Chin-Ling Chen - Academia.edu (original) (raw)

Papers by Chin-Ling Chen

Research paper thumbnail of A resource utilization measurement detection against DDoS attacks

2016 9th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)

We has proposed a DDoS detection combining rule-based and anomaly-based scheme, in which three ty... more We has proposed a DDoS detection combining rule-based and anomaly-based scheme, in which three types of system resource usage are examined. We first analyze the performance of the proposed system under the conditions imposed by both of the normal traffic and the TFN2K attack. Secondly, we find the minimum cost, such as the saturation time and critical point, for attack traffic to saturate the victim. Thirdly, a thorough investigation on comparison of the proposed scheme and the other well-known schemes is presented. Our analysis and experiments demonstrate that the proposed scheme along with ANOVA can work very well with suitable combination and fine tuning of threshold value.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Blockchain-Based Community Safety Security System with IoT Secure Devices

Sustainability

Humans frequently need to construct a huge number of buildings for occupants in large cities to w... more Humans frequently need to construct a huge number of buildings for occupants in large cities to work or live in a highly developed civilization; people who live in the same building or same area are defined as a community. A thief stealing items, a burglary, fire hazards, flood hazards, earthquakes, emergency aid, abnormal gas leakage, strange behavior, falling in a building, fainting in a building, and other incidents all threaten the community’s safety. Therefore, we proposed a blockchain-based community safety security system that is combined with IoT devices. In the proposed scheme, we designed multiple phases to process the alarm triggered by IoT devices. IoT devices can be set up in two types areas: private and public areas. Both types of IoT devices’ alarms have different process flow for the response and records checking phase. All records are saved in the Blockchain Center to assure the data can be verified and cannot be forged. During the communication between sender and r...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Special Issue: Symmetric and Asymmetric Encryption in Blockchain

Symmetry

The technology that is most likely to change the corporate world in the next ten years is not soc... more The technology that is most likely to change the corporate world in the next ten years is not social networks, Big Data, cloud computing, robots, not even artificial intelligence, but blockchain [...]

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Artwork Rental System Based on Blockchain Technology

Symmetry

In recent years, due to the slowdown of the global economy and the instability of the stock marke... more In recent years, due to the slowdown of the global economy and the instability of the stock market and real estate market, the art market has gradually become the third-largest investment market after the former two. As more and more funds flow into the art market, the two seemingly unrelated industries, art, and finance have increasingly close cooperation due to the growing prosperity of the art market. As a very important part of the process of art financialization, the development of art banks has also received extensive attention from all walks of life. In addition, blockchain, as a technology to jointly maintain reliable databases through trustlessness and decentralization, has grown rapidly in recent years, and is gradually applied in various fields. The advantages of blockchain technology are decentralization, anonymity, immutability, and traceability of stored information. The proposed scheme applies the characteristics of blockchain technology to Art Bank’s art rental syste...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Group Resident Daily Load Forecasting Method Fusing Self-Attention Mechanism Based on Load Clustering

Applied Sciences

Daily load forecasting is the basis of the economic and safe operation of a power grid. Accurate ... more Daily load forecasting is the basis of the economic and safe operation of a power grid. Accurate prediction results can improve the matching of microgrid energy storage capacity allocation. With the popularization of smart meters, the interaction between residential electricity demand and sources and networks is increasing, and massive data are generated at the same time. Previous forecasting methods suffer from poor targeting and high noise. They cannot make full use of the important information of the load data. This paper proposes a new framework for daily load forecasting of group residents. Firstly, we use the singular value decomposition to address the problem of high dimensions of residential electricity data. Meanwhile, we apply a K-Shape-based group residential load clustering method to obtain the typical residential load data. Secondly, we introduce an empirical mode decomposition method to address the problem of high noise of residential load data. Finally, we propose a B...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Benefits Evaluation Method of an Integrated Energy System Based on a Fuzzy Comprehensive Evaluation Method

Symmetry

Building an integrated energy system (IES) is an excellent solution to environmental pollution an... more Building an integrated energy system (IES) is an excellent solution to environmental pollution and energy consumption currently. However, there are usually various IES configurations with different performances, and it is usually difficult for the decision-makers to select the most sustainable IES solution among multiple choices. In this paper, we attempt to design an evaluation method that considers the renewable energy and energy system model for evaluating the benefit of an IES. Firstly, this paper constructs an evaluation index system including four dimensions of technology, economy, environment, and society, based on the physical architecture of IES and its benefit influencing factors. It focuses on multiple energy sources or systems, and satisfies the overall evaluation of IES, resulting in accurate benefit evaluation results. Secondly, the subjective weight is determined by combining the triangular fuzzy number (TFN) and the analytic hierarchy process (AHP). The objective wei...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Improved Differentiable Binarization Network for Natural Scene Street Sign Text Detection

Applied Sciences

The street sign text information from natural scenes usually exists in a complex background envir... more The street sign text information from natural scenes usually exists in a complex background environment and is affected by natural light and artificial light. However, most of the current text detection algorithms do not effectively reduce the influence of light and do not make full use of the relationship between high-level semantic information and contextual semantic information in the feature extraction network when extracting features from images, and they are ineffective at detecting text in complex backgrounds. To solve these problems, we first propose a multi-channel MSER (Maximally Stable Extreme Regions) method to fully consider color information in text detection, which separates the text area in the image from the complex background, effectively reducing the influence of the complex background and light on street sign text detection. We also propose an enhanced feature pyramid network text detection method, which includes a feature pyramid route enhancement (FPRE) module ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test

J. Univers. Comput. Sci., 2009

This study has proposed a new detection method for DDoS attack traffic based on two-sample t-test... more This study has proposed a new detection method for DDoS attack traffic based on two-sample t-test. We first investigate the statistics of normal SYN arrival rate (SAR) and confirm it follows normal distribution. The proposed method identifies the attack by testing 1) the difference between incoming SAR and normal SAR, and 2) the difference between the number of SYN and ACK packets. The experiment results show that the possibilities of both false positives and false negatives are very low. The proposed mechanism is also demonstrated to have the capability of detecting DDoS attack quickly.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Traceable Vaccine Supply Management System

Sensors

Everyone should be vaccinated, but the eligibility and safety of the vaccine are always overlooke... more Everyone should be vaccinated, but the eligibility and safety of the vaccine are always overlooked by most people. The outbreak of COVID-19 has led many countries to intensify the development and production of the COVID-19 vaccine. and some countries have even required universal vaccination against this epidemic. However, such popularization of vaccination has also exposed various flaws in vaccine management that existed in the past, and vaccinators have become more concerned about the effectiveness of their vaccinations. In this paper, we propose a blockchain-based traceable vaccine management system. First, the system uses smart contracts to store the records generated during the whole process, from vaccine production to vaccination. Second, the proposed scheme uses the Edwards-curve digital signature algorithm (EdDSA) to guarantee the security and integrity of these data. Third, the system participants can access the corresponding data according to their authority to ensure the t...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An IP Header Extension Scheme for Route Optimization in Mobile IP Networks

Journal of Internet Technology, 2012

IETF has proposed route optimization extensions in Mobile IP to solve the triangle routing proble... more IETF has proposed route optimization extensions in Mobile IP to solve the triangle routing problem. However, the scheme is almost infeasible, because the scheme needs to implement a binding cache for all mobile hosts and correspondent nodes to solve the triangle routing problem. In this paper, we propose an IP header extension scheme for route optimization in Mobile IP to solve the triangle routing problem. Simulation results show that the proposed scheme outperforms the standard Mobile IP scheme.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An ECC Based Secure and Convenient Rural Medical Care System

Lecture Notes in Electrical Engineering, 2018

As hardware and software technologies have rapidly developed over recent years, many services and... more As hardware and software technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come to form the Internet of Things. At the same time, medical care requirements also raise rapidly. Governments formulate policies in order to respond the health-care requirements, one of these issues is rural medical care requirement. In recent years, the government has provided patrolling medical vehicle services to take care of residents in these remote areas. On the other hand, due to the rapid development of human physiological sensoring devices, residents with chronic diseases or those who need long-term monitoring of physiological conditions can wear these physiological sensoring devices, and these sensoring data can be provided to rural medical vehicles, so that doctors can diagnose symptoms. For residents with complicated or severe conditions, they can go to large hospitals in the urban areas for further diagnosi...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A secure key authentication scheme for cryptosystems based on GDLP and IFP

Soft Computing, 2016

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Framework Supporting User-Specific Services in RFID Systems

Fifth IEEE International Conference on Wireless, Mobile, and Ubiquitous Technology in Education (wmute 2008), 2008

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Digital Media Subscription Management System Combined with Blockchain and Proxy Re-Encryption Mechanisms

Symmetry

The subscription economy was born because the relationship between creators and customers is diff... more The subscription economy was born because the relationship between creators and customers is different than it used to be. The era of the creator economy seems to be filled with boundless promise, but at the end of the day, creators are just slaves to tech giants. Neither the control of the content created, nor the money made in their pockets is in complete control of the creator. The blockchain can completely solve these injustices monopolized by enterprises. In the blockchain era, all kinds of creations from music, and video-to-text can be turned into assets that can be purchased and traded through smart contracts. In the music industry, for example, creators do not need to share profits with streaming platforms and record labels and get all the benefits directly. In addition, when the content created is on the chain, every transaction will be recorded on the blockchain, and everyone can inquire about it, avoiding opacity or causing disputes in the future. However, with the struct...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Designing a flip-blended classroom model based on information technology

Engineering Innovation and Design, 2019

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Authentication and replica migration with privacy and lightweight verification in mobile edge computing

Engineering Innovation and Design, 2019

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An E-lottery System with a Fair Purchasing Environment and an Arbitration Mechanism

Journal of Internet Technology, 2020

Lottery is an attractive game as the winning player can potentially receive a huge amount of priz... more Lottery is an attractive game as the winning player can potentially receive a huge amount of prize money. Advances in Internet and communications technologies and the popularity of online shopping resulted in proxy-purchasing-services, and more recently there have been attempts to digitize lotteries into ‘real’ electronic lottery (E-lotteries; i.e. moving away from websites that merely provide proxy purchasing services). However, there are challenges E-underlying existing E-lotteries. For example, the lottery originator (LO) may forge a winning player and share the prize with the actual winners, by purchasing one or more lottery tickets of the winning number before publishing the number. Other concerns include exploitation by malicious employees of lottery providers. In this paper, we use the verifiable random function, digital signature algorithm (DSA) and bulletin board mechanism to establish an E-lottery system, which has a fair and secure purchasing environment and an arbitratio...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A mobile-device-based event reporting scheme for WSNs

2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE), 2015

In recent years, an increasing number of researchers have become involved in wireless sensor netw... more In recent years, an increasing number of researchers have become involved in wireless sensor networks (WSNs) and cloud computing. However, integrating WSN and cloud computing technology to monitor the environment is still an open issue. In this paper, we propose a mobile-device-based environmental monitor based on SaaS (Software as a Service) of cloud computing architecture. The proposed model is a mobile-device-based event reporting scheme. In an environmental monitoring system since there are some events (such as structural damage to dams and bridges) that cannot be reported automatically, we propose using a mobile device to report such events. The proposed scheme can defend against Denial of Service (DoS) and man-in-the-middle attacks, achieve mutual authentication, ensure data security and address network security issues.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Design of a secure communication and handoff protocol for VANETs

Journal of High Speed Networks, 2014

Vehicular communications have become an increasingly important communication technique worldwide.... more Vehicular communications have become an increasingly important communication technique worldwide. The current limitations of vehicular communications are not determined by capability or authentication but by security infrastructure. In 2005, a proposal for vehicular network security was discussed by Raya and Hubaux. However, such protocol is not practical and is unsafe for use in VANETs. In addition, handoff has become a relevant issue for vehicles moving from one region to another. For these reasons, we propose a secure communication and handoff protocol. In our protocol, a vehicle can enjoy seamless service between heterogeneous vehicular networks. Furthermore, vehicular communication is made more secure and ubiquitous.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A novel lottery protocol for mobile environments

Computers & Electrical Engineering, 2016

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A resource utilization measurement detection against DDoS attacks

2016 9th International Congress on Image and Signal Processing, BioMedical Engineering and Informatics (CISP-BMEI)

We has proposed a DDoS detection combining rule-based and anomaly-based scheme, in which three ty... more We has proposed a DDoS detection combining rule-based and anomaly-based scheme, in which three types of system resource usage are examined. We first analyze the performance of the proposed system under the conditions imposed by both of the normal traffic and the TFN2K attack. Secondly, we find the minimum cost, such as the saturation time and critical point, for attack traffic to saturate the victim. Thirdly, a thorough investigation on comparison of the proposed scheme and the other well-known schemes is presented. Our analysis and experiments demonstrate that the proposed scheme along with ANOVA can work very well with suitable combination and fine tuning of threshold value.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Blockchain-Based Community Safety Security System with IoT Secure Devices

Sustainability

Humans frequently need to construct a huge number of buildings for occupants in large cities to w... more Humans frequently need to construct a huge number of buildings for occupants in large cities to work or live in a highly developed civilization; people who live in the same building or same area are defined as a community. A thief stealing items, a burglary, fire hazards, flood hazards, earthquakes, emergency aid, abnormal gas leakage, strange behavior, falling in a building, fainting in a building, and other incidents all threaten the community’s safety. Therefore, we proposed a blockchain-based community safety security system that is combined with IoT devices. In the proposed scheme, we designed multiple phases to process the alarm triggered by IoT devices. IoT devices can be set up in two types areas: private and public areas. Both types of IoT devices’ alarms have different process flow for the response and records checking phase. All records are saved in the Blockchain Center to assure the data can be verified and cannot be forged. During the communication between sender and r...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Special Issue: Symmetric and Asymmetric Encryption in Blockchain

Symmetry

The technology that is most likely to change the corporate world in the next ten years is not soc... more The technology that is most likely to change the corporate world in the next ten years is not social networks, Big Data, cloud computing, robots, not even artificial intelligence, but blockchain [...]

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Artwork Rental System Based on Blockchain Technology

Symmetry

In recent years, due to the slowdown of the global economy and the instability of the stock marke... more In recent years, due to the slowdown of the global economy and the instability of the stock market and real estate market, the art market has gradually become the third-largest investment market after the former two. As more and more funds flow into the art market, the two seemingly unrelated industries, art, and finance have increasingly close cooperation due to the growing prosperity of the art market. As a very important part of the process of art financialization, the development of art banks has also received extensive attention from all walks of life. In addition, blockchain, as a technology to jointly maintain reliable databases through trustlessness and decentralization, has grown rapidly in recent years, and is gradually applied in various fields. The advantages of blockchain technology are decentralization, anonymity, immutability, and traceability of stored information. The proposed scheme applies the characteristics of blockchain technology to Art Bank’s art rental syste...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Group Resident Daily Load Forecasting Method Fusing Self-Attention Mechanism Based on Load Clustering

Applied Sciences

Daily load forecasting is the basis of the economic and safe operation of a power grid. Accurate ... more Daily load forecasting is the basis of the economic and safe operation of a power grid. Accurate prediction results can improve the matching of microgrid energy storage capacity allocation. With the popularization of smart meters, the interaction between residential electricity demand and sources and networks is increasing, and massive data are generated at the same time. Previous forecasting methods suffer from poor targeting and high noise. They cannot make full use of the important information of the load data. This paper proposes a new framework for daily load forecasting of group residents. Firstly, we use the singular value decomposition to address the problem of high dimensions of residential electricity data. Meanwhile, we apply a K-Shape-based group residential load clustering method to obtain the typical residential load data. Secondly, we introduce an empirical mode decomposition method to address the problem of high noise of residential load data. Finally, we propose a B...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Benefits Evaluation Method of an Integrated Energy System Based on a Fuzzy Comprehensive Evaluation Method

Symmetry

Building an integrated energy system (IES) is an excellent solution to environmental pollution an... more Building an integrated energy system (IES) is an excellent solution to environmental pollution and energy consumption currently. However, there are usually various IES configurations with different performances, and it is usually difficult for the decision-makers to select the most sustainable IES solution among multiple choices. In this paper, we attempt to design an evaluation method that considers the renewable energy and energy system model for evaluating the benefit of an IES. Firstly, this paper constructs an evaluation index system including four dimensions of technology, economy, environment, and society, based on the physical architecture of IES and its benefit influencing factors. It focuses on multiple energy sources or systems, and satisfies the overall evaluation of IES, resulting in accurate benefit evaluation results. Secondly, the subjective weight is determined by combining the triangular fuzzy number (TFN) and the analytic hierarchy process (AHP). The objective wei...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An Improved Differentiable Binarization Network for Natural Scene Street Sign Text Detection

Applied Sciences

The street sign text information from natural scenes usually exists in a complex background envir... more The street sign text information from natural scenes usually exists in a complex background environment and is affected by natural light and artificial light. However, most of the current text detection algorithms do not effectively reduce the influence of light and do not make full use of the relationship between high-level semantic information and contextual semantic information in the feature extraction network when extracting features from images, and they are ineffective at detecting text in complex backgrounds. To solve these problems, we first propose a multi-channel MSER (Maximally Stable Extreme Regions) method to fully consider color information in text detection, which separates the text area in the image from the complex background, effectively reducing the influence of the complex background and light on street sign text detection. We also propose an enhanced feature pyramid network text detection method, which includes a feature pyramid route enhancement (FPRE) module ...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A New Detection Method for Distributed Denial-of-Service Attack Traffic based on Statistical Test

J. Univers. Comput. Sci., 2009

This study has proposed a new detection method for DDoS attack traffic based on two-sample t-test... more This study has proposed a new detection method for DDoS attack traffic based on two-sample t-test. We first investigate the statistics of normal SYN arrival rate (SAR) and confirm it follows normal distribution. The proposed method identifies the attack by testing 1) the difference between incoming SAR and normal SAR, and 2) the difference between the number of SYN and ACK packets. The experiment results show that the possibilities of both false positives and false negatives are very low. The proposed mechanism is also demonstrated to have the capability of detecting DDoS attack quickly.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Traceable Vaccine Supply Management System

Sensors

Everyone should be vaccinated, but the eligibility and safety of the vaccine are always overlooke... more Everyone should be vaccinated, but the eligibility and safety of the vaccine are always overlooked by most people. The outbreak of COVID-19 has led many countries to intensify the development and production of the COVID-19 vaccine. and some countries have even required universal vaccination against this epidemic. However, such popularization of vaccination has also exposed various flaws in vaccine management that existed in the past, and vaccinators have become more concerned about the effectiveness of their vaccinations. In this paper, we propose a blockchain-based traceable vaccine management system. First, the system uses smart contracts to store the records generated during the whole process, from vaccine production to vaccination. Second, the proposed scheme uses the Edwards-curve digital signature algorithm (EdDSA) to guarantee the security and integrity of these data. Third, the system participants can access the corresponding data according to their authority to ensure the t...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An IP Header Extension Scheme for Route Optimization in Mobile IP Networks

Journal of Internet Technology, 2012

IETF has proposed route optimization extensions in Mobile IP to solve the triangle routing proble... more IETF has proposed route optimization extensions in Mobile IP to solve the triangle routing problem. However, the scheme is almost infeasible, because the scheme needs to implement a binding cache for all mobile hosts and correspondent nodes to solve the triangle routing problem. In this paper, we propose an IP header extension scheme for route optimization in Mobile IP to solve the triangle routing problem. Simulation results show that the proposed scheme outperforms the standard Mobile IP scheme.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An ECC Based Secure and Convenient Rural Medical Care System

Lecture Notes in Electrical Engineering, 2018

As hardware and software technologies have rapidly developed over recent years, many services and... more As hardware and software technologies have rapidly developed over recent years, many services and applications integrating these technologies into daily life have come to form the Internet of Things. At the same time, medical care requirements also raise rapidly. Governments formulate policies in order to respond the health-care requirements, one of these issues is rural medical care requirement. In recent years, the government has provided patrolling medical vehicle services to take care of residents in these remote areas. On the other hand, due to the rapid development of human physiological sensoring devices, residents with chronic diseases or those who need long-term monitoring of physiological conditions can wear these physiological sensoring devices, and these sensoring data can be provided to rural medical vehicles, so that doctors can diagnose symptoms. For residents with complicated or severe conditions, they can go to large hospitals in the urban areas for further diagnosi...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A secure key authentication scheme for cryptosystems based on GDLP and IFP

Soft Computing, 2016

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Framework Supporting User-Specific Services in RFID Systems

Fifth IEEE International Conference on Wireless, Mobile, and Ubiquitous Technology in Education (wmute 2008), 2008

ABSTRACT

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A Digital Media Subscription Management System Combined with Blockchain and Proxy Re-Encryption Mechanisms

Symmetry

The subscription economy was born because the relationship between creators and customers is diff... more The subscription economy was born because the relationship between creators and customers is different than it used to be. The era of the creator economy seems to be filled with boundless promise, but at the end of the day, creators are just slaves to tech giants. Neither the control of the content created, nor the money made in their pockets is in complete control of the creator. The blockchain can completely solve these injustices monopolized by enterprises. In the blockchain era, all kinds of creations from music, and video-to-text can be turned into assets that can be purchased and traded through smart contracts. In the music industry, for example, creators do not need to share profits with streaming platforms and record labels and get all the benefits directly. In addition, when the content created is on the chain, every transaction will be recorded on the blockchain, and everyone can inquire about it, avoiding opacity or causing disputes in the future. However, with the struct...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Designing a flip-blended classroom model based on information technology

Engineering Innovation and Design, 2019

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Authentication and replica migration with privacy and lightweight verification in mobile edge computing

Engineering Innovation and Design, 2019

Bookmarks Related papers MentionsView impact

Research paper thumbnail of An E-lottery System with a Fair Purchasing Environment and an Arbitration Mechanism

Journal of Internet Technology, 2020

Lottery is an attractive game as the winning player can potentially receive a huge amount of priz... more Lottery is an attractive game as the winning player can potentially receive a huge amount of prize money. Advances in Internet and communications technologies and the popularity of online shopping resulted in proxy-purchasing-services, and more recently there have been attempts to digitize lotteries into ‘real’ electronic lottery (E-lotteries; i.e. moving away from websites that merely provide proxy purchasing services). However, there are challenges E-underlying existing E-lotteries. For example, the lottery originator (LO) may forge a winning player and share the prize with the actual winners, by purchasing one or more lottery tickets of the winning number before publishing the number. Other concerns include exploitation by malicious employees of lottery providers. In this paper, we use the verifiable random function, digital signature algorithm (DSA) and bulletin board mechanism to establish an E-lottery system, which has a fair and secure purchasing environment and an arbitratio...

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A mobile-device-based event reporting scheme for WSNs

2015 11th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (QSHINE), 2015

In recent years, an increasing number of researchers have become involved in wireless sensor netw... more In recent years, an increasing number of researchers have become involved in wireless sensor networks (WSNs) and cloud computing. However, integrating WSN and cloud computing technology to monitor the environment is still an open issue. In this paper, we propose a mobile-device-based environmental monitor based on SaaS (Software as a Service) of cloud computing architecture. The proposed model is a mobile-device-based event reporting scheme. In an environmental monitoring system since there are some events (such as structural damage to dams and bridges) that cannot be reported automatically, we propose using a mobile device to report such events. The proposed scheme can defend against Denial of Service (DoS) and man-in-the-middle attacks, achieve mutual authentication, ensure data security and address network security issues.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of Design of a secure communication and handoff protocol for VANETs

Journal of High Speed Networks, 2014

Vehicular communications have become an increasingly important communication technique worldwide.... more Vehicular communications have become an increasingly important communication technique worldwide. The current limitations of vehicular communications are not determined by capability or authentication but by security infrastructure. In 2005, a proposal for vehicular network security was discussed by Raya and Hubaux. However, such protocol is not practical and is unsafe for use in VANETs. In addition, handoff has become a relevant issue for vehicles moving from one region to another. For these reasons, we propose a secure communication and handoff protocol. In our protocol, a vehicle can enjoy seamless service between heterogeneous vehicular networks. Furthermore, vehicular communication is made more secure and ubiquitous.

Bookmarks Related papers MentionsView impact

Research paper thumbnail of A novel lottery protocol for mobile environments

Computers & Electrical Engineering, 2016

Bookmarks Related papers MentionsView impact