• Title/Summary/Keyword: Security Integration

Search Result 447, Processing Time 0.025 seconds

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

Secure and Scalable Blockchain-Based Framework for IoT-Supply Chain Management Systems

  • Omimah, Alsaedi;Omar, Batarfi;Mohammed, Dahab
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.37-50
    • /
    • 2022
  • Modern supply chains include multiple activities from collecting raw materials to transferring final products. These activities involve many parties who share a huge amount of valuable data, which makes managing supply chain systems a challenging task. Current supply chain management (SCM) systems adopt digital technologies such as the Internet of Things (IoT) and blockchain for optimization purposes. Although these technologies can significantly enhance SCM systems, they have their own limitations that directly affect SCM systems. Security, performance, and scalability are essential components of SCM systems. Yet, confidentiality and scalability are one of blockchain's main limitations. Moreover, IoT devices are lightweight and have limited power and storage. These limitations should be considered when developing blockchain-based IoT-SCM systems. In this paper, the requirements of efficient supply chain systems are analyzed and the role of both IoT and blockchain technologies in providing each requirement are discussed. The limitations of blockchain and the challenges of IoT integration are investigated. The limitations of current literature in the same field are identified, and a secure and scalable blockchain-based IoT-SCM system is proposed. The proposed solution employs a Hyperledger fabric blockchain platform and tackles confidentiality by implementing private data collection to achieve confidentiality without decreasing performance. Moreover, the proposed framework integrates IoT data to stream live data without consuming its limited resources and implements a dualstorge model to support supply chain scalability. The proposed framework is evaluated in terms of security, throughput, and latency. The results demonstrate that the proposed framework maintains confidentiality, integrity, and availability of on-chain and off-chain supply chain data. It achieved better performance through 31.2% and 18% increases in read operation throughput and write operation throughput, respectively. Furthermore, it decreased the write operation latency by 83.3%.

Security Treats about Union File System and Responce Methodology (유니온 파일시스템에 대한 보안 위협 및 대응 방법)

  • Han, Sung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.445-446
    • /
    • 2021
  • Union file system is a technology that can be used as a single file system by integrating various files and directories. It has the advantage of maintaining the source file/directory used for integration, so it is used in many applications like container platform. When using the union file system, the user accesses the write-able layer, to which the security technology provided by the operating system can be applied. However, there is a disadvantage in that it is difficult to apply a separate security technology to the source file and directory used to create the union file system. In this study, we intend to propose an access control mechanism to deny security threats to source file/directory that may occur when using the union file system. In order to verify the effectiveness of the access control mechanism, it was confirmed that the access control mechanism proposed in this study can protect the source file/directory while maintaining the advantages of the union file system.

  • PDF

Analyses of Security Issues and Requirements Under Surroundings of Internet of Things (사물인터넷 환경하에서 보안 이슈 및 요구사항 분석)

  • Jung Tae Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.639-647
    • /
    • 2023
  • A variety of communications are developed and advanced by integration of wireless and wire connections with heterogeneous system. Traditional technologies are mainly focus on information technology based on computer techniques in the field of industry, manufacture and automation fields. As new technologies are developed and enhanced with traditional techniques, a lot of new applications are emerged and merged with existing mechanism and skills. The representative applications are IoT(Internet of Things) services and applications. IoT is breakthrough technologies and one of the innovation industries which are called 4 generation industry revolution. Due to limited resources in IoT such as small memory, low power and computing power, IoT devices are vulnerable and disclosed with security problems. In this paper, we reviewed and analyzed security challenges, threats and requirements under IoT service.

Study on UxNB Network Deployment Method toward Mobile IAB

  • Keewon Kim;Jonghyun Kim;Kyungmin Park;Tae-Keun Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.12
    • /
    • pp.105-114
    • /
    • 2023
  • In this paper, we propose a deployment and operation scheme of UxNB network toward mobile IAB. By operating a UxNB network based on SDN(Software Defined Network), UxNBs are deployed in areas where mobile communication services are desired. After deploying UxNB in the service area, IAB can be set up to perform mobile communication services. For this purpose, this paper first proposes a UxNB Network Controller consisting of a UAV Controller and an SDN Controller, and proposes the necessary functions. Next, we present a scenario in which a UxNB network can be deployed and operated in detail step by step. We also discuss the location of the UxNB network controller, how to deliver control commands from the UAV controller to the UxNB, how to apply IAB for UxNB networks, optimization of UxNB networks, RLF(radio link failure) recovery in UxNB networks, and future research on security in UxNB networks. It is expected that the proposed UxNB Network Controller architecture and UxNB network deployment and operation will enable seamless integration of UxNB networks into Mobile IAB.

Development of the Conceptual Model of Constructing and Operating the Integrated Computing Environment (통합전산환경 구축$\cdot$운영을 위한 개념적 모형 개발)

  • Jung, Hae-Yong;Kim, Sang-Hoon
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.173-195
    • /
    • 2005
  • As the amount of informatization investment is rapidly increasing in many organizations, it becomes more inevitable to manage computing resources (information systems, computing facilities and manpower etc.) effectively. Specially, in public sector It is thought to be very important to achieve the economy of scale by integrating computing resources which are managed individually in many agencies. Also, our government have been recently making much efforts to raise the effectiveness of operating the information systems by promoting joint information use among many public agencies, enhancing the operating systems and the expertise of IS staff and applying the optimal information security systems. This study focuses on presenting the framework to effectively integrate omputing resources and proposing the ways of constructing and operating the integrated computing environment for the institutions and the affiliated groups under the Ministry of Culture & Tourism which are in charge of implementing cultural informatization. The main implications of this study are 1) building the ideal model of the integrated computing environment architecture suitable to cultural informatization area, 2) showing the criteria of deciding whether the organizations use the Integrated computing environment or not and how extensively they commit their computing resources to it, and 3) suggesting the ways of the phased integration and the change management to minimize confusion in the process of adopting the integrated computing environment and behavioral problems such as conflict and resistance of IS-related Personnel Influenced by Implementing the integrated computing environment.

  • PDF

Availability Verification of Integration OTP Framework using Biometrics Information (바이오매트릭스 정보를 이용한 모바일 기반의 통합 OTP 프레임워크의 유효성 검증)

  • Cha, Byung-Rae;Kim, Nam-Ho;Kim, Jong-Won
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.1
    • /
    • pp.39-53
    • /
    • 2011
  • As the applications within Mobile devices becoming more extensive, the mobile communication security issues of these applications and researches are appearing to be the most important concern. In this paper, we propose new integration OTP framework technique which uses the fingerprint and voice features of biometrics in order to generate Mobile One Time Passwords (OTPs) Token. The fingerprint and voice are considered to be one of the powerful personal authentication factors of biometrics and it can be used for generating variable passwords based on mobile environments for one time use. However, we performed a simulation of homomorphic variability of fingerprint and voice feature points using dendrogram and distribution of fingerprint and voice feature points for proposed password generation method, and verified validation of availability.

Development of Multi-function Sensor Integration Module System for Smart Green Building (스마트 그린빌딩 구현을 위한 다기능 센서 통합 모듈 시스템 개발)

  • Kim, Bong-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.10
    • /
    • pp.4799-4804
    • /
    • 2013
  • Green IT technology for the growth of low-carbon green environment and future development of the new technology. Therefore, in this paper, data generated by the security module for RFID applications, smart green building Sung multi-function sensor integrated module that can be integrated environment for building monitoring and management system has been developed. The development of a thermal sensor, temperature sensor, smog sensor, CO2 sensor, O2 sensor, tension sensor and damage detection sensor module with integrated system module integrated multi-functional sensors implemented in the paper. In real-time monitoring by allowing was design and developed system that can be implemented smart green building environment for the environment inside buildings.

A Study on the Readjustment Plans for Solution of Conflict in Gaeseong Complex - Centering around the Inter-Korean Commercial Arbitration System (개성공단 분쟁해결 제도 정비방안 - 남북상사중재제도를 중심으로)

  • Hwangbo, Hyun
    • Journal of Arbitration Studies
    • /
    • v.29 no.4
    • /
    • pp.3-31
    • /
    • 2019
  • In order to achieve full-scale economic cooperation between North Korea and South Korea, the Gaesong Industrial Complex should reopen first. In this case, the Inter-Korean commercial arbitration system should be clearly established to effectively resolve the disputes arising in the special economic zones of the Gaesong Industrial Complex. Even though the Inter-Korean Investment Security Agreement, the Agreement on the Resolution of Commercial Disputes between North Korea and South Korea, the Agreement on the Formation and Operation of the Inter-Korean Commercial Arbitration Committee, and the Agreement on the Formation and Operation of the Inter-Korean Commercial Arbitration Committee in the Gaesong Industrial District are in place, specific arbitration procedure is not concretely agreed upon and realized between the two Koreas. Therefore, the realization of commercial arbitration between them led by the Ministry of Unification or the government should be accomplished. In addition, it is necessary to consider the administrative trial or administrative litigation system in order to deal with administrative disputes that are not subject to commercial arbitration. Lastly, discussions on legal integration between the two Koreas should continue, focusing on the special economic zone of the Gaesong Industrial Complex, in order to prevent integration from being hindered by a different culture for a long time.

Seamless and Secure Mobility Management with Location-Aware Service (LAS) Broker for Future Mobile Interworking Networks

  • Lee Minsoo;Kim Gwanyeon;Park Sehyun
    • Journal of Communications and Networks
    • /
    • v.7 no.2
    • /
    • pp.207-221
    • /
    • 2005
  • The proliferation of wireless local area networks (WLANs) offering high data rate in hot spot area have spurred the demand for possible WLANs and third-generation (3G) cellular network integration solutions as the initiative step towards 4G systems. This paper provides a novel architecture for seamless location-aware integration of WLANs into 3G cellular networks and also an analysis for the efficient handover techniques. We introduce location as a key context in secure roaming mechanism for context-aware interworking in 4G systems. The fast secure roaming with location-aware authentication is implemented at an entity called location-aware service (LAS) broker that utilizes the concepts of direction of user and pre-warming zone. The location-ware interworking architecture supports seamless roaming services among heterogeneous wireless networks including WLANs, wireless metropolitan area networks (WMANs), and 3G cellular networks. This paper also includes a description of procedures needed to implement efficient mobility and location management. We show how the LAS broker with pre-warming and context transfer can obtain significant lower latency in the vertical handover.