Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kyung Sup Kwak is active.

Publication


Featured researches published by Kyung Sup Kwak.


Journal of Medical Systems | 2012

A Comprehensive Survey of Wireless Body Area Networks

Sana Ullah; Henry Higgins; Bart Braem; Benoît Latré; Chris Blondia; Ingrid Moerman; Shahnaz Saleem; Ziaur Rahman; Kyung Sup Kwak

Recent advances in microelectronics and integrated circuits, system-on-chip design, wireless communication and intelligent low-power sensors have allowed the realization of a Wireless Body Area Network (WBAN). A WBAN is a collection of low-power, miniaturized, invasive/non-invasive lightweight wireless sensor nodes that monitor the human body functions and the surrounding environment. In addition, it supports a number of innovative and interesting applications such as ubiquitous healthcare, entertainment, interactive gaming, and military applications. In this paper, the fundamental mechanisms of WBAN including architecture and topology, wireless implant communication, low-power Medium Access Control (MAC) and routing protocols are reviewed. A comprehensive study of the proposed technologies for WBAN at Physical (PHY), MAC, and Network layers is presented and many useful solutions are discussed for each layer. Finally, numerous WBAN applications are highlighted.


IEEE Access | 2015

The Internet of Things for Health Care: A Comprehensive Survey

S. M. Riazul Islam; Daehan Kwak; Md. Humaun Kabir; Mahmud Hossain; Kyung Sup Kwak

The Internet of Things (IoT) makes smart objects the ultimate building blocks in the development of cyber-physical smart pervasive frameworks. The IoT has a variety of application domains, including health care. The IoT revolution is redesigning modern health care with promising technological, economic, and social prospects. This paper surveys advances in IoT-based health care technologies and reviews the state-of-the-art network architectures/platforms, applications, and industrial trends in IoT-based health care solutions. In addition, this paper analyzes distinct IoT security and privacy features, including security requirements, threat models, and attack taxonomies from the health care perspective. Further, this paper proposes an intelligent collaborative security model to minimize security risk; discusses how different innovations such as big data, ambient intelligence, and wearables can be leveraged in a health care context; addresses various IoT and eHealth policies and regulations across the world to determine how they can facilitate economies and societies in terms of sustainable development; and provides some avenues for future research on IoT-based health care based on a set of open issues and challenges.


Journal of Medical Systems | 2012

Security and Privacy Issues in Wireless Sensor Networks for Healthcare Applications

Moshaddique Al Ameen; Jingwei Liu; Kyung Sup Kwak

The use of wireless sensor networks (WSN) in healthcare applications is growing in a fast pace. Numerous applications such as heart rate monitor, blood pressure monitor and endoscopic capsule are already in use. To address the growing use of sensor technology in this area, a new field known as wireless body area networks (WBAN or simply BAN) has emerged. As most devices and their applications are wireless in nature, security and privacy concerns are among major areas of concern. Due to direct involvement of humans also increases the sensitivity. Whether the data gathered from patients or individuals are obtained with the consent of the person or without it due to the need by the system, misuse or privacy concerns may restrict people from taking advantage of the full benefits from the system. People may not see these devices safe for daily use. There may also possibility of serious social unrest due to the fear that such devices may be used for monitoring and tracking individuals by government agencies or other private organizations. In this paper we discuss these issues and analyze in detail the problems and their possible measures.


applied sciences on biomedical and communication technologies | 2010

An overview of IEEE 802.15.6 standard

Kyung Sup Kwak; Sana Ullah; Niamat Ullah

Wireless Body Area Networks (WBAN) has emerged as a key technology to provide real-time health monitoring of a patient and to diagnose and treat many life threatening diseases. WBAN operates in close vicinity to, on, or inside a human body and supports a variety of medical and non-medical applications. IEEE 802 has established a Task Group called IEEE 802.15.6 for the standardization of WBAN. The purpose of the group is to establish a communication standard optimized for low-power in-body/on-body nodes to serve a variety of medical and non-medical applications. This paper explains the most important features of the new IEEE 802.15.6 standard. The standard defines a Medium Access Control (MAC) layer supporting several Physical (PHY) layers. We briefly overview the PHY and MAC layers specifications together with the bandwidth efficiency of IEEE 802.15.6 standard. We also discuss the security paradigm of the standard.


Sensors | 2009

A Study of MAC Protocols for WBANs

Sana Ullah; Bin Shen; S. M. Riazul Islam; Pervez Khan; Shahnaz Saleem; Kyung Sup Kwak

The seamless integration of low-power, miniaturised, invasive/non-invasive lightweight sensor nodes have contributed to the development of a proactive and unobtrusive Wireless Body Area Network (WBAN). A WBAN provides long-term health monitoring of a patient without any constraint on his/her normal dailylife activities. This monitoring requires the low-power operation of invasive/non-invasive sensor nodes. In other words, a power-efficient Medium Access Control (MAC) protocol is required to satisfy the stringent WBAN requirements, including low-power consumption. In this paper, we first outline the WBAN requirements that are important for the design of a low-power MAC protocol. Then we study low-power MAC protocols proposed/investigated for a WBAN with emphasis on their strengths and weaknesses. We also review different power-efficient mechanisms for a WBAN. In addition, useful suggestions are given to help the MAC designers to develop a low-power MAC protocol that will satisfy the stringent requirements.


Int'l J. of Communications, Network and System Sciences | 2009

A Review of Wireless Body Area Networks for Medical Applications

Sana Ullah; Pervez Khan; Niamat Ullah; Shahnaz Saleem; Henry Higgins; Kyung Sup Kwak

Recent advances in Micro-Electro-Mechanical Systems (MEMS) technology, integrated circuits, and wireless communication have allowed the realization of Wireless Body Area Networks (WBANs). WBANs promise unobtrusive ambulatory health monitoring for a long period of time, and provide real-time updates of the patient’s status to the physician. They are widely used for ubiquitous healthcare, entertainment, and military applications. This paper reviews the key aspects of WBANs for numerous applications. We present a WBAN infrastructure that provides solutions to on-demand, emergency, and normal traffic. We further discuss in-body antenna design and low-power MAC protocol for a WBAN. In addition, we briefly outline some of the WBAN applications with examples. Our discussion realizes a need for new power-efficient solu-tions towards in-body and on-body sensor networks.


Journal of Medical Systems | 2012

An Ultra Low-power and Traffic-adaptive Medium Access Control Protocol for Wireless Body Area Network

Sana Ullah; Kyung Sup Kwak

Wireless Body Area Network (WBAN) consists of low-power, miniaturized, and autonomous wireless sensor nodes that enable physicians to remotely monitor vital signs of patients and provide real-time feedback with medical diagnosis and consultations. It is the most reliable and cheaper way to take care of patients suffering from chronic diseases such as asthma, diabetes and cardiovascular diseases. Some of the most important attributes of WBAN is low-power consumption and delay. This can be achieved by introducing flexible duty cycling techniques on the energy constraint sensor nodes. Stated otherwise, low duty cycle nodes should not receive frequent synchronization and control packets if they have no data to send/receive. In this paper, we introduce a Traffic-adaptive MAC protocol (TaMAC) by taking into account the traffic information of the sensor nodes. The protocol dynamically adjusts the duty cycle of the sensor nodes according to their traffic-patterns, thus solving the idle listening and overhearing problems. The traffic-patterns of all sensor nodes are organized and maintained by the coordinator. The TaMAC protocol is supported by a wakeup radio that is used to accommodate emergency and on-demand events in a reliable manner. The wakeup radio uses a separate control channel along with the data channel and therefore it has considerably low power consumption requirements. Analytical expressions are derived to analyze and compare the performance of the TaMAC protocol with the well-known beacon-enabled IEEE 802.15.4 MAC, WiseMAC, and SMAC protocols. The analytical derivations are further validated by simulation results. It is shown that the TaMAC protocol outperforms all other protocols in terms of power consumption and delay.


IEEE Transactions on Communications | 2001

A modified constrained constant modulus approach to blind adaptive multiuser detection

Changjiang Xu; Guangzeng Feng; Kyung Sup Kwak

An alternative blind adaptive multiuser detection is investigated based on modified constrained constant modulus (CM) criterion. It is shown that the performance of a CM-based receiver is limited by the received power of the desired user. In this paper, we show that the limitation can be avoided using the noncanonical constraint CM criterion and that in the presence of channel noise the modified CM criterion function is strictly convex by properly selecting some constant. With analyzing the extrema of the cost function, we point out how to select the constant. Moreover, a simple stochastic gradient algorithm for implementing our scheme is presented, and the convergence properties of the algorithm are analyzed. Simulation examples are given to demonstrate the performance of the proposed scheme.


IEEE Communications Surveys and Tutorials | 2017

Power-Domain Non-Orthogonal Multiple Access (NOMA) in 5G Systems: Potentials and Challenges

S. M. Riazul Islam; Nurilla Avazov; Octavia A. Dobre; Kyung Sup Kwak

Non-orthogonal multiple access (NOMA) is one of the promising radio access techniques for performance enhancement in next-generation cellular communications. Compared to orthogonal frequency division multiple access, which is a well-known high-capacity orthogonal multiple access technique, NOMA offers a set of desirable benefits, including greater spectrum efficiency. There are different types of NOMA techniques, including power-domain and code-domain. This paper primarily focuses on power-domain NOMA that utilizes superposition coding at the transmitter and successive interference cancellation at the receiver. Various researchers have demonstrated that NOMA can be used effectively to meet both network-level and user-experienced data rate requirements of fifth-generation (5G) technologies. From that perspective, this paper comprehensively surveys the recent progress of NOMA in 5G systems, reviewing the state-of-the-art capacity analysis, power allocation strategies, user fairness, and user-pairing schemes in NOMA. In addition, this paper discusses how NOMA performs when it is integrated with various proven wireless communications techniques, such as cooperative communications, multiple-input multiple-output, beamforming, space–time coding, and network coding among others. Furthermore, this paper discusses several important issues on NOMA implementation and provides some avenues for future research.


IEEE Transactions on Parallel and Distributed Systems | 2014

Certificateless Remote Anonymous Authentication Schemes for WirelessBody Area Networks

Jingwei Liu; Zonghua Zhang; Xiaofeng Chen; Kyung Sup Kwak

Wireless body area network (WBAN) has been recognized as one of the promising wireless sensor technologies for improving healthcare service, thanks to its capability of seamlessly and continuously exchanging medical information in real time. However, the lack of a clear in-depth defense line in such a new networking paradigm would make its potential users worry about the leakage of their private information, especially to those unauthenticated or even malicious adversaries. In this paper, we present a pair of efficient and light-weight authentication protocols to enable remote WBAN users to anonymously enjoy healthcare service. In particular, our authentication protocols are rooted with a novel certificateless signature (CLS) scheme, which is computational, efficient, and provably secure against existential forgery on adaptively chosen message attack in the random oracle model. Also, our designs ensure that application or service providers have no privilege to disclose the real identities of users. Even the network manager, which serves as private key generator in the authentication protocols, is prevented from impersonating legitimate users. The performance of our designs is evaluated through both theoretic analysis and experimental simulations, and the comparative studies demonstrate that they outperform the existing schemes in terms of better trade-off between desirable security properties and computational overhead, nicely meeting the needs of WBANs.

Collaboration


Dive into the Kyung Sup Kwak's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sana Ullah

Oporto Polytechnic Institute

View shared research outputs
Top Co-Authors

Avatar

Shaoyi Xu

Beijing Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Zheng Zhou

Beijing University of Posts and Telecommunications

View shared research outputs
Researchain Logo
Decentralizing Knowledge