Kyung-Sook Lee
Catholic University of Daegu
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Kyung-Sook Lee.
international workshop on variable structure systems | 2008
Ihn-Han Bae; Kyung-Sook Lee
As wireless connectivity is integrated into many handheld devices, streaming multimedia content among mobile ad-hoc peers is becoming a popular application. In this paper, we propose a dynamic service replication algorithm for providing guaranteed continuous streaming services to all nodes in mobile ad-hoc networks (MANETs). First, a MANET is comprised of logical grid hierarchy, and a streaming service is replicated to a lower server region of the logical grid hierarchy by considering the link availability between a mobile node and the streaming server within a server region or the popularity of the streaming service. We evaluate analytically the performance of the proposed algorithm, and compared with that of existing Qins algorithm. Evaluation results show that our algorithm can achieve better streaming performance than Qins algorithm. Therefore, the proposed algorithm not only improves the sharing availability of replicated streaming services but also controls efficiently the number of streaming service replications.
fuzzy systems and knowledge discovery | 2007
Ihn-Han Bae; Hwa-Ju Lee; Kyung-Sook Lee
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents a dynamic anomaly detection scheme that can effectively identify a group of especially harmful internal attackers - masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on this, the use pattern of a mobiles user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function with both the age of the user profile and weighted feature values. The performance of our scheme is evaluated by using a simulation.
international conference on hybrid information technology | 2009
Hwa-Ju Lee; Kyung-Sook Lee; Ihn-Han Bae
Mobile wireless networks continue to be plagued by theft of identity and intrusion. Both problems can be addressed in two different ways, either by misuse detection or anomaly-based detection. In this paper, we propose a weighted-dissimilarity-based anomaly detection method that can effectively identify abnormal behavior such as mobility patterns of mobile wireless networks. In the proposed algorithm, a normal profile is constructed from normal mobility patterns of mobile nodes in mobile wireless networks. From the constructed normal profile, the dissimilarity is computed by a weighted dissimilarity measure. If the computed dissimilarity value is greater than the dissimilarity threshold that is a system parameter, an alert message is occurred. The performance of the proposed method is evaluated through a simulation. From the result of the simulation, we know that the proposed method is superior to the performance of anomaly detection methods using other dissimilarity measures.
The Kips Transactions:partc | 2004
Kyung-Sook Lee; Sook-Jeong Ha; Sung-Kwang Chun; Ihn-Han Bae
One of the main challenges in personal communication services(PCS ) Is to locate many mobile terminals that nay move from place to place frequently. This kind of system operation is called location management. This task entails sophisticated signaling traffic and database queries. Several strategies have been proposed to improve the efficiency of location management. These strategies use location register databases to store the current locations of mobile terminals, and are vulnerable to failure of the location register databases. In this paper, we propose a fault-tolerant pointer forwarding scheme with distributed home location register in order to tolerate the failure of location registers. The performance of the proposed scheme is evaluated analytically by simulation, and Is compared with Biaz`s bypass forwarding strategy and two-path forwarding strategy.
International Journal of Knowledge-based and Intelligent Engineering Systems | 2007
Ihn-Han Bae; Hwa-Ju Lee; Kyung-Sook Lee
international conference on wireless communications, networking and mobile computing | 2008
Ihn-Han Bae; Kyung-Sook Lee
software engineering research and applications | 2007
Kyung-Sook Lee; Sook-Jeong Ha; Ihn-Han Bae
Journal of Korea Multimedia Society | 2006
Ihn-Han Bae; Hwa-Ju Lee; Kyung-Sook Lee
Journal of Korea Multimedia Society | 2005
Sook-Jeong Ha; Kyung-Sook Lee; Jin-Gyu Kim
The Kips Transactions:partb | 2001
Sun-Jin Oh; Kyung-Sook Lee; Ihn-Han Bae