Papers by choong seon Hong
The KIPS Transactions:PartC, 2005
ABSTRACT
Lecture Notes in Computer Science, 2005
Today's computer network is shifting from wired networks to wireless networks. Several attempts h... more Today's computer network is shifting from wired networks to wireless networks. Several attempts have been made to assess the performance of TCP over wireless networks. Also, several solutions have been proposed to improve its performance. Many people believe SCTP would be replacement of TCP. However, the performance enhancement research for SCTP over wireless network is in beginning stage yet. In this paper we have measured performance characteristics of SCTP, and compared with ones of TCP and TCP-snoop over wireless network. After this experiment, we found the performance of SCTP is better than TCP, but worse than TCP-snoop. To improve the performance of SCTP over wireless network, we modified SCTP code by adopting TCP-snoop approach. We named it SCTP-snoop. With this SCTP-snoop, we experimented again, and found that it showed the best performance over wireless network among TCP, TCP-snoop, and SCTP.
The KIPS Transactions:PartC, 2004
ABSTRACT
Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05), 2005
Service discovery in ubiquitous environment, as well as adding semantics to the data is quite est... more Service discovery in ubiquitous environment, as well as adding semantics to the data is quite established now. But, still there is no uniform framework for the identification of devices. A uniform identity mechanism which would help existing architectures interoperate, allow agents to roam autonomously and leverage the World Wide Web to its full potential. Here we have tried to achieve this by proposing a URI based architecture for the identification of ubiquitous objects and human. We have materialized our perspective by presenting a conceptual architecture .We argue that by using URIs for physical objects we could leverage the existing architectures of semantic web and ubiquitous system to their highest potential. Our case studies at the end, second our argument, "A Semantically Ubiquitous Web".
Computer Networks, 2014
Internet Protocol Television is defined as a multimedia service delivered over IP-based networks ... more Internet Protocol Television is defined as a multimedia service delivered over IP-based networks supporting quality of service (QoS), quality of experience (QoE), security, interactivity, and reliability. This service is rapidly expanding to both wireless and mobile networks through mobile devices. This trend demands a seamless IPTV service architecture for those mobile devices in heterogeneous access networks. This is because the convergence of the heterogeneous access networks can resolve their own service-coverage limitations, eliminating dead spots. We first briefly research on the background and trend for the seamless IPTV service for heterogeneous networks. Next we propose a new system architecture taking the relevant technical issues into account. This architecture is mainly composed of three parts, (i) information of network conditions on client, (ii) signaling for communicating between client and server with information of network conditions, and (iii) adaptive streaming based on information of network conditions. The proposed architecture can be deployed on any Internet protocol layers such as application layer, transport layer and network layer. In this paper, we evaluate two cases such as (i) RTSP in application layer and (ii) SCTP in transport layer and compare them through the performance evaluation. The results in the evaluation show that the proposed architecture meets well the requirements of the minimum IPTV service performance recommended by ITU-T international standard for the QoE over heterogeneous access networks.
Lecture Notes in Computer Science, 2009
Lecture Notes in Computer Science
Secure multi-path routing is a critical issue in security management of WMNs due to its multi-hop... more Secure multi-path routing is a critical issue in security management of WMNs due to its multi-hop nature as each node takes part in routing mechanism making it prone to routing attacks. Security management mechanisms are armed with features such as asymmetric cryptography which are costly in term of computations, transmissions and time delays. In this paper, we propose a security management mechanism for multi-path routing which efficiently uses the characteristics of WMNs, mutual authentication and secrete key cryptography to provide secure multi-path route management. Our management scheme takes less overhead than the available secure multi-path routing mechanisms. Simulation analyses and the performance of the mechanism are presented in support of the proposal.
IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference, 2007
This paper presents a group-based security scheme for distributed wireless sensor networks. The s... more This paper presents a group-based security scheme for distributed wireless sensor networks. The scheme is proposed with 3-types of entities: one or more base stations, Y number of group dominator nodes, and N number of ordinary sensor nodes. We model the group-based deployment using Gaussian (normal) distribution and show that more than 85% network connectivity can be achieved with the proposed model. The small groups with pre-shared secrets form the secure groups where group dominators form the backbone of the network. The scheme is devised for dealing with sensory data aggregated by groups of collocated sensors; i.e., local sensed data are collected by the dominating nodes and sent an aggregated packet to the base station via other group dominators. The scheme is shown to be lightweight , and it offers a stronger defense against node capture attacks. Analysis and simulation results are presented to defend our proposal. Analysis shows that robustness can significantly be improved by increasing the deployment density using both the dominating and/or ordinary sensor nodes.
Lecture Notes in Computer Science
2011 13th Asia-Pacific Network Operations and Management Symposium, 2011
Intrusion detection system (IDS) i components of network security. IDS can abnormal behaviors to ... more Intrusion detection system (IDS) i components of network security. IDS can abnormal behaviors to detect attacks. When ID in order to detect more attacks, we have to attack signatures on IDS. However, in re wireless sensor networks, it is not efficient to attack signatures. And it is hard to maintai database because it should be updated frequen of attacks appear. In this paper, we propose mechanism which reduces the usage of mem Analysis of our proposal shows that our pro memory.
Lecture Notes in Computer Science, 2009
The current draft standard of 802.11s has defined routing for Wireless Mesh Networks (WMNs) in la... more The current draft standard of 802.11s has defined routing for Wireless Mesh Networks (WMNs) in layer-2 and to differentiate from layer-3 routing, it termed layer-2 routing as path selection. The layer-2 path selection (LPS) mechanism is fully specified in the draft of IEEE 802.11s for WMNs. However, routing with security provision is not specified in the standard. Our study identifies that the current path selection mechanism is vulnerable to various types of routing attacks like flooding, route redirection , spoofing etc. In this paper, we develop a novel Secure Layer-2 Path Selection (SLPS) mechanism that uses cryptographic extensions to provide authenticity and integrity of routing messages. Particularly, the proposed SLPS prevents unauthorized manipulation of mutable fields in the routing messages. Results from analysis and simulation demonstrate that SLPS protocol is robust against identified attacks and provides higher packet delivery ratio, requires no extra communication cost and incurs little path acquisition delay, computational and storage overhead to accomplish secure path selection.
The International Conference on Information Networking 2013 (ICOIN), 2013
In wireless communication, radio spectrum is a resource. Dynamic spectrum access or cognitive rad... more In wireless communication, radio spectrum is a resource. Dynamic spectrum access or cognitive radio is a viable method to increase spectrum utilization. The unlicensed users access the unused portion of radio spectrum opportunistically. The unlicensed users must vacate the spectrum as soon as the licensed users appear on the channel. Since, the licensed users or Primary Users (PUs) have paid licensing fees for the spectrum, the unlicensed users or Secondary Users (SUs) must not cause interference to PU transmissions. In order that SUs can continue to operate, they must find another spectrum hole on another channel and switch to that channel. These so called, spectrum sensing and spectrum handoff, are the basic foundations of CR technology. We model the random channel as an ON-OFF process and applied renewal theory to build a framework to observe the PU activity. Then from the observations, we estimate the likelihood of PU arrival to perform spectrum handoff. We then propose a spectrum access decision making policy based on the spectrum handoff time. We then numerically evaluate our proposal and make comparisons.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012
In this paper, we propose a handover mechanism for supporting of IEEE 802.22 WRAN system. General... more In this paper, we propose a handover mechanism for supporting of IEEE 802.22 WRAN system. Generally, every CPE (Consumer Premise Equipment) in IEEE 802.22 WRAN (Wireless Regional Area Network) is considered as a fixed user device. For this reason, IEEE 802.22 WRAN system is not suitable for adapting to portable and mobile user devices. Mobility is one of the most important factors for mobile devices. In order to support mobility of CPEs and continue to provide broad band network service in IEEE 802.22 WRAN system, an efficient handover mechanism is essential. In this paper we propose an efficient handover mechanism using characteristics of IEEE 802.22 WRAN system. We discuss the how handover procedure can be achieved with IEEE 802.22 control frames and then we evaluate L2 handover IEEE 802.22 WRAN system. We define a handover process with a decision making algorithm to reduce the packet loss during handover operation. The handover decision is made at the BS(Base Station) based on collected information by CPEs which are located on the boundary region located near the edge of BS coverage. Also the performance results show that our proposed mechanism not only achieves low handover latency but also does so with low packet loss rate.
Lecture Notes in Electrical Engineering, 2014
Vehicular Ad hoc Network (VANET) is developed for more driving efficicency, comfort and safety. T... more Vehicular Ad hoc Network (VANET) is developed for more driving efficicency, comfort and safety. The IEEE 802.11p/WAVE is a standard intended to support wireless access in VANETs. In this paper, we propose an analytical model to evaluate the performance of the IEEE 802.11p based MAC for VANETs under non-saturation condition through the packet delivery ratio, the average delay of emergency message and the throughput of service message. The 2-D Markov model is used to model two access categories in the IEEE 802.11p. The analytical model is validated by the extensive simulation, and it shows the impact of different parameters on the performance of network.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014
The IEEE 802.11 DCF (Distributed Coordination Function) is based on CSMA/CA (Carrier Sense Multip... more The IEEE 802.11 DCF (Distributed Coordination Function) is based on CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance). However, the CSMA-based random access protocol can cause serious unfairness or flow starvation. In this paper, we propose a multi-channel MAC with the power control (STPC-MMAC) to mitigate the starvation by exploiting the multiple channels and improving the spatial reuse of wireless channel. The main idea of our proposal is to use the IEEE 802.11 Power Saving Mechanism (PSM) with different transmission power levels used in the Announcement Traffic Indication Message (ATIM) window and the data window. All nodes transmit the ATIM messages with the maximum power while negotiating for the data channel in the ATIM window, and use the minimum required transmission power for their data transmissions in the data window on the negotiated channels. The simulation results show that the proposed STPC-MMAC can improve the network performance: aggregate throughput, average delay, energy efficiency and especially fairness index.
The International Conference on Information Networking 2011 (ICOIN2011), 2011
ABSTRACT We consider the network with two kinds of traffic: inelastic and elastic traffic. The in... more ABSTRACT We consider the network with two kinds of traffic: inelastic and elastic traffic. The inelastic traffic requires fixed throughput, high priority while the elastic traffic has controllable rate and low priority. Giving the fixed rate of inelastic traffic, how to inject the elastic traffic into the network to achieve the maximum utility of elastic traffic is solved in this paper. The Lagrangian Duality method is applied to solve the optimization problem. We decompose the Lagrangian into subproblems, and each sub-problem associates with each layer. The convexity of the primal problem guarantees the duality gap between primal and dual solutions is zero. The Lagrange multipliers, which are indeed the queue length on nodes for every destinations, implicitly update according to subgradient algorithm. The joint algorithm for rate control, routing, and scheduling is proposed. However, the scheduling is Max-weight scheduling and centralized algorithm actually. The Greedy distributed scheduling is introduced to implement scheduling in a distributed sense.
2006 8th International Conference Advanced Communication Technology, 2006
Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various fu... more Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks.
2013 IEEE International Conference on Communications (ICC), 2013
ABSTRACT In addition to spectrum scarcity, unfair and insufficient channel contention resolution ... more ABSTRACT In addition to spectrum scarcity, unfair and insufficient channel contention resolution has become one of the major bottlenecks for a good throughput in multi-hop wireless ad-hoc networks (MHAHNs). In this paper, we propose an optimal cognitive MAC protocol for MHAHNs under opportunistic spectrum access (OSA) approach in which channel contention resolution is done on the basis of interference-dependent random access addressing both social welfare maximization and energy efficiency. We show that, in OSA-based MHAHNs, contention control at MAC layer has an interaction relationship with power control at physical layer and congestion control at transport layer. Studying their mutual effect on such an OSA-based MHAHNs' performance motivates an optimal cognitive MAC framework which is shown as an NP-hard problem. To solve the problem, we introduce some auxiliary variables which are interpreted as interference weights and develop a distributed solution, which has been proved to converge to the global optimum.
Ubiquitous computing is fast becoming a reality. Several ubiquitous devices compliant with the se... more Ubiquitous computing is fast becoming a reality. Several ubiquitous devices compliant with the service discoveries like UPnP and JINI are available now. Individually, managing the ubiquitous devices with UPnP is not a problem. But, it is quite cumbersome to manage these devices in the large scale environment especially when the management issues like performance, fault and security management have to be considered. SNMP is a standard for network management and widely deployed. A majority of SNMP compliant devices are already present. We propose that by integrating SNMP with service discovery protocols like UPnP, we could leverage the use of management factors in the business, organizations, and other multi-user ubiquitous environments, while providing a uniform interface to an administrator for the management of UPnP and SNMP based devices.
Uploads
Papers by choong seon Hong