Myung-Kyun Kim

Learn More
—Recently, a new routing algorithm called inside-out routing algorithm was proposed for routing an arbitrary permutation in the omega-based 2log 2 N stage networks. This paper discusses the problems of the inside-out routing algorithm and shows that the suggested condition for proper routing in the omega-omega network is insufficient. An extended necessary(More)
In this paper, we have proposed a security schema for Ad-hoc On-Demand Distance Vector (AODV) routing protocol. In this schema, each node in a network has a list of its neighbor nodes including a shared secret key which is obtained by executing a key agreement when joining a network. One key principle in our schema is that before executing route discovery(More)
his paper proposes a reliable routing protocol on wireless sensor networks based on the well-known AODV routing protocol. The main idea of proposed protocol is to find the route which has the highest end-to-end reliability from the source to the destination based on the hop-by-hop packet reception probability. We consider the end-to-end reliability of a(More)
In industrial distributed control systems, a sensor periodically collects a physical value from the environment and transmits it to an actuator, which performs a control action based on the value received from the sensor. For stable control operation, those messages from sensors to actuators have to be transmitted reliably end-to-end. This paper proposes a(More)
Securing mobile ad hoc networks is a nowadays emerging research topic. In this paper, we propose a self-secure routing protocol that is primarily based on public-key certificates which are provided locally and flexibly. Specifically, by taking self-securing approach, the proposed protocol makes use of a localized trust model which allows users to get(More)
Many secure routing protocols have been proposed for ad-hoc networks; however, most routing security solutions make unrealistic assumptions about the availability of key management infrastructures that are against the very nature of ad hoc networks. In this paper, we propose a distributed authentication schema for securing the AODV routing protocol. Routing(More)