Browse > Article

The Structural Analysis and Implications of Security Vulnerabilities In Mobile Srevice Network  

Kim, Jang-Hwan (성결대학교 공과대학 미디어소프트웨어학부)
Publication Information
Abstract
Recently mobile service industry has grown very rapidly. In this paper, We investigated the changes in mobile service network as well as security vulnerabilities of network in future 5G mobile service network, too. Recently, there are rapid developement of information and communication and rapid growth of mobile e-business users. Therefore We try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. In addition, there is a need of internetworking between mobile and IoT services. Wireless Application Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, We investigate the structure of mobile service network in order to gain security vulnerabilities and insights in this paper.
Keywords
Mobile Service Network; Security; Vulnerabilities;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 Wikipedia, Ecosystem, Retrieved Mar. 17, 2013, from http://ko.wikipedia.org/
2 G. Gueguen and T. Isckia, "The borders of mobile handset ecosystems: is coopetition inevitable?," Telematics and Informatics, vol. 28, pp. 5-11, Jan. 2011.   DOI
3 J.H.Kim, "Performance enhancement architecture for HLR system based on distributed mobile embedded system," J. KICS, vol. 29, no. 12B, pp. 1022-1036, Dec. 2004.
4 S.Tabbane,Handbook of mobile radio networks, Artech House Publishers,2000.
5 TIA/EIA, IS-41(A), Initial Version. Jan. 1991.; IMT-2000 3GPP2-International Implementation of Wireless Telecommunication Systems Compliant with TIA/EIA-41 Revision A, Oct. 2002.
6 J.H.Kim, "The Structural Analysis and Implications of Mobile Service Industry," J .KICS,vol.38C,no.09,pp.733-739,September 2013.   DOI
7 J.H.Kim and Seung Chang Park, "A Study about M2M Technology Policy and Nano-fusion Sensor SoC Functioning in the IHN(Intelligent Home Networking) Mode", SKT Review, Vol.20 No.4, pp.541-555, August 2010.
8 Seung Chang Park, The analysis of Big Data/IoT technology commerccialization strategy, Jinhanbook, August 2015.
9 J.H.Kim and Seung Chang Park, "IoT Relationship Between Korea and the Philippines",IJUNESST, Vol.9 No.7, July 2016.
10 Tim Dierks and Christopher Allen, "The TLS Protocol Version 1.0" IETF RFC 2246, January 1999
11 WAP Fourm, "Wireless Application Protocol Wireless Transport Layer Security Spectification version 18-FEB-2000", 2000