Abstract
Nowadays there are many intelligent electronic devices in the everyday environments: appliances, industrial machinery, devices for service providers in the cities, etc. These electronic devices usually communicate with other devices and people in order to perform tasks or provide services. The most common form of interaction between people and devices is using the device interfaces (buttons, touch screens, etc.). However, there are other ways of interacting such as Smartphone’s, which are used to communicate users with electronic devices. Normally, the user selects the commands or actions from an application installed on the Smartphone. This application uses the Smartphone communication hardware elements (e.g., Bluetooth, Wi-Fi) to send the selected commands to the electronic device. Native mobile applications are platform-dependent (Android, Symbian, etc.) and are developed for multiple platform usually have high development costs. We present a proposal that allows web applications to access the device communication hardware elements, making possible the communication with physical devices.
Similar content being viewed by others
References
Thompson CW (2005) Smart devices and soft controllers. IEEE Internet Comput 9(1):82–85
Kortuem G, Kawsar F, Fitton D, Sundramoorthy V (2010) Smart objects as building blocks for the Internet of things. IEEE Internet Comput 14(1):44–51
Nichols J, Myers BA (2006) Controlling home and office appliances with smart phones. IEEE Pervasive Comput 5(3):60–67
Silva R, Carvalho P, Sousa P, Neves P (2011) Enabling heterogeneous mobility in android devices. Mob Netw Appl 16(4):518–528
Hernandez EA (2009) War of the mobile browsers. IEEE Pervasive Comput 8(1):82–85
Gossweiler R, McDonough C, Lin J, Want R (2011) Argos: building a Web-centric application platform on Top of android. IEEE Pervasive Comput 10(4):10–14
Myers BA, Stiel H, Gargiulo R (1998) Collaboration using multiple PDAs connected to a PC. Proceedings of the 1998 ACM conference on Computer supported cooperative work. Seattle, Washington, United States: ACM, 285–294
Myers BA, Nichols J, Wobbrock JO, Miller RC (2004) Taking handheld devices to the next level. Computer 37(12):36–43
Flynn M, Pendlebury D, Jones C, Eldridge M, Lamming M (2000) The Satchel system architecture: mobile access to documents and services. Mob Netw Appl 5(4):243–258
Rose B (2001) Home networks: a standards perspective. IEEE Commun Mag 39(12):78–85
Xu H, Su R, Hou X, Ni Q (2009) Remote Control System Design Based on Web Server for Digital Home. ed. Hybrid Intelligent Systems, 2009. HIS ‘09. Ninth International Conference on, 12–14 Aug. 2009 2009, 457–461
Kleinrock L (1996) Nomadicity: anytime, anywhere in a disconnected world. Mob Netw Appl 1(4):351–357
Debaty P, Goddi P, Vorbau A (2005) Integrating the physical world with the web to enable context-enhanced mobile services. Mob Netw Appl 10(4):385–394
Filibeli MC, Ozkasap O, Civanlar MR (2007) Embedded web server-based home appliance networks. J Netw Comput Appl 30(2):499–514
Kindberg T, Barton J, Morgan J, Becker G, Caswell D, Debaty P, Gopal G, Frid M, Krishnan V, Morris H, Schettino J, Serra B, Spasojevic M (2002) People, places, things: web presence for the real world. Mob Netw Appl 7(5):365–376
Pascual J, Sanjuan O, Pelayo BC, Cueva JM, Álvarez M, Gonzalez A (2011) Modeling architecture for collaborative virtual objects based on services. J Netw Comput Appl 34(5):1634–1647
Kanma H, Wakabayashi N, Kanazawa R, Ito H (2003) Home appliance control system over Bluetooth with a cellular phone. Consumer Electron IEEE Trans 49(4):1049–1053
Coppola P, Della Mea V, Di Gaspero L, Menegon D, Mischis D, Mizzaro S, Scagnetto I, Vassena L (2010) The context-aware browser. Int Syst IEEE 25(1):38–47
Pascual J, Gonzalez R, Sanjuan O, Pelayo BC, Cueva JM (2012) Extensible architecture for context-aware mobile web applications. Expert Syst Appl 39(10):9686–9694
Stavrou A (2013) Programming on Android: Best Practices for Security and Reliability. Software Security and Reliability (SERE), 2013 I.E. 7th International Conference on 1–2
Lu Z, Mukhopadhyay S (2012) Model-Based Static Source Code Analysis of Java Programs with Applications to Android Security. Computer Software and Applications Conference (COMPSAC), 2012 I.E. 36th Annual 322–327. doi:10.1109/COMPSAC.2012.43
Ahmad MS, Musa NE, Nadarajah R, et al. (2013) Comparison between android and iOS Operating System in terms of security. Information Technology in Asia (CITA), 2013 8th International Conference on 1–4
Cajic M, Brkic B, Veinovic M (2012) System of assessment security for Android operating system. Telecommunications Forum (TELFOR), 2012 20th 1448–1451
Nachenberg C (2011) A Window Into Mobile Device Security, Examining the security approaches employed in Apple’s iOS and Google’s Android. Symatec Security Response. http://investor.symantec.com/files/doc_news/2012/symc_mobile_device_security_june2011.pdf
Jiang D, Fu X, Song M, Cui Y (2012) A security assessment method for Android applications based on permission model. Cloud Computing and Intelligent Systems (CCIS), 2012 I.E. 2nd International Conference on 02:701–705
Rouse J (2012) Mobile devices – the most hostile environment for security? Netw Secur 2012:11–13
Moran S (2012) Security for mobile ATE applications. AUTOTESTCON, 2012 I.E. 204–208
Kawabata H, Isohara T, Takemori K, et al. (2013) SanAdBox: Sandboxing third party advertising libraries in a mobile application. Communications (ICC), 2013 I.E. International Conference on 2150–2154
Bau J, Bursztein E, Gupta D, Mitchell J (2010) State of the Art: Automated Black-Box Web Application Vulnerability Testing. Security and Privacy (SP), 2010 I.E. Symposium on 332–345
Fonseca J, Vieira M, Madeira H (2007) Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks. Dependable Computing, 2007 PRDC 2007 13th Pacific Rim International Symposium on 365–372
Jhaveri RH, Patel SJ, Jinwala DC (2012) DoS Attacks in Mobile Ad Hoc Networks: A Survey. Advanced Computing & Communication Technologies (ACCT), 2012 Second International Conference on 535–541
Zhang Z, Manikopoulos C (2003) Investigation of neural network classification of computer network attacks. Information Technology: Research and Education, 2003 Proceedings ITRE2003 International Conference on 590–594
Leung A, Sheng Y, Cruickshank H (2007) The security challenges for mobile ubiquitous services. Inf Secur Tech Rep 12:162–171
Pierre S (2001) Mobile computing and ubiquitous networking: concepts, technologies and challenges. Telematics Inform 18:109–131
Al-Jaroodi J, Jawhar I, Al-Dhaheri A et al (2010) Security middleware approaches and issues for ubiquitous applications. Comput Math Appl 60:187–197
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Espada, J.P., García-Díaz, V., Crespo, R.G. et al. Mobile Web-Based System for Remote-Controlled Electronic Devices and Smart Objects. Mobile Netw Appl 19, 435–447 (2014). https://doi.org/10.1007/s11036-014-0510-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-014-0510-2