The search functionality is under construction.

Author Search Result

[Author] Choong Seon HONG(31hit)

21-31hit(31hit)

  • Benefit of Network Coding for Probabilistic Packet Marking and Collecting Coupons from Different Perspectives at the Collector

    Dung Tien NGO  Tuan Anh LE  Choong Seon HONG  Sungwon LEE  Won-Tae LEE  Jae-Jo LEE  

     
    PAPER

      Vol:
    E96-B No:2
      Page(s):
    489-499

    Probabilistic Packet Marking (PPM) is a scheme for IP traceback where each packet is marked randomly with an IP address of one router on the attack path in order for the victim to trace the source of attacks. In previous work, a network coding approach to PPM (PPM+NC) where each packet is marked with a random linear combination of router IP addresses was introduced to reduce number of packets required to infer the attack path. However, the previous work lacks a formal proof for benefit of network coding to PPM and its proposed scheme is restricted. In this paper, we propose a novel method to prove a strong theorem for benefit of network coding to PPM in the general case, which compares different perspectives (interests of collecting) at the collector in PPM+NC scheme. Then we propose Core PPM+NC schemes based on our core network coding approach to PPM. From experiments, we show that our Core PPM+NC schemes actually require less number of packets than previous schemes to infer the attack path. In addition, based on the relationship between Coupon Collector's Problem (CCP) and PPM, we prove that there exists numerous designs that CCP still benefits from network coding.

  • Intelligent Handover Decision Using IEEE 802.21 in Mobile IPTV

    Soohong PARK  Jun LEE  Choong Seon HONG  

     
    LETTER-Internet

      Vol:
    E96-B No:2
      Page(s):
    647-650

    This letter proposes a new mechanism for network configuration on a mobile device that provides Point of Attachment (PoA) specific information using IEEE 802.21 and DHCP before moving to a new PoA. This allows the mobile device to prepare for intelligent handover decision either stateless address configuration or stateful address configuration when entering an IPv6 network. It allows the mobile device to reduce time delay for IP address configuration in the new PoA. Implementation and evaluation results show that the proposed mechanism can be an acceptable network configuration mechanism for providing seamless television watching in IPv6 mobile networks, even when in motion.

  • Cooperative Message Broadcasting in Multichannel Cognitive Radio Ad Hoc Networks

    Zaw HTIKE  Choong Seon HONG  Sungwon LEE  

     
    PAPER-Communication Theory and Signals

      Vol:
    E96-A No:11
      Page(s):
    2099-2105

    Broadcasting is an essential function in almost all wireless networks. Because of the dynamic nature of environment, broadcasting in cognitive radio ad hoc networks is a great challenge. Cognitive radio network technology has been well studied for more than a decade as a new way to improve the spectral efficiency of wireless networks and numerous precious works have been proposed. However, very few existing works consider how to broadcast messages in cognitive radio networks that operate in multichannel environments and none of these provides a full broadcast mechanism. Therefore, in this paper, we propose a broadcasting mechanism for multichannel cognitive radio ad hoc networks. Then, we analyze the mechanism regarding the speed of message dissemination, number of transmissions, fraction of the users that receive the broadcast message and so forth.

  • Congestion Avoidance and Fair Event Detection in Wireless Sensor Network

    Md. MAMUN-OR-RASHID  Muhammad Mahbub ALAM  Md. Abdur RAZZAQUE  Choong Seon HONG  

     
    PAPER

      Vol:
    E90-B No:12
      Page(s):
    3362-3372

    Congestion in WSN increases the energy dissipation rates of sensor nodes as well as the loss of packets and thereby hinders fair and reliable event detection. We find that one of the key reasons of congestion in WSN is allowing sensing nodes to transfer as many packets as possible. This is due to the use of CSMA/CA that gives opportunistic medium access control. In this paper, we propose an energy efficient congestion avoidance protocol that includes source count based hierarchical and load adaptive medium access control and weighted round robin packet forwarding. We also propose in-node fair packet scheduling to achieve fair event detection. The results of simulation show our scheme exhibits more than 90% delivery ratio even under bursty traffic condition which is good enough for reliable event perception.

  • RTSP-Based Adaptive Sending Control for IPTV Service in Heterogeneous Networks and Experimental Implementation

    Soohong PARK  Choong Seon HONG  

     
    LETTER-Internet

      Vol:
    E96-B No:3
      Page(s):
    905-909

    This letter proposes a new mechanism that supports adaptive sending control using Real-Time Streaming Protocol (RTSP) and Transmission Control Protocol (TCP) for IPTV service over heterogeneous networks. The proposed mechanism is implemented on a mobile IPTV device and its performance is verified for providing seamless television watching in heterogeneous networks, even when in motion.

  • A High Throughput On-Demand Routing Protocol for Multirate Ad Hoc Wireless Networks

    Md. Mustafizur RAHMAN  Choong Seon HONG  Sungwon LEE  

     
    PAPER-Network

      Vol:
    E93-B No:1
      Page(s):
    29-39

    Routing in wireless ad hoc networks is a challenging issue because it dynamically controls the network topology and determines the network performance. Most of the available protocols are based on single-rate radio networks and they use hop-count as the routing metric. There have been some efforts for multirate radios as well that use transmission-time of a packet as the routing metric. However, neither the hop-count nor the transmission-time may be a sufficient criterion for discovering a high-throughput path in a multirate wireless ad hoc network. Hop-count based routing metrics usually select a low-rate bound path whereas the transmission-time based metrics may select a path with a comparatively large number of hops. The trade-off between transmission time and effective transmission range of a data rate can be another key criterion for finding a high-throughput path in such environments. In this paper, we introduce a novel routing metric based on the efficiency of a data rate that balances the required time and covering distance by a transmission and results in increased throughput. Using the new metric, we propose an on-demand routing protocol for multirate wireless environment, dubbed MR-AODV, to discover high-throughput paths in the network. A key feature of MR-AODV is that it controls the data rate in transmitting both the data and control packets. Rate control during the route discovery phase minimizes the route request (RREQ) avalanche. We use simulations to evaluate the performance of the proposed MR-AODV protocol and results reveal significant improvements in end-to-end throughput and minimization of routing overhead.

  • TINA-Based Scalable Model for Personal Mobility Service

    Yuzo KOGA  Hiroshi SHIGENO  Choong SEON HONG  Yutaka MATSUSHITA  

     
    PAPER

      Vol:
    E83-A No:7
      Page(s):
    1308-1317

    In order to realize universal service access of mobile users on the global telecommunication environment, we have to consider the scalable networking architecute based on the distributed object computing technologies. In this paper, we apply TINA to the promising networking architecture, and propose TINA-based scalable model for realizing personal mobility service, which especially focuses on making access to telecommunication services from any legacy systems that do not support such the new environment, using a downloadable module in an end terminal, as well as considering load balance of a whole system. Our proposed model also focuses on exchanging personal infomation of mobile users between different administrative domains, by separating the already-specified user profile information objects into two parts, which are the domain-common part and domain-specific part, and propose secure exchange procedure.

  • An Energy-Efficient Sleep Mode in IEEE 802.15.4 by Considering Sensor Device Mobility

    Jinho KIM  Jun LEE  Choong Seon HONG  Sungwon LEE  

     
    LETTER-Network

      Vol:
    E95-B No:6
      Page(s):
    2117-2120

    The current version of IEEE 802.15.4 MAC protocol does not support energy-efficient mobility for the low-power device. In this paper, we propose an energy-efficient sleep mode as part of the IEEE 802.15.4 that can conserve energy by considering mobility of mobile sensor devices. The proposed energy-efficient sleep mode dynamically extends the sleep interval if there is no data to transmit from the device or receive from corresponding nodes.

  • IP-MAC: A Distributed MAC for Spatial Reuse in Wireless Networks

    Md. Mustafizur RAHMAN  Choong Seon HONG  Sungwon LEE  JangYeon LEE  Jin Woong CHO  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E93-B No:6
      Page(s):
    1534-1546

    The CSMA/CA driven MAC protocols withhold packet transmissions from exposed stations when they detect carrier signal above a certain threshold. This is to avoid collisions at other receiving stations. However, this conservative scheme often exposes many stations unnecessarily, and thus minimizes the utilization of the spatial spectral resource. In this paper, we demonstrate that remote estimation of the status at the active receivers is more effective at avoiding collisions in wireless networks than the carrier sensing. We apply a new concept of the interference range, named as n-tolerant interference range, to guarantee reliable communications in the presence of n (n≥ 0) concurrent transmissions from outside the range. We design a distributed interference preventive MAC ( IP-MAC ) using the n-tolerant interference range that enables parallel accesses from the noninterfering stations for an active communication. In IP-MAC, an exposed station goes through an Interference Potentiality Check (IPC) to resolve whether it is potentially interfering or noninterfering to the active communication. During the resolve operation, IPC takes the capture effect at an active receiver into account with interfering signals from a number of possible concurrent transmissions near that receiver. The performance enhancement offered by IP-MAC is studied via simulations in different environments. Results reveal that IP-MAC significantly improves network performance in terms of throughput and delay.

  • A Hybrid MAC Protocol for Cognitive Radio Ad Hoc Networks

    Zaw HTIKE  Jun LEE  Choong Seon HONG  Sungwon LEE  

     
    PAPER

      Vol:
    E95-B No:4
      Page(s):
    1135-1142

    In cognitive radio networks, secondary users exchange control information to utilize the available channels efficiently, to maintain connectivity, to negotiate for data communication such as sender-receiver handshakes, for neighbor discovery etc. This task is not trivial in cognitive radio networks due to the dynamic nature of network environment. Generally, this problem is tackled by using two famous approaches. The first one is the use of common control channel (CCC) and the second one is using channel hopping (a.k.a sequence-based protocols). The use of CCC simplifies the processes of MAC protocols. However, it may not be feasible in cognitive radio networks as the available channels, including control channel, are dynamically changing according to primary user activities. Channel hopping approaches can tolerate the failure of network due to primary user activities. But it causes significant amount of channel access delay which is known as time to rendezvous (TTR). In this paper, we propose a hybrid protocol of these two mechanisms. This hybrid protocol can maintain connectivity and it can guarantee the secondary users to be able to exchange necessary control information in dynamic environment. In our hybrid protocol, we use multiple control channels. If some control channels are unavailable in case of primary user appearances, secondary users still can communicate on different control channels, so it can be more tolerable primary user activities than normal CCC approaches. Channel hopping is performed only for control channels, so it provides relatively small amount of channel access delay.

  • Implementing Signature Based IDS in IP-Based Sensor Networks with the Help of Signature-Codes

    Syed Obaid AMIN  Muhammad Shoaib SIDDIQUI  Choong Seon HONG  Sungwon LEE  

     
    LETTER-Network

      Vol:
    E93-B No:2
      Page(s):
    389-391

    A dynamic coding mechanism is presented to implement distributed signature based IDS (Intrusion Detection System) in IP-USN (IP-based Ubiquitous Sensor Networks). The proposed scheme allows the creation of a lightweight IDS in terms of storage, messaging and energy consumption, which make it appropriate for resource constrained sensor devices.

21-31hit(31hit)