Sungwoo Tak
University of Missouri
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sungwoo Tak.
international conference on computer communications and networks | 2001
Sungwoo Tak; Yugyung Lee; E. K. Park; Jerrold F. Stach
As Internet business exponentially grows, the need for high security level categories to identify groups of connections or individual transactions is manifest. The development of an efficient and secure communication protocol seems to be highly demanding. We propose the adaptive secure protocol to support secure E-commerce transactions. Our adaptive secure protocol dynamically adapts the security level based on the nature and sensitivity of the interactions among participants. The security class incorporates the security level of cryptographic techniques with a degree of information sensitivity. We implement the adaptive secure protocol and measure its performance. The experimental results show that the adaptive secure protocol provides E-commerce transactions with high quality of security service.
Computer Communications | 2004
Sungwoo Tak; Sudhir Dixit; E. K. Park
Home networks that consist of heterogeneous systems needs the design of a secure and efficient security framework due to the diverse resource limitations of each system and network resources. The existing security frameworks of home networks adapt uniform security techniques without considering diverse system resources and network resources. In this paper, we propose an end-to-end home network security framework to support secure interactions. Our security framework dynamically adjusts security classes based on the sensitivity of interactions among systems. The security class incorporates security levels of cryptographic techniques with a degree of information sensitivity.
Microprocessors and Microsystems | 2003
Sungwoo Tak; Yugyung Lee; E. K. Park
Abstract We propose a software framework for a non-repudiation security service in e-commerce (electronic commerce) on the Internet. The proposed software framework is a security framework for the non-repudiation security service. In the framework, we propose a systematic design methodology that provides a security class concept. Our framework can be differentiated from others. First, unlike other frameworks, it is interested in a successful completion of e-commerce transactions by supporting a non-repudiation security service. Second, the proposed framework is based on a dynamic mapping mechanism that improves the performance of e-commerce transactions. We made a set of experiments to measure the performance of three software frameworks—SSL, SET, and our NA framework. The experimental results show that our framework improves the performance of e-commerce transactions while providing a high quality of security services for desired e-commerce transactions.
international conference on computer communications and networks | 2000
Sungwoo Tak; E. K. Park; Jerrold F. Stach
In this paper we simplify the 4.4BSD TCP/IP protocol suite, in support of the design and implementation of embedded high performance communication software. Performance is achieved by employing a flat memory model. The flat memory model does not require protection between user mode and kernel mode. This model corresponds to the environment of current embedded systems. Additionally, we validate a technique called DAP (direct access packet-handler) to improve the performance of processing the upward flow of packets from the network interface to the network protocol layer in the communications software.
international conference on computer communications and networks | 2004
Passakon Prathombutr; Jerrold F. Stach; E. K. Park; Sungwoo Tak
When a traffic demand is changed, a virtual topology could be reconfigured to serve that traffic and to retain high performance. We purpose a reconfiguration model that minimizes costly changes in a virtual topology and maximizes network performance for a series of reconfigurations in the long term. The model includes the reconfiguration process and the policy. The reconfiguration process finds a set of non-dominated solutions using the multi-objective evolutionary algorithm (MOEA) that optimizes two objectives by using the concept of Pareto optimal. The policy picks a solution from the set of solutions above using the Markov decision process (MDP). A case study based on simulation experiments is conducted to illustrate the application of our model
international conference on computer communications and networks | 2008
Byounghoon Kim; Donggeon Lee; Junghwa Shin; E. K. Park; Sungwoo Tak
This paper presents a framework of wireless multi-hop networks exploiting an ad hoc routing protocol working on the layer 2.5, called REAL (reputation based approach on 2.5-Layer) routing protocol. The framework of REAL routing protocol incorporates following three things: a new concept of wireless multi-hop network architecture, a new 2.5-layer routing technique with a reputation management scheme, and high throughput network performance based on cross-layer approaches between MAC (medium access control) and REAL layers. We compare the performance of the REAL routing protocol with previous routing algorithms, DSR (dynamic source routing) and AODV (ad hoc on demand distance vector). A case study on practical experiments and simulations shows that the REAL routing protocol yields better performance in terms of low rate of packet loss, fast packet delivery time, and high throughput network performance.
Archive | 2007
Jun-Hee Park; Dong-Hee Kim; Kyeong-Deok Moon; Sungwoo Tak; Byounghoon Kim
Journal of Korea Multimedia Society | 2007
Donggeon Lee; Youngmann Kim; Sungwoo Tak
Journal of Korea Multimedia Society | 2009
Youngmann Kim; Sungwoo Tak
Journal of Korea Multimedia Society | 2008
Donggeon Lee; Byounghoon Kim; Sungwoo Tak