This page has only limited features, please log in for full access.

Unclaimed
Jaeseung Lee
Department of Computer Science and Engineering, Soongsil University, Seoul 07027, Korea

Basic Info

Basic Info is private.

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 11 March 2019 in Symmetry
Reads 0
Downloads 0

The rapid development of Internet technology and the spread of various smart devices have enabled the creation of a convenient environment used by people all around the world. It has become increasingly popular, with the technology known as the Internet of Things (IoT). However, both the development and proliferation of IoT technology have caused various problems such as personal information leakage and privacy violations due to attacks by hackers. Furthermore, countless devices are connected to the network in the sense that all things are connected to the Internet, and network attacks that have thus far been exploited in the existing PC environment are now also occurring frequently in the IoT environment. In fact, there have been many security incidents such as DDoS attacks involving the hacking of IP cameras, which are typical IoT devices, leakages of personal information and the monitoring of numerous persons without their consent. While attacks in the existing Internet environment were PC-based, we have confirmed that various smart devices used in the IoT environment—such as IP cameras and tablets—can be utilized and exploited for attacks on the network. Even though it is necessary to apply security solutions to IoT devices in order to prevent potential problems in the IoT environment, it is difficult to install and execute security solutions due to the inherent features of small devices with limited memory space and computational power in this aforementioned IoT environment, and it is also difficult to protect certificates and encryption keys due to easy physical access. Accordingly, this paper examines potential security threats in the IoT environment and proposes a security design and the development of an intelligent security framework designed to prevent them. The results of the performance evaluation of this study confirm that the proposed protocol is able to cope with various security threats in the network. Furthermore, from the perspective of energy efficiency, it was also possible to confirm that the proposed protocol is superior to other cryptographic protocols. Thus, it is expected to be effective if applied to the IoT environment.

ACS Style

Jaeseung Lee; Jungho Kang; Moon-Seog Jun; Jaekyung Han. Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment. Symmetry 2019, 11, 361 .

AMA Style

Jaeseung Lee, Jungho Kang, Moon-Seog Jun, Jaekyung Han. Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment. Symmetry. 2019; 11 (3):361.

Chicago/Turabian Style

Jaeseung Lee; Jungho Kang; Moon-Seog Jun; Jaekyung Han. 2019. "Design of a Symmetry Protocol for the Efficient Operation of IP Cameras in the IoT Environment." Symmetry 11, no. 3: 361.

Journal article
Published: 01 December 2016 in Sensors
Reads 0
Downloads 0

The Internet of Things (IoT) is the intelligent technologies and services that mutually communicate information between humans and devices or between Internet-based devices. In IoT environments, various device information is collected from the user for intelligent technologies and services that control the devices. Recently, wireless sensor networks based on IoT environments are being used in sectors as diverse as medicine, the military, and commerce. Specifically, sensor techniques that collect relevant area data via mini-sensors after distributing smart dust in inaccessible areas like forests or military zones have been embraced as the future of information technology. IoT environments that utilize smart dust are composed of the sensor nodes that detect data using wireless sensors and transmit the detected data to middle nodes. Currently, since the sensors used in these environments are composed of mini-hardware, they have limited memory, processing power, and energy, and a variety of research that aims to make the best use of these limited resources is progressing. This paper proposes a method to utilize these resources while considering energy efficiency, and suggests lightweight mutual verification and key exchange methods based on a hash function that has no restrictions on operation quantity, velocity, and storage space. This study verifies the security and energy efficiency of this method through security analysis and function evaluation, comparing with existing approaches. The proposed method has great value in its applicability as a lightweight security technology for IoT environments.

ACS Style

Jaeseung Lee; Yunsick Sung; Jong Hyuk Park. Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments. Sensors 2016, 16, 2044 .

AMA Style

Jaeseung Lee, Yunsick Sung, Jong Hyuk Park. Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments. Sensors. 2016; 16 (12):2044.

Chicago/Turabian Style

Jaeseung Lee; Yunsick Sung; Jong Hyuk Park. 2016. "Lightweight Sensor Authentication Scheme for Energy Efficiency in Ubiquitous Computing Environments." Sensors 16, no. 12: 2044.

Book chapter
Published: 17 July 2015 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

Wireless sensor network technology is a technology that distributes nodes into various areas which is useful in various fields such as exploration for military purposes, and device management, process management, and monitoring specific areas in industry. However, sensor node in wireless sensor network due to use of compact hardware has limitations in energy, processing power, and memory storage, and to overcome these limitations various routing protocols have been suggested. However in the case of existing routing protocol, it focuses on energy efficiency, it is very vulnerable to security in mutual communication, and there is limitations in implementing previous encryption system to overcome this, due to the lack of sensor processing power and memory. Therefore, this study suggests a mutual authentication method that can respond to various security threats by simultaneously introducing mutual authentication, key generation and updating system in the communication process that also considers energy efficiency.

ACS Style

Jaeseung Lee; Jae-Pyo Park; Eunhwan Kim; Moon-Seog Jun. Lightweight Mutual Authentication Routing Protocols Design Based on LEACH in Sensor Network Environment. Lecture Notes in Electrical Engineering 2015, 473 -478.

AMA Style

Jaeseung Lee, Jae-Pyo Park, Eunhwan Kim, Moon-Seog Jun. Lightweight Mutual Authentication Routing Protocols Design Based on LEACH in Sensor Network Environment. Lecture Notes in Electrical Engineering. 2015; ():473-478.

Chicago/Turabian Style

Jaeseung Lee; Jae-Pyo Park; Eunhwan Kim; Moon-Seog Jun. 2015. "Lightweight Mutual Authentication Routing Protocols Design Based on LEACH in Sensor Network Environment." Lecture Notes in Electrical Engineering , no. : 473-478.