JOURNAL BROWSE
Search
Advanced SearchSearch Tips
Smart Device Security Technology for Cyber Defense
facebook(new window)  Pirnt(new window) E-mail(new window) Excel Download
 Title & Authors
Smart Device Security Technology for Cyber Defense
Son, Iek-Jae; Kim, Il-Ho; Yang, Jong-Hyu; Lee, Nam-Young;
  PDF(new window)
 Abstract
As the utilization of smart mobile devices such as smartphones increases, the desire to utilize such devices to control and monitor combat situations also arises. As smart mobile devices with various ICT get integrated with various weaponry system, a new phase of future warfare can be introduced. Moreover, smartphone-based real-time information technology for joint battle command system will be converged with surveillance control to become a leading example of convergence of cyber defense and information technology. Furthermore, mobile device security technology ideal for mobile wireless network environments can be applied to military robots. The following paper will give an overview of smart mobile device usage used for military purposes in battle command system, various security threats and the mobile device security technology to correspond to such security threats.
 Keywords
Smart Device Security;Cyber Defence;Battle Command;Mobile wireless network environment;Military robots;
 Language
Korean
 Cited by
1.
군사 환경에서의 향상된 무선 네트워크 보안,김진우;신수용;

한국통신학회논문지, 2016. vol.41. 11, pp.1341-1348 crossref(new window)
2.
국방환경에서 모바일 앱 관리체계 구축방안 제시 - 국방 앱스토어 및 검증시스템 중심으로 -,이갑진;고승철;

한국정보통신학회논문지, 2013. vol.17. 3, pp.525-532 crossref(new window)
 References
1.
KISA, "Internet & Security issues", 2010.03.

2.
Ki-young Kim, Dong-ho Kang, "Smart phone security technology at open mobile environment", Korean Institute of Information Scientists and Engineers, vol. 19, no. 5, 2009.12.

3.
Ji-eon Lyu, "Key enabler of the smart phone: Software", SW Insight, 2009.04.

4.
Gwang-ho Baek, "Recent trends in research and technology of Secure Execution Environment", Electronics and Telecommunications Trends, vol. 22, no. 5, 2007.10.

5.
ARM, "ARM Security Technology Building a Secure System using TrustZone Technology", Apr. 2009. pp1-108.

6.
Trusted Computing Group, "TCG specification architecture overview. specification revision 1.4", Aug. 2, 2007. pp1-54.

7.
Trusted Computing Group, "TCG mobile trusted module specification. Specification version 1.0, revision 6", June 26, 2008. pp1-105.

8.
Trusted Computing Group, "TCG mobile reference architecture. Specification version 1.0, revision 1", June 12, 2007. pp1-87.

9.
Reiner Sailer, "Xiaolan zhang, Trent faeger, Leendert van doorn: design and Implementation of a TCG-based integrity measurement architecture", 13th Usenix Security Symposium, June 27, 2004.

10.
Ji-ho Bang, Lan Ha, Pil-young Kang and Hong-geon Kim, "Security verification framework for e-GOV mobile App.", Journal of the Korean Institute of Communications and Information Sciences, vol.37, no.2, pp119-131, .2012. crossref(new window)