This page has only limited features, please log in for full access.

Unclaimed
Hyungjoo Kim
Convergence Laboratory, KT Research and Development Center, 151 Taebong-ro, Seocho-gu, Seoul 06763, Korea

Basic Info

Basic Info is private.

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 24 October 2016 in Sustainability
Reads 0
Downloads 0

The services provided to users in the environment associated with the Internet of Things (hereinafter referred to as IoT) begin with the information collected from sensors. It is imperative to transmit high-quality sensor data for providing better services. It is also required to collect data only from those authenticated sensors. Moreover, it is imperative to collect high-quality data on a sustainable and continuous basis in order to provide services anytime and anywhere in the IoT environment. Therefore, high-quality, authenticated sensor networks should be constructed. The most prominent routing protocol to enhance the energy consumption efficiency for the sustainable data collection in a sensor network is the LEACH routing protocol. The LEACH routing protocol transmits sensor data by measuring the energy of sensors and allocating sensor groups dynamically. However, these sensor networks have vulnerabilities such as key leakage, eavesdropping, replay attack and relay attack, given the nature of wireless network communication. A large number of security techniques have been studied in order to solve these vulnerabilities. Nonetheless, these studies still cannot support the dynamic sensor group allocation of the LEACH routing protocol. Furthermore, they are not suitable for the sensor nodes whose hardware computing ability and energy resources are limited. Therefore, this paper proposed a group sensor communication protocol that utilizes only the four fundamental arithmetic operations and logical operation for the sensor node authentication and secure data transmission. Through the security analysis, this paper verified that the proposed scheme was secure to the vulnerabilities resulting from the nature of wireless network communication. Moreover, this paper verified through the performance analysis that the proposed scheme could be utilized efficiently.

ACS Style

Hyungjoo Kim; Jungho Kang. Dynamic Group Management Scheme for Sustainable and Secure Information Sensing in IoT. Sustainability 2016, 8, 1081 .

AMA Style

Hyungjoo Kim, Jungho Kang. Dynamic Group Management Scheme for Sustainable and Secure Information Sensing in IoT. Sustainability. 2016; 8 (10):1081.

Chicago/Turabian Style

Hyungjoo Kim; Jungho Kang. 2016. "Dynamic Group Management Scheme for Sustainable and Secure Information Sensing in IoT." Sustainability 8, no. 10: 1081.

Journal article
Published: 17 October 2016 in Symmetry
Reads 0
Downloads 0

Long Term Evolution (LTE) and Long Term Evolution-Advanced (LTE-A) support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased as people have started to use more than just one mobile device. However, when User Equipment (UE) is executing initial attach processes to access LTE networks, there is a vulnerability in which identification parameters like International Mobile Subscriber Identity (IMSI) and Radio Network Temporary Identities (RNTI) are transmitted as plain texts. It can threat various services that are commercialized therewith in a cyber world. Therefore, a security scheme is proposed in this paper where identification parameters can be securely transmitted and hidden in four cases where initial attach occurs between UE and Mobility Management Entity (MME). The proposed security scheme not only supports encrypted transmission of identification parameters but also mutual authentication between Evolved Node B (eNB) and MME to make a secure cyber world. Additionally, performance analysis results using an OPNET simulator showed the satisfaction of the average delay rate that is specified in LTE standards.

ACS Style

Jong Hyuk Park; Hyungjoo Kim; Jungho Kang. Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World. Symmetry 2016, 8, 106 .

AMA Style

Jong Hyuk Park, Hyungjoo Kim, Jungho Kang. Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World. Symmetry. 2016; 8 (10):106.

Chicago/Turabian Style

Jong Hyuk Park; Hyungjoo Kim; Jungho Kang. 2016. "Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World." Symmetry 8, no. 10: 106.

Journal article
Published: 08 August 2016 in Microprocessors and Microsystems
Reads 0
Downloads 0

Recently, cloud computing and cyber-physical system (CPS) are definitely basic elements in real industrial field. In particular, security is a mandatory factor for communications and operations in these environments. However, the existing CPS security mechanism is not suitable to the telecommunication framework provided by the standards. In addition, random number function of high entropy must be used to enhance security with encrypted communications and must support perfect secrecy. Random number functions supported by the devices instead of servers do not have sufficient entropy. Entropy injection and seed replacement are also impractical. In this paper, we propose a security scheme which provides light-weight secure CPS information transmission and device control scheme in integration of CPS and cloud computing. In this scheme, a light-weight security scheme can multicast event information to users who have heterogeneous device information access authorities based on oneM2M standards, and also be able to manage the control devices. This paper provides performance analysis of proposed scheme and confirms its security and efficiency.

ACS Style

Hyungjoo Kim; Jungho Kang; Jong Hyuk Park. A light-weight secure information transmission and device control scheme in integration of CPS and cloud computing. Microprocessors and Microsystems 2016, 52, 416 -426.

AMA Style

Hyungjoo Kim, Jungho Kang, Jong Hyuk Park. A light-weight secure information transmission and device control scheme in integration of CPS and cloud computing. Microprocessors and Microsystems. 2016; 52 ():416-426.

Chicago/Turabian Style

Hyungjoo Kim; Jungho Kang; Jong Hyuk Park. 2016. "A light-weight secure information transmission and device control scheme in integration of CPS and cloud computing." Microprocessors and Microsystems 52, no. : 416-426.

Book chapter
Published: 18 December 2015 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

A multi-cloud computing refers to the environment where services such as resources and software, etc., can be shared and provided through an agreement between two or more cloud computing service providers. A user requires multiple authentications in order to use the cloud service between the shared service providers. However at such time, users are exposed to vulnerabilities such as their authentication information being exposed to service providers whom they did not sign up with or being exposed during the multiple authentications. Therefore in this paper, the zero-knowledge authentication protocol for ensuring anonymity is proposed. The proposed protocol is safe for all know vulnerabilities and can be used as a safe protocol in multi-cloud environment.

ACS Style

Hyungjoo Kim; Hyunsoo Chung; Jungho Kang. Zero-Knowledge Authentication for Secure Multi-cloud Computing Environments. Lecture Notes in Electrical Engineering 2015, 255 -261.

AMA Style

Hyungjoo Kim, Hyunsoo Chung, Jungho Kang. Zero-Knowledge Authentication for Secure Multi-cloud Computing Environments. Lecture Notes in Electrical Engineering. 2015; ():255-261.

Chicago/Turabian Style

Hyungjoo Kim; Hyunsoo Chung; Jungho Kang. 2015. "Zero-Knowledge Authentication for Secure Multi-cloud Computing Environments." Lecture Notes in Electrical Engineering , no. : 255-261.

Book chapter
Published: 17 July 2015 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

Recently, software has been utilized in various environments including computer, smartphone and medical devices because the application fields of IT products have been diversified. Moreover, software has evolved in a way to modify and redistribute source code freely by opening source code in recent years. However, open source software is being developed through those developers having no prior security related knowledge. Furthermore, it is being distributed without any verification. Hereupon, there are various security vulnerabilities that are exploited for an attack. Therefore, this paper examined security vulnerabilities from design phase to distribution phase of software and also proposed a system that can check whether software is securely coded. Moreover, this paper analyzed the equivalency of performance to the existing products as a result of the performance evaluation through Juliet code.

ACS Style

Hyungjoo Kim; Moon-Seog Jun. A Design and Development of Secure-Coding Check System Based on CVE and CWE. Lecture Notes in Electrical Engineering 2015, 457 -463.

AMA Style

Hyungjoo Kim, Moon-Seog Jun. A Design and Development of Secure-Coding Check System Based on CVE and CWE. Lecture Notes in Electrical Engineering. 2015; ():457-463.

Chicago/Turabian Style

Hyungjoo Kim; Moon-Seog Jun. 2015. "A Design and Development of Secure-Coding Check System Based on CVE and CWE." Lecture Notes in Electrical Engineering , no. : 457-463.

Book chapter
Published: 05 March 2015 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

Long Term Evolution (LTE) is a fourth-generation mobile communication technology implemented throughout the world. There is still, however, an exposed vulnerability with regard to the identification parameters such as IMSI and RNTI, as they are transmitted in plain text during the initial attach procedure in the access to the LTE network. The vulnerability has existed since the initial release of the LTE Standards, and is still present in Release 12. To prevent a leak of the identification parameters during the initial attach process and a possible third party attack, the relevant parameters should be encrypted. This paper proposes a security scheme to safely transmit identification parameters in different cases of the initial attach. The proposed security scheme solves the exposed vulnerability by encrypting the parameters in transmission. Using an OPNET simulator, it is shown that the average rate of delay and processing ratio are efficient in comparison to the existing process.

ACS Style

Uijin Jang; Hyungmin Lim; Hyungjoo Kim. Security Scheme for LTE Initial Attach. Lecture Notes in Electrical Engineering 2015, 331, 53 -66.

AMA Style

Uijin Jang, Hyungmin Lim, Hyungjoo Kim. Security Scheme for LTE Initial Attach. Lecture Notes in Electrical Engineering. 2015; 331 ():53-66.

Chicago/Turabian Style

Uijin Jang; Hyungmin Lim; Hyungjoo Kim. 2015. "Security Scheme for LTE Initial Attach." Lecture Notes in Electrical Engineering 331, no. : 53-66.

Book chapter
Published: 01 January 2015 in Lecture Notes in Electrical Engineering
Reads 0
Downloads 0

Wireless Sensor is used for military purpose, machine management, cultural properties management, etc. However, sensor being transmitted in wireless network channel, relay attack, eavesdropping, and replay attack have occurred. Also, because the sensor’s hardware arithmetic operation capacity is very limited (low cost), it has various security vulnerabilities for which a solution has not yet been developed. Thus, this paper proposed the light-weight distance-bounding mutual authentication security scheme based on the limited hardware computing capability. The proposed scheme is safe against all security vulnerabilities that could occur in sensor network and can be efficiently used for group sensor management because of its ability to authenticate multiple sensors simultaneously and to show efficient performance.

ACS Style

Hyungjoo Kim; Moonseog Jun; Jaesoo Kim. Light-Weight Distance-Bounding Mutual Authentication Security Scheme for Group Sensor Management. Lecture Notes in Electrical Engineering 2015, 330, 269 -274.

AMA Style

Hyungjoo Kim, Moonseog Jun, Jaesoo Kim. Light-Weight Distance-Bounding Mutual Authentication Security Scheme for Group Sensor Management. Lecture Notes in Electrical Engineering. 2015; 330 ():269-274.

Chicago/Turabian Style

Hyungjoo Kim; Moonseog Jun; Jaesoo Kim. 2015. "Light-Weight Distance-Bounding Mutual Authentication Security Scheme for Group Sensor Management." Lecture Notes in Electrical Engineering 330, no. : 269-274.

Journal article
Published: 12 December 2014 in Symmetry
Reads 0
Downloads 0

Long-Term Evolution (LTE) is a fourth-generation mobile communication technology implemented throughout the world. It is the communication means of smartphones that send and receive all of the private date of individuals. M2M, IOT, etc., are the base technologies of mobile communication that will be used in the future cyber world. However, identification parameters, such as International Mobile Subscriber Identity (IMSI), Radio Network Temporary Identities (RNTI), etc., in the initial attach section for accessing the LTE network are presented with the vulnerability of being exposed as clear text. Such vulnerability does not end in a mere identification parameter, but can lead to a secondary attack using the identification parameter, such as replication of the smartphone, illegal use of the mobile communication network, etc. This paper proposes a security protocol to safely transmit identification parameters in different cases of the initial attach. The proposed security protocol solves the exposed vulnerability by encrypting the parameters in transmission. Using an OPNET simulator, it is shown that the average rate of delay and processing ratio are efficient in comparison to the existing process.

ACS Style

Uijin Jang; Hyungmin Lim; Hyungjoo Kim. Privacy-Enhancing Security Protocol in LTE Initial Attack. Symmetry 2014, 6, 1011 -1025.

AMA Style

Uijin Jang, Hyungmin Lim, Hyungjoo Kim. Privacy-Enhancing Security Protocol in LTE Initial Attack. Symmetry. 2014; 6 (4):1011-1025.

Chicago/Turabian Style

Uijin Jang; Hyungmin Lim; Hyungjoo Kim. 2014. "Privacy-Enhancing Security Protocol in LTE Initial Attack." Symmetry 6, no. 4: 1011-1025.