Sun-Hee Lim
Korea University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sun-Hee Lim.
The Journal of Korean Institute of Communications and Information Sciences B | 2011
Sun-Hee Lim; Jae-Woo Jeon; Im-Jin Jung; Okyeon Yi
Near Field Communication is an emerging short-range wireless connectivity technology that offers proximity and different operating modes. Particularly, NFC technology has the potential to revolutionize mobile applications like payment and ticketing because NFC is more complex and mutual connectivity than RFID as the simple tag reader. Finally, NFC security technology defines the robust security protocols. This paper will specify and analyze the NFC security technology, and study the chance and its beneficial effect of the UICC card as the NFC Secure Element.
communication system software and middleware | 2007
Sun-Hee Lim; Okyeon Yi; Chang-Hoon Jung; Ki-Seok Bang
A wireless network has a handover problem between heterogeneous or homogeneous network entitles. We describe in this paper a handover scenario between a WLAN and a WiBro network and propose a fast and efficient authentication scheme for the handover between a WLAN and a WiBro. In the scheme, a Serving Network(SN) plays a key distribution center role so that the Mobile Node (MN) can be quickly associated to a Target Nerwork(TN) before starting a full authentication scheme where a remote Authentication Center (AC) is involved.
Journal of International Medical Research | 2006
Eun Hye Koo; Young Cheol Park; Sun-Hee Lim; Hee Zoo Kim
Both ischaemic preconditioning (IPC) and amiodarone protect against myocardial ischaemia. We examined whether a combination of IPC and amiodarone demonstrated an additive protective effect in isolated rat hearts (n = 40). The controls (group I) were subjected to ischaemia/reperfusion injury; group II was subjected to cycles of IPC prior to ischaemia/reperfusion injury; group III was subjected to ischaemia in the presence of amiodarone (10−10 mol/l); and group IV was subjected to IPC followed by ischaemia in the presence of amiodarone (10−10 mol/l). Amiodarone produced the best preserved left ventricular end-systolic pressure and dP/dtmax, less developed ventricular stiffness, the shortest arrhythmia duration, and the smallest infarct size among the groups. All of the myocardial protective effects against ischaemia/reperfusion injury were diminished or abolished when IPC and amiodarone were applied sequentially.
international symposium on communications and information technologies | 2007
Hyun-Seung Park; Sun-Hee Lim; Seunghwan Yun
In the mobile telecommunication network, the expansion in Internet traffic will cause the demand for IP addresses. Further WiBro will also stimulate the interworking for IP addresses. In fact, many working groups are designing an adaptation mechanism between WiBro and IPv6/MIPv6. Accordingly, from the viewpoint of security, interworking between 802.16e and MIPv6 is essential. In this paper, we propose a secure and efficient OCBP(Optimized Cryptographic Binding Protocol) between Layer 2 and Layer 3 of WiBro system.
Journal of Communications and Networks | 2009
Sun-Hee Lim; Seunghwan Yun; Jongin Lim; Okyeon Yi
A diversity of wireless networks, with rapidly evolving wireless technology, are currently in service. Due to their innate physical layer vulnerability, wireless networks require enhanced security components. WLAN, WiBro, and UMTS have defined proper security components that meet standard security requirements. Extensive research has been conducted to enhance the security of individual wireless platforms, and we now have meaningful results at hand. However, with the advent of ubiquitous service, new horizontal platform service models with vertical cross-layer security are expected to be proposed. Research on synchronized security service and interoperability in a heterogeneous environment must be conducted. In heterogeneous environments, to design the balanced security components, quantitative evaluation model of security policy in wireless networks is required. To design appropriate evaluation method of security policies in heterogeneous wireless networks, we formalize the security properties in wireless networks. As the benefit of security protocols is indicated by the quality of protection (QoP), we improve the QoP model and evaluate hybrid security policy in heterogeneous wireless networks by applying to the QoP model. Deriving relative indicators from the positive impact of security points, and using these indicators to quantify a total reward function, this paper will help to assure the appropriate benchmark for combined security components in wireless networks.
Journal of Broadcast Engineering | 2008
Myoung-Sub Shin; Sun-Hee Lim; Okyeon Yi; Jongin Lim
Multimedia service whose use is rapidly increasing supports effective services to convert and transmit multimedia data based on network speed, noise circumstance, terminal computation, and type of contents for satisfying QoS. For supporting information protection of multimedia service, it offers middle level of singular security service or security mechanism which is based on policy of service provider, depending on present terminal computation and type of contents. It can support security mechanism for more effective multimedia service, if we study security of application layer and network layer for supporting multimedia service. In this paper, we propose Multimedia security framework reflected on quantitative analysis of the WLAN(Wireless Local Area Network) mesh network security using the utility function in the level of the sorority, violation and addictive compensation model.
Journal of Broadcast Engineering | 2008
Youn-Kyoung Park; Sun-Hee Lim; Seunghwan Yun; Okyeon Yi; Sangjin Lee
Internet Protocol Television (IPTV) provides an interactive and personalized service for realizing integrated broadcasting and telecommunication services. Set-top box (SIB) connected to TV is an essential component required for IPTV and has a unique hardware identifier used in identification and authentication. It means that subscriber authentication based on box-level identification is inconsistent with IPTV`s main intention of providing personalized services. The proposed solution is to provide an opportunity to use the flexible user-centric authentication mechanism through Java Card applets in IPTV application server and 3G networks. This paper suggests personalized services by moving the user`s private data and authentication management beyond the STB to a truly personalized device, the ubiquitous mobile phone. In addition, this paper presents effectiveness and security analysis for verifying the proposal.
information security and cryptology | 2010
Jae-Woo Jeon; Sun-Hee Lim; Okyeon Yi
information security and cryptology | 2008
Hyeon-seung Kim; Sun-Hee Lim; Seunghwan Yun; Okyeon Yi; Jongin Lim
The Journal of Korean Institute of Communications and Information Sciences | 2008
Yun-Seon Jung; Sun-Hee Lim; Okyeon Yi; Sangjin Lee