This page has only limited features, please log in for full access.

Unclaimed
Il-Gu Lee
Department of Future Convergence Technology Engineering, Sungshin University, Seoul 02844, Korea

Basic Info

Basic Info is private.

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 17 November 2020 in Electronics
Reads 0
Downloads 0

With the recent development and popularization of various network technologies, communicating with people at any time, and from any location, using high-speed internet, has become easily accessible. At the same time, eavesdropping, data interception, personal data leakage, and distribution of malware during the information transfer process have become easier than ever. Recently, to respond to such threats, end-to-end encryption (E2EE) technology has been widely implemented in commercial network services as a popular information security system. However, with the use of E2EE technology, it is difficult to check whether an encrypted packet is malicious in an information security system. A number of studies have been previously conducted on deep packet inspection (DPI) through trustable information security systems. However, the E2EE is not maintained when conducting a DPI, which requires a long inspection time. Thus, in this study, a fast packet inspection (FPI) and its frame structure for quickly detecting known malware patterns while maintaining E2EE are proposed. Based on the simulation results, the proposed FPI allows for inspecting packets approximately 14.4 and 5.3 times faster, respectively, when the inspection coverage is 20% and 100%, as compared with a DPI method under a simulation environment in which the payload length is set to 640 bytes.

ACS Style

So-Yeon Kim; Sun-Woo Yun; Eun-Young Lee; So-Hyeon Bae; Il-Gu Lee. Fast Packet Inspection for End-To-End Encryption. Electronics 2020, 9, 1937 .

AMA Style

So-Yeon Kim, Sun-Woo Yun, Eun-Young Lee, So-Hyeon Bae, Il-Gu Lee. Fast Packet Inspection for End-To-End Encryption. Electronics. 2020; 9 (11):1937.

Chicago/Turabian Style

So-Yeon Kim; Sun-Woo Yun; Eun-Young Lee; So-Hyeon Bae; Il-Gu Lee. 2020. "Fast Packet Inspection for End-To-End Encryption." Electronics 9, no. 11: 1937.

Article
Published: 28 April 2020 in Wireless Personal Communications
Reads 0
Downloads 0

In general, Internet of Things (IoT) devices collect status information or operate according to control commands from other devices. If the safety and reliability of externally accessed devices are compromised, the risk of exposure of internally collected privacy information or abnormal operation of internal devices increases. This paper proposes a method of building a safe smart home environment by pre-blocking devices that may cause a risk by performing mutual safety verification between devices prior to data transmission and reception through the Session Initiation Protocol (SIP) of the home network. Using a Samsung’s commercial smartphone, not a development board to implement the device’s own verification function, and using an open source application and a SIP server providing free service, we established a test environment that is practically applicable and proved the feasibility of the attestation operation of the device. As a result of an operation test involving the capturing of packet data on a communication channel between two devices, it was confirmed that the transmission of parameter data for the actual attestation in SIP/Session Description Protocol packets succeeded without any problems. It was also confirmed that the final verification result of the target device was correctly derived. With the proposed method, it is possible to establish a safe trust relationship between smart home devices and external smart devices or between various IoT devices while also securing the smart home environment by blocking communications with devices that intentionally seek to do harm.

ACS Style

Jaehwan Ahn; Il-Gu Lee; Myungchul Kim. Design and Implementation of Hardware-Based Remote Attestation for a Secure Internet of Things. Wireless Personal Communications 2020, 114, 295 -327.

AMA Style

Jaehwan Ahn, Il-Gu Lee, Myungchul Kim. Design and Implementation of Hardware-Based Remote Attestation for a Secure Internet of Things. Wireless Personal Communications. 2020; 114 (1):295-327.

Chicago/Turabian Style

Jaehwan Ahn; Il-Gu Lee; Myungchul Kim. 2020. "Design and Implementation of Hardware-Based Remote Attestation for a Secure Internet of Things." Wireless Personal Communications 114, no. 1: 295-327.

Journal article
Published: 05 April 2020 in Sensors
Reads 0
Downloads 0

Wi-Fi technology connects sensor-based things that operate with small batteries, and allows them to access the Internet from anywhere at any time and perform networking. It has become a critical element in many areas of daily life and industry, including smart homes, smart factories, smart grids, and smart cities. The Wi-Fi-based Internet of things is gradually expanding its range of uses from new industries to areas that are intimately connected to people’s lives, safety, and property. Wi-Fi technology has undergone a 20-year standardization process and continues to evolve to improve transmission speeds and service quality. Simultaneously, it has also been strengthening power-saving technology and security technology to improve energy efficiency and security while maintaining backward compatibility with past standards. This study analyzed the security vulnerabilities of the Wi-Fi power-saving mechanism used in smart devices and experimentally proved the feasibility of a battery draining attack (BDA) on commercial smartphones. The results of the experiment showed that when a battery draining attack was performed on power-saving Wi-Fi, 14 times the amount of energy was consumed compared with when a battery draining attack was not performed. This study analyzed the security vulnerabilities of the power-saving mechanism and discusses countermeasures.

ACS Style

Il-Gu Lee; Kyungmin Go; Jung Hoon Lee. Battery Draining Attack and Defense against Power Saving Wireless LAN Devices. Sensors 2020, 20, 2043 .

AMA Style

Il-Gu Lee, Kyungmin Go, Jung Hoon Lee. Battery Draining Attack and Defense against Power Saving Wireless LAN Devices. Sensors. 2020; 20 (7):2043.

Chicago/Turabian Style

Il-Gu Lee; Kyungmin Go; Jung Hoon Lee. 2020. "Battery Draining Attack and Defense against Power Saving Wireless LAN Devices." Sensors 20, no. 7: 2043.

Journal article
Published: 13 September 2019 in Future Generation Computer Systems
Reads 0
Downloads 0

Physical layer security based on non-orthogonal multiple access (NOMA) and artificial jamming (AJ) is considered in a one-way amplify-and-forward (AF) relay network with an untrusted relay. In the first phase of the two-phase operation of the untrusted AF relay network, a source node transmits the first information and AJ symbols, and the destination decodes the AJ symbol first and waits for the relayed replica of the first information symbol, which is forwarded by the untrusted relay. In the second phase, the source sends the second information symbol and the relay amplifies and forwards the received signal in the first phase with a fixed gain. In such an operation scenario, an untrusted relay tries to eavesdrop on the information signal while relaying the received signal properly. To decode the information symbol, the destination cancels out the AJ signal and then decodes the first information symbol by combining the signals received during the two phases. Finally, the second information symbol is decoded with the second-phase signal after cancelling out all the other symbols, i.e., the first information and AJ symbols. The eavesdropper and relay try to eavesdrop on the information signal with all possible orders of interference cancellation, i.e., NOMA receive processing. In this study, an ergodic secrecy rate is derived according to the operation scenario during the two phases. The behaviours of the ergodic secrecy rate with respect to power allocation to two information symbols as well as an AJ symbol are investigated. It is shown that the expected secrecy rate can be maximized by selecting the transmit power and rates for the three symbols properly. It is also demonstrated that the proposed physical layer security scheme achieves a higher secrecy rate than a secure beamformed transmission based on NOMA and artificial noise.

ACS Style

Heejung Yu; Il-Gu Lee. Physical layer security based on NOMA and AJ for MISOSE channels with an untrusted relay. Future Generation Computer Systems 2019, 102, 611 -618.

AMA Style

Heejung Yu, Il-Gu Lee. Physical layer security based on NOMA and AJ for MISOSE channels with an untrusted relay. Future Generation Computer Systems. 2019; 102 ():611-618.

Chicago/Turabian Style

Heejung Yu; Il-Gu Lee. 2019. "Physical layer security based on NOMA and AJ for MISOSE channels with an untrusted relay." Future Generation Computer Systems 102, no. : 611-618.

Journal article
Published: 03 July 2019 in Electronics
Reads 0
Downloads 0

The Internet of things (IoT) technology, which is currently considered the new growth engine of the fourth industrial revolution, affects our daily life and has been applied to various industrial fields. Studies on overcoming the limitations of scalability and stability in a centralized IoT operating environment by employing distributed blockchain technology have been actively conducted. However, the nature of IoT that ensures connectivity with multiple objects at any time and any place increases security threats. Further, it extends the influence of the cyber world into the physical domain, resulting in serious damage to human life and property. Therefore, we aim to study a method to increase the security of IoT devices and effectively extend them simultaneously. To this end, we analyze the authentication methods and limitations of traditional IoT devices and examine cases for improving IoT environments by using blockchain technology. Accordingly, we propose a framework that allows IoT devices to be securely connected and extended to other devices by automatically evaluating security using blockchain technology and the whitelist. The method proposed in this paper restricts the extension of devices vulnerable to security risks by imposing penalties and allows only devices with high security to be securely and quickly authenticated and extended without user intervention. In this study, we applied the proposed method to IoT network simulation environments and observed that the number of devices vulnerable to security was reduced by 48.5% compared with traditional IoT environments.

ACS Style

Ye-Jin Choi; Hee-Jung Kang; Il-Gu Lee. Scalable and Secure Internet of Things Connectivity. Electronics 2019, 8, 752 .

AMA Style

Ye-Jin Choi, Hee-Jung Kang, Il-Gu Lee. Scalable and Secure Internet of Things Connectivity. Electronics. 2019; 8 (7):752.

Chicago/Turabian Style

Ye-Jin Choi; Hee-Jung Kang; Il-Gu Lee. 2019. "Scalable and Secure Internet of Things Connectivity." Electronics 8, no. 7: 752.

Journal article
Published: 04 June 2018 in Future Internet
Reads 0
Downloads 0

The internet of things (IoTs) offers a wide range of consumer benefits, from personal portable devices to internet-connected infrastructure. The wireless local area network (WLAN) is one of the potential candidates for IoTs technology to connect billions of smart devices. Long-range WLAN is widely deployed in dense networks as an alternative to cellular networks or satellite internet access because of its low cost, high performance, and existing ecosystem. However, due to the nature of unregulated communications in industrial, scientific, and medical (ISM) bands, WLANs experience interferences from other radios such as radars and frequency hopping devices. Once interference is detected at a WLAN device, the channel is avoided and other channels become crowded. Thus, it degrades network throughput and channel utilization. In this paper, a secure inter-frame space communication system design is proposed for WLANs to share the ISM bands with other radio systems that generate periodic radio signals. The proposed secure inter-frame communication scheme achieves the goal by designing accurate radar detection and secure inter-frame space communication. The simulation results demonstrate that the proposed scheme significantly increases the receiver sensitivity and user datagram protocol throughput.

ACS Style

Il-Gu Lee. Secure Inter-Frame Space Communications for Wireless LANs. Future Internet 2018, 10, 47 .

AMA Style

Il-Gu Lee. Secure Inter-Frame Space Communications for Wireless LANs. Future Internet. 2018; 10 (6):47.

Chicago/Turabian Style

Il-Gu Lee. 2018. "Secure Inter-Frame Space Communications for Wireless LANs." Future Internet 10, no. 6: 47.

Journal article
Published: 09 August 2017 in Future Internet
Reads 0
Downloads 0

The Internet of Things (IoTs) will change the requirements for wireless connectivity significantly, mainly with regard to service coverage, data rate, and energy efficiency. Therefore, to improve robustness and reliability, WiFi-enabled IoT devices have been developed to use narrowband communication. However, narrowband transmission in WiFi such as IEEE 802.11ah causes relatively higher frequency error due to the reduced subcarrier space, which is larger than legacy wireless local area networks (WLANs) in 2.4/5 GHz frequencies. In a direct conversion receiver, this error degrades the signal quality due to the presence of direct current (DC) offset cancellation circuits. In this paper, a digital carrier frequency offset (CFO) predistortion scheme is proposed for a reliable communication link in dense networks. Evaluation results demonstrate that the proposed scheme can improve received signal quality in terms of packet error rate and error vector magnitude.

ACS Style

Il-Gu Lee. Digital Pre-Distortion of Carrier Frequency Offset for Reliable Wi-Fi Enabled IoTs. Future Internet 2017, 9, 46 .

AMA Style

Il-Gu Lee. Digital Pre-Distortion of Carrier Frequency Offset for Reliable Wi-Fi Enabled IoTs. Future Internet. 2017; 9 (3):46.

Chicago/Turabian Style

Il-Gu Lee. 2017. "Digital Pre-Distortion of Carrier Frequency Offset for Reliable Wi-Fi Enabled IoTs." Future Internet 9, no. 3: 46.

Journal article
Published: 18 July 2017 in Future Internet
Reads 0
Downloads 0

The wireless local area network (WLAN) is one of the most popular wireless technologies offering connectivity today, and one of the candidates for the internet of things (IoTs). However, WLAN’s inefficiency in terms of complexity and relatively large power consumption compared with other wireless standards has been reported as a major barrier for IoTs applications. This paper proposes an interference-aware opportunistic dynamic energy saving mechanism to improve energy efficiency for Wi-Fi enabled IoTs. The proposed scheme optimizes operating clock frequencies adaptively for signal processing when the mobile station transmits packets in partial sub-channels. Evaluation results demonstrate that the proposed scheme improves energy efficiency by approximately 34%.

ACS Style

Il-Gu Lee. Interference-Aware Opportunistic Dynamic Energy Saving Mechanism for Wi-Fi Enabled IoTs. Future Internet 2017, 9, 38 .

AMA Style

Il-Gu Lee. Interference-Aware Opportunistic Dynamic Energy Saving Mechanism for Wi-Fi Enabled IoTs. Future Internet. 2017; 9 (3):38.

Chicago/Turabian Style

Il-Gu Lee. 2017. "Interference-Aware Opportunistic Dynamic Energy Saving Mechanism for Wi-Fi Enabled IoTs." Future Internet 9, no. 3: 38.

Conference paper
Published: 01 January 2015 in Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services
Reads 0
Downloads 0
ACS Style

Il-Gu Lee; Myungchul Kim. Interference-Aware Self-Optimizing Carrier Sensor for High Efficiency Wireless LANs in Dense Networks. Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services 2015, 1 .

AMA Style

Il-Gu Lee, Myungchul Kim. Interference-Aware Self-Optimizing Carrier Sensor for High Efficiency Wireless LANs in Dense Networks. Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. 2015; ():1.

Chicago/Turabian Style

Il-Gu Lee; Myungchul Kim. 2015. "Interference-Aware Self-Optimizing Carrier Sensor for High Efficiency Wireless LANs in Dense Networks." Proceedings of the 12th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services , no. : 1.