• Title/Summary/Keyword: Smart Phone Security

Search Result 273, Processing Time 0.029 seconds

The Mobile ID based Digital Signature Scheme Suitable for Mobile Contents Distribution (모바일 콘텐츠 유통에 적합한 ID 기반 디지털 서명 기법)

  • Yun, Sung-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.2 no.1
    • /
    • pp.1-6
    • /
    • 2011
  • The wide use of mobile devices such as smart phones makes the mobile commerce industry be growing-up rapidly. In mobile commerce security, how to secure a copyright of mobile contents and how to distribute it are of major concerns. The user can carry the smart phone regardless of the places. Thus the utilization of it is very high than that of personal computers. The USIM(Universal Subscriber Information Module) inserted in the smart phone binds the user with the device. This means that the smart phone can be used to represent the owner's identity. In this paper, we develop the mobile ID based digital signature scheme. We create the mobile ID by combining USIM with the user's random secret value. In addition, undeniable property of our signature scheme can make ID based applications such as mobile voting and mobile content distribution be possible with the smart phone.

Authentication of a smart phone user using audio frequency analysis (음향 주파수 분석을 이용한 스마트폰 사용자 인증)

  • Kim, Jin-Bok;Song, Jeong-Eun;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.327-336
    • /
    • 2012
  • In this paper, we propose user authentication methods using a microphone and a speaker in smart phones. The proposed methods guarantee that the user is located close to the target device by transmitting the challenge via an audio channel. We propose two authentication methods; user authentication for a PC or a website using a smart phone as a hardware token, and user authentication to log on to a smart phone using a PC as a token. Because our methods use typical peripheral devices such as a microphone and a speaker, they do not require any special-purpose hardware equipment. In addition, the elderly and the handicapped can easily use our methods because the methods are activated by simple operations.

A Study on VoIP Security Risk Analysis and Countermeasure (VoIP 보안 위협 분석 및 대책 연구)

  • Kim, Hyun-Chul;Kwak, Jin-Suk;Lee, Young-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.277-280
    • /
    • 2011
  • VoIP is a technology of voice communication, using the existing internet network which sends and receives voice packets. VoIP has an advantage that VoIP is cheaper than an existing telephony, and the tech is vitalized lately. But recently you can download Volp Application in the Market that have a vulnerability(Anyone Can Upload). This weakness is wrongfully used that People are downloaded by encouraging about malignant code is planted. Signal intercepts indicates from this case. and paralysis by DDoS Attack, bypass are charged for hacking. Judging from, security threat of VolP analysis and take countermeasures. In the thesis we analyze the VoIP security caused on 'Soft Phone' and 'Smart Phone', and figure out security policies and delineate those policies on the paper.

  • PDF

Implementation of Smart Control System based on Intelligent Dimming with LEDs

  • Lee, Geum-Boon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.5
    • /
    • pp.127-133
    • /
    • 2016
  • In this paper, an intelligent dimming control system is designed and implemented with the human visual response function using CDS sensor, PIR sensor and temperature sensor, etc. The proposed system is designed to detect a moving object by PIR sensor and to control the LED dimming considering the human visual response. Also, the dimming of LED light can modulate on the app, and simultaneously control dimming in real-world environments with smart phone app. A high-temperature warning or a fire hazard information is transmitted to user's smart phone according to sensor values and Data graph are provided as part of data visualization. Connecting the hardware controller, the proposed intelligent smart dimming control system is expected to contribute to the power reduction interior LED, smart grid building and saving home combining with internet of things.

Arduino Based Smart Home System for the Elderly Living Alone (아두이노 기반의 독거노인을 위한 스마트홈 시스템)

  • Lee, In-Gu;Cho, Myeon-Gyun
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.5
    • /
    • pp.307-315
    • /
    • 2015
  • Recently, Smart Home System(SHS) is applied in order to provide comfort, energy efficient and better security to the residence. Thus, by introducing the SHS in the house of elderly people, it is possible to provide a convenient and safe life for old people especially living alone. This paper presents the design and implementation of a low cost but yet flexible and secure smart-phone based SHS. The design is based on inter-working between Arduino board with Bluetooth and Arduino board with Ethernet shield, and the home monitor/appliances are connected to the input/output ports of this board via sensors/relays. In addition, when the old man is put on an emergency, the proposed system will automatically notify it the family. Therefore, we have implemented an inexpensive and efficient SHS for the elderly living alone by inter-working smart phones, internet server and Arduino micro-controller.

Study of Security Issue and Application of EXIF tag in Image File (이미지 파일 EXIF 태그의 정보보호 및 활용에 관한 연구)

  • Seo, Tae-Woong;Kim, Chang-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.695-696
    • /
    • 2011
  • Smart-phone is appropriate for using image information and location information. However it is possible to be exploited for forgery and manipulation. So we experimented on modified data on the smart-phone as image and location information in EXIF and researched the technology for data verification.

  • PDF

Development of User Oriented Vulnerability Analysis Application on Smart Phone (사용자 중심의 스마트폰 보안 취약성 분석 어플리케이션 개발)

  • Cho, Sik-Wan;Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.3 no.2
    • /
    • pp.7-12
    • /
    • 2012
  • An advanced and proactive response mechanism against diverse attacks should be proposed for enhance its security and reliability on android based commercial smart work device. In this study, we propose a user-oriented vulnerability analysis and response system on commercial smart work device based on android when diverse attacks are activated. Proposed mechanism uses simplified and optimized memory for monitoring and detecting the abnormal behavior on commercial smart work device, with which we can find and determine the attacker's attempts. Additionally, proposed mechanism provides advanced vulnerability analysis and monitoring/control module.

Design and Implementation of Physical Secure Card for Financial Security (금융보안을 위한 물리적 보안 카드의 설계 및 구현)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.855-863
    • /
    • 2015
  • In this paper, we present a novel method to verify the financial site and prevent sensitive information disclosure with financial security card and smart phone. This method allows homepage access when user accesses to the valid site with right security card and smart phone. Furthermore, traditional OTP method cannot be secure against to Man in the middle attack, but out method presents the countermeasure of this. User can readily recognize the phishing and pharming sites and even avoid Man in the middle attack by malicious users.

An Interactive Whiteboard on Smart Phones for Ubiquitous Collaboration (유비쿼터스 협업을 위한 스마트폰 환경에서의 인터랙티브 화이트보드)

  • Ha, Wonjeong;Kim, Kangseok;Yeh, Hongjin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.151-154
    • /
    • 2011
  • 유비쿼터스 협업 (Ubiquitous Collaboration)은 유비쿼터스 환경에서 다양한 이기종 디바이스 (PC, Tablet PC, Smart Phone, etc)들이 유무선망을 통해 언제 어디서나 원하는 서비스를 주고 받을 수 있는 시스템으로 시간과 장소에 상관없이 다양한 데이터를 주고 받을 수 있다. 스마트폰의 보편화, 하드웨어 / 소프트웨어 그리고 무선망의 진화로 협업의 중요성은 점점 증가하고 있다. 본 연구에서는 스마트폰 환경에서 이미지, 도형, 텍스트 등의 도구를 사용 협업하는 인터랙티브 화이트보드 어플리케이션(Interactive Whiteboard Application on Smart Phone)을 사용하여 다양한 환경의 사용자들이 서로 다른 이기종 디바이스와 함께 통신하는 방법을 보인다. 또한 서로 다른 이기종 디바이스 간 그룹 통신에서 오는 동기화(Synchronization), 비동기화(Asynchronization), 또한 다른 화면 크기로 부터 발생되는 서로 다른 이미지 크기 표현문제를 극복하기 위한 사용성 평가실험(Usability Test)을 통하여 연구의 타당성 및 우수성을 증명해 보이고자 한다.

A Study of Security Vulnerability by Cloning 2G(GSM) SIM Card in China (중국 2G(GSM) SIM카드 복제로 인한 보안 취약성 연구)

  • Kim, Wan-Soo;Kim, Shik
    • The Journal of Information Technology
    • /
    • v.12 no.2
    • /
    • pp.1-12
    • /
    • 2009
  • China first started its mobile phone services in 1987, and the number of users has exponentially increased so that it reached 700 millions in January 2009. Currently China's 2G(GSM) users is 650 millions. These 2G (GSM) services have an advantage of the capability to use the mobile phone with a SIM (Subscriber Identity Modul) card, one kind of smart cards, inserted into it. However, due to the security vulnerability of SIM cards being used within China's 2G (GSM) services, SIM cards cloning. Problems concerning mobile phone surveillance towards a designated person by illegal cloning ESN and IMSI have recently risen to be a massive social issue within Korea as well. These studies have experimented the possibility of SIM cards clone in various mobile communication corporations using 2G (GSM) in China, and hence discovered the security vulnerability such as the incoming outgoing, SMS service and additional services on mobile phones using clone SIM cards.

  • PDF