• Title/Summary/Keyword: Internet registration

Search Result 208, Processing Time 0.027 seconds

Securing Mobile IP Registration Messages in Residential Networks

  • Kim, Young-Bai;Han, Seung-Jo
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.77-82
    • /
    • 2010
  • Residential network is the hybrid technology of wireless, Ethernet, Bluetooth and RF to the internet via broadband connection at home to facilitate the convenient, safe and pleasant daily lives of home user with various home network services regardless of device, time and place. For ubiquitous development more devices will be wireless and most of them will be roaming. Since these roaming devices carry private information of daily life of residential users, the interaction among the roaming devices of residential network must be secure. This paper presents to secure registration of roaming devices using IP Security (IPSec) Protocol Suite without the need to trust foreign agents.

Internet Banking Login with Multi-Factor Authentication

  • Boonkrong, Sirapat
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.511-535
    • /
    • 2017
  • Internet banking is one of many services provided by financial institutions that have become very popular with an increasing trend. Due to the increased amount of usage of the service, Internet banking has become a target from adversaries. One of the points that are at risk of an attack is the login process. Therefore, it is necessary to have a security mechanism that can reduce this risk. This research designs and develops a multi-factor authentication protocol, starting from a registration system, which generates authentication factors, to an actual authentication mechanism. These factors can be categorised into two groups: short term and long term. For the authentication protocol, only three messages need to be exchanged between a client and a financial institution's server. Many cryptographic processes are incorporated into the protocol, such as symmetric and asymmetric cryptography, a symmetric key generation process, a method for generating and verifying digital signatures. All of the authentication messages have been proved and analysed by the logic of GNY and the criteria of OWASP-AT-009. Even though there are additional factors of authentication, users do not really feel any extra load on their part, as shown by the satisfactory survey.

Blockchain-based Copyright Management System Capable of Registering Creative Ideas (창의적인 아이디어를 등록할 수 있는 블록체인 기반의 저작권 관리시스템)

  • Hwang, Jung-sik;Kim, Hyun-gon
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.57-65
    • /
    • 2019
  • Creative works such as webtoon and web novel are part of property rights. However, illegal copies of them are distributed on the internet easily, which raises social issues in today's society. In order to tackle these problems, this paper proposes and presents a blockchain based copyright management system that ensures forgery prevention, robust security features, improving trading performance, cost-effective, and enhanced visibility. The system allows a user to register creative works formally just the same as before registration and also to register simple creative ideas just anytime. In the latter case, if an idea or a thought flashes across through somebody's mind, he or she can register it to the system immediately without formal registration process and afterward, can utilize a way to prove its originality through the system. Regarding large size images and video files of creative works, the system reduces data size and storage volume sharply to be processed by network entities by storing original creative works separately and including only the hash result of creative works to the transactions.

Automating Configuration System and Protocol for Next-Generation Home Appliances

  • Lee, Eun-Seo;Lee, Hark-Jin;Lee, Kwangil;Park, Jun-Hee
    • ETRI Journal
    • /
    • v.35 no.6
    • /
    • pp.1094-1104
    • /
    • 2013
  • Home appliance manufacturers have recently been trying to provide smart products capable of various Internet services. For example, one health care manufacturer provides a Wi-Fi-capable scale. Once users register their information with the manufacturer's server, their weight and body fat records are automatically uploaded to the server whenever they measure their weight. The users can then watch and check their weight log easily using a smart device, such as a smartphone or tablet. One of the biggest problems, however, is that the initial configuration of the appliances and the user registration process may be quite complicated to typical users who are unfamiliar with such IT devices. This paper proposes an autoconfiguration system structure and protocol for Internet-capable home appliances, which supports the initial configuration and remote maintenance service of the device with only little user effort. Manufacturers can develop their own information appliances and provide differentiated services using the proposed system and protocol.

DART: Fast and Efficient Distributed Stream Processing Framework for Internet of Things

  • Choi, Jang-Ho;Park, Junyong;Park, Hwin Dol;Min, Ok-gee
    • ETRI Journal
    • /
    • v.39 no.2
    • /
    • pp.202-212
    • /
    • 2017
  • With the advent of the Internet-of-Things paradigm, the amount of data production has grown exponentially and the user demand for responsive consumption of data has increased significantly. Herein, we present DART, a fast and lightweight stream processing framework for the IoT environment. Because the DART framework targets a geospatially distributed environment of heterogeneous devices, the framework provides (1) an end-user tool for device registration and application authoring, (2) automatic worker node monitoring and task allocations, and (3) runtime management of user applications with fault tolerance. To maximize performance, the DART framework adopts an actor model in which applications are segmented into microtasks and assigned to an actor following a single responsibility. To prove the feasibility of the proposed framework, we implemented the DART system. We also conducted experiments to show that the system can significantly reduce computing burdens and alleviate network load by utilizing the idle resources of intermediate edge devices.

Analysis of the IP Spoofing Attack Exploiting Null Security Algorithms in 5G Networks

  • Park, Tae-Keun;Park, Jong-Geun;Kim, Keewon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.113-120
    • /
    • 2022
  • In this paper, we analyze the feasibility of the IP spoofing attack exploiting null security algorithms in 5G networks based on 3GPP standard specifications. According to 3GPP standard specifications, the initial Registration Request message is not protected by encryption and integrity. The IP spoofing attack exploits the vulnerability that allows a malicious gNB (next generation Node B) to modify the contents of the initial Registration Request message of a victim UE (User Equipment) before forwarding it to AMF (Access and Mobility Management Function). If the attack succeeds, the victim UE is disconnected from the 5G network and a malicious UE gets Internet services, while the 5G operator will charge the victim UE. In this paper, we analyze the feasibility of the IP spoofing attack by analyzing whether each signaling message composing the attack conforms to the 3GPP Rel-17 standard specifications. As a result of the analysis, it is determined that the IP spoofing attack is not feasible in the 5G system implemented according to the 3GPP Rel-17 standard specifications.

A Study on Certificate-based Personal Authentification System for Preventing Private Information Leakage through Internet (개인정보 유출 피해 방지를 위한 공인인증서 기반 인터넷 개인인증체계 개선 모델에 관한 연구)

  • Lee, Jung-Hyun;Kwon, Hun-Young;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.1-11
    • /
    • 2010
  • Recently, We have many private information leakage cases through internet which cause social problems and it is impossible to change or update the leaked information, it is also used to the third crime such as identity theft, internet fraud. Hackers are interested in stealing private information for making money, in this point private information leakage problems are constantly increased hereafter. In this paper, I surveyed the authorization model on site registration which is currently used in Korea, and the problem of collecting personal identification number, I proposed policy model of useless method of private information, especially leaked information can not be used anymore in internet.

An Overview of the Developments of ICANN Internet Governance and Some Recommendations for Korea (ICANN의 진화과정 고찰을 통해 본 한국 인터넷주소 거버넌스의 개선방향)

  • Chung, Chan-Mo
    • Informatization Policy
    • /
    • v.19 no.3
    • /
    • pp.36-49
    • /
    • 2012
  • Internet Corporation for Assigned Names and Numbers (ICANN) is the body which manages the allocation and registration of global Internet IP addresses and domain names. As a gesture to overcome the dependency on the U.S. government, ICANN and the U.S. Department of Commerce jointly made the Affirmation of Commitment in which they submitted the workings of ICANN to the supervision of a council of Internet experts. Accountability and Transparency Review Team (ATRT) is one of four teams created for this purpose. In December 2010, ATRT made 27 recommendations, which were subsequently approved by the ICANN Board. These reform efforts of ICANN provide significant implications for the future of Korean Internet governance. Korea should enhance the compatibility of its domestic decision making process related to Internet addresses with the private sector driven, bottom-up process of global Internet governance. In order to increase the involvement of private sector and civil society, it is recommended for Korea to formalize the mechanism for bottom-up process. Insertion of a new provision concerning a bottom-up process into the Internet Addresses Act should be considered.

  • PDF

Efficient Backup methods for Location Register System in Cellular Network

  • Kim, Jang-Hwan
    • International journal of advanced smart convergence
    • /
    • v.7 no.3
    • /
    • pp.61-65
    • /
    • 2018
  • A Location Register(LR) system manages each subscriber's location information, which continuously changes in mobile cellular network. For this purpose, the LR database system provides backup management facilities. The objectives of this paper are to identify the problems of the current LR system through rigorous analysis, to suggest solutions to them. I proposed efficient backup methods that takes into account the characteristics of LR database transactions. In the proposed backup method, I use two kinds of dirty flags in order to solve the performance degradation problem caused by frequent registration- location operations.

A Study on the Promotion Strategy for Internet Fashion Soho Shopping Mall (인터넷 패션 소호 쇼핑몰 활성화를 위한 촉진전략 연구)

  • Kim, Hee-Sun
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.9 no.3
    • /
    • pp.59-73
    • /
    • 2007
  • The purpose of this study is to find out the promotion methods for successful management of 'the fashion saho internet shopping mall' with a small capital. This study analyze the research reports, the news items, the documents on the internet shopping mall and data on promotion method which are offered by the hosting companies of the internet shopping mall like 'Cafe 24', 'Make shop', 'Whoismall' and the promotion consulting companies like 'Whoisad', 'Naver keyword shop'. And also analyze the data that interviewed the administrator of internet shopping mall and directly observed the famous internet shopping mall sites. Generally speaking, the promotion mix, marketing communication program can classify 'advertisement', 'publicity', 'personal selling', and 'sales promotion'. This study analyze the research materials on the basis of advertisement, publicity, personal selling, and sales promotion. The result are as follows. 1. The promotion methods at the stage of information the shopping mall site to the consumer are advertisement, and publicity. ${\bigcirc}$ The methods of advertisement are 'searching engine registration', 'advertisement of key word', 'advertisement of overture', 'advertisement of banner', 'advertisement cooperation marketing', 'advertisement of e-mail'. ${\bigcirc}$ The methods of publicity are using 'cafe', 'blog', 'Naver information site', 'community bulletin board', 'the fashion magazine or a press report' and 'cosponsorship'. 2. The main promotion methods at the stage of inducing the purchase are 'personal selling', and various 'sales promotion'. ${\bigcirc}$ 'Personal selling' at the shopping mall have an effect on the communication at bulletin board over the internet and the telephone. ${\bigcirc}$ 'Sales promotion' are attempted by 'VMD', 'deposit system', 'sale', etc.

  • PDF