With the rapid development of the Internet, people can easily share information with each other through the Internet. Because of this, there are a growing number of companies and government agencies creating their online systems to provide services. In particular, the emergence of wireless networks and mobile devices allow users to use the network in an unrestricted way. Thus, it greatly enhances the convenience of using the Internet for users. However, this kind of generation also causes many different network attacks. It gradually becomes a very important topic about the way to resist the cyber-attacks. Identity authentication mechanism on the network is a basic and important security mechanism. The identity authentication mechanism could prevent illegal access to the system on the network. Therefore, how to design a safe and efficient identity authentication mechanism is crucial and important.
Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2013, Aug., "Secure Anonymous Authentication Scheme without Verification Table for Mobile Satellite Communication Systems," accepted by International Journal of Satellite Communications and Networking. (SCI)
Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2013, June, "Secure Handover Authentication Protocol Based on Bilinear Pairings," accepted by Wireless Personal Communications, DOI: 10.1007/s11277-013-1246-1. (SCI)
Kuo-Hui Yeh, N.W. Lo, Tien-Ruey Hsiang, Yi-Chun Wei and Hung-Yi Hsieh, 2013, March, "Chaos between Password-based Authentication Protocol and Dictionary Attacks," Advanced Science Letters, Vol. 19, No. 3, pp. 1048-1051.
Location-based routing protocol can provide good routing performance in large and dense wireless mobile ad hoc networks (MANET). MANET requires the destination’s coordinates as a necessary routing information. It can improve the routing performance by using location information. However, the characteristic of open network makes the message content vulnerable to eavesdropping. To protect the privacy of information, a common approach is to use encryption mechanism. Data encryption will increase the delay time of packet processing, which will lower the routing performance. The location-based routing protocol must have an excellent location management mechanism, which provides the basic functions of updating and querying location.
Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2013, Mar., "ID-based Authenticated Group Key Agreement Protocol from Bilinear Pairings for Wireless Mobile Devices," Ad Hoc & Sensor Wireless Networks, Vol. 17, Issue 3/4, pp. 221-231. (SCI)
Jia-Lun Tsai, Nai-Wei Lo and Tzong-Chen Wu, 2012, Aug. 24-26, "Secure Anonymous Authentication Protocol with Unlinkability for Mobile Wireless Environment," Proceedings of the 6th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID 2012), pp. 1-5.(EI)
N.W. Lo and Hsiao-Chien Tsai, "Illusion Attack on VANET Applications – A Message Plausibility Problem," Proceedings of the 2nd IEEE Workshop on Automotive Networking and Applications (AutoNet'07), Nov. 2007.
Radio Frequency Identification (RFID) is the wireless non-contact use of radio-frequency electromagnetic fields to transfer data for the purpose of automatic identification. RFID has been applied in several various fields such as logistics, supply chain management, medical care system and so on. Since the cost of RFID tag is decreasing, it becomes popular in our daily life. In recent years, RFID technology has been considered as the next generation of technology for hospital environment. The usage of RFID system and RFID tag attached to the bottles or medical devices. During a surgery, the doctors will adopt a well-designed grouping proof protocol to record and verify the corresponding medicine bags or treatment tools are in position.
Yi-Chung Yen, Nai-Wei Lo and Tzong-Chen Wu, 2012, Oct., "Two RFID-Based Solutions for Secure Inpatient Medication Administration," Journal of Medical Systems, Vol. 36, Issue 5, pp. 2769-2778. (SCI)
Kuo-Hui Yeh, N. W. Lo, Yingjiu Li, Yung-Chun Chen and Tzong-Chen Wu, 2012, July, "New Findings on RFID Authentication Schemes against De-synchronization Attack," International Journal of Innovative Computing Information and Control, Vol. 8, Number 7(A), pp. 4431-4449. (EI)
Chih-Ta Yen, Ming-Huang Guo, Nai-Wei Lo and Der-Jiunn Deng, 2012, June, "Authentication with Low-cost RFID Tags in Mobile Networks," accepted by Security and Communication Networks. (SCI)
|Title||Organization||Year/Month(from) - Year/Month(until)||State|
|既有舊系統之異質製造平台架構技術開發與網實系統升級應用驗證(2/3)||行政院國家科學委員會||Oct 2017 - Sep 2018||Closed|
|行動裝置+物連網之創新應用||遠傳電信股份有限公司||Jul 2017 - Jun 2018||Closed|
|以物聯網技術為基礎之端對端系統安全架構－以物聯網技術為基礎之端 對端系統安全架構(1/3)||行政院國家科學委員會||Jun 2017 - May 2018||Closed|
|物聯網2.0智慧應用服務平台||正崴精密工業股份有限公司||Nov 2016 - Aug 2017||Closed|
|新世代資通安全技術與檢測服務之研發(2/4)||行政院國家科學委員會||Oct 2016 - Sep 2017||Closed|
|既有舊系統之異質製造平台架構技術開發與網實系統升級應用驗證(1/3)||行政院國家科學委員會||Oct 2016 - Sep 2017||Closed|
|oT可信賴架構之設計與實作－總計畫暨子計畫一：使用者物聯網裝置啟 動之使用者鑑別協定與控管機制||行政院國家科學委員會||Aug 2016 - Jul 2019||In Commission|
|IoT可信賴架構之設計與實作－子計畫四：物聯網裝置與室內閘道器之感 測層鑑別與安全通訊技術||行政院國家科學委員會||Aug 2016 - Jul 2019||In Commission|
|智慧校園系統||尚立股份有限公司||Jun 2016 - Dec 2017||Closed|
|新世代資通安全技術與檢測服務之研發(1/4)||行政院國家科學委員會||Oct 2015 - Sep 2016||Closed|
|4G網路UE模糊測試自動化分析研究||財團法人資訊工業策進會||Sep 2015 - Mar 2016||Closed|
|基於社群網路之即時輿情分析與資訊整合防災救援平台－基於社群網路 之即時輿情分析與資訊整合防災救援平台||行政院國家科學委員會||Sep 2015 - Aug 2016||Closed|
|刑事資料之巨量資料處理與資料公開在犯罪防範之應用研究－刑事資料 之巨量資料處理與資料公開在犯罪防範之應用研究||行政院國家科學委員會||Apr 2015 - Sep 2015||Closed|
|104年度資安菁英人才培育先導計畫||教育部||Mar 2015 - Feb 2016||Closed|
|物聯網智慧感測裝置之使用者客製化服務平台||正崴精密工業股份有限公司||Jan 2015 - Aug 2015||Closed|
|UE設備安全能力分析技術先期研究||財團法人資訊工業策進會||Sep 2014 - Mar 2015||Closed|
|支付應用系統安全產學合作及技術授權||夠麻吉股份有限公司||Sep 2014 - Feb 2015||Closed|
|可信賴的App安全應用框架－App應用服務可移轉性驗證||行政院國家科學委員會||Aug 2014 - Jul 2016||Closed|
|可信賴的App安全應用框架－行動應用程式重新包裝安全威脅與權限洩漏 風險之防護研究||行政院國家科學委員會||Aug 2014 - Jul 2016||Closed|