Browse > Article
http://dx.doi.org/10.9723/jksiis.2011.16.4.053

Seamless and Secure Service Framework using Multiple Network Interlaces Terminal in Heterogeneous Environment  

Yoon, Sung-Hun (한국전자통신연구원 유무선융합네트워크연구팀)
Lee, Soon-Seok (한국전자통선연구원 융합네트워크연구부)
Kim, Sang-Ha (충남대학교 컴퓨터공학과)
Publication Information
Journal of Korea Society of Industrial Information Systems / v.16, no.4, 2011 , pp. 53-65 More about this Journal
Abstract
As the Information and Communication Technologies continue to advance, some sensitive services (e.g. e-commerce, on-line financial service, and etc.) have spread rapidly. Accordingly, ensuring the safety of the sensitive service itself using personal Information as well as the protection of personal Information Is becoming very important. In addition, with the popularization of smart phone and the universalized use of wireless Internet, many services that have been provided on the basis of the conventional wired network are increasingly propagating to wired and wireless converged network environment. These changes in the network environment requires new paradigm for the pursuit of safe and stable communication. In this paper, we propose seamless and secure service framework that can facilitate a sustainable secure connection between the user terminal and the sensitive service system by using both the personal and network Information. The proposed service framework is capable of isolating the source of authorized use by a third party of the personal Information as far as the user terminal is not lost, although some personal Information is disclosed. Besides, it can provide a seamless and safe service environment even if the access network is changed by relocation of terminals in the heterogeneous mobile network environment.
Keywords
service safety; service continuity; heterogeneous network; multiple network interfaces;
Citations & Related Records
Times Cited By KSCI : 4  (Citation Analysis)
연도 인용수 순위
1 WTLS, "Wireless Transport Layer Security Protocol Specification," WAP Forum, http://www.wapforum.org/, Nov. 1999.
2 E. Rescorla, A.Schiffman, "The Secure HyperTextTransfer Protocol," August 1999, IETF RFC 2660.
3 B. Ramsdell, S/MIME Version 3 Message Specification, Jun. 1999, IETF RFC 2633.
4 R. Moskowitz and P. Nikander, Host Identity Protocol (HIP) Architecture, RFC 4423, May 2006.
5 D. Farinacci, et aI., Locator/ID Separation Protocol (LISP), draft-farinacci-lisp-07.txt, April 2008
6 R. Atkinson, INLP Concept of Operations, Internet-draft, August 2009
7 Erik P. Harris et aI., "Technology Directions for Portable Computers," Proceedings of the IEEE, 636-658, April 1995.
8 J. Arkko, V. Devarapalli, and F. Dupont, Using IPsec to protect mobile IPv6 signaling between mobile nodes and home agents, IETF RFC 3776, Jun. 2004.
9 G. O'shea and M. Roe, "Child-proof authentication for MlPv6(CAM)," ACM Computer Communication Review, vol. 31, no. 2, 2001
10 Y. Qiu, J. Zhou, and F. Bao, "Protecting all traffic channels in mobile IPv6 network," IEEE Wireless Communications and Networking Conf., pp. 100-165, Mar. 2004.
11 Password-authenticated key exchange(PAK) protocol, ITU-T Rec. X.1035, 2007.
12 C. Kaufman, Internet key exchange(IKEv2) protocol, IETF RFC 4306, Dec. 2005.
13 S. Kent, Security Architecture for the Internet Protocol, IETF RFC 4301, Dec. 2005.
14 S. Kent, IP authentication header, IETF RFC 4302, Dec. 2005.
15 Pay-Buy-Mobile Business Opportunity Analysis - Public White Paper, GSMA, Nov. 2007.
16 Global M-Payment Update 2005, Arthur D. Little, 2006
17 The Mobile Internet Report, Morgan Stanley, Dec. 2009.
18 Measuring the Information Society - The ICT Development Index, International Telecommunication Union(ITU), 2009
19 Best Practice for Mobile Financial Services, Mobey Forum, 2008
20 R. Sundarraj and J. Wu, 'Using Information-Systems Constructs to Study Online- and Telephone-banking Technologies," Electronic Commerce Research and Applications, vol. 4, Jul. 2005.
21 김소이, "전자금융사고 발생유형 및 대응현황", 금융결제원, 지급결제와 정보기술 제38호, pp.34-62, 2009년 10월.
22 주영도 외, "랜덤 Nonce 기반 사용자 인증 스킴의 안전성 개선에 관한 연구," 한국산업정보학회논문지, v.15, no.3, pp.33-40, 2010년 9월.
23 이승익, "SBC 기반 차세대 이동형 단말기 개발," 한국산업정보학회논문지, v.14, no.4, pp.30-36, 2009년 12월.
24 Wireshark, http://www.wireshark.org
25 E. -J. Yoon, E. -K. Ryu, and K. -Y. Yoo, "An improvement of Hwang-Lee-Tang's simple remote user authentication scheme," Computer & Security, vol.24, pp.50-56, 2005.   DOI   ScienceOn
26 김영진 외, "U-정보사회에서의 포괄적 네트워크 보안관리 방안," 정보보호학회지, v.18, no.3, pp.74-80, 2008년 6월.
27 이원철 외, "전자금융거래시스템 취약점 분석 및 안전성 강화방안 연구," 정보보호학회지, v.15, no.4, pp.44-49, 2005년 8월.
28 S. Kent, "IP encapsulating security payload(ESP)", IETF RFC 4303, Dec. 2005.
29 D. Eastlake and P. Jones, US secure hash algorithm 1(SHA1), IETF RFC 3174, Sep. 2001.
30 D. Eastlake, J. Schiller, and S. Crocker, Randomness requirements for security, IETF RFC 4086, Jun. 2005.
31 S. Barnes and B Corbitt, "Mobile Banking: Concept and Potential," International Journal of Mobile Communications, vol. 1, Sep. 2003.
32 T. Dierks, The Transport Layer Security (TLS) Protocol Version 1.2, IETF RFC 5246, August 2008.
33 SSL, http://en.wikipedia.org/wiki/Secure_Sockets_Layer
34 P. Eronen, "IKEv2 Mobility and Multihoming Protocol (MOBIKE)", IETF RFC4555, June. 2006.