Sangheon Pack - Academia.edu (original) (raw)

Papers by Sangheon Pack

Research paper thumbnail of Effective Caching for the Secure Content Distribution in Information-Centric Networking

IEEE

—The secure distribution of protected content requires consumer authentication and involves the c... more —The secure distribution of protected content requires consumer authentication and involves the conventional method of end-to-end encryption. However, in information-centric networking (ICN) the end-to-end encryption makes the content caching ineffective since encrypted content stored in a cache is useless for any consumer except those who know the encryption key. For effective caching of encrypted content in ICN, we propose a novel scheme, called the Secure Distribution of Protected Content (SDPC). SDPC ensures that only authenticated consumers can access the content. The SDPC is a lightweight authentication and key distribution protocol; it allows consumer nodes to verify the originality of the published article by using a symmetric key encryption. The security of the SDPC was proved with BAN logic and Scyther tool verification.

Research paper thumbnail of Performance analysis of IP paging protocol in IEEE 802.11 networks

28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings., 2003

Recently, IEEE 802.11 wireless networks have been widely deployed in public areas for mobile Inte... more Recently, IEEE 802.11 wireless networks have been widely deployed in public areas for mobile Internet services. In the public wireless LAN systems, paging function is necessary to support various advanced services (e.g. Voice over IP and message applications) and to provide efficient power management scheme. In next-generation mobile networks, the so-called all-IP networks, the paging function will be supported in the IP layer (i.e. IP paging). When IP paging protocol is deployed in IEEE 802.11 wireless networks, it may utilize the power saving mechanism supported in the IEEE 802.11 standard for more efficient power management. However, since the current power saving mechanism is based on a periodical wake-up mechanism with a fixed interval, it is difficult to optimize the power saving performance. In this paper, we analyze the performance of IP paging protocol over IEEE 802.11 Power Saving Mode (PSM). We define a wake-up cost and a paging delay cost. Then, we study the effect of varying the length of the wake-up interval and the session arrival rate. In addition, we analyze the distribution of the session blocking probability due to the coarse-grained wake-up interval. Also, we investigate the optimal wake-up interval to minimize the total cost through simulations. These results indicate that it is necessary to find the optimal wake-up interval in order to minimize the total cost while satisfying the given paging delay constraints.

Research paper thumbnail of Shall we apply paging technologies to proxy mobile IPv6?

Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture - MobiArch '08, 2008

Research paper thumbnail of Performance evaluation of ip paging with power save mechanism

28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings., 2003

We evaluate the performance of IP paging with power save mechanism by formulating an analytical m... more We evaluate the performance of IP paging with power save mechanism by formulating an analytical model and carrying out simulation study of Integrated IP Paging Protocol (IIPP) that integrates both the paging and power save functionality in IP layer. The results show that, compared to the Mobile IP regional registration, the IIPP significantly reduces the average power consumption of a mobile node and the signaling load in the access networks, while providing link layer independent mobility and power management functions.

Research paper thumbnail of Channel occupancy-based user association in IEEE 802.11 wireless LANs

2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, 2009

ABSTRACT It is usually possible to associate with more than one Access Point (AP) in IEEE 802.11 ... more ABSTRACT It is usually possible to associate with more than one Access Point (AP) in IEEE 802.11 Wireless LANs. AP selection is a crucial issue because the performance achieved by a user heavily depends on the AP selected. A received signal strength (RSS)-based association mechanism is specified by the IEEE 802.11 standard. However, this does not consider the channel conditions and AP load, which leads to a low throughput and a low user transmission rate. An alternative to using the RSS is to exploit the airtime metric, which provides users with information on how busy the channel is, but the results of our simulations show that the airtime metric cannot indicate the exact status of the channel. In this paper, we present a new association framework using channel occupancy in order to provide users with exact channel status information of APs. Via the proposed scheme, users can compare the achievable throughput provided by each AP and select the best AP. We validate our proposed association method via simulation results, which show that the throughput improvement of the method is worthy of notice.

Research paper thumbnail of An Integrated WWAN-WLAN Link Model in Mobile Hotspots

2006 First International Conference on Communications and Networking in China, 2006

In this paper, we propose a two-state Markov chain to approximately model the packet loss process... more In this paper, we propose a two-state Markov chain to approximately model the packet loss process in mobile hotspots. We consider an integrated wireless wide area network (WWAN)-wireless local area network (WLAN) link in mobile hotspots. Using the Markov chain, we derive expressions of the experienced packet loss probability and packet loss burst length. To verify the accuracy of our

Research paper thumbnail of Robust hierarchical mobile IPv6 (RH-MIPv6): an enhancement for survivability and fault-tolerance in mobile IP systems

2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484), 2003

In wireless networks, system survivability is one of the most important issues in providing quali... more In wireless networks, system survivability is one of the most important issues in providing quality of service (QoS). However, since failure of home agent (HA) or mobile anchor point (MAP) causes service interruption, the Hierarchical Mobile IPv6 (HMIPv6) has only weak survivability. In this paper, we propose Robust Hierarchical Mobile IPv6 (RH-MIPv6), which provides fault tolerance and robustness in mobile networks. In RH-MIPv6, a mobile node (MN) registers primary (P-RCoA) and secondary (S-RCoA) regional care of addresses to two different MAPs (Primary and Secondary) simultaneously. We develop a mechanism to enable the mobile node or correspondent node (CN) to detect the failure of primary MAP and change their attachment from the primary to secondary MAP. By this recovery procedure, it is possible to reduce the failure recovery time. Analytical evaluation indicates that RH-MIPv6 has faster recovery time than HMIPv6 and we also show through simulation as like analytical result. Consequently, RH-MIPv6 shows about 60% faster recovery time compared with HMIPv6.

Research paper thumbnail of An Optimized and Distributed Data Packet Forwarding Scheme in LTE/LTE-A Networks

IEEE Transactions on Vehicular Technology, 2015

Research paper thumbnail of Content discovery for information-centric networking

Computer Networks, 2014

ABSTRACT

Research paper thumbnail of SRMS: SIP-based RFID Management System

IEEE International Conference on Pervasive Services, 2007

Radio frequency identification (RFID) is a new technology for object identification/tracking syst... more Radio frequency identification (RFID) is a new technology for object identification/tracking systems. In this paper, we propose a novel RFID location management system:

Research paper thumbnail of A Comparative Study of Mobility Management Schemes for Mobile Hotspots

2007 IEEE Wireless Communications and Networking Conference, 2007

ABSTRACT

Research paper thumbnail of Multiband Directional Neighbor Discovery in Self-Organized mmWave Ad Hoc Networks

IEEE Transactions on Vehicular Technology, 2015

Research paper thumbnail of Dynamic bandwidth allocation in mobile hotspots

2012 International Conference on Wireless Communications and Signal Processing (WCSP), 2012

ABSTRACT

Research paper thumbnail of Exploiting spatial and temporal locality for seamless vertical handover

2009 9th International Symposium on Communications and Information Technology, 2009

... the EIS-based vertical handover procedure to reduce the vertical handover latency by eliminat... more ... the EIS-based vertical handover procedure to reduce the vertical handover latency by eliminatingtime-consuming channel scanning procedure. ... REFERENCES [1] IEEE P802.21/D14.0, Draft Standard for Local and Metropolitan Area Networks: Media Independent ...

Research paper thumbnail of N. Argiriou and L. Georgiadis

Research paper thumbnail of A Probabilistic Neighbor Discovery Algorithm in Wireless Ad hoc Networks

Research paper thumbnail of Brain 21 Inf. Technol., Korea Univ., Seoul, South Korea

Research paper thumbnail of Method and apparatus for sending information using sharing cache between portable terminals

Research paper thumbnail of Lightweight traffic redundancy elimination in software-defined wireless mesh networks

Research paper thumbnail of Efficient delta synchronization algorithm in mobile cloud networks

Research paper thumbnail of Effective Caching for the Secure Content Distribution in Information-Centric Networking

IEEE

—The secure distribution of protected content requires consumer authentication and involves the c... more —The secure distribution of protected content requires consumer authentication and involves the conventional method of end-to-end encryption. However, in information-centric networking (ICN) the end-to-end encryption makes the content caching ineffective since encrypted content stored in a cache is useless for any consumer except those who know the encryption key. For effective caching of encrypted content in ICN, we propose a novel scheme, called the Secure Distribution of Protected Content (SDPC). SDPC ensures that only authenticated consumers can access the content. The SDPC is a lightweight authentication and key distribution protocol; it allows consumer nodes to verify the originality of the published article by using a symmetric key encryption. The security of the SDPC was proved with BAN logic and Scyther tool verification.

Research paper thumbnail of Performance analysis of IP paging protocol in IEEE 802.11 networks

28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings., 2003

Recently, IEEE 802.11 wireless networks have been widely deployed in public areas for mobile Inte... more Recently, IEEE 802.11 wireless networks have been widely deployed in public areas for mobile Internet services. In the public wireless LAN systems, paging function is necessary to support various advanced services (e.g. Voice over IP and message applications) and to provide efficient power management scheme. In next-generation mobile networks, the so-called all-IP networks, the paging function will be supported in the IP layer (i.e. IP paging). When IP paging protocol is deployed in IEEE 802.11 wireless networks, it may utilize the power saving mechanism supported in the IEEE 802.11 standard for more efficient power management. However, since the current power saving mechanism is based on a periodical wake-up mechanism with a fixed interval, it is difficult to optimize the power saving performance. In this paper, we analyze the performance of IP paging protocol over IEEE 802.11 Power Saving Mode (PSM). We define a wake-up cost and a paging delay cost. Then, we study the effect of varying the length of the wake-up interval and the session arrival rate. In addition, we analyze the distribution of the session blocking probability due to the coarse-grained wake-up interval. Also, we investigate the optimal wake-up interval to minimize the total cost through simulations. These results indicate that it is necessary to find the optimal wake-up interval in order to minimize the total cost while satisfying the given paging delay constraints.

Research paper thumbnail of Shall we apply paging technologies to proxy mobile IPv6?

Proceedings of the 3rd international workshop on Mobility in the evolving internet architecture - MobiArch '08, 2008

Research paper thumbnail of Performance evaluation of ip paging with power save mechanism

28th Annual IEEE International Conference on Local Computer Networks, 2003. LCN '03. Proceedings., 2003

We evaluate the performance of IP paging with power save mechanism by formulating an analytical m... more We evaluate the performance of IP paging with power save mechanism by formulating an analytical model and carrying out simulation study of Integrated IP Paging Protocol (IIPP) that integrates both the paging and power save functionality in IP layer. The results show that, compared to the Mobile IP regional registration, the IIPP significantly reduces the average power consumption of a mobile node and the signaling load in the access networks, while providing link layer independent mobility and power management functions.

Research paper thumbnail of Channel occupancy-based user association in IEEE 802.11 wireless LANs

2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications, 2009

ABSTRACT It is usually possible to associate with more than one Access Point (AP) in IEEE 802.11 ... more ABSTRACT It is usually possible to associate with more than one Access Point (AP) in IEEE 802.11 Wireless LANs. AP selection is a crucial issue because the performance achieved by a user heavily depends on the AP selected. A received signal strength (RSS)-based association mechanism is specified by the IEEE 802.11 standard. However, this does not consider the channel conditions and AP load, which leads to a low throughput and a low user transmission rate. An alternative to using the RSS is to exploit the airtime metric, which provides users with information on how busy the channel is, but the results of our simulations show that the airtime metric cannot indicate the exact status of the channel. In this paper, we present a new association framework using channel occupancy in order to provide users with exact channel status information of APs. Via the proposed scheme, users can compare the achievable throughput provided by each AP and select the best AP. We validate our proposed association method via simulation results, which show that the throughput improvement of the method is worthy of notice.

Research paper thumbnail of An Integrated WWAN-WLAN Link Model in Mobile Hotspots

2006 First International Conference on Communications and Networking in China, 2006

In this paper, we propose a two-state Markov chain to approximately model the packet loss process... more In this paper, we propose a two-state Markov chain to approximately model the packet loss process in mobile hotspots. We consider an integrated wireless wide area network (WWAN)-wireless local area network (WLAN) link in mobile hotspots. Using the Markov chain, we derive expressions of the experienced packet loss probability and packet loss burst length. To verify the accuracy of our

Research paper thumbnail of Robust hierarchical mobile IPv6 (RH-MIPv6): an enhancement for survivability and fault-tolerance in mobile IP systems

2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484), 2003

In wireless networks, system survivability is one of the most important issues in providing quali... more In wireless networks, system survivability is one of the most important issues in providing quality of service (QoS). However, since failure of home agent (HA) or mobile anchor point (MAP) causes service interruption, the Hierarchical Mobile IPv6 (HMIPv6) has only weak survivability. In this paper, we propose Robust Hierarchical Mobile IPv6 (RH-MIPv6), which provides fault tolerance and robustness in mobile networks. In RH-MIPv6, a mobile node (MN) registers primary (P-RCoA) and secondary (S-RCoA) regional care of addresses to two different MAPs (Primary and Secondary) simultaneously. We develop a mechanism to enable the mobile node or correspondent node (CN) to detect the failure of primary MAP and change their attachment from the primary to secondary MAP. By this recovery procedure, it is possible to reduce the failure recovery time. Analytical evaluation indicates that RH-MIPv6 has faster recovery time than HMIPv6 and we also show through simulation as like analytical result. Consequently, RH-MIPv6 shows about 60% faster recovery time compared with HMIPv6.

Research paper thumbnail of An Optimized and Distributed Data Packet Forwarding Scheme in LTE/LTE-A Networks

IEEE Transactions on Vehicular Technology, 2015

Research paper thumbnail of Content discovery for information-centric networking

Computer Networks, 2014

ABSTRACT

Research paper thumbnail of SRMS: SIP-based RFID Management System

IEEE International Conference on Pervasive Services, 2007

Radio frequency identification (RFID) is a new technology for object identification/tracking syst... more Radio frequency identification (RFID) is a new technology for object identification/tracking systems. In this paper, we propose a novel RFID location management system:

Research paper thumbnail of A Comparative Study of Mobility Management Schemes for Mobile Hotspots

2007 IEEE Wireless Communications and Networking Conference, 2007

ABSTRACT

Research paper thumbnail of Multiband Directional Neighbor Discovery in Self-Organized mmWave Ad Hoc Networks

IEEE Transactions on Vehicular Technology, 2015

Research paper thumbnail of Dynamic bandwidth allocation in mobile hotspots

2012 International Conference on Wireless Communications and Signal Processing (WCSP), 2012

ABSTRACT

Research paper thumbnail of Exploiting spatial and temporal locality for seamless vertical handover

2009 9th International Symposium on Communications and Information Technology, 2009

... the EIS-based vertical handover procedure to reduce the vertical handover latency by eliminat... more ... the EIS-based vertical handover procedure to reduce the vertical handover latency by eliminatingtime-consuming channel scanning procedure. ... REFERENCES [1] IEEE P802.21/D14.0, Draft Standard for Local and Metropolitan Area Networks: Media Independent ...

Research paper thumbnail of N. Argiriou and L. Georgiadis

Research paper thumbnail of A Probabilistic Neighbor Discovery Algorithm in Wireless Ad hoc Networks

Research paper thumbnail of Brain 21 Inf. Technol., Korea Univ., Seoul, South Korea

Research paper thumbnail of Method and apparatus for sending information using sharing cache between portable terminals

Research paper thumbnail of Lightweight traffic redundancy elimination in software-defined wireless mesh networks

Research paper thumbnail of Efficient delta synchronization algorithm in mobile cloud networks