This page has only limited features, please log in for full access.

Unclaimed
Yohan Park
School of Computer Engineering, Keimyung University, Daegu 42601, Korea

Basic Info

Basic Info is private.

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Journal article
Published: 17 August 2021 in Sustainability
Reads 0
Downloads 0

The Internet of Things (IoT) is being applied to various environments such as telecare systems, smart homes, and intelligent transportation systems. The information generated from IoT devices is stored at remote servers, and external users authenticate to the server for requesting access to the stored data. In IoT environments, the authentication process is required to be conducted efficiently, and should be secure against various attacks and ensure user anonymity and untraceability to ensure sustainability of the network. However, many existing protocols proposed in IoT environments do not meet these requirements. Recently, Rajaram et al. proposed a paring-based user authentication scheme. We found that the Rajaram et al. scheme is vulnerable to various attacks such as offline password guessing, impersonation, privileged insider, and known session-specific temporary information attacks. Additionally, as their scheme uses bilinear pairing, it requires high computation and communication costs. In this study, we propose a novel authentication scheme that resolves these security problems. The proposed scheme uses only hash and exclusive-or operations to be applicable in IoT environments. We analyze the proposed protocol using informal analysis and formal analysis methods such as the BAN logic, real-or-random (ROR) model, and the AVISPA simulation, and we show that the proposed protocol has better security and performance compared with existing authentication protocols. Consequently, the proposed protocol is sustainable and suitable for real IoT environments.

ACS Style

Seunghwan Son; Yohan Park; Youngho Park. A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments. Sustainability 2021, 13, 9241 .

AMA Style

Seunghwan Son, Yohan Park, Youngho Park. A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments. Sustainability. 2021; 13 (16):9241.

Chicago/Turabian Style

Seunghwan Son; Yohan Park; Youngho Park. 2021. "A Secure, Lightweight, and Anonymous User Authentication Protocol for IoT Environments." Sustainability 13, no. 16: 9241.

Journal article
Published: 07 April 2021 in IEEE Access
Reads 0
Downloads 0

Car-sharing systems can solve various urban problems by providing shared vehicles to people and reducing the operation of personal vehicles. With the development of the Internet of Things, people can easily use a shared car through simple operations on their mobile devices. However, the car-sharing system has security problems. Sensitive information, such as the user’s identity, location information, and access code, is transmitted through a public channel for car-sharing. Hence, an attacker can access this information for illegal purposes, making the establishment of a secure authentication protocol essential. Furthermore, the traditional car-sharing system is established on the centralized structure, so there is a single point of failure. Thus, the design of a decentralized car-sharing scheme is vital for solving the centralized problem. This study designed a decentralized car-sharing scheme using blockchain. Specifically, blockchain technology was used to provide a decentralization car-sharing service and ensure data integrity. The participant entities of the proposed system can be authenticated anonymously. The proposed car-sharing system can be secured against various attacks and provide mutual authentication using informal analysis, automated validation of internet security protocols and applications (AVISPA) simulation, and BAN logic analysis. The computation costs and communication costs of the proposed scheme were also analyzed.

ACS Style

Myeonghyun Kim; Joonyoung Lee; Kisung Park; Yohan Park; Kil Houm Park; Youngho Park. Design of Secure Decentralized Car-Sharing System Using Blockchain. IEEE Access 2021, 9, 54796 -54810.

AMA Style

Myeonghyun Kim, Joonyoung Lee, Kisung Park, Yohan Park, Kil Houm Park, Youngho Park. Design of Secure Decentralized Car-Sharing System Using Blockchain. IEEE Access. 2021; 9 (99):54796-54810.

Chicago/Turabian Style

Myeonghyun Kim; Joonyoung Lee; Kisung Park; Yohan Park; Kil Houm Park; Youngho Park. 2021. "Design of Secure Decentralized Car-Sharing System Using Blockchain." IEEE Access 9, no. 99: 54796-54810.

Journal article
Published: 25 January 2021 in IEEE Access
Reads 0
Downloads 0

Traditional recommendation approaches for the mobile Apps basically depend on the Apps related features. Now a days many users are in quench of Apps recommendation based on the version description. Earlier mobile Apps recommendation system do not handle the cold start problem and also lacks in time for recommending the related and latest version of Apps. To overcome this issues, a hybrid Apps recommendation framework which is considering the version of the mobile Apps is proposed. This novel framework named “Probabilistic Evolution based Version Recommendation Model (PEVRM)” integrates the principles of Probabilistic Matrix Factorization (PMF) with Version Evolution Progress Model (VEPM). With the help this novel recommendation algorithm, the mobile users easily identify the specific Apps for particular task based on its version progression. At same time, this framework helps in resolving cold start problems of new users. Evaluations of this framework utilize a benchmark dataset, i.e., Apple’s iTunes App Store3, for revealing its promising performance.

ACS Style

M. Maheswari; S. Geetha; S. Selva Kumar; Marimuthu Karuppiah; Debabrata Samanta; Yohan Park. PEVRM: Probabilistic Evolution Based Version Recommendation Model for Mobile Applications. IEEE Access 2021, 9, 20819 -20827.

AMA Style

M. Maheswari, S. Geetha, S. Selva Kumar, Marimuthu Karuppiah, Debabrata Samanta, Yohan Park. PEVRM: Probabilistic Evolution Based Version Recommendation Model for Mobile Applications. IEEE Access. 2021; 9 ():20819-20827.

Chicago/Turabian Style

M. Maheswari; S. Geetha; S. Selva Kumar; Marimuthu Karuppiah; Debabrata Samanta; Yohan Park. 2021. "PEVRM: Probabilistic Evolution Based Version Recommendation Model for Mobile Applications." IEEE Access 9, no. : 20819-20827.

Journal article
Published: 03 July 2020 in IEEE Systems Journal
Reads 0
Downloads 0

With the significant development of the Internet, Internet of Things (IoT) has become an emerging technology in many industries. To support security and privacy in the Industrial IoT environment, a user may interact with another user on the Internet to share confidential information, which requires an authenticated communication channel. To meet this demand, in this article the authors developed an identity-based two-party authenticated key agreement (ID-2PAKA) protocol that allows two users to communicate securely and share sensitive data across IoT-enabled regions. Similar protocols found in the literature either proven to be insecure or carry the burden of high communication and computational costs. The proposed ID-2PAKA protocol is analyzed in the random oracle model to achieve provable security based on the hardness assumptions of computational Diffie–Hellman and bilinear Diffie–Hellman problems. The performance analysis of the proposed ID-2PAKA protocol is performed using the pairing-based cryptography library. The comparative results from the perspective of the computation and communication costs against the competing protocols showed that the proposed ID-2PAKA protocol is secure and efficient.

ACS Style

Daya Sagar Gupta; S. K. Hafizul Islam; Mohammad S. Obaidat; Pandi Vijayakumar; Neeraj Kumar; Yohan Park. A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments. IEEE Systems Journal 2020, 15, 1732 -1741.

AMA Style

Daya Sagar Gupta, S. K. Hafizul Islam, Mohammad S. Obaidat, Pandi Vijayakumar, Neeraj Kumar, Yohan Park. A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments. IEEE Systems Journal. 2020; 15 (2):1732-1741.

Chicago/Turabian Style

Daya Sagar Gupta; S. K. Hafizul Islam; Mohammad S. Obaidat; Pandi Vijayakumar; Neeraj Kumar; Yohan Park. 2020. "A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments." IEEE Systems Journal 15, no. 2: 1732-1741.

Journal article
Published: 21 May 2020 in Applied Sciences
Reads 0
Downloads 0

With the developments in communication and mobile technologies, mobile users can access roaming services by utilizing a mobile device at any time and any place in the global mobility networks. However, these require several security requirements, such as authentication and anonymity, because the information is transmitted over an open channel. Thus, secure and efficient authentication protocols are essential to provide secure roaming services for legitimate users. In 2018, Madhusudhan et al. presented a secure authentication protocol for global mobile networks. However, we demonstrated that their protocol could not prevent potential attacks, including masquerade, session key disclosure, and replay attacks. Thus, we proposed a secure and efficient three-factor authentication protocol to overcome the security weaknesses of Madhusudhan et al.’s scheme. The proposed scheme was demonstrated to prevent various attacks and provided a secure mutual authentication by utilizing biometrics and secret parameters. We evaluated the security of the proposed protocol using informal security analysis and formal security analysis, such as the real-or-random (ROR) model and Burrows–Abadi–Needham (BAN) logic. In addition, we showed that our scheme withstands man-in-the-middle (MITM) and replay attacks utilizing formal security validation automated validation of internet security protocols and applications (AVISPA) simulation. Finally, we compared the performance of our protocol with existing schemes. Consequently, our scheme ensured better security and efficiency features than existing schemes and can be suitable for resource-constrained mobile environments.

ACS Style

Sungjin Yu; Joonyoung Lee; Yohan Park; Youngho Park; SangWoo Lee; BoHeung Chung. A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks. Applied Sciences 2020, 10, 3565 .

AMA Style

Sungjin Yu, Joonyoung Lee, Yohan Park, Youngho Park, SangWoo Lee, BoHeung Chung. A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks. Applied Sciences. 2020; 10 (10):3565.

Chicago/Turabian Style

Sungjin Yu; Joonyoung Lee; Yohan Park; Youngho Park; SangWoo Lee; BoHeung Chung. 2020. "A Secure and Efficient Three-Factor Authentication Protocol in Global Mobility Networks." Applied Sciences 10, no. 10: 3565.

Journal article
Published: 21 May 2020 in Sensors
Reads 0
Downloads 0

In the traditional electronic health record (EHR) management system, each medical service center manages their own health records, respectively, which are difficult to share on the different medical platforms. Recently, blockchain technology is one of the popular alternatives to enable medical service centers based on different platforms to share EHRs. However, it is hard to store whole EHR data in blockchain because of the size and the price of blockchain. To resolve this problem, cloud computing is considered as a promising solution. Cloud computing offers advantageous properties such as storage availability and scalability. Unfortunately, the EHR system with cloud computing can be vulnerable to various attacks because the sensitive data is sent over a public channel. We propose the secure protocol for cloud-assisted EHR system using blockchain. In the proposed scheme, blockchain technology is used to provide data integrity and access control using log transactions and the cloud server stores and manages the patient’s EHRs to provide secure storage resources. We use an elliptic curve cryptosystems (ECC) to provide secure health data sharing with cloud computing. We demonstrate that the proposed EHR system can prevent various attacks by using informal security analysis and automated validation of internet security protocols and applications (AVISPA) simulation. Furthermore, we prove that the proposed EHR system provides secure mutual authentication using BAN logic analysis. We then compare the computation overhead, communication overhead, and security properties with existing schemes. Consequently, the proposed EHR system is suitable for the practical healthcare system considering security and efficiency.

ACS Style

Myeonghyun Kim; Sungjin Yu; Joonyoung Lee; Yohan Park; Youngho Park. Design of Secure Protocol for Cloud-Assisted Electronic Health Record System Using Blockchain. Sensors 2020, 20, 2913 .

AMA Style

Myeonghyun Kim, Sungjin Yu, Joonyoung Lee, Yohan Park, Youngho Park. Design of Secure Protocol for Cloud-Assisted Electronic Health Record System Using Blockchain. Sensors. 2020; 20 (10):2913.

Chicago/Turabian Style

Myeonghyun Kim; Sungjin Yu; Joonyoung Lee; Yohan Park; Youngho Park. 2020. "Design of Secure Protocol for Cloud-Assisted Electronic Health Record System Using Blockchain." Sensors 20, no. 10: 2913.

Journal article
Published: 04 March 2020 in Applied Sciences
Reads 0
Downloads 0

With the development in wireless communication and low-power device, users can receive various useful services such as electric vehicle (EV) charging, smart building, and smart home services at anytime and anywhere in smart grid (SG) environments. The SG devices send demand of electricity to the remote control center and utility center (UC) to use energy services, and UCs handle it for distributing electricity efficiently. However, in SG environments, the transmitted messages are vulnerable to various attacks because information related to electricity is transmitted over an insecure channel. Thus, secure authentication and key agreement are essential to provide secure energy services for legitimate users. In 2019, Kumar et al. presented a secure authentication protocol for demand response management in the SG system. However, we demonstrate that their protocol is insecure against masquerade, the SG device stolen, and session key disclosure attacks and does not ensure secure mutual authentication. Thus, we propose a privacy-preserving lightweight authentication protocol for demand response management in the SG environments to address the security shortcomings of Kumar et al.’s protocol. The proposed protocol withstands various attacks and ensures secure mutual authentication and anonymity. We also evaluated the security features of the proposed scheme using informal security analysis and proved the session key security of proposed scheme using the ROR model. Furthermore, we showed that the proposed protocol achieves secure mutual authentication between the SG devices and the UC using Burrows–Abadi–Needham (BAN) logic analysis. We also demonstrated that our authentication protocol prevents man-in-the-middle and replay attacks utilizing AVISPA simulation tool and compared the performance analysis with other existing protocols. Therefore, the proposed scheme provides superior safety and efficiency other than existing related protocols and can be suitable for practical SG environments.

ACS Style

Sungjin Yu; Kisung Park; Joonyoung Lee; Youngho Park; Yohan Park; SangWoo Lee; BoHeung Chung. Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment. Applied Sciences 2020, 10, 1758 .

AMA Style

Sungjin Yu, Kisung Park, Joonyoung Lee, Youngho Park, Yohan Park, SangWoo Lee, BoHeung Chung. Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment. Applied Sciences. 2020; 10 (5):1758.

Chicago/Turabian Style

Sungjin Yu; Kisung Park; Joonyoung Lee; Youngho Park; Yohan Park; SangWoo Lee; BoHeung Chung. 2020. "Privacy-Preserving Lightweight Authentication Protocol for Demand Response Management in Smart Grid Environment." Applied Sciences 10, no. 5: 1758.

Article
Published: 26 February 2020 in Peer-to-Peer Networking and Applications
Reads 0
Downloads 0

Recent advances in communication technology and low-power devices have led digital-content services to be provided in various resource limited environments such as smart home, Internet of Things, and the Vehicle-to-Everything. However, digital content is easily replicated and distributed through open channels. Authentication is therefore becoming increasingly important for digital rights management (DRM) systems to provide secure services to authorized users. In 2018, Lee et al. proposed a biometric-based authentication scheme for DRM systems. We here demonstrate that Lee et al.’s scheme is vulnerable to mobile device theft and user impersonation attacks and does not allow secure mutual authentication. We propose an alternative secure three-factor authentication protocol for DRM systems to overcome these security shortcomings. Using formal/informal security analysis and a BAN logic analysis, we also show that our protocol protects against various types of attacks and allows secure mutual authentication. Furthermore, we demonstrate that the proposed protocol is secure against replay attacks and man-in-the-middle attacks using the formal verification simulation tool AVISPA. The proposed protocol is therefore applicable to resource-limited environments.

ACS Style

Sungjin Yu; Kisung Park; Yohan Park; Hyungpyo Kim; Youngho Park. A lightweight three-factor authentication protocol for digital rights management system. Peer-to-Peer Networking and Applications 2020, 13, 1340 -1356.

AMA Style

Sungjin Yu, Kisung Park, Yohan Park, Hyungpyo Kim, Youngho Park. A lightweight three-factor authentication protocol for digital rights management system. Peer-to-Peer Networking and Applications. 2020; 13 (5):1340-1356.

Chicago/Turabian Style

Sungjin Yu; Kisung Park; Yohan Park; Hyungpyo Kim; Youngho Park. 2020. "A lightweight three-factor authentication protocol for digital rights management system." Peer-to-Peer Networking and Applications 13, no. 5: 1340-1356.

Journal article
Published: 22 May 2019 in Sensors
Reads 0
Downloads 0

Internet of Things (IoT) environments such as smart homes, smart factories, and smart buildings have become a part of our lives. The services of IoT environments are provided through wireless networks to legal users. However, the wireless network is an open channel, which is insecure to attacks from adversaries such as replay attacks, impersonation attacks, and invasions of privacy. To provide secure IoT services to users, mutual authentication protocols have attracted much attention as consequential security issues, and numerous protocols have been studied. In 2017, Bae et al. presented a smartcard-based two-factor authentication protocol for multi-gateway IoT environments. However, we point out that Bae et al.’s protocol is vulnerable to user impersonation attacks, gateway spoofing attacks, and session key disclosure, and cannot provide a mutual authentication. In addition, we propose a three-factor mutual authentication protocol for multi-gateway IoT environments to resolve these security weaknesses. Then, we use Burrows–Abadi–Needham (BAN) logic to prove that the proposed protocol achieves secure mutual authentication, and we use the Automated Validation of Internet Security Protocols and Applications (AVISPA) tool to analyze a formal security verification. In conclusion, our proposed protocol is secure and applicable in multi-gateway IoT environments.

ACS Style

Joonyoung Lee; Sungjin Yu; Kisung Park; Yohan Park; Youngho Park. Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments. Sensors 2019, 19, 2358 .

AMA Style

Joonyoung Lee, Sungjin Yu, Kisung Park, Yohan Park, Youngho Park. Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments. Sensors. 2019; 19 (10):2358.

Chicago/Turabian Style

Joonyoung Lee; Sungjin Yu; Kisung Park; Yohan Park; Youngho Park. 2019. "Secure Three-Factor Authentication Protocol for Multi-Gateway IoT Environments." Sensors 19, no. 10: 2358.

Research article
Published: 26 February 2019 in International Journal of Communication Systems
Reads 0
Downloads 0

The fast growth of mobile services and devices has made the conventional single‐server architecture ineffective from the point of its functional requirements. To extend the scalability and availability of mobile services to various applications, it is required to deploy multiserver architecture. In 2016, Moon et al insisted that Lu et al's scheme is weak to insiders and impersonation attack, then they proposed a biometric‐based scheme for authentication and key agreement of users in multiserver environments. Unfortunately, we analyze Moon et al's scheme and demonstrate that their scheme does not withstand various attacks from a malicious registered server. We propose a user authentication scheme with server mutual verification to overcome these security drawbacks. The proposed scheme withstands an attack from malicious insiders in multiserver environments. We use a threshold cryptography to strengthen the process of server authorization and to provide better security functionalities. We then prove the authentication and session key of the proposed scheme using Burrows‐Abadi‐Needham (BAN) logic and show that our proposed scheme is secure against various attacks.

ACS Style

Yohan Park; Kisung Park; Youngho Park. Secure user authentication scheme with novel server mutual verification for multiserver environments. International Journal of Communication Systems 2019, 32, e3929 .

AMA Style

Yohan Park, Kisung Park, Youngho Park. Secure user authentication scheme with novel server mutual verification for multiserver environments. International Journal of Communication Systems. 2019; 32 (7):e3929.

Chicago/Turabian Style

Yohan Park; Kisung Park; Youngho Park. 2019. "Secure user authentication scheme with novel server mutual verification for multiserver environments." International Journal of Communication Systems 32, no. 7: e3929.

Mobile and wireless health
Published: 15 February 2017 in Journal of Medical Systems
Reads 0
Downloads 0

The technology of IoT combined with medical systems is expected to support advanced medical services. However, unsolved security problems, such as misuse of medical devices, illegal access to the medical server and so on, make IoT-based medical systems not be applied widely. In addition, users have a high burden of computation to access Things for the explosive growth of IoT devices. Because medical information is critical and important, but users have a restricted computing power, IoT-based medical systems are required to provide secure and efficient authentication for users. In this paper, we propose a selective group authentication scheme using Shamir’s threshold technique. The property of selectivity gives the right of choice to users to form a group which consists of things users select and access. And users can get an access authority for those Things at a time. Thus, our scheme provides an efficient user authentication for multiple Things and conditional access authority for safe IoT-based medical information system. To the best of our knowledge, our proposed scheme is the first in which selectivity is combined with group authentication in IoT environments.

ACS Style

Yohan Park; Youngho Park. A Selective Group Authentication Scheme for IoT-Based Medical Information System. Journal of Medical Systems 2017, 41, 48 -48:8.

AMA Style

Yohan Park, Youngho Park. A Selective Group Authentication Scheme for IoT-Based Medical Information System. Journal of Medical Systems. 2017; 41 (4):48-48:8.

Chicago/Turabian Style

Yohan Park; Youngho Park. 2017. "A Selective Group Authentication Scheme for IoT-Based Medical Information System." Journal of Medical Systems 41, no. 4: 48-48:8.

Journal article
Published: 14 December 2016 in Sensors
Reads 0
Downloads 0

Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.

ACS Style

Yohan Park; Youngho Park. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks. Sensors 2016, 16, 2123 .

AMA Style

Yohan Park, Youngho Park. Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks. Sensors. 2016; 16 (12):2123.

Chicago/Turabian Style

Yohan Park; Youngho Park. 2016. "Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks." Sensors 16, no. 12: 2123.