Junghwa Shin

Learn More
Because of the openness and anonymity of peer-to-peer (P2P) networks, P2P participants can easily spread inauthentic resources such as viruses or worms throughout Internet. Besides, the deployment of such inauthentic resources in P2P networks has a chance of posing serious problems, thus, the trust on P2P participants needs to be carefully considered. A(More)
Indoor object tracking based on RFID is becoming increasingly prevalent. RFID is very attractive because of reasonable cost and its reliability. This paper presents a cell planning method for indoor object tracking using RFID systems. While previous studies focus on localization method, we focus on the deployment of RFID systems in terms of deployment cost,(More)
P2P (Peer-to-Peer) networks are self-organizing networks and rely on voluntary contribution from individual peers. Peers can easily access information without contributing any information or service to P2P networks. This leads to the well known "free-riding" problem. In order to encourage the cooperation of peers, there needs to be an incentive mechanism(More)
Because the P2P networks have no trusted third parties that can manage the behaviors of peers and control the malicious peers, peers can give harm to correct peers by providing inauthentic resources for the benefit of themselves in resource sharing service. Under this situation, peers can refer the reputation that reflects peer's past behaviors to download(More)
This paper presents a framework of wireless multi-hop networks exploiting an ad hoc routing protocol working on the layer 2.5, called REAL (reputation based approach on 2.5-Layer) routing protocol. The framework of REAL routing protocol incorporates following three things: a new concept of wireless multi-hop network architecture, a new 2.5-layer routing(More)
In P2P networks, peers generally interact with unknown or unfamiliar peers without trusted third parties that can manage the behaviors of peers or control the malicious peers. They can give harm to correct peers by providing inauthentic resources for the benefit of themselves in resource sharing. Under this situation, peers can refer the reputation that(More)
This paper presents a framework of wireless multi-hop networks exploiting an ad hoc routing protocol working on the layer 2.5, called CLARM (Cross Layer Adhoc-routing based on Reputation Management) routing protocol. The framework of CLARM routing protocol incorporates following three things: a new concept of wireless multi-hop network architecture, a new(More)
  • 1