Ilsun You

Ilsun You
Soonchunhyang University · Department of Information Security Engineering

PhD

About

405
Publications
94,671
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,895
Citations

Publications

Publications (405)
Article
Full-text available
The development of new technologies such as the Internet of Things and cloud computing tests the transmission capabilities of communication networks. With the widespread application of multiple wireless access technologies, it has become popular for modern communication devices to be equipped with multiple network access interfaces. The increasing...
Article
The Internet of Medical Things (IoMT) has risen to prominence as a possible backbone in the health sector, with the ability to improve quality of life by broadening user experience while enabling crucial solutions such as near real-time remote diagnostics. However, privacy and security problems remain largely unresolved in the safety area. Various...
Article
Full-text available
The development of Information and Communication Technologies (ICT) has now reached some entirely unexpected domains. Many applications in modern cities lead to novelties, resulting in new habits of the citizens of tomorrow’s smart cities. These innovations include Intelligent Transportation Systems (ITS). An important application domain of ITS is...
Article
After decades of rapid development, the scale and complexity of modern networks have far exceed our expectations. In many conditions, traditional traffic identification methods cannot meet the demand of modern networks. Recently, fine-grained network traffic identification has been proved to be an effective solution for managing network resources....
Article
Full-text available
As the aviation sector becomes digitized and increasingly reliant on wireless technology, so has its attractiveness to cyber attackers including nation-state actors and terrorists. For example, vulnerabilities in the broad range of interconnected devices and (sub)systems, their implementations, as well as design flaws, can be exploited to carry out...
Chapter
The Internet of Things (IoT) has shown to be beneficial in today’s increasingly connected world. IoT has transformed nearly every industry, opening up huge opportunities for future innovation and progress. The Internet of Medical Things (IoMT), as one important application area of IoT, has changed healthcare delivery, such as by playing a crucial r...
Chapter
It is difficult to be anonymous online with user activities always under the scanner. Multiple identifiers and their combinatories are used for user identification. While browsing, trackers keep a record of artifacts such as OS version, screen resolution, and fonts enabled. Browser fingerprinting tries to identify a user’s browser uniquely, without...
Article
Full-text available
In wireless communication, Fifth Generation (5G) Technology is a recent generation of mobile networks. In this paper, evaluations in the field of mobile communication technology are presented. In each evolution, multiple challenges were faced that were captured with the help of next-generation mobile networks. Among all the previously existing mobi...
Article
Full-text available
The need for continuous monitoring of physiological information of critical organs of the human body, combined with the ever-growing field of electronics and sensor technologies and the vast opportunities brought by 5G connectivity, have made implantable medical devices (IMDs) the most necessitated devices in the health arena. IMDs are very sensiti...
Article
5G-assisted device-to-device (D2D) communication plays an instrumental role in minimizing latency, maximizing resource utilization, improving speed, and boosting system capacity. However, the technology confronts several challenges to realize its enormous potential fully. Security and privacy concerns are at the top of the list that can jeopardize...
Article
Full-text available
Internet of Things (IoT) can provide the interconnection and data sharing among devices, vehicles, buildings via various sensors with the development of 5G, and it has been widely used in different services such as e-commerce, heath-care, smart buildings. In the meantime, various cyber-attacks for IoT have increased and caused huge losses. Lots of...
Conference Paper
The rapid development of Information & Communication Technology (ICT) has accelerated the development of Internet of Things (IoT) devices, which in turn increases the application of these devices to build a safe home environment for all. However, there are security concerns that need to be resolved to overcome the possible invasion of privacy (e.g....
Preprint
Full-text available
It is difficult to be anonymous online with user activities always under the scanner. Multiple identi-fiers and their combinatories are used for user identification. While browsing, trackers keep a record of artifacts such as OS version, screen resolution, and fonts enabled. Browser fingerprinting tries to identify a user's browser uniquely, withou...
Article
Implantable internet of things medical devices (IoTMD) has drawn a disruptive transformation in the healthcare domain. It has improved the services of healthcare providers in delivering patient care. Even better, it has supported individuals that are suffering from a chronic condition in self-managing their condition. Patients diagnosed with diabet...
Article
Full-text available
Most existing conventional security mechanisms are insufficient, mainly attributable to their requirements for heavy processing capacity, large protocol message size, and longer round trips, for resource-intensive devices operating in an Internet of Things (IoT) context. These devices necessitate efficient communication and security protocols that...
Article
This article proposes a new blockchain-envisioned key management protocol for Artificial Intelligence(AI)-enabled Industrial Cyber-Physical Systems (ICPS). The designed key management protocol enables key establishment among the Internet of Things(IoT)-enabled smart devices and their respective gateway nodes. The blocks partially constructed with s...
Article
The Internet of Things (IoT) is vulnerable to a wide range of security risks, which can be effectively mitigated by applying Cyber Threat Intelligence (CTI) sharing as a proactive mitigation approach. In realizing CTI sharing, it is of paramount importance to guarantee end-to-end protection of the shared information as unauthorized disclosure of CT...
Article
Full-text available
Cellular technology has evolved over the decades for mobile network operators to accommodate the ever-growing demands of services for connecting Vehicle-to-Everything (V2X). The 5G infrastructure facilitates V2X communications, where a small-cell base station operating at ultra-high radio frequency with limited coverage becomes pervasive. These sma...
Article
Full-text available
Generally, the 5th Generation (5G) network will be soon available in the near future. It will be one with the feature that some of its network functions are handled by Virtual Machines (VMs), rather than by a dedicated one (like that in the 4th generation (4G) networks). Basically, VMs of a specific network function are managed by their own Softwar...
Article
Data caching is an effective method to reduce traffic and improve the quality of service in network. Traditionally, users' requests are offloaded to the cloud for centralized computing. However, due to security and privacy, these tasks are executed in the nearest server, so that the data and service needed by the task are also essential. After the...
Article
Full-text available
This paper presents an in-depth overview of the Bluetooth 5.1 Direction Finding standard’s potentials, thanks to enhancing the Bluetooth Low Energy (BLE) firmware. This improvement allows producers to create location applications based on the Angle of Departure (AoD) and the Angle of Arrival (AoA). Accordingly, it is conceivable to design proper In...
Article
With the evolution of wireless technologies, 5G and Beyond (5GB) communication is paving a way for efficient, ultra-reliable, low-latent, and high converging services for the Internet of Things (IoT). Along with efficient communication, the security of messages is one of the concerns which must be maintained throughout the operations. Backhaul form...
Article
Coronavirus disease (COVID-19) has presented extremely harsh requirements on deterministic transmission capability within different communication networks. However, most existing solutions mainly focus on one specific homogeneous scenario, such as pure IP routers or classical medium access control bridges, which leads to many tough challenges in fl...
Article
Full-text available
Mobile edge computing which provides computing capabilities at the edge of the radio access network can help smart home reduce response time. However, the limited computing capacity of edge servers is the bottlenecks for the development of edge computing. We integrate cloud computing and edge computing in the Internet of Things to expand the capabi...
Article
Full-text available
Unmanned Aerial Vehicle (UAV) plays a paramount role in various fields, such as military, aerospace, reconnaissance, agriculture, and many more. The development and implementation of these devices have become vital in terms of usability and reachability. Unfortunately, as they become widespread and their demand grows, they are becoming more and mor...
Article
Advances of implantable medical devices (IMD) are transforming the tradition method of providing medical treatment, especially to patients under the most challenging condition. Accordingly, the IMD-enabled artificial pancreas system (APS) has now reached global market. It is helping many patients suffering from chronic disease, called diabetes mell...
Article
Full-text available
Wearable devices used for human body monitoring has broad applications in smart home, sports, security and other fields. Wearable devices provide an extremely convenient way to collect a large amount of human motion data. In this paper, the human body acceleration feature extraction method based on wearable devices is studied. Firstly, Butterworth...
Article
Embedded systems are common in the Internet of Things domain: their integration in vehicles and mobile devices is being fostered in the Internet of vehicles (IoV). IoV has direct applications on intelligent transportation systems and smart cities. Besides basic requirements, such as ease of installation, cost‐effectiveness, scalability, and flexibi...
Article
Full-text available
The International Symposium on the Future ICT (Future-ICT 2019) in conjunction with the 4th International Symposium on Mobile Internet Security (MobiSec 2019) has been held on 17–19 October 2019 in Taichung, Taiwan [...]
Article
Implantable medical devices are playing a key role in the paradigm shift of providing healthcare services. Particularly, this paper highlights the role of artificial pancreas system (APS) in the management of blood sugar level, especially to patients that are diagnosed with Diabetes Mellitus (DM). APS provides convenience in the self-management of...
Article
Full-text available
The industrial control system (ICS) inherits the attributes of the traditional information system, but because it has its own characteristics that availability of triad (CIA) of information security should be a top priority, it needs to be set differently from the traditional information security requirements. In response to the issue, TTAK.KO-12.0...
Article
Objective: To realize the full coverage, full spectrum, and full application, of 6G networks, the channel measurement, channel characteristics, and channel research of the 6G-oriented full-spectrum full-scene wireless network are explored. Methods: At present, constructing an information network covering three dimensions of sea, land and air is one...
Chapter
Massive Internet of Things (IoT) applications are characterized by a massive number of low-powered devices with small data storage. In those applications, authentication is very important to guarantee the origin of data produced by each device. With such characteristics, the authentication scheme needs to have small footprint and low complexity com...
Article
Full-text available
Green communications, focusing on energy efficiency, is a hot topic in both academic and industry communities since they can significantly improve sustainability concerning power resources and environmental conditions. Later, with much focus on this area, several green communication methods started enrolling into a more thoughtful phase, with compe...
Article
This paper presents a Smart Collaborative Balancing (SCB) scheme to dynamically adjust the orchestration of network functions to enhance their workflow patterns. First, mathematical models of bandwidth allocation and DDoS defense for multi-user with diverse probability distribution is established. Matrix operations are utilized to solve the relevan...
Article
Smart farming is rapidly revolutionizing the agricultural sector where embedded Internet of Things (IoT) devices are integrated into the field to maintain or improve the quality of products as well as increase food production. Despite the tremendous benefits, various cybersecurity threats of IoT can also be inherited by the sector. In this paper, w...
Article
Full-text available
Efficient big data analysis is critical to support applications or services in Internet of Things (IoT) system, especially for the time-intensive services. Hence, the data center may host heterogeneous big data analysis tasks for multiple IoT systems. It is a challenging problem since the data centers usually need to schedule a large number of peri...
Article
Full-text available
As a new computing paradigm, edge computing emerges in various fields. Many tasks previously deployed on the cloud are distributed to various edge devices such as wearable sensors, which cooperate to complete the tasks. However, circumstantial factors at the edge device (e.g., functionality, transmission efficiency, resource limitation) become more...
Article
Full-text available
With an enormous range of applications, the Internet of Things (IoT) has magnetized industries and academicians from everywhere. IoT facilitates operations through ubiquitous connectivity by providing Internet access to all the devices with computing capabilities. With the evolution of wireless infrastructure, the focus from simple IoT has been shi...
Article
We propose a lightweight specification-based misbehavior detection management technique to efficiently and effectively detect misbehavior of an IoT device embedded in a medical cyber physical system through automatic model checking and formal verification. We verify our specification-based misbehavior detection technique with a patient-controlled a...
Article
Full-text available
In future engineered systems for medical applications, a tight real-time integration between physical and computational processes will be required. That integration is achieved using feedback control loops which need high quality input data streams. However, hardware platforms can barely provide such high-quality data sequences (especially if mobil...
Article
Full-text available
With the development of various deep learning algorithms, the importance and potential of AI + medical treatment are increasingly prominent. Electrocardiogram (ECG) as a common auxiliary diagnostic index of heart diseases, has been widely applied in the pre-screening and physical examination of heart diseases due to its low price and non-invasive c...
Article
Full-text available
Unmanned aerial vehicles (UAVs) allow better coverage, enhanced connectivity, and elongated lifetime when used in telecommunications. However, these features are predominately affected by the policies used for sharing resources amongst the involved nodes. Moreover, the architecture and deployment strategies also have a considerable impact on their...
Article
Full-text available
As the Internet of Things (IoT) is predicted to deal with different problems based on big data, its applications have become increasingly dependent on visual data and deep learning technology, and it is a big challenge to find a suitable method for IoT systems to analyze image data. Traditional deep learning methods have never explicitly taken the...
Article
Full-text available
In the 5G era, network mobility management is recognized as a very important factor for user service availability. Especially, due to fast speed and shrinking cell coverage, frequent handover is expected than before. Hence, efficient handover procedure is essential to guarantee seamless service to users. Distributed IP Mobility Management (DMM), a...
Article
Full-text available
Recently, Satellite Internet of Things (SIoT), a space network that consists of numerous Low Earth Orbit (LEO) satellites, is regarded as a promising technique since it is the only solution to provide 100% global coverage for the whole earth, without any additional terrestrial infrastructure supports. However, compared with Geostationary Earth Orbi...
Article
Cellular-Vehicle to Everything (C-V2X) aims at resolving issues pertaining to the traditional usability of Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) networking. Specifically, C-V2X lowers the number of entities involved in vehicular communications and allows the inclusion of cellular-security solutions to be applied to V2X. For t...
Article
Full-text available
Figuring the network’s hidden abnormal behavior can reduce network vulnerability. This paper presents a detailed architecture in which the collected log data of the network can be processed and analyzed. We process and integrate on-campus network information from every router and store the integrated NetFlow log data. Ceph is used as an open-source...
Article
Full-text available
In the industrial Internet of things (IIoT), there is always a strong demand for real-time information transfer. Especially when deploying wireless/wired hybrid networks in smart factories, the requirement for low delay interaction is more prominent. Although tree routing protocols have been successfully executed in simple networks, more challenges...
Article
Full-text available
Promoted by the advancements in the various wireless access technologies, modern mobile devices equipped with multiple network interfaces are rapidly becoming the norm, and this provides a driving force for the large-scale deployment of the Multipath Transmission Control Protocol (MPTCP) in the current and future Internet. However, the simultaneous...
Article
Full-text available
Driven by the ubiquitous smart devices, wireless traffic data has increased significantly and brings a great burden on backhaul links. Edge caching and device-to-device are proved not only can overcome the above challenges, but also to reduce the energy consumption of devices. Meanwhile, the development of hardware makes it possible for terminal de...