Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jongpil Jeong is active.

Publication


Featured researches published by Jongpil Jeong.


hawaii international conference on system sciences | 2008

Integrated OTP-Based User Authentication Scheme Using Smart Cards in Home Networks

Jongpil Jeong; Min Young Chung; Hyunseung Choo

In this paper, we propose a new user authentication (UA) scheme based on one-time password (OTP) protocol using smart cards for home networks. The proposed scheme is to authenticate home users who uses home devices. Several techniques using technology based on biometrics, passwords, certificates, and smart cards can be used for user authentication in the similar environments. However, such user authentication techniques must be examined before being employed in an environment where home devices have low efficiency and performance. Here, we present the important security functions of home networks. The proposed authentication protocol is designed to accept the existing home networks based on the one-time password protocol. Also, it is a well suited solution and is quite satisfactory in terms of the security requirements of home networks, because of requiring low computation by performing simple operations using one-way hash functions. Our proposed scheme can protect against illegal access for home services and devices and does not allow unnecessary service access by legitimate users. Therefore, it allows the user to provide real-time privilege control and good implementation in secure home networks.


embedded and ubiquitous computing | 2006

Secure user authentication mechanism in digital home network environments

Jongpil Jeong; Min Young Chung; Hyunseung Choo

The home network is a new IT technology environment for making an offer of convenient, safe, pleasant, and blessed lives to people, making it possible to be provided with various home network services by constructing home network infrastructure regardless of devices, time, and places. This can be done by connecting home devices based on wire and wireless communication networks, such as mobile communication, Internet, and sensor network. However, there are many risks involved, for example user privacy violations and service interference. Therefore, security service is required to block these risk elements, and user authentication is an essential component for secure home network service. It enables non-authorized persons not to use home network. In this paper, an authentication protocol for secure communications is proposed for secure home network environments. The proposed authentication protocol is designed to accept existing home networks based on public key infrastructure (PKI) and Authentication, Authorization, and Accounting (AAA), which both use Kerberos


hawaii international conference on system sciences | 2013

Improved Identity Management Protocol for Secure Mobile Cloud Computing

In-Shin Park; Yoon-Deock Lee; Jongpil Jeong

Due to the rapid spread of smart phones and SNS (social network services), the use of Internet applications has increased and their need for bandwidth has begun to exceed the capacity of 3G networks. This has caused a reduction in speed and service quality and has underscored the need for network companies to invest in additional bandwidth. The increase in mobile network users has caused identity management problems for mobile service providers. This paper proposes improved IDM3G [8] to solve user ID management and security problems on mobile internet application services over 3G networks along with an additional authentication management protocol. The proposed I2DM protocol breaks up loads, which are allowed by the existing IDM3G protocols mutual authentication via mobile operator process, by sending some parts to an Internet application service provider to enhance mobile and ID management at the service provider and by reducing the network and process loads from information handling and packet transmission. This optimized protocol should improve the performance of the 3G mobile network.


The Kips Transactions:partc | 2012

SePH: Seamless Proxy-based Handoff Scheme in IP-based Heterogeneous Mobile Networks

Seung-Hyun Lee; Dong-Ryeol Shin; Jongpil Jeong

In Next Generation Wireless Networks (NGWN), lots of information, such as voice and video data, will be used in All-IP networks. It is important note that seamless service for users and handoff between heterogeneous networks must be taken into account in such environments. Therefore, in this paper, we propose a SePH(Seamless Proxy based Handoff) using PMIPv6-based proxy model which is enable to improve the performance of handoff in NGWN. The SePH can efficiently support seamless and IP-based mobility by reducing the search process. The performance results show that our proposed scheme outperforms in terms of QoS (Quality of Service) such as throughput, handoff latency, packet loss, and signaling overhead comparing to the existing schemes.


australasian telecommunication networks and applications conference | 2007

CTBS: Cost-effective target bs selection scheme in IEEE 802.16e networks

Hoon-gyu Choi; Jongpil Jeong; Hyunseung Choo

Modern wireless networks require wide bandwidth and high-speed mobility, and IEEE 802.16e is considered to be a technology capable of meeting such requirements. One of the most important issues with IEEE 802.16e is for the handover technology to provide seamless high capacity data services at a high speed rate. Data transmission to the terminal device is interrupted while scanning is performed for the handover procedure. Naturally, prolonged scanning undermines the networkpsilas performance. In order to resolve this problem, we propose a scheme for reducing the number of base stations to be scanned by performing negotiation prior to scanning. The proposed approachpsilas performance shall be evaluated by analyzing the total time required for scanning and comparing it to the conventional method, which is the IEEE 802.16e standard.


Information Systems | 2015

Cost-effective approach inter-LMA domain management and distributed mobility control scheme in proxy mobile IPv6 networks

Soonho Jang; Jongpil Jeong

The Proxy Mobile IPv6 (PMIPv6) is designed to provide network-based mobility management support to a mobile node (MN) without any involvement of the MN in mobility related signaling; hence, the proxy mobility entity performs all related signaling on behalf of the MN. The new principal functional entities of PMIPv6 are the local mobility anchor (LMA) and the mobile access gateway (MAG). In PMIPv6, all the data traffic sent from the MN gets routed to the LMA through a tunnel between the LMA and the MAG, but it still has a single point of failure (SPOF) and a bottleneck state of traffic. To solve these problems, various approaches directed towards PMIPv6 performance improvements, such as route optimization, have been proposed. However, these approaches add additional signaling to support the MNs mobility, which incurs extra network overhead and still provides difficulty when applied to multiple-LMA networks. In this paper, we propose an improved route optimization in PMIPv6-based multiple-LMA networks. All LMAs were connected to the proxy internetworking gateway (PIG), which performs inter-domain distributed mobility control. Each MAG keeps the information of all LMAs in the PMIPv6 domain, so it is possible to perform fast route optimization. Therefore, this method supported route optimization without any additional signaling because the LMA receives the state information of route optimization from the PIG.


The Kips Transactions:partc | 2012

Security Analysis and Implementation of Fast Inter-LMA domain Handover Scheme in Proxy Mobile IPv6 Networks

Hyun-Suk Chai; Jongpil Jeong

In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. The one of the protocols, Fast Handovers for Proxy Mobile IPv6(FPMIPv6)[1] has studied by the Internet Engineering Task Force(IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6(FMIPv6) in Proxy Mobile IPv6(PMIPv6), it reduces the packet loss. Conventional scheme has proposed that it cooperated with an Authentication, Authorization and Accounting(AAA) infrastructure for authentication of a mobile node in PMIPv6, Despite the best efficiency, without begin secured of signaling messages, PMIPv6 is vulnerable to various security threats such as the DoS or redirect attAcks and it can not support global mobility between PMIPv. In this paper, we analyze Kang-Park & ESS-FH scheme, and then propose an Enhanced Security scheme for FPMIPv6(ESS-FP). Based on the CGA method and the pubilc key Cryptography, ESS-FP provides the strong key exchange and the key independence in addition to improving the weaknesses for FPMIPv6. The proposed scheme is formally verified based on Ban-logic, and its handover latency is analyzed and compared with that of Kang-Park scheme[3] & ESS-FH and this paper propose inter-domain fast handover sheme for PMIPv6 using proxy-based FMIPv6(FPMIPv6).


The Journal of the Institute of Webcasting, Internet and Telecommunication | 2012

3S: Scalable, Secure and Seamless Inter-Domain Mobility Management Scheme in Proxy Mobile IPv6 Networks

Min Kang; Jongpil Jeong

PMIPv6 has received considerable attention between telecommunications and the Internet communities and does not require active participation of the Mobile Node (MN) by way of network-based mobility management. In this paper, we are proposing a novel 3S scheme for building Scalable, Secure, and Seamless PMIPv6 domains. In the proposed scheme, all of the Mobility Access Gateways (MAGs) are acting as the Local Mobility Anchor (LMA) combining a virtual ring with another MAG. General hashing is used in the efficient distributionmapping between each MN and the MN’s LMA for all MAGs. Also, the MAG and the MN are authenticated using the symmetric key. Through mathematical analysis, we verify the safety, scalability, and seamless service for 3S. Furthermore, we propose a handover procedure of 3S, which demonstrates its superiority over the existing schemes in terms of handover latency.


international conference on computational science and its applications | 2009

Fast Handover Scheme Based on Mobile Locations for IEEE 802.16e Networks

Jinwook Park; Seungtak Oh; Jongpil Jeong; Hyunseung Choo

The IEEE 802.16 is developed for fixed broadband wireless technology with wider coverage, higher data transmission speeds and excellent Quality of Services (QoS). IEEE 802.16e is an amendment to the IEEE 802.16 that corporates the handover process to support mobility under high speeds. The mobility user basically conducts hard handover process after the MS terminates the connection with the serving Base Station (BS). During handover process, Mobile Station (MS) releases its connections with serving BS, and sets up connections with the target BS. It can cause the serious problems that user suffer traffic interruption, packet delay and loss during handover process. To resolve this problem, we propose a scheme for reducing unnecessary association procedure by evaluating mobile locations. The proposed scheme offers application QoS requirements and can reduce the total handover latency. Simulation results show that the proposed scheme has better performance than the conventional method in terms of the packet transmission delay and scanning time; hence, they can reduce handover latency up to 60%.


PLOS ONE | 2017

Performance Analysis of Inter-Domain Handoff Scheme Based on Virtual Layer in PMIPv6 Networks for IP-Based Internet of Things

Chulhee Cho; Jae Young Choi; Jongpil Jeong; Tai-Myoung Chung; Kim-Kwang Raymond Choo

Lately, we see that Internet of things (IoT) is introduced in medical services for global connection among patients, sensors, and all nearby things. The principal purpose of this global connection is to provide context awareness for the purpose of bringing convenience to a patient’s life and more effectively implementing clinical processes. In health care, monitoring of biosignals of a patient has to be continuously performed while the patient moves inside and outside the hospital. Also, to monitor the accurate location and biosignals of the patient, appropriate mobility management is necessary to maintain connection between the patient and the hospital network. In this paper, a binding update scheme on PMIPv6, which reduces signal traffic during location updates by Virtual LMA (VLMA) on the top original Local Mobility Anchor (LMA) Domain, is proposed to reduce the total cost. If a Mobile Node (MN) moves to a Mobile Access Gateway (MAG)-located boundary of an adjacent LMA domain, the MN changes itself into a virtual mode, and this movement will be assumed to be a part of the VLMA domain. In the proposed scheme, MAGs eliminate global binding updates for MNs between LMA domains and significantly reduce the packet loss and latency by eliminating the handoff between LMAs. In conclusion, the performance analysis results show that the proposed scheme improves performance significantly versus PMIPv6 and HMIPv6 in terms of the binding update rate per user and average handoff latency.

Collaboration


Dive into the Jongpil Jeong's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chulhee Cho

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Jun-Dong Cho

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hana Jang

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Illkyun Im

Sungkyunkwan University

View shared research outputs
Researchain Logo
Decentralizing Knowledge