• Title/Summary/Keyword: Wireless Mobile Internet

Search Result 1,078, Processing Time 0.036 seconds

Security Vulnerability of Internet of Things and Its Solution (사물인터넷 보안 문제제기와 대안)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.69-78
    • /
    • 2015
  • Internet of Things(IoT) is electronic devices and household appliances use wireless sensor network in environment of high speed wireless network and LTE mobile service. The combination of the development of Internet and wireless network led to development of new forms of service such as electronic devices and household appliances can connect to the Internet through various sensors and online servers such as a Home Network. Even though Internet of Things is useful, there are problems in Internet of Things. In environment of Internet of Things, information leakage could happens by illegal eavesdropping and spoofing. Also illegal devices of wireless communication interference can cause interfere in Internet of things service, physical damage and denial of service by modulation of data and sensor. In this thesis, it will analyze security threats and security vulnerability in environment of mobile services and smart household appliances, then it will suggest plan. To solve security issues, it is important that IT and RFID sensor related companies realize importance of security environment rather than focus on making profit. It is important to develop the standardized security model that applies to the Internet of Things by security-related packages, standard certification system and strong encrypted authentication.

Multi-Agent System for Fault Tolerance in Wireless Sensor Networks

  • Lee, HwaMin;Min, Se Dong;Choi, Min-Hyung;Lee, DaeWon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.3
    • /
    • pp.1321-1332
    • /
    • 2016
  • Wireless sensor networks (WSN) are self-organized networks that typically consist of thousands of low-cost, low-powered sensor nodes. The reliability and availability of WSNs can be affected by faults, including those from radio interference, battery exhaustion, hardware and software failures, communication link errors, malicious attacks, and so on. Thus, we propose a novel multi-agent fault tolerant system for wireless sensor networks. Since a major requirement of WSNs is to reduce energy consumption, we use multi-agent and mobile agent configurations to manage WSNs that provide energy-efficient services. Mobile agent architecture have inherent advantages in that they provide energy awareness, scalability, reliability, and extensibility. Our multi-agent system consists of a resource manager, a fault tolerance manager and a load balancing manager, and we also propose fault-tolerant protocols that use multi-agent and mobile agent setups.

Analyses of Trend of Threat of Security in Internet of Things (사물 인터넷망에서의 보안 위협 기술 동향 분석)

  • Shin, Yoon-gu;Jung, Sungha;Do, Tahoon;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.895-896
    • /
    • 2015
  • With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely used in logistics, Smart devices security, intelligent building and o on. Bridging between wireless sensor networks with traditional communication networks or Internet, IoT gateway plays n important role in IoT applications, which facilitates the integration of wireless sensor networks and mobile communication networks or Internet, and the management and control with wireless sensor networks. The IoT Gateway is a key component in IoT application systems but It has lot of security issues. We analyzed the trends of security and privacy matters.

  • PDF

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

무선인터넷망 개방이 무선인터넷 시장에 미칠 영향 -소비자 후생과 컨텐츠공급자 수익을 중심으로-

  • 박은영;이호무;안병훈
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.222-225
    • /
    • 2001
  • Policy introducing open access to the wireless network has been under discussion in the Korean mobile telecommunications industry. The policy, which directs mobile operators to allow mobile portals other than their own ones to access their network and subscribers, is expected to vitalize mobile Internet market through competition among portals. This study analyzes the impact of the policy in terms of welfare of mobile Internet users and profit of mobile contents providers. We also cover the influence of mobile Internet fee on anticipated results of the policy

  • PDF

Game Theoretic Modeling for Mobile Malicious Node Detection Problem in Static Wireless Sensor Networks

  • Ho, Jun-Won
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.238-242
    • /
    • 2021
  • Game theory has been regarded as a useful theoretical tool for modeling the interactions between distinct entities and thus it has been harnessed in various research field. In particular, research attention has been shown to how to apply game theory to modeling the interactions between malign and benign entities in the field of wireless networks. Although various game theoretic modeling work have been proposed in the field of wireless networks, our proposed work is disparate to the existing work in the sense that we focus on mobile malign node detection problem in static wireless sensor networks. More specifically, we propose a Bayesian game theoretic modeling for mobile malign node detection problem in static wireless sensor networks. In our modeling, we formulate a two-player static Bayesian game with imperfect information such that player 1 is aware of the type of player 2, but player 2 is not aware of the type of player 1. We use four strategies in our static Bayesian game. We obtain Bayesian Nash Equilibria with pure strategies under certain conditions.

The Study on Purchase Intention of the Mobile Environment (모바일 환경에서 구매의도에 영향을 미치는 요인)

  • Lim, Gyu-Hong;Lee, Jong-Ho
    • The Journal of Information Systems
    • /
    • v.15 no.4
    • /
    • pp.189-209
    • /
    • 2006
  • The progress of mobile internet technologies has changed user access to information. The mobile internet allows to obtain contents and services from wireless networks via mobile devices. The purpose of this study is th find out important factors that influence on the customer purchase intention by mobile internet environment. Base on TAM(Technology Acceptance Model) and the latest literature, a comprehensive set of constructs and hypotheses were compiled with a methodology for testing them. We suggested five factors that effect purchase intention in mobile internet environment: Enjoyment Ease of use, Usefulness, Mobility, Trust To validate the research model, we collected data from cellular phone user using an online survey. The results of this study are as follows. First enjoyment ease of un, usefulness, and mobility had positive effects on trust. Second, Usefulness, ease of use, and trust had positive effects on purchase intention to use mobile internet. Third, enjoyment and mobility did not have positive effects on purchase intention to use mobile internet. Based on these results, we suggest marketing strategies.

  • PDF

The Network Externality In Korean Wireless Internet Market (무선 인터넷 시장의 네트워크 외부성 분석)

  • 정동헌;김성민
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.425-428
    • /
    • 2002
  • To understand and forecast the wireless internet market in Korea, we will analyse the network externalities in wireless internet market into communication network externalities and hardware/software network externalities. The wireless market has two competing streams, one is mobile internet and the other is wireless fan internet. Both are characterized by strong network externalities which lead to increasing return to stale. Mobile internet is supposed more suitable for communication and WLAN for data. However these two system will compete in some area, and the critical factor to deride the winner is supposed to be the network externalities as in so many other high-tech industries had showed.

  • PDF

Development of Mobile Contents for Self-Directed Learning in Wireless Internet (무선인터넷 환경에서 자기주도학습 모바일 콘텐츠 설계)

  • Kim, Dong-Seok;Shin, Pan-Seop
    • Journal of the Korea Computer Industry Society
    • /
    • v.8 no.1
    • /
    • pp.29-40
    • /
    • 2007
  • In this study, current status of technology and realities of usage on wireless Internet for educational applications were examined, and based on related studies and case analysis, 'Matrix OX Quiz' that can be applied at present time was designed and built. Main characteristics of this system are as below: Firstly, an attempt was made to achieve educational effect by offering educational contents that are suitable for wireless Internet era, breaking away form limitations on time and space with previous wired Internet. Secondly, mobile phone was selected as the wireless Internet terminal considering the current wireless Internet usage environment and technology, and improved convenience by supporting WAP form Markup language used by SK telecommunications with the most enrollment at present. Thirdly, self-directed learning capability of students can be improved through lessons utilizing wireless Internet. Especially, responsibilities for teaming can be increased through lessons utilizing wireless Internet, and abilities needed for solving immediate problems can be developed. Therefore, the educational contents built in this study should have sufficient educational effects if wireless Internet becomes widely spread and most students can easily use it in near future.

  • PDF

Implementation of a Mobile Agent Platform for Handheld Devices to Access the SNMP MIB (SNMP MIB 액세스를 위한 휴대단말기용 이동에이전트 플랫폼)

  • 전병국;김영철
    • Journal of Internet Computing and Services
    • /
    • v.3 no.2
    • /
    • pp.87-95
    • /
    • 2002
  • Due to rapid development of high speed wire/wireless internet technologies, at the current age, it cares into being one phenomenon that the internet business is able to work on anyplace and anytime. In this environment, a technology of mobile agent provides very useful mechanism for personal handheld devices because of supporting migration as autonomously executable software object Instead of users. Therefore, this paper focuses on Implementing a mobile agent platform for personal handheld devices, which supports mobile agents in wire/wireless internet environment. To do this, we construct the system with modified JAMAS, based on Java, in our previous research. Based on our proposed system, we implement the browsing application in personal handheld devices to access the MIB(Management Information Base) on SNMP(Simple Network Management Protocol), which supervises network environment on wire/wireless internet. This proposed application system is easily to access the MIB managed by SNMP agent. then provides network map viewer and updates the MIB through the browser to network administrator. As a result, we can support application area of mobile agents such as hare network management. M-Commerce, integration of remote database systems, active message and active network with personal handheld devices.

  • PDF