Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Se-Jin Oh is active.

Publication


Featured researches published by Se-Jin Oh.


The Journal of Korean Institute of Communications and Information Sciences | 2011

An RFID Mutual Authentication Protocol Using One-Time Random Number

Se-Jin Oh; Kyung-Ho Chung; Tae-Jin Yun; Kwang-Seon Abn

The RFID(Radio-Frequency IDentification) systems have many security problem such as eavesdropping, a replay attack, location tracking and DoS(Denial of Service) attacks. Because RFID systems use radio-frequency. So research are being made to solve the problem of RFID systems, one of which is AES algorithm. This paper presents an authentication protocol using AES and one-time random number to secure other attacks like eavesdropping, a replay attack, location tracking, In addtion, RSMAP uses OTP(One-Time Pad) in order to safely transmit.


ieee international conference on dependable, autonomic and secure computing | 2009

A Lightweight RFID Authentication Protocol Using Step by Step Symmetric Key Change

Kyoungyoul Kim; Kyung-Ho Chung; Juseok Shin; Hyunwoo Kang; Se-Jin Oh; Chunho Han; Kwang-Seon Ahn

The RFID system has the risk of location tracking and user privacy. Even the cryptograph access method using hash function and re-encryption is difficult to it applies because there is a limit of computing and storage capacity of Tag. In this paper, the AES is used for the lightweight authentication, and the step by step procedure could change the key value three times. This could prevent the key exposure. The symmetric keys of the tag and server are successively changed by the random number generated by tag, reader and server. As a result, the output of the tag and reader always changes. These key changes could make it possible to prevent eavesdropping, replay attack, location tracking.


The Journal of Korean Institute of Communications and Information Sciences | 2012

Improved An RFID Mutual Authentication Protocol Based on Hash Function

Juseok Shin; Se-Jin Oh; Cheol-Ho Jeong; Kyung-Ho Chung; Kwang-Seon Ahn

In 2010, Jeon-Kim proposed HMAP(Hash-based Mutual Authentication Protocol for RFID Environment) to resolve a variety of problem related to security using Mutual authentication scheme, the hash function and secret key is used to update in RFID system. Jeon-Kim proved RMAP was safe for a variety of attacks including eavesdropping attacks through safety analysis. However, unlike the claims of the proposed protocol is vulnerable to next session of the secret key exposure due to eavesdropping. In this paper, we analyze the problem of RMAP and proves it through security analysis. And we also propose improved an RFID Mutual Authentication Protocol based on Hash Function to solve problems of HMAP.


international conference on ubiquitous and future networks | 2017

Real-time lane detection and tracking system using simple filter and Kalman filter

Deok-Kwon Lee; Ju-Seok Shin; Je-Han Jung; Sang-Jun Park; Se-Jin Oh; In-Soo Lee

In this paper, we propose a real-time lane detection and tracking algorithm using a simple filter and Kalman filter to develop a Lane Departure Warning System(LDWS) that can be implemented in an embedded system. Our LDWS was realized on the I.MX6Q board, mounted on a test vehicle, and traveled about 1,000km to derive the experimental results. Experimental results show that our LDWS operates at 97% detection rate in the day time and 95% in the night time. The average processing time of the our LDWS is about 15frame per seconds.


international conference on connected vehicles and expo | 2012

A Non-Volatile Memory Management Scheme for Automotive Electronic Control Units

Juseok Shin; Jeongho Son; Youngback Kim; Se-Jin Oh; Jaekang Lee; Yonghwan Kim; Kwang-Seon Ahn

Recently, the number of automotive electrical and electronic system has been increased due to growth of the requirements for safety and convenience for drivers and passengers. In most cases, the data for either user or system to be used in runtime should be stored on internal or external nonvolatile memory. However, the non-volatile memory has a constraint with write limitation. The limit causes fatal accidents or unexpected results. In this paper, we proposed a management algorithm for using none-volatile memory to prolong the writing access times. Our proposal uses an algorithm which swaps a frequently modified block for a least modified block. In the resorting to our experimental results, the proposed scheme can extend the lifetime of non-volatile memory about 1.78 to 2.56 times.


international conference on ubiquitous and future networks | 2017

Real-time vehicle detection using deep learning scheme on embedded system

Ju-Seok Shin; Ung-Tae Kim; Deok-Kwon Lee; Sang-Jun Park; Se-Jin Oh; Tae-Jin Yun

In this paper, we proposed a real-time vehicle detection using deep learning scheme to reduce false-positive rate. In addition, we implemented our algorithm in an embedded system to confirm the real time. Experimental results show that the precision rate is increased by applying the model generated through deep learning to the vehicle validation phase. The average processing time of our vehicle detection modules is about 15frame per seconds.


The Journal of Korean Institute of Communications and Information Sciences B | 2012

RFID Mutual Authentication Protocol Using Nonfixed Symmetric Key Based on Shift Computation and Random Number

Jaekang Lee; Se-Jin Oh; Kyung-Ho Chung; Changhee Lee; Kwang-Seon Ahn

RFID system is a technique to obtain information of tag using radio frequency. Specificity of RFID systems using radio frequency has many problems that is eavesdropping, location tracking, spoofing attack, replay attack, denial of service attack. So, RFID protocol should be used cryptographic methods and mutual authentication for security and privacy. In this paper, we explain the problem of past protocol and propose the nonfixed symmetric key-based RFID mutual authentication protocol using shift computation and random number. Proposed protocol is secure from various attacks. Because it use shift operation and non-fixed symmetric key.


The Journal of Korean Institute of Communications and Information Sciences | 2012

Improved a Mutual Authentication Protocol in RFID based on Hash Function and CRC Code

Se-Jin Oh; Taejin Yun; Changhee Lee; Jaekang Lee; Kyung-Ho Chung; Kwang-Seon Ahn

In 2011, Woosik Bae proposed a NLMAP(New Low-cost Mutual Authentication Protocol) in RFID based on hash function. They argued that minimize computation such as random number generation. In addition, NLMAP is safe against replay attack, spoofing attack, traffic analysis and eavesdropping attack due to using mutual authentication. So, when applied to RFID system has advantage such as providing a high level of security at a lower manufacturing cost. However, unlike their argue, attacker can obtain Tag`s hash computed unique identification information. This paper proves possible the location tracking and spoofing attack using H(IDt) by attacker. In addition, we propose the improved a mutual authentication protocol in RFID based on hash function and CRC code. Also, our protocol is secure against various attacks and suitable for efficient RFID systems better than NLMAP.


The Journal of Korean Institute of Communications and Information Sciences | 2013

Improved Authentication Protocol for Privacy Protection in RFID Systems

Se-Jin Oh; Changhee Lee; Taejin Yun; Kyung-Ho Chung; Kwang-Seon Ahn


The Journal of Korean Institute of Communications and Information Sciences | 2012

An Ultra-Lightweight RFID Authentication Protocol Using Index

Jaekang Lee; Se-Jin Oh; Taejin Yun; Kyung-Ho Chung; Kwang-Seon Ahn

Collaboration


Dive into the Se-Jin Oh's collaboration.

Top Co-Authors

Avatar

Kwang-Seon Ahn

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Kyung-Ho Chung

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Jaekang Lee

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Juseok Shin

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Changhee Lee

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Kyoungyoul Kim

Kyungpook National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge