Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jung-Sik Cho is active.

Publication


Featured researches published by Jung-Sik Cho.


Computer Communications | 2011

Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value

Jung-Sik Cho; Sang-Soo Yeo; Sung Kwon Kim

Radio Frequency IDentification (RFID ) system is a contactless automatic identification system using small, low-cost RFID tags. It enables recognition of the tag information via radio frequency communication, by attaching an RFID tag to an animate or inanimate object. Since an RFID system has the advantage of simultaneously recognizing massive amounts of information, it is expected to replace the bar-code system. The most important problem with an RFID system is that an adversary can access the tag information, which gives rise to privacy and forgery problems. This paper presents a hash-based mutual authentication protocol as a solution. The proposed protocol is designed to send a random number generated by a tag to a back-end server without disclosure. Moreover it substitutes a random number with a secret value, which is employed in a response message. The properties of the proposed protocol enable constant creation of distinct response messages without interferences from intended or meaningless requests generated by an adversary, while the secret value is not directly transmitted. Our proposed protocol make is difficult for an attacker to launch successful brute-force attacks against our approach.


Computers & Mathematics With Applications | 2015

Consideration on the brute-force attack cost and retrieval cost

Jung-Sik Cho; Young-Sik Jeong; Sang Oh Park

A radio-frequency identification (RFID) system is a promising automatic identification technology that uses communication via radio waves to identify and track moving objects. RFID systems are expected to replace bar-code systems in object identification fields in the future, but various security problems are obstructing their diffusion. The most important problem of RFID system is that an attacker can access the tag information, which raises privacy infringement and forgery problems. This paper proposes a hash-based RFID tag mutual authentication protocol to solve these security problems of RFID systems. The proposed protocol is designed to demand high cost of acquiring the tag information for attackers.


international conference on advanced communication technology | 2008

RFID Tag Anti-Collision Protocol: Query Tree with Reversed IDs

Jung-Sik Cho; Jea-Dong Shin; Sung Kwon Kim

RFID system is a contactless automatic identification system using small and low-cost RFID tag. It allows to recognize the information of tag via radio frequency attaching RFID tag to an object such as a material object, human or animal. Since RFID system has an advantage to recognize massive information simultaneously, it will be able to replace the bar-code system. For this RFID system to be widely spread, the problem of multiple tag identification, which a reader identifies a multiple number of tags in a very short time, has to be solved. So far, several anti- collision algorithms are developed. We present an RFID tag anti-collision protocol, called the query tree protocol with reversed IDs (QTR protocol). This protocol works by reversing the IDs of the tags and then applying the query tree (QT) protocol. And we present the performances of the QTR protocol by simulation. QTR protocol outperforms QT protocol if the tag IDs are consecutive integers.


International Journal of Communication Systems | 2013

Performance improvement of hybrid tag anti‐collision protocol for radio frequency identification systems

Soo-Cheol Kim; Jung-Sik Cho; Sung Kwon Kim

SUMMARY Radio frequency identification (RFID), a new technology for the contactless recognition of objects, is considered an ideal solution to replace barcode systems. To make RFID technology widely applicable, it is important to resolve the ‘multiple tag identification problems’, that is, the problem of indicating tag collisions occurring when multiple RFID tags are simultaneously present in a readers field. The proposed anti-collision algorithm in this paper consists of two separate phases: distribution and recognition. The algorithm distributes tags to be read in such a way that tag collisions are reduced. In the distribution phase, the conventional ALOHA algorithm is used with a newly added command. When there are several occurrences of collision or no-response in a round, a new round is initiated by adjusting the frame size on the basis of the estimated number of tags. ALOHA-based algorithms have the weakness of not being able to guarantee a 100% tag identification rate. Hence, the proposed algorithm uses a tree-based algorithm in the recognition phase in order to eliminate this problem. In addition, the reversed ID approach is employed to ensure efficient tag identification. The simulation results show that the proposed algorithm takes less tag identification time than the conventional algorithms, thereby increasing RFID system efficiency. Copyright


international symposium on parallel and distributed processing and applications | 2011

Hash-Based RFID Tag Mutual Authentication Scheme with Retrieval Efficiency

Jung-Sik Cho; Soo-Cheol Kim; Sung Kwon Kim

RFID(Radio Frequency Identification) system is apromising automatic identification technology that usecommunication via radio waves to identify and track movingobjects. RFID systems, however, are susceptible to a variety ofsecurity problems and fundamental solutions to RFID securityvulnerabilities have not yet been proposed. This paperproposes an RFID tag mutual authentication scheme thatresists security threats posed by inherent characteristics oflow-cost RFID systems. The proposed scheme utilize themodulo operation to improve the efficiency of tag retrieval inthe back-end server and employs the hash function to provideenhanced security.


international conference on future generation communication and networking | 2007

An Analysis of RFID Tag Authentication Protocols Using Secret Value

Jung-Sik Cho; Sang-Soo Yeo; Sung Kwon Kim

RFID (Radio Frequency Identification) system is contactless automatic identification system used by small and low-cost RFID tag. An RFID tag can be stuck on or incorporated into a product, animal, or person and identify tag information by using radio frequency. RFID system will be able to replace barcode system for many merits. But the most important problem of RFID system is that unauthorized readers can access to tag information, which should be possible to produce privacy problem. Presently many researches about RFID tag authentication for solving privacy problem are going on, but these researches have many difficulties for limited hardware resource. In this paper, we analyzed RFID tag authentication protocols using secret value of many proposed. And we also dealt with many problems in the protocols and propose the future research for problem solving.


2011 IEEE Ninth International Symposium on Parallel and Distributed Processing with Applications Workshops | 2011

RFID System Security Analysis, Response Strategies and Research Directions

Jung-Sik Cho; Soo-Cheol Kim; Sang-Soo Yeo

Radio Frequency Identification(RFID) system is a contactless automatic identification system using small, low-cost RFID tags. It enables recognition of the tag information via radio frequency communication, by attaching an RFID tag to an animate or inanimate object. Therefore, RFID system expected widely used in the object recognition and u-healthcare. The most important problem with an RFID system is that an adversary can access the tag information, which gives rise to privacy violation and forgery. In this respect, this paper defines the causes of the security threats occurring in RFID system and defines strategies to respond to the threats and related requirements. We review and analyze existing researches in order to present problems and propose research directions.


Archive | 2011

Collaborative Filtering Recommender System Based on Social Network

Soo-Cheol Kim; Jung-Wan Ko; Jung-Sik Cho; Sung Kwon Kim

In recent years, the use of social network services is constantly increasing. A social network service (SNS) is an individual-centered online service that provides means for users to share information and interact over the Internet. In a SNS, recommender systems supporting filtering of substantial quantities of data are essential. Collaborative filtering (CF) used in recommender systems produces predictions about the interests of a user by collecting preferences or taste information from many users. The disadvantage with the CF approach is that it produces recommendations relying on the opinions of a larger community (i.e., recommendations are determined based on what a much larger community thinks of an item). To address this problem, this article exploits social relations between people in a social network. That is, the recommender system proposed in this article takes into account social relations between users in performing collaborative filtering. The performance of the proposed recommender system was evaluated using the mean absolute error.


Archive | 2012

High Attack Cost: Hash Based RFID Tag Mutual Authentication Protocol

Jung-Sik Cho; James J. Park

Radio Frequency Identification (RFID) systems are expected to replace barcode systems in object identification fields in the future, but various security problems are obstructing their diffusion. This paper proposes hash-based RFID tag mutual authentication protocol to solve these security problems of RFID systems. The proposed protocol is designed to demand high cost of acquiring the tag information from attackers.


Archive | 2011

Considerations on the Security and Efficiency of RFID Systems

Jung-Sik Cho; Soo-Cheol Kim; Sang-Soo Yeo; Sung Kwon Kim

The RFID system is a contactless automatic identification system using small, low-cost RFID tag. The RFID system can be applied in various fields. For the widespread use of RFID systems, security threats such as user privacy violation and location privacy violation must be addressed. As the major advantage of RFID systems is increased efficiency, RFID security schemes should be designed to prevent security threats while maintaining the efficiency of the RFID systems. This paper identifies concerns regarding RFID security and efficiency that must be considered in building an RFID security scheme.

Collaboration


Dive into the Jung-Sik Cho's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

James J. Park

Seoul National University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge