Research interest
Security for Ad Hoc Network
Ad hoc network consists of a set of mobile hosts that carry out basic networking functions without an established infrastructure. Unlike a classical network, in ad hoc network all available nodes carry out basic functions like packet forwarding, routing and network management. Thus, the security in ad hoc network is an essential component for basic network functions.
Light-weight Intrusion Detection Model for WSNs
Sensor network consists of sensor nodes with computation, sensing, and wireless communication capabilities. For securing sensor networks, any intrusion prevention mechanisms like authentication and encryption are proposed. But intrusion detection mechanism is not proposed yet. We are interested in light-weight IDS model for sensor node with limited capabilities, minimizing communication overhead, high detection ratio and low false positive ratio.
Trust evaluation scheme for secure aggregation in WSNs
Wireless sensor networks are expected to play a vital role in the upcoming age of ubiquitous computing such as home environmental, industrial, and military applications. Compared with the vivid utilization of the sensor networks, however, the security and privacy issues of the sensor networks are still in their infancy because unique challenges of the sensor networks make it difficult to adopt conventional security policies. Especially, node compromise is a critical threat because a compromised node can drain out the finite amount of energy resources in battery-powered sensor networks by launching various insider attacks such as a false data injection. Even cryptographic authentication mechanisms and key management schemes cannot suggest solutions for the real root of the insider attack from a compromised node. The trust-based secure aggregation scheme which identifies trustworthiness of sensor nodes and filters out false data of compromised nodes to make resilient sensor networks. This scheme suggests a defensible approach against the insider attack beyond conventional cryptographic solutions.
Fast Handoff in Wireless Mesh Network
Supporting user mobility is one of the most challenging issues in wireless networks. Recently, as the desires for the user mobility and high-quality multimedia services are increasing, fast handoff among base stations comes to a center of quality of connections. Therefore, minimizing re-authentication latency during handoff is crucial for supporting various promising real-time applications such as Voice over IP (VoIP) on public wireless networks. An enhanced proactive key distribution scheme for fast and secure handoff based on IEEE 802.11i authentication mechanism reduces the handoff delay by reducing the number of authentication exchanges between an access point and a mobile station during the re-authentication phase.