Mobile Web-Based System for Remote-Controlled Electronic Devices and Smart Objects
详细信息    查看全文
  • 作者:Jordán Pascual Espada (1)
    Vicente García-Díaz (1)
    Rubén González Crespo (2)
    Oscar Sanjuán Martínez (3)
    B. Cristina Pelayo G-Bustelo (1)
    Juan Manuel Cueva Lovelle (1)
  • 关键词:Mobile computing ; Wireless communications ; Web browser ; Web ; based services ; Web applications
  • 刊名:Mobile Networks and Applications
  • 出版年:2014
  • 出版时间:June 2014
  • 年:2014
  • 卷:19
  • 期:3
  • 页码:435-447
  • 全文大小:1,815 KB
  • 参考文献:1. Thompson CW (2005) Smart devices and soft controllers. IEEE Internet Comput 9(1):82-5 CrossRef
    2. Kortuem G, Kawsar F, Fitton D, Sundramoorthy V (2010) Smart objects as building blocks for the Internet of things. IEEE Internet Comput 14(1):44-1 CrossRef
    3. Nichols J, Myers BA (2006) Controlling home and office appliances with smart phones. IEEE Pervasive Comput 5(3):60-7 CrossRef
    4. Silva R, Carvalho P, Sousa P, Neves P (2011) Enabling heterogeneous mobility in android devices. Mob Netw Appl 16(4):518-28 CrossRef
    5. Hernandez EA (2009) War of the mobile browsers. IEEE Pervasive Comput 8(1):82-5 CrossRef
    6. Gossweiler R, McDonough C, Lin J, Want R (2011) Argos: building a Web-centric application platform on Top of android. IEEE Pervasive Comput 10(4):10-4 CrossRef
    7. Myers BA, Stiel H, Gargiulo R (1998) Collaboration using multiple PDAs connected to a PC. Proceedings of the 1998 ACM conference on Computer supported cooperative work. Seattle, Washington, United States: ACM, 285-94
    8. Myers BA, Nichols J, Wobbrock JO, Miller RC (2004) Taking handheld devices to the next level. Computer 37(12):36-3 CrossRef
    9. Flynn M, Pendlebury D, Jones C, Eldridge M, Lamming M (2000) The Satchel system architecture: mobile access to documents and services. Mob Netw Appl 5(4):243-58 CrossRef
    10. Rose B (2001) Home networks: a standards perspective. IEEE Commun Mag 39(12):78-5 CrossRef
    11. Xu H, Su R, Hou X, Ni Q (2009) Remote Control System Design Based on Web Server for Digital Home. ed. Hybrid Intelligent Systems, 2009. HIS -9. Ninth International Conference on, 12-4 Aug. 2009 2009, 457-61
    12. Kleinrock L (1996) Nomadicity: anytime, anywhere in a disconnected world. Mob Netw Appl 1(4):351-57
    13. Debaty P, Goddi P, Vorbau A (2005) Integrating the physical world with the web to enable context-enhanced mobile services. Mob Netw Appl 10(4):385-94 CrossRef
    14. Filibeli MC, Ozkasap O, Civanlar MR (2007) Embedded web server-based home appliance networks. J Netw Comput Appl 30(2):499-14 j.jnca.2006.04.001" target="_blank" title="It opens in new window">CrossRef
    15. Kindberg T, Barton J, Morgan J, Becker G, Caswell D, Debaty P, Gopal G, Frid M, Krishnan V, Morris H, Schettino J, Serra B, Spasojevic M (2002) People, places, things: web presence for the real world. Mob Netw Appl 7(5):365-76 CrossRef
    16. Pascual J, Sanjuan O, Pelayo BC, Cueva JM, álvarez M, Gonzalez A (2011) Modeling architecture for collaborative virtual objects based on services. J Netw Comput Appl 34(5):1634-647 j.jnca.2011.04.002" target="_blank" title="It opens in new window">CrossRef
    17. Kanma H, Wakabayashi N, Kanazawa R, Ito H (2003) Home appliance control system over Bluetooth with a cellular phone. Consumer Electron IEEE Trans 49(4):1049-053 CrossRef
    18. Coppola P, Della Mea V, Di Gaspero L, Menegon D, Mischis D, Mizzaro S, Scagnetto I, Vassena L (2010) The context-aware browser. Int Syst IEEE 25(1):38-7 CrossRef
    19. Pascual J, Gonzalez R, Sanjuan O, Pelayo BC, Cueva JM (2012) Extensible architecture for context-aware mobile web applications. Expert Syst Appl 39(10):9686-694 j.eswa.2012.02.151" target="_blank" title="It opens in new window">CrossRef
    20. Stavrou A (2013) Programming on Android: Best Practices for Security and Reliability. Software Security and Reliability (SERE), 2013 I.E. 7th International Conference on 1-
    21. Lu Z, Mukhopadhyay S (2012) Model-Based Static Source Code Analysis of Java Programs with Applications to Android Security. Computer Software and Applications Conference (COMPSAC), 2012 I.E. 36th Annual 322-27. doi:10.1109/COMPSAC.2012.43
    22. Ahmad MS, Musa NE, Nadarajah R, et al. (2013) Comparison between android and iOS Operating System in terms of security. Information Technology in Asia (CITA), 2013 8th International Conference on 1-
    23. Cajic M, Brkic B, Veinovic M (2012) System of assessment security for Android operating system. Telecommunications Forum (TELFOR), 2012 20th 1448-451
    24. Nachenberg C (2011) A Window Into Mobile Device Security, Examining the security approaches employed in Apple’s iOS and Google’s Android. Symatec Security Response. june2011.pdf" class="a-plus-plus">http://investor.symantec.com/files/doc_news/2012/symc_mobile_device_security_june2011.pdf
    25. Jiang D, Fu X, Song M, Cui Y (2012) A security assessment method for Android applications based on permission model. Cloud Computing and Intelligent Systems (CCIS), 2012 I.E. 2nd International Conference on 02:701-05
    26. Rouse J (2012) Mobile devices -the most hostile environment for security? Netw Secur 2012:11-3 CrossRef
    27. Moran S (2012) Security for mobile ATE applications. AUTOTESTCON, 2012 I.E. 204-08
    28. Kawabata H, Isohara T, Takemori K, et al. (2013) SanAdBox: Sandboxing third party advertising libraries in a mobile application. Communications (ICC), 2013 I.E. International Conference on 2150-154
    29. Bau J, Bursztein E, Gupta D, Mitchell J (2010) State of the Art: Automated Black-Box Web Application Vulnerability Testing. Security and Privacy (SP), 2010 I.E. Symposium on 332-45
    30. Fonseca J, Vieira M, Madeira H (2007) Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks. Dependable Computing, 2007 PRDC 2007 13th Pacific Rim International Symposium on 365-72
    31. Jhaveri RH, Patel SJ, Jinwala DC (2012) DoS Attacks in Mobile Ad Hoc Networks: A Survey. Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on 535-41
    32. Zhang Z, Manikopoulos C (2003) Investigation of neural network classification of computer network attacks. Information Technology: Research and Education, 2003 Proceedings ITRE2003 International Conference on 590-94
    33. Leung A, Sheng Y, Cruickshank H (2007) The security challenges for mobile ubiquitous services. Inf Secur Tech Rep 12:162-71 j.istr.2007.05.001" target="_blank" title="It opens in new window">CrossRef
    34. Pierre S (2001) Mobile computing and ubiquitous networking: concepts, technologies and challenges. Telematics Inform 18:109-31 CrossRef
    35. Al-Jaroodi J, Jawhar I, Al-Dhaheri A et al (2010) Security middleware approaches and issues for ubiquitous applications. Comput Math Appl 60:187-97 j.camwa.2010.01.009" target="_blank" title="It opens in new window">CrossRef
  • 作者单位:Jordán Pascual Espada (1)
    Vicente García-Díaz (1)
    Rubén González Crespo (2)
    Oscar Sanjuán Martínez (3)
    B. Cristina Pelayo G-Bustelo (1)
    Juan Manuel Cueva Lovelle (1)

    1. Department of Computer Science, University of Oviedo, Oviedo, Asturias, Spain
    2. Pontifical University of Salamanca, Madrid, Spain
    3. Carlos III University, Madrid, Spain
  • ISSN:1572-8153
文摘
Nowadays there are many intelligent electronic devices in the everyday environments: appliances, industrial machinery, devices for service providers in the cities, etc. These electronic devices usually communicate with other devices and people in order to perform tasks or provide services. The most common form of interaction between people and devices is using the device interfaces (buttons, touch screens, etc.). However, there are other ways of interacting such as Smartphone’s, which are used to communicate users with electronic devices. Normally, the user selects the commands or actions from an application installed on the Smartphone. This application uses the Smartphone communication hardware elements (e.g., Bluetooth, Wi-Fi) to send the selected commands to the electronic device. Native mobile applications are platform-dependent (Android, Symbian, etc.) and are developed for multiple platform usually have high development costs. We present a proposal that allows web applications to access the device communication hardware elements, making possible the communication with physical devices.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700