Hyuk Lim

ORCID: 0000-0002-9926-3913
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Networks and Protocols
  • Software-Defined Networks and 5G
  • Mobile Ad Hoc Networks
  • Network Security and Intrusion Detection
  • Cooperative Communication and Network Coding
  • Network Traffic and Congestion Control
  • Advanced MIMO Systems Optimization
  • Indoor and Outdoor Localization Technologies
  • Advanced Wireless Network Optimization
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Energy Efficient Wireless Sensor Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Opportunistic and Delay-Tolerant Networks
  • Wireless Communication Networks Research
  • IoT and Edge/Fog Computing
  • Underwater Vehicles and Communication Systems
  • Information and Cyber Security
  • Energy Harvesting in Wireless Networks
  • Caching and Content Delivery
  • Iterative Learning Control Systems
  • Cloud Computing and Resource Management
  • Smart Grid Energy Management
  • Full-Duplex Wireless Communications
  • Advanced machining processes and optimization

Gwangju Institute of Science and Technology
2013-2022

Korea Institute of Science and Technology
2022

Singapore University of Technology and Design
2018

ORCID
2018

Institute of Science and Technology
2016

Nanyang Technological University
2014

Qualcomm (United Kingdom)
2010

Market Matters
2010

Korea Institute of Science & Technology Information
2008-2010

University of Illinois Urbana-Champaign
2005-2006

Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades. However, nature of reactive security mechanisms has limitations because potential attackers cannot be prevented in advance. We are facing reality with proliferation persistent, advanced, intelligent attacks while defenders often way behind taking appropriate actions thwart attackers. The concept moving target (MTD) emerged proactive...

10.1109/comst.2019.2963791 article EN IEEE Communications Surveys & Tutorials 2020-01-01

Abstract Driven by advances in signal processing and multiuser detection (MUD) technologies, it has become possible for a wireless node to simultaneously receive multiple signals from other transmitters. In order take full advantage of MUD multi-packet reception (MPR) capable networks, is highly desirable make the compound transmitters more separable on its constellation at receiver coordinating both transmit power level carrier phase offsets this article, we propose feedback-based...

10.1186/1687-1499-2013-1 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2013-01-02

Federated learning (FL) is a machine technique that enables distributed devices to train model collaboratively without sharing their local data. FL-based systems can achieve much stronger privacy preservation since the deliver only parameters trained with data centralized server. However, there exists possibility server or attackers infer/extract sensitive private information using structure and of models. We propose employing homomorphic encryption (HE) scheme directly perform arithmetic...

10.3390/app12020734 article EN cc-by Applied Sciences 2022-01-12

With the technical advances in ubiquitous comput- ing and wireless networking, there has been an increasing need to capture context information (such as location) figure it into applications. In this paper, we establish theoreti- cal base develop a localization algorithm for building zero- configuration robust indoor tracking system support location-based network services management. The takes input on-line measurements of received signal strengths (RSSs) between 802.11 APs client its...

10.1109/infocom.2006.223 article EN 2006-01-01

Wireless sensor networks have gained considerable attention in the past few years. They found application domains battlefield communication, homeland security, pollution sensing, and traffic monitoring. As such, there has been an increasing need to define develop simulation frameworks for carrying out high-fidelity WSN simulation. In this article we present a modeling, simulation, emulation framework WSNs J-Sim - open source, component-based compositional network environment developed...

10.1109/mwc.2006.1678171 article EN IEEE Wireless Communications 2006-08-01

The importance of spatial reuse in wireless ad-hoc networks has been long recognized as a key to improving the network capacity. One can increase level by either reducing transmit power or increasing carrier sense threshold (thereby range). On other hand, decreases increases, SINR result smaller received signal increased interference level. Consequently, data rate sustained each transmission may decrease. This leads naturally following questions:(1)How trade-off between and decreased node...

10.1145/1161089.1161131 article EN Proceedings of the 28th Annual International Conference on Mobile Computing And Networking 2006-09-29

A smart grid facilitates more effective energy management of an electrical system. Because both consumption and associated building operation costs are increasing rapidly around the world, need for flexible cost-effective used by buildings in a environment is increasing. In this paper, we consider system connected to external (utility) as well distributed resources including renewable source, storage system, vehicle-to-grid station. First, modeled using Markov decision process that...

10.3390/en11082010 article EN cc-by Energies 2018-08-02

Recent advances in signal processing have demonstrated in-band full-duplex capability at WiFi ranges. In addition to simultaneous two-way exchange between two nodes, access points can potentially support uplink and downlink flows. However, the atomic three-node topology, which allows downlink, leads inter-client interference. this paper, we propose a random-access medium control protocol using distributed power manage interference wireless networks with full-duplex-capable that serve...

10.1109/twc.2015.2408338 article EN IEEE Transactions on Wireless Communications 2015-03-03

With an exponential increase in network traffic demands requiring quality of services, the need for routing optimization has become more prominent. Recently, advent software-defined networking (SDN) technology enables centralized management and operation, resources such as switches flexibly configurable through programmable interfaces. In this paper, we propose a deep reinforcement learning (DRL)-based on SDN. proposed method, DRL agent learns interdependency between load performance,...

10.1109/access.2022.3151081 article EN cc-by-nc-nd IEEE Access 2022-01-01

Wireless sensor networks (WSNs) have gained considerable attention in the past few years. As such, there has been an increasing need for defining and developing simulation frameworks carrying out high-fidelity WSN simulation. In this paper, authors presented a modeling framework WSNs J-Sim - open-source, component-based compositional network environment that is developed entirely Java. This built upon autonomous component architecture (ACA) extensible internetworking (INET) of J-Sim,...

10.1109/anss.2005.27 article EN 2005-04-19

In this paper, we consider the issue of localization in anisotropic sensor networks. Anisotropic networks are differentiated from isotropic that they possess properties vary according to direction measurement. characteristics result various factors such as geographic shape region (non-convex region), different node densities, irregular radio patterns, and terrain conditions. order characterize features, devise a linear mapping method transforms proximity measurements between nodes into...

10.1109/infcom.2005.1497886 article EN 2005-08-24

In this paper, we consider the problem of how to represent locations Internet hosts in a Cartesian coordinate system facilitate estimate network distance between two arbitrary hosts. We envision an infrastructure that consists beacon nodes and provides service estimating without direct delay measurement. show principal component analysis (PCA) technique can effectively extract topological information from measurements Based on PCA, devise transformation method projects data space into new...

10.1145/948205.948222 article EN 2003-01-01

In the last decade, vehicular ad hoc networks (VANETs) have been widely studied as an effective method for providing wireless communication connectivity in transportation systems. particular, cloud systems (VCSs) received abundant interest ability to offer a variety of vehicle information services. We consider data dissemination problem reliable delivery services from center vehicles through roadside access points (APs) with local storage. Due intermittent and limited storage size APs,...

10.1109/tvt.2015.2388851 article EN IEEE Transactions on Vehicular Technology 2015-01-06

Moving target defense (MTD) has emerged as a proactive mechanism aiming to thwart potential attacker. The key underlying idea of MTD is increase uncertainty and confusion for attackers by changing the attack surface (i.e., system or network configurations) that can invalidate intelligence collected interrupt execution; ultimately leading failure. Recently, significant advance software-defined networking (SDN) technology enabled several complex operations be highly flexible robust;...

10.1109/tnsm.2020.2987085 article EN cc-by IEEE Transactions on Network and Service Management 2020-04-10

To meet the explosive growth of mobile traffic, 5G network is designed to be flexible and support multi-access edge computing (MEC), thereby improving end-to-end quality service (QoS). In particular, slicing, which allows a physical infrastructure split into multiple logical networks, keeps balance resource allocation among different types with on-demand requests. However, achieving effective across difficult due dynamic characteristics slicing requests such as uncertain real-time demand...

10.1109/access.2021.3072435 article EN cc-by-nc-nd IEEE Access 2021-01-01

Network address shuffling is one of moving target defense (MTD) techniques that can invalidate the information attackers have collected based on current network IP configuration.We propose a software-defined networking-based MTD technique called Flexible Random Virtual Multiplexing, namely FRVM, which aims to defend against reconnaissance and scanning attacks.FRVM enables host machine multiple, random, time-varying virtual addresses, are multiplexed real host.Multiplexing or de-multiplexing...

10.1109/trustcom/bigdatase.2018.00088 article EN 2018-08-01

With regard to cyber security, pervasive traffic visibility is one of the most essential functionalities for complex network systems. A traditional system has limited access core and edge switches on network; other hand, SDN technology can provide flexible programmable management operations. In this article, we consider practical problem concerning how achieve scalable measurement using functionalities. Less intrusive monitoring be achieved by a packet sampling technique that...

10.1109/mcom.2017.1600990 article EN IEEE Communications Magazine 2017-01-01

Network slicing to create multiple virtual networks, called network slice, is a promising technology enable networking resource sharing among tenants for the 5th generation (5G) networks. By offering slice tenants, supports parallel services meet service level agreement (SLA). In legacy every tenant pays fixed and roughly estimated monthly or annual fee shared resources according contract signed with provider. However, such allocation mechanism may result in low utilization violation of user...

10.3390/app9112361 article EN cc-by Applied Sciences 2019-06-09

This paper aims at precision position control of the X-Y table a computerized numeric (CNC) machining center velocity reversal. The characteristics presliding friction are analyzed, and simple effective method is proposed to compensate on basis these characteristics. A large tracking error occurs reversal due sudden transition between regime sliding regime. investigates time reduce error, derives relationship acceleration zero velocity. also proposes estimating using this relationship,...

10.1109/tcst.2002.806436 article EN IEEE Transactions on Control Systems Technology 2003-01-01

In this paper, we consider the problem of how to represent locations Internet hosts in a Cartesian coordinate system facilitate estimation network distances among arbitrary hosts. We envision an infrastructure that consists beacon nodes and provides service estimating distance between pairs without direct delay measurement. show principal component analysis (PCA) technique can effectively extract topological information from measurements Based on PCA, devise transformation method projects...

10.1109/tnet.2005.850197 article EN IEEE/ACM Transactions on Networking 2005-06-01

Bitcoin is a cryptocurrency based on blockchain technology that enables peer-to-peer transactions without central authority. known for resolving double-spending problems. When two or more miners generate block includes transaction information at nearly the same time, an accidental fork occurs. In this case, longest chain of blocks selected to avoid problem. However, if there attacker node whose hash power greater than half total power, can perform attack, i.e., 51% majority attack. We...

10.1109/dsn-w.2018.00040 article EN 2018-06-01

A disturbance attenuation method in a control system, called the model-based attenuator (MBDA), is proposed, and its properties are studied. The MBDA makes plant performs similarly to nominal plant, as much possible, using compensator. Then, controller designed based on plant. It shown that extremely robust with respect large variations of load inertia. implemented position system computer numerical (CNC) machining center, where velocity composed servo-pack (PI controller), servo motor,...

10.1109/3516.769542 article EN IEEE/ASME Transactions on Mechatronics 1999-06-01
Coming Soon ...