Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jin-Mook Kim is active.

Publication


Featured researches published by Jin-Mook Kim.


Cluster Computing | 2014

A secure smart-work service model based OpenStack for Cloud computing

Jin-Mook Kim; Hwa-Young Jeong; Ilkwon Cho; Sun Moo Kang; Jong Hyuk Park

Cloud computing technology is a general concept and idea such as existing distributed computing, parallel computing, Pervasive computing and Ubiquitous computing. We have been studying OpenStack which was an Open cloud project under the KOREN (Korea Advanced Research Network) environments. In this paper, we propose a secure smart-work service model-based OpenStack. There are mainly two kinds of security breaches that can occur under the proposed environment. Nova is vulnerable to DoS attack in OpenStack. SQL Injection can be attacked in the process during which the user requests authorization, which results in data being saved in Swift. Looking more deeply into these two types of attack, we can divide DoS attack into Jolt2, Tear-drop, and SYN-Flooding attack. We simulated attacks in an experimental environment and summarized the results. With the objective of being able to provide Smart-Work service in the KOREN environment, we proposed solutions to various kinds of attacks against the security system and carried out modeling work with the data from the experiment conducted in the Cloud service environment we examined above.


Security and Communication Networks | 2014

A study of privacy problem solving using device and user authentication for M2M environments

Jin-Mook Kim; Hwa-Young Jeong; Bong-Hwa Hong

Inside a machine-to-machine M2M environment, a device is very much a communication subject. Machine and gateways are important communication subjects. It can be collecting or storing surrounding information as users intention. There is a case that infringes other persons privacy such as not passing through a certification process of the user or communication chairman who requests communications among the information that is collected by the machine. Therefore, we wish to propose privacy problem solving using device and user authentication PSDUA that can support the certification process between device and user communicating the subject in M2M environment and can support the user in another certification work about various services. PSDUA proposes a design that can pass through a light certification process based on existent system. For example, Kerberos and public key infrastructure PKI can support very heavy certification process but our proposed scheme cannot. However, our proposed system can act easily and fast and that gradual access may be possible using time stamp, device identification, and user log-in information. It can also protect privacy information of other person or machines that are not the subject of communication. Additionally, we also check about confidentiality, integrity, and safety of machine-in-the-middle attack. Also, we can show safety in our proposed system. Our proposed scheme will provide solutions on various securities privacy problems. Copyright


ubiquitous computing systems | 2007

SLAP - A Secure but Light Authentication Protocol for RFID Based on Modular Exponentiation

Batbold Toiruul; KyungOh Lee; Jin-Mook Kim

The advantage of using RFID technology is gaining much attention as is seen by an increase in its deployment. However, this pervasive use of RFID tags opens up the possibility for various attacks violating user privacy. This work describes simple, inexpensive, and untraceable mutual identification protocols based on modular exponentiation for RFID tags. The proposed authentication mechanism is a low-cost but high-security for protecting consumers information in RFID tag against unwanted read-attacks. We analyzed with issues of the security and privacy of RFID systems. This paper also showed the 8-bit architecture of a low-power and low die-size implementation of modular exponentiation. The 8-bit modular exponentiation implementation has a chip area of less than 1 K gates and the encryption of 64 bits requires about 1000 clock cycles. The executing time of the proposed protocol would range from 12.36 ms to 20.6 ms, with 6-8 tags authenticated per second.


Journal of the Korea Convergence Society | 2014

Study on predictive modeling of incidence of traffic accidents caused by weather conditions

Young-Suk Chung; Rack-Koo Park; Jin-Mook Kim

Traffic accidents are caused by a variety of factors. Among the factors that cause traffic accidents are weather conditions at the time. There is a difference in the percentage of deaths according to traffic accidents, due to the weather conditions. In order to reduce the number of deaths due to traffic accidents, to predict the incidence of traffic accidents that occur in response to weather conditions is required. In this paper, it propose a model to predict the incidence of traffic accidents caused by weather conditions. Predictive modeling was applied to the theory of Markov processes. By applying the actual data for the proposed model, to predict the incidence of traffic accidents, it was compared with the number of occurrences in practice. In this paper, it is to support the development of traffic accident policy with the change of weather.


Archive | 2014

Approach of Secure Authentication System for Hybrid Cloud Service

Jin-Mook Kim; Jeong-Kyung Moon

Desire for cloud service is very increasing recently. But users are using cloud service actually very few. Because a private cloud service is very expensive and have a many restrict condition. On the other hand, public cloud service, if you can use it than you have to pay a usage fee when you needed external resources that have been published. However, public cloud service is a fear that the privacy of personal information or leaked, put to save the information that requires security. Therefore, the demand for hybrid cloud service has occurred. But, in order to provide a hybrid cloud service, is often difficult to be applied as an authentication system that was used in the cloud service existing. Therefore, I would like to propose a secure authentication system for the hybrid cloud service in this paper. We will secure authentication system for the hybrid cloud service that is provided security, availability, applicability. Our proposed system has a very good capability in suggested condition.


Archive | 2012

A User Authentication Method for M2M Environments

Jin-Mook Kim; Hwa-Young Jeong; Bong-Hwa Hong

The request about green IT technology is increasing recently. M2M is more request to IT Technology for Cloud computing. And effective use request of computer resource is increasing. So, necessity about Cloud computing is increasing rapidly thereby. However, Cloud computing environment have big security problems because embody using virtualization technology. It is Authentication that must solve in Cloud computing environment urgently. Therefore, we wishes to propose protocol that can solve suitable user and services certification in cloud computing environment. An novel authentication protocol that based on Kerberos. But it is faster than Kerberos and implement is easy.


JOURNAL OF ADVANCED INFORMATION TECHNOLOGY AND CONVERGENCE | 2011

A Secure Authentication Protocol for Cloud Services

Jeong-Kyung Moon; Jin-Mook Kim; Hwang-Rae Kim

The request about green IT technology is increasing recently. And effective use request of computer resource is increasing. So, necessity about Cloud computing is increasing rapidly thereby. However, Cloud computing environment have big security problems because embody using virtualization technology. It is Authentication that must solve in Cloud computing environment urgently. Therefore, we wishes to propose protocol that can solve suitable user and services certification in cloud computing environment. An novel authentication protocol that based on Kerberos. But it is faster than Kerberos and implement is easy.


Archive | 2014

A Study on the Clustering Scheme for Node Mobility in Mobile Ad-hoc Network

Hyun-Jong Cha; Jin-Mook Kim; Hwnag-Bin Ryou

A mobile ad-hoc network is an autonomous collection of wireless mobile nodes that organizes a temporary network without any network infrastructure. Due to node mobility, it is a challenging task to maintain the network topology. In this paper, we propose a stable clustering algorithm that uses node mobility for cluster formation. In the proposed algorithm, the node mobility is measured by counting the time of nodes entering into leaving from its transmission range. The node having the lowest mobility is selected as a cluster head. For topology maintenance with reduced control overhead, the cluster head adaptively controls the broadcasting period of hello message to the measured node mobility. Through computer simulations, it is verified that the proposed algorithm outperforms previous clustering algorithms in terms of control overhead, the rate of node mobility changes and the number of cluster head changes.


Surface Science | 2001

The influence of He addition on Cl-etching procedure for Si-nanoscale structure fabrication using reactive ion etching system

M.Y. Jung; S.S. Choi; Jin-Mook Kim; Dae-Wook Kim

Abstract Chlorine-based plasma have been often used to etch several semiconducting materials including Si and III–V materials. The chlorine plasma etching is well suited for fabrication of Si-nanoscale structures due to its good control of undercutting and etch profile. Due to some drawbacks such as trenches and damages on the etch mask from physical ion assisted etching, the Cl2/He gas mixture using a conventional reactive ion etching system was utilized and the optimization procedures were performed. Therefore, the influence of the He flow rate was examined. As the He flow increases over 30% of the total inlet gas flow, the plasma state become stable and the etch rate starts to increase. For high flow rate over 60%, the relationship between the etch depth and the etch time was observed to be nearly linear. In addition, the etch rate has been turned out to be linearly increasing with the He flow rate. With this result, the Cl2/He mixture plasma has been utilized and tested for fabrication of the deep Si sidewall and nanosize Si pillar array.


Multimedia Tools and Applications | 2017

Fast Fourier transform benchmark on X86 Xeon system for multimedia data processing

Young-Soo Park; Koo-Rack Park; Jin-Mook Kim; Hwa-Young Jeong

I benchmarking the well-known Fast Fourier Transforms Library at X86 Xeon E5 2690 v3 system. Fourier transform image processing is an important tool that is used to decompose the image into sine and cosine components. If the input image represented by the equation in the spatial domain, output from the Fourier transform represents the image in the fourier or the frequency domain. Each point represents a particular frequency included in the spatial domain image in the Fourier domain image. Fourier transform is used widely for image analysis, image filtering, image compression and image reconstruction as a wide variety of applications. Fourier transform plays a important role in signal processing, image processing and speech recognition. It has been used in a wide range of sectors. For example, this is often a signal processing, is used in digital signal processing applications, such as voice recognition, image processing. The Discrete Fourier transform is a specific kind of Fourier transform. It maps the sequence over time to sequence over frequencies. If it implemented as a discrete Fourier transform, the time complexity is O (N2). It’s actually not a better way to use. Alternatively, the Fast Fourier Transform is possible to easily perform a Discrete Fourier Transform of parallelism with only O (n log n) algorithm. Fast Fourier Transform is widely used in a variety of scientific computing program. If you are using the correct library can improve the performance of the program, without any additional effort. I have a well-known fast Fourier transform library was going to perform a benchmarking on X86 based Intel Xeon E5 2690 systems. In the machine’s current Intel Xeon X86 Linux system. I have installed Intel IPP library, FFTW3 Library (West FFT), Kiss -FFT library and the numutils library on Intel X86 Xeon E5 based systems. The benchmark performed at C, and measuring the performance over a range of a transform size. It benchmarks both real and complex transforms in one dimension.

Collaboration


Dive into the Jin-Mook Kim's collaboration.

Top Co-Authors

Avatar

Jeong-Kyung Moon

Kongju National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Koo-Rack Park

Kongju National University

View shared research outputs
Top Co-Authors

Avatar

Hwang-Rae Kim

Kongju National University

View shared research outputs
Top Co-Authors

Avatar

Young-Suk Chung

Kongju National University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge