Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hwaseong Lee is active.

Publication


Featured researches published by Hwaseong Lee.


Journal of Medical Systems | 2012

A Privacy-Strengthened Scheme for E-Healthcare Monitoring System

Chanying Huang; Hwaseong Lee; Dong Hoon Lee

Recent Advances in Wireless Body Area Networks (WBANs) offer unprecedented opportunities and challenges to the development of pervasive electronic healthcare (E-Healthcare) monitoring system. In E-Healthcare system, the processed data are patients’ sensitive health data that are directly related to individuals’ privacy. For this reason, privacy concern is of great importance for E-Healthcare system. Current existing systems for E-Healthcare services, however, have not yet provided sufficient privacy protection for patients. In order to offer adequate security and privacy, in this paper, we propose a privacy-enhanced scheme for patients’ physical condition monitoring, which achieves dual effects: (1) providing unlinkability of health records and individual identity, and (2) supporting anonymous authentication and authorized data access. We also conduct a simulation experiment to evaluate the performance of the proposed scheme. The experimental results demonstrate that the proposed scheme achieves better performance in terms of computational complexity, communication overheads and querying efficiency compared with previous results.


IEEE Transactions on Consumer Electronics | 2012

PACPs: practical access control protocols for wireless sensor networks

Hwaseong Lee; Kilho Shin; Dong Hoon Lee

To provide trustworthy cooperation and dynamic node addition in wireless sensor networks, access control is of great concern. Access control should be designed to be secure and efficient even under practical restrictions. Otherwise, theoretical results cannot be immediately applied to real environments. In this paper, we discuss that the recently proposed hash-chain based access control methods are not secure when practical restrictions are considered. We then propose two practical access control protocols, called PACPs. It is shown that PACPs are practically secure yet require less communication/computation costs than those of the previous methods.


international conference on hybrid information technology | 2008

CADE: Cumulative Acknowledgement Based Detection of Selective Forwarding Attacks in Wireless Sensor Networks

Young Ki Kim; Hwaseong Lee; Kwantae Cho; Dong Hoon Lee

Wireless sensor networks are networks consisting of nodes with sensors to monitor physical or environmental conditions. Since nodes in wireless sensor networks have limited transmission capabilities, packets are generally transmitted to the destination node through several immediate nodes. However, if a malicious node is present on a route through which packets are forwarded, attackers can deliver selective forwarding attacks by simply dropping packets. Selective forwarding attacks can be serious threats on many applications including networks for military surveillance and health-care monitoring. Previous countermeasures to selective forwarding attacks cannot identify malicious nodes or require time synchronization. In this paper, we present a detecting scheme which identifies malicious nodes delivering selective forwarding attacks without the need for time synchronization. Our scheme also provides security against sinkhole attacks where attackers try to attract more traffic to malicious nodes.


international conference on hybrid information technology | 2008

Secure Mutual Authentication and Fair Billing for Roaming Service in Wireless Mobile Networks

Tae Ryung Im; Hwaseong Lee; Kwan Tae Cho; Dong Hoon Lee

Authentication and billing for mobile users are primary research area on many commercial wireless mobile networks such as cellular networks, wireless LAN, wireless mesh networks and so on. However there are drawbacks on the conventional approach of roaming and billing. In this paper, we propose an approach of mutual authentication and fair billing for roaming service in wireless mobile networks. Our proposed scheme provides a trustworthy billing as well as secure mutual authentication between users and service providers.


international workshop on security | 2007

Trapdoor-based Mutual Authentication Scheme without Cryptographic Primitives in RFID Tags

Hwaseong Lee; Eun Young Choi; Su-Mi Lee; Dong Hoon Lee

Radio frequency identification(RFID) systems are being used in many applications such as the supply chain. The widespread usage of tags creates new threats of security and privacy in RFID systems. Many schemes have been proposed to provide security and privacy, based on basic cryptographic primitives such as hash function and encryption algorithm. However, it may be a burden on a resource-constrained tag. As considering the requirements on a tag, we propose a lightweight mutual authentication scheme based on trapdoor one-way property and challenge/response approach. Even though the proposed scheme does not perform cryptograhic primitives, it guarantees security and privacy provided by the authentication schemes using cryptographic primitives. We expect this mutual authentication scheme to activate RFID systems in various applications.


international symposium on consumer electronics | 2009

Practical access control protocol for secure sensor networks

Hwaseong Lee; Kilho Shin; Dong Hoon Lee

Key establishment with authentication is basic and necessary to configure secure sensor networks. Recently, a paper was published for dynamic access control, using harsh chain for authentication. We point out its weakness and propose more practical scheme as satisfing same security requirement.


ieee international conference on pervasive computing and communications | 2008

A Key Distribution Scheme for Wireless Sensor Networks

Yong Ho Kim; Hwaseong Lee; Dong Hoon Lee

Recently, some random key pre-distribution approaches have been proposed for pair-wise key establishment in sensor networks recently. Unfortunately, all of them have the following problem if some sensor nodes are captured by an attacker. Some pair-wise keys of non-captured nodes can be compromised. In this paper, we propose a novel key distribution scheme with strong resilience against node capture.


international conference on information security | 2008

Authenticated Group Key Distribution for Unreliable Sensor Networks

Hwaseong Lee; Yong Ho Kim; Dong Hoon Lee

Chadha et al. proposed a group key scheme for wireless sensor networks via local collaboration. A group key was derived from base stations broadcast message and a nodes secret. However, there is no authentication in the group key scheme. It is essential to share a reliable group key among the entire nodes even though it results in a little overhead.


international conference on computer sciences and convergence information technology | 2011

Some remarkable property of the uniformly random distributed archive scheme

Ahmed Tallat; Kilho Shin; Hwaseong Lee; Hiroshi Yasuda


International Journal on Advances in Information Sciences and Service Sciences | 2012

Some Remarkable Properties of the Uniformly Random Distributed Archive Scheme

Ahmed Tallat; Kilho Shin; Hwaseong Lee; Hiroshi Yasuda

Collaboration


Dive into the Hwaseong Lee's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge