Jong Hyuk Park

ORCID: 0000-0003-1831-0309
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IoT and Edge/Fog Computing
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Blockchain Technology Applications and Security
  • User Authentication and Security Systems
  • Energy Efficient Wireless Sensor Networks
  • Context-Aware Activity Recognition Systems
  • Opportunistic and Delay-Tolerant Networks
  • Innovation in Digital Healthcare Systems
  • Mobile Ad Hoc Networks
  • Cloud Computing and Resource Management
  • Privacy-Preserving Technologies in Data
  • Multimedia Communication and Technology
  • Digital and Cyber Forensics
  • Distributed and Parallel Computing Systems
  • Cloud Data Security Solutions
  • Advanced Authentication Protocols Security
  • Caching and Content Delivery
  • Vehicular Ad Hoc Networks (VANETs)
  • IPv6, Mobility, Handover, Networks, Security
  • Information and Cyber Security
  • Advanced Steganography and Watermarking Techniques
  • Spam and Phishing Detection
  • Advanced Wireless Network Optimization
  • Energy Harvesting in Wireless Networks

Seoul National University of Science and Technology
2016-2025

Baewha Women's University
2022

Georgia State University
2022

Korea Advanced Institute of Science and Technology
2019

Carnegie Mellon University
2016-2017

Sungkyunkwan University
2016

Samsung (South Korea)
2016

Seoul National University
2009-2015

Ulsan National Institute of Science and Technology
2015

University of Seoul
2014

The recent expansion of the Internet Things (IoT) and consequent explosion in volume data produced by smart devices have led to outsourcing designated centers. However, manage these huge stores, centralized centers, such as cloud storage cannot afford auspicious way. There are many challenges that must be addressed traditional network architecture due rapid growth diversity number connected internet, which is not designed provide high availability, real-time delivery, scalability, security,...

10.1109/access.2017.2757955 article EN cc-by-nc-nd IEEE Access 2017-09-29

10.1016/j.jnca.2016.09.002 article EN Journal of Network and Computer Applications 2016-09-09

The rapid increase in the number and diversity of smart devices connected to Internet has raised issues flexibility, efficiency, availability, security, scalability within current IoT network. These are caused by key mechanisms being distributed network on a large scale, which is why secure SDN architecture for using blockchain technique (DistBlockNet) proposed this research. It follows principles required designing secure, scalable, efficient architecture. DistBlockNet model combines...

10.1109/mcom.2017.1700041 article EN IEEE Communications Magazine 2017-01-01

10.1016/j.future.2018.04.060 article EN Future Generation Computer Systems 2018-05-02

Blockchain has drawn attention as the next-generation financial technology due to its security that suits informatization era. In particular, it provides through authentication of peers share virtual cash, encryption, and generation hash value. According global industry, market for security-based blockchain is expected grow about USD 20 billion by 2020. addition, can be applied beyond Internet Things (IoT) environment; applications are expand. Cloud computing been dramatically adopted in all...

10.3390/sym9080164 article EN Symmetry 2017-08-18

The digitalization and massive adoption of advanced technologies in the automotive industry not only transform equipment manufacturer's operating mode, but also change current business models. increased autonomous cars is expected to disrupt government regulations, manufacturing, insurance, maintenance services. Moreover, providing integrated, personalized, on-demand services have shared, connected, smart city for a sustainable ecosystem. To address these issues this paper, we propose...

10.1109/tii.2018.2887101 article EN IEEE Transactions on Industrial Informatics 2018-12-18

Industrial Internet of Things (IIoT) is an emerging trend, including in nontraditional technological sector (e.g., oil and gas industry). There are, however, a number research challenges such using cryptography other techniques to ensure security privacy IIoT applications services. In this special issue, we present existing state-of-the-art advances reported by the 21 accepted papers. We then conclude issue with potential agenda.

10.1109/tii.2018.2841049 article EN IEEE Transactions on Industrial Informatics 2018-05-28

Internet of Things (IoT) technology provides the basic infrastructure for a hyper connected society where all things are and exchange information through Internet. IoT is fused with 5G artificial intelligence (AI) technologies use various fields such as smart city factory. As demand increases, security threats against infrastructure, applications, devices have also increased. A variety studies been conducted on detection malware to avoid posed by malicious code. While existing models may...

10.1109/access.2020.2995887 article EN cc-by IEEE Access 2020-01-01

In recent decades, the dramatic increase in global industrial activity has resulted a significant rise use of fossil fuel energy resources, while technological progress increased carbon footprint and hence warming. The consumption caused by Internet Things (IoT) technology created new challenge diverted our focus toward creating more eco-friendly IoT ecosystem. green is an emerging field that attracted great deal attention from researchers industries, as it provides efficient services...

10.1109/mnet.001.1900526 article EN IEEE Network 2020-03-03

Abstract With the advancement of Information and Communication Technology (ICT) proliferation sensor technologies, Internet Things (IoT) is now being widely used in smart home for purposes efficient resource management pervasive sensing. In homes, various IoT devices are connected to each other, these connections centered on gateways. The role gateways homes significant, however, its centralized structure presents multiple security vulnerabilities such as integrity, certification,...

10.1186/s13673-020-0214-5 article EN cc-by Human-centric Computing and Information Sciences 2020-03-17

Abstract Since the end of 2000, smartphones have explosively spread and made people’s lives plentiful. With start smartphones, new smart devices, including tablet PCs, TVs, refrigerators, air conditioners, emerged, expanding their areas from individuals to business home. These days, home service has drawn a lot attention as human-centric service. It is environment where appliances other devices are connected internet in order for user experience. The current simply based on wireless network...

10.1186/s13673-017-0087-4 article EN cc-by Human-centric Computing and Information Sciences 2017-02-01

Unmanned aerial vehicles (UAVs) with auto-pilot capabilities are often used for surveillance and patrol. Pilots set the flight points on a map in order to navigate imaging point where or patrolling is required. However, there limit denoting information such as absolute altitudes angles. Therefore, it required accurately. This paper hereby proposes method construct environmental symmetric big data using an unmanned vehicle (UAV) during by designating non-imaging patrols. The K-Means-based...

10.3390/sym9010001 article EN Symmetry 2016-12-24

Abstract In the recent era, artificial intelligence (AI) is being used to support numerous solutions for human beings, such as healthcare, autonomous transportation, and so on. Cognitive computing represented a next-generation application AI-based which provide human–machine interaction with personalized interactions services that imitate behavior. On other hand, large volume of data generated from smart city applications retail industry, firefighting. There always concern on how efficiently...

10.1186/s13673-019-0190-9 article EN cc-by Human-centric Computing and Information Sciences 2019-08-01
Coming Soon ...