• Title/Summary/Keyword: Mobile Security

Search Result 1,980, Processing Time 0.027 seconds

The Global Distribution Direction of Defense Industry in Eastern Europe under the New Cooperation Strengthened (신 협력 강화에 따른 동유럽 방위산업의 국제유통방향)

  • Seo, Dae-Sung;Coo, Byung-Mo
    • Journal of Distribution Science
    • /
    • v.15 no.1
    • /
    • pp.83-93
    • /
    • 2017
  • Purpose - After the transition, the development of defense industry in Eastern Europe has been regressed. Recently, they have internationally recognized that new products have been exported and contributed to the Innovation-Based Manufacturing of national economy such as unmanned reconnaissance aircraft, water purification technology, and mobile chemical laboratory, etc. The military forces in Eastern Europe are re-armed by the localization of self-produced munitions in their own defense industry, and then emphasize fostering their own defense industry. Thus, if they make a collaboration with other nations as a industrial cluster, it will gain a competitive edge on the defense industry. Research design, data, and methodology - The study was designed with the data of each national defense department. The research of the subject was reviewed before and after the transition. Thousands of workers have worked in defense industries before the transition, however, the defense industry and experts left after the transition. The Hungarian defense spending on GDP also dropped sharply from 1.72% in 2000 to 0.85% in 2013. But, due to the crisis in Ukraine and the crisis of Syrian refugees, the Viségrad Group (V4) member countries have also increased their interest in a defense and industries as well as the confidence in the EU and NATO. Results - On the whole, the joint of military training and purchase of defense materials were found in order to form the EU cooperative combat troops in CEE. There are the implementation of a joint manual plan for strengthening V4 security policy and the joint military exercises for V4 every year, and the others are electronic warfare and innovation of V4 national forces. Through such a performance analysis methodology, we found that the defense industry is developed through the national cluster cooperation among CEEs and spreading global distribution. Conclusions - Eastern Europe and Balkan countries have been looking forward to cooperating with the non-EU countries such as Korea and other defense industries. There are a lot of potential development into a new civilian cooperation defense industry for global-distribution. Thus, Korea should develop electronic commercial applications, not just as a weapon exporting region.

A Proactive Authentication Using Credentials based on Chameleon Hashing in MIH Environments (MIH 환경에서 카멜레온 해쉬 기반의 인증값을 이용한 선행 인증 기법)

  • Chae, Kang-Suk;Choi, Jae-Duck;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.5B
    • /
    • pp.840-848
    • /
    • 2010
  • This paper proposes a proactive authentication scheme using credentials based on chameleon hashing in MIH environments. There is a proactive authentication structure defined by IEEE 802.21 Security Study Group for the link access in MIH environment. Both schemes based on EAP and on PKI can be applied to such structure, but the former has caused network traffic due to the complicated authentication procedure and the latter has complex structure for managing certificates. The proposed scheme performs the proactive authentication procedure only between a mobile node and a MIH Key Holder by using credentials based on chameleon hashing. Our scheme reduces the network traffic since authentication with the server is unnecessary in MIH environment and PKI structure is not required as well. In addition, the proposed scheme provides secure PFS and PBS features owing to the authenticated Diffie-Hellman key exchange of the chameleon-based credential.

DEESR: Dynamic Energy Efficient and Secure Routing Protocol for Wireless Sensor Networks in Urban Environments

  • Obaidat, Mohammad S.;Dhurandher, Sanjay K.;Gupta, Deepank;Gupta, Nidhi;Asthana, Anupriya
    • Journal of Information Processing Systems
    • /
    • v.6 no.3
    • /
    • pp.269-294
    • /
    • 2010
  • The interconnection of mobile devices in urban environments can open up a lot of vistas for collaboration and content-based services. This will require setting up of a network in an urban environment which not only provides the necessary services to the user but also ensures that the network is secure and energy efficient. In this paper, we propose a secure, energy efficient dynamic routing protocol for heterogeneous wireless sensor networks in urban environments. A decision is made by every node based on various parameters like longevity, distance, battery power which measure the node and link quality to decide the next hop in the route. This ensures that the total load is distributed evenly while conserving the energy of battery-constrained nodes. The protocol also maintains a trusted population for each node through Dynamic Trust Factor (DTF) which ensures secure communication in the environment by gradually isolating the malicious nodes. The results obtained show that the proposed protocol when compared with another energy efficient protocol (MMBCR) and a widely accepted protocol (DSR) gives far better results in terms of energy efficiency. Similarly, it also outdoes a secure protocol (QDV) when it comes to detecting malicious nodes in the network.

Finding Smartphone's Factors which Affect Satisfaction or Dissatisfaction based on KANO Model (KANO 모델을 활용한 스마트폰의 만족 및 불만족 요인 분석)

  • Lee, Sang-Gun;Lee, Sin-Seok;Kang, Ju-Young
    • The Journal of Information Systems
    • /
    • v.20 no.3
    • /
    • pp.257-277
    • /
    • 2011
  • The current study categorizes factors of smartphone into three, using KANO model: attractive factors which cause only product satisfaction, must-be factors for dissatisfaction, and one-dimensional factors for both. Based on it, it presents a new model for the effects that smartphone factors have on satisfaction or dissatisfaction. The purpose is to theoretically explain that smartphone factors on which companies and users place a high value can actually affect satisfaction or dissatisfaction. After choosing 15 factors out of 25 which had been selected through literature study, these were divided into attractive, must-be, and one-dimensional ones. 93 out of 109 questionnaires returned were used for analysis. After frequency analysis using SPSS were conducted on the surveys, the factors were grouped, based on KANO table. The grouping results are as follows. Attractive factors include 'expansion slots for external memory, battery desorption, brand awareness, mobile banking and internet telephony'. Must-be ones include 'multi-touch, information security, entertainment, information retrieval, location based service and SNS. Finally, 'screen visibility, size of internal memory, the amount of internal memory, battery life, and response to after-sales service' are classified as one-dimensional factors. A critical finding of this paper is that since the results are different depending on the operating system of smartphones, it must be taken into consideration in studies on smartphones. The wide and rapid spread of smartphones has changed people's lifestyle as well as business environment, which forces companies to compete with each other to adapt to the changed circumstances. In this competitive system, studies on smartphone factors of satisfaction and dissatisfaction are essential for firms to establish a new strategy. From this point of view, the present paper is expected to be a basic material for enterprises not only to develop goods and services that maximize customer satisfaction and minimize dissatisfaction, but also to establish the future business strategy.

A Study on Factors Influencing the Intention to Use NFC Payment System for Public Transport - Focused on Ho Chi Minh Citizens in Vietnam (대중 교통을 위한 NFC 결제 시스템 사용의도에 영향을 미치는 요인에 관한 연구 -베트남 호치민 시민을 중심으로)

  • Ly, Xuan-Hoang;Han, Kyeong-Seok
    • Journal of Digital Contents Society
    • /
    • v.19 no.3
    • /
    • pp.569-577
    • /
    • 2018
  • Near-Field Communication(NFC) is a useful technology that is receiving worldwide attention. NFC mobile payment systems are being developed by many technology companies including financial institutions especially for the public transportation. In this research we find several factors for the intention to adopt NFC payment system. We surveyed 355 respondents who live in Ho Chi Minh city, Vietnam which became more interested by Korean as a post China country to test our research hypothesis. Using Technology Acceptance Model(TAM) we find that the factors of Social influence, Trust, Security, and Users' Convenience play the significant role to the factor of Intention to Use of NFC payment system.

A Study on the Chain of Custody for Securing the Faultlessness of Forensic Data (포렌식 자료의 무결성 확보를 위한 수사현장의 연계관리 방법 연구)

  • Lee, Gyu-an;Shin, young-Tae;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.175-184
    • /
    • 2006
  • Computer Forensics functions by defending the effects and extracting the evidence of the side effects for production at the court. Has the faultlessness of the digital evidence been compromised during the investigation, a critical evidence may be denied or not even be presented at the trial. The presented monograph will deliberate the faultlessness-establishing chain procedures in disk forensics, system forensics, network forensics, mobile forensics and database forensics. Once the faultlessness is established by the methods proposed, the products of investigation will be adopted as a leading evidence. Moreover, the issues and alternatives in the reality of digital investigation are presented along with the actual computer forensics cases, hopefully contributing to the advances in computer digital forensics and the field research of information security.

  • PDF

Walking Assistance System for Visually Impaired People using Vultiple sensors (다중 센서를 이용한 시각장애인 보행 보조 시스템)

  • Park, Hye-Bin;Ko, Yong-Jin;Lee, Seung-Min;Jang, Ji-Hoon;Lee, Boong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.4
    • /
    • pp.533-538
    • /
    • 2017
  • In this thesis, the ambulatory aid mechanism was implemented so that blind people could be safer at risk of walking outdoors. Using ultrasonic sensors, the obstacles can be detected when the distance between the obstacle is within 50 cm of the obstacle. If the light sensor becomes less than 25 lux, the LED will automatically turn on and help the safety of the visually impaired and the security of sight of the peripheral walkers. Color recognition sensors increase the rate of recognition of yellow color by the detection distance is 1cm, it vibrated when yellow light was detected. Using GPS with 7.3 m of error range, the guardian was able to check the location of the visually impaired.

Improvement of DCT-based Watermarking Scheme using Quantized Coefficients of Image (영상의 양자화 계수를 이용한 DCT 기반 워터마킹 기법)

  • Im, Yong-Soon;Kang, Eun-Young;Park, Jae-Pyo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.17-22
    • /
    • 2014
  • Watermarking is one of the methods that insist on a copyright as it append digital signals in digital informations like still mobile image, video, other informations. This paper proposed an improved DCT-based watermarking scheme using quantized coefficients of image. This process makes quantized coefficients through a Discrete Cosine Transform and Quantization. The watermark is embedded into the quantization coefficients in accordance with location(key). The quantized watermarked coefficients are converted to watermarked image through the inverse quantization and inverse DCT. Watermark extract process only use watermarked image and location(key). In watermark extract process, quantized coefficients is obtained from watermarked image through a DCT and quantization process. The quantized coefficients select coefficients using location(key). We perform it using inverse DCT and get the watermark'. Simulation results are satisfied with high quality of image (PSNR) and Normalized Correlation(NC) from the watermarked image and the extracted watermark.

Medical prescription design using QR Codes (QR코드를 적용한 진료 처방전 설계)

  • Lim, Myung-Jae;Jung, Dong-Keun;Kim, Myung-Gwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.161-166
    • /
    • 2013
  • With recent development in information technology, IT convergence has been achieved ubiquitously in all areas of industry. In particular, there have been a lot of changes in medical IT conversion sector in terms of user service. In this regard, this paper attempts to propose an environment in which the existing paper prescription can be transferred in the form of QR codes using mobile handsets as one of practices from the perspective of user service. QR codes can minimize the burden resulting from the process of the output, delivery and storage of paper prescriptions. In addition, they can utilize the representation of the information in a wide variety of ways, and they are considered to be media that can minimize the risk of personal information exposure and falsification due to the restoration and encryption of the information. Accordingly, the application of QR codes to the medical field is expected to improve confidentiality ad storage capability of the information, along with users' convenience.

Design and Implementation of XML Encryption and Digital signature API for Mobile Environment (모바일 환경에서 XML 암호화 및 전자서명 API 설계 및 구현)

  • Cho, Tae-Beom;Ryu, Hwang;Park, Jeong-Yong;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1416-1422
    • /
    • 2010
  • Various other platforms have appeared due to the abolishment of WIPI requirement and increased problems related with hacking and security. Since levels consisting of these platforms are composed of various APIs (Application Programming Interfaces) which are not standardized, other ways must be considered to protect data which are transferred using XML formats. Therefore, XML encryption API and XML digital signature API for data protection and certification, which are both responsible to define mark-up languages for XML encryption and digital signature respectively, were designed in this paper. The simulation system which played the role of the server and client between two terminal units was realized to validate the APIs.