Follow
Ki-Hyung Kim
Ki-Hyung Kim
Verified email at ajou.ac.kr
Title
Cited by
Cited by
Year
Cyber security of critical infrastructures
LA Maglaras, KH Kim, H Janicke, MA Ferrag, S Rallis, P Fragkou, ...
Ict Express 4 (1), 42-45, 2018
1952018
Implementation of IoT system using block chain with authentication and data protection
CH Lee, KH Kim
2018 International Conference on Information Networking (ICOIN), 936-940, 2018
1132018
Ubiquitous sensor network system and method of configuring the same
KH Kim, CS Lim, J Park
US Patent 8,756,299, 2014
1122014
Route-over vs Mesh-under Routing in 6LoWPAN
AH Chowdhury, M Ikram, HS Cha, H Redwan, SMS Shams, KH Kim, ...
Proceedings of the 2009 international conference on wireless communications …, 2009
1082009
Scenario and countermeasure for replay attack using join request messages in LoRaWAN
SJ Na, DY Hwang, WS Shin, KH Kim
2017 international conference on information networking (ICOIN), 718-720, 2017
1042017
LoWMob: Intra-PAN mobility support schemes for 6LoWPAN
G Bag, MT Raza, KH Kim, SW Yoo
Sensors 9 (7), 5844-5877, 2009
992009
An OAuth based authentication mechanism for IoT networks
S Emerson, YK Choi, DY Hwang, KS Kim, KH Kim
2015 International Conference on Information and Communication Technology …, 2015
872015
Risk analysis and countermeasure for bit-flipping attack in LoRaWAN
JW Lee, DY Hwang, JH Park, KH Kim
2017 International conference on information networking (ICOIN), 549-551, 2017
682017
Security analysis survey and framework design for ip connected lowpans
R Riaz, KH Kim, HF Ahmed
2009 international symposium on autonomous decentralized systems, 1-6, 2009
662009
A real-time fall detection system based on the acceleration sensor of smartphone
Y Lee, H Yeh, KH Kim, O Choi
International Journal of Engineering Business Management 10, 1847979017750669, 2018
652018
Survey of security requirements, attacks and network integration in wireless mesh networks
H Redwan, KH Kim
2008 New Technologies, Mobility and Security, 1-5, 2008
652008
SAKES: Secure authentication and key establishment scheme for M2M communication in the IP-based wireless sensor network (6L0WPAN)
HR Hussen, GA Tizazu, M Ting, T Lee, Y Choi, KH Kim
2013 Fifth international conference on ubiquitous and future networks (ICUFN …, 2013
632013
Efficient distributed simulation of hierarchical DEVS models: transforming model structure into a non-hierarchical one
K Kim, W Kang, B Sagong, H Seo
Proceedings 33rd Annual Simulation Symposium (SS 2000), 227-233, 2000
622000
LNMP-Management architecture for IPv6 based low-power wireless Personal Area Networks (6LoWPAN)
H Mukhtar, K Kang-Myo, SA Chaudhry, AH Akbar, K Ki-Hyung, SW Yoo
NOMS 2008-2008 IEEE Network operations and management symposium, 417-424, 2008
612008
Power sharing and control in distributed generation with wireless sensor networks
R Majumder, G Bag, KH Kim
IEEE Transactions on Smart Grid 3 (2), 618-634, 2012
592012
CORBA-based, multi-threaded distributed simulation of hierarchical DEVS models: transforming model structure into a non-hierarchical one
KH Kim, WS Kang
International Conference on Computational Science and Its Applications, 167-176, 2004
512004
Distributed simulation of hierarchical DEVS models: Hierarchical scheduling locally and time warp globally
KH Kim, YR Seong, TG Kim, KH Park
Transactions of the Society for Computer Simulation International 13 (3 …, 1996
501996
Block chain based data security enhanced IoT server platform
JH Jeon, KH Kim, JH Kim
2018 International Conference on Information Networking (ICOIN), 941-944, 2018
472018
Wormhole attack prevention mechanism for RPL based LLN network
FI Khan, T Shon, T Lee, K Kim
2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN …, 2013
472013
A unified security framework with three key management schemes for wireless sensor networks
R Riaz, A Naureen, A Akram, AH Akbar, KH Kim, HF Ahmed
Computer Communications 31 (18), 4269-4280, 2008
462008
The system can't perform the operation now. Try again later.
Articles 1–20