• 제목/요약/키워드: Personal mobility security

검색결과 24건 처리시간 0.021초

e-비즈니스 서비스의 기술수용성이 이용의도에 미치는 영향 - 모바일뱅킹 서비스를 중심으로 - (An Effect of Technology Acceptance of e-business Service on Use Intention - Focusing on Mobile Banking Service -)

  • 손용정
    • 통상정보연구
    • /
    • 제9권2호
    • /
    • pp.87-101
    • /
    • 2007
  • This study developed seven assumptions to demonstrate the effect of personal innovation, social influences, service quality, mobility and accessibility on perceived usability, perceived convenience use and use intention using a technology acceptance model developed by Davis(1989), and the results are presented as follows: First, the assumption that personal innovation and service quality of mobile banking service will influence the perceived usability was adopted while the assumption that social influences will affect the perceived usability was rejected. Second, the assumption that mobility and accessibility of mobile banking services will influence the perceived convenient use was selected. Third, the assumption that the perceived usability of mobile banking service will influence use intention was rejected while the assumption that the convenient use will influence use intention was adopted. This study suggests that as personal innovation, service quality, mobility and accessibility have a significant influence on use of mobile banking, service providers should pay more attention to development of security programs and diversification of contents.

  • PDF

퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가 (Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments)

  • 진병욱;김종화;차시호;전문석
    • 디지털산업정보학회논문지
    • /
    • 제12권1호
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

Professional Mobility as a Factor of Professional Success of a Modern Specialist in the Conditions of Distance Learning

  • Semchuk, Bohdan;Havryliuk, Svitlana;Karnaukh, Lesia;Balakirieva, Viktoriia;Palshkova, Iryna;Leonova, Veronika;Bida, Olena
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.260-268
    • /
    • 2022
  • The article considers the training, competitiveness of specialists, professional mobility, professionalism and competence of specialists in the context of distance learning. The advantages of distance learning are shown. The characteristic features of distance learning in the preparation of students and in the implementation of these technologies in the educational process of higher educational institutions are determined. Competitiveness, professional mobility, professionalism and competence of a specialist are qualities that determine a person's life and work success. Professional mobility is interpreted as a systemic quality of a specialist's personality, which includes a whole range of knowledge, skills, abilities, personal qualities, value orientations, and so on. The vision of mobility of specialists by foreign scientists is presented. It is noted that the classification of professional mobility presented in the article makes it possible to organize various movements from a single position, to present them as separate manifestations of the general process of professional and pedagogical mobility, to determine which type of mobility ensures the performance of certain social functions. It was found that mobility can be differentiated into differentiated and intergeneration. According to the subject, individual and group mobility are distinguished; according to the direction - internal and external. The classification of employees according to their attitude to mobility is shown, which can be divided into the following groups: actually mobile; potentially mobile; actually stable; potentially stable.

청각 장애인 PM 이용자를 위한 소리 위치 시각화 지능형 제어 시스템 개발 (Development of sound location visualization intelligent control system for using PM hearing impaired users)

  • 조용현;최진영
    • 융합보안논문지
    • /
    • 제22권2호
    • /
    • pp.105-114
    • /
    • 2022
  • 본 논문은 퍼스널 모빌리티(Personal Mobility, PM)를 이용하는 청각 장애인에게 소리가 발생하는 도래각(Direction of Arrival, DOA)을 시각화하는 지능형 제어 시스템을 제시하며 도로에서 발생하는 경보음, 크락션 등 소리로 인한 위험한 상황들을 인지하고 예방하고자 한다. 소리 위치 추정 방법은 GCC-PHAT(Generalized Cross-Correlation Phase Transform) 기반 도착 지연 시간(Time Difference of Arrival, TDOA)을 특징으로 갖는 머신러닝 분류 모델을 사용한다. 도로 상황을 재현한 실험 환경에서 각각 풍속 0, 5.8, 14.2, 26.4km/h의 조건에 따라 학습 데이터를 추출한 후 학습한 4가지 분류 모델들을 Grid search cross validation으로 비교하며 성능이 가장 우수한 MLP(Multi-Layer Perceptron) 모델을 알고리즘으로 적용하였다. 최종적으로 바람이 발생하였을 때 제안된 알고리즘이 평균 90.7%의 정확도를 나타내었으며, 이는 기존의 일반적인 소리 위치 추정기법보다 평균 7.6-11.5% 정도의 성능 향상을 보이는 것이다.

Mobile Subscriber Roaming n Different Mobile Networks Using UIM and PASM

  • Park, Jeong-Hyun;Yang, Jeong-Mo
    • 한국멀티미디어학회:학술대회논문집
    • /
    • 한국멀티미디어학회 2003년도 추계학술발표대회(상)
    • /
    • pp.445-448
    • /
    • 2003
  • During a time when cellular systems are being deployed in massive scale worldwide, international roaming is becoming increasingly important. This paper presents UIM (User Identification Module) for mobility support, authentication, and service portability between different mobile systems. We also introduce network model based on PASM(Portable Authentication and Mobility Service Machine) which will support signaling protocol and user information conversions with database for roaming between different mobile networks. Stored data types and elements in UIM, logical data structure and configuration, and registration procedures are described here in the case of DCN (Digital CDMA (Code Division Multiple Access) Network System) and GSM (Global System for Mobile Communications).

  • PDF

무선 센서 네트워크에서의 유비쿼터스 헬스케어 시스템을 위한 보안 구조 (Security Architecture for U-Healthcare Application in Wireless Sensor Network)

  • 신윤구;김한규;김수진;김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 춘계학술대회
    • /
    • pp.884-885
    • /
    • 2014
  • The use of Radio Frequency Identification technology (RFID) in medical context enables not only drug identification, but also a rapid and precise identification of patients, physicians, nurses or any other health care related staffs. The combination of RFID tag identification with structured and secured Internet of Things (IoT) solutions enables ubiquitous and easy access to medical related records, while providing control and security to all interactions. This paper surveyed a basic security architecture, easily deployable on mobile platforms, which would allow to establish and manage a medication prescription service in mobility context making use of electronic personal health records.

  • PDF

보안강화를 위한 무선 네트워크 관리 방안에 관한 연구 (A Study on Wireless Network Management for Security Enhancement)

  • 이은섭;김영곤
    • 한국인터넷방송통신학회논문지
    • /
    • 제20권3호
    • /
    • pp.195-200
    • /
    • 2020
  • 무선랜은 사용의 편리함으로 인해 점차 많은 분야에 걸쳐 활용되고 있다. 무선랜의 가장 큰 장점은 무엇보다도 이동성에 있다고 할 수 있다. 국내 유선 인터넷 서비스는 '06년을 기점으로 포화상태에 있지만, 무선 인터넷 사용자는 꾸준한 증가세를 보이고 있다. 하지만 무선랜은 많은 장점과 동시에 무선 서비스의 특성 상 존재하게 되는 다수의 보안 취약점을 가지고 있으며, 이런 문제점을 해결하기 위해 다양한 보안관련 기술이 개발 및 적용되고 있다. 하지만 그에 반해 무선랜 사용자의 보안인식은 여전히 부족한 상태로, 매년 개인정보유출 등의 보안사고가 반복적으로 발생하고 있는 상황이다. 무선랜에서 발생할 수 있는 주요 취약점을 연구하고, 그에 대한 관리차원에서의 보안대책을 제시하고자 한다.

무선 LAN 환경에서 단말 이동시 전송되는 AP간 WEP 키 전송 개선 방안 (Improvement of WEP Key transmission between APs, during STA Movement in Wireless Environment)

  • 송일규;홍충선;이대영
    • 정보처리학회논문지C
    • /
    • 제11C권2호
    • /
    • pp.219-228
    • /
    • 2004
  • 무선LAN(wireless Local Area Network)이란 옥내 또는 옥외 환경에서 무선으로 네트워크 환경을 구축하는 것을 말하며, 기술적인 측면에서는 허브(Hub)에서 PC(Personal Computer), 노트북PC, PDA 등 클라이언트까지 유선 대신 전파나 빛을 이용하여 네트워크를 구축하는 방식을 말한다. 현재, IEEE 802.11 WG(Working Group) 중에는 AP(Access Point)간의 표준화된 프로토콜을 개발하는 TGf(Task Group F)가 있다. 이 그룹에서는 서로 다른 제조업체에서 생산한 AP 간의 상호연동을 보장하기 위한 IAPP(Inter Access Point Protocol)를 제안하였는데, 이는 동일 서브네트워크 내의 서로 다른 AP간에 이동성을 보장하기 위한 프로토콜로, STA(Station)들이 이동할 때 재인증 과정을 거치지 않고 AP간의 Security Context 정보나 Layer 2 forwarding 정보를 공유함으로서 STA간의 seamless 연결성을 제공한다. 본 논문에서는 위의 AP간 메시지 전달 시 발생할 수 있는 보안성이 요구되는 iapp-move 요청, 응답 메시지를 이미 사용되고 있는 인증된 경로를 통해 전달함으로써 WEP키 등의 보안성이 요구되는 정보의 유출을 막고, 무선구간의 보안성을 제공하기 위해 공개키를 이용한 방안을 제시하고자 한다.

헬스캐어 시스템에서의 사물 인터넷 통신을 위한 보안 문제 분석 (Analyses of Security Issues for Internet of Things in Healthcare Application)

  • 신윤구;김한규;김수진;김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 추계학술대회
    • /
    • pp.699-700
    • /
    • 2014
  • The use of Radio Frequency Identification technology (RFID) in medical context enables not only drug identification, but also a rapid and precise identification of patients, physicians, nurses or any other healthcare giver. The combination of RFID tag identification with structured and secured Internet of Things (IoT) solutions enables ubiquitous and easy access to medical related records, while providing control and security to all interactions. This paper defines a basic security architecture, easily deployable on mobile platforms, which would allow to establish and manage a medication prescription service in mobility context making use of electronic Personal Health Records. This security architecture is aimed to be used with a mobile e-health application (m-health) through a simple and intuitive interface, supported by RFID technology. This architecture, able to support secured and authenticated interactions, will enable an easy deployment of m-health applications. The special case of drug administration and ubiquitous medication control system, along with the corresponding Internet of Things context, is presented.

  • PDF

A Privacy Preserving Authentication Mechanism for Wireless Mesh Networks

  • Islam, Shariful;Hamid, Abdul;Hong, Choong-Seon
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2007년도 가을 학술발표논문집 Vol.34 No.2 (D)
    • /
    • pp.556-559
    • /
    • 2007
  • Due to its ease of deployment, low cost, self-configuring and self-healing capabilities, Wireless Mesh Networks (WMNs) have emerged as a key technology to be used in a wide scale applications in personal, local, campus, and metropolitan areas. Security and more specifically privacy is an important issue in this type of multi-hop WMN which has given a little attention in the research community. We focus on privacy compromise of a mesh client in a community mesh network that may lead an attacker to reveal mesh clients identity. his other profiles and gain information about mobility. In this paper. we have presented an authentication mechanism with the aid of blind signature that ensures a mesh client to anonymously authenticate itself with a nearby mesh router and thereby preserve identity privacy We have also presented the security and performance analysis of the proposed scheme.

  • PDF