Jong-Hyouk Lee

According to our database1, Jong-Hyouk Lee authored at least 120 papers between 2005 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Secure and efficient binding updates in host-based distributed mobility management.
Wireless Networks, 2019

User authentication in a tactile internet based remote surgery environment: Security issues, challenges, and future research directions.
Pervasive and Mobile Computing, 2019

DNS based Neighbor Discovery in ITS.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

2018
TEE based session key establishment protocol for secure infotainment systems.
Design Autom. for Emb. Sys., 2018

Blockchain Technologies: Blockchain Use Cases for Consumer Electronics.
IEEE Consumer Electronics Magazine, 2018

Secure and Fault-Tolerant Distributed Location Management for Intelligent 5G Wireless Networks.
IEEE Access, 2018

BIDaaS: Blockchain Based ID As a Service.
IEEE Access, 2018

2017
Home Network Prefix Renumbering in Proxy Mobile IPv6 (PMIPv6).
RFC, August, 2017

Mobile Access Gateway Configuration Parameters Controlled by the Local Mobility Anchor.
RFC, August, 2017

Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things.
Wireless Personal Communications, 2017

Blockchain-based secure firmware update for embedded devices in an Internet of Things environment.
The Journal of Supercomputing, 2017

Anonymous Authentication for Wireless Body Area Networks With Provable Security.
IEEE Systems Journal, 2017

DLM: Delayed location management in network mobility (NEMO)-based public transportation systems.
J. Network and Computer Applications, 2017

SPFP: Ticket-based secure handover for fast proxy mobile IPv6 in 5G networks.
Computer Networks, 2017

How the Blockchain Revolution Will Reshape the Consumer Electronics Industry [Future Directions].
IEEE Consumer Electronics Magazine, 2017

Security and Privacy Challenges in the Internet of Things [Security and Privacy Matters].
IEEE Consumer Electronics Magazine, 2017

Black Hat: Knowledge Resource for Cybersecurity [Society News].
IEEE Consumer Electronics Magazine, 2017

2016
Distributed proxies with fast handover support for a PURSUIT based networking architecture.
Wireless Networks, 2016

Privacy-preserving data aggregation scheme against internal attackers in smart grids.
Wireless Networks, 2016

Secure authentication with dynamic tunneling in distributed IP mobility management.
IEEE Wireless Commun., 2016

Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment.
IEEE Trans. Dependable Sec. Comput., 2016

Secure firmware validation and update for consumer devices in home networking.
IEEE Trans. Consumer Electronics, 2016

Energy-Efficient Multimedia Data Dissemination in Vehicular Clouds: Stochastic-Reward-Nets-Based Coalition Game Approach.
IEEE Systems Journal, 2016

Wireless and Mobile Technologies for the Internet of Things.
Mobile Information Systems, 2016

One-to-many authentication for access control in mobile pay-TV systems.
SCIENCE CHINA Information Sciences, 2016

Localized paging in proxy mobile IPv6 networks.
Annales des Télécommunications, 2016

A Novel DMM Architecture Based on NDN.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016

Group Key Based Session Key Establishment Protocol for a Vehicle Diagnostic.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016

Firmware Verification of Embedded Devices Based on a Blockchain.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016

Delayed Location Management in Network Mobility Environments.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016

A systematic classification of distributed IP mobility.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

2015
Utilizing the Domain Name System for Scalable and Secure Named Data Networking.
Wireless Personal Communications, 2015

Intelligent Mobile Video Surveillance System as a Bayesian Coalition Game in Vehicular Sensor Networks: Learning Automata Approach.
IEEE Trans. Intelligent Transportation Systems, 2015

Secure pseudonym-based near field communication protocol for the consumer internet of things.
IEEE Trans. Consumer Electronics, 2015

Collaborative-Learning-Automata-Based Channel Assignment With Topology Preservation for Wireless Mesh Networks Under QoS Constraints.
IEEE Systems Journal, 2015

Efficient provably secure password-based explicit authenticated key agreement.
Pervasive and Mobile Computing, 2015

Privacy Enhancing Factors in People-Nearby Applications.
JoWUA, 2015

Guest Editorial - Special Issue on Frontiers of Computing and Communications.
JCM, 2015

Pseudonyms in IPv6 ITS Communications: Use of Pseudonyms, Performance Degradation, and Optimal Pseudonym Change.
IJDSN, 2015

Load control scheme to preserve processing capacity for emergency biometric data.
Proceedings of the 11th International Conference on Heterogeneous Networking for Quality, 2015

2014
Enhanced three-factor security protocol for consumer USB mass storage devices.
IEEE Trans. Consumer Electronics, 2014

Peer-to-Peer Cooperative Caching for Data Dissemination in Urban Vehicular Communications.
IEEE Systems Journal, 2014

Editorial.
IEEE Systems Journal, 2014

Performance analysis of secure beaconing messages for GeoNetworking.
Security and Communication Networks, 2014

Performance analysis of distributed mapping system in ID/locator separation architectures.
J. Network and Computer Applications, 2014

Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol.
J. Medical Systems, 2014

Mobile Data Offloading: A Host-Based Distributed Mobility Management Approach.
IEEE Internet Computing, 2014

2013
Distributed IP mobility management from the perspective of the IETF: motivations, requirements, approaches, comparison, and challenges.
IEEE Wireless Commun., 2013

Novel Branching-Router-Based Multicast Routing Protocol with Mobility Support.
IEEE Trans. Parallel Distrib. Syst., 2013

Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols.
IEEE Trans. Industrial Electronics, 2013

Anonymous two-factor authentication for consumer roaming service in global mobility networks.
IEEE Trans. Consumer Electronics, 2013

State-Aware Pointer Forwarding Scheme With Fast Handover Support in a PMIPv6 Domain.
IEEE Systems Journal, 2013

Performance Modeling and Simulation for Future Mobile Networks.
Mathematical and Computer Modelling, 2013

UBMR-CA: Utility-based multicast routing and channel assignment with varying traffic demands in multi-radio multi-channel wireless mesh networks.
Mathematical and Computer Modelling, 2013

A dynamic N threshold prolong lifetime method for wireless sensor nodes.
Mathematical and Computer Modelling, 2013

HOTA: Handover optimized ticket-based authentication in network-based mobility management.
Inf. Sci., 2013

IPv6 Security Issues in Cooperative Intelligent Transportation Systems.
Comput. J., 2013

Distributed Local Mobility Anchor architecture for large scale mobility management.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Dynamic tunneling for network-based distributed mobility management coexisting with PMIPv6.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Localized Paging Scheme in PMIPv6.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Dynamic proxy based distributed mobility management in PURSUIT.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

Host-based distributed mobility management: Example of traffic offloading.
Proceedings of the 10th IEEE Consumer Communications and Networking Conference, 2013

2012
Performance Analysis of PMIPv6-Based NEtwork MObility for Intelligent Transportation Systems.
IEEE Trans. Vehicular Technology, 2012

Distributed context aware collaborative filtering approach for P2P service selection and recovery in wireless mesh networks.
Peer-to-Peer Networking and Applications, 2012

Securing mobile network prefix provisioning for NEMO based vehicular networks.
Mathematical and Computer Modelling, 2012

NGMIP: network-based global mobility support.
IJIPT, 2012

DSSH: Digital signature based secure handover for network-based mobility management.
Comput. Syst. Sci. Eng., 2012

A novel minimum delay maximum flow multicast algorithm to construct a multicast tree in wireless mesh networks.
Computers & Mathematics with Applications, 2012

MNPP: Mobile Network Prefix Provisioning for Enabling Route Optimization in Geographic Vehicular Networks.
Ad Hoc & Sensor Wireless Networks, 2012

Host-based distributed mobility management support protocol for IPv6 mobile networks.
Proceedings of the 8th IEEE International Conference on Wireless and Mobile Computing, 2012

A Sparse Clustering Model of Wireless Communication Networks.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Comparative study of centralized mobility management and distributed mobility management on ID/locator separation architectures.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

2011
Enhancing QoS of Mobile Devices by a New Handover Process in PMIPv6 Networks.
Wireless Personal Communications, 2011

Tunnel Restraint to Prevent Out-of-Order Packets for Route Optimization in Proxy Mobile IPv6.
Wireless Personal Communications, 2011

Secure handover for Proxy Mobile IPv6 in next-generation communications: scenarios and performance.
Wireless Communications and Mobile Computing, 2011

Reducing Communication Overhead for Nested NEMO Networks: Roaming Authentication and Access Control Structure.
IEEE Trans. Vehicular Technology, 2011

Lightweight NEtwork MObility Within PMIPv6 for Transportation Systems.
IEEE Systems Journal, 2011

Enhancing MISP with Fast Mobile IPv6 Security.
Mobile Information Systems, 2011

Improved PMIPv6 handover procedure for consumer multicast traffic.
IET Communications, 2011

Fast PMIPv6 Multicast Handover Procedure for Mobility-Unaware Mobile Nodes.
Proceedings of the 73rd IEEE Vehicular Technology Conference, 2011

Security issues of IPv6 communications in Cooperative Intelligent Transportation Systems (poster).
Proceedings of the 2011 IEEE Vehicular Networking Conference, 2011

Overhead analysis on secure beaconing for GeoNetworking.
Proceedings of the IEEE Intelligent Vehicles Symposium (IV), 2011

2010
Cost analysis of IP mobility management protocols for consumer mobile devices.
IEEE Trans. Consumer Electronics, 2010

Diffie-Hellman key based authentication in proxy mobile IPv6.
Mobile Information Systems, 2010

Guest Editorial: Advances in Wireless Mobile and Sensor Technologies.
JoWUA, 2010

caTBUA: Context-aware ticket-based binding update authentication protocol for trust-enabled mobile networks.
Int. J. Communication Systems, 2010

ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6.
IEICE Transactions, 2010

Adaptive Authentication And Registration Key Management Scheme Based On AAA Architecture.
Intelligent Automation & Soft Computing, 2010

How much do we gain by introducing route optimization in Proxy Mobile IPv6 networks?
Annales des Télécommunications, 2010

Enhanced Handover Process for Proxy Mobile IPv6.
Proceedings of the 4th International Conference on Multimedia and Ubiquitous Engineering, 2010

Comments on a One-Way Hash Chain Based Authentication for FMIPv6.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

2009
Route Optimization in Nested NEMO: Classification, Evaluation, and Analysis from NEMO Fringe Stub Perspective.
IEEE Trans. Mob. Comput., 2009

A comparative performance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6.
Telecommunication Systems, 2009

Optimizing Access Point Allocation Using Genetic Algorithmic Approach for Smart Home Environments.
Comput. J., 2009

Secure Fast Handover Scheme of Proxy Mobile IPv6.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

Authentication Scheme Based on Trust and Clustering Using Fuzzy Control in Wireless Ad-Hoc Networks.
Proceedings of the Computational Science and Its Applications, 2009

Authentication Analysis Based on Certificate for Proxy Mobile IPv6 Environment.
Proceedings of the Computational Science and Its Applications, 2009

A Performance Analysis on Route Optimization for Proxy Mobile IPv6.
Proceedings of IEEE International Conference on Communications, 2009

2008
A comparative signaling cost analysis of Hierarchical Mobile IPv6 and Proxy Mobile IPv6.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Hybrid PMIPv6 indication mechanism for interaction between MIPv6 and PMIPv6.
Proceedings of the 5th International Conference on Mobile Technology, 2008

Ticket-Based Authentication Mechanism for Proxy Mobile IPv6 Environment.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

Performance Analysis of Route Optimization on Proxy Mobile IPv6.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

PMIPv6 Route Optimization Mechanism Using the Routing Table of MAG.
Proceedings of the 3rd International Conference on Systems and Networks Communications, 2008

Group Key Locking Scheme in Mobile Multicast Environments with Modified MLDs.
Proceedings of the Challenges for Next Generation Network Operations and Service Management, 2008

Preventing Out-of-Sequence Packets on the Route Optimization Procedure in Proxy Mobile IPv6.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

An Investigation of Distance-Based Proxy Mobile Client Selection Schemes for NetLMM.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Performance evaluation of distributed multiple home agents with HAHA protocol.
Int. Journal of Network Management, 2007

A Novel Inter-LMD Handoff Mechanism for Network-Based Localized Mobility Management.
Proceedings of the Next Generation Teletraffic and Wired/Wireless Advanced Networking, 2007

Local Authentication Scheme Based on AAA in Mobile IPv6 Networks.
Proceedings of the Advances in Multimedia Modeling, 2007

PKG-MIB: Private-Mib for Package-Based Linux Systems in a Large Scale Management Domain.
Proceedings of the Agent and Multi-Agent Systems: Technologies and Applications, 2007

MANET ID : Improvement on Group Communications and ZRP.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

A Scheme to reduce the handoff latency using mSCTP in Fast Mobile IPv6.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

An Adaptive Inter-Mobility Supports Scheme for NetLMM.
Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), 2007

An Optimal Access Points Allocation Scheme Based on Genetic Algorithm.
Proceedings of the Future Generation Communication and Networking, 2007

2006
Session Key Forwarding Scheme Based on AAA Architecture in Wireless Networks.
Proceedings of the Parallel and Distributed Processing and Applications, 2006

Performance Evaluation of Dual Authentication Scheme in Mobile IPv6 Networks.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

Experimental Performance Evaluation of Mobile IPv6 Handovers over Wireless LAN.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

2005
Policy Based Handoff in MIPv6 Networks.
Proceedings of the Computational Science and Its Applications, 2005

New Binding Update Method using GDMHA in Hierarchical Mobile IPv6.
Proceedings of the Computational Science and Its Applications, 2005

Distributing Multiple Home Agents in MIPv6 Networks.
Proceedings of the High Performance Computing and Communications, 2005


  Loading...