Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Ashlesha Mahawadiwar et al.

/ (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES


Vol No. 4, Issue No. 1, 010 - 014

A software framework for authentication of


interacting data between different mobile
applications.

.Ashlesha Mahawadiwar Dr. N.G Bawane

M.E IVsem(Embedded system & Computing) Professor, Computer Science & Engineering
G.H.Raisoni.College of Engineering. G.H.Raisoni.College of Engineering.
Nagpur, India Nagpur, India
ashlesha37@yahoo.com narenbawane@rediffmail.com

T
Abstract

The security of mobile communication has aily benefit. These applications may range from simple e-
become increasingly important with the development of mail systems to complex applications, such as intelligent
devices that features more and more versatile
ES
communication functionality. Third party software in
mobile phones has expanded into areas where the user
expects security in forms of confidentiality and integrity
Personal Digital Assistants, interactive multiplayer games, e-
commerce, location-sensitive transactions systems, and so
on.
of data.
At the same time this development has lead into Some of these applications require the intelligent
a situation where mobile communication is used in areas behavior typically provided by agents, since they must
such as mobile commerce and mobile payments. exhibit capabilities such as autonomy, goal-driven reasoning
Persistence and distribution of data is crucial for these ,reactivity, adaptation, as well as communication,
systems, as the small handheld devices are not as coordination and cooperation with other software entities.
powerful as that of the desktop computers. Different m-commerce applications are being deployed on
In this paper , the proposed work is targeted to
A
small handheld devices, to facilitate the transactions and data
overcome the problem in data sharing in distributed
applications through the concept of Multi-Agent processing in wireless environment [3]
Systems by providing a shared storage. And also, to
provide explicit access to authenticated & authorized In a wireless environment, there is a need for a
MIDlets. With this mechanism, it is possible to share the secure exchange of information between different wireless
data among specific MIDlets safely. devices. Often it is required to have distribution and
IJ

sharing of data among various clients. But enabling


distributed applications opens the data to be accessible for
Keywords:J2ME, Mobile business, MIDlets, RMS,
all MIDlets (small applications running on mobile devices)
MIDP,CLDC
present on the device, hence creating a number of
vulnerabilities to the confidential information that is
I.INTRODUCTION intended to be shared with specific MIDlets. Hence a
MIDlet needs to have a secure storage system.[1]

The integration of novel handheld devices’ capabilities, The information can be susceptible to an attack
such as location, storage, processing and communication, from a malicious user i.e. it can be accessed and manipulated
has opened a myriad of applications from which users can by other MIDlets(from the same device or from a different
device). Sharing the data among different MIDlets creates a
lot of vulnerabilities to the confidential information ,

ISSN: 2230-7818 @ 2011 http://www.ijaest.iserp.org. All rights Reserved. Page 10


Ashlesha Mahawadiwar et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES
Vol No. 4, Issue No. 1, 010 - 014

therefore some mechanism is needed to overcome this A Java virtual machine together with core libraries,
problem and to prevent unintended access of the stored data. classes and Application Programming Interfaces (API)
forms a “J2ME configuration”. “Profiles” define J2ME
The proposed plan for implementing the multi agent environment furthermore, specifying Java platform suited
systems approach consists of implementing the following for “specific” devices . The MIDP profile is the core profile
things : for the CLDC configuration. See fig.1.

1.To overcome the problem in data sharing through the J2ME has a Record Management System (RMS),
concept of multi-agent systems by providing shared storage an Application Programming Interface (API) that provides
among specific MIDlets persistent storage on local device. RMS (kind of a database)
2..To restrict the actions (save, delete, search etc) that can
is the only feature in J2ME for local data storage and is
be performed on the data by invoking the services of agents
along with limited access of data to specific MIDLETs. essential to writing any application that relies on local
3. To enable the record stores of a MIDLET to be shared persistent data . RMS stores all the records in a file with
not only on local device but also across remote devices. extension “.db” called record store. The application
4. To authorize the shared storage of data for a particular developed in J2ME for mobile devices is called a MIDLET
MIDLET. and each MIDLET suit (group of related MIDLETs) can
5. The multi agent system should provide features such as own one or more record stores.
context awareness, object persistence and scalability.

T
Due to the limitations of J2ME Record
Management System (RMS), when the data of record store
is set to shared mode then it can be accessed by all the
II TECHNOLOGY CONSIDERATION MIDLETs present on the device and hence creating a
number of vulnerabilities to the confidential information.
Also, there is no restricted access for intended users.
ES
J2ME is targeted to developers of intelligent
wireless devices and small computing devices who need
incorporate cross-platform functionality into their products.
The consumers of these small devices have high
performance expectations. They expect the same software
and capabilities fond on their desktop and laptop computers
to be available on their cellphones and PDAs.[20]
J2ME slims down the Java Standard Edition
(J2SE) by removing or rewriting key parts of the core
runtime environment in order to fit it into small devices. As
an outcome of a consortium involving Sun Microsystems
Inc. and the major telecommunication devices manufactures
A
(e.g. Motorola, Nokia, Sony, Samsung and Ericsson), J2ME
broadens application perspectives in this area. In fact, it
allows the developers to write their own software for
handheld devices, which was unfeasible before since the
software and platforms for these devices were proprietary.
.
One of the J2ME features is that it provides built in
IJ

caching mechanisms for locally storing data on a mobile


device. The Mobile Information Device Profile (MIDP)
adds APIs (Application Programming Interface) for user Fig 1. Java2 platforms
interaction, network connectivity, and persistent storage.
Java 2 Micro Edition (J2ME) is a runtime environment for
resource-constrained environments. To achieve the desired target, the methodologies
J2ME includes specific virtual machines, which are already implemented are given as:
configurations and profiles for various environments and
needs. With an appropriate configuration and profile, J2ME - JavaSpaces implements the concept of tuple space through
applications could be executed within pagers, mobile Java programming language. It is a service of Jini , which
phones, PDAs, set-top boxes and automobile navigation forms a distributed network of clients and services.
systems. JavaSpaces provide an easy way for communications facility
in mobile distributed applications. Due to the fact that Jini
technology is dependent on Remote Method Invocation

ISSN: 2230-7818 @ 2011 http://www.ijaest.iserp.org. All rights Reserved. Page 11


Ashlesha Mahawadiwar et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES
Vol No. 4, Issue No. 1, 010 - 014

(RMI), which is not supported by number of handheld MIDlets are packaged together in suites inside a .jar
devices,so JavaSpaces is not suitable for distributed mobile file with a Manifest file indicating which classes implement
applications. Moreover, JavaSpaces requires a resource rich which MIDlet. As well as the Java classes, the .jar file can
environment.
contain other resources such as images or sound files. A .jad
-applications developed using MobileSpaces capture events file contains the location of the .jar as well as the list of
through notify() method which resulted in demand of more MIDlets in the suite and other attributes.
resources.[1]
The Record Management System (RMS) is a simple record-
-lightweight storage system based on serialization oriented database that allows a MIDlet to persistently store
framework allows MIDP enabled J2ME devices to store data information and retrieve it later. Different MIDlets can also
on local as well as remote storage spaces requiring similar use the RMS to share data.
semantics., so this framework does not support
heterogeneous environment.
Each record store can be visualized as a collection of
-Existing multi agent system frameworks (JADE-LEAP, records, which will remain persistent across multiple
Grasshopper, Micro FIPA-OS etc.) do not provide invocations of the MIDlet. The device platform is
robustness, context awareness and persistence. responsible for making its best effort to maintain the
integrity of the MIDlet's record stores throughout the normal
use of the platform, including reboots, battery changes, etc.

T
A record store is created in platform-dependent locations,
III.EXAMPLE like nonvolatile device memory, which are not directly
exposed to the MIDlets. The RMS classes call into the
The problem can be illustrated by giving an example. platform-specific native code that uses the standard OS data
manager functions to perform the actual database operations.
ES
A person arrives at an airport. He wants to book
hotel , book a taxi ,and also book the ticket for his return
journey all from his mobile phone. He wants to do this thru
the agent.
Record store implementations ensure that all
individual record store operations are atomic, synchronous,
and serialized, so no corruption of data will occur with
multiple accesses. The record store is timestamped to
denote the last time it was modified. The record store also
The information about hotel is present on the maintains a version, which is an integer that is incremented
database of the mobile of the hotel manager. Also, taxi for each operation that modifies the contents of the record
booking office owner contains details about the taxis in the store. Versions and timestamps are useful for
database of his mobile. synchronization purposes.

The person after arriving , makes a call to the agent. When a MIDlet uses multiple threads to access a
A
The agent ,in order to seek info. about the hotel contacts the record store, it is the MIDlet's responsibility to coordinate
hotel manager . The manager asks about the authentication this access; if it fails to do so, unintended consequences may
of the agent. The agent provides the user name and result. Similarly, if a platform(ex. like a multi-agent system)
performs a synchronization of a record store with multiple
password and confirms his identity. The manager after threads trying to access the record store simultaneously, it is
authenticating the agent, provides him with the latest the platform's responsibility to enforce exclusive access to
availability. The agent then makes a booking and provides it the record store between the MIDlet and its synchronization
IJ

to the customer. This is repeated for booking the taxi and for engine. Each record in a record store is an array of bytes and
the return ticket also. has a unique integer identifier.

Hence, the manager will send the information to the B. Developing an agent management system
registered users only (agent in this case ) but not to any
other persons as the malicious user can damage or change An agent is an intelligent system which has certain
the data . Hence ,protection to the information is provided. set of goals that act on the environment. This agent system
will be above the RMS for giving specific access. Its a kind
of wrapper layer which will guard all the actions related to
record database.
IV.SYSTEM MODULE ANALYSIS
C. Developing message transport service
A. Design of RMS and design the query parser

ISSN: 2230-7818 @ 2011 http://www.ijaest.iserp.org. All rights Reserved. Page 12


Ashlesha Mahawadiwar et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES
Vol No. 4, Issue No. 1, 010 - 014

-Bluetooth. connectivity
customer Shop
Developing the protocol for Bluetooth connectivity owner
has following steps: System Raise a query
- Locating device flow
-Establish connection
Accepts
-Make data transfer between client & server phones
Asks for auth. ,needs
D. Implement authorization & authentication auth.info.
It will make the agent system do the work of
authentication and authorization in the following way:

- check for the validity of the user Usernm,pwd


Process,
-based on that , take a decision to grant the access .

T
valid
-provide authorization by giving privileges to access
certain services. confirmation user
The test bed we are planning to use is Nokia series of
phones.
ES
The flow of the system will be as given in fig.2

Response to Collect
query info from
others
A
Fig.2:secure client-server interaction

V. CONCLUSION
Software security will become a more important
concern in mobile business applications because more and
IJ

more data will be stored or can be accessed with a mobile


device. Also, more services will be provided by the system
through different data connections, like Bluetooth. This
requires Confidentiality, Integrity and Authenticity. The
proposed solution implements these concepts using the
Bluetooth protocol and the Java ME platform.

As the security level is increased, so the growing


processing volume of the application becomes an overhead
for the mobile device processor and battery lifetime.
Because performance and quality are important software
characteristics mainly for users and the security has same

ISSN: 2230-7818 @ 2011 http://www.ijaest.iserp.org. All rights Reserved. Page 13


Ashlesha Mahawadiwar et al. / (IJAEST) INTERNATIONAL JOURNAL OF ADVANCED ENGINEERING SCIENCES AND TECHNOLOGIES
Vol No. 4, Issue No. 1, 010 - 014

important for system owners, developers must find a balance [9] D. Gelernter, "Generative Communication in Linda",
between them. ACM Transactions Programming Languages and Systems.

The system is an innovation with the [10] Xia Shixiong, Chang Zheng. Constructing mobile
practical value, and provides thought and solutions for the business with the IPv6 method[J]. Computer Engineering,
application of future mobile business.
[11] Guo Shaoyou. Discusses of the Web service and
dynamic ecommerce . Information magazine. 2003(2)
.
[12] A. Kaminsky, "JiniME: JiniTM Connection Technology
REFERENCES for Mobile Devices", Information Technology Laboratory
Rochester Institute of Technology, August 2000.
[1]Wu Yueliang,” Mobile Business Application based on
J2ME and web services”, Eighth International Conference [13] T. Rybicki; J. Domaszewicz; “MobileSpaces –
JavaSpaces for Mobile Devices”; Computer as a Tool, 2005.
on Mobile Business,2009 EUROCON 2005.The International Conference on Volume
[2] Muhammad Ainan Sadiq, Syed Muhammad Ali 2, Issue, 2005 Page(s):1076 – 1079

Shah,”Shared storage in J2ME:A multi agent system [14] Philipp Bolliger; Marc Langheinrich; “Distributed

T
approach”, Annual IEEE International Computer Software Persistence for Limited Devices”; Inst. for Pervasive
Computing ETH Zurich, Switzerland.
and Applications Conference,2008
[3] Wassim Itani and Ayman I. Kayssi “J2ME end to end [15] Karun Bakshi, “Oracle Database Lite 10gR2 Feature
Overview”, June 2006, Oracle Corporation, World
security for m-commerce” IEEE,2003 Headquarters, 500 Oracle Parkway, Redwood Shores, CA
ES
[4 ] A. Chander, J. Mitchell, and I. Shin, “Mobile code
security by Java bytecode instrumentation,” in Proc. of
DARPA Information Survivability Conference & Exposition
II 2001. USA: IEEE, 2001.
94065, U.S.A.

[16] Yannis Labrou and Tim Finin, “Agent Communication


Language: the current landscape”, IEEE Intelligent systems,
Language: the current landscape”, IEEE Intelligent systems,
[5]S. Jun-Zhao, D. Howie, A. Koivisto, and J. Sauvola, “A March/April, 1999.
hierarchical framework model of mobile security,” in
Personal, Indoor and Mobile Radio Communications, 2001. [17] Weiss, G. Multiagent Systems: A Modern Approach to
IEEE, 2001. Distributed Artificial
Intelligence, The MIT Press, Cambridge, Massachussets,
[6] P. Ashley, H. Hinton, and M. Vandenwauver, “Wired London, England, 1999.
A
versus Wireless Security: The Internet, WAP and iMode for
E-Commerce,” in Proc. Of Computer Security Applications [18] “Applications for mobile Information Devices: White
Conference 2001, USA, 2001. Paper”, Sun Microsystems,
Inc., 2000
[7] A. Biryukov, A. Shamir, and D. Wagner, “Real time
cryptanalysis of A5/1 on a PC,” Lecture Notes in Computer [19] MIDP 2.0 Style Guide
Science, vol. 1978, 2001.
IJ

[20] J2ME complete reference


[8] Hafiz Farooq et. al: “Persistent Architecture for Context
Aware Lightweight Multi Agent System”. The Fifth [21] JAVA2 complete reference
International Joint Conference on Autonomous Agents &
Multi-Agent Systems, Japan, 2006.

ISSN: 2230-7818 @ 2011 http://www.ijaest.iserp.org. All rights Reserved. Page 14

You might also like