Ki‐Hong Park

ORCID: 0000-0002-6867-4277
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Optical Wireless Communication Technologies
  • Advanced Wireless Communication Technologies
  • Cooperative Communication and Network Coding
  • Network Traffic and Congestion Control
  • Wireless Communication Security Techniques
  • Advanced MIMO Systems Optimization
  • UAV Applications and Optimization
  • Advanced Wireless Network Optimization
  • Underwater Vehicles and Communication Systems
  • Optical Network Technologies
  • Advanced Photonic Communication Systems
  • Satellite Communication Systems
  • Wireless Networks and Protocols
  • Software-Defined Networks and 5G
  • Wireless Communication Networks Research
  • Full-Duplex Wireless Communications
  • Network Security and Intrusion Detection
  • Mobile Ad Hoc Networks
  • Image Enhancement Techniques
  • Advanced Optical Network Technologies
  • Energy Harvesting in Wireless Networks
  • Advanced Surface Polishing Techniques
  • Advanced Wireless Communication Techniques
  • Peer-to-Peer Network Technologies
  • Video Surveillance and Tracking Methods

King Abdullah University of Science and Technology
2016-2025

Hongik University
2024

Sungkyunkwan University
2016-2023

University of Glasgow
2018-2022

Chongqing University of Posts and Telecommunications
2020-2022

Xi’an University of Posts and Telecommunications
2020-2022

Stellenbosch University
2022

Hawassa University
2022

China Mobile (China)
2020-2022

University of Ghana
2022

Denial of service (DoS) attack on the Internet has become a pressing problem. In this paper, we describe and evaluate route-based distributed packet filtering (DPF), novel approach to DoS (DDoS) prevention. We show that DPF achieves proactiveness scalability, there is an intimate relationship between effectiveness at mitigating DDoS power-law network topology.The salient features work are two-fold. First, able proactively filter out significant fraction spoofed flows prevent packets from...

10.1145/383059.383061 article EN 2001-08-27

Measurements of LAN and WAN traffic show that network exhibits variability on different scales. We examine a mechanism gives rise to self-similar discuss performance. The we study is the transfer files or messages whose size drawn from heavy-tailed distribution. In realistic client/server degree which file sizes are can directly determine self-similarity at link level. This causal relationship robust relative changes in resources, topology, influence cross-traffic, distribution interarrival...

10.1109/icnp.1996.564935 article EN 2002-12-24

Effective mitigation of denial service (DoS) attack is a pressing problem on the Internet. In many instances, DoS attacks can be prevented if spoofed source IP address traced back to its origin which allows assigning penalties offending party or isolating compromised hosts and domains from rest network. traceback mechanisms based probabilistic packet marking (PPM) have been proposed for achieving attacks. We show that marking-of interest due efficiency implementability vis-a-vis...

10.1109/infcom.2001.916716 article EN 2002-11-13

The video streaming, data transmission, and remote control in underwater call for high speed (Gbps) communication link with a long channel length (~10 meters). We present compact low power consumption wireless optical (UWOC) system utilizing 450-nm laser diode (LD) Si avalanche photodetector. With the LD operating at driving current of 80 mA an 51.3 mW, we demonstrated high-speed UWOC offering rate up to 2 Gbps over 12-meter-long, 1.5 record 20-meter-long channel. measured bit-error (BER)...

10.1364/oe.24.025502 article EN cc-by Optics Express 2016-10-24

We experimentally demonstrate a record high-speed underwater wireless optical communication (UWOC) over 7 m distance using on-off keying non-return-to-zero (OOK-NRZ) modulation scheme. The link uses commercial TO-9 packaged pigtailed 520 nm laser diode (LD) with 1.2 GHz bandwidth as the transmitter and an avalanche photodiode (APD) module receiver. At 2.3 Gbit/s transmission, measured bit error rate of received data is 2.23×10(-4), well below forward correction (FEC) threshold 2×10(-3)...

10.1364/oe.23.020743 article EN cc-by Optics Express 2015-07-30

Time, polarization, and wavelength multiplexing schemes have been used to satisfy the growing need of transmission capacity. Using space as a new dimension for communication systems has recently suggested versatile technique address future bandwidth issues. We review potentials harnessing an additional degree freedom applications including free optics, optical fiber installation, underwater wireless links, on-chip interconnects, data center indoor connections, radio frequency, acoustic...

10.1109/comst.2019.2915981 article EN IEEE Communications Surveys & Tutorials 2019-01-01

Surface passivation of unpassivated Al nanoparticles has been realized using self-assembled monolayers (SAMs). Nanoscale particles were prepared in solution by catalytic decomposition H3Al·NMe3 or H3Al·N(Me)Pyr Ti(OiPr)4 and coated situ a perfluoroalkyl carboxylic acid SAM. Because the are wet chemistry techniques solution, they free oxygen passivation. This SAM coating passivates aluminum appears to prevent oxidation air renders composite material, some extent, soluble polar organic...

10.1021/cm048264y article EN Chemistry of Materials 2005-05-01

This paper investigates the secrecy performance of a two-user downlink non-orthogonal multiple access systems. Both single-input and single-output multiple-input systems with different transmit antenna selection (TAS) strategies are considered. Depending on whether base station has global channel state information both main wiretap channels, exact closed-form expressions for outage probability (SOP) suboptimal optimal schemes obtained compared traditional space-time transmission scheme. To...

10.1109/access.2017.2737330 article EN cc-by-nc-nd IEEE Access 2017-01-01

In this paper, we investigate secure communications in two-hop wireless relaying networks with one eavesdropper. To prevent the eavesdropper from intercepting source message, destination sends an intended jamming noise to relay, which is referred as cooperative jamming. This helps protecting message being captured reliably at eavesdropper, while cancels its self-intended noise. According channel information available destination, derive three power allocation strategies minimize outage...

10.1109/jsac.2013.130908 article EN IEEE Journal on Selected Areas in Communications 2013-08-23

Underwater wireless optical communication (UWOC) is a technology that uses visible light to transmit data in underwater environment. Compared radio-frequency (RF) and acoustic techniques, UWOC has many advantages including large information bandwidth, unlicensed spectrum low power requirements. This review paper provides an overview of the latest research. Additionally, we present detailed description transmitter receiver technologies which are key components systems. Moreover, studies...

10.7567/jjap.57.08pa06 article EN Japanese Journal of Applied Physics 2018-07-17

This paper considers the secrecy outage performance of a multiple-relay assisted non-orthogonal multiple access (NOMA) network over Nakagami-m fading channels. Two time slots are utilized to transmit signals from base station destination. At first slot, broadcasts superposition signal two users all decode-and-forward relays by message mapping strategy. Subsequently, selected relay transmits via power-domain NOMA technology. Three selection schemes, i.e., optimal single (OSRS) scheme,...

10.1109/tcomm.2019.2916070 article EN IEEE Transactions on Communications 2019-05-10

In this paper, we study the secrecy performance of a mixed radio frequency-free space optical (RF-FSO) transmission systems. All RF links experience Nakagami-m fading and FSO link experiences Gamma-Gamma fading. The effect pointing error two types detection techniques (i.e., heterodyne intensity modulation with direct detection) are considered. We derive closed-form expressions for lower bound outage probability (SOP) exact average capacity (ASC). Furthermore, by utilizing expansion Meijer's...

10.1109/jphot.2017.2723422 article EN cc-by-nc-nd IEEE photonics journal 2017-07-05

We experimentally evaluate the performance of underwater wireless optical communication (UWOC) links in presence different air bubbles. Air bubbles sizes and densities are generated by using an pipe conjunction with a submersible water pump variable flow rate that helps break up large into smaller Received signal intensity measurements show significantly degrade UWOC links. Large completely obstruct beam cause deep fade. However, as bubble size decreases, level fade also decreases because is...

10.1109/jphot.2017.2682198 article EN cc-by-nc-nd IEEE photonics journal 2017-03-16

We analyze a secure dual-hop mixed radio frequency-free space optical (RF-FSO) downlink simultaneous wireless information and power transfer system. The FSO link all RF links experience Gamma-Gamma, independent, identical Nakagami-m fading, respectively. the effects of atmospheric turbulence, pointing error, detection technology, path loss, energy harvesting on secrecy performance. Signalto-noise ratios at both legitimate illegitimate receivers are not independent since they simultaneously...

10.1109/tcomm.2018.2865944 article EN IEEE Transactions on Communications 2018-08-17

We analyze the secrecy outage performance of a mixed radio frequency-free space optical (RF-FSO) transmission system with imperfect channel state information (CSI). deal single-input multiple-output wiretap model, where base station (works as relay) forwards signal transmitted from user (source) to data center destination), while an eavesdropper wiretaps confidential by decoding received signal. Both relay and are armed multiple antennas, maximal ratio combining scheme is utilized improve...

10.1109/jphot.2018.2835562 article EN cc-by-nc-nd IEEE photonics journal 2018-06-01

In this work, we analyze the secrecy outage performance of a dual-hop relay system composed multipleinput-multiple-output radio-frequency (RF) links and freespace optical (FSO) link while multiple-antenna eavesdropper wiretaps confidential information by decoding received signals from source node.The channel state (CSI) RF FSO is considered to be outdated imprecise, respectively.We propose four transmit antenna selection (TAS) schemes enhance systems.The with different TAS analyzed effects...

10.1109/tcomm.2020.2985028 article EN IEEE Transactions on Communications 2020-04-02

This paper considers a secure nonorthogonal multiple access system, where confidential messages are transmitted from base station to legitimate destinations and wiretapped by illegitimate receivers. It is assumed that all the channels experience Nakagami-m fading model nodes equipped with antennas, respectively. Both noncolluding colluding eavesdroppers considered, A max-min (MM) transmit antenna selection (TAS) strategy adopted improve secrecy performance of target in which both users user...

10.1109/tvt.2018.2824310 article EN IEEE Transactions on Vehicular Technology 2018-04-09

In this paper, we analyze the performance of a dual-hop radio frequency-underwater wireless optical communication (RF-UWOC) transmission systems wherein RF and UWOC links experience Nakagami-m fading mixture Exponential-Generalized Gamma fading, respectively. The location S is uniformly distributed in space hemisphere where relay located center hemisphere. effect bubbles level, temperature gradient, water types, detection techniques are considered. We derive closed-form expressions for...

10.1109/jphot.2020.2983016 article EN cc-by IEEE photonics journal 2020-03-30

In this paper, we investigate a mobile relaying system assisted by an unmanned aerial vehicle (UAV) with finite size of the buffer. Under buffer limit and delay constraints at UAV relay, consider dual-hop mixed free-space optical/radio frequency (FSO/RF) (i.e., source-to-relay relay-to-destination links employ FSO RF links, respectively). Taking imbalance in transmission rate between into consideration, address trajectory design relay node to obtain maximum data throughput ground user...

10.1109/twc.2020.3028068 article EN IEEE Transactions on Wireless Communications 2020-10-08

Denial of service (DoS) attack on the Internet has become a pressing problem. In this paper, we describe and evaluate route-based distributed packet filtering (DPF), novel approach to DoS (DDoS) prevention. We show that DPF achieves proactiveness scalability, there is an intimate relationship between effectiveness at mitigating DDoS power-law network topology.The salient features work are two-fold. First, able proactively filter out significant fraction spoofed flows prevent packets from...

10.1145/964723.383061 article EN ACM SIGCOMM Computer Communication Review 2001-08-27
Coming Soon ...