Design and Prototyping of Web Service Security on J2ME based Mobile Phones

نویسنده

  • Ti-Shiang Wang
چکیده

One of the main objectives in this paper is to investigate how to manipulate the Simple Object Access Protocol (SOAP) message and place security functions in the header of SOAP message. Here, we will present the design and implementation of web service security application on Java 2 Micro Edition (J2ME) based mobile devices. Basically this prototyping includes two-stage approach. In the first stage, we study the concept of proof in implementation of web services security on the IBM laptop using IBM WebSephere Studio Device Developer (WSDD V 5.6) IDE [1]. In addition we import kXML/kSOAP APIs to process SOAP message and use Bouncy Castle’s API [2] supporting cryptographic algorithms for security implementations. In this paper, the security functions we present here include five tasks: non-security, data digest, data encryption using symmetric key, data encryption using asymmetric key, and digital signature. At each task, we will discuss its corresponding design, SOAP header message, time performance, and return results in emulator. Based on the expected results from the first stage, in the second stage, we use Nokia 6600/3650 mobile phones as target mobile devices to test our application and evaluate performance at each task. Finally we will share our experience and lessons on this work in the conclusion and do the demonstration using Nokia 3650 mobile phone in the conference.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

MIKE's PET: A Participant-based Experiment Tracking tool for HCI Practitioners using Mobile Devices

Knowledge Elicitation (KE) methods are an integral part of Human Computer Interaction (HCI) practices. They are a key aspect to the synthesis of psychology empirical methods with requirements engineering, User Centred Design (UCD) and user evaluations. Examples of these methods include prototyping, focus groups, interviews, surveys and direct video observation. The MIKE project (Mobile Interact...

متن کامل

A Localized and Secure Method for Transferring Bank Information by SMS for Persian Banks

Nowadays m-banking (mobile banking) is widely used in many banks. It has embarked upon supply of various services based on different systems and with the aid of various services such as the Short Message Service (SMS). However in developing countries such as Iran, m-banking is facing some challenges. One of these challenges is the issue of language of this system, because the main language of t...

متن کامل

Mobile and Dynamic Web Services

Making mobile phones capable of consuming Web services over wireless networks is a challenging task because of the different issues to be addressed and the limited resources of mobile devices. In this paper, we focus on the issue of how to perform dynamic discovery and invocation of Web services from mobile phones when a J2ME wireless middleware is used. In order to solve the limitations of the...

متن کامل

QoS-Based web service composition based on genetic algorithm

Quality of service (QoS) is an important issue in the design and management of web service composition. QoS in web services consists of various non-functional factors, such as execution cost, execution time, availability, successful execution rate, and security. In recent years, the number of available web services has proliferated, and then offered the same services increasingly. The same web ...

متن کامل

Design and Implementation of Location Awareness and Sharing System using GPS and 3G/GPRS

In this age of significant telecommunications competition, mobile network operators continuously seek new and innovative ways to create differentiation and increase profits. One of the best ways to accomplish this is through the delivery of highly personalized services. One of the most powerful ways to personalize mobile services is based on location. Location is a key to provide location based...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005