Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sun-Hee Lim is active.

Publication


Featured researches published by Sun-Hee Lim.


The Journal of Korean Institute of Communications and Information Sciences B | 2011

Study on NFC Security Analysis and UICC Alternative Effect

Sun-Hee Lim; Jae-Woo Jeon; Im-Jin Jung; Okyeon Yi

Near Field Communication is an emerging short-range wireless connectivity technology that offers proximity and different operating modes. Particularly, NFC technology has the potential to revolutionize mobile applications like payment and ticketing because NFC is more complex and mutual connectivity than RFID as the simple tag reader. Finally, NFC security technology defines the robust security protocols. This paper will specify and analyze the NFC security technology, and study the chance and its beneficial effect of the UICC card as the NFC Secure Element.


communication system software and middleware | 2007

A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro

Sun-Hee Lim; Okyeon Yi; Chang-Hoon Jung; Ki-Seok Bang

A wireless network has a handover problem between heterogeneous or homogeneous network entitles. We describe in this paper a handover scenario between a WLAN and a WiBro network and propose a fast and efficient authentication scheme for the handover between a WLAN and a WiBro. In the scheme, a Serving Network(SN) plays a key distribution center role so that the Mobile Node (MN) can be quickly associated to a Target Nerwork(TN) before starting a full authentication scheme where a remote Authentication Center (AC) is involved.


Journal of International Medical Research | 2006

Amiodarone offsets the cardioprotective effects of ischaemic preconditioning against ischaemia/reperfusion injury.

Eun Hye Koo; Young Cheol Park; Sun-Hee Lim; Hee Zoo Kim

Both ischaemic preconditioning (IPC) and amiodarone protect against myocardial ischaemia. We examined whether a combination of IPC and amiodarone demonstrated an additive protective effect in isolated rat hearts (n = 40). The controls (group I) were subjected to ischaemia/reperfusion injury; group II was subjected to cycles of IPC prior to ischaemia/reperfusion injury; group III was subjected to ischaemia in the presence of amiodarone (10−10 mol/l); and group IV was subjected to IPC followed by ischaemia in the presence of amiodarone (10−10 mol/l). Amiodarone produced the best preserved left ventricular end-systolic pressure and dP/dtmax, less developed ventricular stiffness, the shortest arrhythmia duration, and the smallest infarct size among the groups. All of the myocardial protective effects against ischaemia/reperfusion injury were diminished or abolished when IPC and amiodarone were applied sequentially.


international symposium on communications and information technologies | 2007

Optimized cryptographic binding protocol using MIPv6 over IEEE 802.16e

Hyun-Seung Park; Sun-Hee Lim; Seunghwan Yun

In the mobile telecommunication network, the expansion in Internet traffic will cause the demand for IP addresses. Further WiBro will also stimulate the interworking for IP addresses. In fact, many working groups are designing an adaptation mechanism between WiBro and IPv6/MIPv6. Accordingly, from the viewpoint of security, interworking between 802.16e and MIPv6 is essential. In this paper, we propose a secure and efficient OCBP(Optimized Cryptographic Binding Protocol) between Layer 2 and Layer 3 of WiBro system.


Journal of Communications and Networks | 2009

Formalizing the design, evaluation, and analysis of quality of protection in wireless networks

Sun-Hee Lim; Seunghwan Yun; Jongin Lim; Okyeon Yi

A diversity of wireless networks, with rapidly evolving wireless technology, are currently in service. Due to their innate physical layer vulnerability, wireless networks require enhanced security components. WLAN, WiBro, and UMTS have defined proper security components that meet standard security requirements. Extensive research has been conducted to enhance the security of individual wireless platforms, and we now have meaningful results at hand. However, with the advent of ubiquitous service, new horizontal platform service models with vertical cross-layer security are expected to be proposed. Research on synchronized security service and interoperability in a heterogeneous environment must be conducted. In heterogeneous environments, to design the balanced security components, quantitative evaluation model of security policy in wireless networks is required. To design appropriate evaluation method of security policies in heterogeneous wireless networks, we formalize the security properties in wireless networks. As the benefit of security protocols is indicated by the quality of protection (QoP), we improve the QoP model and evaluate hybrid security policy in heterogeneous wireless networks by applying to the QoP model. Deriving relative indicators from the positive impact of security points, and using these indicators to quantify a total reward function, this paper will help to assure the appropriate benchmark for combined security components in wireless networks.


Journal of Broadcast Engineering | 2008

Study on Security Framework using Security Quantitative Analysis for the Effective Multimedia Services to WLAN Mesh Network

Myoung-Sub Shin; Sun-Hee Lim; Okyeon Yi; Jongin Lim

Multimedia service whose use is rapidly increasing supports effective services to convert and transmit multimedia data based on network speed, noise circumstance, terminal computation, and type of contents for satisfying QoS. For supporting information protection of multimedia service, it offers middle level of singular security service or security mechanism which is based on policy of service provider, depending on present terminal computation and type of contents. It can support security mechanism for more effective multimedia service, if we study security of application layer and network layer for supporting multimedia service. In this paper, we propose Multimedia security framework reflected on quantitative analysis of the WLAN(Wireless Local Area Network) mesh network security using the utility function in the level of the sorority, violation and addictive compensation model.


Journal of Broadcast Engineering | 2008

Java Card-based User Authentication and Personalized IPTV Services in 3G Mobile Environment

Youn-Kyoung Park; Sun-Hee Lim; Seunghwan Yun; Okyeon Yi; Sangjin Lee

Internet Protocol Television (IPTV) provides an interactive and personalized service for realizing integrated broadcasting and telecommunication services. Set-top box (SIB) connected to TV is an essential component required for IPTV and has a unique hardware identifier used in identification and authentication. It means that subscriber authentication based on box-level identification is inconsistent with IPTV`s main intention of providing personalized services. The proposed solution is to provide an opportunity to use the flexible user-centric authentication mechanism through Java Card applets in IPTV application server and 3G networks. This paper suggests personalized services by moving the user`s private data and authentication management beyond the STB to a truly personalized device, the ubiquitous mobile phone. In addition, this paper presents effectiveness and security analysis for verifying the proposal.


information security and cryptology | 2010

A Wireless Network Structure and AKA(Authentication and Key Agreement) Protocol of Advanced Metering Infrastructure on the Smart Grid based on Binary CDMA

Jae-Woo Jeon; Sun-Hee Lim; Okyeon Yi


information security and cryptology | 2008

Effective Evaluation of Quality of Protection(QoP) in Wireless Network Environments

Hyeon-seung Kim; Sun-Hee Lim; Seunghwan Yun; Okyeon Yi; Jongin Lim


The Journal of Korean Institute of Communications and Information Sciences | 2008

The Mobile Digital ID Wallet based on LTE/SAE for 4G Networks

Yun-Seon Jung; Sun-Hee Lim; Okyeon Yi; Sangjin Lee

Collaboration


Dive into the Sun-Hee Lim's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge