Eun-Kyu Lee's research while affiliated with Incheon National University and other places

Publications (67)

Article
Full-text available
The Internet of Things (IoT) technology is rapidly being applied to real life, but the application of a corresponding secure and convenient authentication method is still in significant challenge. So far, pattern, password and fingerprint authentication are the most used methods, but it is important to address various security vulnerabilities and l...
Article
Full-text available
Content-Centric Vehicular Networks (CCVNs) are considered as an attractive technology to efficiently distribute and share contents among vehicles in vehicular environments. Due to the large size of contents such as multimedia data, it might be difficult for a vehicle to download the whole of a content within the coverage of its current RoadSide Uni...
Article
Full-text available
Accurate estimation of a neighbor’s evolving position is essential to enhancing safety in intelligent transport systems. A vehicle can estimate a neighbor’s evolving position via periodic beaconing wherein each vehicle periodically broadcasts a beacon including its own kinematic data (e.g., position, speed, and acceleration). Many researchers have...
Article
As the capabilities for vehicular communications have become widespread, periodic beaconing is becoming fundamental to tracking neighbors. Specifically, a vehicle periodically broadcasts its kinematic data and receivers estimate the sender’s evolving position. To ensure safety, tracking neighbors via beaconing requires position errors and transmiss...
Article
Full-text available
Peak-load forecasting prevents energy waste and helps with environmental issues by establishing plans for the use of renewable energy. For that reason, the subject is still actively studied. Most of these studies are focused on improving predictive performance by using varying feature information, but most small industrial facilities cannot provide...
Article
Full-text available
The increasing use of cryptocurrencies has raised scalability and performance issues in blockchain systems that require global consensus and security assurance for real-time payments. The payment channel network (PCN) is a promising off-chain solution for cryptocurrencies; in these networks, transactions are offloaded from the blockchain and are ha...
Article
Full-text available
It has been found that a cloud building energy management system (BEMS) alone cannot support increasing numbers of end devices (e.g., energy equipment and IoT devices) and emerging energy services efficiently. To resolve these limitations, this paper proposes Fog BEMS, which applies an emerging fog computing concept to a BEMS. Fog computing places...
Article
This paper investigates the impact of channel bonding property provided in wireless technology on performance in real-time applications. IEEE 802.11n is an amendment to the IEEE 802.11 Wireless Local Area Network (WLAN) standard, which aims to extensively improve network throughput over legacy WLANs. This new network technology provides a better pe...
Article
Full-text available
The fundamental properties of long-range (LoRa) performance have been revealed by previous research, but advanced issues remain unresolved. This paper tackles three technical challenges that are confronted when establishing a LoRa network on a smart energy campus testbed in Korea. First, the communication range of LoRa in a combined indoor and outd...
Chapter
LoRaWAN is emerging as one of promising wireless technologies for long range IoT communications. At its early stage, its technical specification promises long, reliable communications in ranges up to tens of km (in a rural area). However, its performance of connectivity has not been proved in a real world environment yet. To answer a question of Do...
Chapter
Fog Computing is an emerging paradigm that distributes computing and networking services closer to where user data is generated. The Fog presents a new architecture that “takes processing to the data”. The fog will resolve in the Internet of Things such as bandwidth and cost constraints and performing data fusion, etc. Considering the “distributed”...
Article
Full-text available
This article investigates access control in cyber-physical systems, making a decision to permit or deny a user’s request for access operations on a system. Access operations in cyber-physical system result in diverse impacts on human beings and are perceived with different importance. Say, controlling a nuclear plant and reading data from it must b...
Article
Full-text available
Within the emerging fog network, mobile devices along with local sensors and actuators dynamically form an ad hoc network. As mobile ad hoc networks frequently merge and split in such mobile fog network scenarios, the node addresses must be changed too. This implies that a session may be broken if one of the peers is assigned a new IP address. To o...
Article
Full-text available
Direct vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications have been popularly considered for safe driving of manned or unmanned vehicles. The V2I communication is better than the V2V communication for propagating safety messages at critical regions like intersections where the safety messages must be delivered to surround v...
Article
The concept of future hyper-connected city will include ubiquitous, frequent connections among people, objects, and our environment. In this sense, crowd information is re-interpreted as the level of interactions in which people communicate with physical devices at rooms and stores, and even on streets in various ways. Therefore, it becomes one of...
Article
Full-text available
A microgrid is characterized by the integration of distributed energy resources and controllable loads in a power distribution network. Such integration introduces new, unique challenges to microgrid management that have never been exposed to traditional power systems. To accommodate these challenges, it is necessary to redesign a conventional Ener...
Article
Full-text available
Recent advances in communications, controls, and embedded systems have changed the perception of a car. A vehicle has been the extension of the man’s ambulatory system, docile to the driver’s commands. It is now a formidable sensor platform, absorbing information from the environment (and from other cars) and feeding it to drivers and infrastructur...
Article
Indoor tracking has been a challenging task compared to outdoor cases provided by GPS and a variety of ranging-based solutions. In this work, we propose a promising approach using RFID for indoor mobile object tracking. A moving object equipped with an RFID tag can be tracked by the pre-deployed RFID reader network. It is in the interest of many sc...
Article
Full-text available
With the emerging concept of smart grid, a customer’s building facility is able to consume, generate, and store energy. At the center of the facility, an energy management system is required to perform an efficient energy management and to enable smart grid interoperation. However, the existing EMS is designed only for the management function and d...
Article
Full-text available
Many indoor localization techniques that rely on received signals from Wi-Fi access points have been explored in the last decade. Recently, crowdsourced Wi-Fi fingerprint attracts much attention, which leads to a self-organized localization system avoiding painful survey efforts. However, this participatory approach introduces new challenges with n...
Article
Full-text available
In spite of a recent trend of container ships becoming larger in size, the current circumstance is that managing reefer containers marine transportation is being mostly dependent upon manpower. Particularly, in the case of bad weather or nighttime, reefer containers are not being monitored due to lack of safety device. For the purpose of reducing s...
Article
In this letter, we present an accurate reachability model of a vehicular data dissemination in a non-deterministic fading channel. Reachability refers to the fraction of vehicles that have successfully received a packet within a specified area. Most previous works have been based on two unrealistic assumptions, which induced inaccurate performance...
Article
Existing data centers are each individually owned and operated by a single entity. This situation creates an excessive financial burden upon each entity through the need to over-provision for hardware. While this state of affairs enables a secure and an efficient maintenance scheme for the data center, the financial drawbacks are perhaps excessive....
Article
Attribute-Based Encryption provides an encrypted access control mechanism. A user applies and obtains a private key that is associated with various attributes of the applicant. A secret message is encrypted with an access control policy tree representing a logical combination of different attributes. Only the users whose attributes satisfy the poli...
Article
Full-text available
An Automated Demand Response is the most fundamental energy service that contributes to balancing the power demand with the supply, in which it realizes extensive interoperations between the power consumers and the suppliers. The OpenADR specification has been developed to facilitate the service communications, and several facilities offer primitiv...
Article
This paper proposes a conceptual framework for a safety driving system that can pre-vent secondary collision due to car accidents ahead on a road. The proposed framework uses sensors (shock and velocity), GPS information, video information using a Drone system and multicast transmission in connected-vehicle communication network including V2V and V...
Conference Paper
This work addresses a moving object equipped with an RFID tag can be tracked by the pre-deployed RFID reader network. However, identifying a large scale of tags that surround RFID readers within the limited time raises a big challenge for RFID-based tracking. To solve this problem, we propose a range-free tracking algorithm. The algorithm works wit...
Conference Paper
Ciphertext-Policy Attribute-Based Encryption provides an encrypted access control mechanism for broadcasting messages. A secret message is encrypted with an access control policy tree that contains the logical combination of different attributes. Each qualified user can apply and obtain a private key, which is associated with the various attributes...
Conference Paper
Full-text available
A microgrid can be characterized by its integration of distributed energy resources and controllable loads. Such integration brings unique challenges to the microgrid management and control which can be significantly different from conventional power systems. Therefore, a conventional energy management system (EMS) needs to be redesigned with consi...
Article
A Distributed Energy Resources (DER) system, composed of distributed generation and storage units, has been proposed as a promising enhancement to the traditional power grids. One key challenge to implement a DER system, however, places on standardizing the communication network for seamless information exchange. As one approach, this paper focuses...
Article
Full-text available
A recent trend of increasing container traffic volume using reefer container demands continuous management of reefer container in transit. However, reefer containers can only be monitored at terminal or in ship during marine transportation instead of throughout entire section. In the case of inland transportation section using truck or train, monit...
Article
Geographic routing in wireless sensor networks requires sources nodes to be aware of the location information of sinks to send their data. To provide the sink location service, quorum-based schemes have been proposed, which exploit crossing points between a quorum of a sink location announcement (SLA) message from a sink and a quorum of a sink loca...
Conference Paper
Traditionally, the vehicle has been the extension of the man's ambulatory system, docile to the driver's commands. Recent advances in communications, controls and embedded systems have changed this model, paving the way to the Intelligent Vehicle Grid. The car is now a formidable sensor platform, absorbing information from the environment (and from...
Article
Smart city ecosystems provide fundamental resource services such as water and electricity through an intelligent management system. Here, the authors focus on energy resources for smart grids and smart buildings, investigating how a smart grid infrastructure accesses the energy resources in a smart building to obtain or control data. The energy ser...
Article
Full-text available
Container Security Device (ConTracer) which is suggested in this study is to monitor temperature, humidity, and impact inside of the container while the container is transported. ConTracer could also give information to users when a door of the container is opened over 2 inch within 1 second. Additionally, GPS/GLONASS based global position and stat...
Article
Full-text available
In recent years, Container Security Device(CSD) using GPS & GLONASS to improve logistics efficiency are being extensively researched. The purpose of this paper is to examine the performance development antenna usable cargo container security transport. Antenna developed by study were optimized to match logistics environment apply to GPS/GLONASS dua...
Article
The Energy Service Interface (ESI), sitting at the boundary of a customer facility, plays a communication gateway role - interconnecting internal customer energy resources to external systems. A number of customer energy services are realized over the interconnected communications, which then contributes to smart grid interoperation eventually. In...
Conference Paper
From the customer domain perspective, interoperation implies that external systems are able to control customer's energy resources as well as to read energy-related information. These two types of accesses to an energy resource affect the operation of the customer domain differently. However, most existing security mechanisms were designed at indiv...
Article
The smart grid is characterized by the two-way flow of electric power and information. For the information flow implementation and support, several wireless communication technologies and standards are being considered. Although there is no doubt that using wireless communications offers significant benefits over wired connections, the wireless tec...
Conference Paper
This paper presents the design example and overall operation of an energy storage system (ESS) for applying to the urban railway cars. ESS prevents the line voltage from the voltage fluctuation during the motoring or breaking. It keeps the line voltage not to be increased in deceleration region by storing the regenerative braking energy in the ener...
Article
With technological advancement, recent VANET applications such as safe driving and emergency rescue often demand high position accuracy. Unfortunately, however, conventional localization systems, e.g., GPS, hardly meet new accuracy requirements. To overcome this limitation, this paper proposes an RFID-assisted localization system. The proposed syst...
Article
Full-text available
Jamming attacks are security threats disrupting RF communications in wireless networks. Traditionally, spread spectrum has been proposed as a countermeasure. However, spread spectrum requires secure pre-key establishment before data transmission, with considerable time investment and thus limited functionality. This paper proposes a Frequency Quoru...
Article
Full-text available
In this paper, A Design of 2.45GHz and GPS antenna Integrated Board using Container security Device(ConTracer) for container cargo transportation is proposed and experimentally evaluate. Integrated antenna board include 2.4GHz chip and Ceramic GPS antenna is also consider the impact of RF interference based on simulation for applied to steel contai...
Article
Full-text available
CSD is IEEE Stan없rd 802.15.4b based Container Security Device which is proposed by the U.S Department of Home Security. It is mounted inside the container to sense opening of the container door. ConTracer is the CSD which is developed in this research whose major features are sensing door opening status as well as history inquiring on internal envi...
Conference Paper
Secure transmission among mobile nodes in hostile environments has often been achieved by trading off security with communication latency. However, in time critical applications (e.g., tactical wireless networks, civilian law enforcement operations, homeland security missions, etc.), latency is more critical than any other parameters. Long latency...
Conference Paper
Full-text available
In this paper, we propose a novel packet forwarding scheme based on network coding that is resilient to jamming attack in a tactical area. Wireless communication is necessary in a battlefield, but it is fragile to jamming attacks from an adversary because of the wireless shared medium. Jamming attack is easily achieved by emitting continuous radio...
Article
Full-text available
This paper proposes a novel Frequency Quorum Rendezvous (FQR) scheme for fast and resilient pre-key establishment in anti-jamming spread spectrum techniques. While nodes hop over own frequencies during the key establishment phase, using a quorum system improves their rendezvous probability and reduces time latency.
Conference Paper
Full-text available
Jamming attacks have been recently studied as wireless security threats disrupting reliable RF communication in a wireless network. By emitting noise-like signals arbitrarily on the shared wireless medium, a jammer can easily disturb the network. Countermeasures such as Frequency-Hopping Spread Spectrum enable nodes to avoid the jamming attacks by...
Article
Full-text available
In this study, we propose characteristics improvement methods according to via hole plating method for FBAR Duplexer with bandwidth(: 1850 MHz ~ 1910 MHz, :1930 MHz ~ 1990 MHz) which is used for wireless systems. Also, we designed and fabricated size microminiature FBAR Duplexer based on this proposal. First of all, in this study, we fabricated pen...
Article
Full-text available
CSD is Active RFID based Container Security Device which is proposed by the U.S Department of Home Security. It is mounted inside the container to sense opening of the container door. ConTracer is the CSD which is developed in this research whose major features are sensing door opening status as well as history inquiring on internal environment and...
Article
Full-text available
CSD is Active RFID based Container Security Device which is proposed by the U.S Department of Home Security. It is mounted inside the container to sense opening of the container door. ConTracer is the CSD which is developed in this research whose major features are sensing door opening status as well as history inquiring on internal environment and...
Conference Paper
Full-text available
Providing vehicles' position is essential in VANETs. Currently, GPS positioning is widely used, but the accuracy is not adequate for emerging safety applications. In order to provide accurate positioning, this paper proposes RF-GPS, a RFID-assisted localization system that reliably supports lane-level position accuracy. It improves accuracy of the...
Conference Paper
Full-text available
Due to recent technology advancements, RFID readers have been proposed for several vehicular applications ranging from safe navigation to intelligent transport. However, one obstacle to deployment is the unpredictable read performance. An RFID reader occasionally fails to read an RFID tag even in static circumstances, mostly due to collisions. In a...
Conference Paper
In this study, the research on antenna designing method and overall process were performed in order to apply the RFID tag used at UHF band. Also, the chip impedance measured and antenna impedance had been examined for impedance matching. Through the simulation, the radiation pattern can come out as Omni-directional form at the RFID tag with Au wire...
Conference Paper
In DC electric railway system, when the railcar starts, the electric power is absorbed from the line, and then the line voltage is instantaneously collapsed to provide a large accelerating torque. On the other hand, when the railcar brakes, the regenerative power is created and it increases the line voltage at the pantograph of the railcar. If it i...
Conference Paper
Supercapacitor can be used for energy storage and peak power control in order to increase the efficiency and the life cycle of the system. Recent developments in the field of supercapacitors have led to the achievement of high specific energy and high specific power devices. Due to the capacitances of several hundred farads and serial resistances o...
Conference Paper
In this paper we present a spatial data server which provides not only interoperability but also rapid response for mobile environment with efficient ways, such as use of main memory to eliminate access time from disk on request, management of target data (i.e., GML) in the main memory to eliminate conversion time, spatial index to reduce search ti...
Article
A provision of spatial information is expected to make a market explosion in various fields. A distribution of spatial data on wireless mobile environments indicates a huge expansion of mobile technology as well as a spread of geospatial applications. For high-qualified spatial information, the 4S technology Project that is integrating four kinds o...

Citations

... Although there exist some works [24,27] on privacy-preserving appliance recognition using Federated Learning (FL), they do not consider the presence of noisy labels in training data. In this paper, we address this important challenge by building an appliance recognition model in a collaborative manner using mislabeled training data while preserving consumers' privacy. ...
... Furthermore, depending on the capabilities of the attackers, attacks are further categorized into Data Poisoning, Model Poisoning, and Backdoors attacks. a) Data Poisoning: Data Poisoning attacks are most common in ML but not very effective in FL because updates from benign clients tend to reduce the negative effect of the malicious dataset during the aggregation process [38], [39]. As the attackers modify the dataset, Data Poisoning is thus considered a white-box attack. ...
... Thus, designing an efficient data pre-cache prediction is one of the more efficient techniques to resolve cache problems in VANET. The proposed methodology informs vehicles about interesting safety events, such as pre-decision in disastrous situations, and efficiently overcomes disasters through early prediction results [14]. ...
... The features in the trees are also randomly selected by splitting values without using the criterion of optimizing localization, which enables ExtraTrees to achieve faster computational speed and membership diversity [34]. Current applications of ExtraTrees have emerged in the field of electricity load forecasting, for example, the peak load forecasting [35], day-ahead load demand forecasting case from Spain [36], and medium-and long-term load forecasting [37]. ...
... For instance, activity trackers, such as wearable devices, can connect smartphones as fog servers. Instead of transmitting this data over the backbone network to a remote server, these devices could use the smartphone's computing capacities to analyze the information that they collect [30]. Fog computing gives end-users economic prospects for both data communication and storage costs. ...
... Smart grids are the next application with PHC references [135][136][137][138][139][140][141][142][143][144][145][146]. The authors in ref. [136] presented how cloud computing can manage the smart grid data measured from front-end intelligent devices. ...
... Tabla 4.2: LoRa Spreading Factors[69].Los SF más bajos significan chrips más rápidos y, por tanto, una mayor velocidad de transmisión de datos. Por cada aumento del SF, la velocidad de barrido de los chrips se reduce a la mitad, al igual que la velocidad de transmisión de los datos Figura 4.4: Comparación de Spreading Factors de LoRa: SF 7 a SF 12[70]. Tabla 4.3: Especificaciones técnicas de la tecnología LoRa[69]. ...
... introduces a priority-based access control, find grained protection in cyber physical system. [12] a) Attribute-based identification ...
... However, there are several problems with the downlink broadcast technology. Due to the high latency of eMBMS joining and leaving multicast services, the latency is difficult to meet the requirements of V2X applications [45]; Because the V2V broadcast area of the vehicle is small, variable and overlapping, while the eMBMS broadcast area is a large and fixed broadcast area, the two broadcast areas do not match [3][21] [38]. A number of research programs have been carried out to solve the broadcasting problem. ...
... One of the solutions to this problem is to decentralize the control of distribution systems into a set of small-scale zones called microgrid (MG) [1,3,4]. However, one of the challenges of MG operators is energy management in them [5]. ...