The search functionality is under construction.
The search functionality is under construction.

Author Search Result

[Author] Sang-Ho LEE(5hit)

1-5hit
  • A Group Key Management Scheme Using Core Based Tree and Height Balanced Tree

    Taenam CHO  Sang-Ho LEE  

     
    PAPER-Application Information Security

      Vol:
    E87-D No:10
      Page(s):
    2329-2338

    Recently, with the explosive growth of communication technologies, group oriented services such as teleconferencing and multi-player games are increasing. Access to information is controlled through secret communication using a group key shared among members, so efficient updating of group keys is vital to maintaining secrecy of large and dynamic groups. In this paper, we employ (2,4)-tree as a key tree, which is a height balanced tree, to reduce the number of key updates caused by joins or leaves of members. Specifically, we use the CBT (Core Based Tree) to determine the network configuration of the group members to reflect that onto the structure of the key tree. This allows for more efficient updates of group keys when splitting or merging of subgroups occurs by network failure or recovery.

  • A New CMOS Linear Transconductor

    Sang-Ho LEE  Tae-Soo YIM  Young-Hwan KIM  

     
    LETTER-Electronic Circuits

      Vol:
    E79-C No:8
      Page(s):
    1166-1170

    A new CMOS analogue transconductor is proposed and simulated. This transconductor is based on the operation of MOS transistors in the linear region and has a good linearity. The simulation result shows that less than 1% distortion can be obtained for the differential input signal of 6.4 Vp-p with IB=80µA and supply voltage of 5V.

  • Design and Analysis of Scalable WDM-Based Ethernet Hybrid-PON Architecture

    Tae-Yeon KIM  NamUk KIM  Sang-Ho LEE  Jeong-Ju YOO  Byong-Whi KIM  

     
    PAPER

      Vol:
    E90-B No:5
      Page(s):
    1032-1041

    To overcome the demerits of two passive optical networks; the small link capacity of the TDM-PON, and the ineffective link utilization of the WDM-PON; we propose a novel access network architecture featuring a WDM-based feeder network and a TDM-based distribution network. In this paper, we examine the design issues of the key constituent of SWE-PON (Scalable WDM-based Ethernet hybrid-PON) to validate its economic and practical feasibility. For flawless network operation, the wavelength tuning rule is investigated so that it does not collide between wavelengths from the tunable lasers belonging to the WDM coupler. Also, the potential problem between the tunable laser and the reflective operational device is analyzed in detail. From the numerical analysis and simulation, we demonstrate the variation of the network performance in terms of the upstream traffic delay and throughput of the ONU in accordance with the sharing structure of distribution network and the number of tunable laser devices (TLDs) at the feeder network.

  • A Key Establishment Protocol for RFID User in IPTV Environment

    Yoon-Su JEONG  Yong-Tae KIM  Jae-Min SOHN  Gil-Cheol PARK  Sang-Ho LEE  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Vol:
    E93-B No:9
      Page(s):
    2407-2415

    In recent years, the usage of IPTV (Internet Protocol Television) has been increased. The reason is a technological convergence of broadcasting and telecommunication delivering interactive applications and multimedia content through high speed Internet connections. The main critical point of IPTV security requirements is subscriber authentication. That is, IPTV service should have the capability to identify the subscribers to prohibit illegal access. Currently, IPTV service does not provide a sound authentication mechanism to verify the identity of its wireless users (or devices). This paper focuses on a lightweight authentication and key establishment protocol based on the use of hash functions. The proposed approach provides effective authentication for a mobile user with a RFID tag whose authentication information is communicated back and forth with the IPTV authentication server via IPTV set-top box (STB). That is, the proposed protocol generates user's authentication information that is a bundle of two public keys derived from hashing user's private keys and RFID tag's session identifier, and adds 1 bit to this bundled information for subscriber's information confidentiality before passing it to the authentication server.

  • A Novel Overload Control Strategy for Distributed Mobile Communication Systems

    Woo-Goo PARK  Je-Hun RHEE  Sook-Jin LEE  Sang-Ho LEE  

     
    PAPER-Communication Theory

      Vol:
    E81-B No:11
      Page(s):
    2131-2140

    In this paper, a new overload control strategy is proposed for a call control processor (CCP) in the base station controller (BSC) and processor utilization is measured. The proposed overload control strategy can regulate the call attempts by adopting measured processor utilization. A function, specifically a linear interpolation function based on Inverse Transform theory is used to convert controlled predictive average load rate in a call rejection rate. Then a call admission rate is obtained from the call rejection rate. Simulation shows that the proposed algorithm yields better performance than the conventional algorithm does under the heavy transient overload status in terms of call admission rate.