Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sang-Choon Kim is active.

Publication


Featured researches published by Sang-Choon Kim.


international conference on distributed computing systems workshops | 2007

Public Key Management Framework for Two-tier Super Peer Architecture

Hyeokchan Kwon; Sang-Choon Kim; Jaehoon Nah; Jongsoo Jang

Many Internet applications use public key infrastructure (PKI) to enable the secure transaction of confidential messages. However, the use of PKI is not consistent with the ideas of peer-to-peer networks. In this paper, we propose public key management framework to distribute public key safely without PKI infrastructure for two-tier super peer architecture. In this framework, each peer self-generates and distributes public/private key pairs. In general case, this kind of mechanism is vulnerable to man-in-the- middle attack during the public key distribution process. But the proposed mechanism can easily avoid this kind of attack.


Microelectronics Journal | 2011

Efficient co-simulation framework enhancing system-level power estimation for a platform-based SoC design

Je-Hoon Lee; Sang-Choon Kim; Young Hwan Kim; Kyoung-Rok Cho

This paper proposes a hardware-software (HW-SW) co-simulation framework that provides a unified system-level power estimation platform for analyzing efficiently both the total power consumption of the target SoC and the power profiles of its individual components. The proposed approach employs the trace-based technique that reflects the real-time behavior of the target SoC by applying various operation scenarios to the high-level model of target SoC. The trace data together with corresponding look-up table (LUT) is utilized for the power analysis. The trace data is also used to reduce the number of input vectors required to analyze the power consumption of large H/W designs through the trade-offs between the signal probability in the trace results and its effect on the power consumption. The effect of cache miss on power, occurring in the S/W program execution, is also considered in the proposed framework. The performance of the proposed approach was evaluated through the case study using the SoC design example of IEEE 802.11a wireless LAN modem. The case study illustrated that, by providing fast and accurate power analysis results, the proposed approach can enable SoC designers to manage the power consumption effectively through the reconstruction of the target SoC. The proposed framework maps all hardware IPs into FPGA. The trace based approach gets input vectors at transactor of the each IP and gets power consumption indexing a LUT. This hardware oriented technique reports the power estimation result faster than the conventional ones doing it at S/W level.


information security and cryptology | 2014

A Segmented Leap-Ahead LFSR Pseudo-Random Number Generator

Young-kyu Park; Sang-Choon Kim; Je-Hoon Lee

A LFSR is commonly used for various stream cryptography applications to generate random numbers. A Leap-ahead LFSR was presented to generate a multi-bits random number per cycle. It only requires a single LFSR and it has an advantages in hardware complexity. However, it suffers from the significant reduction of maximum period of the generated random numbers. This paper presents the new segmented Leap-ahead LFSR to solve this problem. It consists of two segmented LFSRs. We prove the efficiency of the proposed segmented architecture using the precise mathematical analysis. We also demonstrate the proposed comparison results with other counterparts using Xinilx Vertex5 FPGA. The proposed architecture can increase 2.5 times of the maximum period of generated random numbers compared to the typical Leap-ahead architecture.


Journal of Sensor Science and Technology | 2013

Wake-up Algorithm of Wireless Sensor Node Using Geometric Probability

Sung-Yeol Choi; Sang-Choon Kim; Seong Kun Kim; Je-Hoon Lee

Efficient energy management becomes a critical design issue for complex WSN (Wireless Sensor Network). Most of complex WSN employ the sleep mode to reduce the energy dissipation. However, it should cause the reduction of sensing coverage. This paper presents new wake-up algorithm for reducing energy consumption in complex WSN. The proposed wake-up algorithm is devised using geometric probability. It determined which node will be waked-up among the nodes having overlapped sensing coverage. The only one sensor node will be waked-up and it is ready to sense the event occurred uniformly. The simulation results show that the lifetime is increased by 15% and the sensing coverage is increased by 20% compared to the other scheduling methods. Consequently, the proposed wake-up algorithm can eliminate the power dissipation in the overlapped sensing coverage. Thus, it can be applicable for the various WSN suffering from the limited power supply.


international conference on new trends in information and service science | 2009

Secure Overlay for Multicast IPTV Streaming Using Trust Rendezvous Point

Hyeokchan Kwon; Sang-Choon Kim; Jaehoon Nah; Dongil Seo

Recently, there is the attempt to use overlay-based multicast, such as p2p, to distribute streaming media data for reducing network load and management cost. But there exist many security threats about overlay-based media multicast mechanism. In this paper we analyze the security threats of overlay-based multicast mechanism, and we propose the security solutions against it. In this mechanism, we introduce the trust anchor(TA) and trust rendezvous point(RP) to the SCRIBE based overlay multicast mechanism for secure multicast IPTV streaming


The Kips Transactions:partc | 2004

A Design of SERDL(Security Evaluation Rule Description Language) and Rule Execution Engine for Evaluating Security of IPv6 Network

Hyeokchan Kwon; Sang-Choon Kim

Recently, several projects have been implementing IPv6 IPsec (IP security) on the various operating systems. But there is no existing tool that checks the systems, which provide IPsec services, work properly and provide their network security services well in the IPv6 network. In this paper, we design SERDL (Security Evaluation Rule Description Language) to define security evaluation rule and rule execution engine for executing the rules defined by SERDL for evaluating security of the IPv6 network. We developed the prototype of rule execution engine using Java and C language.


ieee international conference on high performance computing data and analytics | 2007

Intelligent home network authentication: S/key-based home device authentication

Deok-Gyu Lee; Ilsun You; Sang-Choon Kim; Yun-Kyung Lee; Jong Wook Han; Kyoil Chung


IEICE Transactions on Information and Systems | 2011

A Self-Timed SRAM Design for Average-Case Performance

Je-Hoon Lee; Young-Jun Song; Sang-Choon Kim


International Journal of Contents | 2011

Analysis of Verification Methodologies Based on a SoC Platform Design

Je-Hoon Lee; Sang-Choon Kim


Archive | 2014

The Evaluation of a Performance Model for a MOST Network

Je-Hoon Lee; Yongrak Choi; Sang-Choon Kim; Si-Byung Nam

Collaboration


Dive into the Sang-Choon Kim's collaboration.

Top Co-Authors

Avatar

Je-Hoon Lee

Kangwon National University

View shared research outputs
Top Co-Authors

Avatar

Hyeokchan Kwon

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jaehoon Nah

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Young-Jun Song

Chungbuk National University

View shared research outputs
Top Co-Authors

Avatar

Deok-Gyu Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Dongil Seo

Kangwon National University

View shared research outputs
Top Co-Authors

Avatar

Jong Wook Han

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jongsoo Jang

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Kyoil Chung

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Kyoung-Rok Cho

Chungbuk National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge