Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hongjin Yeh is active.

Publication


Featured researches published by Hongjin Yeh.


Peer-to-peer Networking and Applications | 2015

An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks

Soobok Shin; Hongjin Yeh; Kangseok Kim

Recently the advances in a variety of hardware/software technologies and wireless networking have brought explosive growth of mobile network/device involved services and it raised a number of security concerns such as user authentication/authorization, user information privacy and secure data transmission between service providers and consumers using mobile devices through mobile network. Therefore, it is essential that legitimate user authentication as well as user anonymity for privacy is ensured between those entities (service providers and consumers). As compared to stationary devices, due to high network latency and low computing performance of mobile network/devices, the authentication scheme in wireless and mobile networks requires a mechanism to achieve low communication and computation costs. Thus, in this paper we propose a lightweight authentication scheme. Also, the scheme ensures user’s anonymity and provides secure password update, session key agreement, and mutual authentication between entities to resist to possible attacks in ubiquitous networks. And we present security and performance analysis of our proposed scheme, and experimental results to show the efficiency of the scheme as well.


International Journal of Advanced Robotic Systems | 2012

A Remote User Authentication Scheme with Anonymity for Mobile Devices

Soobok Shin; Kangseok Kim; Ki-Hyung Kim; Hongjin Yeh

With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.


international parallel processing symposium | 1999

Optimal Scheduling Algorithms in WDM Optical Passive Star Networks

Hongjin Yeh; Kyubum Wee; Manpyo Hong

All-to-all broadcast scheduling problems are considered in WDM optical passive star networks where k wavelengths are available in the network. It is assumed that each node has exactly one tunable transmitter and one fixed tuned receiver. All transmitters can tune to k different wavelengths, and have the same tuning delay δ to tune from one wavelength to another. In this paper, we take δ to be a nonnegative integer which can be expressed in units of packet durations. When all-to-all broadcasts are scheduled periodically in the network, the lower bounds are established on the minimum cycle length depending on whether each node sends packets to itself or not. And then, we present optimal scheduling algorithms in both cases for arbitrary number of wavelengths and for arbitrary value of the tuning delay.


International Journal of Advanced Robotic Systems | 2012

Personalized Mobile Information Retrieval System

Okkyung Choi; Kangseok Kim; Duksang Wang; Hongjin Yeh; Manpyo Hong

Building a global Network Relations with the internet has made huge changes in personal information system and even comments left on a webpage of SNS(Social Network Services) are appreciated as important elements that would provide valuable information for someone. Social Network is a relation between individuals or groups, represented in a graph model, which converts the concept of psychological and social relations into a logical structure by using node and link. But, most of the current personalized systems on the basis of Social Network are built and constructed mainly in the PC environment, and the systems are neither designed nor implemented in mobile environment. Hence, the objective of this study is to propose methods of providing Personalized Mobile Information Retrieval System using NFC (Near Field Communication) Smartphone, which will be then used for Smartphone users. Besides, this study aims to verify its efficiency through a comparative analysis of existing studies.


Peer-to-peer Networking and Applications | 2014

An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment

Soobok Shin; Taeshik Shon; Hongjin Yeh; Kangseok Kim

With the advent of new generation of mobile access devices such as smartphone and tablet PC, there is coming a need for ubiquitous collaboration which allows people to access information systems with their disparate access devices and to communicate with others in anytime and in anywhere. As the number of collaborators with a large number of disparate access devices increases in ubiquitous collaboration environment, the difficulties for protecting secured resources from unauthorized users as well as unsecured access devices will increase since the resources can be compromised by inadequately secured human and devices. Therfore, authentication mechanism for access of legitimate participants is essential in ubiquitous collaboration environment. In this paper we present an efficient authentication mechanism in ubiquitous collaboration environment. We show that proposed scheme is secure through security analysis and is efficient through the experimental results obtained from the practical evaluation of the scheme in ubiquitous collaboration environment.


International Journal of Computer Mathematics | 2013

Two-factor authentication system based on extended OTP mechanism

Yunlim Ku; Okkyung Choi; Kangseok Kim; Taeshik Shon; Manpyo Hong; Hongjin Yeh; Jai-Hoon Kim

The recent increase in smartphone supply drives more users to utilize mobile financial services and it magnifies the importance of mobile security solutions. But it is not easy to defend cyber-attacks against financial services because the attacks get more diverse every year. The recent solution, OTP (one time password), is the most commonly used financial security measure to defend session attacks, but the downside is that it is hard to implement differentiated OTP creation mechanism to it. This research intends to solve the problem by suggesting Two-Factor authentication mechanism that utilizes graphical OTP. It is an extension of OTP mechanism which implements the graphical one time password to mobile financial security to reinforce mobiles way of authenticating with only ID and Password or digital certificate from banks; and it will defend against more diverse mobile hackings.


Archive | 2012

Extended OTP Mechanism Based on Graphical Password Method

Yunlim Ku; Okkyung Choi; Kangseok Kim; Taeshik Shon; Manpyo Hong; Hongjin Yeh; Jai-Hoon Kim

OTP (One Time Password), a financial security authentication mechanism mainly used nowadays, is possible to cope with session attacks but has an weakness that it is difficult to apply differentiated mechanisms. This study intends to propose an extended OTP mechanism utilizing Graphical password method in order to solve such problem of the existing method. The proposed method is a Graphical password mechanism in story method based on user’s memory and can cope with various financial hackings and attack techniques. The existing authentication mechanisms have also a weakness in reliability to be used in mobile devices. In order to complement such weakness, GOTP (Graphical One Time Password) method was introduced so that users may use it in the Smartphone environment more easily and safely. Lastly, the effectiveness and validity were confirmed through an user study.


International Journal of Communication Systems | 2013

LZCode based compression method for effectively using the memory of embedded devices

Hyun-chul Lee; Kangseok Kim; Okkyung Choi; Hongjin Yeh

SUMMARY Recently, with the rapid growth of embedded devices such as smart phones, tablet PC, and so on, the research on the effective use of flash memory widely used in embedded devices has been increasing. The growth is expected to continue more rapidly and the need for research will increase more. Therefore, there is a coming need for the effective use of main memory with flash memory in embedded devices. Essentially, all program codes have to be loaded into main memory before they can be executed. Then, the time for loading them into main memory is to be the sum of time for reading compression data from flash memory and for decompressing the data by a compressor residing in the main memory. Thus, the smaller the size of the compressor can make the utilization of main memory more effective. In this paper, we present our research on a lossless compression algorithm for reducing the size of the compressor while still maintaining compression rate and speed similar to LZCode suitable for embedded devices. Copyright


web age information management | 2004

Effective Web-Related Resource Security Using Distributed Role Hierarchy

Gunhee Lee; Won-Il Kim; Dong-kyoo Kim; Hongjin Yeh

The recent trend of access control on the Web-related resource is that the service provider differentiates services according to the user’s attributes such as membership class or job position. For proper and simple representation of the relationships between user’s attributes and permission, role-base access control is used on the Web. As the size of the organization increases, does the number of membership classes or job positions. Naturally, the role hierarchy becomes too complicated to administrate properly. The lack of proper role administration makes the system vulnerable in access control. Moreover, the web services are distributed and categorized by the type of service. It is difficult that a centralized server controls the distribute environment properly. In this paper, we propose a distributed role hierarchy module that can manage the role hierarchy effectively and practically. The proposed system employs the distributed local role hierarchy, and the combination of them represents a logical global role structure. Distributed role hierarchy modules manage local role hierarchy that is related to each of them.


2012 9th International Conference & Expo on Emerging Technologies for a Smarter World (CEWIT) | 2012

An effective device and data origin authentication scheme in home networks

Soobok Shin; Hongjin Yeh; Kangseok Kim

Home network provides residents with autonomous services for convenient and secure life through communication among networked home devices. Particularly, as services of home network are provided through communication among home devices without human intervention, device and data origin authentication among devices are important for secure home. Most home devices do not have restrictions such as power supply and networking because home devices are located in home. On the other hand, home devices have the restrictions of computing power and memory capacity. Therefore security in home network should be designed effectively considering those restrictions. In this paper we propose device authentication scheme for secure home network. The proposed scheme does not have high computation complexity due to applying low cost operations such as hash function and exclusive-OR. Also the proposed scheme proposes mutual authentication and data origin authentication and then we show that our scheme is secure through security analysis.

Collaboration


Dive into the Hongjin Yeh's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Eun-Sun Cho

Chungnam National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge