{"id":291,"date":"2015-10-26T21:45:17","date_gmt":"2015-10-26T12:45:17","guid":{"rendered":"http:\/\/pel.sejong.ac.kr\/wordpress\/?page_id=291"},"modified":"2026-03-15T21:58:36","modified_gmt":"2026-03-15T12:58:36","slug":"journal","status":"publish","type":"page","link":"https:\/\/pel.sejong.ac.kr\/wordpress\/?page_id=291","title":{"rendered":"Int. Journal Articles"},"content":{"rendered":"<h2>Accepted Papers<\/h2>\n<ol>\n<li>Wooyoung Son, Soonhong Kwon, Jeongmin Lee, and Jong-Hyouk Lee, &#8220;Exploration of Optimal Frequency Bands for Acoustic Signal Air-Gap Attacks&#8221;, <em>IEEE Transactions on Dependable and Secure Computing (TDSC)<\/em>, DOI: 10.1109\/TDSC.2026.3661896, January 2026.<\/li>\n<li>Mohammad Wazid, Ashok Kumar Das, and Jong-Hyouk Lee, \u201cAuthentication Protocols for the Internet of Drones: Taxonomy, Analysis and Future Directions\u201d, <em>Journal of Ambient Intelligence and Humanized Computing<\/em>, DOI: 10.1007\/s12652-018-1006-x, August 2018.<\/li>\n<\/ol>\n<h2>2025<\/h2>\n<ol>\n<li>Soonhong Kwon, Wooyoung Son, and Jong-Hyouk Lee, \u201cPolicy-Driven Contextual Risk Evaluation in OAuth 2.0 Authentication Frameworks for AI Chatbot-Based RPA Systems\u201d, <em>Computers and Electrical Engineering<\/em>, vol. 128, December 2025.<\/li>\n<li>Jong-Hyouk Lee and Kamal Singh, \u201cSwitchTree: In-Network Computing and Traffic Analyses with Random Forests\u201d, <em>Neural Computing and Applications<\/em>, vol. 37, pp. 23143\u201323154, October 2025.<\/li>\n<li>Wooyoung Son, Soonhong Kwon, and Jong-Hyouk Lee, &#8220;A DID-Based One-Time Session Key Authentication Mechanism for Secure Human-AI Chatbot Communication&#8221;, <em>Computers and Electrical Engineering, <\/em>vol.127, October\u00a02025.<\/li>\n<li>Wooyoung Son, Soonhong Kwon, and Jong-Hyouk Lee, \u201cHomomorphic Encryption-Based Facial Recognition for Dual-Layer Similarity Analysis of Modified Images\u201d, <em>IEEE Access<\/em>, vol. 13, pp. 156639-156655, September 2025.<\/li>\n<li>Jihye Kim, Jaehyoung Park, and Jong-Hyouk Lee, \u201cIntegration of the layer 2 protection extended application for Open RAN: A security by design approach\u201d, <em>Computers and Electrical Engineering<\/em>, vol. 126, August 2025.<\/li>\n<\/ol>\n<h2>2024<\/h2>\n<ol>\n<li>Soonhong Kwon, Jaehyoung Park, Taeyang Lee, SungHeun Oh, and Jong-Hyouk Lee, &#8220;Decentralized identifier based illegal digital content distribution tracking system using the format-preserving encryption algorithm&#8221;, <em>Software: Practice and Experience<\/em>, vol. 54, no. 7, pp. 1275-1293, July 2024.<\/li>\n<li>Dongjie Liu and Jong-Hyouk Lee, &#8220;A CNN-Based SIA Screenshot Method to Visually Identify Phishing Websites&#8221;, <em>Journal of Network and Systems Management<\/em>, vol. 32, no. 1, pp. 8, January 2024.<\/li>\n<li>Wooyoung Son, Soonhong Kwon, Sungheun Oh and Jong-Hyouk Lee, &#8220;Automated Over-the-Top Service Copyright Distribution Management System Using the Open Digital Rights Language&#8221;, <em>Electronics<\/em>, vol. 13, no. 2, pp. 336, January 2024.<\/li>\n<\/ol>\n<h2>2023<\/h2>\n<ol>\n<li>Anusha Vangala, Ashok Kumar Das, and Jong-Hyouk Lee, \u201cProvably secure signature-based anonymous user authentication protocol in an Internet of Things-enabled intelligent precision agricultural environment\u201d, <em>Concurrency and Computation: Practice and Experience<\/em>, vol. 35, no. 16, e6187, July 2023.<\/li>\n<li>Haneul Lee, Soonhong Kwon and Jong-Hyouk Lee, &#8220;Experimental Analysis of Security Attacks for Docker Container Communications&#8221;,\u00a0<em>Electronics<\/em>, vol. 12, no. 4, pp. 940, February 2023.<\/li>\n<li>Jaehyoung Park, Jihye Kim, Jiyou Seo, Sangpil Kim and Jong-Hyouk Lee, &#8220;DNN-Based Forensic Watermark Tracking System for Realistic Content Copyright Protection&#8221;,<em> Electronics<\/em>, vol. 12, no. 3, pp. 553, January 2023.<\/li>\n<\/ol>\n<h2>2022<\/h2>\n<ol>\n<li>Dongjie Liu and Jong-Hyouk Lee, &#8220;CFLedger: Preventing Chargeback Fraud with Blockchain&#8221;,<em> ICT Express<\/em>, vol. 8, no. 3, pp. 352-356, September 2022.<\/li>\n<li>Yeonjoo Lim, Jong-Hyouk Lee, &#8220;Container-based Service Relocation for Beyond 5G Networks&#8221;, <em>Journal of Internet Technology<\/em>, vol. 23, no. 4 , pp. 911-918, July 2022.<\/li>\n<\/ol>\n<h2>2021<\/h2>\n<ol>\n<li>Soonhong Kwon, Sang-Jin Son, Yangseo Choi, and Jong-Hyouk Lee, \u201cProtocol Fuzzing to find security vulnerabilities of RabbitMQ\u201d, <em>Concurrency and Computation: Practice and Experience<\/em>, vol. 33, no. 23(e6012)<span class=\"citation__eLocator\">, December 2021.<\/span><\/li>\n<li>Zhiwei Yan and Jong-Hyouk Lee, &#8220;BGPChain: Constructing a secure, smart, and agile routing infrastructure based on blockchain&#8221;, <em>ICT Express<\/em>, vol. 7, no. 3, pp. 376-379, September 2021.<\/li>\n<li>Jong-Hyouk Lee, Zhiwei Yan, and Xinchang Zhang, &#8220;Optimized video content delivery for mobile networks using the transformative computing model&#8221;,<em> Applied Soft Computing<\/em>, vol. 107(107477), August 2021.<\/li>\n<li>Inam Ullah, Siyu Qian, Zhixiang Deng, Jong-Hyouk Lee, &#8220;Extended Kalman Filter-based localization algorithm by edge computing in Wireless Sensor Networks&#8221;, <em>Digital Communications and Networks<\/em>, vol. 7, pp. 187-195, May 2021.<\/li>\n<\/ol>\n<h2>2020<\/h2>\n<ol>\n<li>Zhiwei Yan and Jong-Hyouk Lee, &#8220;The road to DNS privacy&#8221;, <em>Future Generation Computer Systems<\/em>, vol. 112, pp. 604-611, November 2020.<\/li>\n<li>K. Vivekananda Bhat, Ashok Kumar Das, and Jong-Hyouk Lee, &#8220;Design of a blind quantization based audio watermarking scheme using singular value decomposition&#8221;, <em>Concurrency and Computation: Practice and Experience<\/em>, vol. 32, no. 18(e5253), September 2020.<\/li>\n<li>Sein Myung, Jong-Hyouk Lee, &#8220;Ethereum smart contract-based automated power trading algorithm in a microgrid environment&#8221;, <em>Journal of Supercomputing<\/em>, vol. 76, no. 7, pp. 4904-4914, July 2020.<\/li>\n<li>Shijie Zhang and Jong-Hyouk Lee, &#8220;Analysis of the main consensus protocols of blockchain&#8221;, <em>ICT Express<\/em>, vol. 6, no. 2, pp. 93-97, June 2020.<\/li>\n<li>Dongjie Liu and Jong-Hyouk Lee, &#8220;CNN Based Malicious Website Detection by Invalidating Multiple Web Spams&#8221;, <em>IEEE Access<\/em>, vol. 8, pp. 97258-97266, May 2020.<\/li>\n<li>Shijie Zhang and Jong-Hyouk Lee, &#8220;Mitigations on Sybil-Based Double-Spend Attacks in Bitcoin&#8221;, <em>IEEE Consumer Electronics Magazine<\/em>, vol. 10, no. 5, pp. 23-28, May 2020.<\/li>\n<li>Shijie Zhang and Jong-Hyouk Lee, &#8220;A Group Signature and Authentication Scheme for Blockchain-Based Mobile-Edge Computing&#8221;, <em>IEEE Internet of Things Journal<\/em>, vol. 7, no. 5, pp. 4557-4565, May 2020.<\/li>\n<li>Soonhong Kwon and Jong-Hyouk Lee, \u201cDIVDS: Docker Image Vulnerability Diagnostic System\u201d, <em>IEEE Access<\/em>, vol. 8, pp. 42666-42673, March 2020.<\/li>\n<li>Seoyun Choi and Jong-Hyouk Lee, \u201cBlockchain-based Distributed Firmware Update Architecture for IoT Devices\u201d, <em>IEEE Access<\/em>, vol. 8, pp. 37518-37525, February 2020.<\/li>\n<\/ol>\n<h2><strong>2019<\/strong><\/h2>\n<ol>\n<li>K. Vivekananda Bhat, Ashok Kumar Das, and Jong-Hyouk Lee, &#8220;A Mean Quantization Watermarking Scheme for Audio Signals Using Singular-Value Decomposition&#8221;, <em>IEEE Access<\/em>, vol. 7, pp. 157480-157488, October 2019.<\/li>\n<li>Shijie Zhang and Jong-Hyouk Lee, &#8220;Double-spending with a Sybil Attack in the Bitcoin Decentralized Network&#8221;, <em>IEEE Transactions on Industrial Informatics<\/em>, vol. 15, no. 10, pp. 5715-5722, October 2019. (IF: 7.377(2018), SCIE)<\/li>\n<li>Jong-Hyouk Lee, &#8220;Rise of Anonymous Cryptocurrencies: Brief Introduction&#8221;, <em>IEEE Consumer Electronics Magazine<\/em>, vol. 8, no. 5, pp. 20-25, September 2019. (IF: 3.273(2018), SCIE)<\/li>\n<li>Shijie Zhang and Jong-Hyouk Lee, &#8220;Smart Contract-based Secure Model for Miner Registration and Block Validation&#8221;, <em>IEEE Access<\/em>, vol. 7, pp. 132087-132094, September 2019.<\/li>\n<li>Wanting Li, Jian Jin, and Jong-Hyouk Lee, &#8220;Analysis of Botnet Domain Names for IoT Cybersecurity&#8221;, <em>IEEE Access<\/em>, vol. 7, pp. 94658-94665, July 2019.<\/li>\n<li>Zhiwei Yan and Jong-Hyouk Lee, &#8220;Mobility Capability Negotiation for IPv6 based Ubiquitous Mobile Internet&#8221;, <em>Computer Networks<\/em>, vol. 157, pp. 24-28, July 2019.<\/li>\n<li>Mohammad Wazid, Ashok Kumar Das, and Jong-Hyouk Lee, &#8220;User Authentication in a Tactile Internet Based Remote Surgery Environment: Security Issues, Challenges, and Future Research Directions&#8221;, <em>Pervasive and Mobile Computing<\/em>, vol. 54, pp. 71-85, March 2019.<\/li>\n<\/ol>\n<h2><strong>2018<\/strong><\/h2>\n<ol>\n<li>Sungbum Lee and Jong-Hyouk Lee, &#8220;TEE based Session Key Establishment Protocol for Secure Infotainment Systems&#8221;, <em>Design Automation for Embedded Systems<\/em>, vol. 22, no. 3, pp 215\u2013224, September 2018. (IF: 0.516(2017), SCIE)<\/li>\n<li>Sarang Wi and Jong-Hyouk Lee, &#8220;Group Key Based Session Key Establishment Protocol for a Secure Remote Vehicle Diagnosis&#8221;, <em>Journal of Internet Technology<\/em>, vol. 19, no. 3, pp. 633-640, May 2018. (IF: 1.930(2016), SCIE)<\/li>\n<li>Kashif Munir, Ehtesham Zahoor, Ra\ufb01a Rahim, Xavier Lagrange, and Jong-Hyouk Lee, &#8220;Secure and Fault-tolerant Distributed Location Management for Intelligent 5G Wireless Networks&#8221;, <em>IEEE Access<\/em>, vol. 6, pp. 18117-18127, April 2018. (IF: 3.244(2016), SCIE)<\/li>\n<li>Junling Zhang, Zhiwei Yan, Guanggang Geng, Xiaodong Lee, and Jong-Hyouk Lee, &#8220;Trademark protection for Chinese Domain Names&#8221;, <em>Journal of Internet Technology<\/em>, vol. 19, no. 2, pp. 315-324, March 2018. (IF: 1.930(2016), SCIE)<\/li>\n<li>Jong-Hyouk Lee, &#8220;BIDaaS: Blockchain based ID as a Service&#8221;, <em>IEEE Access<\/em>, vol. 6, pp. 2274-2278, February 2018. (IF: 3.244(2016), SCIE)<\/li>\n<li>Jian Jin, Zhiwei Yan, Jong-Hyouk Lee, and Guanggang Geng, &#8220;Health Evaluation of a Domain Name System Based on the Analytic Hierarchy Process&#8221;,<em> Journal of Internet Technology<\/em>, vol. 19, no. 1, pp. 25-32, January 2018. (IF: 1.930(2016), SCIE)<\/li>\n<\/ol>\n<h2><strong>2017<\/strong><\/h2>\n<ol>\n<li>Ilsun You and Jong-Hyouk Lee, &#8220;SPFP: Ticket-based Secure Handover for Fast Proxy Mobile IPv6 in 5G Networks&#8221;, <em>Computer Networks<\/em>, vol. 129, pp. 363-372, December 2017. (IF: 1.446(2014), SCIE)<\/li>\n<li>Debiao He, Sherali Zeadally, Neeraj Kumar, and Jong-Hyouk Lee, &#8220;Anonymous Authentication for Wireless Body Area Networks with Provable Security&#8221;, <em>IEEE Systems Journal<\/em>, vol. 11, no. 4, pp. 2590-2601, December 2017. (IF: 1.980(2014), SCIE)<\/li>\n<li>Sehrish Malik and Jong-Hyouk Lee, &#8220;Adaptive Load Control Scheme for Emergency Biometric Data&#8221;, <em>Journal of Internet Technology<\/em>, vol. 18, no. 6, pp. 1369-1378, November 2017. (IF: 1.930(2016), SCIE)<\/li>\n<li>Han Shen, Jian Shen, Muhammad Khurram Khan, and Jong-Hyouk Lee, &#8220;Efficient RFID Authentication Using Elliptic Curve Cryptography for the Internet of Things&#8221;, <em>Wireless Personal Communications<\/em>, vol. 96, no. 4, pp. 5253-5266, October 2017. (IF: 0.653(2014), SCIE)<\/li>\n<li>Jong-Hyouk Lee and Hyoungshick Kim, &#8220;Security and Privacy Challenges in the Internet of Things&#8221;, <em>IEEE Consumer Electronics Magazine<\/em>, vol. 6, no. 3, pp. 134-136, July 2017. (IF: 1.153(2016), SCIE)<\/li>\n<li>Jong-Hyouk Lee and Marc Pilkington, &#8220;How the Blockchain Revolution Will Reshape the Consumer Electronics Industry&#8221;, <em>IEEE Consumer Electronics Magazine<\/em>, vol. 6, no. 3, pp. 19-23, July 2017. (IF: 1.153(2016), SCIE)<\/li>\n<li>Boohyung Lee and Jong-Hyouk Lee, &#8220;Blockchain based secure firmware update for embedded devices in an Internet of Things environment&#8221;, <em>Journal of Supercomputing<\/em>, vol. 73, no. 3, pp. 1152-1167, March 2017. (IF: 1.088(2015): SCI)<\/li>\n<\/ol>\n<h2><strong>2016<\/strong><\/h2>\n<ol>\n<li>Jong-Hyouk Lee, &#8220;Secure Authentication with Dynamic Tunneling in Distributed IP Mobility Management&#8221;, <em>IEEE Wireless Communications<\/em>, vol. 23, no. 5, pp. 38-43, October 2016. (IF: 4.148(2015), SCI)<\/li>\n<li>Zhiwei Yan and Jong-Hyouk Lee, &#8220;Localized Paging in Proxy Mobile IPv6 Networks&#8221;, <em>Annals of Telecommunications<\/em>, vol. 71, no. 9, pp. 539-547, October 2016. (IF: 0.699(2014): SCI)<\/li>\n<li>Neeraj Kumar, Jong-Hyouk Lee, Naveen Chilamkurti, and Alexey Vinel, &#8220;Energy-Efficient Multimedia Data Dissemination in Vehicular Clouds: Stochastic-Reward-Nets-Based Coalition Game Approach&#8221;, <em>IEEE Systems Journal<\/em>, vol. 10, no. 2, pp. 847-858, June 2016. (IF: 1.980(2014), SCIE)<\/li>\n<li>Debiao He, Neeraj Kumar, Han Shen, and Jong-Hyouk Lee, &#8220;One-to-Many Authentication for Access Control in Mobile Pay-TV Systems&#8221;, <em>Science China Information Sciences<\/em>, vol. 59, no. 5, May 2016. (IF: 0.850(2014): SCI)<\/li>\n<li>Byung-Chul Choi, Seoung-Hyeon Lee, Jung-Chan Na, and Jong-Hyouk Lee, &#8220;Secure Firmware Validation and Update for Consumer Devices in Home Networking&#8221;, <em>IEEE Transactions on Consumer Electronics<\/em>, vol. 62, no. 1, pp. 39-44, February 2016. (IF: 1.045(2014), SCI)<\/li>\n<li>Debiao He, Neeraj Kumar, and Jong-Hyouk Lee, &#8220;Privacy-preserving Data Aggregation Scheme against Internal Attackers in Smart Grids&#8221;, <em>Wireless Networks<\/em>, vol. 22, no. 2, pp. 491-502, February 2016. (IF: 0.961(2014), SCI)<\/li>\n<li>Neeraj Kumar, Sudip Misra, Naveen Chilamkurti, Jong-Hyouk Lee, and Joel Jos\u00e9 Puga Coelho Rodrigues, &#8220;Bayesian Coalition Negotiation Game as a Utility for Secure Energy Management in a Vehicles-to-Grid Environment&#8221;, <em>IEEE Transactions on Dependable and Secure Computing<\/em>, vol. 13, no. 1, pp. 133-145, January 2016. (IF: 1.351(2014), SCIE)<\/li>\n<li>Zhiwei Yan, Jong-Hyouk Lee, and Yong-Jin Park, &#8220;Distributed Proxies with Fast Handover Support for a PURSUIT based Networking Architecture&#8221;, <em>Wireless Networks<\/em>, vol. 22, no. 1, pp. 307-318, January 2016. (IF: 0.961(2014), SCI)<\/li>\n<\/ol>\n<h2><strong>2015<\/strong><\/h2>\n<ol>\n<li>Neeraj Kumar, Sudip Misra, Joel J.P.C. Rodrigues, Jong-Hyouk Lee, Mohammad S. Obaidat, and Naveen Chilamkurti, &#8220;Playing the Smart Grid Game: Performance Analysis of Intelligent Energy Harvesting and Traffic Flow Forecasting for Plug-In Electric Vehicles&#8221;, <em>IEEE Vehicular Technology Magazine<\/em>, vol. 10, no. 4, pp. 81-92, December 2015. (IF: 1.75(2014), SCIE)<\/li>\n<li>Ou Ruan, Neeraj Kumar, Debiao He, and Jong-Hyouk Lee, &#8220;Efficient Provably Secure Password-based Explicit Authenticated Key Agreement&#8221;, <em>Pervasive and Mobile Computing<\/em>, vol. 24, pp. 50-60, December 2015. (IF: 2.079(2014): SCIE)<\/li>\n<li>Zhiwei Yan, Jong-Hyouk Lee, Xiaodong Lee, and Yong-Jin Park, &#8220;Utilizing the Domain Name System for Scalable and Secure Named Data Networking&#8221;, <em>Wireless Personal Communications<\/em>, vol. 84, no. 3, pp. 2135-2149, October 2015. (IF: 0.653(2014), SCIE)<\/li>\n<li>Neeraj Kumar and Jong-Hyouk Lee, &#8220;Collaborative-Learning-Automata-Based Channel Assignment With Topology Preservation for Wireless Mesh Networks Under QoS Constraints&#8221;, <em>IEEE Systems Journal<\/em>, vol. 9, no. 3, pp. 675-685, September 2015. (IF: 1.980(2014), SCIE)<\/li>\n<li>Neeraj Kumar, Jong-Hyouk Lee, and Joel Jos\u00e9 Puga Coelho Rodrigues, &#8220;Intelligent Mobile Video Surveillance System as a Bayesian Coalition Game in Vehicular Sensor Networks: Learning Automata Approach&#8221;, <em>IEEE Transactions on Intelligent Transportation Systems<\/em>, vol. 16, no. 3, pp. 1148-1161, June 2015. (IF: 2.377(2014), SCI)<\/li>\n<li>Jong-Hyouk Lee, Giwon Lee, and Sangheon Pack, &#8220;Pseudonyms in IPv6 ITS Communications: Use of Pseudonyms, Performance Degradation, and Optimal Pseudonym Change&#8221;, <em>International Journal of Distributed Sensor Networks<\/em>, vol. 2015, May 2015. (IF: 0.923(2013), SCIE)<\/li>\n<li>Debiao He, Neeraj Kumar, and Jong-Hyouk Lee, &#8220;Secure Pseudonym-based Near Field Communication Protocol for the Consumer Internet of Things&#8221;, <em>IEEE Transactions on Consumer Electronics<\/em>, vol. 61, no. 1, pp. 56-62, February 2015. (IF: 1.157(2013), SCI)<\/li>\n<\/ol>\n<h2>2014<\/h2>\n<ol>\n<li>Jong-Hyouk Lee, Thierry Ernst, and Xiaomin Ma, &#8220;Performance Analysis of Secure Beaconing Messages for GeoNetworking&#8221;, <em>Security and Communication Networks<\/em>, vol. 7, no. 12, pp. 2555-2563, December 2014. (IF: 0.311(2012), SCIE)<\/li>\n<li>Neeraj Kumar and Jong-Hyouk Lee, &#8220;Peer-to-Peer Cooperative Caching for Data Dissemination in Urban Vehicular Communications&#8221;, <em>IEEE Systems Journal<\/em>, vol. 8, no. 4, pp. 1136-1144, December 2014. (IF: 1.746(2013), SCIE)<\/li>\n<li>Debiao He, Neeraj Kumar, Naveen Chilamkurti, and Jong-Hyouk Lee, &#8220;Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol&#8221;, <em>Journal of Medical Systems<\/em>, vol. 38, no. 10, October 2014. (IF: 1.372(2013), SCIE)<\/li>\n<li>Younghyun Kim, Haneul Ko, Sangheon Pack, Jong-Hyouk Lee, Seok-Joo Koh, and Heeyoung Jung, &#8220;Performance Analysis of Distributed Mapping System in ID\/Locator Separation Architectures&#8221;, <em>Journal of Network and Computer Applications<\/em>, vol. 39, pp. 223\u2013232, March 2014. (IF: 1.251(2012), SCIE)<\/li>\n<li>Debiao He, Neeraj Kumar, Jong-Hyouk Lee, and R. Simon Sherratt, &#8220;Enhanced Three-factor Security Protocol for Consumer USB Mass Storage Devices&#8221;, <em>IEEE Transactions on Consumer Electronics<\/em>, vol. 60, no. 1, pp. 30-37, February 2014. (IF: 1.087(2012), SCI)<\/li>\n<li>Jong-Hyouk Lee, Kamal Deep Singh, Jean-Marie Bonnin, and Sangheon Pack, &#8220;Mobile Data Offloading: A Host-based Distributed Mobility Management Approach&#8221;, <em>IEEE Internet Computing<\/em>, vol. 18, no. 1, pp. 20-29, January\/February 2014. (IF: 2.039(2012), SCIE)<\/li>\n<\/ol>\n<h2>2013<\/h2>\n<ol>\n<li>Debiao He, Neeraj Kumar, Muhammad K. Khan, and Jong-Hyouk Lee, &#8220;Anonymous Two-factor Authentication for Consumer Roaming Service in Global Mobility Networks&#8221;, <em>IEEE Transactions on Consumer Electronics<\/em>, vol. 59, no. 4, pp. 811-817, November 2013. (IF: 1.087(2012), SCI)<\/li>\n<li>Jong-Hyouk Lee, Jean-Marie Bonnin, Pierrick Seite, and H. Anthony Chan, &#8220;Distributed IP Mobility Management from the Perspective of the IETF: Motivations, Requirements, Approaches, Comparison, and Challenges&#8221;, <em>IEEE Wireless Communications Magazine<\/em>, vol. 20, no. 5, pp. 159-168, October 2013. (IF: 3.74(2012), SCI)<\/li>\n<li>Jong-Hyouk Lee and Thierry Ernst, &#8220;IPv6 Security Issues in Cooperative Intelligent Transportation Systems&#8221;, <em>The Computer Journal<\/em>, vol. 56, no. 10, pp. 1189-1197, October 2013. (IF: 0.755(2012), SCIE)<\/li>\n<li>Zhiwei Yan, Jong-Hyouk Lee, Sean Shen, and Chunming Qiao, &#8220;Novel Branching-Router based Multicast Routing Protocol with Mobility Support&#8221;, <em>IEEE Transactions on Parallel and Distributed Systems<\/em>, vol. 24, no. 10, pp. 2060-2068, October 2013. (IF: 1.796(2012), SCI)<\/li>\n<li>Neeraj Kumar, Naveen Chilamkurti, and Jong-Hyouk Lee, &#8220;UBMR-CA: Utility based Multicast Routing and Channel Assignment with Varying Traffic Demands in Multi-radio Multi-channel Wireless Mesh Networks&#8221;, <em>Mathematical and Computer Modelling<\/em>, vol. 57, no. 11\u201312, pp. 2750-2763, June 2013 (IF: 1.346(2011), SCIE)<\/li>\n<li>Der-Chen Huang and Jong-Hyouk Lee, &#8220;A dynamic N threshold prolong lifetime method for wireless sensor nodes&#8221;, <em>Mathematical and Computer Modelling<\/em>, vol. 57, no. 11\u201312, pp. 2731-2741, June 2013. (IF: 1.346(2011), SCIE)<\/li>\n<li>Jong-Hyouk Lee and Jean-Marie Bonnin, &#8220;HOTA: Handover Optimized Ticket-based Authentication in Network-based Mobility Management&#8221;, <em>Information Sciences<\/em>, vol. 230, pp. 64-77, May 2013. (IF: 2.833(2011), SCI)<\/li>\n<li>Jong-Hyouk Lee, Jean-Marie Bonnin, Ilsun You, and Tai-Myoung Chung, &#8220;Comparative Handover Performance Analysis of IPv6 Mobility Management Protocols&#8221;, <em>IEEE Transactions on Industrial Electronics<\/em>, vol. 60, no. 3, pp. 1077-1088, March 2013. (IF: 5.160(2011), SCI)<\/li>\n<li>Zhiwei Yan and Jong-Hyouk Lee, &#8220;State-aware Pointer Forwarding Scheme with Fast Handover Support in a PMIPv6 Domain&#8221;, <em>IEEE Systems Journal<\/em>, vol. 7, no. 1, pp. 92-101, March 2013. (IF: 1.746(2013), SCIE)<\/li>\n<\/ol>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Accepted Papers Wooyoung Son, Soonhong Kwon, Jeongmin Lee, and Jong-Hyouk Lee, &#8220;Exploration of Optimal Frequency Bands for Acoustic Signal Air-Gap Attacks&#8221;, IEEE Transactions on Dependable and Secure Computing (TDSC), DOI: 10.1109\/TDSC.2026.3661896, January 2026. Mohammad Wazid, Ashok Kumar Das, and Jong-Hyouk Lee, \u201cAuthentication Protocols for the Internet of Drones: Taxonomy, Analysis and Future Directions\u201d, Journal of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/291"}],"collection":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=291"}],"version-history":[{"count":82,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/291\/revisions"}],"predecessor-version":[{"id":4263,"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=\/wp\/v2\/pages\/291\/revisions\/4263"}],"wp:attachment":[{"href":"https:\/\/pel.sejong.ac.kr\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}