Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jiyoung Lim is active.

Publication


Featured researches published by Jiyoung Lim.


network-based information systems | 2012

Anomaly Teletraffic Intrusion Detection Systems on Hadoop-Based Platforms: A Survey of Some Problems and Solutions

Hae-Duck Joshua Jeong; WooSeok Hyun; Jiyoung Lim; Ilsun You

Telecommunication networks are getting more important in our social lives because many people want to share their information and ideas. Thanks to the rapid development of the Internet and ubiquitous technologies including mobile devices such as smart phones, mobile phones and tablet PCs, the quality of our lives has been greatly influenced and rapidly changed in recent years. Internet users have exponentially increased as well. Meanwhile, the explosive growth of teletraffic called big data for user services threatens the current networks, and we face menaces from various kinds of intrusive incidents through the Internet. A variety of network attacks on network resources have continuously caused serious damage. Thus, active and advanced technologies for early detecting of anomaly teletraffic on Hadoop-based platforms are required. In this paper, a survey of some problems and technical solutions for anomaly teletraffic intrusion detection systems based on the open-source software platform Hadoop has been investigated and proposed.


Lecture Notes in Computer Science | 2003

A generalized discrete scale-space formulation for 2-D and 3-D signals

Jiyoung Lim; H. Siegfried Stiehl

This paper addresses the issue of a higher dimensional discrete scale-space (DSS) formulation. The continuous linear scale-space theory provides a unique framework for visual front-end processes. In practice, a higher dimensional DSS formulation is necessary since higher dimensional discrete signals must be dealt with. In this paper, first we examine the approximation fidelity of the commonly used sampled Gaussian. Second, we propose a generalized DSS formulation for 2-D and 3-D signals. The DSS theory has been presented at first by Lindeberg. While his 1-D DSS formulation is complete, the formulation as related to the extension to higher dimensions has not been fully derived. Furthermore, we investigate the properties of our derived DSS kernels and present the results of a validation study with respect to both smoothing and differentiation performance.


innovative mobile and internet services in ubiquitous computing | 2013

A Remote Computer Control System Using Speech Recognition Technologies of Mobile Devices

Hae-Duck Joshua Jeong; Sang-Kug Ye; Jiyoung Lim; Ilsun You; WooSeok Hyun; Hee-Kyoung Song

This paper presents a remote control computer system using speech recognition technologies of mobile devices for the blind and physically disabled population. These people experience difficulty and inconvenience using computers through a keyboard and/or mouse. The purpose of this system is to provide a way that the blind and physically disabled population can easily control many functions of a computer via speech. The configuration of the system consists of a mobile device such as a smartphone, a PC server, and a Google server that are connected to each other. Users can command a mobile device to do something via speech such as directly controlling computers, writing emails and documents, calculating numbers, checking the weather forecast, and managing a schedule. They are then immediately executed. The proposed system also provides the blind people with a function via TTS (text to speech) of the Google server if they want to receive contents of the document stored in a computer.


innovative mobile and internet services in ubiquitous computing | 2012

Design and Implementation of Location-Based SNS Smartphone Application for the Disabled Population

Arisu An; Hae-Duck Joshua Jeong; Jiyoung Lim; WooSeok Hyun

The disabled have settled down as smart phone users in this age as users of these phones have exponentially increased in recent years. The theme of this paper is how to create a better world using the information that people want to exchange with each other between the disabled and the general population. On the other hand, the main goal is to provide the information that they need from each other which can be displayed on the map in real-time. We propose a new location-based SNS application for the physically disabled population having three major characteristics of this application to be considered as follows: One uses Social Networking Service (SNS) by constructing a friend matching system such as Face book and Twitter, which are the most widely-used SNS in the world, the general population registers real-time information of a specific location on the map for the physically disabled population using SNS. This information with photos and messages is given and evaluated by users, and this system makes it easier to see that the menu in the GUI was implemented.


innovative mobile and internet services in ubiquitous computing | 2015

Secure Authentication for Structured Smart Grid System

Inshil Doh; Jiyoung Lim; Kijoon Chae

An important application area for M2M (Machine to Machine) or IoT (Internet of Things) technology is smart grid system which plays an important role in electric power transmission, electricity distribution, and demand-driven control for the energy. To make the smart grid system more reliable and stable, security is the major issue to be provided with the main technologies. In this work, we propose an authentication mechanism between the utility system and the smart meters which gather the energy consumption data from electrical devices in layered smart grid system. Our proposal enhances the smart grid system integrity, availability and robustness by providing security with low overhead.


innovative mobile and internet services in ubiquitous computing | 2013

Key Establishment and Management for Secure Cellular Machine-to-Machine Communication

Inshil Doh; Jiyoung Lim; Shi Li; Kijoon Chae

M2M(Machine-to-Machine) communication is considered to be one of the major issues in future network. Especially, M2M will bring various benefits in wireless communications when it is interconnected with cellular network. Considering the characteristics of cellular M2M network, traditional security solutions are not practical to apply because the cellular M2M network is more vulnerable to various attacks. In this work, we consider security aspects for cellular M2M communication and propose a key management. Our proposal can provide reliability and efficiency for secure cellular M2M communication network.


network-based information systems | 2012

An Improved Security Approach Based on Kerberos for M2M Open IPTV System

Inshil Doh; Kijoon Chae; Jiyoung Lim; Min Young Chung

Open IPTV has attracted considerable attention and is expected to bring great changes in the IPTV service area. However, because of its openness and IP network characteristics, security is one of the major issues hindering its commercialization. For IPTV, several security mechanisms for user authentication and content protection have been applied to make the service reliable. These traditional security mechanisms cannot be adopted in the IPTV area, because in the many-to-many environment the security and hence the system performance is influenced by numerous factors. In our work, we propose a mechanism for secure user authentication and key distribution based on Kerberos for open IPTV and for secure M2M three-screen service in home networks. Our proposal provides an efficient authentication process and secure transfer of contents among users, and it further decreases the authentication time compared with the other mechanisms.


network-based information systems | 2013

Secure Aggregation and Attack Detection for Smart Grid System

Inshil Doh; Jiyoung Lim; Kijoon Chae

Smart grid is a very efficient and intelligent system for managing and monitoring the electricity usage and it can be applied in many useful areas. It supports energy producers and consumers efficiently by supporting the estimation and provision of the proper amount of electricity in proper time. However, when the information is altered or forged by the attackers, it could cause the system malfunction. In addition to that, some attacks could waste the system resources on purpose and could lead to disastrous results. In this work, we propose a secure data aggregation mechanism providing verification of the aggregated data and detection of the compromised node to prevent the DoS(Denial of Service) attack based on the homomorphic encryption.


Mathematical and Computer Modelling | 2013

Code updates based on minimal backbone and group key management for secure sensor networks

Inshil Doh; Jiyoung Lim; Kijoon Chae

Abstract Code update in sensor networks is a useful technology to update codes to change the functionality or to correct bugs of the existing code. However, sensor networks are susceptible to various attacks because they are deployed in open and unprotected environments. It is necessary to use effective mechanisms to protect sensor nodes against attacks. In this paper, we propose a secure code update mechanism over the energy-efficient minimum virtual backbone reducing the number of broadcasting packets using RSSI (Received Signal Strength Indicator) values. We also propose a group key establishment and rekeying mechanism which provides authentication among the entities for code update. Our mechanism considers all security requirements such as confidentiality, integrity and authentication to defend the battery exhaustion attack, DoS attacks, the routing attacks, etc. during the code update. Simulation results show that our mechanism significantly reduces the number of transmitted messages, the energy consumption and the computation overhead for the secure code update in comparison to other existing secure code update mechanisms. We also prove that our group key mechanism is efficient and much more secure than compared ones.


soft computing | 2016

Security system architecture for data integrity based on a virtual smart meter overlay in a smart grid system

Jiyoung Lim; Inshil Doh; Kijoon Chae

As an efficient and intelligent system for managing and monitoring electricity usage, the “smart grid” has many useful applications. It supports energy producers and energy consumers efficiently by supporting the estimation and provision of the proper amount of electricity at the proper time. The most serious threat to a smart grid system may be when information is altered or forged by attackers; the system could malfunction and could collapse. In some cases, the attackers could waste system resources on purpose and this could lead to disastrous results. In this paper, we propose security system architecture to provide the secure and reliable smart grid service. It includes a data authentication process to verify the aggregated data and virtual network management to detect a compromised area or node. It detects a false data injection attack and further prevents a denial of service attack efficiently with less overhead for the individual devices comprising the smart grid system.

Collaboration


Dive into the Jiyoung Lim's collaboration.

Top Co-Authors

Avatar

Kijoon Chae

Ewha Womans University

View shared research outputs
Top Co-Authors

Avatar

Inshil Doh

Ewha Womans University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ilsun You

Soonchunhyang University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jisun Kim

Ewha Womans University

View shared research outputs
Top Co-Authors

Avatar

Jungchan Nah

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge