Learn More
Detecting network intrusion has been not only important but also difficult in the network security research area. In Medical Sensor Network(MSN), network intrusion is critical because the data delivered through network is directly related to patients’ lives. Traditional supervised learning techniques are not appropriate to detect anomalous behaviors and new(More)
Traditional password conversion scheme for user authentication is to transform the passwords into hash values. These hash-based password schemes are comparatively simple and fast because those are based on text and famed cryptography. However, those can be exposed to cyber-attacks utilizing password by cracking tool or hash-cracking online sites. Attackers(More)
Open IPTV has attracted considerable attention and is expected to bring great changes in the IPTV service area. However, because of its openness and IP network characteristics, security is one of the major issues hindering its commercialization. For IPTV, several security mechanisms for user authentication and content protection have been applied to make(More)
In this paper, we propose an energy-efficient and secure channel group key establishment and rekeying management scheme for mobile IPTV service. Compared with traditional IPTV service, mobile IPTV is much more vulnerable to various attacks, and membership management is more complicated because of the user mobility. Our scheme provides a group key management(More)
Wireless Sensor Network (WSN) is a very attractive technique to support Ubiquitous Pervasive Computing(UPC) such as Medical Sensor Network (MSN) due to many merits such as compact form, low-power, and potential low cost. However, the more the sensor nodes exist, the more difficult the manager monitors sensor nodes individually, and faults of the sensing(More)
In recent years enhancing the capability of network services automatically and dynamically through SDN and CDN/CDNi networks has become a new field of research. These future network architectures pose both a blessing and a threat in the network field. Such network architectures can optimize the overall network services by analyzing the topology, traffic(More)
M2M(Machine-to-Machine) communication is considered to be one of the major issues in future network. Especially, M2M will bring various benefits in wireless communications when it is interconnected with cellular network. Considering the characteristics of cellular M2M network, traditional security solutions are not practical to apply because the cellular(More)