- Cryptography and Data Security
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Advanced Malware Detection Techniques
- Security in Wireless Sensor Networks
- Complexity and Algorithms in Graphs
- Privacy-Preserving Technologies in Data
- Cryptographic Implementations and Security
- Coding theory and cryptography
- Chaos-based Image/Signal Encryption
- Vehicular Ad Hoc Networks (VANETs)
- Security and Verification in Computing
- Cloud Data Security Solutions
- Cryptography and Residue Arithmetic
- Internet Traffic Analysis and Secure E-voting
- Network Security and Intrusion Detection
- Mobile Ad Hoc Networks
- Energy Efficient Wireless Sensor Networks
- Fuel Cells and Related Materials
- Biometric Identification and Security
- graph theory and CDMA systems
- Digital and Cyber Forensics
- RFID technology advancements
- Advanced Data Storage Technologies
- Autonomous Vehicle Technology and Safety
Korea University
2015-2024
Korea Research Institute of Standards and Science
2007-2019
Bucheon University
2019
Korea Institute of Science & Technology Information
2012-2018
Sungkyunkwan University
2014-2018
Gyeonggi Research Institute
2018
Convergence
2017
Dong-Eui University
2016
Dongseo University
2014
Electronics and Telecommunications Research Institute
2003-2013
Vehicle-IT convergence technology is a rapidly rising paradigm of modern vehicles, in which an electronic control unit (ECU) used to the vehicle electrical systems, and controller area network (CAN), in-vehicle network, commonly construct efficient ECUs. Unfortunately, security issues have not been treated properly CAN, although CAN messages could be life-critical. With appearance connected car environment, networks (e.g., CAN) are now external 3G/4G mobile networks), enabling adversary...
The proliferation of computerized functions aimed at enhancing drivers' safety and convenience has increased the number vehicular attack surfaces accordingly. fundamental vulnerability is caused by fact that controller area network protocol, a de facto standard for in-vehicle networks, does not support message origin authentication. Several methods to resolve this problem have been suggested. However, most them require modification CAN protocol their own vulnerabilities. In paper, we focus...
Deep Learning has been widely applied to problems in detecting various network attacks. However, no cases on security have shown applications of deep learning algorithms real-time services beyond experimental conditions. Moreover, owing the integration high-performance computing, it is necessary apply systems that can handle large-scale traffic. Given rapid evolution web-attacks, we implemented and our Artificial Intelligence-based Intrusion Detection System (AI-IDS). We propose an optimal...
As the functions of vehicles are more computerized for safety and convenience drivers, attack surfaces vehicle accordingly increasing. Many results have shown that an attacker could intentionally control vehicles. Most them exploit vulnerability controller area network (CAN) protocol, a de-facto standard in-vehicle networks, does not support message origin authentication. Although number methods to resolve this security been suggested, they their each limitation be applied into current...
Recently, Baek et al. proposed an efficient public key encryption scheme with keyword search based on the of Boneh al., However, security model seriously limits ability adversary.
The controller area network with flexible data rate (CAN-FD) is attracting attention as the next generation of in-vehicle technology. However, security issues have not been completely taken into account when designing CAN-FD, although every bit information transmitted could be critical to driver safety. If we fail solve vulnerabilities cannot expect Vehicle-Information and Communications Technology (Vehicle-ICT) convergence continue develop. Fortunately, secure CAN-FD communication...
Smart grids have attracted increasing interest in the field of industrial research. These systems allow electricity consumers to communicate with electrical using bidirectional communications. However, these channels may introduce privacy threats consumers. Considerable research has been conducted aim resolving threats. Unfortunately, a practical smart grid design adequate efficiency and security functionalities not yet produced. In this paper, we propose lightweight preserving metering...
Abstract A series of methyl, benzyl, and mixed polybenzimidazolium halides was synthesised characterised by NMR spectroscopy. Membranes were formed ion exchanged with hydroxides. These membranes are interest for use in potentially platinum‐free anionic exchange membrane fuel cells. Crosslinked obtained the addition α,α′‐dibromo‐ p ‐xylene to casting solution. The conductivity determined impedance hydroxide 29 mS · cm −1 at 26 °C 58 60 obtained. thermal hydrolytic stability investigated a...
Numerous hacking attempts on modern vehicles have recently demonstrated that an adversary can remotely control a vehicle using vulnerable telematics services. In these attempts, masquerade attack impersonating some safety-critical electronic units (ECUs) is usually performed to vehicle. the last decade, several message authentication protocols for controller area network (CAN) been proposed protect from attacks. However, are not enough attacks by compromised ECUs. Other secure against fill...
Secure authentication in roaming services is being designed to allow legal users get access wireless network when they are away from their home location. Recently, protect the location privacy of users, there have been researches on anonymous authentication. In particular, without participation servers has attracted considerable interest owing its influence communication efficiency. Unfortunately, previously proposed schemes serious practical shortcomings, such as high and computation costs...
A revocable identity-based encryption (RIBE) provides an efficient revocation method in IBE that a trusted authority periodically broadcasts update key for nonrevoked users and user can decrypt ciphertext if he is not revoked the key. Boldyreva, Goyal, Kumar (CCS 2008) defined RIBE proposed scheme uses tree-based to revoke users' private keys. In this paper, we devise new technique propose schemes with constant number of elements. We achieve following results. first combines hierarchical...