, I. Endo (1996), Collision Avoidance Using Com-

munication Between Autonomous Mobile Robot, Journal of the Robotics Society of Japan, pp.


M. Parnichkun, S. Ozono (1998), CDCSMA-CD Communication Method for Cooperative Robot

Systems, Advanced Robotics, pp. 669-694.

P. E. Rybski, S. A. Stoeter, M. Gini, D. F. Hougen, N. P. Papanikolopoulos (2002), Performance

of a Distributed Robotic System Using Shared Communications Channels, IEEE Transactions on

Robotics and Automation, pp. 713-727.

J. Arai, A. Koyama, and L. Barolli (2008), AR-TDMA: An Adaptive Reservation Time Division

Multiple Access Control Protocol for Robot Inter-communication, International Journal of Wireless

and Mobile Computing (IJWMC), Vol. 3, No. 1/2, pp. 4-11.

S. Wallach (2003), A Survey of Peer-to-Peer Security Issues, Theories and Systems, Springer

Berlin Heidelberg, pp. 253-258.

JXTA 2.5 RC1 (June 2007),

D. Bailly (2002), CBJX: Crypto-based JXTA (An Internship Report).

CCITT (1988), The Directory Authentication Framework: Recommendation.

D. Brookshier and D. Govoni and N. Krishnan and J.C Soto (2002), JXTA: Java P2P Program-

ming, Sams Publishing.

SUN Microsystem (2003), Project JXTA v 2.0: Java Programmer’s Guide.

SUN Microsystem (2001), Project JXTA, Available on line at

D. Sax (2003), DNS Spoofing (Malicious Cache Poisoning), Available on line at

T. Dierks and C. Allen (1999), The TLS Protocol Version 1.0, Available on line at

F. Xhafa, Z. Arrizabalaga, J.M. Bertran, L. Barolli (2009), Parameter Tuning of JXTA-based P2P

Platforms, Proc. of International Conference on Network-Based Information Systems (NBiS-2009),

pp. 92-102.




How to Cite

SPAHO, E. ., MATSUO, K. ., BAROLLI, L. ., XHAFA, F. ., ARNEDO-MORENO, J. ., & KOLICI, V. . (2010). APPLICATION OF JXTA-OVERLAY PLATFORM FOR SECURE ROBOT CONTROL. Journal of Mobile Multimedia, 6(3), 227–242. Retrieved from




Most read articles by the same author(s)

1 2 > >>