Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where YoHan Park is active.

Publication


Featured researches published by YoHan Park.


Sensors | 2016

Three-Factor User Authentication and Key Agreement Using Elliptic Curve Cryptosystem in Wireless Sensor Networks

YoHan Park; Young-Ho Park

Secure communication is a significant issue in wireless sensor networks. User authentication and key agreement are essential for providing a secure system, especially in user-oriented mobile services. It is also necessary to protect the identity of each individual in wireless environments to avoid personal privacy concerns. Many authentication and key agreement schemes utilize a smart card in addition to a password to support security functionalities. However, these schemes often fail to provide security along with privacy. In 2015, Chang et al. analyzed the security vulnerabilities of previous schemes and presented the two-factor authentication scheme that provided user privacy by using dynamic identities. However, when we cryptanalyzed Chang et al.’s scheme, we found that it does not provide sufficient security for wireless sensor networks and fails to provide accurate password updates. This paper proposes a security-enhanced authentication and key agreement scheme to overcome these security weaknesses using biometric information and an elliptic curve cryptosystem. We analyze the security of the proposed scheme against various attacks and check its viability in the mobile environment.


IEEE Access | 2017

Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks

Kisung Park; YoungHo Park; YoHan Park; Alavalapati Goutham Reddy; Ashok Kumar Das

In global mobility networks, a mobile user can access roaming services using a mobile device at anytime and anywhere. However, mobile users can be vulnerable to various attacks by adversaries, because the roaming services are provided through public network. Therefore, an anonymous mobile user authentication for roaming services is an essential security issue in global mobility networks. Recently, Lee et al. pointed out the security weaknesses of a previous scheme and proposed an advanced secure anonymous authentication scheme for roaming services in global mobility networks. However, we found that the scheme proposed by Lee et al. is vulnerable to password guessing and user impersonation attacks, and that it cannot provide perfect forward secrecy and secure password altered phase. In this paper, to overcome the security weaknesses of the scheme proposed by Lee et al., we propose an improved secure anonymous authentication scheme using shared secret keys between home agent and foreign agent. In addition, we analyze the security of our proposed scheme against various attacks and prove that it provides secure mutual authentication using Burrows–Abadi–Needham logic. In addition, the formal security analysis using the broadly-accepted real-or-random (ROR) random oracle model and the formal security verification using the widely accepted automated validation of the Internet security protocols and applications tool show that the proposed scheme provides the session key security and protection against replay as well as man-in-the-middle attacks, respectively. Finally, we compare the performance of the proposed scheme with the related schemes, and the results show that the proposed scheme provides better security and comparable efficiency as compared with those for the existing schemes.


International Journal of Distributed Sensor Networks | 2017

Security analysis and enhancements of an improved multi-factor biometric authentication scheme

YoHan Park; Kisung Park; KyungKeun Lee; Hwangjun Song; Young-Ho Park

Many remote user authentication schemes have been designed and developed to establish secure and authorized communication between a user and server over an insecure channel. By employing a secure remote user authentication scheme, a user and server can authenticate each other and utilize advanced services. In 2015, Cao and Ge demonstrated that An’s scheme is also vulnerable to several attacks and does not provide user anonymity. They also proposed an improved multi-factor biometric authentication scheme. However, we review and cryptanalyze Cao and Ge’s scheme and demonstrate that their scheme fails in correctness and providing user anonymity and is vulnerable to ID guessing attack and server masquerading attack. To overcome these drawbacks, we propose a security-improved authentication scheme that provides a dynamic ID mechanism and better security functionalities. Then, we show that our proposed scheme is secure against various attacks and prove the security of the proposed scheme using BAN Logic.


Journal of Korea Multimedia Society | 2015

Secur e Pr ivate Key Revocation Scheme in Anonymous Cluster -Based MANETs

YoHan Park; YoungHo Park


IEEE Access | 2018

2PAKEP: Provably Secure and Efficient Two-Party Authenticated Key Exchange Protocol for Mobile Environment

Kisung Park; YoungHo Park; YoHan Park; Ashok Kumar Das


Journal of Korea Multimedia Society | 2015

An ID-Based Remote User Authentication Scheme in IoT

Kisung Park; SungYup Lee; YoHan Park; YoungHo Park


Journal of the Institute of Electronics Engineers of Korea | 2013

Cluster Reconfiguration Protocol in Anonymous Cluster-Based MANETs

YoHan Park; Young-Ho Park


Journal of Korea Multimedia Society | 2017

Secure Remote User Authentication Protocol against Privileged-Insider Attack

SungYup Lee; YoHan Park; YoungHo Park


Journal of Korea Multimedia Society | 2016

Symmetric Key-Based Remote User Authentication Scheme With Forward Secrecy

SungYup Lee; Kisung Park; YoHan Park; YoungHo Park


Journal of the Korea Industrial Information Systems Research | 2015

Secure and Scalable Key Aggregation Scheme for Cloud Storage

YoHan Park; YoungHo Park

Collaboration


Dive into the YoHan Park's collaboration.

Top Co-Authors

Avatar

YoungHo Park

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

SungYup Lee

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Young-Ho Park

Pukyong National University

View shared research outputs
Top Co-Authors

Avatar

Ashok Kumar Das

International Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hwangjun Song

Pohang University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

KyungKeun Lee

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

SangJae Moon

Kyungpook National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge