• Title/Summary/Keyword: Mobile home

Search Result 740, Processing Time 0.023 seconds

Clue for Secure Route Optimization in Mobile IPv6 (모바일 IPv6 바인딩 업데이트의 보안 향상 기법)

  • Song, Se-Hwa;Choi, Hyoung-Kee;Kim, Jung-Yoon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.153-158
    • /
    • 2010
  • Mobile IPv6 is one of method can keep Mobile node's session. To solve legacy Mobile IPv4's triangular routing problem, in Mobile IPv6, Mobile Node could directly communicate with Correspond node by Binding Update. But, attacker could interfere Return Routability Procedure that is Correspond node check Home address and Care of address reachable. At this result, Attacker is able to hijack Session to correspond node from Mobile node. In This paper, We propose new Binding Update scheme for solving that problem. Our approach is that MN gives association both home token and care of token using onewayness of keyed hash fuction. From security and performance analysis, we can see that proposed binding Update Scheme can achieve stronger security than legacy scheme and at the same time requires minimal computational overhead.

Enhancing Security in Mobile IPv6

  • Modares, Hero;Moravejosharieh, Amirhossein;Salleh, Rosli Bin;Lloret, Jaime
    • ETRI Journal
    • /
    • v.36 no.1
    • /
    • pp.51-61
    • /
    • 2014
  • In the Mobile IPv6 (MIPv6) protocol, a mobile node (MN) is a mobile device with a permanent home address (HoA) on its home link. The MN will acquire a care-of address (CoA) when it roams into a foreign link. It then sends a binding update (BU) message to the home agent (HA) and the correspondent node (CN) to inform them of its current CoA so that future data packets destined for its HoA will be forwarded to the CoA. The BU message, however, is vulnerable to different types of security attacks, such as the man-in-the-middle attack, the session hijacking attack, and the denial-of-service attack. The current security protocols in MIPv6 are not able to effectively protect the BU message against these attacks. The private-key-based BU (PKBU) protocol is proposed in this research to overcome the shortcomings of some existing MIPv6 protocols. PKBU incorporates a method to assert the address ownership of the MN, thus allowing the CN to validate that the MN is not a malicious node. The results obtained show that it addresses the security requirements while being able to check the address ownership of the MN. PKBU also incorporates a method to verify the reachability of the MN.

Embedded System for Mobile Phone-based Control and Monitoring (모바일 폰 기반의 제어 및 모니터링을 위한 임베디드 시스템)

  • Park, Hung-bog;Seo, Jung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.288-289
    • /
    • 2018
  • The use of IoT (Internet of Things) is rapidly expanding to enhance the quality of life as seen in the interconnection between mobile devices and Web. This paper proposes an embedded system that connects sensors and mobile devices via IoT technology, improving the user's ability and service experience to remotely control the home appliances with mobile-detection features. Home appliances are expected to increase labor efficiency by utilizing the embedded system connected to the sensors. Using mobile applications to control home appliances remotely and to monitor operation status advances the user's knowledge, experience, and perspectives to experience refined life qualities.

  • PDF

A Relationship between Consumption Value and Consumption Behavior of Adolescent Consumers - Focused on the Consumption Behavior of Mobile Phones - (청소년 소비자의 소비가치와 소비행동과의 관계 - 이동전화 소비행동을 중심으로 -)

  • Kim, Si-Wuel;Kim, You-Jin
    • Journal of the Korean Home Economics Association
    • /
    • v.46 no.3
    • /
    • pp.13-26
    • /
    • 2008
  • This study aims to offer basic data for consumer education regarding the use of mobile phones by adolescent consumers in a correct way by researching and analyzing the consumption value and consumption behavior of adolescent consumers for mobile phones to see how they use mobile phone as consumers, which is a serious of user behaviors according to their plan, purchase, use, and disposal. Based on the research results, the study proposes the following in relation to the correct use of mobile phones by adolescent consumers. First, in the purchase or use of mobile phones, a more demonstrative consumption pattern was more likely for males than females and for those who are in higher grades than those who are not. Therefore, it is necessary to offer consumer education given the gender and school year rather than stereotyped consumer education. Second, it is necessary to offer objective information and give consumer education for checking the instant desire for something new in order to prevent an impulsive purchase based upon advertisements given the characteristics of adolescent consumers who prefer new designs or functions. Third, regarding the disposal of mobile phones, it is necessary to seek strategies for recycling mobile phones usefully at an administrative level to prevent mobile phones from being thrown away without being recycled.

On Managing Mobility of Mobile Nodes using an Improved Mobile IP Regional Registration in Wireless Mobile Networks (무선 이동 망에서 개선된 Mobile IP 지역 위치등록을 이용한 이동 노드의 이동성 관리)

  • 한승진;이정현
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.3
    • /
    • pp.47-54
    • /
    • 2004
  • By using wireless terminal, the number of users who wish to use the multimedia service like the Internet as well as Short Message Services and voice service has increased dramatically over the last years. We propose the method that improves Mobile IPv4 (MIPv4) Regional Registration in wireless mobile networks to decrease traffic's transmission delay and message generation compared with an existing method We design the scheme in MIPv4 environments that a packet do not pass through the home agent transmitted from correspondent node to mobile node, if a mobile node moves to other mobility agent. Simulation results show that the proposed method significantly reduces the expenses for registration and delivering packet.

Data Dissemination Protocol based on Home Agent and Access Node for Mobile Sink in Sensor Network (센서 네트워크에서 홈에이젼트와 액세스 노드에 기반한 모바일 싱크를 위한 데이터 전송 기법)

  • Lee, Joa-Hyoung;Jung, In-Bum
    • The KIPS Transactions:PartC
    • /
    • v.15C no.5
    • /
    • pp.383-390
    • /
    • 2008
  • The mobile sink is most suitable to guarantee the real time processing to events in ubiquitous environment. However it brings many challenges to wireless sensor networks. In particular, the question of how to transfer the collected data to the mobile sink is an important topic in the aspect of effective management of wireless sensor nodes. In this paper, a new data dissemination model is proposed. Since this method uses the home agent and the access node concepts, it provides reliable and efficient data delivery to mobile sink with minimum overhead. In this proposed method, the information of the mobile sink which is constantly moving is informed only to the home agent node and the access node, instead of all sensor nodes. Thus, the collected data from sensor nodes are transferred to the fixed home agent and it sends these data to the mobile sink. Since the confliction phenomenon between data packets in wireless networks could be reduced, the success ratio of data arriving in the mobile sink is highly enhanced. In our experiments, the proposed method reduces the number of broadcast packets so that it saves the amount of energy consumed for transmitting and receiving the data packets. This effect contributes to prolong the lifetime of the wireless sensor networks operated by batteries.

Ubiquitous Home Security Robot System based on Sensor Network (센서 네트워크 기반의 홈 보안로봇 시스템 구현)

  • Kim, Yoon-Gu;Lee, Ki-Dong
    • The Journal of Korea Robotics Society
    • /
    • v.2 no.1
    • /
    • pp.71-79
    • /
    • 2007
  • We propose and develop Home Security robot system based on Sensor Network (HSSN) configured by sensor nodes including radio frequency (RF), ultrasonic, temperature, light and sound sensors. Our system can acknowledge security alarm events that are acquired by sensor nodes and relayed in the hop-by-hop transmission way. There are sensor network, Home Security Mobile Robot (HSMR) and Home Server(HS) in this system. In the experimental results of this system, we presented that our system has more enhanced performance of response to emergency context and more speedy and accurate path planning to target position for arriving an alarm zone with obstacle avoidance and acquiring the context-aware information.

  • PDF

An Efficient Authentication Mechanism Using Regional Registration in Mobile IP Network (Mobile IP 망에서 지역 등록 기법을 이용한 효율적인 인증 방안)

  • Jang, Sung-Eun;Park, Jung-Min;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.9C no.5
    • /
    • pp.749-756
    • /
    • 2002
  • As Internet access through mobile devices is increasing, Mobile IP is the protocol to provide the mobility of a host on the existing IP. It is important to provide secure authentication when mobile node register with home agent through the foreign agent each time it moves. In this paper, we propose the authentication mechanism using a regional registration. The proposed authentication mechanism reduce frequent home registration in regional movement. The simulation results show that the proposed authentication reduces the total registration time and is more efficient than conventional registration mechanism.

Roaming Service Support Technique using CHAP in Wireless Internet (무선 인터넷 환경에서 CHAP 인증 기법을 이용한 로밍 서비스 지원 방법)

  • 박정현;유승재;양정모
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.53-60
    • /
    • 2004
  • We describe CHAP authentication for roaming service method of visited ISP subscriber on GPRS network. We also illustrate how visited mobile ISP subscriber can access ISP server and authenticate RADIUS in home network via Gateway GPRS Support Node (GGSN) on GPRS/UMTS network for wireless internet service and roaming. For this we propose the modified CHAP message format, PCO Message format at MT, and interworking message and format between GGSN and RADIUS in home ISP network for wireless internet service of mobile ISP subscriber at GPRS network in this paper. We also show authentication results when visited mobile ISP subscriber via CHAP at GPRS network accesses the RADIUS server in home ISP network.

  • PDF

The Structure of Assure Information Security In Mobile Environment Based Mobile PKI (모바일 PKI 기반의 이동 보안 구조)

  • 서세영;신승수;최승권;조용환
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.132-139
    • /
    • 2003
  • In this paper, we design and implement the public key certification the structure of assure information security which play an important role in PKI (Public Key Infrastructure). The structure of assure information security consists of Root-CA, Home-network and Foreign-network. CA will going to gave the mandate to Home-Agent or Foreign-Agent when they request. The structure of assure information security is various characteristic : more then high speed, mobile network, and low cost more then previous structure of assure information security.

  • PDF