Authors can submit their research articles to editor@ijsea.com  

Processing Charges

IJSEA is index with

 

 

 

 

 

 

 

IJSEA Archive (Volume 4, Issue 4)

International Journal of Science and Engineering Applications (IJSEA)  (Volume 4, Issue 4 July-August 2015)

A Comparative Study Of Remote Access Technologies and Implementation of a Smartphone App for Remote System Administration Based on a Proposed Secure RFB Protocol

Ernest D. Ganaa,Frimpong Twum,J. B. Hayfron- Acquah

10.7753/IJSEA0404.1002




 PDF 



Keywords: Remote access; Remote Frame Buffer; Remote Desktop Protocol; Android app; Remote server; Remote system administration

Abstract References BibText


        In this paper we proposed advanced technologies to provide tremendous support for network administrators by implementing a secure remote system administration app that runs on android smartphones to aid them administer their servers remotely when they (network administrators) are out stationed using their smartphones. The android app developed in eclipse establishes a secure connection with a remote server running a PHP application. The app was developed based on the Remote Frame Buffer (RFB) protocol. The RFB protocol, a display protocol has some security lapses including being vulnerable to Man-In-The-Middle (MITM) attack using a few tools and techniques. This research therefore incorporated a self-signed Secure Socket Layer (SSL) certificate in the android app to enable secure encrypted connections to be established between the android app and the remote server to ensure end-to-end security against attacks such as Man-In-The-Middle (MITM). The whole system was deployed based on client-server architecture with the hand-held smart devices as clients, providing real-time network access to network administrators to their remote servers. The secure RFB protocol proposed and implemented in the android app was compared with other existing software for remote system administration such as Remote Desktop (RDP), and RFB protocols using ICMP ping command. The results show that the average response time of the RDP protocol was 436ms, that of the RFB protocol was 496ms and that of the android app which is based on a proposed secure RFB protocol was 474ms.


[1] Baig S, Rajasekar M. & Balaji P. (2012) Virtual Network Computing Based Remote Desktop Access. International Journal of Computer Science and Telecommunications. Volume 3, Issue 5. pp. 127.
[2] Behboodian N. & Razak S. A. (2011) ARP Poisoning Attack Detection and Protection in WLAN via Client Web Browser. International Conference on Emerging Trends in Computer and Image Processing. pp. 20.
[3] Boling D. (2007) Windows Embedded CE 6.0 R2 Remote Desktop Protocols and Internet Explorer. pp. 6. Retrieved from: http://download.microsoft.com/download/5/8/e/58e0c008-fc15-4a3b-9728-c0103bab6473/Windows%20Embedded%20CE%206.0%20R2%20Remote%20Desktop%20Protocol%20and%20Internet%20Explorer_whitepaper.pdf.
[4] Code Project (2014) Android Security-Implementation of Self-Signed SSL Certificate for your App. Retrieved from: www.codeproject.com/articles/826045/android-security-implementation-of-self-signed-SSL
[5] Kerai P. (2010) Tracing VNC and RDP Protocol Artefacts on Windows Mobile and Windows Smartphone for Forensic Purpose. In Proceedings of International Cyber Resilience Conference. Australia. pp. 58. Retrieved from: http://ro.ecu.edu.au/icr/7
[6] Masthan K, Kumar S. K. & Prasad H. V. (2013) Virtual Network Computing of User Appliances. International Journal of Computer Science and Mobile Computing. Volume 2, Issue 8. pp. 132.
[7] Montoro M. (2005) Remote Desktop Protocol, the Good the Bad and the Ugly. pp. 1-2. Available from: www.oxid.it.
[8] Nam Y. S, Jurayev S, Kim S, Choi K. & Choi S. G (2012) Mitigating ARP poisoning-base man-in-the-middle attacks in wired or wireless LAN. EURASIP Journal on Wireless Communication and Networking. pp. 2.
[9] Richardson T. (2010) The RFB Protocol. pp. 3. Retrieved from: www.realvnc.com.
[10] Roosa S. B. & Schultze S. (2010) The “Certificate Authority” Trust Model for SSL: A Defective Foundation for Encrypted Web Traffic and a Legal Quagmire. Intellectual Property & Technology Law Journal. Volume 22, Number 11. pp. 3.
[11] Youming L. (2013) Virtual Networking for Mobile Cloud Computing. Master's Thesis, Aalto University-Finland. pp. 19. Retrieved from: https://into.aalto.fi/download/attachment/.../Lin_Youming_thesis.pdf?


@article{Ernest04041002,
title = " A Comparative Study Of Remote Access Technologies and Implementation of a Smartphone App for Remote System Administration Based on a Proposed Secure RFB Protocol ",
journal = "International Journal of Science and Engineering Applications (IJSEA)",
volume = "4",
number = "4",
pages = "163 - 168",
year = "2015",
author = " Ernest D. Ganaa,Frimpong Twum,J. B. Hayfron- Acquah ",
}