Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where YoungHo Park is active.

Publication


Featured researches published by YoungHo Park.


Eurasip Journal on Wireless Communications and Networking | 2011

A USIM-based uniform access authentication framework in mobile communication

Xinghua Li; Jianfeng Ma; YoungHo Park; Li Xu

With the rapid development of the mobile communication and wireless access technologies, the interworking of heterogeneous networks turns into a trend and various wireless networks are getting connected with the mobile core networks through different measures. At present, in mobile communication, though access authentication methods of various access networks are different from each other, they are all based on the unique authentication algorithm in (U)SIM, which results in several drawbacks and cannot fulfill the requirements of the future mobile communications. The underlying reason is the authentication algorithm is not extensible and the authentication framework is not independent of the communication technologies. In order to solve this problem, we propose a uniform access authentication framework. Making use of the extensive authentication protocol EAP, we add a media-independent authentication layer in USIM which outputs the uniform keys after an authentication, and a key adaptation layer is designed in the terminals which transforms the output keys accordingly to meet the specific requirements of various communication modules. In such a method, USIM is extensible in authentication algorithms and the authentication framework is independent of the communication technologies. Our analysis indicates that the proposed scheme is of great advantages over the current one.


IEEE Transactions on Wireless Communications | 2010

Key Infection, Secrecy Transfer, and Key Evolution for Sensor Networks

Zhihong Liu; Jianfeng Ma; Qingqi Pei; Liaojun Pang; YoungHo Park

Sensor networks are composed of a large number of low power sensor devices. For secure communication among sensors, secret keys are required to be established between them. Considering the strict resource constraints of sensors, key infection has been proposed by Anderson, Chan, and Perrig. However, because the communication keys are broadcasted in plaintext in key infection, some of them may be eavesdropped by an adversary. To address this security issue, secrecy transfer is presented, which utilizes pre-loaded secret keying material to enhance the security performance of key infection. To thwart on-going cryptanalytic attacks, a key evolution scheme is proposed to continuously refresh shared keys. Key evolution forces the adversary to keep monitoring traffic all the time after compromising a key; even if the adversary has compromised a key, it cannot catch up with the key evolution process, and may lose control of the compromised key quickly in a noisy communication environment. Analysis results show that key infection, secrecy transfer, and key evolution present viable trade-offs between security and resource consumption for smart dust sensor networks.


IEEE Journal of Biomedical and Health Informatics | 2018

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment

Ashok Kumar Das; Mohammad Wazid; Neeraj Kumar; Muhammad Khurram Khan; Kim-Kwang Raymond Choo; YoungHo Park

Wearable devices are used in various applications to collect information including step information, sleeping cycles, workout statistics, and health-related information. Due to the nature and richness of the data collected by such devices, it is important to ensure the security of the collected data. This paper presents a new lightweight authentication scheme suitable for wearable device deployment. The scheme allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal (e.g., Android and iOS device) and establish a session key among these devices (worn and carried by the same user) for secure communication between the wearable device and the mobile terminal. The security of the proposed scheme is then demonstrated through the broadly accepted real-or-random model, as well as using the popular formal security verification tool, known as the Automated validation of Internet security protocols and applications. Finally, we present a comparative summary of the proposed scheme in terms of the overheads such as computation and communication costs, security and functionality features of the proposed scheme and related schemes, and also the evaluation findings from the NS2 simulation.


Journal of The Optical Society of Korea | 2009

Frequency Swept Laser at 1300 nm Using a Wavelength Scanning Filter Based on a Rotating Slit Disk

Mansik Jeon; Unsang Jung; Jae-Won Song; Jeehyun Kim; Junghwan Oh; Jin-Seob Eom; Chang-Seok Kim; YoungHo Park

A simple and compact frequency swept laser is demonstrated at


Mobile Networks and Applications | 2011

Authentications and Key Management in 3G-WLAN Interworking

Xinghua Li; Xiang Lu; Jianfeng Ma; Zhenfang Zhu; Li Xu; YoungHo Park

1.3{mu}m


International Journal of Distributed Sensor Networks | 2013

Anonymous Cluster-Based MANETs with Threshold Signature

YoHan Park; YoungHo Park; SangJae Moon

using a wavelength scanning filter based on a rotating slit disk. The laser is comprised of a pigtailed semiconductor optical amplifier, a circulator, and a wavelength scanning filter in an extended cavity configuration. The wavelength scanning filter is composed of a collimator, a diffraction grating, a rotating slit disk, and a mirror. The instantaneous laser output power is more than 5 mW. The scanning range of the laser is extended to 80 nm at the maximum level, and 55 nm in the full width at half maximum at a scanning rate of 2 kHz.


communications and mobile computing | 2012

Data security in unattended wireless sensor networks with mobile sinks

Zhihong Liu; Jianfeng Ma; YoungHo Park; Shangrong Xiang

The successful deployment of WLAN for high speed data transmission and 3G cellular systems for wide coverage and global roaming has emerged to be a complementary platform for wireless data communications. But security in the 3G-WLAN interworking, especially the efficient authentication and valid key management, has been remaining a challenging issue. What’s more, some emerging security challenges are neglected by 3GPP specifications as well as the previous studies. This paper first analyzes and evaluates the current contributions in this field, and then puts forward some design issues. Thereafter, by modifying the EAP-AKA keying framework we propose an improved authentication scheme which enables a WLAN user to efficiently access packet switch services through the 3G networks. What’s more, through the new keying framework the user can efficiently realize the future re-authentications and handover authentications. The proposed authentication scheme, the corresponding re-authentications and handover authentications are simulated, and results indicate that our scheme can reduce authentication latency significantly.


IEEE Access | 2017

Design of Lightweight Authentication and Key Agreement Protocol for Vehicular Ad Hoc Networks

Mohammad Wazid; Ashok Kumar Das; Neeraj Kumar; Vanga Odelu; Alavalapati Goutham Reddy; Kisung Park; YoungHo Park

Security supports are a significant factor in the design of security system in ad hoc networks. It is particularly important to protect the identities of individual nodes to avoid personal privacy concerns. In this paper, we propose a security system for ID-based anonymous cluster-based MANETs to protect the privacy of nodes. Moreover, we propose a threshold signature scheme without pairing computations, which diminishes the computation load on each node. To the best of our knowledge, our proposed security system is the first in which the pseudonym is combined with cluster-based mobile ad hoc networks (MANETs) without a trusted entity. According to our protocol analysis, our proposal satisfies most properties for an anonymous security system and effectively copes with dynamic environments with greater efficiency by using secret sharing schemes. Therefore, it could be usefully applied to preserve privacy in dynamic MANETs without a trusted entity, such as military battlefields, emergency areas, mobile marketplaces, and vehicular ad hoc networks (VANETs).


IEEE Access | 2017

Provably Secure and Efficient Authentication Protocol for Roaming Service in Global Mobility Networks

Kisung Park; YoungHo Park; YoHan Park; Alavalapati Goutham Reddy; Ashok Kumar Das

Unattended wireless sensor networks operating in hostile environments face the risk of compromise. Given the unattended nature, sensors must safeguard their sensed data of high value temporarily. However, saving data inside a network creates security problems due to the lack of tamper-resistance of sensors and the unattended nature of the network. In some occasions, a network controller may periodically dispatch mobile sinks to collect data. If a mobile sink is given too many privileges, it will become very attractive for attack. Thus, the privilege of mobile sinks should be restricted. Additionally, secret keys should be used to achieve data confidentiality, integrity, and authentication between communicating parties. To address these security issues, we present mAKPS, an asymmetric key predistribution scheme with mobile sinks, to facilitate the key distribution and privilege restriction of mobile sinks, and schemes for sensors to protect their collected data in unattended wireless sensor networks. Copyright


IEEE Access | 2017

On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems

Santanu Chatterjee; Sandip Roy; Ashok Kumar Das; Samiran Chattopadhyay; Neeraj Kumar; Alavalapati Goutham Reddy; Kisung Park; YoungHo Park

Due to the widespread popularity in both academia and industry, vehicular ad hoc networks (VANETs) have been used in a wide range of applications starting from intelligent transportation to e-health and itinerary planning. This paper proposes a new decentralized lightweight authentication and key agreement scheme for VANETs. In the proposed scheme, there are three types of mutual authentications: 1) between vehicles; 2) between vehicles and their respective cluster heads; and 3) between cluster heads and their respective roadside units. Apart from these authentications, the proposed scheme also maintains secret keys between roadside units for their secure communications. The rigorous formal and informal security analysis shows that the proposed scheme is capable to defend various malicious attacks. Moreover, the ns-2 simulation demonstrates the practicability of the proposed scheme in VANET environment.

Collaboration


Dive into the YoungHo Park's collaboration.

Top Co-Authors

Avatar

YoHan Park

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ashok Kumar Das

International Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Sun-Young Ihm

Sookmyung Women's University

View shared research outputs
Top Co-Authors

Avatar

SangJae Moon

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

SungYup Lee

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hwangjun Song

Pohang University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge