연구성과로 돌아가기
2021 연구성과 (143 / 281)
※ 컨트롤 + 클릭으로 열별 다중 정렬 가능합니다.
Excel 다운로드
| WoS | SCOPUS | Document Type | Document Title | Abstract | Authors | Affiliation | ResearcherID (WoS) | AuthorsID (SCOPUS) | Author Email(s) | Journal Name | JCR Abbreviation | ISSN | eISSN | Volume | Issue | WoS Edition | WoS Category | JCR Year | IF | JCR (%) | FWCI | FWCI Update Date | WoS Citation | SCOPUS Citation | Keywords (WoS) | KeywordsPlus (WoS) | Keywords (SCOPUS) | KeywordsPlus (SCOPUS) | Language | Publication Stage | Publication Year | Publication Date | DOI | JCR Link | DOI Link | WOS Link | SCOPUS Link |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ○ | ○ | Article | iGCACS-IoD: An Improved Certificate-Enabled Generic Access Control Scheme for Internet of Drones Deployment | Due to wide-spread use of the Information and Communications Technology (ICT) and Internet of Things (IoT) enabled smart devices, called unmanned aerial vehicles (UAVs) (popularly known as drones), a lot of potential applications of Internet of Drones (IoD) are available ranging from the military to civilian applications. Access control mechanism is an important potential security service that is needed to secure communication among the drones in their respective flying zones, and also among the drones and the Ground Service Station (GSS). In 2021, Chaudhry et al. proposed a certificate based generic access control scheme for IoD environment, called GCACS-IoD. Their claims about the possible security attacks resistant of GCACS-IoD is not justified. In fact, we first prove that GCACS-IoD is unable to protect the disclosure of the private key r(CR) of the trusted control room (CR), which is extremely unfortunate careless design flaw and it leads to compromise the entire network. Using the disclosed private key r(CR), we further show that GCACS-IoD is completely insecure against other serious attacks, such as malicious drones deployment attack, drone/GSS impersonation attacks and Ephemeral Secret Leakage (ESL) attack, which lead to compromise the session key between any two drones communicating in a particular flying zone. We thus feel that there is a strong need to remedy such serious weaknesses found in Chaudhry et al.'s GCACS-IoD. An improved certificate-enabled generic access control scheme for IoD deployment, called as iGCACS-IoD, has been suggested, which overcomes the weaknesses found in the previous GCACS-IoD. The practical demonstration of iGCACS-IoD has been done through formal security verification and also through NS2 simulation study. | Das, Ashok Kumar; Bera, Basudeb; Wazid, Mohammad; Jamal, Sajjad Shaukat; Park, Youngho | Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India; Graph Era Deemed Be Univ, Dept Comp Sci & Engn, Dehra Dun 248002, Uttarakhand, India; King Khalid Univ, Coll Sci, Dept Math, Abha 61413, Saudi Arabia; Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea | wazid, mohammad/X-4211-2018; WAZID, MOHAMMAD/X-4211-2018; Jamal, Sajjad/AHE-6498-2022; Das, Ashok Kumar/U-2790-2019; Bera, Basudeb/ACC-6233-2022 | 55450732800; 57214777647; 55480987400; 57198092048; 56962990300 | itkgp.akdas@gmail.com;parkyh@knu.ac.kr; | IEEE ACCESS | IEEE ACCESS | 2169-3536 | 9 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2021 | 3.476 | 37.9 | 1.67 | 2025-07-30 | 15 | 25 | Internet of Drones (IoD); cryptanalysis; access control; key establishment; security; NS2 simulation | KEY AGREEMENT SCHEME; REMOTE USER AUTHENTICATION; LIGHTWEIGHT AUTHENTICATION; SECURE; PROTOCOL; BLOCKCHAIN; EXCHANGE; SURVEILLANCE; FRAMEWORK; ANONYMITY | access control; cryptanalysis; Internet of Drones (IoD); key establishment; NS2 simulation; security | Antennas; Drones; Internet of things; Military applications; Access control schemes; Cryptanalyse; Information and Communication Technologies; Internet of drone; Key establishments; NS2 simulation; Private key; Security; Smart devices; Wide spreads; Access control | English | 2021 | 2021 | 10.1109/access.2021.3089871 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | |||
| ○ | ○ | Article | Implementation and Performance Evaluation for DSRC-Based Vehicular Communication System | Traffic accidents and congestion are the most common on-road problems that might be anywhere and anytime. Recently, to deal with such problems, well-coordinated wireless communication system between vehicles, road side units (RSU), drones, etc., namely vehicle-to-everything (V2X) communication system, has been considered as a key technology enabling on-road human safety and convenience. One of the well-known building blocks of the V2X communication system is Wi-Fi based Dedicated Short Range Communication (DSRC) which performs stably, owing to a long year of study, simplicity and capability of distributed operation. In spite of promising opportunities brought by DSRC, its elaborate performance evaluation must be done under real-world scenarios, in advance to the actual use, since its performance is directly related to human and vehicle safety. In this context, this article presents field test results of DSRC-based V2X communication system we implemented. As a result of the line-of-sight (LoS) test, the distance represented by 90% or more of packet reception rate (PRR) was 720 meters at 5 dBm, and 1,035 meters at 11 dBm. In Non-LoS (NLOS) shadowing test, the distance represented by 90% or more of PRR was 175 meters at 5 dBm, and 520 meters at 11 dBm. And in NLoS intersection test, the distance represented by 90% or more of PRR was 320 meters at 5 dBm, and 515 meters at 11 dBm. Meanwhile, the distance for PRR 90% was up to 520 meters at urban environment, 1,219 meters on highway, and 1,700 meters inside a tunnel. | Bae, Jeong-Kyu; Park, Myung-Chul; Yang, Eun-Ju; Seo, Dae-Wha | CEST Co Ltd, Res Dept, Daegu 41566, South Korea; Ctr Embedded Software Technol, Daegu 41566, South Korea; Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea | 57221303372; 56313821300; 57190139832; 35782242600 | dwseo@ee.knu.ac.kr; | IEEE ACCESS | IEEE ACCESS | 2169-3536 | 9 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2021 | 3.476 | 37.9 | 1.82 | 2025-07-30 | 19 | 28 | Vehicle-to-everything; Communication systems; Meters; Testing; Safety; Protocols; Performance evaluation; Vehicular communication; V2X; DSRC; C-V2X; performance evaluation | C-V2X; DSRC; performance evaluation; V2X; Vehicular communication | Roads and streets; Vehicles; Distributed operations; Intersection test; Key technologies; Packet Reception Rate; Real-world scenario; Urban environments; Vehicular communications; Wireless communication system; Dedicated short range communications | English | 2021 | 2021 | 10.1109/access.2020.3044358 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | |||||
| ○ | ○ | Article | iSPLInception: An Inception-ResNet Deep Learning Architecture for Human Activity Recognition | Advances in deep learning (DL) model design have pushed the boundaries of the areas in which it can be applied. The fields with an immense availability of complex big data have been big beneficiaries of these advances. One such field is human activity recognition (HAR). HAR is a popular area of research in a connected world because internet-of-things (IoT) devices and smartphones are becoming more prevalent. A major research goal of recent research work has been to improve predictive accuracy for devices with limited computational resources. In this paper, we propose iSPLInception, a DL model motivated by the Inception-ResNet architecture from Google, that not only achieves high predictive accuracy but also uses fewer device resources. We evaluate the proposed model's performance on four public HAR datasets from the University of California, Irvine (UCI) machine learning repository. The proposed model's performance is compared to that of existing DL architectures that have been proposed in the recent past to solve the HAR problem. The proposed model outperforms these approaches on several metrics of accuracy, cross-entropy loss, and F-1 score on all the four datasets. The performance of the proposed iSPLInception model is validated on the UCI HAR using smartphones dataset, Opportunity activity recognition dataset, Daphnet freezing of gait dataset, and PAMAP2 physical activity monitoring dataset. The experiments and result analysis indicate that the proposed iSPLInception model achieves remarkable performance for HAR applications. | Ronald, Mutegeki; Poulose, Alwin; Han, Dong Seog | Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu 41566, South Korea; Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea | , ALWIN POULOSE/S-4914-2018; Han, Dong Seog/N-8949-2018; POULOSE, ALWIN/S-4914-2018 | 57224199608; 57205504085; 7403219442 | dshan@knu.ac.kr; | IEEE ACCESS | IEEE ACCESS | 2169-3536 | 9 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2021 | 3.476 | 37.9 | 9.92 | 2025-07-30 | 122 | 159 | Human activity recognition; deep learning; inception module; Inception-ResNet; time-series classification | FRAMEWORK; PLATFORM; LIFE | deep learning; Human activity recognition; inception module; Inception-ResNet; time-series classification | Architecture; Internet of things; Learning systems; Pattern recognition; Smartphones; Activity recognition; Computational resources; Human activity recognition; Internet of Things (IOT); Learning architectures; Machine learning repository; Physical activity monitoring; University of California; Deep learning | English | 2021 | 2021 | 10.1109/access.2021.3078184 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | |||
| ○ | ○ | Article | Learning-Based Illuminant Estimation Model With a Persistent Memory Residual Network (PMRN) Architecture | Since AlexNet, large deep convolutional neural networks (DCNNs) have been one of the major topics of interest in the field of computer vision, as well as bringing remarkable progress to the field. However, there has been little effort to use the DCNNs in realizing the mechanism of human memory. The human memory can be classified into three types: sensory memory, short-term memory and long-term memory. The short-term memory, also known as primary memory or active memory, is the information that humans are presently perceiving or thinking about, whereas the long-term memory refers to the persistent storage of information. In the mechanism of the human brain, the long-term memory enables the human vision to identify the actual color of an object effortlessly. In the computer vision, the DCNN-based illuminant estimation models are facing the long-term dependency problem as deeper networks encounter widening gaps between their earlier layers and later layers. Therefore, it is highly inspiring to apply the human long-term memory to the DCNN-based illuminant estimation models. The natural motivation of this article is to present a novel persistent memory residual network (PMRN) model which provides the DCNN with explicit access to persistent memory. The proposed PMRN architecture has two distinct units: a recursive unit and a gate unit. The two units combined serve to facilitate persistent memory access in a non-recursive fashion. The recursive unit has four residual blocks which are trained on the multiple-level image features on diverse receptive fields. The residual block outputs are concatenated and then fed into the gate unit. The proposed architecture keeps track of the recursive unit, deciding on how many of the earlier blocks to keep in reserve and how much of the image features to let the present block store. In this way, the proposed architecture contributes to solving the long-term dependency problem of conventional DCNNs. Comprehensive experiments support unparalleled performance of the proposed architecture in comparison to its counterparts and its potential to meet the needs of illumination estimation applications. | Choi, Ho-Hyoung; Yun, Byoung-Ju | Kyungpook Natl Univ, Adv Dent Device Dev Inst, Sch Dent, Daegu 41940, South Korea; Kyungpook Natl Univ, Coll IT Engn, Sch Elect Engn, Daegu 41566, South Korea | 37048369000; 7006416932 | bjisyun@ee.knu.ac.kr; | IEEE ACCESS | IEEE ACCESS | 2169-3536 | 9 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2021 | 3.476 | 37.9 | 0.15 | 2025-07-30 | 4 | 3 | Image color analysis; Estimation; Computer architecture; Lighting; Logic gates; Semantics; Reflectivity; Human memory; long-term dependency problem; short-term memory; long-term memory; illumination estimation; persistent memory residual network (PMRN) | COLOR CONSTANCY; RETINEX THEORY | Human memory; illumination estimation; long-term dependency problem; long-term memory; persistent memory residual network (PMRN); short-term memory | Brain; Convolutional neural networks; Deep neural networks; Network architecture; Illuminant estimation; Illumination estimation; Long-term dependencies; Persistent memory; Persistent storage; Proposed architectures; Receptive fields; Short term memory; Memory architecture | English | 2021 | 2021 | 10.1109/access.2021.3059914 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | ||||
| ○ | ○ | Article | Lightweight Three-Factor-Based Privacy- Preserving Authentication Scheme for IoT-Enabled Smart Homes | Smart homes are an emerging paradigm of Internet of Things (IoT) in which users can remotely control various home devices via the internet anytime and anywhere. However, smart home environments are vulnerable to security attacks because an attacker can inject, insert, intercept, delete, and modify transmitted messages over an insecure channel. Thus, secure and lightweight authentication protocols are essential to ensure useful services in smart home environments. In 2021, Kaur and Kumar presented a two-factor based user authentication protocol for smart homes using elliptic curve cryptosystems (ECC). Unfortunately, we demonstrate that their scheme cannot resist security attacks such as impersonation and session key disclosure attacks, and also ensure secure user authentication. Moreover, their scheme is not suitable in smart home environments because it utilizes public-key cryptosystems such as ECC. Hence, we design a secure and lightweight three-factor based privacy-preserving authentication scheme for IoT-enabled smart home environments to overcome the security problems of Kaur and Kumar's protocol. We prove the security of the proposed scheme by using informal and formal security analyses such as the ROR model and AVISPA simulation. In addition, we compare the performance and security features between the proposed scheme and related schemes. The proposed scheme better provides security and efficiency compared with the previous schemes and is more suitable than previous schemes for IoT-enabled smart home environments. | Yu, Sungjin; Jho, Namsu; Park, Youngho | Elect & Telecommun Res Inst, Daejeon 34129, South Korea; Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea; Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea | 57203974524; 8976178000; 56962990300 | parkyh@knu.ac.kr; | IEEE ACCESS | IEEE ACCESS | 2169-3536 | 9 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2021 | 3.476 | 37.9 | 3.71 | 2025-07-30 | 42 | 56 | Security; Smart homes; Authentication; Smart devices; Protocols; Elliptic curve cryptography; Password; Smart homes; privacy-preserving; authentication; security protocol | PROTOCOL; SECURE; CARD | authentication; privacy-preserving; security protocol; Smart homes | Ambient intelligence; Authentication; Automation; Intelligent buildings; Privacy by design; Public key cryptography; Security systems; Elliptic Curve cryptosystems; Formal security analysis; Internet of Things (IOT); Lightweight authentication protocols; Privacy-preserving authentication; Public key cryptosystems; User authentication; User authentication protocols; Internet of things | English | 2021 | 2021 | 10.1109/access.2021.3111443 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | ||||
| ○ | ○ | Article | Linguistic-Coupled Age-to-Age Voice Translation to Improve Speech Recognition Performance in Real Environments | We address a low-performance problem of the elderly in automatic speech recognition (ASR) through feature adaptation agnostic to the ASR. Most of the datasets for speech recognition models consist of datasets collected from adult speakers. Consequently, the majority of commercial speech recognition systems typically tend to perform well on adult speakers. In other words, the limited diversity of speakers in the training datasets yields unreliable performance for minority (e.g., elderly) speakers due to the infeasible acquisition of training data. In response, this paper suggests a neural network-based voice conversion framework to enhance speech recognition of the minority. To this end, we propose a voice translation model including an unsupervised phonology clustering to extract linguistic information to fit the minority's speech to a current acoustic model frame. Our proposal is a spectral feature adaptation method that can be placed in front of any commercial or open ASR system, avoiding directly modifying the speech recognizer. The experimental results and analysis demonstrate the effectiveness of our proposed method through improvement in elderly speech recognition accuracy. | Kim, June-Woo; Yoon, Hyekyung; Jung, Ho-Young | Kyungpook Natl Univ, Grad Sch, Dept Artificial Intelligence, Daegu 41566, South Korea | 57219550643; 57273359500; 57198760619 | hoyjung@knu.ac.kr; | IEEE ACCESS | IEEE ACCESS | 2169-3536 | 9 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2021 | 3.476 | 37.9 | 0.82 | 2025-07-30 | 2 | 11 | Speech recognition; Senior citizens; Linguistics; Hidden Markov models; Feature extraction; Bridges; Adaptation models; Speech recognition; voice translation; spectral feature transform; age-on-demand speech recognition | TRANSFORMER; MODEL | age-on-demand speech recognition; spectral feature transform; Speech recognition; voice translation | Linguistics; Speech processing; Translation (languages); Age-on-demand speech recognition; Automatic speech recognition; Feature adaptation; Feature transform; On demands; Real environments; Spectral feature; Spectral feature transform; Speech recognition performance; Voice translation; Speech recognition | English | 2021 | 2021 | 10.1109/access.2021.3115608 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | ||||
| ○ | ○ | Article | Low-Power Cross-Layer Error Management Using MIMO-LDPC Iterative Decoding for Video Processing | This paper presents a novel low-power joint decoding system composed of a multiple-input multiple-output (MIMO) detector, low-density parity-check (LDPC) channel decoder, and H.264 source decoder for energy-aware and cross-layer source-channel transmission systems. Our aim is to achieve a minimum power design that meets the expected quality of service (QoS) at the application layer. This design includes an iterative MIMO-LDPC decoder for minimizing communication errors and an unequal error protection scheme for reducing energy consumption in transmission. The experiment results reveal that our proposed iterative MIMO-LDPC-H.264 joint decoder achieved up to 66% energy reduction with only 0.09 dB peak signal-to-noise ratio degradation when compared to a non-UEP based joint source-channel decoding system. | Yang, Yoon Seok; Kim, Yongtae | Intel Corp, Intel Labs, Santa Clara, CA 95054 USA; Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu 41566, South Korea | Yang, Yoon/AGQ-1174-2022 | 36162192400; 55699627900 | yongtae@knu.ac.kr; | IEEE ACCESS | IEEE ACCESS | 2169-3536 | 9 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2021 | 3.476 | 37.9 | 0.07 | 2025-07-30 | 0 | 1 | Iterative decoding; MIMO communication; Streaming media; Wireless communication; Quality of service; Maximum likelihood decoding; Detectors; MIMO; LDPC; iterative decoding; unequal error protection; H264; H265 data partitioning; joint source-channel decoding; low-power design; error resilience; energy-aware communication system; QoS for video processing | SCALABLE VIDEO; TRANSMISSION; DESIGN; COMMUNICATION; OPTIMIZATION; ALLOCATION; CRITERION | Energy-aware communication system; Error resilience; H264/H265 data partitioning; Iterative decoding; Joint source-channel decoding; LDPC; Low-power design; MIMO; QoS for video processing; Unequal error protection | Channel coding; Electric power supplies to apparatus; Electric power transmission; Energy utilization; Errors; Image coding; Iterative decoding; Power management; Satellite communication systems; Signal to noise ratio; Video signal processing; Communications systems; Data partitioning; Energy aware communication; Energy-aware communication system; Error resilience; H.264/h.265 data partitioning; Iterative decodings; Joint source channel decoding; Low-density parity-check; Low-power design; Quality of service for video processing; Quality-of-service; Unequal error protections; Video processing; Quality of service | English | 2021 | 2021 | 10.1109/access.2021.3115671 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | |||
| ○ | ○ | Article | Multi-Saliency Map and Machine Learning Based Human Detection for the Embedded Top-View Imaging System | Compared to the side view, a top-view is robust against occlusion generated by objects located indoors. It offers a better wide view angle and much visibility of a scene. However, there are still problems to be handled. The top-view image shows asymmetrical features and radially distorted scenes around the corners, such as omnidirectional view images and self-occlusion. Conventional human detection methods are suitable for finding moving objects in front view imaging systems. And there are some limitations, such as slow execution speed due to computational complexity. In this paper, we propose an efficient method. A static saliency map with low activity and a dynamic saliency map with a lot of movement are respectively detected. These two models were fused to create a multi-saliency map, and both characteristics were used simultaneously to improve detection rates. To handle problems such as asymmetry, a rotation matrix was calculated around the center, and Histogram of Oriented Gradient (HOG) features descriptor were extracted from the multi-saliency map to create an image patch (a small image region of interest containing human candidates). For the classification of image patches, we used machine learning-based supervised learning models support-vector machine (SVM) algorithm to improve performance. As a result of the proposed algorithm, it showed low resource occupancy and achieved Average Precision of 92.3% and 96.12% when Intersection over Union were 50% and 45% respectively. | Lee, Seung Jun; Kim, Byeong Hak; Kim, Min Young | Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea; Korea Inst Ind Technol, Daegu 42990, South Korea; Kyungpook Natl Univ, Res Ctr Neurosurg Robot Syst, Daegu 41566, South Korea | 57365596600; 56406686400; 56739349100 | minykim@knu.ac.kr; | IEEE ACCESS | IEEE ACCESS | 2169-3536 | 9 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2021 | 3.476 | 37.9 | 0.3 | 2025-07-30 | 3 | 4 | Feature extraction; Head; Cameras; Support vector machines; Classification algorithms; Shape; Principal component analysis; Top-view; human detection; image subtraction; saliency map; clustering; classification; machine learning algorithms | classification; clustering; human detection; image subtraction; machine learning algorithms; saliency map; Top-view | Image enhancement; Image segmentation; Imaging systems; Support vector machines; Detection rates; Histogram of oriented gradients (HOG); Human detection; Improve performance; Omni-directional view; Rotation matrices; Static saliency map; Support vector machine algorithm; Learning systems | English | 2021 | 2021 | 10.1109/access.2021.3078623 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | |||||
| ○ | ○ | Article | On the Design of Lightweight and Secure Mutual Authentication System for Global Roaming in Resource-Limited Mobility Networks | A secure authentication protocol plays a crucial role in securing communications over wireless and mobile networks. Due to resource-limitations and the nature of the wireless channel, the global mobile networks are highly susceptible to various attacks. Recently, an efficient authentication system for global roaming has been proposed in the literature. In this article, we first show that the analyzed authentication system is vulnerable man-in-the-middle attack, replay attack and Denial-of-Service (DoS) attack, and it does not ensure untraceability and local password-verification process to identify wrong passwords. To fix these security flaws, we propose a more efficient and robust authentication system for roaming in mobility networks. We use the formal verification tools like ProVerif, Automated Validation of Internet Security Protocols and Applications (AVISPA) and Burrows-Abadi-Needham (BAN) logic to check the regularity of the authentication protocol. Moreover, we prove the secrecy of a session key through the formal security using the random oracle model, known as Real-Or-Random (ROR) model. Finally, a detailed performance evaluation proves that the security protocol not only provides a security strength, but also preserves the low computational overhead. Thus, the proposed authentication protocol is secure and computationally efficient as compared to other relevant schemes. | Shashidhara, R.; Nayak, Sanjeet Kumar; Das, Ashok Kumar; Park, Youngho | Bennett Univ, Dept Comp Sci Engn, Greater Noida 201310, India; Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India; Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea; Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 41566, South Korea | Das, Ashok Kumar/U-2790-2019; Shashidhara, R/ABG-7111-2021 | 57211937805; 55811613100; 55450732800; 56962990300 | parkyh@knu.ac.kr; | IEEE ACCESS | IEEE ACCESS | 2169-3536 | 9 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2021 | 3.476 | 37.9 | 0.98 | 2025-07-30 | 7 | 13 | Authentication; Security; Protocols; Roaming; Password; Cryptography; Wireless sensor networks; Global roaming; authentication; key establishment; cryptanalysis; security; BAN logic; AVISPA | authentication; AVISPA; BAN logic; cryptanalysis; Global roaming; key establishment; security | Authentication; Cellular radio systems; Computation theory; Cryptography; Denial-of-service attack; Formal verification; Internet protocols; Mobile security; Mobile telecommunication systems; Wireless networks; Authentication protocols; Authentication systems; Computational overheads; Computationally efficient; Efficient authentication; Formal verification tools; Man in the middle attacks; Password verifications; Network security | English | 2021 | 2021 | 10.1109/access.2021.3050402 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | ||||
| ○ | ○ | Article | On the Security of a Secure and Lightweight Authentication Scheme for Next Generation IoT Infrastructure | In recent years, the Internet of things (IoT) has become an encouraging communication paradigm that has numerous applications including smart city, smart home and intelligent transportation system. The information sensed by several IoT smart devices can be security stored at the (cloud) servers. An external user, being a client, can access the services from a server for the sensing information, provided that a mutual authentication happens among them. Using the established session key among the user and the server, encrypted information with the help of session key can be delivered to the user by the server securely. Recently, Rana et al. proposed a smart-card based remote user authentication scheme using user password. In this comment paper, we carefully analyzed the scheme of Rana et al. and tracked down that their scheme is insecure against serious attacks, including stolen smart card attack, privileged-insider attack, user impersonation attack, password change attack and Ephemeral Secret Leakage (ESL) attack. Furthermore, their scheme does not preserve untraceability feature. To remedy these security pitfalls, we also provide some remedies that can help in building more secure and effective user authentication scheme to apply in securing next generation IoT infrastructure. | Das, Ashok Kumar; Bera, Basudeb; Wazid, Mohammad; Jamal, Sajjad Shaukat; Park, Youngho | Int Inst Informat Technol, Ctr Secur Theory & Algorithm Res, Hyderabad 500032, India; Graph Era, Dept Comp Sci & Engn, Dehra Dun 248002, Uttarakhand, India; King Khalid Univ, Dept Math, Abha 61413, Saudi Arabia; Kyungpook Natl Univ, Sch Elect Engn, Daegu 41566, South Korea | Das, Ashok Kumar/U-2790-2019; Jamal, Sajjad/AHE-6498-2022; WAZID, MOHAMMAD/X-4211-2018; Bera, Basudeb/ACC-6233-2022; wazid, mohammad/X-4211-2018 | 55450732800; 57214777647; 55480987400; 57198092048; 56962990300 | iitkgp.akdas@gmail.com;parkyh@knu.ac.kr; | IEEE ACCESS | IEEE ACCESS | 2169-3536 | 9 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2021 | 3.476 | 37.9 | 2.88 | 2025-07-30 | 16 | 41 | Servers; Security; Internet of Things; Authentication; Smart cards; Password; Licenses; Internet of Things (IoT); cryptanalysis; authentication; key agreement; security | KEY AGREEMENT SCHEME; PASSWORD AUTHENTICATION; USER ANONYMITY; INTERNET; ENHANCEMENT; PROTOCOL; IMPROVEMENT | authentication; cryptanalysis; Internet of Things (IoT); key agreement; security | Authentication; Automation; Cryptography; Intelligent systems; Smart cards; Authentication scheme; Communication paradigm; Encrypted informations; Intelligent transportation systems; Internet of thing (IOT); Remote user authentication schemes; User authentication scheme; User impersonation attacks; Internet of things | English | 2021 | 2021 | 10.1109/access.2021.3079312 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | |||
| ○ | ○ | Article | Polycrystalline-Silicon-MOSFET-Based Capacitorless DRAM With Grain Boundaries and Its Performances | In this work, a capacitorless one-transistor dynamic random access memory (1T-DRAM) based on a polycrystalline silicon (poly-Si) metal-oxide-semiconductor field-effect transistor was designed and analyzed through a technology computer-aided design (TCAD) simulation. A poly-Si thin film was utilized within the device because of several advantages, including its low fabrication cost and the feasibility of its use in high-density three-dimensional (3D) memory arrays. An asymmetric dual-gate structure is proposed to perform the write "1" operation and achieve high retention characteristics. The proposed 1T-DRAM cell demonstrates a high sensing margin of 8.73 fiA/fim and a high retention time of 704.4 ms compared to previously reported 1T-DRAMs, even at a high temperature. In addition, the effect of grain boundaries on the memory performance of the proposed device was investigated, and the results validated the excellent reliability of its retention characteristics even in the presence of grain boundaries (>64 ms at T D 358 K). | Lee, Sang Ho; Jang, Won Douk; Yoon, Young Jun; Seo, Jae Hwa; Mun, Hye Jin; Cho, Min Su; Jang, Jaewon; Bae, Jin-Hyuk; Kang, In Man | Kyungpook Natl Univ, Sch Elect & Elect Engn, Daegu 702201, South Korea; Samsung Elect Co Ltd, Hwasung Si 445701, South Korea; Korea Atom Energy Res Inst, Korea Multipurpose Accelerator Complex, Gyeongju 38180, South Korea | Lee, Sang Ho/MCX-8396-2025; Seo, Jae Hwa/KYP-7367-2024 | 57416738400; 57211978212; 57218864885; 55516610100; 57219936994; 57188742288; 57194107504; 35326180700; 7203062678 | imkang@ee.knu.ac.kr; | IEEE ACCESS | IEEE ACCESS | 2169-3536 | 9 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2021 | 3.476 | 37.9 | 0.98 | 2025-07-30 | 12 | 14 | Polycrystalline silicon; one-transistor dynamic random access memory; grain boundaries; metal-oxide-semiconductor field-effect transistor; one transistor dynamic random access memory; dualgate | dualgate; grain boundaries; metal-oxide-semiconductor field-effect transistor; one transistor dynamic random access memory; one-transistor dynamic random access memory; Polycrystalline silicon | Electronic design automation; Field effect transistors; Grain boundaries; Polycrystalline materials; Polysilicon; Static random access storage; Capacitorless drams; Dual-gate structure; One-transistor dynamic random access memory (1t-dram); Polycrystalline silicon (poly-Si); Retention characteristics; Semiconductor field-effect transistors; Technology computer aided design; Three-dimensional (3D) memory; Dynamic random access storage | English | 2021 | 2021 | 10.1109/access.2021.3068987 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | ||||
| ○ | ○ | Article | Power Flow Analysis of Islanded Microgrids: A Differential Evolution Approach | Power flow (PF) analysis of microgrids (MGs) has been gaining a lot of attention due to the evolution of islanded MGs. To calculate islanded MGs' PF solution, a globally convergent technique is proposed using Differential Evolution (DE)- a popular optimization algorithm for global non-convex optimization. This paper formulates the PF problem as a constrained optimization problem (COP) considering all the operating conditions of the Droop Controlled Islanded MGs (DCIMGs). To solve the proposed COP, epsilon DE-NGM, (Epsilon based Differential Evolution with Newton-Gauss-based mutation) is proposed. The proposed algorithm, epsilon DE-NGM, is a novel variant of DE since it comprises a novel mutation operator, Newton-Gauss-based mutation (NGM). NGM includes all the important features of DE's mutation strategies as well as reduces the constraint violation by utilizing the information of constraint-space. Numerical experiments validate that the global convergence ability of proposed algorithms in solving COPs than existing state-of-the-art algorithms. Furthermore, the proposed algorithm as a PF tool has better robustness than existing tools on ill- and well-conditioned systems with heavy loads, different limit violations, and inappropriate final solutions (far from the flat start). The performed comparative analysis confirms good agreement of accuracy and efficacy with the existing method for islanded MG's PF. | Kumar, Abhishek; Jha, Bablesh Kumar; Das, Swagatam; Mallipeddi, Rammohan | Indian Inst Technol BHU, Dept Elect Engn, Varanasi 221005, Uttar Pradesh, India; Indian Inst Technol Gandhinagar, Dept Elect Engn, Gandhinagar 382355, India; Indian Stat Inst, Elect & Commun Sci Unit, Kolkata 700108, India; Kyungpook Natl Univ, Sch Elect Engn, Dept Artificial Intelligence, Daegu 702701, Daegu 702701, South Korea | Jha, Bablesh/B-2801-2019; Mallipeddi, Rammohan/AAL-5306-2020; Kumar, Abhishek/ABA-5251-2021; Das, Swagatam/AAG-6753-2019 | 57206266703; 57197764988; 24729258600; 25639919900 | mallipeddi.ram@gmail.com; | IEEE ACCESS | IEEE ACCESS | 2169-3536 | 9 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2021 | 3.476 | 37.9 | 2.42 | 2025-07-30 | 28 | 35 | Constrained optimization problem; differential evolution; islanded microgrid; power flow; distributed generation | BACKWARD/FORWARD SWEEP ALGORITHM; CONSTRAINT-HANDLING METHOD; DYNAMIC ECONOMIC-DISPATCH; NEWTON-RAPHSON; OPTIMIZATION; OPERATION; STRATEGIES; SYSTEMS; HYBRID; MODES | Constrained optimization problem; differential evolution; distributed generation; islanded microgrid; power flow | Constrained optimization; Convex optimization; Genetic algorithms; Microgrids; Constrained optimi-zation problems; Constraint violation; Differential Evolution; Global convergence ability; Nonconvex optimization; Numerical experiments; Optimization algorithms; State-of-the-art algorithms; Electric load flow | English | 2021 | 2021 | 10.1109/access.2021.3073509 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | |||
| ○ | ○ | Article | REF-Net: Robust, Efficient, and Fast Network for Semantic Segmentation Applications Using Devices With Limited Computational Resources | Considering importance of the autonomous driving applications for mobile devices, it is imperative to develop both fast and accurate semantic segmentation models. Thanks to emergence of Deep Learning (DL) techniques, the segmentation models enhanced their accuracy. However, this improved performance of currently popular DL models for self-driving car applications come at the cost of time and computational efficiency. Moreover, networks with efficient model architecture experience lack of accuracy. Therefore, in this study, we propose robust, efficient, and fast network (REF-Net) that combines carefully formulated encoding and decoding paths. Specifically, the contraction path uses mixture of dilated and asymmetric convolution layers with skip connections and bottleneck layers, while the decoding path benefits from nearest neighbor interpolation method that demands no trainable parameters to restore original image size. This model architecture considerably reduces the number of trainable parameters, required memory space, training, and inference time. In fact, the proposed model required nearly 90 times fewer trainable parameters and approximately 4 times less memory space that allowed 3-fold faster training runtime and 2-fold inference speedup in the conducted experiments using Cambridge-driving Labeled Video Database (CamVid) and Cityscapes datasets. Moreover, despite its notable efficiency in terms of memory and time, the REF-Net attained superior results in several segmentation evaluation metrics that showed roughly 2%, 4%, and 3% increase in pixel accuracy, Dice coefficient, and Jaccard Index, respectively. | Olimov, Bekhzod; Kim, Jeonghong; Paul, Anand | Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu 41566, South Korea | ; Paul, Anand/V-6724-2017; Olimov, Bekhzod/AAA-9362-2021 | 57220579660; 55138548100; 56650522400 | jhk@knu.ac.kr; | IEEE ACCESS | IEEE ACCESS | 2169-3536 | 9 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2021 | 3.476 | 37.9 | 1.36 | 2025-07-30 | 19 | 21 | Semantics; Autonomous vehicles; Computational modeling; Image segmentation; Decoding; Training; Convolution; Autonomous driving; deep convolutional neural networks; nearest neighbor interpolation; semantic segmentation | IMAGE SEGMENTATION; POINT CLOUD | Autonomous driving; Deep convolutional neural networks; Nearest neighbor interpolation; Semantic segmentation | Autonomous vehicles; Computational efficiency; Decoding; Deep learning; Efficiency; Memory architecture; Semantic Web; Semantics; Autonomous driving; Computational resources; Encoding and decoding; Model architecture; Nearest neighbor interpolation; Segmentation evaluation metrics; Segmentation models; Semantic segmentation; Network architecture | English | 2021 | 2021 | 10.1109/access.2021.3052791 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | |||
| ○ | ○ | Article | Resource-Optimized Design of Bit-Shuffle Block Coding for MIMO-VLC | Designing a run-length-limited (RLL) code for a visible light communication (VLC) system requires consideration of several performance factors including hardware overhead, transmission efficiency, and direct current (DC) balance. This paper proposes a novel RLL code called bit-shuffle block codes for high-rate multiple-input multiple-output (MIMO)-VLC systems that can offer excellent constant illumination and transmission efficiency with extensively-optimized hardware resources. Due to the structure of the Omega network, the proposed bit-shuffle block coding method can increase transmission efficiency and significantly reduce hardware overhead. In addition, it can generate codewords dynamically, which guarantees DC balance with multiple LEDs to serve the dual purpose of illumination and communication. Experimental results confirm that the proposed bit-shuffle block coding demonstrate excellent performance in resource optimization, and can be a viable solution for MIMO-VLC applications that can send large volumes data with limited hardware resources. | Han, Youngsun; Lee, Sanghyeon; Kim, Byung Wook; Kim, Yongtae | Pukyong Natl Univ, Dept Comp Engn, Busan 48513, South Korea; Changwon Natl Univ, Dept Informat & Commun Engn, Chang Won 51140, Gyeongnam, South Korea; Kyungpook Natl Univ, Sch Comp Sci & Engn, Daegu 41566, South Korea | 7404096461; 59951851100; 57195558142; 55699627900 | bwkim@changwon.ac.kr;yongtae@knu.ac.kr; | IEEE ACCESS | IEEE ACCESS | 2169-3536 | 9 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2021 | 3.476 | 37.9 | 0.23 | 2025-07-30 | 4 | 3 | Multiple-input multiple-output (MIMO); visible light communication (VLC); run-length-limited (RLL) codes; hardware resource optimization; bit-shuffling | VISIBLE-LIGHT COMMUNICATION; CONSTELLATION DESIGN | bit-shuffling; hardware resource optimization; Multiple-input multiple-output (MIMO); run-length-limited (RLL) codes; visible light communication (VLC) | Efficiency; MIMO systems; Hardware overheads; Hardware resources; Optimized designs; Performance factors; Resource optimization; Run length limited code; Transmission efficiency; Visible light communications (VLC); Visible light communication | English | 2021 | 2021 | 10.1109/access.2021.3095514 | 바로가기 | 바로가기 | 바로가기 | 바로가기 | ||||
| ○ | ○ | Article | Reverberation Suppression Method for Active Sonar Systems Using Non-Negative Matrix Factorization With Pre-Trained Frequency Basis Matrix | In active sonar systems, detection always suffers from reverberation interference from multiple scatterers in oceanic environments; therefore, numerous studies have been conducted on reverberation suppression. Recently, a non-negative matrix factorization (NMF)-based method was proposed and successfully applied to reverberation suppression. However, the conventional NMF-based method makes convergence challenging because the frequency basis matrix is initialized without considering reverberation characteristic information from oceanic environments. To solve these problems, We propose an improved NMF-based reverberation suppression method adopting a pre-trained reverberation basis matrix and modified sparse update rule. The proposed method is evaluated by analyzing simulation and sea experiment data and the study confirmed that the detection performance was improved compared to the conventional method under various signal-to-reverberation ratio conditions. Several topics are also discussed to analyze the proposed method in detail. | Kim, Geunhwan; Lee, Seokjin | Kyungpook Natl Univ, Coll IT Engn, Elect & Elect Engn, Daegu 41566, South Korea | 57214800540; 36174416200 | sjlee6@knu.ac.kr; | IEEE ACCESS | IEEE ACCESS | 2169-3536 | 9 | SCIE | COMPUTER SCIENCE, INFORMATION SYSTEMS;ENGINEERING, ELECTRICAL & ELECTRONIC;TELECOMMUNICATIONS | 2021 | 3.476 | 37.9 | 0.45 | 2025-07-30 | 3 | 6 | Reverberation; Spectrogram; Time-frequency analysis; Sonar; Matrix decomposition; Sparse matrices; Support vector machines; Active sonar; non-negative matrix factorization; reverberation suppression; pre-trained basis matrix; sparseness | Active sonar; Non-negative matrix factorization; Pre-trained basis matrix; Reverberation suppression; Sparseness | Factorization; Matrix algebra; Sonar; Active sonar; Base matrix; Matrix decomposition; Nonnegative matrix factorization; Pre-trained base matrix; Reverberation suppressions; Sparse matrices; Sparseness; Spectrograms; Support vectors machine; Time-frequency Analysis; Reverberation | English | 2021 | 2021 | 10.1109/access.2021.3124509 | 바로가기 | 바로가기 | 바로가기 | 바로가기 |
페이지 이동: