Sungkyul University

Displaying 1-27 of 27 results

  • White Papers // Jul 2014

    Wireless Networks with RF Energy Harvesting: A Contemporary Survey

    Radio Frequency (RF) energy transfer and harvesting techniques have recently become alternative methods to power the next generation wireless networks. As this emerging technology enables proactive energy replenishment of wireless devices, it is advantageous in supporting applications with Quality of Service (QoS) requirement. In this paper, the authors present an...

    Provided By Sungkyul University

  • White Papers // Jan 2014

    Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Card and Biometrics

    The researchers propose an anonymous multi server authenticated key agreement scheme based on trust computing using smart card, password, and biometrics. The researchers say that this scheme not only supports multi-server but also achieves security requirements. But this scheme is vulnerable to masquerade attack, smart card attack, Denial-of-Service (DoS) attack...

    Provided By Sungkyul University

  • White Papers // Oct 2013

    A Security Method for Multiple Attacks in Sensor Networks: Against the False Report Injection Attack and the Sinkhole Attack

    In a large scale wireless sensor network, various attacks rapidly spread damages in the network from inside and outside attacks such as the false report injection attack and the sinkhole attack, respectively. These attacks drain finite energy resources and devastate constructed routing paths via compromised nodes. The security methods like...

    Provided By Sungkyul University

  • White Papers // Aug 2013

    On the Security of a Password-Only Authenticated Three-Party Key Exchange Protocol

    Password-only Authenticated Key Exchange (PAKE) protocols enable two or more parties communicating over a public network to generate a high-entropy key (known as a session key) from their low-entropy passwords which are easy for humans to remember. PAKE protocols are often designed to work in the three-party setting, in which...

    Provided By Sungkyul University

  • White Papers // Jul 2013

    An Efficient User Authentication Scheme with Smart Cards for Wireless Communications

    Several user authentication schemes purpose to provide user anonymity in wireless communication have been announced, however, many of them failed to provide user anonymity, actually. In 2011, Li and Lee proposed a secure user authentication scheme for wireless communications. Differently from the previous researches, Li and Lee claimed two more...

    Provided By Sungkyul University

  • White Papers // Jul 2013

    3S: Scalable, Secure and Seamless Inter-Domain Mobility Management Scheme in Proxy Mobile IPv6 Networks

    PMIPv6 has received considerable attention between telecommunications and the Internet communities and does not require active participation of the Mobile Node (MN) by way of network-based mobility management. In this paper, the authors are proposing a novel 3S scheme for building Scalable, Secure, and Seamless PMIPv6 domains. In the proposed...

    Provided By Sungkyul University

  • White Papers // Jul 2013

    Security Requirements of Web Content Protection System

    Since the internet is a widely used tool in many business areas these days, a large amount of contents are offered through the web. Almost all of them, however, are being provided to users without any protection. Anyone can copy and reuse the contents without permission by using features of...

    Provided By Sungkyul University

  • White Papers // May 2013

    An Improved Secure Dynamic ID-based Remote User Authentication Scheme with Key Agreement using Symmetric Cryptology

    A dynamic ID-based user authentication scheme is designed to protect leakage of a user's partial information from intruders while enabling authenticated users to be granted access to the network service. Wen and Li proposed a dynamic ID-based remote user authentication scheme with key agreement and claimed that their scheme resisted...

    Provided By Sungkyul University

  • White Papers // May 2013

    The Methodology of Security Management Cost Reduction using Security Level Lifecycle

    Security management cost for securing information is increasing rapidly, as increasing the use of electronic information. In this paper, the authors focused on the two respects. The one is security level lifecycle of the Sensitive Information (SI). The other is SI that has characteristics to decrease security level over time....

    Provided By Sungkyul University

  • White Papers // Apr 2013

    Fuzzy-Based Energy Efficient Method for Multiple Attacks in Sensor Networks: Against False Vote and Report Injection Attacks

    An adversary can easily compromise sensor nodes in wireless sensor networks, and generate multiple attacks through compromised nodes, such as false vote injection attacks and false report injection attacks. The false vote injection attack tries to drop legitimate reports in an intermediate node, and the false report injection attack tries...

    Provided By Sungkyul University

  • White Papers // Mar 2013

    Study on A Secure Remote User Authentication Scheme Using Smart Cards

    Remote user authentication scheme is a kind of way to authenticate the communication parties who transmit messages through an insecure channel. Researchers in this area have proposed some approaches during the last couple of decades. Unfortunately, most of them are proved to be insecure against various attacks. In 2009, Kim...

    Provided By Sungkyul University

  • White Papers // Mar 2013

    A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised security because they may be deployed in hostile environments and each sensor node communicates wirelessly. An adversary...

    Provided By Sungkyul University

  • White Papers // Dec 2012

    A Study on the Cloud Simulation with a Network Topology Generator

    CloudSim is a useful tool to simulate the cloud environment. It shows the service availability, the power consumption, and the network traffic of services on the cloud environment. Moreover, it supports to calculate a network communication delay through a network topology data easily. CloudSim allows inputting a file of topology...

    Provided By Sungkyul University

  • White Papers // Oct 2012

    Mobility-Aware Admission Control With QoS Guarantees in OFDMA Femtocell Networks

    The authors consider the mobility- and QoS-aware admission control problem for OFDMA femtocell networks. To mitigate strong cross-tier interference in the downlink communication, they assume each macrocell is partitioned into cell center and cell edge zones where femtocells in the edge zone share the same bandwidth with the macrocell while...

    Provided By Sungkyul University

  • White Papers // Sep 2012

    Resource Allocation for Device-to-Device Communications Underlaying LTE-Advanced Networks

    The Long Term Evolution-Advanced (LTE-Advanced) networks are being developed to provide mobile broadband services for the Fourth Generation (4G) cellular wireless systems. Device-To-device (D2D) communications is a promising technique to provide wireless peer-to-peer services and enhance spectrum utilization in the LTE-Advanced networks. In D2D communications, the User Equipments (UEs) are...

    Provided By Sungkyul University

  • White Papers // Sep 2012

    An Unequal Error Protection Using Prioritized Network Coding for Scalable Video Streaming

    In order to improve the quality of video transmission over wireless relay system, some of the studies using Network Coding (NC) and Forward Error Correction (FEC) have been studied. In this paper, layered video streaming using Scalable Video Coding (SVC) based on prioritized network coding is investigated. The authors propose...

    Provided By Sungkyul University

  • White Papers // Aug 2012

    Energy Efficient and Reliable Geographic Routing in Wireless Sensor Networks

    The wireless link can be unreliable in realistic Wireless Sensor Networks (WSNs). Energy efficient and reliable data forwarding is important because each node has limited resources. Therefore, the authors must suggest an optimal solution that considers using the information of the node's characteristics. Previous routing protocols were unsuited to realistic...

    Provided By Sungkyul University

  • White Papers // Jun 2012

    Extent Mapping Scheme for Flash Memory Devices

    Flash memory devices commonly rely on traditional address mapping schemes such as page mapping, block mapping or a hybrid of the two. Page mapping is more flexible than block mapping or hybrid mapping without being restricted by block boundaries. However, its mapping table tends to grow large quickly as the...

    Provided By Sungkyul University

  • White Papers // Mar 2012

    An Efficient and Versatile Key Management Protocol for Secure Smart Grid Communications

    Numerous entities in a smart grid network communicate with each other via unicast, multicast, and broadcast communications in order to enhance the efficiency, reliability, and intelligence of the power supply chain. This paper proposes an efficient and scalable key management protocol for secure unicast, multicast, and broadcast communications in a...

    Provided By Sungkyul University

  • White Papers // Mar 2012

    Optimized MIMO Relaying in Random Linear Coded Multiple-Access Relay Network

    The authors design a multiple-access relay network with multiple sources and relays via network coded cooperation where the radio resources in three dimensions: time, space and user are jointly optimized. For this, they derive the decoding error probability of two MIMO modes and develop an optimal MIMO mode selection and...

    Provided By Sungkyul University

  • White Papers // Jan 2012

    Fractional Frequency Reuse for Interference Management in LTE-Advanced HetNets

    Improvement of cell coverage and network capacity are two major challenges for the evolving Fourth Generation (4G) cellular wireless communication networks such as the Long Term Evolution-Advanced (LTE-Advanced) networks. In this context, hierarchical layering of cells with macro base stations coexisting with low-power and short-range base stations (corresponding to picocells...

    Provided By Sungkyul University

  • White Papers // Nov 2011

    Hybrid Key Management Architecture for Robust SCADA Systems

    Recently, as a demand for connecting Supervisory Control and Data Acquisition (SCADA) systems to open networks increases, the study of SCADA system security becomes an issue. Many researchers have proposed key management schemes for SCADA systems. However, previous studies lack the proper considerations for availability. In this paper, the authors...

    Provided By Sungkyul University

  • White Papers // Apr 2011

    Transactional In-Page Logging for Multiversion Read Consistency and Recovery

    Recently, a new buffer and storage management strategy called In-Page Logging (IPL) has been proposed for database systems based on flash memory. Its main objective is to overcome the limitations of flash memory such as erase-before-write and asymmetric read/write speeds by storing changes made to a data page in a...

    Provided By Sungkyul University

  • White Papers // Apr 2011

    Per Cluster Based Opportunistic Power Control for Heterogeneous Networks

    In this paper, the authors propose an opportunistic Power Control (PC) algorithm to mitigate the AGGregate Interference (AGGI) from active femtocells in uplink transmission. Macrocell Base Station (BS) decides the interference allowance per femtocell and femtocell users then allocate their transmit power within the allowance to suppress the cross-tier interference...

    Provided By Sungkyul University

  • White Papers // Dec 2010

    Accelerating In-Page Logging With Non-Volatile Memory

    A great deal of research has been done on solid-state storage media such as flash memory and non-volatile memory in the past few years. While NAND-type flash memory is now being considered a top alternative to magnetic disk drives, non-volatile memory (also known as storage class memory) has begun to...

    Provided By Sungkyul University

  • White Papers // Dec 2010

    IPL B+ -Tree for Flash Memory Database Systems

    NAND flash memory has become the major persistent data storage medium for mobile and embedded devices (e.g. cell phones, USB Disk Drive, mp3 player) because of its low access latency, low power consumption, and high shock resistance. On the other hand, due to its erase-before-write limitation, it is also known...

    Provided By Sungkyul University

  • White Papers // Oct 2009

    Building Femtocell More Secure with Improved Proxy Signature

    Demand for the femtocell is largely credited to the surge in a more always best connected communication conscious public. 3GPP define new architecture and security requirement for Release 9 to deal with femtocell, Home eNode B referred as HeNB. In this paper, the authors analyze the HeNB security with respect...

    Provided By Sungkyul University

  • White Papers // Sep 2012

    Resource Allocation for Device-to-Device Communications Underlaying LTE-Advanced Networks

    The Long Term Evolution-Advanced (LTE-Advanced) networks are being developed to provide mobile broadband services for the Fourth Generation (4G) cellular wireless systems. Device-To-device (D2D) communications is a promising technique to provide wireless peer-to-peer services and enhance spectrum utilization in the LTE-Advanced networks. In D2D communications, the User Equipments (UEs) are...

    Provided By Sungkyul University

  • White Papers // Jan 2012

    Fractional Frequency Reuse for Interference Management in LTE-Advanced HetNets

    Improvement of cell coverage and network capacity are two major challenges for the evolving Fourth Generation (4G) cellular wireless communication networks such as the Long Term Evolution-Advanced (LTE-Advanced) networks. In this context, hierarchical layering of cells with macro base stations coexisting with low-power and short-range base stations (corresponding to picocells...

    Provided By Sungkyul University

  • White Papers // Oct 2012

    Mobility-Aware Admission Control With QoS Guarantees in OFDMA Femtocell Networks

    The authors consider the mobility- and QoS-aware admission control problem for OFDMA femtocell networks. To mitigate strong cross-tier interference in the downlink communication, they assume each macrocell is partitioned into cell center and cell edge zones where femtocells in the edge zone share the same bandwidth with the macrocell while...

    Provided By Sungkyul University

  • White Papers // Dec 2012

    A Study on the Cloud Simulation with a Network Topology Generator

    CloudSim is a useful tool to simulate the cloud environment. It shows the service availability, the power consumption, and the network traffic of services on the cloud environment. Moreover, it supports to calculate a network communication delay through a network topology data easily. CloudSim allows inputting a file of topology...

    Provided By Sungkyul University

  • White Papers // Apr 2011

    Per Cluster Based Opportunistic Power Control for Heterogeneous Networks

    In this paper, the authors propose an opportunistic Power Control (PC) algorithm to mitigate the AGGregate Interference (AGGI) from active femtocells in uplink transmission. Macrocell Base Station (BS) decides the interference allowance per femtocell and femtocell users then allocate their transmit power within the allowance to suppress the cross-tier interference...

    Provided By Sungkyul University

  • White Papers // Oct 2009

    Building Femtocell More Secure with Improved Proxy Signature

    Demand for the femtocell is largely credited to the surge in a more always best connected communication conscious public. 3GPP define new architecture and security requirement for Release 9 to deal with femtocell, Home eNode B referred as HeNB. In this paper, the authors analyze the HeNB security with respect...

    Provided By Sungkyul University

  • White Papers // Apr 2013

    Fuzzy-Based Energy Efficient Method for Multiple Attacks in Sensor Networks: Against False Vote and Report Injection Attacks

    An adversary can easily compromise sensor nodes in wireless sensor networks, and generate multiple attacks through compromised nodes, such as false vote injection attacks and false report injection attacks. The false vote injection attack tries to drop legitimate reports in an intermediate node, and the false report injection attack tries...

    Provided By Sungkyul University

  • White Papers // Mar 2013

    Study on A Secure Remote User Authentication Scheme Using Smart Cards

    Remote user authentication scheme is a kind of way to authenticate the communication parties who transmit messages through an insecure channel. Researchers in this area have proposed some approaches during the last couple of decades. Unfortunately, most of them are proved to be insecure against various attacks. In 2009, Kim...

    Provided By Sungkyul University

  • White Papers // Mar 2013

    A Secure Routing Method for Detecting False Reports and Wormhole Attacks in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) consist of a large number of sensor nodes that monitor the environment and a few base stations that collect the sensor readings. Individual sensor nodes are subject to compromised security because they may be deployed in hostile environments and each sensor node communicates wirelessly. An adversary...

    Provided By Sungkyul University

  • White Papers // Aug 2012

    Energy Efficient and Reliable Geographic Routing in Wireless Sensor Networks

    The wireless link can be unreliable in realistic Wireless Sensor Networks (WSNs). Energy efficient and reliable data forwarding is important because each node has limited resources. Therefore, the authors must suggest an optimal solution that considers using the information of the node's characteristics. Previous routing protocols were unsuited to realistic...

    Provided By Sungkyul University

  • White Papers // Sep 2012

    An Unequal Error Protection Using Prioritized Network Coding for Scalable Video Streaming

    In order to improve the quality of video transmission over wireless relay system, some of the studies using Network Coding (NC) and Forward Error Correction (FEC) have been studied. In this paper, layered video streaming using Scalable Video Coding (SVC) based on prioritized network coding is investigated. The authors propose...

    Provided By Sungkyul University

  • White Papers // Mar 2012

    An Efficient and Versatile Key Management Protocol for Secure Smart Grid Communications

    Numerous entities in a smart grid network communicate with each other via unicast, multicast, and broadcast communications in order to enhance the efficiency, reliability, and intelligence of the power supply chain. This paper proposes an efficient and scalable key management protocol for secure unicast, multicast, and broadcast communications in a...

    Provided By Sungkyul University

  • White Papers // Mar 2012

    Optimized MIMO Relaying in Random Linear Coded Multiple-Access Relay Network

    The authors design a multiple-access relay network with multiple sources and relays via network coded cooperation where the radio resources in three dimensions: time, space and user are jointly optimized. For this, they derive the decoding error probability of two MIMO modes and develop an optimal MIMO mode selection and...

    Provided By Sungkyul University

  • White Papers // Nov 2011

    Hybrid Key Management Architecture for Robust SCADA Systems

    Recently, as a demand for connecting Supervisory Control and Data Acquisition (SCADA) systems to open networks increases, the study of SCADA system security becomes an issue. Many researchers have proposed key management schemes for SCADA systems. However, previous studies lack the proper considerations for availability. In this paper, the authors...

    Provided By Sungkyul University

  • White Papers // Apr 2011

    Transactional In-Page Logging for Multiversion Read Consistency and Recovery

    Recently, a new buffer and storage management strategy called In-Page Logging (IPL) has been proposed for database systems based on flash memory. Its main objective is to overcome the limitations of flash memory such as erase-before-write and asymmetric read/write speeds by storing changes made to a data page in a...

    Provided By Sungkyul University

  • White Papers // Dec 2010

    IPL B+ -Tree for Flash Memory Database Systems

    NAND flash memory has become the major persistent data storage medium for mobile and embedded devices (e.g. cell phones, USB Disk Drive, mp3 player) because of its low access latency, low power consumption, and high shock resistance. On the other hand, due to its erase-before-write limitation, it is also known...

    Provided By Sungkyul University

  • White Papers // Jun 2012

    Extent Mapping Scheme for Flash Memory Devices

    Flash memory devices commonly rely on traditional address mapping schemes such as page mapping, block mapping or a hybrid of the two. Page mapping is more flexible than block mapping or hybrid mapping without being restricted by block boundaries. However, its mapping table tends to grow large quickly as the...

    Provided By Sungkyul University

  • White Papers // Dec 2010

    Accelerating In-Page Logging With Non-Volatile Memory

    A great deal of research has been done on solid-state storage media such as flash memory and non-volatile memory in the past few years. While NAND-type flash memory is now being considered a top alternative to magnetic disk drives, non-volatile memory (also known as storage class memory) has begun to...

    Provided By Sungkyul University

  • White Papers // May 2013

    An Improved Secure Dynamic ID-based Remote User Authentication Scheme with Key Agreement using Symmetric Cryptology

    A dynamic ID-based user authentication scheme is designed to protect leakage of a user's partial information from intruders while enabling authenticated users to be granted access to the network service. Wen and Li proposed a dynamic ID-based remote user authentication scheme with key agreement and claimed that their scheme resisted...

    Provided By Sungkyul University

  • White Papers // Jul 2013

    An Efficient User Authentication Scheme with Smart Cards for Wireless Communications

    Several user authentication schemes purpose to provide user anonymity in wireless communication have been announced, however, many of them failed to provide user anonymity, actually. In 2011, Li and Lee proposed a secure user authentication scheme for wireless communications. Differently from the previous researches, Li and Lee claimed two more...

    Provided By Sungkyul University

  • White Papers // Jan 2014

    Security Enhanced Anonymous Multi-Server Authenticated Key Agreement Scheme Using Smart Card and Biometrics

    The researchers propose an anonymous multi server authenticated key agreement scheme based on trust computing using smart card, password, and biometrics. The researchers say that this scheme not only supports multi-server but also achieves security requirements. But this scheme is vulnerable to masquerade attack, smart card attack, Denial-of-Service (DoS) attack...

    Provided By Sungkyul University

  • White Papers // Oct 2013

    A Security Method for Multiple Attacks in Sensor Networks: Against the False Report Injection Attack and the Sinkhole Attack

    In a large scale wireless sensor network, various attacks rapidly spread damages in the network from inside and outside attacks such as the false report injection attack and the sinkhole attack, respectively. These attacks drain finite energy resources and devastate constructed routing paths via compromised nodes. The security methods like...

    Provided By Sungkyul University

  • White Papers // Aug 2013

    On the Security of a Password-Only Authenticated Three-Party Key Exchange Protocol

    Password-only Authenticated Key Exchange (PAKE) protocols enable two or more parties communicating over a public network to generate a high-entropy key (known as a session key) from their low-entropy passwords which are easy for humans to remember. PAKE protocols are often designed to work in the three-party setting, in which...

    Provided By Sungkyul University

  • White Papers // May 2013

    The Methodology of Security Management Cost Reduction using Security Level Lifecycle

    Security management cost for securing information is increasing rapidly, as increasing the use of electronic information. In this paper, the authors focused on the two respects. The one is security level lifecycle of the Sensitive Information (SI). The other is SI that has characteristics to decrease security level over time....

    Provided By Sungkyul University

  • White Papers // Jul 2013

    3S: Scalable, Secure and Seamless Inter-Domain Mobility Management Scheme in Proxy Mobile IPv6 Networks

    PMIPv6 has received considerable attention between telecommunications and the Internet communities and does not require active participation of the Mobile Node (MN) by way of network-based mobility management. In this paper, the authors are proposing a novel 3S scheme for building Scalable, Secure, and Seamless PMIPv6 domains. In the proposed...

    Provided By Sungkyul University

  • White Papers // Jul 2013

    Security Requirements of Web Content Protection System

    Since the internet is a widely used tool in many business areas these days, a large amount of contents are offered through the web. Almost all of them, however, are being provided to users without any protection. Anyone can copy and reuse the contents without permission by using features of...

    Provided By Sungkyul University

  • White Papers // Jul 2014

    Wireless Networks with RF Energy Harvesting: A Contemporary Survey

    Radio Frequency (RF) energy transfer and harvesting techniques have recently become alternative methods to power the next generation wireless networks. As this emerging technology enables proactive energy replenishment of wireless devices, it is advantageous in supporting applications with Quality of Service (QoS) requirement. In this paper, the authors present an...

    Provided By Sungkyul University