Young-Gu Lee
Soongsil University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Young-Gu Lee.
Sensors | 2011
Seung-Jae Jang; Young-Gu Lee; Kwang-Hyung Lee; Tai-hoon Kim; Moon-Seog Jun
These days, with the emergence of the concept of ubiquitous computing, sensor networks that collect, analyze and process all the information through the sensors have become of huge interest. However, sensor network technology fundamentally has wireless communication infrastructure as its foundation and thus has security weakness and limitations such as low computing capacity, power supply limitations and price. In this paper, and considering the characteristics of the sensor network environment, we propose a group key agreement method using a keyset pre-distribution of two-dimension arrays that should minimize the exposure of key and personal information. The key collision problems are resolved by utilizing a polygonal shape’s center of gravity. The method shows that calculating a polygonal shape’s center of gravity only requires a very small amount of calculations from the users. The simple calculation not only increases the group key generation efficiency, but also enhances the sense of security by protecting information between nodes.
ubiquitous computing | 2011
Seung-Jae Jang; Young-Gu Lee; Hoon Ko; Moon-Seog Jun
These days, with the implementation of ubiquitous computing concept, sensor networks that collect analyze and process information of things and environment through sensors have become a huge interest as the technology that would realize this concept. However, sensor network technology has wireless communication infrastructure as its foundation and fundamentally has security weakness with limitations on low computing capacity, power supply and low budget. The core of group telecommunications between sensor network sensor nodes is the group key management. Managing group key requires appreciating group key security and management mechanism efficiency. This paper takes the characteristics of sensor network into consideration and not only increases the group key agreement efficiency through Two-dimension array key set distribution and not the existing group key method to satisfy both the network function and security but also protects information between each nodes thereby enhancing the sense of security.
ubiquitous computing | 2011
Jae-Young Kim; Young-Gu Lee; Kwang-Hyong Lee; Moon-Seog Jun
In addition to the diffusion of internet, the advancements in information communication technology have continued with the appearances of numerous new technologies and supply of new services. Ubiquitous computing has also been developed based on such technologies and is the most representative information communication technology that has been developed. The wireless communication technology of ubiquitous computing does not only provide useful services in industries but also in various environments including households, schools and hospitals. This paper suggests the system that accurately confirms the location of the moving body by fusing the communications network and USN based RFID and based on that provides various services. Based on the location confirmation of the moving body, the various service systems are being developed and provided in hospitals, ports and distribution centers and this paper proposes the integrated service system for zoos and theme parks. The sensor with its distinct ID is attached to children, who are the major subjects for protection in zoos and theme parks, to search the proximity contents with the location information gained through the RFID receiver located in the elements throughout the zoo and output the searched contents through the output device. Moreover, the current location information and course of the moving body is used to provide services to protect children from getting lost. Along with the supply of education contents suited to the situation of the moving body, the specialized integrated service is materialized to take measures when children get lost in zoos.
international conference on software engineering | 2009
Hyun-Chul Kim; Young-Gu Lee; Kying-Seok Lee; Moon-Seog Jun
This paper proposed mechanism of multiple certification for secure electronic transaction. Existing OTP mechanism can’t guarantee certification and non-repudiation by certification request information asynchronization and involves replay attack risk due to the uniformity of password creation time period. This paper intends to guarantee non-repudiation, confidentiality and integrity and prevent replay attack by requesting certification through OTP by creating and holding password asynchronously among transaction parties along with certificate. In addition, regarding each verification request, the mechanism provides with availability and high security by processing the request separately for certificate verification and OTP verification. Consequently, the mechanism was able to guarantee the safety in electronic transaction, and to confirm that it demonstrates excellence in replay attack, non-repudiation, availability and certification strength etc also in comparison and analysis through experiment with existing OTP mechanism.
ubiquitous computing | 2011
Seung-Jae Jang; Young-Gu Lee; Jeong-Jae Kim; Hoon Ko; Moon-Seog Jun
These days, with the implementation of ubiquitous computing concept, sensor networks that collect analyze and process information of things and environment through sensors have become a huge interest as the technology that would realize this concept. However, sensor network technology has wireless communication infrastructure as its foundation and fundamentally has security weakness with limitations on low computing capacity, power supply and low budget. The core of group telecommunications between sensor network sensor nodes is the group key management. Managing group key requires appreciating group key security and management mechanism efficiency. This paper takes the characteristics of sensor network into consideration and not only increases the group key agreement efficiency through Two-dimension array key set distribution and not the existing group key method to satisfy both the network function and security but also protects information between each nodes thereby enhancing the sense of security.
ubiquitous computing | 2011
Jae-Hwe You; Young-Gu Lee; Moon-Seog Jun
In this thesis, the future-oriented system using RFID technology was developed for figure out the number of people following by the guide promptly and effectively every time location changes. By having the tourists carry RFID tag, the group leader can check the number of the tourists by collecting the information on surrounding tags real-time through PDA with attached RFID reader. To make this feasible, the RFID based location check for the group members were made possible. To examine the safety of the proposed system, the directionality of antenna was tested. The result showed that the presence of the followers can be easily checked using the reader, processing the signals from the active tag, it could overcome the limitations of the location which the existing the prevention of lost children system in theme parks.
ubiquitous computing | 2011
Jae-Hwe You; Young-Gu Lee; Moon-Seog Jun
In this thesis, the future-oriented system using RFID technology was developed for figure out the number of people following by the guide promptly and effectively every time location changes. By having the tourists carry RFID tag, the group leader can check the number of the tourists by collecting the information on surrounding tags real-time through PDA with attached RFID reader. To make this feasible, the RFID based location check for the group members were made possible. To examine the safety of the proposed system, the directionality of antenna was tested. The result showed that the presence of the followers can be easily checked using the reader, processing the signals from the active tag, it could overcome the limitations of the location which the existing the prevention of lost children system in theme parks.
ubiquitous computing | 2011
Jae-Yong Kim; Young-Gu Lee; Kwang-Hyong Lee; Moon-Seok Jun
In addition to the diffusion of internet, the advancements in information communication technology have continued with the appearances of numerous new technologies and supply of new services. Ubiquitous computing has also been developed based on such technologies and is the most representative information communication technology that has been developed. The wireless communication technology of ubiquitous computing does not only provide useful services in industries but also in various environments including households, schools and hospitals. This paper suggests the system that accurately confirms the location of the moving body by fusing the communications network and USN based RFID and based on that provides various services. Based on the location confirmation of the moving body, the various service systems are being developed and provided in hospitals, ports and distribution centers and this paper proposes the integrated service system for zoos and theme parks. The sensor with its distinct ID is attached to children, who are the major subjects for protection in zoos and theme parks, to search the proximity contents with the location information gained through the RFID receiver located in the elements throughout the zoo and output the searched contents through the output device. Moreover, the current location information and course of the moving body is used to provide services to protect children from getting lost. Along with the supply of education contents suited to the situation of the moving body, the specialized integrated service is materialized to take measures when children get lost in zoos.
Journal of the Korea Academia-Industrial cooperation Society | 2010
Hyun-Chul Kim; Young-Gu Lee; Jung-Jae Kim; Kwang-Hyung Lee
Abstract In this paper, requirements of efficient group key creation in multiple hierarchy structure environment with clear distinction of hierarchical roles within organizations are explained and the method of creating a group key that satisfies such requirements is proposed. The proposed method creates the group key through logical sum operation of hierarchy identifier created using uni-directional hash chain and group identifier randomly created according to the access right. The problem of excessive possession of key information by upper group users in the existing static group key creation technique was resolved. At the same time, lower group users were prevented from deducing key information of upper group users. In addition, as a result of comparative analysis performed with an experiment on existing super group key creation technique and multiple hierarchy group key method, the proposed method was found to be equivalent or superior to existing method in terms of various items including the total number of keys created, the number of keys possessed by users, the number of keys used for encoding and decoding of information, and expandability of keys.
international conference on software engineering | 2009
Hyun-Chul Kim; Young-Gu Lee; Kying-Seok Lee; Moon-Seog Jun
Home network is required for installment, simple & convenient use, expensive cost, various application service. Security is essential requirement for the interlock of intranet and extranet.To control home network by outside user terminal, this paper proposes that the outside client connects home server using SOAP(Simple Object Access Protocol) message. Based on x.509 v3,the proposed system controls deviceby dividing into user groups in the extention area ofx.509 v3. This paper proposes the access control method by adding limited devices to the ACL(Access Control List) and by distinguishing between limited users and a administrator for each device.