Man-Pyo Hong

Learn More
Sensor nodes are often deployed in unattended environment, where an adversary can capture them, so sensor nodes may send false data to the base station. Existing authentication mechanisms can not prevent such attacks. In this paper we propose a mechanism for verifying data accuracy. For this, we divide the sensor field using Quadtree-based space(More)
SIP is able to support MH mobility at the application level using a redirect server. SIP, however, performs signaling on the basis of an open network, the Internet. Thus, it is exposed to security threats that do not exist in a closed network such as PSTN. Although much research concerning SIP security threats have been conducted, studies regarding security(More)
  • 1