• Title/Summary/Keyword: mobile distributed environment

Search Result 292, Processing Time 0.029 seconds

A Study on the Distribute Authentication Method Scheme through Authentication and Right Mechanism Trend of the Ubiquitous Environment (유비쿼터스 환경의 인증 및 권한 메커니즘 동향을 통한 분산 인증기법 방안 연구)

  • Oh, Dong-Yeol;Sung, Kyung-Sang;Kim, Bae-Hyun;Oh, Hae-Seok
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.35-42
    • /
    • 2008
  • While an information system and administration for an application that a user contacts with raise a head by an important problem, a system approach and methodology for administration are mentioned. Authentication technology of various configuration is used, but non-efficiency by complicated authentication administration and operation inappropriate use are for a successful expansion of various and new business of wire/wireless environment. In addition, under the mobile computer environment with different authentic method each other, it is difficult at all to expect flexible and continuous service. Under the ubiquitous computing environment, It is very important thing plan to research and develop compatibility and the side of variance authentication plan that preservation characteristics are helped. Hereby, This paper look around an requirement items and authority mechanism for the administration and the operation mechanism of the distributed authentication considering expansion possibility of the ubiquitous computing environment not only fixed computing environment but also mobile computing. In future, we expect it by can guide positive participation about distributed authentication technique of the genuine ubiquitous environment.

  • PDF

Characteristics of Wireless Distributed Communication System under the Overlay Convergent Networks (중첩 융합 네트워크에서 분산 무선 통신 시스템의 특성)

  • Cheon, EunJi;Kim, Jeong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.11
    • /
    • pp.986-992
    • /
    • 2012
  • In order to support quickly increasing mobile traffic and deal with various types of users of wireless mobile systems under overlay convergent cognitive networking environments, it is highly required to improve the performance and the capability of the wireless access networks. With distributed antennas and distributed processors, it is possible for mobile terminals (MTs) to monitor interference and control system effectively to minimize mutual interference among users and cells. Virtual cell changes as the MT moves or the environment changes, so no handoff is needed in connections with base station hotelling. In this paper, the characteristics of wireless distributed systems under the overlay convergent networks will be investigated.

An Efficient Election Protocol in a Mobile Computing Environment (이동 컴퓨팅 환경에서 효율적인 선출 프로토콜)

  • Park, Sung-Hoon
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.289-296
    • /
    • 2001
  • The Election protocol can be used as a building block in many practical problems such as group communication, atomic commit and replicated data management where a protocol coordinator might be useful. The problem has been widely studied in the research community since one reason for this wide interest is that many distributed protocols need an election protocol. However, despite its usefulness, to our knowledge there is no work that has been devoted to this problem in a mobile computing environment. Mobile systems are more prone to failures than conventional distributed system. Solving election in such an environment requires from a set of mobile hosts to choose a mobile host or a fixed host based on the their priority despite failures of both mobile computing and/or fixed hosts. In this paper, we describe a solution to the election problem from mobile computing systems. This solution is based on the Garcia Molina\\`s Bully algorithm.

  • PDF

Lifelike Behaviors of Collective Autonomous Mobile Agents

  • Min, Suk-Ki;Hoon Kang
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1998.06a
    • /
    • pp.176-180
    • /
    • 1998
  • We may gaze at some peculiar scenes of flocking of birds and fishes. This paper demonstrates that multiple agent mobile robots show complex behaviors from efficient and strategic rules. The simulated flock are realized by a distributed behavioral model and each mobile robot decides its own motion as an individual which moves constantly by sensing the dynamic environment.

  • PDF

Advanced Mobile Devices Biometric Authentication Model Based on Compliance (컴플라이언스 기반의 발전된 모바일 기기 생체 인증 모델)

  • Jung, Yong-hun;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.879-888
    • /
    • 2018
  • Along with the recent worldwide development of fintech, FIDO (Fast IDentity Online) using biometric technology is rapidly growing in the mobile payment market, replacing the existing password system. This FIDO authentication must be processed in a reliable environment that requires high level of security, as sensitive biometrics is being processed. However, this environment is currently dependent on the manufacturer as it is supported by certain hardware on the smartphone. Therefore, this thesis proposes a server-based authentication model using distributed management of compliance based biometric information that can be used universally safely without the need for specific hardware in mobile environments.

Obstacle Avoidance of Mobile Robot Using Distributed Fuzzy Control with Imitation of Potential Field (Potential Field 모방 분산 퍼지 제어를 통한 이동 로봇의 장애물 회피)

  • Kwak, Hwan-Joo;Park, Gwi-Tae
    • Proceedings of the IEEK Conference
    • /
    • 2009.05a
    • /
    • pp.378-380
    • /
    • 2009
  • For the autonomous movement, the optimal pat]1 planning connecting between current and target positions is essential, and the optimal path of mobile robot means obstacle-free and the shortest length path to a target position. Many actual mobile robots should move without any information of surrounded obstacles. This paper suggests a new method of obstacle avoidment which is suitable in unknown environments. This method of obstacle avoidance is designed with a distributed fuzzy control system, and imitates a Potential Field method. A simulation confirms the performance and correctness of the obstacle avoidance.

  • PDF

Frameworks and Environments for Mobile Agents

  • Kim Haeng Kon;Chung Youn-Ky
    • The Journal of Information Systems
    • /
    • v.14 no.3
    • /
    • pp.48-52
    • /
    • 2005
  • The Mobile agent-based distributed systems become obtaining significant popularity as a potential vehicle to allow software components to be executed on heterogeneous environments despite mobility of users and computations. However, as these systems generally force mobile agents to use only common functionalities provided in every execution environment, the agents may not access environment-specific resources. In this paper, we propose a new framework using Aspect Oriented Programming technique to accommodate a variety of static resources as well as dynamic ones whose amount is continually changed at runtime even in the same execution environment. Unlike previous works, this framework divides roles of software developers into three groups to relieve application programmers from the complex and error prone parts of implementing dynamic adaptation and allowing each developer to only concentrate on his own part. Also, the framework enables policy decision makers to apply various adaptation policies to dynamically changing environments for adjusting mobile agents to the change of their resources.

  • PDF

An Execution Control Algorithm for Mobile Flex Transactions in Mobile Heterogeneous Multidatabase Systems (이동 이질 멀티데이타베이스 시스텐을 위한 이동 유연 트랜잭션의 실행 제어 알고리즘)

  • Gu, Gyeong-Lee;Kim, Yu-Seong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.2845-2862
    • /
    • 1999
  • As the technical advances in portable computers and wireless communication technologies, mobile computing environment has been rapidly expanded. The mobile users on mobile host can access information via wireless communication from the distributed heterogeneous multidatabase system in which pre-existing independent local information systems are integrated into one logical system to support mobile applications. Hence, mobile transaction model should include not only the features for heterogeneous multidatabase systems but also the ones for mobile computing environment. In this paper, we proposed a mobile flex transaction model which extends the flexible transaction model that previously proposed for heterogeneous multidatabase systems is extended to support the requirements of mobile heterogeneous multidatabase systems. We also presented the execution control mechanism of the mobile flex transaction model. The proposed mobile flex transaction model allows the definition of location-dependent subtransactions, the effective support of hand-over, and the flexibility of transaction executions. Hence, the proposed mobile flex transaction model can be suit to mobile heterogeneous multidatabase systems that have low power capability, low bandwidth, and high communication failure possibility.

  • PDF

An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Xiong, Ling;Peng, Daiyuan;Peng, Tu;Liang, Hongbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6169-6187
    • /
    • 2017
  • With the fast growth of mobile services, Mobile Cloud Computing(MCC) has gained a great deal of attention from researchers in the academic and industrial field. User authentication and privacy are significant issues in MCC environment. Recently, Tsai and Lo proposed a privacy-aware authentication scheme for distributed MCC services, which claimed to support mutual authentication and user anonymity. However, Irshad et.al. pointed out this scheme cannot achieve desired security goals and improved it. Unfortunately, this paper shall show that security features of Irshad et.al.'s scheme are achieved at the price of multiple time-consuming operations, such as three bilinear pairing operations, one map-to-point hash function operation, etc. Besides, it still suffers from two minor design flaws, including incapability of achieving three-factor security and no user revocation and re-registration. To address these issues, an enhanced and provably secure authentication scheme for distributed MCC services will be designed in this work. The proposed scheme can meet all desirable security requirements and is able to resist against various kinds of attacks. Moreover, compared with previously proposed schemes, the proposed scheme provides more security features while achieving lower computation and communication costs.

Partially Distributed Dynamic Model for Secure and Reliable Routing in Mobile Ad hoc Networks

  • Anand, Anjali;Aggarwal, Himanshu;Rani, Rinkle
    • Journal of Communications and Networks
    • /
    • v.18 no.6
    • /
    • pp.938-947
    • /
    • 2016
  • A mobile ad hoc network (MANET) is a collection of mobile nodes communicating in an infrastructure-less environment without the aid of a central administrating authority. Such networks entail greater dependency on synergy amongst the nodes to execute fundamental network operations. The scarcity of resources makes it economically logical for nodes to misbehave to preserve their resources which makes secure routing difficult to achieve. To ensure secure routing a mechanism is required to discourage misbehavior and maintain the synergy in the network. The proposed scheme employs a partially distributed dynamic model at each node for enhancing the security of the network. Supplementary information regarding misbehavior in the network is partially distributed among the nodes during route establishment which is used as a cautionary measure to ensure secure routing. The proposed scheme contemplates the real world scenario where a node may exhibit different kinds of misbehavior at different times. Thus, it provides a dynamic decision making procedure to deal with nodes exhibiting varying misbehaviors in accordance to their severity. Simulations conducted to evaluate the performance of the model demonstrate its effectiveness in dealing with misbehaving nodes.