Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Ihn-Han Bae

The rapid growth of sense-and-respond applications and the emerging cloud computing model present a new challenge: providing publish/subscribe middleware as a scalable and elastic cloud service. The publish/subscribe interaction model is... more
The rapid growth of sense-and-respond applications and the emerging cloud computing model present a new challenge: providing publish/subscribe middleware as a scalable and elastic cloud service. The publish/subscribe interaction model is a promising solution for scalable data dissemination over wide-area networks. In addition, there have been some work on the publish/subscribe messaging paradigm that guarantees reliability and availability in the face of node and link failures. These publish/subscribe systems are commonly used in information-centric networks and edge-fog-cloud infrastructures for IoT. The IoT has an edge-fog cloud infrastructure to efficiently process massive amounts of sensing data collected from the surrounding environment. In this paper. we propose a quorum-based hierarchical fault-tolerant publish/subscribe systems (QHFPS) to enable reliable delivery of messages in the presence of link and node failures. The QHFPS efficiently distributes IoT messages to the publ...
Information-centric networking (ICN) has emerged as a promising candidate for the architecture of the future Internet of Things (IoT). ICN provides unique and location-independent content names, in-network caching and name-based routing.... more
Information-centric networking (ICN) has emerged as a promising candidate for the architecture of the future Internet of Things (IoT). ICN provides unique and location-independent content names, in-network caching and name-based routing. Consequently, locating the demanded device or content is one of the major challenges in ICN-based IoT networks. In this paper, we propose a BFH2M2: Bloom Filter based Hierarchical Hybrid Mobility Management that works in IoT with Edge-Fog Cloud architecture. The proposed BFH2M2 uses the hybrid location scheme that combines direct location with indirect location schemes depending on a moving device characteristics. Also, BFH2M2 uses time-based location update mixed with geographic-based location update, and it uses various Bloom filters: counting Bloom filter (CBF), mapping Bloom filter information base (MaBFIB) and attenuated Bloom filter (ABF) as data structures to effectively store and query the location and routing information of a node name. The...
A Critical issue in the performance of a video-on-demand system is the required I/O bandwidth of the Video server in order to satisfy clients requests, and it is the crucial resource that may cause delay increasingly. Several approaches... more
A Critical issue in the performance of a video-on-demand system is the required I/O bandwidth of the Video server in order to satisfy clients requests, and it is the crucial resource that may cause delay increasingly. Several approaches such as batching and piggybacking are used to reduce the I/O demand on the video server through sharing. Bathing approach is to make single I/O request for storage server by grouping the requests for the same object. Piggybacking is th policy for altering display rates of requests in progress for the same object to merge their corresponding I/O streams into a single stream, and serve it as a group of merged requests. In this paper, we propose a reservation-based hybrid disk bandwidth reduction policy that dynamically reserves the I/O stream capacity of a video server for popular videos according to the loads of video server in order to schedule the requests for popular videos immediately. The performance of the proposed policy is evaluated through si...
We present an efficient decentralized, symmetric mutual exclusion algorithm for the hypercube architecture. The algorithm is based on the technique which embeds a mesh into a hypercube. We compare the performance of our algorithm with... more
We present an efficient decentralized, symmetric mutual exclusion algorithm for the hypercube architecture. The algorithm is based on the technique which embeds a mesh into a hypercube. We compare the performance of our algorithm with that of Gupta et al.'s algorithm. As a result of performance comparison, the minimum round-trip delay is equal to that of Gupta et al.'s algorithm, the average blocking delay is a little longer than that of Gupta et al.'s algorithm, and the number of messages per access to critical resource is fewer than that of Gupla et al.'s algorithm.
One of the main chalenges in personal communication services (PCS) is to locate many mobile terminals that may move frequently from place to place. Such a system operation is called location management. Many network signaling traffic, and... more
One of the main chalenges in personal communication services (PCS) is to locate many mobile terminals that may move frequently from place to place. Such a system operation is called location management. Many network signaling traffic, and database queries are required to achieve such a task. Several strategies have been proposed to improve the efficiency of location management. These strategies use location register databases to store the current location on mobile terminals, and are vulnerable to failure of the location registers. In this paper, we propose a fault-tolerant pointer forwarding with distributed home location register (FT-RFDHLR) to tolerate the failure of location registers. The performance of the proposed method is evaluated by an analytical model, and is compared with thew pointer forwarding with the single home location register (PFSHLR), the pointer forwarding with distributed home location register (PFDHLR), Biaz's bypass forwarding strategy (BFS) and two-pat...
Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and con guration of the system that delivers the services. Cloud computing providers have... more
Cloud computing provides computation, software, data access, and storage services that do not require end-user knowledge of the physical location and con guration of the system that delivers the services. Cloud computing providers have setup several data centers at di erent geographical locations over the Internet in order to optimally serve needs of their customers around the world. One of the fundamental challenges in geographically distributed clouds is to provide efficient algorithms for supporting intercloud data management and dissemination. In this paper, we propose a group quorum system (GQS)-based dissemination for improving the interoperability of inter- cloud in time-critical event dissemination service, such as computing policy updating, message sharing, event noti cation and so forth. The proposed GQS-based method organizes these distributed clouds into a group quorum ring overlay to support a constant event dissemination latency. Our numerical results show that the GQS...
Several multi-hop applications developed for vehicular ad hoc networks use broadcast as a means to either discover nearby neighbors or propagate useful traffic information to other vehicles located within a certain geographical area.... more
Several multi-hop applications developed for vehicular ad hoc networks use broadcast as a means to either discover nearby neighbors or propagate useful traffic information to other vehicles located within a certain geographical area. However, the conventional broadcast mechanism may lead to the so-called broadcast storm problem, a scenario in which there is a high level of contention and collisions at the link layer due to an excessive number of broadcast packets. We present a fuzzy alert message dissemination algorithm to improve performance for road safety alert application in Vehicular Ad-hoc Network (VANET). In the proposed algorithm, when a vehicle receives an alert message for the first time, the vehicle rebroadcasts the alert message according to the fuzzy control rules for rebroadcast degree, where the rebroadcast degree depends on the current traffic density of the road and the distance between source vehicle and destination vehicle. Also, the proposed algorithm is the hybr...
The basic requirements of distributed multimedia systems are intramedia synchronization which asks the strict delay and jitter for the check period of media buffer and the scaling duration with periodic continuous media such as audio and... more
The basic requirements of distributed multimedia systems are intramedia synchronization which asks the strict delay and jitter for the check period of media buffer and the scaling duration with periodic continuous media such as audio and video media, and intermedia synchronization that needs the constraint for relative time relations among them when several media are presented in parallel. In this paper, a distributed intermedia synchronization algorithm that solves the intermedia synchronization problem by using variable service rates based on the fuzzy logic is designed and then the performance is evaluated through simulation.
The Internet of Things (IoT) envisions smart objects collecting and sharing data at a massive scale via the Internet. One challenging issue is how to disseminate data to relevant data consuming objects efficiently. In such a massive IoT... more
The Internet of Things (IoT) envisions smart objects collecting and sharing data at a massive scale via the Internet. One challenging issue is how to disseminate data to relevant data consuming objects efficiently. In such a massive IoT network, Mission critical data dissemination imposes constraints on the message transfer delay between objects. Due to the low power and communication range of IoT objects, data is relayed over multi-hops before arriving at the destination. In this paper, we propose a quorum-based adaptive dissemination algorithm (QADA) for the critical data in the monitoring-based applications of massive IoTs. To design QADA, we first design a new stepped-triangular grid structures (sT-grid) that support data dissemination, then construct a triangular grid overlay in the fog layer on the lower IoT layer and propose the data dissemination algorithm of the publish/subscribe model that adaptively uses triangle grid (T-grid) and sT-grid quorums depending on the mission ...
The appearance IoT (Internet-of-Things) applications such as environmental monitoring, smart cities, and home automation has realized the IoT concept to reality at a massive scale. Mission critical event data dissemination in massive IoT... more
The appearance IoT (Internet-of-Things) applications such as environmental monitoring, smart cities, and home automation has realized the IoT concept to reality at a massive scale. Mission critical event data dissemination in massive IoT networks imposes constraints on the message transfer delay between devices. Due to low power and communication range of IoT devices, event data is predicted to be relayed over multiple D2D (device-to-device) links before reaching the destination. The coexistence of a massive number of IoT devices poses a challenge in maximizing the successful transmission capacity of the overall network alongside reducing the multi-hop transmission delay in order to support mission critical applications. In this paper, we first propose an extended s-grid quorum: the xS-grid quorum and the ┣-shaped grid quorum, which are quorum structures that can be used in many different applications including decentralized consensus, distributed mutual exclusion, and replica control. Next, we propose a quorum-based hierarchical dissemination algorithm for critical event data executed on the edge-fog environment in massive IoTs. The proposed algorithm constructs xS-grid and ┣-shaped grid quorums in the overlay network on the edge nodes of the lower layer and the fog servers of the upper layer to support event dissemination, respectively. It supports reliable and guaranteed real-time data dissemination using the proposed algorithm. Then, the performance of quorum and algorithm which are proposed is evaluated through an analytical model.
One of the most risky maneuvers in roads with both directions in the same carriageway and only one lane for each direction is overtaking another vehicle. To overtake becomes particularly dangerous at night, with bad weather conditions and... more
One of the most risky maneuvers in roads with both directions in the same carriageway and only one lane for each direction is overtaking another vehicle. To overtake becomes particularly dangerous at night, with bad weather conditions and in curves, due to the diminution of visibility. This paper suggests a VANET-based Adaptive Overtaking Assistance System (VAOAS). The VAOAS not only considers both the driving skill of drivers and the length of overtaking/preceding vehicles, but also supports all strategies of overtaking using VANETs. The performance of VAOAS system is evaluated as the number of V2V messages, overtaking and passing sight distances, and overtaking success rate, depending on traffic densities of both directions through a simulation.
Vehicular ad hoc networks (VANET) enable promising new possibilities to enhance traffic safety and efficiency. The vision of VANET is that vehicles communicate spontaneously, exchanging traffic-related information such as road conditions... more
Vehicular ad hoc networks (VANET) enable promising new possibilities to enhance traffic safety and efficiency. The vision of VANET is that vehicles communicate spontaneously, exchanging traffic-related information such as road conditions and hazardous situations. Traffic-related information can be disseminated via multi-hop routing, thus enabling the propagation of important information over longer distances. The major contribution of this paper is to propose Hi-CAST, a hybrid intelligent broadcast algorithm for alert message dissemination in VANET. We also propose various variants of Hi-CAST considering fading factors. To deliver alert messages effectively, Hi-CAST uses delay and probabilistic broadcast protocols in conjunction with token protocols. The performance of Hi-CAST is evaluated through simulation and compared with that of other alert message dissemination algorithms. From the simulation results, we know that our Hi-CAST is superior to Simple, p-Persistence and EDB algorithms. Also, we design Hi-CAST (best) hybrid algorithm which combines Hi-CAST (parabolic) and Hi-CAST (cubic).
Vehicular ad hoc network is an emerging new technology and a promising platform for the intelligent transportation system. The most important application of VANET is disseminating emergency messages to warn drivers in case of dangerous... more
Vehicular ad hoc network is an emerging new technology and a promising platform for the intelligent transportation system. The most important application of VANET is disseminating emergency messages to warn drivers in case of dangerous events. The core technique relies on the design of a broadcast scheme. In this paper, we propose a hybrid intelligent broadcast algorithm for alert message dissemination in VANETs that is called Hi-CAST. To deliver alert message effectively, the proposed Hi-CAST algorithm uses delay and probabilistic broadcast protocols together with token protocol. The performance of the Hi-CAST is evaluated through simulation and compared with that of other alert message dissemination algorithms.
Location information services or location management systems in VCN Vehicular Communication Networks are used to provide location information about vehicles such as current location, speed, direction and report this information to other... more
Location information services or location management systems in VCN Vehicular Communication Networks are used to provide location information about vehicles such as current location, speed, direction and report this information to other vehicles or network entities that require this information. This paper designs firstly an EDQS Extended Dynamic Quorum System which is a logical structure for location management of VCNs. Secondly, we propose a QAHLS Quorum-based Adaptive Hybrid Location Service on the basis of the EDQS which uses direct location scheme mixed with indirect location scheme according to the location preference and the location mobility for a vehicle. The performance of QAHLS is evaluated by an analytical model and compared with that of existing GQS Grid Quorum System based and DQS Diamond Quorum System based location services.
Detecting misbehavior in vehicular ad-hoc networks is very important problem with wide range of implications including safety related and congestion avoidance applications. Most misbehavior detection schemes are concerned with detection... more
Detecting misbehavior in vehicular ad-hoc networks is very important problem with wide range of implications including safety related and congestion avoidance applications. Most misbehavior detection schemes are concerned with detection of malicious nodes. In most situations, vehicles would send wrong information because of selfish reasons of their owners. Because of rational behavior, it is more important to detect false information than to identify misbehaving nodes. In this paper, we propose a misbehavior-based reputation management system (MBRMS) which is composed of three components: misbehavior detection, event rebroadcast and global eviction algorithms, to detect and filter false data in vehicular ad-hoc networks (VANETs). The performance of MBRMS is evaluated through simulation. From the results of the simulation, we confirm that the proposed MBRMS identifies and evicts properly bad nodes by outlier detection method and misbehaving node risk value.
With the proliferation of wireless devices, mobile ad-hoc networking (MANET) has become a very exciting and important technology. However, MANET is more vulnerable than wired networking. Existing security mechanisms designed for wired... more
With the proliferation of wireless devices, mobile ad-hoc networking (MANET) has become a very exciting and important technology. However, MANET is more vulnerable than wired networking. Existing security mechanisms designed for wired networks have to be redesigned in this new environment. In this paper, we discuss the problem of anomaly detection in MANET. The focus of our research is on techniques for automatically constructing anomaly detection models that are capable of detecting new or unseen attacks. We propose a new anomaly detection method for MANET. The proposed method performs cross-feature analysis on the basis of rough sets to capture the inter-feature correlation patterns in normal traffic. The performance of the proposed method is evaluated through a simulation. The results show that proposed method effectively detects anomalies and identify attack types using the intrusion detection method.
Abstract—Mobile Ad hoc NETworks (MANETs) conveniently complement infrastructure-based networks, allowing mobile nodes to spontaneously form a network and share their services, including bridging with other networks, either... more
Abstract—Mobile Ad hoc NETworks (MANETs) conveniently complement infrastructure-based networks, allowing mobile nodes to spontaneously form a network and share their services, including bridging with other networks, either infrastructure-based or ad hoc. However, distributed ...
As wireless connectivity is integrated into many handheld devices, streaming multimedia content among mobile ad-hoc peers is becoming a popular application. In this paper, we propose a dynamic service replication algorithm for providing... more
As wireless connectivity is integrated into many handheld devices, streaming multimedia content among mobile ad-hoc peers is becoming a popular application. In this paper, we propose a dynamic service replication algorithm for providing guaranteed continuous streaming services to ...
Vehicular Ad-hoc network (VANET) has gaining much attention recently to improve road safety, reduce traffic congestion, and to enable efficient traffic management because of its many important applications in transportation. In this... more
Vehicular Ad-hoc network (VANET) has gaining much attention recently to improve road safety, reduce traffic congestion, and to enable efficient traffic management because of its many important applications in transportation. In this paper, we propose a dynamic safety message dissemination protocol for VANET. It can alleviate the broadcast storm problem by adaptive rebroadcast probability using fuzzy control and fading factor. The performance of the proposed approaches is evaluated through simulation. From the performance results, we can design the best protocol for safety message dissemination in VANET.
We present a scalable adaptive randomized home region scheme for mobility management in ad hoc mobile networks. In the proposed scheme, home regions are used to store the location of the network nodes and to manage the mobility of nodes.... more
We present a scalable adaptive randomized home region scheme for mobility management in ad hoc mobile networks. In the proposed scheme, home regions are used to store the location of the network nodes and to manage the mobility of nodes. When a mobile's location changes, a number of randomly selected home regions considering the gravity of locality of the mobile node are updated. When a mobile's location is needed, such as a call arrival, a number of randomly selected databases are queried. The performance of the proposed scheme is evaluated through an analytical model, and it is compared with that of the conventional randomized database group (RDG) scheme. In the future, we will study the secure SARHR, which is a security enhancement to the original SARHR scheme.
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown... more
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of
ABSTRACT
Research Interests:
Research Interests:
FM (Frequency Modulation) subcarrier multiplexing using multitone modulation for optical coherent communication system have been firstly introduced to maximize the bandwidth utilization, where the optimized number of bits allocated in... more
FM (Frequency Modulation) subcarrier multiplexing using multitone modulation for optical coherent communication system have been firstly introduced to maximize the bandwidth utilization, where the optimized number of bits allocated in each subcarrier is defined. Each subcarrier transmitting different number of data bits is modulated by the M-QAM. When we implement FDM to divide the given bandwidth within FM channel, the spectrum of the subcarrier signals in the given FM bandwidth is the quadratic noise.
... for Smart Homes * Ihn-Han Bae and Hae Geun Kim ... On detection of significant changes of context, the reasoning is triggered. We design the ontology model for ARoM and implement the prototype system of ARoM by using Protege and Jess... more
... for Smart Homes * Ihn-Han Bae and Hae Geun Kim ... On detection of significant changes of context, the reasoning is triggered. We design the ontology model for ARoM and implement the prototype system of ARoM by using Protege and Jess tools. ...
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown... more
The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being ...
Research Interests:
ABSTRACT
Research Interests:
Vehicular ad hoc networks (VANETs) will play a vital role in reducing the number of road accidents and fatalities as well as vehicular traffic optimization. In this paper, we propose TLV-eCAST, the last vehicle based early broadcasting... more
Vehicular ad hoc networks (VANETs) will play a vital role in reducing the number of road accidents and fatalities as well as vehicular traffic optimization. In this paper, we propose TLV-eCAST, the last vehicle based early broadcasting for disseminating safety-related alert message in VANET. The proposed TLV-eCAST uses the early warning system on the basis of time to collision (TTC) as well as just broadcasting by the last vehicle in the transmission range of sending vehicle. The performance of TLV-eCAST is evaluated through simulation and compared with other message dissemination algorithms.
Current driver assistance systems merely use a minimum amount of information. By using additional information of the environment hazardous situations can be detected earlier, more reliably and with a higher accuracy. This situational... more
Current driver assistance systems merely use a minimum amount of information. By using additional information of the environment hazardous situations can be detected earlier, more reliably and with a higher accuracy. This situational information has a significant impact not only on hazard detection, but also on other modules such as the human-machine-interface or knowledge distribution between vehicles over vehicular ad-hoc networks. In this paper, we design TOCADAS (TOlerant Context-Aware Driver Assistance System) in order to help prevent accidents and reduce the number of traffic fatalities. The proposed TOCADAS is aware of uncertain situational information, recognizes current context situation and provides drivers with the most effective driver assistance services for the current context situation using pattern similarity degrees.
Mobile ad hoc networks (MANETs) are networks of mobile nodes that have no fixed network infrastructure. Since the mobile node`s location changes frequently, it is an attractive area to maintain the node`s location efficiently. In this... more
Mobile ad hoc networks (MANETs) are networks of mobile nodes that have no fixed network infrastructure. Since the mobile node`s location changes frequently, it is an attractive area to maintain the node`s location efficiently. In this paper, we present an adaptive randomized database group (ARDG) scheme to manage the mobile nodes mobility in MHANETs. The proposed scheme stores the network nodes` location in location databases to manage the nodes` mobility. When a mobile node changes its location or needs a node`s location, the node randomly select some databases to update or que교 the location information. The number of the selected databases is fixed in the case of querying while the number of the databases is determined according to the node`s popularity in the case of updating. We evaluated the performance of the proposed scheme using an analytical model, and compared the performance with that of the conventional randomized database group (RDG) scheme.
Research Interests:
Research Interests:
Abstract Recursive Patching recursively shares existing video streams with asynchronous clients for efficient multicast in large-scale video on demand systems. In this paper, we propose Practical Patching that removes unnecessary data... more
Abstract Recursive Patching recursively shares existing video streams with asynchronous clients for efficient multicast in large-scale video on demand systems. In this paper, we propose Practical Patching that removes unnecessary data included in transition streams ...

And 8 more