• 제목/요약/키워드: Secure Mobile

검색결과 726건 처리시간 0.027초

무선 센서 네트워크에서의 안전한 모바일 쿼리 프로토콜 (Secure Mobile Query in Wireless Sensor Networks)

  • 임채훈
    • 정보보호학회논문지
    • /
    • 제23권6호
    • /
    • pp.1191-1197
    • /
    • 2013
  • 대규모의 센서 네트워크에서는 고정된 베이스 스테이션에서 데이터를 수집하고 네트워크를 관리하는 것은 센서노드들의 제한된 에너지를 빨리 소진시켜 네트워크의 수명을 단축시키게 되므로 바람직하지 않다. 다른 여러 가지 이유로도 모바일 싱크가 널리 활용되고 있으나, 이러한 모바일 싱크에 대한 안전한 쿼리 프로토콜에 대한 연구는 그다지 많지는 않다. 본 논문에서는 모바일 싱크가 인접 센서노드들과 안전하면서도 효율적인 쿼리 세션을 수행할 수 있는 키관리 및 인증 프로토콜을 제안하고 안전성 및 효율성을 분석한다.

모바일 로봇의 네비게이션을 위한 빠른 경로 생성 알고리즘 (Fast Path Planning Algorithm for Mobile Robot Navigation)

  • 박정규;전흥석;노삼혁
    • 대한임베디드공학회논문지
    • /
    • 제9권2호
    • /
    • pp.101-107
    • /
    • 2014
  • Mobile robots use an environment map of its workspace to complete the surveillance task. However grid-based maps that are commonly used map format for mobile robot navigation use a large size of memory for accurate representation of environment. In this reason, grid-based maps are not suitable for path planning of mobile robots using embedded board. In this paper, we present the path planning algorithm that produce a secure path rapidly. The proposed approach utilizes a hybrid map that uses less memory than grid map and has same efficiency of a topological map. Experimental results show that the fast path planning uses only 1.5% of the time that a grid map based path planning requires. And the results show a secure path for mobile robot.

Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication

  • Abdelkader, Ghazli;Naima, Hadj Said;Adda, Ali Pacha
    • Journal of Information Processing Systems
    • /
    • 제13권1호
    • /
    • pp.152-173
    • /
    • 2017
  • Mobile phones are the most common communication devices in history. For this reason, the number of mobile subscribers will increase dramatically in the future. Therefore, the determining the location of a mobile station will become more and more difficult. The mobile station must be authenticated to inform the network of its current location even when the user switches it on or when its location is changed. The most basic weakness in the GSM authentication protocol is the unilateral authentication process where the customer is verified by the system, yet the system is not confirmed by the customer. This creates numerous security issues, including powerlessness against man-in-the-middle attacks, vast bandwidth consumption between VLR and HLR, storage space overhead in VLR, and computation costs in VLR and HLR. In this paper, we propose a secure authentication mechanism based new mobility management method to improve the location management in the GSM network, which suffers from a lot off drawbacks, such as transmission cost and database overload. Numerical analysis is done for both conventional and modified versions and compared together. The numerical results show that our protocol scheme is more secure and that it reduces mobility management costs the most in the GSM network.

무선 환경에서 안전한 디지털 컨텐츠 유통을 제공하는 시스템 설계 및 구현 (A Design and Implementation of System to Provide Secure Digital Contents Distribution on Mobile Environment)

  • 이권일;김봉선;신영찬;류재철;이준석
    • 정보처리학회논문지C
    • /
    • 제11C권3호
    • /
    • pp.327-336
    • /
    • 2004
  • DRM 기술은 사용 권한이 없는 사용자가 사용자 기기를 이용해 불법으로 디지털 컨텐츠를 사용하는 것을 방지하는 것을 목적으로 한다. 따라서 DRM 시스템을 구성하기 위해서는 기본적인 정보보호 기술들이 이용된다. 이는 무선 DRM의 경우에 있어서도 마찬가지다. 특히 디지털 컨텐츠를 암호화 기술을 이용하여 패키징하고 패키징된 디지털 컨텐츠를 사용하기 위해 필요한 패키징에 사용된 암호화 키를 PDA나 휴대전화기 같은 합법적인 무선 사용자 기기에 안전한 방법으로 배분하는 것이 중요하다. 본 논문은 무선 DRM 표준안인 OMA의 규격을 준수한 무선 디지털 컨텐츠 배분에 사용될 무선 DRM 시스템의 구조를 제안하고 공개키 기법을 사용하여 디지털 컨텐츠 사용권을 배분하는 방식으로 무선 DRM 시스템 각 구성 요소들 사이의 프로토콜을 제안하고 설계 구현하였다.

Authentication and Key Agreement Protocol for Secure End-to-End Communications on Mobile Networks

  • Park, Jeong-Hyun;Kim, Jin-Suk;Kim, Hae-Kyu;Yang, Jeong-Mo;Yoo, Seung-Jae
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 2003년도 ISIS 2003
    • /
    • pp.256-259
    • /
    • 2003
  • This paper presents mutual authentication scheme between user and network on mobile communications using public key scheme based on counter, and simultaneously shows key agreement between user and user using random number for secure communications. This is also a range of possible solutions to authentication and key agreement problem-authentication and key agreement protocol based on nonce and count, and secure end-to-end protocol based on the function Y=f(.)$\^$1/, C$\^$i/ is count of user I, and f(.) is one way function.

  • PDF

Application Driven Cluster Based Group Key Management with Identifier in Mobile Wireless Sensor Networks

  • Huh, Eui-Nam;Nahar Sultana
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제1권1호
    • /
    • pp.1-17
    • /
    • 2007
  • This paper proposes and analyzes a scalable and an efficient cluster based group key management protocol by introducing identity based infrastructure for secure communication in mobile wireless sensor networks. To ensure scalability and dynamic re-configurability, the system employs a cluster based approach by which group members are separated into clusters and the leaders of clusters securely communicate with each other to agree on a group key in response to changes in membership and member movements. Through analysis we have demonstrated that our protocol has a high probability of being resilient for secure communication among mobile nodes. Finally, it is established that the proposed scheme is efficient for secure positioning in wireless sensor networks.

Secure Password-based Authentication Method for Mobile Banking Services

  • Choi, Dongmin;Tak, Dongkil;Chung, Ilyong
    • 한국멀티미디어학회논문지
    • /
    • 제19권1호
    • /
    • pp.41-50
    • /
    • 2016
  • Moblie device based financial services are vulnerable to social engineering attacks because of the display screen of mobile devices. In other words, in the case of shoulder surfing, attackers can easily look over a user's shoulder and expose his/her password. To resolve this problem, a colour-based secure keyboard solution has been proposed. However, it is inconvenient for genuine users to verify their password using this method. Furthermore, password colours can be exposed because of fixed keyboard colours. Therefore, we propose a secure mobile authentication method to provide advanced functionality and strong privacy. Our authentication method is robust to social engineering attacks, especially keylogger and shoulder surfing attacks. According to the evaluation results, our method offers increased security and improved usability compared with existing methods.

무선 오버레이 네트워크에서 Mobile IPv6를 위한 커버로스 기반의 안전한 바인딩 업데이트 (Kerberos based Secure Binding Update for Mobile IPv6 in Wireless Overlay Networks)

  • 정회윤;송세화;최형기
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2008년도 한국컴퓨터종합학술대회논문집 Vol.35 No.1 (D)
    • /
    • pp.62-65
    • /
    • 2008
  • Mobile IPv6에서 단말이 이동을 하게 되면 경로 최적화를 위한 바인딩 업데이트를 하게 된다. 안전한 바인딩 업데이트를 위해 RFC 3775에서 Return Routability가 제안 되었다. 그러나 Return Routability는 MN과 HA 사이에는 IPSec으로 Secure Path를 보장 받지만, MN과 CN 사이에는 바인딩 업데이트 과정에 공격자가 개입할 경우 다양한 공격에 노출될 수 있다. 이에 본 논문에서는CN도 MN과 같이 HA와 Secure Channel을 보유한 이동 단말일 경우, 각 HA 사이에 커버로스 서버를 이용한 키 분배를 통해 바인딩 업데이트 메시지가 전달되는 전 구간에 걸쳐 안전한 경로를 확보하는 아키텍쳐를 제안한다.

  • PDF

Gesture Input as an Out-of-band Channel

  • Chagnaadorj, Oyuntungalag;Tanaka, Jiro
    • Journal of Information Processing Systems
    • /
    • 제10권1호
    • /
    • pp.92-102
    • /
    • 2014
  • In recent years, there has been growing interest in secure pairing, which refers to the establishment of a secure communication channel between two mobile devices. There are a number of descriptions of the various types of out-of-band (OOB) channels, through which authentication data can be transferred under a user's control and involvement. However, none have become widely used due to their lack of adaptability to the variety of mobile devices. In this paper, we introduce a new OOB channel, which uses accelerometer-based gesture input. The gesture-based OOB channel is suitable for all kinds of mobile devices, including input/output constraint devices, as the accelerometer is small and incurs only a small computational overhead. We implemented and evaluated the channel using an Apple iPhone handset. The results demonstrate that the channel is viable with completion times and error rates that are comparable with other OOB channels.

An Enhanced Mutual Key Agreement Protocol for Mobile RFID-enabled Devices

  • Mtoga, Kambombo;Yoon, Eun-Jun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제1권1호
    • /
    • pp.65-71
    • /
    • 2012
  • Mobile RFID is a new application that uses a mobile phone as an RFID reader with wireless technology and provides a new valuable service to users by integrating RFID and ubiquitous sensor network infrastructures with mobile communication and wireless Internet. Whereas the mobile RFID system has many advantages, privacy violation problems on the reader side are very concerning to individuals and researchers. Unlike in regular RFID environments, where the communication channel between the server and reader is assumed to be secure, the communication channel between the backend server and the RFID reader in the mobile RFID system is not assumed to be safe. Therefore it has become necessary to devise a new communication protocol that secures the privacy of mobile RFID-enabled devices. Recently, Lo et al. proposed a mutual key agreement protocol that secures the authenticity and privacy of engaged mobile RFID readers by constructing a secure session key between the reader and server. However, this paper shows that this protocol does not meet all of the necessary security requirements. Therefore we developed an enhanced mutual key agreement protocol for mobile RFID-enabled devices that alleviates these concerns. We further show that our protocol can enhance data security and provide privacy protection for the reader in an unsecured mobile RFID environment, even in the presence of an active adversary.

  • PDF