Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Seon-Ho Park is active.

Publication


Featured researches published by Seon-Ho Park.


international conference on advanced communication technology | 2008

CHEF: Cluster Head Election mechanism using Fuzzy logic in Wireless Sensor Networks

Jong-Myoung Kim; Seon-Ho Park; Young-Ju Han; Tai-Myoung Chung

In designing the wireless sensor networks, the energy is the most important consideration because the lifetime of the sensor node is limited by the battery of it. To overcome this demerit many research have been done. The clustering is the one of the representative approaches. In the clustering, the cluster heads gather data from nodes, aggregate it and send the information to the base station. In this way, the sensor nodes can reduce communication overheads that may be generated if each sensor node reports sensed data to the base station independently. LEACH is one of the most famous clustering mechanisms. It elects a cluster head based on probability model. This approach may reduce the network lifetime because LEACH does not consider the distribution of sensor nodes and the energy remains of each node. However, using the location and the energy information in the clustering can generate big overheads. In this paper we introduce CHEF - cluster head election mechanism using fuzzy logic. By using fuzzy logic, collecting and calculating overheads can be reduced and finally the lifetime of the sensor networks can be prolonged. To prove efficiency of CHEF, we simulated CHEF compared with LEACH using the matlab. Our simulation results show that CHEF is about 22.7% more efficient than LEACH.


high performance computing and communications | 2006

Context-Role based access control for context-aware application

Seon-Ho Park; Young-Ju Han; Tai-Myoung Chung

The rapid growth of wireless network technology and the deployment of mobile computing devices have enabled the construction of pervasive computing environment. In pervasive computing environment, it is proliferated that many new applications that provide active and intelligent services by context information are collected by pervasive sensor devices. These new applications called context-aware applications must require new security mechanisms and policies different from typical ones. Specially, access control mechanism supports security policy that is based on context information, in order to provide automating context-aware services. So, this paper analyzes various access control mechanisms and proposes a context-role based access control mechanism for context-aware application.


international conference on information systems security | 2008

Active Cyber Attack Model for Network System's Vulnerability Assessment

Jung-Ho Eom; Young-Ju Han; Seon-Ho Park; Tai-Myoung Chung

In this paper, we architected active cyber attack model for assessing network systems vulnerability. As simulating cyber attack model in network system, we can identify the weakest point and inspect security policy. It also improved the capability of information collection and attack action, as using autonomous agents. Attack action agents which introduced attack a set of sequence number can reduce transmission overhead and hide attack scenarios information. We built attack scenario for attack process and technique of attack action agents. It is composed of attack pattern and tree. Action controller uses nodes attack success percent(ASP) to choose the second best attack scenario after the first attack was failed. ASP is calculated with the ratio of all achieved events until the sub-node over all nodes of the attack tree.


international conference on conceptual structures | 2007

Risk Assessment Method Based on Business Process-Oriented Asset Evaluation for Information System Security

Jung-Ho Eom; Seon-Ho Park; Young-Ju Han; Tai-Myoung Chung

We presented risk assessment methodology focused on business-process oriented asset evaluation and qualitative risk analysis method. The business process-oriented asset evaluation is to evaluate assets value by the degree of asset contribution related to business process. Namely, assets value is different according to the importance of department to which asset belongs, the contribution of assets business, and security safeguard, etc. We proposed new assets value evaluation applied to the weight of above factors. The weight is decided by evaluation matrix by Delphi team. We assess risk by qualitative method applied to the improved international standard method which is added the effectiveness of operating safeguard at information system. It reflects an assumption that they can reduce risk level when existent safeguards are established appropriately. Our model derives to practical risk assessment method than existent risk assessment method, and improves reliability of risk analysis.


asia-pacific network operations and management symposium | 2007

Architecture of context-aware integrated security management systems for smart home environment

Seon-Ho Park; Joon-Sic Cho; Sung-Min Jung; Young-Ju Han; Tai-Myoung Chung

The smart home technology is a noticeable area of study in various studies on the ubiquitous computing technology. This paper presents the security management system to provide context-aware security service. The system supports the management and enforcement of context-aware security and the management of the context of users and resources. This system provides the security service functions such as the partial credential based user authentication and context-aware access control, and the security policy management functions. In addition, the system provides the policy enforcement simulation function to test and validate the security policy. This simulator can cover all security service in the smart home environment.


international conference on computational science and its applications | 2007

Energy-efficient distance based clustering routing scheme for wireless sensor networks

Young-Ju Han; Seon-Ho Park; Jung-Ho Eom; Tai-Myoung Chung

Clustering scheme enabling the efficient utilization of the limited energy resources of the deployed sensor nodes can effectively prolong the lifetime of wireless sensor networks. The most common technique in famous clustering schemes is a probabilistic clustering scheme based on a randomized cluster-head rotation for distributing the energy consumption among nodes in each cluster. Because most of those schemes utilize mainly the residual energy of each node as the criterion of cluster-head election, those schemes have demerit which the unbalanced energy consumption among cluster-heads is occurred. To overcome this demerit, we consider a distance from the base station to cluster-heads as well as the residual energy as the criterion of cluster-head election for balanced energy consumption among cluster-heads. Our scheme provides fully distributed manner by utilizing local information and good energy-efficiency by load balanced clustering scheme. Through simulation experiments, we showed that the proposed scheme is more effective than LEACH and EECS in prolonging the lifespan of wireless sensor networks.


international conference on advanced communication technology | 2007

CAISMS: A Context-Aware Integrated Security Management System for Smart Home

Joon-Sic Cho; Seon-Ho Park; Young-Ju Han; Tai-Myoung Chung

Computer system is evolving rapidly to ubiquitous computing system. A smart home environment is a typical ubiquitous environment consisting of a network of computerized electronic appliances. Current smart home system provides context information on individual machinery and it responses only to users passive requirement. Correspondingly, smart home technique does not offer users authentication access control, and preservation. To emphasize these issues, we study using the environment information by access control method, or users authentication service requirement. However, current techniques still contains weak points. They cannot establish a large scaled-policy and it cannot also provide various efficient authentication methods. In this research, we propose an integrated preservation system by using the security middleware to solve the problem.


asia-pacific network operations and management symposium | 2007

Energy-efficient distance based clustering routing scheme for long-term lifetime of multi-hop wireless sensor networks

Young-Ju Han; Jung-Ho Eom; Seon-Ho Park; Tai-Myoung Chung

To balance energy consumption among cluster-heads in multi-hop wireless sensor networks, we propose an energy-efficient distance based probabilistic clustering scheme. Our scheme considers a distance from the sink(base station) to each node as well as the residual energy of each node as the criterion of cluster-head election. Through simulation experiments, we show that our scheme is more effective than LEACH and EEUC in prolonging the lifespan of multi-hop wireless sensor networks.


networked computing and advanced information management | 2009

A Study on Access Control Model for Context-Aware Workflow

Seon-Ho Park; Jung-Ho Eom; Tai-Myoung Chung

In this paper, we explore security considerations on context-aware workflow systems. We also present the Workflow-aware Context-Role Based Access Control (WCRBAC) model that is a new access control model suitable for context-aware workflow systems. The WCRBAC model enables security administrator to configure authorization policy considering both the security-related context information and the workflow-related data, as well as organizations structural information.


Contexts | 2007

Context-aware security management system for pervasive computing environment

Seon-Ho Park; Young-Ju Han; Tai-Myoung Chung

This paper presents the context based authentication and authorization management system for security management in the pervasive computing environment. we explored security considerations of the pervasive computing environment. The proposed system adopts the context-role based access control model as access control model for enforcement of access control service based on various context information. We also studied the methodology to apply partial credential to user authentication. We introduce the authentication confidence index for applying the partial credential to authentication mechanisms. The authentication confidence index is also used for user-role activation in the access control service. This paper shows comparison between our system and related works, such as Cerberus and CASA.

Collaboration


Dive into the Seon-Ho Park's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Young-Ju Han

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Jung-Ho Eom

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Joon-Sic Cho

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Min-Woo Park

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Changsup Keum

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hun-Jung Lim

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge