Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Young-Gu Lee is active.

Publication


Featured researches published by Young-Gu Lee.


Sensors | 2011

A Study on Group Key Agreement in Sensor Network Environments Using Two-Dimensional Arrays

Seung-Jae Jang; Young-Gu Lee; Kwang-Hyung Lee; Tai-hoon Kim; Moon-Seog Jun

These days, with the emergence of the concept of ubiquitous computing, sensor networks that collect, analyze and process all the information through the sensors have become of huge interest. However, sensor network technology fundamentally has wireless communication infrastructure as its foundation and thus has security weakness and limitations such as low computing capacity, power supply limitations and price. In this paper, and considering the characteristics of the sensor network environment, we propose a group key agreement method using a keyset pre-distribution of two-dimension arrays that should minimize the exposure of key and personal information. The key collision problems are resolved by utilizing a polygonal shape’s center of gravity. The method shows that calculating a polygonal shape’s center of gravity only requires a very small amount of calculations from the users. The simple calculation not only increases the group key generation efficiency, but also enhances the sense of security by protecting information between nodes.


ubiquitous computing | 2011

Study on Group Key Agreement Using Two-Dimensional Array in Sensor Network Environment

Seung-Jae Jang; Young-Gu Lee; Hoon Ko; Moon-Seog Jun

These days, with the implementation of ubiquitous computing concept, sensor networks that collect analyze and process information of things and environment through sensors have become a huge interest as the technology that would realize this concept. However, sensor network technology has wireless communication infrastructure as its foundation and fundamentally has security weakness with limitations on low computing capacity, power supply and low budget. The core of group telecommunications between sensor network sensor nodes is the group key management. Managing group key requires appreciating group key security and management mechanism efficiency. This paper takes the characteristics of sensor network into consideration and not only increases the group key agreement efficiency through Two-dimension array key set distribution and not the existing group key method to satisfy both the network function and security but also protects information between each nodes thereby enhancing the sense of security.


ubiquitous computing | 2011

Implement of Integrated Solution for Zoos Using RFID/USN Based LBS Technology

Jae-Young Kim; Young-Gu Lee; Kwang-Hyong Lee; Moon-Seog Jun

In addition to the diffusion of internet, the advancements in information communication technology have continued with the appearances of numerous new technologies and supply of new services. Ubiquitous computing has also been developed based on such technologies and is the most representative information communication technology that has been developed. The wireless communication technology of ubiquitous computing does not only provide useful services in industries but also in various environments including households, schools and hospitals. This paper suggests the system that accurately confirms the location of the moving body by fusing the communications network and USN based RFID and based on that provides various services. Based on the location confirmation of the moving body, the various service systems are being developed and provided in hospitals, ports and distribution centers and this paper proposes the integrated service system for zoos and theme parks. The sensor with its distinct ID is attached to children, who are the major subjects for protection in zoos and theme parks, to search the proximity contents with the location information gained through the RFID receiver located in the elements throughout the zoo and output the searched contents through the output device. Moreover, the current location information and course of the moving body is used to provide services to protect children from getting lost. Along with the supply of education contents suited to the situation of the moving body, the specialized integrated service is materialized to take measures when children get lost in zoos.


international conference on software engineering | 2009

Design and Implementation of Multi Authentication Mechanism for Secure Electronic Commerce

Hyun-Chul Kim; Young-Gu Lee; Kying-Seok Lee; Moon-Seog Jun

This paper proposed mechanism of multiple certification for secure electronic transaction. Existing OTP mechanism can’t guarantee certification and non-repudiation by certification request information asynchronization and involves replay attack risk due to the uniformity of password creation time period. This paper intends to guarantee non-repudiation, confidentiality and integrity and prevent replay attack by requesting certification through OTP by creating and holding password asynchronously among transaction parties along with certificate. In addition, regarding each verification request, the mechanism provides with availability and high security by processing the request separately for certificate verification and OTP verification. Consequently, the mechanism was able to guarantee the safety in electronic transaction, and to confirm that it demonstrates excellence in replay attack, non-repudiation, availability and certification strength etc also in comparison and analysis through experiment with existing OTP mechanism.


ubiquitous computing | 2011

A Group Key Exchange Scheme Using Two-Dimensional Array between Sensor Nodes in Sensor Network Environment

Seung-Jae Jang; Young-Gu Lee; Jeong-Jae Kim; Hoon Ko; Moon-Seog Jun

These days, with the implementation of ubiquitous computing concept, sensor networks that collect analyze and process information of things and environment through sensors have become a huge interest as the technology that would realize this concept. However, sensor network technology has wireless communication infrastructure as its foundation and fundamentally has security weakness with limitations on low computing capacity, power supply and low budget. The core of group telecommunications between sensor network sensor nodes is the group key management. Managing group key requires appreciating group key security and management mechanism efficiency. This paper takes the characteristics of sensor network into consideration and not only increases the group key agreement efficiency through Two-dimension array key set distribution and not the existing group key method to satisfy both the network function and security but also protects information between each nodes thereby enhancing the sense of security.


ubiquitous computing | 2011

Real-Time Monitoring System Using Location Based Service

Jae-Hwe You; Young-Gu Lee; Moon-Seog Jun

In this thesis, the future-oriented system using RFID technology was developed for figure out the number of people following by the guide promptly and effectively every time location changes. By having the tourists carry RFID tag, the group leader can check the number of the tourists by collecting the information on surrounding tags real-time through PDA with attached RFID reader. To make this feasible, the RFID based location check for the group members were made possible. To examine the safety of the proposed system, the directionality of antenna was tested. The result showed that the presence of the followers can be easily checked using the reader, processing the signals from the active tag, it could overcome the limitations of the location which the existing the prevention of lost children system in theme parks.


ubiquitous computing | 2011

Location Based Service Using 2.45GHz Active Tag

Jae-Hwe You; Young-Gu Lee; Moon-Seog Jun

In this thesis, the future-oriented system using RFID technology was developed for figure out the number of people following by the guide promptly and effectively every time location changes. By having the tourists carry RFID tag, the group leader can check the number of the tourists by collecting the information on surrounding tags real-time through PDA with attached RFID reader. To make this feasible, the RFID based location check for the group members were made possible. To examine the safety of the proposed system, the directionality of antenna was tested. The result showed that the presence of the followers can be easily checked using the reader, processing the signals from the active tag, it could overcome the limitations of the location which the existing the prevention of lost children system in theme parks.


ubiquitous computing | 2011

Realization of Integrated Service for Zoos Using RFID/USN Based Location Tracking Technology

Jae-Yong Kim; Young-Gu Lee; Kwang-Hyong Lee; Moon-Seok Jun

In addition to the diffusion of internet, the advancements in information communication technology have continued with the appearances of numerous new technologies and supply of new services. Ubiquitous computing has also been developed based on such technologies and is the most representative information communication technology that has been developed. The wireless communication technology of ubiquitous computing does not only provide useful services in industries but also in various environments including households, schools and hospitals. This paper suggests the system that accurately confirms the location of the moving body by fusing the communications network and USN based RFID and based on that provides various services. Based on the location confirmation of the moving body, the various service systems are being developed and provided in hospitals, ports and distribution centers and this paper proposes the integrated service system for zoos and theme parks. The sensor with its distinct ID is attached to children, who are the major subjects for protection in zoos and theme parks, to search the proximity contents with the location information gained through the RFID receiver located in the elements throughout the zoo and output the searched contents through the output device. Moreover, the current location information and course of the moving body is used to provide services to protect children from getting lost. Along with the supply of education contents suited to the situation of the moving body, the specialized integrated service is materialized to take measures when children get lost in zoos.


Journal of the Korea Academia-Industrial cooperation Society | 2010

Group Key Generation Scheme using Logical Operation of HashChain and Random Number in Hierarchy Structures

Hyun-Chul Kim; Young-Gu Lee; Jung-Jae Kim; Kwang-Hyung Lee

Abstract In this paper, requirements of efficient group key creation in multiple hierarchy structure environment with clear distinction of hierarchical roles within organizations are explained and the method of creating a group key that satisfies such requirements is proposed. The proposed method creates the group key through logical sum operation of hierarchy identifier created using uni-directional hash chain and group identifier randomly created according to the access right. The problem of excessive possession of key information by upper group users in the existing static group key creation technique was resolved. At the same time, lower group users were prevented from deducing key information of upper group users. In addition, as a result of comparative analysis performed with an experiment on existing super group key creation technique and multiple hierarchy group key method, the proposed method was found to be equivalent or superior to existing method in terms of various items including the total number of keys created, the number of keys possessed by users, the number of keys used for encoding and decoding of information, and expandability of keys.


international conference on software engineering | 2009

Design and Implementation of Security Protocol for Home-Network

Hyun-Chul Kim; Young-Gu Lee; Kying-Seok Lee; Moon-Seog Jun

Home network is required for installment, simple & convenient use, expensive cost, various application service. Security is essential requirement for the interlock of intranet and extranet.To control home network by outside user terminal, this paper proposes that the outside client connects home server using SOAP(Simple Object Access Protocol) message. Based on x.509 v3,the proposed system controls deviceby dividing into user groups in the extention area ofx.509 v3. This paper proposes the access control method by adding limited devices to the ACL(Access Control List) and by distinguishing between limited users and a administrator for each device.

Collaboration


Dive into the Young-Gu Lee's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge