Seung S. Yang
Virginia State University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Seung S. Yang.
Journal of Networks | 2008
Seung S. Yang; Yoon G. Kim; Hongsik Choi
We studied the possibility of using wireless sensor networks for vehicle identification in a large open field. This is exciting research in that it not only presents a challenge but has practicality. The challenge here is to develop algorithms and/or protocols for sensor nodes to execute a given task. Since each sensor node has limited computation and communication capabilities, these limitations prohibit the use of algorithms and/or protocols developed for conventional computers and networks. Each sensor is dispensable and easily deployable, it can do meaningful work when it is collaborated as a networked cluster; therefore it is very practical in application. Our goal is to identify vehicles in real time using acoustic signal sensors and wireless networks. Our contribution in this paper is three fold. First, we developed a simple vehicle sound identification algorithm enough to be implemented for capacity limited sensor nodes. Second, we proposed architecture and protocols of wireless sensor networks for vehicle identification using this developed sound classification algorithm. Third, we proposed a cooperation model among sensors to expedite the classification process. Our preliminary results show the proposed architecture and protocols are promising.
southeastcon | 2007
Seung S. Yang; Yoon G. Kim; Hongsik Choi
We studied the possibility of using wireless sensor networks for vehicle identification. It is interesting because it is not only challenging but also practical. It is challenging to develop algorithms and/or protocols for sensor nodes to execute since each sensor node has limited computation and communication capabilities, and these limitations prohibit the use of algorithms and/or protocols developed for conventional computer and networks. It is practical since each sensor is dispensable and easily deployable, yet it can do meaningful works when it is collaborated as a networked cluster. Our goal is to identify vehicles in real time using acoustic signal sensors and wireless networks. Our contribution in this paper is two fold. First, we develop a simple vehicle sound identification algorithm enough to be implemented on capacity limited sensor nodes. Second, we propose architecture and protocols of wireless sensor networks for vehicle identification using this developed sound classification algorithm. Our preliminary results show the proposed architecture and protocols are promising.
Information Management & Computer Security | 2010
Seung S. Yang; Hongsik Choi
Purpose – One‐time password systems provide great strengths over conventional password systems: protection against over‐the‐shoulder, eavesdropping, replay, etc. The Grid Data Security authentication system is a server‐challenge‐based system. It has advantages over other one‐time password systems since it does not require pre‐installed software nor special devices to carry on. However, there are some weaknesses. The purpose of this paper is to analyze the weaknesses of the one‐time password system and provide practical guidelines for using the one‐time password system.Design/methodology/approach – This paper statistically analyzes the weakness of the Grid Data Security authentication system and simulates attacks to the system to confirm the discovered weakness. The paper also suggests ways to reduce the discovered vulnerability using mathematical formula and offers practical guideline for using the system. It also identifies the systems strength on access authentication on mobile communication.Findings –...
Information Security Journal: A Global Perspective | 2010
Seung S. Yang; Hongsik Choi; Hankyu Joo
ABSTRACT A password-based authentication is still the most prevalent authentication method because of its convenience and easy implementations. Since a password is transmitted via network, it has an inherent vulnerability of password exposure to an attacker. A one-time password system reduces the risk of a security breach even when a password is exposed to an attacker, because the password is only meaningful at a given time. A grid data security system uses a technology, GridOne™, which allows the use of a one-time password without requiring preinstalled hardware or software infrastructures, and it provides strong security over conventional password-based authentication systems. We analyzed the weakness of the grid data security authentication system and provide a suggestion to compensate for its vulnerability.
Network Security archive | 2009
Seung S. Yang; Hongsik Choi
Authentication is the process of confirming that something claimed is true, and an authentication method is the way of proving the claim. As more and more people use networked computer systems in their everyday lives - for example, in online banking, email, and online shopping - the importance of authentication is increasing.
2008 IEEE International Workshop on Semantic Computing and Applications | 2008
Seong Y. Jeong; Jin U. Kim; Seung S. Yang
Since the existing metadata define the structure of information using non-unified semantics, syntax, and representation methods, they set a limit in the search for exact information. To address this problem, metadata for construction project information that are frequently used in the construction industry were developed in this study, for the first time in Korea, by referring to the information standard development guidelines of UN/CEFACT. In addition, to establish reciprocal compatibility with the metadata which will be developed in the future, metadata development guidelines were formulated. The results of this study can be used in accurately expressing the semantic relationship between the essential meanings and their representations, such as RDF (resource description framework), in the establishment of an information system for the asset management of public facilities.
The 25th International Symposium on Automation and Robotics in Construction | 2008
Seong Y. Jeong; Jin U. Kim; Seung S. Yang
Archive | 2015
Hongsik Choi; Seung S. Yang
Archive | 2015
Seung S. Yang; Hongsik Choi
Society for Information Technology & Teacher Education International Conference | 2010
Youwen Ouyang; Seung S. Yang; Theresa Franklin; Karen Michaelson; Shelby P. Morge; Ehsan Sheybani; Katherine Hayden; Sridhar Narayan; Gene Tagliarini; Manorama Talaiver