scispace - formally typeset
Search or ask a question
Author

Seo Yeon Moon

Bio: Seo Yeon Moon is an academic researcher from Seoul National University of Science and Technology. The author has contributed to research in topics: Authentication & Intrusion detection system. The author has an hindex of 9, co-authored 17 publications receiving 724 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: Block-VN is a reliable and secure architecture that operates in a distributed way to build the new distributed transport management system, and examines how the network of vehicles evolves with paradigms focused on networking and vehicular information.
Abstract: In recent decades, the ad hoc network for vehicles has been a core network technology to provide comfort and security to drivers in vehicle environments. However, emerging applications and services require major changes in underlying network models and computing that require new road network planning. Meanwhile, blockchain widely known as one of the disruptive technologies has emerged in recent years, is experiencing rapid development and has the potential to revolutionize intelligent transport systems. Blockchain can be used to build an intelligent, secure, distributed and autonomous transport system. It allows better utilization of the infrastructure and resources of intelligent transport systems, particularly effective for crowdsourcing technology. In this paper, we proposes a vehicle network architecture based on blockchain in the smart city (Block-VN). Block-VN is a reliable and secure architecture that operates in a distributed way to build the new distributed transport management system. We are considering a new network system of vehicles, Block-VN, above them. In addition, we examine how the network of vehicles evolves with paradigms focused on networking and vehicular information. Finally, we discuss service scenarios and design principles for Block-VN.

310 citations

Journal ArticleDOI
TL;DR: A state-of-art of lightweight cryptographic primitives which include lightweight block cipher, hash function, stream ciphers, high performance system, and low resources device for IoT environment are discussed in details.
Abstract: There are many emerging areas in which highly constrained devices are interconnected and communicated to accomplish some tasks Nowadays, Internet of Things (IoT) enables many low resources and constrained devices to communicate, compute process and make decision in the communication network In the heterogeneous environments for IoT, there are many challenges and issues like power consumption of devices, limited battery, memory space, performance cost, and security in the Information Communication Technology (ICT) network In this paper, we discuss a state-of-art of lightweight cryptographic primitives which include lightweight block ciphers, hash function, stream ciphers, high performance system, and low resources device for IoT environment in details We analyze many lightweight cryptographic algorithms based on their key size, block size, number of rounds, and structures In addition, we discuss the security architecture in IoT for constrained device environment, and focus on research challenges, issues and solutions Finally, a proposed security scheme with a service scenario for an improvement of resource constrained IoT environment and open issues are discussed

252 citations

Journal ArticleDOI
TL;DR: An enhanced security framework for smart devices in a smart home environment is proposed that provides the integrity system using the self-signing and access control techniques for preventing the security threats such as data modification, leakage and code fabrication.
Abstract: Since the end of 2000, smartphones have explosively spread and have made people's lives plentiful. With the start of smartphones, new smart devices, including tablet PCs, smart TVs, smart refrigerators, and smart air conditioners, have emerged, expanding their areas from individuals to business and home. These days, smart home service has drawn a lot of attention as a human-centric service. It is the environment where home appliances and other smart devices are connected to internet in order for user service and experience. The current smart home service is simply based on wireless home network to execute the function of connected home. The service has no smart home security so that it is possible for users to suffer a financial loss caused by information leakage or home appliance hacking. Therefore, to apply smart home service to surroundings, it is necessary to take into account security of smart devices. In this paper, we propose an enhanced security framework for smart devices in a smart home environment. The security framework provides the integrity system using the self-signing and access control techniques for preventing the security threats such as data modification, leakage and code fabrication.

108 citations

Journal ArticleDOI
TL;DR: A structured study on semantic-aware work is introduced to find potential contributions that analyze and detect Advanced persistent threat in details and a modeling phase that discusses the typical steps in APT attacks to collect the desired information by attackers is proposed.
Abstract: Recently in the connected digital world, targeted attack has become one of the most serious threats to conventional computing systems. Advanced persistent threat (APT) is currently one of the most important threats considering the information security concept. APT persistently collects data from a specific target by exploiting vulnerabilities using diverse attack techniques. Many researchers have contributed to find approaches and solutions to fight against network intrusion and malicious software. However, only a few of these solutions are particularly focused on APT. In this paper, we introduce a structured study on semantic-aware work to find potential contributions that analyze and detect APT in details. We propose modeling phase that discusses the typical steps in APT attacks to collect the desired information by attackers. Our research explores social network and web infrastructure exploitation as well as communication protocols and much more for future networks and communications. The paper also includes some recent Zero-day attacks, use case scenarios and cyber trends in southeastern countries. To overcome these challenges and attacks, we introduce a detailed comprehensive literature evaluation scheme that classifies and provides countermeasures of APT attack behavior. Furthermore, we discuss future research direction of APT defense framework of next-generation threat life cycle.

88 citations

Journal ArticleDOI
TL;DR: An enhanced security model for detecting Smishing attack (the authors called “S-Detector”) is applied to a Naive Bayes classifier to improve the Smishingattack detection in smart devices and it is possible to analyze a text message and effectively detect SMS phishing.
Abstract: Recently the mobile computing technology has been generally used to people with the development of the IT technology. The mobile computing environment has provided a convenient environment via the intelligent devices such as tablet PC, smartphone, etc. However, many security threats in the mobile computing environment exist. Therefore, secure elements to protect against security threats are needed. In particular, Short Message Service phishing (Smishing) damage has continued to increase with the normalization of mobile computing environment. We discuss and analyze the security considerations about Smishing in mobile computing environments. In addition, we propose an enhanced security model for detecting Smishing attack (we called "S-Detector"). The proposed model is applied to a Naive Bayes classifier to improve the Smishing attack detection in smart devices. This model distinguishes normal text message and Smishing message. And this is mainly used to filter by using statistical learning method. As a result, it is possible to analyze a text message and effectively detect SMS phishing. Finally, we demonstrate the efficiency of our model through the evaluation and analysis of our proposed model.

49 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A comprehensive classification of blockchain-enabled applications across diverse sectors such as supply chain, business, healthcare, IoT, privacy, and data management is presented, and key themes, trends and emerging areas for research are established.

1,310 citations

Journal ArticleDOI
TL;DR: The results of the evaluation show that performance is improved by reducing the induced delay, reducing the response time, increasing throughput, and the ability to detect real-time attacks in the IoT network with low performance overheads.
Abstract: The recent expansion of the Internet of Things (IoT) and the consequent explosion in the volume of data produced by smart devices have led to the outsourcing of data to designated data centers However, to manage these huge data stores, centralized data centers, such as cloud storage cannot afford auspicious way There are many challenges that must be addressed in the traditional network architecture due to the rapid growth in the diversity and number of devices connected to the internet, which is not designed to provide high availability, real-time data delivery, scalability, security, resilience, and low latency To address these issues, this paper proposes a novel blockchain-based distributed cloud architecture with a software defined networking (SDN) enable controller fog nodes at the edge of the network to meet the required design principles The proposed model is a distributed cloud architecture based on blockchain technology, which provides low-cost, secure, and on-demand access to the most competitive computing infrastructures in an IoT network By creating a distributed cloud infrastructure, the proposed model enables cost-effective high-performance computing Furthermore, to bring computing resources to the edge of the IoT network and allow low latency access to large amounts of data in a secure manner, we provide a secure distributed fog node architecture that uses SDN and blockchain techniques Fog nodes are distributed fog computing entities that allow the deployment of fog services, and are formed by multiple computing resources at the edge of the IoT network We evaluated the performance of our proposed architecture and compared it with the existing models using various performance measures The results of our evaluation show that performance is improved by reducing the induced delay, reducing the response time, increasing throughput, and the ability to detect real-time attacks in the IoT network with low performance overheads

549 citations

Journal ArticleDOI
TL;DR: This paper presents an analysis of recent research in IoT security from 2016 to 2018, its trends and open issues, and the relevant tools, modellers and simulators.

537 citations

Journal ArticleDOI
TL;DR: A comprehensive survey on the literature involving blockchain technology applied to smart cities, from the perspectives of smart citizen, smart healthcare, smart grid, smart transportation, supply chain management, and others is provided.
Abstract: In recent years, the rapid urbanization of world’s population causes many economic, social, and environmental problems, which affect people’s living conditions and quality of life significantly. The concept of “smart city” brings opportunities to solve these urban problems. The objectives of smart cities are to make the best use of public resources, provide high-quality services to the citizens, and improve the people’s quality of life. Information and communication technology plays an important role in the implementation of smart cities. Blockchain as an emerging technology has many good features, such as trust-free, transparency, pseudonymity, democracy, automation, decentralization, and security. These features of blockchain are helpful to improve smart city services and promote the development of smart cities. In this paper, we provide a comprehensive survey on the literature involving blockchain technology applied to smart cities. First, the related works and background knowledge are introduced. Then, we review how blockchain technology is applied in the realm of smart cities, from the perspectives of smart citizen, smart healthcare, smart grid, smart transportation, supply chain management, and others. Finally, some challenges and broader perspectives are discussed.

472 citations

Journal ArticleDOI
TL;DR: A systematic review of the literature finds four main clusters in the co-citation analysis, namely Technology, Trust, Trade, and Traceability/Transparency, and discusses the emerging themes and applications of blockchains for supply chains, logistics and transport.
Abstract: This paper presents current academic and industrial frontiers on blockchain application in supply chain, logistics and transport management. We conduct a systematic review of the literature and find four main clusters in the co-citation analysis, namely Technology, Trust, Trade, and Traceability/Transparency. For each cluster, and based on the pool of articles included in it, we apply an inductive method of reasoning and discuss the emerging themes and applications of blockchains for supply chains, logistics and transport. We conclude by discussing the main themes for future research on blockchain technology and its application in industry and services.

437 citations