115,410 research outputs found

    MOSDEN: An Internet of Things Middleware for Resource Constrained Mobile Devices

    Get PDF
    The Internet of Things (IoT) is part of Future Internet and will comprise many billions of Internet Connected Objects (ICO) or `things' where things can sense, communicate, compute and potentially actuate as well as have intelligence, multi-modal interfaces, physical/ virtual identities and attributes. Collecting data from these objects is an important task as it allows software systems to understand the environment better. Many different hardware devices may involve in the process of collecting and uploading sensor data to the cloud where complex processing can occur. Further, we cannot expect all these objects to be connected to the computers due to technical and economical reasons. Therefore, we should be able to utilize resource constrained devices to collect data from these ICOs. On the other hand, it is critical to process the collected sensor data before sending them to the cloud to make sure the sustainability of the infrastructure due to energy constraints. This requires to move the sensor data processing tasks towards the resource constrained computational devices (e.g. mobile phones). In this paper, we propose Mobile Sensor Data Processing Engine (MOSDEN), an plug-in-based IoT middleware for mobile devices, that allows to collect and process sensor data without programming efforts. Our architecture also supports sensing as a service model. We present the results of the evaluations that demonstrate its suitability towards real world deployments. Our proposed middleware is built on Android platform

    Security analysis of JXME-Proxyless version

    Get PDF
    JXME es la especificaciĂłn de JXTA para dispositivos mĂłviles con J2ME. Hay dos versiones diferentes de la aplicaciĂłn JXME disponibles, cada una especĂ­fica para un determinado conjunto de dispositivos, de acuerdo con sus capacidades. El principal valor de JXME es su simplicidad para crear peer-to-peer (P2P) en dispositivos limitados. AdemĂĄs de evaluar las funciones JXME, tambiĂ©n es importante tener en cuenta el nivel de seguridad por defecto que se proporciona. Este artĂ­culo presenta un breve anĂĄlisis de la situaciĂłn actual de la seguridad en JXME, centrĂĄndose en la versiĂłn JXME-Proxyless, identifica las vulnerabilidades existentes y propone mejoras en este campo.JXME Ă©s l'especificaciĂł de JXTA per a dispositius mĂČbils amb J2ME. Hi ha dues versions diferents de l'aplicaciĂł JXME disponibles, cada una d'especĂ­fica per a un determinat conjunt de dispositius, d'acord amb les seves capacitats. El principal valor de JXME Ă©s la seva simplicitat per crear peer-to-peer (P2P) en dispositius limitats. A mĂ©s d'avaluar les funcions JXME, tambĂ© Ă©s important tenir en compte el nivell de seguretat per defecte que es proporciona. Aquest article presenta un breu anĂ lisis de la situaciĂł actual de la seguretat en JXME, centrant-se en la versiĂł JXME-Proxyless, identifica les vulnerabilitats existents i proposa millores en aquest camp.JXME is the JXTA specification for mobile devices using J2ME. Two different flavors of JXME implementation are available, each one specific for a particular set of devices, according to their capabilities. The main value of JXME is its simplicity to create peer-to-peer (P2P) applications in limited devices. In addition to assessing JXME functionalities, it is also important to realize the default security level provided. This paper presents a brief analysis of the current state of security in JXME, focusing on the JXME-Proxyless version, identifies existing vulnerabilities and proposes further improvements in this field

    OpenKnowledge at work: exploring centralized and decentralized information gathering in emergency contexts

    Get PDF
    Real-world experience teaches us that to manage emergencies, efficient crisis response coordination is crucial; ICT infrastructures are effective in supporting the people involved in such contexts, by supporting effective ways of interaction. They also should provide innovative means of communication and information management. At present, centralized architectures are mostly used for this purpose; however, alternative infrastructures based on the use of distributed information sources, are currently being explored, studied and analyzed. This paper aims at investigating the capability of a novel approach (developed within the European project OpenKnowledge1) to support centralized as well as decentralized architectures for information gathering. For this purpose we developed an agent-based e-Response simulation environment fully integrated with the OpenKnowledge infrastructure and through which existing emergency plans are modelled and simulated. Preliminary results show the OpenKnowledge capability of supporting the two afore-mentioned architectures and, under ideal assumptions, a comparable performance in both cases
    • 

    corecore