- Advanced Authentication Protocols Security
- Cryptography and Data Security
- User Authentication and Security Systems
- Security in Wireless Sensor Networks
- Blockchain Technology Applications and Security
- Software-Defined Networks and 5G
- Cloud Data Security Solutions
- IoT and Edge/Fog Computing
- Cryptographic Implementations and Security
- Cryptography and Residue Arithmetic
- IPv6, Mobility, Handover, Networks, Security
- Caching and Content Delivery
- Chaos-based Image/Signal Encryption
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Privacy-Preserving Technologies in Data
- Security and Verification in Computing
- Digital Rights Management and Security
- Agriculture, Soil, Plant Science
- Coding theory and cryptography
- Internet Traffic Analysis and Secure E-voting
- Mobile Ad Hoc Networks
- Internet of Things and Social Network Interactions
- Metallurgy and Material Forming
- Military Defense Systems Analysis
Gyeongsang National University
2024-2025
Dongseo University
2011-2023
Daegu University
2007
Busan National University of Education
2002
Inha University
1991
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and provided with unique identifiers to enable their self-identification other devices ability continuously generate data transmit it network. Hence, security network, sensor paramount concern in IoT network as grows very fast terms exchanged interconnected nodes. This paper analyses authentication access control method using presented by Jing et al. (Authentication Access Control Things. In...
In this paper we build an MQTT(Message Queue Telemetry Transportation) broker on Amazon Web Service(AWS). The MQTT has been utilized as a platform to provide the Internet of Things(IoT) services which monitor and control room temperatures, sense, alarm, suppress fire. Arduino was used IoT end device connecting sensors actuators via Wi-Fi channel. We created smart home scenario designed massages satisfying requirement. also implemented some system in hardware software, verified operation....
Endophytic fungi play a vital role in protecting and promoting the growth of their host plants. The diversity fungal endophytes has been documented across different plant species varies depending on factors such as host, ecological conditions, health status plant. We isolated endophytic from Prunus yedoensis trees with decay rates. A total 31 were decayed trees, while 33 obtained healthy trees. number exhibiting antifungal activities against wood was higher 10 showing activity compared to...
Many researchers challenge the possibility of using blockchain and smart contracts to disrupt Internet Things (IoT) architecture because their security decentralization guarantees. However, state-of-the-art is not scalable enough satisfy requirements massive data traffics in IoT environment. The main reason for this issue one needs choose consensus trade-off between either coping with a high throughput or number nodes. Consequently, prevents applicability use cases. In paper, we propose...
AI has been implemented in many sectors such as security, health, finance, national defense, etc. However, together with AI’s groundbreaking improvement, some people exploit to do harmful things. In parallel, there is rapid development cloud computing technology, introducing a cloud-based system. Unfortunately, the vulnerabilities will also affect security of services. We observe that compromising training data integrity means results system itself. From this background, we argue it...
In software-defined network (SDN), the southbound protocol defines communication between control plane and data plane. The agreed protocol, OpenFlow, suggests securing with Transport Layer Security (TLS). However, most current SDN projects do not implement security segment, only a few exceptions such as OpenDayLight, HP VAN SDN, ONOS implementing TLS in communication. From telecommunication providers’ perspective, one of major consumers besides centers, becomes much more complicated addition...
The Internet of Things (IoT) providers serve better IoT services each year while producing more gateways and devices to expand their services. However, the security ecosystem remains an afterthought for most providers. This action results in many cybersecurity breaches field, likely due lack access control mechanisms. In this paper, we propose BorderChain, framework based on blockchain endpoints. protocol guarantees two properties. First, our proposal assures users that they communicate with...
Since the inception of Internet Things (IoT), we have adopted centralized architecture for decades. With vastly growing number IoT devices and gateways, this struggles to cope with high demands state-of-the-art services, which require scalable responsive infrastructure. In response, decentralization becomes a considerable interest among adopters. Following similar trajectory, paper introduces an re-work that enables three spheres workflows (i.e., computing, storage, networking) be run in...
In recent years, wireless sensor networks (WSNs) have been considered as a potential solution for real-time monitoring applications and these WSNs practical impact on next generation technology too. However, could become threat if suitable security is not before the deployment there are any loopholes in their security, which might open door an attacker hence, endanger application. User authentication one of most important services to protect WSN data access from unauthorized users; it should...
Energy efficiency is one of the major concerns in designing protocols for WSNs. One energy-efficient communication this network LEACH that works on cluster-based homogeneous Though but it does not take security into account. Because WSNs are usually deployed remote and hostile areas, becomes a concern protocol. In paper we present our analysis five have been proposed to strengthen protocols. Those SLEACH, SecLEACH, SC-LEACH, Armor MS-LEACH.
Software Defined Networking (SDN) is a promising step towards the future network. But, it still has some issue regarding security. One of security issues augmented impact Denial Service (DoS) attacks. In this paper, we create an application on top Beacon controller to mitigate DoS attacks in OpenFlow networks. The include IP/MAC Spoofing and Bulky/Garbage Message. We launch network analyze performance application. All these attacks, Beacon, are implemented simulation environment Mininet. At...
The state-of-the-art centralized Internet of Things (IoT) data flow pipeline has started aging since it cannot cope with the vast number newly connected IoT devices. As a result, community begins transition to decentralized encourage and resource sharing. However, move is not trivial. With many instances allocating or service arbitrarily, how can we guarantee correctness processes that other parties offer. Furthermore, in case dispute, assist determining which party guilty faulty behavior....
Ganoderma (Ganodermataceae, Basidiomycota) species are medicinally and economically important wood-decaying fungi occurring throughout the world. Since 2022, unrecorded have been collected in Jinju Busan, Korea. The hosts of fungal were Platanus Prunus species. Based on morphological characteristics molecular phylogenetic analysis, this was identified as G. gibbosum. Description, macroscopic microscopic photographs, a phylogeny based ITS sequences provided here.
Pollutants can exist in the soil for a long time and alter bacterial community. Using lubricants to prevent wear of chainsaw blades is necessary thinning activities wood harvesting. We investigated influences contamination with on communities. Bio-oil, mineral oil, recycled oil were scattered each treatment investigate variations structure during treated periods using Illumina MiSeq sequencing platform. The results obtained 5943 ASVs, 5112 6136 ASVs after at one month, six months, twelve...
In distributed software-defined network (SDN), the east/west-bound protocol describes communication between SDN controllers. The security of ensures that no malicious controllers are eavesdropping on or even driving network. Southbound defines control plane and data plane. It is also only channel with an agreed protocol, OpenFlow. OpenFlow suggests securing southbound Transport Layer Security (TLS). However, most current projects do not implement segment in both communications. Only a few...
Federated learning enables multiple users to collaboratively train a global model using the users’ private data on local machines. This way, are not required share their training with other parties, maintaining user privacy; however, vanilla federated proposal is mainly assumed be run in trusted environment, while actual implementation of expected performed untrusted domains. paper aims use blockchain as platform realize missing “running domain” requirement. First, we investigate federate...
Most existing data integrity auditing protocols in cloud storage rely on proof of probabilistic possession. Consequently, the sampling rate verification is low to prevent expensive costs auditor. However, case a multi-cloud environment, amount stored will be huge. As result, higher needed. It also have an increased cost for auditor as consequence. Therefore, this paper proposes blockchain-based distributed protocol environments that enables using multi-verifiers. The proposed scheme aims...
This paper presents a user authentication scheme for healthcare application using wireless medical sensor networks (WMSNs), where sensors are used patients monitoring. These sensors' sense the patient body data and transmit it to professionals (e.g., doctors, nurses, surgeons). Since, of an individual highly vulnerable, must ensures that vital signs secure, not exposed unauthorized person. In this regards, we propose networks. The proposed includes: novel two-factor (user authentication),...
Several techniques using technology based on biometrics, passwords, certificates, and smart cards can be used for user authentication in the accessible network system. One of most popular areas OTP protocol authenticating a by server. It increases security new password each while previous scheme iteratively uses same password. In this paper we propose secure with one time PingPong128 stream cipher.