Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yongtae Shin is active.

Publication


Featured researches published by Yongtae Shin.


international conference on hybrid information technology | 2012

Cloud Computing Availability: Multi-clouds for Big Data Service

Sangdo Lee; Hyoungyill Park; Yongtae Shin

In The use of cloud computing has increased rapidly in many organizations. General firms have already adopted the cloud computing and successfully applied to ‘smart working’ for security & remote-services. In addition, government organizations have recently introduced this system, which is gaining more users.


international conference on information networking | 2002

Mobile Multicast Method Using the Habitude of Movement

Su-lyun Sung; Yongtae Shin; Jongwon Choe; Kwangsue Chung

This paper presents the new mobile multicast method using a habitude of movement that can reduce the total number of the graft and join by making the network including to the habitude be active. The proposed mechanism can provide a multicast service in the mobile environment with the less service delay and not too excessive overhead efficiently. Furthermore, numerical results show that our scheme compared to other mechanisms reduces a delay efficiently until the receipt of multicast service but it has a few overheads.


international conference on information networking | 2014

A security mechanism of Smart Grid AMI network through smart device mutual authentication

Sangji Lee; Jinsuk Bong; Sunhee Shin; Yongtae Shin

AMI (Advanced Meter Infrastructure), vital component to build next generation electricity grid, is an informatization service infrastructure for electricity between consumers and electricity companies. To manage the quantity of electricity consumed, AMI is composed with bidirectional communication Smart Devices. Authentication mechanism is necessary to have the access control of Smart Devices in Smart Grid communication environment. However, current ID-based authentication mechanism does not offer mutual authentication between User Device and Smart Meter. PKI (Public Key Infrastructure) in Smart Grid gives a guarantee for security, but the number of exchanged data to generate certificate for all Smart Devices is concerned. This paper proposes to couple ID-based authentication and PKI mechanism, which offers mutual authentication between Smart Devices. This proposed mechanism reduces the number of message exchanges and ultimately provides secure communication environments to Smart Devices.


international conference on computational science and its applications | 2005

Safe authentication method for security communication in ubiquitous

Hoon Ko; Bangyong Sohn; Hayoung Park; Yongtae Shin

Ubiquitous computing environment has a lot of different things as for applying existing security technical. It needs authentication method which is different kinks of confidence level or which satisfies for privacy of user’s position. Using range localizes appoint workstation or it uses assumption which is satify environment of client in Kerberos authentication method which is representation of existing authentication method but it needs new security mechanism because it is difficult to offer the condition in ubiquitous computing environment. This paper want to prove the result which is authentication method for user authentication and offering security which are using wireless certificate from experiment in ubiquitous environment. Then I propose method which is offering security and authentication in ubiquitous environment.


international conference on information networking | 2011

An efficient slotted CSMA/CA algorithm for the IEEE 802.15.4 LR-WPAN

Hyeopgeon Lee; Sanghong Lee; Kyounghwa Lee; Kwanho Song; Seunghak Ryu; Yongtae Shin

The wireless sensor networks is a network technique for the implementation of Ubiquitous computing environment. The nodes use the CSMA/CA for the communication. However, the number of nodes which are joined from the PAN coordinator is more increasing, also the competition and the overhead are more increasing. Therefore, the performance of current standard is decrease. In this paper, we design an efficient slotted CSMA/CA algorithm for the IEEE 802.15.4 LR-WPAN. The proposal algorithm using the EBE (Efficient Backoff Exponent) variable decreases the network output load, the energy consumption and the dropped packet, so the data transmission is more efficient than the current standard.


Journal of Network and Computer Applications | 2015

A study on impact of wired access networks for green Internet

Yuhwa Suh; Kiyoung Kim; Aran Kim; Yongtae Shin

The energy consumption of data network equipment used for the Internet is generally unknown, although such equipment is known to use a substantial amount of energy. In addition, there is a lack of related studies with a special focus on wired networking. This paper aims at analyzing the impact of wired access networks in data network for greening the Internet, and encouraging further research in this field by clearly presenting the significance and reasonability of this endeavor. For this work, we first introduce the background and motivation of green networking. Next, we survey the existing works and describe reasonability of our approach, and then we estimate the overall energy consumption of wired access networks by which the energy consumption of data network is driven, calculate CO2 emissions and economic costs from the energy consumption and explore savings potential of them. Going a step, we analyze the impact of energy consumption, economy, and environment from the use of wired access network equipment depending on IP traffic types. Finally, we present a new viewpoint on energy efficiency focusing on the quality-of-service with future works related to this issue. HighlightsWe estimate the overall real energy consumption, CO2 emissions and economic costs of wired access networks by network modeling.We explore energy savings potential of wired access networks.We analyze the impact of energy consumption, economy, and environment on IP traffic types.


international conference on computational science and its applications | 2006

Hierarchical clustering algorithm based on mobility in mobile ad hoc networks

Sulyun Sung; Yuhwa Seo; Yongtae Shin

This paper proposes a hierarchical clustering method based on the relative mobility pattern in mobile ad hoc environment. The relative mobility pattern between two nodes is evaluated by using a received message and the cluster is created by grouping nodes with a relative mobility below a specific threshold. Also, we create a hierarchical clustering structure by allowing a merge among clusters based on the mobility pattern. In this way, the proposed mechanism can increase a continuity of total cluster structure. Since we allow the combination of clusters, we can reduce the number of cluster and message required for a routing. To evaluate a performance of our mechanism, we compared ours with the existing LCC and WCA by a Glomosim. The simulation results show that our scheme can provide the higher stability and efficiency than existing schemes.


international conference on advanced communication technology | 2014

A study on energy savings potential of data network equipment for a green Internet

Yuhwa Suh; Jong-Seok Choi; Changho Seo; Yongtae Shin

A green Internet is becoming a major concern recently. The main concept of it is to improve energy efficiency in the Internet for reduction of unnecessary energy consumption. Generally, energy consumption of data network equipment in the Internet is unknown although they use a substantial amount of energy. In this area, there is a lack of deeper related studies with a special focus on wired networking and it still remains to be many challenges. This paper aims at exploring an impact of data network equipment for greening the Internet. We first introduce backgrounds and motivations of green networking on aspect of energy consumption. Secondly, we estimate energy consumption and energy savings potential of data network equipment in detail. Thirdly, we assess impacts of it based on IP traffic type and propose new viewpoint on energy efficiency focused on the QoS. Lastly, we propose the future works for green networking from the perspective of QoS.


international conference on information networking | 2013

A Network Partition Scheme to protect secure zone for malicious code

Jungeun Jee; Joopal Jang; Inhee Jo; Yongtae Shin

Network Partition scheme is required to protect major information for malicious code that is various and detailed by rapid growth of internet. In Network Partition types, there are a physical network partition which separates doubly internet network and business network and a logical network partition which separates by using a virtualization. The physical network partition costs high in establishment of network and maintenance. Thus, the logical network partition has low reliability of security. We suggest the Network Partition scheme to protect Secure Zone which is the domain of significant data. Secure Zone is the domain separated locally to avoid spreading the harm from an infected domain in case of detecting the malicious code. Therefore, Network Partition scheme we suggest provides the network safety and high security of reliability by protecting Secure Zone, which is the critical domain from a threat of malicious code.


information security and cryptology | 2013

Measuring method of personal information leaking risk factor to prevent leak of personal information in SNS

Myung-Ho Cheon; Jong-Seok Choi; Yongtae Shin

ABSTRACT SNS is relationship based service and its users are increasing rapidly because it can be used in variety forms as penetration rate of Smartphone increased. Accordingly personal information can be exposed easily and spread rapidly in SNS so self-control on information management, right to control open a nd distribution of own personal information is necessary. This research suggest way of measuring personal information leaking risk factor through personal information leaking possible territory’s, based on property value and relationship of person al information in SNS, personal information exposure frequency and access rate. Suggested method expects to used in strengthening self-control on information management right by arousing attention of personal information exposure to SNS users.Keywords: Privacy, Personal Information Exposure, SNS접수일(2012년 11월 19일), 수정일(1차: 2013년 6월 24일, 2차: 2013년 08월 30일), 게재확정일(2013년 9월 11일)* 본 논문은 미래창조과학부 및 정보통신산업진흥원의 대학 IT연구센터 지원사업의 연구결과로 수행되었음 (NIPA –2013-H0301-13-1003) 본 논문은 2013년도 정부(미래창조과학부)의 재원으로 한국연구재단-차세대정보컴퓨팅기술개발사업의 지원을 받아 수행된 연구임(No.2012-0029926)†주저자, [email protected]‡교신저자, [email protected] (Corresponding author)

Collaboration


Dive into the Yongtae Shin's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jongwon Choe

Sookmyung Women's University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge