Sungha Pete Kim

Learn More
The security of sensor network s is ever more important nowadays. In this paper we propose a new protocol BROSK t o construct link-dependent keys by broadcasting key negotiation messages. The link-dependent key will be negotiated in an ad-hoc scheme. Most of the proposed security protocols in sensor networks are based on point-to-point handshaking(More)
The security of sensor networks is a challenging area. Key management is one of the crucial parts in constructing the security among sensor nodes. However, key management protocols require a great deal of energy consumption, particularly in the transmission of initial key negotiation messages. In this paper, we examine three previously published sensor(More)
OBJECTIVE This study was performed to analyze the singledose toxicity of Aconitum kusnezoffii Reichb. pharmacopuncture (AKRP). METHODS All experiments were conducted at the Korea Testing & Research Institute (KTRI), an institute authorized to perform non-clinical studies, under the regulations of Good Laboratory Practice (GLP). Twenty (20) Sprague-Dawley(More)
OBJECTIVES To evaluate the blinding effectiveness of a modified blunt sham press needle on the basis of the ability of subjects to discriminate between real and sham acupuncture needles compared with their discrimination ability based on pure guessing, and to define differences between senses (touch and vision) in the rates of correctly identified needles.(More)
The widespread deployment of wireless sensor networks (WSN) promises extensive applications in military and civilian fields. So far the major research focus has been to make WSN more useful and scalable in order to cope with future challenges of communication technologies, small emphasis is placed till now for the secure communication in WSN. A lot number(More)
Even though the primo vascular system (PVS) has been observed in large caliber lymph vessels by several independent teams, the presence of the PVS in the thoracic duct has been reported by only one team, probably because reproducing the experiment is technically difficult. This brief report presents a new, relatively straightforward method, which is a(More)
  • 1