• Title/Summary/Keyword: Wireless Mobile

Search Result 3,724, Processing Time 0.034 seconds

A WTLSW Protocol and a Proxy Model to Ensure End-to-End Security for Mobile Devices with Limited Resources (제한된 자원의 무선 단말기를 위한 종단간 보안을 제공하는 WTLSW 프로토콜 및 프록시 모델)

  • Lee, Heon-Guil
    • Journal of Industrial Technology
    • /
    • v.29 no.B
    • /
    • pp.33-39
    • /
    • 2009
  • The need for end-to-end security has been increased with the widespread use of mobile devices in wireless internet access applications such as mobile commerce. The WAP1.x has an end-to-end security problem that the message transmitted between the mobile device and the Web server is decrypted inside the gateway within a short time. To overcome this problem, several protocols including WAP2.0 has been proposed. These protocols require that the heavy modules such as TLS or data compression modules should be installed on the mobile device with limited resources. This paper proposes a new WTLSW(WTLS-TLS at Web server) protocol and a new WAP2.0 proxy model in order to ensure end-to-end security between the mobile device and the Web server and to be appropriate for mobile devices with limited resources.

  • PDF

Design of Mobile Robot's Curve Following by Wireless LAN Communication (무선 랜 통신을 이용한 이동 로봇의 곡선 추종 구현)

  • 홍인택;김용택;김종수;전홍태
    • Proceedings of the IEEK Conference
    • /
    • 2002.06c
    • /
    • pp.5-8
    • /
    • 2002
  • In this paper, we propose the self-autonomous algorithm for mobile robot system. The proposed mobile robot system controlled by Personal Digital Assistant(PDA) can follow the target at regular intervals. The mobile robot can evaluate the distance between robot and target with ultrasonic sensors, transmits the distance to the PDA. The velocity and direction decided in PDA are transmitted to the mobile robot with wireless LAN communication. Considering the state, velocity-changing and distance-maintenance, of the mobile robot, driving velocity and direction are applied. For safety, the velocity of the mobile robot is changed step by step. As a result, we confirm the ability of following the target with proposed mobile robot.

  • PDF

The Design of an Efficient Proxy-Based Framework for Mobile Cloud Computing

  • Zhang, Zhijun;Lim, HyoTaek;Lee, Hoon Jae
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.1
    • /
    • pp.15-20
    • /
    • 2015
  • The limited battery power in the mobile environment, lack of sufficient wireless bandwidth, limited resources of mobile terminals, and frequent breakdowns of the wireless network have become major hurdles in the development of mobile cloud computing (MCC). In order to solve the abovementioned problems, This paper propose a proxy-based MCC framework by adding a proxy server between mobile devices and cloud services to optimize the access to cloud services by mobile devices on the network transmission, application support, and service mode levels. Finally, we verify the effectiveness of the developed framework through an experimental analysis. This framework can ensure that mobile users have efficient access to cloud services.

Design and Implementation of Mobile Map Service on the WIPI Platform (WIPI 플랫폼에서 모바일 맵 서비스의 설계 및 구현)

  • Choi Jin-Oh
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.457-460
    • /
    • 2006
  • For avoiding the waste of costs for building each mobile platform according to each mobile communication vender, KWISF proposed WIPI platform standard. Already the venders are providing mobile map services which are adapted on their own platforms. Because the integration of various mobile platform was performed to WIPI standard, the changes of platform and component API may cause the environment changes of mobile nap services. This study shows the design and implementation results of mobile map services adapted to WPI environments.

  • PDF

A Mobile-Sink based Energy-efficient Clustering Scheme in Mobile Wireless Sensor Networks (모바일 센서 네트워크에서 모바일 싱크 기반 에너지 효율적인 클러스터링 기법)

  • Kim, Jin-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.1-9
    • /
    • 2017
  • Recently, the active research into wireless sensor networks has led to the development of sensor nodes with improved performance, including their mobility and location awareness. One of the most important goals of such sensor networks is to transmit the data generated by mobile sensors nodes. Since these sensor nodes move in the mobile wireless sensor networks (MWSNs), the energy consumption required for them to transmit the sensed data to the fixed sink is increased. In order to solve this problem, the use of mobile sinks to collect the data while moving inside the network is studied herein. The important issues are the mobility and energy consumption in MWSNs. Because of the sensor nodes' limited energy, their energy consumption for data transmission affects the lifetime of the network. In this paper, a mobile-sink based energy-efficient clustering scheme is proposed for use in mobile wireless sensor networks (MECMs). The proposed scheme improves the energy efficiency when selecting a new cluster head according to the mobility of the mobile sensor nodes. In order to take into consideration the mobility problem, this method divides the entire network into several cluster groups based on mobile sinks, thereby decreasing the overall energy consumption. Through both analysis and simulation, it was shown that the proposed MECM is better than previous clustering methods in mobile sensor networks from the viewpoint of the network energy efficiency.

Design and Implementation of Integrated IEEE802.15.4 Wireless Mobile Care Application (집적형 IEEE 802.15.4 무선 모바일케어 응용시스템의 설계 및 적용)

  • Yau, Chiew-Lian;Chung, Wan-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.482-485
    • /
    • 2007
  • Recent generation of wireless computing has focus on the integrating of exisitng technologies to enhance the mobile capabilities and developing a new approaches to meet the needs of the growing pool of applications. This paper describes an integrated IEEE802.15.4 wireless CDMA based healthcare system that interacts and received the data wirelessly from wireless medical devices of patient and forward to medical center by using the cellular network. Mobile application had been developed not only as the middle ware to handle the receive and transmit of medical data between wireless sensor network and cellular network but also provides the interface for monitoring and analyzing the health condition of patients continuously at cellular phone regardless of its physical location. This system thus enables the remote healthcare monitoring and supports medical data seamlessly roams between IEEE802.15.4 wireless network and CDMA network beyond and outside the hospital environment.

  • PDF

Handover Scheme between WiFi and Mobile WiMax (WiFi와 mobile WiMax간 핸드오버 방안)

  • Park, Seung-Kyun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.1
    • /
    • pp.34-41
    • /
    • 2011
  • At present wireless internet access service is available through the 3G network, mobile WiMAX and WiFi anytime and anywhere. In this environment where there are various networks, users should be able to select specific networks depending on different situations. And it is necessary to provide mobility support between homogeneous and between heterogenous networks. Given this situation, the many proposals have been presented to link 3G, which has the largest service area among various networks, with mobile WiMAX(IEEE 802.16e), or with WiFi(IEEE 802.11). But, recently, with the increasing volume of wireless internet use and wireless internet data, due to the advents of net-book, e-book and smart phone, the service area of WiFi and mobile WiMAX has rapidly expanded. Especially, the availability of real-time application such as internet phone has led to the relative shrinking of the proportion of 3G mobile communication network giving conventional voice service, and enlargement of those of wireless internet access networks like WiFi and mobile WiMAX. This paper suggests a handover scheme based on PMIPv6, whitch support mobility between WiFi and mobile WiMAX, and minimizes handover delay. In this scheme, the mobile node has a dual stack structure composed of two interfaces-WiFi and mobile WiMAX. Since WiFi dose not support mobility, it is suggested that the mobile node have the capacity to deal with handover signaling between gateway in case of handover between homogeneous networks. This handover scheme, suggested comparing with current handovers between homogeneous networks, has proved, in its analytic evaluation, to be able to reduce handover, transmission, and signaling overhead.

Mobile Malicious AP Detection and Cut-off Mechanism based in Authentication Network (인증 네트워크 상의 비 인가된 모바일 AP 탐지 및 차단 기법)

  • Lim, Jae-Wan;Jang, Jong-Deok;Yoon, Chang-Pyo;Ryu, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.55-61
    • /
    • 2012
  • Owing to the development of wireless infrastructure and mobile communication technology, There is growing interest in smart phone using it. The resulting popularity of smart phone has increased the Mobile Malicious AP-related security threat and the access to the wireless AP(Access Point) using Wi-Fi. mobile AP mechanism is the use of a mobile device with Internet access such as 3G cellular service to serve as an Internet gateway or access point for other devices. Within the enterprise, the use of mobile AP mechanism made corporate information management difficult owing to use wireless system that is impossible to wire packet monitoring. In this thesis, we propose mobile AP mechanism-based mobile malicious AP detection and prevention mechanism in radius authentication server network. Detection approach detects mobile AP mechanism-based mobile malicious AP by sniffing the beacon frame and analyzing the difference between an authorized AP and a mobile AP mechanism-based mobile malicious AP detection.