• Title/Summary/Keyword: 위치불추적서비스

Search Result 3, Processing Time 0.018 seconds

Design of Location Based System in Distributed ZigBee Network Environment (분산 ZigBee 네트워크 환경을 이용한 위치 기반 시스템 설계)

  • Byung-Wook Kim;Chul-Jung Kim; Seok-Chun Park
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.641-644
    • /
    • 2008
  • 무선통신기술의 발전과 전자기술의 발전으로 저가격, 저전력, 다기능 센서 노드로 구성된 무선 센서 네트워크(Wireless Sensor Network)에 대한 관심이 급격히 고조되고 있으며 또한 무선 센서 네트워크를 응용한 서비스들이 많이 개발되고 있는 추세이다. 본 논문에서는 ZigBee Device를 이용한 위치추적 시스템을 제안한다. ZigBee Device의 한계 때문에 평상시에 불특정한 넓은 범위를 이동하는 일반인을 대상으로 할 수는 없지만 평상시 고정된 위치를 이동하는 아동이나 노인들을 대상으로 활용할 수 있는 시스템으로써 저렴하면서 효과적으로 구축가능하고 통신 데이터의 무결성과 보안을 제공하는 ZigBee 무선 통신 기술에 기반한 위치파악시스템을 제안하고 설계한다.

A Study on Location Untraceability Service and Payment Protocol using Temporary Pseudonym in Mobile Communication Environments (이동통신 환경에서 임시 익명 아이디를 이용한 위치 불추적 서비스와 지불 프로토콜에 관한 연구)

  • 김순석;김성권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.2
    • /
    • pp.78-92
    • /
    • 2003
  • In related to mobile communication environment, many researchers have studied problems concerning current locations of mobile users and exposure of their movements in the privacy aspect so far [1,2,3,4,5,6,7,8,9]. Among them, Kesdogan and Pfitzmann [3,6] proposed effective solutions using temporary pseudonym identification, called TP(Temporary Pseudonym ) to solve them. After that, Kesdogan et al. proposed an improved method protecting mobile users from some types of attacks of network providers in [8]. However, among their methods, in particular the method, attaching the other new device (so-called Reachability Manager) to system against active attack of network providers, is alterative rather than practical and is not clear. Moreover, it requires the other cost and overhead. Therefore we propose a practical method against active attack of network providers without attaching new device in original environments. The basie idea of proposed method is to protect a fraud act of network provider as a inside user by exchanging a secret information, which only users and network providers know, via network provider between mobile user and the trusted third party (so-called Trust Device). Moreover, we introduce a new payment protocol which applied our method.

Secure Location Information Protection Scheme from the Network Provider and the third party in Mobile Communication Environments (이동통신 환경에서 네트워크 제공자 및 제 3자로부터 안전한 위치정보 보호기법)

  • Kim, Soon-Seok;Lee, Chang-Hun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.867-878
    • /
    • 2003
  • In thls Paper, we Propose a new scheme, protecting information about the location of a mobile user against attacks from inside users of the mobile communication, especially the network providers. There have already been some proposals about how to protect location information of user in mobile communication environments〔1-5〕. Among them, Kesdogan et al.〔2, 3〕 proposed a new method, using so-called temporary pseudonyms and also described protection method against a passive and an active attack of network providers. However, the description of protection method against the active attack between the two is not clear. Moreover, there is an additional load that it should append a reachability manager〔1, 6〕 to the proposed system. Therefore, we propose a new scheme improving the above method of Kesdogan et al. and analyze its security and effectiveness.