• Title/Summary/Keyword: Mobile Security

Search Result 1,974, Processing Time 0.027 seconds

Introduction of the Internet-only Bank and Development direction Proposal (국내 인터넷 전문은행의 도입과 발전 방향 제안)

  • Choi, Jeong-Il
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.139-147
    • /
    • 2016
  • Korea is ahead of the launch of internet banking professional following to America, Europe and Japan. Internet banking is a professional non-store bank to conduct business such as deposits and loans on the internet and call centers. It is operating in a low-cost structure and minimizes the loans and deposits, various fees than traditional banks and obtains a profit. In order to be successful internet banking professional to develop a differentiated work with the existing banks should be competitive. In this paper, we explore and analyze the cases of Japan and the United States to present the future direction of domestic Internet banking professional future. Also it is expected to enable faster and more convenient one-stop financial services. Internet specialized bank is expected to continue to develop further by the inevitable competition with conventional banks as developing differentiated financial services. Deregulation of banks and industries and participation of various companies of security, insurance, telecommunications, and retail are expected to lead to the convergence among industries and development of new financial services.

Privacy Vulnerability Analysis on Shuai et al.'s Anonymous Authentication Scheme for Smart Home Environment (Shuai등의 스마트 홈 환경을 위한 익명성 인증 기법에 대한 프라이버시 취약점 분석)

  • Choi, Hae-Won;Kim, Sangjin;Jung, Young-Seok;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.18 no.9
    • /
    • pp.57-62
    • /
    • 2020
  • Smart home based on Internet of things (IoT) is rapidly emerging as an exciting research and industry field. However, security and privacy have been critical issues due to the open feature of wireless communication channel. As a step towards this direction, Shuai et al. proposed an anonymous authentication scheme for smart home environment using Elliptic curve cryptosystem. They provided formal proof and heuristic analysis and argued that their scheme is secure against various attacks including de-synchronization attack, mobile device loss attack and so on, and provides user anonymity and untraceability. However, this paper shows that Shuai et al.'s scheme does not provide user anonymity nor untraceability, which are very important features for the contemporary IoT network environment.

3D Mesh Watermarking Using Projection onto Convex Sets (볼록 집합 투영 기법을 이용한 3D 메쉬 워터마킹)

  • Lee Suk-Hwan;Kwon Seong-Geun;Kwon Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.2 s.308
    • /
    • pp.81-92
    • /
    • 2006
  • This paper proposes a robustness watermarking for 3D mesh model based on projection onto convex sets (POCS). After designing the convex sets for robustness and invisibility among some requirements for watermarking system, a 3D-mesh model is projected alternatively onto two constraints convex sets until the convergence condition is satisfied. The robustness convex set are designed for embedding the watermark into the distance distribution of the vertices to robust against the attacks, such as mesh simplification, cropping, rotation, translation, scaling, and vertex randomization. The invisibility convex set are designed for the embedded watermark to be invisible. The decision values and index that the watermark was embedded with are used to extract the watermark without the original model. Experimental results verify that the watermarked mesh model has invisibility and robustness against the attacks, such as translation, scaling, mesh simplification, cropping, and vertex randomization.

Research on Robust Face Recognition against Lighting Variation using CNN (CNN을 적용한 조명변화에 강인한 얼굴인식 연구)

  • Kim, Yeon-Ho;Park, Sung-Wook;Kim, Do-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.2
    • /
    • pp.325-330
    • /
    • 2017
  • Face recognition technology has been studied for decades and is being used in various areas such as security, entertainment, and mobile services. The main problem with face recognition technology is that the recognition rate is significantly reduced depending on the environmental factors such as brightness, illumination angle, and image rotation. Therefore, in this paper, we propose a robust face recognition against lighting variation using CNN which has been recently re-evaluated with the development of computer hardware and algorithms capable of processing a large amount of computation. For performance verification, PCA, LBP, and DCT algorithms were compared with the conventional face recognition algorithms. The recognition was improved by 9.82%, 11.6%, and 4.54%, respectively. Also, the recognition improvement of 5.24% was recorded in the comparison of the face recognition research result using the existing neural network, and the final recognition rate was 99.25%.

Distributed Time Division Piconet Coexistence Using Local Time Offset Exchange (로컬 오프셋을 이용한 분산 시간 분리 피코넷 충돌회피 방법론)

  • Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1447-1453
    • /
    • 2014
  • Wireless Body Area Networks (WBAN), standardized as IEEE 802.15.6, enable digital devices on/around the human body to communicate with one another. WBAN is essentially a person's piconet consisting of a master (mobile) device and several slave devices, which follows his/her mobility pattern, and hence, occasionally collides with another piconet as people meet or pass by. As such, a mechanism to detect collision and avoid interference is needed for intra-piconet communications. In this paper, we focus on this notorious problem of piconet collision and propose Distributed Time Division Piconet Coexistence (DTDPC) using local time offset exchange as a simple, attractive solution. The proposed DTDPC provides different level of services for various applications. Besides our simulation results have shown that the proposed solution outperforms the conventional CSMA protocols.

Analysis of the Routing Path Tracking Technology for Mobility Host (이동성 호스트를 위한 라우팅 경로 추적 기술 분석)

  • Park, Jin-tae;Phyo, Gyung-soo;Moon, Il-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.638-640
    • /
    • 2016
  • Recently, Humanity enter the super-connection generation that linking human and things as a result of the development ICT technologies. IoT technology is growing rapidly as a result of IoT technology appearance and development of smart device, technology expansion, the spread of smart sensors, spread diffusion of smart devices, construction of a variety of network. These techniques are applied to those having a mobility is growing importance of network technology. Real-time service and features, such as the accuracy of the data it became important. In order to implement the IoT will need to take into account IP, security, a lot of things such as a service model, but in this paper, want to discuss mobility, for the tracking technology of routing path for efficient service delivery of the host. Therefore, in this paper, the routing path that is currently study examined the tracking technology, we try to refer to routing method of the future of the mobile host.

  • PDF

Efficient Multicasting Mechanism for Mobile Computing Environment (물류트랙킹 장비에 활용되는 WCDMA/GSM 이중 대역 안테나 설계 및 성능 검증)

  • Lee, Eun-Kyu;Choi, Sung-Pill;Moon, Young-Sik;Jeon, Mi-Jin;Jo, Jae-Hui;Kim, Jae-Joong;Choi, Hyung-Rim
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.896-897
    • /
    • 2013
  • In recent years, logistics tracking Device using GSM & WCDMA to improve logistics efficiency are being extensively researched. The purpose of this paper is to examine the performance development antenna usable cargo container security transport. Antenna developed by study were optimized to match logistics environment apply to GSM & WCDMA dual frequency for monitering system. The measure of antenna have confirmation VSWR is 3:1 measured in return loss -10dB. Reliability of this antenna has been verified about GSM & WCDMA through test-operation between the south korea and Russia.

  • PDF

Technical Suggestions for Smart Airport Realization - Viewpoint of Passenger Convenience (스마트공항 실현을 위한 기술적 제언 - 여객 편의성 관점)

  • Hong, Jin Woo;Oh, Jeong Hoon;Lee, Han Kyu;Kim, Moon Ku;Song, Ho Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.268-271
    • /
    • 2018
  • Smart Airport which applies the new ICT technologies to the airport is a future airport to provide convenient and safe services for passengers who are airport users, and promote the efficient management of the airport system in point of airport operator's view. The ranges of smart airport include the overall area of the airport like land side, terminal, and air side. In this paper, we propose a technical solution for airport process of terminal providing passenger convenience in various ranges for smart airport realization. Self-service such as web or mobile check-in, self check-in/tagging/back drop/boarding etc. should be strengthened to smartize the airport process and technologies such as automatic immigration, smart security search and automatic AI-based baggage search should be applied. In this paper, we explain the concept of smart airport and smart process, and then propose technical considerations.

  • PDF

Design and Implementation of IEEE 802.11 Wireless LAN-based Identification and Location Tracking Techniques for Vehicle Information Terminals (IEEE 802.11 무선랜 기술 기반 차량용 정보 단말을 위한 식별과 위치 추적 기능의 설계와 구현)

  • Oh, Doo-Hwan;Yoon, Mi-Kyung;Han, Seung-Ho;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2B
    • /
    • pp.107-118
    • /
    • 2009
  • In this paper, we present design and implementation for identification and location tracking techniques for vehicle information terminals in high-speed mobile environment using IEEE 802.11 wireless LAN technology. RSU be installed at a specific point. RSU recognizes it and then aware identification and location tracking for target vehicle when target vehicle that is equipped with information terminals pass near point. Issue of quick recognition using IEEE 802.11 access management frame, issue of weak wireless LAN security and tracking a range of restrictions be raised and we present solutions. Vehicle information terminal, RSU and a server-side GUI-based management program be implemented based on proposed solution. Implementation system be performed experiment at actual road environment and effectiveness be verified.

Multi-Attribute based on Data Management Scheme in Big Data Environment (빅 데이터 환경에서 다중 속성 기반의 데이터 관리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.263-268
    • /
    • 2015
  • Put your information in the object-based sensors and mobile networks has been developed that correlate with ubiquitous information technology as the development of IT technology. However, a security solution is to have the data stored in the server, what minimal conditions. In this paper, we propose a data management method is applied to a hash chain of the properties of the multiple techniques to the data used by the big user and the data services to ensure safe handling large amounts of data being provided in the big data services. Improves the safety of the data tied to the hash chain for the classification to classify the attributes of the data attribute information according to the type of data used for the big data services, functions and characteristics of the proposed method. Also, the distributed processing of big data by utilizing the access control information of the hash chain to connect the data attribute information to a geographically dispersed data easily accessible techniques are proposed.