DOI QR코드

DOI QR Code

휴대용통신단말의 효과적인 보안관리를 위한 보안 재구성기법의 설계 및 구현

Design and Implementation of Security Reconfiguration for Effective Security Management of Mobile Communication Device

  • 안개일 (한국전자통신연구원 인프라보호연구팀) ;
  • 김기영 (한국전자통신연구원 인프라보호연구팀) ;
  • 서동일 (한국전자통신연구원 인프라보호연구팀)
  • 발행 : 2009.12.31

초록

휴대용 통신 단말은 스마트 폰이나 PDA와 같은 통신 서비스를 제공하는 작은 크기의 휴대용 컴퓨터이다. 현재 휴대용 통신 단말의 발전을 가로막는 가장 큰 장벽중의 하나가 바로 보안이다. 비록 휴대용 통신 단말을 보호할 수 있는 다양한 보안기술들은 있지만, 휴대용 통신 단말은 데스크톱 컴퓨터에 비해 컴퓨팅 자원이 빈약하고 사용자 인터페이스가 불편하여 그 보안기술 모두를 휴대용 통신 단말에 운용할 수 없기 때문이다. 본 논문에서는 휴대용 통신 단말의 보안을 효과적으로 관리할 수 있는 상황인지형 보안재구성 기법을 제안하고 설계한다. 본 보안재구성 기법은 휴대용 통신 단말의 현재 보안 상황에 가장 적합한 최적의 보안 서비스를 자동으로 제공할 수 있다. 본 제안하는 기법의 구현과 실험을 통하여 본 기법이 보안수준을 떨어뜨리는 것 없이 자원 효율성과 사용자 편의성에서 우수하다는 것을 확인하였다.

A mobile communication device is a small size of portable computer which provides communication service, such as smart phone and PDA. Currently, one of the biggest barriers in developing the mobile communication device is security issue. Even though there are excellent security functions which can remove the security issues, there is a problem that the mobile communication device can not be loaded with all the functions because it has low storage, poor computational power, and inconvenient user interface, compared to the desktop personal computer. This paper proposes a context-aware security reconfiguration scheme for effective security management of the mobile communication device. The scheme can provide the mobile communication device with the optimized security service which is most adapted to its current security context. Through the prototype implementation and the experiments of the proposed scheme, we have confirmed that the proposed scheme is excellent in terms of computing resource efficiency and usability, without degrading security level.

키워드

참고문헌

  1. Ko, S., Ji, Y., Kim, D.: Understanding Influence of Mobile Internet Services on Life Behavior of Mobile Users. In Proc. of Human-Computer Interaction, LNCS, vol. LNCS 4553, pp. 944-953 (2007) https://doi.org/10.1007/978-3-540-73111-5_104
  2. Jamaluddin, J., Zotou, N., Edwards, R.: Mobile phone vulnerabilities: a new generation of malware. In Proc. of IEEE International Symposium on Consumer Electronics, pp. 199-202 (2004)
  3. Mulliner, C., Vigna, G., Dagon, D., Lee, W.: Using Labeling to Prevent Cross-Service Attacks Against Smart Phones. In Proc. of SIG SIDAR Conf. on Detection of Intrusions and Malware & Vulnerability Assessment, LNCS, Vol.4064, pp. 91-108, (2006) https://doi.org/10.1007/11790754_6
  4. Nash, D. C., Martin, T. L., Ha, D. S., Hsiao, M. S.: Towards an Intrusion Detection System for Battery Exhaustion Attacks on Mobile Computing Devices. In Proc. of the 3rd Int'l Conf. on Pervasive Computing and Communications Workshops, pp.141-145, (2005)
  5. Martin, T., Hsiao, M., Ha, D., Krishnaswami, J.: Denial-of-Service Attacks on Battery-powered Mobile Computers. In Proc. of the 2th IEEE Annual Conf. on Pervasive Computing and Communications, pp.309-318 (2004)
  6. Jacoby, G. A., Davis IV, N. J.: Battery-Based Intrusion Detection. In Proc. of Globecom 2004, pp. 2250-2255 (2004)
  7. Dey, A. K., Abowd, G. D.: Towards a Better Understanding of Context and Context-Awareness. In Proc. of the workshop on the What, Who, Where, When and How of Context-Awareness (2000) https://doi.org/10.1007/3-540-48157-5_29
  8. Schilit, B. N. Adams, N., Want, R.: Context-Aware Computing Applications. In Proc. of IEEE Workshop Mobile Computing Systems and Applications, pp.85-90, (1994) https://doi.org/10.1109/WMCSA.1994.16
  9. Chen, G. & Kotz, D. A Survey of Context-Aware Mobile Computing Research. Dartmouth Computer Science Technical Report, TR2000-381 (2000)
  10. Han, L., Jyri, S., Ma, J., Yu, K.: Research on Context-Aware Mobile Computing. In Proc. of 22nd International Conference on Advanced Information Networking and Applications, pp. 24-30 (2008) https://doi.org/10.1109/WAINA.2008.115

피인용 문헌

  1. A Study on Effective Management Method of the Flood Forecast System using PDA vol.17A, pp.4, 2010, https://doi.org/10.3745/KIPSTA.2010.17A.4.197