Y
Young-Ho Park
Researcher at Kyungpook National University
Publications - 203
Citations - 3420
Young-Ho Park is an academic researcher from Kyungpook National University. The author has contributed to research in topics: Authentication & Mutual authentication. The author has an hindex of 23, co-authored 162 publications receiving 1491 citations. Previous affiliations of Young-Ho Park include Sangju National University.
Papers
More filters
Journal ArticleDOI
AKM-IoV: Authenticated Key Management Protocol in Fog Computing-Based Internet of Vehicles Deployment
Mohammad Wazid,Palak Bagga,Ashok Kumar Das,Sachin Shetty,Joel J. P. C. Rodrigues,Young-Ho Park +5 more
TL;DR: A secure authenticated key management protocol in fog computing-based IoV deployment, called AKM-IoV, which is tested for its security analysis under the widely accepted real-or-random (ROR) model, informal, and formal security verification using the broadly accepted automated validation of Internet security protocols and applications (AVISPAs).
Journal ArticleDOI
Design of Secure and Lightweight Authentication Protocol for Wearable Devices Environment
Ashok Kumar Das,Mohammad Wazid,Neeraj Kumar,Muhammad Khurram Khan,Kim-Kwang Raymond Choo,Young-Ho Park +5 more
TL;DR: A new lightweight authentication scheme suitable for wearable device deployment that allows a user to mutually authenticate his/her wearable device(s) and the mobile terminal and establish a session key among these devices (worn and carried by the same user) for secure communication between the wearable device and theMobile terminal.
Journal ArticleDOI
BAKMP-IoMT: Design of Blockchain Enabled Authenticated Key Management Protocol for Internet of Medical Things Deployment
Neha Garg,Mohammad Wazid,Ashok Kumar Das,Devesh Pratap Singh,Joel J. P. C. Rodrigues,Young-Ho Park +5 more
TL;DR: A novel blockchain enabled authentication key agreement protocol for IoMT environment, called BAKMP-IoMT, which provides secure key management between implantable medical devices and personal servers and betweenpersonal servers and cloud servers and needs low communication and computational costs as compared to other schemes.
Journal ArticleDOI
Provably Secure ECC-Based Device Access Control and Key Agreement Protocol for IoT Environment
TL;DR: This paper proposes a new certificate-based “lightweight access control and key agreement protocol in the IoT environment, called LACKA-IoT,” that utilizes the elliptic curve cryptography (ECC) along with the “collision-resistant one-way cryptographic hash function.”
Journal ArticleDOI
Intrusion Detection Protocols in Wireless Sensor Networks Integrated to Internet of Things Deployment: Survey and Future Challenges
Sumit Pundir,Mohammad Wazid,Devesh Pratap Singh,Ashok Kumar Das,Joel J. P. C. Rodrigues,Young-Ho Park +5 more
TL;DR: A critical literature survey of recent intrusion detection protocols for IoT and WSN environments along with their comparative analysis is provided and a taxonomy of security and privacy-preservation protocols in WSN and IoT is highlighted.