• Title/Summary/Keyword: Mobile security

Search Result 1,977, Processing Time 0.03 seconds

A Study on Preventing SA Re-negotiation for Mobility Support in Mobile IP VPN Environment (모바일 IP VPN 환경에서의 이동성 지원에 따른 SA 재협상 방지에 관한 연구)

  • 차정석;김태윤;송주석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.891-898
    • /
    • 2003
  • In the remote access VPN architecture which is based on IPsec, if the VPN client wants to be served the VPN service continuously during VPN client's handoff, It needs the techniques to merge VPN with Mobile IP. In this case, if the VPN client roams to new subnet, it acquires new CoA. As a result of changing IP address, existing SA becomes useless and new SA is required. The SA renegotiation process results from handoff of the VPN client and does not result from security aspect. Hence, In the environment which includes many handoffs, overhead by SA re-negotiation deteriorates performance. In this paper, we propose the technique provides that it doesn't need to renegotiate SA and be able to get the security service continuously even though MN's handoff occurs in Mobile IP VPN environment.

An Efficient Multi-Layer Encryption Framework with Authentication for EHR in Mobile Crowd Computing

  • kumar, Rethina;Ganapathy, Gopinath;Kang, GeonUk
    • International journal of advanced smart convergence
    • /
    • v.8 no.2
    • /
    • pp.204-210
    • /
    • 2019
  • Mobile Crowd Computing is one of the most efficient and effective way to collect the Electronic health records and they are very intelligent in processing them. Mobile Crowd Computing can handle, analyze and process the huge volumes of Electronic Health Records (EHR) from the high-performance Cloud Environment. Electronic Health Records are very sensitive, so they need to be secured, authenticated and processed efficiently. However, security, privacy and authentication of Electronic health records(EHR) and Patient health records(PHR) in the Mobile Crowd Computing Environment have become a critical issue that restricts many healthcare services from using Crowd Computing services .Our proposed Efficient Multi-layer Encryption Framework(MLEF) applies a set of multiple security Algorithms to provide access control over integrity, confidentiality, privacy and authentication with cost efficient to the Electronic health records(HER)and Patient health records(PHR). Our system provides the efficient way to create an environment that is capable of capturing, storing, searching, sharing, analyzing and authenticating electronic healthcare records efficiently to provide right intervention to the right patient at the right time in the Mobile Crowd Computing Environment.

Factors Affecting User Adoption of E-Payment Services Available in Mobile Wallets in Saudi Arabia

  • Alswaigh, Noha Y.;Aloud, Monira E.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.222-230
    • /
    • 2021
  • Mobile wallets have been in continuous demand and developed over the past few years, especially during the COVID-19 pandemic. Several studies have examined user intentions and perspectives. This study develops a conceptual model combining behavioral factors with the technology acceptance model (TAM). The goal is to identify key factors that influence user's intention to adopt mobile payments. This study uses the TAM and the unified theory of acceptance and use of technology (UTAUT) models with additional factors. The additional factors are security, trust, facilitating conditions, and lifestyle compatibility. The study analyzes the results of a survey of 394 Saudi citizens conducted via an online survey. The results indicate that user attitudes and intentions are positively influenced by all of the factors. Perceived usefulness, perceived ease of use, lifestyle compatibility, and facilitating conditions are direct predictors of user behavior in accepting mobile wallet payments. This study provides an empirical contribution to the literature on mobile payment acceptance on the effect of perceived usefulness and lifestyle compatibility. The results demonstrate that about 26% of the respondents started using mobile wallet services because of the COVID-19 pandemic.

The Impact of Service Quality and Loyalty on Adoption and Use of Mobile Banking Services: Empirical Evidence from Central Asian Context

  • IVANOVA, Aisena;NOH, Grimm
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.5
    • /
    • pp.75-86
    • /
    • 2022
  • The service industry has been acknowledged as a critical part of mobile banking services in recent years. This study examines the impact of e-service quality and loyalty on the intention to use and use behavior of mobile banking services in Mongolia, a Central Asian country. As a result, based on past research, a conceptual model was suggested. This study comprises 209 completed questionnaires from young Mongolians who own a bank account and a smartphone. The data was collected based on convenience sampling, and it was analyzed with SmartPLS software using a partial least squares-structural equation modeling (PLS-SEM) technique. The findings indicate that system quality, interface design, and security assurance have a significant positive impact on service quality; service quality has a positive impact on loyalty. Moreover, the results reveal that service quality and loyalty have a significant influence on the intention to use mobile banking services. The findings of this study suggest that local or international banks and financial institutions in Mongolia should consider system quality, interface design, and security concerns as key successors to building perceived security quality to retain current mobile banking users and attract new customers.

Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment

  • Park, Woo-Ram;Park, Chan-Ik
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.331-337
    • /
    • 2011
  • Recently, Virtual Desktop Infrastructure (VDI) has been widely adopted to ensure secure protection of enterprise data and provide users with a centrally managed execution environment. However, user experiences may be restricted due to the limited functionalities of thin clients in VDI. If thick client devices like laptops are used, then data leakage may be possible due to malicious software installed in thick client mobile devices. In this paper, we present Data Firewall, a security framework to manage and protect security-sensitive data in thick client mobile devices. Data Firewall consists of three components: Virtual Machine (VM) image management, client VM integrity attestation, and key management for Protected Storage. There are two types of execution VMs managed by Data Firewall: Normal VM and Secure VM. In Normal VM, a user can execute any applications installed in the laptop in the same manner as before. A user can access security-sensitive data only in the Secure VM, for which the integrity should be checked prior to access being granted. All the security-sensitive data are stored in the space called Protected Storage for which the access keys are managed by Data Firewall. Key management and exchange between client and server are handled via Trusted Platform Module (TPM) in the framework. We have analyzed the security characteristics and built a prototype to show the performance overhead of the proposed framework.

A Study on the New Vulnerability of Inducing Service Charge Doctoring SSID of Smartphone Based on Android (안드로이드폰 SSID 변조를 통한 새로운 과금 유발 취약점에 관한 연구)

  • Heo, Geon-Il;Yoo, Hong-Ryul;Park, Chan-Uk;Park, Won-Hyung
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.21-30
    • /
    • 2010
  • Wireless network is one of the 2010's most important security issues. As smartphone is popularize, the number of Wireless Internet users is really growing and wireless AP spring up everywhere. But most wireless AP haven't being managed properly in terms of security, Wireless Internet users also don't recognize important of security. This situation causes grave security threats. This paper design and analyze a new cyber attack whose it circulates malware via QR code and activates Mobile AP to induce service charge. The new vulnerability we suggest forces to activate Mobile AP of smartphone based on Android and responds to all Probe Request are generated around, and brings induction of service charge and communication problems in its train.

Analysis of DDoS Prevention Algorithm in Mobile Ad-hoc Network (MANET 환경에서의 DDoS 공격방지 알고리즘 분석)

  • Kim, Dong-Chul
    • Convergence Security Journal
    • /
    • v.13 no.1
    • /
    • pp.11-17
    • /
    • 2013
  • In this paper, the information security requirements in the mobile ad-hoc network(MANET) are presented, and the algorithm to establish the protection node(gateway) is proposed to prevent the distributed denial of service(DDoS). The information security technology and security threats in the MANET are presented, and protection node is decided to minimize the total cost through the sending nodes and receiving nodes by way of protection node. To set up the protection node, the minimization algorithms of maximum cost and the average cost between the protection node and receiving nodes are compared with the optimal solutions, in which optimal solution is found out by all enumeration method. From the results, the total cost between the sending and receiving nodes is minimized under the average cost minimization algorithm rather than the using of the maximum cost.

mNPKI for Mobile Government in Developing Countries (개발도상국의 모바일 정부를 위한 mNPKI)

  • Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.161-171
    • /
    • 2019
  • Government transactions over wireless electronic devices are not safe and hence the messages are prone to attack. Thereby, devices supporting wireless Internet must assure the same level of security and privacy as the wired network. National public key infrastructure (NPKI) for electronic government used in the wired environment is not suitable for wireless environment for mobile government (mGovernment) because of the limitations of computing power, memory capacity and restricted battery power. This requires the development of a new NPKI for mGovernment, denoted as mNPKI, to developing countries, which provides the same security level as the wired NPKI. For the wireless environment requirements, mNPKI is based on short lived certificates. Analysis shows that mNPKI is well suited to wireless Internet and provides the same security requirement from the wired NPKI.

The Mobile Security Diagnostic System against Smart-phone Threat (스마트폰 악성코드 대응을 위한 모바일 보안 진단 시스템)

  • Cheon, Woo-Bong;Lee, Jung-Hee;Park, Won-Hyung;Chung, Tai-Myoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.537-544
    • /
    • 2012
  • With wireless network infrastructure, the number of smart-phone users is remarkably increasing in the world and the amounts of damage due to the smart-phone malwares are also raised. Many security solutions for wireless network have come into the market but these solutions are for companies or large enterprises, therefore, the public users of smart-phone don't feel easy to select as their solutions and it is difficult to detect unknown malwares. In this paper, we propose the mobile security diagnostic system for public smart-phone users, which provides functions like smart-phone system check, comparison with blacklist of applications and collecting malwares.

A Review of Security Policy and 3-Steps for Defense 5G (국방 5G 운영을 위한 보안정책과 단계별 구축에 대한 고찰)

  • Song, Won-Seok;Cho, Jun-Ha;Kang, Seong-Moon;Lee, MinWoo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.597-599
    • /
    • 2021
  • 5G technology will be applied to various technologies related to game changers in the defense field. In addition, the establishment of a mobile work environment will be utilized. 5G has emerged as a new threat due to major technologies different from previous technologies. And due to 5G technology, there is an increasing demand to apply mobile technology to the defense sector. In this paper, we look at the security policy for defense 5G operation and the step-by-step construction plan consisting of three.

  • PDF