• Title/Summary/Keyword: Mobile Message

Search Result 731, Processing Time 0.025 seconds

A Design of Secure Mobile Agent Systems Employing ID based Digital Multi-Signature Scheme (ID기반 디지털 다중 서명 기술을 적용한 안전한 이동 에이전트 시스템의 설계)

  • Yoo, Seong-Jin;Kim, Seong-Yeol;Lee, Ok-Bin;Chung, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.17-26
    • /
    • 2003
  • Mobile agent system comes into the spotlight since it contributes largely to mobile computing on distributed network environment. However, this system has a number of significant security Problems. In this Paper, we analyze suity attacks to mobile agent system Presented by NIST[3]. In order to protect this system from them, we suggest a security protocol for mobile agent system by employing R based key distribution and digital multi-signature scheme. To solve these problems described in NIST, securities for mobile agent and agent platform shouid be accomplished. Comparing with other protocols, our protocol performs both of these securities, while other protocols mentioned only one of them. Proposed Protocol satisfies simplicity of key management, providing security service such as confidentiality, integrity, authentication and preventing reputation, liveness guarantee, protection of excution-result data and preventing replay attack. Furthermore, it is designed to detect message modification immediately by verifying each step of agent execution at a corresponding server.

Automatic Node Configuration Protocol for Small Sized Mobile Ad-Hoc Networks (소규모 이동 애드혹 네트워크에서의 자동 노드 설정 프로토콜)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.100-109
    • /
    • 2005
  • A Mobile Ad-Hoc Network (MANET) supports a multi-hop wireless network without any prepared base station (BS). The MANET is capable of building a mobile network automatically without any help from DHCP servers for address allocation or routers to forward or route messages. Many routing protocols have been proposed for the MANET, but these specify the most optimized or shortest path from a source to a destination, and they assume that nodes are pre-configured before communication. To make up for this, address allocation algorithms, such as MANETConf [1] and prophet address allocation algorithm [2], have been proposed. Especially, MANETConf proposes address allocation algorithm with duplication address check. In this paper, we present a dynamic node configuration protocol based on 2-tierd hierarchical network architecture for mobile ad-hoc network, modified from [1]. Especially, it reduces the number of broadcast message exchange between nodes when a new node somes into a network, which lessens network overhead, remarkably. This protocol is based on two-tired structure, and it ensures address allocation with simple duplication address defection mechanism.

Mutual Authentication Protocol using One Time Password for Mobile RFID System (OTP를 이용한 모바일 RFID 상호인증 프로토콜)

  • Sung, Jong-Yeop;Lee, Sang-Duck;Ryu, Chang-Ju;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1634-1642
    • /
    • 2014
  • Mobile RFID system, that consists of the existing RFID reader mounted on the mobile devices such as smartphones, is able to provide the users a variety of services and convenience. But security of mobile RFID system is too weak like the existing RFID system. In this paper, the mobile RFID mutual authentication protocol with high level of security is proposed to overcome the troubles such as cryptographic protocols in the existing RFID system responding with the same value in every authentication procedure and the exposure in the exchange of messages. The proposed protocol exchanges messages unexposed by using the random numbers generated in the mutual authentication between the tag and the reader and making numbers coded with the symmetric key. Besides, the protocol uses the mutual authentication utilizing OTP by considering the characteristics of the reader embedded in mobile devices in the mutual authentication process between the reader and the server. Because changed message in every authentication, which produces safe from spoofing attacks and replay attacks, etc.

Design and Implementation of an Instant Messenger between the two different domain mobile terminal systems (이종(異種) 모바일 단말 간 인스턴트 메신저 설계 및 구현)

  • Bang, Ji-Woong;Kim, Dae-Won
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.4
    • /
    • pp.255-262
    • /
    • 2010
  • Recently, we are living in the world of information and ubiquitous technology strayed away from the fixed network systems resulting in an increase of using mobile terminals which is convenient for mobility and functionality. Because the diversification of mobile devices to communicate between disparate mobile terminals is difficult, the two kinds of operating systems and hardware for data communication between the terminals is needed to convert the data. The proposed instant messenger design in MRP-S3C2440A (Windows CE 5.0) and Nexio XP30 (Windows CE .NET 4.1) were tested and applied. Usually the mobile terminal has an information on a central server. Sender terminal receives the message according to the characteristics of the terminal after converting was sent to the receiving terminal. Receiving-side terminal without a separate conversion process, it was the output terminals. This paper deals with the proposal and implementation of designing an instant messenger application program between the two different mobile terminals and network systems.

System Specification-based Design of Mobile Alarm System for Privacy Protection (시스템 명세화 기법 기반의 개인정보보호 모바일 알람 시스템 설계 및 구현)

  • Jang, Eun-Young;Kim, Hyung-Jong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.113-121
    • /
    • 2010
  • The system specification is a system theory based formal representation method for systems' structure and behavior modeling. When we make use of the system specification method in each step of software development, we can derive a hierarchical and modularized system design which enables us to manage the software development process flexibly. This research presents system specification based design of a mobile alarm system which sends alerts about illegal usage of private information and manages the response against the each alert. In our design of mobile alarm system, there are formal definition of alert message overcoming the functional limitation of mobile device and hierarchical modularized modeling of alarm processing using system specification. The efficiency of making use of the system specification is shown by applying the specification method to implementation of mobile alarm system. The contribution of this work is in design and implementation of mobile alarm system which enables us to handle the private information leakage situation more flexible way using system specification based software designing method.

An Extended Message Pool support to Inter-Mobile Agents Communication (이동에이전트간의 통신을 지원하는 확장된 메시지 저장소)

  • 이근상;전병국;최영근
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10b
    • /
    • pp.134-136
    • /
    • 1999
  • 이동에이전트의 응용 분야가 다양해짐에 따라 에이전트 협력 작업이 요구되고 있다. 이런 협력 작업은 에이전트간의 정보 공유 및 작업 제어를 위해 빈번한 통신을 필요로 한다. 본 논문은 서로 다른 이동에이젼트(mobile agent)들의 통신과 협력 작업을 수행하는 그룹에이전트(group agent)를 위한 효율적인 통신 메커니즘을 제안한다. 제안된 통신 메커니즘은 네트워크 대역폭을 줄이기 위해 이동에이전트 시스템에 확장된 메시지 저장소를 두었으며, 시스템에서 제공하는 기본적인 통신 메소드(method)를 이용하여 동기적/비동기적으로 에이전트 상호간에 보다 융통성 있는 정보 전달을 수행한다. 또한, 제안된 메소드는 1:1 통신뿐만 아니라 다:다 통신을 지원하기 때문에 그룹에이전트 모델에서도 효율적인 수행이 가능하다.

  • PDF

A Study on the Emergency Public Warning System (긴급 공공경보시스템에 관한 연구)

  • Kang, Heau-Jo
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.879-886
    • /
    • 2011
  • Warning notification system base on mobile communication providers, is a warning information provider which senses the disaster and warning condition, provides the warning message to the entrepreneur and its mobile terminal. In this paper, for protecting our lives and properties, we study on disaster warning system ISO TC233's WG3's Public Warning model, Korea Disaster Forecasting and Warning System, disaster Forecasting and Warning System's role, and Colour-coded Alert etc.

Throughput of Coded DS CDMA/Unslotted ALOHA Networks with Variable Length Data Traffic and Two User Classes in Rayleigh Fading FSMC Model

  • Tseng, Shu-Ming;Chiang, Li-Hsin;Wang, Yung-Chung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4324-4342
    • /
    • 2014
  • Previous papers analyzed the throughput performance of the CDMA ALOHA system in Rayleigh fading channel, but they assume that the channel coefficient of Rayleigh fading was the same in the whole packet, which is not realistic. We recently proposed the finite-state Markov channel (FSMC) model to the throughput analysis of DS uncoded CDMA/unslotted ALOHA networks for fixed length data traffic in the mobile environment. We now propose the FSMC model to the throughput analysis of coded DS CDMA/unslotted ALOHA networks with variable length data traffic and one or two user classes in the mobile environment. The proposed DS CDMA/unslotted ALOHA wireless networks for two user classes with access control can maintain maximum throughput for the high priority user class under high message arrival per packet duration.

Cooperative Behavior and Control in a Collective Autonomous Mobile Robots using Communication System (통신시스템을 이용한 자율이동로봇군의 협조행동 및 제어)

  • 이동욱;이동욱;심귀보
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1996.10a
    • /
    • pp.323-326
    • /
    • 1996
  • In this paper, we propose a new method of the communication system for cooperative behavior and control in a collective autonomous mobile robots. A communication function among the collective robots is essential to intelligent cooperation. In general, global communication is effective for small number of robots. However when the number of robot goes on increasing, this becomes difficult to be realized because of limited communication capacity and increasing amount of information to handle. And also the problems such as communication interference and improper message transmission occur. So we propose local communication system based on infrared sensor to realize the cooperative behavior and control as the solution of above problem. It is possible to prevent overflow of information and exchange of complex information by combining communicate a specific robot. At last we verify the effectiveness of the proposed communication system from example of cooperative behavior.

  • PDF

A Reliable Transport Supporting Method for a DTMNs (DTMNs를 위한 신뢰성 있는 데이터 전송 지원 방법)

  • Seo, Doo Ok;Lee, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.151-160
    • /
    • 2009
  • While portable and wireless devices are pouring, a new network technology is needed as a breakthrough. The new network technology features large delays, intermittent connectivity, and absence of an end-to-end path from sources to destinations. A network which has one of those characteristics is called DTNs(Delay Tolerant Networks). The main 4 routing methods have been researched so far in extream environment. In this paper, we look into the reliability of DTMNs(Delay Tolerant Mobile Networks) in several different situations, and propose an algorithm that selects a positive routine by sending the only information of its position when making a connection to a detected node. We simulate the proposed algorithm here in DTN using ONE simulator. As a result, it shows that the algorithm reduces the number of message transmission each node.