H
Hoon-Jae Lee
Researcher at Dongseo University
Publications - 308
Citations - 3304
Hoon-Jae Lee is an academic researcher from Dongseo University. The author has contributed to research in topics: Wireless sensor network & Authentication. The author has an hindex of 25, co-authored 303 publications receiving 2865 citations. Previous affiliations of Hoon-Jae Lee include Sogang University.
Papers
More filters
Journal ArticleDOI
Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey
Pardeep Kumar,Hoon-Jae Lee +1 more
TL;DR: The security and privacy issues in healthcare application using WMSNs are discussed, some popular healthcare projects using wireless medical sensor networks are highlighted, and their security is discussed, and a summary of open security research issues that need to be explored for future healthcare applications using W MSNs are explored.
Journal ArticleDOI
E-SAP: Efficient-Strong Authentication Protocol for Healthcare Applications Using Wireless Medical Sensor Networks
TL;DR: It is demonstrated that E-SAP is more secure against many practical attacks, and allows a tradeoff between the security and the performance cost for healthcare application using WMSNs.
Journal ArticleDOI
Distributed SDN controller system
TL;DR: It is discovered that the methods for logically centralized network control can be classified into several design choices that are trending among SDN adopters, and it is concluded that each design begets some characteristics.
Book ChapterDOI
The LILI-II Keystream Generator
Andrew Clark,Ed Dawson,Joanne Fuller,Jovan Dj. Golic,Hoon-Jae Lee,William Millan,S.-J. Moon,Leone Simpson +7 more
TL;DR: The LILI-II keystream generator is a LFSR based synchronous stream cipher with a 128 bit key that offers large period and linear complexity, is immune to currently known styles of attack, and is simple to implement in hardware or software.
Journal ArticleDOI
Security analysis and improvements of authentication and access control in the Internet of Things.
TL;DR: This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al and proposes improvements to the protocol to fill the discovered weakness gaps.