The search functionality is under construction.

Author Search Result

[Author] Sehyun PARK(5hit)

1-5hit
  • A Context-Aware Seamless Interoperator Roaming Management Framework in 4G Networks

    Minsoo LEE  Sehyun PARK  

     
    PAPER

      Vol:
    E90-B No:11
      Page(s):
    3015-3023

    The roaming services with the predefined security associations among the entities in various networks are especially complex. We propose a novel architecture to support future context-aware interoperator roaming services throughout 4G networks by using Roaming Coordinators. We design a secure context management model for the practical use of Smart Cards in the secure roaming services. Our architecture solves the interoperator roaming management problems while minimizing the processing overhead on the mobile nodes.

  • Random Visitor: Defense against Identity Attacks in P2P Networks

    Jabeom GU  Jaehoon NAH  Hyeokchan KWON  Jongsoo JANG  Sehyun PARK  

     
    PAPER-Application Information Security

      Vol:
    E91-D No:4
      Page(s):
    1058-1073

    Various advantages of cooperative peer-to-peer networks are strongly counterbalanced by the open nature of a distributed, serverless network. In such networks, it is relatively easy for an attacker to launch various attacks such as misrouting, corrupting, or dropping messages as a result of a successful identifier forgery. The impact of an identifier forgery is particularly severe because the whole network can be compromised by attacks such as Sybil or Eclipse. In this paper, we present an identifier authentication mechanism called random visitor, which uses one or more randomly selected peers as delegates of identity proof. Our scheme uses identity-based cryptography and identity ownership proof mechanisms collectively to create multiple, cryptographically protected indirect bindings between two peers, instantly when needed, through the delegates. Because of these bindings, an attacker cannot achieve an identifier forgery related attack against interacting peers without breaking the bindings. Therefore, our mechanism limits the possibility of identifier forgery attacks efficiently by disabling an attacker's ability to break the binding. The design rationale and framework details are presented. A security analysis shows that our scheme is strong enough against identifier related attacks and that the strength increases if there are many peers (more than several thousand) in the network.

  • Reflection Characteristics of Center-Feed Single-Layer Waveguide Arrays

    Yasuhiro TSUNEMITSU  SeHyun PARK  Jiro HIROKAWA  Makoto ANDO  Yohei MIURA  Yasuhiro KAZAMA  Naohisa GOTO  

     
    PAPER

      Vol:
    E88-B No:6
      Page(s):
    2313-2319

    The reflection characteristics of large alternating-phase fed single-layer waveguide arrays with center-feeds are investigated to identify the mechanism for bandwidth narrowing effects. Firstly, the overall reflection for the whole array is analyzed by FEM and fine agreement with measurements is demonstrated. It is deviating from the conventional prediction based upon a simple sum of reflections from components in the array, such as the multiple-way power divider, the slot waveguides and the aperture at the antenna input. Careful diagnosis reveals that the mutual coupling between the alternating phase waveguides via external half-space is the key factor in reflection accumulation. Amongst all, the slot with strong excitation whose position depends upon the aperture illumination design produces the dominant contribution in the mutual coupling.

  • Design of an Energy-Aware LED Light System (EA-LLS) for Energy Saving and User Satisfaction through Daylight, Space and User Movement Analysis in Buildings

    Sangmin PARK  Jinsung BYUN  Byeongkwan KANG  Daebeom JEONG  Beomseok LEE  Sehyun PARK  

     
    LETTER-Office Information Systems, e-Business Modeling

      Pubricized:
    2015/07/17
      Vol:
    E98-D No:10
      Page(s):
    1861-1865

    This letter introduces an Energy-Aware LED Light System (EA-LLS) that provides adequate illumination to users according to the analysis of the sun's position, the user's movement, and various environmental factors, without sun illumination detection sensors. This letter presents research using algorithms and scenarios. We propose an EA-LLS that offers not only On/Off and dimming control, but dimming control through daylight, space, and user behavior analysis.

  • An Immunity-Based Security Layer against Internet Antigens

    Jabeom GU  Dongwook LEE  Kweebo SIM  Sehyun PARK  

     
    LETTER-Network

      Vol:
    E83-B No:11
      Page(s):
    2570-2575

    With the rising innovative antigens (such as intruders and viruses) through Internet, reliable security mechanisms are required to perceptively detect and put them down. However, defense techniques of the current host system over Internet may not properly analyze Internet antigens, because trends of attacks are unexpectedly shifted. In this paper, we introduce an Antibody Layer that mediates proper security services based on the biological mechanism to rapidly disclose and remove innovative antigens. The proposed Antibody Layer also employs a new topology called antibody cooperation protocol to support real-time security QoS for one host as well as host alliance.