• Title/Summary/Keyword: mobility security

Search Result 299, Processing Time 0.051 seconds

An Approach for Applying Network-based Moving Target Defense into Internet of Things Networks

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.9
    • /
    • pp.35-42
    • /
    • 2019
  • In this paper, we propose an approach to apply network-based moving target defense into Internet of Things (IoT) networks. The IoT is a technology that provides the high interconnectivity of things like electronic devices. However, cyber security risks are expected to increase as the interconnectivity of such devices increases. One recent study demonstrated a man-in-the-middle attack in the statically configured IoT network. In recent years, a new approach to cyber security, called the moving target defense, has emerged as a potential solution to the challenge of static systems. The approach continuously changes system's attack surface to prevent attacks. After analyzing IPv4 / IPv6-based moving target defense schemes and IoT network-related technologies, we present our approach in terms of addressing systems, address mutation techniques, communication models, network configuration, and node mobility. In addition, we summarize the direction of future research in relation to the proposed approach.

Analyses of Embedded Network Gateway under Ubiquitous Surroundings (유비쿼터스 환경하에서의 암호화 모듈이 내장된 네트워크 게이트웨이의 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.755-758
    • /
    • 2008
  • As the commercial use of the Internet becomes com- mon and the demand for mobile computing through the Internet is emerging, it is necessary to construct a secure mobile environment. This paper proposes an approach with IP layer security and mobility support to meet this challenge. To evaluate our approach, we are developing a security and motility supported system.

  • PDF

Mobile Subscriber Roaming n Different Mobile Networks Using UIM and PASM

  • Park, Jeong-Hyun;Yang, Jeong-Mo
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11a
    • /
    • pp.445-448
    • /
    • 2003
  • During a time when cellular systems are being deployed in massive scale worldwide, international roaming is becoming increasingly important. This paper presents UIM (User Identification Module) for mobility support, authentication, and service portability between different mobile systems. We also introduce network model based on PASM(Portable Authentication and Mobility Service Machine) which will support signaling protocol and user information conversions with database for roaming between different mobile networks. Stored data types and elements in UIM, logical data structure and configuration, and registration procedures are described here in the case of DCN (Digital CDMA (Code Division Multiple Access) Network System) and GSM (Global System for Mobile Communications).

  • PDF

Proxy-AAA Authentication Scheme with Forwarding Mode Supporting in PMIPv6 Networks

  • Han, JeongBae;Jeong, Jongpil;Jo, Jun
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.5 no.2
    • /
    • pp.18-22
    • /
    • 2013
  • Mobile IPv6 (MIPv6) is a host-based protocol supporting global mobility while Proxy Mobile IPv6 (PMIPv6) is a network-based protocol supporting localized mobility. This paper makes its focus on how to reduce the longer delay and extra cost arising from the combination of authentication, authorization and accounting (AAA) and PMIPv6 further. Firstly, a novel authentication scheme (Proxy-AAA) is proposed, which supports fast handover mode and forwarding mode between different local mobility anchors (LMAs). Secondly, a cost analysis model is established based on Proxy-AAA. From the theoretical analysis, it could be noted that the cost is affected by average arrival rate and residence time.

An Effect of Technology Acceptance of e-business Service on Use Intention - Focusing on Mobile Banking Service - (e-비즈니스 서비스의 기술수용성이 이용의도에 미치는 영향 - 모바일뱅킹 서비스를 중심으로 -)

  • Son, Yong-Jung
    • International Commerce and Information Review
    • /
    • v.9 no.2
    • /
    • pp.87-101
    • /
    • 2007
  • This study developed seven assumptions to demonstrate the effect of personal innovation, social influences, service quality, mobility and accessibility on perceived usability, perceived convenience use and use intention using a technology acceptance model developed by Davis(1989), and the results are presented as follows: First, the assumption that personal innovation and service quality of mobile banking service will influence the perceived usability was adopted while the assumption that social influences will affect the perceived usability was rejected. Second, the assumption that mobility and accessibility of mobile banking services will influence the perceived convenient use was selected. Third, the assumption that the perceived usability of mobile banking service will influence use intention was rejected while the assumption that the convenient use will influence use intention was adopted. This study suggests that as personal innovation, service quality, mobility and accessibility have a significant influence on use of mobile banking, service providers should pay more attention to development of security programs and diversification of contents.

  • PDF

Wireless LAN Security Solutions for Secure Wireless Communications

  • Kim, Su-Yong;Ahn, Duck-Ki;Roh, Jae-Sung;Oh, Chang-Reon;Cho, Sung-Joon
    • Journal of information and communication convergence engineering
    • /
    • v.1 no.4
    • /
    • pp.183-188
    • /
    • 2003
  • The $4^{th}$ generation mobile communications, through several radio access networks such as WLAN, Bluetooth, UMTS, GPRS, CDMA 1X, and IMT-2000 in the same area offering different type of coverage, will support interactive multimedia services in additions to wider bandwidths, higher bit rates, and service portability. Regardless of various radio access networks, they will also support robust security mechanisms, as well as seamless mobility and common authentication. In this paper, we give an overview of WLAN security and examine its security problems. We also explain the enhanced security schemes, such as port-based authentication, EAP, and IEEE 802.1X. For secure wireless communications, several possible security solutions are offered and evaluated in various respects to improve WLAN security. This paper will make a contribution to provide more secure wireless communications to cellular operators embracing WLAN technology as a means to generate new revenues based on data services.

A Study on Security Architecture for F-MIPv6 (F-HMIPv6 지원을 위한 보안 아키텍처)

  • Son, Sang-Woo;Kim, Mun-Ki;Rhee, Byung-Ho
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.7-8
    • /
    • 2006
  • F-HMIPv6 is protocol that supports fast handovers for Hierarchical Mobile IPv6. Unlike HMIPv6 (Hierarchical Mobile IPv6), it sends FBU(Fast Binding Update) by predicted Router's Information for a potential handover. But, The current version of this protocol doesn't ensure impeccably between mobile node and router. To make up for the weak points of the security, we propose the architecture for F-HMIPv6 protocol to structurally reinforce the security and improve weak security of among mobile node, MAP(Mobility Anchor Point), and routers for binding update when mobile node conducts handovers.

  • PDF

A Secure Mobile Agent Transfer Protocol in Mobile Agents Based E-Commerce System (이동 에이전트 기반 저자사걸 시스템에서의 안전한 이동 에이전트 전송 프로토콜)

  • Han, Seung-Wan;Im, Hyeong-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.5S
    • /
    • pp.1657-1665
    • /
    • 2000
  • Mobile agents based e-commerce system has many advantage than traditional e-commerce-information gathering on goods, price settlement and payment, delivery of the goods purchased, and so on. However, due to the security vulnerability that stems from mobile agent's mobility, mobile agents based e-commerce system has additional security problems. Therefore, in order to do e-commerce securely in th system, first of al the security issues on mobile agents must be addressed. It this paper, we propose a mobile agent transfer protocol that provides confidentiality and integrity of mobile agent in transit and mutual authentication for communicating hosts. We further show the security of the protocol against many possible attacks. Also, we suggest the location management mechanism of mobile agents based on the trust center. This mechanism is capable of finding their locations transparently and detecting mobile agent clones.

  • PDF

Security Architecture for U-Healthcare Application in Wireless Sensor Network (무선 센서 네트워크에서의 유비쿼터스 헬스케어 시스템을 위한 보안 구조)

  • Shin, Yoon-gu;Kim, Hankyu;Kim, Sujin;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.884-885
    • /
    • 2014
  • The use of Radio Frequency Identification technology (RFID) in medical context enables not only drug identification, but also a rapid and precise identification of patients, physicians, nurses or any other health care related staffs. The combination of RFID tag identification with structured and secured Internet of Things (IoT) solutions enables ubiquitous and easy access to medical related records, while providing control and security to all interactions. This paper surveyed a basic security architecture, easily deployable on mobile platforms, which would allow to establish and manage a medication prescription service in mobility context making use of electronic personal health records.

  • PDF

A Survey about Vulnerabilities and Solutions of Autonomous vehicle security (자율주행 자동차 보안 취약성 및 솔루션 조사)

  • JaeKyung Park;SeungYoon Kang;Chat-GPT
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.615-616
    • /
    • 2023
  • 본 논문은 자율주행 자동차의 보안 취약성과 이를 해결하기 위한 솔루션에 대한 조사를 다루고 있다. 자동차의 자율주행 및 초연결성이 대두됨에 따라 보안 위협이 점점 중요해지는 현실을 직면하고 있다. 본 논문은 다양한 취약성을 카테고리 별로 다루고, 해당 취약성에 대응하기 위한 보안 솔루션과 현재 연구 개발 중인 솔루션들을 소개하고 있다. 그러나 아직 해결되지 않은 과제들이 산적해 있으며, 연구와 개발이 계속되어야 안전하고 신뢰성 있는 초연결 자율주행 자동차를 구현할 수 있을 것으로 기대한다.

  • PDF