• Title/Summary/Keyword: Mobile internet devices

Search Result 800, Processing Time 0.031 seconds

A study on implementation of standard protocol for communication of health signals in mobile environment (모바일 환경에서 건강정보 통신을 위한 표준 프로토콜의 구현에 관한 연구)

  • Kim, Sunho;Lee, Kangwoo;Lee, Yonghee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.125-129
    • /
    • 2016
  • This study has a purpose of development of mobile health monitoring system for measuring, saving and transmitting health signals by standardizing and encoding methods under the mobile environment. The system consists of a module for measuring the health signals with Bluetooth function, encoding equipment for encoding the measured health signals by a standardized encoding method so as to maintain mutual compatibility between devices, and a mobile system for saving and transmitting the encoding health signals. The proposed system was realized under the mobilet environment and has showed to be able to make good use.

An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Irshad, Azeem;Sher, Muhammad;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Chaudhry, Shehzad Ashraf;Kumar, Rahul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5529-5552
    • /
    • 2016
  • Mobile cloud computing (MCC) has revolutionized the way in which the services can be obtained from the cloud service providers. Manifold increase in the number of mobile devices and subscribers in MCC has further enhanced the need of an efficient and robust authentication solution. Earlier, the subscribers could get cloud-computing services from the cloud service providers only after having consulted the trusted third party. Recently, Tsai and Lo has proposed a multi-server authenticated key agreement solution for MCC based on bilinear pairing, to eliminate the trusted third party for mutual authentication. The scheme has been novel as far as the minimization of trusted party involvement in authenticating the user and service provider, is concerned. However, the Tsai and Lo scheme has been found vulnerable to server spoofing attack (misrepresentation attack), de-synchronization attack and denial-of-service attack, which renders the scheme unsuitable for practical deployment in different wireless mobile access networks. Therefore, we have proposed an improved model based on bilinear pairing, countering the identified threats posed to Tsai and Lo scheme. Besides, the proposed work also demonstrates performance evaluation and formal security analysis.

A Probabilistic Tensor Factorization approach for Missing Data Inference in Mobile Crowd-Sensing

  • Akter, Shathee;Yoon, Seokhoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.63-72
    • /
    • 2021
  • Mobile crowd-sensing (MCS) is a promising sensing paradigm that leverages mobile users with smart devices to perform large-scale sensing tasks in order to provide services to specific applications in various domains. However, MCS sensing tasks may not always be successfully completed or timely completed for various reasons, such as accidentally leaving the tasks incomplete by the users, asynchronous transmission, or connection errors. This results in missing sensing data at specific locations and times, which can degrade the performance of the applications and lead to serious casualties. Therefore, in this paper, we propose a missing data inference approach, called missing data approximation with probabilistic tensor factorization (MDI-PTF), to approximate the missing values as closely as possible to the actual values while taking asynchronous data transmission time and different sensing locations of the mobile users into account. The proposed method first normalizes the data to limit the range of the possible values. Next, a probabilistic model of tensor factorization is formulated, and finally, the data are approximated using the gradient descent method. The performance of the proposed algorithm is verified by conducting simulations under various situations using different datasets.

The Design and Implementation of a WML Web-Site Authoring Tool for Cellular Phones (휴대폰용 WML 웹사이트 저작도구의 설계 및 구현)

  • 이종열;박원배
    • Proceedings of the IEEK Conference
    • /
    • 2000.06a
    • /
    • pp.109-112
    • /
    • 2000
  • The desire of achieving abundant and various information in Web-sites through portable devices is increased as the mobile communication technology is matured. WML(Wireless Markup Language) is the fundamental language to fill up the those desires. The number of commercial WML sites which can be accessed by PCS(Personal Communication System) over the Internet are growing rapidly worldwide. In this paper, a WML authoring tool which can author easily the homepage suitable for PCS is designed and implemented. The usability of the proposed WML authoring tool was confirmed by using UP.SDK simulator over the Internet.

  • PDF

A Registration of Personal Information using Biometrics in Mobile Devices (모바일 장치에서 바이오인식을 이용한 개인정보 등록)

  • Han, Seung-Jin;Kim, Nak-Hyun;Kim, Jae-Sung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2014.11a
    • /
    • pp.49-50
    • /
    • 2014
  • 바이오인식 기술은 기존의 패스워드나 PIN을 대체할 수 있는 새로운 수단이지만 바이오인식 기술은 한번 도용이 되면 기존의 수단과 달리 수정할 방법이 없으므로 바이오인식 정보를 안전하게 신뢰하는 제3의 장치에 등록하는 방법을 제안한다.

  • PDF

A Study the Test Methods and Evaluation Practices of Network Access Control System (NAC 시스템의 시험방법과 평가사례에 관한 연구)

  • Yang, Hyo-Sik;Jeon, In-Oh
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.159-168
    • /
    • 2014
  • With the advancement of internet and mobile communication devices, mobile banking such as internet banking, internet loan and smart phones related to the people's economic activities using mobile communication devices is becoming increasingly more popular. Various security systems to prevent such new crimes are being introduced and the security system market is anticipated to continuously increase substantially in the future. Accordingly, qualitative advancement of the security systems are also in continuous demand. Therefore, this thesis proposes the method and system for quality evaluation of the network access control system by proposing testing and evaluating method for the relevant system through surveying and analyzing the tend in the foundation technologies and standards in the area of network access control system, which is one of the security systems, in order to cope with the demands for the evaluation of the quality of the security system as the security system product market is anticipated to grow continuously.

Design of A One-time Password Generator on A Mobile Phone Providing An Additional Authentication for A Particular Transaction (특정 트랜잭션용 추가 인증을 제공하는 휴대폰 상의 일회용 암호 생성기 설계)

  • Park, Jun-Cheol
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.6
    • /
    • pp.552-557
    • /
    • 2009
  • One-time passwords are used just once and discarded, which makes it more secure than the repeatedly used conventional passwords. This paper proposes a challenge-response based one-time password generator on a user's mobile phone always carried with the user. The generator can provide an additional authentication for a user to issue a money transfer request within his Internet banking session on a PC. A currently used device for Internet banking generates a password that changes every 30 seconds or so, which allows a man-in-the-middle to use it for stealing money within the 30 seconds. Unlike such a device, the proposed generator resists against the man-in-the-middle attack by a novel challenge-response scheme, provides better accessability and protection against stolen devices. As the currently used devices do, it prevents any unauthorized transfer even if the victim's all other credentials are revealed through his PC infected with spyware such as a keyboard logger.

The Technological Method for Safe Processing of Sensitive Information in Network Separation Environments (망분리 환경에서 민감정보를 안전하게 처리하기 위한 기술적 방안)

  • Juseung Lee;Ilhan Kim;Hyunsoo Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.125-137
    • /
    • 2023
  • Companies that handle sensitive information, led by public institutions, establish separate networks for work and the Internet and protect important data through strong access control measures to prevent cyber attacks. Therefore, systems that involve the junction where the Intranet(internal LAN for work purposes only) and the Internet network are connected require the establishment of a safe security environment through both administrative and technical measures. Mobile Device Management(MDM) solutions to control mobile devices used by institutions are one such example. As this system operates by handling sensitive information such as mobile device information and user information on the Internet network, stringent security measures are required during operation. In this study, a model was proposed to manage sensitive information data processing in systems that must operate on the Internet network by managing it on the internal work network, and the function design and implementation were centered on an MDM solution based on a network interconnection solution.

Comparison between the Internet and Mobile Phone Addiction of Adolescent with Structural Equation Model and Dominance Analysis (구조 방정식 모형과 우세 분석을 통한 청소년의 인터넷.휴대폰 중독 비교)

  • Park, Chan-Jung;Hyun, Jung-Suk;Ha, Hwan-Ho
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.1
    • /
    • pp.11-22
    • /
    • 2013
  • Due to the advent of new smart devices, the new technology addiction problems have been much severer than the Internet addiction recently. A lot of research about each technology addiction has been proposed, but the research about the changes in the addictions has been rare. In this paper, we analyze how the environmental factors such as parents and friends affect the personal factors such as time perspectives and technology usage time. In addition, we get the relative importances among the factors which influence on the Internet and mobile phone addictions. As a result, we can analyze the relationships among the factors and the differences between the two addictions with time perspective. In order to achieve our goals, we surveyed on 1,420 primary and secondary school students. We also provided the results produced by structural equation model and Budescu's Dominance analysis. Based on these analyses, we described the differences between the Internet and mobile phone addictions and proposed an alternative to prevent new technology addictions.

  • PDF

WPKI Certificate Verification Using Observer (옵저버를 이용한 WPKI 인증서 검증방법)

  • 김진철;오영환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8C
    • /
    • pp.1203-1209
    • /
    • 2004
  • A huge growth the wireless internet services, which are based on the wireless mobile network technology and internet technology, poses demand for the end-to-end secure connections. Restrictions of wireless mobile environment and mobile devices make difficult to adapt present secure protocols to wireless internet services. In this paper, we analyze existing certificate status verification methods in WPKI and propose a new method, adding a observer information in handshake protocol. The method with observer makes it more efficient for relying parties to verify both the current status of the X.509 certificate and the short-lived WTLS server certificate.