Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Seoksoo Kim is active.

Publication


Featured researches published by Seoksoo Kim.


international conference on future generation communication and networking | 2007

Delay Model for Flooding of Service Prevention in E-Commerce System

Young-Soo Kim; Seoksoo Kim

Todays commercial security server systems which provide secrecy, integrity and availability is still be vulnerable to denial-of-service attacks. Authentication systems which use public key cryptography and process RSA encryption are relatively slow. This has become a major security threat specifically in flooding of service attacks caused by authentication requests. The service flooding attacks render the server incapable of providing its service to legitimate users. In this paper, we propose a delay protocol which applies to the authentication model. Our gradually strengthening authentication model improves the availability and continuity of services and prevents denial of service attacks. We implemented a flooding of service tolerance system to verify the efficiency of our model. This system will greatly increase the reliability.


Journal of the Korea Convergence Society | 2015

Design of Key Tree-based Management Scheme for Healthcare Information Exchange in Convergent u-Healthcare Service

Dong-Hyun Kim; Seoksoo Kim

The threats to privacy and security have received increasing attention as ubiquitous healthcare applications over the Internet become more prevalent, mobile and universal. In particular, we address the communication security issues of access sharing of health information resources in the ubiquitous healthcare environment. The proposed scheme resolves the sender and data authentication problem in information systems and group communications. We propose a novel key management scheme for generating and distributing cryptographic keys to constituent users to provide form of data encryption method for certain types of data concerning resource constraints for secure communications in the ubiquitous healthcare domains.


International Journal of Distributed Sensor Networks | 2012

An Optimization Scheme for M2M-Based Patient Monitoring in Ubiquitous Healthcare Domain

Sungmo Jung; Jae Young Ahn; Dae-Joon Hwang; Seoksoo Kim

In ubiquitous healthcare systems, machine-to-machine (M2M) communication promises large opportunities as it utilizes rapidly developing technologies of large-scale networking of devices for patient monitoring without dependence on human interaction. With the emergence of wireless multimedia sensor networks (WMSNs), M2M communications improve continuous monitoring and transmission and retrieval of multimedia content such as video and audio streams, images, and sensor data from the patient being monitored. This research deploys WMSN for continuous monitoring of target patients and reports tracking for preventive ubiquitous healthcare. This study performs optimization scheme movement coordination technique and data routing within the monitored area. A movement tracking algorithm is proposed for better patient tracking techniques and aids in optimal deployment of wireless sensor networks. Results show that our optimization scheme is capable of providing scalable and reliable patient monitoring results.


Future Generation Computer Systems | 2009

Structure design and test of enterprise security management system with advanced internal security

Seoksoo Kim; Soongohn Kim; Geuk Lee

A security system for a company network is progressing as a ESM (Enterprise Security Management) in an existing security solution foundation. The establishment of the security policy is occupying a very important area in ESM of the security system. We tried to analyze the existing ESM system for this and designed a security solution structure for enhancing the internal security. We applied implementing directly IDS system and tested it. This study examined the structure of security solutions in order to build an enterprise security management system. For this purpose, we analyzed existing enterprise security management systems and, based on the results, proposed a enterprise security management system with reinforced internal security and tested the system. For the test, we used a firewall through log analysis and designed an intra-network using virtual IP system.


pacific rim knowledge acquisition workshop | 2010

Context-aware service framework for decision-support applications using ontology-based modeling

Giovanni Cagalaban; Seoksoo Kim

The technological advances in healthcare specifically in preventive healthcare can lead to longer life expectancy especially for the elders. To aid in preventing premature loss of lives as well as lengthening life span, this research aims to implement the use of mobile and sensor technology to improve the quality of life and lengthen life expectancy. In particular, we propose a context-aware service framework for decision-support applications in preventive healthcare. This research applies ontology to support context modeling and reasoning by applying the general application areas for ontologies to the domain of context in ubiquitous computing environments. This paper also demonstrates how context technologies and mobile web services can help enhance the quality of services in preventive healthcare to elders.


Future Generation Computer Systems | 2009

Secure verifiable non-interactive oblivious transfer protocol using RSA and Bit commitment on distributed environment

Soongohn Kim; Seoksoo Kim; Geuk Lee

In this paper, we have discussed the issues concerning the basic concept and classification of OT (Oblivious Transfer). We have proposed secure verifiable non-interactive oblivious transfer protocols for the exchange of secrets on distributed environments. One is a new secure verifiable non-interactive oblivious transfer protocol using RSA, the other is that with bit commitment using one-way functions. The structure of the protocols is similar to that of the original protocols proposed by Bellare and Micali. Their protocols are based on the difficulty of the discrete logarithm problem. Our protocols are also based on the difficulty of the discrete logarithm problem. The secret in their protocol could be chosen as a random number. The security in our protocols also can be chosen as a random number. These methods have the additional functions that enable us to authenticate the sender and to protect ones denial of what he/she has sent the messages to the other. The traffic amount of transfer of the proposed methods is less than or equal to that of the conventional interactive method.


Sensors | 2010

Research on a Denial of Service (DoS) Detection System Based on Global Interdependent Behaviors in a Sensor Network Environment

Jae-gu Song; Sungmo Jung; Jong Hyun Kim; Dong Il Seo; Seoksoo Kim

This research suggests a Denial of Service (DoS) detection method based on the collection of interdependent behavior data in a sensor network environment. In order to collect the interdependent behavior data, we use a base station to analyze traffic and behaviors among nodes and introduce methods of detecting changes in the environment with precursor symptoms. The study presents a DoS Detection System based on Global Interdependent Behaviors and shows the result of detecting a sensor carrying out DoS attacks through the test-bed.


international conference on intelligent pervasive computing | 2007

A Study on Ontology Based Medical Information System for Home Healthcare

Seoksoo Kim; Jae-gu Song

Miniaturizations of IT devices, makes home healthcare information services possible. Introduction of diversified medical information collection devices supported diversified number of medical information to be collected. However, such introduction has geometrically increased volume of medical information collected in comparison to previously. Therefore, difficulties are faced in managing and processing such information and information sharing among various medical information devices is becoming difficult as well. The study as a research on applied ontology for expressing medical knowledge wants to integrate logical and structural method of approaching of information and wants to effectively manage and provide information generated during medical diagnosis activities through information sharing among medical information devices. Especially, through integration with home healthcare system, the study wants to apply medical knowledge center, consultation center or home healthcare support system to provide technical medical terminologies that are used by doctors to clear up understanding to patients.rapidly, much attention has been paid on the use of spectrum resources. Recently, a new technology called Cognitive Radio (CR) was developed for using the unused spectrum band efficiently. In the CR systems, one possible approach is to allocate the unused spectrum band to the usage spectrum band provided by spectrum sensing technique. In this paper, we propose a new spectral correlation based signal feature detection method for spectrum sensing. To improve spectrum sensing sensitivity, the proposed method computes the autocorrelation of received signal before the spectral correlation detection. Simulation results show that the proposed method provides better performance of spectrum sensing than conventional spectral correlation detection method even in the low SNR environment. Index Terms--Cognitive radio, Cyclostationary, Spectrum sensing.


international conference on advanced software engineering and its applications | 2010

Trends in M2M Application Services Based on a Smart Phone

Jae Young Ahn; Jae-gu Song; Dae-Joon Hwang; Seoksoo Kim

M2M, which stands for communications between machines, offers various services today thanks to advanced communication networks and sensor systems. Also, a powerful terminal such as a smart phone provides sufficient physical environments, not requiring a special device for the services. However, the smart phone M2M environment involves various complex technologies, and there have been no clear policies or standards for the technology. This study, therefore, analyzes the current status of M2M service introduction and the trends in M2M application services using a smart phone.


international conference on future generation communication and networking | 2010

Multiple Object Tracking in Unprepared Environments Using Combined Feature for Augmented Reality Applications

Giovanni Cagalaban; Seoksoo Kim

Existing augmented reality (AR) applications performs well in tracking objects in prepared environments. However, tracking multiple objects in unprepared environments involves considerable difficulty to achieve best results since users are not allowed to modify the real environment such as in outdoor applications. This research focuses on a multiple object tracking based on combined feature tracking and color tracking in an arbitrary scene to demonstrate superior performance. This approach is beneficial to tracking technologies since additional visual cues provide seamless real-synthetic world integration. The system requires accurate measurements of the six-degree of freedom (6DOF) camera pose, three-degree of freedom (3DOF) for position and three for orientation relative to the world coordinate system. Our framework aims to lead AR applications in unprepared environments with multiple tracking objects regardless of the movement of real objects, lights and cameras.

Collaboration


Dive into the Seoksoo Kim's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dong-Hyun Kim

Gyeongsang National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge