Browse > Article

Design and Implementation of the Security Components in Ultra-Lightweight Mobile Computing Environment  

Park, Rae-Young (군산대학교 전자정보공학부)
You, Yong-Duck (충남대학교 컴퓨터공학과)
Lee, Young-Seok (군산대학교 전자정보공학부)
Abstract
The next-generation computer is the ultra-lightweight mobile computer that communicates with peripheral handhold devices and provides dynamically the services appropriate to user. To provide the dynamic services on the ultra-lightweight mobile computer, security problem for user or computer system information should be solved and security mechanism is necessary for the ultra-lightweight mobile computing environment that has battery limit and low performance. In this paper, the security mechanism on the component based middleware for the ultra-lightweight mobile computer was implemented using RC-5 cipher algorithm and SHA-1 authentication algorithm. The security components are dynamically loaded and executed into the component based middleware on the ultra-lightweight mobile computer.
Keywords
Security; Ultra-Lightweight; Mobile Computer; Component Based; RC5; SHA1;
Citations & Related Records
연도 인용수 순위
  • Reference
1 J. Waldo, 'Alive and well: Jini technology today', Computer, Vol.33, No. 6, pp.107-109, June 2000
2 P. Levis and D. Culler, 'Maté : A Tiny virtual machine for sensor networks,' Proc. of Int'l Conf. Architectural Support for Prog. Languages and Op. Sys. 2002
3 최경호 김정식, 임을규, '모바일 환경에서의 보안기법 연구', 한국정보보호학회 하계정보보호학술대회 논문집, Vol 16, No.1, pp 314-315, June 2006
4 S. Vinoski, 'CORBA: integrating diverse applications within distributed heterogeneous environments', IEEE Communications Magazine, pp. 46-55, Volume 35, Issue: 2 , Feb. 1997
5 R. Baldwin, R. Rivest 'The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms', RFC 2040, October 1996
6 S. Mohapatra and N. Venkatasubramanian, 'PARM : Power aware reconfigurable middleware,' Proc. of Int'l Conf. on Dist. Computing Systems, pp.1-8, 2003
7 D. Garlan and et al., 'Project Aura: Toward Distraction-Free Pervasive Computing,' IEEE Pervasive Comp., Apr. June 2002
8 Y. W. Law and J. M. Doumen and P. H. Hartel, 'Benchmarking Block Ciphers for Wireless Sensor Networks(Extended Abstract)', 1st IEEE Int. Conf. on Mobile Ad-Hoc and Sensor Systems (MASS 2004), Fort Lauderdale, Florida, October 2004
9 J. Flinn, E. D. Lara, M. Satyanarayanan, D. S. Wallach, and W. Zwaenepoel, 'Reducing the energy usage of office applications,' IFIP/ACM, 2001
10 유용덕, 최훈, 김형신, 권영미, Takeshi Nanri '경량 미들웨어를 위한 소프트웨어 구조', 한국차세대PC학회 논문지, Vol.1 No.2, pp.34-42. December 2005
11 D. Eastlake, P. Jones, 'US Secure Hash Algorithm 1(SHA1)', RFC 3174, Sep. 2001