Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sungmo Jung is active.

Publication


Featured researches published by Sungmo Jung.


International Journal of Distributed Sensor Networks | 2012

An Optimization Scheme for M2M-Based Patient Monitoring in Ubiquitous Healthcare Domain

Sungmo Jung; Jae Young Ahn; Dae-Joon Hwang; Seoksoo Kim

In ubiquitous healthcare systems, machine-to-machine (M2M) communication promises large opportunities as it utilizes rapidly developing technologies of large-scale networking of devices for patient monitoring without dependence on human interaction. With the emergence of wireless multimedia sensor networks (WMSNs), M2M communications improve continuous monitoring and transmission and retrieval of multimedia content such as video and audio streams, images, and sensor data from the patient being monitored. This research deploys WMSN for continuous monitoring of target patients and reports tracking for preventive ubiquitous healthcare. This study performs optimization scheme movement coordination technique and data routing within the monitored area. A movement tracking algorithm is proposed for better patient tracking techniques and aids in optimal deployment of wireless sensor networks. Results show that our optimization scheme is capable of providing scalable and reliable patient monitoring results.


Sensors | 2010

Research on a Denial of Service (DoS) Detection System Based on Global Interdependent Behaviors in a Sensor Network Environment

Jae-gu Song; Sungmo Jung; Jong Hyun Kim; Dong Il Seo; Seoksoo Kim

This research suggests a Denial of Service (DoS) detection method based on the collection of interdependent behavior data in a sensor network environment. In order to collect the interdependent behavior data, we use a base station to analyze traffic and behaviors among nodes and introduce methods of detecting changes in the environment with precursor symptoms. The study presents a DoS Detection System based on Global Interdependent Behaviors and shows the result of detecting a sensor carrying out DoS attacks through the test-bed.


Sensors | 2010

A Study on Software-based Sensing Technology for Multiple Object Control in AR Video

Sungmo Jung; Jae-gu Song; Dae-Joon Hwang; Jae Young Ahn; Seoksoo Kim

Researches on Augmented Reality (AR) have recently received attention. With these, the Machine-to-Machine (M2M) market has started to be active and there are numerous efforts to apply this to real life in all sectors of society. To date, the M2M market has applied the existing marker-based AR technology in entertainment, business and other industries. With the existing marker-based AR technology, a designated object can only be loaded on the screen from one marker and a marker has to be added to load on the screen the same object again. This situation creates a problem where the relevant marker’should be extracted and printed in screen so that loading of the multiple objects is enabled. However, since the distance between markers will not be measured in the process of detecting and copying markers, the markers can be overlapped and thus the objects would not be augmented. To solve this problem, a circle having the longest radius needs to be created from a focal point of a marker to be copied, so that no object is copied within the confines of the circle. In this paper, software-based sensing technology for multiple object detection and loading using PPHT has been developed and overlapping marker control according to multiple object control has been studied using the Bresenham and Mean Shift algorithms.


Wireless Personal Communications | 2016

Mobile-Based DoS Attack Security Agent in Sensor Networking

Donghyun Kim; Sungmo Jung; Dae-Joon Hwang; Seoksoo Kim

AbstractCloud computing emerges as a way to dynamically increase the capacity or capabilities in infrastructure architectures, software delivery, and development models. However, security is one of the major issues with mobile applications as they can be attacked by malicious users which reduces the growth of cloud computing and complications with data privacy and data protection. In this paper, a mobile-based security agent is presented which provides security mechanisms to security agents as well as hosts. This type of security agent is significant in providing security mechanism to security risks in cloud computing due to its ability to migrate from one host to another where it can resume its processing and service provisioning. Additionally, some of the current attacks are created that attackers may initiate. A fault tolerance at a high level was enabled for mobile-based distributed transaction processing in the cloud. The results show that most of the attack messages were detected and identified, and the type of attack was identified within a specific period of time.


international conference on future generation communication and networking | 2010

Design of Cyber Attack Precursor Symptom Detection Algorithm through System Base Behavior Analysis and Memory Monitoring

Sungmo Jung; Jong Hyun Kim; Giovanni Cagalaban; Ji-hoon Lim; Seoksoo Kim

More recently, botnet-based cyber attacks, including a spam mail or a DDos attack, have sharply increased, which poses a fatal threat to Internet services. At present, antivirus businesses make it top priority to detect malicious code in the shortest time possible (Lv.2), based on the graph showing a relation between spread of malicious code and time, which allows them to detect after malicious code occurs. Despite early detection, however, it is not possible to prevent malicious code from occurring. Thus, we have developed an algorithm that can detect precursor symptoms at Lv.1 to prevent a cyber attack using an evasion method of ‘an executing environment aware attack’ by analyzing system behaviors and monitoring memory.


Journal of The Chinese Institute of Engineers | 2012

Design of context-aware middleware for mobile healthcare services

Jae-gu Song; Sungmo Jung; Byeong Ho Kang; Dae-Joon Hwang; Seoksoo Kim

We design and develop a context-aware middleware for various mobile healthcare services, specifically those for preventive medicine. The middleware provides medical status information in a context form and then links such information with medical records. Information is collected by the middleware through the recognition of diverse environmental data that affect patients’ health. Information-to-information-related values are obtained as a measure for effectively categorizing and managing medical-related context information. High-frequency context values are determined using the Bayesian probability formula to manage frequently occurring risk situations. The middleware also allows for real-time analysis of information, as well as the calculation of risk frequency via a real-time sensor and recognition of radio frequency identification tag information. It is designed to transmit calculated and preventive care-related information to mobile devices. Using the unique target application program of the ubiquitous healthcare system, the general environment and preventive medicine environment are set as the primary paradigms for generating and managing practical medical context information. This research presents methods for providing automated preventive medical services under a ubiquitous healthcare system. The proposed middleware is expected to present new interactive concepts for preventive medicine-related environments, consequently satisfying the demands of user-oriented ubiquitous healthcare.


International Conference on Advanced Computer Science and Information Technology | 2011

Design of Multilayered Grid Routing Structure for Efficient M2M Sensor Network

Sungmo Jung; Jae Young Ahn; Dae-Joon Hwang; Seoksoo Kim

As heterogeneous sensor networking technology has recently emerged, researches on M2M network that consists of various sensor nodes have been actively carried out. In this research, a routing structure using the multi-level grid structure that could decrease multihop was designed in order to reduce energy consumption in the M2M network consisting of different types of sensor nodes.


International Conference on Advanced Communication and Networking | 2011

A Study on MAC Address Spoofing Attack Detection Structure in Wireless Sensor Network Environment

Sungmo Jung; Jong Hyun Kim; Seoksoo Kim

Wireless sensor network applies authentication by registering/managing user IP and MAC addresses. However, the existing methods are vulnerable to MAC address spoofing, in which a malicious user changes a client’s MAC address into his own, calling for a new detection method. Therefore, this paper provides a method of detecting MAC address spoofing attacks in real-time by collecting wireless traffic data through AirSensor/AP- and using a MAC Address Index table in TMS.


international conference on future generation communication and networking | 2010

Study on the Future Internet System through Analysis of SCADA Systems

Jae-gu Song; Sungmo Jung; Seoksoo Kim

Research on the future Internet is focused on establishing standards by solving problems through various projects and accepting various requirements. In this study, the SCADA (Supervisory Control And Data Acquisition) environment, closely related with national infrastructure, is analyzed in order to explore requirements of the future Internet and then those of the SCADA network. Also, this study provides SCADA system environments for the future Internet.


Archive | 2014

Network-Threatening Element Extraction and Quantification Framework

Sungmo Jung; Donghyun Kim; Seoksoo Kim

APT attacks’ forecasts and warning technologies are the most effective strategy to detect and analyze pre-attack indicators. Here, a study on a quantification framework for threatening conditions is necessary to being able to extract various network threatening elements. In this study, we collected data on security threatening elements to analyze network threatening elements. We analyzed the limitations of pre-technologies to analyze the quantification technologies of pre-threatening conditions. We also categorized their degrees of risks by grading threatening elements to deduce a method of graded degrees of risks.

Collaboration


Dive into the Sungmo Jung's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jong Hyun Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jae Young Ahn

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Dong-Hyun Kim

Gyeongsang National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dong Il Seo

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Dong-Joo Kang

Korea Electrotechnology Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge