• 제목/요약/키워드: secure voice

검색결과 62건 처리시간 0.029초

사이버공격의 국가 경제적 손실분석 - 보이스 피싱을 중심으로 (Analysis on National Economic Loss of Cyber Attack: Voice Phishing Case)

  • 신진
    • 한국정보통신학회논문지
    • /
    • 제16권11호
    • /
    • pp.2341-2346
    • /
    • 2012
  • 보이스 피싱은 해독능력이 약한 노인과 약자를 대상으로 사회공학적인 방법을 이용하여 경제적 피해를 유발시킨다. 최근 인접국과 연계조직에 의한 보이스 피싱이 많은 국민에게 경제적 손실과 정신적 파탄을 야기하였고 대한민국 전체로 보더라도 보이스 피싱으로 인한 국가경제손실 및 정신적 피해는 매우 크다. 최근 정부와 관련기관들이 보이스 피싱을 막기위한 보안시스템과 금융보안장치를 강화하고 있으나 보안효과가 얼마나 큰가는 검증하기 쉽지 않다. 본 논문에서는 보이스 피싱으로 인한 대한민국의 경제적손실과 보안장치강화에 따른 보안효과의 경제성에 관하여 살펴본다. 우리나라의 보이스 피싱 피해의 직접 피해액은 1,100억 원으로 나타나고 있으며 철저한 보안에 따는 잠재적인 경제적 효과는 연간 3,500억 원 규모에 이른다고 볼 수 있다.

Voice Verification System for m-Commerce on CDMA Network

  • Kyung, Youn-Jeong
    • The Journal of the Acoustical Society of Korea
    • /
    • 제22권4E호
    • /
    • pp.176-182
    • /
    • 2003
  • As the needs for wireless Internet service is increasing, the needs for secure m-commerce is also increasing. Conventional security techniques are reinforced by biometric security technique. This paper utilized the voice as biometric security techniques. We developed speaker verification system for m-commerce (mobile commerce) via wireless internet and wireless application protocol (WAP). We named this system the mVprotek. We implemented the system as client-server architecture. The clients are mobile phone simulator and personal digital assistant (PDA). The verification results are obtained by integrating the mVprotek system with SK Telecom's code dimension multiple access (CDMA) system. Utilizing f-ratio weighting and virtual cohort model normalization showed much better performance than conventional background model normalization technique.

SIP 프로토콜을 기반으로한 VOIP 네트워크를 위한 Secure Framework (Secure Framework for SIP-based VoIP Network)

  • 한경헌;최성종;최동유;배용근
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2008년도 춘계종합학술대회 A
    • /
    • pp.295-297
    • /
    • 2008
  • Session Initiation Protocol (SIP) has become the call control protocol of choice for Voice over IP (VoIP) networks because of its open and extensible nature. However, the integrity of call signaling between sites is of utmost importance, and SIP is vulnerable to attackers when left unprotected. Currently a hop-by-hop security model is prevalent, wherein intermediaries forward a request towards the destination user agent server (UAS) without a user agent client (UAC) knowing whether or not the intermediary behaved in a trusted manner. This paper presents an integrated security model for SIP-based VoIP network by combining hop-by-hop security and end-to-end security.

  • PDF

ROSS: Low-Cost Self-Securing VoIP Communication Framework

  • Syafalni, Alfin;Samsudin, Azman;Jaafar, Yazid;Omar, Mohd. Adib
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제6권12호
    • /
    • pp.3366-3383
    • /
    • 2012
  • Reliance on the Internet has introduced Voice over Internet Protocol (VoIP) to various security threats. A reliable security protocol and an authentication scheme are thus required to prevent the aforementioned threats. However, an authentication scheme often demands additional cost and effort. Accordingly, a security framework for known participants in VoIP communication is proposed in this paper. The framework is known as Randomness-Optimized Self-Securing (ROSS), which performs authentication automatically throughout the session by optimizing the uniqueness and randomness of the communication itself. Elliptic Curve Diffie-Hellman (ECDH) key exchange and Salsa20 stream cipher are utilized in the framework correspondingly to secure the key agreement and the communication with low computational cost. Human intelligence supports ROSS authentication process to ensure participant authenticity and communication regularity. The results show that with marginal overhead, the proposed framework is able to secure VoIP communication by performing reliable authentication.

An Improved Authentication and Key Agreement scheme for Session Initial Protocol

  • Wu, Libing;Fan, Jing;Xie, Yong;Wang, Jing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권8호
    • /
    • pp.4025-4042
    • /
    • 2017
  • Session initiation protocol (SIP) is a kind of powerful and common protocols applied for the voice over internet protocol. The security and efficiency are two urgent requirements and admired properties of SIP. Recently, Hamed et al. proposed an efficient authentication and key agreement scheme for SIP. However, we demonstrate that Hamed et al.'s scheme is vulnerable to de-synchronization attack and cannot provide anonymity for users. Furthermore, we propose an improved and efficient authentication and key agreement scheme by using elliptic curve cryptosystem. Besides, we prove that the proposed scheme is provably secure by using secure formal proof based on Burrows-Abadi-Needham logic. The comparison with the relevant schemes shows that our proposed scheme has lower computation costs and can provide stronger security.

피난조명 및 음성경보 기능을 내장한 화재경보시스템 개발에 관한 연구 (A Study on the Development of Fire Alarm System with Evacuation Lighting and Voice Alarm Functions)

  • 이건호;최수길;김시국
    • 한국화재소방학회논문지
    • /
    • 제32권4호
    • /
    • pp.25-34
    • /
    • 2018
  • 본 논문은 피난조명 및 음성경보 기능을 내장한 화재경보시스템 개발에 관한 연구이다. 기존 화재감지기에 화재시 피난성능향상을 위해 가장 중요한 화재조기인지 및 피난시야확보가 가능하도록 피난조명 및 음성경보 기능을 자체적으로 내장한 화재감지기 및 시스템을 개발하여 성능을 확인하였다. 개발된 시스템의 경우 평균조도가 1.62 lx, 평균음향 89.7 dB, 평균음성 86.1 dB로 형식승인 및 제품검사 기술기준을 만족하는 것으로 나타났다. 추가적으로 개발된 시스템을 이용한 피난성능실험결과 본 실험조건에서 기존시스템보다 63.08%에서 67.82%까지 피난시간이 단축되는 것으로 나타났다. 개발된 시스템의 경우 자체 음성경보를 통해 화재인지 실패를 방지하고, 비상조명 점등을 통해 최소한의 피난을 위한 가시거리를 제공함으로써 화재피해를 최소화할 수 있고, 화재취약계층인 청각장애인 및 시각장애인까지 고려함으로써 당위성 및 효용성을 갖춘 화재경보시스템으로 활용될 것으로 생각된다.

Legacy Radio 기반의 전술데이터 통신 효율성 향상 위한 데이터 압축 기법 (The Data Compression Method for increase of Efficiency in Tactical Data Communication over Legacy Radios)

  • 심동섭;신웅희;김기형
    • 한국군사과학기술학회지
    • /
    • 제13권4호
    • /
    • pp.577-585
    • /
    • 2010
  • The Military Tactical Communication technology for effective network-centric warfare is developing. Targeting broadband wireless transmission, core technology for connection, and Transmission technology that secure survivability under High-speed Movement environment. On the one hand, Tactical data communication system that reflects military characteristic is developing on the base of Legacy communication equipment which is used in the field. Because almost every military units in the field have used voice to communicate which lower efficiency of operation, they have made effort to Substitute voice communication which delays military Operation Tempo to digital communication. The Communications environment of troops in Forward edge of battle field area is very poor. Especially in terms of limited frequency allocation and bandwidth. Therefore, improving the efficiency of frequency is essential for Military Tactical Communication. This paper is about The Data Compression Method for increase of Efficiency in Tactical Data Communication over Legacy Radios which are UHF, VHF, HF Radio. I proposed and proved the most efficient Data Compression Method that reflects military characteristic, after analyzing the experimentation, which simulate CAS(Close Air Support mission) data transmission between Pilot and TACP.

Determining Personal Credit Rating through Voice Analysis: Case of P2P loan borrowers

  • Lee, Sangmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권10호
    • /
    • pp.3627-3641
    • /
    • 2021
  • Fintech, which stands for financial technology, is growing fast globally since the economic crisis hit the United States in 2008. Fintech companies are striving to secure a competitive advantage over existing financial services by providing efficient financial services utilizing the latest technologies. Fintech companies can be classified into several areas according to their business solutions. Among the Fintech sector, peer-to-peer (P2P) lending companies are leading the domestic Fintech industry. P2P lending is a method of lending funds directly to individuals or businesses without an official financial institution participating as an intermediary in the transaction. The rapid growth of P2P lending companies has now reached a level that threatens secondary financial markets. However, as the growth rate increases, so does the potential risk factor. In addition to government laws to protect and regulate P2P lending, further measures to reduce the risk of P2P lending accidents have yet to keep up with the pace of market growth. Since most P2P lenders do not implement their own credit rating system, they rely on personal credit scores provided by credit rating agencies such as the NICE credit information service in Korea. However, it is hard for P2P lending companies to figure out the intentional loan default of the borrower since most borrowers' credit scores are not excellent. This study analyzed the voices of telephone conversation between the loan consultant and the borrower in order to verify if it is applicable to determine the personal credit score. Experimental results show that the change in pitch frequency and change in voice pitch frequency can be reliably identified, and this difference can be used to predict the loan defaults or use it to determine the underlying default risk. It has also been shown that parameters extracted from sample voice data can be used as a determinant for classifying the level of personal credit ratings.

Auto-Focusing 미세부품 Yoke 조립 자동화 모듈 개발 (Development of automatic assembly module for yoke parts in auto-focusing actuator)

  • 하석재;박정연;박규섭;윤길상
    • Design & Manufacturing
    • /
    • 제13권1호
    • /
    • pp.55-60
    • /
    • 2019
  • Smart-phone in the recently released high-end applied to the camera module is equipped with the most features auto focusing camera module. Also, auto focusing camera module is divided into voice coil motor, encoder, and piezo according to type of motion mechanism. Auto focusing camera module is composed of voice coil motor (VCM) as an actuator and leaf spring as a guide and suspension. VCM actuator is made of magnet, yoke as a metal, and coil as a copper wire. Recently, the assembly as yoke and magnet is made by human resources. These process has a long process time and it is difficult to secure quality. Also, These process is not economical in cost, and productivity is reduced. Therefore, an automatic assembly as yoke and magnet is needed in the present process. In this paper, we have developed an automatic assembly device that can automatically assemble yoke and magnet, and performed verifying performance. Therefore, by using the developed automatic assembly device, it is possible to increase the productivity and reduce the production cost.

이기종 전술통신망 종단간 암호화 통신을 위한 메커니즘 (A mechanism for end-to-end secure communication in heterogeneous tactical networks)

  • 박철용;김기홍;류재철
    • 정보보호학회논문지
    • /
    • 제24권4호
    • /
    • pp.625-634
    • /
    • 2014
  • 전술통신망은 이기종 다양한 특성의 통신장비로 구성된 네트워크가 복합적으로 운용되고 있다. 이러한 구성으로 인해 종단간 통신을 위해 기종별 데이터 포맷으로 변환하기 위한 망연동 게이트웨이를 적용하고 통신 정보보호를 위해 네트워크별 암호기술이 적용되고 있다. 이는 이기종 망간 암호화된 데이터를 직접 전송할 수 없고 통신데이터의 재가공 및 처리지연의 문제점이 있다. 서로 다른 전술통신망 사이에 위치하는 망연동 게이트웨이에서 통신데이터에 대한 재가공과 암호화 데이터에 대한 복호화 및 재암호화가 요구된다. 본 논문에서는 전술통신망에서 이기종간 종단간 암호화 통신을 위한 통신방식을 제안한다. 제안한 방식을 이용하여 PSTN과 UHF 통신망간 게이트웨이에서 재가공, 재암호화, 전송 지연요소 등을 없애 실시간 음성 및 데이터 통신을 가능하게 한다. 또한, 종단간 정보보호를 위해 단대단 정보보호방식을 적용한다. 이를 통신망에 적용하여 기존 방식 대비 제안한 방식의 성능을 비교 분석한다. 제안한 방식은 기존방식의 문제점을 해결하고 이기종 전술통신망간 종단간 암호화 통신이 가능함을 확인하였다.