Ki-Hyung Kim

Orcid: 0000-0001-6624-3003

According to our database1, Ki-Hyung Kim authored at least 113 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cyber Attack Defense: DID-based Email Security System.
Proceedings of the International Conference on Information Networking, 2024

Deep Learning-Based SBOM Defect Detection for Medical Devices.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication , 2024

2023
Security Framework for Network-Based Manufacturing Systems with Personalized Customization: An Industry 4.0 Approach.
Sensors, September, 2023

A Comprehensive Study on Cyber Attacks in Communication Networks in Water Purification and Distribution Plants: Challenges, Vulnerabilities, and Future Prospects.
Sensors, September, 2023

High-Speed Network DDoS Attack Detection: A Survey.
Sensors, August, 2023

Home IoT Authority Control Method Based on DID Auth.
Proceedings of the Fourteenth International Conference on Ubiquitous and Future Networks, 2023

A V2X Access Authorization Mechanism based on Decentralized ID (DID) and Verifiable Credentials (VC).
Proceedings of the International Conference on Information Networking, 2023

2022
Decentralized Identifiers (DIDs)-Based Authentication Scheme for Smart Health Care System.
Proceedings of the Thirteenth International Conference on Ubiquitous and Future Networks, 2022

Blockchain-enabled Access Control with Fog Nodes for Independent IoTs.
Proceedings of the International Conference on Information Networking, 2022

2021
Moisture Computing-Based Internet of Vehicles (IoV) Architecture for Smart Cities.
Sensors, 2021

Image Compression Using Chain Coding for Electronic Shelf Labels (ESL) Systems.
IEEE Access, 2021

Vulnerability Analysis of DID Document's Updating Process in the Decentralized Identifier Systems.
Proceedings of the International Conference on Information Networking, 2021

A Subject-Centric Credential Management Method based on the Verifiable Credentials.
Proceedings of the International Conference on Information Networking, 2021

Attribute-Based Access Control(ABAC) with Decentralized Identifier in the Blockchain-Based Energy Transaction Platform.
Proceedings of the International Conference on Information Networking, 2021

Analysis on the Privacy of DID Service Properties in the DID Document.
Proceedings of the International Conference on Information Networking, 2021

Principal Component Analysis Implementation for Signal Processing of Electrochemical Impedance Spectroscopy in the Detection of Fake Fingerprints.
Proceedings of the International Conference on Artificial Intelligence in Information and Communication, 2021

2020
An Assistant Service for Customers in QR-payment with the Merchant Presented Mode.
Proceedings of the 2020 International Conference on Information Networking, 2020

Proof-of-Lottery: Design for Block Producing Algorithm Based on PoS for Scalability.
Proceedings of the 2020 International Conference on Information Networking, 2020

Power Trading Blockchain using Hyperledger Fabric.
Proceedings of the 2020 International Conference on Information Networking, 2020

Privacy and Ledger Size Analysis for Healthcare Blockchain.
Proceedings of the 2020 International Conference on Information Networking, 2020

Random Seed Generation For IoT Key Generation and Key Management System Using Blockchain.
Proceedings of the 2020 International Conference on Information Networking, 2020

2019
Blockchain-Based Management of Video Surveillance Systems.
Proceedings of the 33rd International Conference on Information Networking, 2019

Improving TDoA Based Positioning Accuracy Using Machine Learning in a LoRaWan Environment.
Proceedings of the 33rd International Conference on Information Networking, 2019

2018
Escalator: An Autonomous Scheduling Scheme for Convergecast in TSCH.
Sensors, 2018

CEnsLoc: Infrastructure-Less Indoor Localization Methodology Using GMM Clustering-Based Classification Ensembles.
Mob. Inf. Syst., 2018

A hybrid mode to enhance the downward route performance in routing protocol for low power and lossy networks.
Int. J. Distributed Sens. Networks, 2018

Cyber security of critical infrastructures.
ICT Express, 2018

A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

Dynamic Access Control Scheme for IoT Devices using Blockchain.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018

Implementation of IoT system using block chain with authentication and data protection.
Proceedings of the 2018 International Conference on Information Networking, 2018

Block chain based data security enhanced IoT server platform.
Proceedings of the 2018 International Conference on Information Networking, 2018

2017
An Algorithm for Timely Transmission of Solicitation Messages in RPL for Energy-Efficient Node Mobility.
Sensors, 2017

A Security Analysis and Reinforcement Design Adopting Fingerprints over Drawbacks of Passwords Based Authentication in Remote Home Automation Control System.
Proceedings of the 6th International Conference on Informatics, 2017

Dynamic routing influence on secure enterprise network based on DMVPN.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

MDA approach towards a unified application development framework.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Industrial control system security framework for ethiopia.
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017

Scenario and countermeasure for replay attack using join request messages in LoRaWAN.
Proceedings of the 2017 International Conference on Information Networking, 2017

Risk analysis and countermeasure for bit-flipping attack in LoRaWAN.
Proceedings of the 2017 International Conference on Information Networking, 2017

Reducing positioning errors in the important access point selection method for fingerprint localization by spatial partitioning.
Proceedings of the 2017 International Conference on Information Networking, 2017

2016
Traffic-aware Cooperative Binary Exponential Backoff Algorithm for Low Power and Lossy Networks.
Wirel. Pers. Commun., 2016

An entropy-based clustering algorithm for load balancing in WSN.
Int. J. Sens. Networks, 2016

A Gateway Deployment Heuristic for Enhancing the Availability of Sensor Grids.
Int. J. Distributed Sens. Networks, 2016

2015
An ECDH-based light-weight mutual authentication scheme on local SIP.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

An efficient generation mechanism of HMI information for heterogeneous PLCs.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

Multi-antenna channel capacity enhancement in wireless communication.
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015

An OAuth based authentication mechanism for IoT networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015

A hybrid service discovery approach to mitigate overhead concentration on resource directory.
Proceedings of the 2015 International Conference on Information Networking, 2015

2014
Merkle tree-based wormhole attack avoidance mechanism in low power and lossy network based networks.
Secur. Commun. Networks, 2014

Virtual group leader election algorithm in distributed WSN.
Proceedings of the Sixth International Conference on Ubiquitous and Future Networks, 2014

Implementation of adaptive binary exponential backoff (ABEB) algorithm with dynamical sizing buffer for load-balanced RPL.
Proceedings of the Sixth International Conference on Ubiquitous and Future Networks, 2014

Cluster-based failure detection and recovery scheme in wireless sensor network.
Proceedings of the Sixth International Conference on Ubiquitous and Future Networks, 2014

GIDPS: A game theory-based IDPS for RPL-networked low power lossy networks with energy limitation.
Proceedings of the Sixth International Conference on Ubiquitous and Future Networks, 2014

2013
WEAMR - A Weighted Energy Aware Multipath Reliable Routing Mechanism for Hotline-Based WSNs.
Sensors, 2013

Secure session key exchange scheme for Smart Grid Home Area Networks.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

A fast and efficient wireless AP connection approach based on NFC Tag.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

Q-learning based adaptive subgraph generation algorithm for graph routing in ISA 100.11a.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

2012
Power Sharing and Control in Distributed Generation With Wireless Sensor Networks.
IEEE Trans. Smart Grid, 2012

LABILE: link quAlity-based lexIcaL routing mEtric for reactive routing protocols in IEEE 802.15.4 networks.
J. Supercomput., 2012

Remote Industrial Sensor Network Monitoring Using M2M Based Ethical Sniffers.
Int. J. Distributed Sens. Networks, 2012

Cluster-based AAA architecture for wireless sensor and WiMax networks.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

Wireless Sensor Networks for integrated search and rescue efforts for disaster hit areas.
Proceedings of the Fourth International Conference on Ubiquitous and Future Networks, 2012

Optimizing time schedule of key updates in ISA100.11a.
Proceedings of the Fourth International Conference on Ubiquitous and Future Networks, 2012

A window-based overload control considering the number of confirmation Massages for SIP server.
Proceedings of the Fourth International Conference on Ubiquitous and Future Networks, 2012

2011
Application-oriented Re-Clustering and Cluster Head Re-Election scheme for Wireless Sensor Networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Instant graph routing: lightweight graph generation scheme.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

LBP: a secure and efficient network bootstrapping protocol for 6LoWPAN.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

2010
An Enhanced Backbone-Assisted Reliable Framework for Wireless Sensor Networks.
Sensors, 2010

ENUM Based Service Discovery Architecture for 6LoWPAN.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

FESP: Fast and Energy Efficient Service Provisioning in 6LoWPAN.
Proceedings of the IEEE 21st International Symposium on Personal, 2010

Time slot schedule based minimum delay graph in TDMA supported wireless industrial system.
Proceedings of the 2010 International Conference on Computer Information Systems and Industrial Management Applications, 2010

Ubiquitous Korea Project.
Proceedings of the Handbook of Ambient Intelligence and Smart Environments, 2010

2009
Dead reckoning based target tracking in wireless sensor networks.
SIGBED Rev., 2009

Design and Implementation of an Architectural Framework for Web Portals in a Ubiquitous Pervasive Environment.
Sensors, 2009

LoWMob: Intra-PAN Mobility Support Schemes for 6LoWPAN.
Sensors, 2009

A Comparative Analysis of PKC and Semi-PKC Based Key Management Schemes for Hierarchical Sensor Networks.
Proceedings of the Advances in Information Security and Assurance, 2009

A simple lightweight authentic bootstrapping protocol for IPv6-based low rate wireless personal area networks (6LoWPANs).
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Route-over vs mesh-under routing in 6LoWPAN.
Proceedings of the International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly, 2009

Security analysis survey and framework design for IP connected LoWPANs.
Proceedings of the International Symposium on Autonomous Decentralized Systems (ISADS 2009), 2009

An Architectural Framework for Web Portal in Ubiquitous Pervasive Environment.
Proceedings of the 7th Annual Conference on Communication Networks and Services Research, 2009

Network Assisted Mobility Support for 6LoWPAN.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009

Remote Configuration Mechanism for IP Based Ubiquitous Sensor Networks.
Proceedings of the Management Enabling the Future Internet for Changing Business and New Computing Services, 2009

2008
Adaptive Yaw Rate Aware Sensor Wakeup Schemes Protocol (A-YAP) for Target Prediction and Tracking in Sensor Networks.
IEICE Trans. Commun., 2008

A unified security framework with three key management schemes for wireless sensor networks.
Comput. Commun., 2008

Performance and Security Assessment of a PKC Based Key Management Scheme for Hierarchical Sensor Networks.
Proceedings of the 67th IEEE Vehicular Technology Conference, 2008

Survey of Security Requirements, Attacks and Network Integration in Wireless Mesh Networks.
Proceedings of the NTMS 2008, 2008

LNMP- Management architecture for IPv6 based low-power wireless Personal Area Networks (6LoWPAN).
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008

A survey of flash memory design and implementation of database in flash memory.
Proceedings of the 3rd International Conference on Intelligent System and Knowledge Engineering, 2008

A Lightweight Mutual Authentication Scheme for Mobile Radio Frequency IDentification (mRFID) Systems.
Proceedings of the 2008 IEEE International Performance, 2008

A scheme to support mobility for IP based sensor networks.
Proceedings of the 3rd International ICST Conference on Scalable Information Systems, 2008

An empirical study to analyze the feasibility of WIFI for VANETs.
Proceedings of the 12th International Conference on CSCW in Design, 2008

Secure and Survivable Group Communication over MANET Using CRTDH Based on a Virtual Subnet Model.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

Effective Superpeer Control Messages for P2P Virtual Network in MANET.
Proceedings of the ALPIT 2008, 2008

2007
On the Interplay of Service Proximity and Ubiquity.
IEICE Trans. Commun., 2007

2006
Mitigating Broadcast Storms in Stateless Address Auto-configuring MANETs.
Proceedings of the Computational Science and Its Applications, 2006

GARPAN: Gateway-Assisted Inter-PAN Routing for 6LoWPANs.
Proceedings of the Computational Science and Its Applications, 2006

On the Effect of Heterogeneous Traffic Sources on the Network Availability for Wireless Sensor Grids.
Proceedings of the Computational Science, 2006

Proxy-Based Service Discovery and Network Selection in 6LoWPAN.
Proceedings of the High Performance Computing and Communications, 2006

Are Low PANs a PAN or an Internet of PANs?
Proceedings of the Advances in Grid and Pervasive Computing, 2006

Route Error Reporting Schemes for On-Demand Routing in 6LoWPAN.
Proceedings of the Advances in Grid and Pervasive Computing, 2006

Availability Considerations for Wireless Sensor Grids.
Proceedings of the Advances in Grid and Pervasive Computing, 2006

Binding Multiple Applications on Wireless Sensor Networks.
Proceedings of the Advances in Grid and Pervasive Computing, 2006

Autonomic Network Management for Wireless Mesh and MANETs.
Proceedings of the Self-Organizing Systems, First International Workshop, 2006

A Proxy-Enabled Service Discovery Architecture to Find Proximity-Based Services in 6LoWPAN.
Proceedings of the Embedded and Ubiquitous Computing, International Conference, 2006

HYWINMARC: An Autonomic Management Architecture for Hybrid Wireless Networks.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

An energy-efficient data gathering technique using multiple paths in wireless sensor networks.
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006

NETSAQ: Network State Adaptive QoS Provisioning for MANETs.
Proceedings of the Management of Convergence Networks and Services, 2006

2005
Performance of Service Location Protocols in MANET Based on Reactive Routing Protocols.
Proceedings of the Networking, 2005

Design of a Service Discovery Architecture for Mobility-Supported Wired and Wireless Networks.
Proceedings of the Networking, 2005

A Resilient Multipath Routing Protocol for Wireless Sensor Networks.
Proceedings of the Networking, 2005

2004
Mobility Agent Advertisement Mechanism for Supporting Mobile IP in Ad Hoc Networks.
Proceedings of the First International Workshop, 2004

CORBA-Based, Multi-threaded Distributed Simulation of Hierarchical DEVS Models: Transforming Model Structure into a Non-hierarchical One.
Proceedings of the Computational Science and Its Applications, 2004

A Web Services-Based Distributed Simulation Architecture for Hierarchical DEVS Models.
Proceedings of the Artificial Intelligence and Simulation, 2004

Mapping Cooperating GRID Applications by Affinity for Resource Characteristics.
Proceedings of the Artificial Intelligence and Simulation, 2004


  Loading...