This page has only limited features, please log in for full access.
Physical memory acquisition is a prerequisite when performing memory forensics, referring to a set of techniques for acquiring and analyzing traces associated with user activity information, malware analysis, cyber incident response, and similar areas when the traces remain in the physical RAM. However, certain types of malware have applied anti-memory forensics techniques to evade memory analysis strategies or to make the acquisition process impossible. To disturb the acquisition process of physical memory, an attacker hooks the kernel API, which returns a map of the physical memory spaces, and modifies the return value of the API, specifically that typically used by memory acquisition tools. Moreover, an attacker modifies the kernel object referenced by the kernel API. This causes the system to crash during the memory acquisition process or causes the memory acquisition tools to incorrectly proceed with the acquisition. Even with a modification of one byte, called a one-byte modification attack, some tools fail to acquire memory. Therefore, specialized countermeasure techniques are needed for these anti-memory forensics techniques. In this paper, we propose a memory layout acquisition method which is robust to kernel API hooking and the one-byte modification attack on NumberOfRuns, the kernel object used to construct the memory layout in Windows. The proposed acquisition method directly accesses the memory, extracts the byte array, and parses it in the form of a memory layout. When we access the memory, we extract the _PHYSICAL_MEMORY_DESCRIPTOR structure, which is the basis of the memory layout without using the existing memory layout acquisition API. Furthermore, we propose a verification method that selects a reliable memory layout. We realize the verification method by comparing NumberOfRuns and the memory layout acquired via the kernel API, the registry, and the proposed method. The proposed verification method guarantees the reliability of the memory layout and helps secure memory image acquisition through a comparative verification with existing memory layout acquisition methods. We also conduct experiments to prove that the proposed method is resistant to anti-memory forensics techniques, confirming that there are no significant differences in time compared to the existing tools.
Seungwon Jung; Seunghee Seo; Yeog Kim; Changhoon Lee. Memory Layout Extraction and Verification Method for Reliable Physical Memory Acquisition. Electronics 2021, 10, 1380 .
AMA StyleSeungwon Jung, Seunghee Seo, Yeog Kim, Changhoon Lee. Memory Layout Extraction and Verification Method for Reliable Physical Memory Acquisition. Electronics. 2021; 10 (12):1380.
Chicago/Turabian StyleSeungwon Jung; Seunghee Seo; Yeog Kim; Changhoon Lee. 2021. "Memory Layout Extraction and Verification Method for Reliable Physical Memory Acquisition." Electronics 10, no. 12: 1380.
Advanced information technologies have transformed into high-level services for more efficient use of energy resources through the fusion with the energy infrastructure. As a part of these technologies, the energy cloud is a technology that maximizes the efficiency of energy resources through the organic connection between the entities that produce and consume the energy. However, the disruption or destruction of energy cloud systems through cyberattacks can lead to incidents such as massive blackouts, which can lead to national disasters. Furthermore, since the technique and severity of modern cyberattacks continue to improve, the energy cloud environment must be designed to resist cyberattacks. However, since the energy cloud environment has different characteristics from general infrastructures such as the smart grid and the Advanced Metering Infrastructure (AMI), it requires security technology specialized to its environment. This paper proposes a cyber threat intelligence framework to improve the energy cloud environment’s security. Cyber Threat Intelligence (CTI) is a technology to actively respond to advanced cyber threats by collecting and analyzing various threat indicators and generating contextual knowledge about the cyber threats. The framework proposed in this paper analyzes threat indicators that can be collected in the advanced metering infrastructure and proposes a cyber threat intelligence generation technique targeting the energy cloud. This paper also proposes a method that can quickly apply a security model to a large-scale energy cloud infrastructure through a mechanism for sharing and spreading cyber threat intelligence between the AMI layer and the cloud layer. Our framework provides a way to effectively apply the proposed technologies through the CTI architecture, including the local AMI layer, the station layer, and the cloud layer. Furthermore, we show that the proposed framework can effectively respond to cyber threats by showing a 0.822 macro-F1 score and a 0.843 micro-F1 score for cyberattack detection in an environment that simulates a model of an attacker and an energy cloud environment.
Seonghyeon Gong; Changhoon Lee. Cyber Threat Intelligence Framework for Incident Response in an Energy Cloud Platform. Electronics 2021, 10, 239 .
AMA StyleSeonghyeon Gong, Changhoon Lee. Cyber Threat Intelligence Framework for Incident Response in an Energy Cloud Platform. Electronics. 2021; 10 (3):239.
Chicago/Turabian StyleSeonghyeon Gong; Changhoon Lee. 2021. "Cyber Threat Intelligence Framework for Incident Response in an Energy Cloud Platform." Electronics 10, no. 3: 239.
Preemptive respondents on cyber threats have become an essential part of cybersecurity. Cyber Threat Intelligence (CTI) is an evidence-based threat detection and prevention system. CTI system analyzes and shares the security data to mitigate evolving cyber threats using security-related data. However, to gather enough amount of data for analysis, the CTI system uses various data collection channels. The reliability of data collected from these channels is a critical issue because the inaccurate and vast amount of information could degrade the performance of threat detection. Thus, proper filtering is needed to remove the noise data. In this paper, we propose a data noise-reduction algorithm. The proposed algorithm reflects the contextual characteristics of CTI data and reduces noise data in the CTI dataset. Noise-reduced dataset increases the performance of machine learning and deep learning-based attack prediction models. In our experiment, we conducted a cyber-attack classification using a noise-reduced CTI dataset. As a result, we improve the accuracy of classification from 84 to 96% and reduce the volume of the dataset by 70%.
Seonghyeon Gong; Changhoon Lee. Efficient Data Noise-Reduction for Cyber Threat Intelligence System. Lecture Notes in Electrical Engineering 2021, 591 -597.
AMA StyleSeonghyeon Gong, Changhoon Lee. Efficient Data Noise-Reduction for Cyber Threat Intelligence System. Lecture Notes in Electrical Engineering. 2021; ():591-597.
Chicago/Turabian StyleSeonghyeon Gong; Changhoon Lee. 2021. "Efficient Data Noise-Reduction for Cyber Threat Intelligence System." Lecture Notes in Electrical Engineering , no. : 591-597.
Side-channel threat is a form of cryptanalysis that takes advantage of secret information leaked during program implementations, through measurement and evaluation of systematic parameters, such as execution time, power consumption and electromagnetic field (EMF) radiation. Since various side-channel analysis techniques have applied successfully in gathering data and extracting cryptographic keys on variety of devices and platforms, including smartphones, smart cards, tablets, TVs, FPGAs and CPUs, these attacks constitute a significant risk to the security of cryptographic systems. Eliminating serious leakages is a major approach to mitigate side-channel vulnerabilities, in particular Simple Power Analysis (SPA) and Differential Power Analysis (DPA). During the last decade, several research aimed at securing cryptographic primitive algorithms against side-channel attacks, and validating possible countermeasures under assumption which its computational complexity can be estimated precisely. In this paper, we propose a hash-based authenticated nonce-misuse resistant encryption, namely HANMRE which is adaptable for a lightweight leakage resilient authenticated encryption with associated data (AEAD) scheme. The HANMRE construction has been designed for the side-channel security achievement (including SPA and DPA attacks) and highly integrated for restrained environments with limited resource. The advantage of this scheme is ensuring the strong security developed in misuse-resistant schemes against general adversaries for authenticated encryption. It also presents reasonable implementation results (especially long message handling) compared to existing authenticated encryption schemes and is expected to be a novel idea for better approaches of authenticated encryption mechanisms design in the future.
Song Dat Phuc Tran; Byoungjin Seok; Changhoon Lee. HANMRE - An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches. Applied Soft Computing 2020, 97, 106663 .
AMA StyleSong Dat Phuc Tran, Byoungjin Seok, Changhoon Lee. HANMRE - An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches. Applied Soft Computing. 2020; 97 ():106663.
Chicago/Turabian StyleSong Dat Phuc Tran; Byoungjin Seok; Changhoon Lee. 2020. "HANMRE - An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches." Applied Soft Computing 97, no. : 106663.
The proliferation of various connected platforms, including Internet of things, industrial control systems (ICSs), connected cars, and in-vehicle networks, has resulted in the simultaneous use of multiple protocols and devices. Chaotic situations caused by the usage of different protocols and various types of devices, such as heterogeneous networks, implemented differently by vendors renders the adoption of a flexible security solution difficult, such as recent deep learning-based intrusion detection system (IDS) studies. These studies optimized the deep learning model for their environment to improve performance, but the basic principle of the deep learning model used was not changed, so this can be called a next-generation IDS with a model that has little or no requirements. Some studies proposed IDS based on unsupervised learning technology that does not require labeled data. However, not using available assets, such as network packet data, is a waste of resources. If the security solution considers the role and importance of the devices constituting the network and the security area of the protocol standard by experts, the assets can be well used, but it will no longer be flexible. Most deep learning model-based IDS studies used recurrent neural network (RNN), which is a supervised learning model, because the characteristics of the RNN model, especially when the long-short term memory (LSTM) is incorporated, are better configured to reflect the flow of the packet data stream over time, and thus perform better than other supervised learning models such as convolutional neural network (CNN). However, if the input data induce the CNN’s kernel to sufficiently reflect the network characteristics through proper preprocessing, it could perform better than other deep learning models in the network IDS. Hence, we propose the first preprocessing method, called “direct”, for network IDS that can use the characteristics of the kernel by using the minimum protocol information, field size, and offset. In addition to direct, we propose two more preprocessing techniques called “weighted” and “compressed”. Each requires additional network information; therefore, direct conversion was compared with related studies. Including direct, the proposed preprocessing methods are based on field-to-pixel philosophy, which can reflect the advantages of CNN by extracting the convolutional features of each pixel. Direct is the most intuitive method of applying field-to-pixel conversion to reflect an image’s convolutional characteristics in the CNN. Weighted and compressed are conversion methods used to evaluate the direct method. Consequently, the IDS constructed using a CNN with the proposed direct preprocessing method demonstrated meaningful performance in the NSL-KDD dataset.
Wooyeon Jo; Sungjin Kim; Changhoon Lee; Taeshik Shon. Packet Preprocessing in CNN-Based Network Intrusion Detection System. Electronics 2020, 9, 1151 .
AMA StyleWooyeon Jo, Sungjin Kim, Changhoon Lee, Taeshik Shon. Packet Preprocessing in CNN-Based Network Intrusion Detection System. Electronics. 2020; 9 (7):1151.
Chicago/Turabian StyleWooyeon Jo; Sungjin Kim; Changhoon Lee; Taeshik Shon. 2020. "Packet Preprocessing in CNN-Based Network Intrusion Detection System." Electronics 9, no. 7: 1151.
The convergence of fifth-generation (5G) communication and the Internet-of-Things (IoT) has dramatically increased the diversity and complexity of the network. This change diversifies the attacker’s attack vectors, increasing the impact and damage of cyber threats. Cyber threat intelligence (CTI) technology is a proof-based security system which responds to these advanced cyber threats proactively by analyzing and sharing security-related data. However, the performance of CTI systems can be significantly compromised by creating and disseminating improper security policies if an attacker intentionally injects malicious data into the system. In this paper, we propose a blockchain-based CTI framework that improves confidence in the source and content of the data and can quickly detect and eliminate inaccurate data for resistance to a Sybil attack. The proposed framework collects CTI by a procedure validated through smart contracts and stores information about the metainformation of data in a blockchain network. The proposed system ensures the validity and reliability of CTI data by ensuring traceability to the data source and proposes a system model that can efficiently operate and manage CTI data in compliance with the de facto standard. We present the simulation results to prove the effectiveness and Sybil-resistance of the proposed framework in terms of reliability and cost to attackers.
Seonghyeon Gong; Changhoon Lee. BLOCIS: Blockchain-Based Cyber Threat Intelligence Sharing Framework for Sybil-Resistance. Electronics 2020, 9, 521 .
AMA StyleSeonghyeon Gong, Changhoon Lee. BLOCIS: Blockchain-Based Cyber Threat Intelligence Sharing Framework for Sybil-Resistance. Electronics. 2020; 9 (3):521.
Chicago/Turabian StyleSeonghyeon Gong; Changhoon Lee. 2020. "BLOCIS: Blockchain-Based Cyber Threat Intelligence Sharing Framework for Sybil-Resistance." Electronics 9, no. 3: 521.
Recently, many lightweight block ciphers are proposed, such as PRESENT, SIMON, SPECK, Simeck, SPARX, GIFT, and CHAM. Most of these ciphers are designed with Addition–Rotation–Xor (ARX)-based structure for the resource-constrained environment because ARX operations can be implemented efficiently, especially in software. However, if the word size of a block cipher is smaller than the register size of the target device, it may process inefficiently in the aspect of memory usage. In this article, we present a fast implementation method for ARX-based block ciphers, named two-way operation. Moreover, also we applied SPARX-64/128 and CHAM-64/128 and estimated the performance in terms of execution time (cycles per byte) on a 32-bit Advanced RISC Machines processor. As a result, we achieved a large amount of improvement in execution time. The cycles of round function and key schedule are reduced by 53.31% and 31.51% for SPARX-64/128 and 41.22% and 19.40% for CHAM-64/128.
Byoungjin Seok; Changhoon Lee. Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor. International Journal of Distributed Sensor Networks 2019, 15, 1 .
AMA StyleByoungjin Seok, Changhoon Lee. Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor. International Journal of Distributed Sensor Networks. 2019; 15 (9):1.
Chicago/Turabian StyleByoungjin Seok; Changhoon Lee. 2019. "Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor." International Journal of Distributed Sensor Networks 15, no. 9: 1.
With the rapid development of computer-supported cooperative work (CSCW) technology, graphical collaborative editing plays an increasingly important role in CSCW. The most important technique in graphics co-editing is the consistency of graphics co-editing, which mainly includes causality consistency, consistency of results, and consistency of intention. Most of the previous research was abstract and ineffective, lacking theoretical depth and scalability. However, because the algorithm proposed in this paper can solve the contradictions in the consistency of graphical collaborative editing, the research in this paper has particularity, and the results will be proven by the experiment described in the paper. In order to solve the consistency conflict problem of graphic collaborative editing, the common graphics collaborative editing algorithm (CGCE algorithm) is proposed. It is proposed not only to perfect and expand the definition of graphics collaborative editing but also to merge with HTML5 Canvas, WebSocket, jQuery, Node.js and other network programming languages and technologies. The graphic collaborative editing based on the design and implementation of this paper can effectively solve the consistency conflict problem of many users during the collaborative editing of graphics, which ensures that the graphics of each graphical collaborative editing interface is consistent and the collaborative work can achieve the desired effect.
Chunxue Wu; Langfeng Li; Changwei Peng; Yan Wu; Naixue Xiong; Changhoon Lee. Design and analysis of an effective graphics collaborative editing system. EURASIP Journal on Image and Video Processing 2019, 2019, 50 .
AMA StyleChunxue Wu, Langfeng Li, Changwei Peng, Yan Wu, Naixue Xiong, Changhoon Lee. Design and analysis of an effective graphics collaborative editing system. EURASIP Journal on Image and Video Processing. 2019; 2019 (1):50.
Chicago/Turabian StyleChunxue Wu; Langfeng Li; Changwei Peng; Yan Wu; Naixue Xiong; Changhoon Lee. 2019. "Design and analysis of an effective graphics collaborative editing system." EURASIP Journal on Image and Video Processing 2019, no. 1: 50.
BM123-64 block cipher, which was proposed by Minh, N.H. and Bac, D.T. in 2014, was designed for high speed communication applications factors. It was constructed in hybrid controlled substitution–permutation network (CSPN) models with two types of basic controlled elements (CE) in distinctive designs. This cipher is based on switchable data-dependent operations (SDDO) and covers dependent-operations suitable for efficient primitive approaches for cipher constructions that can generate key schedule in a simple way. The BM123-64 cipher has advantages including high applicability, flexibility, and portability with different algorithm selection for various application targets with internet of things (IoT) as well as secure protection against common types of attacks, for instance, differential attacks and linear attacks. However, in this paper, we propose methods to possibly exploit the BM123-64 structure using related-key attacks. We have constructed a high probability related-key differential characteristics (DCs) on a full eight rounds of BM123-64 cipher. The related-key amplified boomerang attack is then proposed on all three different cases of operation-specific designs with effective results in complexity of data and time consumptions. This study can be considered as the first cryptographic results on BM123-64 cipher.
Tran Song Dat Phuc; Changhoon Lee. Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets. Symmetry 2018, 10, 353 .
AMA StyleTran Song Dat Phuc, Changhoon Lee. Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets. Symmetry. 2018; 10 (8):353.
Chicago/Turabian StyleTran Song Dat Phuc; Changhoon Lee. 2018. "Cryptanalysis on SDDO-Based BM123-64 Designs Suitable for Various IoT Application Targets." Symmetry 10, no. 8: 353.
Cyber-threat intelligence (CTI) is a knowledge-based threat management system that addresses increasing cyber threats. The CTI system creates reputation information for network resources such as IP, URL and file hash based on security data collected from Security Information and Event Management (SIEM) systems. This information can be applied extensively in industrial infrastructures to provide an effective response process for cyber attacks. This information can also be applied to the security systems of internal IT and OT infrastructures such as IoT (Internet objects) and SCADA (Surveillance Control and Data Acquisition) networks. However, because the performance of infrastructure security using CTI depends on the accuracy of the data on which the system is based, careful consideration of the accuracy of the data is required. In this paper, we propose a new model that can analyze the reliability and validity of data by using comparative analysis between CTI data and present a criterion for evaluating the reliability of feed providing CTI data. The experiment uses approximately 40,000 data sets to provide data accuracy results for four CTI feeds. These results can serve as a basis for substantive validation to use CTI data.
Seonghyeon Gong; Jaeik Cho; Changhoon Lee. A Reliability Comparison Method for OSINT Validity Analysis. IEEE Transactions on Industrial Informatics 2018, 14, 5428 -5435.
AMA StyleSeonghyeon Gong, Jaeik Cho, Changhoon Lee. A Reliability Comparison Method for OSINT Validity Analysis. IEEE Transactions on Industrial Informatics. 2018; 14 (12):5428-5435.
Chicago/Turabian StyleSeonghyeon Gong; Jaeik Cho; Changhoon Lee. 2018. "A Reliability Comparison Method for OSINT Validity Analysis." IEEE Transactions on Industrial Informatics 14, no. 12: 5428-5435.
Color information plays an important role in the color image segmentation and real-time color sensor, which affects the result of video image segmentation and correct real-time temperature value. In this paper, a novel real-time color image segmentation method is proposed, which is based on color similarity in RGB color space. According to the color and luminance information in RGB color space, the dominant color is determined at first, and then color similarity can be calculated with the proposed calculation method of color component, which creates a color-class map. Next, the information of the corresponding color-class map is utilized to classify the pixels. Due to the characteristic that thermal inks feature color values that change in real time as the temperature changes, the segmentation results of thermal ink can be used as a real-time color sensor. Then, we also propose a method of color correction and light source compensation for the sake of potential inaccuracy of its measures. We discuss the proposed segmentation method application combining with color sensor (thermal ink) in real-time color image segmentation for Cyber physical system (CPS) by the application in fire detection and summarize a new method in identifying fire in a video based on these characteristics. The experiments showed that the proposed method in vision-based fire detection and identification in videos was effective; the results were accurate and can be used in real-time analysis.
Neal N. Xiong; Yang Shen; Kangye Yang; Changhoon Lee; Chunxue Wu. Color sensors and their applications based on real-time color image segmentation for cyber physical systems. EURASIP Journal on Image and Video Processing 2018, 2018, 23 .
AMA StyleNeal N. Xiong, Yang Shen, Kangye Yang, Changhoon Lee, Chunxue Wu. Color sensors and their applications based on real-time color image segmentation for cyber physical systems. EURASIP Journal on Image and Video Processing. 2018; 2018 (1):23.
Chicago/Turabian StyleNeal N. Xiong; Yang Shen; Kangye Yang; Changhoon Lee; Chunxue Wu. 2018. "Color sensors and their applications based on real-time color image segmentation for cyber physical systems." EURASIP Journal on Image and Video Processing 2018, no. 1: 23.
Real-time collaborative graphical editing system allows a group of users simultaneously to view and edit the shared graphical documents from geographically dispersed sites connected by networks. The strategy of consistency maintenance is the key technique to ensure correctness in this editing system. This paper maps the two-dimensional drawing area into the linear structure in the real-time collaborative graphical editing system in the Web environment, and transforms the two-dimensional graphical operations to the linear operations. Based on the above, this paper improves the ABST algorithm to be suitable for this new environment. In order to verify the correctness and feasibility of the algorithm, this paper develops the real-time collaborative graphical editing system CoWebDraw based on Web, which adopts the HTML5 WebSocket protocol to achieve the real-time transformation of the information. In this system, geographically dispersed users can edit the shared graphical documents through web browsers. In the mobile internet era, the CoWebDraw system supports the concurrent editing of the same documents by multi-clients.
Liping Gao; Dongfang Gao; Naixue Xiong; Changhoon Lee. CoWebDraw: a real-time collaborative graphical editing system supporting multi-clients based on HTML5. Multimedia Tools and Applications 2017, 77, 5067 -5082.
AMA StyleLiping Gao, Dongfang Gao, Naixue Xiong, Changhoon Lee. CoWebDraw: a real-time collaborative graphical editing system supporting multi-clients based on HTML5. Multimedia Tools and Applications. 2017; 77 (4):5067-5082.
Chicago/Turabian StyleLiping Gao; Dongfang Gao; Naixue Xiong; Changhoon Lee. 2017. "CoWebDraw: a real-time collaborative graphical editing system supporting multi-clients based on HTML5." Multimedia Tools and Applications 77, no. 4: 5067-5082.
Ubiquitous networks enable mobile users to communicate with each other efficiently and independently without the need of inventing agent. This approach is proved to be delay and spectral efficient. Due to the nature of underlying Big data, such networks are prone to several security and privacy challenges. Because such gigantic data is not only difficult to store, maintain and manipulate but Big data’s open architecture makes the security threats inevitable. Therefore, incorporating authentication between mobile node and foreign network during roaming in ubiquitous networks has become a tedious task. Very recently, Farash et al. found a number of weaknesses in the schemes proposed by Wen et al. and Shin et al. Furthermore, Farash et al. proposed an enhanced scheme for roaming user in ubiquitous network. However, after thorough investigation, we show fragilities of Farash et al.’s scheme against (1) mobile user anonymity violation; (2) disclosure of secret parameter of mobile node; (3) session key disclosure; and (4) mobile node impersonation attacks. Therefore, we propose an improved scheme to fix these fragilities. We analyze the security of proposed scheme using popular automated verification tool ProVerif. The analysis confirms that the proposed scheme resists the known attacks while having quite low overhead as compared with Farash et al.’s scheme. Therefore, in order to get better performance proposed scheme is a suitable candidate to be employed along with supercomputing systems for dealing the security challenges of big data in ubiquitous networks.
Shehzad Ashraf Chaudhry; Aiiad Albeshri; Naixue Xiong; Changhoon Lee; Taeshik Shon. A privacy preserving authentication scheme for roaming in ubiquitous networks. Cluster Computing 2017, 20, 1223 -1236.
AMA StyleShehzad Ashraf Chaudhry, Aiiad Albeshri, Naixue Xiong, Changhoon Lee, Taeshik Shon. A privacy preserving authentication scheme for roaming in ubiquitous networks. Cluster Computing. 2017; 20 (2):1223-1236.
Chicago/Turabian StyleShehzad Ashraf Chaudhry; Aiiad Albeshri; Naixue Xiong; Changhoon Lee; Taeshik Shon. 2017. "A privacy preserving authentication scheme for roaming in ubiquitous networks." Cluster Computing 20, no. 2: 1223-1236.
In the Internet of things, trust establishment plays an important role of improving cooperation and enhancing security. To evaluate the trust relationships among sensor nodes accurately, an appropriate trust estimation model should be designed so as to against attack and misbehavior effectively. In this paper, a novel quantitative model of trust value is proposed. A variety of trust factors related to the behaviors of sensor nodes is measured, including the packet forwarding capacity, the repetition rate, the consistency of the packet content, the delay, the integrity, etc. To void the impact of subjective setting, each trust factor is determined by means of the information entropy theory. In addition, the D-S theory is adopted to deduce and synthesize the trust, and the statistic factor of nodes’ behavior is introduced to modify the synthesis result. Evaluation results show that our scheme performs better in defeating attacks.
Yang Yu; Ziyan Jia; Weige Tao; Bo Xue; Changhoon Lee. An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things. Wireless Personal Communications 2016, 93, 571 -587.
AMA StyleYang Yu, Ziyan Jia, Weige Tao, Bo Xue, Changhoon Lee. An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things. Wireless Personal Communications. 2016; 93 (2):571-587.
Chicago/Turabian StyleYang Yu; Ziyan Jia; Weige Tao; Bo Xue; Changhoon Lee. 2016. "An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things." Wireless Personal Communications 93, no. 2: 571-587.
Data-dependent operations (DDOs) that were introduced by Moldovyan in 2003 (Moldovyan in MMM-ACNS 2003, LNCS, 2776: 316–327, Springer, Heidelberg, 5; Moldovyan et al. in Int J Netw Secur 2(2):114–225, 6, in Proceedings of CCCT04, VII:123–128, 7), have been proposed as a primitive suitable for designing efficient ciphers with simple key scheduling. DDOs solve problems arising due to the weaknesses in key change process, and also the DDO-based ciphers provide a better performance with smaller hardware requirement for implementation. Along with Eagle-64 (Moldovyan et al. 7), Eagle-128 (Moldovyan et al. 6), MD-64 (Minh et al. in Int J Comput Sci Netw Secur 10(3):54–60, 15), KT-64 (Minh et al. in IJCSNS 19(1):10–18, 13) … block ciphers are being designed, XO-64 (Minh et al. in Advanced Technologies for Communications, ATC, 409–412, 1) is a block cipher of this type which is better in terms of applicability, flexibility in fast and efficient wireless system, as well as security against known attack methods, such as slide attack and differential attack. In this paper, by applying a way of related-key attacks, we present the possibility to break the XO-64 cipher with high probability. We propose a related-key amplified boomerang attack using the differential characteristics on a 7-round reduced XO-64, requiring complexities of 244 in data, 247 bytes in memory, and 265 in computational time. This study can be considered as the first cryptographic result on XO-64.
Tran Song Dat Phuc; Neal Naixue Xiong; Changhoon Lee. Cryptanalysis of the XO-64 Suitable for Wireless Systems. Wireless Personal Communications 2016, 93, 589 -600.
AMA StyleTran Song Dat Phuc, Neal Naixue Xiong, Changhoon Lee. Cryptanalysis of the XO-64 Suitable for Wireless Systems. Wireless Personal Communications. 2016; 93 (2):589-600.
Chicago/Turabian StyleTran Song Dat Phuc; Neal Naixue Xiong; Changhoon Lee. 2016. "Cryptanalysis of the XO-64 Suitable for Wireless Systems." Wireless Personal Communications 93, no. 2: 589-600.
Changhoon Lee. Guest Editorial: Automated Big Data Analysis for Social Multimedia Network Environments. Multimedia Tools and Applications 2016, 75, 12663 -12667.
AMA StyleChanghoon Lee. Guest Editorial: Automated Big Data Analysis for Social Multimedia Network Environments. Multimedia Tools and Applications. 2016; 75 (20):12663-12667.
Chicago/Turabian StyleChanghoon Lee. 2016. "Guest Editorial: Automated Big Data Analysis for Social Multimedia Network Environments." Multimedia Tools and Applications 75, no. 20: 12663-12667.
With the development of computer and IT technologies, enterprise management has gradually become information-based management. Moreover, due to poor technical competence and non-uniform management, most breeding enterprises show a lack of organisation in data collection and management. In addition, low levels of efficiency result in increasing production costs. This paper adopts ‘struts2’ in order to construct an information-based management system for standardised and normalised management within the process of production in beef cattle breeding enterprises. We present a radio-frequency identification system by studying multiple-tag anti-collision via a dynamic grouping ALOHA algorithm. This algorithm is based on the existing ALOHA algorithm and uses an improved packet dynamic of this algorithm, which is characterised by a high-throughput rate. This new algorithm can reach a throughput 42% higher than that of the general ALOHA algorithm. With a change in the number of tags, the system throughput is relatively stable.
Haoqi Liu; Changhoon Lee; Mingming Han; Zhongbin Su; Varshinee Anu Padigala; Weizheng Shen. Information-based management mode based on value network analysis for livestock enterprises. Enterprise Information Systems 2016, 12, 1 -18.
AMA StyleHaoqi Liu, Changhoon Lee, Mingming Han, Zhongbin Su, Varshinee Anu Padigala, Weizheng Shen. Information-based management mode based on value network analysis for livestock enterprises. Enterprise Information Systems. 2016; 12 (1):1-18.
Chicago/Turabian StyleHaoqi Liu; Changhoon Lee; Mingming Han; Zhongbin Su; Varshinee Anu Padigala; Weizheng Shen. 2016. "Information-based management mode based on value network analysis for livestock enterprises." Enterprise Information Systems 12, no. 1: 1-18.
This paper proposes a novel method for real-time gesture recognition. Aiming at improving the effectiveness and accuracy of HGR, spatial pyramid is applied to linguistically segment gesture sequence into linguistic units and a temporal pyramid is proposed to get a time-related histogram for each single gesture. Those two pyramids can help to extract more comprehensive information of human gestures from RGB and depth video. A two-layered HGR is further exploited to further reduce the computation complexity. The proposed method obtains high accuracy and low computation complexity performance on the ChaLearn Gesture Dataset, comprising more than 50, 000 gesture sequences recorded.
Feng Jiang; Jie Ren; Changhoon Lee; Wuzhen Shi; Shaohui Liu; Debin Zhao. Spatial and temporal pyramid-based real-time gesture recognition. Journal of Real-Time Image Processing 2016, 13, 599 -611.
AMA StyleFeng Jiang, Jie Ren, Changhoon Lee, Wuzhen Shi, Shaohui Liu, Debin Zhao. Spatial and temporal pyramid-based real-time gesture recognition. Journal of Real-Time Image Processing. 2016; 13 (3):599-611.
Chicago/Turabian StyleFeng Jiang; Jie Ren; Changhoon Lee; Wuzhen Shi; Shaohui Liu; Debin Zhao. 2016. "Spatial and temporal pyramid-based real-time gesture recognition." Journal of Real-Time Image Processing 13, no. 3: 599-611.
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device to access and monitor industrial systems and their corresponding information interfaces anywhere and anytime. This study describes the deployment of a protocol whereby industrial system information can be securely accessed by cellular phones via a Supervisory Control And Data Acquisition (SCADA) server. To achieve the study goals, proprietary protocol interconnectivity with non-proprietary protocols and the usage of interconnectivity services are considered in detail. They support the visualization of the SCADA system information, and the related operations through smart phones. The intelligent sensors are configured and designated to process real information via cellular phones by employing information exchange services between the proprietary protocol and non-proprietary protocols. SCADA cellular access raises the issue of security flaws. For these challenges, a cryptography-based security method is considered and deployed, and it could be considered as a part of a proprietary protocol. Subsequently, transmission flows from the smart phones through a cellular network.
Aamir Shahzad; René Landry; Malrey Lee; Naixue Xiong; Jongho Lee; Changhoon Lee. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols. Sensors 2016, 16, 821 .
AMA StyleAamir Shahzad, René Landry, Malrey Lee, Naixue Xiong, Jongho Lee, Changhoon Lee. A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols. Sensors. 2016; 16 (6):821.
Chicago/Turabian StyleAamir Shahzad; René Landry; Malrey Lee; Naixue Xiong; Jongho Lee; Changhoon Lee. 2016. "A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols." Sensors 16, no. 6: 821.
There are technological, operational, and environmental constraints at tactical edge, which are disconnected operation, intermittent connectivity, and limited bandwidth, size, weight and power limitations, ad-hoc and mobile network, and so on. Moreover, an operational environment is highly dynamic: requirements change in response to the emerging situation, and the availability of resources needs to be updated constantly due to the factors, such as technical failures. Therefore, an efficient matching mechanism is required that considers all possible criteria to achieve a mission. In this paper, we proposed an ontology-based mission service model that consists of a mission, tasks, services, and resources, and developed a capability-based matching mechanism in tactical edge environment. In addition, we have developed a prototype that supports dynamic resource allocation during executing a mission in tactical edge.
Seheon Song; Changhoon Lee; Sangil Lee; Jaehyun Park. Capability-based semantic matching for dynamic resource allocation in tactical edge environment. The Journal of Supercomputing 2016, 72, 3646 -3662.
AMA StyleSeheon Song, Changhoon Lee, Sangil Lee, Jaehyun Park. Capability-based semantic matching for dynamic resource allocation in tactical edge environment. The Journal of Supercomputing. 2016; 72 (9):3646-3662.
Chicago/Turabian StyleSeheon Song; Changhoon Lee; Sangil Lee; Jaehyun Park. 2016. "Capability-based semantic matching for dynamic resource allocation in tactical edge environment." The Journal of Supercomputing 72, no. 9: 3646-3662.