Taeshik SHON


Recovery Measure against Disabling Reassembly Attack to DNP3 Communication
Sungmoon KWON Hyunguk YOO Taeshik SHON 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8  pp. 1790-1797
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Industrial Control System Security
Keyword: 
industrial control systemDNP3reassemblyavailability
 Summary | Full Text:PDF(1.7MB)

A Novel Network Modeling and Evaluation Approach for Security Vulnerability Quantification in Substation Automation Systems
Jongbin KO Seokjun LEE Yong-hun LIM Seong-ho JU Taeshik SHON 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/09/01
Vol. E96-D  No. 9  pp. 2021-2025
Type of Manuscript:  Special Section LETTER (Special Section on Dependable Computing)
Category: 
Keyword: 
IEC 61850substation automation systemsecurity vulnerability quantificationsmart gridIEC 62351CVSSMTTC
 Summary | Full Text:PDF(602.3KB)

An Efficient and Secure Service Discovery Protocol for Ubiquitous Computing Environments
Jangseong KIM Joonsang BAEK Jianying ZHOU Taeshik SHON 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D  No. 1  pp. 117-125
Type of Manuscript:  Special Section PAPER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Security
Keyword: 
privacy protectionservice discovery protocolubiquitousprivacy-preserving authenticationmembership verification
 Summary | Full Text:PDF(1.1MB)

Design and Implementation of One-Way Key Agreement Model for Enhancing VoIP Internet Phone Security
Kyusuk HAN Taeshik SHON Kwangjo KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/08/01
Vol. E94-B  No. 8  pp. 2235-2238
Type of Manuscript:  Special Section LETTER (Special Section on Deployment and Operation of New Internet Technology: Challenges and Approaches)
Category: 
Keyword: 
VoIPID-based cryptosystemone-way key agreementauthenticationkey agreement
 Summary | Full Text:PDF(1.2MB)

Enhancing Credibility of Location Based Service Using Multiple Sensing Technologies
Kyusuk HAN Kwangjo KIM Taeshik SHON 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/06/01
Vol. E94-D  No. 6  pp. 1181-1184
Type of Manuscript:  Special Section LETTER (Special Section on Emerging Technologies of Ubiquitous Computing Systems)
Category: 
Keyword: 
ubiquitous computingcontext-awarenessLocation Based Serviceprivacyauthenticationcredibility
 Summary | Full Text:PDF(1MB)

Location-Aware and Privacy-Preserving Approach for Child Safety in Ubiquitous Computing Environment
Jangseong KIM Taeshik SHON Kwangjo KIM 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/03/01
Vol. E94-B  No. 3  pp. 686-689
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication Technologies for Next-generation Mobile Multimedia Life)
Category: 
Keyword: 
privacy protectionlocation supporting protocolubiquitouschild safety
 Summary | Full Text:PDF(408.2KB)

Implementation of a WSN-Based Structural Health Monitoring Architecture Using 3D and AR Mode
Bonhyun KOO Taeshik SHON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/11/01
Vol. E93-B  No. 11  pp. 2963-2966
Type of Manuscript:  Special Section LETTER (Special Section on Fundamental Issues on Deployment of Ubiquitous Sensor Networks)
Category: 
Keyword: 
wireless sensor networksensor node3D visualizationaugmented realitystructural health monitoring
 Summary | Full Text:PDF(1.1MB)

Design and Implementation of Hybrid MAC-Based Robust Architecture for Wireless Sensor Network
Taeshik SHON Eui-jik KIM Jeongsik IN Yongsuk PARK 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/04/01
Vol. E93-B  No. 4  pp. 1016-1019
Type of Manuscript:  LETTER
Category: Network
Keyword: 
IEEE 802.15.4securityenergy consumptionreliabilitywireless sensor network
 Summary | Full Text:PDF(615.3KB)