This page has only limited features, please log in for full access.

Prof. Ilsun You
Department of Information Security Engineering, Soonchunhyang University, 22 Soonchunhyang-ro, Shinchang-myeon, Asan-si 31538, Choongchungnam-do, Korea

Basic Info


Research Keywords & Expertise

0 IoT Security
0 5G security
0 Authentication and access control
0 Formal security analysis
0 Mobile internet security

Fingerprints

Formal security analysis
5G security
Authentication and access control
Mobile internet security

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 21 May 2021 in IEEE Internet of Things Journal
Reads 0
Downloads 0

With the evolution of wireless technologies, 5G and Beyond (5GB) communication is paving a way for efficient, ultra-reliable, low-latent, and high converging services for the Internet of Things (IoT). Along with efficient communication, the security of messages is one of the concerns which must be maintained throughout the operations. Backhaul forms an essential part of 5GB with an ability to enhance the coverage and quality of service for IoT. However, conventional wired backhaul connection would cost operators thousands of dollars in the construction of 5GB infrastructure considering the ultra-dense nature of IoT. As a result, wireless backhaul is quickly becoming a feasible alternative to address 5GB’s direction towards network densification without affecting its other provisions. Wireless backhaul is expected to increase the landscape, covering from islands to mountains, which were difficult to access in the existing network generation. Moreover, it can effectively respond to the situation where the data traffic tremendously increased. Despite such provisioning, the wireless backhaul poses relatively various security threats and vulnerabilities due to the characteristics of wireless technologies. Several studies have been conducted to address the security problems; however, existing protocols do not support dynamic security policy and key management in a decentralized structure as well as secure handover in a specific scenario where Terminals (TMs) are moving. Motivated by this, we proposed the Mobile Terminal Handover Security Protocol (MoTH) to provide secure handover of mobile terminals between hubs. To solve the problem of existing protocols, a new entity called Backhaul Management Function (BMF) is introduced to support distributed and dynamic security policy and key management in each serving network of 5GB backhaul environment. The proposed protocol satisfies security requirements including authentication and key management, confidentiality, integrity, and perfect forward secrecy. Additionally, it supports policy and key update services, and optimized handover. The security and correctness of the proposed protocol are thoroughly verified using the two formal security analysis tools, BAN logic and Scyther. Additionally, the performance evaluation shows that the proposed protocol is efficient.

ACS Style

JiYoon Kim; Philip Virgil Astillo; Vishal Sharma; Nadra Guizani; IlSun You. MoTH: Mobile Terminal Handover Security Protocol for HUB Switching based on 5G and Beyond (5GB) P2MP Backhaul Environment. IEEE Internet of Things Journal 2021, PP, 1 -1.

AMA Style

JiYoon Kim, Philip Virgil Astillo, Vishal Sharma, Nadra Guizani, IlSun You. MoTH: Mobile Terminal Handover Security Protocol for HUB Switching based on 5G and Beyond (5GB) P2MP Backhaul Environment. IEEE Internet of Things Journal. 2021; PP (99):1-1.

Chicago/Turabian Style

JiYoon Kim; Philip Virgil Astillo; Vishal Sharma; Nadra Guizani; IlSun You. 2021. "MoTH: Mobile Terminal Handover Security Protocol for HUB Switching based on 5G and Beyond (5GB) P2MP Backhaul Environment." IEEE Internet of Things Journal PP, no. 99: 1-1.

Review
Published: 21 May 2021 in Sensors
Reads 0
Downloads 0

This paper presents an in-depth overview of the Bluetooth 5.1 Direction Finding standard’s potentials, thanks to enhancing the Bluetooth Low Energy (BLE) firmware. This improvement allows producers to create location applications based on the Angle of Departure (AoD) and the Angle of Arrival (AoA). Accordingly, it is conceivable to design proper Indoor Positioning Systems (IPS), for instance, for the traceability of resources, assets, and people. First of all, Radio Frequency (RF) radiogoniometry techniques, helpful in calculating AoA and AoD angles, are introduced in this paper. Subsequently, the topic relating to signal direction estimation is deepened. The Bluetooth Core Specification updates concerning version 5.1, both at the packet architecture and prototyping levels, are also reported. Some suitable platforms and development kits for running the new features are then presented, and some basic applications are illustrated. This paper’s final part allows ascertaining the improvement made by this new definition of BLE and possible future developments, especially concerning applications related to devices, assets, or people’s indoor localization. Some preliminary results gathered in a real evaluation scenario are also presented.

ACS Style

Giovanni Pau; Fabio Arena; Yonas Gebremariam; IlSun You. Bluetooth 5.1: An Analysis of Direction Finding Capability for High-Precision Location Services. Sensors 2021, 21, 3589 .

AMA Style

Giovanni Pau, Fabio Arena, Yonas Gebremariam, IlSun You. Bluetooth 5.1: An Analysis of Direction Finding Capability for High-Precision Location Services. Sensors. 2021; 21 (11):3589.

Chicago/Turabian Style

Giovanni Pau; Fabio Arena; Yonas Gebremariam; IlSun You. 2021. "Bluetooth 5.1: An Analysis of Direction Finding Capability for High-Precision Location Services." Sensors 21, no. 11: 3589.

Journal article
Published: 17 March 2021 in IEEE Access
Reads 0
Downloads 0

Mobile edge computing which provides computing capabilities at the edge of the radio access network can help smart home reduce response time. However, the limited computing capacity of edge servers is the bottlenecks for the development of edge computing. We integrate cloud computing and edge computing in the Internet of Things to expand the capabilities. Nevertheless, the cost of leasing computing resources has been seldom considered. In this paper, we study the joint transmission power and resource allocation to minimize the users’ overhead which is measured by the sum of energy consumption and cost leasing servers. We formulate the problem as a Mixed Integer Linear Programming which is NP-hard and present the Branch-and-Bound to solve it. Due to high complexity, a learning method is proposed to accelerate the algorithm. The branching policy can be learned to reduce the time-cost of the Branch-and-Bound algorithm. Simulation results show our approach can improve the Branch-and-Bound efficiency and performs closely to the traditional branching scheme.

ACS Style

Bocheng Yu; Xingjun Zhang; IlSun You; Umer Sadiq Khan. Efficient Computation Offloading in Edge Computing Enabled Smart Home. IEEE Access 2021, PP, 1 -1.

AMA Style

Bocheng Yu, Xingjun Zhang, IlSun You, Umer Sadiq Khan. Efficient Computation Offloading in Edge Computing Enabled Smart Home. IEEE Access. 2021; PP (99):1-1.

Chicago/Turabian Style

Bocheng Yu; Xingjun Zhang; IlSun You; Umer Sadiq Khan. 2021. "Efficient Computation Offloading in Edge Computing Enabled Smart Home." IEEE Access PP, no. 99: 1-1.

Journal article
Published: 15 March 2021 in Sensors
Reads 0
Downloads 0

Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development and implementation of these devices have become vital in terms of usability and reachability. Unfortunately, as they become widespread and their demand grows, they are becoming more and more vulnerable to several security attacks, including, but not limited to, jamming, information leakage, and spoofing. In order to cope with such attacks and security threats, a proper design of robust security protocols is indispensable. Although several pieces of research have been carried out with this regard, there are still research gaps, particularly concerning UAV-to-UAV secure communication, support for perfect forward secrecy, and provision of non-repudiation. Especially in a military scenario, it is essential to solve these gaps. In this paper, we studied the security prerequisites of the UAV communication protocol, specifically in the military setting. More importantly, a security protocol (with two sub-protocols), that serves in securing the communication between UAVs, and between a UAV and a Ground Control Station, is proposed. This protocol, apart from the common security requirements, achieves perfect forward secrecy and non-repudiation, which are essential to a secure military communication. The proposed protocol is formally and thoroughly verified by using the BAN-logic (Burrow-Abadi-Needham logic) and Scyther tool, followed by performance evaluation and implementation of the protocol on a real UAV. From the security and performance evaluation, it is indicated that the proposed protocol is superior compared to other related protocols while meeting confidentiality, integrity, mutual authentication, non-repudiation, perfect forward secrecy, perfect backward secrecy, response to DoS (Denial of Service) attacks, man-in-the-middle protection, and D2D (Drone-to-Drone) security.

ACS Style

YongHo Ko; JiYoon Kim; Daniel Duguma; Philip Astillo; IlSun You; Giovanni Pau. Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone. Sensors 2021, 21, 2057 .

AMA Style

YongHo Ko, JiYoon Kim, Daniel Duguma, Philip Astillo, IlSun You, Giovanni Pau. Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone. Sensors. 2021; 21 (6):2057.

Chicago/Turabian Style

YongHo Ko; JiYoon Kim; Daniel Duguma; Philip Astillo; IlSun You; Giovanni Pau. 2021. "Drone Secure Communication Protocol for Future Sensitive Applications in Military Zone." Sensors 21, no. 6: 2057.

Journal article
Published: 02 March 2021 in IEEE Journal of Biomedical and Health Informatics
Reads 0
Downloads 0

Advances of implantable medical devices (IMD) are transforming the tradition method of providing medical treatment, especially to patients under the most challenging condition. Accordingly, the IMD-enabled artificial pancreas system (APS) has now reached global market. It is helping many patients suffering from chronic disease, called diabetes mellitus, in monitoring and maintaining blood glucose level conveniently. However, this advancement is accompanied by various security threats that place the life of patients at risk. Hence, protective measures, especially against yet unknown threats, are of paramount importance. This paper proposes a specification-based misbehavior detection as an alternative solution to effectively mitigate security threats. Moreover, an outlier detection algorithm is also introduced to validate integrity of unprotected data transmitted by the different components. The monitor agent applies a smoothened-trust-based method to assess the trustworthiness of the APS. To demonstrate effectiveness of the proposed method, we first extend the UVA/Padova simulator for glucose-insulin data collection and subsequently simulate scenario with well-behave and malicious APS in MATLAB. The results show that there exists an optimal trust value that can achieve high specificity and sensitivity rate. Moreover, the proposed technique was also compared to contemporary anomaly-based detection methods including decision tree (DT), support vector machine (SVM), and k-nearest neighbor (KNN). It is shown that our approach can dominate detection performance, especially to malicious behavior that manifests habitually (hidden mode).

ACS Style

Philip Virgil Astillo; Gaurav Choudhary; Daniel Gerbi Duguma; JiYoon Kim; IlSun You. TrMAps: Trust Management in Specification-based Misbehavior Detection System for IMD-Enabled Artificial Pancreas System. IEEE Journal of Biomedical and Health Informatics 2021, PP, 1 -1.

AMA Style

Philip Virgil Astillo, Gaurav Choudhary, Daniel Gerbi Duguma, JiYoon Kim, IlSun You. TrMAps: Trust Management in Specification-based Misbehavior Detection System for IMD-Enabled Artificial Pancreas System. IEEE Journal of Biomedical and Health Informatics. 2021; PP (99):1-1.

Chicago/Turabian Style

Philip Virgil Astillo; Gaurav Choudhary; Daniel Gerbi Duguma; JiYoon Kim; IlSun You. 2021. "TrMAps: Trust Management in Specification-based Misbehavior Detection System for IMD-Enabled Artificial Pancreas System." IEEE Journal of Biomedical and Health Informatics PP, no. 99: 1-1.

Journal article
Published: 10 February 2021 in Energies
Reads 0
Downloads 0

Wearable devices used for human body monitoring has broad applications in smart home, sports, security and other fields. Wearable devices provide an extremely convenient way to collect a large amount of human motion data. In this paper, the human body acceleration feature extraction method based on wearable devices is studied. Firstly, Butterworth filter is used to filter the data. Then, in order to ensure the extracted feature value more accurately, it is necessary to remove the abnormal data in the source. This paper combines Kalman filter algorithm with a genetic algorithm and use the genetic algorithm to code the parameters of the Kalman filter algorithm. We use Standard Deviation (SD), Interval of Peaks (IoP) and Difference between Adjacent Peaks and Troughs (DAPT) to analyze seven kinds of acceleration. At last, SisFall data set, which is a globally available data set for study and experiments, is used for experiments to verify the effectiveness of our method. Based on simulation results, we can conclude that our method can distinguish different activity clearly.

ACS Style

Zhenzhen Huang; Qiang Niu; IlSun You; Giovanni Pau. Acceleration Feature Extraction of Human Body Based on Wearable Devices. Energies 2021, 14, 924 .

AMA Style

Zhenzhen Huang, Qiang Niu, IlSun You, Giovanni Pau. Acceleration Feature Extraction of Human Body Based on Wearable Devices. Energies. 2021; 14 (4):924.

Chicago/Turabian Style

Zhenzhen Huang; Qiang Niu; IlSun You; Giovanni Pau. 2021. "Acceleration Feature Extraction of Human Body Based on Wearable Devices." Energies 14, no. 4: 924.

Research article
Published: 06 January 2021 in International Journal of Intelligent Systems
Reads 0
Downloads 0

Embedded systems are common in the Internet of Things domain: their integration in vehicles and mobile devices is being fostered in the Internet of vehicles (IoV). IoV has direct applications on intelligent transportation systems and smart cities. Besides basic requirements, such as ease of installation, cost‐effectiveness, scalability, and flexibility, IOV applications need to guarantee energy‐efficient and good‐quality communication. In fact, IoV implementations are commonly based on wireless nodes, which rely on a limited energy source; therefore, an efficient communication among the nodes is desirable to prolong the lifetime of the devices. In particular, the alternation of active and sleep states and the regulation of the transmission power represent two common approaches to save energy. Based on this strategy, an effective fuzzy control system is presented in the paper to manage power consumption and quality of services of IoV applications. Two fuzzy controllers increase the battery life while keeping a good throughput to workload ratio. This technique has been simulated with two leading technologies in IoV: IEEE 802.11b/g/n and IEEE 802.11p. Experimental results show a network lifetime improvement ranging from 30% to 40%, according to the adopted medium access control protocol.

ACS Style

Mario Collotta; Renato Ferrero; Edoardo Giusto; Mohammad Ghazi Vakili; Jacopo Grecuccio; Xiangjie Kong; IlSun You. A fuzzy control system for energy‐efficient wireless devices in the Internet of vehicles. International Journal of Intelligent Systems 2021, 36, 1595 -1618.

AMA Style

Mario Collotta, Renato Ferrero, Edoardo Giusto, Mohammad Ghazi Vakili, Jacopo Grecuccio, Xiangjie Kong, IlSun You. A fuzzy control system for energy‐efficient wireless devices in the Internet of vehicles. International Journal of Intelligent Systems. 2021; 36 (4):1595-1618.

Chicago/Turabian Style

Mario Collotta; Renato Ferrero; Edoardo Giusto; Mohammad Ghazi Vakili; Jacopo Grecuccio; Xiangjie Kong; IlSun You. 2021. "A fuzzy control system for energy‐efficient wireless devices in the Internet of vehicles." International Journal of Intelligent Systems 36, no. 4: 1595-1618.

Editorial
Published: 03 January 2021 in Sensors
Reads 0
Downloads 0

The International Symposium on the Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) has been held on 17–19 October 2019 in Taichung, Taiwan

ACS Style

Giovanni Pau; Hsing-Chung Chen; Fang-Yie Leu; IlSun You. Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019). Sensors 2021, 21, 265 .

AMA Style

Giovanni Pau, Hsing-Chung Chen, Fang-Yie Leu, IlSun You. Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019). Sensors. 2021; 21 (1):265.

Chicago/Turabian Style

Giovanni Pau; Hsing-Chung Chen; Fang-Yie Leu; IlSun You. 2021. "Selected Papers from the First International Symposium on Future ICT (Future-ICT 2019) in Conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019)." Sensors 21, no. 1: 265.

Research article
Published: 26 November 2020 in Mobile Information Systems
Reads 0
Downloads 0

The industrial control system (ICS) inherits the attributes of the traditional information system, but because it has its own characteristics that availability of triad (CIA) of information security should be a top priority, it needs to be set differently from the traditional information security requirements. In response to the issue, TTAK.KO-12.0307 (Standard for Industrial Control System Information Security Requirements) proposed by the National Security Research Institute (NSRI) and established by the Telecommunications Technology Association (TTA) is being used. However, it is difficult to apply security requirements of TTAK.KO-12.0307 uniformly because of the reason that the characteristics of the ICS in each layer are different. There is also a limit to invest the security resources with equivalent priority for all requirements and ICS layers. It is still unresolved in the previous research studies which are related to information security resources, for example, Choi (2013), Ko et al. (2013), and Nah et al.’s (2016) studies. Therefore, this study tried to focus on what a top priority of information security requirements by the ICS in each layer is, using the analytic hierarchy process. As a result, we derived that the top priority requirement in the operation layer is “Identification Authentication Access Control,” in the control layer is “Event Response,” and in the field device layer is “Physical Interface Protection” with the highest importance. The results of this study can be utilized as a guideline for the security strategy and policy design by determining security requirements that should be prioritized in each layer of the ICS.

ACS Style

Jiho Shin; IlSun You; Jung Taek Seo. Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process. Mobile Information Systems 2020, 2020, 1 -11.

AMA Style

Jiho Shin, IlSun You, Jung Taek Seo. Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process. Mobile Information Systems. 2020; 2020 ():1-11.

Chicago/Turabian Style

Jiho Shin; IlSun You; Jung Taek Seo. 2020. "Investment Priority Analysis of ICS Information Security Resources in Smart Mobile IoT Network Environment Using the Analytic Hierarchy Process." Mobile Information Systems 2020, no. : 1-11.

Journal article
Published: 10 November 2020 in IEEE Transactions on Intelligent Transportation Systems
Reads 0
Downloads 0

Objective: To realize the full coverage, full spectrum, and full application, of 6G networks, the channel measurement, channel characteristics, and channel research of the 6G-oriented full-spectrum full-scene wireless network are explored. Methods: At present, constructing an information network covering three dimensions of sea, land and air is one of the research directions of 6G technology development. Meanwhile, the full coverage of three dimensions of communication requires multiple channels including multiple frequency bands and multiple scenarios, mainly including terahertz, light band, satellite, unmanned aerial vehicle, ocean, high-speed rail, and vehicle-to-vehicle. For different channels, different parameters are analyzed and targeted discussed according to channel characteristics. Also, there are many other problems of wireless communication channel that need to be solved. Here, only the above problems are analyzed in detail. Because of the current development of the Internet of Vehicles, the interconnection of connected vehicles is analyzed, and this scenario is also the most widely common scenario in daily life. Results: For the above-mentioned communication channels, the relevant measurement and modeling results of the 6G channel are shown; besides, the characteristics, time, and space correlation functions are obtained for each channel. Conclusion: The existing research results of 6G-oriented wireless channel measurement and modeling are analyzed; the research methods are summarized; new ideas are proposed to provide researchers with important references.

ACS Style

ZhiHan Lv; Liang Qiao; IlSun You. 6G-Enabled Network in Box for Internet of Connected Vehicles. IEEE Transactions on Intelligent Transportation Systems 2020, 22, 5275 -5282.

AMA Style

ZhiHan Lv, Liang Qiao, IlSun You. 6G-Enabled Network in Box for Internet of Connected Vehicles. IEEE Transactions on Intelligent Transportation Systems. 2020; 22 (8):5275-5282.

Chicago/Turabian Style

ZhiHan Lv; Liang Qiao; IlSun You. 2020. "6G-Enabled Network in Box for Internet of Connected Vehicles." IEEE Transactions on Intelligent Transportation Systems 22, no. 8: 5275-5282.

Conference paper
Published: 02 November 2020 in Communications in Computer and Information Science
Reads 0
Downloads 0

Massive Internet of Things (IoT) applications are characterized by a massive number of low-powered devices with small data storage. In those applications, authentication is very important to guarantee the origin of data produced by each device. With such characteristics, the authentication scheme needs to have small footprint and low complexity computation. Likewise, the number of authentication signaling needs to be significantly reduced to accommodate massive amount of IoT devices trying to connect to the network simultaneously, which is similar to Denial of Service (DoS) attacks. In 3GPP TR 33.899 V1.3.0, an architecture of the authentication system that consists of the aggregation nodes and the authenticators is proposed. The aggregation nodes receive the authenticated data from the devices and send the aggregated authenticated data to the authenticators. In this article, we discuss the possibility to implement more efficient authentication scheme for a massive Internet of Things (IoT) applications enabled in 5G networks. In particular, we analyze the performance of the system using some signature aggregation methods and identify the main research challenges in this area.

ACS Style

Amril Syalim; Bayu Anggorojati; Joonsang Baek; Daniel Gerbi; IlSun You. Aggregate Authentication for Massive Internet of Things in 5G Networks. Communications in Computer and Information Science 2020, 3 -12.

AMA Style

Amril Syalim, Bayu Anggorojati, Joonsang Baek, Daniel Gerbi, IlSun You. Aggregate Authentication for Massive Internet of Things in 5G Networks. Communications in Computer and Information Science. 2020; ():3-12.

Chicago/Turabian Style

Amril Syalim; Bayu Anggorojati; Joonsang Baek; Daniel Gerbi; IlSun You. 2020. "Aggregate Authentication for Massive Internet of Things in 5G Networks." Communications in Computer and Information Science , no. : 3-12.

Journal article
Published: 27 October 2020 in IEEE Access
Reads 0
Downloads 0

Smart farming is rapidly revolutionizing the agricultural sector where embedded Internet of Things (IoT) devices are integrated into the field to maintain or improve the quality of products as well as increase food production. Despite the tremendous benefits, various cybersecurity threats of IoT can also be inherited by the sector. In this paper, we propose a lightweight specification-based distributed detection to identify the misbehavior of heterogeneous embedded IoT nodes efficiently and effectively in a closed-loop smart greenhouse farming system. To expand the monitoring space of a node, we exploited the Kalman-filter algorithm and simple statistical operations to obtain estimates of data. Accordingly, this enables a monitoring node to assess a target node that has distinct physical characteristics and access to natural phenomena. Along with this, we derive the behavior-rules that are specific to the target system and carefully translate these rules into a state machine diagram. Besides, we formally verify the functional correctness of the monitoring processes as well as ensure that the behavior specifications are completely covered by using the model checker tool UPPAAL. Through extensive experimental simulation using Proteus, we verify its applicability to resource-constrained embedded devices, e.g., Arduino-Uno, as well as show high accuracy in detecting misbehaving nodes while having low false alarms.

ACS Style

Philip Virgil Astillo; JiYoon Kim; Vishal Sharma; IlSun You. SGF-MD: Behavior Rule Specification-based Distributed Misbehavior Detection of Embedded IoT Devices in a Closed-Loop Smart Greenhouse Farming System. IEEE Access 2020, 8, 1 -1.

AMA Style

Philip Virgil Astillo, JiYoon Kim, Vishal Sharma, IlSun You. SGF-MD: Behavior Rule Specification-based Distributed Misbehavior Detection of Embedded IoT Devices in a Closed-Loop Smart Greenhouse Farming System. IEEE Access. 2020; 8 ():1-1.

Chicago/Turabian Style

Philip Virgil Astillo; JiYoon Kim; Vishal Sharma; IlSun You. 2020. "SGF-MD: Behavior Rule Specification-based Distributed Misbehavior Detection of Embedded IoT Devices in a Closed-Loop Smart Greenhouse Farming System." IEEE Access 8, no. : 1-1.

Journal article
Published: 20 October 2020 in IEEE Access
Reads 0
Downloads 0

Green communications, focusing on energy efficiency, is a hot topic in both academic and industry communities since they can significantly improve sustainability concerning power resources and environmental conditions. Later, with much focus on this area, several green communication methods started enrolling into a more thoughtful phase, with compelling applications in several networks. For instance, a simple and effective green communication solution is to arrange a sleep mode device incorporated by several MAC protocols with broad wireless network applications. However, it is required to examine the trade-off between green communications’ energy efficiency and network requirements. In addition, it is crucial to appraise the performance concerning the energy consumption, the throughput, and the response time, regarding green communications under different wireless network conditions (e.g., different traffic and different channels).

ACS Style

IlSun You; Giovanni Pau; Wei Wei; Carol Fung. IEEE Access Special Section Editorial: Green Communications on Wireless Networks. IEEE Access 2020, 8, 187140 -187145.

AMA Style

IlSun You, Giovanni Pau, Wei Wei, Carol Fung. IEEE Access Special Section Editorial: Green Communications on Wireless Networks. IEEE Access. 2020; 8 ():187140-187145.

Chicago/Turabian Style

IlSun You; Giovanni Pau; Wei Wei; Carol Fung. 2020. "IEEE Access Special Section Editorial: Green Communications on Wireless Networks." IEEE Access 8, no. : 187140-187145.

Journal article
Published: 09 October 2020 in IEEE Transactions on Industrial Informatics
Reads 0
Downloads 0

This paper presents a Smart Collaborative Balancing (SCB) scheme to dynamically adjust the orchestration of network functions to enhance their workflow patterns. First, mathematical models of bandwidth allocation and DDoS defense for multi-user with diverse probability distribution is established. Matrix operations are utilized to solve the relevant issues based on individual congestion windows. Second, specific procedures of collaboration among different network components are presented. The capabilities of CPS, in terms of bandwidth allocation and DDoS defense, are guaranteed via novel queue policy and access control mechanisms. Third, we build a comprehensive prototype including multiple domains for validations. Experimental results in two scenarios illustrate that SCB not only fully supports service reliability of end hosts with different priorities according to mathematical models, but also effectively resists DDoS attacks. Compared to the traditional Internet and SDN, our scheme performs quite well in both available resource management and malicious flow recognition aspects.

ACS Style

Fei Song; Zhengyang Ai; Haowei Zhang; IlSun You; Shiyong Li. Smart Collaborative Balancing for Dependable Network Components in Cyber-Physical Systems. IEEE Transactions on Industrial Informatics 2020, 17, 6916 -6924.

AMA Style

Fei Song, Zhengyang Ai, Haowei Zhang, IlSun You, Shiyong Li. Smart Collaborative Balancing for Dependable Network Components in Cyber-Physical Systems. IEEE Transactions on Industrial Informatics. 2020; 17 (10):6916-6924.

Chicago/Turabian Style

Fei Song; Zhengyang Ai; Haowei Zhang; IlSun You; Shiyong Li. 2020. "Smart Collaborative Balancing for Dependable Network Components in Cyber-Physical Systems." IEEE Transactions on Industrial Informatics 17, no. 10: 6916-6924.

Journal article
Published: 08 September 2020 in IEEE Access
Reads 0
Downloads 0

With an enormous range of applications, the Internet of Things (IoT) has magnetized industries and academicians from everywhere. IoT facilitates operations through ubiquitous connectivity by providing Internet access to all the devices with computing capabilities. With the evolution of wireless infrastructure, the focus from simple IoT has been shifted to smart, connected and mobile IoT (M-IoT) devices and platforms, which can enable low-complexity, low-cost and efficient computing through sensors, machines, and even crowdsourcing. All these devices can be grouped under a common term of M-IoT. Even though the positive impact on applications has been tremendous, security, privacy and trust are still the major concerns for such networks and insufficient enforcement of these requirements introduces non-negligible threats to M-IoT devices and platforms. Thus, it is important to understand the range of solutions which are available for providing a secure, privacy-compliant, and trustworthy mechanism for M-IoT. There is no direct survey available, which focuses on security, privacy, trust, secure protocols, physical layer security and handover protections in M-IoT. This paper covers such requisites and presents comparisons of state-the-art solutions for IoT which are applicable to security, privacy, and trust in smart and connected M-IoT networks. Apart from these, various challenges, applications, advantages, technologies, standards, open issues, and roadmap for security, privacy and trust are also discussed in this paper.

ACS Style

Vishal Sharma; IlSun You; Karl Andersson; Francesco Palmieri; Mubashir Husain Rehmani; Jaedeok Lim. Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey. IEEE Access 2020, 8, 167123 -167163.

AMA Style

Vishal Sharma, IlSun You, Karl Andersson, Francesco Palmieri, Mubashir Husain Rehmani, Jaedeok Lim. Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey. IEEE Access. 2020; 8 (99):167123-167163.

Chicago/Turabian Style

Vishal Sharma; IlSun You; Karl Andersson; Francesco Palmieri; Mubashir Husain Rehmani; Jaedeok Lim. 2020. "Security, Privacy and Trust for Smart Mobile- Internet of Things (M-IoT): A Survey." IEEE Access 8, no. 99: 167123-167163.

Journal article
Published: 03 September 2020 in IEEE Access
Reads 0
Downloads 0

Promoted by the advancements in the various wireless access technologies, modern mobile devices equipped with multiple network interfaces are rapidly becoming the norm, and this provides a driving force for the large-scale deployment of the Multipath Transmission Control Protocol (MPTCP) in the current and future Internet. However, the simultaneous use of multiple network paths for concurrent multipath data transmission can make MPTCP have a larger attack surface than the traditional single-path transport protocols, and this may be likely to pose a risk of MPTCP being much more susceptible to cyber attacks. In this paper, we present a measurement method to investigate the vulnerability and robustness of MPTCP under cyber attacks with incomplete network information, by considering the fact that most cyber attacks normally lack of real-time information with respect to various MPTCP attributes. We mathematically characterize cyber attacks with incomplete network information from the viewpoints of both the cyber attacker and the MPTCP communication system, and then we introduce a mixed attack strategy, by jointly considering the features of both the random attacks and the selective attacks, to evaluate the robustness of MPTCP.

ACS Style

Yuanlong Cao; Jing Chen; Qinghua Liu; Gang Lei; Hao Wang; IlSun You. Can Multipath TCP be Robust to Cyber Attacks With Incomplete Information? IEEE Access 2020, 8, 165872 -165883.

AMA Style

Yuanlong Cao, Jing Chen, Qinghua Liu, Gang Lei, Hao Wang, IlSun You. Can Multipath TCP be Robust to Cyber Attacks With Incomplete Information? IEEE Access. 2020; 8 (99):165872-165883.

Chicago/Turabian Style

Yuanlong Cao; Jing Chen; Qinghua Liu; Gang Lei; Hao Wang; IlSun You. 2020. "Can Multipath TCP be Robust to Cyber Attacks With Incomplete Information?" IEEE Access 8, no. 99: 165872-165883.

Journal article
Published: 03 September 2020 in IEEE Access
Reads 0
Downloads 0

Driven by the ubiquitous smart devices, wireless traffic data has increased significantly and brings a great burden on backhaul links. Edge caching and device-to-device are proved not only can overcome the above challenges, but also to reduce the energy consumption of devices. Meanwhile, the development of hardware makes it possible for terminal devices to cache popular content (referred to as "helpers"). In this paper, a device-to-device assisted edge caching network via helpers is designed to provide low-latency content access and alleviate the traffic load. Then, we formulate the problem of maximization of the successful delivery rate under the constraints of the Signal-to-Interference-plus-Noise Ratio and caching capacity as an integer programming and pose a novel efficient and effective scheme. Based on the algorithm, we first transform the problem into a tractable form. Then this paper presents a hybrid of heuristic approach and iterative selection method to limit the search scope. The simulations demonstrate the method can significantly reduce the system computation time. Moreover, the effects of different scenarios and parameter settings about the successful delivery rate of the Device-to-Device assisted edge caching networks are analyzed.

ACS Style

Bocheng Yu; Xingjun Zhang; IlSun You. Collaborative Cache Allocation and Transmission Scheduling for Multi-User in Edge Computing. IEEE Access 2020, 8, 163953 -163961.

AMA Style

Bocheng Yu, Xingjun Zhang, IlSun You. Collaborative Cache Allocation and Transmission Scheduling for Multi-User in Edge Computing. IEEE Access. 2020; 8 (99):163953-163961.

Chicago/Turabian Style

Bocheng Yu; Xingjun Zhang; IlSun You. 2020. "Collaborative Cache Allocation and Transmission Scheduling for Multi-User in Edge Computing." IEEE Access 8, no. 99: 163953-163961.

Journal article
Published: 01 September 2020 in Energies
Reads 0
Downloads 0

Efficient big data analysis is critical to support applications or services in Internet of Things (IoT) system, especially for the time-intensive services. Hence, the data center may host heterogeneous big data analysis tasks for multiple IoT systems. It is a challenging problem since the data centers usually need to schedule a large number of periodic or online tasks in a short time. In this paper, we investigate the heterogeneous task scheduling problem to reduce the global task execution time, which is also an efficient method to reduce energy consumption for data centers. We establish the task execution for heterogeneous tasks respectively based on the data locality feature, which also indicate the relationship among the tasks, data blocks and servers. We propose a heterogeneous task scheduling algorithm with data migration. The core idea of the algorithm is to maximize the efficiency by comparing the cost between remote task execution and data migration, which could improve the data locality and reduce task execution time. We conduct extensive simulations and the experimental results show that our algorithm has better performance than the traditional methods, and data migration actually works to reduce th overall task execution time. The algorithm also shows acceptable fairness for the heterogeneous tasks.

ACS Style

Xin Li; Liangyuan Wang; Jemal H. Abawajy; Xiaolin Qin; Giovanni Pau; IlSun You. Data-Intensive Task Scheduling for Heterogeneous Big Data Analytics in IoT System. Energies 2020, 13, 4508 .

AMA Style

Xin Li, Liangyuan Wang, Jemal H. Abawajy, Xiaolin Qin, Giovanni Pau, IlSun You. Data-Intensive Task Scheduling for Heterogeneous Big Data Analytics in IoT System. Energies. 2020; 13 (17):4508.

Chicago/Turabian Style

Xin Li; Liangyuan Wang; Jemal H. Abawajy; Xiaolin Qin; Giovanni Pau; IlSun You. 2020. "Data-Intensive Task Scheduling for Heterogeneous Big Data Analytics in IoT System." Energies 13, no. 17: 4508.

Journal article
Published: 12 August 2020 in IEEE Transactions on Industrial Informatics
Reads 0
Downloads 0

As a new computing paradigm, edge computing emerges in various fields. Many tasks previously relied on cloud computing are distributed to various edge devices that cooperate to complete the tasks. However, circumstantial factors in the edge network (e.g., functionality, transmission efficiency, and resource limitation) become more complex than those in cloud computing. Consequently, there is instability that cannot be ignored in the cooperation between the edge devices. In this article, we propose a novel framework to optimize edge cooperative network (ECN), called ECN-Opt, to improve the performance of edge computing tasks. Specifically, we first define the evaluation metrics for cooperation. Next, the cooperation of an ECN is optimized to improve the performance of specific tasks. Extensive experiments using real datasets from wearable sensors on the players in soccer teams demonstrate that our ECN-Opt framework performs well, and it also validate the effectiveness of the proposed optimization algorithm.

ACS Style

Xiangjie Kong; Shiqin Tong; Haoran Gao; Guojiang Shen; Kailai Wang; Mario Collotta; IlSun You; Sajal K. Das. Mobile Edge Cooperation Optimization for Wearable Internet of Things: A Network Representation-Based Framework. IEEE Transactions on Industrial Informatics 2020, 17, 5050 -5058.

AMA Style

Xiangjie Kong, Shiqin Tong, Haoran Gao, Guojiang Shen, Kailai Wang, Mario Collotta, IlSun You, Sajal K. Das. Mobile Edge Cooperation Optimization for Wearable Internet of Things: A Network Representation-Based Framework. IEEE Transactions on Industrial Informatics. 2020; 17 (7):5050-5058.

Chicago/Turabian Style

Xiangjie Kong; Shiqin Tong; Haoran Gao; Guojiang Shen; Kailai Wang; Mario Collotta; IlSun You; Sajal K. Das. 2020. "Mobile Edge Cooperation Optimization for Wearable Internet of Things: A Network Representation-Based Framework." IEEE Transactions on Industrial Informatics 17, no. 7: 5050-5058.

Journal article
Published: 10 July 2020 in IEEE Transactions on Network and Service Management
Reads 0
Downloads 0

We propose a lightweight specification-based misbehavior detection management technique to efficiently and effectively detect misbehavior of an IoT device embedded in a medical cyber physical system through automatic model checking and formal verification. We verify our specification-based misbehavior detection technique with a patient-controlled analgesia (PCA) device embedded in a medical health monitoring system. Through extensive ns3 simulation, we verify its superior performance over popular machine learning anomaly detection methods based on support vector machine (SVM) and k-nearest neighbors (KNN) techniques in both effectiveness and efficiency performance metrics.

ACS Style

Gaurav Choudhary; Philip Virgil Astillo; IlSun You; Kangbin Yim; Ing-Ray Chen; Jin-Hee Cho. Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems. IEEE Transactions on Network and Service Management 2020, 17, 2496 -2510.

AMA Style

Gaurav Choudhary, Philip Virgil Astillo, IlSun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho. Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems. IEEE Transactions on Network and Service Management. 2020; 17 (4):2496-2510.

Chicago/Turabian Style

Gaurav Choudhary; Philip Virgil Astillo; IlSun You; Kangbin Yim; Ing-Ray Chen; Jin-Hee Cho. 2020. "Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems." IEEE Transactions on Network and Service Management 17, no. 4: 2496-2510.