- IoT and Edge/Fog Computing
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Blockchain Technology Applications and Security
- User Authentication and Security Systems
- Energy Efficient Wireless Sensor Networks
- Context-Aware Activity Recognition Systems
- Opportunistic and Delay-Tolerant Networks
- Innovation in Digital Healthcare Systems
- Mobile Ad Hoc Networks
- Cloud Computing and Resource Management
- Privacy-Preserving Technologies in Data
- Multimedia Communication and Technology
- Digital and Cyber Forensics
- Distributed and Parallel Computing Systems
- Cloud Data Security Solutions
- Advanced Authentication Protocols Security
- Caching and Content Delivery
- Vehicular Ad Hoc Networks (VANETs)
- IPv6, Mobility, Handover, Networks, Security
- Information and Cyber Security
- Advanced Steganography and Watermarking Techniques
- Spam and Phishing Detection
- Advanced Wireless Network Optimization
- Energy Harvesting in Wireless Networks
Seoul National University of Science and Technology
2016-2025
Baewha Women's University
2022
Georgia State University
2022
Korea Advanced Institute of Science and Technology
2019
Carnegie Mellon University
2016-2017
Sungkyunkwan University
2016
Samsung (South Korea)
2016
Seoul National University
2009-2015
Ulsan National Institute of Science and Technology
2015
University of Seoul
2014
The recent expansion of the Internet Things (IoT) and consequent explosion in volume data produced by smart devices have led to outsourcing designated centers. However, manage these huge stores, centralized centers, such as cloud storage cannot afford auspicious way. There are many challenges that must be addressed traditional network architecture due rapid growth diversity number connected internet, which is not designed provide high availability, real-time delivery, scalability, security,...
The rapid increase in the number and diversity of smart devices connected to Internet has raised issues flexibility, efficiency, availability, security, scalability within current IoT network. These are caused by key mechanisms being distributed network on a large scale, which is why secure SDN architecture for using blockchain technique (DistBlockNet) proposed this research. It follows principles required designing secure, scalable, efficient architecture. DistBlockNet model combines...
Blockchain has drawn attention as the next-generation financial technology due to its security that suits informatization era. In particular, it provides through authentication of peers share virtual cash, encryption, and generation hash value. According global industry, market for security-based blockchain is expected grow about USD 20 billion by 2020. addition, can be applied beyond Internet Things (IoT) environment; applications are expand. Cloud computing been dramatically adopted in all...
The digitalization and massive adoption of advanced technologies in the automotive industry not only transform equipment manufacturer's operating mode, but also change current business models. increased autonomous cars is expected to disrupt government regulations, manufacturing, insurance, maintenance services. Moreover, providing integrated, personalized, on-demand services have shared, connected, smart city for a sustainable ecosystem. To address these issues this paper, we propose...
Industrial Internet of Things (IIoT) is an emerging trend, including in nontraditional technological sector (e.g., oil and gas industry). There are, however, a number research challenges such using cryptography other techniques to ensure security privacy IIoT applications services. In this special issue, we present existing state-of-the-art advances reported by the 21 accepted papers. We then conclude issue with potential agenda.
Internet of Things (IoT) technology provides the basic infrastructure for a hyper connected society where all things are and exchange information through Internet. IoT is fused with 5G artificial intelligence (AI) technologies use various fields such as smart city factory. As demand increases, security threats against infrastructure, applications, devices have also increased. A variety studies been conducted on detection malware to avoid posed by malicious code. While existing models may...
In recent decades, the dramatic increase in global industrial activity has resulted a significant rise use of fossil fuel energy resources, while technological progress increased carbon footprint and hence warming. The consumption caused by Internet Things (IoT) technology created new challenge diverted our focus toward creating more eco-friendly IoT ecosystem. green is an emerging field that attracted great deal attention from researchers industries, as it provides efficient services...
Abstract With the advancement of Information and Communication Technology (ICT) proliferation sensor technologies, Internet Things (IoT) is now being widely used in smart home for purposes efficient resource management pervasive sensing. In homes, various IoT devices are connected to each other, these connections centered on gateways. The role gateways homes significant, however, its centralized structure presents multiple security vulnerabilities such as integrity, certification,...
Abstract Since the end of 2000, smartphones have explosively spread and made people’s lives plentiful. With start smartphones, new smart devices, including tablet PCs, TVs, refrigerators, air conditioners, emerged, expanding their areas from individuals to business home. These days, home service has drawn a lot attention as human-centric service. It is environment where appliances other devices are connected internet in order for user experience. The current simply based on wireless network...
Unmanned aerial vehicles (UAVs) with auto-pilot capabilities are often used for surveillance and patrol. Pilots set the flight points on a map in order to navigate imaging point where or patrolling is required. However, there limit denoting information such as absolute altitudes angles. Therefore, it required accurately. This paper hereby proposes method construct environmental symmetric big data using an unmanned vehicle (UAV) during by designating non-imaging patrols. The K-Means-based...
Abstract In the recent era, artificial intelligence (AI) is being used to support numerous solutions for human beings, such as healthcare, autonomous transportation, and so on. Cognitive computing represented a next-generation application AI-based which provide human–machine interaction with personalized interactions services that imitate behavior. On other hand, large volume of data generated from smart city applications retail industry, firefighting. There always concern on how efficiently...