Skip to main content

Showing 1–10 of 10 results for author: You, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.02851  [pdf, other

    cs.CR

    5G-AKA-HPQC: Hybrid Post-Quantum Cryptography Protocol for Quantum-Resilient 5G Primary Authentication with Forward Secrecy

    Authors: Yongho Ko, I Wayan Adi Juliawan Pawana, Ilsun You

    Abstract: 5G enables digital innovation by integrating diverse services, making security especially primary authentication crucial. Two standardized protocols, 5G AKA and EAP AKA', handle authentication for 3GPP and non 3GPP devices. However, 5G AKA has vulnerabilities, including linkability attacks. Additionally, quantum computing poses threats, requiring quantum resistant cryptography. While post-quantum… ▽ More

    Submitted 4 February, 2025; originally announced February 2025.

  2. arXiv:1909.07568  [pdf

    cs.NI cs.CR

    An optimal security management framework for backhaul-aware 5G-Vehicle to Everything (V2X)

    Authors: Vishal Sharma, Jiyoon Kim, Yongho Ko, Ilsun You, Jung Taek Seo

    Abstract: Cellular (C) setups facilitate the connectivity amongst the devices with better provisioning of services to its users. Vehicular networks are one of the representative setups that aim at expanding their functionalities by using the available cellular systems like Long Term Evolution (LTE)-based Evolved Universal Terrestrial Radio Access Network (E-UTRAN) as well as the upcoming Fifth Generation (5… ▽ More

    Submitted 16 September, 2019; originally announced September 2019.

    Comments: 14 pages, 11 figures, 3 tables, Journal of Internet Technology (JIT) (Accepted)

  3. arXiv:1905.09555  [pdf, other

    cs.NI cs.CR eess.SY

    Security of 5G-V2X: Technologies, Standardization and Research Directions

    Authors: Vishal Sharma, Ilsun You, Nadra Guizani

    Abstract: Cellular-Vehicle to Everything (C-V2X) aims at resolving issues pertaining to the traditional usability of Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) networking. Specifically, C-V2X lowers the number of entities involved in vehicular communications and allows the inclusion of cellular-security solutions to be applied to V2X. For this, the evolvement of LTE-V2X is revolutionary, b… ▽ More

    Submitted 18 December, 2019; v1 submitted 23 May, 2019; originally announced May 2019.

    Comments: 9 pages, 6 figures, Preprint

  4. arXiv:1903.05362  [pdf, other

    cs.NI cs.CR

    Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey

    Authors: Vishal Sharma, Ilsun You, Karl Andersson, Francesco Palmieri, Mubashir Husain Rehmani, Jaedeok Lim

    Abstract: With an enormous range of applications, Internet of Things (IoT) has magnetized industries and academicians from everywhere. IoT facilitates operations through ubiquitous connectivity by providing Internet access to all the devices with computing capabilities. With the evolution of wireless infrastructure, the focus from simple IoT has been shifted to smart, connected and mobile IoT (M-IoT) device… ▽ More

    Submitted 9 August, 2020; v1 submitted 13 March, 2019; originally announced March 2019.

    Comments: 13 figures, 11 tables

  5. arXiv:1811.08273  [pdf

    cs.NI

    Security management for backhaul-aware 5G-V2X

    Authors: Vishal Sharma, Yongho Ko, Jiyoon Kim, Ilsun You

    Abstract: Security is a primary concern for the networks aiming at the utilization of Cellular (C) services for connecting Vehicles to Everything (V2X). At present, C-V2X is observing a paradigm shift from Long Term Evolution (LTE) - Evolved Universal Terrestrial Radio Access Network (E-UTRAN) to Fifth Generation (5G) based functional architecture. However, security and credential management are still conce… ▽ More

    Submitted 21 November, 2018; v1 submitted 20 November, 2018; originally announced November 2018.

    Comments: 4 pages, 3 figures, 1 table, Conference on Information Security and Cryptography-Winter (CISC-W), December 8, 2018, Seoul, South Korea

  6. arXiv:1808.00203  [pdf, other

    cs.NI

    Internet of Drones (IoD): Threats, Vulnerability, and Security Perspectives

    Authors: Gaurav Choudhary, Vishal Sharma, Takshi Gupta, Jiyoon Kim, Ilsun You

    Abstract: The development of the Internet of Drones (IoD) becomes vital because of a proliferation of drone-based civilian or military applications. The IoD based technological revolution upgrades the current Internet environment into a more pervasive and ubiquitous world. IoD is capable of enhancing the state-of-the-art for drones while leveraging services from the existing cellular networks. Irrespective… ▽ More

    Submitted 10 August, 2018; v1 submitted 1 August, 2018; originally announced August 2018.

    Comments: 13 pages, 3 Figures, 1 Table, The 3rd International Symposium on Mobile Internet Security (MobiSec'18), Auguest 29-September 1, 2018, Cebu, Philippines, Article No. 37, pp. 1-13

  7. arXiv:1807.00435  [pdf, other

    cs.CR

    Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey

    Authors: Gaurav Choudhary, Vishal Sharma, Ilsun You, Kangbin Yim, Ing-Ray Chen, Jin-Hee Cho

    Abstract: Unmanned Aerial Vehicles (UAV)-based civilian or military applications become more critical to serving civilian and/or military missions. The significantly increased attention on UAV applications also has led to security concerns particularly in the context of networked UAVs. Networked UAVs are vulnerable to malicious attacks over open-air radio space and accordingly, intrusion detection systems (… ▽ More

    Submitted 1 July, 2018; originally announced July 2018.

    Comments: 6 pages, 2 figures

  8. Self-enforcing Game Theory-based Resource Allocation for LoRaWAN Assisted Public Safety Communications

    Authors: Vishal Sharma, Gaurav Choudhary, Ilsun You, Jae Deok Lim, Jeong Nyeo Kim

    Abstract: Public safety networks avail to disseminate information during emergency situations through its dedicated servers. Public safety networks accommodate public safety communication (PSC) applications to track the location of its utilizers and enable to sustain transmissions even in the crucial scenarios. Despite that, if the traditional setups responsible for PSCs are unavailable, it becomes prodigio… ▽ More

    Submitted 19 April, 2018; originally announced April 2018.

    Comments: 16 Pages, 11 Figures, 2 Tables

    Journal ref: Journal of Internet Technology Volume 19 (2018) No.2

  9. arXiv:1804.05549  [pdf, ps, other

    cs.NI cs.CR

    A framework for mitigating zero-day attacks in IoT

    Authors: Vishal Sharma, Jiyoon Kim, Soonhyun Kwon, Ilsun You, Kyungroul Lee, Kangbin Yim

    Abstract: Internet of Things (IoT) aims at providing connectivity between every computing entity. However, this facilitation is also leading to more cyber threats which may exploit the presence of a vulnerability of a period of time. One such vulnerability is the zero-day threat that may lead to zero-day attacks which are detrimental to an enterprise as well as the network security. In this article, a study… ▽ More

    Submitted 16 April, 2018; originally announced April 2018.

    Comments: 6 Pages, 6 Figures, Conference on Information Security and Cryptography (CISC-S'17)

    Journal ref: CISC-S'17, June 22-23, 2017, Sinchang-Asan, South Korea, pp.1-6

  10. Extension of MIH to Support FPMIPv6 for Optimized Heterogeneous Handover

    Authors: Jianfeng Guan, Vishal Sharma, Ilsun You, Mohammad Atiquzzaman

    Abstract: Fast handover for Proxy Mobile IPv6 (FPMIPv6) can reduce handover delay and packet loss compared with Proxy Mobile IPv6 (PMIPv6). However, FPMIPv6 still cannot handle heterogeneous handovers due to the lack of unified Layer 2 triggering mechanism along with the booming of emerging wireless technologies. Media Independent Handover (MIH) can provide heterogeneous handover support, and a lot of integ… ▽ More

    Submitted 27 May, 2017; originally announced May 2017.

    Comments: 14 pages, 17 figures, 5 tables

    Journal ref: Future Gener. Comput. Syst. 97: 775-791 (2019)