• Title/Summary/Keyword: Smart Phone Security

Search Result 273, Processing Time 0.026 seconds

A Study on the VoIP Security Countermeasure of SIP-based (SIP(Session Initiation Protocol) 기반의 VoIP 보안 대책 연구)

  • Tae, Jang-Won;Kwak, Jin-Suk
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.421-428
    • /
    • 2013
  • Voice over IP refers to technology that enables routing of voice conversations over the Internet or a TCP/IP network. VoIP communication costs cheaper than traditional analog phone. Phone calls can be made to anywhere / anyone: Both to VoIP numbers as well as people with normal phone numbers. VoIP protocol equipment available today follows the SIP standard. Older VoIP equipment though would follow H 323, MGCP, Megaco/H.248. A SIP server is the main component of an IP PBX, dealing with the setup of all SIP calls in the TCP/IP network. A SIP server is also referred to a Asterisk IP-PBX. A VoIP telephone, also known as a SIP phone or a softphone, allows the user to make phone calls to any softphone, mobile or PC by using App store. A VoIP telephone can be a simple software-based softphone. However, the SIP Server and the program is vulnerable to VoIP attacks. In this paper, eavesdropping attacks tested by using the Asterisk SIP server. Eavesdropping attacks and TLS security methods apply to VoIP system. TLS can be applied to determine whether the eavesdropping available for VoIP Environments.

A Study on the Efficient e-Commerce Policies under the Smart Phone Environment (스마트융합환경에서의 전자상거래 정책)

  • Kim, Sun-Bae;Kim, Kyoung-Mook
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.125-133
    • /
    • 2012
  • The volume of electronic banking service via smart phone is expected to increase dramatically under smart convergence environment. Under such circumstances, the effort to establish the mobile electronic banking culture which took a major step forward from the conventional electronic commerce method is essential. It is necessary to standardize the mobile payment infrastructure in order to resolve the initiative conflicts between financial institutions and newly launched non-financial institutions. Furthermore, a domestic and international strategy is required as the number of NFC technology based smart phone transaction business is increased. As various types of business enter the electronic commerce field, efforts to resolve the dissatisfaction of the customers are critical. Additionally, security is one of the significant issue due to the conversation process to open-type operating system. This study surveyed and analyzed the current domestic and foreign status, the problems in Korea, and suggested an effective counterplan and policy, which could be helpful in governments' preparation for electronic commerce policy.

A Multichannel Authentication Technique In The Internet Banking System Using OTP (OTP를 이용한 인터넷뱅킹 시스템의 다중 채널 인증 기법)

  • Yoon, Seong Gu;Park, Jae Pyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.131-142
    • /
    • 2010
  • Due to the development of the Internet, Internet banking that we are liberated from time and space has evolved into banking system. So modern life became comfortable. However, Dysfunction (malicious Information leakage and hacking etc.) of the Internet development has become a serious social problem. According to this, The need for security is rapidly growing. In this paper, we proposed the Internet Banking Authentication System using a dual-channel in OTP(One Time Password) authentication. This technology is that A user transfer transaction information to Bank through one Internet channel then bank transfer transaction information to user using the registered mobile phone or smart phone. If user confirm transaction information then bank request user's OTP value. User create OTP value and transfer to bank and bank authenticate them throgth the ARS. If authentication is pass then transaction permitted. Security assessment that the proposed system, the security requirement that the confidentiality and integrity, authentication, repudiation of all of the features provide a key length is longer than the current Internet banking systems, such as using encryption, the security provided by the Financial Supervisory Service Level 1 rating can be applied to more than confirmed.

Homomorphic Encryption as End-to-End Solution for Smart Devices

  • Shanthala, PT;Annapurna, D;Nittala, Sravanthi;Bhat, Arpitha S;Aishwarya, Aishwarya
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.57-62
    • /
    • 2022
  • The recent past has seen a tremendous amount of advancement in the field of Internet of Things (IoT), allowing the influx of a variety of devices into the market. IoT devices are present in almost every aspect of our daily lives. While this increase in usage has many advantages, it also comes with many problems, including and not limited to, the problem of security. There is a need for better measures to be put in place to ensure that the users' data is protected. In particular, fitness trackers used by a vast number of people, transmit important data regarding the health and location of the user. This data is transmitted from the fitness device to the phone and from the phone onto a cloud server. The transmission from device to phone is done over Bluetooth and the latest version of Bluetooth Light Energy (BLE) is fairly advanced in terms of security, it is susceptible to attacks such as Man-in-the-Middle attack and Denial of Service attack. Additionally, the data must be stored in an encrypted form on the cloud server; however, this proves to be a problem when the data must be decrypted to use for running computations. In order to ensure protection of data, measures such as end-to-end encryption may be used. Homomorphic encryption is a class of encryption schemes that allow computations on encrypted data. This paper explores the application of homomorphic encryption for fitness trackers.

Infant nurture management guide service widget based on Smart-TV (스마트TV 기반 유아 양육 도우미 서비스 위젯)

  • Jo, Hui-Joon;Choi, Jong-Hyuk;Jung, Jai-Jin
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.93-99
    • /
    • 2010
  • Smart TV, Internet content and interactive services are available, the operating system to mount the Web, App Store, you can enjoy a variety of content. Smart TV market, TV replacement cycle is long, watching for changes in the way copyright issues such as adaptation period and, unlike the case of a smart phone TV market in the short term are expected to occupy will not find, if IPTV, satellite, cable and real-time TV platform for broadcasters to adopt a smart, smart TV market could spread more quickly than expected. Long term, Google, Apple, TV gajeonsa and broadcasters to compete with various companies through the process of expanding the TV market is smart, the media are expected to dominate the market. Smart TV with the latest technology-related research and to investigate the Smart TV, Smart TV is designed based widgets. Widgets on the desktop, mobile, IPTV, etc. can be implemented in various environments and various features and types of users already are using the widget. In particular the advantages of the widget can be implemented to meet the needs of the users, because users to more efficiently and meet their desired widget. In this paper, propose Smart-TV-based Baby management widget.

Study for Injurious Multimedia Contents Analysis Mechanism in Smart Devices (스마트 기기에서 유해 멀티미디어 콘텐츠 판별 메커니즘 및 성능 분석)

  • Min, Sun-Ho;Kim, Seok-Woo;Ha, Kyeoung-Ju;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1001-1006
    • /
    • 2013
  • In this paper, Recently, we describe the distinction mechanism analysis and injurious distinction mechanism performance analysis in order to determine harmfulness of the injurious multimedia which is being rapidly spread in the smart phone and Intelligent Robots. Based on the injurious mechanism distinction technologies, We defined individual injurious characteristics elements of multimedia(images and videos). Also, We analyze harmfulness of the injurious multimedia content by the visual characteristics modeling.

A Study on the Effects that Personal Characteristics of Market Maven and Time Orientation have on Mobile Shopping - With a Focus on Mobile Shopping - (패션 및 뷰티 제품의 모바일 쇼핑에 영향을 미치는 마켓 메이븐 및 시간지향특성에 관한 연구)

  • Nam, Miwoo
    • Journal of the Korean Society of Costume
    • /
    • v.64 no.5
    • /
    • pp.30-49
    • /
    • 2014
  • Mobile shopping, through the use of the smart phone, has become a very popular shopping method for consumers due to it not being limited by time or place. This research aims do the following:1)find the causes for consumers shifting to mobile shopping with the focus on fashion and beauty items; and in order to so, this research will use the TAM that was found by David et al (1989), and 2) distinguish any behavioral differences between consumer groups divided into purchasing intention of fashion and beauty items through smart phone. Path analysis was performed to verify the cause-and-effect relationship between the variables. Personal characteristics(i.e. market maven, time orientation), perceived usability, ease of use, attitude towards mobile shopping, and purchase intentions were all treated as dependant variables. The results showed that attitude towards mobile shopping was the most important variable on mobile shopping intentions. Time-oriented and Market Maven were thought to affect mobile shopping attitude and the dependent variables of purchase intention. Also, when purchasing smart phones, consumers highly valued smart phone's popularity; people with higher purchasing intention mainly used entertainment and utility apps. The following are the main reasons for not purchasing through mobile shopping: they are slower than computers, inconveniences in viewing due to small size of the screen, and security issues. The consumers used the internet as their main source of acquiring daily information. In this research, factors that affect the purchase intention were studied. However, it is difficult to firmly insist that this research correctly predicts the actual purchase intention-further studies need to be done to investigate the relationship between mobile purchase intention and actual purchase intention.

Tracking Analysis of User Privacy Damage using Smartphone (스마트폰 사용으로 인한 사용자 프라이버시 피해 현황 분석)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.13-18
    • /
    • 2014
  • The usage rate of user due to advances in smartphone development is higher than the usage rate to use a PC. However, smartphone usage popularized research to protect sensitive information, such as smart phone users personal information, financial information is a small state. In this paper, we analyzed the various vulnerabilities in smartphone studies to date have been looking into the corresponding port smart consumer dispute resolution methods and criteria for smartphone security attack methods and analysis. In particular, the threat of such a network, malware, Peep attack of the security threats arising from the smartphone they can avoid or mitigate threats to minimize the smartphone security damage is done to the disclosure of personal information, such as direct damage or financial loss the analysis of that method.

  • PDF

User Privacy Protection for Smart Phone using Hypervisor (Hypervisor를 이용한 스마트폰 사용자 프라이버시 보호)

  • Yoo, Jae-Sung;Lee, Kwang-Woo;Kim, Seung-Joo;Won, Dong-Ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.01a
    • /
    • pp.29-32
    • /
    • 2011
  • 현재 사용되고 있는 스마트폰에서는 어떤 개인정보들이 외부로 제공되고 있는지 사용자에게 알려주지 않는다. 스마트폰 개인정보 유출로 인한 피해 사례가 증가하면서, 스마트폰 사용자 프라이버시 보호의 중요성이 부각되고 있다. 본 논문에서는 스마트폰 사용자가 설정한 개인정보보호 정책을 기반으로 개인정보 접근권한을 각 어플리케이션에 부여하고, 어플리케이션이 허가되지 않은 정보에 대한 접근을 요청한 경우, 이를 차단하고 사용자에게 경고 메시지를 보여주는 방법을 제안한다. 제안하는 기법은 물리적인 하드웨어에 대한 접근을 모니터링하고 제어할 수 있는 Hypervisor 기술을 이용한다. 본 논문에서 제안하는 기법은 사용자가 허가하지 않은 개인정보의 유출을 차단할 수 있고, 프라이버시를 안전하게 보호할 수 있다.

  • PDF

Framework for Design and Implementation of SmartPhone Forensic Based on Web Service (웹 서비스 기반의 스마트폰 포렌식 프레임 워크 설계 및 구현)

  • Kim, Hyoung-Hwan;Jeon, SangJun;Kim, DoHyun;Lee, Sangjin;Un, Sungkyong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.842-845
    • /
    • 2011
  • 현재의 스마트폰 기반의 모바일 애플리케이션은 기본적인 전화, 문자와 같은 기능들 외 네비게이션과 같은 유용하고 편리한 기능들이 사용되고 있다. 이러한 애플리케이션에는 사용자와 관련된 많은 개인 정보들이 포함되어있고, 저장된 개인 정보는 사건 발생 시 사건의 직접적인 증거 혹은 간접적은 증거로 활용될 수 있다. 스마트폰에 저장된 증거를 수집하고 분석할 때 조사관들이 사용할 수 있는 기존의 도구는 복잡한 사용방법을 숙지해야 하고, 인증된 소프트웨어가 설치되어 있는 컴퓨터에서 국한되어 분석이 가능했다. 본 논문에서는 이와 같은 문제를 해결하기 위한 웹 서비스 개념의 스마트폰 포렌식 프레임워크를 제시한다.