• 제목/요약/키워드: Secure Mobile

Search Result 727, Processing Time 0.101 seconds

The Factors Affecting Smartphone User's Intention to use Mobile Anti-Malware SW (스마트폰 이용자의 악성코드용 모바일 백신 이용 의도에 영향을 미치는 요인)

  • Jang, Jaeyoung;Kim, Jidong;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.13 no.2
    • /
    • pp.113-131
    • /
    • 2014
  • Smartphone security threat has become an important issue in Information Science field following the wide distribution of smartphones. However, there are few studies related to such. Therefore, this study examined the factors affecting the intention of smartphone users to use the mobile vaccine against malware with the Protection Motivation Theory. To secure the reliability of the study, a surveying agency was commissioned. A total of 263 respondents, excluding 37 respondents who are users of iOS, which does not have mobile vaccine in the smart phone, or who gave invalid responses, were surveyed. The results showed that perception of the installed mobile vaccine significantly affected the Response Efficacy and Self-efficacy, and that the Perceived Severity, Perceived Vulnerability, Response Efficacy, and Self-efficacy significantly influenced the intention to use the mobile vaccine. On the other hand, Installation Perception of mobile vaccine itself did not affect the Perceived Severity and Perceived Vulnerability. This study is significant since it presented the new evaluation model of threat evaluation and response evaluation in the Protection Motivation Theory in accepting the security technology and raised the need for the promotion and exposure of mobile vaccine, since perception of mobile vaccine installation affects the response evaluation. It also found that the promotion must consider the seriousness of smartphone security, outstanding attribute of mobile vaccine, and user-friendliness of mobile vaccine above all.

A Study on the Kernel-Based Management for Mobile Grid Application (모바일 그리드 어플리케이션을 위한 커널 기반 관리방안에 대한 연구)

  • Kim, Tae-Kyung;Seo, Hee-Seok
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.4
    • /
    • pp.21-28
    • /
    • 2006
  • In this paper, we introduce the mobile grid architecture using kernel-based managements. Mobile grid paradigm is used to allow mobile users to access distributed resources in a transparent, secure and effective way. Each mobile grid user requests job submission, searches for suitable resources to run Job, executes the job to the allocated system resources, and receives the results of the requested job. There are a number of challenging issues when taking mobile environment into account, such as limited performance of mobile devices and mobility of mobile device. To resolve these issues, we design and implement the kernel-based management system for mobile grid application to overcome the limited resources of mobile devices. Also, we show the efficiency of the suggested architecture using the performance evaluation.

  • PDF

Clue for Secure Route Optimization in Mobile IPv6 (모바일 IPv6 바인딩 업데이트의 보안 향상 기법)

  • Song, Se-Hwa;Choi, Hyoung-Kee;Kim, Jung-Yoon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.153-158
    • /
    • 2010
  • Mobile IPv6 is one of method can keep Mobile node's session. To solve legacy Mobile IPv4's triangular routing problem, in Mobile IPv6, Mobile Node could directly communicate with Correspond node by Binding Update. But, attacker could interfere Return Routability Procedure that is Correspond node check Home address and Care of address reachable. At this result, Attacker is able to hijack Session to correspond node from Mobile node. In This paper, We propose new Binding Update scheme for solving that problem. Our approach is that MN gives association both home token and care of token using onewayness of keyed hash fuction. From security and performance analysis, we can see that proposed binding Update Scheme can achieve stronger security than legacy scheme and at the same time requires minimal computational overhead.

Highly Secure Mobile Devices Assisted with Trusted Cloud Computing Environments

  • Oh, Doohwan;Kim, Ilkyu;Kim, Keunsoo;Lee, Sang-Min;Ro, Won Woo
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.348-358
    • /
    • 2015
  • Mobile devices have been widespread and become very popular with connectivity to the Internet, and a lot of desktop PC applications are now aggressively ported to them. Unfortunately, mobile devices are often vulnerable to malicious attacks due to their common usage and connectivity to the Internet. Therefore, the demands on the development of mobile security systems increase in accordance with advances in mobile computing. However, it is very hard to run a security program on a mobile device all of the time due the device's limited computational power and battery life. To overcome these problems, we propose a novel mobile security scheme that migrates heavy computations on mobile devices to cloud servers. An efficient data transmission scheme for reducing data traffic between devices and servers over networks is introduced. We have evaluated the proposed scheme with a mobile device in a cloud environment, whereby it achieved a maximum speedup of 13.4 compared to a traditional algorithm.

Design and Implementation of a Proxy-based Mobile Grid Services Framework (프록시 기반의 모바일 그리드 서비스 프레임워크 설계 및 구현)

  • Kim, Min-Gyu;Park, Si-Yong;Lee, Bong-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.8 no.3
    • /
    • pp.85-98
    • /
    • 2007
  • In distributed computing paradigm, mobile surrogate systems have not gained wide acceptance because of security concerns that have not been suitably addressed yet. Currently even the widely used Grid middleware, Globus, does not have a host authentication mechanism, which makes it hard to provide high performance Grid computing capabilities to mobile clients. In this paper, a mobile Grid service framework is designed and implemented in order to provide Grid services to mobile host such as PDA. The surrogate host-based system allows mobile hosts to be provided with Grid services while moving. The implemented mobile Grid services system has been applied to mobile healthcare system which utilizes Grid computing for ECG signal processing. The presented system framework can be used as a secure enterprise mobile healthcare system for hospital physicians.

  • PDF

A Study on the Localized Key Management Using AAA in Mobile IPv6 (Mobile IPv6 상에서 AAA 기반의 지역화된 키 관리 기법에 관한 연구)

  • Kim Mi-Young;Mun Young-Song
    • Journal of Internet Computing and Services
    • /
    • v.4 no.1
    • /
    • pp.19-25
    • /
    • 2003
  • Mobile IPv6 services exposes its vulnerability when a mobile node is roaming across the subnets which belongs to the different domains. The AAA Infrastructure Is strongly recommended when the ISPs need to authenticate the mobile user come from the different domains. In addition to the basic requirements for AAA service, the authentication latency and AAA message overhead should be minimized for contiguity of the service. This paper considers the roaming service with AAA infra structure in Mobile IPv6 and proposes the key distribution method to authenticate the mobile node with secure manner by reducing and optimizing the exchanged messages for AAA entities.

  • PDF

An Efficient Approach for Adaptation of MIPv6 in Roaming Environments

  • Jeong Yoon-su;Woo Sung-hee;Lee Sang-ho
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.341-344
    • /
    • 2005
  • Mobile IPv6(MIPv6) allows a Mobile Node to talk directly to its peers while retaining the ability to move around and change the currently used IP address. One of the major issues regarding the basic Mobile IPv6 protocol is related to the handover management of a mobile node. This paper proposes efficient approach for adaptation of MIPv6 sing context information in roaming environments. To investigate on a efficient and secure handover procedure, proposed approach method will give us the following advantages: (l)the intention of context is to reduce latency, packet losses and avoid re-initiation of signaling to and from mobile nodes,(2) FMIPv6 aims to reduce handover latency due to IP protocol operations as small as possible in comparison to the inevitable link switching latency.

  • PDF

A Study on Device Authentication Technology in AAA Mechanism of Mobile Environment (모바일 환경의 AAA 메커니즘에서 디바이스 인증 기술에 관한 연구)

  • Park, Jong-Hyuk
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.5
    • /
    • pp.444-450
    • /
    • 2008
  • With the advancement of the mobile device and arrival of the integrated wired/wireless environments, the damand for services accessible by mobile devices is rapidly increasing. However, unlike existing wired networks, communication in wireless networks has many weaknesses. Therefore, research and development into an appropriate security technology has reached a critical stage, as combined wired/wireless environments emerge. Therefor, in this paper, we propose that device authentication technology in AAA (Authentication, Authorization, Accounting) mechanism of Mobile environment for secure service offer.

  • PDF

Trusted Third Party(TTP) Based Mono-directional Entity Authentication Scheme in Mobile Agent (이동 에이전트에 대한 신뢰 센터 기반 단방향 엔티티 인증 기법)

  • Lee, Gi-Hyeon;No, Hwan-Ju
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11S
    • /
    • pp.3356-3366
    • /
    • 1999
  • Electric commerce system based on distributed mobile on object such as mobile agents need both precise identification and secure authentication scheme on remotemobile entities. In this paper, existing discrete logarithm based Schnorr like entity authentication schemes are improved by the analysis of performance and security on the bi-directional interactive proofs. And ElGamal like schemes are also proposed. Then, there are enhanced with oblivious transfer based mono-directional authentication schemes based on trusted third party for applying to the mobile agent based computing systems. Therefore, proposed schemes provide compatible performance and safety on mobile entity authentication process.

  • PDF

Development of The Open Mobile E-commerce Platform Using 3D GIS and E-catalog

  • Cho, Jeong-Hyun;Ryu, Hyun-Ki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.3
    • /
    • pp.17-23
    • /
    • 2014
  • Recently, E-Commerce demands an integrated solution for online and off-line provided to customers on wired / wireless network and various mobile devices. Our E-commerce platform can use anytime, anywhere, for all consumers. And, it can take convenient and secure E-commerce service in mobile environment. So, we will implement a software platform base on the mobile environment that independent of the mobile OS. Particularly, our E-commerce platform is based on 3D GIS information for 3D electronic map. So, all users (customers) have got the more visible convenience. And, by using the e-catalog DB cloud server, off-line store operators can be built the online home-page easily. From now on our E-commerce platform based on 3D GIS can be usable at various E-commerce areas in the ubiquitous environment.