• Title/Summary/Keyword: IMSI

Search Result 23, Processing Time 0.034 seconds

A Design of Safe AKA Module for Adapted Mobile Payment System on Openness SMART Phone Environment (개방형 스마트 폰 환경에 적합한 모바일 결제 시스템을 위한 안전한 AKA(Authentication Key Agreement) 모듈 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.11
    • /
    • pp.1687-1697
    • /
    • 2010
  • The USIM-based AKA authentication process is essential to a mobile payment system on smart phone environment. In this paper a payment protocol and an AKA module are designed for mobile payment system which is suitable for openness smart phone environment. The payment protocol designs the cross authentication among components of the mobile payment system to improve the reliability of the components. The AKA module of mobile payment system based on 3GPP-AKA protocol prevents the exposure of IMSI by creating the SSK(Shared Secure Key) through advance registration and solves the SQN(SeQuence Number) synchronization problem by using timestamp. Also, by using the SSK instead of authentication vector between SN and authentication center, the existing bandwidth $(688{\times}N){\times}R$ bit between them is reduced to $320{\times}R$ bit or $368{\times}R$ bit. It creates CK and IK which are message encryption key by using OT-SSK(One-Time SSK) between MS and SN. In addition, creating the new OT-SSK whenever MS is connected to SN, it prevents the data replay attack.

A Study on the Web Based Collaborative Learning Systems (웹기반 협동학습시스템의 활용에 관한 연구)

  • Lee, Dong-Hoon;Lee, Sang-Kon;Lee, Ji-Yeon
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.2 no.1
    • /
    • pp.64-70
    • /
    • 2010
  • The purpose of this study is to understand students' use intentions of Web Based Collaborative Learning (WBCL) system. To meet this purpose, we developed a research model based on the Decomposed TPB. This model contains 5 influencing factors: Explicit social influence(EXSI) and Implicit social influence(IMSI), Perceived Usefulness (PU), Perceived easy of use(PEOU), Perceived Playfulness(PP). Data was collected 254 university students from two different institutions. Also, the analysis is conducted to do the hypothesis testing by using PLS 3.0. The result shows that influence factors except PEOU have a important and significant impact on user Behavior Intention(BI). Using WBCL system and learning tool, team leader(that is referent) and members can be a good interaction. For these same reasons, We found that especialy Explicit social influence(EXSI) and Implicit social influence(IMSI) are special influence factors in reference group.

  • PDF

A Study of Security Vulnerability by Cloning 2G(GSM) SIM Card in China (중국 2G(GSM) SIM카드 복제로 인한 보안 취약성 연구)

  • Kim, Wan-Soo;Kim, Shik
    • The Journal of Information Technology
    • /
    • v.12 no.2
    • /
    • pp.1-12
    • /
    • 2009
  • China first started its mobile phone services in 1987, and the number of users has exponentially increased so that it reached 700 millions in January 2009. Currently China's 2G(GSM) users is 650 millions. These 2G (GSM) services have an advantage of the capability to use the mobile phone with a SIM (Subscriber Identity Modul) card, one kind of smart cards, inserted into it. However, due to the security vulnerability of SIM cards being used within China's 2G (GSM) services, SIM cards cloning. Problems concerning mobile phone surveillance towards a designated person by illegal cloning ESN and IMSI have recently risen to be a massive social issue within Korea as well. These studies have experimented the possibility of SIM cards clone in various mobile communication corporations using 2G (GSM) in China, and hence discovered the security vulnerability such as the incoming outgoing, SMS service and additional services on mobile phones using clone SIM cards.

  • PDF

Weakness and its Improvement about IS-95/cdma2000 Mobile Communication System (IS-95/cdma2000 이동통신 시스템의 취약성과 개선방안)

  • Kim Keon-Woo;Hong Do-Won
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.185-189
    • /
    • 2006
  • 최근 ESN과 IMSI 불법복제에 의해 IS-95/cdma2000 이동통신 서비스 정상가입 사용자와 단말의 피해가 확인되고 있다. 이는 정상 가입자의 요금증가, SMS를 통한 휴대폰 결재, 정상단말의 착발신 장애 등의 문제를 일으키고 있다. 이러한 불법복제 단말의 서비스 접근과 정상단말 신원확인을 위해 이동통신 사업자는 파워온 등록, 착신, 발신시에 인증 메커니즘을 적용하지만, 여전히 CDMA/cdma2000 시스템에는 취약점이 존재하는 것으로 분석되고 이의 대응책이 요구된다. 이에 본 논문에서는 파워온 인증, 발신인증, 착신인증이 도입된 이동통신 시스템에서 정상단말과 불법복제 단말이 동일 기지국내에 위치할 때와 서로다른 기지국에 위치할 때, 각각 불법복제 단말에 의해 발생할 수 있는 취약점과 대응방안을 분석하고자 한다.

  • PDF

ECC-based UMTS-AKA Protocol Providing Privacy and Perfect Forward Secrecy (타원 곡선 암호 기반의 프라이버시와 완전한 전방향 안전성을 제공하는 UMTS-AKA 프로토콜)

  • Kim Dae-Young;Cui Yong-Gang;Kim Sang-Jin;Oh Hee-Kuck
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.506-510
    • /
    • 2006
  • 3G 이동통신기술중 하나인 UMTS(Universal Mobile Telecommunications System)에서는 무선 구간의 안전한 통신을 위해 UMTS-AKA(Authentication and Key Agreement) 프로토콜이 사용된다. 그러나 SN(Serving Network)과 HN(Home Network)의 통신량 소비 문제, SQN(SeQuence Number) 동기화 문제 등 여러 가지 문제점이 제기되었다. 본 논문에서는 기존 프로토콜의 문제점과 IMSI(International Mobile Subscriber Identity)의 노출로 인한 프라이버시 문제점을 해결하고, ECDH(Elliptic Curve Diffie Hellman) 기법으로 완전한 전방향 안전성을 제공하는 프로토콜을 제안한다.

  • PDF

Proposal of new GSM Authentication protocol (새로운 GSM의 인증프로토콜 제안)

  • Choi, Hyun;Song, Yun-Kyung;Park, Dong-Sun
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.113-116
    • /
    • 2003
  • Mobile communication network because information through radio channel is passed, information may be eavesdropped and need information security countermeasure in communication network dimension for safe information exchange because there is possibility that is manufactured. This paper used Public Key Cryptography for protection and authentication connected with user authentication. Use public key and private key that is asymmetry encryption key to quote that is used at encryption, decryption of Public key. Encrypt IMSI and authentication message that is transmitted MS, VLR and HLR interval to public key, wish to embody transmitted authentication protocol safety.

  • PDF

An Enhanced PKI Security Management on Smartphone (스마트폰 공인인증서의 안전성 향상을 위한 기법)

  • Kim, Dae-jung;Chang, Yun Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1134-1137
    • /
    • 2010
  • 공인인증서를 사용하는 스마트폰 응용에서는 공인인증서를 스마트폰의 내부 메모리에 내장하거나 SD 메모리에 저장하여 스마트폰에 설치된 응용 프로그램이 이를 접근하는 방법을 사용한다. 그러나 공인인증서를 스마트폰의 메모리에 저장하여 사용하는 경우, 공인인증서의 암호만 알면 타인의 공인인증서를 임의의 스마트폰에 설치하여 사용할 수 있다는 문제점을 안고 있다. 이와 같은 문제점을 해결하고 메모리에 저장되는 공인인증서의 보안성을 높이기 위하여 본 논문에서는 스마트폰의 IMEI와 USIM의 IMSI를 키로 사용하여 스마트폰과 사용자를 식별함으로써 특정한 개인의 스마트폰에서만 해당 개인의 공인인증서를 사용할 수 있도록 하는 방법을 제안하고, 그 효율성을 분석하였다.

Mobile Office Authentication Method using Keystroke (키스트로크를 이용한 모바일 오피스 사용자 인증 방식)

  • Lee, Jong-Hyeok;Choi, Okkyung;Yeh, Hong-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.759-761
    • /
    • 2011
  • 스마트폰이 발전함에 따라 모바일 단말기를 이용해 외부에서 회사 업무를 처리할 수 있는 모바일 오피스 업무 시스템이 증가 하고 있는 실정이다. 개인 휴대 기기의 특성상 이용자의 부주의로 인해 기기 및 메모리카드 등을 도난, 분실 할 수 있으며 이에 따라 개인 및 기업의 정보 유출이 가능하다. 그러므로 본 방식 연구에서는 모바일 오피스 환경에 보다 효율적이고 정보보호를 위한 인증 방법으로 키스트로크(KeyStroke) 방식과 모바일의 IMSI / IMCI 방식을 연구 분석하여 강력하고 적합한 인증 방식을 제안한다.

A Study on the Role of Cultural Intermediaries for the Practice of Local Culture : Focusing on Space Beam, Space Imsi, Incheon Spectacle in Incheon (지역문화의 실천을 위한 문화매개자의 역할 연구 : 인천의 스페이스빔, 임시공간, 인천스펙타클을 중심으로)

  • Lee, Jeongeun
    • 지역과문화
    • /
    • v.7 no.2
    • /
    • pp.1-29
    • /
    • 2020
  • The purpose of this study is to have an opportunity to enhance the role of cultural intermediaries in the region as interest in the cultural media sector increased with the implementation of the Law for Promotion of Regional Culture. First, I discussed the need to pay attention to the local Cultural Intermediaries group as the background of the discussion, confirming that the existing research on the cultural mediation sector was focused on cultural workers in public institutions and government projects. Next, for the theoretical discussion, I reviewed the role of cultural intermediaries contributing to the production of meaning via the concept of cultural intermediaries by Pierre Bourdieu, and described that the mediation of regions and cultures began to emerge as an alternative to the existing centralized structure of cultural production in the context of Korea after the late 1990s. It was found that practices that mediate the region and culture were developed around the group of public artists and cultural activists and the intermediary group played a role in revealing various aspects of the region and dynamically constructing the local public sphere through these cultural practices. Lastly, local curator's cases (Space Beam, Space Imsi, Incheon Spectacle) were studied. The actual cases of activity were analyzed through the cultural practices by focusing on what alternative meanings had been produced in the region and how the region was represented. Each case showed the mediating activity that attempts to change the environment of life while sharing local issues with communities, projects that reconstructs the local professional art sector into a public sphere, and mediating activity that represents local daily culture and form networks through independent publications.

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.