Using a Secure Mobile Object Kernel as Operating System on Embedded Devices to Support the Dynamic Upload of Applications

  • Walter Binder
  • Balázs Lichtl
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2535)


In this paper we present the architecture of an autonomous, multi-purpose station which securely executes dynamically uploaded applications. The station hardware is based on an embedded Java processor running the system software and applications. The system software is built on top of a flexible, lightweight, efficient, and secure mobile object kernel, which is able to receive mobile code and to execute it, while protecting the station from faulty applications. Mobile code is used for application upload, as well as for remote configuration and maintenance. The autonomous station relies on resource accounting and control in order to prevent an overuse of its computing resources. Moreover, applications executing on the station may be charged for their resource consumption. This paper also describes an initial application of the autonomous station, which has been recently deployed in a pilot project: Based on the architecture of the autonomous station, we have designed and implemented an on-demand bus stop.


Mobile Agent Power Supply System Mobile Object Autonomous Station Resource Accounting 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    3GPP. 3GPP Specifications Home Page. Web pages at
  2. 2.
    G. Back, W. Hsieh, and J. Lepreau. Processes in KaffeOS: Isolation, resource management, and sharing in Java. In Proceedings of the Fourth Symposium on Operating Systems Design and Implementation (OSDI–2000), San Diego, CA, USA, Oct. 2000.Google Scholar
  3. 3.
    W. Binder. Design and implementation of the J-SEAL2 mobile agent kernel. In The 2001Symp osium on Applications and the Internet (SAINT-2001), San Diego, CA, USA, Jan. 2001.Google Scholar
  4. 4.
    W. Binder, J. Hulaas, A. Villazón, and R. Vidal. Portable resource control in Java: The J-SEAL2 approach. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA-2001), Tampa Bay, Florida, USA, Ott. 2001.Google Scholar
  5. 5.
    W. Binder and V. Roth. Secure mobile agent Systems using Java: Where are we heading? In Seventeenth ACM Symposium on Applied Computing (SAC-2002), Madrid, Spain, Mar. 2002.Google Scholar
  6. 6.
    G. Bollella, B. Brosgol, P. Dibble, S. Furr, J. Gosling, D. Hardin, and M. Turnbull. The Real-Time Specification for Java. Addison-Wesley, Reading, MA, USA, 2000.Google Scholar
  7. 7.
    C. Bryce and J. Vitek. The JavaSeal mobile agent kernel. In First International Symposium on Agent Systems and Applications (ASA–99)/Third International Symposium on Mobile Agents (MA–99), Palm Springs, CA, USA, Ott. 1999.Google Scholar
  8. 8.
    G. Czajkowski and L. Daynes. Multitasking without compromise: A virtual machine evolution. In ACM Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA –Ul), Tampa Bay, Florida, Ott. 2001.Google Scholar
  9. 9.
    J. Heidemann, F. Silva, C. Intanagonwiwat, R. Govindan, D. Estrin, and D. Ganesan. Building efficient wireless Sensor networks with low-level naming. In G. Ganger, editor, Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP-01), volume 35, 5 of ACM SIGOPS Operating Systems Review, pages 146–159, New York, Ott. 21–24 2001. ACM Press.Google Scholar
  10. 10.
    R. N. Horspool and J. Corless. Tailored compression of Java class files. Software Practice and Experience, 28(12):1253–1268, Ott. 1998.Google Scholar
  11. 11.
    T. Lindholm and F. Yellin. The Java Virtual Machine Specification. Addison-Wesley, Reading, MA, USA, second edition, 1999.Google Scholar
  12. 12.
    G. J. Pottie and W. J. Kaiser. Embedding the Internet: wireless integrated network Sensors. Communications of the ACM, 43(5):51–51, May 2000.CrossRefGoogle Scholar
  13. 13.
    A. Villazón and W. Binder. Portable resource reification in Java-based mobile agent systems. In Fifth IEEE International Conference on Mobile Agents (MA-2001), Atlanta, Georgia, USA, Dec. 2001.Google Scholar
  14. 14.
    J. Vitek and G. Castagna. Seal: A framework for secure mobile computations. In Internet Programming Languages, 1999.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • Walter Binder
    • 1
  • Balázs Lichtl
    • 1
  1. 1.CoCo Software Engineering GmbHViennaAustria

Personalised recommendations