• Title/Summary/Keyword: mobile communication devices

Search Result 1,051, Processing Time 0.034 seconds

Design and Implementation of an Information System for Storing and Querying Context Information in Ubiquitous Smart Space (지능형 유비쿼터스 공간에서 상황 정보의 효과적인 저장 및 질의를 위한 정보 시스템의 설계 및 구현)

  • Lee, Ki-Hyeok;Han, Hyung-Jin;Choi, Won-Chul;Han, Kyoung-Hoon;Han, Ji-Yean;Shon, Kirack
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.15-23
    • /
    • 2008
  • This paper proposes a CIB framework implementing a ubiquitous smart space. In a ubiquitous smart space, a ubiquitous mobile device recognizes surrounding context, and infers the situation and provides services to users. Ubiquitous mobile devices have a RDF store to manage resources and relevant information efficiently on CIB framework. This store space is flexible on the operations such as addition, modification, deletion of information and response to query by SPARQL. In addition, it provides local information to other ubiquitous mobile devices in the from of XML and stores resource information from other ubiquitous mobile devices into local ubiquitous mobile device for the purpose of discovering external resources.

  • PDF

Trace Monitoring System of Mobile Devices based on GML (GML 기반 모바일 디바이스 추적 모니터링 시스템)

  • Jeon, Chang-Young;Park, Jun;Lee, Jin-Seok;Song, Eun-Ha;Jeong, Young-Sik
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.1
    • /
    • pp.19-27
    • /
    • 2007
  • Entering the 21st century, the demand on information service via mobile devices is skyrocketing along with the popularization of computers and mobile communication devices and the rapid development of wireless communication technology. In particular, as mobile device service such as LBS and Telematics becomes highlighted, the management of mobile devices is ever more drawing attention. However, since there is no fixed standard on geographical space data, many commercialized monitoring systems do not use common geographical space data but independent geographic information. Furthermore, as it is impossible to save location information of each mobile device by integrating such information after acquiring them, it is difficult to trace management. Therefore, in this paper, geographic data with DXF. DWG and SHP format, which are commonly used files, were created and visualized by GML format, OGC standard advice. And then, TMS(Trace Monitoring System of Mobile Device) that can trace and manage information after acquiring and saving space information that show the movement of users was implemented.

Design of Secure Protocol based on trust model and trust values for Ubiquitous Sensor Networks (Ubiquitous Sensor Network에서 안전성 증가를 위한 신뢰모델과 신뢰값에 관한 프로토콜 설계)

  • Jang, Kun Won;Suh, Jang Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.9-18
    • /
    • 2008
  • Mobile devices do not need the fixed network infrastructure in ad-hoc network, these devices communicate each other through the distributed control. Accordingly, mobile devices can discover several services using dynamic searching method and provide safely public ownership of these services. Ad-hoc network needs the distributed control and topology of dynamic network because the limited power for processing and network communication. This paper is devoted to provide the secure protocol that provides efficient services discovery using SDP(Service Discovery Protocol) and considers the security requirements. Proposed protocol provides the distributed control based on PKI without central server, the discovery of trusted service, secure telecommunication, the identification among mobile devices, and service access control by user authority.

Privacy-Preserving NFC-Based Authentication Protocol for Mobile Payment System

  • Ali M. Allam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1471-1483
    • /
    • 2023
  • One of the fastest-growing mobile services accessible today is mobile payments. For the safety of this service, the Near Field Communication (NFC) technology is used. However, NFC standard protocol has prioritized transmission rate over authentication feature due to the proximity of communicated devices. Unfortunately, an adversary can exploit this vulnerability with an antenna that can eavesdrop or alter the exchanged messages between NFC-enabled devices. Many researchers have proposed authentication methods for NFC connections to mitigate this challenge. However, the security and privacy of payment transactions remain insufficient. We offer a privacy-preserving, anonymity-based, safe, and efficient authentication protocol to protect users from tracking and replay attacks to guarantee secure transactions. To improve transaction security and, more importantly, to make our protocol lightweight while ensuring privacy, the proposed protocol employs a secure offline session key generation mechanism. Formal security verification is performed to assess the proposed protocol's security strength. When comparing the performance of current protocols, the suggested protocol outperforms the others.

Understanding Mobile e-Text Communication with the Framework of Orality and Literacy: Student Perception of Non-verbal Texts

  • LEE, Hye-Jung;HONG, Young-il;KIM, Yoon-Jung
    • Educational Technology International
    • /
    • v.13 no.1
    • /
    • pp.49-77
    • /
    • 2012
  • The development of mobile devices and network technology is changing the ways in which people communicate with one another. Mobile text message has emerged as one of the most frequently used form of communication, which also gave rise to various non-verbal texts such as emoticons. Nonetheless, the use of text messages has largely been denied in education because text messages often involve colloquial and non-verbal texts considered inappropriate or grammatically incorrect by the teacher. In efforts to provide a theoretical framework to better understand mobile e-text communication, this research compared the practical usages of non-verbal texts in the mobile e-learning environment. The study developed three types of text messages according to the degree of using non-verbal texts and their phraseology as instructors' messages, which were then distributed to 259 students via mobile text messaging. The perceptions of students were analyzed using a semantic differential scale and a questionnaire. The results showed clear differences in students' perceptions of non-verbal text and traditional text, and that optimally designed non-verbal texts turned out to encourage the students' interaction the most out of the three types of text messages. Following the discussion of the results, an expanded theoretical framework beyond Ong's concepts of orality and literacy is also suggested to understand the evolution of mobile e-text communication in education.

Design and Implementation of Real-time Remote Control System (실시간 무선 원격제어 시스템의 설계 및 구현)

  • 이문구;박성원
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1589-1592
    • /
    • 2003
  • Existing system management software solutions show limitations in time and space, as well as problems such as uncertain error messages, and also difficulty providing swift assistance or real time emergency support. Therefore, a wireless remote control system has been designed and implemented in this thesis, which is capable of managing and monitoring remote systems using mobile communication devices (Mobile Phone, PDA, Smart Phone, Webpad) for instantaneous control. The implemented real time wireless remote control system provides remote server management functions, error or event message (unctions, log record functions, authentication function via mobile devices.

  • PDF

A Study of the HTML5-based Mobile Order Communication System

  • Ahn, Yoon-Ae;Cho, Han-Jin
    • International Journal of Contents
    • /
    • v.9 no.1
    • /
    • pp.11-17
    • /
    • 2013
  • Recently, online real-time web accessible mobile devices such as smartphones, tablet PCs and application services have been developing rapidly. Hospitals also need to adopt an efficient information system that can provide decent medical services under mobile computing environments to complete future medical services. This study proposes a system in which a doctor can examine a patient and make out a prescription in a ward on a real-time based on the current Order Communication Systems (OCSs) through mobile interfaces. The proposed system implements mobile web pages using HTML5, instead of a mobile app. Web processing speed can be enhanced using the web socket and web storage functions of HTML5.

CMP: A Context Information-based Routing Scheme with Energy-based Message Prioritization for Delay Tolerant Networks

  • Cabacas, Regin;Ra, In-Ho
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.295-304
    • /
    • 2014
  • Communication infrastructure supports wide variety of mobile services such as photo and file sharing, location tracking, social network services and instant messaging. However, instances like power-loss and natural disasters disrupt these communication infrastructures unable to render support to these mobile services. Delay-tolerant networks (DTNs) offer a solution to these problems at hand. By utilizing mobility and opportunistic contacts among mobile devices, a plausible communication network can be establish and enable support to mobile applications. This paper presents an energy-efficient, reliable message delivery routing scheme with message prioritization rules for DTN. It uses the context information of nodes (mobile devices) such as the contact history (location and time of contact), speed/velocity, moving direction to determine the best forwarders among nodes in the network. The remaining energy of the nodes is also used to determine the message types a node can deliver successfully. The simulation results show that proposed approach outperforms Epidemic and Prophet routing schemes in terms of delivery ratio, overhead ratio, delivered messages per types and remaining energy.

Implementation of the Golf Play Advice System with Reasoning Rules Using Mobile Devices

  • Kim, Kapsu;Min, Meekyung
    • International journal of advanced smart convergence
    • /
    • v.7 no.2
    • /
    • pp.47-54
    • /
    • 2018
  • This paper is a study on implementation of the golf play advice system which provides advice to golfers through mobile devices. The system consists of a mobile unit consisting of a GPS receiver, a data transmitter and receiver, and a display unit, and a server unit composed of a database and advice generator. The advice generator that provides advices to the users, generates advices with IF-THEN rule-based reasoning method. The reasoning module utilizes golfer's personal records and various information in the database of the server unit. This system provides the advice to the users who play on the golf course through mobile devices, so that it is possible to provide various information similar to the screen golf using the computer simulating technology in the outdoor golf course.

Mutual Authentication Protocol using One Time Password for Mobile RFID System (OTP를 이용한 모바일 RFID 상호인증 프로토콜)

  • Sung, Jong-Yeop;Lee, Sang-Duck;Ryu, Chang-Ju;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1634-1642
    • /
    • 2014
  • Mobile RFID system, that consists of the existing RFID reader mounted on the mobile devices such as smartphones, is able to provide the users a variety of services and convenience. But security of mobile RFID system is too weak like the existing RFID system. In this paper, the mobile RFID mutual authentication protocol with high level of security is proposed to overcome the troubles such as cryptographic protocols in the existing RFID system responding with the same value in every authentication procedure and the exposure in the exchange of messages. The proposed protocol exchanges messages unexposed by using the random numbers generated in the mutual authentication between the tag and the reader and making numbers coded with the symmetric key. Besides, the protocol uses the mutual authentication utilizing OTP by considering the characteristics of the reader embedded in mobile devices in the mutual authentication process between the reader and the server. Because changed message in every authentication, which produces safe from spoofing attacks and replay attacks, etc.