• Title/Summary/Keyword: Mobile Internet Platform

Search Result 325, Processing Time 0.024 seconds

Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks

  • Phuc, Tran Song Dat;Shin, Yong-Hyeon;Lee, Changhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2148-2167
    • /
    • 2021
  • The proliferation of the Internet of Things (IoT) technologies and applications, especially the rapid rise in the use of mobile devices, from individuals to organizations, has led to the fundamental role of secure wireless networks in all aspects of services that presented with many opportunities and challenges. To ensure the CIA (confidentiality, integrity and accessibility) security model of the networks security and high efficiency of performance results in various resource-constrained applications and environments of the IoT platform, DDO-(data-driven operation) based constructions have been introduced as a primitive design that meet the demand of high speed encryption systems. Among of them, the TMN-family ciphers which were proposed by Tuan P.M., Do Thi B., etc., in 2016, are entirely suitable approaches for various communication applications of wireless mobile networks (WMNs) and advanced wireless sensor networks (WSNs) with high flexibility, applicability and mobility shown in two different algorithm selections, TMN64 and TMN128. The two ciphers provide strong security against known cryptanalysis, such as linear attacks and differential attacks. In this study, we demonstrate new probability results on the security of the two TMN construction versions - TMN64 and TMN128, by proposing efficient related-key recovery attacks. The high probability characteristics (DCs) are constructed under the related-key differential properties on a full number of function rounds of TMN64 and TMN128, as 10-rounds and 12-rounds, respectively. Hence, the amplified boomerang attacks can be applied to break these two ciphers with appropriate complexity of data and time consumptions. The work is expected to be extended and improved with the latest BCT technique for better cryptanalytic results in further research.

A Social Search Scheme Considering User Preferences and Popularities in Mobile Environments

  • Bok, Kyoungsoo;Lim, Jongtae;Ahn, Minje;Yoo, Jaesoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.744-768
    • /
    • 2016
  • As various pieces of information can be provided through the web, schemes that provide search results optimized for individual users are required in consideration of user preference. Since the existing social search schemes use users' profiles, the accuracy of the search deteriorates. They also decrease the reliability of a search result because they do not consider a search time. Therefore, a new social search scheme that considers temporal information as well as popularities and user preferences is required. In this paper, we propose a new mobile social search scheme considering popularities and user preferences based on temporal information. Popularity is calculated by collecting the visiting records of users, while user preference is generated by the actual visiting information among the search results. In order to extract meaningful information from the search target objects that have multiple attributes, a skyline processing method is used, and rank is given to the search results by combining the user preference and the popularity with the skyline processing result. To show the superiority of the proposed scheme, we conduct performance evaluations of the existing scheme and the proposed scheme.

Development and Characterization of Mobile Transceiver for Millimeter-Wave Channel Sounding Measurement (밀리미터파 채널사운딩 측정을 위한 이동형 송수신 장치의 개발과 특성평가)

  • Jonguk Choi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.35-40
    • /
    • 2024
  • In this paper, the design, implementation, and analysis of a device capable of transmitting and receiving millimeter-wave signals and performing channel sounding measurements in atmospheric conditions at distances of up to approximately 10km outdoors are presented. The device is expected to be instrumental in studying the propagation characteristics of millimeter-wave frequencies. Utilizing data such as received power levels and power delay profiles (PDPs), comparisons with predicted values using path loss, K-factor, and other propagation models are facilitated. The mobile transceiver unit, integrated onto a vehicle platform, allows for flexible adjustment of transmitter and receiver positions, while synchronization issues with distance are mitigated using a rubidium atomic clock. Furthermore, automatic boresight alignment using scanning techniques is employed to locate the main sector of the antenna.

Implementation of a MTM-based secure OTP Generator for IoT Devices (IoT 디바이스를 위한 MTM 기반의 안전한 OTP 생성기 구현)

  • Kim, Young-Sae;Han, Jin-Hee;Jeon, Yong-Sung;Kim, Jung-Nyu
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.4
    • /
    • pp.199-206
    • /
    • 2015
  • In this paper, we present the implementation of a secure OTP(One Time Password) generator for IoT(Internet of Things) devices. Basically, MTM(Mobile Trusted Module) is used and expanded considering secure IoT services. We combine the MTM architecture with a new hardware-based OTP generation engine. The new architecture is more secure, offering not only the security of devices but also that of the OTP service. We have implemented and verified the MTM-based OTP generator on a real mobile platform embedded with the MTM chip. The proposed method can be used as a solution for enhancing security of IoT devices and services.

A study on the effect of open wireless Internet services on the value network of mobile communications industry : Open mobile platform perspective (개방형 무선인터넷서비스가 이동통신 가치네트워크에 미치는 영향에 관한 연구 : 개방형 모바일 플랫폼을 중심으로)

  • Kwon, Min-Tack;Shin, Min-Soo
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.05a
    • /
    • pp.272-277
    • /
    • 2008
  • 무선통신망의 망고도화로 3세대 이동통신 서비스가 개시됨에 따라 소비자들은 다양한 서비스와 콘텐츠를 제공받을 수 있게 되었다. 현재의 모바일 무선인터넷은 네트워크를 소유하고 있는 이동통신사들이 사실상 전권을 행사하고 있어 폐쇄적 성격이 짙다. 하지만, 작년 Google이 개방형 모바일 플랫폼 "안드로이드"를 공개한데 이어, 최근 LGT의 무선인터넷서비스 "OZ"의 런칭으로 무선인터넷 활성화에 대한 기대감이 높아지고 있다. 기존의 무선인터넷 산업에 대한 연구는 선형적인 가치사슬에 기반하여 해석되었기 때문에, 복잡한 네트워크로 진화해가는 해당 산업에 대한 명확한 분석을 할 수가 없었다. 따라서, 본 연구에서는 가치네트워크 개념을 도입하여 모바일 플랫폼의 개방이 이동통신 가치네트워크에 미치는 영향에 대하여 연구한다.

  • PDF

Educational Paradigm Shift from E-Learning to Mobile Learning Toward Ubiquitous Learning

  • Gelogo, Yvette;Kim, Hye-jin
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.4 no.1
    • /
    • pp.8-12
    • /
    • 2012
  • The purpose of this study is to review the possible effect of the learning paradigm shift from traditional method to ubiquitous learning. What are the societal issues that need to be address in order to design a new pedagogical platform trending from e-learning to m-learning and now the u-learning? That without the proper study of how learning environment may affect the learning process of an individual will lead to poor quality of education. This new era of learning environment offer a big opportunity for "anytime, anywhere" learning. Thus, Lifelong learning is at hand of everyone. Maximizing the benefit of new trend will be a great help and addressing the limitations will lead to quality education.

Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services

  • Moon, Ki-Young;Park, Nam-Je;Chung, Kyo-Il;Sohn, Sung-Won;Ryou, Jae-Cheol
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.86-95
    • /
    • 2005
  • Location-based services or LBS refer to value-added service by processing information utilizing mobile user location. With the rapidly increasing wireless Internet subscribers and world LBS market, the various location based applications are introduced such as buddy finder, proximity and security services. As the killer application of the wireless Internet, the LBS have reconsidered technology about location determination technology, LBS middleware server for various application, and diverse contents processing technology. However, there are fears that this new wealth of personal location information will lead to new security risks, to the invasion of the privacy of people and organizations. This paper describes a novel security approach on open LBS service to validate certificate based on current LBS platform environment using XKMS (XML Key Management Specification) and SAML (Security Assertion Markup Language), XACML (extensible Access Control Markup Language) in XML security mechanism.

A Probabilistic Test based Detection Scheme against Automated Attacks on Android In-app Billing Service

  • Kim, Heeyoul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1659-1673
    • /
    • 2019
  • Android platform provides In-app Billing service for purchasing valuable items inside mobile applications. However, it has become a major target for attackers to achieve valuable items without actual payment. Especially, application developers suffer from automated attacks targeting all the applications in the device, not a specific application. In this paper, we propose a novel scheme detecting automated attacks with probabilistic tests. The scheme tests the signature verification method in a non-deterministic way, and if the method was replaced by the automated attack, the scheme detects it with very high probability. Both the analysis and the experiment result show that the developers can prevent their applications from automated attacks securely and efficiently by using of the proposed scheme.

Design and Implementation of a Mapping Middleware for Wireless Internet Map Service (무선인터넷 지도서비스를 위한 매핑 미들웨어의 설계와 구현)

  • 이양원;박기호
    • Spatial Information Research
    • /
    • v.12 no.2
    • /
    • pp.165-179
    • /
    • 2004
  • With the spread of wireless internet, the interest in mobile applications and services is increasing. Korea Wireless Internet Standardization Forum has been establishing the standards for mobile platform and map service in the wireless internet environment. This study aims to present a paragon of mapping middleware that plays the role of broker for wireless internet map service: in particular, it focuses on the interoperability with generic map servers. In this study, we developed a method for applying current map servers to the wireless internet map service, and analyzed the request/response structure of the map servers which have different operation characteristics in order to allow our middleware to fully utilize the functionalities of the map servers. The middleware we developed is composed of .NET-based XML Web Services: it has a lightweight module for image map and a map representation module for choropleth map, symbol map, chart map, etc. This mapping middleware is a broker between mobile client and generic map server, and supports .NET clients and Java clients as well. Its component-based interoperability grants the extensibility for the wireless internet dedicated map servers of the future in addition to the current generic map servers.

  • PDF

A Property-Based Data Sealing using the Weakest Precondition Concept (최소 전제조건 개념을 이용한 성질 기반 데이터 실링)

  • Park, Tae-Jin;Park, Jun-Cheol
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.1-13
    • /
    • 2008
  • Trusted Computing is a hardware-based technology that aims to guarantee security for machines beyond their users' control by providing security on computing hardware and software. TPM(Trusted Platform Module), the trusted platform specified by the Trusted Computing Group, acts as the roots for the trusted data storage and the trusted reporting of platform configuration. Data sealing encrypts secret data with a key and the platform's configuration at the time of encryption. In contrast to the traditional data sealing based on binary hash values of the platform configuration, a new approach called property-based data sealing was recently suggested. In this paper, we propose and analyze a new property-based data sealing protocol using the weakest precondition concept by Dijkstra. The proposed protocol resolves the problem of system updates by allowing sealed data to be unsealed at any configuration providing the required property. It assumes practically implementable trusted third parties only and protects platform's privacy when communicating. We demonstrate the proposed protocol's operability with any TPM chip by implementing and running the protocol on a software TPM emulator by Strasser. The proposed scheme can be deployed in PDAs and smart phones over wireless mobile networks as well as desktop PCs.

  • PDF