Youn-Hee Han

Youn-Hee Han
Korea University of Technology and Education | KOREATECH · School of Computer Science and Engineering

PhD

About

157
Publications
29,531
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,641
Citations
Additional affiliations
January 2006 - present
January 2004 - December 2006
Education
March 1998 - February 2002
Korea University
Field of study
  • Computer Networks
March 1996 - February 1998
Korea University
Field of study
  • Database
March 1992 - February 1996
Korea University
Field of study
  • Mathematics

Publications

Publications (157)
Article
Full-text available
Recently, intelligent IoT applications based on artificial intelligence (AI) have been deployed with mobile edge computing (MEC). Intelligent IoT applications demand more computing resources and lower service latencies for AI tasks in dynamic MEC environments. Thus, in this paper, considering the resource scalability and resource optimization of ed...
Article
Full-text available
The objective of smart cities is to improve the quality of life for citizens by using Information and Communication Technology (ICT). The smart IoT environment consists of multiple sensor devices that continuously produce a large amount of data. In the IoT system, accurate inference from multi-sensor data is imperative to make a correct decision. S...
Article
Full-text available
Wireless sensor networks allow efficient data collection and transmission in IoT environments. Since wireless sensor networks consist of a few to several sensor nodes which are spatially distributed, the data collection in the networks is a difficult task. Due to multi-hope connectivity and energy constraint, mobile elements are sent to the network...
Article
Full-text available
Automated guided vehicles (AGVs) are essential components for the automation of fulfillment centers, a type of warehouse, where goods are stored on shelves and carried by AGVs. To increase the productivity in inventory management, a well-organized cooperative path control is required to transport goods to the designated picking stations. In this pa...
Article
The patient’s heterogenous data in IoT-based healthcare system are gathered using various sensor nodes. the existing healthcare and monitoring systems are mostly based on ontology or type-1 fuzzy logic which is insufficient due to inconsistency and uncertainty in the sensed data. in this paper a novel data fusion scheme is proposed which is based o...
Article
Full-text available
Nowadays, Reinforcement Learning (RL) is applied to various real-world tasks and attracts much attention in the fields of games, robotics, and autonomous driving. It is very challenging and devices overwhelming to directly apply RL to real-world environments. Due to the reality gap simulated environment does not match perfectly to the real-world sc...
Article
Full-text available
Multisensor data fusion is extensively used to merge data from heterogeneous sensors in a smart environment. However, sensors provide noisy and uncertain information which is a big challenge for researchers. Since uncertainty in the data is a central constraint for data fusion and decision-making systems. Dempster-Shafer’s evidence theory is an app...
Article
Full-text available
Wireless sensor network (WSN) is used for data collection and transmission in IoT environment. Since it consists of a large number of sensor nodes, a significant amount of redundant data and outliers are generated which substantially deteriorate the network performance. Data aggregation is needed to reduce energy consumption and prolong the lifetim...
Article
Full-text available
This paper proposes a deep recurrent neural network (RNN)-based traffic classification scheme (deep RNN-TCS) for classifying applications from traffic patterns in a hybrid edge computing and cloud computing architecture.We can also classify traffic from a cloud server, but there will be a time delay when packets transfer to the server. Therefore, t...
Article
Full-text available
With the exponential growth of Cyber-Physical Systems (CPSs) technologies, the Internet of Things (IoT) infrastructure has evolved from built-in static infrastructure to a flexible structure applicable to various mobile environments. In this Internet of Mobile Things (IoMT) environment, each IoT device could operate simultaneously as a provider and...
Article
Full-text available
Intralogistics is a technology that optimizes, integrates, automates, and manages the logistics flow of goods within a logistics transportation and sortation center. As the demand for parcel transportation increases, many sortation systems have been developed. In general, the goal of sortation systems is to route (or sort) parcels correctly and qui...
Article
Full-text available
Reinforcement learning has recently been studied in various fields and also used to optimally control IoT devices supporting the expansion of Internet connection beyond the usual standard devices. In this paper, we try to allow multiple reinforcement learning agents to learn optimal control policy on their own IoT devices of the same type but with...
Article
Full-text available
Recently, with the advent of various Internet of Things (IoT) applications, a massive amount of network traffic is being generated. A network operator must provide different quality of service, according to the service provided by each application. Toward this end, many studies have investigated how to classify various types of application network...
Article
Rotary inverted pendulum is an unstable and highly nonlinear device, and has been used as a common application model in nonlinear control engineering field. In this paper, we use a rotary inverted pendulum as a deep reinforcement learning environment. The real device is composed of a cyber environment and physical environment based on OpenFlow netw...
Article
VANET standards, including IEEE 1609 WAVE and ETSI C-ITS, use IPv6 to interconnect VANET with the Internet. Considering the high vehicle speeds and short communication ranges of Road Side Units (RSUs), such vehicles may suffer from frequent service interruptions. Several VANET IP mobility schemes have been proposed in order to mitigate this problem...
Article
Full-text available
Named Data Networking (NDN) supports the consumer mobility service by letting a consumer reissue an interest. This method is straightforward, but it may cause several drawbacks, including unnecessary handover overhead and long handover delay. We concentrate on the NDN communication model in which the pair of an interest and a data packet is conside...
Article
Full-text available
Making an SDN data plane flexible enough to satisfy the various requirements of heterogeneous IoT applications is very desirable in terms of software-defined IoT (SD-IoT) networking. Network devices with a programmable data plane provide an ability to dynamically add new packet- and data-processing procedures to IoT applications. The previously pro...
Article
Full-text available
Many Internet of Things (IoT) services utilize an IoT access network to connect small devices with remote servers. They can share an access network with standard communication technology, such as IEEE 802.11ah. However, an authentication and key management (AKM) mechanism for resource constrained IoT devices using IEEE 802.11ah has not been propose...
Article
The integration of VANETs with Internet is required if vehicles are to access IP-based applications. A vehicle must have an IP address, and the IP mobility service should be supported during the movement of the vehicle. VANET standards such as WAVE or C-ITS use IPv6 address auto configuration to allocate an IP address to a vehicle. In C-ITS, NEMO-B...
Conference Paper
A smart vehicle becomes a communication device with the advance of VANETs. In the WAVE standards, which is the well-known VANET standards, RSUs interconnect a VANETs to the Internet, and they act as default routers for the vehicles. However, the WAVE standards have eliminated the L2 portal function, which was included in the previous WAVE standards...
Article
Full-text available
As smart phones have rapidly proliferated over the past few years, LTE operators endeavor to cope with large mobile data traffic volumes. To solve such problems, we propose a new distributed LTE/EPC network architecture based on SDN, NFV, and cloud computing supporting distributed P-GWs and centralized control plane in LTE/EPC networks. It is desig...
Article
Recently, the great number of mobile devices causes excessive data/control traffic problems in the centralized LTE/EPC network and such dramatically increased traffic is emerging as a critical issue. In the Centralized Mobility Management (CMM) based LTE/EPC network, the Packet Data Network Gateway (P-GW) plays the centralized mobility anchor role...
Article
Mobility arises naturally in the Internet of Things networks, since the location of mobile objects, e.g., mobile agents, mobile software, mobile things, or users with wireless hardware, changes as they move. Tracking their current location is essential to mobile computing. To overcome the scalability problem, hierarchical architectures of location...
Article
In order to find meaningful patterns of research trends in the computer science and engineering field, we crawl a significant amount of bibliographic information, 3 million or more scholarly papers published from 1956 to 2015. We also make a list of target key words and analyze their frequency rate over the past 60 years based on the terms extracte...
Article
Utilization of the Constrained Application Protocol (CoAP) that is an important protocol of the Internet of Things (IoT) has increased. So the many associated libraries related with CoAP are also emerging. Among those libraries, CoAPthon, a representative Python-based CoAP library, has advantage in aspect of easy-to-use programming interface to exp...
Article
Named Data Networking (NDN) has emerged as an alternative to traditional IP-based networking for the achievement of Information-Centric Networking (ICN). Currently, most NDN is deployed over IP networks, but such an overlay deployment increases the transport network overhead due to the use of dual network control planes (NDN routing and IP routing)...
Article
Full-text available
In wireless networks, the betweenness of a node has been considered an indication of that node’s importance in efficiently and reliably delivering messages. In a large wireless network, however, the cost of computing the betweenness of every node is impractically high. In this paper, we introduce a new representation of a node’s vicinity, called th...
Article
Enforcing access control policies in Information-Centric Networking (ICN) is difficult due to there being multiple copies of contents in various network locations. Traditional Access Control List (ACL)-based schemes are ill-suited for ICN, because all potential content distribution servers should have an identical access control policy or they shou...
Article
Mobile nodes (MNs) have multiple interfaces for accessing heterogeneous networks. The multiple interfaces enable the MNs to access diverse networks simultaneously, and allocate or redirect data flows dynamically across the networks. In this paper, we introduce scalable network-based mobility management architecture and propose flow mobility managem...
Article
In journal manuscript submission and review systems, authors can submit their manuscript at any time and editorial members are struggling to find proper reviewers for the submitted manuscripts and assign them to such reviewers. In order to solve this problem, we propose a greedy algorithm and a genetic algorithm to recommend proper reviewers for th...
Conference Paper
An IP address is used as a host identifier and a locator to bind hosts and applications to their location in existing Internet. Several protocols are proposed to eliminate this binding. Most of these protocols use IPv6-based host identifiers to maintain compatibility with existing Internet, but these identifiers cannot be handled by standard IPv6 r...
Article
Wearable smart devices industry is booming up and being highlighted by the market recently as an alternative of post smart phone industry. Wearable smart devices have an intrinsic nature that their visual style should be very important like fashion as well as the sophisticated function is. They also have unique characteristics of industrial ecosyst...
Article
In this paper, Proxy Mobile IPv6 (PMIPv6), which is a network-based mobility management protocol, is adapted to the OpenFlow architecture. Mobility-related signaling is generally performed by network entities on behalf of a mobile node, but in standard PMIPv6, the control and data packets are delivered and processed over the same network entities,...
Article
In traditional social network analysis, the betweenness centrality measure has been heavily used to identify the relative importance of nodes. Since the time complexity to calculate the betweenness centrality is very high, however, it is difficult to get it of each node in large-scale social network where there are so many nodes and edges. In our p...
Chapter
As smart phone has rapidly proliferated over the past few years, LTE operators endeavor to cope with large mobile data traffic volumes. To solve such problems, we propose a new SDN-based distributed mobility management supporting distributed P-GWs and centralized control plane in LTE/EPC networks. For enhancing network performance more, we also pro...
Article
Full-text available
In delay-tolerant networks, network topology changes dynamically and there is no guarantee of continuous connectivity between any two nodes. These features make DTN routing one of important research issues, and the application of social network metrics has led to the design of recent DTN routing schemes. In this paper, we propose an efficient routi...
Article
Proxy Mobile IPv6 (PMIPv6), a network-based mobility management protocol, supports multi-homing, inter-technology handover, and flow mobility, with the help of a host’s virtual interface (VI). Several single virtual interface (SVI) schemes have been proposed to support these functions. In the SVI schemes, the link-layer identifier (LL-ID) should be...
Article
In recent years, the convergence phenomenon of the IT (information technology) industry with other traditional industries has deepened. Particularly, the IT industry has been strongly characterized as a base industry leading the convergence era and also pointed out as a key sector in the convergence era. In this paper, we describe what IT convergen...
Article
Full-text available
Delay-Tolerant Network employs message forwarding based on a Store, Carry and Forward method to conquer no guarantee of continue connectivity. For this reason, a lot of DTN routing scheme have been proposed recently. message forwarding is an important research issue in delay-tolerant network and In this paper, we propose a efficiency DTN routing sc...
Article
This paper proposes a new IPv4/IPv6 traversal scheme based on a scalable network-based IP mobility management system, called Access Independent Mobile Service (AIMS), which can provide MNs with high-quality mobility services over various wireless access networks. The proposed AIMS with IPv4/IPv6 Dual Stack Support (AIMS-DS) scheme can support an MN...
Conference Paper
Software Defined Network (SDN) is widely deployed by using OpenFlow protocol for the implementation of flexible networking. A lot of researches are progressing to adapt OpenFlow to existing network architectures. PMIPv6 is proposed to handle the network-based local mobility using IP tunneling. However, it has some weak points such as IP tunneling o...
Conference Paper
Recently, due to a explosive growth in the mobile Internet traffic, the problem of excessive data traffic handling on core network and thus scalability problem have been magnified in 3GPP Long Term Evolution/System Architecture Evolution (LTE/SAE) networks. Current LTE/SAE network based on the central packet data network gateway (P-GW) used as mobi...
Article
Community detection is a core problem in social network analysis. Strictly speaking, however, the communities does not exactly correspond to the real group, well-known as social circles. In this paper, we study on 1) how close relation between the ground-truth social circles and communities exists and 2) whether the social circles can be detected b...
Article
In VANET environments, messages between vehicles, and vehicles and infrastructures have to be kept secure. To authenticate users and messages, many authentication schemes are proposed. Previous works are hard to deploy, and to maintain entire users through one Certificate Agent (CA). Also, the authentication methods to authenticate users are compli...
Article
Full-text available
Recently, due to a explosive growth in the mobile Internet traffic, the problem of excessive data traffic handling on core network and thus scalability problem have been magnified in 3GPP LTE/SAE networks. Current LTE/SAE network based on the central P-GW (PDN Gateway) used as mobility anchor cannot deal with such demand for exponentially increasin...
Article
Traditional mobility management architectures are a centralized structure which has several problems and limitations, such as a single point of failure, scalability problem, triangle routing, and tunneling overhead thereby node which is fixed or in idle mode. Distributed Mobility Management (DMM) focuses on solving those problems caused by centrali...
Chapter
Recently, the consideration of social characteristics present a new angle of view in the design of data routing and dissemination in delay tolerant networks. Many social network studies have been undertaken using a ego network because it has the benefit of simplicity in data collection and gives statistically significant features about the entire n...
Article
In this paper, we study the sensor deployment pattern problem in cyber physical systems. When designing the sensor deployment pattern, the network lifetime maximization while covering the given area/targets and forwarding sensor data to a sink node is an important issue. In order to prolong the network lifetime by balancing energy depletion across...
Article
Full-text available
A directional sensor network consists of a large number of directional sensors (e.g., image/video sensors), which have a limited angle of sensing range due to technical constraints or cost considerations. In such directional sensor networks, the power saving issue is a challenging problem. In this paper, we address the Directional Cover and Transmi...
Article
Full-text available
In traditional social network analysis, the betweenness centrality measure has been heavily used to identify the relative importance of nodes in terms of message delivery. Since the time complexity to calculate the betweenness centrality is very high, however, it is difficult to get it of each node in large-scale social network where there are so m...
Chapter
This paper proposes a mobility management scheme, called Access Independent Mobile Service with IPv4/IPv6 Dual Stack Support (AIMS-DS), which supports high-quality mobility service for IPv4/IPv6 dual stack nodes in heterogeneous wireless networks. The proposed scheme provides a mobile node with a fast and reliable handovers through network-based mo...
Article
Full-text available
This paper proposes a mobility management scheme to provide a mobile node with high-quality handovers among heterogeneous wireless access networks. The proposed scheme employs a signaling architecture to support fast and reliable delivery of control messages by separating a control plane from a data transport plane in the core network. The proposed...
Article
Full-text available
Influence propagation is an important research issue in social networks. Influence propagation means that the status or the disposition of nodes get changed by new idea, information and gossip propagated by other nodes. Influenced nodes also make other nodes influenced across the network. The influence propagation problem based on 'word of mouth' r...
Chapter
Social analysis and community structure detection present a new angle of view in the design of data routing and dissemination in delay tolerant networks (DTNs). However, most community detection schemes developed in the context of sociology cannot be applied to DTNs since they have been designed without the consideration of the dynamic aspect of DT...