Sangheon Pack - Academia.edu (original) (raw)
Papers by Sangheon Pack
IEEE
—The secure distribution of protected content requires consumer authentication and involves the c... more —The secure distribution of protected content requires consumer authentication and involves the conventional method of end-to-end encryption. However, in information-centric networking (ICN) the end-to-end encryption makes the content caching ineffective since encrypted content stored in a cache is useless for any consumer except those who know the encryption key. For effective caching of encrypted content in ICN, we propose a novel scheme, called the Secure Distribution of Protected Content (SDPC). SDPC ensures that only authenticated consumers can access the content. The SDPC is a lightweight authentication and key distribution protocol; it allows consumer nodes to verify the originality of the published article by using a symmetric key encryption. The security of the SDPC was proved with BAN logic and Scyther tool verification.
28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings., 2003
Recently, IEEE 802.11 wireless networks have been widely deployed in public areas for mobile Inte... more Recently, IEEE 802.11 wireless networks have been widely deployed in public areas for mobile Internet services. In the public wireless LAN systems, paging function is necessary to support various advanced services (e.g. Voice over IP and message applications) and to provide efficient power management scheme. In next-generation mobile networks, the so-called all-IP networks, the paging function will be supported in the IP layer (i.e. IP paging). When IP paging protocol is deployed in IEEE 802.11 wireless networks, it may utilize the power saving mechanism supported in the IEEE 802.11 standard for more efficient power management. However, since the current power saving mechanism is based on a periodical wake-up mechanism with a fixed interval, it is difficult to optimize the power saving performance. In this paper, we analyze the performance of IP paging protocol over IEEE 802.11 Power Saving Mode (PSM). We define a wake-up cost and a paging delay cost. Then, we study the effect of varying the length of the wake-up interval and the session arrival rate. In addition, we analyze the distribution of the session blocking probability due to the coarse-grained wake-up interval. Also, we investigate the optimal wake-up interval to minimize the total cost through simulations. These results indicate that it is necessary to find the optimal wake-up interval in order to minimize the total cost while satisfying the given paging delay constraints.
Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture - MobiArch '08, 2008
28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings., 2003
We evaluate the performance of IP paging with power save mechanism by formulating an analytical m... more We evaluate the performance of IP paging with power save mechanism by formulating an analytical model and carrying out simulation study of Integrated IP Paging Protocol (IIPP) that integrates both the paging and power save functionality in IP layer. The results show that, compared to the Mobile IP regional registration, the IIPP significantly reduces the average power consumption of a mobile node and the signaling load in the access networks, while providing link layer independent mobility and power management functions.
2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, 2009
ABSTRACT It is usually possible to associate with more than one Access Point (AP) in IEEE 802.11 ... more ABSTRACT It is usually possible to associate with more than one Access Point (AP) in IEEE 802.11 Wireless LANs. AP selection is a crucial issue because the performance achieved by a user heavily depends on the AP selected. A received signal strength (RSS)-based association mechanism is specified by the IEEE 802.11 standard. However, this does not consider the channel conditions and AP load, which leads to a low throughput and a low user transmission rate. An alternative to using the RSS is to exploit the airtime metric, which provides users with information on how busy the channel is, but the results of our simulations show that the airtime metric cannot indicate the exact status of the channel. In this paper, we present a new association framework using channel occupancy in order to provide users with exact channel status information of APs. Via the proposed scheme, users can compare the achievable throughput provided by each AP and select the best AP. We validate our proposed association method via simulation results, which show that the throughput improvement of the method is worthy of notice.
2006 First International Conference on Communications and Networking in China, 2006
In this paper, we propose a two-state Markov chain to approximately model the packet loss process... more In this paper, we propose a two-state Markov chain to approximately model the packet loss process in mobile hotspots. We consider an integrated wireless wide area network (WWAN)-wireless local area network (WLAN) link in mobile hotspots. Using the Markov chain, we derive expressions of the experienced packet loss probability and packet loss burst length. To verify the accuracy of our
2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484), 2003
In wireless networks, system survivability is one of the most important issues in providing quali... more In wireless networks, system survivability is one of the most important issues in providing quality of service (QoS). However, since failure of home agent (HA) or mobile anchor point (MAP) causes service interruption, the Hierarchical Mobile IPv6 (HMIPv6) has only weak survivability. In this paper, we propose Robust Hierarchical Mobile IPv6 (RH-MIPv6), which provides fault tolerance and robustness in mobile networks. In RH-MIPv6, a mobile node (MN) registers primary (P-RCoA) and secondary (S-RCoA) regional care of addresses to two different MAPs (Primary and Secondary) simultaneously. We develop a mechanism to enable the mobile node or correspondent node (CN) to detect the failure of primary MAP and change their attachment from the primary to secondary MAP. By this recovery procedure, it is possible to reduce the failure recovery time. Analytical evaluation indicates that RH-MIPv6 has faster recovery time than HMIPv6 and we also show through simulation as like analytical result. Consequently, RH-MIPv6 shows about 60% faster recovery time compared with HMIPv6.
IEEE Transactions on Vehicular Technology, 2015
Computer Networks, 2014
ABSTRACT
IEEE International Conference on Pervasive Services, 2007
Radio frequency identification (RFID) is a new technology for object identification/tracking syst... more Radio frequency identification (RFID) is a new technology for object identification/tracking systems. In this paper, we propose a novel RFID location management system:
2007 IEEE Wireless Communications and Networking Conference, 2007
ABSTRACT
IEEE Transactions on Vehicular Technology, 2015
2012 International Conference on Wireless Communications and Signal Processing (WCSP), 2012
ABSTRACT
2009 9th International Symposium on Communications and Information Technology, 2009
... the EIS-based vertical handover procedure to reduce the vertical handover latency by eliminat... more ... the EIS-based vertical handover procedure to reduce the vertical handover latency by eliminatingtime-consuming channel scanning procedure. ... REFERENCES [1] IEEE P802.21/D14.0, Draft Standard for Local and Metropolitan Area Networks: Media Independent ...
IEEE
—The secure distribution of protected content requires consumer authentication and involves the c... more —The secure distribution of protected content requires consumer authentication and involves the conventional method of end-to-end encryption. However, in information-centric networking (ICN) the end-to-end encryption makes the content caching ineffective since encrypted content stored in a cache is useless for any consumer except those who know the encryption key. For effective caching of encrypted content in ICN, we propose a novel scheme, called the Secure Distribution of Protected Content (SDPC). SDPC ensures that only authenticated consumers can access the content. The SDPC is a lightweight authentication and key distribution protocol; it allows consumer nodes to verify the originality of the published article by using a symmetric key encryption. The security of the SDPC was proved with BAN logic and Scyther tool verification.
28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings., 2003
Recently, IEEE 802.11 wireless networks have been widely deployed in public areas for mobile Inte... more Recently, IEEE 802.11 wireless networks have been widely deployed in public areas for mobile Internet services. In the public wireless LAN systems, paging function is necessary to support various advanced services (e.g. Voice over IP and message applications) and to provide efficient power management scheme. In next-generation mobile networks, the so-called all-IP networks, the paging function will be supported in the IP layer (i.e. IP paging). When IP paging protocol is deployed in IEEE 802.11 wireless networks, it may utilize the power saving mechanism supported in the IEEE 802.11 standard for more efficient power management. However, since the current power saving mechanism is based on a periodical wake-up mechanism with a fixed interval, it is difficult to optimize the power saving performance. In this paper, we analyze the performance of IP paging protocol over IEEE 802.11 Power Saving Mode (PSM). We define a wake-up cost and a paging delay cost. Then, we study the effect of varying the length of the wake-up interval and the session arrival rate. In addition, we analyze the distribution of the session blocking probability due to the coarse-grained wake-up interval. Also, we investigate the optimal wake-up interval to minimize the total cost through simulations. These results indicate that it is necessary to find the optimal wake-up interval in order to minimize the total cost while satisfying the given paging delay constraints.
Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture - MobiArch '08, 2008
28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings., 2003
We evaluate the performance of IP paging with power save mechanism by formulating an analytical m... more We evaluate the performance of IP paging with power save mechanism by formulating an analytical model and carrying out simulation study of Integrated IP Paging Protocol (IIPP) that integrates both the paging and power save functionality in IP layer. The results show that, compared to the Mobile IP regional registration, the IIPP significantly reduces the average power consumption of a mobile node and the signaling load in the access networks, while providing link layer independent mobility and power management functions.
2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, 2009
ABSTRACT It is usually possible to associate with more than one Access Point (AP) in IEEE 802.11 ... more ABSTRACT It is usually possible to associate with more than one Access Point (AP) in IEEE 802.11 Wireless LANs. AP selection is a crucial issue because the performance achieved by a user heavily depends on the AP selected. A received signal strength (RSS)-based association mechanism is specified by the IEEE 802.11 standard. However, this does not consider the channel conditions and AP load, which leads to a low throughput and a low user transmission rate. An alternative to using the RSS is to exploit the airtime metric, which provides users with information on how busy the channel is, but the results of our simulations show that the airtime metric cannot indicate the exact status of the channel. In this paper, we present a new association framework using channel occupancy in order to provide users with exact channel status information of APs. Via the proposed scheme, users can compare the achievable throughput provided by each AP and select the best AP. We validate our proposed association method via simulation results, which show that the throughput improvement of the method is worthy of notice.
2006 First International Conference on Communications and Networking in China, 2006
In this paper, we propose a two-state Markov chain to approximately model the packet loss process... more In this paper, we propose a two-state Markov chain to approximately model the packet loss process in mobile hotspots. We consider an integrated wireless wide area network (WWAN)-wireless local area network (WLAN) link in mobile hotspots. Using the Markov chain, we derive expressions of the experienced packet loss probability and packet loss burst length. To verify the accuracy of our
2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484), 2003
In wireless networks, system survivability is one of the most important issues in providing quali... more In wireless networks, system survivability is one of the most important issues in providing quality of service (QoS). However, since failure of home agent (HA) or mobile anchor point (MAP) causes service interruption, the Hierarchical Mobile IPv6 (HMIPv6) has only weak survivability. In this paper, we propose Robust Hierarchical Mobile IPv6 (RH-MIPv6), which provides fault tolerance and robustness in mobile networks. In RH-MIPv6, a mobile node (MN) registers primary (P-RCoA) and secondary (S-RCoA) regional care of addresses to two different MAPs (Primary and Secondary) simultaneously. We develop a mechanism to enable the mobile node or correspondent node (CN) to detect the failure of primary MAP and change their attachment from the primary to secondary MAP. By this recovery procedure, it is possible to reduce the failure recovery time. Analytical evaluation indicates that RH-MIPv6 has faster recovery time than HMIPv6 and we also show through simulation as like analytical result. Consequently, RH-MIPv6 shows about 60% faster recovery time compared with HMIPv6.
IEEE Transactions on Vehicular Technology, 2015
Computer Networks, 2014
ABSTRACT
IEEE International Conference on Pervasive Services, 2007
Radio frequency identification (RFID) is a new technology for object identification/tracking syst... more Radio frequency identification (RFID) is a new technology for object identification/tracking systems. In this paper, we propose a novel RFID location management system:
2007 IEEE Wireless Communications and Networking Conference, 2007
ABSTRACT
IEEE Transactions on Vehicular Technology, 2015
2012 International Conference on Wireless Communications and Signal Processing (WCSP), 2012
ABSTRACT
2009 9th International Symposium on Communications and Information Technology, 2009
... the EIS-based vertical handover procedure to reduce the vertical handover latency by eliminat... more ... the EIS-based vertical handover procedure to reduce the vertical handover latency by eliminatingtime-consuming channel scanning procedure. ... REFERENCES [1] IEEE P802.21/D14.0, Draft Standard for Local and Metropolitan Area Networks: Media Independent ...