Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jun-Dong Cho is active.

Publication


Featured researches published by Jun-Dong Cho.


international conference on computational science and its applications | 2016

On Efficient SC-Based Soft Handoff Scheme in Proxy Mobile IPv6 Networks

Byunghun Song; Youngmin Kwon; Hana Jang; Jongpil Jeong; Jun-Dong Cho

This study examines mobility support functions in soft handoff and IP-based mobile network, and distinguishes the control areas in the cell’s range areas. Several important characteristics of cell configurations for soft handoff are used to propose new structures for mobile network’s efficient session control (SC). A fixed-point strategy is proposed in order to not only determine the handoff traffic’s arrival speed, but stably calculate the loss probabilities or set the optimum guard channel numbers. We suggest a False Handoff Sessions (FHS) for improving the channel use efficiency based on mobility information. Numerical analyses indicate the efficiency of the presented Markov chain model and the advantage of proposed soft handoff method.


International Journal of Ad Hoc and Ubiquitous Computing | 2016

Design and performance analysis of a cost-effective proxy-LMA mobility management scheme in IP-based mobile networks with global mobility support

Chulhee Cho; Jae-Young Choi; Jun-Dong Cho; Jongpil Jeong

Interlocking with a heterogeneous network is important because mobile users (MUs) who navigate on next-generation (NG) wireless networks want to be provided with undisrupted network services. Unfortunately, there have been few studies on methods of guaranteeing global mobility. To enhance global mobility and interoperability within the NG network environment, in this paper, we propose a proxy-local mobility anchor (Proxy-LMA) system, a mobile IP-based global inter-networking system. The purpose of the proposed Proxy-LMA system is to expand the boundary of mobility with respect to the existing mobility management protocols (PMIPv6 and MIPv6), in order to guarantee global mobility and interoperability within a heterogeneous network environment. The results revealed that the proposed Proxy-LMA system was more efficient than the other methods in terms of the signal cost and delay in a heterogeneous network environment such as wireless sensor networks.


international conference on intelligent computing | 2016

On Cross-Layer Based Handoff Scheme in Heterogeneous Mobile Networks

Byunghun Song; Junho Shin; Hana Jang; Yongkil Lee; Jongpil Jeong; Jun-Dong Cho

The necessities of the MNs are generally included in the cellular modules available in LTE/3G and Wi-Fi for high-speed Internet. Further, many people with Wi-Fi and LTE/3G use a cross-layer-based handoff as they move from one place to another. MN mobility management has been handled adequately; however, using the network-based mobility management described in this paper, carriers can manage and maintain a lower-cost network.


international conference on intelligent computing | 2016

On Multicasting-Based Fast Inter-Domain Handover Scheme in Proxy Mobile IPv6 Networks

Jongpil Jeong; Jun-Dong Cho; Younseok Choi; Youngmin Kwon; Byunghun Song

In this paper, we review the current status of PMIPv6 (Proxy Mobile IPv6) multicast listener support being standardized in the IETF and point out limitations of the current approach and we proposed a fast multicast handover procedure in inter-domain PMIPv6 network for network-based mobility management. The proposed fast multicast handover procedure in inter domain optimizes multicast management by using the context of the MNs. We evaluate the proposed fast multicast handover procedure compared to the one based through the developed analytical models and confirm that introduced fast multicast handover procedure provides reduced service interruption time and total network overhead compared to the one based during handovers.


high performance computing systems and applications | 2014

Reduction of authentication cost based on key caching for inter-MME handover support

Myungseok Song; Jae-Young Choi; Jun-Dong Cho; Jongpil Jeong; Byunghun Song; Hyungsu Lee

The recent development of mobile network technology resulted in commercialization of Long Term Evolution (LTE) network, opening the era when data can be processed at high speed even in the mobile. But a new authentication key must be created during the handover in the LTE network environment. In this case, the authentication process is performed by handover and therefore, authentication cost and delay time are caused. In this paper, we propose an efficient key caching handover technique of simplifying the authentication process by reusing the stored authentication key if old Mobility Management Entity (oMME) stores the authentication key for a certain period of time and returns it to oMME within Life Time of the authentication key when User Equipment (UE) is handed over from oMME to New Mobility Management Entity (nMME).


The International Journal of Advanced Culture Technology | 2014

Analytical Approach of New Random-walk Based Mobility Management Scheme in IP-based Mobile Networks

Myungseok Song; Jun-Dong Cho; Jongpil Jeong

In next-generation wireless networks, provisioning of IP-based network architecture and seamless transmission services are very important issues for mobile nodes. For this reason, a mobility management mechanism to support global roaming is highly regarded. These technologies bring a broader life by using a global roaming account through the connection of multiple devices or technology to mobile users; they also provide real-time multimedia services. This paper presents a comprehensive performance analysis of fast handover for hierarchical mobile IPv6 (F-HMIPv6), hierarchical mobile IPv6 (HMIPv6), Proxy Mobile IPv6 (PMIPv6), and fast Proxy Mobile IPv6 (FPMIPv6) using the fluid-flow model and random-walk model. As a result, the location update cost of the PMIPv6 and FPMIPv6 is better than that of HMIPv6 and F-HMIPv6. These results suggest that the network-based mobility management technology is superior to the hierarchical mobility management technology in the mobility environment.


International Journal of Security and Networks | 2015

Random-walk mobility management scheme for sensor-based mobile networks

Myungseok Song; Jun-Dong Cho; Jongpil Jeong

With the emergence of hyper-connected societies in which people and things are connected over networks, new generations of smart devices with multiple functionalities have been proliferating. In addition to personal communication tools, devices have been developed to bring intelligence to users, objects and spaces via inter-terminal connections, such as the internet of things IoTs and 5G mobile communications. Hence, seamless mobility of the sensors used for these communications is important for fulfilling their services. To address this need, network-based mobility management protocols can be applied to sensor networks. In this paper, we evaluate the performance of mobility management using F-HMIPv6, PMIPv6, HMIPv6 and FPMIPv6 with fluid-flow and random-walk models. Experimental results show that the location update costs of PMIPv6 and FPMIPv6 are better than those of HMIPv6 and F-HMIPv6.


innovative mobile and internet services in ubiquitous computing | 2014

Cost-Effective Proxy-LMA Mobility Management Scheme in Mobile Networks with Global Mobility Support

Chulhee Cho; Jun-Dong Cho; Jongpil Jeong

Mobile users (MUs) want to be provided with undisrupted network services when they navigate on the Next-Generation wireless networks (NGWNs). For that, interlocking with a heterogeneous network is important, but there have been few studies on the method for guaranteeing global mobility. Thus, this paper proposes the Proxy-LMA technique, the mobile IP-based global inter-networking system, to enhance global mobility and interoperability within the NGWN. The purpose of the proposed Proxy-LMA system is to expand the boundary of the mobility with regards to the existing mobility management protocol (PMIPv6 and MIPv6) in order to guarantee global mobility and interoperability within the heterogeneous network environment. The results of the performance evaluation showed that the proposed Proxy-LMA system was more efficient than other methods from the standpoint of signaling cost and delay in the heterogeneous network environment.


innovative mobile and internet services in ubiquitous computing | 2014

Seamless SPMIPv6-Based Handoff Scheme for Next-Generation Mobile Networks

Chulhee Cho; Jun-Dong Cho; Jongpil Jeong

In next-generation mobile networks (NGWNs), seamless service for users and handoffs between heterogeneous networks must be taken into account. In this paper, we propose a seamless proxy-based handoff scheme using the PMIPv6-based proxy model, which is able to improve the performance of handoffs in sensor-based mobile networks. Our scheme can efficiently support IP-based seamless mobility by reducing the search process. The performance results show that our proposed scheme outperforms the existing schemes in terms of Quality of Service (QoS), including such factors as throughput, handoff latency, packet loss, and signaling overhead.


innovative mobile and internet services in ubiquitous computing | 2014

On Security-Effective and Global Mobility Management for FPMIPv6 Networks

Hyun Suk Chai; Jun-Dong Cho; Jongpil Jeong

In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. One of the protocols, Fast Handovers for Proxy Mobile IPv6 (FPMIPv6) [1] was studied by the Internet Engineering Task Force (IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6 (FMIPv6) in Proxy Mobile IPv6 (PMIPv6), it reduces the packet loss. The conventional scheme has been proposed to cooperate with an Authentication, Authorization and Accounting (AAA) infrastructure for authentication of a mobile node in PMIPv6. Despite the fact that this approach resulted in the best efficiency, without beginning secured signaling messages, The PMIPv6 is vulnerable to various security threats and it does not support global mobility. In this paper, the authors analyzed the Kang-Park & ESS-FH scheme, and proposed an Enhanced Security scheme for FPMIPv6 (ESS-FP). Based on the CGA method and the public key Cryptography, ESS-FP provides a strong key exchange and key independence in addition to improving the weaknesses of FPMIPv6 and its handover latency was analyzed and compared with that of the Kang-Park scheme & ESS-FH.

Collaboration


Dive into the Jun-Dong Cho's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chulhee Cho

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hana Jang

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Joonho Kim

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Taehyun Lee

Sungkyunkwan University

View shared research outputs
Top Co-Authors

Avatar

Yongkil Lee

Sungkyunkwan University

View shared research outputs
Researchain Logo
Decentralizing Knowledge