This page has only limited features, please log in for full access.
Ho-Kyung Yang; Hyun-Jong Cha; You-Jin Song. Secure Identifier Management Based on Blockchain Technology in NDN Environment. IEEE Access 2018, 7, 6262 -6268.
AMA StyleHo-Kyung Yang, Hyun-Jong Cha, You-Jin Song. Secure Identifier Management Based on Blockchain Technology in NDN Environment. IEEE Access. 2018; 7 ():6262-6268.
Chicago/Turabian StyleHo-Kyung Yang; Hyun-Jong Cha; You-Jin Song. 2018. "Secure Identifier Management Based on Blockchain Technology in NDN Environment." IEEE Access 7, no. : 6262-6268.
Hyun-Jong Cha; Ho-Kyung Yang; You-Jin Song. Secure Data Sharing using Proxy Re-Encryption for Intelligent Customized Services. International Journal of Grid and Distributed Computing 2018, 11, 29 -40.
AMA StyleHyun-Jong Cha, Ho-Kyung Yang, You-Jin Song. Secure Data Sharing using Proxy Re-Encryption for Intelligent Customized Services. International Journal of Grid and Distributed Computing. 2018; 11 (10):29-40.
Chicago/Turabian StyleHyun-Jong Cha; Ho-Kyung Yang; You-Jin Song. 2018. "Secure Data Sharing using Proxy Re-Encryption for Intelligent Customized Services." International Journal of Grid and Distributed Computing 11, no. 10: 29-40.
It is expected that the number of devices connecting to the Internet-of-Things (IoT) will increase geometrically in the future, with improvement of their functions. Such devices may create a huge amount of data to be processed in a limited time. Under the IoT environment, data management should play the role of an intermediate level between objects and devices that generate data and applications that access to the data for analysis and the provision of services. IoT interactively connects all communication devices and allows global access to the data generated by a device. Fog computing manages data and computation at the edge of the network near an end user and provides new types of applications and services, with low latency, high frequency bandwidth and geographical distribution. In this paper, we propose a fog computing architecture for efficiently and reliably delivering IoT data to the corresponding IoT applications while ensuring time sensitivity. Based on fog computing, the proposed architecture provides efficient power management in IoT device communication between sensors and secure management of data to be decrypted based on user attributes. The functional effectiveness and the safe data management of the method proposed are compared through experiments.
Hyun-Jong Cha; Ho-Kyung Yang; You-Jin Song. A Study on the Design of Fog Computing Architecture Using Sensor Networks. Sensors 2018, 18, 3633 .
AMA StyleHyun-Jong Cha, Ho-Kyung Yang, You-Jin Song. A Study on the Design of Fog Computing Architecture Using Sensor Networks. Sensors. 2018; 18 (11):3633.
Chicago/Turabian StyleHyun-Jong Cha; Ho-Kyung Yang; You-Jin Song. 2018. "A Study on the Design of Fog Computing Architecture Using Sensor Networks." Sensors 18, no. 11: 3633.
Combining rapid development of information and communication technology (ICT) with real life and things social infrastructure of things, the dangers of existing cyberspace, such as the hacking of home appliances by hacking of personal information and malware infection. As these devices increase, an enormous amount of data bound and personal information etc. are bound by external environmental information and so forth. IoT device size is increasing more and more problems such as hacking by a centralized management system and a duo such as DDoS attack are emerging. The technology to distribute and manage recent data provides the reliability without the third party who has the block chain certified. Since it manages data by distributing it, it has the effect of reducing intermediate fee and construction cost, data consistency is secured and it has high security. In this paper, we discuss a method to securely manage distributed identifiers of contents. Confidential identifiers can be safely stored and managed via these identifier division management systems.
Ho-Kyung Yang; Hyun-Jong Cha; You-Jin Song. A Study on Configuration of NDN Based Identifier Using Block Chain in Fog Computing Environment. Advanced Science Letters 2018, 24, 2020 -2025.
AMA StyleHo-Kyung Yang, Hyun-Jong Cha, You-Jin Song. A Study on Configuration of NDN Based Identifier Using Block Chain in Fog Computing Environment. Advanced Science Letters. 2018; 24 (3):2020-2025.
Chicago/Turabian StyleHo-Kyung Yang; Hyun-Jong Cha; You-Jin Song. 2018. "A Study on Configuration of NDN Based Identifier Using Block Chain in Fog Computing Environment." Advanced Science Letters 24, no. 3: 2020-2025.
With the advancement of ICT technology, the use of systems capable of organizing, sorting and utilizing numerous information generated in seconds was essential. This is not only information providers but also system stability, mobile-based technology, cloud system, etc. are presented for smooth use by consumers. However, the medical information handled by the service can violate the privacy of individuals. Therefore, the introduction of security technology such as encryption is necessary. Personal information must be made available only to users with access rights. For that, delegation of access rights is required from the data constructor. Also, when the authority is lost, it must be able to deprive the access right. These problems can be improved to attribute based encryption. In this paper, user attribute based encryption which can delegate and withdraw access right to be used in medical information monitoring system is applied. In order to manage this efficiently, it is based on the network of Fog Computing environment. Authorization authentication system uses block chain method.
Hyun-Jong Cha; Ho-Kyung Yang; You-Jin Song. A Study on Access Structure Management of CP-ABTD Based Blockchain for Medical Information Monitoring System. Advanced Science Letters 2018, 24, 2026 -2030.
AMA StyleHyun-Jong Cha, Ho-Kyung Yang, You-Jin Song. A Study on Access Structure Management of CP-ABTD Based Blockchain for Medical Information Monitoring System. Advanced Science Letters. 2018; 24 (3):2026-2030.
Chicago/Turabian StyleHyun-Jong Cha; Ho-Kyung Yang; You-Jin Song. 2018. "A Study on Access Structure Management of CP-ABTD Based Blockchain for Medical Information Monitoring System." Advanced Science Letters 24, no. 3: 2026-2030.
Development of IoT (Internet of Things) under 5G environment makes collecting information of the individual’s context easier and allows to provide users with a customized service based on the contextual information collected. IoT infrastructure, platform has been combined cloudenvironment for relevant service. With such combination, our entire life is under influence of the new combined environment. However, a current contextaware system is in a basic level that demands a certain behavior through user’s recognition. Particularly, multiusers do not act witha certain purpose. They should be provided with a customized service that is created by contextual information collected according to user’s behaviors. This paper uses an ECG sensor to minimize direct intervention of a user and create an individual service for multi-users. In addition,this paper proposes a sensing data processing mechanism for vehicular CPS that has context-aware function for multi-users in order to escape from the same service for all existing users. Moreover, this paper improves safety of real-time sensing information and user’s security throughthe step of delegation of actuating that is analyzed with relevant sensing information. It is expected that the finding of this paper allows safe processing of IoT service suitable for context in 5G environment, which is expected to be commercialized in the near future.
Hyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim; You-Jin Song. A Study on Data Processing for Application of Vehicular CPS in Fog Computing Environment. Advanced Science Letters 2017, 23, 10379 -10383.
AMA StyleHyun-Jong Cha, Ho-Kyung Yang, Jin-Mook Kim, You-Jin Song. A Study on Data Processing for Application of Vehicular CPS in Fog Computing Environment. Advanced Science Letters. 2017; 23 (10):10379-10383.
Chicago/Turabian StyleHyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim; You-Jin Song. 2017. "A Study on Data Processing for Application of Vehicular CPS in Fog Computing Environment." Advanced Science Letters 23, no. 10: 10379-10383.
Recently, the technology that allows to remotely receive medical service through a smart medical information service has been presented. However, medical information dealt with in such service can infringe people’s privacy. Therefore, it is necessary to introduce information security technology including encryption. Only an authorized person who can access to service user’s data should be allowed to see the information. To achieve the goal, it is essential to delegate access privilege or even remove the access privilege under a certain circumstance. Such issues can be improved with attribute based encryption. This paper applies user’s attribute based encryption, which allows to delegate or revoke an access right to a medical information monitoring system. In addition, it creates a scenario of a medical information monitoring system and propose a relevant system structure using user’s attribute based encryption.
You-Jin Song; Hyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim. A Medical Information Monitoring System Based CP-ABTD for Safe Medical Information Sharing in Fog Computing Environment. Advanced Science Letters 2017, 23, 10370 -10374.
AMA StyleYou-Jin Song, Hyun-Jong Cha, Ho-Kyung Yang, Jin-Mook Kim. A Medical Information Monitoring System Based CP-ABTD for Safe Medical Information Sharing in Fog Computing Environment. Advanced Science Letters. 2017; 23 (10):10370-10374.
Chicago/Turabian StyleYou-Jin Song; Hyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim. 2017. "A Medical Information Monitoring System Based CP-ABTD for Safe Medical Information Sharing in Fog Computing Environment." Advanced Science Letters 23, no. 10: 10370-10374.
The potential of future Internet environment is expanding due to development of information and communication technology. It is expected that the number of objects connecting to the Internet will increase by billions, even excluding PCs, tablets and smart phones. As the number of devicesconnecting increases a numerous amount of data including personal information combining with external environmental information is exchanging. Therefore, it is necessary to share collected information at a minimum level by a legitimate user for the original purpose and control access rightto data if necessary. While existing network infrastructure uses a path to exchange data between a data center and a terminal, future infrastructure actively makes a decision about the whole process from data generated by various objects to utilization and independently plays major roles includinga service supporting function of a data center. This paper discusses a safe sharing management scheme of content identifiers. This paper proposes a system for safe management of identifiers using secret sharing and AES Cryptography algorithm as a separation and restoration scheme for identifiers.Sensitive identifiers can be safely saved and managed through such identifier separation system. In addition, they are safe in moving by segmenting and restoring an identifier through mobile device interfaces such as a smart phone.
Ho-Kyung Yang; Hyun-Jong Cha; Jin-Mook Kim; You-Jin Song. Anonymity Management Based on Segmentation and Restoration Scheme for Content Identifier in Future Internet Environment. Advanced Science Letters 2017, 23, 10375 -10378.
AMA StyleHo-Kyung Yang, Hyun-Jong Cha, Jin-Mook Kim, You-Jin Song. Anonymity Management Based on Segmentation and Restoration Scheme for Content Identifier in Future Internet Environment. Advanced Science Letters. 2017; 23 (10):10375-10378.
Chicago/Turabian StyleHo-Kyung Yang; Hyun-Jong Cha; Jin-Mook Kim; You-Jin Song. 2017. "Anonymity Management Based on Segmentation and Restoration Scheme for Content Identifier in Future Internet Environment." Advanced Science Letters 23, no. 10: 10375-10378.
In the future urban traffic system, there will be great demands for technologies that ensure safety on the road, specifically those that monitor illegal activities, detect risks associated with the movement of vehicles, and prevent collisions. As technologies of sensor networks and the IoT (Internet of Things) made strides, systems that monitor traffic violations have become automated, which led to increase in the amounts of data generated, and as such overheads may occur. Also, given encryption is used to prevent leakage of information on vehicles, in order to track a specific vehicle, data on the vehicle must be provided to the secondary user. To solve this problem, this paper proposes a model based on Attribute-Based Proxy Re-Encryption (ABPRE). The proposed system collects data from a place (edge) close to the sensor (device), and performs pre-processing or real-time processing on the data, or processes the data using a smart gateway that processes only sensor data. Such processing is done by the proxy of ABPRE, and the system is designed so that among the secondary users, only those with the specific privileges can decrypt the ciphertext.
Hyun-Jong Cha; Ho-Kyung Yang; You-Jin Song. Tracking of Specific Vehicle Using Smart Transportation Networks in the Internet of Things Environment. Advanced Science Letters 2016, 22, 3365 -3368.
AMA StyleHyun-Jong Cha, Ho-Kyung Yang, You-Jin Song. Tracking of Specific Vehicle Using Smart Transportation Networks in the Internet of Things Environment. Advanced Science Letters. 2016; 22 (11):3365-3368.
Chicago/Turabian StyleHyun-Jong Cha; Ho-Kyung Yang; You-Jin Song. 2016. "Tracking of Specific Vehicle Using Smart Transportation Networks in the Internet of Things Environment." Advanced Science Letters 22, no. 11: 3365-3368.
Hyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim; You-Jin Song. Design of Monitoring system of rule violation using ABPRE in the Fog Computing Environment. 5th International Workshop on Psychology and Counseling Security, Reliability and Safety 2016 2016, 1 .
AMA StyleHyun-Jong Cha, Ho-Kyung Yang, Jin-Mook Kim, You-Jin Song. Design of Monitoring system of rule violation using ABPRE in the Fog Computing Environment. 5th International Workshop on Psychology and Counseling Security, Reliability and Safety 2016. 2016; ():1.
Chicago/Turabian StyleHyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim; You-Jin Song. 2016. "Design of Monitoring system of rule violation using ABPRE in the Fog Computing Environment." 5th International Workshop on Psychology and Counseling Security, Reliability and Safety 2016 , no. : 1.
With the introduction of the concept of information warfare, the way military operations are done is changing quickly. Now, much more than it was in past, quick acquisition of information and effective decision making are crucial. Especially, these days the ratio of multimedia data is on the rise. A data management system has been put in place since the 1980s which encrypts information before storing it, and allowing only authorized users to gain access to it according to the proper procedures. In this paper, a secure and effective multimedia data management system that uses homomorphic operations is designed and implemented. By using homomorphic operations, it is able to quickly process stored ciphertext without a decryption process, allowing fast decision making after information gathering in a NCW environment. In order to assess the performance of the effective multimedia data management system implemented in this paper, it was compared to an ordinary system in which ciphertext has to be first decrypted before it can be modified. The secure and effective multimedia data management system for information warfare implemented in this study is highly versatile because any public encryption algorithm can be used, and has short response times thanks to the homomorphic algorithm which allows processing to be done directly on the ciphertext.
Hyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim; You-Jin Song. A Design of System using homomorphic encryption for multimedia data management. Multimedia Tools and Applications 2016, 76, 19897 -19912.
AMA StyleHyun-Jong Cha, Ho-Kyung Yang, Jin-Mook Kim, You-Jin Song. A Design of System using homomorphic encryption for multimedia data management. Multimedia Tools and Applications. 2016; 76 (19):19897-19912.
Chicago/Turabian StyleHyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim; You-Jin Song. 2016. "A Design of System using homomorphic encryption for multimedia data management." Multimedia Tools and Applications 76, no. 19: 19897-19912.
With innovative developments made in the research of wireless communication network technologies, many different types of cutting-edge wireless systems are being developed and used today. This paper focuses on the development of a MANET(Mobile Ad-hoc network) scheme intended to be used for delivery of wireless multimedia streaming services. MANET don’t use a fixed infrastructure network but mobile devices form the network themselves autonomously. But owing to un-stability in the state of the wireless channel formed in this way, there will be frequent transmission delays and data losses. In ordinary routing schemes available for data transmission, the greater the amount of data transmitted by the devices, the more severe the quality degradation. Therefore, these schemes are not suitable for streaming multimedia data. This paper suggests a stable protocol that takes into account mobility of nodes, in order to provide an efficient scheme for streaming video content in a MANET. The suggested protocol handles movements of nodes particularly well compared to the existing MP-AOMDV(Mobility Prediction Ad-hoc on-demand Multipath Distance Vector) scheme. The test results show the performance of the suggested protocol. In a large network, it has a short response time and a high transmission success rate. Use of the suggested protocol increases the reliability of the transmission paths, thereby resulting in more organic or flexible handling of changes to the network topology. Furthermore, multimedia streaming services can be delivered more stably compared to when existing systems or schemes are used.
Hyun-Jong Cha; Jin-Mook Kim; Jeong-Kyung Moon. A study on mobile ad-hoc network for reliable multimedia streaming services. Multimedia Tools and Applications 2016, 76, 19861 -19879.
AMA StyleHyun-Jong Cha, Jin-Mook Kim, Jeong-Kyung Moon. A study on mobile ad-hoc network for reliable multimedia streaming services. Multimedia Tools and Applications. 2016; 76 (19):19861-19879.
Chicago/Turabian StyleHyun-Jong Cha; Jin-Mook Kim; Jeong-Kyung Moon. 2016. "A study on mobile ad-hoc network for reliable multimedia streaming services." Multimedia Tools and Applications 76, no. 19: 19861-19879.
Ho-Kyung Yang; Hyun-Jong Cha; You-Jin Song. Data Sharing Scheme Based on Attribute Based Encryption with Proxy. Information Technology and Computer Science 2016 2016, 105 -109.
AMA StyleHo-Kyung Yang, Hyun-Jong Cha, You-Jin Song. Data Sharing Scheme Based on Attribute Based Encryption with Proxy. Information Technology and Computer Science 2016. 2016; ():105-109.
Chicago/Turabian StyleHo-Kyung Yang; Hyun-Jong Cha; You-Jin Song. 2016. "Data Sharing Scheme Based on Attribute Based Encryption with Proxy." Information Technology and Computer Science 2016 , no. : 105-109.
VoIP (Voice over Internet Protocol), which provides voice calls as well as additional services at cheaper prices than PSTN (Public Switched Telephone Network), is gaining ground over the latter, which had been the dominant telephone network in the past. This kind of a VoIP service is evolving into a dedicated mVoIP service for the smartphone which allows calls to be made at cheap prices using a WiFi network, as the number of smartphone users is skyrocketing as of late. While an increase in the user base is expected for mVoIP, a packet network is an open network which means anyone can easily gain access and so there can be various problems. To mitigate this, in this paper an authentication system is designed which has an AA (Attribute Authority) server added to VoIP in order to increase security and discriminate user access. In this paper a system for addressing security vulnerabilities from the increase in the use of VoIP services and providing differentiated services according to user access privileges is designed. This paper is organized as follows: Chapter 1 gives the introduction; Chapter 2 is on related research; Chapter 3 describes the proposed technique and system; Chapter 4 implements the system and analyzes its the performance; and Chapter 5 gives the conclusions.
Ho-Kyung Yang; Hyun-Jong Cha; Yong-Ho Kim. mVoIP for P2P service based authentication system using AA authentication server. Peer-to-Peer Networking and Applications 2015, 9, 529 -538.
AMA StyleHo-Kyung Yang, Hyun-Jong Cha, Yong-Ho Kim. mVoIP for P2P service based authentication system using AA authentication server. Peer-to-Peer Networking and Applications. 2015; 9 (3):529-538.
Chicago/Turabian StyleHo-Kyung Yang; Hyun-Jong Cha; Yong-Ho Kim. 2015. "mVoIP for P2P service based authentication system using AA authentication server." Peer-to-Peer Networking and Applications 9, no. 3: 529-538.
In a mobile ad-hoc network, multiple number of nodes can communicate with one another without the need for an infrastructure network. It is used in many different types of places, including military zones and disaster or hazardous areas. In a mobile ad-hoc network, each node acts both as a main agent of communication and a relay. Furthermore, each gives a weakness to the network or is subjected to vulnerabilities from malicious attacks due to their distinctive qualities, namely mobility and limited power. Accordingly, in order for stable P2P service, it is important to maintain the reliability and connectivity of the network at a high level. With existing schemes, it has often been the case that when defective nodes or malicious nodes are detected, it also causes damage to normal nodes. In scheme suggested in this paper, those nodes that have temporary defects but otherwise normal and can recovered are kept in the network but those that are defective or malicious are eliminated from the network, using trust values. The simulation was carried out to evaluate the performance of the proposed method. As a result, the message transmission rate even if the impact of a malicious node than the conventional method was demonstrated increased keeping the stable network topology.
Hyun-Jong Cha; Ho-Kyung Yang; Yong-Ho Kim. A node management scheme for stable P2P service in mobile ad-hoc networks. Peer-to-Peer Networking and Applications 2015, 9, 558 -565.
AMA StyleHyun-Jong Cha, Ho-Kyung Yang, Yong-Ho Kim. A node management scheme for stable P2P service in mobile ad-hoc networks. Peer-to-Peer Networking and Applications. 2015; 9 (3):558-565.
Chicago/Turabian StyleHyun-Jong Cha; Ho-Kyung Yang; Yong-Ho Kim. 2015. "A node management scheme for stable P2P service in mobile ad-hoc networks." Peer-to-Peer Networking and Applications 9, no. 3: 558-565.
A mobile ad-hoc network is an autonomous collection of wireless mobile nodes that organizes a temporary network without any network infrastructure. Due to node mobility, it is a challenging task to maintain the network topology. In this paper, we propose a stable clustering algorithm that uses node mobility for cluster formation. In the proposed algorithm, the node mobility is measured by counting the time of nodes entering into leaving from its transmission range. The node having the lowest mobility is selected as a cluster head. For topology maintenance with reduced control overhead, the cluster head adaptively controls the broadcasting period of hello message to the measured node mobility. Through computer simulations, it is verified that the proposed algorithm outperforms previous clustering algorithms in terms of control overhead, the rate of node mobility changes and the number of cluster head changes.
Hyun-Jong Cha; Jin-Mook Kim; Hwnag-Bin Ryou. A Study on the Clustering Scheme for Node Mobility in Mobile Ad-hoc Network. Lecture Notes in Electrical Engineering 2014, 279, 531 -535.
AMA StyleHyun-Jong Cha, Jin-Mook Kim, Hwnag-Bin Ryou. A Study on the Clustering Scheme for Node Mobility in Mobile Ad-hoc Network. Lecture Notes in Electrical Engineering. 2014; 279 ():531-535.
Chicago/Turabian StyleHyun-Jong Cha; Jin-Mook Kim; Hwnag-Bin Ryou. 2014. "A Study on the Clustering Scheme for Node Mobility in Mobile Ad-hoc Network." Lecture Notes in Electrical Engineering 279, no. : 531-535.
A mobile ad-hoc network is an autonomous collection of wireless mobile nodes that organizes a temporary network without any network infrastructure. Due to node mobility, it is a challenging task to maintain the network topology. In this paper, we propose a stable clustering algorithm that uses node mobility for cluster formation. In the proposed algorithm, the node mobility is measured by counting the time of nodes entering into leaving from its transmission range. The node having the lowest mobility is selected as a cluster head. For topology maintenance with reduced control overhead, the cluster head adaptively controls the broadcasting period of hello message to the measured node mobility. Through computer simulations, it is verified that the proposed algorithm outperforms previous clustering algorithms in terms of control overhead, the rate of node mobility changes and the number of cluster head changes.
Hyun-Jong Cha; Jin-Mook Kim; Hwnag-Bin Ryou. A Study on the Clustering Scheme for Node Mobility in Mobile Ad-hoc Network. Lecture Notes in Electrical Engineering 2014, 279, 1365 -1369.
AMA StyleHyun-Jong Cha, Jin-Mook Kim, Hwnag-Bin Ryou. A Study on the Clustering Scheme for Node Mobility in Mobile Ad-hoc Network. Lecture Notes in Electrical Engineering. 2014; 279 ():1365-1369.
Chicago/Turabian StyleHyun-Jong Cha; Jin-Mook Kim; Hwnag-Bin Ryou. 2014. "A Study on the Clustering Scheme for Node Mobility in Mobile Ad-hoc Network." Lecture Notes in Electrical Engineering 279, no. : 1365-1369.
A mobile ad-hoc network is a method of communication between different nodes (mobile devices) without the use of base stations, which are used in wired networks. In a Mobile ad-hoc network, nodes can play the role of a receiver, sender, or a relay. As movement is flexible in Mobile ad-hoc networks and nodes have limited resources, nodes may join the communication or exit it at any time. Therefore, for Mobile ad-hoc networks, routing techniques - selecting communication routes and maintaining them – is considered important in an environment of constantly changing network topology. To overcome this problem, this paper proposes a reliable routing protocol based on MP-AOMDV, which monitors changes in signal strength not only for GPS signals but reception signals as well. Although MP-AOMDV was researched under the assumption of fixed movement direction and speed, this paper proposes a routing technique that works with changing movement direction or speed of nodes.
Hyun Jong Cha; Jin Mook Kim; Hwang Bin Ryou. A Route Selection Mechanism for Mobility of Node in Mobile Ad Hoc Network. Applied Mechanics and Materials 2012, 224, 520 -523.
AMA StyleHyun Jong Cha, Jin Mook Kim, Hwang Bin Ryou. A Route Selection Mechanism for Mobility of Node in Mobile Ad Hoc Network. Applied Mechanics and Materials. 2012; 224 ():520-523.
Chicago/Turabian StyleHyun Jong Cha; Jin Mook Kim; Hwang Bin Ryou. 2012. "A Route Selection Mechanism for Mobility of Node in Mobile Ad Hoc Network." Applied Mechanics and Materials 224, no. : 520-523.
The basic idea of Network Centric Warfare (NCW) is that data processing capabilities of computers and communication technologies of a network can be leveraged to guarantee information sharing, which will increase the efficiency of running a military. Amid advancements being made in IT, the Korea military is one of the militaries in the world doing research on ways of conducting more effective warfare, which it aims to achieve by connecting each of the entities together and sharing battlefield resources. However, maintaining interoperability between different systems is an issue, caused by the fact that different militaries have different tactics and weapon systems. In this paper, the current state of interoperability is examined, for when the Korean military builds a C4I system in preparation for future warfare. Furthermore, interoperability cases in the US are analyzed, and matters of consideration and various technologies for interoperability are proposed.
Hyun-Jeong Cha; Jin-Mook Kim; Hwang-Bin Ryou; Hwa-Young Jeong. A Study on the Improvement of Interoperability in Rok C4I System for Future Warfare. Lecture Notes in Electrical Engineering 2012, 805 -812.
AMA StyleHyun-Jeong Cha, Jin-Mook Kim, Hwang-Bin Ryou, Hwa-Young Jeong. A Study on the Improvement of Interoperability in Rok C4I System for Future Warfare. Lecture Notes in Electrical Engineering. 2012; ():805-812.
Chicago/Turabian StyleHyun-Jeong Cha; Jin-Mook Kim; Hwang-Bin Ryou; Hwa-Young Jeong. 2012. "A Study on the Improvement of Interoperability in Rok C4I System for Future Warfare." Lecture Notes in Electrical Engineering , no. : 805-812.
Wireless Mesh Networks provide much flexibility in establishing a network compared to existing wire networks. A higher level of security is required for a wireless environment that makes the network accessible by anyone. Compared to MANET, Wireless Mesh Networks is less portable, and have less sensitivity to electric power. This enables the adoption of a higher level of security. This study takes advantage of the PKI (Public Key Infrastructure) security algorithm to optimize a Wireless Mesh Network, so that it is applicable to a Wireless Mesh Network environment. A Pre-Shared Key, which is dynamically created and utilizes the hash function, is adopted as the routing authentication method of the mesh router and for the distribution of Keys necessary for data encryption. Each router node of a Wireless Mesh Network encrypts a random number data for electronic signature. The techniques for supervision, detection and avoidance of malicious nodes between router nodes on a Wireless Mesh Network are presented. The security technique is applied in this environment.
Chang-Pyo Yoon; Jae-Wan Lim; Hyun-Jong Cha; Ho-Kyung Yang; Hwang-Bin Ryou. The Design of Reliable Routing Protocols in Wireless Mesh Networks. Transactions on Petri Nets and Other Models of Concurrency XV 2011, 162 -174.
AMA StyleChang-Pyo Yoon, Jae-Wan Lim, Hyun-Jong Cha, Ho-Kyung Yang, Hwang-Bin Ryou. The Design of Reliable Routing Protocols in Wireless Mesh Networks. Transactions on Petri Nets and Other Models of Concurrency XV. 2011; ():162-174.
Chicago/Turabian StyleChang-Pyo Yoon; Jae-Wan Lim; Hyun-Jong Cha; Ho-Kyung Yang; Hwang-Bin Ryou. 2011. "The Design of Reliable Routing Protocols in Wireless Mesh Networks." Transactions on Petri Nets and Other Models of Concurrency XV , no. : 162-174.