Browse > Article
http://dx.doi.org/10.5762/KAIS.2021.22.5.325

A Study on Cell-Broadcasting Based Security Authentication System and Business Models  

Choi, Jeong-Moon (Graduate School Of Information, Yonsei University)
Lee, Jungwoo (Graduate School Of Information, Yonsei University)
Publication Information
Journal of the Korea Academia-Industrial cooperation Society / v.22, no.5, 2021 , pp. 325-333 More about this Journal
Abstract
With the rapidly changing era of the fourth industrial revolution, the utilization of IT technology is increasing. In addition, the demand for security authentication is increasing as shared services or IoT technologies are being developed as new business models. Security authentication is becoming increasingly important for all intelligent devices such as self-driving cars. However, most location-based security authentication technologies are being developed mainly with technologies that utilize server proximity or satellite location tracking, which limits the scope of their physical use. Location-based security authentication technology has recently been developed as a complementary replacement technology. In this study, we introduce location-based security authentication technology using cell broadcasting technology, which has a wider range of applications and is more convenient and business-friendly than existing location-based security authentication technologies. We also introduced application cases and business models related to this. In addition to the current status of technology development, we analyzed current changes in business models being employed. Based on our analysis results, this study draws the implication that technology diversification is necessary to improve the performance of innovative technologies. It is meaningful that it has found and studied advanced technologies other than existing location authentication methods and systems.
Keywords
Cell Broadcasting; Location Based Service; Security Authentication; Business Model; Information Technology;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Korea Communications Commission, A plan to promote the use of location information for fostering LBS industries and upgrading social safety nets (plan), pp.5-6, 2010.
2 S. M. Kim, Study on the Usage of Location-Based Services App on Smartphones: Focusing on the Perceived Risk, Master's thesis, Hanyang cyber university Graduate School of Business, Seoul, Korea, pp.5, 2014.
3 IT World, HPE Aruba Announces Digital Workplace Research Results, Available From: https://www.itworld.co.kr/news/110660 (accessed Dec. 01, 2020)
4 Y. K. Park, Online Information Security System Utilizing Cell Broadcasting Service, The Korean Intellectual Property Office, Korea, pp.12-13, 2016.
5 Hankyung Dotcom Newsroom, [securities firms working with startups] L-Fin's location-based authentication service is applied by Korea Investment &Securities, Available From: https://www.hankyung.com/economy/article/202008273705a (accessed Nov. 10, 2020)
6 N. J. Park, Y. J. Song, K. Y. Moon, "Application of Certification and Security for Secure Location-Based Services", Korea Institute Of Information Security And Cryptology, 14, 3, pp.56-67, 2004.
7 H. J. Seo, H. W. Kim, A Location based Two-Factor L-OTP Protocol. The KIPS Transactions: PartC, 18C, 5, pp.327-330, 2011.   DOI
8 H. G. Youn, [Issue lighting] Attention to PUF technology in the coming IoT era, Available From: http://www.comworld.co.kr/news/articleView.html?idxno=49025 (accessed Jan. 12, 2021)
9 H. W. Lee, H. G. Sine, "Consideration of strong user authentication methods for memory hacking attacks, Korea Institute Of Information Security And Cryptology, 23, 6, pp.67-75, 2013.
10 S. H. Yang, Even a father who is not good at Smartphones can do it in a minute. Available From: https://news.mt.co.kr/mtview.php?no=2020040309393048053 (accessed Dec. 01, 2020)
11 S. Y. Kim, E-finance and Financial security2, p.160, Financial security institute, 2015, pp.59-94.
12 S. H. Jin, [Science Ongojisin]The Fourth Industrial Revolution and Huayibudong, Available From: https://www.etnews.com/20180218000060 (accessed Feb. 18, 2018)
13 K. M. Choi, Smartphone location-based authentication applied for the improvement of public cloud security, Master's thesis, Dongguk University Graduate School of International Affairsand Information, Seoul, Korea, pp.15-16, 2013.
14 H. J. Ann, Non-facing authentication Security threat analysis and security measures: Establishment of checklist basis for minimizing non-facing authentication security threats, Master's thesis, Konkuk University Graduate School of Information and Communication, Seoul, Korea, pp.4, 2019.
15 S. H. Yeom, Watch out for unlicensed car accidents in the coming holiday season, Available From: https://www.jjan.kr/news/articleView.html?idxno=2087091 (accessed July. 12, 2020)
16 J. H. Kee, The Past and Present of Authentication Technology -Introduction to Concepts and Cases-, Weekly Technology Trend Report, IITP, Korea, pp.13-22.