The search functionality is under construction.

Author Search Result

[Author] Jihoon LEE(6hit)

1-6hit
  • Novel Transmit Power Control for Energy Efficiency in IEEE 802.11 WLAN

    Seungwoo JEON  Jihoon LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E95-B No:1
      Page(s):
    325-328

    This letter proposes a novel TPC scheme that increases the energy efficiency of IEEE 802.11 WLAN users. It can determine whether to access the channel and with what level of transmit power given the current channel condition by comparing the expected energy efficiency to an adaptive threshold.

  • Low Overhead Smooth Mobile Content Sharing Using Content Centric Networking (CCN)

    Jihoon LEE  Seungwoo JEON  

     
    LETTER

      Vol:
    E94-B No:10
      Page(s):
    2751-2754

    Rapid developments in mobile technology have transformed mobile phones into mobile multimedia devices. Due to these advancements, user created mobile content is on the increase, both in terms of quality and quantity. To keep pace with such movements, the new networking technology named content centric networking (CCN), which is optimized for content sharing, has appeared. However, it virtually ignores mobile devices. So, this letter proposes a smooth mobile content migration scheme for CCN to provide lower communication overhead and shorter download time.

  • Opportunistic Resource Scheduling with Effective QoS Support in Wireless Network

    Seungwoo JEON  Hanjin LEE  Jihoon LEE  

     
    LETTER-Wireless Communication Technologies

      Vol:
    E93-B No:4
      Page(s):
    1045-1048

    This letter suggests an opportunistic resource scheduling scheme for supporting users with variety of services in wireless network. This scheme is designed to increase resource utilization while meeting diverse quality of service (QoS) requirements. It can be achieved by considering the channel status and the urgency for QoS support synthetically.

  • Proxy-Based IPv6 Neighbor Discovery Scheme for Wireless LAN Based Mesh Networks

    Jihoon LEE  Seungwoo JEON  Jaehoon KIM  

     
    LETTER

      Vol:
    E93-B No:5
      Page(s):
    1151-1154

    Multi-hop Wireless LAN-based mesh network (WMN) provides high capacity and self-configuring capabilities. Due to data forwarding and path selection based on MAC address, WMN requires additional operations to achieve global connectivity using IPv6 address. The neighbor discovery operation over WLAN mesh networks requires repeated all-node broadcasting and this gives rise to a big burden in the entire mesh networks. In this letter, we propose the proxy neighbor discovery scheme for optimized IPv6 communication over WMN to reduce network overhead and communication latency. Using simulation experiments, we show that the control overhead and communication setup latency can be significantly reduced using the proxy-based neighbor discovery mechanism.

  • Synchronization Based Redundant Routing for Multihop Networks

    Wonjong NOH  Jihoon LEE  Sangkyung KIM  

     
    LETTER-Network

      Vol:
    E95-B No:9
      Page(s):
    2952-2955

    This paper proposes a new on-demand routing protocol. It aims to establish a redundant route path containing intermediate nodes having relatively more synchronized neighbor nodes in a possible route. This approach can localize the effects of route failures and reduce route reconfiguration time by enhancing the reachability to the destination node without source-initiated route re-discoveries at route failures. Simulation results show that it has better performance than AODV and TORA.

  • How to Make Content Centric Network (CCN) More Robust against DoS/DDoS Attack

    DaeYoub KIM  Jihoon LEE  

     
    LETTER-Network

      Vol:
    E96-B No:1
      Page(s):
    313-316

    Content-centric networking (CCN) is one of candidates being spotlighted as the technologies of the future Internet to solve the problems of the current Internet. Since DoS/DDoS attack is the most serious threat to the current Internet, this letter introduces the possibility of DoS/DDoS attack on CCN for the first time. And we introduce an attack method using fake-request packets and propose countermeasures in order to detect and/or react to CCN DoS/DDoS attack, and then analyze the result of our proposal.