Internet of Vehicles (IoV)

  • IoV
  • VANET
  • Communication

The Internet of Vehicles (IoV) is an open, heterogeneous network, is enabled by technologies such as cognitive computing, deep learning and artificial intelligence, as well as 5G, LEO and the future 6G network.
When building an IoV environment, in addition to ensuring flexibility and scalability, low latency is also a major requirement due to the high-speed requirement. In addition, in order to avoid user data leakage, data nodes and transmission processes also need to be protected.
In light of these requirement, safety and efficiency are also important factors when planning a IoV environment, in addition to flexibility.

  • Nai-Wei Lo and Jia-Lun Tsai, 2016, May, "An Efficient Conditional Privacy-Preserving Authentication Scheme for Vehicular Sensor Networks Without Pairings," IEEE Transactions on Intelligent Transportation Systems, vol. 17, no. 5, pp. 1319-1328.
  • Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2013, Mar., "ID-based Authenticated Group Key Agreement Protocol from Bilinear Pairings for Wireless Mobile Devices," Ad Hoc & Sensor Wireless Networks, Vol. 17, Issue 3/4, pp. 221-231. (SCI)
  • Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2012, Aug. 24-26, "Secure Anonymous Authentication Protocol with Unlinkability for Mobile Wireless Environment," Proceedings of the 6th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID 2012), pp. 1-5.(EI)

Blockchain and Smart Contract

  • Blockchain
  • Smart Contract
  • Cryptology

Blockchain originated with the release of Bitcoin by Satoshi Nakamoto. The basic concept is a solution that uses decentralised and de-trusted technology to jointly maintain a reliable database.
Blockchain has the advantages of anonymity, immutability and even automated rules through smart contracts. As a result, more and more industries are now developing blockchain solutions, hoping to solve problems.
Although blockchain applies many cryptography-related theories, it is difficult to ensure that the information on the chain is never compromised. It is therefore very important to design in a way that ensures the privacy and security of information.

  • Yohan, Alexander, Nai-Wei Lo, and Suttawee Achawapong, 2018, "Blockchain-based firmware update framework for internet-of-things environment," Proceedings of the International Conference on Information and Knowledge Engineering, The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing, p. 151-155.
  • Alexander Yohan and Nai-Wei Lo, 2018, Dec., "An Over-the-Blockchain Firmware Update Framework for IoT Devices", Proceedings of the 2018 IEEE Conference on Dependable and Secure Computing ( DSC 2018).

Information Security and Privacy

  • Information
  • Security
  • Privacy

With the rapid development of the Internet, people can easily share information with each other through the Internet. Because of this, there are a growing number of companies and government agencies creating their online systems to provide services. In particular, the emergence of wireless networks and mobile devices allow users to use the network in an unrestricted way. Thus, it greatly enhances the convenience of using the Internet for users. However, this kind of generation also causes many different network attacks. It gradually becomes a very important topic about the way to resist the cyber-attacks. Identity authentication mechanism on the network is a basic and important security mechanism. The identity authentication mechanism could prevent illegal access to the system on the network. Therefore, how to design a safe and efficient identity authentication mechanism is crucial and important.

  • Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2013, Aug., "Secure Anonymous Authentication Scheme without Verification Table for Mobile Satellite Communication Systems," accepted by International Journal of Satellite Communications and Networking. (SCI)
  • Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2013, June, "Secure Handover Authentication Protocol Based on Bilinear Pairings," accepted by Wireless Personal Communications, DOI: 10.1007/s11277-013-1246-1. (SCI) Kuo-Hui
  • Yeh, N.W. Lo, Tien-Ruey Hsiang, Yi-Chun Wei and Hung-Yi Hsieh, 2013, March, "Chaos between Password-based Authentication Protocol and Dictionary Attacks," Advanced Science Letters, Vol. 19, No. 3, pp. 1048-1051.

RFID and Web Services

  • RFID
  • Service
  • Application

Radio Frequency Identification (RFID) is the wireless non-contact use of radio-frequency electromagnetic fields to transfer data for the purpose of automatic identification. RFID has been applied in several various fields such as logistics, supply chain management, medical care system and so on. Since the cost of RFID tag is decreasing, it becomes popular in our daily life. In recent years, RFID technology has been considered as the next generation of technology for hospital environment. The usage of RFID system and RFID tag attached to the bottles or medical devices. During a surgery, the doctors will adopt a well-designed grouping proof protocol to record and verify the corresponding medicine bags or treatment tools are in position.

  • Yi-Chung Yen, Nai-Wei Lo and Tzong-Chen Wu, 2012, Oct., "Two RFID-Based Solutions for Secure Inpatient Medication Administration," Journal of Medical Systems, Vol. 36, Issue 5, pp. 2769-2778. (SCI)
  • Kuo-Hui Yeh, N. W. Lo, Yingjiu Li, Yung-Chun Chen and Tzong-Chen Wu, 2012, July, "New Findings on RFID Authentication Schemes against De-synchronization Attack," International Journal of Innovative Computing Information and Control, Vol. 8, Number 7(A), pp. 4431-4449. (EI)
  • Chih-Ta Yen, Ming-Huang Guo, Nai-Wei Lo and Der-Jiunn Deng, 2012, June, "Authentication with Low-cost RFID Tags in Mobile Networks," accepted by Security and Communication Networks. (SCI)

Projects

Title Organization Year/Month(from) - Year/Month(until) State
車聯網之零信任架構--應用於車聯網之資料分享與可追溯安全傳輸機制 行政院國家科學委員會 Aug 2022 - Jul 2023 Closed
車聯網之零信任架構--基於零信任架構之輕量級車聯網鑑別協定 行政院國家科學委員會 Aug 2022 - Jul 2023 Closed
異質區塊鏈聯合框架設計--異質區塊鏈網路之安全跨鏈資料交換中介機制 行政院國家科學委員會 Aug 2020 - Jul 2021 Closed
以物聯網技術為基礎之醫療與健康系統安全技術 行政院國家科學委員會 Jan 2020 - Jan 2021 Closed
異質區塊鏈聯合框架設計--異質區塊鏈之跨鏈身分鑑別與存取授權機制 行政院國家科學委員會 Jan 2020 - Jan 2021 Closed
【國際合作鏈結法人計畫】:5G多接取邊緣計算之存取控制 行政院國家科學委員會 Jan 2020 - Jan 2021 Closed
具跨領域存取控制之異質區塊鏈聯合框架--子計畫三:異質區塊鏈網路跨鏈資料路由與連線安全機制 行政院國家科學委員會 Jan 2019 - Jan 2020 Closed
具跨領域存取控制之異質區塊鏈聯合框架--總計畫暨子計畫一:異質區塊鏈之跨鏈存取控制與授權機制 行政院國家科學委員會 Jan 2019 - Jan 2020 Closed
既有舊系統之異質製造平台架構技術開發與網實系統升級應用驗證(3/3) 行政院國家科學委員會 Oct 2018 - Sep 2019 Closed
既有舊系統之異質製造平台架構技術開發與網實系統升級應用驗證(2/3) 行政院國家科學委員會 Oct 2017 - Sep 2018 Closed
行動裝置+物連網之創新應用 遠傳電信股份有限公司 Jul 2017 - Jun 2018 Closed
以物聯網技術為基礎之端對端系統安全架構-以物聯網技術為基礎之端 對端系統安全架構(1/3) 行政院國家科學委員會 Jun 2017 - May 2018 Closed
物聯網2.0智慧應用服務平台 正崴精密工業股份有限公司 Nov 2016 - Aug 2017 Closed
新世代資通安全技術與檢測服務之研發(2/4) 行政院國家科學委員會 Oct 2016 - Sep 2017 Closed
既有舊系統之異質製造平台架構技術開發與網實系統升級應用驗證(1/3) 行政院國家科學委員會 Oct 2016 - Sep 2017 Closed
oT可信賴架構之設計與實作-總計畫暨子計畫一:使用者物聯網裝置啟 動之使用者鑑別協定與控管機制 行政院國家科學委員會 Aug 2016 - Jul 2019 Closed
IoT可信賴架構之設計與實作-子計畫四:物聯網裝置與室內閘道器之感 測層鑑別與安全通訊技術 行政院國家科學委員會 Aug 2016 - Jul 2019 Closed
智慧校園系統 尚立股份有限公司 Jun 2016 - Dec 2017 Closed
新世代資通安全技術與檢測服務之研發(1/4) 行政院國家科學委員會 Oct 2015 - Sep 2016 Closed
4G網路UE模糊測試自動化分析研究 財團法人資訊工業策進會 Sep 2015 - Mar 2016 Closed
基於社群網路之即時輿情分析與資訊整合防災救援平台-基於社群網路 之即時輿情分析與資訊整合防災救援平台 行政院國家科學委員會 Sep 2015 - Aug 2016 Closed
刑事資料之巨量資料處理與資料公開在犯罪防範之應用研究-刑事資料 之巨量資料處理與資料公開在犯罪防範之應用研究 行政院國家科學委員會 Apr 2015 - Sep 2015 Closed
104年度資安菁英人才培育先導計畫 教育部 Mar 2015 - Feb 2016 Closed
物聯網智慧感測裝置之使用者客製化服務平台 正崴精密工業股份有限公司 Jan 2015 - Aug 2015 Closed
UE設備安全能力分析技術先期研究 財團法人資訊工業策進會 Sep 2014 - Mar 2015 Closed
支付應用系統安全產學合作及技術授權 夠麻吉股份有限公司 Sep 2014 - Feb 2015 Closed
可信賴的App安全應用框架-App應用服務可移轉性驗證 行政院國家科學委員會 Aug 2014 - Jul 2016 Closed
可信賴的App安全應用框架-行動應用程式重新包裝安全威脅與權限洩漏 風險之防護研究 行政院國家科學委員會 Aug 2014 - Jul 2016 Closed
可信賴的App安全應用框架-子計畫四:App程式碼及多個App間資料交換的完整性保之研究 行政院國家科學委員會 Aug 2013 - Jul 2014 Closed
適用於 NFC 應用環境之聯合安全服務平台-子計畫四:使用者隱私協商機制 行政院國家科學委員會 Aug 2012 - Jul 2013 Closed
智慧系統服務產業應用機會與人才培育機制研究 財團法人資訊工業策進會 Jul 2012 - Dec 2012 Closed
互動式行銷決策整合系統 巨人熊貓國際資訊股份有限公司 Jun 2012 - Oct 2012 Closed
二代健保網路服務及整體網路安全之評估 行政院衛生署中央健康保險局 May 2012 - Nov 2012 Closed
為雲端服務而設計之智慧終端應用安全套件 行政院國家科學委員會 May 2012 - Apr 2013 Closed
二代電子發票精進研究計畫 資誠企業管理顧問股份有限公司 Jan 2012 - Dec 2013 Closed
行動數位版權傳遞技術研究 財團法人資訊工業策進會 Apr 2010 - Dec 2010 Closed
軟硬體應用安全檢測平台建置計畫 行政院國家科學委員會 Jan 2010 - Feb 2012 Closed
經濟部技術處之學界協助中小企業科技關懷計畫-新世代視覺化商業戰情設計行動平台開發 經濟部技術處 Nov 2009 - Apr 2010 Closed
具隱私協商與風險管理之聯合服務架構-子計畫三:個人隱私協商模組 行政院國家科學委員會 Oct 2009 - Jul 2010 Closed
於智慧型手機中應用QR碼及GPS之高效能旅遊導航系統-具高安全性且支援導航路徑之智慧型加值服務平台 行政院國家科學委員會 Oct 2008 - Jul 2009 Closed
教育部RFID科技及應用人才培育先導型計畫-RFID教育暨研發實驗資源中心 教育部 Jul 2007 - Jun 2008 Closed
合成化模擬戰場環境參數資料庫架構之分析、規劃與建置 國防部整合評估室 Jul 2007 - Feb 2008 Closed
資通安全跨國合作人才培育與關鍵技術研發-分項子計畫二:RFID應用之安全與隱私保護技術之研究 行政院國家科學委員會 Apr 2006 - Jun 2007 Closed
網路服務技術與商業應用整合研究-子計畫一:智慧型網路服務挑選與評估 子計畫一主持人 Jan 2006 - Mar 2009 Closed
網路服務技術與商業應用整合研究子計畫一:智慧型網路服務挑選與評估 國立臺灣科技大學 Jan 2006 - Dec 2008 Closed
智慧型校園生活環境研擬與建置子計畫六-普及資訊擷取架構 行政院國家科學委員會 Nov 2005 - Oct 2008 Closed
教育部顧問室94會計年度大專校院資訊人才培育先導型計畫-軟體工程課程推廣計畫 教育部 Mar 2005 - Jan 2006 Closed
教育部顧問室大專校院人才培育計畫:軟體工程聯盟發展計畫-分項子計畫:軟體專案管理課程編撰 教育部 Apr 2004 - Dec 2005 Closed
在不同網路規模之下,二維Torus 互聯網路的容錯傳播之研究 行政院國家科學委員會 Aug 2003 - Jul 2004 Closed