Design of Context-Aware based Information Prevention Sungmo Jung 1, Younsam Chae 2, Jonghun Shin 2, Uyeol Baek 2, Seoksoo Kim ∗ 1, * Department of Multimedia,

Slides:



Advertisements
Similar presentations
Troy Leach April 2012 The PCI Security Standards Council.
Advertisements

 The Citrix Application Firewall prevents security breaches, data loss, and possible unauthorized modifications to Web sites that access sensitive business.
Reference: [1] TeamSpace paper
New Technologies Are Surfacing Everyday. l Some will have a dramatic affect on the business environment. l Others will totally change the way you live.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
Smart Learning Services Based on Smart Cloud Computing
Chapter 10: Authentication Guide to Computer Network Security.
Context Awareness System and Service SCENE JS Lee 1 Energy-Efficient Rate-Adaptive GPS-based Positioning for Smartphones.
Introduction Due to the recent advances in smart grid as well as the increasing dissemination of smart meters, the electricity usage of every moment in.
A Taxonomy of Network and Computer Attacks Simon Hansman & Ray Hunt Computers & Security (2005) Present by Mike Hsiao, S. Hansman and R. Hunt,
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Introduction to the Mobile Security (MD)  Chaitanya Nettem  Rawad Habib  2015.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
Seung-Hoon Lee, Sewook Jung, Alexander Chang, Dea-Ki Cho, and Mario Gerla Network Research Lab Department of Computer Science University of California,
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
1 Lecture 1: Introduction to Artificial Intelligence.
Enforcing Cyber security in Mobile Applications – Public Sector Use Case SAPHINA MCHOME, VIOLA RUKIZA TANZANIA REVENUE AUTHORITY INFORMATION AND COMMUNICATION.
REDACTION BASED ATM MONITORING SYSTEM USING MSP 430
Srinivas Cheekati( ) Instructor: Dr. Dong-Chul Kim
Design of On-Demand Analysis for Cloud Service Configuration using Related-Annotation Hyogun Yoon', Hanku Lee' 2 `, ' Center for Social Media Cloud Computing,
Development of a Software Renderer for utilizing 3D Contents on a 2D-based Mobile System Sungkwan Kang 1, Joonseub Cha 2, Jimin Lee 1 and Jongan Park 1,
Longitudinal Motion Characteristics between a Non- Matched Piezoelectric Sensor and Actuator Pair Young-Sup Lee Department of Embedded Systems Engineering,
A Study of Secure Communications in WiFi Networks Bumjo Park 1 and Namgi Kim 11 1 Dept. Of Computer Science, Kyonggi Univ. San 94-1, Iui, Yeongtong, Suwon,
Advanced Science and Technology Letters Vol.32 (Architecture and Civil Engineering 2013), pp A Preliminary.
Advanced Science and Technology Letters Vol.106 (Information Technology and Computer Science 2015), pp.17-21
Handovers in Hierarchical Multi-tier Systems Seungjae Shin 1, Min Choi 2, and Namgi Kim 31 1 Dept. Of Computer Science, KAIST, Korea
Essential Customization for Moodle Adoption in School Jeong Ah Kim', SunKyun Park 1 ' 2 Computer Education Department, Kwandong University, KOREA
Effect Analysis of Electric Vehicle Charging to Smart Grid with Anti-Islanding Method Bum-Sik Shin, Kyung-Jung Lee, Sunny Ro, Young-Hun Ki and Hyun-Sik.
Time-Space Trust in Networks Shunan Ma, Jingsha He and Yuqiang Zhang 1 College of Computer Science and Technology 2 School of Software Engineering.
Advanced Science and Technology Letters Vol.43 (Multimedia 2013), pp A Study on Improvements of Electric.
An Adaptive Load Balancing Management for Distributed Virtual Environment Systems Yuanxing Yao 1, Tae-Hyung Kim 1, 1 Department of Computer Science and.
HTML5 based Notification System for Updating E-Training Contents Yu-Doo Kim 1 and Il-Young Moon 1 1 Department of Computer Science Engineering, KoreaTech,
Enhanced MAC Protocol to reduce latency in Wireless Sensor Network Myungsub Lee 1, Changhyeon Park 2 1 Department of Computer Technology, Yeungnam College.
Advanced Science and Technology Letters Vol.30 (ICCA 2013), pp A Review of Friis Equation Based Indoor.
Interactive Mirror System based on Personal Purchase Information Donghyun Kim 1, Younsam Chae 2, Jonghun Shin 2, Uyeol Baek 2, Seoksoo Kim * 1,* Dept of.
Advanced Science and Technology Letters Vol.28 (EEC 2013), pp Histogram Equalization- Based Color Image.
Applicability Analysis of Software Testing for Actual Operating Railway Software Jong-Gyu Hwang 1, Hyun-Jeong Jo 1, Baek-Hyun Kim 1, Jong-Hyun Baek 1 1.
A Framework with Behavior-Based Identification and PnP Supporting Architecture for Task Cooperation of Networked Mobile Robots Joo-Hyung Kiml, Yong-Guk.
The Study on the Car Mechanics e-Training AR(Augmented Reality) System for Real-time Augmented Contents Ji-Yean Yoon,1, Dong-Jin Kim 1, Yu-Doo Kim 1 and.
Advanced Science and Technology Letters Vol.46 (Mobile and Wireless 2014), pp University Dedicated Next.
Robot Velocity Based Path Planning Along Bezier Curve Path Gil Jin Yang, Byoung Wook Choi * Dept. of Electrical and Information Engineering Seoul National.
A Design of Electronic Payment Authentication Method based on NFC Smartphone Seolhwa Han, Okkyung Choi*, Kangseok Kim, Hongjin Yeh, Taesik Shon Dept. of.
Advanced Science and Technology Letters Vol.54 (Networking and Communication 2014), pp Priority-based.
BLFS: Supporting Fast Editing/Writing for Large- Sized Multimedia Files Seung Wan Jung 1, Seok Young Ko 2, Young Jin Nam 3, Dae-Wha Seo 1, 1 Kyungpook.
Advanced Science and Technology Letters Vol.54 (Networking and Communication 2014), pp Efficient Duplicate.
Gaia Ubiquitous Computing Directions Roy Campbell University of Illinois at Urbana-Champaign.
ARM and GPS Based Transformer monitoring system with area Identification Student Name USN NO Guide Name H.O.D Name Name Of The College & Dept.
Low Power Sensing Algorithm based on Context Aware Seong-Joong Kim', Hae-Moon Seo', Woo-Chool Park', Youn-Sung Lee', Seung- Han Kim', Jin-Kyu Lee', and.
Adaptive Roaming between LTE and Wi-Fi 1 Daeguil Science high school, Daegu, Republic of Korea. 2 Daegu Gyeongbuk Institute of Science and Technology,
Jenny Knackmuß, Thomas Möller, Wilfried Pommerien & Reiner Creutzburg Brandenburg University of Applied Sciences, IT- and Media Forensics Lab, P.O.Box.
A Classification for Access Control List To Speed Up Packet-Filtering Firewall CHEN FAN, LONG TAN, RAWAD FELIMBAN and ABDELSHAKOUR ABUZNEID Department.
Advanced Science and Technology Letters Vol.53 (AITS 2014), pp An Improved Algorithm for Ad hoc Network.
Advanced Science and Technology Letters Vol.46 (Games and Graphics 2014), pp On Study of the Volumetric.
The Design of Smart RFID Tag System for Food Poisoning Index Monitoring Chang Won Lee 1.1, Nghia Truong Van 1, Kyung Kwon Jung 2, Joo Woong Kim 1, Woo.
Augmented Reality Services based on Embedded Metadata Byoung-Dai Lee Department of Computer Science, Kyonggi University, Suwon, Korea Abstract.
The Design of Smart Management System for Unmanned Clothing Stores Lin Sen ',', Chang Won Lee 2, Kyung Kwon Jung 3, Won Gap Choi 2 and Ki-Hwan Eom 2 '
Food Distribution Management System with the Smart RFID-PH Sensor Tag Chang Won Lee 1,1, So Young Park 1, Joo woongKim 1 and Ki-Hwan Eom 1 1 Department.
Advanced Science and Technology Letters Vol.47 (Healthcare and Nursing 2014), pp Design of Roof Type.
Jong-Gyu Hwang1, Hyun-Jeong Jo1 , Baek-Hyun Kim1, Jong-Hyun Baek1
Firewalls.
Grid with Anti-Islanding Method
HTML5 based Notification System for Updating
Seunghui Cha1, Wookhyun Kim1
Aziz Nasridinov and Young-Ho Park*
Il-Kyoung Kwon1, Sang-Yong Lee2
Study of Optical Interface for CCTV Camera
Kil-Hun Lee1,*, Moon-Seok Jun1, Hyeon-Hong Kim2,
Internet of Things Vulnerabilities
Smart Learning concepts to enhance SMART Universities in Africa
Presentation transcript:

Design of Context-Aware based Information Prevention Sungmo Jung 1, Younsam Chae 2, Jonghun Shin 2, Uyeol Baek 2, Seoksoo Kim ∗ 1, * Department of Multimedia, Hannam University, Daejeon, Korea 2 KPD, 10F Daegu Gyeongbuk Design Center, Daegu, Korea Abstract. Hackers can attack the information of unique address value in the process. Despite this situation, many people do not know anything about the attack. To prevent this, experts are encouraging to turn off unused network services. However, in their proposed method, many users cannot perform it properly. Therefore, in this paper, a context-aware based algorithm for prevention of Bluetooth device attack was designed so that users have better security options in any situation. Keywords: Context Aware, Bluetooth Device, Information Prevention 1 Introduction In recent years, many Bluetooth-based applications and devices are gaining wide popularity with consumers. The emergence of Smartphone, in particular, has fueled its popularity and development of a variety of contents. Bluetooth’s key strength lies in the fact that it is wireless and convenient to use. On the other hand, wireless nature of its technology invites frequent attacks from hackers and the theft of personal information has risen sharply. In light of this, security measures that can prevent Bluetooth device attacks beforehand have become a focal point for many in the industry[1]. There are numerous researches that are taking places around the world to reduce the vulnerability against attacks and many experts recommend that unused network services be turned off to minimize the risk of attacks. Despite its recommendation, many users are either unable to perform properly or faced with inconvenience of setting the device every time. Also, some users are hesitant to turn off Bluetooth. Thus, in this paper, through the recognition of users’ location, time, and other elements, we designed the algorithm so that Bluetooth setting is changed accordingly to given situations and subsequently, minimize the damage from attacks. ∗ Corresponding author SoftTech 2013, ASTL Vol. 19, pp , © SERSC ://ww

Proceedings, The 2nd International Conference on Software Technology 2 CA-based Algorithm for Information Prevention 2.1 Suggested CAIP Algorithm Suggested CAIP(Context-Aware based Information Prevention) algorithm in this paper uses context information and incorporates the use of RBR[2] and CBR[3] and sets Bluetooth environment such as user’s location and time, security mode and others that are deemed safe. After the setting and sensing of context information by user’s device sensors, it is largely divided into two categories: when there is a request by other devices and when there is no request. Fig. 1. Suggested CAIP Algorithm Structure 2.2 Scenario In this scenario, users taking account of information’s level of importance, a number of people, and location’s characteristics, classify and set as either safe location or unsafe location. Similarly, users classify time as safe time or unsafe time corresponding with aforesaid location’s characteristics. For instance, if the user determines that the location is a restaurant, as many more patrons will frequent the restaurant during breakfast, lunch, and dinner hours, these 8 ://ww

Design of Context-Aware based Information Prevention hours will be determined to be unsafe as hackers will be prone to attack during these hours. For this scenario, employed device is a Smartphone with the signal strength of 10 to 100 meter and the security is set to Mode 1, which is non-secure. Table 1. Basic Setting of Device Type Contents Used Device Smart Phone Signal Strength Within 10~100m (Class2) Device Security Mode Security Mode1(non-secure) The process for scenario is as follows. Fig. 3. Scenario Process ① A user who has a business meeting everyday with concerns for possible leak of company’s sensitive information sets his Smartphone’s Bluetooth setting as unsafe location, meeting time as 30 minutes, and Security Mode 3, before arriving at the company. ② The user enters a conference room to participate in the meeting. At that moment, his Smartphone utilizes GPS, sensor, surrounding environment, and others and checks whether there are similar cases in the past with the current situation. If not, via currently sensed coordinate points, determines that current location is a conference room within the company and temporarily terminates the Bluetooth connection. When there is a similar case in the future, it will undergo a checking of the past cases and set the environment accordingly. ③ When the meeting is over, the user leaves the conference room and at that time, the Bluetooth setting will be reset as the conditions – leaving the conference room or meeting time has expired – is met. In turn, the security mode is changed to low and connection is now possible again. 9 ://ww

Proceedings, The 2nd International Conference on Software Technology 3 Conclusion For Bluetooth device security algorithm based on context-aware that was recommended to users to reduce the security risk associated with using Bluetooth devices, it was designed to protect from attacks by changing the Bluetooth setting through the recognition of users’ relevant conditions and surroundings. We examined one possible scenario considering location and time. With the recent popularity of Smartphone and subsequent increase of contents that use Bluetooth technology, it has easier for users to use the technology anytime and anywhere. Conversely, associated risks with using such technology have risen as well. Thus, it is important to propose suggestions that can reduce the security risk and various educations and campaigns should be in placed to make users aware of the risk. This paper has limited the values to location and time but there are other values that can be obtained from various sensors and surroundings and apply them with other security and context-aware technology to further the study from different approaches. Acknowledgement This paper has been supported by the Technology Innovation program of MKE. [ , Development of Digital Signage Design applying Augmented Reality Technology] References 1.Sunguk Lee, Haniph A. Latchman and Byungjoo Park: ELRR – Enhanced Limited Round Robin Mechanism using Priority Policy over Bluetooth Networks, International Journal of Advanced Science and Technology, Vol.6, pp (2009) 2.Haesung Lee, Joonhee Kwon: Combining Context-Awareness with Wearable Computing for Emotion-based Contents Service, International Journal of Advanced Science and Technology, Vol.22, pp (2010) 3.A. Idhammad, A. Abdali and P. BussyNumerical: Simulation of the Process of Bone Remodeling in the Context of Damaged Elastic, International Journal of Advanced Science and Technology, Vol.37, pp (2011) 10 ://ww