This page has only limited features, please log in for full access.
Today, many people use dashcams, and videos recorded on dashcams are often used as evidence of accident fault. People can upload videos of dashcam recordings with specific accident clips and share the videos with others who request them, by providing the time or location of an accident. However, dashcam videos are erased when the dashcam memory is full, so periodic backup is necessary for video sharing. It is inconvenient for dashcam owners to search for and transmit a requested video clip from backup videos. In addition, anonymity is not ensured, which may reduce location privacy by exposing the video owner’s location. To solve this problem, we propose a video sharing scheme with accident detection using deep learning coupled with automatic transfer to the cloud; we also propose ensuring data and operational integrity along with location privacy by using blockchain smart contracts. Furthermore, our proposed system uses proxy re-encryption to enhance the confidentiality of a shared video. Our experiments show that our proposed automatic video sharing system is cost-effective enough to be acceptable for deployment.
TaeHyoung Kim; Im Y. Jung; Yih-Chun Hu. Automatic, location-privacy preserving dashcam video sharing using blockchain and deep learning. Human-centric Computing and Information Sciences 2020, 10, 1 -23.
AMA StyleTaeHyoung Kim, Im Y. Jung, Yih-Chun Hu. Automatic, location-privacy preserving dashcam video sharing using blockchain and deep learning. Human-centric Computing and Information Sciences. 2020; 10 (1):1-23.
Chicago/Turabian StyleTaeHyoung Kim; Im Y. Jung; Yih-Chun Hu. 2020. "Automatic, location-privacy preserving dashcam video sharing using blockchain and deep learning." Human-centric Computing and Information Sciences 10, no. 1: 1-23.
Im Y. Jung. A review of privacy-preserving human and human activity recognition. International Journal on Smart Sensing and Intelligent Systems 2020, 13, 1 -13.
AMA StyleIm Y. Jung. A review of privacy-preserving human and human activity recognition. International Journal on Smart Sensing and Intelligent Systems. 2020; 13 (1):1-13.
Chicago/Turabian StyleIm Y. Jung. 2020. "A review of privacy-preserving human and human activity recognition." International Journal on Smart Sensing and Intelligent Systems 13, no. 1: 1-13.
Jaejin Jang; Im.Y Jung; Jong Hyuk Park. An effective handling of secure data stream in IoT. Applied Soft Computing 2018, 68, 811 -820.
AMA StyleJaejin Jang, Im.Y Jung, Jong Hyuk Park. An effective handling of secure data stream in IoT. Applied Soft Computing. 2018; 68 ():811-820.
Chicago/Turabian StyleJaejin Jang; Im.Y Jung; Jong Hyuk Park. 2018. "An effective handling of secure data stream in IoT." Applied Soft Computing 68, no. : 811-820.
Android applications store large amounts of sensitive information that may be exposed and exploited. To prevent this security risk, some applications such as Syrup and KakaoTalk use physical device values to authenticate or encrypt application data. However, by manipulating these physical device values, an attacker can circumvent the authentication by executing a Same Identifier Attack and obtain the same application privileges as the user. In our work, WhatsApp, KakaoTalk, Facebook, Amazon, and Syrup were subjected to the Same Identifier Attack, and it was found that an attacker could gain the same privileges as the user, in all five applications. To solve such a problem, we propose a technical scheme—User Authentication using Peripheral Devices. We applied the proposed scheme to a Nexus 5X smartphone running Android version 7.1 and confirmed that the average execution time was 0.005 s, which does not affect the other applications’ execution significantly. We also describe the security aspects of the proposed scheme and its compatibility with the Android platform and other applications. The proposed scheme is practical and efficient in terms of resource usage; therefore, it will be useful for Android users to improve Android application security.
Jinseong Kim; Im Y. Jung. Efficient Protection of Android Applications through User Authentication Using Peripheral Devices. Sustainability 2018, 10, 1290 .
AMA StyleJinseong Kim, Im Y. Jung. Efficient Protection of Android Applications through User Authentication Using Peripheral Devices. Sustainability. 2018; 10 (4):1290.
Chicago/Turabian StyleJinseong Kim; Im Y. Jung. 2018. "Efficient Protection of Android Applications through User Authentication Using Peripheral Devices." Sustainability 10, no. 4: 1290.
The era of the Internet of Things (IoT) has arrived and much information is transmitted through various small IoT devices. Public key cryptography can be used in the present internet environment to avoid eavesdropping. The well-known public key cryptography, Rivest–Shamir–Adleman cryptography and Elliptic Curve Cryptography are apt to be broken when quantum computing is introduced. Therefore, lattice-based cryptography has been proposed as a new public key cryptography to replace them. The Ring-LWE scheme has been proposed to implement lattice-based cryptography. To apply the scheme to IoT devices using 8-bit, 32-bit, or 64-bit microcontrollers, optimization is inevitable. Further, the 8-bit environment is more important for small IoT devices. However, Ring-LWE may be vulnerable to side-channel attacks. This paper analyzes the attack scenario and tenders a countermeasure through bit checking for IoT applications using 8-bit microcontrollers.
Jaegeun Moon; Im Y. Jung; Jong Hyuk Park. IoT application protection against power analysis attack. Computers & Electrical Engineering 2018, 67, 566 -578.
AMA StyleJaegeun Moon, Im Y. Jung, Jong Hyuk Park. IoT application protection against power analysis attack. Computers & Electrical Engineering. 2018; 67 ():566-578.
Chicago/Turabian StyleJaegeun Moon; Im Y. Jung; Jong Hyuk Park. 2018. "IoT application protection against power analysis attack." Computers & Electrical Engineering 67, no. : 566-578.
Many Android applications store sensitive information such as account information, debit/credit card details. The exposed information can be accessed by attackers. They can pretend to be the data owners in cyber space with a duplicate of the information. In this study, we propose a new framework to protect Android applications against the data duplication attack. The proposed framework is practical because it can be applied to all of Android applications and has an inconsiderable overhead contributing to security of Android.
Jinseong Kim; Im Y. Jung. Private Data Protection of Android Application. Lecture Notes in Electrical Engineering 2017, 1470 -1475.
AMA StyleJinseong Kim, Im Y. Jung. Private Data Protection of Android Application. Lecture Notes in Electrical Engineering. 2017; ():1470-1475.
Chicago/Turabian StyleJinseong Kim; Im Y. Jung. 2017. "Private Data Protection of Android Application." Lecture Notes in Electrical Engineering , no. : 1470-1475.
Many devices use various Wireless Personal Area Networks (WPANs), and unauthorized users try to disguise as authorized users. To protect against such threats, each WPANs have their own authentication process. Authentication processes can be divided into entity authentication and messageauthentication. Entity authentication is a counterpart to claim someone and prove that. Message authentication is a process to check the integrity of a message. This paper focuses on Bluetooth, Zigbee and Wi-fi among WPANs, which also have authentication processes. This paper examines eachauthentication protocol in Bluetooth, Zigbee and Wi-fi.
Jaegeun Moon; Im Y Jung. Authentication for Wireless Personal Area Network. Advanced Science Letters 2017, 23, 9713 -9717.
AMA StyleJaegeun Moon, Im Y Jung. Authentication for Wireless Personal Area Network. Advanced Science Letters. 2017; 23 (10):9713-9717.
Chicago/Turabian StyleJaegeun Moon; Im Y Jung. 2017. "Authentication for Wireless Personal Area Network." Advanced Science Letters 23, no. 10: 9713-9717.
Android app is often used at multiple devices of one user. Sometimes, an app recognizes another device to be the same device which it has known, and bypasses its authentication process. As a result, an attacker can get the same privilege as the original device owner has for the app. In this paper, we show how to get the privilege of the device owner in Android app and how to defend against the attack by Same Identifier Attack Defensor.
Jinseong Kim; Im Y. Jung. Android app protection using same identifier attack defensor. 2017 IEEE International Conference on Intelligence and Security Informatics (ISI) 2017, 201 -201.
AMA StyleJinseong Kim, Im Y. Jung. Android app protection using same identifier attack defensor. 2017 IEEE International Conference on Intelligence and Security Informatics (ISI). 2017; ():201-201.
Chicago/Turabian StyleJinseong Kim; Im Y. Jung. 2017. "Android app protection using same identifier attack defensor." 2017 IEEE International Conference on Intelligence and Security Informatics (ISI) , no. : 201-201.
Various wireless technologies, such as RF, Bluetooth, and Zigbee, have been applied to sensor communications. However, the applications of Bluetooth-based wireless sensor networks (WSN) have a security issue. In one pairing process during Bluetooth communication, which is known as simple secure pairing (SSP), the devices are required to specify I/O capability or user interference to prevent man-in-the-middle (MITM) attacks. This study proposes an enhanced SSP in which a nonce to be transferred is converted to a corresponding signal interval. The quantization level, which is used to interpret physical signal intervals, is renewed at every connection by the transferred nonce and applied to the next nonce exchange so that the same signal intervals can represent different numbers. Even if attackers eavesdrop on the signals, they cannot understand what is being transferred because they cannot determine the quantization level. Furthermore, the proposed model does not require exchanging passkeys as data, and the devices are secure in the case of using a fixed PIN. Subsequently, the new quantization level is calculated automatically whenever the same devices attempt to connect with each other. Therefore, the pairing process can be protected from MITM attacks and be convenient for users.
Jaegeun Moon; Im Y. Jung; Jaesoo Yoo. Security Enhancement of Wireless Sensor Networks Using Signal Intervals. Sensors 2017, 17, 752 .
AMA StyleJaegeun Moon, Im Y. Jung, Jaesoo Yoo. Security Enhancement of Wireless Sensor Networks Using Signal Intervals. Sensors. 2017; 17 (4):752.
Chicago/Turabian StyleJaegeun Moon; Im Y. Jung; Jaesoo Yoo. 2017. "Security Enhancement of Wireless Sensor Networks Using Signal Intervals." Sensors 17, no. 4: 752.
Social Safety Guards, which make up the blind spots or situations of social security network, can be designed and implemented using state-of-the-art technology. This paper proposes a type of Social Safety Guards based on Internet of Things, Simple Safety Guard for convenience store. The Simple Safety Guard is easy to apply and adopt, and can lead to quick handling of urgent situations. It can help the people in danger as soon as possible.
Jae-Gun Moon; Jinseong Kim; Im Y. Jung; Su-An Eom. Social Safety Guard Based on Internet of Things. 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC) 2016, 483 -485.
AMA StyleJae-Gun Moon, Jinseong Kim, Im Y. Jung, Su-An Eom. Social Safety Guard Based on Internet of Things. 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC). 2016; ():483-485.
Chicago/Turabian StyleJae-Gun Moon; Jinseong Kim; Im Y. Jung; Su-An Eom. 2016. "Social Safety Guard Based on Internet of Things." 2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC) , no. : 483-485.
Wireless access points (WAPs) are devices that provide Internet connectivity to devices such as desktops, laptops, smartphones, and tablets. Hence, it is important to provide sufficient availability to devices and security for the traffic that is routed by a WAP. However, attackers can decrease the network bandwidth or obtain the traffic including private data such as search histories, login information, and device usage patterns by exploiting the vulnerabilities in firmware upgrades to install malicious firmware. To address this problem, we propose a sustainable and practical firmware upgrade for a WAP using password-based authentication. The proposed upgrade protocol ensures security by adding freshness to the firmware whenever a firmware upgrade occurs. This freshness is different for each event and each firmware; therefore, even if the freshness of one firmware is exposed, the others are secure. In addition, confidentiality, integrity, and authentication are ensured. Furthermore, the proposed protocol can be easily implemented and adapted to WAPs. Experiments are performed to evaluate the upgrade time, resource usage, and code size in wired and wireless connected environments by implementing a prototype and analyzing the security of the protocol. The results show that the proposed upgrade is secure and practical.
Jaejin Jang; Im Y. Jung. Sustainable and Practical Firmware Upgrade for Wireless Access Point Using Password-Based Authentication. Sustainability 2016, 8, 876 .
AMA StyleJaejin Jang, Im Y. Jung. Sustainable and Practical Firmware Upgrade for Wireless Access Point Using Password-Based Authentication. Sustainability. 2016; 8 (9):876.
Chicago/Turabian StyleJaejin Jang; Im Y. Jung. 2016. "Sustainable and Practical Firmware Upgrade for Wireless Access Point Using Password-Based Authentication." Sustainability 8, no. 9: 876.
A technique to communicate with a smart sensor device using the Web is currently being developed. When the user approaches the device, like a beacon, the device sends a URL to the built-in sensor to the user’s smartphone. With this URL, the user can communicate with the smart sensor device through a Web interface. When communicating with a beacon using a Web interface, encryption is required for secure communication between the Web browser and beacon. In this paper, we propose secure communication using a symmetric key distribution. Our method prevents malicious applications from eavesdropping on messages and replaying a message. In addition, we evaluated the execution time.
Jin H. Park; Im Y. Jung; Soon J. Kim. A Secure Communication in Web of Things. Lecture Notes in Electrical Engineering 2016, 197 -202.
AMA StyleJin H. Park, Im Y. Jung, Soon J. Kim. A Secure Communication in Web of Things. Lecture Notes in Electrical Engineering. 2016; ():197-202.
Chicago/Turabian StyleJin H. Park; Im Y. Jung; Soon J. Kim. 2016. "A Secure Communication in Web of Things." Lecture Notes in Electrical Engineering , no. : 197-202.
With the advance of mobile phone cameras and broadband networks, gaining access to digital information and services via logo recognition has become of high industrial interest. The fundamental subsystem for logo recognition must be a logo database, whose images link real-world information to specific corporate entities. However, few attempts have been made to create and update such a logo database, i.e., how to automatically collect the latest logos. Moreover, the few existing methods are limited in their application and unattractive in terms of logo detection accuracy and performance overhead. In this article, we describe a practical system for automatic logo extraction. Websites are an optimal source of a huge number of up-to-date logos, and experts can easily find logos from webpages without rendering. For instance, an expert can locate elements with the term “logo” using the websites’ entity names as attribute values, and then download images connected to them. Our system mimics this human behavior to automate logo extraction. Given a website, it learns its entity name and uses that name to locate elements that lead to the logo. Evaluation tests showed that this contextual reasoning significantly contributes to the performance of the system, which achieved high precision with negligible overhead.
Insoon Jo; Im Y. Jung. Smart learning of logo detection for mobile phone applications. Multimedia Tools and Applications 2016, 75, 13211 -13233.
AMA StyleInsoon Jo, Im Y. Jung. Smart learning of logo detection for mobile phone applications. Multimedia Tools and Applications. 2016; 75 (21):13211-13233.
Chicago/Turabian StyleInsoon Jo; Im Y. Jung. 2016. "Smart learning of logo detection for mobile phone applications." Multimedia Tools and Applications 75, no. 21: 13211-13233.
The Internet of Things (IoT) operates solely on local interactions among its components, which include various devices with communications capabilities. Because the IoT is a fully distributed computing network, it is important to mitigate any negative effects resulting from faults occurring in its components and to provide sustainable services. This paper focuses on fault management of IoT services. In particular, it handles a fault management scheme for the self-organizing software platform (SoSp), a platform on which IoT services connected to various IT devices are deployed. The proposed fault management scheme enables SoSp to provide situation aware IoT services without loss of data and state.
Im Y. Jung; Gil-Jin Jang; Jung-Min Yang; Jaesoo Yoo. Design of a Situation Aware Service for Internet of Things. International Journal of Distributed Sensor Networks 2015, 11, 1 .
AMA StyleIm Y. Jung, Gil-Jin Jang, Jung-Min Yang, Jaesoo Yoo. Design of a Situation Aware Service for Internet of Things. International Journal of Distributed Sensor Networks. 2015; 11 (9):1.
Chicago/Turabian StyleIm Y. Jung; Gil-Jin Jang; Jung-Min Yang; Jaesoo Yoo. 2015. "Design of a Situation Aware Service for Internet of Things." International Journal of Distributed Sensor Networks 11, no. 9: 1.
Many users do not realize whether their devices become bots or not. There are many security accidents due to malicious bots. To solve this problem, we propose a monitor system composed of IoT devices to detect bots.
Jae-Geun Moon; Jae J. Jang; Im Y. Jung. Bot Detection via IoT Environment. 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems 2015, 1691 -1692.
AMA StyleJae-Geun Moon, Jae J. Jang, Im Y. Jung. Bot Detection via IoT Environment. 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems. 2015; ():1691-1692.
Chicago/Turabian StyleJae-Geun Moon; Jae J. Jang; Im Y. Jung. 2015. "Bot Detection via IoT Environment." 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems , no. : 1691-1692.
This paper proposes a check and alert service based on IoT as personal guard. This personal service can prevent people in trouble because of the omitted things or the skipped tasks unconsciously. Further, it can avoid the probable risks caused by the missed tasks or the omitted things. In addition, we present a security model for personal services based on Bluetooth 4.2 supporting IPSP (Internet Protocol Support Profile). The prototype implemented shows small overhead.
Jae J. Jang; Jinseong Kim; Im Y. Jung. A check and alert service based on IoT. 2015 IEEE Conference on Technologies for Sustainability (SusTech) 2015, 113 -116.
AMA StyleJae J. Jang, Jinseong Kim, Im Y. Jung. A check and alert service based on IoT. 2015 IEEE Conference on Technologies for Sustainability (SusTech). 2015; ():113-116.
Chicago/Turabian StyleJae J. Jang; Jinseong Kim; Im Y. Jung. 2015. "A check and alert service based on IoT." 2015 IEEE Conference on Technologies for Sustainability (SusTech) , no. : 113-116.
Among primary asynchronous sequential circuits, ring counters are used as an important building block in various spaceborne digital systems. As they are subject to adverse effects of radiation, it is imperative that they be given fault tolerance mechanism for robust operation. This paper presents a corrective control scheme for tolerating state transition faults in ring counters. The considered ring counter has the structure of Double Modular Redundancy (DMR), in which some selected memory bits of each ring counter module can override the counterpart values of the other module. With this structure, we can design a static corrective controller that tolerates any state transition fault occurring to the dual ring counter. Though the state information is unavailable, we can implement a simple fault tolerant control scheme using corrective control. The proposed control scheme is validated in VHDL experiments.
Jung-Min Yang; Im Y. Jung; Seong Woo Kwak. Fault Tolerant Control for Spaceborne Dual Ring Counters with Selective Overriding. Indian Journal of Science and Technology 2015, 8, 1-8 .
AMA StyleJung-Min Yang, Im Y. Jung, Seong Woo Kwak. Fault Tolerant Control for Spaceborne Dual Ring Counters with Selective Overriding. Indian Journal of Science and Technology. 2015; 8 (S1):1-8.
Chicago/Turabian StyleJung-Min Yang; Im Y. Jung; Seong Woo Kwak. 2015. "Fault Tolerant Control for Spaceborne Dual Ring Counters with Selective Overriding." Indian Journal of Science and Technology 8, no. S1: 1-8.
There are several applications connected to IT health devices on the self-organizing software platform (SoSp) that allow patients or elderly users to be cared for remotely by their family doctors under normal circumstances or during emergencies. An evaluation of the SoSp applied through PAAR watch/self-organizing software platform router was conducted targeting a simple user interface for aging users, without the existence of extrasettings based on patient movement. On the other hand, like normal medical records, the access to, and transmission of, health information via PAAR watch/self-organizing software platform requires privacy protection. This paper proposes a security framework for health information management of the SoSp. The proposed framework was designed to ensure easy detection of identification information for typical users. In addition, it provides powerful protection of the user’s health information.
Im Y. Jung; Gil-Jin Jang; Soon-Ju Kang. Secure eHealth-Care Service on Self-Organizing Software Platform. Mathematical Problems in Engineering 2014, 2014, 1 -9.
AMA StyleIm Y. Jung, Gil-Jin Jang, Soon-Ju Kang. Secure eHealth-Care Service on Self-Organizing Software Platform. Mathematical Problems in Engineering. 2014; 2014 ():1-9.
Chicago/Turabian StyleIm Y. Jung; Gil-Jin Jang; Soon-Ju Kang. 2014. "Secure eHealth-Care Service on Self-Organizing Software Platform." Mathematical Problems in Engineering 2014, no. : 1-9.
The Electronic Commerce System should provide prompt responses for user requests and continuous services despite partial failures of its sub systems. In addition, scalability and flexibility should be supported as the number of customers increases. Because Electronic Commerce is beyond the national border, the system should be implemented across different subnets for its efficiency and business needs. This paper proposes the design and implementation of a distributed system infrastructure across different subnets for Electronic Commerce. When the Electronic Commerce system is owned and managed by a small enterprise, the cost should be considered as well as fault tolerance, high availability and scalability. The proposed infrastructure was evaluated and discussed in the aspect of economics such as implementation and management cost, performance and overhead.
Im Y. Jung; Wenfeng Cui; Hyeonsang Eom; Heon Y. Yeom. Distributed Electronic Commerce cluster for small enterprise. Cluster Computing 2014, 17, 681 -689.
AMA StyleIm Y. Jung, Wenfeng Cui, Hyeonsang Eom, Heon Y. Yeom. Distributed Electronic Commerce cluster for small enterprise. Cluster Computing. 2014; 17 (3):681-689.
Chicago/Turabian StyleIm Y. Jung; Wenfeng Cui; Hyeonsang Eom; Heon Y. Yeom. 2014. "Distributed Electronic Commerce cluster for small enterprise." Cluster Computing 17, no. 3: 681-689.
Sehoon Park; Im Y. Jung; Heonsang Eom; Heon Y. Yeom. An Analysis of Replication Enhancement for a High Availability Cluster. Journal of Information Processing Systems 2013, 9, 205 -216.
AMA StyleSehoon Park, Im Y. Jung, Heonsang Eom, Heon Y. Yeom. An Analysis of Replication Enhancement for a High Availability Cluster. Journal of Information Processing Systems. 2013; 9 (2):205-216.
Chicago/Turabian StyleSehoon Park; Im Y. Jung; Heonsang Eom; Heon Y. Yeom. 2013. "An Analysis of Replication Enhancement for a High Availability Cluster." Journal of Information Processing Systems 9, no. 2: 205-216.