Yong-Hoon Jung
Soongsil University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yong-Hoon Jung.
ubiquitous computing | 2011
Jeong-Hyo Park; Yong-Hoon Jung; Hoon Ko; Jeong-Jai Kim; Moon-Seog Jun
Research on sensor network had been focused on security services that provide authentication, confidentiality, integrity and availability until recently, but now there is growing interest in tackling the problem of actual sensor IDs being exposed. Many techniques for providing anonymity to the source in an ad-hoc network have been proposed, but they are not suitable. Thus, a technique that is well-suited to the characteristics of sensor networks is needed. This paper, limiting the type of attack against a sensor network to that of eavesdropping, proposes a new technique for providing anonymity using Phantom ID and SMAC. The degree of anonymity provided by the proposed technique was analyzed using an entropy-based modeling technique. The results showed that the anonymity is high when the proposed technique is used. The key factor responsible for the improved anonymity had to do with disguising the sensor ID so that it cant be found easily.
The Smart Computing Review | 2011
Yong-Hoon Jung; Seung-Jae Jang; So Yeon Min; Moon-Seog Jun
Home network is one composition of several various devices and has been expanded according to the development of those devices. The number and quantity of digital contents have been growing to various ways. However, it is not easy to protect a copyright of the digital contents continuously since it has a lack of operating the devices which need multimedia contents. It is also not easy to reissue a license from DRM server to move the contents the exterior requests. To solve those inconveniences, this thesis has suggested the authentication method between the devices using a certain framework. In the framework, the contents can move to another device without reissuing a license through interacts of the devices from DRM server, using two dimension array. In addition, even if all members of family access home network externally, it is designed to be able to use home network contents through a simple authentication of devices.
ubiquitous computing | 2011
Jeong-Hyo Park; Yong-Hoon Jung; Kwang-Hyung Lee; Hoon Ko; Moon-Seog Jun
Research on sensor network had been focused on security services that provide authentication, confidentiality, integrity and availability until recently, but now there is growing interest in tackling the problem of actual sensor IDs being exposed. Many techniques for providing anonymity to the source in an ad-hoc network have been proposed, but they are not suitable. Thus, a technique that is well-suited to the characteristics of sensor networks is needed. This paper, limiting the type of attack against a sensor network to that of eavesdropping, proposes a new technique for providing anonymity using Phantom ID and SMAC. The degree of anonymity provided by the proposed technique was analyzed using an entropy-based modeling technique. The results showed that the anonymity is high when the proposed technique is used. The key factor responsible for the improved anonymity had to do with disguising the sensor ID so that it cant be found easily.
Journal of the Korea Academia-Industrial cooperation Society | 2009
Eun-Hwan Kim; Yong-Hoon Jung; Moon-Seog Jun
Home network is a network composed of devices in home and is being expanded by evolving devices. Also, The number of digital contents in home network has been increasing steadily. But it is difficult to continually protect the rights of digital contents due to lack of interoperability among contents devices. Besides, a license has to be re-issued by DRM sever for contents transfer between devices. Thus, this paper proposes framework which can freely transfer and contents to another device through mutual device authentication and a system that can decrease overload of license management of the DRM sever and that enable device outside home network to use contents through user authentication.
The Smart Computing Review | 2012
Yong-Hoon Jung; Jeong-Hyo Park; Kwang-Hyung Lee
A home network consists of home appliances, and they are being expanded with home appliance development. The amount of digital content in home networks is therefore increasing tremendously. But continuous protection of digital content authentication is difficult, because of a lack of digital content management between devices. Devices should reissue licenses from DRM servers, and then content will be able to shift toward each device. In this paper, a framework which freely moves digital content by device authentication to other devices in a home network is proposed. In addition, a system which reduces a DRM servers work with license issues and management, and the even outside approaches, will be able to control the system by device authentication from a home network sever.
The Smart Computing Review | 2011
Jeong-Hyo Park; Yong-Hoon Jung; Kwang-Hyung Lee; Keun-Wang Lee; Moon-Seog Jun
Research on sensor network had been focused on security services that provide authentication, confidentiality, integrity and availability until recently, but now there is growing interest in tackling the problem of actual sensor IDs being exposed. Many techniques for providing anonymity to the source in an ad-hoc network have been proposed, but they are not suitable. Thus, a technique that is well-suited to the characteristics of sensor networks is needed. This paper, limiting the type of attack against a sensor network to that of eavesdropping, proposes a new technique for providing anonymity using Phantom ID and SMAC. The degree of anonymity provided by the proposed technique was analyzed using an entropy-based modeling technique. The results showed that the anonymity is high when the proposed technique is used. The key factor responsible for the improved anonymity had to do with disguising the sensor ID so that it cant be found easily.
International Conference on Grid and Distributed Computing | 2011
Jeong-Hyo Park; Yong-Hoon Jung; Kwang-Hyung Lee; Keun-Wang Lee; Moon-Seog Jun
Sensor network maintains high limitation of resource because it performs many communications in order to create encryption keys. To solve this problem, this research suggests LA2EP. LA2EP Protocol can minimize resource and provides a new scheme for authentication and encryption that can provide anonymity of node for safe communication. To analyze the performance of the suggested scheme, a degree of anonymity that is provided by the scheme suggested by using an Entropy-based modeling was measured. As a result, when the suggested scheme was used, the degree of anonymity of sensor node was high. It showed that an important element to increase the degree of anonymity was to let the sensor’s ID not known correctly. Also, as a result of calculating spaces for operation, communication, and storage while considering the characteristic of sensor network, which is limited in resource, it showed suitability for sensor network environment.
Journal of the Korea Academia-Industrial cooperation Society | 2009
So-Yeon Min; Yong-Hoon Jung
This paper suggests that location tracking system by RFID. It uses the location tracking and the authentication to entrance after inserts passive RFID tag into user Identification card. The readers periodically broadcast their signal, and then the readers understand where users are by analyzing them. In one of tracking systems, it is possible to detect the area where user had stayed for the longest time during moving according to signal power, to know user moved path and user next moving path. Also, it can be used in entrance authentication system in security area by using tag ID value which stored to backend server.
international conference on hybrid information technology | 2008
Yong-Hoon Jung; Jung-Jae Kim; Moon-Seog Jun
The system proposed in this thesis allows acquiring security by using two dimensional array technique to enhance the security of the existing RFID system. The proposed system uses the value of UID which is an original ID value of RFID Tag and two dimensional array to authenticate between the tag and the reader. In order to code/decode in the proposed system, it uses the key set defined by the manager as well as the UID value which is the original ID value of the tag to prove excellence compared to other existing systems.
international conference on hybrid information technology | 2006
Yong-Hoon Jung; Jung-Jae Kim; Moon-Seog Jun
This paper proposes more various key generation algorithms than conventional encryption method, and more secure encryption method that does not keep each symmetric key of key generation algorithm in server. After implementing proposed system, we verify the system using various sizes of video data. We get the fact that proposed system can reduce the delay time of encryption and decryption at the replay of video data