Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hyun Gon Kim is active.

Publication


Featured researches published by Hyun Gon Kim.


international conference on computational science and its applications | 2003

Secure session key exchange for mobile IP low latency handoffs

Hyun Gon Kim; Doo Ho Choi; Dae Young Kim

Mobile IP Low Latency Handoffs[1] allow greater support for real-time services on a Mobile IPv4 network by minimising the period of time when a mobile node is unable to send or receive IP packets due to the delay in the Mobile IP Registration process. However, on Mobile IP network with AAA servers that are capable of performing Authentication, Authorization, and Accounting(AAA) services, every Regional Registration has to be traversed to the home network to achieve new session keys, that are distributed by home AAA server, for a new Mobile IP session. This communication delay is the time taken to reauthenticate the mobile node and to traverse between foreign and home network even if the mobile node has been previously authorized to old foreign agent. In order to reduce these extra time overheads, we present a method that performs Low Latency Handoff without requiring further involvement by home AAA server. The method re-uses the previously assigned session keys. To provide the confidentiality of session keys in the phase of key exchange between old FA and new FA, it uses a key sharing method with a trusted third party. The proposed method allows the mobile node to perform Low Latency Handoff with fast as well as secure operation.


international conference on computational science and its applications | 2004

Session Key Exchange Based on Dynamic Security Association for Mobile IP Fast Handoff

Hyun Gon Kim; Doo Ho Choi

For Low Latency Handoffs(LLH) [1] to be fast and effective, the Mobile IP session keys distributed by home AAA(Authentication, Authorization, and Accounting) server should be reused [2]. This can decrease the number of signaling messages to the home network, and reduce the signaling delay when a mobile node moves from one foreign agent to another, within the same visited domain. To reuse the session keys in a secure fashion, we present a method that performs the LLH without requiring further involvement by home AAA server. To prevent session stealing attack, the method provides the confidentiality and integrity of session keys in the phase of key exchange between old foreign agent and new foreign agent by using Diffie-Hellman key agreement. It allows the mobile node to perform LLH with fast as well as secure operation.


color imaging conference | 2002

Analysis and design of secure and reliable transmission protocol in diameter

Sang Keun Yoo; Hyun Gon Kim

Diameter adopts TLS to secure transferring messages between communicating peers and defines TCP and SCTP as its transmission protocol. This paper analyzes functional requirements of transmission protocol of Diameter and proposes design of transport layer structure including integrated TLS with SCTP. First, we analyze the functional requirements of transport protocol both TCP and SCTP in Diameter as well as TLS. To integrate TLS and SCTP, we analyze characteristics of TLS and SCTP. Based on their characteristics, we derive design requirements of transport layer structure integrated TLS and SCTP.


Archive | 2002

Inter-working method of wireless internet networks (gateways)

Byung Gil Lee; Hyun Gon Kim; Chee Hang Park


Archive | 2003

Authentication, authorization and accounting (diameter) protocol-based accounting method using batch processing

Byung Gil Lee; Mal Hee Kim; Hyun Gon Kim; Sung Won Sohn


Archive | 2005

Method for verifying authorization with extensibility in AAA server

Byung Gil Lee; Hyun Gon Kim; Kyo Il Chung


Archive | 2003

System and process method for authenticating hand-off of the mobile station on the wireless internet network

Mal Hee Kim; Hyun Gon Kim; Doo Ho Choi


Lecture Notes in Computer Science | 2003

Design of an accounting architecture for load and session managed diameter-based AAA network

Byung Gil Lee; Hyun Gon Kim; Sung Won Sohn; Kil Houm Park


Lecture Notes in Computer Science | 2003

Enhancement of failover using application layer watchdog and SCTP heartbeat in diameter

Sang Keun Yoo; Hyun Gon Kim; Seung Won Sohn

Collaboration


Dive into the Hyun Gon Kim's collaboration.

Top Co-Authors

Avatar

Byung Gil Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Doo Ho Choi

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Mal Hee Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Sang Keun Yoo

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Sung Won Sohn

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Dae Young Kim

Chungnam National University

View shared research outputs
Top Co-Authors

Avatar

Kil Houm Park

Kyungpook National University

View shared research outputs
Top Co-Authors

Avatar

Kyo Il Chung

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Seung Won Sohn

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge