Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sunghyun Yoon is active.

Publication


Featured researches published by Sunghyun Yoon.


international conference on advances in system simulation | 2009

A Design of Network Simulation Environment Using SSFNet

Sunghyun Yoon; Young Boo Kim

Network simulation tool is needed to verify the functionalities and performance of networks. The SSFNet (Scalable Simulation Framework Network Models) is a network simulation tool using open source software with various network simulation applications. It has been designed for the expansion of network including topology, protocols, traffic, and etc, and is able to support simulation for the large-scale network like Internet. However it is not easy for general users to perform network simulation using SSFNet because the SSFNet does not provide users with any supplementary tools for designing of network elements and topology, and analyzing of simulation results. The network modeling and analysis process must be done manually by users themselves. This circumstance makes it difficult to perform reliable network simulation. In this paper, we design a network simulation environment available for SSFNet. Using this environment, users can build network simulation model effectually and analyze the simulation results without difficulty.


Telecommunication Systems | 2015

Robust mutual trust architecture for safety critical service in heterogeneous mobile network environment

Sunghyun Yoon; Soon Seok Lee; Sang-Ha Kim

Wireless network services are more vigorous than ever due to the rapid development of mobile devices such as smartphones. Most mobile devices are evolving into multi-purpose handsets having multiple interfaces and always on, operating in a state that can receive the data any time through these different interfaces. In line with this trend, safety critical services such as e-commerce and on-line financial service have now mostly been used through the mobile environment. Since the Internet service is made up of interaction between the user and the service provider, service safety is based on mutual trust between them. In other words, the user terminal and the service provider system should have confidence in the identities of each other. In heterogeneous mobile network, the user terminal can get access to the service system through diverse access networks simultaneously. So, service provider cannot distinguish which is a valid access for service. In this paper, we propose a mutual trust architecture that can maintain a sustainable secure relation between the user terminal and the safety critical service system by using both personal and network information.


international conference on consumer electronics | 2012

Seamless and secure P2P communication scheme for mobile Internet devices behind NAT

Sunghyun Yoon; Soon Seok Lee; Sang-Ha Kim

In this paper, we propose a tunnel based peer-to-peer communication scheme which guarantees seamless and secure data exchange between mobile Internet devices behind network address translator. Since our approach allows of only the minimum delay to establish a safe communication channel between peers, it is well-suited to heterogeneous mobile network environment.


international conference on consumer electronics | 2016

An implementation of web-RTC based audio/video conferencing system on virtualized cloud

Sunghyun Yoon; Taeheum Na; Ho-Yong Ryu

Audio/video conferencing system have been increasing gradually due to enhancement of work productivity and deduction of expenditure. In this paper, we implemented a web-RTC-based audio/video conferencing system on virtualized cloud. Through this system, users can experience audio/video conference with only web browser. Also this system provides flexible capabilities through the elastic resources management from virtualized cloud.


vehicular technology conference | 2011

Seamless and Secure Service Framework in Heterogeneous Mobile Network Environment

Sunghyun Yoon; Soon Seok Lee; Sang-Ha Kim

As the mobile Internet increases with the popularization of smartphones, the conventional services are gradually being expanded to the wired and wireless integrated environment. These changes in the network environment require a new paradigm for the pursuit of safe and stable communication. In this paper, we propose a Seamless and Secure service Framework (SSF) that can maintain a sustainable secure relation between the user terminal and the sensitive service system by using both personal and network information. Typical examples of the SSF are the secure payment of bills and authentication. The SSF can block at the root the illegal use of the service (by a third party) even if personal information is leaked, as long as the user terminal is not lost. In addition, the SSF can provide a seamless service environment even if the access network is changed by movement of a terminal with the multiple network interfaces within the heterogeneous network environment.


international conference on consumer electronics | 2011

Seamless and Secure service Framework using multiple network interface terminal

Sunghyun Yoon; Sangjin Hong; Jongtae Song; Soon Seok Lee; Sang-Ha Kim

In this paper, we propose a Seamless and Secure service Framework (SSF) which guarantees secure association between users terminal and safety critical system such as payment gateway by exploiting both user information and network information. Despite the leaks of personal sensitive information, SSF provides very safe service environment in wired and wireless convergence network that vertical handover happens frequently.


international conference on consumer electronics | 2017

An implementation of network computing testbed system on open source virtualized cloud

Sunghyun Yoon; Taeheum Na; Hosun Yoon; Ho-Yong Ryu

Virtualized cloud infra have been increasing gradually due to the cost savings and operational efficiency. Virtualization technology has spread to all areas of ICT such as application and network not limited just computer resources as cloud computing environments are common. We implemented network computing testbed system on virtualized cloud in this paper. With this system, user (DevOps) can develop and experiment with a variety of virtual network functions on their own virtual network in fast cycle.


international conference on information and communication technology convergence | 2016

Design and implementation of virtual network function development toolkit

Sunghyun Yoon; Taeheum Na; Hosun Yoon; Ho-Yong Ryu

Recently, Network Function Virtualization (NFV) has been getting the attention for reason of operational efficiency, cost savings and service scalability. The NFV can be described as integrating an independent software on the general purposed hardware such as server and switch in order to replace the legacy hardware-based network device. Therefore, NFV can help ensure that carriers can quickly respond to the change of communication environment by shortening lots of cost and time to introduce new network service. In this paper, we design and implement a toolkit for NFV. This toolkit allows the DevOps development of virtual network functions in rapid cycle, which enables the carriers to deploy NFV environment quickly and easily.


international conference on signal processing and communication systems | 2011

A design of authentication architecture for service safety in heterogeneous network

Sunghyun Yoon; Soon Seok Lee; Sang-Ha Kim

Wireless network services are more vigorous than ever due to the rapid development of mobile devices. For this reason, safety critical services such as on-line financial service have now mostly been used through the mobile environment. Recent mobile devices such as smart phones are evolving into multi-purpose handsets having multiple network interfaces and operating in a state that can receive the data any time through these different interfaces. In this situation, the mobile node can get access to the service provider through diverse access networks simultaneously. Therefore, service provider cannot distinguish which is a valid access for service. In this paper, we propose a dual authentication architecture that can guarantee the service safety between the mobile node and the safety critical service provider by using both network and service level information. Our approach can block at the root the unauthorized use of the service by malicious users through personal information piracy.


Archive | 2008

Terminal shift management system and method thereof

Sunghyun Yoon; Soon-seok Lee

Collaboration


Dive into the Sunghyun Yoon's collaboration.

Top Co-Authors

Avatar

Soon Seok Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Sang-Ha Kim

Chungnam National University

View shared research outputs
Top Co-Authors

Avatar

Young Boo Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Jongtae Song

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Heuk Park

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Ho-Yong Ryu

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Soon-seok Lee

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Taeheum Na

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Eun Joo Kim

Electronics and Telecommunications Research Institute

View shared research outputs
Top Co-Authors

Avatar

Hosun Yoon

Electronics and Telecommunications Research Institute

View shared research outputs
Researchain Logo
Decentralizing Knowledge