Search : [ author: Hyuk Lee ] (4)

Review of QoS Research Considering Mobility in Mobile Edge Computing

Junseong Nam, Jaehyuk Lee, Duksan Ryu

http://doi.org/10.5626/JOK.2025.52.2.108

Mobile Edge Computing (MEC) is a technology that can enhance performance and reduce latency by performing data processing and cloud computing services not centrally, but at the edge of the network. Mobility is a key characteristic of MEC and a crucial factor in determining the Quality of Service (QoS) for users. The objective of this study is to review current state of research related to providing optimal services in MEC environments by predicting QoS, considering mobility. This study identified research areas related to MEC that aimed to provide optimal services to users while considering mobility, analyzed types of techniques used to address specific problem types, and examined characteristics and improvements made in each category. Based on analysis results, research was categorized into three main areas: security, QoS monitoring, and edge server placement. In the security domain, security techniques have been applied to data preprocessing, while the QoS monitoring domain has utilized collaborative filtering techniques considering data dependencies. The edge server placement domain has employed multi-objective optimization techniques. Through this study, follow-up researchers could better understand mobility-aware QoS research in MEC environments, thereby promoting further research on QoS improvement.

Design Threat Analysis and Risk Assessment of Battery Management System

Woongsub Park, Daehui Jeong, Hyuk Lee

http://doi.org/10.5626/JOK.2022.49.2.176

Climate change due to emission of greenhouse gases and air pollutants is currently the most important international environmental problem. As a result of advances in technology and efforts by automobile manufacturers to address these issues, automobiles are changing from internal combustion engines to electric motors. Electric vehicles have a high proportion of electronic components. Software technologies such as battery management systems, infotainment, and advanced driver assistance systems (ADAS) are integrated. An increase in the proportion of software increases the internal connectivity and complexity of the entire system, leading to expansion of the potential security attack surface. To secure cyber security for automobiles, it is recommended to comply with the ISO/SAE-21434 international standard and perform threat analysis and risk assessment activities. In this paper, high-level threat analysis and risk assessment for the battery management system were performed based on the HEAVENS security model. Threats that can occur in the battery management system were identified through the STRIDE technique. Possible damage and threat scenarios were then derived. Through systematic risk assessment, an impact rating and an attack potential rating for threats were assigned and a security rating was derived. Finally, by analyzing the security level of the threat, it is suggested to apply threat analysis and risk assessment activities to improve the design level security of the battery management system.

Fast Blockchain Consensus Algorithm with Forward Secure Signatures

Jeonghyuk Lee, Jihye Kim, Hyunok Oh

http://doi.org/10.5626/JOK.2019.46.5.397

Recently blockchain has emerged as an alternative to central data management. Existing blockchains, such as Bitcoin or Ethereum use a PoW(Proof of Work) method to reliably add a new block to the blockchain. Since PoW method performs a hash function calculation and has a high computational cost, fast transactions are impossible with PoW. Therefore, we propose a delegation based blockchain that can replace PoW method and use a forward secure signature to enhance the blockchain security. We implemented a signature scheme that could be used in delegation based blockchains, and analyzed the performance and security of the proposed blockchain.

Efficient Attribute Based Digital Signature that Minimizes Operations on Secure Hardware

Jungjoon Yoon, Jeonghyuk Lee, Jihye Kim, Hyunok Oh

http://doi.org/

An attribute based signature system is a cryptographic system where users produce signatures based on some predicate of attributes, using keys issued by one or more attribute authorities. If a private key is leaked during signature generation, the signature can be forged. Therefore, signing operation computations should be performed using secure hardware, which is called tamper resistant hardware in this paper. However, since tamper resistant hardware does not provide high performance, it cannot perform many operations requiring attribute based signatures in a short time frame. This paper proposes a new attribute based signature system using high performance general hardware and low performance tamper resistant hardware. The proposed signature scheme consists of two signature schemes within a existing attribute based signature scheme and a digital signature scheme. In the proposed scheme, although the attribute based signature is performed in insecure environments, the digital signature scheme using tamper resistant hardware guarantees the security of the signature scheme. The proposed scheme improves the performance by 11 times compared to the traditional attribute based signature scheme on a system using only tamper resistant hardware.


Search




Journal of KIISE

  • ISSN : 2383-630X(Print)
  • ISSN : 2383-6296(Electronic)
  • KCI Accredited Journal

Editorial Office

  • Tel. +82-2-588-9240
  • Fax. +82-2-521-1352
  • E-mail. chwoo@kiise.or.kr