• Title/Summary/Keyword: Mobile technology

Search Result 6,583, Processing Time 0.034 seconds

A Study on Security Technology using Mobile Virtualization TYPE-I (모바일 가상화 TYPE-I을 이용한 보안 기술 연구)

  • Kang, Yong-Ho;Jang, Chang-Bok;Kim, Joo-Man
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.1-9
    • /
    • 2015
  • Recently, with smart device proliferation and providing the various services using this, they have interested in mobile and Smart TV security. Smartphone users are enjoying various service, such as cloud, game, banking. But today's mobile security solutions and Study of Smart TV Security simply stays at the level of malicious code detection, mobile device management, security system itself. Accordingly, there is a need for technology for preventing hacking and leakage of sensitive information, such as certificates, legal documents, individual credit card number. To solve this problem, a variety of security technologies(mobile virtualization, ARM TrustZone, GlobalPlatform, MDM) in mobile devices have been studied. In this paper, we propose an efficient method to implement security technology based on TYPE-I virtualization using ARM TrustZone technology.

A Probabilistic Approach for Mobile Robot Localization under RFID Tag Infrastructures

  • Seo, Dae-Sung;Won, Dae-Heui;Yang, Gwang-Woong;Choi, Moo-Sung;Kwon, Sang-Ju;Park, Joon-Woo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1797-1801
    • /
    • 2005
  • SLAM(Simultaneous localization and mapping) and AI(Artificial intelligence) have been active research areas in robotics for two decades. In particular, localization is one of the most important issues in mobile robot research. Until now expensive sensors like a laser sensor have been used for the mobile robot's localization. Currently, as the RFID reader devices like antennas and RFID tags become increasingly smaller and cheaper, the proliferation of RFID technology is advancing rapidly. So, in this paper, the smart floor using passive RFID tags is proposed and, passive RFID tags are mainly used to identify the mobile robot's location on the smart floor. We discuss a number of challenges related to this approach, such as RFID tag distribution (density and structure), typing and clustering. In the smart floor using RFID tags, because the reader just can senses whether a RFID tag is in its sensing area, the localization error occurs as much as the sensing area of the RFID reader. And, until now, there is no study to estimate the pose of mobile robot using RFID tags. So, in this paper, two algorithms are suggested to. We use the Markov localization algorithm to reduce the location(X,Y) error and the Kalman Filter algorithm to estimate the pose(q) of a mobile robot. We applied these algorithms in our experiment with our personal robot CMR-P3. And we show the possibility of our probability approach using the cheap sensors like odometers and RFID tags for the mobile robot's localization on the smart floor.

  • PDF

Smart Device Security Technology for Cyber Defense (사이버 국방을 위한 스마트 단말 보안기술)

  • Son, Iek-Jae;Kim, Il-Ho;Yang, Jong-Hyu;Lee, Nam-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.10
    • /
    • pp.986-992
    • /
    • 2012
  • As the utilization of smart mobile devices such as smartphones increases, the desire to utilize such devices to control and monitor combat situations also arises. As smart mobile devices with various ICT get integrated with various weaponry system, a new phase of future warfare can be introduced. Moreover, smartphone-based real-time information technology for joint battle command system will be converged with surveillance control to become a leading example of convergence of cyber defense and information technology. Furthermore, mobile device security technology ideal for mobile wireless network environments can be applied to military robots. The following paper will give an overview of smart mobile device usage used for military purposes in battle command system, various security threats and the mobile device security technology to correspond to such security threats.

Blockchain Technology for Mobile Applications Recommendation Systems (모바일앱 추천시스템과 블록체인 기술)

  • Umekwudo, Jane O.;Shim, Junho
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.3
    • /
    • pp.129-142
    • /
    • 2019
  • The interest in the blockchain technology has been increasing since its inception and it has been applied to many fields and sectors. The blockchain technology creates a decentralized environment where no third party controls the data and transaction. Mobile apps recommendation has been extensively used to recommend apps to mobile users. For example, Android-based recommendation applications have been developed to recommend other mobile apps for download depending on user's preferences and mobile context. These recommendations help users discover apps by referring to the experiences of other users. Due to the collection of a large amount of data and user information, there is a problem of insecurity and user's privacy that are prone to be attacked. To address this issue the blockchain technology can be incorporated to assure cryptographic safety. In this paper, we present a survey of the on-going mobile app recommendations and e-commerce technology trend to address how the blockchain can be incorporated into the collaborative filtering recommendation systems to enable the users to set up a secured data, which implies the importance of user privacy preference on personalized app recommendations.

Implementation of Context-Aware Services Platform Supporting Mobile Agents

  • Kim, Jung-Rae;Huh, Jae-Doo
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.225-228
    • /
    • 2005
  • A context-aware services platform supporting mobile agents consists of sensor nodes and a sensor coordinator. Sensor nodes collect environmental information and transmit the collected information to the sensor coordinator through wireless sensor networks. The sensor coordinator passes the information to the context-aware service module, and the mobile agent. The context-aware service module or the mobile agent performs services suitable for a user's situation based on the environmental information and a service actuation message is delivered to an actuation node through the sensor coordinator. In this paper, we present a context-aware services platform structure employed in our project, and describe context-aware services platform interfaces with a context-aware service module and mobile agents.

  • PDF

A Study of Security Vulnerability by Cloning 2G(GSM) SIM Card in China (중국 2G(GSM) SIM카드 복제로 인한 보안 취약성 연구)

  • Kim, Wan-Soo;Kim, Shik
    • The Journal of Information Technology
    • /
    • v.12 no.2
    • /
    • pp.1-12
    • /
    • 2009
  • China first started its mobile phone services in 1987, and the number of users has exponentially increased so that it reached 700 millions in January 2009. Currently China's 2G(GSM) users is 650 millions. These 2G (GSM) services have an advantage of the capability to use the mobile phone with a SIM (Subscriber Identity Modul) card, one kind of smart cards, inserted into it. However, due to the security vulnerability of SIM cards being used within China's 2G (GSM) services, SIM cards cloning. Problems concerning mobile phone surveillance towards a designated person by illegal cloning ESN and IMSI have recently risen to be a massive social issue within Korea as well. These studies have experimented the possibility of SIM cards clone in various mobile communication corporations using 2G (GSM) in China, and hence discovered the security vulnerability such as the incoming outgoing, SMS service and additional services on mobile phones using clone SIM cards.

  • PDF

A Multi-Agent Approach to Context-Aware Optimization for Personalized Mobile Web Service (상황인지 기반 최적화가 가능한 개인화된 모바일 웹서비스 구축을 위한 다중에이전트 접근법에 관한 연구)

  • Kwon Oh-byung;Lee Ju-chul
    • Korean Management Science Review
    • /
    • v.21 no.3
    • /
    • pp.23-38
    • /
    • 2004
  • Recently the usage of mobile devices which enable the accessibility to Internet has been dramatically increased. Most of the mobile services, however, so far tend to be simple such as infotainment service. In order to fully taking advantage of wireless network and corresponding technology, personalized web service based on user's context could be needed. Meanwhile, optimization techniques have been vitally incorporated for optimizing the development and administration of electronic commerce. However, applying context-aware optimization mechanism to personalized mobile services is still very few. Hence, the purpose of this paper is to propose a methodology to incorporate optimization techniques into personalization services. Multi agent-based web service approach is considered to realize the methodology. To show the feasibility of the methodology proposed in this paper, a prototype system, CAMA-myOPt(Context-Aware Multi-Agent system for my Optimization), was implemented and adopted in mobile comparative shopping.

A Heuristic Algorithm for Designing Near-Optimal Mobile Agent Itineraries

  • Gavalas Damianos
    • Journal of Communications and Networks
    • /
    • v.8 no.1
    • /
    • pp.123-131
    • /
    • 2006
  • Several distributed architectures, incorporating mobile agent technology, have been recently proposed to answer the scalability limitations of their centralized counterparts. However, these architectures fail to address scalability problems, when distributed tasks requiring the employment of itinerant agents is considered. This is because they lack mechanisms that guarantee optimization of agents' itineraries so as to minimize the total migration cost in terms of the round-trip latency and the incurred traffic. This is of particular importance when MAs itineraries span multiple subnets. The work presented herein aspires to address these issues. To that end, we have designed and implemented an algorithm that adapts methods usually applied for addressing network design problems in the specific area of mobile agent itinerary planning. The algorithm not only suggests the optimal number of mobile agents that minimize the overall cost but also constructs optimal itineraries for each of them. The algorithm implementation has been integrated into our mobile agent framework research prototype and tested in real network environments, demonstrating significant cost savings.

Children's Mobile Phone Use and Dosimetry

  • Lee, Ae-Kyoung;Kwon, Jong-Hwa
    • Journal of electromagnetic engineering and science
    • /
    • v.15 no.3
    • /
    • pp.167-172
    • /
    • 2015
  • Research results on possible effects caused by radiofrequency fields in children are limited because most of the studies published so far have focused on adults, rather than children. Mobile phone use is now widespread, even among younger children. If a biological risk due to mobile phone exposure is found, it might be greater in children because their bodies might be more sensitive to radiofrequency energy. The issue of a possible difference in sensitivity between adults and children begins with whether any difference exists physically in terms of electromagnetic absorption. This paper presents a review of recent publications on dosimetric comparisons between children and adults with respect to radiation from mobile phones. The issue of the health effects of mobile phone use is beyond the scope of the present review. Most of the dosimetry research on possible differences in power absorption between children and adults has been based on numerical modeling and analysis. The understanding of the results so far is presented and needed studies are described.

Design and Implementation of Security Integration Framework for Secure Mobile RFID Service Network (안전한 모바일 RFID 서비스 네트워크를 위한 보안 통합 프레임워크의 설계 및 구현)

  • Park, Nam-Je;Chung, Kyo-Il
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.63-64
    • /
    • 2008
  • The mobile RFID (Radio Frequency Identification) is a new application to use mobile phone as RFID reader with a wireless technology and provides new valuable services to user by integrating RFID and ubiquitous sensor network infrastructure with mobile communication and wireless internet. However, there are an increasing number of concerns, and even some resistances, related to consumer tracking and profiling using RFID technology. Therefore, in this paper, we describe the security analysis and implementation leveraging globally networked mobile RFID services which complies with the Korea's mobile RFID forum standard.

  • PDF