- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Wireless Body Area Networks
- ECG Monitoring and Analysis
- Security in Wireless Sensor Networks
- Blockchain Technology Applications and Security
- IoT and Edge/Fog Computing
- Advanced Malware Detection Techniques
- Privacy, Security, and Data Protection
- UAV Applications and Optimization
- Advanced MIMO Systems Optimization
- Wireless Networks and Protocols
- FinTech, Crowdfunding, Digital Finance
- Privacy-Preserving Technologies in Data
- Smart Grid Energy Management
- IPv6, Mobility, Handover, Networks, Security
- Artificial Intelligence in Healthcare
- Internet Traffic Analysis and Secure E-voting
- Diabetes Management and Research
- COVID-19 diagnosis using AI
- RFID technology advancements
- Vehicular Ad Hoc Networks (VANETs)
- Advanced Wireless Communication Technologies
- Software-Defined Networks and 5G
- Cloud Data Security Solutions
Soonchunhyang University
2019-2022
Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development implementation of these devices have become vital terms usability reachability. Unfortunately, they widespread their demand grows, are becoming more vulnerable to several security attacks, including, but not limited to, jamming, information leakage, spoofing. In order cope with attacks threats, proper design robust protocols is...
The Internet of Medical Things (IoMT) has risen to prominence as a possible backbone in the health sector, with ability improve quality life by broadening user experience while enabling crucial solutions such near real-time remote diagnostics. However, privacy and security problems remain largely unresolved safety area. Various rule-based methods have been considered recognize aberrant behaviors IoMT demonstrated high accuracy misbehavior detection appropriate for lightweight IoT devices....
Advances of implantable medical devices (IMD) are transforming the traditional method providing treatment, especially those patients under most challenging condition. Accordingly, IMD-enabled artificial pancreas system (APS) has now reached global market. It helped many suffering from chronic disease, called diabetes mellitus, in monitoring and maintaining blood glucose level conveniently. However, this advancement is accompanied by various security threats that place life at risk. Hence,...
Cellular technology has evolved over the decades for mobile network operators to accommodate ever-growing demands of services connecting Vehicle-to-Everything (V2X). The 5G infrastructure facilitates V2X communications, where a small-cell base station operating at ultra-high radio frequency with limited coverage becomes pervasive. These stations in 5G-V2X must be strategically deployed near consumers realize several use cases. More recently, architectural split solutions Next Generation...
5G-assisted device-to-device (D2D) communication plays an instrumental role in minimizing latency, maximizing resource utilization, improving speed, and boosting system capacity. However, the technology confronts several challenges to realize its enormous potential fully. Security privacy concerns are at top of list that can jeopardize regular operation D2D by executing various assaults such as free-riding impersonation. Although researchers suggested different solutions these concerns, most...
Abstract 5G has introduced various emerging demands for new services and technologies that raised the bar quality of service, latency, handovers, data rates. Such diverse perplexing network requirements bring numerous issues, among which security stands in first row. The backhaul, can be implemented as a wired or wireless solution, serves bridge between radio access core networks assuring connectivity to end users. recent trends backhaul usage rely on using point-to-point (PTP)...
Most existing conventional security mechanisms are insufficient, mainly attributable to their requirements for heavy processing capacity, large protocol message size, and longer round trips, resource-intensive devices operating in an Internet of Things (IoT) context. These necessitate efficient communication protocols that cognizant the severe resource restrictions regarding energy, computation, communication, storage. To realize this, IETF (Internet Engineering Task Force) is currently...
The continuous improvements in network softwarization and cloudification have enabled the realization of many applications. One significant result from this is harmonized amalgamation NFV, SDN, Cloud Computing to bring telco clouds that efficiently operate a 5G network. Although these building blocks revolutionized telecom sector various ways, they are vulnerable multiple security issues. Moreover, absence generic architecture another challenge hinders effective adoption technology....
Implantable Medical Devices (IMDs) play a very critical role in both medical and non-medical fields. Hence, protecting the security privacy of these devices is among highest priorities, as failing to do so would jeopardize life patient. One way maintaining safety IMDs design an authentication protocol between external devices. With this regard, although several schemes exist, significant number protocols did not include formal verification prove their secrecy against known attacks. such...
Implantable Medical Devices (IMDs) have evolved over the years to stretch their application areas provide a range of services from health-care public safety. In order handle such information, high strength security and proper authentication are required. For this, Ellouze et al. proposed an protocol for IMDs in 2013. The IMD that they propose mention is reasonable, but some aspects expected be vulnerable attack. addition, not only schemes need secured, should also formally verified against...
Network operators are attempting many innovations and changes in 5G using self-organizing networks (SON). The SON operates on the measurement reports (MR), which obtained from user equipment (UE) secured against malware userspace programs. However, synchronization signal block that UE relies to measure wireless environment configured by a base station is not authenticated. As result, will likely gauge wrong false (FBS) transmit corresponding MR serving station, poisons data used for SONs....
The need for continuous monitoring of physiological information critical organs the human body, combined with ever-growing field electronics and sensor technologies vast opportunities brought by 5G connectivity, have made implantable medical devices (IMDs) most necessitated in health arena. IMDs are very sensitive since they implanted patients depend on them proper functioning their vital organs. Simultaneously, intrinsically vulnerable to several attacks mainly due resource limitations...
This manuscript aims to formalize and conclude the discussions initiated during PriTEM workshop 22-23 March 2023. We present important ideas discussion topics in context of transactive energy systems. Moreover, conclusions from articulate potential aspects be explored future studies on management. Particularly, these cover research technology informatics, law, data market socio-psychology that are relevant seamless integration renewable resources systems-in smart microgrids-focusing...