Entity

Time filter

Source Type

Seoul, South Korea

Lim H.-J.,Financial Security Agency | Kim M.,Information and Communications Examination Bureau | Lee J.-H.,French Institute for Research in Computer Science and Automation | Seo D.-H.,Electronics and Telecommunications Research Institute | Chung T.M.,Sungkyunkwan University
IEEE Transactions on Vehicular Technology | Year: 2011

In this paper, we present a practical public key certificate structure that is combined with an authentication protocol for roaming across different wireless Internet service providers (ISPs). The design rationale is to enable the mutual authentication between the roaming mobile device (MD) and the visited network to be locally performed without invoking the MD's home ISP. The mutual authentication ensures that the visited network has authenticity as well as a mechanism for establishing the appropriate revenue stream for the roaming MD. The proposed scheme guarantees that the overhead associated with the authentication time is significantly reduced and that the impact of this overhead on the roaming MD is also minimized, although the nested depth of the network mobility is increased. In this paper, we use analytical comparisons to show that the proposed scheme creates less overhead than that of the previous approaches in terms of security and communication performance. © 2010 IEEE. Source


Kim T.K.,Seoul Theological University | Lim H.J.,Financial Security Agency | Nah J.H.,Electronics and Telecommunications Research Institute
International Journal of Security and its Applications | Year: 2013

In this paper, we proposed the model which can support fraud detection in ICT application service. Fraud detection service monitors and analyzes user activity and behavior at the application level (rather than at the system, database or network level) and watches what transpires inside and across accounts, using any channel available to a user. It also analyzes behavior among related users, accounts or other entities, looking for organized criminal activity, corruption or misuse. This model can be used in e-banking, e-payment, e-government and enterprise remote access, etc. © 2013 SERSC. Source


Kim M.,Korean Intellectual Property Office | Choo H.,Sungkyunkwan University | Mutka M.W.,Michigan State University | Lim H.-J.,Financial Security Agency | Park K.,Wonkwang University
Information Sciences | Year: 2013

In this paper, we study how to obtain Steiner trees appropriately for efficient multicast routing. We first introduce a scheme for generating a new weighted multicast parameter by efficiently combining two independent measures: cost and delay. We call our proposal the Weighted Parameter for Multicast Trees (WPMT) algorithm. The WPMT can be adjusted by the weight ω ε [0, 1]. For instance, if ω approaches 0, then the delay of the multicast tree may be relatively lower than the delay of other trees that are obtained as ω approaches 1. Otherwise, as the weight approaches 1 then the cost of the obtained tree may be relatively lower compared with other trees. A case study shows how to find an appropriate Steiner tree for each ω. The simulation results show that the use of the proposed WPMT produces results similar to the k-minimum Steiner tree algorithm. The WPMT can be applied to several existing multicast problems as we describe. We also propose several multicast algorithms using the WPMT in order to solve well-known multicast problems, and compare the proposed algorithms-based the WPMT with representative algorithms for the well-known problems. © 2013 Elsevier Inc. All rights reserved. Source


Jo H.,Financial Security Agency | Kim S.,Korea University | Won D.,Sungkyunkwan University
ACM International Conference Proceeding Series | Year: 2012

In mobile communication environment, mutual authentication is very important. Lu et al. proposed an anonymous mutual authentication protocol with provable link-layer location privacy. In this paper, we identify a flaw in their design and demonstrate that the Lu et al. protocol is vulnerable to the QoS (Quality of Service) of a packet's sending/receiving state and to DoS (Denial of Service) attack. We then propose a method for improving the protocol. We hope that through this analysis of flaws in the protocol, similar structural mistakes can be avoided in future designs, similar structural mistakes can be avoided in future designs. Copyright 2012 ACM. Source


Jo H.,Financial Security Agency | Kim S.,Korea University | Won D.,Sungkyunkwan University
KSII Transactions on Internet and Information Systems | Year: 2011

Information security management systems (ISMSs) are used to manage information about their customers and themselves by governments or business organizations following advances in e-commerce, open networks, mobile networks, and Internet banking. This paper explains the existing ISMSs and presents a comparative analysis. The discussion deals with different types of ISMSs. We addressed issues within the existing ISMSs via analysis. Based on these analyses, then we proposes the development of an information security management evaluation system (ISMES). The method can be applied by a self-evaluation of the organization and an evaluation of the organization by the evaluation committee. The contribution of this study enables an organization to refer to and improve its information security levels. The case study can also provide a business organization with an easy method to build ISMS and the reduce cost of information security evaluation. © 2011 KSII. Source

Discover hidden collaborations