• Title/Summary/Keyword: Wireless Internet Services

Search Result 775, Processing Time 0.031 seconds

A Study on the authentication scheme for Security of Wireless Internet (무선 인터넷에서 보안을 위한 인증방안에 관한 연구)

  • 최용식;강찬희;신승호
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.11
    • /
    • pp.87-91
    • /
    • 2004
  • The continuing development of the information technology industry and wireless networking has increased the use of mobile device, which provides both portability and mobility. As follows, demands for extended services within the wireless Internet are increasing rapidly. Because it still in its initial stages of development, the wireless Internet presents continuing problems in security and limitations in the content of services. Furthermore, most mobile equipment utilizes the touch pad input method. This input method is inconvenient when a user needs to input a long sentence. This has led to the more convenient development of image selection by using a pen mouse. In order to provide security under these conditions, a HASH code may be used to transmit an array of information and input values, created by the image input at the early stages. Thus, authentication and key exchange are completed securely. Messages are encoded and transmitted, preventing both information drain by insiders and interference from outside.

Analyzing Moderating Effects of WiBro User Experiences

  • Lee, Bong-Gyou;Kim, Ki-Youn;Song, Jae-Sung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.1
    • /
    • pp.177-190
    • /
    • 2011
  • The purpose of this study is to explore the determinants of actual demand for wireless broadband (WiBro) services in Korea. To this end, this study identifies conceptual definitions of diverse latent variables and determines the significance of the causal relationship between independent and dependent variables. It then presents the nomadic user concept by testing the moderator effect. This study also proposes a revised Unified Theory of Acceptance and Use of Technology (UTAUT) model, which is an appropriate model for wireless communication services and users' attributes. Prior research has concentrated exclusively on the Technology Acceptance Model (TAM) based on future potential users. Compared to previous studies, the current research model and analysis results are useful in not only academic but also industry contexts.

Vertical Handoff Decision Algorithm combined Improved Entropy Weighting with GRA for Heterogeneous Wireless Networks

  • Zhao, Shasha;Wang, Fei;Ning, Yueqiang;Xiao, Yi;Zhang, Dengying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.11
    • /
    • pp.4611-4624
    • /
    • 2020
  • Future network scenario will be a heterogeneous wireless network environment composed of multiple networks and multimode terminals (MMT). Seamless switching and optimal connectivity for MMT among different networks and different services become extremely important. Here, a vertical handoff algorithm combined an improved entropy weighting method based on grey relational analysis (GRA) is proposed. In which, the improved entropy weight method is used to obtain the objective weights of the network attributes, and GRA is done to rank the candidate networks in order to choose the best network. Through simulation and comparing the results with other vertical handoff decision algorithms, the number of handoffs and reversal phenomenon are reduced with the proposed algorithm, which shows a better performance.

WAP Protocol Adaptation Requirements for Internet Service of Portable Handset in the Wireless Environment (무선 휴대 단말기 환경에서의 인터넷 서비스를 위한 WAP 프로토콜 수용방안)

  • 권영미;조웅기
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.363-367
    • /
    • 1999
  • As the subscription rate to both Internet services and wireless communications services increases rapidly, traffic in the future wireless communications will be dominated by Internet applications. Current research for wireless technology is focused to the multimedia data transmission mainly for the personal computer or notebook whose display which has large display and abundant memory. But in the near future, Internet access request from the handphone or PDA device which is already spreaded in the world will be large. Special handset terminals which has small display monitor, low capacity memory and poor processing power has to be managed differently from torrent wireless communications protocols. So, WAP Forum is organized with wireless handset manufacturers in the world and the standardization process for wireless application is being actively developed. In this paper, basic model and architecture of WAP is introduced and adaptation requirements for change from HTML documents to WML formats are proposed. Also, compression ratio gained in the transform from the existing web documents to WML is shown.

  • PDF

Security Vulnerability of Internet of Things and Its Solution (사물인터넷 보안 문제제기와 대안)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.69-78
    • /
    • 2015
  • Internet of Things(IoT) is electronic devices and household appliances use wireless sensor network in environment of high speed wireless network and LTE mobile service. The combination of the development of Internet and wireless network led to development of new forms of service such as electronic devices and household appliances can connect to the Internet through various sensors and online servers such as a Home Network. Even though Internet of Things is useful, there are problems in Internet of Things. In environment of Internet of Things, information leakage could happens by illegal eavesdropping and spoofing. Also illegal devices of wireless communication interference can cause interfere in Internet of things service, physical damage and denial of service by modulation of data and sensor. In this thesis, it will analyze security threats and security vulnerability in environment of mobile services and smart household appliances, then it will suggest plan. To solve security issues, it is important that IT and RFID sensor related companies realize importance of security environment rather than focus on making profit. It is important to develop the standardized security model that applies to the Internet of Things by security-related packages, standard certification system and strong encrypted authentication.

Interconnection Pricing for Mobile Internet Network (무선인터넷 망 접속료 산정 방안)

  • Kim Tae-Sung;Kim Min-Jeong;Byun Jae-Ho
    • Journal of Korea Technology Innovation Society
    • /
    • v.8 no.3
    • /
    • pp.1139-1156
    • /
    • 2005
  • The explosive growth in wireless networks and Internet services has created considerable demand for mobile Internet services based on the mobile phone. Mobile Internet has become the new business model in telecommunication market, therefore the open network policy for mobile Internet has been formulated and implemented by the government in Korea. In spite of the open network policy for mobile Internet, there has been no systematic analysis of the various interconnection issues, including pricing, in mobile Internet network. This paper aims to suggest the interconnection pricing methods for mobile Internet network by reviewing the current pricing models for various communications services, and adapting them to mobile Internet communications circumstances. Results of this paper can be used as a guideline for government policy directions and management decision making after the introduction of the open network policy for mobile Internet.

  • PDF

Emerging Internet Technology & Service toward Korean Government 3.0

  • Song, In Kuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.540-546
    • /
    • 2014
  • Recently a new government has announced an action plan known as the government 3.0, which aims to provide customized services for individual people, generate more jobs and support creative economy. Leading on from previous similar initiatives, the new scheme seeks to focus on open, share, communicate, and collaborate. In promoting Government 3.0, the crucial factor might be how to align the core services and policies of Government 3.0 with correspoding technologies. The paper describes the concepts and features of Government 3.0, identifies emerging Internet-based technologies and services toward the initiative, and finally provides improvement plans for Government 3.0. As a result, 10 issues to be brought together include: Smart Phone Applications and Service, Mobile Internet Computing and Application, Wireless and Sensor Network, Security & Privacy in Internet, Energy-efficient Computing & Smart Grid, Multimedia & Image Processing, Data Mining and Big Data, Software Engineering, Internet Business related Policy, and Management of Internet Application.

Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services

  • Moon, Ki-Young;Park, Nam-Je;Chung, Kyo-Il;Sohn, Sung-Won;Ryou, Jae-Cheol
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.86-95
    • /
    • 2005
  • Location-based services or LBS refer to value-added service by processing information utilizing mobile user location. With the rapidly increasing wireless Internet subscribers and world LBS market, the various location based applications are introduced such as buddy finder, proximity and security services. As the killer application of the wireless Internet, the LBS have reconsidered technology about location determination technology, LBS middleware server for various application, and diverse contents processing technology. However, there are fears that this new wealth of personal location information will lead to new security risks, to the invasion of the privacy of people and organizations. This paper describes a novel security approach on open LBS service to validate certificate based on current LBS platform environment using XKMS (XML Key Management Specification) and SAML (Security Assertion Markup Language), XACML (extensible Access Control Markup Language) in XML security mechanism.

A Study on the Wireless Internet Service of University Libraries in Korea (국내 대학도서관의 무선인터넷 서비스에 관한 연구)

  • Kim, Sung-Won
    • Journal of Information Management
    • /
    • v.39 no.2
    • /
    • pp.75-94
    • /
    • 2008
  • Korean university libraries has lead the advancement of library service by adopting state-of-art technology for the improvement of information service provision, which therefore contributes to the consolidation of the status of the library as a center of information circulation among related institutions. This paper examines the current conditions of wireless internet service provided by the university libraries. First, it takes 'WDL mobile campus consortium', which is an organized movement with many university libraries involved, and explores their major issues such as wireless internet service environment, platform components, service components and functions, user environment and usage. Finally, this paper makes suggestions for the continuous advancement of the university libraries' wireless services.

Downlink Wireless Adaptive Modulation and Coding Scheme (AMC)-based Priority Queuing Scheduling Algorithm for Multimedia Services

  • Park, Seung-Young;Kim, Dong-Hoi
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.12
    • /
    • pp.1622-1631
    • /
    • 2007
  • To realize the wireless packet scheduler which efficiently considers both the effect of adaptive modulation and coding (AMC) scheme due to variable wireless communication channel information from physical layer and the QoS differentiation of multimedia services from internet protocol (IP) layer, this paper proposes a new downlink AMC-based priority queuing (APQ) scheduler which combines AMC scheme and service priority method in multimedia services at the same time. The result of numerical analysis shows that the proposed APQ algorithm plays a role in increasing the number of services satisfying the mean waiting time requirements per each service in multimedia services because the APQ scheme allows the mean waiting time of each service to be reduced much more than existing packet scheduler having only user selection processor.

  • PDF