Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gil-Cheol Park is active.

Publication


Featured researches published by Gil-Cheol Park.


international conference on future generation communication and networking | 2010

A Study on Architecture of Malicious Code Blocking Scheme with White List in Smartphone Environment

Kijeong Lee; Randy S. Tolentino; Gil-Cheol Park; Yong-Tae Kim

Recently, the interest and demands for mobile communications are growing so fast because of the increasing prevalence of smartphones around the world. In addition, the existing feature phones were replaced by smartphones and it has widely improved while using the explosive growth of Internet users using smartphones, e-commerce enabled Internet banking transactions and the importance of protecting personal information. Therefore, the development of smartphones antivirus products was developed and launched in order to prevent malicious code or virus infection. In this paper, we proposed a new scheme to protect the smartphone from malicious codes and malicious applications that are element of security threats in mobile environment and to prevent information leakage from malicious code infection. The proposed scheme is based on the white list smartphone application which only allows installing authorized applications and to prevent the installation of malicious and untrusted mobile applications which can possibly infect the applications and programs of smartphones.


Wireless Personal Communications | 2009

Protecting Your Privacy with a Mobile Agent Device in RFID Environment

Sang-Soo Yeo; Soo-Cheol Kim; Sung Kwon Kim; Gil-Cheol Park; Seok Soo Kim; KiSung Yang; Sung-Eon Cho

Radio Frequency Identification (RFID) Technology is a contactless automatic identification technology using radio frequency. For this RFID technology to be widely spread, the problem of privacy invasion should be solved. There are many research works in progress to solve the RFID privacy problems. Most of works for solving this problem have focused on developing light-weight cryptographic modules which can be embedded into RFID tags, but some of them used a proxy agent approach that control communications between the tag and the reader for protecting user privacy. The later approach is very useful and practical in terms of manufacturing low-cost tag hardware. However, all schemes of this approach have some problems in ownership transfer and forgery detection. In this paper, we are focusing on the proxy agent approach and we suggest an advanced agent scheme that guarantees not only privacy protection but also forgery detection. And our scheme is more scalable than other agent schemes so far.


international conference on intelligent computing | 2006

U-Logistic services in military using RFID and mobile sensor network

Gil-Cheol Park; Seoksoo Kim

Superiority in information technology became an important factor influencing success or failure of the national defense, and prompt delivery of information gathered from IT serves as a core factor in exhibiting combative power of the military. Furthermore, applications of these technologies can lead to increase in strategic capabilities like sensing and detection, exchanging and sharing advanced real time information and increasing community power of the strategic units. Therefore, the author wants to research core technology sector that can be developed and applied in preparation of ubiquitous national defense era. In particular, this paper aims to design Logistic system that is mobile sensor network and RFID based.


ubiquitous computing | 2011

Design of RSSI Signal Based Transmit-Receiving Device for Preventing from Wasting Electric Power of Transmit in Sensor Network

Yong-Tae Kim; Yoon-Su Jeong; Gil-Cheol Park

In WPAN environment using the existing ZigBee communication, the determination of transmitting electric power output of sensor is set up at the early stage which composes system. Therefore, the devices which compose WPAN use the way to transmit with the output value that is set as fixed irrelevantly to the distance of other device and it causes excessive electric power for transmitting. As a result, the life-expectancy of battery is reduced and there happens interference among devices. So, in this paper, a transmit-receiving system which can transmit signal using proper electric power for transmit to other device that transmits signal by the receiving intensity of measured signal after measuring intensity of RSSI of each device for solving interruption problem among device and wasting electric power transmitting.


international conference on future generation communication and networking | 2010

Next Generation RFID-Based Medical Service Management System Architecture in Wireless Sensor Network

Randy S. Tolentino; Kijeong Lee; Yong-Tae Kim; Gil-Cheol Park

Radio Frequency Identification (RFID) and Wireless Sensor Network (WSN) are two important wireless technologies that have wide variety of applications and provide unlimited future potentials most especially in healthcare systems. RFID is used to detect presence and location of objects while WSN is used to sense and monitor the environment. Integrating RFID with WSN not only provides identity and location of an object but also provides information regarding the condition of the object carrying the sensors enabled RFID tag. However, there isn’t any flexible and robust communication infrastructure to integrate these devices into an emergency care setting. An efficient wireless communication substrate for medical devices that addresses ad hoc or fixed network formation, naming and discovery, transmission efficiency of data, data security and authentication, as well as filtration and aggregation of vital sign data need to be study and analyze. This paper proposed an efficient next generation architecture for RFID-based medical service management system in WSN that possesses the essential elements of each future medical application that are integrated with existing medical practices and technologies in real-time, remote monitoring, in giving medication, and patient status tracking assisted by embedded wearable wireless sensors which are integrated in wireless sensor network.


international conference on future generation communication and networking | 2009

MSMAP: A Study on Robust Multiple Selection Scheme of Mobility Anchor Point in Hierarchical Mobile IPv6 Networks

Randy S. Tolentino; Kijeong Lee; Minho Song; Yoon-Su Jeong; Yong-Tae Kim; Byungjoo Park; Gil-Cheol Park

In Hierarchical Mobile IPv6 networks, how a mobile node selects an appropriate mobility anchor point (MAP) has a vital effect on the overall network performance. In this paper, we evaluate the performances of MAP selection schemes: the furthest MAP selection scheme, the nearest MAP selection scheme, the mobility-based MAP selection scheme, and the adaptive MAP selection scheme. The dynamic schemes can achieve load balancing among MAPs, where the adaptive MAP selection is better than the mobility-based MAP selection scheme. We also discussed our proposed scheme which is called the Multiple Selection of MAP in HMIPv6 (MSMAP-HMIPv6). We will show the comparison of performance analysis of HMIPv6 and our propose scheme, based on the assumptions of the new scheme, we can minimize the signaling of the mobile node and based on the pre-binding update research can minimize the handover latency.


multimedia and ubiquitous engineering | 2007

Designing Tag Based Status Identification Control System to Provide Information From uHealthcare Environment

Jae-gu Song; Gil-Cheol Park; Minseong Ju; Seoksoo Kim

Status data identification in ubiquitous computing is studied as the method of providing optimum service to the user. The study is most active in Healthcare field, which is considered as the essential factor in human life. Studies have been conducted in the past which utilized analysis of information taken from sensors to obtain corresponding status information of the patient. However, applying the information obtained from such data had its limitations due to lack of researches done on methods of controlling and distributing such status information. This study suggests a solution for managing status information through tag matching method in order to effectively provide status information from uHealthcare. The suggested model shows slight delay in data process when information is produced, but an improved ability during information search by utilizing tagged information.


frontiers in convergence of bioscience and information technologies | 2007

Towards a Mobile and Context-Aware Technology Based Healthcare System

Jae-gu Song; S. Kirn; Gil-Cheol Park

We are studying the process of accounting for context awareness for mobile information technology solutions in the healthcare sector. We consider the needs of context- aware information technology, its requirements and its delivery from intelligent and ubiquitous sensors through middleware. We discuss the state of the art and the processes that we deem important to advance the realization of powerful context-aware technology that offers new possibilities, services, and economies to the healthcare sector.


2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security (BLISS 2007) | 2007

Block Model Application for Decision Support Systems

Tai-hoon Kim; Seoksoo Kim; Gil-Cheol Park

Because networks and systems become more complex, the implementation of the security countermeasures for Decision Support Systems (DSS) becomes more critical. Designers and developers of the security policy should recognize the importance of building security countermeasures by using both technical and non-technical methods, such as personnel and operational facts. In general, decision support systems have many components, and these components are connected with each other complicatedly. Therefore, to make security countermeasure more perfect one, all components of systems should be checked, and this method is very difficult because too many components are included. In this paper, to overcome this problem, we propose the Block Model to divide decision support systems into 4 blocks. After dividing systems into blocks, we can get a chance to build security countermeasures for each block Security countermeasures of each block can be integrated into total countermeasures. Applying of Security engineering and intelligent methods are needed to reduce security holes may be included in the software or systems. Therefore, more security-related intelligent researches are needed to reduce security weakness may be included in the systems. This paper proposes some intelligent methods and procedures for reducing the threat to the system by applying security engineering, and for building security countermeasure.


The Journal of Digital Policy and Management | 2014

Energy-efficient routing protocol based on Localization Identification and RSSI value in sensor network

Yong-Tae Kim; Yoon-Su Jeong; Gil-Cheol Park

This study has a purpose that improves efficiency of energy management and adaptation followed by movement of node better than the various early studied routing techniques. The purpose of this paper is the technique that uses RSSI value and location of sensor that is received by each sensor node to routing. This sduty does not save node information of 1-hop distance. And it solves energy-inefficient traffic problem that happens during data exchange process for middle node selection in close range multi hop transmission technique. The routing protocol technique that is proposed in this study selects a node relevant to the range of transmission which is set for RSSI value that is received by each node and selects the closest node as a middle node followed by location data. Therefore, it is for not exhaustion of node`s energy by managing energy efficiently and cutting data transmission consuming until the destination node.

Collaboration


Dive into the Gil-Cheol Park's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yoon-Su Jeong

Chungbuk National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sang-Ho Lee

Chungbuk National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge