• Title/Summary/Keyword: Mobile security

Search Result 1,993, Processing Time 0.025 seconds

A Study on the Chain of Custody for Securing the Faultlessness of Forensic Data (포렌식 자료의 무결성 확보를 위한 수사현장의 연계관리 방법 연구)

  • Lee, Gyu-An;Shin, Young-Tae;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.225-234
    • /
    • 2006
  • Computer Forensics functions by defending the effects and extracting the evidence of the side effects for production at the court. Has the faultlessness of the digital evidence been compromised during the investigation, a critical evidence may be denied or not even be presented at the trial. The presented monograph will deliberate the faultlessness-establishing chain procedures in disk forensics. system forensics, network forensics, mobile forensics and database forensics. Once the faultlessness is established by the methods proposed, the products of investigation will be adopted as a leading evidence. Moreover, the issues and alternatives in the reality of digital investigation are presented along with the actual computer forensics cases, hopefully contributing to the advances in computer digital forensics and the field research of information security.

  • PDF

DTCF: A Distributed Trust Computing Framework for Vehicular Ad hoc Networks

  • Gazdar, Tahani;Belghith, Abdelfettah;AlMogren, Ahmad S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1533-1556
    • /
    • 2017
  • The concept of trust in vehicular ad hoc networks (VANETs) is usually utilized to assess the trustworthiness of the received data as well as that of the sending entities. The quality of safety applications in VANETs largely depends on the trustworthiness of exchanged data. In this paper, we propose a self-organized distributed trust computing framework (DTCF) for VANETs to compute the trustworthiness of each vehicle, in order to filter out malicious nodes and recognize fully trusted nodes. The proposed framework is solely based on the investigation of the direct experience among vehicles without using any recommendation system. A tier-based dissemination technique for data messages is used to filter out non authentic messages and corresponding events before even going farther away from the source of the event. Extensive simulations are conducted using Omnet++/Sumo in order to investigate the efficiency of our framework and the consistency of the computed trust metrics in both urban and highway environments. Despite the high dynamics in such networks, our proposed DTCF is capable of detecting more than 85% of fully trusted vehicles, and filtering out virtually all malicious entities. The resulting average delay to detect malicious vehicles and fraudulent data is showed to be less than 1 second, and the computed trust metrics are shown to be highly consistent throughout the network.

Design improved security protocol on mobile device for sensor node access using RFID local key (센서노드 접근을 위해 RFID를 지역 키로 사용하는 이동형 단말장치상의 개선된 보안 프로토콜 설계)

  • John, Young-Jun;Choi, Yong-Sik;Park, Sang-Hyun;Han, Soo;Shin, Seung-Ho
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.328-333
    • /
    • 2007
  • RFID와 sensor network의 두 기반 기술은 독특한 물리적 특정을 가지며 상호 보완적인 관계를 가지고 있다. 이러한 관계는 창고 안 물품의 상태파악과 입출 재고를 관리하는 형태로 응용된다. 창고 내 물품 보관 단위인 파렛트(Pallet) 에 RFID 태그를 부착하여 입/출고시의 물품을 식별한다. 그리고 Zigbee 무선 통신기능을 가진 센서 모듈에 의해 물품의 환경 상태 정보를 파악한다. 이후 현장 관리자나 소비자들은 이동형 단말장치를 통해 현장에서 다양한 USN 상의 정보들과 상호작용 한다. 이 과정에서 이동형 단말장치를 통한 RFID tag 정보와 센서 노드의 접근이 공중파 상에 노출 된다. 이러한 센서 노드 접근을 보호하기 위해 추가적인 칩 설계 등의 비용 지불로 기밀 노출에 대처할 수 있다. 이에 대한 대안으로 인프라형태로 놓여진 RFID tag와 단말장치에 탑재될 RFID 리더를 활용해 더 적은 비용으로 보안 서비스를 받고자 한다. 그래서 유비쿼터스 환경에서 센서 노드에 대한 접근을 제어하기 위해 RFID tag를 지역키(local key) 처럼 사용한다. 또한 이 과정에 보안이 적용된 프로토콜을 설계 하는 것이 본 논문의 주된 목표이다.

  • PDF

Methodological Issues in Nursing Research using IT Technology: A Discussion Paper

  • Im, Eun-Ok;Chee, Wonshik
    • Research in Community and Public Health Nursing
    • /
    • v.30 no.4
    • /
    • pp.391-399
    • /
    • 2019
  • Purpose: Recent advances in computer and mobile technologies have brought increasing usages of IT technology in nursing research across nursing fields. Despite the increasing usages, there has been little discussion on methodological issues involved in nursing research using IT technology. This is a discussion paper to identify methodological issues in IT technology-based nursing research. Methods: An analysis was done using content analysis on research team meeting minutes and research team members' research diaries in a clinical trial that tested the efficacy of a technology-based intervention. First, several major categories of IT technology-based nursing research are concisely summarized. Then, the method that was used for this analysis is presented. Results: The findings are presented as themes reflecting methodological issues in IT technology-based research: (a) difficulties in recruitment due to necessary technology literacy; (b) facilitating recruitment through allowing the use of multiple languages; (c) participants' preferences for specific IT technology; (d) efforts needed to ensure technological security; (e) participants' preferences for design; and (f) necessary considerations on timing. Conclusion: Finally, future directions for nursing research using IT technology are proposed based on the identified issues.

Application Study applied to the Encryption at Virtualization Launcher (가상화 런처에서 암호화를 적용한 어플리케이션 연구)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.87-92
    • /
    • 2014
  • Smartphones, as well as providing a number of convenience features such as an individual's personality to express the range is gradually increasing. Changed when we met another person, such as a change of outward change in the smartphone became responsive individuals. Each other, it is common to observe smartphones smartphones. Smartphone now due to the common use of information leakage has become a serious problem. In this paper, when sharing smart phone, smartphones to separate the user's area, and the constraints of privacy and the need to apply encryption to prevent information leakage or add application-specific information is encrypted and stored in other similar applications it is not accessible to protect the personal information was through this smartphone to share your private information even improved.

An Authentication Protocol Design in RFID System for Mobility (유동성을 지닌 RFID 시스템을 위한 인증 프로토콜 설계)

  • Kim, Young-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.122-128
    • /
    • 2010
  • RFID is method used on wireless system. However, this mechanism is not used for authentication and security. Therefore, it is very vulnerable to attacks such as dropping attacks and traffic attacks. the RFID Tags are of the limited nature due to environment factors and there is greater constraints in designing authentication protocol. If we do not RFID to secure corporate information and product all the information will be exposed. The attacker will break into the RFID system and stop the distribution system. So, this paper proposes a new authentication protocol which provides not only unlimited access to Tag and Reader of mobile and connection between Tag and Reader bet also provides authentication mechanism by defining the key distribution.

Indoor Passive Location Tracking and Activity Monitoring using WSN for Ubiquitous Healthcare

  • Singh, Vinay Kumar;Lee, Seung-Chul;Lim, Hyo-Taek;Myllyla, Risto;Chung, Wan-Young
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.4
    • /
    • pp.382-388
    • /
    • 2007
  • Indoor location system using wireless sensor network technology was applied for the status evaluation and activity monitoring of elderly person or chronic invalid at home. Location awareness application is transparent to the daily activities, while providing the embedded computing infrastructure with an awareness of what is happening in this space. To locate an object, the active ceiling-mounted reference beacons were placed throughout the building. Reference beacons periodically publish location information on RF and ultrasonic signals to allow application running on mobile or static nodes to study and determine their physical location. Once object-carried passive listener receives the information, it subsequently determines it's location from reference beacons. By using only the sensor nodes without any external network infrastructure the cost of the system was reduced while the accuracy in our experiments. was fairly good and fine grained between 7 and 15 cm for location awareness in indoor environments. Passive architecture used here provides the security of the user privacy while at the server the privacy was secured by providing the authentication using Geopriv approach. This information from sensor nodes is further forwarded to base station where further computation is performed to determine the current position of object and several applications are enabled for context awareness.

Efficient Parent Peer Selection Method in a Wireless P2P System (무선 P2P 시스템에서 효율적 부모 피어 선택법)

  • Park, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.12
    • /
    • pp.870-872
    • /
    • 2014
  • In this paper, we devise a cost function by considering the energy consumption rate and the remaining energy of a peer. Then, we propose a parent peer selection method that chooses the least cost peer in the system in a distributed manner. On the contrary to the conventional method that makes each peer select the least cost neighbor as a parent peer, the proposed method chooses a parent peer using the swarm intelligence formed among a set of peers. Therefore, the proposed method could extent distributedly the number of peers searched for parent peer selection. Thus, compared to the conventional method, the proposed method increases the probability of being a parent peer as the cost of a peer becomes smaller with less operational load.

Safe Bike : Secure your Bicycle with this smart Arduino based GPS device

  • Godfrey, Daniel;Song, Mi-Hwa
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.16-26
    • /
    • 2016
  • This proposed project is about a bicycle anti theft devised system which helps people protect the bicycle from theft and helps to track the stolen bicycle's location using a smart phone. Safety bike uses two main devices to keep the bicycle secured, the vibration sensor and GPS sensor. The purpose of this project is to put all these small devices into one well connected system which will help the bicycle owner have more control over the security of his own bicycle. The whole system can be divided into two main parts. The first part is about the hardware development whereby all electronics components are connected via the circuit design using wire wrapping technique. This hardware part includes, a vibrations sensor, a GPS receiver, a toggle switch, LED light, Bluetooth and a buzzer. Wireless Bluetooth signals are used as the means of communication between the smartphone and the microcontroller. The second part is the software part which is being to program and control the whole system. The program is written using MikroBasic, a full-featured Basic compiler for microcontroller based systems. In conclusion, this system is designed to enable user to have control in securing his/her bicycle also being able to find and locate it at any time using GPS receiver and mobile android application.

Extended 3-Party Mutual Authentication Protocols for the Virtual Home Environment in Next Generation Mobile Networks (차세대 이동통신 네트워크의 Virtual Home Environment 구조에 적용 가능한 3자간 상호 인증 프로토콜)

  • Jeong, Jong-Min;Lee, Goo-Yeon;Lee, Yong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.4
    • /
    • pp.22-29
    • /
    • 2003
  • In the virtual home environment (VHE), which was proposed to offer global roaming and personal service environment portability, user's profiles and service logics are conveyed from home network to visited network to provide services at the visited network. Because user's profiles and service logics may contain confidential information, some procedures for mutual authentication among entities for offering confidence are needed. For these issues, we propose and analyze three 3-Party mutual authentication Protocols adaptable to the VHE in 3G ; password based mutual authentication protocol, mutual authentication protocol with CHAP and key exchange and mutual authentication protocol with trusted third party.