Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jungho Kang is active.

Publication


Featured researches published by Jungho Kang.


Sensors | 2016

A Reliable TTP-Based Infrastructure with Low Sensor Resource Consumption for the Smart Home Multi-Platform

Jungho Kang; Mansik Kim; Jong Hyuk Park

With the ICT technology making great progress in the smart home environment, the ubiquitous environment is rapidly emerging all over the world, but problems are also increasing proportionally to the rapid growth of the smart home market such as multiplatform heterogeneity and new security threats. In addition, the smart home sensors have so low computing resources that they cannot process complicated computation tasks, which is required to create a proper security environment. A service provider also faces overhead in processing data from a rapidly increasing number of sensors. This paper aimed to propose a scheme to build infrastructure in which communication entities can securely authenticate and design security channel with physically unclonable PUFs and the TTP that smart home communication entities can rely on. In addition, we analyze and evaluate the proposed scheme for security and performance and prove that it can build secure channels with low resources. Finally, we expect that the proposed scheme can be helpful for secure communication with low resources in future smart home multiplatforms.


Journal of Internet Technology | 2016

Security Challenges in Recent Internet Threats and Enhanced Security Service Model for Future IT Environments

Mansik Kim; Jeong-Kyu Lee; Jong Hyuk Park; Jungho Kang

Due to the development of ICT ( internet communication technology), people are currently able to access to the Internet and use service at any time with any types of devices. Especially, the global distribution rate of advanced Internet device and technologies as well as Internet utilization has been continuously increasing. However, various types of Internet threats have emerged in proportion with the development of Internet technology. Not only particular targets but also mass unknown targets in Internet infrastructure have been continuously threatened. However, existing Internet security system has not been able to appropriately cope with them that caused devastated damage. In this paper, we analyze the recent Internet security threats and discuss security requirements. In addition, we propose an enhanced security service model for establishing the secure Internet environment to solve aforementioned issues in future ICT.


Symmetry | 2016

Security Scheme Based on Parameter Hiding Technic for Mobile Communication in a Secure Cyber World

Jong Hyuk Park; Hyungjoo Kim; Jungho Kang

Long Term Evolution (LTE) and Long Term Evolution-Advanced (LTE-A) support a better data transmission service than 3G dose and are globally commercialized technologies in a cyber world that is essential for constructing a future mobile environment, since network traffics have exponentially increased as people have started to use more than just one mobile device. However, when User Equipment (UE) is executing initial attach processes to access LTE networks, there is a vulnerability in which identification parameters like International Mobile Subscriber Identity (IMSI) and Radio Network Temporary Identities (RNTI) are transmitted as plain texts. It can threat various services that are commercialized therewith in a cyber world. Therefore, a security scheme is proposed in this paper where identification parameters can be securely transmitted and hidden in four cases where initial attach occurs between UE and Mobility Management Entity (MME). The proposed security scheme not only supports encrypted transmission of identification parameters but also mutual authentication between Evolved Node B (eNB) and MME to make a secure cyber world. Additionally, performance analysis results using an OPNET simulator showed the satisfaction of the average delay rate that is specified in LTE standards.


Archive | 2015

Zero-Knowledge Authentication for Secure Multi-cloud Computing Environments

Hyungjoo Kim; Hyunsoo Chung; Jungho Kang

A multi-cloud computing refers to the environment where services such as resources and software, etc., can be shared and provided through an agreement between two or more cloud computing service providers. A user requires multiple authentications in order to use the cloud service between the shared service providers. However at such time, users are exposed to vulnerabilities such as their authentication information being exposed to service providers whom they did not sign up with or being exposed during the multiple authentications. Therefore in this paper, the zero-knowledge authentication protocol for ensuring anonymity is proposed. The proposed protocol is safe for all know vulnerabilities and can be used as a safe protocol in multi-cloud environment.


Journal of Internet Technology | 2015

Secure HDFS Design Using Group Key Management System

Jungho Kang; Jaesoo Kim

Data is increasing in recent years due to the development of mobile communication technology and the spread of smart devices. These large amounts of data are called 〞Big-Data〞. To process Big-Data, a variety of technologies have emerged. Of those, the most prominent technology is Hadoop. Hadoop introduced Kerberos and Token system for security. Nonetheless, it still has various problems including session key leakage issue, key sharing issue of 〞NameNode〞 and 〞DataNode〞, replay attack of block accessed token, impersonation attack, etc. This study proposed HDFS using group key management system in order to resolve these vulnerabilities while keeping the optimal performance. The proposed system manages the secret key and group key of client and the group key of 〞DataNode〞 by bundling clients and 〞DataNode〞 as a respective logical group. Also, our study proposed client authentication using the proposed system and authority verification and BAT protocol when accessing files.


Journal of Digital Convergence | 2015

Designed OTP Generation Method Using Health Information

Yeun-Su Choo; Jungho Kang; Kyounghun Kim; Jea-Pyo Park; Moon-Seog Jun

Abstract User Authentication in Online service is essential for accurate and safe service. For this user authentication, One Time Password(OTP) is frequently used. To satisfy one-time-use characteristic of OTP, Offset information to generate OTP or final OTP value get generated through OTP generator or security card which could be lost. In this study, OTP generation method that bypasses OTP generator or security card by using health information collected from u-Health care system is proposed. Suggestion is that health information collected through wearable devices get utilized to offset information that are applied in OTP generations. OTP generated using suggested methods showed similar results than current OTP generation methods in the collision resistance test which tests how often it generate same authentication numbers, this implies that new proposed method can be applied to various on-line services. Key Words : OTP, Convergence User Authentication, Health Information, Collision resistance, u-Health


Journal of Digital Convergence | 2017

A Design of Smart Fuzzing System Based on Hybrid Analysis

Mansik Kim; Jungho Kang; Moon-Seog Jun

In accordance with the development of IT industry worldwide, software industry has also grown tremendously, and it is exerting influence on the general society starting from daily life to financial organizations and public institutions. However, various security threats that can inflict serious threat to provided services in proportion to the growing software industry, have also greatly increased. In this thesis, we suggest a smart fuzzing system combined with black box and white box testing that can effectively detect distinguish software vulnerability which take up a large portion of the security incidents in application programs.


Archive | 2016

Drone Classification by Available Control Distances

Mansik Kim; Hyungjoo Kim; Jungho Kang; Jaesoo Kim

A drone industry which started for military purposes is growing and are being spread in the private market as ICT technologies are developing. For example, it includes various industries such as leisure, construction, delivery, military, etc. and there are plenty of pioneer areas for future. However the researches for future drone developments have some challenges because there are no standards for drone developments, so the environment should be provided to develop and design them properly. This paper categorizes various purpose drones into 3 kinds of control distances by features, so it will help future drone development researches.


Journal of Digital Convergence | 2016

A Study on Analysis and Countermeasure of Security threat in NFC

Hyung-Uk Kim; Hyungjoo Kim; Jungho Kang; Moon-Seog Jun

Most recent trend reveals broader state of provision of NFC service as NFC technology was applied on smartphones which has become core communication tools by providing integrated services such as payment, medical, and personal authentication. Moreover, with integration of original service and NFC technology, new service providers now can handle personal information of original service or can handle other personal information with transition of previous service provider to NFC service provider. Considering current state of security industry along with NFC technology and service, we would like to analyze current stage of security threats and plan the counter strategies to create NFC service structure.


Archive | 2015

Personal Information Access Control Scheme for Secure NFC Integrated Payment

Jungho Kang; Kyounghun Kim; Sangkee Suk

NFC integrated payment service generates information such as user consumption-migration information by processing them through big-data technology after collecting personal information including credit card payment information, location information, electronic coupon usage history, etc. and also provides such service as advertising tailored to a specific user based on the pattern information. Since such sensitive personal information as consumption pattern in addition to simple personal information, only those authorized companies should be able to process the information thereof. Nonetheless, the cooperative relationship for sharing personal information among the companies based on TSM just like a mesh has been formed; thus, it is difficult to control access to personal information. Moreover, as for Hadoop that is the most prominent big-data technology, it has an access control function; however, it lacks a method to grant an authority to process personal information. As a result, it is not able to grant an authority to process information in accordance with the companies to provide simple services using the pattern information and the companies to process personal information for generating pattern information. Thus, this paper proposed a technique for key generation and distribution and a secure communication protocol in order to ensure that access control of personal information and personal information processing for each authority will be securely conducted in NFC integrated payment environment.

Collaboration


Dive into the Jungho Kang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jong Hyuk Park

Seoul National University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jaeseung Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge