70 / 100 SEO Score

Assist. Prof. Dr. Hyunseok Kim | Internet of Drones | Best Researcher Award

Assist. Prof. Dr. Hyunseok Kim, Dept.of Information and Security, South Korea.

Dr. Hyun-Seok Kim is a distinguished computer scientist and cybersecurity expert from the Republic of Korea, currently serving as the Head of the Department of Information Security at ICT Polytechnic University. With over two decades of experience in IT auditing, formal verification, and secure systems research, he has contributed immensely to both governmental cyber safety and academic excellence. Dr. Kim is a prolific author and patent holder, with specialized expertise in RFID security, cryptographic protocol analysis, and biometric authentication systems. His career reflects a commitment to enhancing digital security infrastructures in critical systems like IoT, e-commerce, and national defense.

Publication Profile

Scopus

ORCID

Google Scholar

🎓 Education Background

Dr. Kim earned his Ph.D. in Computer Science from Korea University, where he conducted pioneering research on cryptographic modeling and the formal design of distributed systems. He also holds a Master of Science in Computer Science from the same institution, focusing on protocol analysis via model checking. Earlier, he received a Bachelor of Business Management from the Korea Military Academy, which laid the foundation for his structured and strategic approach to IT and cybersecurity. His academic training integrates both technical and managerial disciplines, preparing him for leadership roles in both research and institutional governance.

💼 Professional Experience

Dr. Kim’s professional journey spans multiple leadership and technical roles. He currently leads the Information Security Department at ICT Polytechnic University since August 2023. From 2012 to 2023, he served as an IT Senior Auditor and Deputy Director at the Board of Audit and Inspection of Korea, conducting national audits on cyber safety. He also worked as an IT Manager in the Korean Army’s Special Warfare Training Group and was a full-time lecturer at the Korea Military Academy. His early roles included IT manager and teaching assistant positions, all contributing to his expertise in secure systems and education.

🏆 Awards and Honors

Dr. Kim has received multiple prestigious awards and scholarships throughout his career. These include full research scholarships in 2006 and 2007, and recognition for three consecutive years (2008–2010) in the Korea Security Technology Paper and Idea contest, earning second, third, and fourth place respectively. Additionally, he completed several elite training programs, including Canada’s Audit Foundation courses and a digital forensic inspector certification. His work has been widely recognized for its innovation, depth, and practical impact in the cybersecurity field, especially in areas like RFID and biometric security systems.

🔬 Research Focus

Dr. Kim’s research revolves around formal verification and analysis of cryptographic protocols in wireless networks, smart cards, IoT systems, and cloud environments. His interests include protocol modeling, RFID security systems, biometric authentication, and e-commerce security frameworks. Leveraging tools such as Casper, FDR, and SPIN, he ensures theoretical robustness and real-world applicability. He has led government-supported projects in smart card evaluation, military technology renovation, and pervasive system security analysis, advancing the frontiers of trustworthy computing and national cyber defense systems through both academic and applied research.

📝 Conclusion

Dr. Hyun-Seok Kim stands as a leading authority in secure system architecture and formal verification, blending academic rigor with real-world implementation. His commitment to strengthening digital infrastructures through research, patents, and government audits underscores his influence in both the public and academic sectors. A lifelong learner and innovator, he continues to shape the future of cybersecurity with his work on RFID, biometrics, and protocol security. His leadership at ICT Polytechnic University marks a new chapter in mentoring future professionals and advancing Korea’s position in global cybersecurity research.

📚 Top Publication Notes

  1. Bio-2FA-IoD: A Biometric-Enhanced Two-Factor Authentication Protocol for Secure Internet of Drones Operations
    Journal: Mathematics, 2025
    Cited by: 12 articles
    Summary: Introduces a biometric-enhanced protocol to secure drone operations via formal verification.

  2. Efficient and Scalable Authentication Framework for IoD Networks
    Journal: Electronics, 2025
    Cited by: 9 articles
    Summary: Develops scalable authentication for secure communications in Internet of Drones environments.

  3. Security Enhancement of biometric-based authentication systems using smart card
    Journal: IEEE Access, 2024
    Cited by: 17 articles
    Summary: Strengthens biometric systems by integrating smart cards in multi-factor authentication.

  4. Enhanced Password-based Simple Three Party Key Exchange Protocol
    Journal: Computers and Electrical Engineering, 2009
    Cited by: 34 articles
    Summary: Proposes a secure and efficient three-party key exchange protocol.

  5. Security Analysis of RFID Systems Using Model Checking
    Journal: Lecture Notes in Computer Science, 2006
    Cited by: 42 articles
    Summary: Demonstrates formal security validation of RFID protocols via model checking techniques.

  6. The Design and Verification of RFID Authentication Protocol for Ubiquitous Computing
    Conference: WICS in DEXA, 2007
    Cited by: 25 articles
    Summary: Delivers protocol verification for RFID use in smart environments.

  7. Formal Verification of Cryptographic Protocol for Secure RFID System
    Conference: NMC 2008
    Cited by: 18 articles
    Summary: Validates cryptographic resilience of RFID systems using model checking frameworks.

  8. Security Analysis of Smart Card-based Authentication Schemes
    Conference: ICIS 2010
    Cited by: 14 articles
    Summary: Examines vulnerabilities and mitigation strategies in smart card authentication.

  9. EAFoc: Enterprise Architecture Framework Based on Commonality
    Journal: Journal of Computer Science and Technology, 2006
    Cited by: 58 articles
    Summary: Introduces a novel enterprise architecture framework using commonality analysis.

  10. RFID Privacy Protection Scheme for Secure Ubiquitous Computing
    Conference: IEEE ICCCN Workshop, 2007
    Cited by: 27 articles
    Summary: Proposes privacy-preserving protocols for RFID in pervasive environments.

 

 

Hyunseok Kim | Internet of Drones | Best Researcher Award

You May Also Like