Technical Vulnerability

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 75 Experts worldwide ranked by ideXlab platform

Imrich Chlamtac - One of the best experts on this subject based on the ideXlab platform.

  • Technical Vulnerability of the E-UTRAN paging mechanism
    2012 IEEE Wireless Communications and Networking Conference (WCNC), 2012
    Co-Authors: Alexey Baraev, Urtzi Ayesta, Ina Maria Verloop, Daniele Miorandi, Imrich Chlamtac
    Abstract:

    The signalling subsystem is the most expensive and complex element in cellular networks. Today's networks use signalling mechanisms whose design builds on more than 20 years of the operational expertise. Despite this, the signalling subsystem of all mobile network standards remains vulnerable to failures of equipment and to sharp increases in offered load caused by unanticipated traffic patterns. In this work we analyse the Technical Vulnerability of paging - a key signalling mechanism that is responsible for notifying mobile terminals of downlink service requests. Our assessment considers the operation of Long-Term Evolution (LTE) networks and in particular the performance of the paging mechanism on the radio interface. We implemented the paging procedure in a simulator, and we propose and verify a mathematical model of the system behaviour. The proposed mathematical model effectively captures the non-zero threshold of paging failure probability; it is scrupulously precise for the paging loads below the nonzero threshold and delivers a close approximation with the increasing paging load. The mathematical model can be applied to optimise the performance of the paging mechanism and to devise techniques able to overcome its Technical Vulnerability.

  • WCNC - Technical Vulnerability of the E-UTRAN paging mechanism
    2012 IEEE Wireless Communications and Networking Conference (WCNC), 2012
    Co-Authors: Alexey Baraev, Urtzi Ayesta, Ina Maria Verloop, Daniele Miorandi, Imrich Chlamtac
    Abstract:

    The signalling subsystem is the most expensive and complex element in cellular networks. Today's networks use signalling mechanisms whose design builds on more than 20 years of the operational expertise. Despite this, the signalling subsystem of all mobile network standards remains vulnerable to failures of equipment and to sharp increases in offered load caused by unanticipated traffic patterns. In this work we analyse the Technical Vulnerability of paging — a key signalling mechanism that is responsible for notifying mobile terminals of downlink service requests. Our assessment considers the operation of Long-Term Evolution (LTE) networks and in particular the performance of the paging mechanism on the radio interface. We implemented the paging procedure in a simulator, and we propose and verify a mathematical model of the system behaviour. The proposed mathematical model effectively captures the non-zero threshold of paging failure probability; it is scrupulously precise for the paging loads below the nonzero threshold and delivers a close approximation with the increasing paging load. The mathematical model can be applied to optimise the performance of the paging mechanism and to devise techniques able to overcome its Technical Vulnerability.

Okkyung Choi - One of the best experts on this subject based on the ideXlab platform.

  • A secure NFC-based mobile printing service using recognition robot
    International Journal of Distributed Sensor Networks, 2020
    Co-Authors: Hyo-sik Yang, Seungbin Moon, Okkyung Choi
    Abstract:

    With the rapid growth of internet technologies, there have been many recent innovations in printing methods and mobile printing service has become important part of our daily life. In this paper, we design and implement a secure mobile printing service using NFC tag to protect our personal information from the Technical Vulnerability and physical accident such as a robbery. To protect the personal information, the user has to scan the NFC information at the NFC reader using recognition robot to confirm the authentication. In addition, we propose a secure NFC-based authentication protocol that provides printer authorization method and document access control in accordance with user's authority. Lastly, to prove validity and efficiency of the proposed system, the experimental test was confirmed and provided the results.

  • NFC Payment Authentication Protocol for Payment Agency of Service Robot
    Lecture Notes in Electrical Engineering, 2020
    Co-Authors: Okkyung Choi, Taewoo Choi, Seungbin Moon
    Abstract:

    Robots are becoming more sophisticated and they are performing a lot of work instead of humans. For the natural communication between humans and robots, a real-time technology is needed that they can perform a payment service as an individual characteristic. In this paper, we propose security solutions using PUK module not only Technical Vulnerability but also physical accident such as a robbery and loss case for safe social media services. In addition, we propose NFC payment authentication protocol based on USIM certificate that includes a streamlined payment and authentication step. Lastly, to prove validity and safety of the proposed system, the experimental test of safety was confirmed and provided the results.

  • A Secure NFC-Based Mobile Printing Service Using Recognition Robot
    International Journal of Distributed Sensor Networks, 2015
    Co-Authors: Eunmi Lee, Hongjin Yeh, Seungbin Moon, Hyo-sik Yang, Okkyung Choi
    Abstract:

    With the rapid growth of internet technologies, there have been many recent innovations in printing methods and mobile printing service has become important part of our daily life. In this paper, we design and implement a secure mobile printing service using NFC tag to protect our personal information from the Technical Vulnerability and physical accident such as a robbery. To protect the personal information, the user has to scan the NFC information at the NFC reader using recognition robot to confirm the authentication. In addition, we propose a secure NFC-based authentication protocol that provides printer authorization method and document access control in accordance with user's authority. Lastly, to prove validity and efficiency of the proposed system, the experimental test was confirmed and provided the results. © 2015 Eunmi Lee et al.

Alexey Baraev - One of the best experts on this subject based on the ideXlab platform.

  • Technical Vulnerability of the E-UTRAN paging mechanism
    2012 IEEE Wireless Communications and Networking Conference (WCNC), 2012
    Co-Authors: Alexey Baraev, Urtzi Ayesta, Ina Maria Verloop, Daniele Miorandi, Imrich Chlamtac
    Abstract:

    The signalling subsystem is the most expensive and complex element in cellular networks. Today's networks use signalling mechanisms whose design builds on more than 20 years of the operational expertise. Despite this, the signalling subsystem of all mobile network standards remains vulnerable to failures of equipment and to sharp increases in offered load caused by unanticipated traffic patterns. In this work we analyse the Technical Vulnerability of paging - a key signalling mechanism that is responsible for notifying mobile terminals of downlink service requests. Our assessment considers the operation of Long-Term Evolution (LTE) networks and in particular the performance of the paging mechanism on the radio interface. We implemented the paging procedure in a simulator, and we propose and verify a mathematical model of the system behaviour. The proposed mathematical model effectively captures the non-zero threshold of paging failure probability; it is scrupulously precise for the paging loads below the nonzero threshold and delivers a close approximation with the increasing paging load. The mathematical model can be applied to optimise the performance of the paging mechanism and to devise techniques able to overcome its Technical Vulnerability.

  • WCNC - Technical Vulnerability of the E-UTRAN paging mechanism
    2012 IEEE Wireless Communications and Networking Conference (WCNC), 2012
    Co-Authors: Alexey Baraev, Urtzi Ayesta, Ina Maria Verloop, Daniele Miorandi, Imrich Chlamtac
    Abstract:

    The signalling subsystem is the most expensive and complex element in cellular networks. Today's networks use signalling mechanisms whose design builds on more than 20 years of the operational expertise. Despite this, the signalling subsystem of all mobile network standards remains vulnerable to failures of equipment and to sharp increases in offered load caused by unanticipated traffic patterns. In this work we analyse the Technical Vulnerability of paging — a key signalling mechanism that is responsible for notifying mobile terminals of downlink service requests. Our assessment considers the operation of Long-Term Evolution (LTE) networks and in particular the performance of the paging mechanism on the radio interface. We implemented the paging procedure in a simulator, and we propose and verify a mathematical model of the system behaviour. The proposed mathematical model effectively captures the non-zero threshold of paging failure probability; it is scrupulously precise for the paging loads below the nonzero threshold and delivers a close approximation with the increasing paging load. The mathematical model can be applied to optimise the performance of the paging mechanism and to devise techniques able to overcome its Technical Vulnerability.

Seungbin Moon - One of the best experts on this subject based on the ideXlab platform.

  • A secure NFC-based mobile printing service using recognition robot
    International Journal of Distributed Sensor Networks, 2020
    Co-Authors: Hyo-sik Yang, Seungbin Moon, Okkyung Choi
    Abstract:

    With the rapid growth of internet technologies, there have been many recent innovations in printing methods and mobile printing service has become important part of our daily life. In this paper, we design and implement a secure mobile printing service using NFC tag to protect our personal information from the Technical Vulnerability and physical accident such as a robbery. To protect the personal information, the user has to scan the NFC information at the NFC reader using recognition robot to confirm the authentication. In addition, we propose a secure NFC-based authentication protocol that provides printer authorization method and document access control in accordance with user's authority. Lastly, to prove validity and efficiency of the proposed system, the experimental test was confirmed and provided the results.

  • NFC Payment Authentication Protocol for Payment Agency of Service Robot
    Lecture Notes in Electrical Engineering, 2020
    Co-Authors: Okkyung Choi, Taewoo Choi, Seungbin Moon
    Abstract:

    Robots are becoming more sophisticated and they are performing a lot of work instead of humans. For the natural communication between humans and robots, a real-time technology is needed that they can perform a payment service as an individual characteristic. In this paper, we propose security solutions using PUK module not only Technical Vulnerability but also physical accident such as a robbery and loss case for safe social media services. In addition, we propose NFC payment authentication protocol based on USIM certificate that includes a streamlined payment and authentication step. Lastly, to prove validity and safety of the proposed system, the experimental test of safety was confirmed and provided the results.

  • A Secure NFC-Based Mobile Printing Service Using Recognition Robot
    International Journal of Distributed Sensor Networks, 2015
    Co-Authors: Eunmi Lee, Hongjin Yeh, Seungbin Moon, Hyo-sik Yang, Okkyung Choi
    Abstract:

    With the rapid growth of internet technologies, there have been many recent innovations in printing methods and mobile printing service has become important part of our daily life. In this paper, we design and implement a secure mobile printing service using NFC tag to protect our personal information from the Technical Vulnerability and physical accident such as a robbery. To protect the personal information, the user has to scan the NFC information at the NFC reader using recognition robot to confirm the authentication. In addition, we propose a secure NFC-based authentication protocol that provides printer authorization method and document access control in accordance with user's authority. Lastly, to prove validity and efficiency of the proposed system, the experimental test was confirmed and provided the results. © 2015 Eunmi Lee et al.

Daniele Miorandi - One of the best experts on this subject based on the ideXlab platform.

  • Technical Vulnerability of the E-UTRAN paging mechanism
    2012 IEEE Wireless Communications and Networking Conference (WCNC), 2012
    Co-Authors: Alexey Baraev, Urtzi Ayesta, Ina Maria Verloop, Daniele Miorandi, Imrich Chlamtac
    Abstract:

    The signalling subsystem is the most expensive and complex element in cellular networks. Today's networks use signalling mechanisms whose design builds on more than 20 years of the operational expertise. Despite this, the signalling subsystem of all mobile network standards remains vulnerable to failures of equipment and to sharp increases in offered load caused by unanticipated traffic patterns. In this work we analyse the Technical Vulnerability of paging - a key signalling mechanism that is responsible for notifying mobile terminals of downlink service requests. Our assessment considers the operation of Long-Term Evolution (LTE) networks and in particular the performance of the paging mechanism on the radio interface. We implemented the paging procedure in a simulator, and we propose and verify a mathematical model of the system behaviour. The proposed mathematical model effectively captures the non-zero threshold of paging failure probability; it is scrupulously precise for the paging loads below the nonzero threshold and delivers a close approximation with the increasing paging load. The mathematical model can be applied to optimise the performance of the paging mechanism and to devise techniques able to overcome its Technical Vulnerability.

  • WCNC - Technical Vulnerability of the E-UTRAN paging mechanism
    2012 IEEE Wireless Communications and Networking Conference (WCNC), 2012
    Co-Authors: Alexey Baraev, Urtzi Ayesta, Ina Maria Verloop, Daniele Miorandi, Imrich Chlamtac
    Abstract:

    The signalling subsystem is the most expensive and complex element in cellular networks. Today's networks use signalling mechanisms whose design builds on more than 20 years of the operational expertise. Despite this, the signalling subsystem of all mobile network standards remains vulnerable to failures of equipment and to sharp increases in offered load caused by unanticipated traffic patterns. In this work we analyse the Technical Vulnerability of paging — a key signalling mechanism that is responsible for notifying mobile terminals of downlink service requests. Our assessment considers the operation of Long-Term Evolution (LTE) networks and in particular the performance of the paging mechanism on the radio interface. We implemented the paging procedure in a simulator, and we propose and verify a mathematical model of the system behaviour. The proposed mathematical model effectively captures the non-zero threshold of paging failure probability; it is scrupulously precise for the paging loads below the nonzero threshold and delivers a close approximation with the increasing paging load. The mathematical model can be applied to optimise the performance of the paging mechanism and to devise techniques able to overcome its Technical Vulnerability.