Hyeong‐Il Kim

ORCID: 0000-0003-0267-5514
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Data Management and Algorithms
  • Wireless Communication Networks Research
  • Wireless Networks and Protocols
  • Caching and Content Delivery
  • Vehicular Ad Hoc Networks (VANETs)
  • Consumer Perception and Purchasing Behavior
  • Graph Theory and Algorithms
  • Access Control and Trust
  • Advanced Database Systems and Queries
  • Advanced Wireless Communication Techniques
  • Security in Wireless Sensor Networks
  • Digital Marketing and Social Media
  • Energy Efficient Wireless Sensor Networks
  • Diverse Topics in Contemporary Research
  • Mobile Ad Hoc Networks
  • Advanced Wireless Network Optimization
  • Cloud Computing and Resource Management
  • Microwave Engineering and Waveguides
  • Distributed and Parallel Computing Systems
  • Education and Learning Interventions
  • Mobile Agent-Based Network Management
  • Recommender Systems and Techniques

Electronics and Telecommunications Research Institute
2008-2024

Jeonbuk National University
2009-2017

Chonbuk National University Hospital
2014

Stanford University
2008

Yonsei University
2007

California State University Los Angeles
2002

University of California, Los Angeles
1994

Recent development in wireless communication technology and mobile equipment like PDA, cellular phone GPS is making location-based services (LBSs) more popular day by day. However, because, the LBSs, users continuously send queries to LBS servers using their exact locations, private information could be danger. Therefore, a mechanism for users' privacy protection required safe comfortable use of LBSs. For this, this paper, we propose grid-based cloaking area creation scheme order support...

10.1145/2245276.2245379 article EN 2012-03-26

The study on spatial database outsourcing has been spotlighted with the development of cloud computing. Therefore, researches for protecting location data privacy in outsourced have studied. However, existing transformation schemes are vulnerable to naïve attack models. cryptographic scheme provides high privacy, but it causes query processing cost. To solve these problems, this paper we propose a Hilbert-curve based protect and improve efficiency databases. proposed reduces communication...

10.1109/bigcomp.2014.6741411 article EN 2014-01-01

In wireless sensor networks, the nodes collect data, which are routed to a sink node. Most of existing proposals address routing problem maximize network lifetime in case single this paper, we extend into multiple nodes. To lifetime, consider two problems: (i) how position area, and (ii) route traffic flows from solutions these problems formulated Mixed Integer Linear Programming (MILP) model. However, it is computationally difficult solve MILP formulation as size grows because NP-hard....

10.1093/ietcom/e91-b.11.3499 article EN IEICE Transactions on Communications 2008-11-01

Data aggregation techniques have been widely used in wireless sensor networks (WSNs) to solve the energy constraint problems of nodes. They can conserve significant amount by reducing data packet transmission costs. However, many applications require privacy and integrity protection real while transmitting from sensing nodes a sink node. The existing schemes for supporting both integrity, that is, iCDPA, iPDA, suffer high communication cost, computation propagation delay. To resolve...

10.1155/2014/272537 article EN cc-by International Journal of Distributed Sensor Networks 2014-01-01

With the adoption of cloud computing, database outsourcing has emerged as a new platform. Due to serious privacy concerns in cloud, need be encrypted before being outsourced cloud. Therefore, various kNN query processing techniques have been proposed over database. However, existing schemes are either insecure or inefficient. So, we, this paper, propose secure algorithm. Our algorithm guarantees confidentiality both data and user's record. To achieve high efficiency, we also devise an index...

10.1109/bigcomp.2016.7425806 article EN 2016-01-01

Recently, cyber attacks have become a serious hindrance to the stability of Internet. These exploit interconnectivity networks, propagate in an instant, and more sophisticated evolutionary. Traditional Internet security systems such as firewalls, IDS IPS are limited terms detecting recent advance these respond only after inflict damage. In this paper, we propose hybrid intrusion forecasting system framework for early warning system. The proposed utilizes three types methods: time-series...

10.1093/ietisy/e91-d.5.1234 article EN IEICE Transactions on Information and Systems 2008-05-01

10.1007/s11390-013-1359-8 article EN Journal of Computer Science and Technology 2013-07-01

In Location-Based Services (LBSs), users send location-based queries to LBS servers along with their exact locations, but the location information of can be misused by adversaries. For this, a mechanism deal userspsila privacy protection is required. this paper, we propose new cloaking algorithm for in LBSs. Our support both k-anonymity and l-diversity. That is, it first creates minimum region finding l buildings (l-diversity) then finds k (k-anonymity). To generate efficiently, make use...

10.1109/hpcc.2009.47 article EN 2009-01-01

This paper presents a Maximum Likelihood Location Estimation (MLLE) algorithm for the home network environments. We propose deployment of cluster-tree topology in ZigBee networks and derive MLE under log-normal models Received Signal Strength (RSS) measurements. Experiments are also conducted to validate effectiveness proposed algorithm.

10.1093/ietisy/e90-d.10.1706 article EN IEICE Transactions on Information and Systems 2007-10-01

With the development of wireless communication technologies and popularity smart phones, many people are using location-based services (LBSs). However, since users continuously request queries to LBS server by their exact locations, privacy information is always in danger. Because existing techniques provide user's protection operating on centralized system, an anonymizer suffers from performance degradation security problem. Therefore, a mechanism based distributed system for users'...

10.1109/cit.2011.87 article EN 2011-08-01

This paper examines architectural techniques for providing concurrent error detection in self-timed VLSI pipelines. Signal pairs from Differential Cascode Voltage Switch Logic are compared with a checker that is composed of tree dual-rail (morphic) comparators to detect errors and signal completion. An efficient implementation shown compares favorably speed area conventional completion generators. A simple pipeline examined checkers at each computation stage hand-shaking control circuits...

10.1109/ftcs.1994.315653 article EN 2002-12-17

From the introduction of CodeRed and Slammer worms, it has been learned that early detection worm epidemics is important in order to reduce damage resulting from outbreaks. A prominent characteristic Internet worms random selection subsequent targets. In this paper, we propose a new mechanism by checking distribution destination addresses network traffic. The proposed constructs matrix traffic checks rank detect spreading worms. fact binary holds high value, ADUR (Anomaly Detection Using...

10.1093/ietcom/e90-b.4.894 article EN IEICE Transactions on Communications 2007-04-01

ABSTRACT Outsourcing database to a third‐party data provider is becoming common practice for owners avoid the cost of managing and maintaining database. Meanwhile, because popularity location‐based services, need spatial increasing dramatically. However, most important challenge in outsourcing how meet privacy requirements guarantee integrity query result as well. Unfortunately, existing techniques support either or on databases. To carry both outsourced data, we propose transformation...

10.1002/sec.833 article EN Security and Communication Networks 2013-08-02

Because much interest in spatial database for cloud computing has been attracted, studies on preserving location data privacy have actively done. However, since the existing transformation schemes are weak to a proximity attack, they cannot preserve of users who enjoy location-based services computing. Therefore, scheme is required providing safe service users. We, this paper, propose new based line symmetric (LST). The proposed performs both LST-based distribution and error injection...

10.4018/ijdwm.2014100102 article EN International Journal of Data Warehousing and Mining 2014-10-01

A novel method of voice frame aggregation for wireless mesh networks is presented. In the method, degree automatically regulated by congestion level on link. On IEEE 802.11-based network, it shown to yield approximately twice call capacity, while incurring no additional delay aggregation.

10.1093/ietcom/e90-b.5.1283 article EN IEICE Transactions on Communications 2007-05-01

Most of previous works have presented the dynamic spectrum allocation (DSA) gain achieved by utilizing time or regional variations in traffic demand between multi-network operators (NOs). In this paper, we introduce functionalities required for entities related with sharing and propose a algorithm while considering long-term priority NOs, multiple class services, urgent bandwidth request. To take into account priorities among NOs metric (SSM) is proposed, negotiation procedure proposed to treat

10.1093/ietcom/e91-b.7.2393 article EN IEICE Transactions on Communications 2008-07-01

In the integrated Wireless LAN (WLAN) and cellular networks, power efficiency is one of most important aspects as in existing wireless networks. Especially, we note that idle state, a mobile device with dual interfaces needs to receive periodic beacons from access point downlink control information base station, resulting significant consumption. To save power, propose saving scheme Hibernation mode completely turn off WLAN interface during instead entering Power Save (PS) it on only when...

10.1093/ietcom/e90-b.10.2780 article EN IEICE Transactions on Communications 2007-10-01

In this paper, we present and verify a new chip-package co-modeling simulation approach for low-noise hierarchical power distribution network (PDN) design. It is based on modeling to combine distributed circuit models at both chip-level PDN package-level PDN. particular, it includes all on- off-chip parasitic elements in the with special consideration on-chip decoupling capacitor design placement inside chip. The proposed model was successfully validated good correlations subsequent analysis...

10.1093/ietele/e91-c.4.595 article EN IEICE Transactions on Electronics 2008-04-01

The explosive growth of location-detection devices, such as GPS (Global Positioning System), continuously increases users' privacy threat in location-based services (LBSs). However, order to enjoy services, the user must precisely disclose his/her exact location LBS. So, it is a key challenge efficiently preserve user's while accessing For this, existing method employs 2PASS cloaking scheme hides actual and reduces bandwidth consumption. suffers from attack since does not actually consider...

10.1145/2442985.2442986 article EN 2012-11-06
Coming Soon ...