• Title/Summary/Keyword: mobile server

Search Result 1,302, Processing Time 0.027 seconds

Active Rule Manager for the Mobile Agent Middleware System

  • Lee, Yon-Sik;Cheon, Eun-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.99-105
    • /
    • 2016
  • The active rule system is a key element of the rule-based mobile agent middleware system for activeness and autonomy of the sensor network. The rule manager, which is the main components of active rule based mobile agent framework and active rule system, performs the control and management of the rule-related processes. In this paper, we design and implement the roles and functions of the rule manager in detail. The proposed rule manager plays an important role in the sensor network environment. The sensor data server loads the active rule on the mobile agent by the rule manager according to the situations, and the mobile agent migrates to the destination node and performs the designated action. This active rule-based mobile agent middleware system presents the usefulness for the various sensor network applications. Through the rule execution experiment using the rule-based mobile agent, we show the adaptability and applicability of rule-based mobile agent middleware system to the dynamic environmental changes in sensor networks.

Development of A Pilot Android Application for Location-based Mobile Agricultural Information System (위치기반 모바일 농업정보시스템 구축을 위한 안드로이드 애플리케이션 시험 개발)

  • Kim, Sang Min;Jang, Min-Won
    • Journal of Korean Society of Rural Planning
    • /
    • v.20 no.4
    • /
    • pp.277-284
    • /
    • 2014
  • Recently the use of smart phones and mobile devices is increasing rapidly, data search and retrieval in the mobile environments are generalized. There are only few mobile applications available in the area of agriculture while huge amount of new applications are developed and uploaded. The purpose of this study was to develop the android based mobile application for providing agricultural infrastructure and disaster information. The mobile application was designed through the database establishment and management system, server management system, and mobile application development. The database is composed of weather data, agricultural infrastructure data, and agricultural disaster data. By developing the mobile application which provides agricultural infrastructure information, it is expected to improve the accessibility to agricultural information and mitigate the agricultural disaster damages.

Efficient mutual authentication and key distribution protocol for cdma2000 packet data service (cdma2000 패킷 데이터 서비스를 위한 효율적인 상호 인증과 키 분배 프로토콜)

  • 신상욱;류희수
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2002.11a
    • /
    • pp.59-63
    • /
    • 2002
  • 본 논문에서는 DIA.METER AAA(Authentication, Authorization and Accounting) 하부 구조를 가지고 Mobile IP 액세스 기법을 사용하는 cdma2000 패킷 데이터 서비스에서 MN(mobile node)와 AAAH(home AAA server)간의 상호 인증과 Mobile IP 개체들간에 안전한 세션키 분배를 위한 방법을 제안한다. 제안된 프로토콜은 DIAMETER AAA 하부 구조론 가정하며 DIAMETER AAA의 비효율성을 개선하고, 인증과 키 분배 프로토콜의 시큐리티 요구 사항들을 모두 만족한다.

  • PDF

Design and Implementation of Real-time Remote Control System (실시간 무선 원격제어 시스템의 설계 및 구현)

  • 이문구;박성원
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1589-1592
    • /
    • 2003
  • Existing system management software solutions show limitations in time and space, as well as problems such as uncertain error messages, and also difficulty providing swift assistance or real time emergency support. Therefore, a wireless remote control system has been designed and implemented in this thesis, which is capable of managing and monitoring remote systems using mobile communication devices (Mobile Phone, PDA, Smart Phone, Webpad) for instantaneous control. The implemented real time wireless remote control system provides remote server management functions, error or event message (unctions, log record functions, authentication function via mobile devices.

  • PDF

Design and Safety Analysis of a Role-Based Access Control Framework for Mobile Agents in Home Network Environments (홈 네트워크 환경에서 이동 에이전트의 역할에 기반한 접근제어 프레임워크 설계 및 안전성 평가)

  • Jung, Young-Woo;Ko, Kwang-Sun;Kim, Gu-Su;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.14C no.6
    • /
    • pp.537-544
    • /
    • 2007
  • A home network is a residential local area network in which digital home appliances are connected with each other. Applying the mobile agent technology to the home network is expected to provide a new computing model. In particular, mobility and asynchronous ability of mobile agent can be used to reduce network traffic generated for managing home appliances. However, in order to apply the mobile agent concept to the home network, access control for mobile agents is necessary. In the existing home network system, there is one special server, sometimes called home server This server generally has mapping tables to be updated periodically, which describes access control lists between users' authorities and corresponding devices. In this paper, we propose a role-based access control framework with mobile agents in home networks. This framework, called Secure KAgent framework, is designed and implemented based on KAgent system. It has two main characteristics: to control access permissions based on Role-Based Access Control(RBAC) scheme and to safety assign roles to mobile agents by role tickets.

ACE-BIS: A Cost-Effective Bus Information System (ACE-BIS: 최적의 버스 노선을 선택하기 위한 비용 효율적인 알고리즘의 개발)

  • Lee, Jong-Chan;Park, Sang-Hyun;Seo, Min-Koo;Kim, Sang-Wook
    • Journal of KIISE:Databases
    • /
    • v.33 no.7
    • /
    • pp.655-667
    • /
    • 2006
  • Due to the rapid development in mobile communication technologies, the usage of mobile devices such as cellular phones and PDAs becomes increasingly popular. One of the best ways to maximize the usability of mobile devices is to make them aware of their current locations and the locations of other fixed and mobile objects. In this paper, we propose a cost-effective Bus Information System, ACE-BIS, which utilizes a mobile device to retrieve the bus routes to reach a destination from the current location. To accomplish this task, ACE-BIS maintains a small amount of information on bus stops and bus routes in a mobile device and runs a heuristic routing algorithm based on such information. When a user asks more accurate route information or calls for a 'leave later query', ACE-BIS entrusts the task to a server into which real-time traffic and bus location information is being collected. By separating the roles into a mobile device and a server, ACE-BIS is able to provide bus routes at the lowest cost for wireless communications, without imposing much burden to a server. The results of extensive experiments revealed that ACE-BIS is effective and scalable in most experimental settings.

A Strategy to maintain Cache Consistency in Mobile Computing Environments using the Asynchronous Broadcasting (비동기적 방송을 사용하는 이동 컴퓨팅 환경에서 캐쉬 일관성 유지 정책)

  • Kim, Dae-Ong;Park, Seong-Bae;Hwang, Bu-Hyun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.11
    • /
    • pp.2763-2775
    • /
    • 1998
  • In mobile computing environments, to efficiently use the narrow bandwidth of wireless networks a mobile host caches the data that are frequently accessed. But, because the cached data can be inconsistent with the data n a server due to the host mobility and the disconnection from a server, the usefullness of cached data may be losted. The traditional methods emphasize on the cache consistency and assume that broadcasting times are synchronized at all mobile supprot stations. In this paper, we propose a strategy to maintain cache consistency, which resolves the problems that be caused by the migration of mobile host. The proposed strategy has asynchronous broadcasting time and reduces the communication overhead caused by the synchronization. Also, by preventing the unnecessary messages transmitting from the mobile support station to a mobile host, this strategy can reduce the communication cost and use the narrow bandwidth of wireless networks efficiently.

  • PDF

Design and Implementation of SK-VM based Avatar E-mail Service System (SK-VM 기반의 Avatar E-mail 서비스 시스템 설계 및 구현)

  • Lee Kyung-Jin;Song Wang-Cheol;Lee Jung-Yun
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.4
    • /
    • pp.212-218
    • /
    • 2005
  • These days, mobile technology is developing very fast. It has increased the usage of the Internet by mobile phones. Nowadays the avatar and game contents services are most popular in mobile phones using the Internet. In this paper, we propose a Client/Server system to combine the animation avatar and e-mail services on SK-VM which are different from simple avatar services. The server which consists of DB (database) module and mail management module is designed in order to manage the information about avatar and the user. The client is designed so as to show the email contents and avatar animation on the mobile phone. This model is intended to reduce the performance overhead on the client as much as possible. We expect that this module would be useful in the mobile phones with limited resources, although the technology is being developed very rapidly.

  • PDF

Design and Implementation of Object Reusing Methods for Mobile Vector Map Services (모바일 벡터 지도 서비스를 위한 객체 재사용 기법의 설계 및 구현)

  • Kim, Jin-Deog;Choi, Jin-Oh
    • The KIPS Transactions:PartD
    • /
    • v.10D no.3
    • /
    • pp.359-366
    • /
    • 2003
  • Although the reuse of the cached data for scrolling the map reduces the amount of passed data between client and server, it needs the conversions of data coordinates, selective deletion of objects, cache compaction and object structuring step in the clients. The conversion is a time- intensive operation due to limited resources of mobile phones such as low computing power, small memory. Therefore, in order to control the map efficiently in the vector map service based mobile phones, it is necessary to study the methods which reuse cached objects for reducing wireless network bandwidth and overwhelming the limited resources of mobile phones as well. This paper proposes the methods of reusing pre-received spatial objects for map control in the mobile vector map service system based on client-server architecture. The experiments conducted on the Web GIS systems with real data show that the proposed method is appropriate to map services for mobile phone. We also analyze the advantages and drawbacks between the reuse of cached data and transmission of raw data respectively.

Preventing ELF(Executable and Linking Format)-File-Infecting Malware using Signature Verification for Embedded Linux (임베디드 리눅스에서 서명 검증 방식을 이용한 악성 프로그램 차단 시스템)

  • Lee, Jong-Seok;Jung, Ki-Young;Jung, Daniel;Kim, Tae-Hyung;Kim, Yu-Na;Kim, Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.6
    • /
    • pp.589-593
    • /
    • 2008
  • These days, as a side effect of the growth of the mobile devices, malwares for the mobile devices also tend to increase and become more dangerous. Because embedded Linux is one of the advanced OSes on mobile devices, a solution to preventing malwares from infecting and destroying embedded Linux will be needed. We present a scheme using signature verification for embedded Linux that prevents executallle-Infecting malwares. The proposed scheme works under collaboration between mobile devices and a server. Malware detection is delegated to the server. In a mobile device, only integrity of all executables and dynamic libraries is checked at kernel level every time by kernel modules using LSM hooks just prior to loading of executables and dynamic libraries. All procedures in the mobile devices are performed only at kernel level. In experiments with a mobile embedded device, we confirmed that the scheme is able to prevent all executable-Infecting malwares while minimizing damage caused by execution of malwares or infected files, power consumption and performance overheads caused by malware check routines.