Hyungjoo Kim
Soongsil University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hyungjoo Kim.
Symmetry | 2014
Uijin Jang; Hyungmin Lim; Hyungjoo Kim
Long-Term Evolution (LTE) is a fourth-generation mobile communication technology implemented throughout the world. It is the communication means of smartphones that send and receive all of the private date of individuals. M2M, IOT, etc., are the base technologies of mobile communication that will be used in the future cyber world. However, identification parameters, such as International Mobile Subscriber Identity (IMSI), Radio Network Temporary Identities (RNTI), etc., in the initial attach section for accessing the LTE network are presented with the vulnerability of being exposed as clear text. Such vulnerability does not end in a mere identification parameter, but can lead to a secondary attack using the identification parameter, such as replication of the smartphone, illegal use of the mobile communication network, etc. This paper proposes a security protocol to safely transmit identification parameters in different cases of the initial attach. The proposed security protocol solves the exposed vulnerability by encrypting the parameters in transmission. Using an OPNET simulator, it is shown that the average rate of delay and processing ratio are efficient in comparison to the existing process.
Microprocessors and Microsystems | 2017
Hyungjoo Kim; Jungho Kang; Jong Hyuk Park
Abstract Recently, cloud computing and cyber-physical system (CPS) are definitely basic elements in real industrial field. In particular, security is a mandatory factor for communications and operations in these environments. However, the existing CPS security mechanism is not suitable to the telecommunication framework provided by the standards. In addition, random number function of high entropy must be used to enhance security with encrypted communications and must support perfect secrecy. Random number functions supported by the devices instead of servers do not have sufficient entropy. Entropy injection and seed replacement are also impractical. In this paper, we propose a security scheme which provides light-weight secure CPS information transmission and device control scheme in integration of CPS and cloud computing. In this scheme, a light-weight security scheme can multicast event information to users who have heterogeneous device information access authorities based on oneM2M standards, and also be able to manage the control devices. This paper provides performance analysis of proposed scheme and confirms its security and efficiency.
Symmetry | 2016
Jong Hyuk Park; Hyungjoo Kim; Jungho Kang
Long Term Evolution (LTE) and Long Term Evolution-Advanced (LTE-A) support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased as people have started to use more than just one mobile device. However, when User Equipment (UE) is executing initial attach processes to access LTE networks, there is a vulnerability in which identification parameters like International Mobile Subscriber Identity (IMSI) and Radio Network Temporary Identities (RNTI) are transmitted as plain texts. It can threat various services that are commercialized therewith in a cyber world. Therefore, a security scheme is proposed in this paper where identification parameters can be securely transmitted and hidden in four cases where initial attach occurs between UE and Mobility Management Entity (MME). The proposed security scheme not only supports encrypted transmission of identification parameters but also mutual authentication between Evolved Node B (eNB) and MME to make a secure cyber world. Additionally, performance analysis results using an OPNET simulator showed the satisfaction of the average delay rate that is specified in LTE standards.
Archive | 2015
Hyungjoo Kim; Hyunsoo Chung; Jungho Kang
A multi-cloud computing refers to the environment where services such as resources and software, etc., can be shared and provided through an agreement between two or more cloud computing service providers. A user requires multiple authentications in order to use the cloud service between the shared service providers. However at such time, users are exposed to vulnerabilities such as their authentication information being exposed to service providers whom they did not sign up with or being exposed during the multiple authentications. Therefore in this paper, the zero-knowledge authentication protocol for ensuring anonymity is proposed. The proposed protocol is safe for all know vulnerabilities and can be used as a safe protocol in multi-cloud environment.
international conference on computer sciences and convergence information technology | 2010
Hyungjoo Kim; Moon-Seog Jun
The low-cost tag based on the ESC Class-1 Generation-2 Standards which is used in the bandwidth of the Ultra High Frequency is exposed to a number of vulnerable points of security due to the limited capability of calculation. The solution for such a problem has not been suggested yet. Because of such a reason, this paper proposes a Light-Weight Mutual Authentication Protocol for Multi-Tags. The proposed protocol is equipped with the level of security which can resist the malignant attacks which are becoming issues on the RFD system by using only the capability of calculation of the tag specified in the ESC Class-1 Generation-2 Standards. Furthermore, it has been designed to mutual verify the multi-tags at the same time in order to use them efficiently for the distribution process and the related management process.
Archive | 2016
Hyungjoo Kim; Moon-Seog Jun
Recently, software has been utilized in various environments including computer, smartphone and medical devices because the application fields of IT products have been diversified. Moreover, software has evolved in a way to modify and redistribute source code freely by opening source code in recent years. However, open source software is being developed through those developers having no prior security related knowledge. Furthermore, it is being distributed without any verification. Hereupon, there are various security vulnerabilities that are exploited for an attack. Therefore, this paper examined security vulnerabilities from design phase to distribution phase of software and also proposed a system that can check whether software is securely coded. Moreover, this paper analyzed the equivalency of performance to the existing products as a result of the performance evaluation through Juliet code.
Archive | 2016
Mansik Kim; Hyungjoo Kim; Jungho Kang; Jaesoo Kim
A drone industry which started for military purposes is growing and are being spread in the private market as ICT technologies are developing. For example, it includes various industries such as leisure, construction, delivery, military, etc. and there are plenty of pioneer areas for future. However the researches for future drone developments have some challenges because there are no standards for drone developments, so the environment should be provided to develop and design them properly. This paper categorizes various purpose drones into 3 kinds of control distances by features, so it will help future drone development researches.
Journal of Digital Convergence | 2016
Hyung-Uk Kim; Hyungjoo Kim; Jungho Kang; Moon-Seog Jun
Most recent trend reveals broader state of provision of NFC service as NFC technology was applied on smartphones which has become core communication tools by providing integrated services such as payment, medical, and personal authentication. Moreover, with integration of original service and NFC technology, new service providers now can handle personal information of original service or can handle other personal information with transition of previous service provider to NFC service provider. Considering current state of security industry along with NFC technology and service, we would like to analyze current stage of security threats and plan the counter strategies to create NFC service structure.
Archive | 2015
Hyungjoo Kim; Moon-Seog Jun; Jaesoo Kim
Wireless Sensor is used for military purpose, machine management, cultural properties management, etc. However, sensor being transmitted in wireless network channel, relay attack, eavesdropping, and replay attack have occurred. Also, because the sensor’s hardware arithmetic operation capacity is very limited (low cost), it has various security vulnerabilities for which a solution has not yet been developed. Thus, this paper proposed the light-weight distance-bounding mutual authentication security scheme based on the limited hardware computing capability. The proposed scheme is safe against all security vulnerabilities that could occur in sensor network and can be efficiently used for group sensor management because of its ability to authenticate multiple sensors simultaneously and to show efficient performance.
Archive | 2015
Uijin Jang; Hyungmin Lim; Hyungjoo Kim
Long Term Evolution (LTE) is a fourth-generation mobile communication technology implemented throughout the world. There is still, however, an exposed vulnerability with regard to the identification parameters such as IMSI and RNTI, as they are transmitted in plain text during the initial attach procedure in the access to the LTE network. The vulnerability has existed since the initial release of the LTE Standards, and is still present in Release 12. To prevent a leak of the identification parameters during the initial attach process and a possible third party attack, the relevant parameters should be encrypted. This paper proposes a security scheme to safely transmit identification parameters in different cases of the initial attach. The proposed security scheme solves the exposed vulnerability by encrypting the parameters in transmission. Using an OPNET simulator, it is shown that the average rate of delay and processing ratio are efficient in comparison to the existing process.