• 제목/요약/키워드: Secure Mobile

Search Result 727, Processing Time 0.026 seconds

VM의 자동 변수 생성 방식 기반 모바일 지급결제 시스템 (A Mobile Payment System Based-on an Automatic Random-Number Generation in the Virtual Machine)

  • 강경석;민상원;심상범
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제12권6호
    • /
    • pp.367-378
    • /
    • 2006
  • 이동전화가 전자상거래와 온라인 뱅킹의 새로운 수단으로 등장하고 있다. 모바일 기기를 통한 모바일 지급결제는 인터넷 결제나 소액결제 등에서 대중적으로 이용되며 새로운 결제수단으로 각광받고 있다. 하지만 현재의 모바일 지급결제는 소액에 치중하고 있으며 안전하고 표준화된 기술의 미비 등의 문제가 해결해 되어야할 과제로 떠오르고 있다. 본 논문에서는 현재 모바일 지급결제 서비스의 정의와 유형을 알아보고 모바일 지급결제 서비스에서의 인증의 의미와 각 지급결제 서비스의 인증방식에 대해 살펴보았다. 또한 각 인증방식들에서의 사고유형과 그 원인 그리고 그에 따른 대책을 알아보고, 현시점에서 그 대책이 실제 적용되기까지의 긴 시간동안 기존 설비나 휴대폰의 하드웨어를 추가 또는 변형하지 않는 범위 안에서 실현 가능한 새로운 인증절차를 제안하였다. 본 논문이 제안한 인증기법은 휴대폰의 VM을 이용한 결제로서 기존 SMS로 전달된 난수를 입력하는 방식의 문제점으로 지적되는 전달 내용에 대한 타인의 도용 위험성을 줄이기 위해 사용자가 직접 본인의 휴대폰에서 결제용 VM을 구동 난수를 확인하여 난수를 사이트에 입력하는 방식을 사용한다. VM 다운로드 후 처음 사용시 다운받은 VM의 S/N을 서버에 등록하여 VM을 구동할 때마다 S/N과 휴대폰 번호를 매칭한 후 난수를 부여하여 기존 휴대폰 통합 과금 서비스에서는 하기 어려운 점이었던 등록된 폰 이외의 불법 복제된 폰의 결제를 막을 수 있게 하였다. 또 난수 발급시 사용되는 매개체를 SMS발송에서 47 byte 패킷통신으로 대체하여 난수를 발급할 때 소요되는 시간을 대폭 줄이고 결제할 때 소요되는 비용을 기존의 1/3로 절감 하였다.

Analyses of Characteristics of U-Healthcare System Based on Wireless Communication

  • Kim, Jung Tae
    • Journal of information and communication convergence engineering
    • /
    • 제10권4호
    • /
    • pp.337-342
    • /
    • 2012
  • The medical industries are integrated with information technology with mobile devices and wireless communication. The advent of mobile healthcare systems can benefit patients and hospitals, by not only providing better quality of patient care, but also by reducing administrative and medical costs for both patients and hospitals. Security issues present an interesting research topic in wireless and pervasive healthcare networks. As information technology is developed, many organizations such as government agencies, public institutions, and corporations have employed an information system to enhance the efficiency of their work processes. For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure. As a part of the wireless network, a mobile agent has been employed at a large scale in hospitals due to its outstanding mobility. Several vulnerabilities and security requirements related to mobile devices should be considered in implementing mobile services in the hospital environment. Secure authentication and protocols with a mobile agent for applying ubiquitous sensor networks in a healthcare system environment is proposed and analyzed in this paper.

A Study of a Secure Mobile Agent Services Based on Grid Proxy Gateway

  • Lee, Se-Yul;Choi, Gyoo-Seok;Kim, Chang-Su;Jung, Hoe-Kyung
    • Journal of information and communication convergence engineering
    • /
    • 제6권3호
    • /
    • pp.348-352
    • /
    • 2008
  • In distributed computing paradigm, mobile surrogate systems migrates from on host in a network to another. However, Mobile surrogate system have not gained wide acceptance because of security concerns that have not been suitably addressed yet. In this paper, we propose a security framework based on Grid Proxy Gateway for mobile Grid service. The current Grid Security Infrastructure is extended to mobile computing environments. The surrogate host system designed for mobile Personal Digital Assistant (PDA) users can access the certified host and get his proxy credential to launch remote job submission securely.

SSL을 이용한 Mobile CORBA 환경에서의 보안 (Security in Mobile CORBA Environment Using SSL)

  • 강석태;김은규;정연진;이성룡;이광모
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2002년도 추계학술발표논문집 (중)
    • /
    • pp.1467-1470
    • /
    • 2002
  • 인터넷의 사용이 활발해지면서 이동 중에도 인터넷을 이용 정보를 얻거나 쇼핑을 하려는 사람들이 늘어남에 따라 Mobile Network이나 Mobile 환경에서의 보안이 요구되고 있다. 이 논문에서는 Architecture for Location Independent CORBA Environment (ALICE)구조에 기반을 둔 Mobile CORBA 환경에서 Mobile Host(MH)와 Mobile Gateway(MG)간의 통신 시 전파 특성상 보안에 취약하여 정보유출의 우려가 있다. 그래서 현재 공개키 방식으로 널리 쓰이는 SSL(Secure Socket Layer)을 이용 무선에서의 보안을 제안한다.

  • PDF

무선 모바일 멀티 홉 네트워크에서의 인증 기법 고찰 및 개선 (Authentication Scheme in Wireless Mobile Multi-hop Networks)

  • 이용;이구연
    • 산업기술연구
    • /
    • 제27권B호
    • /
    • pp.43-51
    • /
    • 2007
  • In mobile multi-hop wireless networks, the authentication between a base station and a mobile multi-hop node, between multi-hop nodes, and between user a station and a multi-hop node is needed for the reliable and secure network operation. In this paper, we survey various authentication schemes which can be considered to be adopted in mobile multi-hop wireless networks and propose a concept of novel mutual authentication scheme applicable to mobile multi-hop network architecture. The scheme should resolve the initial trust gain problem of a multi-hop node at its entry to the network, the problem of rogue mobile multi-hop node and the problem of hop-by-hop authentication between multi-hop nodes. Effectively, the scheme is a hybrid scheme of the distributed authentication method and the centralized authentication method which are considered to be deployed in the wireless ad-hoc network and the wireless network connected to wired authentication servers, respectively.

  • PDF

순번을 이용한 고속의 안전한 무선 랜 2-Way 핸드쉐이크 기법 (Fast and Secure 2-Way Handshake Mechanism using Sequence Number in Wireless LAN)

  • 임정미
    • 한국멀티미디어학회논문지
    • /
    • 제12권9호
    • /
    • pp.1323-1332
    • /
    • 2009
  • 본 논문은 IEEE 802.11i의 4-Way 핸드쉐이크의 취약점을 분석하고, 고속의 안전한 2-Way 핸드쉐이크 방식을 제안한다. PTK 생성에서 난수 대신에 순번(Sequence Number)을 사용하여, 재생공격, DoS 공격을 방지한다. 또한 Re-association Request 프레임과 Re-association Response 프레임을 변형하여 MS(Mobile Station)과 AP(Access Point) 사이의 상호 인증과, PTK(Pairwise Transient Key)의 도출을 가능하게 하여, 전송되는 메시지의 개수를 감소시켜, 4-Way 핸드쉐이크보다 고속의 핸드오프 방식을 제안한다. 그리고 고속의 안전한 핸드오프를 제안하는 기존의 기법들과 비교 분석한다.

  • PDF

CCN 기반 이동 애드혹 환경에서의 안전한 라우팅 방안 (Secure Routing Scheme in CCN-Based Mobile Ad-Hoc Networking Environments)

  • 이주용;이지훈
    • 한국통신학회논문지
    • /
    • 제39B권5호
    • /
    • pp.304-308
    • /
    • 2014
  • 이동통신 기술의 발달과 스마트폰의 폭발적 보급으로 인해 사용자들이 언제 어디서든 컨텐츠를 생성하고 공유하게 하게 됨에 따라, CCN (Content-centric networking)과 같은 컨텐츠 중심의 새로운 네트워킹 방식이 등장하게 되었다. 그러나, CCN은 일대일 전송 구조를 근간으로 하고 있어 사용자 단말로만 구성된 애드혹 환경에 적합한 라우팅 프로토콜이 요구된다. 이에 본 논문에서는 애드혹 환경에 적합한 주문형 방식의 CCN 라우팅 방식을 제안한다. 또한, 허위 라우팅 정보 구축을 방지하기 위한 해쉬 기반 라우팅 정보 교환 구조 또한 제안한다. 성능 평가를 통해 이중 라우팅 구조로 인해 제안 방식이 기존 방식 대비 제어 메시지 오버헤드를 감소시킴을 확인하였다.

The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle

  • Zeng, Qian;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권4호
    • /
    • pp.1941-1960
    • /
    • 2019
  • Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system's (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)' secure coverage probability in downlink transmission is mainly impacted by the following three factors: its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs' secure coverage probability is relevant to state of the UAV. The system's secure capacity can be substantially improved by adaptively changing the UAV's position as well as coverage.

무선 메쉬망에서의 안전하고 효율적인 키관리 스킴 (Secure and Efficient Key Management Scheme for Wireless Mesh Network)

  • ;;이상곤;이훈재
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.844-847
    • /
    • 2011
  • Wireless mesh network (WMN) is a type of mobile ad-hoc network consists of wireless router, mobile clients and gateway which connects the network with the Internet. To provide security in the network it is required to encrypt the message sent among the communicating nodes in such way so that only legitimate user can retrieve the original data. Several security mechanisms have been proposed so far to enhance the security of WMN. However, there still exists a need for a comprehensive mechanism to prevent attacks in data communication. Considering the characteristic of mesh network, in this paper we proposed a public key cryptography based security architecture to establish a secure key agreement among communicating nodes in mesh network. The proposed security architecture consists of two major sections: client data protection and network data protection. Client data protection deals with the mutual authentication between the client and the access router and provide client to access router encryption for data confidentiality using standard IEEE 802.11i protocol. On the other hand, network data protection ensures encrypted routing and data transfer in the multi hop backbone network. For the network data protection, we used the pre-distributed public key to form a secure backbone infrastructure.

Secure Cluster Selection in Autonomous Vehicular Networks

  • Mohammed, Alkhathami
    • International Journal of Computer Science & Network Security
    • /
    • 제23권1호
    • /
    • pp.11-16
    • /
    • 2023
  • Vehicular networks are part of the next generation wireless and smart Intelligent Transportation Systems (ITS). In the future, autonomous vehicles will be an integral part of ITS and will provide safe and reliable traveling features to the users. The reliability and security of data transmission in vehicular networks has been a challenging task. To manage data transmission in vehicular networks, road networks are divided into clusters and a cluster head is selected to handle the data. The selection of cluster heads is a challenge as vehicles are mobile and their connectivity is dynamically changing. In this paper, a novel secure cluster head selection algorithm is proposed for secure and reliable data sharing. The idea is to use the secrecy rate of each vehicle in the cluster and adaptively select the most secure vehicle as the cluster head. Simulation results show that the proposed scheme improves the reliability and security of the transmission significantly.