Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kangseok Kim is active.

Publication


Featured researches published by Kangseok Kim.


Peer-to-peer Networking and Applications | 2015

An efficient secure authentication scheme with user anonymity for roaming user in ubiquitous networks

Soobok Shin; Hongjin Yeh; Kangseok Kim

Recently the advances in a variety of hardware/software technologies and wireless networking have brought explosive growth of mobile network/device involved services and it raised a number of security concerns such as user authentication/authorization, user information privacy and secure data transmission between service providers and consumers using mobile devices through mobile network. Therefore, it is essential that legitimate user authentication as well as user anonymity for privacy is ensured between those entities (service providers and consumers). As compared to stationary devices, due to high network latency and low computing performance of mobile network/devices, the authentication scheme in wireless and mobile networks requires a mechanism to achieve low communication and computation costs. Thus, in this paper we propose a lightweight authentication scheme. Also, the scheme ensures user’s anonymity and provides secure password update, session key agreement, and mutual authentication between entities to resist to possible attacks in ubiquitous networks. And we present security and performance analysis of our proposed scheme, and experimental results to show the efficiency of the scheme as well.


International Journal of Advanced Robotic Systems | 2012

A Remote User Authentication Scheme with Anonymity for Mobile Devices

Soobok Shin; Kangseok Kim; Ki-Hyung Kim; Hongjin Yeh

With the rapid growth of information technologies, mobile devices have been utilized in a variety of services such as e-commerce. When a remote server provides such e-commerce services to a user, it must verify the legitimacy of the user over an insecure communication channel. Therefore, remote user authentication has been widely deployed to verify the legitimacy of remote user login requests using mobile devices like smart cards. In this paper we propose a smart card-based authentication scheme that provides both user anonymity and mutual authentication between a remote server and a user. The proposed authentication scheme is a simple and efficient system applicable to the limited resource and low computing performance of the smart card. The proposed scheme provides not only resilience to potential attacks in the smart card-based authentication scheme, but also secure authentication functions. A smart card performs a simple one-way hash function, the operations of exclusive-or and concatenation in the authentication phase of the proposed scheme. The proposed scheme also provides user anonymity using a dynamic identity and key agreement, and secure password change.


international conference on information and communication technology convergence | 2015

An OAuth based authentication mechanism for IoT networks

Shamini Emerson; Young-Kyu Choi; DongYeop Hwang; Kangseok Kim; Ki-Hyung Kim

Internet of things (IoT) has rapidly become one of the most familiar and perhaps most discussed topic on the research field. The attention for the Internet of Things is mainly due to the new connected products intended to bring greater efficiencies and simplicity to life. Variety of IoT applications lead to equally wide variety of security issues. In this paper, we propose an approach to provide secure authentication mechanism for an IoT network which consists of various kinds of constrained devices using a security manager. This proposed approach protects IoT network from unauthenticated users with security manager using OAuth 2.0 protocol. Moreover, this approach provides flexibility in managing IoT networks. The security manager provides authentication service for multiple IoT networks, which can also help to reduce the cost overhead to maintain secure database in IoT networks.


International Journal of Advanced Robotic Systems | 2012

Personalized Mobile Information Retrieval System

Okkyung Choi; Kangseok Kim; Duksang Wang; Hongjin Yeh; Manpyo Hong

Building a global Network Relations with the internet has made huge changes in personal information system and even comments left on a webpage of SNS(Social Network Services) are appreciated as important elements that would provide valuable information for someone. Social Network is a relation between individuals or groups, represented in a graph model, which converts the concept of psychological and social relations into a logical structure by using node and link. But, most of the current personalized systems on the basis of Social Network are built and constructed mainly in the PC environment, and the systems are neither designed nor implemented in mobile environment. Hence, the objective of this study is to propose methods of providing Personalized Mobile Information Retrieval System using NFC (Near Field Communication) Smartphone, which will be then used for Smartphone users. Besides, this study aims to verify its efficiency through a comparative analysis of existing studies.


Sensors | 2017

An Algorithm for Timely Transmission of Solicitation Messages in RPL for Energy-Efficient Node Mobility

Jihong Park; Ki-Hyung Kim; Kangseok Kim

The IPv6 Routing Protocol for Low Power and Lossy Networks (RPL) was proposed for various applications of IPv6 low power wireless networks. While RPL supports various routing metrics and is designed to be suitable for wireless sensor network environments, it does not consider the mobility of nodes. Therefore, there is a need for a method that is energy efficient and that provides stable and reliable data transmission by considering the mobility of nodes in RPL networks. This paper proposes an algorithm to support node mobility in RPL in an energy-efficient manner and describes its operating principle based on different scenarios. The proposed algorithm supports the mobility of nodes by dynamically adjusting the transmission interval of the messages that request the route based on the speed and direction of the motion of mobile nodes, as well as the costs between neighboring nodes. The performance of the proposed algorithm and previous algorithms for supporting node mobility were examined experimentally. From the experiment, it was observed that the proposed algorithm requires fewer messages per unit time for selecting a new parent node following the movement of a mobile node. Since fewer messages are used to select a parent node, the energy consumption is also less than that of previous algorithms.


international conference on information networking | 2012

Design and implementation of web crawler based on dynamic web collection cycle

Kangseok Kim; Kyoung-Ran Kim; Kyung-Hee Lee; T. K. Kim; Wan-Sup Cho

The amount of web information is increasing rapidly with advanced wireless networks and emergence of diverse smart devices like i-Phone, i-Pad and so on. The information is continuously being produced and updated in anywhere and anytime by means of easy web platforms, and social networks. Now, it is becoming a hot issue how frequently updated web data has to be refreshed in data integration and retrieval domain. In this paper, we propose dynamic web-data crawling methods, which include sensitive checking of web site changes, and dynamic retrieving of web pages from target web sites. Furthermore, we implemented a java-based web crawling application and compared performance between conventional static approaches and our proposed dynamic ones. Our experiment results showed 59% performance benefits compared to static crawling method.


Peer-to-peer Networking and Applications | 2014

An effective authentication mechanism for ubiquitous collaboration in heterogeneous computing environment

Soobok Shin; Taeshik Shon; Hongjin Yeh; Kangseok Kim

With the advent of new generation of mobile access devices such as smartphone and tablet PC, there is coming a need for ubiquitous collaboration which allows people to access information systems with their disparate access devices and to communicate with others in anytime and in anywhere. As the number of collaborators with a large number of disparate access devices increases in ubiquitous collaboration environment, the difficulties for protecting secured resources from unauthorized users as well as unsecured access devices will increase since the resources can be compromised by inadequately secured human and devices. Therfore, authentication mechanism for access of legitimate participants is essential in ubiquitous collaboration environment. In this paper we present an efficient authentication mechanism in ubiquitous collaboration environment. We show that proposed scheme is secure through security analysis and is efficient through the experimental results obtained from the practical evaluation of the scheme in ubiquitous collaboration environment.


Peer-to-peer Networking and Applications | 2015

An approach to mitigate DoS attack based on routing misbehavior in wireless ad hoc networks

Won-Il Kim; Kangseok Kim; Sangyoon Oh; Dong-kyoo Kim

The routing misbehavior is one of the most serious threats to wireless ad hoc networks where nodes are not forwarding messages correctly. Once the attack has been launched, nodes in the network are not able to send messages anymore. Thus it could be a kind of DoS (denial of service) attack. So far, in order to detect the attack, most researches employ a watchdog method although it is not efficient and has a high false positive ratio. In this paper, we propose a novel approach to detect the attacks based on routing misbehavior. It can detect attacks in a more effective way as well as solve problems in existing watchdog. In the proposed method a node in the network cooperates with its neighbor nodes to collect statistics on packets. According to the statistical information, the method determines each nodes misbehavior. The simulation results shows that the proposed method is practical and effective to apply to real domain.


Multimedia Tools and Applications | 2015

Hierarchical structured data logging system for effective lifelog management in ubiquitous environment

Minkyung Kim; Dong-Wook Lee; Kangseok Kim; Jai-Hoon Kim

The researches for collecting personal daily behaviors and providing lifelog services with them have been recently increasing. Recent advances in mobile devices and sensor technologies have motivated to collect a huge amount of personal lifelog data in real time. With the rapid growth of the need for the research, there is a coming need for the effective lifelog management system which collects time-series big lifelog data sent from sensing devices and extracts major activities through processing them. For the effective lifelog management, the lifelog data can be processed in separated computing resources depending on the size and level of data. In this paper, we propose hierarchical structured data logging to support lifelog based personal services and to reduce the processing complexity and storage cost. First, we present the architecture of personal lifelog management system. With the system we present hierarchical lifelog data logging to optimally utilize computing and storage resources. Then we describe cost analysis and performance comparison for demonstrating the efficacy of our proposed system. Finally, as an initial step for experiments in our research, we describe experimental results of recognizing physical activities and extracting lifelog data which indicate major activities from them.


International Journal of Computer Mathematics | 2013

Two-factor authentication system based on extended OTP mechanism

Yunlim Ku; Okkyung Choi; Kangseok Kim; Taeshik Shon; Manpyo Hong; Hongjin Yeh; Jai-Hoon Kim

The recent increase in smartphone supply drives more users to utilize mobile financial services and it magnifies the importance of mobile security solutions. But it is not easy to defend cyber-attacks against financial services because the attacks get more diverse every year. The recent solution, OTP (one time password), is the most commonly used financial security measure to defend session attacks, but the downside is that it is hard to implement differentiated OTP creation mechanism to it. This research intends to solve the problem by suggesting Two-Factor authentication mechanism that utilizes graphical OTP. It is an extension of OTP mechanism which implements the graphical one time password to mobile financial security to reinforce mobiles way of authenticating with only ID and Password or digital certificate from banks; and it will defend against more diverse mobile hackings.

Collaboration


Dive into the Kangseok Kim's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge