• Title/Summary/Keyword: 모바일 키

Search Result 258, Processing Time 0.027 seconds

mNPKI for Mobile Government in Developing Countries (개발도상국의 모바일 정부를 위한 mNPKI)

  • Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.161-171
    • /
    • 2019
  • Government transactions over wireless electronic devices are not safe and hence the messages are prone to attack. Thereby, devices supporting wireless Internet must assure the same level of security and privacy as the wired network. National public key infrastructure (NPKI) for electronic government used in the wired environment is not suitable for wireless environment for mobile government (mGovernment) because of the limitations of computing power, memory capacity and restricted battery power. This requires the development of a new NPKI for mGovernment, denoted as mNPKI, to developing countries, which provides the same security level as the wired NPKI. For the wireless environment requirements, mNPKI is based on short lived certificates. Analysis shows that mNPKI is well suited to wireless Internet and provides the same security requirement from the wired NPKI.

Security Mechanism of Agent for Effective Agro-Foods Mobile Commerce (농산물 모바일 상거래를 위한 효과적인 에이전트 보안 메커니즘)

  • Jung Chang-Ryul;Song Jin-Kook;Koh Jin-Gwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.9
    • /
    • pp.1573-1581
    • /
    • 2006
  • To utilize actively the agent which is one of the elements of revitalization of Agro-Foods Mobile I-commerce, an essential prerequisite is agent security. IF using partial PKI(Public Key Infrastructure)-based confirmation mechanism providing security for the agent, the size of agent is becoming larger, the result of the transmission speed is slow, and the confirmation speed is tardy as well because of performing calculation of public keys such as RSA and needing linkage with the CA for the valid examination of certificates. This paper suggests a mechanism that can cross certification and data encryption of each host in the side of improving the problems of key distribution on agent by shaping key chain relationship. This mechanism can guarantee the problem of ky distribution by using agent cipher key(ACK) module and generating random number to fit mobile surroundings and to keep the secret of the agent. Suggested mechanism is a thing that takes into consideration security and efficiency to secure agent for the revitalization of M-Commerce, and is a code skill to make the agent solid and is a safe mechanism minimizing the problems of memory overflow.

Authenticated Mobile IPv6 Binding Update Protocol for Micro/Pico Cell Environments (마이크로 및 피코 셀 환경에 적합한 인증된 모바일 IPv6 바인딩 갱신 프로토콜)

  • Lee, Gi-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1519-1523
    • /
    • 2007
  • In this paper, we propose the fast and secure binding update protocol as handoff or handover in the micro and pico environment based on mobile IPv6. The nodes or routers on participating in this protocol generate their addresses from cryptographically generated addresses (CGAs) method unlike previous address generation method. The mobile node (MN) includes in home network or home link has limited power and computational abilities. So the home agent (HA) of the MN executes key agreement protocol with the correspondent node (CN) on behalf of the MN. The CN then creates a ticket on including session key, lifetime of ticket. and so on. It then transmits it to the MN via the HA of the MN. The ticket is used to communicate directly between the MN and its CN. In performance analysis, we analyze security of proposed binding update protocol under various attack scenarios and efficiency by comparing proposed protocol with prior binding update protocols. Finally we make a conclusion of this paper and present future works.

  • PDF

Authentication Protocol Using Hamming Distance for Mobile Ad-hoc Network (모바일 Ad-hoc 네트워크에서 Hamming Distance를 이용한 인증프로토콜)

  • Lee, Seok-Lae;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.47-57
    • /
    • 2006
  • Mobile Ad-hoc networks have various implementation constraints such as infrastructure-free, no trusted authority, node mobility, and the limited power and small memory of mobile device. And just like wired networks, various security issues such as authentication, confidentiality, integrity, non-repudiation, access control, availability and so on have been arisen in mobile Ad-hoc networks. But we focus on authentication of these security issues because it is quitely affected by the characteristics of networks. In this paper, we propose the authentication protocol that can limit the size of certificate repository as $log_2N$ and assures to make a trusted certificate path from one node to another, adopting the concept of Hamming distance. Particularly, our protocol can construct a trusted certificate path in spite of decreasing or increasing the number of nodes in mobile Ad-hoc network.

Research on Secure Keypads for Mobile Devices with Stretchable Displays (스트레처블 디스플레이가 적용된 모바일 기기의 보안 키패드 연구)

  • Dongmin Choi
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.885-890
    • /
    • 2024
  • This study proposes a secure keypad structure that can adapt to screen changes in mobile devices equipped with stretchable display. For this purpose, we compared and analyzed the authentication methods applied to current rigid form factor smartphones with those applied to rollable and bendable display based smartphones, which are the previous stages of stretchable display. Based on the results of this analysis, we identified potential user convenience and security safety issues that may arise in the form factor structure for smart wallets, multitasking, screen expansion and media viewing, and gaming and entertainment applications where stretchable displays will be applied, then proposed a security keypad structure for these form factors. Our keypad structure provides enhanced user convenience and security compared to the structures applied in the smartphone environment based on the conventional rigid display form factor and rollable, bendable display form factor.

Algorithms for Designing Optimal Keypads of Mobile Devices (최적의 휴대폰 키패드 디자인을 위한 알고리즘)

  • Kim, Hyun-Min;Kim, Yong-Hyuk
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.6
    • /
    • pp.814-820
    • /
    • 2009
  • The arrangement of the general 12-button cellular phone keypad is unified with one or two kind. In general, the several alphabets are arranged in one key. When inputting an English, countries which do not speak English use multi-tap method. We can input next alphabet by pressing key repeatedly. We address the problem of finding multi-tap-based keypad designs which minimize the number of key presses for various case. Genetic algorithms is proposed method for optimal keypad designs. We are to maintain the number of keys, which is ranged from 8 to 12. We also show experimental using non-alphabetically-constrained and alphabetically-constrained arrangement, respectively. Finally, we give improved keypad designs.

Design and Implementation of effective ECC Encryption Algorithm for Voice Data (음성 데이터 보안을 위한 효율적인 ECC 암호 알고리즘 설계 및 구현)

  • Kim, Hyun-Soo;Park, Seok-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2374-2380
    • /
    • 2011
  • Many people is preferred to mVoIP which offers call telephone-quality and convenient UI as well as free of charge. On the other hand, security of mVoIP is becoming an issue as it using Internet network may have danger about wiretapping. Although traditionally encryption algorithm of symmetric key for security of voice data has been used, ECC algorithm of public key type has been preferring for encryption because it is stronger in part the strength of encryption than others. However, the existing way is restricted by lots of operations in poor mobile environment. Thus this paper proposes the efficiency of resource consumption way by reducing cryptographic operations.

Analysis of each appstores' certification way by code signing and security (앱스토어별 코드사이닝 기법을 이용한 인증 방식과 보안성 분석)

  • Kim, Ji-Hong;Kim, Young-Hun;Lim, Hun-Jung;Lee, Jun-Ho;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1221-1224
    • /
    • 2010
  • 스마트폰 사용자의 폭발적 증가와 함께 모바일 애플리케이션 시장에 대한 관심도 크게 증가하고 있다. 더불어 애플리케이션의 보안 위협 역시 증가하고 있는데 각 모바일 애플리케이션 마켓에서는 이에 대한 대처방안 중 하나로 코드사이닝 기법을 활용하고 있다. 코드사이닝 기법을 이용하여 애플리케이션 및 개발자에 대해 인증을 받는 방식에는 각 모바일 마켓별로 다른 점이 존재한다. 그 종류로는 개발자가 생성한 공개키와 해당 애플리케이션을 애플에 전송하고 애플이 이에 대한 검증을 하여 마지막 서명을 부여하는 방식의 애플 앱스토어, 개발자가 키와 증명서를 이용해 스스로 애플리케이션에 대해 증명서를 발급하는 방식의 구글 안드로이드 마켓, RIM에 등록되어 있는 코드사이닝 키를 이용하여 애플리케이션을 제출하면 자동적으로 서명을 받을 수 있는 블랙베리 앱월드, 사전에 개발자가 자기 증명을 통해 아이디를 발급받고 애플리케이션을 테스트 하우스에 등록하여 검증 및 서명을 받는 노키아오비스토어 등이 있다. 이와 같이 개발자 및 애플리케이션을 인증 받는 방식이 각 마켓별로 차이가 있는데 이에 대한 자세한 분석과 그에 따른 보안 위협에 대한 안정성에 대해 분석해 보겠다.

Mobile Security for Academic Information Service (학술정보 콘텐츠 제공을 위한 모바일 보안 서비스에 관한 연구)

  • Kim, sang-kuk;Choi, byeong-seon;Kang, mu-yeong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.473-476
    • /
    • 2008
  • Mobile network environments are the environments where mobile devices are distributed invisible in our daily lives so that we can conventionally use mobile services at any time and any place. But, Mobile devices has a many security vulnerabilities caused by lower computing of devices and security problem of wireless network. So in this paper, PKI structure is proposed to minimize encrypting and decrypting operation by compounding session key and public key on WIPI environment. Proposed secure authentication system based on korean standard cryptography algorithm will give a more firmness in mobile network and support a more secure service for mobile academic information service that KISTI future plan.

  • PDF

Development of a Mobile App Combining React Native and Unity3D for Chromakey-based Image Composition (React Native와 Unity3D를 활용한 크로마키 기반 이미지 합성 모바일 앱 개발)

  • Kim, Seung-Jun;Seo, Beom-Joo;Cho, Sung-Hyun
    • Journal of Korea Game Society
    • /
    • v.20 no.4
    • /
    • pp.11-20
    • /
    • 2020
  • In the rapidly changing mobile app market, it is crucial to develop a good idea quickly and receive its market evaluation. For a small-sized company, however, it is very challenging to rapidly develop and deploy their products in response to highly fragmented mobile environments. This article demonstrates that our integrated development environment using both React Native and Unity3D when developing a mobile app achieves a high level of functionality and performance requirements successfully. Moreover, this integrated environment helps reduce development costs and shorten development time.