NISL's Homepage

Next-generation Information Security Lab (NISL)

1095 Dalgubeoldaero, Dalseo-Gu, Daegu, 42601, Republic of Korea 路 (053)580-5229 路 yhpark@kmu.ac.kr

In the 21st century with information and telecommunication more important than ever before, the mobile network field is rapidly developing as the core of the information and telecommunication field. The importance of information security is being more emphasized, as we live in the information society with system development. Information security is a social and national issue rather than personal.

Under these circumstances, we have established Next-generation Information Security Laboratory(NISL). "Next-generation" includes internet of things(IoT) security, blockchain, vehicle ad hoc network(VANET) security, post-quantum cryptography, information security service technology for the mobile Internet, and authentication technology for the various network security system. These are the core of the next-generation security technology.

NISL at Keimyung University will do its best to improve the information security field in Korea, meet international standards, and enhance its competitive edge in the rapidly changing information and telecommunication society


Members

YoHan Park

Assistant Professor

Network Security, Blockchain, Post-Quantum Crytography, Formal Analysis

SeungMin Lee

Graduate(Master)

Intrusion Detection System

August 2021 - Present

UnDong Kim

Undergraduate

Blockchain, Web Security, Vehicle networks

February 2020 - Present

DaEun Ryu

Undergraduate

Cryptography, Formal Analysis

June 2021 - Present

SangCheol Lee

Undergraduate

Blockchain, Secure Conding

June 2021 - Present

SuHwan Kim

Undergraduate

Information Security

September 2021 - Present

Research Interests

Blockchain Technology
My Image

A blockchain is a decentralized ledger of all transaction across a P2P(pier to pier) network. The innovation of this technology is that participants transfer assets or data through the internet without the need for a trusted third party. This mechanism of blockchain can be applicable for financial services, voting, cloud service, healthcare, automotive energy management and many other fields. We study the security system and cryptographic techniques using the blockchain.

Post-quantum Cryptography

The quantum computer will break today's public-key cryptosystem such as RSA and ECC using Shor and Grover algorithm. A post-quantum cryptosystem is secure cryptosystem even if an attacker has a large quantum computer and try to attack the system. Today, several post quantum cryptosystems have been proposed for preventing quantum computing attacks, including hash based, multivariate, code based and lattice based cryptosystem. We study the post quantum cryptosystem for improving security and efficiency.

Security of IoT
My Image

The concept of Internet of Things (IoT) is that every object in the Internet infrastructure is inter connected into a global dynamic expanding network. Sensors and smart objects are classical computing devices key parties of the IOT. The computing performance of those devices are comparatively low, hence, it is hard to apply traditional cryptographic technologies. We study user authentication and key management suitable for IoT environments.

Security of VANETs
My Image

Vehicle Ad-Hoc Networks (VANETs) are distributed, self-organized networks built up by many high-speed vehicles. All vehicles in the network would install onboard units (OBU), which would integrate the vehicles' wireless communications, micro-sensors, embedded systems, and Global Positioning System (GPS). These smart vehicles could then communicate with each other as well as with roadside units (RSU), such as traffic lights or traffic signs, which would then improve the driving experience and make driving safer. Despite these advantages, VANETs come with their own set of challenges, particularly in the aspects of security and privacy. Lack of authenticated information shared in the network may lead to malicious attacks and service abuses, which could pose great threats to drivers. We study authentication and key distribution between vehicles and RSUs.


Publications


Lectures


Notice

We are recruting new members now.
If you have any question, don't hesitate to send email and to visit Room 1319, College of Engineering.