Byungsuk Kim

Learn More
Current wireless networks that are widely deployed for various commercial applications, do not keep track of a mobile user's location. However, location information can enhance security by facilitating tracking of misbehaving users, or though implementation of location based network access. Previous work done on location estimation typically involves(More)
Wireless Ethernet (or Wi-Fi) security management is a challenging area of increased interest due to the widespread deployment of Wireless LANs (WLANs) and their well-known vulnerabilities to various types of attacks, as well as stringent scalability requirements in the dynamic wireless domain. Until the adoption of the latest security standards is complete,(More)
We provide an experimental analysis of MIMM (multi-interface mobility management) demonstrated in a heterogeneous network involving 802.11b and CDMA access technologies. We have experimented WAN-LAN handoff for real-time service (voice and video) in the testbed. The subnet handoff managed by MIMM was done seamlessly in this environment and is proved to(More)
Localization in WLAN networks has been an active area of research recently. However, most of the previous schemes in this area do not consider the presence of any malicious user within the network. The growing interest in location based services would necessitate the development of a low-cost localization scheme which is robust against the attacks from(More)
Wireless LANs (WLANs) based on IEEE 802.11 standards are becoming increasingly popular for both business and residential use. However, the very nature of wireless networks exposes the risks and vulnerabilities that a malicious user can exploit and severely compromise the network. In this paper, we provide a design of a secure wireless system (SWS) that can(More)
— Streaming real-time multimedia content over the Internet is gaining momentum in the communications, entertainment, music and interactive game industries as well as in the military. In general, streaming applications include IP telephony, multimedia broadcasts and various interactive applications such as multi-party conferences, collaborations and(More)
The integrated networking technology prototype demonstrates the capability of several emerging networking technologies to operate together seamlessly to enhance network services targeted for dynamic mobile environments such as those found in the battlefield. The prototype consists of four technologies: (1) autoconfiguration technology supports autonomous(More)
As all the participating mobile nodes are mobile in nature in MANET and due to frequent movement of the participating mobile nodes, it is very difficult to predict the topology of the networks at any time. Which leads to frequent route failures and route discovery mechanism are required to activate very frequently, it causes a loss of significant amount of(More)