Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Bok Nyong Park is active.

Publication


Featured researches published by Bok Nyong Park.


IEICE Transactions on Communications | 2005

ISMANET: A Secure Routing Protocol Using Identity-Based Signcryption Scheme for Mobile Ad-Hoc Networks

Bok Nyong Park; Wonjun Lee

Mobile ad-hoc networks consist of mobile nodes interconnected by multihop path that has no fixed network infrastructure support. Due to the limited bandwidth and resource, and also the frequent changes in topologies, ad-hoc network should consider these features for the provision of security. We present a secure routing protocol based on identity-based signcryption scheme. Since the proposed protocol uses an identity-based cryptosystem, it does not need to maintain a public key directory and to exchange any certificate. In addition, the signcyption scheme simultaneously fulfills both the functions of digital signature and encryption. Therefore, our protocol can give savings in computation cost and have less amount of overhead than the other protocols based on RSA because it uses identity-based signcryption with pairing on elliptic curve. The effectiveness of our protocol is illustrated by simulations conducted using ns-2.


Computer Communications | 2007

QoS-aware Internet access schemes for wireless mobile ad hoc networks

Bok Nyong Park; Wonjun Lee; Choonhwa Lee

Recently, the idea of integrating mobile ad hoc networks (MANETs) and the Internet are being explored to expand the reach of the Internet to MANET access networks. It will get us one step closer to the goal of ubiquitous Internet which is accessible anytime and anywhere. Among others, Internet gateway discovery and selection schemes pose more fundamental challenge to the problem. In this paper, we propose a load-adaptive access gateway discovery protocol and a QoS-enabled access gateway selection scheme that can exploit relevant network conditions. The gateway discovery protocol dynamically adjusts its proactive area according to network traffic. Among a set of the discovered candidate gateways, one is selected based on the number of hops to and the capability of them. Our performance evaluation study shows that the load-adaptive access gateway discovery and QoS-enabled selection schemes outperform existing mechanisms over various simulation scenarios.


IEEE Transactions on Consumer Electronics | 2006

QoS-driven wireless broadband home networking based on multihop wireless mesh networks

Bok Nyong Park; Wonjun Lee; Sanghyun Ahn; Sungjoon Ahn

Wireless mesh networks are a suitable technology for wireless broadband home networks which can expand into ubiquitous networks. In this paper, we introduce a home network architecture which is based on the multihop wireless mesh networks and provide a general overview of the architecture. The system model introduced might be helpful to set up self-organizing and self-configuring network for consumer homes. The wireless mesh home network architecture can reduce the deployment cost and provide a much simpler deployment process by wireless home mesh routers. The home mesh routers provide various functions. Thus, home mesh router discovery and selection problems pose a primary challenge in the wireless mesh home network architecture. To deal with these problems, we propose a scoped-proactive home mesh router discovery scheme and a QoS-driven home mesh router selection mechanism. The scoped-proactive discovery protocol limits the flooding area. Among the candidates, a serving mesh router is selected based on a QoS-driven selection metric. Through simulations, we show that our schemes perform better than existing mechanisms in terms of various performance measures


international conference on information networking | 2006

LAID: load-adaptive internet gateway discovery for ubiquitous wireless internet access networks

Bok Nyong Park; Wonjun Lee; Choonhwa Lee; Jin Pyo Hong; Joonmo Kim

Ubiquitous Internet connectivity is to connect all devices to the Internet at any time and any place To achieve this ubiquitous Internet connectivity, we consider integrating the Internet and mobile ad-hoc networks One of the most important issues in the ubiquitous Internet connectivity is to find an efficient and reliable Internet gateway We propose a load-adaptive Internet gateway discovery approach that can exploit network conditions The load-adaptive Internet gateway discovery scheme dynamically adjusts a proactive area according to network traffic Among the candidates, a serving gateway is selected based on offered load The simulation results show that our discovery scheme outperforms existing discovery schemes.


international conference on information networking | 2005

LSRP: a lightweight secure routing protocol with low cost for ad-hoc networks

Bok Nyong Park; Jihoon Myung; Wonjun Lee

Ad-hoc networks consist of only mobile nodes and have no support infrastructure. Due to the limited resources and frequent changes in topologies, ad-hoc network should consider these features for the provision of security. We present a lightweight secure routing protocol (LSRP) applicable for mobile ad-hoc networks. Since the LSRP uses an identity-based signcryption scheme, it can eliminate public or private key exchange, and can give savings in computation cost and communication overhead. LSRP is more computationally efficient than other RSA-based protocols because our protocol is based on the properties of pairings on elliptic curves. Empirical studies are conducted using NS-2 to evaluate the effectiveness of LSRP. The simulation results show that the LSRP is more efficient in terms of cost and overhead.


parallel and distributed computing applications and technologies | 2004

ISSRP: a secure routing protocol using identity-based signcryption scheme in ad-hoc networks

Bok Nyong Park; Jihoon Myung; Wonjun Lee

TWe present a secure routing protocol based on identity-based signcryption scheme in ad-hoc networks. Because the proposed protocol uses identity-based cryptography, it can eliminate storage consumption and a certificate of public key exchange. Also, our protocol has very short ciphertexts/signatures and efficient computation time than other protocols based on RSA because it uses pairings over elliptic curves. In addition, the signcryption scheme fulfills both the functions of digital signature and encryption, and it thus can give savings in computation cost and communication overhead.


advanced information networking and applications | 2004

PrecePt: a privacy-enhancing license management protocol for digital rights management

Bok Nyong Park; Jae Won Kim; Wonjun Lee

One of the major issues raised by digital rights management (DRM) systems concerns the protection of the users privacy and anonymous consumption of content. However, most existing DRM systems do not support the protection of each users personal information. This paper suggests a privacy-enhancing license management protocol, named PrecePt (privacy-enhancing license management protocol), which is a more powerful protocol to protect personal information in DRM. To protect the exposure of user identifier, this protocol uses temporary ID and token to guarantee anonymity. The proposed scheme also uses a session key form ECDH cryptography and public-key so that it can protect the revelation of personal information and user privacy.


broadband communications, networks and systems | 2006

QoS-Aware Adaptive Internet Gateway Selection in Ad Hoc Wireless Internet Access Networks

Bok Nyong Park; Wonjun Lee; Choonhwa Lee; Christian K. Shin

In ad hoc networks with Internet connectivity, an Internet gateway (IG) is used to connect ad hoc mobile nodes to the Internet. Multiple Internet gateways may be deployed in order to provide more scalable and robust ubiquitous coverage. In this case, we need to solve the Internet gateway selection problem in order for successful integration of the Internet with mobile ad hoc networks. An ad hoc mobile node first discovers available Internet gateways, and then the node selects a serving gateway among those candidates for optimal performance. In this paper, we propose an adaptive Internet gateway selection scheme using redirecting selection method which is based on QoS attributes such as hop-count and residual capacity. Our objective is to design a selection method for providing enhanced performance. Simulation results show that our adaptive Internet gateway selection scheme achieves better performance as well as better load balancing than existing selection schemes.


embedded and ubiquitous computing | 2006

Securing internet gateway discovery protocol in ubiquitous wireless internet access networks

Bok Nyong Park; Wonjun Lee; Christian K. Shin

Ubiquitous wireless Internet access networks (UWIANs) integrate mobile ad hoc networks into the Internet to achieve ubiquitous Internet connectivity. The Internet connectivity is provided by Internet gateways in the UWIANs. Most of the Internet connectivity research has not considered a malicious environment. However, UWIANs will not be able to succeed without an effective security solution due to wireless links and energy constraints. Thus, security is a critical factor to the success of ubiquitous Internet connectivity. In this paper, we propose a secure Internet gateway discovery protocol in order to provide the secure Internet connectivity. A registration mechanism is also proposed to secure a foreign network and an ad hoc mobile node when it connects within the network. The efficiency of the protocol is shown via simulation


computer and information technology | 2006

A Power Balanced Multipath Routing Protocol inWireless Ad-Hoc Sensor Networks

Dongshin Kim; Wonjun Lee; Bok Nyong Park; Joongheon Kim; Christian Shin; Changmin Shin

Traditional data centric routing protocols are for stationary sensor networks so these are not appropriate for mobile ad hoc sensor networks where sensor nodes may move and operate as an actuator. In order to maximize the life time of mobile ad hoc sensor networks, we propose a power balanced routing protocol based on a multiple path routing method for ad hoc sensor networks. The proposed routing protocol is referred to as a Power Balanced Multipath Routing protocol (PBMR). The PBMR enables balanced power consumption in a network by managing the routing reply time. Performance comparison of the PBMR to other existing protocols shows that the PBMR is able to effectively cope with mobility-induced route failures. In particular, it extends network lifetime by up to 50%.

Collaboration


Dive into the Bok Nyong Park's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Christian K. Shin

State University of New York at Geneseo

View shared research outputs
Top Co-Authors

Avatar

Changmin Shin

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jin Pyo Hong

Hankuk University of Foreign Studies

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge