Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yong-Hoon Jung is active.

Publication


Featured researches published by Yong-Hoon Jung.


ubiquitous computing | 2011

A Privacy Technique for Providing Anonymity to Sensor Nodes in a Sensor Network

Jeong-Hyo Park; Yong-Hoon Jung; Hoon Ko; Jeong-Jai Kim; Moon-Seog Jun

Research on sensor network had been focused on security services that provide authentication, confidentiality, integrity and availability until recently, but now there is growing interest in tackling the problem of actual sensor IDs being exposed. Many techniques for providing anonymity to the source in an ad-hoc network have been proposed, but they are not suitable. Thus, a technique that is well-suited to the characteristics of sensor networks is needed. This paper, limiting the type of attack against a sensor network to that of eavesdropping, proposes a new technique for providing anonymity using Phantom ID and SMAC. The degree of anonymity provided by the proposed technique was analyzed using an entropy-based modeling technique. The results showed that the anonymity is high when the proposed technique is used. The key factor responsible for the improved anonymity had to do with disguising the sensor ID so that it cant be found easily.


The Smart Computing Review | 2011

A Fast Authentication System for Home Network Devices Using Two Dimension Array

Yong-Hoon Jung; Seung-Jae Jang; So Yeon Min; Moon-Seog Jun

Home network is one composition of several various devices and has been expanded according to the development of those devices. The number and quantity of digital contents have been growing to various ways. However, it is not easy to protect a copyright of the digital contents continuously since it has a lack of operating the devices which need multimedia contents. It is also not easy to reissue a license from DRM server to move the contents the exterior requests. To solve those inconveniences, this thesis has suggested the authentication method between the devices using a certain framework. In the framework, the contents can move to another device without reissuing a license through interacts of the devices from DRM server, using two dimension array. In addition, even if all members of family access home network externally, it is designed to be able to use home network contents through a simple authentication of devices.


ubiquitous computing | 2011

A New Privacy Scheme for Providing Anonymity Technique on Sensor Network

Jeong-Hyo Park; Yong-Hoon Jung; Kwang-Hyung Lee; Hoon Ko; Moon-Seog Jun

Research on sensor network had been focused on security services that provide authentication, confidentiality, integrity and availability until recently, but now there is growing interest in tackling the problem of actual sensor IDs being exposed. Many techniques for providing anonymity to the source in an ad-hoc network have been proposed, but they are not suitable. Thus, a technique that is well-suited to the characteristics of sensor networks is needed. This paper, limiting the type of attack against a sensor network to that of eavesdropping, proposes a new technique for providing anonymity using Phantom ID and SMAC. The degree of anonymity provided by the proposed technique was analyzed using an entropy-based modeling technique. The results showed that the anonymity is high when the proposed technique is used. The key factor responsible for the improved anonymity had to do with disguising the sensor ID so that it cant be found easily.


Journal of the Korea Academia-Industrial cooperation Society | 2009

A Study on Convenient Move of Digital Contents Between Devices Using RFID in Home Network

Eun-Hwan Kim; Yong-Hoon Jung; Moon-Seog Jun

Home network is a network composed of devices in home and is being expanded by evolving devices. Also, The number of digital contents in home network has been increasing steadily. But it is difficult to continually protect the rights of digital contents due to lack of interoperability among contents devices. Besides, a license has to be re-issued by DRM sever for contents transfer between devices. Thus, this paper proposes framework which can freely transfer and contents to another device through mutual device authentication and a system that can decrease overload of license management of the DRM sever and that enable device outside home network to use contents through user authentication.


The Smart Computing Review | 2012

Convenient Move of Digital Content Using RFID in Home Networks

Yong-Hoon Jung; Jeong-Hyo Park; Kwang-Hyung Lee

A home network consists of home appliances, and they are being expanded with home appliance development. The amount of digital content in home networks is therefore increasing tremendously. But continuous protection of digital content authentication is difficult, because of a lack of digital content management between devices. Devices should reissue licenses from DRM servers, and then content will be able to shift toward each device. In this paper, a framework which freely moves digital content by device authentication to other devices in a home network is proposed. In addition, a system which reduces a DRM servers work with license issues and management, and the even outside approaches, will be able to control the system by device authentication from a home network sever.


The Smart Computing Review | 2011

A New Privacy Scheme for Providing Anonymity Techniques on Sensor Network

Jeong-Hyo Park; Yong-Hoon Jung; Kwang-Hyung Lee; Keun-Wang Lee; Moon-Seog Jun

Research on sensor network had been focused on security services that provide authentication, confidentiality, integrity and availability until recently, but now there is growing interest in tackling the problem of actual sensor IDs being exposed. Many techniques for providing anonymity to the source in an ad-hoc network have been proposed, but they are not suitable. Thus, a technique that is well-suited to the characteristics of sensor networks is needed. This paper, limiting the type of attack against a sensor network to that of eavesdropping, proposes a new technique for providing anonymity using Phantom ID and SMAC. The degree of anonymity provided by the proposed technique was analyzed using an entropy-based modeling technique. The results showed that the anonymity is high when the proposed technique is used. The key factor responsible for the improved anonymity had to do with disguising the sensor ID so that it cant be found easily.


International Conference on Grid and Distributed Computing | 2011

An Enhanced Data Privacy Mechanism Suitable for Ubiquitous Sensor Networks

Jeong-Hyo Park; Yong-Hoon Jung; Kwang-Hyung Lee; Keun-Wang Lee; Moon-Seog Jun

Sensor network maintains high limitation of resource because it performs many communications in order to create encryption keys. To solve this problem, this research suggests LA2EP. LA2EP Protocol can minimize resource and provides a new scheme for authentication and encryption that can provide anonymity of node for safe communication. To analyze the performance of the suggested scheme, a degree of anonymity that is provided by the scheme suggested by using an Entropy-based modeling was measured. As a result, when the suggested scheme was used, the degree of anonymity of sensor node was high. It showed that an important element to increase the degree of anonymity was to let the sensor’s ID not known correctly. Also, as a result of calculating spaces for operation, communication, and storage while considering the characteristic of sensor network, which is limited in resource, it showed suitability for sensor network environment.


Journal of the Korea Academia-Industrial cooperation Society | 2009

Implementation of Multidimensional Trace System for Specific Object by RFID

So-Yeon Min; Yong-Hoon Jung

This paper suggests that location tracking system by RFID. It uses the location tracking and the authentication to entrance after inserts passive RFID tag into user Identification card. The readers periodically broadcast their signal, and then the readers understand where users are by analyzing them. In one of tracking systems, it is possible to detect the area where user had stayed for the longest time during moving according to signal power, to know user moved path and user next moving path. Also, it can be used in entrance authentication system in security area by using tag ID value which stored to backend server.


international conference on hybrid information technology | 2008

A Study on Authentication Protocol for Secure RFID Tag

Yong-Hoon Jung; Jung-Jae Kim; Moon-Seog Jun

The system proposed in this thesis allows acquiring security by using two dimensional array technique to enhance the security of the existing RFID system. The proposed system uses the value of UID which is an original ID value of RFID Tag and two dimensional array to authenticate between the tag and the reader. In order to code/decode in the proposed system, it uses the key set defined by the manager as well as the UID value which is the original ID value of the tag to prove excellence compared to other existing systems.


international conference on hybrid information technology | 2006

DRM Encryption System using the Key Exchange with Matrix Puzzle

Yong-Hoon Jung; Jung-Jae Kim; Moon-Seog Jun

This paper proposes more various key generation algorithms than conventional encryption method, and more secure encryption method that does not keep each symmetric key of key generation algorithm in server. After implementing proposed system, we verify the system using various sizes of video data. We get the fact that proposed system can reduce the delay time of encryption and decryption at the replay of video data

Collaboration


Dive into the Yong-Hoon Jung's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge