Yung-Cheng Lee - Academia.edu (original) (raw)
Papers by Yung-Cheng Lee
Scientia Iranica, Aug 1, 2015
Some practices arising in sport club industry include: (1) Most sport clubs run their business by... more Some practices arising in sport club industry include: (1) Most sport clubs run their business by taking membership programs, and divide their memberships into several distinct classes by applying restrictions; (2) They operate in chain business mode and allow their members to enjoy their services at any a liate; and (3) They usually recruit members as many as possible to increase their revenues. Due to the limitless acceptance of customers' subscriptions, users usually face the situation that their preferred equipments are occupied. Thus, in order to improve revenues and enhance corporate image, sport clubs can not only pay attention to the supply management of tness equipment allocation, but also attempt on the demand management in terms of member recruiting limit. This study develops a mathematical model for determining the resource allocation of tness equipments and the member recruiting limit decisions for a chain tness club. The model is a constrained nonlinear integer problem, and in this paper a computational approach is proposed to solve the considered problem. Numerical results show that the proposed heuristic approach can e ciently obtain compromised solutions.
Password-based remote authentication schemes provide users with convenient and secure mechanisms ... more Password-based remote authentication schemes provide users with convenient and secure mechanisms to access resources through networks. Such schemes can be further divided into static ID and dynamic ID schemes. The main drawback of the static ID scheme is that an adversary can intercept the fixed login ID and masquerade as a legal user to log into the system. On the other hand, dynamic ID schemes can eliminate the risk of ID-theft and protect user's privacy. In 2004, Das et al. proposed a dynamic ID-based remote user authentication scheme. Their scheme allows users to select and update their passwords freely, and the server does not need to maintain a verifier table. In this paper, we first demonstrate that their scheme is not secure. We then propose an improved scheme for security enhancement. This improved scheme has a dynamic advantage such that an adversary cannot trace the users. Because the smart card generates a different random number for each authentication session, the forward messages are always different for each login. This causes the guessing attacks to fail, because the adversary has not enough information to verify his/her guess. Further, the adversary cannot successfully guess the correct password even if he/she obtains the smart card. Therefore, the proposed scheme can withstand smart-card-theft attack.
The Radio Frequency Identification (RFID) system plays an important role in authentication, secur... more The Radio Frequency Identification (RFID) system plays an important role in authentication, security control, supply chain management, and inventory control. Due to market consideration, low-cost RFID systems have become very popular in recent years. In many applications, such as e-passport, RFID systems need security mechanisms to resist all possible attacks and security risks. However, because of extensive computation requirements and high memory space demand for most security mechanisms, they are not suitable for low-cost RFID tags. In this paper, we propose two ultralightweight authentication protocols for low-cost RFID tags. The first protocol is based on dynamic identity and the second one on static identity. Both protocols have the merits of obtaining mutual authentication, protecting the user's privacy, and low computation cost. Furthermore, the proposed protocols can resist replay, impersonation, and de-synchronization attacks.
Journal of Applied Research and Technology, 2014
How to cite Complete issue More information about this article Journal's homepage in redalyc.org ... more How to cite Complete issue More information about this article Journal's homepage in redalyc.org Scientific Information System Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Non-profit academic project, developed under the open access initiative
Distributed Multimedia Systems, 2005
Applied Mechanics and Materials, 2015
Due to the rapid growth of computer and communication technologies, people obtain variety of onli... more Due to the rapid growth of computer and communication technologies, people obtain variety of online services quickly. However, all networks are vulnerable to lots of security threats and attacks. The remote authentication scheme provides an efficient method to validate the remote users and servers. Ahirwal and Sonwanshi proposed a remote user authentication scheme with smart card in 2012. They indicated that Song’s smart card based password authentication protocol cannot resist the offline password guessing attack, insider attack, forward secrecy and denial of service attack. They proposed an ID-based authentication scheme to fix security flaws. The scheme uses one-way hash function and bitwise XOR operation such that the computation complexity is very low. However, in this article, we will show that their scheme cannot withstand the offline password guessing attack as they declared. An adversary can use the intercepted messages of two login sessions to obtain the password.
PIERS Online, 2008
This paper describes a single-feed S-Ring type stacked microstrip structure antenna for broadband... more This paper describes a single-feed S-Ring type stacked microstrip structure antenna for broadband applications. The antenna is designed for RHCP/LHCP at a center frequency of 2.1 GHz. The design of the antenna is aimed at obtaining both wider bandwidth on the impedance and better circular polarization AR (Axial-Ratio) for GPS (global positioning system) applications. The feeding technique and structures of the present antenna has been analyzed. The results of simulations and measurements results show that the antenna has an impedance bandwidth (VSWR. 2) of 30% and a 3-dB AR bandwidth more than 23%.
2008 International Conference on Machine Learning and Cybernetics, 2008
In 2004, Das et al. proposed a dynamic ID-based remote user authentication scheme. Their scheme a... more In 2004, Das et al. proposed a dynamic ID-based remote user authentication scheme. Their scheme allows users to select and update their passwords freely, and the server needs not maintain a verifier table. In this paper, we show that their scheme is not secure. Though there are several improvement schemes proposed to fix the flaws. However, we show that all
PIERS Online, 2007
This paper presents a novel signal couple fed Circular Polarization (CP) Bow Tie shape Microstrip... more This paper presents a novel signal couple fed Circular Polarization (CP) Bow Tie shape Microstrip Antenna (Bow-Ti MA) based on the concept of electromagnetic coupled. The feeding technique and radiation performance of the Bow-Ti MA has been analyzed. The objective of the present design is not limited to both the improvement on the impedance and Axial Ratio (AR) bandwidths of the traditional CP antenna but also the radiation characteristics such as CP gain. The gain bandwidth and 3dB beam widths are also examined. Simulations and measurements show a good matching and a well-behaved CP radiation pattern can be achieved.
International Journal of Engineering and Technology Innovation, 2012
Wireless sensor networks are widely used in industrial process control, human health care, enviro... more Wireless sensor networks are widely used in industrial process control, human health care, environmental control, vehicular tracking and battlefield surveillance, etc. A wireless sensor network consists of lots of sensor nodes and a gateway node. The sensor node usually communicates with the gateway node and users over an ad hoc wireless network. However, due to the open environments, the wireless sensor networks are vulnerable to variety of security threats. Thus, it is a critical issue to adopt a suitable authentication mechanism for wireless sensor networks to enhance security. In 2009, Vaidya et al. proposed a robust user authentication schemes for wireless sensor networks. In this article, we will show that their scheme is vulnerable to the guessing attack and the impersonation attack. Since it needs a secure channel for communications in password changing phase, their scheme is also inconvenient and expensive for users to update passwords. We also propose an improved scheme to...
Journal of Computers, 2014
This paper investigates the periodic delivery planning of vending machine problem (PDPVMP). The p... more This paper investigates the periodic delivery planning of vending machine problem (PDPVMP). The problem is a periodic vehicle routing problem (PVRP), which is also an extension of the typical vehicle routing problem (VRP). The considered PDPVMP contains multiple vending machines with periodic demands. For each vending machine, its replenishment frequency is either once per two days or twice per two days, i.e., once per day. In the PDPVMP, there are multiple vehicles to deliver goods for vending machines. The objective of the considered problem is to minimize the total length of routes for all vehicles during the time horizon such that all demands for vending machines are delivered. In this paper, based upon a new coding procedure, we apply an immune based algorithm to solve the PDPVMP. A case of Taoyuan county in Taiwan is considered and solved. Numerical results show that the studied immune algorithm can effectively solve this PDPVMP.
Lecture Notes in Computer Science
To improve the safety of drivers and walkers in a city, several traffic monitors are usually set ... more To improve the safety of drivers and walkers in a city, several traffic monitors are usually set on lanes. These traffic monitors can also improve the security of communities. In this paper, we integrate the so-called linear/circular consecutive-k-out-of-n:F systems into our proposed traffic-monitor system. The objective is to find the optimal design of monitors under limited budget for the system.
Advanced Materials Research, 2011
Password authentication protocols are widely used mechanisms to authenticate identities in networ... more Password authentication protocols are widely used mechanisms to authenticate identities in networks. In 2006, Yoon et al. proposed a secure password authentication protocol in wireless networks that fixed the drawback of Ma et al.’s protocol. In this article we show that the Yoon et al.’s protocol is still vulnerable to the off-line password guessing attack. We propose an improvement to solve the problem. The improvement protocol is secure while the computation cost is the same with Yoon et al.’s protocol.
2011 International Conference in Electrics, Communication and Automatic Control Proceedings, 2011
Password-based authentication is an important security mechanism to identify users and prevent da... more Password-based authentication is an important security mechanism to identify users and prevent databases from unauthorized access. Unfortunately, people usually choose short passwords and many protocols have security flaws such that many password authentication schemes suffer from various attacks. In 2000, Sandirigama et al. used a one-way hash function to propose a simple password authentication scheme. In this chapter, we will show that their scheme cannot resist guessing attack. We propose an improved scheme to enhance the security. The improved scheme provides mutual authentication and can resist guessing attack, denial-of-service attack, and replay attack.
Asian Journal of Control, 2008
In this paper, a new method, applying the fuzzy logic system, is proposed to discretize the conti... more In this paper, a new method, applying the fuzzy logic system, is proposed to discretize the continuous-time controller in computer-controlled systems. All the continuous-time controllers can be reconstructed by the proposed method under the Sampling Theorem. That is, the fuzzy logic systems are used to add nonlinearity and to approximate smooth functions. Hence, the proposed controller is a new smooth controller that can replace the original controller, independent of the sampling time under the Sampling Theorem. Consequently, the proposed controller not only can discretize the continuous-time controllers, but also can tolerate a wider range of sampling time uncertainty. Besides, the input-output stability is proposed for discretizing the continuous-time controller of the fuzzy logic systems. Finally, computer simulation shows that the proposed method can easily reconstruct the continuous-time controller and has very good robustness for different sampling times.
Applied Mechanics and Materials, 2013
Nowadays, we can easily obtain variety of services through network. But due to the open environme... more Nowadays, we can easily obtain variety of services through network. But due to the open environment, networks are vulnerable to variety of security threats. Ramasamy et al. proposed a discrete logarithm based remote authentication scheme with smart cards. Their scheme provides mutual authentication and withstanding the denial of service attack, forgery attack, parallel session attack and smart card loss attack. In this article, we show that their scheme is not a practical solution for remote accessing. It also lacks key agreement mechanism; and users cannot update password freely. Moreover, their scheme cannot resist the stolen verifier attack and off-line guessing attack.
Lecture Notes in Electrical Engineering, 2012
Single sign-on system allows users to login networks for services with only a set of password. Ma... more Single sign-on system allows users to login networks for services with only a set of password. Many single sign-on solutions available today are lack of mobility or even insecure. In this article, we propose two new single sign-on solutions with the merits of mobility and resisting password guessing attack. The proposed first scheme is based on smart card, and the second one is based on password. Both the schemes are simple and practical for non-PKI users.
Scientia Iranica, Aug 1, 2015
Some practices arising in sport club industry include: (1) Most sport clubs run their business by... more Some practices arising in sport club industry include: (1) Most sport clubs run their business by taking membership programs, and divide their memberships into several distinct classes by applying restrictions; (2) They operate in chain business mode and allow their members to enjoy their services at any a liate; and (3) They usually recruit members as many as possible to increase their revenues. Due to the limitless acceptance of customers' subscriptions, users usually face the situation that their preferred equipments are occupied. Thus, in order to improve revenues and enhance corporate image, sport clubs can not only pay attention to the supply management of tness equipment allocation, but also attempt on the demand management in terms of member recruiting limit. This study develops a mathematical model for determining the resource allocation of tness equipments and the member recruiting limit decisions for a chain tness club. The model is a constrained nonlinear integer problem, and in this paper a computational approach is proposed to solve the considered problem. Numerical results show that the proposed heuristic approach can e ciently obtain compromised solutions.
Password-based remote authentication schemes provide users with convenient and secure mechanisms ... more Password-based remote authentication schemes provide users with convenient and secure mechanisms to access resources through networks. Such schemes can be further divided into static ID and dynamic ID schemes. The main drawback of the static ID scheme is that an adversary can intercept the fixed login ID and masquerade as a legal user to log into the system. On the other hand, dynamic ID schemes can eliminate the risk of ID-theft and protect user's privacy. In 2004, Das et al. proposed a dynamic ID-based remote user authentication scheme. Their scheme allows users to select and update their passwords freely, and the server does not need to maintain a verifier table. In this paper, we first demonstrate that their scheme is not secure. We then propose an improved scheme for security enhancement. This improved scheme has a dynamic advantage such that an adversary cannot trace the users. Because the smart card generates a different random number for each authentication session, the forward messages are always different for each login. This causes the guessing attacks to fail, because the adversary has not enough information to verify his/her guess. Further, the adversary cannot successfully guess the correct password even if he/she obtains the smart card. Therefore, the proposed scheme can withstand smart-card-theft attack.
The Radio Frequency Identification (RFID) system plays an important role in authentication, secur... more The Radio Frequency Identification (RFID) system plays an important role in authentication, security control, supply chain management, and inventory control. Due to market consideration, low-cost RFID systems have become very popular in recent years. In many applications, such as e-passport, RFID systems need security mechanisms to resist all possible attacks and security risks. However, because of extensive computation requirements and high memory space demand for most security mechanisms, they are not suitable for low-cost RFID tags. In this paper, we propose two ultralightweight authentication protocols for low-cost RFID tags. The first protocol is based on dynamic identity and the second one on static identity. Both protocols have the merits of obtaining mutual authentication, protecting the user's privacy, and low computation cost. Furthermore, the proposed protocols can resist replay, impersonation, and de-synchronization attacks.
Journal of Applied Research and Technology, 2014
How to cite Complete issue More information about this article Journal's homepage in redalyc.org ... more How to cite Complete issue More information about this article Journal's homepage in redalyc.org Scientific Information System Network of Scientific Journals from Latin America, the Caribbean, Spain and Portugal Non-profit academic project, developed under the open access initiative
Distributed Multimedia Systems, 2005
Applied Mechanics and Materials, 2015
Due to the rapid growth of computer and communication technologies, people obtain variety of onli... more Due to the rapid growth of computer and communication technologies, people obtain variety of online services quickly. However, all networks are vulnerable to lots of security threats and attacks. The remote authentication scheme provides an efficient method to validate the remote users and servers. Ahirwal and Sonwanshi proposed a remote user authentication scheme with smart card in 2012. They indicated that Song’s smart card based password authentication protocol cannot resist the offline password guessing attack, insider attack, forward secrecy and denial of service attack. They proposed an ID-based authentication scheme to fix security flaws. The scheme uses one-way hash function and bitwise XOR operation such that the computation complexity is very low. However, in this article, we will show that their scheme cannot withstand the offline password guessing attack as they declared. An adversary can use the intercepted messages of two login sessions to obtain the password.
PIERS Online, 2008
This paper describes a single-feed S-Ring type stacked microstrip structure antenna for broadband... more This paper describes a single-feed S-Ring type stacked microstrip structure antenna for broadband applications. The antenna is designed for RHCP/LHCP at a center frequency of 2.1 GHz. The design of the antenna is aimed at obtaining both wider bandwidth on the impedance and better circular polarization AR (Axial-Ratio) for GPS (global positioning system) applications. The feeding technique and structures of the present antenna has been analyzed. The results of simulations and measurements results show that the antenna has an impedance bandwidth (VSWR. 2) of 30% and a 3-dB AR bandwidth more than 23%.
2008 International Conference on Machine Learning and Cybernetics, 2008
In 2004, Das et al. proposed a dynamic ID-based remote user authentication scheme. Their scheme a... more In 2004, Das et al. proposed a dynamic ID-based remote user authentication scheme. Their scheme allows users to select and update their passwords freely, and the server needs not maintain a verifier table. In this paper, we show that their scheme is not secure. Though there are several improvement schemes proposed to fix the flaws. However, we show that all
PIERS Online, 2007
This paper presents a novel signal couple fed Circular Polarization (CP) Bow Tie shape Microstrip... more This paper presents a novel signal couple fed Circular Polarization (CP) Bow Tie shape Microstrip Antenna (Bow-Ti MA) based on the concept of electromagnetic coupled. The feeding technique and radiation performance of the Bow-Ti MA has been analyzed. The objective of the present design is not limited to both the improvement on the impedance and Axial Ratio (AR) bandwidths of the traditional CP antenna but also the radiation characteristics such as CP gain. The gain bandwidth and 3dB beam widths are also examined. Simulations and measurements show a good matching and a well-behaved CP radiation pattern can be achieved.
International Journal of Engineering and Technology Innovation, 2012
Wireless sensor networks are widely used in industrial process control, human health care, enviro... more Wireless sensor networks are widely used in industrial process control, human health care, environmental control, vehicular tracking and battlefield surveillance, etc. A wireless sensor network consists of lots of sensor nodes and a gateway node. The sensor node usually communicates with the gateway node and users over an ad hoc wireless network. However, due to the open environments, the wireless sensor networks are vulnerable to variety of security threats. Thus, it is a critical issue to adopt a suitable authentication mechanism for wireless sensor networks to enhance security. In 2009, Vaidya et al. proposed a robust user authentication schemes for wireless sensor networks. In this article, we will show that their scheme is vulnerable to the guessing attack and the impersonation attack. Since it needs a secure channel for communications in password changing phase, their scheme is also inconvenient and expensive for users to update passwords. We also propose an improved scheme to...
Journal of Computers, 2014
This paper investigates the periodic delivery planning of vending machine problem (PDPVMP). The p... more This paper investigates the periodic delivery planning of vending machine problem (PDPVMP). The problem is a periodic vehicle routing problem (PVRP), which is also an extension of the typical vehicle routing problem (VRP). The considered PDPVMP contains multiple vending machines with periodic demands. For each vending machine, its replenishment frequency is either once per two days or twice per two days, i.e., once per day. In the PDPVMP, there are multiple vehicles to deliver goods for vending machines. The objective of the considered problem is to minimize the total length of routes for all vehicles during the time horizon such that all demands for vending machines are delivered. In this paper, based upon a new coding procedure, we apply an immune based algorithm to solve the PDPVMP. A case of Taoyuan county in Taiwan is considered and solved. Numerical results show that the studied immune algorithm can effectively solve this PDPVMP.
Lecture Notes in Computer Science
To improve the safety of drivers and walkers in a city, several traffic monitors are usually set ... more To improve the safety of drivers and walkers in a city, several traffic monitors are usually set on lanes. These traffic monitors can also improve the security of communities. In this paper, we integrate the so-called linear/circular consecutive-k-out-of-n:F systems into our proposed traffic-monitor system. The objective is to find the optimal design of monitors under limited budget for the system.
Advanced Materials Research, 2011
Password authentication protocols are widely used mechanisms to authenticate identities in networ... more Password authentication protocols are widely used mechanisms to authenticate identities in networks. In 2006, Yoon et al. proposed a secure password authentication protocol in wireless networks that fixed the drawback of Ma et al.’s protocol. In this article we show that the Yoon et al.’s protocol is still vulnerable to the off-line password guessing attack. We propose an improvement to solve the problem. The improvement protocol is secure while the computation cost is the same with Yoon et al.’s protocol.
2011 International Conference in Electrics, Communication and Automatic Control Proceedings, 2011
Password-based authentication is an important security mechanism to identify users and prevent da... more Password-based authentication is an important security mechanism to identify users and prevent databases from unauthorized access. Unfortunately, people usually choose short passwords and many protocols have security flaws such that many password authentication schemes suffer from various attacks. In 2000, Sandirigama et al. used a one-way hash function to propose a simple password authentication scheme. In this chapter, we will show that their scheme cannot resist guessing attack. We propose an improved scheme to enhance the security. The improved scheme provides mutual authentication and can resist guessing attack, denial-of-service attack, and replay attack.
Asian Journal of Control, 2008
In this paper, a new method, applying the fuzzy logic system, is proposed to discretize the conti... more In this paper, a new method, applying the fuzzy logic system, is proposed to discretize the continuous-time controller in computer-controlled systems. All the continuous-time controllers can be reconstructed by the proposed method under the Sampling Theorem. That is, the fuzzy logic systems are used to add nonlinearity and to approximate smooth functions. Hence, the proposed controller is a new smooth controller that can replace the original controller, independent of the sampling time under the Sampling Theorem. Consequently, the proposed controller not only can discretize the continuous-time controllers, but also can tolerate a wider range of sampling time uncertainty. Besides, the input-output stability is proposed for discretizing the continuous-time controller of the fuzzy logic systems. Finally, computer simulation shows that the proposed method can easily reconstruct the continuous-time controller and has very good robustness for different sampling times.
Applied Mechanics and Materials, 2013
Nowadays, we can easily obtain variety of services through network. But due to the open environme... more Nowadays, we can easily obtain variety of services through network. But due to the open environment, networks are vulnerable to variety of security threats. Ramasamy et al. proposed a discrete logarithm based remote authentication scheme with smart cards. Their scheme provides mutual authentication and withstanding the denial of service attack, forgery attack, parallel session attack and smart card loss attack. In this article, we show that their scheme is not a practical solution for remote accessing. It also lacks key agreement mechanism; and users cannot update password freely. Moreover, their scheme cannot resist the stolen verifier attack and off-line guessing attack.
Lecture Notes in Electrical Engineering, 2012
Single sign-on system allows users to login networks for services with only a set of password. Ma... more Single sign-on system allows users to login networks for services with only a set of password. Many single sign-on solutions available today are lack of mobility or even insecure. In this article, we propose two new single sign-on solutions with the merits of mobility and resisting password guessing attack. The proposed first scheme is based on smart card, and the second one is based on password. Both the schemes are simple and practical for non-PKI users.