Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sungyoung Lee is active.

Publication


Featured researches published by Sungyoung Lee.


Sensors | 2010

BARI+: A Biometric Based Distributed Key Management Approach for Wireless Body Area Networks

Khaliq ur Rahman Raazi Syed Muhammad; Heejo Lee; Sungyoung Lee; Young Koo Lee

Wireless body area networks (WBAN) consist of resource constrained sensing devices just like other wireless sensor networks (WSN). However, they differ from WSN in topology, scale and security requirements. Due to these differences, key management schemes designed for WSN are inefficient and unnecessarily complex when applied to WBAN. Considering the key management issue, WBAN are also different from WPAN because WBAN can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBAN domain.


Journal of computing science and engineering | 2010

A Survey on Key Management Strategies for Different Applications of Wireless Sensor Networks

Syed Muhammad Khaliq-ur-Rahman Raazi; Sungyoung Lee

Wireless Sensor Networks (WSN) have proved to be useful in applications that involve monitoring of real-time data. There is a wide variety of monitoring applications that can employ Wireless Sensor Network. Characteristics of a WSN, such as topology and scale, depend upon the application, for which it is employed. Security requirements in WSN vary according to the application dependent network characteristics and the characteristics of an application itself. Key management is the most important aspect of security as some other security modules depend on it. We discuss application dependent variations in WSN, corresponding changes in the security requirements of WSN and the applicability of existing key management solutions in each scenario.


Annales Des Télécommunications | 2010

MUQAMI+: a scalable and locally distributed key management scheme for clustered sensor networks

Muhammad Khaliq Ur Rahman Raazi Syed; Heejo Lee; Sungyoung Lee; Young Koo Lee

Wireless sensor networks (WSN) are susceptible to node capture and many network levels attacks. In order to provide protection against such threats, WSNs require lightweight and scalable key management schemes because the nodes are resource-constrained and high in number. Also, the effect of node compromise should be minimized and node capture should not hamper the normal working of a network. In this paper, we present an exclusion basis system-based key management scheme called MUQAMI+ for large-scale clustered sensor networks. We have distributed the responsibility of key management to multiple nodes within clusters, avoiding single points of failure and getting rid of costly inter-cluster communication. Our scheme is scalable and highly efficient in terms of re-keying and compromised node revocation.


computational intelligence and security | 2009

BARI: A Distributed Key Management Approach for Wireless Body Area Networks

Syed Muhammad Khaliq-ur-Rahman Raazi; Heejo Lee; Sungyoung Lee; Young-Koo Lee

In recent years, use of sensors to measure the biometrics and movements of human body have resulted in the design of wireless body area networks (WBAN). Although WBANs consist of resource constrained sensing devices just like other wireless sensor networks (WSN), they differ from WSNs in topology, scale and security requirements. Due to these differences, key management schemes designed for WSNs prove inefficient and unnecessarily complex when applied to WBANs. Considering key management issue, WBANs are also different from WPANs because WBANs can use random biometric measurements as keys. We highlight the differences between WSN and WBAN and propose an efficient key management scheme, which makes use of biometrics and is specifically designed for WBANs domain.


international conference on trust management | 2007

MUQAMI: A Locally Distributed Key Management Scheme for Clustered Sensor Networks

Syed Muhammad Khaliq-ur-Rahman Raazi; Adil Mehmood Khan; Faraz Idris Khan; Sungyoung Lee; Young Jae Song; Young Koo Lee

In many of the sensor network applications like natural habitat monitoring and international border monitoring, sensor networks are deployed in areas, where there is a high possibility of node capture and network level attacks. Specifically in such applications, the sensor nodes are severely limited in resources. We propose MUQAMI, a locally distributed key management scheme for resilience against the node capture in wireless sensor networks. Our scheme is efficient both in case of keying, re-keying and node compromise. Beauty of our scheme is that it requires minimal message transmission outside the cluster. We base our Scheme on Exclusion Basis System (EBS).


workshop on information security applications | 2009

Image-Feature Based Human Identification Protocols on Limited Display Devices

Hassan Jameel; Riaz Ahmed Shaikh; Le Xuan Hung; Yuan Wei Wei; Syed Muhammad Khaliq Ur Rehman Raazi; Ngo Trong Canh; Sungyoung Lee; Heejo Lee; Yuseung Son; Miguel Fernandes

We present variations and modifications of the image-feature based human identification protocol proposed by Jameel et al with application to user authentication on mobile devices with limited display capabilities. The protocols introduced are essentially reduced versions of the original protocol with a minor tradeoff between security and usability. However, the proposed protocols are not aimed for computation and memory restrained devices. A brief user survey highlights the usability. By employing realistic assumptions pertaining to mobile devices, we show that the protocols are secure under the conjectured difficulty of extracting the secret feature from the observation of images and their binary answers. The adversary considered is strictly passive.


international performance computing and communications conference | 2008

Activity-based Security Scheme for Ubiquitous Environments

Le Xuan Hung; J Hassan; A. S Riaz; Syed Muhammad Khaliq-ur-Rahman Raazi; Yuan Weiwei; Ngo Trong Canh; Phan Tran Ho Truc; Sungyoung Lee; Heejo Lee; Yuseung Son; Miguel Fernandes; Miso Kim; Yonil Zhung

Bardram introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous environments. In such environments where users are using a multitude of heterogeneous computing devices, the need for supporting users at the activity level becomes essential. However, without considering basic security issues, it could be rife with vulnerabilities. Security services, like authentication and access control, have to not only guarantee security, privacy, and confidentiality for ubiquitous computing resources, but also support user activities equipped with various devices. In this paper, we present an activity-based security scheme. The proposed scheme aims to enhance security services on mobile devices and facilitate user activities. We also integrate off-the-shell security services like MD5, TEA, Diffie-Hellman key agreement protocol so that it makes the scheme more robust and practically usable. The implementation and sample scenario have shown the requirement satisfactory of the scheme.


consumer communications and networking conference | 2009

Activity-Oriented Access Control for Ubiquitous Environments

Le Xuan Hung; Riaz Ahmed Shaikh; Hassan Jameel; Syed Muhammad Khaliq-ur-Rahman Raazi; Yuan Weiwei; Ngo Trong Canh; Phan Tran Ho Truc; Sungyoung Lee; Heejo Lee; Yuseung Son; Miguel Fernandes

Recent research on ubiquitous computing has introduced a new concept of activity-based computing as a way of thinking about supporting human activities in ubiquitous computing environment. Existing access control approaches such as RBAC, became inappropriate to support this concept because they do not consider human activities. In this paper, we propose Activity-Oriented Access Control (AOAC) model, aiming to support users activity in ubiquitous environments. We have designed and implemented our initial AOAC system. We also built up a simple scenario in order to illustrate how it supports user activities. The results have shown that AOAC meets our objectives. Also, AOAC it takes approximately 0.26 second to give a response which proves that AOAC is suitable to work in real-time environments.


networked computing and advanced information management | 2009

A Novel Architecture for Efficient Key Management in Humanware Applications

Syed Muhammad Khaliq-ur-Rahman Raazi; Sungyoung Lee; Young-Koo Lee

In humanware applications, resource constrained sensor devices are tactically placed on human body to form Wireless Body Area Networks (WBAN). Then the WBAN is used for monitoring biometrics and movements of human body. Keeping in mind the resource constrained devices, WBANs are treated just like wireless sensor networks when considering a solution for key management. However, WBANs differ from traditional wireless sensor networks in scale, topology and security requirements. Also, the WBANs can also use random values from biometric measurements for the generation of keys. These differences render the key management schemes of WSNs inefficient and overly complex for WBANs scenario. Therefore, we propose a key management scheme that is efficient and fulfills the security requirements of WBAN.


international conference on mobile multimedia communications | 2009

TIMAR: an efficient key management scheme for ubiquitous health care environments

Khaliq-ur-Rahman Raazi; Sungyoung Lee; Young-Koo Lee

Wireless Sensor Networks (WSN) are worthy to use in ubiquitous healthcare environments. They provide comfort to patients and make patient monitoring systems more efficient. WSN, when applied in ubiquitous healthcare environments, have different characteristics and security requirements. Number of sensors is very small as compared to other WSN applications and all nodes are close to each other in the network. Possibility of human intervention in ubiquitous healthcare environments and randomness properties of biometric measurements, which are collected in ubiquitous healthcare environments, reduce the security requirements as compared to other WSN applications. Key Management Schemes, proposed for generic WSN, prove to be overly complex and inefficient for ubiquitous healthcare environments. In this paper, we present TIMAR, which is an efficient Key Management Scheme specifically designed for ubiquitous healthcare environments.

Collaboration


Dive into the Sungyoung Lee's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge