jonghyouk@home:~$

Working papers

  1. Dongjie Liu and Jong-Hyouk Lee, “The Design and Evaluation of an Education Game to Combat Phishing,” Big Data, submitted.

  2. Dongjie Liu and Jong-Hyouk Lee, “A CNN-Based Phishing Detection Method on SIA Screenshot from Users’ Perspective,” Neural Computing and Applications, revision.

  3. Jong-Hyouk Lee, “Blockchain based Anonymous Authentication for Mobile Devices in 5G Multi-Access Edge Computing,” in preparation.

  4. Jong-Hyouk Lee, “Blockchain based Service-level Anonymous Authentication in 5G Multi-Access Edge Computing,” in preparation.

Accepted papers

  1. Anusha Vangala, Ashok Kumar Das, and Jong-Hyouk Lee, “Provably-secure signature-based anonymous user authentication protocol in an IoT-enabled intelligent precision agricultural environment,” Concurrency and Computation: Practice and Experience, accepted.

  2. Dongjie Liu and Jong-Hyouk Lee, “CFLedger: Preventing Chargeback Fraud with Blockchain,” ICT Express, accepted.

  3. Zhiwei Yan and Jong-Hyouk Lee, “BGPChain: Constructing a Secure, Smart, and Agile Routing Infrastructure based on Blockchain,” ICT Express, accepted.

  4. Jong-Hyouk Lee and Kamal Singh, “SwitchTree: In-Network Computing and Traffic Analyses with Random Forests,” Neural Computing and Applications, accepted.

  5. Soonhong Kwon, Sang-Jin Son, Yangseo Choi, and Jong-Hyouk Lee, “Protocol Fuzzing to find security vulnerabilities of RabbitMQ,” Concurrency and Computation: Practice and Experience, accepted.

  6. Jong-Hyouk Lee, Zhiwei Yan, and Xinchang Zhang, “Optimized video content delivery for mobile networks using the transformative computing model,” Applied Soft Computing, accepted.

  7. Shijie Zhang and Jong-Hyouk Lee, “Mitigations on Sybil-based Double-spend Attacks in Bitcoin,” IEEE Consumer Electronics Magazine, vol. 10, no. 2, accepted.

  8. Mohammad Wazid, Ashok Kumar Das, and Jong-Hyouk Lee, “Authentication Protocols for the Internet of Drones: Taxonomy, Analysis and Future Directions,” Journal of Ambient Intelligence and Humanized Computing, accepted.

Published papers

  1. Inam Ullah, Siyu Qian, Zhixiang Deng, and Jong-Hyouk Lee, “Extended Kalman Filter-based Localization Algorithm by Edge Computing in Wireless Sensor Networks,” Digital Communications and Networks, vol. 7, no. 2, pp. 187-195, May 2021.

  2. Zhiwei Yan and Jong-Hyouk Lee, “The Road to DNS Privacy,” Future Generation Computer Systems, vol. 122, pp. 604-611, November 2020.

  3. K. Vivekananda Bhat, Ashok Kumar Das, and Jong-Hyouk Lee, “Design of a blind quantization based audio watermarking scheme using singular value decomposition,” Concurrency and Computation: Practice and Experience, vol. 32, no. 18, September 2020.

  4. Sein Myung and Jong-Hyouk Lee, “Ethereum Smart Contract-based Automated Power Trading Algorithm in a Microgrid Environment,” Journal of Supercomputing, vol. 76, no. 7, pp. 4904-4914, July 2020.

  5. Shijie Zhang and Jong-Hyouk Lee, “Analysis of the main consensus protocols of blockchain,”, ICT Express, vol. 6, no. 2, pp. 93-97, June 2020.

  6. Dongjie Liu and Jong-Hyouk Lee, “CNN based Malicious Website Detection by Invalidating Multiple Web Spams,” IEEE Access, vol. 8, pp. 97258-97266, May 2020.

  7. Shijie Zhang and Jong-Hyouk Lee, “A Group Signature and Authentication Scheme for Blockchain-based Mobile Edge Computing,” IEEE Internet of Things Journal, vol. 7, no. 5, pp. 4557-4565, May 2020.

  8. Soonhong Kwon and Jong-Hyouk Lee, “DIVDS: Docker Image Vulnerability Diagnostic System,” IEEE Access, vol. 8, pp. 42666-42673, March 2020.

  9. Seoyun Choi and Jong-Hyouk Lee, “Blockchain-based Distributed Firmware Update Architecture for IoT Devices,” IEEE Access, vol. 8, pp. 37518-37525, February 2020.

  10. K. Vivekananda Bhat, Ashok Kumar Das, and Jong-Hyouk Lee, “A Mean Quantization Watermarking Scheme for Audio Signals Using Singular-Value Decomposition,” IEEE Access, vol. 7, pp. 157480-157488, October 2019.

  11. Shijie Zhang and Jong-Hyouk Lee, “Double-spending with a Sybil Attack in the Bitcoin Decentralized Network,” IEEE Transactions on Industrial Informatics, vol. 15, no. 10, pp. 5715-5722, October 2019.

  12. Jong-Hyouk Lee, “Rise of Anonymous Cryptocurrencies: Brief Introduction,” IEEE Consumer Electronics Magazine, vol. 8, no. 5, pp. 20-25, September 2019.

  13. Shijie Zhang and Jong-Hyouk Lee, “Smart Contract-based Secure Model for Miner Registration and Block Validation,” IEEE Access, vol. 7, pp. 132087-132094, September 2019.

  14. Wanting Li, Jian Jin, and Jong-Hyouk Lee, “Analysis of Botnet Domain Names for IoT Cybersecurity,” IEEE Access, vol. 7, pp. 94658-94665, July 2019.

  15. Zhiwei Yan and Jong-Hyouk Lee, “Mobility Capability Negotiation for IPv6 based Ubiquitous Mobile Internet,” Computer Networks, vol. 157, pp. 24-28, July 2019.

  16. Mohammad Wazid, Ashok Kumar Das, and Jong-Hyouk Lee, “User Authentication in a Tactile Internet Based Remote Surgery Environment: Security Issues, Challenges, and Future Research Directions,” Pervasive and Mobile Computing, vol. 54, pp. 71-85, March 2019.

  17. Sungbum Lee and Jong-Hyouk Lee, “TEE based Session Key Establishment Protocol for Secure Infotainment Systems,” Design Automation for Embedded Systems, vol. 22, no. 3, pp. 215-224, September 2018.

  18. Sarang Wi and Jong-Hyouk Lee, “Group Key Based Session Key Establishment Protocol for a Secure Remote Vehicle Diagnosis,” Journal of Internet Technology, vol. 19, no. 3, pp. 633-640, May 2018.

  19. Kashif Munir, Ehtesham Zahoor, Rafia Rahim, Xavier Lagrange, and Jong-Hyouk Lee, “Secure and Fault-tolerant Distributed Location Management for Intelligent 5G Wireless Networks,” IEEE Access, vol. 6, pp. 18117-18127, April 2018.

  20. Junling Zhang, Zhiwei Yan, Guanggang Geng, Xiaodong Lee, and Jong-Hyouk Lee, “Trademark protection for Chinese Domain Names,” Journal of Internet Technology, vol. 19, no. 2, pp. 315-324, March 2018.

  21. Jong-Hyouk Lee, “BIDaaS: Blockchain based ID as a Service,” IEEE Access, vol. 6, pp. 2274-2278, February 2018.

  22. Jian Jin, Zhiwei Yan, Jong-Hyouk Lee, and Guanggang Geng, “Health Evaluation of a Domain Name System Based on the Analytic Hierarchy Process,” Journal of Internet Technology, vol. 19, no. 1, pp. 25-32, January 2018.

  23. Ilsun You and Jong-Hyouk Lee, “SPFP: Ticket-based Secure Handover for Fast Proxy Mobile IPv6 in 5G Networks,” Computer Networks, vol. 129, pp. 363-372, December 2017.

  24. Debiao He, Sherali Zeadally, Neeraj Kumar, and Jong-Hyouk Lee, “Anonymous Authentication for Wireless Body Area Networks with Provable Security,” IEEE Systems Journal, vol. 11, no. 4, pp. 2590-2601, December 2017.

  25. Sehrish Malik and Jong-Hyouk Lee, “Adaptive Load Control Scheme for Emergency Biometric Data,” Journal of Internet Technology, vol. 18, no. 6, pp. 1369-1378, November 2017.

  26. Han Shen, Jian Shen, Muhammad Khurram Khan, and Jong-Hyouk Lee, “Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things,” Wireless Personal Communications, vol. 96, no. 4, pp. 5253-5266, October 2017.

  27. Jong-Hyouk Lee and Hyoungshick Kim, “Security and Privacy Challenges in the Internet of Things,” IEEE Consumer Electronics Magazine, vol. 6, no. 3, pp. 134-136, July 2017.

  28. Jong-Hyouk Lee and Marc Pilkington, “How the Blockchain Revolution Will Reshape the Consumer Electronics Industry,” IEEE Consumer Electronics Magazine, vol. 6, no. 3, pp. 19-23, July 2017.

  29. Boohyung Lee and Jong-Hyouk Lee, “Blockchain based secure firmware update for embedded devices in an Internet of Things environment,” Journal of Supercomputing, vol. 73, no. 3, pp. 1152-1167, March 2017.

  30. Jong-Hyouk Lee, “Secure Authentication with Dynamic Tunneling in Distributed IP Mobility Management,” IEEE Wireless Communications, vol. 23, no. 5, pp. 38-43, October 2016.

  31. Zhiwei Yan and Jong-Hyouk Lee, “Localized Paging in Proxy Mobile IPv6 Networks,” Annals of Telecommunications, vol. 71, no. 9, pp. 539-547, October 2016.

  32. Neeraj Kumar, Jong-Hyouk Lee, Naveen Chilamkurti, and Alexey Vinel, “Energy-Efficient Multimedia Data Dissemination in Vehicular Clouds: Stochastic-Reward-Nets-Based Coalition Game Approach,” IEEE Systems Journal, vol. 10, no. 2, pp. 847-858, June 2016.

  33. Debiao He, Neeraj Kumar, Han Shen, and Jong-Hyouk Lee, “One-to-Many Authentication for Access Control in Mobile Pay-TV Systems,” Science China Information Sciences, vol. 59, no. 5, May 2016.

  34. Byung-Chul Choi, Seoung-Hyeon Lee, Jung-Chan Na, and Jong-Hyouk Lee, “Secure Firmware Validation and Update for Consumer Devices in Home Networking,” IEEE Transactions on Consumer Electronics, vol. 62, no. 1, pp. 39-44, February 2016.

  35. Debiao He, Neeraj Kumar, and Jong-Hyouk Lee, “Privacy-preserving Data Aggregation Scheme against Internal Attackers in Smart Grids,” Wireless Networks, vol. 22, no. 2, pp. 491-502, February 2016.

  36. Neeraj Kumar, Sudip Misra, Naveen Chilamkurti, Jong-Hyouk Lee, and Joel José Puga Coelho Rodrigues, “Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment,” IEEE Transactions on Dependable and Secure Computing, vol. 13, no. 1, pp. 133-145, January 2016.

  37. Zhiwei Yan, Jong-Hyouk Lee, and Yong-Jin Park, “Distributed Proxies with Fast Handover Support for a PURSUIT based Networking Architecture,” Wireless Networks, vol. 22, no. 1, pp. 307-318, January 2016.

  38. Neeraj Kumar, Sudip Misra, Joel J.P.C. Rodrigues, Jong-Hyouk Lee, Mohammad S. Obaidat, and Naveen Chilamkurti, “Playing the Smart Grid Game: Performance Analysis of Intelligent Energy Harvesting and Traffic Flow Forecasting for Plug-In Electric Vehicles,” IEEE Vehicular Technology Magazine, vol. 10, no. 4, pp. 81-92, December 2015.

  39. Ou Ruan, Neeraj Kumar, Debiao He, and Jong-Hyouk Lee, “Efficient Provably Secure Password-based Explicit Authenticated Key Agreement, “ Pervasive and Mobile Computing, vol. 24, pp. 50-60, December 2015.

  40. Zhiwei Yan, Jong-Hyouk Lee, Xiaodong Lee, and Yong-Jin Park, “Utilizing the Domain Name System for Scalable and Secure Named Data Networking,” Wireless Personal Communications, vol. 84, no. 3, pp. 2135-2149, October 2015.

  41. Neeraj Kumar and Jong-Hyouk Lee, “Collaborative-Learning-Automata-Based Channel Assignment With Topology Preservation for Wireless Mesh Networks Under QoS Constraints,” IEEE Systems Journal, vol. 9, no. 3, pp. 675-685, September 2015.

  42. Neeraj Kumar, Jong-Hyouk Lee, and Joel José Puga Coelho Rodrigues, “Intelligent Mobile Video Surveillance System as a Bayesian Coalition Game in Vehicular Sensor Networks: Learning Automata Approach,” IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 3, pp. 1148-1161, June 2015.

  43. Jong-Hyouk Lee, Giwon Lee, and Sangheon Pack, “Pseudonyms in IPv6 ITS Communications: Use of Pseudonyms, Performance Degradation, and Optimal Pseudonym Change,” International Journal of Distributed Sensor Networks, vol. 2015, 2015.

  44. Debiao He, Neeraj Kumar, and Jong-Hyouk Lee, “Secure Pseudonym-based Near Field Communication Protocol for the Consumer Internet of Things,” IEEE Transactions on Consumer Electronics, vol. 61, no. 1, pp. 56-62, February 2015.

  45. Jong-Hyouk Lee, Thierry Ernst, and Xiaomin Ma, “Performance Analysis of Secure Beaconing Messages for GeoNetworking,” Security and Communication Networks, vol. 7, no. 12, pp. 2555-2563, December 2014.

  46. Neeraj Kumar and Jong-Hyouk Lee, “Peer-to-Peer Cooperative Caching for Data Dissemination in Urban Vehicular Communications,” IEEE Systems Journal, vol. 8, no. 4, pp. 1136-1144, December 2014.

  47. Debiao He, Neeraj Kumar, Naveen Chilamkurti, and Jong-Hyouk Lee, “Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol,” Journal of Medical Systems, vol. 38, no. 10, October 2014.

  48. Younghyun Kim, Haneul Ko, Sangheon Pack, Jong-Hyouk Lee, Seok-Joo Koh, Heeyoung Jung, “Performance Analysis of Distributed Mapping System in ID/Locator Separation Architectures,” Journal of Network and Computer Applications, vol. 39, pp. 223–232, March 2014.

  49. Debiao He, Neeraj Kumar, Jong-Hyouk Lee, and R. Simon Sherratt, “Enhanced Three-factor Security Protocol for Consumer USB Mass Storage Devices,” IEEE Transactions on Consumer Electronics, vol. 60, no. 1, pp. 30-37, February 2014.

  50. Jong-Hyouk Lee, Kamal Deep Singh, Jean-Marie Bonnin, and Sangheon Pack, “Mobile Data Offloading: A Host-based Distributed Mobility Management Approach,” IEEE Internet Computing, vol. 18, no. 1, pp. 20-29, January/February 2014.

  51. Debiao He, Neeraj Kumar, Muhammad K. Khan, and Jong-Hyouk Lee, “Anonymous Two-factor Authentication for Consumer Roaming Service in Global Mobility Networks,” IEEE Transactions on Consumer Electronics, vol. 59, no. 4, pp. 811-817, November 2013.

  52. Jong-Hyouk Lee, Jean-Marie Bonnin, Pierrick Seite, and H. Anthony Chan, “Distributed IP Mobility Management from the Perspective of the IETF: Motivations, Requirements, Approaches, Comparison, and Challenges,” IEEE Wireless Communications, vol. 20, no. 5, pp. 159-168, October 2013.

  53. Jong-Hyouk Lee and Thierry Ernst, “IPv6 Security Issues in Cooperative Intelligent Transportation Systems,” The Computer Journal, vol. 56, no. 10, pp. 1189-1197, October 2013.

  54. Zhiwei Yan, Jong-Hyouk Lee, Sean Shen, and Chunming Qiao, “Novel Branching-Router based Multicast Routing Protocol with Mobility Support,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 10, pp. 2060-2068, October 2013.

  55. Neeraj Kumar, Naveen Chilamkurti, and Jong-Hyouk Lee, “UBMR-CA: Utility based Multicast Routing and Channel Assignment with Varying Traffic Demands in Multi-radio Multi-channel Wireless Mesh Networks,” Mathematical and Computer Modelling, vol. 57, no. 11–12, pp. 2750-2763, June 2013.

  56. Der-Chen Huang and Jong-Hyouk Lee, “A dynamic N threshold prolong lifetime method for wireless sensor nodes,” Mathematical and Computer Modelling, vol. 57, no. 11–12, pp. 2731-2741, June 2013.

  57. Jong-Hyouk Lee and Jean-Marie Bonnin, “HOTA: Handover Optimized Ticket-based Authentication in Network-based Mobility Management,” Information Sciences, vol. 230, pp. 64-77, May 2013.

  58. Jong-Hyouk Lee, Jean-Marie Bonnin, Ilsun You, and Tai-Myoung Chung, “Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols,” IEEE Transactions on Industrial Electronics, vol. 60, no. 3, pp. 1077-1088, March 2013.

  59. Zhiwei Yan and Jong-Hyouk Lee, “State-aware Pointer Forwarding Scheme with Fast Handover Support in a PMIPv6 Domain,” IEEE Systems Journal, vol. 7, no. 1, pp. 92-101, March 2013.

  60. Neeraj Kumar, Naveen Chilamkurti, and Jong-Hyouk Lee, “Distributed Context Aware Collaborative Filtering Approach for P2P Service Selection and Recovery in Wireless Mesh Networks,” Peer-to-Peer Networking and Applications, vol. 5, no. 4, pp. 350-362, December 2012.

  61. Zhiwei Yan, Jong-Hyouk Lee, and Liming Wang, “NGMIP: Network Based Global Mobility Support,” International Journal of Internet Protocol Technology, vol. 7, no. 2, pp. 96-107, November, 2012.

  62. Ilsun You, Jong-Hyouk Lee, and Kouichi Sakurai, [“DSSH: Digital Signature based Secure Handover for Network-based Mobility Management,”] Computer Systems Science & Engineering, vol. 27, no. 3, pp. 183-193, May 2012.

  63. Jong-Hyouk Lee, Manabu Tsukada, and Thierry Ernst, [“MNPP: Mobile Network Prefix Provisioning for Enabling Route Optimization in Geographic Vehicular Networks,”] Adhoc & Sensor Wireless Networks, vol. 15, no.1, pp. 5-19, 2012.

  64. Jong-Hyouk Lee, Thierry Ernst, and Naveen Chilamkurti, “Performance Analysis of PMIPv6 based NEtwork MObility for Intelligent Transportation Systems,” IEEE Transactions on Vehicular Technology, vol. 61, no. 1, pp. 74-85, January 2012.

  65. Neeraj Kumar, Naveen Chilamkurti, and Jong-Hyouk Lee, “A novel minimum delay maximum flow multicast algorithm to construct a multicast tree in wireless mesh networks,” Computers and Mathematics with Applications, vol. 63, no. 2, pp. 481-491, January 2012.

  66. Jong-Hyouk Lee, Jiefeng (Terence) Chen, and Thierry Ernst, “Securing Mobile Network Prefix Provisioning for NEMO based Vehicular Networks,” Mathematical and Computer Modelling, vol. 55, no. 1-2, pp. 170-187, January 2012.

  67. Jong-Hyouk Lee, Zhiwei Yan, and Ilsun You, “Enhancing QoS of Mobile Devices by a New Handover Process in PMIPv6 Networks,” Wireless Personal Communications, vol. 61, no. 4, pp. 591-602, December 2011.

  68. Jong-Hyouk Lee, Thierry Ernst, Der-Jiunn Deng, and Han-Chieh Chao, “Improved PMIPv6 Handover Procedure for Consumer Multicast Traffic,” IET Communications, vol. 5, no. 15, pp. 2149-2156, October 2011.

  69. Jong-Hyouk Lee, Yeong-Deok Kim, and Dongwoo Lee, “Tunnel Restraint to Prevent Out-of-Order Packets for Route Optimization in Proxy Mobile IPv6,” Wireless Personal Communications, vol. 60, no. 3, pp. 547-558, October 2011.

  70. Hyung-Jin Lim, Moonseong Kim, Jong-Hyouk Lee, Dae-Hee Seo, and Tai-Myoung Chung, “Reducing Communication Overhead for Nested NEMO Networks: Roaming Authentication and Access Control Structure,” IEEE Transactions on Vehicular Technology, vol. 60, no. 7, pp. 3408-3423, September 2011.

  71. Ilsun You, Jong-Hyouk Lee, Yoshiaki Hori, and Kouichi Sakurai, “Enhancing MISP with Fast Mobile IPv6 Security,” Mobile Information Systems, vol. 7, no. 3, pp. 271-283, September 2011.

  72. Jong-Hyouk Lee and Thierry Ernst, “Lightweight NEtwork MObility within PMIPv6 for Transportation Systems,” IEEE Systems Journal, vol. 5, no. 3, pp. 352-361, September 2011.

  73. Jong-Hyouk Lee and Tai-Myoung Chung, “Secure Handover for Proxy Mobile IPv6 in Next-Generation Communications: Scenarios and Performance,” Wireless Communications & Mobile Computing, vol. 11, no. 2, pp. 176-186, February 2011.

  74. Jong-Hyouk Lee, Moonseong Kim, Byoung-Soo Koh, and Tai-Myoung Chung, “Adaptive Authentication and Registration Key Management Scheme based on AAA Architecture,” Intelligent Automation and Soft Computing, vol. 16, no. 4, pp. 519-536, 2010.

  75. Ilsun You, Jong-Hyouk Lee, and Bonam Kim, “caTBUA: Context-aware ticket-based binding update authentication protocol for trust-enabled mobile networks,” International Journal of Communication Systems, vol. 23, no. 11, pp. 1382-1404, November 2010.

  76. Jong-Hyouk Lee and Tai-Myoung Chung, “How much do we gain by introducing Route Optimization in Proxy Mobile IPv6 networks?,” Annals of Telecommunications, vol. 65, no. 5-6, pp. 233-246, June 2010.

  77. Jong-Hyouk Lee, Thierry Ernst, and Tai-Myoung Chung, “Cost Analysis of IP Mobility Management Protocols for Consumer Mobile Devices,” IEEE Transactions on Consumer Electronics, vol. 56, no. 2, pp. 1010-1017, May 2010.

  78. Ilsun You, Jong-Hyouk Lee, Kouichi Sakurai, and Yoshiaki Hori, “ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6,” IEICE Transactions on Information and Systems, vol. E93-D, no. 5, pp. 1096-1105, May 2010.

  79. HyunGon Kim and Jong-Hyouk Lee, “Diffie-Hellman Key Based Authentication in Proxy Mobile IPv6,” Mobile Information Systems, vol. 6, no. 1, pp. 107-121, April 2010.

  80. Hyung-Jin Lim, Moonseong Kim, Jong-Hyouk Lee, and Tai-Myoung Chung, “Route Optimization in Nested NEMO: Classification, Evaluation and Analysis from NEMO Fringe Stub Perspective,” IEEE Transactions on Mobile Computing, vol. 8, no. 11, pp. 1554-1572, November 2009.

  81. Jong-Hyouk Lee, Byung-Jin Han, Hyung-Jin Lim, Yeong-Deok Kim, Navrati Saxena, and Tai-Myoung Chung, “Optimizing Access Point Allocation Using Genetic Algorithmic Approach for Smart Home Environments,” The Computer Journal, vol. 52, no. 8, pp. 938-949, November 2009.

  82. Jong-Hyouk Lee, Hyung-Jin Lim, and Tai-Myoung Chung, “A competent global mobility support scheme in NETLMM,” International Journal of Electronics and Communications, vol. 63, no. 11, pp. 950-967, November 2009.

  83. Jong-Hyouk Lee, Sangheon Pack, Ilsun You, and Tai-Myoung Chung, “Enabling a Paging Mechanism in Network-based Localized Mobility Management Networks,” Journal of Internet Technology, vol. 10, no. 5, pp. 463-472, October 2009.

  84. Jong-Hyouk Lee, Seon-Gyoung Sohn, Beom-Hwan Chang, and Tai-Myoung Chung, “PKG-VUL: Security Vulnerability Evaluation and Patch Framework for Package-based Systems,” ETRI Journal, vol. 31, no.5, pp. 554-564, October 2009.

  85. Jong-Hyouk Lee, Youn-Hee Han, Sri Gundavelli, and Tai-Myoung Chung, “A comparative performance analysis on Hierarchical Mobile IPv6 and Proxy Mobile IPv6,” Telecommunication Systems, vol. 41, no. 4, pp. 279-292, August 2009.

  86. Jong-Hyouk Lee and Tai-Myoung Chung, “Performance evaluation of distributed multiple home agents with HAHA Protocol,” International Journal of Network Management, vol. 17, no. 2, pp. 107-115, March 2007.