Match!
Dong Chun Lee
Howon University
40Publications
4H-index
55Citations
Publications 41
Newest
#1Sang Young LeeH-Index: 3
#2Cheol-Jung YooH-Index: 4
Last.Dong Chun LeeH-Index: 4
view all 3 authors...
Source
#1Dong Chun LeeH-Index: 4
view all 3 authors...
Source
#1Kuinam J. Kim (KGU: Kyonggi University)H-Index: 7
#2Dong Chun LeeH-Index: 4
With the proliferation of various wireless services such as Third Generation, Fourth Generation, Wireless Local Area Network, and Personal Area Network, etc., users request for access to the Next Generation Internet in more heterogeneous networks. The network mobility working group within the Internet Engineering Task Force introduced the Network Mobility (NEMO) concept as a network mobility basic support protocol (i.e., network moves as a unit) extended from Mobile IPv6 (MIPv6). However, this s...
3 CitationsSource
#1Dong Chun LeeH-Index: 4
#2Kuinam J. Kim (KGU: Kyonggi University)H-Index: 7
Last.Jong Chan Lee (Kunsan National University)
view all 3 authors...
This paper proposes resource reservation scheme for the handoff control to accommodate mobile multimedia traffic using the location estimation and the direction estimation. This proposed scheme uses a novel mobile tracking method based on fuzzy multi-criteria decision making, in which uncertain parameters such as pilot signal strength, distance between the mobile terminal and the base station, the moving direction, and the previous location are used in the decision process using the aggregation ...
Source
#1Dong Chun LeeH-Index: 4
#2Kuinam J. Kim (KGU: Kyonggi University)H-Index: 7
Last.Jong Chan Lee (Kunsan National University)
view all 3 authors...
We propose a handoff control scheme to accommodate mobile multimedia traffic based on the resource reservation procedure using the direction estimation. This proposed scheme uses a novel mobile tracking method based on Fuzzy Multi-Criteria Decision Making (FMCDM), in which uncertain parameters such as Pilot Signal Strength (PSS), the distances between the Mobile Terminal (MT) and the Base Station (BS), the moving direction, and the previous location are used in the decision process using the agg...
Source
#1Dong Chun LeeH-Index: 4
#2Kuinam J. Kim (KGU: Kyonggi University)H-Index: 7
We propose the efficient and secure Ticket based Binding Update (TBU) protocol for MIPv6 networks. In our TBU protocol, when MN first executes the BU, its Correspondent Node (CN) issues a ticket to MN. This ticket assist that it is able to do efficiently the BU whenever Mobile Node (MN) requires the BU for the future. The proposed TBU protocol need not be repeated equal BU course whenever the MN moves to foreign link or network, and is able to be executed in environment of not operating the Home...
2 CitationsSource
#1Dong Chun Lee (Howon University)H-Index: 4
In this paper we design and implement the system that diagnoses security vulnerability in mobile IP networks. The aim of the paper is to interpret the communication network related to security vulnerability reporting process, and focuses on how the information of the vulnerability is received and processed and how the information is managed after the reception in mobile IP networks.
Source
#1Jung Doo Koo (Hanyang University)H-Index: 2
#2Jung Sook Koo (KGU: Kyonggi University)H-Index: 1
Last.Dong Chun Lee (Howon University)H-Index: 4
view all 3 authors...
We propose new binding update protocol in Mobile IPv6. In our protocol, the home agent (HA) of each node creates Diffie-Hellman session key using middle key and safely transmits the middle key, cookie, etc via secure IPSec tunnel. These are used to generate secret keys in a mobile node (MN) and a correspondent node (CN). We present that the proposed protocol is satisfied with security requirements of key agreement protocol and shows the appropriate defense in existed attack scenarios.
2 CitationsSource
#1Jung Doo Koo (Hanyang University)H-Index: 2
#2Jungsook Koo (KGU: Kyonggi University)H-Index: 1
Last.Dong Chun Lee (Howon University)H-Index: 4
view all 3 authors...
We propose a new authentication scheme of binding update protocol, which its Correspondent Node (CN) issues a ticket to Mobile Node (MN) when MN first executes the Binding Update (BU). This ticket assist that it is able to do efficiently the BU whenever MN requires the BU for the future. The proposed protocol need not be repeated equal BU course whenever the MN moves to foreign link or network, and is able to be executed in environment of not operating the Home Agent (HA), and also easies scalab...
2 CitationsSource
#1Dong Chun Lee (Howon University)H-Index: 4
We propose analytic model of the delay of the Slotted ALOHA protocol with Binary Exponential Backoff (BEB) as a collision resolution algorithm in mobile multimedia networks. We verify the proposed analytic model using the computer simulation. In numerical results, our proposed method show correct analytic model and has better performance results than previous methods in mobile multimedia networks.
Source
12345