JongHyup Lee
Yonsei University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by JongHyup Lee.
IEEE Transactions on Industrial Electronics | 2010
JongHyup Lee; Taekyoung Kwon; JooSeok Song
It is a recent trend to consider wireless sensor networks in harsh industrial environments. With actual deployment of wireless sensor networks, it would be desirable to make a concrete deployment plan regarding connectivities and to place sensors by grouping them according to the planned deployment points, even more in case of targeting multiple objects to be sensed and monitored in harsh environments. The connectedness of groups as well as individual sensors is important specifically for real-time data acquisitions and even more if there are no external communication links among these groups. In this paper, we focus on the connectivity of sensor groups, rather than the individual sensors only, and propose a novel group connectivity model so as to analyze group connectivity and to make a concrete deployment plan of sensor groups with regard to the internal distribution of sensors and group positions. We believe that the proposed model should be useful in planning the deployment of wireless sensor networks in harsh industrial environments where running wires is less practical and also prohibitively expensive.
IEEE Transactions on Wireless Communications | 2009
Taekyoung Kwon; JongHyup Lee; JooSeok Song
A practical pairwise key distribution scheme is necessary for wireless sensor networks since sensor nodes are susceptible to physical capture and constrained in their resources. In this paper, we investigate a simple and practical scheme that achieves higher connectivities and perfect resilience with less resources, even in case of deployment errors.
international conference on universal access in human computer interaction | 2009
Taekyoung Kwon; JongHyup Lee; JooSeok Song
Actual interactions between human users and computers occur at the user interface, which includes both hardware and software. When users attempt to input sensitive information to computers, a kind of shoulder surfing that might use direct observation techniques, such as looking over someones shoulder, to get the information could be a great concern at the user interface. In this paper, we observe privacy-related issues at the user interface and then present an abstract model for privacy-preserving human-computer interactions. In such an abstract model, we also present two prototype methods which could work with traditional input devices.
information security and cryptology | 2015
Dohyun Pak; JongHyup Lee
Constrained IoT devices cannot achieve full coverage of software attestation even though the integrity of software is critical. The limited modification attacks on control flow of software aim at the shadow area uncovered in software attestation processes. In this paper, we propose a light-weight protection system that detects modification by injecting markers to program code.
Archive | 2018
Yu Sang Chang; Do Hyun Pak; Seongmin Jeon; JongHyup Lee
information security and cryptology | 2012
JongHyup Lee
information security and cryptology | 2009
Taekyoung Kwon; JongHyup Lee; JooSeok Song
Archive | 2009
Taekyoung Kwon; JongHyup Lee; JooSeok Song
IADIS AC (1) | 2009
Jin Ho Jung; JongHyup Lee; JooSeok Song
Lecture Notes in Computer Science | 2006
JongHyup Lee; Taekyoung Kwon; JooSeok Song