Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Byung Gil Lee is active.

Publication


Featured researches published by Byung Gil Lee.


international conference on information networking | 2002

An AAA Application Protocol Design and Service for Secure Wireless Internet Gateway Roaming

Byung Gil Lee; Hyun Gon Kim; Kil-Houm Park

The Mobile IP based AAA (Diameter protocol) provides authentication, authorization, and accounting (AAA) service to a mobile network for achieving mobility in wireless IP access. This paper proposes a secured wireless Internet roaming service using wireless Internet Gateways (AAA Clients) and an AAA server. To support inter-networking with wireless Internet gateways (i.e., WAP G/W), we also designed a diameter application protocol and scenarios. Traditional AAA schemes have not been used in such wireless Internet gateway networks to date. The basic strategy involves the use of the wireless Internet content of a portal that is provided independently from a mobile service providers network and related inter-working with the outer mobile service providers networks.


IEEE Transactions on Dependable and Secure Computing | 2014

Low-Priced and Energy-Efficient Detection of Replicas for Wireless Sensor Networks

Kwantae Cho; Byung Gil Lee; Dong Hoon Lee

The forthcoming internet of things - an intelligent collaboration of resource-limited devices such as wireless sensor nodes that are embedded in the daily lives of users - poses new challenges to security and end-user privacy. One of the most challenging problems is the thwarting of replica attacks. Once a sensor node is physically captured, it can be reprogrammed and replicated into a large number of replicas, which may maliciously occupy the network. Thus far, various schemes have been proposed to detect replicas; however, most of them require expensive hardware such as a global positioning system. In general, the ideal price for a sensor node is as low as one dollar, and thus, it is equipped with limited resources; hence, it is not practical to employ additional devices. In this paper, we propose a low-priced and efficient solution for replica detection in static wireless sensor networks. Although the proposed solution does not need any additional hardware, it exhibits similar or better performance, as compared to existing schemes. Through simulation experiments, we show that the proposed solution provides comparable performance in terms of the replica detection ratio and the time required to detect replicas. Furthermore, we show that the proposed solution saves more energy than existing schemes in most of our simulations.


Iet Communications | 2013

Energy-efficient replica detection for resource-limited mobile devices in the internet of things

Kwantae Cho; Byung Gil Lee; Kyungho Lee; Dong Hoon Lee

The forthcoming Internet of Things - an intelligent collaboration of resource-limited static/mobile devices that are embedded in the daily lives of users - poses new challenges to security and end-user privacy. One of the most challenging problems is how to thwart replica attacks. Once a device is captured physically by an attacker or contaminated by malicious code, it can be reprogrammed and the secret information inside can be duplicated into a large number of replicas that maliciously occupy the network and collect users private information without authorisation. In this study, the authors focus on studying the detection of replicas in mobile applications; which can consist of resource-limited static devices attached to mobile entities. Most existing solutions for detecting replicas have been designed for static devices, and cannot be immediately applied to mobile devices because of their unique properties, in particular, their node mobility. The authors present two efficient methods for detecting replicas in mobile devices. Through performance evaluations, they find that the proposed methods provide highly accurate replica detection with nearly zero detection errors. Furthermore, the distributed and cooperative strategy of the methods significantly reduces the energy required to detect replicas while providing faster replica detection than the existing solutions.


international congress on image and signal processing | 2016

Gateway system of VTS system

Hae Sook Jeon; Byung Gil Lee

In order to provide for the safe and expeditious passage of maritime traffic in congested waters, every country establishes, operates, and maintains Vessel Traffic Services where needed. In larger areas, a VTS will generally require a communication system to enable the vessel traffic center and the participating vessels to exchange information. There are some kinds of commercial VTS. Generally, these consists of several systems which have its own role such as operating system, video extracting and tracking system, warning and integration system, VTS logging and replaying system and so on. These are connected each other directly. In this paper, we introduce the centralized VTS which is separated by VTS Gateway System between VTS Operating System and the other subsystems. In case of VGWS, three kinds of messages are considered in the message arrival process. First is check in/check out messages which are basic as gateway. Second is VTS operating system supporting message which is always applied to all VTS operating system including VTOS user login, VTOS user environment configuration info setting and common info for VTS system and so on. Last is compulsory message transmission for VTOS logging and playback. The centralized VTS running tests show that the message processing delay of VGWS is acceptable compared to the predefined delay metric for VGWS performance.


international congress on image and signal processing | 2016

Redunadancy method for VTS system

Hae Sook Jeon; Byung Gil Lee

In order to provide for the safe and expeditious passage of maritime traffic in congested waters, the U.S. Coast Guard is authorized by the Ports and Waterways Safety Act to establish, operate, and maintain Vessel Traffic Services (VTS) where needed. In larger areas, a VTS will generally require a communication system to enable the vessel traffic center and the participating vessels to exchange information. VORA (VTS system for Operators Rapid Situation Awareness) is a maritime traffic monitoring system which provides a comprehensive representation of vessel traffic situation to operators. VORA uses radar, CCTV, VHF/DSC, VHD/DF, SCADA, weather sensors, AIS to keep track of vessel movements and provide navigational safety, safety of life at sea and the protection of the marine environment in a limited geographical area. VORA consists of hardware and software components which collect, integrate, analyze and display data. In this paper, we introduce the redundancy method of VORA subsystem, MSIS (Multiple Sensor Integration System). This is related to the redundancy method, including data redundancy. The data redundancy role is up to each subsystem policy. Experiments show that though if MSIS is in the error case, MSIS with the supposed redundancy can provide the continuous service.


computer science and its applications | 2015

Self-certified Privacy-Preserving Scheme for Vehicle-to-Vehicle Communications

Kwantae Cho; Byung Gil Lee; Dong Hoon Lee

In vehicular ad hoc networks (VANETs), vehicles should exchange safety-related messages with each other while processing them within short time in their embedded on-board units. Most previous authentication schemes unfortunately are not ready to be deployed for vehicle-to-vehicle communications owing to serious practical shortcomings, such as the enormous expense of building additional facilities (e.g., roadside units), computation and communication bottlenecks, a huge certificate revocation list, and low processing capacity. To alleviate these problems, we propose an efficient privacy-preserving scheme with which each vehicle (specifically, its embedded on-board unit) can produce valid one-time certificates without help from any third party. The scheme is cost-effective because additional facilities are not needed and it can also prevent bottlenecks on a certain trusted entity because certificates are self-produced.


international conference on advanced communication technology | 2014

Vessel tracking vision system using a combination of Kaiman filter, Bayesian classification, and adaptive tracking algorithm

Yun Jip Kim; Yun Koo Chung; Byung Gil Lee

In these days, there are many vessel traffics to trade with foreign nations and travel abroad. Near coast or in harbor, the more traffics of transportation, the more possibility of accidents tends to occur. Thus, to reduce ships collision, vessel traffic services (VTS) centers have installed lots of equipment to keep a close eye on ships sailing in sea port, such as night observation device, telescope, and CCTV. To improve efficiently existing tracking system and overcome flaw of noises in the process of pursuit in maritime environment, considering bad weather and waves, this paper presents vessel tracking system using an image input device. The tracking system uses a fusion of Bayesian classifier to distinguish some images at initial stage, Kalman filter algorithm for keeping tracking the watercraft when it cannot be detected from the obtained image because some noises or inappropriate parameters used in the library functions may prevent detection from successive pictures, and the adaptive tracking algorithm for not only whether Kalman filtering is used as adaptive way to reduce a computational time but also disregarding the noise interference. The experimental results are included to prove the validity of the proposed method.


international conference on information networking | 2002

Hierarchy and Region Based Source-Channel Combined Coder for Image Transmission over Mobile Links

Byung Gil Lee; Kil-Houm Park

This paper presents a new combined source channel coding approach to an unequal error protection method based on hierarchical and regional sensitivity to error propagation utilizing wavelet transform for mobile channels is presented. The proposed scheme performed in a very robust manner, when tested in a mobile multimedia system.


color imaging conference | 2002

Design of peer state acquisition mechanism for efficient dynamic HA allocation at diameter-based AAA server

Hae Dong Lee; Byung Gil Lee; Hyung Gon Kim

This Currently, IETF AAA Working Group has developed a new AAA protocol, Diameter, by upgrading the existing protocol, RADIUS. Diameter supports AAA framework over not only Dialup PPP service but also Mobile IP service. For AAA server in order to provide its services into Mobile IP entities, the following facilities should be implemented together with AAA servers original services (Authentication, Authorization and Accounting); dynamic home agent allocation, dynamic home address assignment, the role of Key Distribution Center. In this paper, to provide an efficient dynamic home agent allocation, we propose a peer state acquisition mechanism for the allocation at Diameter-based AAA server. In the mechanism, AAA servers use the peer state information acquired by means of Diameter Base Protocols facilities: Capability Exchange, Transport Failure Detection. Then the servers can easily obtain and update the latest state of home agents, as Diameter client. The mechanism allows AAA servers to use the realistic peer state information....


Archive | 2002

Inter-working method of wireless internet networks (gateways)

Byung Gil Lee; Hyun Gon Kim; Chee Hang Park

Collaboration


Dive into the Byung Gil Lee's collaboration.

Top Co-Authors

Avatar

Hyun Gon Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Byung Doo Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Do Hyeung Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hyun Sook Cho

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Kwantae Cho

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Dae Hee Seo

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Hae Sook Jeon

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Joong Yong Choi

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jung Chan Na

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge