• 제목/요약/키워드: Mobile Information

검색결과 15,570건 처리시간 0.035초

SDN 기반의 Inter PMIPv6 도메인 핸드오버 (SDN based Inter Proxy Mobile IPv6 Domain Handover)

  • ;염상길;김동수;추현승
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2015년도 춘계학술발표대회
    • /
    • pp.210-211
    • /
    • 2015
  • Proxy Mobile IPv6 (PMIPv6) is a network based IP mobility management protocol. PMIPv6 make sure that the IP address of the mobile node remains the same as long as the mobile node roams with in the PMIPv6 domain. A mobile node roams with in a PMIPv6 domain. PMIPv6 protocol doesn't provide the mobility support once the mobile node moves from one PMIPv6 domain to another PMIPv6 domain. This paper proposes a Software Defined Networking (SDN) based PMIPv6 scheme which provides the mobility support for inter PMIPv6 domain movement of mobile node. In the proposed architecture each PMIPv6 domain has a SDN controller and SDN controllers from different domains communicate with each other to share the mobility information.

Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues

  • Karim, Ahmad;Ali Shah, Syed Adeel;Salleh, Rosli Bin;Arif, Muhammad;Noor, Rafidah Md;Shamshirband, Shahaboddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권4호
    • /
    • pp.1471-1492
    • /
    • 2015
  • The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. The implications of botnets have inspired attention from the academia and the industry alike, which includes vendors, investors, hackers, and researcher community. Above all, the capability of botnets is uncovered through a wide range of malicious activities, such as distributed denial of service (DDoS), theft of business information, remote access, online or click fraud, phishing, malware distribution, spam emails, and building mobile devices for the illegitimate exchange of information and materials. In this study, we investigate mobile botnet attacks by exploring attack vectors and subsequently present a well-defined thematic taxonomy. By identifying the significant parameters from the taxonomy, we compared the effects of existing mobile botnets on commercial platforms as well as open source mobile operating system platforms. The parameters for review include mobile botnet architecture, platform, target audience, vulnerabilities or loopholes, operational impact, and detection approaches. In relation to our findings, research challenges are then presented in this domain.

A Resource Discovery with Data Dissemination over Unstructured Mobile P2P Networks

  • Bok, Kyoung-Soo;Kwak, Dong-Won;Yoo, Jae-Soo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권3호
    • /
    • pp.815-834
    • /
    • 2012
  • Recently, along with the innovative development of wireless communication techniques and mobile devices, mobile P2P services in mobile wireless networks have gained a lot of attention. In this paper, we propose a resource discovery scheme with data dissemination over mobile P2P networks. In the proposed scheme, each peer manages a local information table, a resource index table, and a routing table in a local database to enhance the accuracy and cost of resource discovery. The local information table stores the status of a mobile peer, and the resource index table stores the resource information of the neighbor peers via the ranking function. The routing table is used to communicate with the neighbor peers. We use a timestamp message to determine whether or not the resource index table will be changed before the resource information is exchanged. Our ranking function considers the interest and mobility of the mobile peer and prioritizes the resource information transmitted from the neighbor peers. It is shown via various experiments that the proposed scheme outperforms the existing scheme.

이동 이질 멀티데이타베이스 시스텐을 위한 이동 유연 트랜잭션의 실행 제어 알고리즘 (An Execution Control Algorithm for Mobile Flex Transactions in Mobile Heterogeneous Multidatabase Systems)

  • 구경이;김유성
    • 한국정보처리학회논문지
    • /
    • 제6권11호
    • /
    • pp.2845-2862
    • /
    • 1999
  • As the technical advances in portable computers and wireless communication technologies, mobile computing environment has been rapidly expanded. The mobile users on mobile host can access information via wireless communication from the distributed heterogeneous multidatabase system in which pre-existing independent local information systems are integrated into one logical system to support mobile applications. Hence, mobile transaction model should include not only the features for heterogeneous multidatabase systems but also the ones for mobile computing environment. In this paper, we proposed a mobile flex transaction model which extends the flexible transaction model that previously proposed for heterogeneous multidatabase systems is extended to support the requirements of mobile heterogeneous multidatabase systems. We also presented the execution control mechanism of the mobile flex transaction model. The proposed mobile flex transaction model allows the definition of location-dependent subtransactions, the effective support of hand-over, and the flexibility of transaction executions. Hence, the proposed mobile flex transaction model can be suit to mobile heterogeneous multidatabase systems that have low power capability, low bandwidth, and high communication failure possibility.

  • PDF

A Study on Mobile IPv4 Authentication Mechanisms

  • Lim, Jung-Muk;Lim, Hyung-Jin;Chung, Tai-Myoung
    • 한국정보기술응용학회:학술대회논문집
    • /
    • 한국정보기술응용학회 2005년도 6th 2005 International Conference on Computers, Communications and System
    • /
    • pp.277-280
    • /
    • 2005
  • With the proliferation of mobile terminals, use of the Internet in mobile environments is becoming more common. To support mobility in these terminals, Mobile IPv4 is proposed and represents the standard in IPv4 environments. Authentication should be mandatory, because mobile terminals can utilize Internet services in any foreign domain. Mobile IPv4 provides symmetric key based authentication using the default HMAC-MD5. However, symmetric key based authentication creates a key distribution problem. To solve this problem, public key based authentication mechanisms have been proposed. In this paper, the performance of each of these mechanisms is evaluated. The results present that, among these mechanisms, partial certificate based authentication has superior performance, and certificate based authentication has the worst performance. Although current public key based authentication mechanisms have lower performance than symmetric key based authentication, this paper presents the possibility that public key based authentication mechanisms may be used for future mobile terminal authentication.

  • PDF

PKI 인증서와 CA를 이용한 Mobile IP 등록 프로토콜 (Mobile IP Registration Protocol Using PKI Certificates and CA)

  • 박상준;홍충선;이대영
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2001년도 추계학술발표논문집 (하)
    • /
    • pp.863-866
    • /
    • 2001
  • Mobile IP는 호스트의 이동성을 제공하여주는 대표적인 프로토콜이다. 이러한 이동 네트워킹 환경에서 전자상거래를 비롯한 여러 가지 다양한 데이터 서비스가 원활하게 제공되기 위해서는 정보보호 문제가 선결되어야 한다. 본 논문에서는 Mobile IP에서 공개키 기반 인증서와 CA(Certification Authority)를 이용한 Mobile IP 등록 프로토콜을 제안한다. 제안된 프로토콜은 이동 노드(mobile node)의 등록 메시지 인증과 재사용 공격(replay attack)을 방지한 수 있으며, 무선 환경을 고려한 공개키 암호방식을 최소로 사용하도록 제안하였다. 또한, 인증서를 이용한 인증방식으로 에이전트(agent)들과 이동노드간의 직접적인 인증이 이루어지도록 하였다. 제안된 Mobile IP 등록 프로토콜은 시뮬레이션을 통하여 기존에 제안된 공개키 기반의 Mobile IP 등록 프로토콜보다 성능이 우수하다는 것을 확인할 수 있었다.

  • PDF

A Novel Architecture for Mobile Crowd and Cloud computing for Health care

  • kumar, Rethina;Ganapathy, Gopinath;Kang, Jeong-Jin
    • International Journal of Advanced Culture Technology
    • /
    • 제6권4호
    • /
    • pp.226-232
    • /
    • 2018
  • The rapid pace of growth in internet usage and rich mobile applications and with the advantage of incredible usage of internet enabled mobile devices the Green Mobile Crowd Computing will be the suitable area to research combining with cloud services architecture. Our proposed Framework will deploy the eHealth among various health care sectors and pave a way to create a Green Mobile Application to provide a better and secured way to access the Products/ Information/ Knowledge, eHealth services, experts / doctors globally. This green mobile crowd computing and cloud architecture for healthcare information systems are expected to lower costs, improve efficiency and reduce error by also providing better consumer care and service with great transparency to the patient universally in the field of medical health information technology. Here we introduced novel architecture to use of cloud services with crowd sourcing.

Proxy Mobile IPv6에서 Correspondent Information Route Optimization 기법의 핸드오버 (Route Optimization Using Correspondent Information handover on Proxy Mobile IPv6)

  • 최영현;정태명
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2010년도 춘계학술발표대회
    • /
    • pp.641-644
    • /
    • 2010
  • Proxy Mobile IPv6에서는 같은 Local Mobility Anchor 내의 다른 Mobile Access Gateway에 있는 Mobile Node 들의 패킷 전송에 있어서 발생하는 삼각 라우팅 문제는 여전히 존재한다. 이 문제점을 해결하기 위해 인터넷 드래프트 Liebsch와 Dutta에서 제안된 두 가지 Route Optimization 기법의 동작과정을 알아보고, 상호 데이터 전송 상황에서 더 나은 성능을 제공하는 Correspondent Route Optimization 기법을 제안한다. 통신을 맺고 있던 Mobile Node가 Local Mobility Anchor 내 다른 Mobile Access Gateway의 범위로 이동할 경우 발생하는 핸드오버 상황에서 Correspondent Route Optimization 기법을 사용하여 signaling cost를 줄이는 방법을 제안한다. 제안한 Route Optimization 기법은 Correspondent Flag를 추가하여 Mobile Access Gateway 간 Corresponding Binding을 완료하여, Route Optimization을 설정한다. 제안한 Correspondent Route Optimization 기법은 기존의 기법보다 상호 데이터 전송 상황에서 Route Optimization에 필요한 메시지 수가 적기 때문에 시그널링 비용이 감소한다.

모바일 어플리케이션 개인정보 유출탐지 및 보안강화 연구 (Mobile Application Privacy Leak Detection and Security Enhancement Research)

  • 김성진;허준범
    • 정보보호학회논문지
    • /
    • 제29권1호
    • /
    • pp.195-203
    • /
    • 2019
  • 구글 플레이 스토어와 애플 앱 스토어 등 모바일 앱 스토어는 금융, 쇼핑, 엔터테인먼트 등 다양한 카테고리로 영역을 확장하고 있으며, 등록되어 있는 어플리케이션(이하 앱)만 수백만 개에 이른다. 하지만 휴대성과 편리성을 제공하는 모바일 앱의 보안 취약점으로 인해서 최근 모바일 앱을 통한 개인정보 및 데이터 유출이 급격히 증가되고 있는 상황이다. 본 논문에서는 국내 최대 규모의 사용자가 사용하는 상용 모바일 앱을 카테고리별로 분류하고, 사용자가 각 카테고리 별 모바일 앱을 사용하는 경우 유출될 수 있는 개인정보를 분석한다. 분석 결과 해당 앱들을 통해서 실시간으로 개인정보가 유출될 수 있음을 증명하고, 모바일 앱 사용자의 개인정보 유출방지와 안전한 사용을 위한 보안강화 방안을 제안한다.

The Prefetching Method in Mobile Environments

  • Yoo, Jin-Ah;Koh, Tea-Wook
    • Journal of the Korean Data and Information Science Society
    • /
    • 제17권4호
    • /
    • pp.1261-1270
    • /
    • 2006
  • This paper proposes a mobile computing prefetching method providing the effective information about location change of mobile user or mobile computing in mobile information services. For mobile computing environments, there exist restrictions as like low bandwidth, latency and traffic. To solve those problems, a variety of techniques have been developed including caching and prefetching. In this paper we present a Statistical Poisson Prefetching Scheme using the reference count to provide a mobile user information that will be likely referenced in the near future. Comparing to existing methods in numerical results, the proposed method improves the prefetching performance to give the maximum effectiveness and reduces the failure rate of information searching.

  • PDF