DOI QR코드

DOI QR Code

A Study on Cell-Broadcasting Based Security Authentication System and Business Models

셀 브로드캐스팅 보안 인증시스템 및 비즈니스 모델에 관한 연구

  • 최정문 (연세대학교 정보대학원) ;
  • 이정우 (연세대학교 정보대학원)
  • Received : 2021.02.01
  • Accepted : 2021.05.07
  • Published : 2021.05.31

Abstract

With the rapidly changing era of the fourth industrial revolution, the utilization of IT technology is increasing. In addition, the demand for security authentication is increasing as shared services or IoT technologies are being developed as new business models. Security authentication is becoming increasingly important for all intelligent devices such as self-driving cars. However, most location-based security authentication technologies are being developed mainly with technologies that utilize server proximity or satellite location tracking, which limits the scope of their physical use. Location-based security authentication technology has recently been developed as a complementary replacement technology. In this study, we introduce location-based security authentication technology using cell broadcasting technology, which has a wider range of applications and is more convenient and business-friendly than existing location-based security authentication technologies. We also introduced application cases and business models related to this. In addition to the current status of technology development, we analyzed current changes in business models being employed. Based on our analysis results, this study draws the implication that technology diversification is necessary to improve the performance of innovative technologies. It is meaningful that it has found and studied advanced technologies other than existing location authentication methods and systems.

공유 서비스나 사물인터넷기술이 확산됨에 따라 보안인증이 적용되어야 하는 분야와 그 범위가 넓어지고 있다. 이동을 전제로 하는 서비스들에 있어서는 기존의 개인 소유물이나 특성에 관한 보안인증만으로는 충분치가 않아서 위치에 기반한 인증기술들도 개발이 되고 있다. 하지만 기존 위치기반 보안인증기술의 대부분은 주로 서버 근접도나 위성위치추적을 활용하는 기술로 개발이 되고 있어서 그 활용의 범위가 좁고 이동 시 핸드오버 문제가 발생한다. 본 연구에서는 이러한 기존의 위치기반 보안인증기술보다 그 활용의 범위가 넓고 따라서 편의성과 사업성이 높은 셀 브로드캐스팅(Cell Broadcasting)기술 활용 위치기반 보안인증기술에 대해서 소개하고 이와 관련된 응용 사례 및 비즈니스 모델들을 소개하였다. 기술 개발의 현황과 아울러 이를 활용하여 사업을 개발하고 있는 기업 사례를 심층 분석하여 비즈니스 모델의 변화가 어떻게 이루어지고 있는지를 자세히 분석하였다. 여기서 제안된 셀브로드캐스팅 보안인증시스템은 다각화되고 있는 미래형 비즈니스모델의 근간이 되는 기술이며 기존의 위치인증방법 및 시스템을 보완한 모델로 그 의미가 있다.

Keywords

References

  1. S. H. Jin, [Science Ongojisin]The Fourth Industrial Revolution and Huayibudong, Available From: https://www.etnews.com/20180218000060 (accessed Feb. 18, 2018)
  2. J. H. Kee, The Past and Present of Authentication Technology -Introduction to Concepts and Cases-, Weekly Technology Trend Report, IITP, Korea, pp.13-22.
  3. K. M. Choi, Smartphone location-based authentication applied for the improvement of public cloud security, Master's thesis, Dongguk University Graduate School of International Affairsand Information, Seoul, Korea, pp.15-16, 2013.
  4. H. J. Ann, Non-facing authentication Security threat analysis and security measures: Establishment of checklist basis for minimizing non-facing authentication security threats, Master's thesis, Konkuk University Graduate School of Information and Communication, Seoul, Korea, pp.4, 2019.
  5. S. Y. Kim, E-finance and Financial security2, p.160, Financial security institute, 2015, pp.59-94.
  6. Korea Communications Commission, A plan to promote the use of location information for fostering LBS industries and upgrading social safety nets (plan), pp.5-6, 2010.
  7. S. M. Kim, Study on the Usage of Location-Based Services App on Smartphones: Focusing on the Perceived Risk, Master's thesis, Hanyang cyber university Graduate School of Business, Seoul, Korea, pp.5, 2014.
  8. N. J. Park, Y. J. Song, K. Y. Moon, "Application of Certification and Security for Secure Location-Based Services", Korea Institute Of Information Security And Cryptology, 14, 3, pp.56-67, 2004.
  9. H. J. Seo, H. W. Kim, A Location based Two-Factor L-OTP Protocol. The KIPS Transactions: PartC, 18C, 5, pp.327-330, 2011. https://doi.org/10.3745/KIPSTC.2011.18C.5.327
  10. H. G. Youn, [Issue lighting] Attention to PUF technology in the coming IoT era, Available From: http://www.comworld.co.kr/news/articleView.html?idxno=49025 (accessed Jan. 12, 2021)
  11. H. W. Lee, H. G. Sine, "Consideration of strong user authentication methods for memory hacking attacks, Korea Institute Of Information Security And Cryptology, 23, 6, pp.67-75, 2013.
  12. Y. K. Park, Online Information Security System Utilizing Cell Broadcasting Service, The Korean Intellectual Property Office, Korea, pp.12-13, 2016.
  13. S. H. Yeom, Watch out for unlicensed car accidents in the coming holiday season, Available From: https://www.jjan.kr/news/articleView.html?idxno=2087091 (accessed July. 12, 2020)
  14. Hankyung Dotcom Newsroom, [securities firms working with startups] L-Fin's location-based authentication service is applied by Korea Investment &Securities, Available From: https://www.hankyung.com/economy/article/202008273705a (accessed Nov. 10, 2020)
  15. S. H. Yang, Even a father who is not good at Smartphones can do it in a minute. Available From: https://news.mt.co.kr/mtview.php?no=2020040309393048053 (accessed Dec. 01, 2020)
  16. IT World, HPE Aruba Announces Digital Workplace Research Results, Available From: https://www.itworld.co.kr/news/110660 (accessed Dec. 01, 2020)