• Title/Summary/Keyword: mobile communication environment

Search Result 1,403, Processing Time 0.03 seconds

Authentication and Key Agreement Protocol based on NTRU in the Mobile Communication (NTRU기반의 이동 통신에서의 인증 및 키 합의 프로토콜)

  • 박현미;강상승;최영근;김순자
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.49-59
    • /
    • 2002
  • As the electronic commerce increases rapidly in the mobile communication, security issues become more important. A suitable authentication and key agreement for the mobile communication environment is a essential condition. Some protocols based on the public key cryptosystem such as Diffie-Hellman, EIGamal etc. were adapted in the mobile communication. But these protocols that are based on the difficult mathematical problem in the algebra, are so slow and have long key-length. Therefore, these have many limitation to apply to the mobile communication. In this paper, we propose an authentication and key agreement protocol based on NTRU to overcome the restriction of the mobile communication environment such as limited sources. low computational fewer, and narrow bandwidth. The proposed protocol is faster than other protocols based on ECC, because of addition and shift operation with small numbers in the truncated polynomial ring. And it is as secure as other existent mathematical problem because it is based on finding the Shortest or Closest Vector Problem(SVP/CVP).

Wireless LAN based Teleoperation of a Mobile Robot with Force-reflection (무선 LAN기반에서 힘 반영을 이용한 이동로봇의 원격제어)

  • Hong, Hyun-Ju;Park, Chang-Jun;Ro, Young-Shick
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.261-265
    • /
    • 2005
  • In this paper, we constructed the infrastructure with wireless LAN and Access Point in the indoor environment and implemented the teleoperation. Wireless LAN based teleoperation system is irregular communication delay according to environment condition and occurrence possibility of blackout is very high. In this paper, In case these problem happened, we measured communication delay time by real time, and did mobile robot to control harmoniously through vision and force reflection information. Also, we present obstacle-avoidance mode that mobile robot can travel without collision using direction information in case communication delay time is large. We proved usefulness of presented algorithm through teleoperation experiment to apply presented algorithm.

  • PDF

Intelligent Mobile Agents in Personalized u-learning

  • Cho, Sung-Jin;Chung, Hwan-Mook
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.10 no.1
    • /
    • pp.49-53
    • /
    • 2010
  • e-learning and m-learning have some problems that data transmission frequently discontinuously, communication cost increases, the computation speed of mass data drops, battery limitation in the mobile learning environments. In this paper, we propose the PULIMS for u-learning systems. The proposed system intellectualize the education environment using intelligent mobile agent, supports the customized education service, and helps that learners feasible access to the education information through mobile phone. We can see the fact that the efficience of proposed method is outperformed that of the conventional methods. The PULIMS is new technology that can be used to learn whenever and wherever learners want in Ubiquitous education environment.

The Performance Evaluation of XML-based Digital Signature System on Mobile Environment (모바일 환경에서 XML 기반 전자 서명 시스템의 성능 평가)

  • 김남윤;황기태
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.4C
    • /
    • pp.570-580
    • /
    • 2004
  • Due to development of internet and mobile communication, M-commerce applications that utilize the digital signature are widely used these days. The mobile environment is weaker than the wired internet environment. Thus, it is highly required to systematically analyze the effect of processing the digital document and the digital signature algorithm, and low bandwidth of the mobile network on the system performance. In this paper, we have constructed the mobile contract system which has the XML based digital contract and the RSA signature algorithm as the test system. And we have derived the performance parameters and then measured in detail the runtime performance of the mobile digital signature system with the Compaq iPAQ 3850 PDA and CDMA 2000 1x mobile network.

An Efficient Multi-Layer Encryption Framework with Authentication for EHR in Mobile Crowd Computing

  • kumar, Rethina;Ganapathy, Gopinath;Kang, GeonUk
    • International journal of advanced smart convergence
    • /
    • v.8 no.2
    • /
    • pp.204-210
    • /
    • 2019
  • Mobile Crowd Computing is one of the most efficient and effective way to collect the Electronic health records and they are very intelligent in processing them. Mobile Crowd Computing can handle, analyze and process the huge volumes of Electronic Health Records (EHR) from the high-performance Cloud Environment. Electronic Health Records are very sensitive, so they need to be secured, authenticated and processed efficiently. However, security, privacy and authentication of Electronic health records(EHR) and Patient health records(PHR) in the Mobile Crowd Computing Environment have become a critical issue that restricts many healthcare services from using Crowd Computing services .Our proposed Efficient Multi-layer Encryption Framework(MLEF) applies a set of multiple security Algorithms to provide access control over integrity, confidentiality, privacy and authentication with cost efficient to the Electronic health records(HER)and Patient health records(PHR). Our system provides the efficient way to create an environment that is capable of capturing, storing, searching, sharing, analyzing and authenticating electronic healthcare records efficiently to provide right intervention to the right patient at the right time in the Mobile Crowd Computing Environment.

Non-Linear Error Identifier Algorithm for Configuring Mobile Sensor Robot

  • Rajaram., P;Prakasam., P
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.1201-1211
    • /
    • 2015
  • WSN acts as an effective tool for tracking the large scale environments. In such environment, the battery life of the sensor networks is limited due to collection of the data, usage of sensing, computation and communication. To resolve this, a mobile robot is presented to identify the data present in the partitioned sensor networks and passed onto the sink. In novel data collection algorithm, the performance of the data collecting operation is reduced because mobile robot can be used only within the limited range. To enhance the data collection in a changing environment, Non Linear Error Identifier (NLEI) algorithm has been developed and presented in this paper to configure the robot by means of error models which are non-linear. Experimental evaluation has been conducted to estimate the performance of the proposed NLEI and it has been observed that the proposed NLEI algorithm increases the error correction rate upto 42% and efficiency upto 60%.

An Integrated Architecture for Location-Based Mobile Commerce Service in Ubiquitous Environment (유비쿼터스 환경의 위치 기반 모바일 전자상거래 서비스 통합 구조에 관한 연구)

  • Lee, Min-Suk;Lee, Hun-Ll;Lee, Mi-Young
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.3
    • /
    • pp.97-109
    • /
    • 2005
  • The internet and wireless communication technologies are creating ubiquitous environments in which various services are expected anytime and anywhere. Many hardware facilities have been developed and system structures are suggested for mobile services to realize a ubiquitous computing environment with appropriate quality. But these applications are not designed in the consideration of the general capabilities to perform user's wireless and mobile communication/transaction. Consequently, different needs from users are not sufficiently satisfied yet. In this study, we suggest structure of the emerging network system for mobile commerce that provides users with seamless and ubiquitous environments using location information which exploit context-aware technology.

  • PDF

Location management using user mobility pattern in mobile IP and WCDMA network (Mobile IP 와 WCDMA 망에서의 사용자 이동 pattern 에 따른 location management)

  • Kim, Seo-Young;Kim, Jeong-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.229-232
    • /
    • 2005
  • Many kinds of communication systems will be co-existed in the next generation communication environment. Location management will be one of the most important strategies in the future communication network. Whether the user gets the service in any kind of communication system, it is required to know the location of the user properly and manages this location information efficiently. In this paper, mobile IP and WCDMA systems are considered as next generation communication systems. We improve the performance of communication in heterogeneous networks adjusting the conventional region-based location management strategy in homogeneous network. This strategy can be adjusted dynamically to the communication system on the basis of packet-to-mobility ratio (PMR) in mobile IP system or call-to-mobility ratio (CMR) in WCDMA system, lots of different system parameters, and movement pattern of the user. This can be also based on the performance analysis with considering signaling cost and database access cost.

  • PDF

A Study of Android Launcher based on Application Virtualization (어플리케이션 가상화를 적용한 안드로이드 런처 연구)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.115-120
    • /
    • 2013
  • Recently, Virtualization technology is moving the desktop environment from its place a mobile platform environment, personal and businesses, academia, and lacked security and in a team environment brought about many changes are coming. In this environment, a representative of VMware's MVP solution and Enterporid Divide. But, another issue is that these mobile virtualization technologies in an environment of limited resources and performance constraints, have become its application virtualization technology to improve the weaknesses of the mobile platform. In this paper, proposed for client-based desktop application virtualization infrastructure, bring it to the Android environment, weaknesses of the existing paper was user area limitations of the desktop environment with application virtualization, program execution android application virtualization launcher was improved through increased resource allocation.

Chord System Algorithm Based on the mobility in the mobile environment (모바일 환경에서 이동성을 고려한 Chord 시스템 알고리즘)

  • Hong, Rok Ji;Moon, Il Young
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.75-81
    • /
    • 2010
  • Due to the increasing use of smart phones, using Wifi, Wibro of mobile devices spread. Accordingly, Need of using peer-to-peer file sharing between mobile devices is growing. However, common Peer-to-Peer(P2P) system is too complex and is not suitable to be applied to mobile devices. Thus, the need of research has shown to improve way in a mobile environment that has a constraints as mobility and the scope of communication. Among them, there is a Chord as contents look up algorithm. Chord is the issue. Chord as the DHT-based P2P protocol shares files, index-key and distributed key across the network. However, exist Chord doesn't consider the mobility. So, It has a lot of problems in the mobile environment. Thus, in this paper, I will try to explore an appropriate way of Chord in a mobile environment.