- Advanced Authentication Protocols Security
- RFID technology advancements
- Security in Wireless Sensor Networks
- User Authentication and Security Systems
- Cryptography and Data Security
- Advanced Wireless Network Optimization
- Energy Harvesting in Wireless Networks
- IPv6, Mobility, Handover, Networks, Security
- Multimedia Communication and Technology
- Mobile Ad Hoc Networks
National Tsing Hua University
2007-2014
Fu Jen Catholic University
2003
To achieve secure multicast communications, key management is one of the most critical problems that should be solved. So far, many schemes have been proposed. In 1999, Balenson, McGrew, and Sherman proposed an efficient scheme, BMS based on one-way function trees. The number broadcasts for a updating operation roughly proportional to logarithm group size. Recently, Horng showed scheme vulnerable collusion attack under certain situation. this paper, we further analyze necessary conditions...
802.16/WiMAX is going to be the most popular technology in wireless communications. In 2006, IEEE 802.16e has been proposed for mobility issue. order maintain security, re-authentication should considered when mobile station handovers. However, often takes latency and consumes power. On other hand, several fast authentication schemes have based on preauthentication concept 802.11/WLAN networks. These provide different methods enhance efficiency security of procedure. By using concept, we...
With the rapid development of wireless communication, mobile users are able to manually switch their network interfaces different types networks. The IEEE 802.21 Draft Standard was proposed integrate Media Independent Handover (MIHs) between interfaces, such as WiFi, WiMAX, 3GPP, and 3GPP2. However, it may not hold seamless roaming character does provide security mechanism.In this paper, we propose an efficient handover mechanism among WiFi WiMAX networks meet by reducing authentication...
RFID technology has become popular in many applications; however, most of the products lack security related functionality due to hardware limitation low-cost tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, also an advanced version our provide key updating. Based on secrecy shared keys, reader and tag can establish authenticity relationship. Further analysis showed that it satisfies integrity, forward secrecy,...
RFIDs have been popularly used in daily life. To avoid being intruded on user privacy, proper protection is necessary. The privacy issues, such as object tracking and forgery of tags, are widely studied the literature. Traditionally, reader regarded a part system. In mobile RFID environment, however, anyone who holds can connect to server acquire other information about objects he owns. verify whether has rights access tags become essential. this paper, we propose an authentication protocol...
Mobile WiMAX (IEEE 802.16e) is an emerging technology for wireless broadband access network. It provides wider converge and higher bandwidth than conventional technologies. Multicast Broadcast (M&B) in are suitable multimedia applications such as Pay-TV system because providers can efficiently distribute the same contents to users within M&B group. Although IEEE 802.16e has defined Multicast/Broadcast Rekeying Algorithm (MBRA) secure M&B, recent research indicates that MBRA insecure. In this...