• Title/Summary/Keyword: 스마트 워크

Search Result 1,495, Processing Time 0.03 seconds

Proposal and Implementation of Security Keypad with Dual Touch (이중 터치를 이용한 보안 키패드 제안 및 구현)

  • Song, Jinseok;Jung, Myung-Woo;Choi, Jung-In;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.3
    • /
    • pp.73-80
    • /
    • 2018
  • Due to the popularity of smartphones and the simplification of financial services, the number of mobile financial services is increasing. However, the security keypads developed for existing financial services are susceptible to probability analysis attacks and have security vulnerabilities. In this paper, we propose and implement a security keypad based on dual touch. Prior to the proposal, we examined the existing types of security keypads used in the mobile banking and mobile payment systems of Korean mobile financial businesses and analyzed the vulnerabilities. In addition, we compared the security of the proposed dual touch keypad as well as existing keypads using the authentication framework and the existing keypad attack types (Brute Force Attack, Smudge Attack, Key Logging Attack, and Shoulder Surfing Attack, Joseph Bonneau). Based on the results, we can confirm that the proposed security keypad with dual touch presented in this paper shows a high level of security. The security keypad with dual touch can provide more secure financial services, and it can be applied to other mobile services to enhance their security.

The Design and Implementation of Sensor Data Processing Module Based on TinyOS Utilizing TinyDB and LineTracer (TinyDB와 라인트레이서를 활용한 TinyOS기반의 센서 데이터 처리 모듈 설계 및 구현)

  • Lee, Sang-Hoon;Moon, Seung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10B
    • /
    • pp.883-890
    • /
    • 2006
  • The study of sensor network database is beginning to liven up as we are interested in Ubiquitous Computing technology in hardware, communication, database and so on. Especially, as new smart sensors have capabilities of real-time information gathering and analysis of each sensor node, data processing becomes an important issue in Ubiquitous Computing. In thesis, we have applied TinyDB(query processing system) to carry sensor node with line tracer which can follow the fixed path. After we gathered data around path, we have processed data in TinyDB GUI, gathered data, displayed data on a web server. Also we have a web browser on an embedded board for convenient user interface and implemented touch screen such that users can operate with a finger.

A Study of Factors Affecting Attitude Towards Using Mobile Cloud Service (모바일 클라우드 서비스 이용태도에 영향을 미치는 요인 연구)

  • Kim, Su-Yeon;Lee, Sang Hoon;Hwang, Hyun-Seok
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.18 no.6
    • /
    • pp.83-94
    • /
    • 2013
  • As smart devices have proliferated and mobile networks have accelerated, various wired IT(Information Technology) services are transplanted in wireless environments. Cloud computing service, enabling individual users or firm users to download data from a server and upload data after manipulating data, is also available in mobile devices. Unlike cloud service in wired network environments, mobile cloud service provides differentiated aspects in mobility, security issues caused by persistent connection to networks. In this paper we aim to analyze the factors affecting the user attitude and their structural relationships towards mobile cloud service use. We extend TAM(Technology Acceptance Model) to consider the characteristics of mobile environments. Research findings, analyzed by SEM(Structural Equation Model), are explained and practical implications are presented with concluding remarks.

Security Enhanced User Authentication Scheme with Key Agreement based on Fuzzy Extraction Technology (보안성이 향상된 퍼지추출 기술 기반 사용자 인증 및 키 동의 스킴)

  • Choi, Younsung;Won, Dongho
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.1-10
    • /
    • 2016
  • Information and network technology become the rapid development, so various online services supplied by multimedia systems are provided through the Internet. Because of intrinsic open characteristic on Internet, network systems need to provide the data protection and the secure authentication. So various researchers including Das, An, and Li&Hwang proposed the biometric-based user authentication scheme but they has some security weakness. To solve their problem, Li et al. proposed new scheme using fuzzy extraction, but it is weak on off-line password attack, authentication without biometrics, denial-of-service and insider attack. So, we proposed security enhanced user authentication scheme with key agreement to address the security problem of authentication schemes.

Authentication for Single/Multiple Domain using Attribute Certificates (유비쿼터스 컴퓨팅 환경에서 속성 인증서를 이용한 단일/멀티 도메인 인증)

  • Lee Deok-Gyu;Park Hee-Un;Lee In-Yeong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.291-300
    • /
    • 2005
  • The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much specially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that have following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method(MD: Multi Domain) and user ownself space(SD: Single Domain) that realize authentication through device in case of moved user's direct path who device differs.

Interference Analysis based on System Level Simulation in LTE Networks (LTE 네트워크에서 시스템 레벨 시뮬레이션 기반 인접 대역간 간섭 분석)

  • Ban, Tae Won;Jung, Bang Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2411-2417
    • /
    • 2012
  • Globally, the emergence of smart phones vitalized the ecosystem of mobile data service industry. Consequentially, mobile data traffic has been explosively growing and the speed of growth will be more steep. New spectrum will be required in order to properly accommodate the explosively growing mobile data traffic. However, it will be difficult to acquire a sufficient guard band between different frequency bands because the range of frequency which is suitable for wireless communications is limited. Thus, the performance degradation caused by inter-band interference will be one of challenging problems in the next generation mobile communication systems. In this paper, we analyze the performance degradation caused by inter-band interference by computer simulations in various environments. Our results show that the impact of the inter-band interference is more critical when own signal is poor or its own interference from neighboring cells is low.

A Study on Interconnection Regime: Core Issues and Alternatives (국내 상호접속제도 연구: 핵심이슈와 대안 발굴)

  • Kim, Il-Jung;Shin, Minsoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.678-691
    • /
    • 2015
  • Internet and mobile traffic continues to surge exponentially in recent years due to popularization of smart devices, the appearance of various internet services carrying large amount of traffic from richer content and applications. This phenomenon leaded to various network problems such as the congestion delay, the non-balanced traffic ratio between ISPs, the continuous network investment cost and the Internet access problems. In light of changed data-driven communication ecosystem, There are growing concerns by both academia and industry that settlement-free peering and full transit regime have the limitations such as not only difficulties in maintaining mutual benefits but also difficulties in securing investment incentives for upgrading network performance and quality. Thus, it becomes more necessary for introducing the evolved internet interconnection regime which can fulfill the All-IP network environment. This study derives core issues regarding internet interconnection regime in Korea and suggest new evolved alternatives based on three point of view(traffic optimization, cost optimization, network investment optimization) through the empirical analysis.

A Novel Frequency Planning and Power Control Scheme for Device-to-Device Communication in OFDMA-TDD Based Cellular Networks Using Soft Frequency Reuse (OFDMA-TDD 기반 셀룰러 시스템에서 디바이스간 직접통신을 위한 SFR 자원할당 및 전송 전력조절 방법)

  • Kim, Tae-Sub;Lee, Sang-Joon;Lim, Chi-Hun;Ryu, Seungwan;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.10
    • /
    • pp.885-894
    • /
    • 2012
  • Currently, Demand of data traffic has rapidly increased by popular of smart device. It is very difficult to accommodate demand of data traffic by limited resource of base station (BS). To solve this problem, method has proposed that the Device-to-Device (D2D) reduce frequency overload of the BS and all of the user equipment (UE) inside the BS and neighbor BS don't allow communicating directly to BS. However, in LTE-Advance system cellular link and sharing radio resources of D2D link, the strong interference of the cellular network is still high. So we need to eliminate or mitigate the interference. In this paper, we use the transmission power control method and Soft Frequency Reuse (SFR) resource allocation method to mitigate the interference of the cellular link and D2D link. Simulation results show that the proposed scheme has high performance in terms of Signal to Noise Ratio (SINR) and system average throughput.

Resource Allocation Based on Location Information in D2D Cellular Networks (D2D 셀룰러 네트워크에서 위치기반 자원할당)

  • Kang, Soo-Hyeong;Seo, Bang-Won;Kim, Jeong-Gon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.4
    • /
    • pp.750-757
    • /
    • 2017
  • Recently, mobile internet traffic has rapidly increased as the huge increase of the smart phone and mobile devices. D2D get attention, because D2D is known that it reduce the traffic load of the base station and also improves the reliability of the network performance. However, D2D has a problem that the efficiency decreases as interference is increased. In this paper, we propose a resource allocation scheme to use the resources efficiently when the D2D link share the cellular resources in the cellular network based the uplink. D2D communication utilizes the location information for allocating resources when the eNB know the location of all devices. The proposed scheme select some cellular user using location informations in order to ensure performance of the D2D communication. and D2D link choose cellular user that performs resource allocation using only selected cellular user. Simulation results show optimal value of resource selection in order to ensure most performance of the D2D communication.

Realtime Image Transmission System based-on the Zigbee Protocol (지그비기반의 실시간 이미지전송시스템의 설계 및 구현)

  • Park, Byoung-Seob
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.91-98
    • /
    • 2010
  • In order to control moving facilities on a remote place effectively, it are required to acquire a environment informations such as images where the moving facilities are placed. However, since there is no tools to acquire such informations to the central control system based on the non-networked sensor environments, it is difficult to control the moving facilities remotely. Therefore, we design and implement the Zigbee based image transmission system and communication protocol to control the moving target remotely. The wireless control utilizing the Zigbee protocol is that electrically consumption is more small than the Bluetooth and reliability of data transmission is better. The implemented Zigbee based control systems and communication protocol have the normal and replay function for a realtime control of the moving target under the server PC and the mobile FDA with the WiFi protocol. The functional operability and performance are analyzed by a designed prototype under the wireless home network environment.