http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Location-Awareness Management in IP-based IMT Network Platform ($IP^2$)
NamGung, Jung-Il,Shin, Soo-Young,Jung, Byeong-Hwa,Park, Hyun-Moon,Yun, Nam-Yeol,Park, Soo-Hyun Korea Multimedia Society 2010 멀티미디어학회논문지 Vol.13 No.6
$IP^2$, as an extended concept of the next generation IMT network, is a concept of basically supporting mobility using two steps of IP address (i.e. IPha (IP Host address) and IPra (IP routing address)) in IP backbone network. Current $IP^2$system has a shortcoming of excess usage of network resources caused by sending paging messages to all cells in LA (Location Area) in paging procedure. Considering the evolving direction of network, which is taking mobility with various speed and integration of devices into consideration, this shortcoming must be overcome. In this paper, we proposed a method to reduce time and memory for paging by maintaining current information of MN (Mobile Node) not in Active state with proxy server. Performance evaluation based on NS-2 simulations has shown that the efficiency of network resources is improved in the proposed method.
Custody Transfer of Bundle layer in Security Mechanism for Under water Inter net of Things (UIoT)
Urunov, Khamdamboy,Namgung, Jung-Il,Park, Soo-Hyun Korea Multimedia Society 2015 멀티미디어학회논문지 Vol.18 No.4
The intent is to determine whether or not the custody transfer is helpful for data transmission in challenging underwater communications when running Bundle protocol or underwater protocols. From the point of view defending side, Underwater Acoustic Network (UAN) will be a serious threat for its strong functionality long rang and high precision of surveillance and detection. Therefore, countermeasures must be taken to weaken its effect. Our purpose is analyzed that how to benefit from the UIoT to learn from, exploit and preserve the natural underwater resources. Delay/Disruption Tolerant Network (DTN) is essential part of the network heterogeneity communication network. The vulnerability and potential security factors of UIoT are studied thereafter. Security mechanisms for an underwater environment are difficult to apply owing to the limited bandwidth. Therefore, for underwater security, appropriate security mechanisms and security requirements must be defined simultaneously. The paper consists of mathematical and security model. Most important point of view in the security challenges of effective Buffer and Storage management in DTN.
The Framework for Authentication and Authorization for Constrained M2M Devices
( Sardorjon Vakkosov ),( Jung-il Namgung ),( Soo-hyun Park ) 한국정보처리학회 2015 한국정보처리학회 학술대회논문집 Vol.22 No.1
M2M technology enables us to control “Things” and collect various kinds of information from “Things”. M2M is defined as a technology that enables electronic and mechanical devices to communicate with each other seamlessly and perform actions without human intervention. In this paper, we review some security solutions for M2M devices and show our light weight framework which is responsible for security of constrained M2M devices. In addition to the above-mentioned ones, we propose the framework can be applied for constrained environment and give conclusion and future works.
Khamdamboy Urunov(함담보이 우루노브),Jung-Il Namgung(남궁정일),Soo Young Shin(신수영),Soo-Hyun Park(박수현) 대한전자공학회 2016 대한전자공학회 학술대회 Vol.2016 No.11
Most of the discovery protocols depend on the intended applications and a wide range of activities for discovery technologies are using various purposes. Indeed, interworking function based on service discovery protocols, which of protocols DNS (DNS-SD, mDNS) and SLP, SSDP, Bluetooth SDP, SSLP and others. However, the service discovery protocols for wired, powered or high-bandwidth wireless networks are not suitable for constrained networks. Our goal is M2M discovery protocols for constrained environment that they must be resource efficient in terms of low processing and memory overhead, as well as must minimizing the number and size of message exchanges. Additionally, Underwater Internet of Things (UIoT) is also constrained environment which IoT sensors are sensing different parameters of data, as well this is non-IP standard protocol specification for wireless and acoustic low power networks have defined their own resource aware discovery mechanism.
An Energy Efficiency Analysis of Lightweight Security Protocols for M2M/IoT environment
Khamdamboy Urunov(함담보이 우르노브),Jung-Il Namgung(남궁정일),Sun-Ho Yeom(염선호),Soo-Hyun Park(박수현) 대한전자공학회 2016 대한전자공학회 학술대회 Vol.2016 No.6
The Internet of Things should be considering security risk environments such as different platform and services Intelligence devices can be mounted on household electric appliances, healthcare and other heterogeneous networks and things. The IoT consists of two different type environments which resource-constrained and resource-rich devices. This paper covered energy consumption and an efficiency for the IoT security protocols and other aspects. First of all, our goal analysis of constrained lightweight protocol like CoAP, MQTT, AMQT, SSL, TLS, and DTLS. Second of all, the security facilities are adjusting the whole process of network protocols PANA, LDAP. Likewise, those are adjusting satisfaction communication in the low bandwidth, a high latency, a data limits, and a fragile connection for M2M/IoT.
해양 센서네트워크에서 Scheduled Interest Table(SIT) 기반 다중경로 설정 기법
윤남열,남궁정일,박수현,Yun, Nam-Yeol,NamGung, Jung-Il,Park, Soo-Hyun 한국시뮬레이션학회 2009 한국시뮬레이션학회 논문지 Vol.18 No.4
The distance of sensor nodes is an important factor in having influence on capability of networks in underwater acoustic sensor networks. Our proposed scheme is to establish an efficient distance to design a route of communication in underwater environment and it proposes a Level scheme that the areas divided by transmit/receive distance in network are given different levels. Our proposed scheme is pursued research to maintain a established route and maximize an energy efficiency. The established route will have fluid modification by an internal and external factors and it will construct more robust underwater sensor networks over our proposed multiple path configuration scheme.