Development and implementation of authenticated multi-user mobile Java applications

J. Shell
{"title":"Development and implementation of authenticated multi-user mobile Java applications","authors":"J. Shell","doi":"10.1109/WTS.2009.5068972","DOIUrl":null,"url":null,"abstract":"Across the globe mobile devices are a facet of everyday life. The technology that is encapsulated within these units is accelerating at a phenomenal rate. The addition of a wide range of network connectivity, from InfraRed (IR) to Wireless Local Area Network (WLAN) and more predominantly Bluetooth, has increased the scope of the applications that can be developed and utilised within this market. The demands of ever evolving technology within mobile phones places large burdens on developers to deploy applications to market at an equal rate. Previous pieces of research have highlighted the benefits of utilising a framework in the development of applications. Through the use of Iterative modeling and software prototypes this paper presents an application framework to reduce the complexity and knowledge base necessary to construct a Bluetooth multi-user application. To reduce hardware dependency the framework has been developed on Java 2 Platform, Micro Edition (J2ME). It is also identified that Bluetooth technology within resource restricted devices is prone to security issues. The issues surrounding human interaction in device authentication are addressed by this paper through the addition of an automated Diffie-Hellman key exchange authentication connection process.","PeriodicalId":313087,"journal":{"name":"2009 Wireless Telecommunications Symposium","volume":"77 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-04-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 Wireless Telecommunications Symposium","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/WTS.2009.5068972","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Across the globe mobile devices are a facet of everyday life. The technology that is encapsulated within these units is accelerating at a phenomenal rate. The addition of a wide range of network connectivity, from InfraRed (IR) to Wireless Local Area Network (WLAN) and more predominantly Bluetooth, has increased the scope of the applications that can be developed and utilised within this market. The demands of ever evolving technology within mobile phones places large burdens on developers to deploy applications to market at an equal rate. Previous pieces of research have highlighted the benefits of utilising a framework in the development of applications. Through the use of Iterative modeling and software prototypes this paper presents an application framework to reduce the complexity and knowledge base necessary to construct a Bluetooth multi-user application. To reduce hardware dependency the framework has been developed on Java 2 Platform, Micro Edition (J2ME). It is also identified that Bluetooth technology within resource restricted devices is prone to security issues. The issues surrounding human interaction in device authentication are addressed by this paper through the addition of an automated Diffie-Hellman key exchange authentication connection process.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
开发和实现身份验证的多用户移动Java应用程序
在全球范围内,移动设备是日常生活的一个方面。封装在这些单元中的技术正在以惊人的速度加速发展。从红外(IR)到无线局域网(WLAN),以及更主要的蓝牙,广泛的网络连接的增加,增加了在这个市场中可以开发和利用的应用范围。移动电话中不断发展的技术的需求给开发人员以同样的速度向市场部署应用程序带来了巨大的负担。之前的研究已经强调了在应用程序开发中使用框架的好处。通过使用迭代建模和软件原型,本文提出了一个应用程序框架,以减少构建蓝牙多用户应用程序所需的复杂性和知识库。为了减少对硬件的依赖,该框架是在Java 2 Platform, Micro Edition (J2ME)上开发的。研究还发现,在资源受限的设备中使用蓝牙技术容易出现安全问题。本文通过增加一个自动的Diffie-Hellman密钥交换认证连接过程,解决了围绕设备认证中人机交互的问题。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Blind correlation-based DFE receiver for the equalization of single input multi output communication channels Analysis of threshold of regular and irregular LDPC codes using Gaussian approximation Value analysis of technology evolution: Case mobile peer-to-peer communications New decision feedback channel estimation for OFDM systems Security risk analysis of RFID technology: A RFID tag life cycle approach
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1