Jung-Il Namgung
Kookmin University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jung-Il Namgung.
Sensors | 2010
Soo Young Shin; Jung-Il Namgung; Soo-Hyun Park
In this paper, several MAC scheduling methods applicable to an underwater environment are proposed. Besides, a new marine communication system model was proposed to improve the reliability of the proposed SBMAC method. The scheme minimizes transmission of control frames except for data transmission and various transmission methods and ACK methods can be used together. Simulation models are set indices and analysis of the underwater environment is established to conduct reliable simulations. Consequently, the performance improvement of the proposed method is verified with respect to delay time, data transmission rate, memory utilization, energy efficiency, etc.
embedded and ubiquitous computing | 2010
Yung-Pyo Kim; Jung-Il Namgung; Nam-Yeol Yun; Hui-Jin Cho; Imtiaz Ahmed Khan; Soo-Hyun Park
Underwater acoustic communication, compared with Wireless Sensor Networks (WSNs) used in terrestrial environment, poses unique challenges due to the harsh underwater environment, such as limited bandwidth capacity, high and variable propagation delays, high bit error rates, and temporary losses connectivity caused by multipath and fading phenomena in spite of using a variety of applications in many areas. In this paper we specify to develop the baseboard using characteristics of ARM9 processor based on low power consumption to enhance the performance, to improve a variety of restrictions. And we describe the process of the underwater communication that demonstrates and designs test-bed of the underwater acoustic sensor network with a similar actual environment.
Wireless Personal Communications | 2016
Mukhridinkhon Ibragimov; Jae-Hoon Lee; Muppalla Kalyani; Jung-Il Namgung; Soo-Hyun Park; Okyeon Yi; Chang Hwa Kim; Yong-Kon Lim
In this paper, we briefly describe an underwater media access control protocol based on the request to send/clear to send mechanism with security algorithms, which is proposed to provide data confidentiality, authenticity, and replay attack protection. The protocol includes the counter with cipher block chaining-message authentication code (CBC-MAC) for underwater (CCM-UW) mode that is the modified form of the counter with CBC-MAC (CCM*) mode for underwater acoustic communication, based on the advanced encryption standard/agency, research and institute, academy block cipher algorithm. CCM-UW security mechanism is suitable for underwater acoustic sensor networks (UWASNs) and offers six different security levels with different security strength, energy consumption and transmission time. The results in the paper show that the protocol is not impracticable for UWASNs since it is energy efficient and saves transmission time.
embedded and ubiquitous computing | 2010
Jung-Il Namgung; Soo Young Shin; Nam-Yeol Yun; Soo-Hyun Park
This paper proposes a new media access control (MAC) protocol, Preamble-MAC (P-MAC). P-MAC is adaptive and dynamic MAC protocol based on Virtual Distance Level (VDL), which is the estimated, accumulated information of channel status and variation obtained through periodically monitoring underwater environment information such as long, unknown propagation delays and low bandwidth for underwater acoustic sensor networks.
computational science and engineering | 2009
Seung-Joo Lee; Jung-Il Namgung; Soo-Hyun Park
For the efficient routing environment of Underwater Wireless Sensor Network (UWSN), this paper proposes Underwater Direct-Diffusion (UDD) approach method in consideration of acoustic communications and movement of nodes under ocean environments without using existing RF (Radio Frequency) approach method in the ground-based environments. The data transmission method with the three types of events such as Interest, Gradient, and Reinforce will assure the reliability and maximize energy efficiency of the Interest by following methods; 1) to divide a whole network into top layer, middle layer, and bottom layer to minimize the interference by indiscreet flooding, 2) to prohibit the horizontal query between same layer, and only allow the query between different layers to minimize the energy consumption by flooding transmission 3) to delegate transmission to a non-bridge node in the same layer in case of losing a transmission route by a bridge node’s failure.
software engineering research and applications | 2005
Jung-Il Namgung; Soo Young Shin; Soo-Hyun Park; Lee-Sub Lee; Dongwon Jeong
CDN does not calculate connections between infra networks and user networks by increasing physical network. Instead, CDN decentralizes bottlenecked data traffics or contents to main parts of Internet network. By this, an amount of traffics passing through middle-mile of complicated Internet is decreased and CP (contents provider)s server loads are reduced by allocating contents to many distributed servers. In this paper, we proposed an extended Rosary overlay network which is suitable for CDN environment by modification and supplement of Pastry. The proposed Rosary extends Pastry by dividing it into inter-Pastry and intra-Pastry to fit for CDN environment, makes application-level multicasting and adopts semi-hash scheme. By adopting geographic layout technology to proximity neighbor selection technology of Pastry, Rosary node was made to act as landmark server.
OCEANS 2017 - Aberdeen | 2017
N. Mohan Krishna Varma; Soo Young Shin; Kalyani; Jung-Il Namgung; Soo-Hyun Park
Underwater acoustic sensor network (UWASN) can gather the ocean data such as temperature, salinity, pH, turbidity and dissolved oxygen etc. with the help of underwater sensor nodes. Using the underwater surface gateway, underwater sensor nodes forward the ocean data to terrestrial network for the analysis. These techniques can be used to detect the water-borne disease causing areas. Water-borne diseases can spread at certain water conditions. Based on these conditions it is easy to find the water-borne disease causing areas and to alert the health departments. Government healthcare center gets the ocean data from underwater surface gateway via internet and same data can be monitored using big data analysis for water-borne disease management. In this paper we add pre-processing and rule based engine functionalities to the underwater surface gateway to send the alert message to the local healthcare center.
Archive | 2016
Sun-Ho Yeom; Jung-Il Namgung; Soo Young Shin; Soo-Hyun Park
Becoming IoT era, RF communication on terrestrial network gets faster speed and wide communication coverage. However, because of RF has vulnerability on underwater environment, the underwater acoustic is widely adopting for replacing RF. As a result of efforts, we can suggest ‘underwater IoT’ model and its security challenge by listing UIoT security consideration and comparing underwater security protocols which are presented. Additional, we discuss side channel attack issues.
asia pacific network operations and management symposium | 2015
Khamdamboy Urunov; Jung-Il Namgung; Soo-Hyun Park
The paper considers Machine to Machine (M2M) different access methods are analyses to determine their security aspects. Financial billing system structure consists of architecture, protocol stacks, and communication mechanism. M2M/IoT is widely used in vary industrials energy, transport, industrial communication control, public/private services management, e-health, water, oil and other industries. In this security paper consists of such kind of scams and challenges, TRE mechanism, Pros and Cons of TRE possibility on Finance system.
asia pacific network operations and management symposium | 2015
Sardorjon Vakkosov; Jung-Il Namgung; Soo-Hyun Park
Internet of Things (IoT) is becoming increasingly important for todays market and gained a lot of attentions both in academia and industry. IoT can be applied into wide range of application scenarios. In case of constrained environment, for communication, resource-constrained devices are expected to employ the lightweight mechanisms. In order to provide intelligent facilities for constrained IoT devices, energy efficient service discovery mechanism must be designed. In this paper, we address technologies related with constrained environment and provide comprehensive overview of lightweight discovery protocols.