• Title/Summary/Keyword: Smart Phone Security

Search Result 273, Processing Time 0.027 seconds

Development of a Smart Phone Security System (스마트폰 정보분실 보안 시스템 개발)

  • Park, Gi-Deok;Hwang, Sang-Yun;Rho, Young J.
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.809-811
    • /
    • 2011
  • 스마트폰이 많이 보급되어 커다란 시장을 형성하고 있고, 많은 기업체에서 전자 결제 시스템을 도입하는 등, 스마트폰으로 업무를 보는 환경이 늘어나고 있다. 더불어 스마트폰 보안 및 분실, 도난 방지 시스템의 필요성을 느끼게 되었다. 본 논문에서 다루는 내용은 안드로이드SDK기반 스마트폰의 분실이나 도난을 방지하고 내부의 중요한 데이터를 보존하기 위한 시스템으로, 분실 시 정보의 유출을 제한하기위한 방법에 중심을 두고 개발하였다.

A Security Survey and SmartPhone Authentication in Telematics (텔레매틱스에서 보안 동향 및 스마트폰 인증)

  • Yeo, Seong-Gwon;Lee, Keun-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.951-954
    • /
    • 2011
  • IT 기술의 발전으로 M2M 시장이 급부상하고 있는 가운데 M2M 응용분야 중 텔레매틱스의 개념 및 차량 네트워크 보안의 취약성을 알아보았다. 차량 및 IT 기술의 융합과 이동통신망 기술의 발전은 사용자에게 제공되는 서비스의 질은 향상 시켰지만, 이로 인한 보안 위험성은 더 많아지고 다양해졌다. 이에 본 논문에서는 텔레매틱스의 새로운 비즈니스 모델과 이로 인해 발생 될 수 있는 차량 이동통신망 보안의 취약성을 분석하였다. 이 중 발생할 수 있는 위장공격을 예방하기 위해 M2M 기기와 스마트폰의 상호 인증 기법을 제시하였다.

Analysis on Smishing Attack Trends and Mobile Forensic (스미싱 공격 동향 분석 및 Mobile Forensic)

  • Noh, Jung-Ho;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.394-397
    • /
    • 2014
  • Most of Koreans have smartphone. By using smartphone, they have done internet-banking, e-commerce and private scheduling. However, convenience of smart phone has been made side effect such as tool of fraud and crime. Especially, Smishing on smartphone has been increased rapidly since 2013. Smishing have utilized social-engineering technique with social issue such as Korean near-sea cruse ship, 'Sewol-Ho', Sinking and traditional thanks-giving holiday, 'Chu-Seok', etc. This paper proposed the oncoming trend of smishing on smartphone after 2014. This paper also analyzed the process and technique of smishing on internal financial fraud. It also covered smartphone forensic for using legal evidence. By discovering the connectivity of smishing and financial fraud, this paper could be reference for social security on smartphone.

  • PDF

Mobile Ultra-Broadband, Super Internet-of-Things and Artificial Intelligence for 6G Visions

  • Hamza Ali Alshawabkeh
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.235-245
    • /
    • 2023
  • Smart applications based on the Network of Everything also known as Internet of Everything (IoE) are increasing popularity as network connectivity requires rise further. As a result, there will be a greater need for developing 6G technologies for wireless communications in order to overcome the primary limitations of visible 5G networks. Furthermore, implementing neural networks into 6G will bring remedies for the most complex optimizing networks challenges. Future 6G mobile phone networks must handle huge applications that require data and an increasing amount of users. With a ten-year time skyline from thought to the real world, it is presently time for pondering what 6th era (6G) remote correspondence will be just before 5G application. In this article, we talk about 6G dreams to clear the street for the headway of 6G and then some. We start with the conversation of imaginative 5G organizations and afterward underline the need of exploring 6G. Treating proceeding and impending remote organization improvement in a serious way, we expect 6G to contain three critical components: cell phones super broadband, very The Web of Things (or IoT and falsely clever (artificial intelligence). The 6G project is currently in its early phases, and people everywhere must envision and come up with its conceptualization, realization, implementation, and use cases. To that aim, this article presents an environment for Presented Distributed Artificial Intelligence as-a-Services (DAIaaS) supplying in IoE and 6G applications. The case histories and the DAIaaS architecture have been evaluated in terms of from end to end latency and bandwidth consumption, use of energy, and cost savings, with suggestion to improve efficiency.

Designing Password Input System Resistant on Shoulder Surfing Attack with Statistical Analysis (Shoulder Surfing 공격을 고려한 패스워드 입력 시스템 구현 및 통계적 검증)

  • Lim, Soo Min;Kim, Hyoung Joong;Kim, Seong Kee
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.215-224
    • /
    • 2012
  • Using password on system is easy to build and shorten the access time to authorize user, which is high in use for vary system that requires users' authorization. Many input device are able to perform the password system easily, such as PC, smart-phone, tablet PC, etc. Beside the high usability of password, physical attack occurs when user put their password on the device, known as Shoulder Surfing attack. It used to be formed in numbers, characters or mix of different kinds, but new kind of password arose. Exploiting image or making scenarios are those kinds which are able to reflect users' intentions. Not many estimation exists for new password, so there's need to be standard for those new password for highlighting usability and accessability. In this paper, we propose password system with simple image and switching key-board to test statistical method to estimate usability on the password.

A Study on efficient transmission performance improvement Considering the security in the wireless LAN environment (무선랜 환경에서 보안을 고려한 효율적 전송성능 향상에 관한 연구)

  • Hwang, Seong-Kyu;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.4
    • /
    • pp.837-846
    • /
    • 2013
  • Recently, new technologies based on wireless LAN is being studied because utilization on smart phone using Wi-Fi is increased. 802.11 b/g/a is universalized wireless LAN technologies based on ISM, the standard developed in 11's working group of IEEE 802. standardization about IEEE 802.11ac that overcame limitation on Blue-ray of IEEE 802.11n or uncompressed video transmission and IEEE 802.af's technologies using TVWS is being actively studied. In this paper, ability of transmission considering the security on AP operated by these technologies have measured and done a comparative analysis with existing wireless LAN environment ability of transmission measured when appling security is more stable than existing ability of transmission in an environment with obstacles and shorten of transmission time is confirmed as a result of analysis.

A Study of Accident Prevention Effect through Anomaly Analysis in E-Banking (전자금융거래 이상징후 분석을 통한 사고예방 효과성에 관한 연구)

  • Park, Eun Young;Yoon, Ji Won
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.4
    • /
    • pp.119-134
    • /
    • 2014
  • Financial companies are providing electronic financial transactions through a variety of user terminals for non-face-to-face services such as Internet banking, smart phone banking, or etc. However, in these services users' security awareness and the limitations of technical responses has frequently caused the financial loss so that fundamental protection measures are required from financial authorities. Accordingly, financial industry is planning and establishing systems that block unusual financial transactions by comprehensively analyzing and detecting user's electronic information, access information, transaction information, and so on in accordance with "Guide for building Unusual financial transactions detection system" to prevent the financial loss that happens in electronic financial transactions. In this paper, we analyze case studies of unusual financial transactions detection and prevention system that is built and operated in financial companies and current operating status and propose effects of the accident prevention and security measures later.

Implementation of Home Security System using a Mobile App (모바일 앱을 이용한 홈 시큐리티 시스템 구현)

  • Kwon, Young-Il;Jeong, Sam-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.4
    • /
    • pp.91-96
    • /
    • 2017
  • In this paper, we aim to respond efficiently to crime by using Arduino and smartphone apps in response to increasing number of house-breaking crimes. It receives the signal of the sensor installed in the house and connects it with the app of the smartphone. To use the app, you can download the app from the user's smartphone, launch the app, and operate the operation outside the home, not only inside the house, by linking the executed app. Among the sensors installed in the house, the movement detection sensor is used to enhance the security, and the gas leakage sensor and the flame detection sensor can be used to easily detect the risk of fire and to prevent the fire early. Security is further enhanced by the ability to remotely control the front door with a smartphone. After that, various sensors can be added and it can be developed as a WiFi module in addition to the Bluetooth module.

Design and Implementation of a Flexible Application Permission Management Scheme on Android Platform (안드로이드 플랫폼에서 유연한 응용프로그램 권한관리 기법 설계 및 구현)

  • Kim, Ik-Hwan;Kim, Tae-Hyoun
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.151-156
    • /
    • 2011
  • Google Android, which is one of the popular smart phone platforms, employs a security model based on application permissions. This model intends to reduce security threats by protecting inappropriate accesses to system resources from applications, but this model has a few problems. First, permission requested by an application cannot be granted selectively. Second, once the permission has been granted it is maintained until the application is uninstalled. Third, applications may acquire powerful permissions through user ID sharing without any notice to users. In order to overcome these limitations, we designed and implemented a flexible application permission management scheme. The goal of our scheme is to enhance security and user convenience while keeping compatibility to original platform. We also verified the operation of our scheme with real applications on Android emulator.

Behavioral Factors Affecting Tourists' Smartphone Usage: Focus on Mobile Banking Service (관광객의 스마트폰 이용 행위 요인: 모바일 뱅킹 서비스 중심)

  • Qu, Xiaoqian;Kim, Mincheol
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.127-134
    • /
    • 2019
  • The purpose of this study was to investigate the factors affecting the behavior intention of smartphone mobile banking service among tourists. Currently, due to the development of mobile Internet technology and the spread of smartphone all over the world, interest and spread of smart phone based mobile banking is popularized. Thus, we analyzed the relationship among performance expectancy, social influence, facilitating conditions, perceived financial cost, perceived habit, perceived security level, and user's behavioral intention as a dependent variable. In this study, 203 respondents were interviewed about Chinese tourists at Jeju International Airport, and the influence of independent variables was determined by Smartpls 3.0. The results showed that the perceived security level and habit had a positive effect on the behavior intention. Especially, perceived security is a major issue of smartphone-based mobile banking in recent years. This study is meaningful in that it is an analysis of behavior factors of smartphone-based mobile banking service for tourists.