<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-7743</journal-id>
<journal-title><![CDATA[Ingeniería, investigación y tecnología]]></journal-title>
<abbrev-journal-title><![CDATA[Ing. invest. y tecnol.]]></abbrev-journal-title>
<issn>1405-7743</issn>
<publisher>
<publisher-name><![CDATA[Universidad Nacional Autónoma de México, Facultad de Ingeniería]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-77432010000200008</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[Generic Model to Send Secure Alerts for Utility Companies]]></article-title>
<article-title xml:lang="es"><![CDATA[Modelo genérico para el envío de alertas seguras en empresas del sector energético]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Galván-Bobadilla]]></surname>
<given-names><![CDATA[I.]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Santos-Domínguez]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
<xref ref-type="aff" rid="A02"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Perez-Díaz]]></surname>
<given-names><![CDATA[J.A.]]></given-names>
</name>
<xref ref-type="aff" rid="A03"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Instituto de Investigaciones Eléctricas  ]]></institution>
<addr-line><![CDATA[Cuernavaca Morelos]]></addr-line>
<country>México</country>
</aff>
<aff id="A02">
<institution><![CDATA[,Instituto de Investigaciones Eléctricas  ]]></institution>
<addr-line><![CDATA[Cuernavaca Morelos]]></addr-line>
<country>México</country>
</aff>
<aff id="A03">
<institution><![CDATA[,Tecnológico de Monterrey Campus Cuernavaca ]]></institution>
<addr-line><![CDATA[Cuernavaca Morelos]]></addr-line>
<country>México</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>06</month>
<year>2010</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>06</month>
<year>2010</year>
</pub-date>
<volume>11</volume>
<numero>2</numero>
<fpage>217</fpage>
<lpage>231</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-77432010000200008&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-77432010000200008&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-77432010000200008&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[In some industries such as logistics services, bank services, and others, the use of automated systems that deliver critical business information anytime and anywhere play an important role in the decision making process. This paper introduces a "Generic model to send secure alerts and notifications", which operates as a middleware between enterprise data sources and its mobile users. This model uses Short Message Service (SMS) as its main mobile messaging technology, however is open to use new types of messaging technologies. Our model is interoperable with existing information systems, it can store any kind of information about alerts or notifications at different levels of granularity, it offers different types of notifications (as analert when critical business problems occur,asanotificationina periodical basis or as 2 way query). Notification rules can be customized by final users according to their preferences. The model provides a security framework in the cases where information requires confidentiality, it is extensible to existing and new messaging technologies (like e-mail, MMS, etc). It is a platform, mobile operator and hardware independent. Currently, our solution is being used at the Comisión Federal de Electricidad (Mexico's utility company) to deliver secure alerts related to critical events registered in the main power generation plants of our country.]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[En algunas industrias como las empresas de generación eléctrica, consultoras de servicios de logística, banca y otras, el uso de sistemas automatizados que entreguen -en cualquier lugar y en cualquier momento- información crítica del negocio, juegan un papel muy importante en el proceso de toma de decisiones. En este artículo se presenta un "modelo genérico para enviar notificaciones y alertas en forma segura", el cual opera como una capa intermedia entre las fuentes de datos empresariales y sus usuarios móviles. Este modelo usa el servicio de mensajes cortos o Short Message Service (SMS) como su principal tecnología de mensajería, no obstante, está abierto a usar nuevas tecnologías de mensajería. Nuestro modelo es interoperable con sistemas informáticos existentes, es capaz de almacenar en distintos niveles de granu-laridad cualquier tipo de información sobre alertas o notificaciones, ofrece distintos tipos de notificación (por ejemplo: como alerta cuando ocurre algún problema crítico del negocio, como una notificación en forma periódica ó como una consulta de dos vías). Las reglas de notificación pueden ser personalizadas por los usuarios finales, de acuerdo a sus preferencias. El modelo ofrece un marco de seguridad para aquellos casos en que la información requiere ser protegida, además es extensible con nuevas tecnologías de mensajería. Es independiente de hardware, sistema operativo y operadora de telefonía celular. Actualmente, nuestra solución se encuentra en uso por la Comisión Federal de Electricidad para enviar alertas seguras relacionadas con eventos críticos ocurridos en las principales plantas de generación eléctrica de nuestro país.]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[Mobile middle ware]]></kwd>
<kwd lng="en"><![CDATA[mobile environments]]></kwd>
<kwd lng="en"><![CDATA[nomadic computing]]></kwd>
<kwd lng="es"><![CDATA[capas intermedias móviles]]></kwd>
<kwd lng="es"><![CDATA[ambientes móviles]]></kwd>
<kwd lng="es"><![CDATA[cómputo móvil]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[ <p align="center"><font face="verdana" size="4"><b>Generic Model to Send Secure Alerts for Utility Companies</b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="3"><b>Modelo gen&eacute;rico para el env&iacute;o de alertas seguras en empresas del sector energ&eacute;tico</b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="center"><font face="verdana" size="2"><b>Galv&aacute;n&#150;Bobadilla I.<sup>1</sup>, Santos&#150;Dom&iacute;nguez M.<sup>2</sup> y Perez&#150;D&iacute;az J.A.<sup>3</sup></b></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><i><sup>1</sup> Instituto de Investigaciones El&eacute;ctricas. </i><i>Cuernavaca, Morelos, M&eacute;xico. </i><i>E&#150;mail: </i><a href="mailto:igalvan@iie.org.mx"><i>igalvan@iie.org.mx</i></a></font></p>     <p align="justify"><font face="verdana" size="2"><i><sup>2</sup> Instituto de Investigaciones El&eacute;ctricas. </i><i>Cuernavaca, Morelos, M&eacute;xico. </i><i>E&#150;mail: </i><a href="mailto:msantos@iie.org.mx"><i>msantos@iie.org.mx</i></a></font></p>     <p align="justify"><font face="verdana" size="2"><i><sup>3</sup> Tecnol&oacute;gico de Monterrey, Campus Cuernavaca. </i><i>Cuernavaca, Morelos, M&eacute;xico. E&#150;mail: </i><a href="mailto:jesus.arturo.perez@itesm.mx"><i>jesus.arturo.perez@itesm.mx</i></a></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">Recibido: abril de 2008    <br> Reevaluado: enero de 2009    <br> Aceptado: febrero de 2009</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>     <p align="justify"><font face="verdana" size="2">In some industries such as logistics services, bank services, and others, the use of automated systems that deliver critical business information anytime and anywhere play an important role in the decision making process. This paper introduces a "Generic model to send secure alerts and notifications", which operates as a middleware between enterprise data sources and its mobile users. This model uses Short Message Service (SMS) as its main mobile messaging technology, however is open to use new types of messaging technologies. Our model is interoperable with existing information systems, it can store any kind of information about alerts or notifications at different levels of granularity, it offers different types of notifications (as analert when critical business problems occur,asanotificationina periodical basis or as 2 way query). Notification rules can be customized by final users according to their preferences. The model provides a security framework in the cases where information requires confidentiality, it is extensible to existing and new messaging technologies (like e&#150;mail, MMS, etc). It is a platform, mobile operator and hardware independent. Currently, our solution is being used at the Comisi&oacute;n Federal de Electricidad (Mexico's utility company) to deliver secure alerts related to critical events registered in the main power generation plants of our country.</font></p>     <p align="justify"><font face="verdana" size="2"><b>Keywords:</b>Mobile middle ware, mobile environments, nomadic computing.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Resumen</b></font></p>     <p align="justify"><font face="verdana" size="2"><i>En algunas industrias como las empresas de generaci&oacute;n el&eacute;ctrica, consultoras de servicios de log&iacute;stica, banca y otras, el uso de sistemas automatizados que entreguen &#150;en cualquier </i><i>lugar y en cualquier momento&#150; informaci&oacute;n cr&iacute;tica del negocio, juegan un papel muy importante en el proceso de toma de decisiones. En este art&iacute;culo se presenta un "modelo gen&eacute;rico para enviar notificaciones y alertas en forma segura", el cual opera como una capa intermedia entre las fuentes de datos empresariales y sus usuarios m&oacute;viles. Este modelo usa el servicio de mensajes cortos o Short Message Service (SMS) como su principal tecnolog&iacute;a de mensajer&iacute;a, no obstante, est&aacute; abierto a usar nuevas tecnolog&iacute;as de mensajer&iacute;a. Nuestro modelo es interoperable con sistemas inform&aacute;ticos existentes, es capaz de almacenar en distintos niveles de granu&#150;laridad cualquier tipo de informaci&oacute;n sobre alertas o notificaciones, ofrece distintos tipos de notificaci&oacute;n (por ejemplo: como alerta cuando ocurre alg&uacute;n problema cr&iacute;tico del negocio, como una notificaci&oacute;n en forma peri&oacute;dica &oacute; como una consulta de dos v&iacute;as). Las reglas de notificaci&oacute;n pueden ser personalizadas por los usuarios finales, de acuerdo a sus preferencias. El modelo ofrece un marco de seguridad para aquellos casos en que la informaci&oacute;n requiere ser protegida, adem&aacute;s es extensible con nuevas tecnolog&iacute;as de mensajer&iacute;a. Es independiente de hardware, sistema operativo y operadora de telefon&iacute;a celular. Actualmente, nuestra soluci&oacute;n se encuentra en uso por la Comisi&oacute;n Federal de Electricidad para enviar alertas seguras relacionadas con eventos cr&iacute;ticos ocurridos en las principales plantas de generaci&oacute;n el&eacute;ctrica de nuestro pa&iacute;s.</i></font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>Descriptores: </b><i>capas intermedias m&oacute;viles, ambientes m&oacute;viles, c&oacute;mputo m&oacute;vil.</i></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Introduction</b></font></p>     <p align="justify"><font face="verdana" size="2">Medium to large size organizations have a variety of information systems like administrative, operative or strategic applications; these applications contain very valuable and helpful information for the decision&#150;making process. Usually, these systems need to be consulted from a desktop computer so the user can be informed of critical information.</font></p>     <p align="justify"><font face="verdana" size="2">There are scenarios where users have no access to a desktop computer because most of their time is spent in continuous movement outside of their offices, and some of these users are persons who are responsible for taking critical decisions for the company. This group of users requires mobility and ubiquitous access to information at the moment that is needed.</font></p>     <p align="justify"><font face="verdana" size="2">Hence, there is a need to have a tool that monitors and unifies critical business information which delivers it to decision makers as quickly as possible in pocket&#150;sized devices, in a secure way, anytime&#150;anywhere and also eliminate the need for wires.</font></p>     <p align="justify"><font face="verdana" size="2">An alternative to solve those necessities is the creation of a "middleware" between data sources and final users that make use of mobile messaging as an instantaneous medium of communication.</font></p>     <p align="justify"><font face="verdana" size="2">Such middleware must resolve the following challenges (see <a href="#figura1">figure 1</a>):</font></p>     <blockquote>       <p align="justify"><font face="verdana" size="2">A) <i>Interoperability with existing systems</i>. Usually, data sources are heterogeneous; information is stored in different database management systems and acceded through applications created in distinct programming languages.</font></p>       ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">The middleware must provide a standard mechanism for connecting to data sources without concerning the technical aspects where they were created.</font></p>       <p align="justify"><font face="verdana" size="2">B) <i>Handle different kinds of notification contents</i>. Notification data in a certain domain may not be the same in another domain, so a flexible repository design must be considered to store any kind of information related to a notification service.</font></p>       <p align="justify"><font face="verdana" size="2">C) Confidentiality and integrity of messages have to be assured, especially when classified data is transmitted.</font></p>       <p align="justify"><font face="verdana" size="2">D) <i>Different mobile messaging technologies and devices to notify</i>. The content of messages needs to be transformed to a proper format according to the type of device where the message is going to be read.</font></p>       <p align="justify"><font face="verdana" size="2">E) <i>Users require customizing their notification preferences</i>. There are some cases where alerting services are too general, and users need to customize their notification preferences according to their information needs.</font></p>       <p align="justify"><font face="verdana" size="2">For example: if the alerting system consists of notifying the presence of hurricanes, maybe a user who is living in the west will decide to only receive alerts of hurricanes from the Pacific Ocean.</font></p> </blockquote>     <p align="center"><font face="verdana" size="2"><a name="figura1"></a></font></p>     <p align="center"><font face="verdana" size="2"><img src="/img/revistas/iit/v11n2/a8f1.jpg"></font></p>     <p align="center"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Selected technologies and related work</b></font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">As part of this research, we made an analysis of the current Mobile Messaging Technologies (MMT) in order to decide which of them is more suitable to our country.</font></p>     <p align="justify"><font face="verdana" size="2">Currently there are three MMTs: <i>Short Message Service </i>(SMS) (2002), <i>Enhanced Message Service </i>(EMS) and <i>Multimedia Messaging Service </i>(MMS). <a href="/img/revistas/iit/v11n2/a8t1.jpg" target="_blank">Table 1</a> summarizes all the features of each technology.</font></p>     <p align="justify"><font face="verdana" size="2">SMS is the most used technology in the world. According to Garnet Dataquest Group, one of the industry's major research agencies, it is estimated that in 2002, 142 billion SMS messages were exchanged worldwide, and 168 billion in 2003 (Le Bodic, 2003). In M&eacute;xico the use of SMS is intensive; from 2003 to 2005 SMS increased by 500% (Olgu&iacute;n, 2006). On the other hand, its cost is very low: 85 cents of a peso, compared with MMS that costs 13 pesos per message (The net size guide 2006) plus download charges.</font></p>     <p align="justify"><font face="verdana" size="2">The previous information motivated this work to focus on the use of SMS as a default technology to send alerts, in addition to the following: it is very cheap; it is available in many countries; it is present in any cell phone; it is interoperable between different cell phone companies; offers "store and forward messaging", that means, that when a user has "turned off" his mobile, the SMS center holds the message until the user turns "on" his equipment; and many other advantages mentioned in Drumea <i>et al</i>. (2004) and Ravi <i>et al</i>. (2004).</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Related work</b></font></p>     <p align="justify"><font face="verdana" size="2">Before starting with the design of our proposed model, we made an analysis of previously related work on the use of mobile messaging for sending alerts (see <a href="/img/revistas/iit/v11n2/a8t2.jpg" target="_blank">table 2</a>).</font></p>     <p align="justify"><font face="verdana" size="2">We found the following disadvantages: they are expensive tools; they are proprietary and domain specific; they do not offer security on the transmission of messages; they are operating system dependant and are limited to a specific mobile technology; and they do not allow the customization of notification preferences.</font></p>     <p align="justify"><font face="verdana" size="2">The work described in (Wams <i>et al</i>., 2003) is an abstract model that it is implementation independent, so features G, H, I and J are not available. On the other hand, security is achieved by using hybrid protocol based on public and private keys; however this requires bigger processing requirements that are not suitable for many mobile devices. Ravi (2004) offers very poor security: data is only encoded (not encrypted); access rights are based on a plain user&#150;id.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>SMS Based Generic Model</b></font></p>     <p align="justify"><font face="verdana" size="2"><b>To send secure notifications in real time systems</b></font></p>     <p align="justify"><font face="verdana" size="2">After analyzing the previous work, we concluded that it was necessary to create a cheaper solution that eliminates all the disadvantages that the other tools have. <a href="#figura1">Figure 1</a> shows the architecture of the proposed model.</font></p>     <p align="justify"><font face="verdana" size="2">Generic connectors</font></p>     <p align="justify"><font face="verdana" size="2">In order to be able to communicate the middleware with any data source (challenge A), we created a couple of documents (called generic connectors) based on XML &#91;1&#93;; the advantage of using XML is that publishers just need to generate (or "push") two outputs based in our proposed XML structure.</font></p>     <p align="justify"><font face="verdana" size="2">The first output (called XMLAlertDef) is generated only once and is used by the publishers to describe what the alert consists of (See <a href="#figura2">figure 2</a>).</font></p>     <p align="center"><font face="verdana" size="2"><a name="figura2"></a></font></p>     <p align="center"><font face="verdana" size="2"><img src="/img/revistas/iit/v11n2/a8f2.jpg"></font></p>     <p align="justify"><font face="verdana" size="2">A tipical <i>XMLAlertDef </i>document will include: the alert's name, the alert's description, who is the publisher, how often information will be published, if it has support for two&#150;way messaging and (optionally) the name and type of additional information that can be included as "extra_parameters" in the content of an alert's message.</font></p>     <p align="justify"><font face="verdana" size="2">The second output (called XMLAlertData), is used by publishers to issue the message content of an alert, this document is generated when new information is registered at data sources (See <a href="#figura3">figure 3</a>).</font></p>     ]]></body>
<body><![CDATA[<p align="center"><font face="verdana" size="2"><a name="figura3"></a></font></p>     <p align="center"><font face="verdana" size="2"><img src="/img/revistas/iit/v11n2/a8f3.jpg"></font></p>     <p align="justify"><font face="verdana" size="2">The use of "extra_parameter" tags are very useful when the publisher wants to add more data granularity to the alerting service, for example, if the alerting service is Temperature of Mexico City the "extra_param&#150;eters" tags will probably include data like: humidity, UV Index, precipitation probability, etc. In the other hand, the subscriber can take advantage of the information contained in the "extra_parameter" tags to customize his notification preferences based on its contents.</font></p>     <p align="justify"><font face="verdana" size="2">The "extra_parameters" are also used to solve any kind of information related to a notification service (challenge B).</font></p>      <p align="justify"><font face="verdana" size="2">Alert's monitor</font></p>     <p align="justify"><font face="verdana" size="2">This component works in three modes: per event mode, "two ways" mode and periodical mode.</font></p>     <p align="justify"><font face="verdana" size="2">Per event mode:</font></p>     <p align="justify"><font face="verdana" size="2">There are some scenarios where information is generated in a random, unpredictable or unexpected way, for example, an earthquake, a fault in a power station, the increase or decrement of auctions, etc. On this type of scenarios, the "per event" monitoring mode is used.</font></p>     <p align="justify"><font face="verdana" size="2">Similar to the "event streams" described in Chen (2002), in the per event mode, publishers have the responsibility to identify and deliver new information. It is more efficient that the publisher "push" information when generated instead of having a monitor checking continuously data sources and consequently consuming resources such as bandwidth, DB connections, processor time, etc.</font></p>     <p align="justify"><font face="verdana" size="2">The monitor is "listening" for new data and when this occurs it verifies the authenticity of the data source and if it is valid, proceeds to create a list of subscribers for that alerting service. Later, for each subscriber, it carries out a process called "parameters collation" (explained in section 4.3) to verify if the received data "matches" with the user's notification preferences. In the case of a match, it checks on which mobile equipment and MMT the notification must be sent.</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">Finally, based on that information, the middleware adapts and dispatches the message using the appropriate Mobile Messaging Gateway (MMG). A MMG is a hardware and software component that serves as an access   point   to   other   networks;   it   makes   the conversion of protocols between different types of networks or applications. <a href="#figura4">Figure 4</a> shows the flow diagram for this mode.</font></p>     <p align="center"><font face="verdana" size="2"><a name="figura4"></a></font></p>     <p align="center"><font face="verdana" size="2"><img src="/img/revistas/iit/v11n2/a8f4.jpg"></font></p>     <p align="justify"><font face="verdana" size="2">"Two ways" mode:</font></p>     <p align="justify"><font face="verdana" size="2">In this mode, the way that information travels is different; in this case the mobile user sends a request using a message (See <a href="#figura5">figure 5</a>). This message includes a prefix, 2&#150;ways parameters and the source's equipment ID. The "prefix" parameter is used by the monitor to identify the alerting service which will process the request, the 2&#150;way parameters are optional and they are used by the data source system as a filter of information, finally the equipment ID is later used by the MMG to return to the subscriber the results of the query.</font></p>     <p align="center"><font face="verdana" size="2"><a name="figura5"></a></font></p>     <p align="center"><font face="verdana" size="2"><img src="/img/revistas/iit/v11n2/a8f5.jpg"></font></p>     <p align="justify"><font face="verdana" size="2">Periodical mode:</font></p>     <p align="justify"><font face="verdana" size="2">This monitoring mode is used when information at data sources is generated on a regular basis, so the middleware knows how often new information will be available. Examples of this type of information are the amount of sales in a week, the daily price of fuel and other raw materials, the monthly complaint summary, etc.</font></p>     <p align="justify"><font face="verdana" size="2">This mode is similar to per event mode, the only difference is that the monitor is continuously consulting data sources (based on the notification period specified by the publisher).</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">The minimal time for monitoring is every hour and the maximum is every year. When new information is discovered, a similar process like "per event mode" is carried out.</font></p>     <p align="justify"><font face="verdana" size="2">With this component, the middleware determines if an alert must be sent to a subscriber or not. This is achieved by doing a Parameters Collation Process (PCP). See <a href="#figura6">figure 6</a>.</font></p>     <p align="center"><font face="verdana" size="2"><a name="figura6"></a></font></p>     <p align="center"><font face="verdana" size="2"><img src="/img/revistas/iit/v11n2/a8f6.jpg"></font></p>     <p align="justify"><font face="verdana" size="2">The PCP analyzes and compares each "extra_param&#150;eter" tag included in the XMLAlertData Document against the parameters that were customized by the subscriber. In the case that all the "extra_parameter" values   satisfy   the   conditions   indicated   by   the subscriber, the alert must be sent. On the contrary, the alert should be ignored.</font></p>     <p align="justify"><font face="verdana" size="2"><a href="#figura6">Figure 6</a> shows an example of the PCP, in that example, Subscriber A is the only one who is going to receive an alert because all his conditions are satisfied.</font></p>     <p align="justify"><font face="verdana" size="2">The PCP is a novel feature that allows subscribers to customize their notification preferences when no alert's history is stored in the middleware's database. The PCP was not found in any of the related work (challenge E).</font></p>      <p align="justify"><font face="verdana" size="2">Our middleware also offers templates that include common notification preferences, with this feature a subscriber can save time at the customization of notificacion preferences process. In future work, our middleware will include Artificial Intelligent techniques to decide when an alert should be sent based on the alerts sent to subscribers in the past.</font></p>      <p align="justify"><font face="verdana" size="2">Message adapter and dispatcher</font></p>     <p align="justify"><font face="verdana" size="2">Based on Haneef <i>et al</i>. (2004) we developed a Message Adapter (MA) component, that transforms the content of a message in to a proper format in order to suite the capabilities of the target device, for example, if the subscriber wishes to receive an alert via MMS the MA transforms the content of the alert (the XMLAlertData Document) into SMIL &#91;3&#93;. SMIL is the used language for creating MMS messages. If another subscriber wants to receive an alert as an e&#150;mail then the MA transforms the message into HTML, etc. The MA uses XSLT &#91;4&#93; as its core technology (see <a href="#figura7">figure 7</a>).</font></p>     ]]></body>
<body><![CDATA[<p align="center"><font face="verdana" size="2"><a name="figura7"></a></font></p>     <p align="center"><font face="verdana" size="2"><img src="/img/revistas/iit/v11n2/a8f7.jpg"></font></p>     <p align="justify"><font face="verdana" size="2">With XSLT the rules about how the middleware has to transform an alert into specific format are provided as external instructions that can be updated or removed without affecting the middleware's operation. If a new MMT is created and the middleware wants to use it, the middleware's administrator only needs to register the new MMT and attach its corresponding XSLT document.</font></p>     <p align="justify"><font face="verdana" size="2">By using a MA the middleware is extensible to other messaging technologies (so challenge D in <a href="#figura1">figure 1</a> and feature G in <a href="/img/revistas/iit/v11n2/a8t2.jpg" target="_blank">table 2</a> is achieved).</font></p>     <p align="justify"><font face="verdana" size="2">The MA is a feature that was not found in any of the previous work. We succesfully tested our MA transforming XMLAlertData to SMS, HTML and email. Future work will include voiceXML, SMIL and SVG transformations.</font></p>     <p align="justify"><font face="verdana" size="2">Message encrypter &amp; decrypter</font></p>     <p align="justify"><font face="verdana" size="2">As we mentioned in section 2, we focused on the use of SMS as a default MMT. However, SMS does not consider any security features, hence, information is transmitted as plain text, and therefore, it is susceptible to malicious attacks like eavesdropping and data alteration (Talukder, 2003).</font></p>     <p align="justify"><font face="verdana" size="2">This is a problem when the type of information to be transmitted is classified. To avoid these problems we propose a Message Encrypter (ME) in the middleware and a Message Decrypter (MD) at the end user's mobile equipment, as illustrated in <a href="#figura1">figure 1</a>.</font></p>     <p align="justify"><font face="verdana" size="2">The message Encrypter seeks (inside of the middleware database) the subscriber's password and uses it as a symmetric key to encrypt the message to be sent. The subscriber's password was previously provided when the user subscribed to an alerting service. <a href="#figura8">Figure 8</a> shows the message protection process.</font></p>     <p align="center"><font face="verdana" size="2"><a name="figura8"></a></font></p>     ]]></body>
<body><![CDATA[<p align="center"><font face="verdana" size="2"><img src="/img/revistas/iit/v11n2/a8f8.jpg"></font></p>     <p align="justify"><font face="verdana" size="2">The use of an encrypter and decrypter component is a feature was not found in any of the related work and that is used to assure the confidentiality of SMS (challenge C). Authentication is out of the scope of our middleware, because this is done when the subscribers registers his mobile equipment to the notification service. We assume that additional authentication is made by the mobile carrier when the subscriber's mobile is connected to the network.</font></p>     <p align="justify"><font face="verdana" size="2">With the encrypter and decrypter components, our model is a cheap and safe solution that can be used to deliver confidential SMS in several domains where information is classified, for example, to send a password to activate a system, a credit card number for bank transactions, the name and diagnosis results of a patient in a hospital, the amount of sales of a store, the geographic coordinates of an important shipment, etc.</font><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Implementation</b></font></p>     <p align="justify"><font face="verdana" size="2">The proposed model was implemented and distributed in several hardware and software components. Currently, it is being successfully used in a real world application at the Comisi&oacute;n Federal de Electricidad (CFE) (2007) to deliver secure alerts related to critical events   registered   in   the   main   power   generation plants of our country. CFE is the utility company in Mexico. <a href="#figura9">Figure 9</a> shows the distribution diagram of the implemented model. However, a smaller hardware and software distribution can be made to reduce costs which would be easy to install in small businesses.</font></p>     <p align="center"><font face="verdana" size="2"><a name="figura9"></a></font></p>     <p align="center"><font face="verdana" size="2"><img src="/img/revistas/iit/v11n2/a8f9.jpg"></font></p>     <p align="justify"><font face="verdana" size="2">The alert monitor and filter, the message encrypter and the message adapter and dispatcher were implemented as a Java 2 SE desktop application, which operates as thread that is continuously executed to search new alerts.</font></p>     <p align="justify"><font face="verdana" size="2">Another important part of our implementation is mAlert, which is a web application where the middleware's administrator can register and manage alerting services, supported devices, MMTs, MMGs and subscribers. Additionally, mAlert provides a public area where mobile users can subscribe to alerting services and customize their notification preferences (see <a href="/img/revistas/iit/v11n2/a8f10.jpg" target="_blank">figure 10</a>).</font></p>     <p align="justify"><font face="verdana" size="2">Concerning the confidentiality and integrity of SMS, the Message Encrypter and the Message Decry&#150;pter was implemented using symmetric cryptography based on AES (Daemen, <i>et al</i>., 2002) and SHA&#150;2 (Eastlake <i>et al</i>., 2006). We selected AES algorithm because it is the best and current encryption standard, and there is a current implementation available. A stronger cryptosystem is not required because the alert's data is not considered to be top secret stuff.</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">Message Decrypter was specifically implemented as a mobile application (MIDlet) based on J2ME &#91;2&#93; / MIDP2.0 (2002) that can be executed in a PDA or a Cell Phone, this application is listening for incoming ciphered SMS at a specific port number.</font></p>     <p align="justify"><font face="verdana" size="2">When a new secure SMS arrives at the mobile device the application is launched and asks the user for a valid password in order to display the message, as illustrated in <a href="#figura11">figure 11</a>.</font></p>     <p align="center"><font face="verdana" size="2"><a name="figura11"></a></font></p>     <p align="center"><font face="verdana" size="2"><img src="/img/revistas/iit/v11n2/a8f11.jpg"></font></p>     <p align="justify"><font face="verdana" size="2">In order to send secure SMS to a specific port number in a mobile device, we developed our own SMS gateway (called <i>mGateway</i>). <i>mGateway </i>is a multi&#150;platform application (created in Java) that is capable to manipulate (Through AT Commands, 2003 in PDU mode) any cell phone or GSM MODEM (based on ETSI standard) connected by a COM port to send SMS. <i>mGateway </i>includes inside of the SMS message information about: the port number where the message has to be sent (port addressing), the size of the message, the payload, the digest and other extra parameters, as illustrated in <a href="#figura12">figure 12</a>.</font></p>     <p align="center"><font face="verdana" size="2"><a name="figura12"></a></font></p>     <p align="center"><font face="verdana" size="2"><img src="/img/revistas/iit/v11n2/a8f12.jpg"></font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Potential aplications</b></font></p>     <p align="justify"><font face="verdana" size="2">Although our current implementation is being used by the utility sector, our model can be extrapolated to other domains like banking services, logistic and financial services. The following is a list of examples where the proposed model can be used:</font></p>     ]]></body>
<body><![CDATA[<blockquote>       <p align="justify"><font face="verdana" size="2">1. Alerts about unsafe operation levels in production plants.</font></p>       <p align="justify"><font face="verdana" size="2">2. Notifications about fuel price variations.</font></p>       <p align="justify"><font face="verdana" size="2">3. Earthquake and infrastructure impacts reports.</font></p>       <p align="justify"><font face="verdana" size="2">4. High traffic warnings.</font></p>       <p align="justify"><font face="verdana" size="2">5. Bad weather and disaster alerts.</font></p>       <p align="justify"><font face="verdana" size="2">6. Notification of expired payments.</font></p>       <p align="justify"><font face="verdana" size="2">7. Notification of important banking transactions.</font></p>       <p align="justify"><font face="verdana" size="2">8. Notification of daily revenues in small business.</font></p>       <p align="justify"><font face="verdana" size="2">9. Low stock warnings.</font></p> </blockquote>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Future work</b></font></p>     <p align="justify"><font face="verdana" size="2">During the testing of our work we identified that performance and wait times presented a variation between different mobile devices, network technologies and network providers.</font></p>     <p align="justify"><font face="verdana" size="2">Future work will implement a similar model like the one is exposed in Wittie <i>et al</i>. (2007), in order to manage a fine tunning to our application code to ensure consisten behavior across platform types and network providers, and by consequence to assure a good aplicaction usability and performance.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Conclusions</b></font></p>     <p align="justify"><font face="verdana" size="2">There are many areas where the benefits of mobile messaging can be exploited. The proposed model provides an easy and fast way to implement it.</font></p>     <p align="justify"><font face="verdana" size="2">Our current implementation has contributed to the decision making process of the CFE's power generation area. It is being successfully used at 300 thermoelectric power plants where supervisors can be well informed about failures and anomalies in the production process. In the near future, the CFE will use our implementation to provide alerting services about unsafe water levels in dams at hydro power plants.</font></p>     <p align="justify"><font face="verdana" size="2">The use of XML as a universal connector for publishing alerts facilitates the integration of existing information systems with the proposed middleware.</font></p>     <p align="justify"><font face="verdana" size="2">The use of "extra_parameters" tags allows storing any kind of information about an alert and helps to provide a depth level of granularity in the contents of an alert.</font></p>     ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">The Parameter Collation Process (PCP) takes advantage of the existence of the "extra_parameters" tags in order to allow subscribers to customize their notification preferences. Both PCP and "extra_parameters" are useful and novel features that were not found in any of the related work.</font></p>     <p align="justify"><font face="verdana" size="2">The use of XSLT converts our model to an extensible tool to new mobile messaging technologies. The integration of encryption mechanism and the use of SHA&#150;1 contribute to the area of security of SMS, which was not considered by its creators.</font></p>     <p align="justify"><font face="verdana" size="2">The creation of a Java based mobile messaging gateway capable of connecting to GSM modems via serial communication offers great flexibility to companies that need to incorporate SMS based services at a lower cost, because they do not require expensive hardware, a specific cell phone carrier, and a specific operating system.</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>Acknowledgments</b></font></p>     <p align="justify"><font face="verdana" size="2">This research was supported by research grants from the Mexican Electric Research Institute (IIE).</font></p>     <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>References</b></font></p>     <!-- ref --><p align="justify"><font face="verdana" size="2">AT Command Set for User Equipment (UE) 3GPP TS 27.007 V3.13.0 (2003&#150;03). 3rd Generation Partnership Project.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252823&pid=S1405-7743201000020000800001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Bulk SMS India–NonStopSMS.com–India's First Website Dedicated to Bulk SMS solutions &#91;on line&#93;. &#91;January 10, 2006&#93;. Available on: <a href="http://www.nonstopsms.com/" target="_blank">http://www.nonstopsms.com</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252824&pid=S1405-7743201000020000800002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Comisi&oacute;n Federal de Electricidad (CFE). Mexico's Utility Company &#91;on line&#93;. &#91;Januar, 2007&#93;. Available on: <a href="http://www.cfe.gob.mx/en" target="_blank">http://www.cfe.gob.mx/en</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252825&pid=S1405-7743201000020000800003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Daemen J., Rijmen V. <i>The Design of Rijndael: AES&#150;The Advanced Encryption Standard</i>. Springer&#150;Verlag. 2002. ISBN: 3540425802.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252826&pid=S1405-7743201000020000800004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Dantas M.A.R., Baggio R.K. A SMS Tool for Alerts and Monitoring of a High Availability Cluster Environment. IEEE 19th International Symposium on High Performance Computing Systems and Applications, 2005, pp. 307&#150;11. ISBN: 0 7695 2343 9. 15&#150;18 May 2005, Guelph, ON, Canada.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252827&pid=S1405-7743201000020000800005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Drumea A., Svasta P., Popescu C. Remote Access Solutions for Industrial Control Systems. 27th International Spring Seminar on Electronics Technology: Meeting the Challenges of Electronics Technology Progress, Vol.1, Pages 30&#150;35. IEEE, Institute of Electrical Engineers. 13&#150;16 May 2004.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252828&pid=S1405-7743201000020000800006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Eastlake D., Hansen T. US Secure Hash Algorithms (SHA and HMAC&#150;SHA), RFC 4634 &#91;on line&#93;. &#91;July 2006&#93;. Available on: <a href="http://tools.ietf.org/html/rfc4634" target="_blank">http://tools.ietf.org/html/rfc4634</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252829&pid=S1405-7743201000020000800007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Chen G., Kotz D. Solar: An Open Platform for Context&#150;Aware Mobile Applications. In Proceedings of the First International Conference on Pervasive Computing, pp. 41&#150;47, June, 2002.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252830&pid=S1405-7743201000020000800008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Haneef A., Ganz A. ANMoLe–An Adaptive Multimedia Content Delivery Middleware Architecture for Heterogeneous Mobile Multi&#150;Device Neighborhoods. <i>International Journal of Multimedia Tools and Applications </i>(Kluwer Academic Publishers), 22(2):171&#150;186, February 2004.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252831&pid=S1405-7743201000020000800009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Jain R., Puglia S., Wullert J., Parmeswaran K., Bakker J. The Mobile Application Server (MAS): An Infrastructure Platform for Mobile Wireless Services. <i>Information Systems Frontiers</i>, 6(1):23&#150;34. Mar. 2004. ISSN: 1387&#150;3326. Springer Netherlands.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252832&pid=S1405-7743201000020000800010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Le Bodic G. <i>Mobile Messaging Technologies and Services: SMS, EMS and MMS</i>. John Willey &amp; Sons. 2003. P. 36. ISBN: 0&#150;470&#150;84876&#150;6</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252833&pid=S1405-7743201000020000800011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Message Master&trade; Enterprise Alert, SMS Software for Enterprises. Derdack GmbH. Germany &#91;on line&#93;. &#91;February 15, 2006&#93;. Available on: <a href="http://www.derdack.com/products/EA.htm" target="_blank">http://www.derdack.com/products/EA.htm</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252834&pid=S1405-7743201000020000800012&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Mobile Information Device Profile 2.0 Java Community &#91;on line&#93;. &#91;2002&#93;. Available on: <a href="http://jcp.org/aboutJava/communityprocess/final/jsr118/" target="_blank">http://jcp.org/aboutJava/communityproess/final/jsr118/index.html</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252835&pid=S1405-7743201000020000800013&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Olgu&iacute;n&#150;S&aacute;nchez J. Quintuplican env&iacute;o de mensajes cortos &#91;on line&#93;. Pagina oficial de la Presidencia de la Rep&uacute;blica &#91;January 10, 2006&#93;. Available on: <a href="http://www.presidencia.gob.mx/buscador/index.php?co" target="_blank">http://www.presidencia.gob.mx/buscador/index.php?conteido=17470 &amp; pagina=1 &amp; palabras=sms</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252836&pid=S1405-7743201000020000800014&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Ravi S., Chathish M.S., Prasanna H. WAP and SMS Based Emerging Techniques for Remote Monitoring and Control of a Process Plant. On: 7th International Conference on Signal Processing Proceedings (ICSP'04), 2004, p. 2672&#150;2675. ISBN: 0&#150;7803&#150;8406&#150;7. IEEE, Institute of Electrical Engineers. Aug 31&#150;Sep 4 2004, Beijing, China.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252837&pid=S1405-7743201000020000800015&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2"><i>Small Screens a Global Vision, The Net Size Guide</i>. Net Size S.A. Paris France. February 2006. ISBN: 2 &#150;9523533&#150;1&#150;X</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252838&pid=S1405-7743201000020000800016&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">SMS Messaging Software From NotePage. NotePage Pro &#91;on line&#93;. &#91;January 12, 2006&#93;. Available on: <a href="http://www.notepage.net/" target="_blank">http://www.notepage.net/</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252839&pid=S1405-7743201000020000800017&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Talukder&#150;Asoke K. Information Assurance and Security needs in an ASP/MVNO Environment for Pervasive Content through SMS/GSM. International Conference on Communication and Broadband Networks. May 5&#150;7, 2003. Bangalore, India.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252840&pid=S1405-7743201000020000800018&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Technical Realization of the Short Message Service (SMS), Release 1998, 3GPP TS 03.40 V7.5.0 (2001&#150;12). 3rd Generation Partnership Project (3GPP). France, 2002.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252841&pid=S1405-7743201000020000800019&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Telcel–DATUM. SMS Alerts Generated by Systems Logs &#91;on line&#93;. &#91;January 10&#93;. Available on: 2006 <a href="http://www.datumtelcel.com/fr_contenidos.html" target="_blank">http://www.datumtelcel.com/fr_contenidos.html?op=01</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252842&pid=S1405-7743201000020000800020&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">What is NowSMS? &#91;on line&#93;. &#91;February, 2006&#93;. Available on: NowSMS.com. <a href="http://www.nowsms.com/whatisnowsms.htm" target="_blank">http://www.nowsms.com/whatisnowsms.htm</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252843&pid=S1405-7743201000020000800021&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Wams J., Van Steen M. A Flexible Middleware Layer for User&#150;to&#150;User Messaging. In Proc. 14th International Conference on Distributed Applications and Interoperable Systems, Lecture Notes on Computer Science, Nov. 2003. Springer&#150;Verlag, Berlin.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252844&pid=S1405-7743201000020000800022&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">Wittie M.P., Stone&#150;Gross K.C. Almeroth and Elizabeth M. Belding.MIST: Cellular Data Network Measurement for Mobile Applications. Proceedings of IEEE Broadnets, Raleigh, NC. September 2007.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252845&pid=S1405-7743201000020000800023&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;1&#93; &#91;Extensible Markup Language (XML). World Wide Web Consortium (W3C) &#91;on line&#93;. Available on: <a href="http://www.w3.org/XML/" target="_blank">http://www.w3.org/XML/</a>.</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252846&pid=S1405-7743201000020000800024&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;2&#93; &#91;Java ME&#150;Micro App Development Made Easy. Java Technology &#91;on line&#93;. Available on: &#91;<a href="http://java.sun.com/javame/index.jsp" target="_blank">http://java.sun.com/javame/index.jsp</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252847&pid=S1405-7743201000020000800025&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;3&#93; &#91;SMIL, The Synchronized Multimedia Integration Language. World Wide Web Consortium (W3C) &#91;on line&#93;. Available on: <a href="http://www.w3.org/AudioVideo/" target="_blank">http://www.w3.org/AudioVideo/</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252848&pid=S1405-7743201000020000800026&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2">&#91;4&#93; &#91;XSL Transformations (XSLT). World Wide Web Consortium (W3C) &#91;on line&#93;.Available on: <a href="http://www.w3.org/TR/xslt" target="_blank">http://www.w3.org/TR/xslt</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=4252849&pid=S1405-7743201000020000800027&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><p align="justify"><font face="verdana" size="2">&nbsp;</font></p>     <p align="justify"><font face="verdana" size="2"><b>About the authors</b></font></p>     <p align="justify"><font face="verdana" size="2"><i>Israel Galv&aacute;n&#150;Bobadilla</i>. Received the B.S. degree in computer systems from Universidad de Occidente, Campus Guasave, Sinaloa, Mexico, in 2000 and the Masters degree in Computer Science from the Tecnol&oacute;gico de Monterrey, Mexico, in 2006. Since 2001, he has been with the Electrical Research Institute, Cuernavaca, Morelos, Mexico, where he has developed several information systems for the Mexican power sector.</font></p>     <p align="justify"><font face="verdana" size="2"><i>Mart&iacute;n Santos&#150;Dom&iacute;nguez</i>. Received the B.S. degree in Physics from Universidad de Veracuz, Mexico, in 1987 and the M.S. degree in fiber optics from the University of Salford, England, in 1994. He has experience in the development of virtual instrumentation systems and image processing, LAN/WAN networks design, installation and management; he also has worked in the multimedia applications field with the use of integrated audio and video services. Since 1998, he has been with the Department of Information Systems at the Electric Research Institute, Mexico, where he is a Project leader. He has directed numerous information system projects for the Mexican Petroleum Company and the CFE (the main utility company of Mexico).</font></p>     <p align="justify"><font face="verdana" size="2"><i>Jesus Arturo P&eacute;rez&#150;D&iacute;az. </i>Obtained his B.Sc. degree in Computer Science from the Universidad Autonoma de Aguascalientes, Mexico, in 1995. He worked as a system and network administrator in the Aguascalientes city hall. He got his PhD Degree in Computer Science in the University of Oviedo in 2000. During his PhD studies, he carried out research in mobile agents and published around 12 research papers in magazines and international conferences and became a full associate member of the European founded research project AgentLink. Nowadays he is a researcher and professor in the Tecnologico de Monterrey, Campus Cuernavaca and member of the Mexican Researchers National System, his research field focus in network security and wireless communications. Currently Jes&uacute;s Arturo P&eacute;rez&#150;D&iacute;az holds the recognized Cisco certifications CCNA and CCAI, which allows him to give Cisco certification courses. He has given security courses in some European and South American Universities.</font></p>     ]]></body>
<body><![CDATA[ ]]></body><back>
<ref-list>
<ref id="B1">
<nlm-citation citation-type="book">
<source><![CDATA[AT Command Set for User Equipment (UE) 3GPP TS 27.007 V3.13.0 (2003-03)]]></source>
<year></year>
<publisher-name><![CDATA[3rd Generation Partnership Project]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B2">
<nlm-citation citation-type="">
<collab>Bulk SMS India-NonStopSMS.com</collab>
<source><![CDATA[]]></source>
<year>Janu</year>
<month>ar</month>
<day>y </day>
</nlm-citation>
</ref>
<ref id="B3">
<nlm-citation citation-type="">
<collab>Comisión Federal de Electricidad</collab>
<source><![CDATA[Mexico's Utility Company]]></source>
<year>Janu</year>
<month>ar</month>
<day>, </day>
</nlm-citation>
</ref>
<ref id="B4">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Daemen]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Rijmen]]></surname>
<given-names><![CDATA[V.]]></given-names>
</name>
</person-group>
<source><![CDATA[The Design of Rijndael: AES-The Advanced Encryption Standard]]></source>
<year>2002</year>
<publisher-name><![CDATA[Springer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B5">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Dantas]]></surname>
<given-names><![CDATA[M.A.R.]]></given-names>
</name>
<name>
<surname><![CDATA[Baggio]]></surname>
<given-names><![CDATA[R.K.]]></given-names>
</name>
</person-group>
<source><![CDATA[A SMS Tool for Alerts and Monitoring of a High Availability Cluster Environment]]></source>
<year>15-1</year>
<month>8 </month>
<day>Ma</day>
<conf-name><![CDATA[19 International Symposium on High Performance Computing Systems and Applications]]></conf-name>
<conf-date>2005</conf-date>
<conf-loc> </conf-loc>
<page-range>307-11</page-range><publisher-loc><![CDATA[Guelph^eON ON]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B6">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Drumea]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Svasta]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
<name>
<surname><![CDATA[Popescu]]></surname>
<given-names><![CDATA[C.]]></given-names>
</name>
</person-group>
<source><![CDATA[Remote Access Solutions for Industrial Control Systems]]></source>
<year>13-1</year>
<month>6 </month>
<day>Ma</day>
<volume>1</volume>
<conf-name><![CDATA[27 International Spring Seminar on Electronics Technology: Meeting the Challenges of Electronics Technology Progress]]></conf-name>
<conf-loc> </conf-loc>
<page-range>30-35</page-range><publisher-name><![CDATA[IEEE, Institute of Electrical Engineers]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B7">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Eastlake]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
<name>
<surname><![CDATA[Hansen]]></surname>
<given-names><![CDATA[T.]]></given-names>
</name>
</person-group>
<source><![CDATA[US Secure Hash Algorithms (SHA and HMAC-SHA), RFC 4634]]></source>
<year>July</year>
<month> 2</month>
<day>00</day>
</nlm-citation>
</ref>
<ref id="B8">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Chen]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
<name>
<surname><![CDATA[Kotz]]></surname>
<given-names><![CDATA[D.]]></given-names>
</name>
</person-group>
<source><![CDATA[Solar: An Open Platform for Context-Aware Mobile Applications]]></source>
<year>June</year>
<month>, </month>
<day>20</day>
<conf-name><![CDATA[First International Conference on Pervasive Computing]]></conf-name>
<conf-loc> </conf-loc>
<page-range>41-47</page-range></nlm-citation>
</ref>
<ref id="B9">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Haneef]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Ganz]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[ANMoLe-An Adaptive Multimedia Content Delivery Middleware Architecture for Heterogeneous Mobile Multi-Device Neighborhoods]]></article-title>
<source><![CDATA[International Journal of Multimedia Tools and Applications]]></source>
<year>Febr</year>
<month>ua</month>
<day>ry</day>
<volume>22</volume>
<numero>2</numero>
<issue>2</issue>
<page-range>171-186</page-range><publisher-name><![CDATA[Kluwer Academic]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Jain]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
<name>
<surname><![CDATA[Puglia]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Wullert]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Parmeswaran]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
<name>
<surname><![CDATA[Bakker]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[The Mobile Application Server (MAS): An Infrastructure Platform for Mobile Wireless Services]]></article-title>
<source><![CDATA[Information Systems Frontiers]]></source>
<year>Mar.</year>
<month> 2</month>
<day>00</day>
<volume>6</volume>
<numero>1</numero>
<issue>1</issue>
<page-range>23-34</page-range><publisher-name><![CDATA[Springer Netherlands]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Le Bodic]]></surname>
<given-names><![CDATA[G.]]></given-names>
</name>
</person-group>
<source><![CDATA[Mobile Messaging Technologies and Services: SMS, EMS and MMS]]></source>
<year>2003</year>
<page-range>36</page-range><publisher-name><![CDATA[John Willey & Sons]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B12">
<nlm-citation citation-type="book">
<collab>Message Master™ Enterprise Alert</collab>
<source><![CDATA[SMS Software for Enterprises]]></source>
<year>Febr</year>
<month>ua</month>
<day>ry</day>
<publisher-name><![CDATA[Derdack GmbH]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B13">
<nlm-citation citation-type="">
<source><![CDATA[Mobile Information Device Profile 2.0 Java Community]]></source>
<year>2002</year>
</nlm-citation>
</ref>
<ref id="B14">
<nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Olguín-Sánchez]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
</person-group>
<source><![CDATA[Quintuplican envío de mensajes cortos]]></source>
<year>Janu</year>
<month>ar</month>
<day>y </day>
</nlm-citation>
</ref>
<ref id="B15">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Ravi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
<name>
<surname><![CDATA[Chathish]]></surname>
<given-names><![CDATA[M.S.]]></given-names>
</name>
<name>
<surname><![CDATA[Prasanna]]></surname>
<given-names><![CDATA[H.]]></given-names>
</name>
</person-group>
<source><![CDATA[WAP and SMS Based Emerging Techniques for Remote Monitoring and Control of a Process Plant]]></source>
<year>Aug </year>
<month>31</month>
<day>-S</day>
<conf-name><![CDATA[7 International Conference on Signal Processing Proceedings (ICSP'04)]]></conf-name>
<conf-date>2004</conf-date>
<conf-loc> </conf-loc>
<page-range>2672-2675</page-range><publisher-loc><![CDATA[Beijing ]]></publisher-loc>
<publisher-name><![CDATA[IEEE, Institute of Electrical Engineers]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B16">
<nlm-citation citation-type="book">
<collab>Small Screens a Global Vision</collab>
<source><![CDATA[The Net Size Guide]]></source>
<year>Febr</year>
<month>ua</month>
<day>ry</day>
<publisher-loc><![CDATA[Paris ]]></publisher-loc>
<publisher-name><![CDATA[Net Size S.A]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B17">
<nlm-citation citation-type="book">
<source><![CDATA[SMS Messaging Software From NotePage]]></source>
<year>Janu</year>
<month>ar</month>
<day>y </day>
<publisher-name><![CDATA[NotePage Pro]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B18">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Talukder-Asoke]]></surname>
<given-names><![CDATA[K.]]></given-names>
</name>
</person-group>
<source><![CDATA[Information Assurance and Security needs in an ASP/MVNO Environment for Pervasive Content through SMS/GSM]]></source>
<year></year>
<conf-name><![CDATA[ International Conference on Communication and Broadband Networks]]></conf-name>
<conf-date>May 5-7, 2003</conf-date>
<conf-loc>Bangalore </conf-loc>
</nlm-citation>
</ref>
<ref id="B19">
<nlm-citation citation-type="book">
<collab>Technical Realization of the Short Message Service</collab>
<source><![CDATA[Release 1998, 3GPP TS 03.40 V7.5.0 (2001-12)]]></source>
<year>2002</year>
<publisher-name><![CDATA[3rd Generation Partnership Project]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B20">
<nlm-citation citation-type="">
<collab>Telcel</collab>
<collab>DATUM</collab>
<source><![CDATA[SMS Alerts Generated by Systems Logs]]></source>
<year>2006</year>
</nlm-citation>
</ref>
<ref id="B21">
<nlm-citation citation-type="book">
<collab>What is NowSMS?</collab>
<source><![CDATA[]]></source>
<year>Febr</year>
<month>ua</month>
<day>ry</day>
<publisher-name><![CDATA[NowSMS.com]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B22">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wams]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Van Steen]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[A Flexible Middleware Layer for User-to-User Messaging]]></source>
<year></year>
<conf-name><![CDATA[14 International Conference on Distributed Applications and Interoperable Systems, Lecture Notes on Computer Science]]></conf-name>
<conf-date>Nov. 2003</conf-date>
<conf-loc> </conf-loc>
<publisher-loc><![CDATA[Berlin ]]></publisher-loc>
<publisher-name><![CDATA[Springer-Verlag]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B23">
<nlm-citation citation-type="confpro">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Wittie]]></surname>
<given-names><![CDATA[M.P.]]></given-names>
</name>
<name>
<surname><![CDATA[Stone-Gross]]></surname>
<given-names><![CDATA[K.C.]]></given-names>
</name>
<name>
<surname><![CDATA[Almeroth]]></surname>
</name>
<name>
<surname><![CDATA[Elizabeth]]></surname>
<given-names><![CDATA[M.]]></given-names>
</name>
</person-group>
<source><![CDATA[Belding.MIST: Cellular Data Network Measurement for Mobile Applications]]></source>
<year></year>
<conf-name><![CDATA[ IEEE Broadnets]]></conf-name>
<conf-date>September 2007</conf-date>
<conf-loc>Raleigh NC</conf-loc>
</nlm-citation>
</ref>
<ref id="B24">
<nlm-citation citation-type="book">
<source><![CDATA[[1] [Extensible Markup Language (XML)]]></source>
<year></year>
<publisher-name><![CDATA[World Wide Web Consortium]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B25">
<nlm-citation citation-type="book">
<source><![CDATA[[2] [Java ME-Micro App Development Made Easy]]></source>
<year></year>
<publisher-name><![CDATA[Java Technology]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B26">
<nlm-citation citation-type="book">
<source><![CDATA[[3] [SMIL, The Synchronized Multimedia Integration Language]]></source>
<year></year>
<publisher-name><![CDATA[World Wide Web Consortium]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B27">
<nlm-citation citation-type="book">
<source><![CDATA[[4] [XSL Transformations (XSLT)]]></source>
<year></year>
<publisher-name><![CDATA[World Wide Web Consortium]]></publisher-name>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
