http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
IHE MHD 메타데이터와 IHE XDS.b 메타데이터의 자동 변환
전형석 ( Hyeongseok Jeon ),이장수 ( Jangsoo Lee ),도형호 ( Dongwook Park ),이성기 ( Hyoungho Do ),( Sungkee Lee ) 한국정보처리학회 2013 한국정보처리학회 학술대회논문집 Vol.20 No.2
IHE(Integrating the Healthcare Enterprise)의 XDS.b(Cross-Enterprise Document Sharing.b) 프로파일은 의료기관간 환자의 전자진료기록을 공유하기 위해 개발되었으나 모바일 환경을 고려하지 않았다. 이를 보완하고자 IHE 에서는 모바일기기에서도 전자진료기록을 공유할 수 있는 MHD(Mobile access to Health Documents) 프로파일을 개발했다. XDS.b 메타데이터는 ebXML(electronic business XML)을 사용하고 MHD 메타데이터는 JSON(JavaScript Object Notation)을 사용하므로 MHD와 XDS.b를 연동하기 위해서는 MHD 메타데이터를 XDS.b 메타데이터로 변환이 필요하다. 본 논문에서는 MHD 메타데이터를 XDS.b 메타데이터로 변환하는 규칙을 정의했다.
IoT 헬스케어 기기에서의 중간자 공격 방어를 위한 디지털 서명 알고리즘 분석과 구현
전형석(Hyeongseok Jeon),이성기(Sungkee Lee) 한국정보기술학회 2021 한국정보기술학회논문지 Vol.19 No.9
MITM(Man-In-The-Middle) attacks can directly or indirectly harm users health by leaking and modulating user information, vital sign data from IoT healthcare devices, and causing them to malfunction. In this paper, we analyzed and applied digital signature algorithms to defend against MIMT attacks on IoT healthcare devices having low system resources, and we also defined the light-weight digital certificate. After implementing and testing three digital signature algorithms that offer a 128-bit of security level on four MCU boards which are used in IoT healthcare devices, we found that the ECDSA using secp256k1 elliptic curve was excellent in terms of execution and speed. To verify that ECDSA and the light-weight certificate can defend against MITM attacks on IoT healthcare devices, we simulated a IoT Healthcare device in a remote update situation and a MITM attack. As a result, we prove that the MITM attacker was unable to intervene in the network connection between the simulated IoT Healthcare device and the update server which are ECDSA and the light-weight certificate applied.
전형석(Hyeongseok Jeon),이성기(Sungkee Lee) 한국정보기술학회 2021 한국정보기술학회논문지 Vol.19 No.1
Due to the growing interest in health care in everyday life and advances in the internet technology, IoT healthcare devices are widely used at home. However, despite the fact that IoT healthcare devices generate very sensitive health information, security measures are very low because of devices capacity limitation. During the remote update of the device software over network which is called over-the-air (OTA) programming, OTA update protocols and binary codes can be leaked by security attacks that leads to sensitive information leaks, or the devices are suffered from secondary attacks by malicious use of the leaked sensitive information. In this paper, we analyzed the vulnerabilities of OTA updates of IoT healthcare devices and demonstrated them by simulating the real-world security attacks. In the simulation, OTA update protocols and binary codes are captured by executing the sniffing attacks, the device operation information is obtained through reverse engineering, and demonstrated the disabling of the device by installing a dummy program.
IoT 헬스케어 기기의 원격 업데이트 보안을 위한 암호화 알고리즘 분석과 구현
전형석(Hyeongseok Jeon),이성기(Sungkee Lee) 한국정보기술학회 2021 한국정보기술학회논문지 Vol.19 No.7
When IoT healthcare devices are updated remotely, information such as user, device authentication, and the source code are vulnerable to leak by sniffing attacks. Through the binary code analysis of the leaked source code, device control commands, data transmission format, and security functions could be leaked, allowing a secondary attack by utilizing the device. In this paper, we analyzed and applied encryption algorithms to defend against sniffing attacks while remote updating IoT healthcare devices having limited system resources. As testing results of algorithms implemented on MCU boards, which are mainly used in IoT healthcare devices, we found that the ChaCha20 encryption algorithm has sufficient security performance to defend against sniffing attacks and is excellent in terms of speed and memory usage. We also showed that, by implementing the ChaCha20 algorithm, the malicious use of the source codes for remote updates is prevented from sniffing attacks.
인정민(Jungmin In),전형석(Hyeongseok Jeon),이성기(Sungkee Lee) 한국정보기술학회 2016 한국정보기술학회논문지 Vol.14 No.4
Health information systems are required to apply international standards to achieve interoperability and standardized systems should be validated according to conformance statements. IHE MHD profile was developed to exchange health documents on mobile environments by standardized way. In this research, we developed the conformance test tools for each transaction of IHE MHD profile. To validate the actual request and response messages, the conformance test tools embed the actors of MHD profile. The tools parse, analyze and examine HTTP messages and MHD metadata, and display the results on web pages using JSP.
시뮬레이터를 활용한 Multiplay Mode 구축 및 모션 시뮬레이터 연계를 통한 자율주행 metaverse 시스템 구축
설재민(Jaemin Seol),진영완(Youngwan Jin),전형석(Hyeongseok Jeon),이기범(Kibeom Lee),송봉섭(Bongsob Song) 한국자동차공학회 2023 한국자동차공학회 부문종합 학술대회 Vol.2023 No.5
Since an autonomous driving technology is getting sophisticated, the edge case scenarios which can induce traffic accident is considered as a bottleneck in the further improvement. Even though deep learning-based algorithms are capable of higher generality, edge cases remain challenge because networks are highly dependent to the training dataset which generally has small amount of dangerous driving scenarios. Therefore, in this paper, metaverse simulation system using motion simulator is proposed. In order to mimic various human factors in the driving scene, multiple users can access the identical virtual environment and be able to interact with each other. Additionally, motion simulator provides realistic ride comfort for assuring the high fidelity of the driving condition. Using the proposed system, various cases stand for dangerous edge scenario can be synthetically covered and can be expanded to cross-domain applications for future smart mobility system including autonomous vehicle, urban air mobility, robots and traffic management system.