Sang Guun Yoo

Sang Guun Yoo
Verified
Sang Guun verified their affiliation via an institutional email.
Verified
Sang Guun verified their affiliation via an institutional email.
  • Doctor of Philosophy
  • Professor at National Polytechnic School

About

93
Publications
101,745
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,303
Citations
Current institution
National Polytechnic School
Current position
  • Professor
Additional affiliations
August 2001 - May 2006
ExtremoSoftware (Microsoft Certified Partner)
Position
  • Founder & CTO
August 2016 - present
Universidad de las Fuerzas Armadas-ESPE
Position
  • Invited Professor
September 2011 - May 2012
Central American Integration System
Position
  • Scholar
Education
February 2010 - February 2013
Sogang University
Field of study
  • Computer Science and Engineering
February 2008 - February 2010
Sogang University
Field of study
  • Computer Science and Engineering

Publications

Publications (93)
Article
Full-text available
This article presents a systematic literature review of technologies and solutions for cattle tracking and monitoring based on a comprehensive analysis of scientific articles published since 2017. The main objective of this review is to identify the current state of the art and the trends in this field, as well as to provide a guide for selecting t...
Conference Paper
Full-text available
Currently, user authentication only based on passwords can be inadequate due to different types of vulnerabilities and attacks. To solve this problem, two-factor authentication is commonly used, providing a higher level of security when the user logs into their accounts, and one popular example of two-factor authentication is the combination of pas...
Article
Full-text available
This paper presents a comprehensive examination of smart farming solutions through a systematic review of literature available in various digital repositories. Methodologically, we categorize the devices and technologies utilized in these solutions into sensors, actuators, gateways, power supplies, networking, data storage, data processing, and inf...
Chapter
Full-text available
The release of LoRaWAN in 2015 introduced specification v1.0, which outlined its key features, implementation, and network architecture. However, the initial version had certain flaws, particularly vulnerabilities to replay attacks due to encryption keys, counters, and nonce schema. To address these concerns, the LoRa Alliance subsequently released...
Chapter
Full-text available
Wireless networks constant expansion and the growth of smart devices connectivity, has motivated the search of new communication solutions to provide benefits for social problems like citizen insecurity where home robbery is one of the most relevant. A solution this type of problem is home automation, by using sensors that can detect intrusions at...
Article
Full-text available
LoRaWAN is a communication protocol designed especially for Internet of Things (IoT) applications that offers benefits such as long-distance connection and low power consumption. Due to the characteristics of LoRaWAN, this technology has gained great popularity in various IoT applications, such as environmental monitoring, smart agriculture, and ap...
Article
Artificial intelligence has experienced significant growth in recent decades. As a result, several architectures have been developed for object detection, classification, and recognition. Currently, there are several alternatives that fulfill these purposes; however, there is no rigid framework defining how these architectures are formed. This work...
Chapter
Artificial intelligence has experienced significant growth in recent decades. As a result, several architectures have been developed for object detection, classification, and recognition. Currently, there are several alternatives that fulfill these purposes; however, there is no rigid framework defining how these architectures are formed. This work...
Chapter
Full-text available
The objective of this paper is to share the knowledge required for developing a One-Time Password (OTP) system and the practical experience of developing a real one using microservices and different programming languages, remembering that the OTP is the most popular mechanism to carry out a two-factor authentication process. To achieve this purpose...
Article
Full-text available
Around 1,35 million people worldwide die each year because of traffic incidents, and it is estimated that another 50 million suffers serious injuries. This picture is particularly dramatic in the Andean Region where the death toll due to traffic accidents is as high as 127 deaths per million inhabitants. In recent years the deployment of the so-cal...
Chapter
Full-text available
In this work, a prototype based on gaze tracking to control IoT devices was made. This prototype is a web application where the user can interact with interfaces through the gaze. The user can send commands to an IoT device using this application. For the creation of the aforementioned system, the iterative and incremental development methodology w...
Chapter
Full-text available
Gaze tracking is a technological discipline that offers an alternative interaction between human and computer. A common solution based on gaze tracking has two elements: a hardware device to obtain data from user’s gaze and a library to process the gathered data. This work makes a formal analysis of previous works in gaze tracking. It presents the...
Article
Full-text available
Metaverse is a new technology which is evolving rapidly in the world of Internet and education. This service involves other novel technologies such as blockchain, cryptocurrency, virtual reality, avatars, knowledge management, etc., and this situation makes it necessary the implementation of new security mechanism including an evolved user authenti...
Chapter
Full-text available
Internet of Things allows devices to communicate each other and with users. This way, people can control and monitor these devices using mobile applications, voice commands, gestures, among others. It is a technology that makes people’s life easier. However, people with severe physical disabilities cannot take advantage of this technology since the...
Article
Full-text available
The arrival of IoT has brought constant innovation. This innovation has allowed many “things” (sensors, wearable devices, smart appliances, among others) to be connected to the Internet to deliver the information they collect. This need for connection has set the tone for the development of new protocols that adapt to the IoT environment, taking in...
Article
Full-text available
IoT systems contribute to digital transformation through the development of smart concepts. However, the IoT has also generated new security challenges that require security tools to be adapted, such as risk analysis methodologies. With this in mind, the purpose of our study is based on the following question: Which factors of IoT devices should be...
Chapter
Full-text available
Cities have adopted the smart city model based on decision-making to maintain their sustainability and resilience. The decision-making process on a smart city is based on data generated in real-time for the city’s senzorization layer of physical components. For this goal, the digital abstraction of the physical aspects of city using digital twin to...
Chapter
Full-text available
The characteristics of the stimulus can influence the strength of the SSVEP responses. However, a complete study of the influence of different characteristics of SSVEP stimuli was not considered in previous works. The present work has performed different experiments including the most important characteristics of a visual stimulus that can affect t...
Chapter
Full-text available
This study employs a novel emotion elicitation method to recollect EEG signals using an EEG-based BCI commercial device with 14 channels for emotion recognition with machine learning algorithms. We obtained EEG signals of six participants playing a complete Texas hold ’em poker game consisting of several hands in a sit-and-go online tournament with...
Chapter
Full-text available
Smart waste management is one of the most important services in smart cities. An efficient waste collection system based on IoT technologies allows having the streets clean and reducing resource consumption by optimizing garbage collecting trucks’ routes. In this situation, the present work proposes a smart management system based on LoRaWAN. This...
Chapter
Full-text available
In this paper, we analyze the participants’ state of mind through the measurement of EEG readings like alpha, theta, gamma, and beta waves. To obtain the EEG readings, we use OpenBCI with its Cyton Bluetooth helmet product. Due to its higher temporal resolution, EEG is an important noninvasive method for studying the transient dynamics of the human...
Chapter
Full-text available
We present a novel method of emotion elicitation through stock trad- ing activities in a competitive market for automatic emotion recognition. We pre- pared eight participants, who placed buy and sell orders of a specific and very volatile security in simulated trading with real-time market data. A “carrot and stick” approach was implemented to eli...
Article
Full-text available
Data published by different organizations such as the United Nations indicates that there are a large number of people who suffer from different types of movement disabilities. In many cases, the disability is so severe that they cannot have any kind of movements. Faced with this situation, Brain Computer Interface technology has taken up the chall...
Article
Full-text available
Smart cities exploit emerging technologies such as Big Data, the Internet of Things (IoT), Cloud Computing, and Artificial Intelligence (AI) to enhance public services management. The use of IoT allows detecting and reporting specific parameters related to different domains of the city, such as health, waste management, agriculture, transportation,...
Article
Full-text available
Affecting computing is an artificial intelligence area of study that recognizes, interprets, processes, and simulates human affects. The user’s emotional states can be sensed through electroencephalography (EEG)-based Brain Computer Interfaces (BCI) devices. Research in emotion recognition using these tools is a rapidly growing field with multiple...
Article
Full-text available
Finding a parking space in a city is one of the most common activities of a driver. This becomes more difficult when the city is unknown or has huge vehicular congestion. A solution to address this issue is called smart parking. Smart parking solutions rely on Internet of Things (IoT) and several technologies to achieve their purpose. This paper pr...
Chapter
Full-text available
Context:Extension of battery lifetime on mobile devices is an aspect which is continuously studied by both manufacturers and applications developers. Problem: Most studies are focused on extending Li-Ion batteries lifetime (commonly used in mobile devices), on the premise that charge cycles in this kind of batteries do not reach 100% of their capac...
Article
Full-text available
Nowadays, Internet of Things (IoT) is becoming a major research area, since, its applications can improve people’s life. Even when its purpose is to facilitate daily tasks for everyone, it does not fully consider people with disabilities. Even voice or gesture command technologies can help most of people with disabilities,Motor Neuron Diseases (MND...
Chapter
Full-text available
A proper product demand projection is an aspect that can be decisive for the competitiveness and survival of companies. However, in most of cases, this process is carried out based on empirical knowledge of the marketing personnel generating a high level of error in the results. To solve this problem, this paper presents a production planning archi...
Chapter
Full-text available
This paper describes a new risk analysis methodology for libraries based on steps filtered from existing methodologies that are compatible with the ISO/IEC 27000: 2013 standard. After analyzing MAGERIT, OCTAVE and NIST 800-30 risk analysis methodologies, the most important steps were identified and those that do not fit in library type of organizat...
Article
Full-text available
This article proposes an emotion elicitation method to develop our Stock-Emotion dataset: a collection of the participants’ electroencephalogram (EEG) signals who paper-traded using real stock market data, virtual money, and outcomes that emotionally affected them. A system for emotion recognition using this dataset was tested. The system extracted...
Article
Full-text available
The New Urban Agenda (Agenda 2030) adopted at the United Nations Conference related to Sustainable Urban Development (Habitat III) in the year 2016 has the goal of prompting cities to achieve the identified Sustainable Development Goals by the year 2030. In this context, cities can experiment strategies of circular economy for the optimization of r...
Article
Full-text available
The development and high growth of the Internet of Things (IoT) have improved quality of life and strengthened different areas in society. Many cities worldwide are looking forward to becoming smart. One of the most popular use cases in smart cities is the implementation of smart parking solutions, as they allow people to optimize time, reduce fuel...
Article
Nowadays, IoT, cloud computing, mobile and social networks are generating a transformation in social processes. Nevertheless, this technological change rise to new threats and security attacks that produce new and complex cybersecurity scenarios with large volumes of data and different attack vectors that can exceeded the cognitive skills of securi...
Article
Full-text available
Population growth worldwide is considered a health issue in this moment and it will have greater impact in the following years due to the limited number of specialists in the medical field. Health organizations present a special concern in older adults over 65 years because most of them live alone and their growth rate is the highest one in the wor...
Chapter
Full-text available
Indoor location-based application and services based on Wi-Fi have serious problems in terms of privacy since attackers could track users by capturing their MAC addresses. Although several initiatives have been proposed by scientific community to properly address authentication by strongly preserving privacy, there are still improvements and steps...
Conference Paper
Full-text available
The aging process includes the degradation of physical and neurological functions in the people. Although the process of degradation of functions is normal, in some people due to certain risk factors the impact can be high. The appearance of chronic diseases in older adults, one of which is Alzheimer's with about 46.8 million affected worldwide, ca...
Chapter
Full-text available
This paper studies the possibilities of making prediction of stock market prices using historical data and machine learning algorithms. We have experimented with stock market data of the Apple Inc. using random trees and multilayer perceptron algorithms to perform the predictions of closing prices. An accuracy analysis was also conducted to determi...
Chapter
Full-text available
In this work, a methodology for the automated classification of Landsat 8 images from the integration of Artificial Neural Networks and the identification of pixels of pure classes is presented. The exercise carried out in this research by using the SEPAL platform, allowed to obtain a mosaic L8 of the study area, fully preprocessed and calibrated,...
Article
Full-text available
This document aims to present the state of the art regarding the subject of data recovery in SSD storage devices whose information loss has been caused physical damage are these human or environmental factors and proposed the most common scenarios of the causes of this loss being these blows or humidity, also the techniques of file carving are anal...
Chapter
Full-text available
The intention of this work is to propose and develop a Brain-Computer Interface solution for people with movement disabilities. The proposed solution will read, monitor and translate brainwaves generated from the Central Nervous System of a person with movement disabilities to replace/rehabilitate his/her natural movements or for allowing him/her t...
Chapter
Full-text available
The present paper makes a study of the maturity of Information Security Management Systems of the Public Sector of Ecuador. Through a theoretical study, 5 factors were determined that make up an effective Information Security Management System: internal organizational control, information security policy, information security culture, and technical...
Conference Paper
Full-text available
The development of new voice-controlled home assistant devices such as Amazon Echo and Google Home has allowed the interaction between users and devices in a more human and familiar way. With this background, this project aims to use Amazon Echo, Alexa, and complementary technologies to implement a smart home environment by controlling external dev...
Conference Paper
Full-text available
The objective of this is to find the competencies or success factors that characterize the leaders in the segment of savings and credit cooperatives. To reach the aforementioned objective, the Lominger methodology was used, which considers the competencies as observable and measurable behaviors of executives. The study is based on quantitative-qual...
Article
Full-text available
Electricity demand prediction plays an essential role in short-term load allocation and long-term planning for new generation and transmission infrastructures. An accurate prediction also allows to take better decisions in terms of cost and energy efficiency. In this aspect, this paper proposes a model for predicting the electricity consumption of...
Article
Full-text available
Technological advance in the last decades has permitted the development of many applications that avoid the interaction of people with social networks and other smart phones features while they have an altered state of consciousness caused by alcohol consumption. However, none application identifies altered state of consciousness in real time on Fa...
Conference Paper
Full-text available
Internet of Things (IoT) is growing every day since it has allowed the interconnection of different devices existent in smart environments e.g. home environment, and because it has allowed improving or supporting different services such as physical security, energy consumption management, entertainment among others. The smart home environment, also...
Conference Paper
Full-text available
Public entities around the world are adapting and adopting international standards to improve their internal processes, and Ecuador is not the exception. The National Secretariat of Public Administration decided to implement the standard ISO/IEC 27001: 2005 in order to respond to the continuous attacks and computer crimes presented in different pub...
Article
Full-text available
This document describes the experience in developing a Timestamping application for the Electronic Factoring process in Ecuador which executes the process of electronic signing of documents in XML format with timestamp. The need of this application has its origin in an Electronic Factoring platform developed by the company BIGDATA CA, where it was...
Article
Full-text available
This paper is focused on radio frequency identification (RFID) technology which allows the wireless and remote identification of an entity (e.g. product or device). The high level of usability and security of this technology allows optimizing the processes of detection and location of items in an inventory system, generating great benefits such as...
Conference Paper
Full-text available
Nowadays, it is impossible to ignore the implementation of security features in information systems since they manage important assets that are critical for the business processes of organizations. In this aspect, there have been several researches for introducing the security analysis in different stages of software development life cycle. Among t...
Article
Full-text available
The present work focuses on sharing our experience in applying the methodology MAGERIT to identify threats and vulnerabilities that could be materialized in risks and affect company’s financial statements. The present work was executed in a real company of the Agro-industrial field. The research results indicate that the application of ISO/IEC 2700...
Article
Full-text available
Almost immediately after the initial design and implementation of first computers systems accessible to the general public and businesses, computer programs so called viruses and malware appeared into computing and informatics scenario, representing a big threat to normal informatics applications operation, and in most cases causing loss of time, d...
Article
Full-text available
Malware has become a powerful and sophisticated tool used by malicious users to compromise and harm systems, and its evasion ability has improved considerably, getting to the point of becoming completely undetectable. On the other hand, machine learning has evolved tremendously in last years and it has become a standard in many IT solutions includi...
Article
Full-text available
From historical times, classification of patients according their priority level has been considered very important. In this aspect, this paper intends to share some experiences in improving the turn allocation process in the emergency room of a hospital using machine learning algorithms. The present work compares several models such as Naive Bayes...
Article
Full-text available
Despite an imminent arrival of the 5G communication technology, there are only a few research works done using such technology in the field of vehicular networks. One of the pioneers in proposing a service for 5G enabled vehicular networks is the Eiza-Ni-Shi Scheme. In such scheme, the authors present an innovative system model for 5G vehicular net...
Conference Paper
Full-text available
Indoor location-based application and services have drawn businesses attention as they have shown advances in conjunction with a growing importance of ubiquitous computing and context-dependent information. However, current systems have serious problems in terms of privacy since attackers can track users by analyzing information captured from the n...
Article
Full-text available
Purpose - Since mobile devices can hold vast amounts of confidential and sensitive information, they are attractive targets for criminals. Both individuals and society as a whole can suffer serious consequences if these devices are compromised. However, even though the importance of securing mobile devices, many of users are not conscious of the se...
Article
Full-text available
Usageoflocation based services in indoor environments has grown as the popularity of smart devices has been extended. Location Based Services can be generally classified in Indoor LBS and Outdoor LBS. The most common and well-known Outdoor LBS mechanism is the Global Positioning System (GPS) because of its high coverage and accuracy in outdoor envi...
Article
Full-text available
The present work takes a tour about the influence of music in the society and tries to find the connections between the personality and the musical preferences in people. The work is proposed to identify a mechanism capable of evaluating personality; the mechanism is framed within five major factors embodied in the OCEAN model, which was determined...
Conference Paper
Full-text available
Wireless sensor networks are being applied in different fields. One of those fields is the body sensor networks. Body sensor networks is a kind of wireless sensor network with higher flexibility and sensitivity because the sensors are put on or in user's body. As healthcare applications includes confidential information, security becomes one of the...
Article
Full-text available
One of the fields where wireless sensor networks are being widely applied is the area body sensor networks for healthcare applications. As healthcare applications manage private data of patients, the security becomes one of the most critical requirements to consider. In this aspect, there have been several researches delivering security mechanisms...
Article
Full-text available
Defending from DDoS attacks have become more difficult because they have evolved in many ways. Absence of a specific predetermined pattern, increase of number of attack devices, and distributed execution of the DDoS attack makes hard the recognition of the attack sources and thus application of countermeasures. When the DDoS attack is being execute...
Article
Full-text available
Recently, several user authentication schemes for wireless sensor networks based on two-factor concept using the smart card technology were proposed. However, they have serious limitations in terms of security and usability. First, even though they are enhancements of other works, they still have several security flaws, such as vulnerability agains...
Article
Full-text available
Mobile devices such as tab devices (e.g. iPad, Galaxy Tab), smart phones, laptops, and ultra-mobile personal computers (UMPCs) have become very popular as an access point of important information because of benefits such as small size and mobility. However, because of their high probability of loss or theft, it can turn into a point of information...
Article
Full-text available
The issue of JTAG security has recently become of interest not only to academic researchers but also to industrial entities. As a response to this security need, several security approaches using fuses, key matching, and three-entity authentication approaches have been proposed. However, each of those solutions only provides the idea of the securit...
Article
Full-text available
In this paper we propose a protection mechanism for the debug port. While debug ports are useful tools for embedded device development and maintenance, they can also become potential attack tools for device hacking in case their usage is permitted to hackers with malicious intentions. The proposed approach prevents illicit use of debug ports by con...
Article
Full-text available
The uses of wireless sensor networks have increased to be applicable in many different areas, such as military applications, ecology, and health applications. These applications often include the management of confidential information, making the issue of security one of the most important aspects to consider. In this aspect, a user authentication...
Article
Full-text available
With the improvement of the wireless communication and embedded technology, the application of wireless sensor network has increased to various fields. However, such type of network embeds more vulnerabilities than others because of its resource constrained characteristic. To counteract such problem, traditional security mechanisms such as cryptogr...
Article
Full-text available
WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is an emerging wireless broadband Internet technology providing full mobility through open IP based network with various types of terminals. The security of WiBro is based on the IEEE 802.16e-2005 with new version of PKMv2 (Privacy Key Management version 2) w...
Conference Paper
Full-text available
WiBro (Wireless Broadband), the service based on the IEEE 802.16e (mobile WiMAX) standard, is a wireless broadband Internet technology developed by the South Korean telecommunications industry. In this paper, we analyze security vulnerabilities of the WiBro standard, focusing on the initial authentication phase and propose a specification-based int...
Conference Paper
Full-text available
Information systems manage assets that are critical for the business processes of organizations. Therefore, it is imperative that information systems be guaranteed and secured from the beginning of their development life cycle. Several approaches such as misuse cases, attack tree, and threat modeling have been proposed by way of security requiremen...
Article
Full-text available
JTAG (Joint Test Access Group) is a powerful tool for the embedded system development environments. The features of JTAG, however, can be exploited by malicious users as a backdoor for launching attacks, an approach which now constitutes a major threat in the domain of device hacking. To deny unauthenticated users access to the features of JTAG por...
Conference Paper
Full-text available
Wireless sensor networks are used in many applications in military, ecological, health, and other areas. These applications often include the monitoring of sensitive information making the security issue one of the most important aspects to consider in this field. However, most of protocols optimize for the limited capabilities of sensor nodes and...
Article
Shadow file, 또는 윈도우의 SAM 파일) 얻을 수 있다. 그리고 Brute Force Attack과 Dictionary Attack을 통하여 암호 정보들 로부터 사용자의 암호를 분석해 낼 수 있다. 따라서 이러한 공격을 방지하려면 사용자에게 복잡한 암호를 사용하도록 강제해 야 한다. 하지만 그것은 한계가 있으며 알아내기 쉬운 간단한 암호를 사용하는 사용자들은 항상 존재하기 마련이다. 따라서 보 다 근본적인 보안 대책이 요구된다. 본 논문에서는 사용자 암호의 복잡도와 상관없이 Brute Force Attack과 Dictionary Attack 으로부터 안전한 전자서명(Digital Signature) 및 TPM...

Network

Cited By