Ho-Kyung Yang
Kwangwoon University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ho-Kyung Yang.
Peer-to-peer Networking and Applications | 2016
Hyun-Jong Cha; Ho-Kyung Yang; Yong-Ho Kim
In a mobile ad-hoc network, multiple number of nodes can communicate with one another without the need for an infrastructure network. It is used in many different types of places, including military zones and disaster or hazardous areas. In a mobile ad-hoc network, each node acts both as a main agent of communication and a relay. Furthermore, each gives a weakness to the network or is subjected to vulnerabilities from malicious attacks due to their distinctive qualities, namely mobility and limited power. Accordingly, in order for stable P2P service, it is important to maintain the reliability and connectivity of the network at a high level. With existing schemes, it has often been the case that when defective nodes or malicious nodes are detected, it also causes damage to normal nodes. In scheme suggested in this paper, those nodes that have temporary defects but otherwise normal and can recovered are kept in the network but those that are defective or malicious are eliminated from the network, using trust values. The simulation was carried out to evaluate the performance of the proposed method. As a result, the message transmission rate even if the impact of a malicious node than the conventional method was demonstrated increased keeping the stable network topology.
International Journal of Distributed Sensor Networks | 2014
Ho-Kyung Yang; Jeong-Kyung Moon; Cheol-Rim Choi; Hwang-Bin Ryou
VoIP, which is used to transmit voice data on the Internet, is being welcomed as a replacement for the PSTN. In VoIP, voice data are converted to IP data and transmitted in an ordinary IP network. As a result, it is less expensive than the ordinary telephone network and has excellent scalability. With the increasing demand for VoIP services, problems are also occurring, namely, security vulnerabilities and degraded service quality. To address these issues, in this paper an AA (Attribute Authority) server is added to VoIP to design an authentication system with bolstered security and differentiated user access.
Sensors | 2018
Hyun-Jong Cha; Ho-Kyung Yang; You-Jin Song
It is expected that the number of devices connecting to the Internet-of-Things (IoT) will increase geometrically in the future, with improvement of their functions. Such devices may create a huge amount of data to be processed in a limited time. Under the IoT environment, data management should play the role of an intermediate level between objects and devices that generate data and applications that access to the data for analysis and the provision of services. IoT interactively connects all communication devices and allows global access to the data generated by a device. Fog computing manages data and computation at the edge of the network near an end user and provides new types of applications and services, with low latency, high frequency bandwidth and geographical distribution. In this paper, we propose a fog computing architecture for efficiently and reliably delivering IoT data to the corresponding IoT applications while ensuring time sensitivity. Based on fog computing, the proposed architecture provides efficient power management in IoT device communication between sensors and secure management of data to be decrypted based on user attributes. The functional effectiveness and the safe data management of the method proposed are compared through experiments.
Peer-to-peer Networking and Applications | 2016
Ho-Kyung Yang; Hyun-Jong Cha; Yong-Ho Kim
VoIP (Voice over Internet Protocol), which provides voice calls as well as additional services at cheaper prices than PSTN (Public Switched Telephone Network), is gaining ground over the latter, which had been the dominant telephone network in the past. This kind of a VoIP service is evolving into a dedicated mVoIP service for the smartphone which allows calls to be made at cheap prices using a WiFi network, as the number of smartphone users is skyrocketing as of late. While an increase in the user base is expected for mVoIP, a packet network is an open network which means anyone can easily gain access and so there can be various problems. To mitigate this, in this paper an authentication system is designed which has an AA (Attribute Authority) server added to VoIP in order to increase security and discriminate user access. In this paper a system for addressing security vulnerabilities from the increase in the use of VoIP services and providing differentiated services according to user access privileges is designed. This paper is organized as follows: Chapter 1 gives the introduction; Chapter 2 is on related research; Chapter 3 describes the proposed technique and system; Chapter 4 implements the system and analyzes its the performance; and Chapter 5 gives the conclusions.
Archive | 2012
Ho-Kyung Yang; Jin-Mook Kim; Hwang-Bin Ryou; Jong Hyuk Park
As IT advances, warfare undergoing a paradigm shifts. It is going from a type that is weapon-based—making heavy use of conventional weapons—to one that is network-based, a type of warfare called network-centric warfare (NCW). In NCW, sharing of information can be guaranteed using communication technologies of the network. As the members that take part in missions can exchange and collaborate with other, they can be completed more successfully and efficiently, increasing the military might. Amid advancements being made in IT, the Korea military is also doing research for conducting more effective warfare, which it aims to do by connecting each of the entities together and sharing battlefield resources. This paper examines threats to information security in NCW, as well as requirements for information security. Furthermore, a development direction for information security is proposed.
FGIT-GDC/IESH/CGAG | 2012
Hyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim; Hwang-Bin Ryou
The future warfare will universalize the operation of a combined weapon system that utilizes this technology and create an operational environment that is centered on a network requiring a high level of interoperability between combat elements as well as a high level of operation speed. Therefore, the study attempts to draw out a Korean measurement plan concerning battlefield environment changes in the future by investigating and analyzing all problems occurring during the mass acquisition and processing of battlefield information in battlefield situations of network centric warfare currently conducted by the US military in Afghanistan and Iraq.
international conference on hybrid information technology | 2011
Chang-Pyo Yoon; Hyun-Jong Cha; Ho-Kyung Yang; Hwang-Bin Ryou
Wireless Mesh Networks provide much flexibility in establishing a network compared to existing wire networks. A higher level of security is required for a wireless environment that makes the network accessible by anyone. Compared to MANET, Wireless Mesh Networks is less portable, and have less sensitivity to electric power. This enables the adoption of a higher level of security. This study takes advantage of the PKI (Public Key Infrastructure) security algorithm to optimize a Wireless Mesh Network, so that it is applicable to a Wireless Mesh Network environment. A Pre-Shared Key, which is dynamically created and utilizes the hash function, is adopted as the routing authentication method of the mesh router and for the distribution of Keys necessary for data encryption. Each router node of a Wireless Mesh Network encrypts a random number data for electronic signature. The techniques for supervision, detection and avoidance of malicious nodes between router nodes on a Wireless Mesh Network are presented. The security technique is applied in this environment.
The Journal of Korean Institute of Communications and Information Sciences | 2010
Ho-Kyung Yang; Hyun-Kyoo Park; Hyun-Jong Cha; Yong-Gun Cho
Advanced Science Letters | 2017
Ho-Kyung Yang; Hyun-Jong Cha; Jin-Mook Kim; You-Jin Song
Advanced Science Letters | 2017
Hyun-Jong Cha; Ho-Kyung Yang; Jin-Mook Kim; You-Jin Song