• Title/Summary/Keyword: mobile techniques

Search Result 1,064, Processing Time 0.025 seconds

Mobile Smishing 해킹 동향 분석 및 보안대책 (Analysis of Mobile Smishing Hacking Trends and Security Measures)

  • 박대우
    • 한국정보통신학회논문지
    • /
    • 제19권11호
    • /
    • pp.2615-2622
    • /
    • 2015
  • 스마트폰 태블릿 PC와 같은 모바일 장치를 이용하여 인터넷뱅킹과 전자상거래는 물론 본인의 업무까지 처리하고 있다. 모바일 기기의 가용성과 편리성은 높아가고 있지만, SNS나 문자 이메일을 이용한 Smishing 금융사기사건과 개인정보유출 등 범죄사건도 많이 발생하고 있다. 스마트폰에서 Smishing 사고는 2013년부터 급격하게 증가되어 MERS 감염 사건, 지뢰도발 사건, 추석의 택배 등의 사회공학적 방법을 이용하여 교묘하게 발생하고 있다. 본 논문에서는 2014년 이후의 모바일 장치에서의 Smishing 해킹 동향을 분석한다. 사회적 이슈와 관련하여, 모바일 사용자들에게 금융사기로 이어지는 Smishing 해킹 공격의 프로세스를 분석한다. 그리고, Mobile Smishing 해킹에 대한 보안 방법과 금융 피해의 대책을 제시한다.

모바일 IPTV 환경에 적합한 DCAS 보안 프레임워크 연구 (A Study on DCAS Security Framework Model for Mobile IPTV)

  • 최중영;조관태;임종인
    • 정보보호학회논문지
    • /
    • 제21권1호
    • /
    • pp.105-116
    • /
    • 2011
  • 모바일 IPTV는 무선 인터넷 망을 이용하여 IPTV의 양방향 서비스에 이동성을 함께 제공함으로써 사용자의 편의를 증대시킬 수 있는 기술이다. 이러한 모바일 IPTV 서비스는 더욱 많은 수요를 불러올 것으로 예상되는데, 성공적인 사업화와 서비스 활성화를 위해서는 무선 환경과 모바일 통신단말기를 이용한 콘텐츠 보호 등 다양한 기술적 이슈를 해결해야 한다. 본 논문에서는 모바일 IPTV 특성과 모바일 IPTV 서비스를 위한 보안 요구사항을 살펴보고, 그에 따라 요구되는 콘텐츠 보안의 문제점들을 살펴보고자 한다. 또한 이를 해결하기 위한 모바일 IPTV환경에서 DCAS 보안 프레임워크 모델을 제시하고, 기존 DCAS에 비하여 개선된 사항을 평가한다.

소형 이동 로봇의 사람 추적 성능 개선을 위한 휠 오도메트리 기반 실시간 보정에 관한 연구 (Real-Time Correction Based on wheel Odometry to Improve Pedestrian Tracking Performance in Small Mobile Robot)

  • 박재훈;안민성;한재권
    • 로봇학회논문지
    • /
    • 제17권2호
    • /
    • pp.124-132
    • /
    • 2022
  • With growth in intelligence of mobile robots, interaction with humans is emerging as a very important issue for mobile robots and the pedestrian tracking technique following the designated person is adopted in many cases in a way that interacts with humans. Among the existing multi-object tracking techniques for pedestrian tracking, Simple Online and Realtime Tracking (SORT) is suitable for small mobile robots that require real-time processing while having limited computational performance. However, SORT fails to reflect changes in object detection values caused by the movement of the mobile robot, resulting in poor tracking performance. In order to solve this performance degradation, this paper proposes a more stable pedestrian tracking algorithm by correcting object tracking errors caused by robot movement in real time using wheel odometry information of a mobile robot and dynamically managing the survival period of the tracker that tracks the object. In addition, the experimental results show that the proposed methodology using data collected from actual mobile robots maintains real-time and has improved tracking accuracy with resistance to the movement of the mobile robot.

A Mobile Robot for Nuclear Power Plant Applications

  • Kim, Chang-Hoi;Seo, Yong-Chil;Cho, Jai-Wan;Choi, Young-Soo;Kim, Seung-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.803-807
    • /
    • 2003
  • Tele-operation and remote monitoring techniques are essential and important technologies for performing the inspection and repair tasks effectively in nuclear power plants. This paper presents the application of a mobile robot for the remote monitoring and inspection of the Calandria faces, where human access is limited because of the high-level radioactive environments during full power operation. The mobile robot was designed with reconfigurable crawler type of wheels attached on the front and rear side in order to pass through the ditch. The extendable mast, mounted on the mobile robot, can be extended up to 8 m vertically. This robot was also equipped a visible CCD/thermal infrared inspection head module and a stereo camera module for the enhancement of visual inspection.

  • PDF

Analytic Model for Optimal Checkpoints in Mobile Real-time Systems

  • Lim, Sung-Hwa;Lee, Byoung-Hoon;Kim, Jai-Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권8호
    • /
    • pp.3689-3700
    • /
    • 2016
  • It is not practically feasible to apply hardware-based fault-tolerant schemes, such as hardware replication, in mobile devices. Therefore, software-based fault-tolerance techniques, such as checkpoint and rollback schemes, are required. In checkpoint and rollback schemes, the optimal checkpoint interval should be applied to obtain the best performance. Most previous studies focused on minimizing the expected execution time or response time for completing a given task. Currently, most mobile applications run in real-time environments. Therefore, it is extremely essential for mobile devices to employ optimal checkpoint intervals as determined by the real-time constraints of tasks. In this study, we tackle the problem of determining the optimal inter-checkpoint interval of checkpoint and rollback schemes to maximize the deadline meet ratio in real-time systems and to build a probabilistic cost model. From this cost model, we can numerically find the optimal checkpoint interval using mathematical tools. The performance of the proposed solution is evaluated using analytical estimates.

모바일 GIS를 활용한 도로시설물 DB 구축의 효율성 향상 (The Improvement of the Road Facility Database Creation Using a Mobile GIS)

  • 이현직;박은관;용민;최동주
    • 한국측량학회:학술대회논문집
    • /
    • 한국측량학회 2004년도 추계학술발표회 논문집
    • /
    • pp.373-380
    • /
    • 2004
  • GIS was introduced to spatial information of complex and various facility systematically and scientifically. And, recently, new trend has been spread by Mobile GIS owing to its fast development of information and communication technology However, these Mobile GIS techniques were introduced in maintenances of various facilities. Due to its mismanagement, the use became insufficient in facilities causing database creation to require realism and mobility. Therefore, in this research, to road facility of various facilities, it deduced improving the work process by using a Mobile GIS to analyze work process of the road facility database creation. And, through an experiment, by comparing and analyzing road facilities database creation process by existing method and improving method, could improvement of road facility database creation using a Mobile GIS.

  • PDF

Study of Eye Blinking to Improve Face Recognition for Screen Unlock on Mobile Devices

  • Chu, Chung-Hua;Feng, Yu-Kai
    • Journal of Electrical Engineering and Technology
    • /
    • 제13권2호
    • /
    • pp.953-960
    • /
    • 2018
  • In recently, eye blink recognition, and face recognition are very popular and promising techniques. In some cases, people can use the photos and face masks to hack mobile security systems, so we propose an eye blinking detection, which finds eyes through the proportion of human face. The proposed method detects the movements of eyeball and the number of eye blinking to improve face recognition for screen unlock on the mobile devices. Experimental results show that our method is efficient and robust for the screen unlock on the mobile devices.

The CDMA Mobile System Architecture

  • Shin, Sung-Moon;Lee, Hun;Han, Ki-Chul
    • ETRI Journal
    • /
    • 제19권3호
    • /
    • pp.98-115
    • /
    • 1997
  • The architecture of the CDMA mobile system (CMS) is developed based on three function groups - service resource, service control, and service management groups. In this paper, the CMS architecture is discussed from the point of view of implementing these functions. The variable length packets are used for transmission. The synchronization clock signals are derived form the GPS receiver. The open loop and closed loop techniques are used for the power control. The internationally accepted signaling and network protocols are employed. The call control for the primary services in designed to provide efficient mobile telecommunication services. The softer handoff is implemented in one card. The mobile assisted handoff and the network assisted handoff are employed in the soft and hard handoffs. The authentication is based on the secret data which includes random numbers. The management functions, which include the location management, resource management, cell boundary management and OAM management, are implemented to warrant the system efficiency, maximum capacity and high reliability. The architecture ensures that the CMS is flexible and expandable to provide subscribers with economic and efficient system configuration. The dynamic power control, adaptive channel allocation. and dynamic cell boundary management are recommended for future work.

  • PDF

모바일 환경에서 멀티미디어 서비스를 위해 개선된 핸드오프 기법 (An Improved Handoff Technique for Multimedia Services in mobile environment)

  • 김정원
    • 한국컴퓨터정보학회논문지
    • /
    • 제10권3호
    • /
    • pp.219-227
    • /
    • 2005
  • 모바일 환경에서 멀티캐스트는 패킷 전달 기법과 위치 독립적 주소를 사용하는데 본 논문에서는 멀티캐스트의 그룹 관리 및 경로 설정 방법을 이용하여 이동성을 제공하는 기법과 선가입을 통해 멀티미디어 서비스를 위한 smooth 핸드오프 기법을 제안한다. 제안된 기법은 호스트의 이동 방향 예측을 통한 선가입 기법을 이용하여 멀티미디어 서비스시 핸드오프로 인한 지연을 최소화할 수 있다. NS-2 네트워크 모의실험 프로그램을 확장하여 실험하였는데 실험 결과 제안된 기법이 이동성을 지원하는 여러 기법들보다 핸드오프 지연과 수신되는 데이터의 처리량에서 우수한 성능을 나타내었다.

  • PDF

Review of Biometrics-Based Authentication Techniques in Mobile Ecosystem

  • Al-Jarba, Fatimah;Al-Khathami, Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • 제21권11호
    • /
    • pp.321-327
    • /
    • 2021
  • Mobile devices have recently developed to be an integral part of humans' daily lives because they meet business and personal needs. It is challenging to design a feasible and effective user authentication method for mobile devices because security issues and data privacy threats have significantly increased. Biometric approaches are more effective than traditional authentication methods. Therefore, this paper aims to analyze the existing biometric user authentication methods on mobile platforms, particularly those that use face recognition, to demonstrate the methods' feasibility and challenges. Next, this paper evaluates the methods according to seven characteristics: universality, uniqueness, permanence, collectability, performance, acceptability, and circumvention. Last, this paper suggests that solely using the method of biometric authentication is not enough to identify whether users are authentic based on biometric traits.