scispace - formally typeset
Y

Young-Ho Park

Researcher at Kyungpook National University

Publications -  203
Citations -  3420

Young-Ho Park is an academic researcher from Kyungpook National University. The author has contributed to research in topics: Authentication & Mutual authentication. The author has an hindex of 23, co-authored 162 publications receiving 1491 citations. Previous affiliations of Young-Ho Park include Sangju National University.

Papers
More filters
Journal ArticleDOI

AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment

TL;DR: A secure authenticated key management protocol in fog computing-based IoV deployment, called AKM-IoV, which is tested for its security analysis under the widely accepted real-or-random (ROR) model, informal, and formal security verification using the broadly accepted automated validation of Internet security protocols and applications (AVISPAs).
Journal ArticleDOI

Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment

TL;DR: A new lightweight authentication scheme suitable for wearable device deployment that allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal and establish a session key among these devices (worn and carried by the same user) for secure communication between the wearable device and theMobile terminal.
Journal ArticleDOI

BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment

TL;DR: A novel blockchain enabled authentication key agreement protocol for IoMT environment, called BAKMP-IoMT, which provides secure key management between implantable medical devices and personal servers and betweenpersonal servers and cloud servers and needs low communication and computational costs as compared to other schemes.
Journal ArticleDOI

Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment

TL;DR: This paper proposes a new certificate-based “lightweight access control and key agreement protocol in the IoT environment, called LACKA-IoT,” that utilizes the elliptic curve cryptography (ECC) along with the “collision-resistant one-way cryptographic hash function.”
Journal ArticleDOI

Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges

TL;DR: A critical literature survey of recent intrusion detection protocols for IoT and WSN environments along with their comparative analysis is provided and a taxonomy of security and privacy-preservation protocols in WSN and IoT is highlighted.