This page has only limited features, please log in for full access.
The most significant advantage of the group recommender system over personalization is the low computational cost because the former analyzes the preferences of many users at once by integrating their preferences. The clustering step is the most time-consuming part of the entire process in a group recommender system. Existing studies either measured the similarities among all users or utilized a clustering algorithm based on the item preference vector to form the groups. However, these existing clustering methods overlooked the clustering cost, and the time complexity was not significantly better than that for personalized recommendations. Therefore, we propose a group recommender system based on the genre preferences of users to dramatically reduce the clustering cost. First, we define a genre preference vector and cluster the groups using this vector. Our group recommender system can reduce the time complexity more efficiently because the number of genres is significantly smaller than the number of items. In addition, we propose a new item preference along with genre weight to subdivide the preferences of users. The evaluation results show that the genre-based group recommender system significantly improves the time efficiency in terms of clustering. Clustering time was about five times faster when using k-means. In addition, for the Gaussian mixture model (GMM), it was about fifty times faster in MovieLens 100 k and about five hundred times faster in Last.fm. The normalized discounted cumulative gain (NDCG) (i.e., accuracy) is not much different from that of the item-based existing studies and is even higher when the number of users is low in a group in MovieLens 100 k.
Young-Duk Seo; Young-Gab Kim; Euijong Lee; Hyungjin Kim. Group recommender system based on genre preference focusing on reducing the clustering cost. Expert Systems with Applications 2021, 183, 115396 .
AMA StyleYoung-Duk Seo, Young-Gab Kim, Euijong Lee, Hyungjin Kim. Group recommender system based on genre preference focusing on reducing the clustering cost. Expert Systems with Applications. 2021; 183 ():115396.
Chicago/Turabian StyleYoung-Duk Seo; Young-Gab Kim; Euijong Lee; Hyungjin Kim. 2021. "Group recommender system based on genre preference focusing on reducing the clustering cost." Expert Systems with Applications 183, no. : 115396.
Sentiment analysis is a useful method to extract user preferences from product reviews; however, it cannot explain the detailed reasons for user preferences because of the exclusion of neutral sentiment words, constituting a large proportion of the words used in reviews. In contrast, there are limitations to using root cause analysis to analyze sentiment relations using sentiment words extracted from user preferences. This research aimed to extract a more fine-grained root cause by proposing a novel method capable of analyzing the root cause based on the relations between sentiment words. To identify the root causes of negative opinions in aspect-level sentiment analysis, we analyze the hierarchical and causal relations between sentiment triples and utilize hierarchical clustering based on sentiment triples’ relation to compensate for general sentiment words. The experimental results showed that the proposed method was 6.4% and 5.1% more accurate than the existing aspect-level analysis for the mobile device and clothing domains, respectively. Finally, we discussed some issues associated with the proposed method using a qualitative evaluation. In this study, a novel root cause identification method that can utilize the hierarchical and causal relations between sentiment words using negative and neutral sentiment expressions of product reviews is proposed.
Sang-Min Park; Young-Gab Kim. Root Cause Analysis Based on Relations Among Sentiment Words. Cognitive Computation 2021, 1 -16.
AMA StyleSang-Min Park, Young-Gab Kim. Root Cause Analysis Based on Relations Among Sentiment Words. Cognitive Computation. 2021; ():1-16.
Chicago/Turabian StyleSang-Min Park; Young-Gab Kim. 2021. "Root Cause Analysis Based on Relations Among Sentiment Words." Cognitive Computation , no. : 1-16.
Military weapon systems are considered as “system of systems” (SoS). They comprise various equipment based on computers and networks and have been developed using commercial computing technology for several decades. The state-of-the-art weapon systems are information technology (IT) systems, for example, the cyber-physical system. In particular, the naval combat system, which is a weapon system, is a representative system interconnecting a number of equipments by using commercial computing technology. It is a software-based complex system, which produces and shares information about naval tactical situations by interconnecting the various systems installed on ships or remote platforms. Moreover, it performs tactical combat functions automatically or manually for assigned missions. As the core function and performance of the combat system shift from being hardware-centric to software-centric, cybersecurity threats to software that can affect the combat systems may emerge as a novel issue. The failure of the combat system to perform normal combat functions in an actual naval combat situation owing to cybersecurity issues is a very serious risk to naval operations. However, software security testing is not conducted systematically during system development because the cybersecurity of the combat system is evaluated to be less important than its function and performance, resulting in the development of an insecure and vulnerable combat system against cybersecurity threats. To build a secure combat system against cyberattacks, it is important to derive systematic and practical security testing for the combat system software during system development. This paper analyzes the previous researches on a software security test, characteristics of the combat system software, and guidelines for the software security testing of the Korean military’s weapon system development. In addition, it proposes improved software security testing to strengthen the cybersecurity of the combat system based on its characteristics and missions.
Cheol-Gyu Yi; Young-Gab Kim. Security Testing for Naval Ship Combat System Software. IEEE Access 2021, 9, 66839 -66851.
AMA StyleCheol-Gyu Yi, Young-Gab Kim. Security Testing for Naval Ship Combat System Software. IEEE Access. 2021; 9 ():66839-66851.
Chicago/Turabian StyleCheol-Gyu Yi; Young-Gab Kim. 2021. "Security Testing for Naval Ship Combat System Software." IEEE Access 9, no. : 66839-66851.
Recently, there has been an increase in studies relating to the Internet of Things (IoT) in various fields, such as smart cities, smart homes, smart factories, and healthcare. In an IoT environment, several entities, including users, devices, and information resources, are interconnected and interworked with services. Therefore, interoperability between different entities is essential to accomplish the goals of IoT systems. Further, security is another important aspect to achieve in an IoT environment to protect information resources and privacy when networking between different entities. Therefore, security and interoperability may be significant barriers in the implementation of IoT in the real world. Several studies have been conducted to investigate methods for accomplishing interoperability and security in IoT, but they address only specific problems. Hence, compatibility and generality must be considered to accomplish the goals of IoT systems. International standards provide general methods by listing protocols, rules, guidelines, and characteristics that are defined and approved by authorized organizations, helping develop and manage systems efficiently by applying these standards; interoperability and security are supported by adopting standards in development and management. Therefore, the adoption of international standards is required to overcome the barriers in IoT. Furthermore, international standard organizations are developing IoT-related standards that may provide a solution to interoperability and security. However, a study focusing on interoperability-and security-related standards has not yet been conducted. Therefore, in this paper, we focus on international standards related to interoperability and security for IoT environments. Moreover, we studied international standard organizations that have been developing standards for IoT. In this study, a systematic literature review is conducted, and international standards are analyzed. In addition, any remaining challenges related to interoperability and security for IoT standards are discussed.
Euijong Lee; Young-Duk Seo; Se-Ra Oh; Young-Gab Kim. A Survey on Standards for Interoperability and Security in the Internet of Things. IEEE Communications Surveys & Tutorials 2021, 23, 1020 -1047.
AMA StyleEuijong Lee, Young-Duk Seo, Se-Ra Oh, Young-Gab Kim. A Survey on Standards for Interoperability and Security in the Internet of Things. IEEE Communications Surveys & Tutorials. 2021; 23 (2):1020-1047.
Chicago/Turabian StyleEuijong Lee; Young-Duk Seo; Se-Ra Oh; Young-Gab Kim. 2021. "A Survey on Standards for Interoperability and Security in the Internet of Things." IEEE Communications Surveys & Tutorials 23, no. 2: 1020-1047.
A range of video contents and technology have provided convenience to humans, with real-time video applications—such as surveillance applications—able to contribute to increasing public safety by reducing physical crimes. The development of video technology has made it possible to achieve an improved quality of life. However, this technology can also be exploited and lead to security issues such as physical and digital crimes. Unfortunately, security breaches are increasing in complexity and frequency, making current countermeasures insufficient to prevent them. Given recent trends, we recognize the need for security technology to respond to advanced video crimes. Intelligent security is one of the methods that can be used to respond to these issues. Although research on video data security has been actively conducted, not enough studies have been published on video data security that also addresses intelligent security. Specifically, a classification system for research on video data security has not been provided, and no systematic analysis has been conducted for advanced research. Thus, the purpose of this is to fill in these gaps in existing research. This study offers a classification of research on video data security based on the collection and analysis of related works. Moreover, this study presents an analysis of research on video data security technologies combined with intelligent technologies based on SLR methodology.
Jin-Yong Yu; Yujun Kim; Young-Gab Kim. Intelligent Video Data Security: A Survey and Open Challenges. IEEE Access 2021, 9, 26948 -26967.
AMA StyleJin-Yong Yu, Yujun Kim, Young-Gab Kim. Intelligent Video Data Security: A Survey and Open Challenges. IEEE Access. 2021; 9 ():26948-26967.
Chicago/Turabian StyleJin-Yong Yu; Yujun Kim; Young-Gab Kim. 2021. "Intelligent Video Data Security: A Survey and Open Challenges." IEEE Access 9, no. : 26948-26967.
Optimization of resource consumption and decreasing the response time of authentication requests is an immense urgent requirement for supporting the scalability of resources in IoT environments. The existing research attempts to design lightweight authentication protocols to address these issues. However, the schemes proposed in the literature are lacking in the creation of a lightweight (i.e., low computing, communication, and storage cost) and secure architecture. IoT devices in existing approaches consume high electricity and computing power, despite the fact that IoT devices have limited power and computing capabilities. Furthermore, the existing approaches lead to an increase in the burden on storage memory and also create heavy traffic on a communication channel, increasing the response time of device authentication requests. To overcome these limitations, we propose a novel lightweight and secure architecture that uses crypto-modules, which optimize the usage of one-way hash functions, elliptic-curve cryptography, and an exclusive-or operation. We demonstrate the proposed scheme’s security strength using informal security analysis and verified it by considering the widely used automated validation of internet security protocol application (AVISPA) and the ProVerif tool. The result shows that the proposed scheme is effective against active and passive security attacks and satisfies secure design. Moreover, we calculate the proposed scheme’s working cost by implementing it using a widely accepted standard pairing-based cryptography (PBC) library on embedded devices. The implementation proves that the proposed scheme is lightweight and reduces computation time by 0.933 ms, communication cost by 1408 bits, and storage cost by 384 bits, and removes the existing gaps.
Abhijeet Thakare; Young-Gab Kim. Secure and Efficient Authentication Scheme in IoT Environments. Applied Sciences 2021, 11, 1260 .
AMA StyleAbhijeet Thakare, Young-Gab Kim. Secure and Efficient Authentication Scheme in IoT Environments. Applied Sciences. 2021; 11 (3):1260.
Chicago/Turabian StyleAbhijeet Thakare; Young-Gab Kim. 2021. "Secure and Efficient Authentication Scheme in IoT Environments." Applied Sciences 11, no. 3: 1260.
The use of big data in various fields has led to a rapid increase in a wide variety of data resources, and various data analysis technologies such as standardized data mining and statistical analysis techniques are accelerating the continuous expansion of the big data market. An important characteristic of big data is that data from various sources have life cycles from collection to destruction, and new information can be derived through analysis, combination, and utilization. However, each phase of the life cycle presents data security and reliability issues, making the protection of personally identifiable information a critical objective. In particular, user tendencies can be analyzed using various big data analytics, and this information leads to the invasion of personal privacy. Therefore, this paper identifies threats and security issues that occur in the life cycle of big data by confirming the current standards developed by international standardization organizations and analyzing related studies. In addition, we divide a big data life cycle into five phases (i.e., collection, storage, analytics, utilization, and destruction), and define the security taxonomy of the big data life cycle based on the identified threats and security issues.
Jahoon Koo; Giluk Kang; Young-Gab Kim. Security and Privacy in Big Data Life Cycle: A Survey and Open Challenges. Sustainability 2020, 12, 10571 .
AMA StyleJahoon Koo, Giluk Kang, Young-Gab Kim. Security and Privacy in Big Data Life Cycle: A Survey and Open Challenges. Sustainability. 2020; 12 (24):10571.
Chicago/Turabian StyleJahoon Koo; Giluk Kang; Young-Gab Kim. 2020. "Security and Privacy in Big Data Life Cycle: A Survey and Open Challenges." Sustainability 12, no. 24: 10571.
The story is the description of events in chronological order that have occurred between people. By delivering facts to the people reading the story, it enables them to feel emotions. Such a story is composed using the following method: each event is analyzed and a storyline is composed, which becomes a skeleton text by linking relationships between major events. As the content of users becomes more diverse, multimodal story composition has become more essential than unimodal text-based story composition. This paper discusses modality integration based on multimodal data types and type conversion for multimodal story composition. We propose a story-graph model to create a story based on the integrated analysis of various modal data. In terms of architecture, the proposed multimodal storytelling model consists of modal data and a topic modeling module that performs clustering based on cross-modal similarities and extracts a topic of clustered modalities. From the perspective of utilization, to visualize a story-graph, the proposed model summarizes nodes with a representative image. Furthermore, the latest techniques are discussed with respect to five main modules and twelve sub-modules for story composition. Lastly, problems that can become issues when composing multimodal story modules are explained.
Sang-Min Park; Young-Gab Kim. Survey and challenges of story generation models - A multimodal perspective with five steps: data embedding, topic modeling, storyline generation, draft story generation, and story evaluation. Information Fusion 2020, 67, 1 .
AMA StyleSang-Min Park, Young-Gab Kim. Survey and challenges of story generation models - A multimodal perspective with five steps: data embedding, topic modeling, storyline generation, draft story generation, and story evaluation. Information Fusion. 2020; 67 ():1.
Chicago/Turabian StyleSang-Min Park; Young-Gab Kim. 2020. "Survey and challenges of story generation models - A multimodal perspective with five steps: data embedding, topic modeling, storyline generation, draft story generation, and story evaluation." Information Fusion 67, no. : 1.
Currently, software systems are operated in a dynamic and an uncertain environment, making it difficult to predict the operating environment. Particularly, the Internet of Things (IoT) interconnects several entities, users, and information resources with services. Therefore, IoT systems can dynamically create various environments at runtime. Consequently, to support the dynamic IoT environment, an efficient verification method is required for IoT systems. Model checking is one of the formal methods for verification of concurrent systems, which is applied in several software fields. However, model checking has a chronic problem (i.e., state explosion) that obstructs the verification at runtime. To overcome this limitation, one possible approach is to abstract the system design as expression forms, and then perform verification by solving the expressions. To apply this approach, the abstraction and verification processes need to be performed at a reasonable time. In this study, we focused on developing an efficient model checking method during the IoT system runtime verification. A cache mechanism is proposed that reduces the computational time for abstraction and verification, which was validated through experiments. Additionally, the comparison of other model checking tools (such as RINGA, CadenceSMV, NuSMV, and nuXmv) reveals that the proposed approach is more efficient at runtime.
Euijong Lee; Young-Duk Seo; Young-Gab Kim. A Cache-based Model Abstraction and Runtime Verification for the Internet of Things Applications. IEEE Internet of Things Journal 2020, 7, 8886 -8901.
AMA StyleEuijong Lee, Young-Duk Seo, Young-Gab Kim. A Cache-based Model Abstraction and Runtime Verification for the Internet of Things Applications. IEEE Internet of Things Journal. 2020; 7 (9):8886-8901.
Chicago/Turabian StyleEuijong Lee; Young-Duk Seo; Young-Gab Kim. 2020. "A Cache-based Model Abstraction and Runtime Verification for the Internet of Things Applications." IEEE Internet of Things Journal 7, no. 9: 8886-8901.
With the emergence of new smart technologies, including the Internet of Things, wireless media are playing an important role to connect numerous devices to fulfill the requirements of newly developed communication systems. The massive connectivity, therefore, made the wireless spectrum too crowded and gave several challenges to resisting against potential wireless jammers. Note that, the two main challenges that have always been a part of any communication system, especially in the case of wireless communication, are information security and information jamming. Carefully considering the given challenges, this study uses a new advanced anti-jamming approach, a modulation technique based on the frequency-hopping spread spectrum, which has notably high resistance accounted against various potential jammers. The objective of this study is two-fold. First, the physical channel properties are considered, and the random bits are transmitted, employing a cryptographic secured hoping-spread pattern, having a set of carrier frequencies, known at both sides of the transmission. Second, the hashing code is computed only for the key, and transmitted along the original hopset, but with distinct frequencies set. The deployed practical anti-jamming approach, therefore, computed a high efficiency to examine the information secrecy well and primarily the connection availability even in the presence of the jammers. Moreover, this study considered and modeled a communication system and evaluated the proposed system’s performance, applying the theories of Shannon’s entropy and Wyner’s entropy (i.e. Wyner’s wiretap channel), to anticipate the system’s perfect secrecy, even in the worst case when jammer has unlimited computational capabilities.
Aamir Shahzad; Kaiwen Zhang; Jr René Landry; Neal Xiong; Young-Gab Kim. An efficient emerging network and secured hopping scheme employed over the unsecured public channels. International Journal of Distributed Sensor Networks 2020, 16, 1 .
AMA StyleAamir Shahzad, Kaiwen Zhang, Jr René Landry, Neal Xiong, Young-Gab Kim. An efficient emerging network and secured hopping scheme employed over the unsecured public channels. International Journal of Distributed Sensor Networks. 2020; 16 (4):1.
Chicago/Turabian StyleAamir Shahzad; Kaiwen Zhang; Jr René Landry; Neal Xiong; Young-Gab Kim. 2020. "An efficient emerging network and secured hopping scheme employed over the unsecured public channels." International Journal of Distributed Sensor Networks 16, no. 4: 1.
Jin-Yong Yu; Euijong Lee; Se-Ra Oh; Young-Duk Seo; Young-Gab Kim. A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security. IEEE Access 2020, 8, 45304 -45324.
AMA StyleJin-Yong Yu, Euijong Lee, Se-Ra Oh, Young-Duk Seo, Young-Gab Kim. A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security. IEEE Access. 2020; 8 ():45304-45324.
Chicago/Turabian StyleJin-Yong Yu; Euijong Lee; Se-Ra Oh; Young-Duk Seo; Young-Gab Kim. 2020. "A Survey on Security Requirements for WSNs: Focusing on the Characteristics Related to Security." IEEE Access 8, no. : 45304-45324.
Internet of Things has become a fundamental paradigm in our everyday lives. However, standards and technologies are often designed without considering interoperability, which is a critical issue for Internet of Things. Internet of Things environment requires interoperability to share resources (e.g. data and services) between heterogeneous Internet of Things domains. The open authorization (OAuth) 2.0 framework that is actively used in Internet of Things (as well as in conventional web environments) also did not focus on interoperability. In other words, the systems that implement the same OAuth 2.0 standard cannot interoperate without additional support. For this reason, we propose an authorization framework as a service. Authorization framework as a service provides an additional authorization layer to support standard authorization capabilities as an interoperable secure wrapper between different domains. Besides, authorization framework as a service supports the four extended authorization grant flow types to issue an interoperable access token, which has a global access scope across multiple heterogeneous domains. With the authorization framework as a service, interoperability can be supported for heterogeneous domains, and token management can also be simple because an interoperable access token can represent several existing access tokens that have local access scopes. Furthermore, this article presents a feasible interoperability scenario, implementation, and security considerations for authorization framework as a service, focusing on Internet of Things platforms.
Se-Ra Oh; Young-Gab Kim. AFaaS: Authorization framework as a service for Internet of Things based on interoperable OAuth. International Journal of Distributed Sensor Networks 2020, 16, 1 .
AMA StyleSe-Ra Oh, Young-Gab Kim. AFaaS: Authorization framework as a service for Internet of Things based on interoperable OAuth. International Journal of Distributed Sensor Networks. 2020; 16 (2):1.
Chicago/Turabian StyleSe-Ra Oh; Young-Gab Kim. 2020. "AFaaS: Authorization framework as a service for Internet of Things based on interoperable OAuth." International Journal of Distributed Sensor Networks 16, no. 2: 1.
With the development of the fourth industrial technology, such as the Internet of Things (IoT) and cloud computing, developed countries including the U.S. are investigating the efficiency of national defense, the public sector and national innovation, and constructing the infrastructure for cloud computing environments through related policies. The Republic of Korea is enacting the related legislation and considering the fourth industrial technology in various fields. Particularly, it is considering the adaptation of the cloud to the command and control system in the national defense sector; hence, related research and pilot projects are being conducted. However, if the existing information system is converted to a cloud computing system by introducing IoT devices, existing security requirements cannot solve problems related to the security vulnerabilities of cloud computing. Therefore, to build a cloud-based secure command and control system, it is necessary to derive additional cloud computing-related security requirements that are lacking in the existing security requirements, and to build a secure national defense command and control system architecture based upon it. In this paper, we derive security requirements for a cloud-based command control system, propose a security architecture designed based thereupon, and implement a security architecture with an open-stack-based cloud platform, “OpenStack”.
Jahoon Koo; Se-Ra Oh; Sang Hoon Lee; Young-Gab Kim. Security Architecture for Cloud-Based Command and Control System in IoT Environment. Applied Sciences 2020, 10, 1035 .
AMA StyleJahoon Koo, Se-Ra Oh, Sang Hoon Lee, Young-Gab Kim. Security Architecture for Cloud-Based Command and Control System in IoT Environment. Applied Sciences. 2020; 10 (3):1035.
Chicago/Turabian StyleJahoon Koo; Se-Ra Oh; Sang Hoon Lee; Young-Gab Kim. 2020. "Security Architecture for Cloud-Based Command and Control System in IoT Environment." Applied Sciences 10, no. 3: 1035.
Abhijeet Thakare; Euijong Lee; Ajay Kumar; Valmik B. Nikam; Young-Gab Kim. PARBAC: Priority-Attribute-Based RBAC Model for Azure IoT Cloud. IEEE Internet of Things Journal 2020, 7, 2890 -2900.
AMA StyleAbhijeet Thakare, Euijong Lee, Ajay Kumar, Valmik B. Nikam, Young-Gab Kim. PARBAC: Priority-Attribute-Based RBAC Model for Azure IoT Cloud. IEEE Internet of Things Journal. 2020; 7 (4):2890-2900.
Chicago/Turabian StyleAbhijeet Thakare; Euijong Lee; Ajay Kumar; Valmik B. Nikam; Young-Gab Kim. 2020. "PARBAC: Priority-Attribute-Based RBAC Model for Azure IoT Cloud." IEEE Internet of Things Journal 7, no. 4: 2890-2900.
Internet protocol television (IPTV) provides video on demand (VOD), internet service, and real-time broadcasting to users as a service that combines broadcasting and communication technology. Among various services, the sales of VOD are profitable because VODs offer relatively strong direct revenue models in IPTV services. However, the development of a VOD recommender system for IPTV service is highly challenging owing to the lack of explicit preference information of users in an IPTV environment. Previous studies for IPTV VOD recommender systems have attempted to solve the data sparsity problem through implicit preference information; however, it is better to utilize explicit preference information to improve the performance of system. Recently, IPTV service providers have provided their own over-the-top (OTT) services such that explicit preference information of users for items can be combined. Therefore, we proposed a novel information fusion method for an IPTV VOD recommender system that integrates the explicit information of both IPTV and OTT services. In addition, we utilized the probabilistic matrix factorization, that guarantees high performance in most recommender systems, as a recommender algorithm in this study. Finally, we conducted comparative evaluations based on various metrics and validated that the information fusion of IPTV and OTT services contribute to the IPTV VOD recommender system.
Young-Duk Seo; Euijong Lee; Young-Gab Kim. Video on demand recommender system for internet protocol television service based on explicit information fusion. Expert Systems with Applications 2019, 143, 113045 .
AMA StyleYoung-Duk Seo, Euijong Lee, Young-Gab Kim. Video on demand recommender system for internet protocol television service based on explicit information fusion. Expert Systems with Applications. 2019; 143 ():113045.
Chicago/Turabian StyleYoung-Duk Seo; Euijong Lee; Young-Gab Kim. 2019. "Video on demand recommender system for internet protocol television service based on explicit information fusion." Expert Systems with Applications 143, no. : 113045.
The Internet of Things (IoT) connects a wide range of objects and the types of environments in which IoT can be deployed dynamically change. Therefore, these environments can be modified dynamically at runtime considering the emergence of other requirements. Self-adaptive software alters its behavior to satisfy the requirements in a dynamic environment. In this context, the concept of self-adaptive software is suitable for some dynamic IoT environments (e.g., smart greenhouses, smart homes, and reality applications). In this study, we propose a self-adaptive framework for decision-making in an IoT environment at runtime. The framework comprises a finite-state machine model design and a game theoretic decision-making method for extracting efficient strategies. The framework was implemented as a prototype and experiments were conducted to evaluate its runtime performance. The results demonstrate that the proposed framework can be applied to IoT environments at runtime. In addition, a smart greenhouse-based use case is included to illustrate the usability of the proposed framework.
Euijong Lee; Young-Duk Seo; Young-Gab Kim. Self-Adaptive Framework Based on MAPE Loop for Internet of Things. Sensors 2019, 19, 2996 .
AMA StyleEuijong Lee, Young-Duk Seo, Young-Gab Kim. Self-Adaptive Framework Based on MAPE Loop for Internet of Things. Sensors. 2019; 19 (13):2996.
Chicago/Turabian StyleEuijong Lee; Young-Duk Seo; Young-Gab Kim. 2019. "Self-Adaptive Framework Based on MAPE Loop for Internet of Things." Sensors 19, no. 13: 2996.
In recent years, the Internet of Things (IoT) has gained global popularity. IoT can connect several objects and create a dynamic environment; thus, an IoT system must adapt to environmental changes. To adapt to a dynamic environment, an effective decision-making method is required for an IoT system. Game theory is a mathematical method for decision-making among decision makers, and it may be applied to decision-making for an IoT system. In addition, the concept of self-adaptive software may be applied to IoT because such software evaluates and changes its behavior to satisfy its intended use, and the IoT system then makes decisions and adapts to its dynamic environment. In this study, a decision-making method is proposed along with game theoretic decision-making and self-adaptive loop mechanisms for IoT. The proposed method is based on MAPE-K loops, which are general processes used in self-adaptive software with shared knowledge. In addition, Nash equilibrium is applied to extract candidate strategies, which are evaluated for selecting the most optimal solution. The proposed method was implemented as a prototype, and experiments were conducted to evaluate its runtime performance. The results show that the proposed method can be applied to an IoT environment at runtime.
Euijong Lee; Young-Duk Seo; Young-Gab Kim. A Nash equilibrium based decision-making method for internet of things. Journal of Ambient Intelligence and Humanized Computing 2019, 1 -9.
AMA StyleEuijong Lee, Young-Duk Seo, Young-Gab Kim. A Nash equilibrium based decision-making method for internet of things. Journal of Ambient Intelligence and Humanized Computing. 2019; ():1-9.
Chicago/Turabian StyleEuijong Lee; Young-Duk Seo; Young-Gab Kim. 2019. "A Nash equilibrium based decision-making method for internet of things." Journal of Ambient Intelligence and Humanized Computing , no. : 1-9.
Due to the rapid development of Internet of Things (IoT), IoT platforms that can provide common functions for things are becoming increasingly important. However, access control frameworks in diverse IoT platforms have been developed for individual security goals, designs, and technologies. In particular, current OAuth-based access control frameworks that are widely used in IoT research have not been providing interoperability among IoT platforms even though sharing resources and services is a critical issue for IoT platforms. Therefore, we analyze the main requirements for an IoT access control framework to properly design our framework and propose an interoperable access control framework based on OAuth 2.0 and Role. Our approach describes a new extended authorization grant flow to issue an Interoperable Access Token (IAT) that has a global access scope across IoT platforms using multiple pairs of clients’ credentials. With the IAT and proposed framework, we can access client-specific domains in heterogeneous IoT platforms, then valuable resources (e.g., data and services) in the domains can be accessed by validating the roles, which will greatly simplify permission management. Furthermore, IAT supports a simple token management (e.g., token issuance, refreshing, and revocation) by managing only one token for diverse IoT platforms. In addition, we implement our interoperable access control framework on Mobius and FIWARE, which are promising open-source IoT platforms, and test an interoperability scenario to demonstrate our approach with the implementation. Furthermore, the proposed framework is compared with other IoT access control approaches based on the selected requirements in this paper.
Se-Ra Oh; Young-Gab Kim; Sanghyun Cho. An Interoperable Access Control Framework for Diverse IoT Platforms Based on OAuth and Role. Sensors 2019, 19, 1884 .
AMA StyleSe-Ra Oh, Young-Gab Kim, Sanghyun Cho. An Interoperable Access Control Framework for Diverse IoT Platforms Based on OAuth and Role. Sensors. 2019; 19 (8):1884.
Chicago/Turabian StyleSe-Ra Oh; Young-Gab Kim; Sanghyun Cho. 2019. "An Interoperable Access Control Framework for Diverse IoT Platforms Based on OAuth and Role." Sensors 19, no. 8: 1884.
With the continuous improvement of Internet of Things (IoT) technologies, various IoT platforms are under development. However, each IoT platform is developed based on its own device identification system. That is, it is challenging to identify each sensor device between heterogeneous IoT platforms owing to the resource request format (e.g., device identifier) varying between platforms. Moreover, despite the considerable research focusing on resource interoperability between heterogeneous IoT platforms, little attention is given to sensor device identification systems in diverse IoT platforms. In order to overcome this problem, the current work proposes an IoT device name system (DNS) architecture based on the comparative analysis of heterogeneous IoT platforms (i.e., oneM2M, GS1 'Oliot', IBM 'Watson IoT', OCF 'IoTivity', FIWARE). The proposed IoT DNS analyzes and translates the identification system of the device and resource request format. In this process, resource requests between heterogeneous IoT platforms can be reconfigured appropriately for the resources and services requested by the user, and as a result, users can use heterogeneous IoT services. Furthermore, in order to illustrate the aim of the proposed architecture, the proposed IoT DNS is implemented and tested on a microcomputer. The experimental results show that a oneM2M-based device successfully performs a resource request to a Watson IoT and FIWARE sensor devices.
Jahoon Koo; Se-Ra Oh; Young-Gab Kim. Device Identification Interoperability in Heterogeneous IoT Platforms. Sensors 2019, 19, 1433 .
AMA StyleJahoon Koo, Se-Ra Oh, Young-Gab Kim. Device Identification Interoperability in Heterogeneous IoT Platforms. Sensors. 2019; 19 (6):1433.
Chicago/Turabian StyleJahoon Koo; Se-Ra Oh; Young-Gab Kim. 2019. "Device Identification Interoperability in Heterogeneous IoT Platforms." Sensors 19, no. 6: 1433.
Telemonitoring is not a new term, in information technology (IT), which has been employed to remotely monitor the health of patients that are located not in common places, such hospitals or medical centers. For that, wearable medical sensors, such as electrocardiography sensors, blood pressure sensors, and glucometer, have commonly been used to make possible to acquire the real-time information from the remotely located patients; therefore, the medical information is further carried, via the Internet, to perform medical diagnosis and the corresponding treatments. Like in other IT sectors, there has been tremendous progress accounted in medical sectors (and in telemonitoring systems) that changes the human life protection against several chronic diseases, and the patient’s medical information can be accessed wirelessly via Wi-Fi and cellular systems. Further, with the advents of cloud computing technology, medical systems are now more efficient and scalable in processing, such as storage and access, the medical information with minimal development costs. This study is also a piece of enhancement made to track and monitor the real-time medical information, bounded in authorized area, through the modeling of private cloud computing. The private cloud-based environment is designed, for patient health monitoring called bounded telemonitoring system, to acquire the real-time medical information of patients that resided in the boundary, inside medical wards and outside medical wards, of the medical center. A new wireless sensor network scenario is designed and modeled to keep or monitor the patients’ health information whole day, 24 hours. This research is a new secured sight towards medical information access and gives directions for future developments in the medical systems.
Aamir Shahzad; Yang Sun Lee; Malrey Lee; Young-Gab Kim; Naixue Xiong. Real-Time Cloud-Based Health Tracking and Monitoring System in Designed Boundary for Cardiology Patients. Journal of Sensors 2018, 2018, 1 -15.
AMA StyleAamir Shahzad, Yang Sun Lee, Malrey Lee, Young-Gab Kim, Naixue Xiong. Real-Time Cloud-Based Health Tracking and Monitoring System in Designed Boundary for Cardiology Patients. Journal of Sensors. 2018; 2018 ():1-15.
Chicago/Turabian StyleAamir Shahzad; Yang Sun Lee; Malrey Lee; Young-Gab Kim; Naixue Xiong. 2018. "Real-Time Cloud-Based Health Tracking and Monitoring System in Designed Boundary for Cardiology Patients." Journal of Sensors 2018, no. : 1-15.