Digital Library[ Search Result ]
RSU-independent Message Authentication Scheme using CRT-based Group Key in VANET
Jin Sook Bong, Yu Hwa Suh, Ui Jin Jang, Yongtae Shin
http://doi.org/10.5626/JOK.2019.46.3.277
Security in communication is still an important issue because information transmitted via VANET provides safety-related services to drivers. In this context, there have been many studies related to the sending and receiving messages securely in VANET. In many studies, the RSU was assumed as a trust or semi-trust device and RSU played an important role in message authentication. However, a large number of RSUs cannot be considered trustworthy because the security of the RSU cannot be secured. Therefore, this paper proposes a message authentication scheme that is not dependent on the RSU. For this, a group key based on CRT (Chinese Remainder Theorem) is used. In the proposed scheme, the CRT-based key server calculates and distributes a `private key` and a `group key seed` to each vehicle. Then, each vehicle extracts the group key from the group key seed and uses it to authenticate the message. The proposed scheme eliminates the RSU dependence in a message verification. And it is also possible to easily withdraw a vehicle from a group.
Protocol Analysis and Evaluation of the Transport Layer to Improve Security in a Public Cloud Environment
Jin Sook Bong, Sang Jin Park, Yongtae Shin
http://doi.org/10.5626/JOK.2018.45.1.76
Governments and public agencies try to use the cloud to carry out their work and provide public services. However, a public cloud is vulnerable to security side because it has a structure to support services using public networks (i.e, the internet). Thus, this paper finds the general security vulnerabilities of a network and compares and analyzes the characteristics of transport protocols (UDP, TCP, SCTP, and MPTCP) on the basis of their security vulnerabilities. This paper uses a reliability and security factor for the comparative analysis, evaluates the security exposure, and chooses a suitable protocol considering the security of the transport protocols in the cloud circumstance.
An Empirical Study on the Factors and Resolution Methods of the Smart Divide of Older Adults
Kihun Paek, Jinsook Bong, Yongtae Shin
This research was conducted both to analyze the determining factors of and to suggest resolution methods for the smart divide of adults over 65 years of age in the rapidly aging society of the 2000s and the smart society of the 2010s following the information society of the 1990s. The research model based on the Technology Acceptance Model (TAM) includes 6 determining factors derived from existing studies: Self Efficacy, Training, Accessibility, Playfulness, Cost Rationality, and Policy Support. Research data were collected through a survey given to a total of 243 older adults in 14 Senior Welfare Centers nationwide, and research hypotheses were verified by structural equation model (SEM) analysis. The results of this research that gives priority to the order of Political Support, Playfulness, Self Efficacy, Accessibility, Cost Rationality, and Training can be used to develop various resolution methods for the smart divide of adults over 65 years of age.
A Study on the Acceptance Factors of Healthcare Information Services Converged with Cognitive Computing
Young-Woo Pae, Jin-Sook Bong, Wonki Min, Yongtae Shin
The aging population and the advancement of science and technology are transforming the healthcare industry to focus on health management for the prevention of diseases. The U-health and remote healthcare services have not yet achieved the social agreement in the nation; however, these have been extensively used in the global scale. The innovation of user experience through cognitive computing are expected to increase the health effects of consumers, by converging with healthcare information services. This study suggests the conceptual model of healthcare information service converged with cognitive computing. Then, the acceptance factors for consumers have been investigated. For this purpose, reliability and validity analysis have been conducted using an online survey. The path analysis was performed to verify the hypotheses and moderating effect based upon the gender, by using structural equation modeling.
Search

Journal of KIISE
- ISSN : 2383-630X(Print)
- ISSN : 2383-6296(Electronic)
- KCI Accredited Journal
Editorial Office
- Tel. +82-2-588-9240
- Fax. +82-2-521-1352
- E-mail. chwoo@kiise.or.kr