Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ho-Kyung Yang is active.

Publication


Featured researches published by Ho-Kyung Yang.


Peer-to-peer Networking and Applications | 2016

A node management scheme for stable P2P service in mobile ad-hoc networks

Hyun-Jong Cha; Ho-Kyung Yang; Yong-Ho Kim

In a mobile ad-hoc network, multiple number of nodes can communicate with one another without the need for an infrastructure network. It is used in many different types of places, including military zones and disaster or hazardous areas. In a mobile ad-hoc network, each node acts both as a main agent of communication and a relay. Furthermore, each gives a weakness to the network or is subjected to vulnerabilities from malicious attacks due to their distinctive qualities, namely mobility and limited power. Accordingly, in order for stable P2P service, it is important to maintain the reliability and connectivity of the network at a high level. With existing schemes, it has often been the case that when defective nodes or malicious nodes are detected, it also causes damage to normal nodes. In scheme suggested in this paper, those nodes that have temporary defects but otherwise normal and can recovered are kept in the network but those that are defective or malicious are eliminated from the network, using trust values. The simulation was carried out to evaluate the performance of the proposed method. As a result, the message transmission rate even if the impact of a malicious node than the conventional method was demonstrated increased keeping the stable network topology.


International Journal of Distributed Sensor Networks | 2014

User Access Control and Authentication System for VoIP Service in Mobile Communication Environments

Ho-Kyung Yang; Jeong-Kyung Moon; Cheol-Rim Choi; Hwang-Bin Ryou

VoIP, which is used to transmit voice data on the Internet, is being welcomed as a replacement for the PSTN. In VoIP, voice data are converted to IP data and transmitted in an ordinary IP network. As a result, it is less expensive than the ordinary telephone network and has excellent scalability. With the increasing demand for VoIP services, problems are also occurring, namely, security vulnerabilities and degraded service quality. To address these issues, in this paper an AA (Attribute Authority) server is added to VoIP to design an authentication system with bolstered security and differentiated user access.


Sensors | 2018

A Study on the Design of Fog Computing Architecture Using Sensor Networks

Hyun-Jong Cha; Ho-Kyung Yang; You-Jin Song

It is expected that the number of devices connecting to the Internet-of-Things (IoT) will increase geometrically in the future, with improvement of their functions. Such devices may create a huge amount of data to be processed in a limited time. Under the IoT environment, data management should play the role of an intermediate level between objects and devices that generate data and applications that access to the data for analysis and the provision of services. IoT interactively connects all communication devices and allows global access to the data generated by a device. Fog computing manages data and computation at the edge of the network near an end user and provides new types of applications and services, with low latency, high frequency bandwidth and geographical distribution. In this paper, we propose a fog computing architecture for efficiently and reliably delivering IoT data to the corresponding IoT applications while ensuring time sensitivity. Based on fog computing, the proposed architecture provides efficient power management in IoT device communication between sensors and secure management of data to be decrypted based on user attributes. The functional effectiveness and the safe data management of the method proposed are compared through experiments.


Peer-to-peer Networking and Applications | 2016

mVoIP for P2P service based authentication system using AA authentication server

Ho-Kyung Yang; Hyun-Jong Cha; Yong-Ho Kim

VoIP (Voice over Internet Protocol), which provides voice calls as well as additional services at cheaper prices than PSTN (Public Switched Telephone Network), is gaining ground over the latter, which had been the dominant telephone network in the past. This kind of a VoIP service is evolving into a dedicated mVoIP service for the smartphone which allows calls to be made at cheap prices using a WiFi network, as the number of smartphone users is skyrocketing as of late. While an increase in the user base is expected for mVoIP, a packet network is an open network which means anyone can easily gain access and so there can be various problems. To mitigate this, in this paper an authentication system is designed which has an AA (Attribute Authority) server added to VoIP in order to increase security and discriminate user access. In this paper a system for addressing security vulnerabilities from the increase in the use of VoIP services and providing differentiated services according to user access privileges is designed. This paper is organized as follows: Chapter 1 gives the introduction; Chapter 2 is on related research; Chapter 3 describes the proposed technique and system; Chapter 4 implements the system and analyzes its the performance; and Chapter 5 gives the conclusions.


Archive | 2012

Development Direction for Information Security in Network-Centric Warfare

Ho-Kyung Yang; Jin-Mook Kim; Hwang-Bin Ryou; Jong Hyuk Park

As IT advances, warfare undergoing a paradigm shifts. It is going from a type that is weapon-based—making heavy use of conventional weapons—to one that is network-based, a type of warfare called network-centric warfare (NCW). In NCW, sharing of information can be guaranteed using communication technologies of the network. As the members that take part in missions can exchange and collaborate with other, they can be completed more successfully and efficiently, increasing the military might. Amid advancements being made in IT, the Korea military is also doing research for conducting more effective warfare, which it aims to do by connecting each of the entities together and sharing battlefield resources. This paper examines threats to information security in NCW, as well as requirements for information security. Furthermore, a development direction for information security is proposed.


FGIT-GDC/IESH/CGAG | 2012

A Study on Optimization for Acquisition and Processing of Massive Battlefield Information for Korean NCW

Hyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim; Hwang-Bin Ryou

The future warfare will universalize the operation of a combined weapon system that utilizes this technology and create an operational environment that is centered on a network requiring a high level of interoperability between combat elements as well as a high level of operation speed. Therefore, the study attempts to draw out a Korean measurement plan concerning battlefield environment changes in the future by investigating and analyzing all problems occurring during the mass acquisition and processing of battlefield information in battlefield situations of network centric warfare currently conducted by the US military in Afghanistan and Iraq.


international conference on hybrid information technology | 2011

The design of reliable routing protocols in wireless mesh networks

Chang-Pyo Yoon; Hyun-Jong Cha; Ho-Kyung Yang; Hwang-Bin Ryou

Wireless Mesh Networks provide much flexibility in establishing a network compared to existing wire networks. A higher level of security is required for a wireless environment that makes the network accessible by anyone. Compared to MANET, Wireless Mesh Networks is less portable, and have less sensitivity to electric power. This enables the adoption of a higher level of security. This study takes advantage of the PKI (Public Key Infrastructure) security algorithm to optimize a Wireless Mesh Network, so that it is applicable to a Wireless Mesh Network environment. A Pre-Shared Key, which is dynamically created and utilizes the hash function, is adopted as the routing authentication method of the mesh router and for the distribution of Keys necessary for data encryption. Each router node of a Wireless Mesh Network encrypts a random number data for electronic signature. The techniques for supervision, detection and avoidance of malicious nodes between router nodes on a Wireless Mesh Network are presented. The security technique is applied in this environment.


The Journal of Korean Institute of Communications and Information Sciences | 2010

A Study on the Reform of A Defence IT Governance System

Ho-Kyung Yang; Hyun-Kyoo Park; Hyun-Jong Cha; Yong-Gun Cho


Advanced Science Letters | 2017

Anonymity Management Based on Segmentation and Restoration Scheme for Content Identifier in Future Internet Environment

Ho-Kyung Yang; Hyun-Jong Cha; Jin-Mook Kim; You-Jin Song


Advanced Science Letters | 2017

A Study on Data Processing for Application of Vehicular CPS in Fog Computing Environment

Hyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim; You-Jin Song

Collaboration


Dive into the Ho-Kyung Yang's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yong-Ho Kim

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge