Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Meiyuan Zhao is active.

Publication


Featured researches published by Meiyuan Zhao.


computer and communications security | 2008

SEAR: a secure efficient ad hoc on demand routing protocol for wireless networks

Qing Li; Yih Chun Hu; Meiyuan Zhao; Adrian Perrig; Jesse Walker; Wade Trappe

Multi-hop routing is essential to the operation of wireless ad hoc networks. Unfortunately, it is very easy for an adversary to forge or modify routing messages to inflict severe damage on the underlying routing protocol. In this paper, we present SEAR, a Secure Efficient Ad hoc Routing protocol for ad hoc networks that is mainly based on efficient symmetric cryptography, with asymmetric cryptography used only for the distribution of initial key commitments. We show, through both theoretical examination and simulations, that SEAR provides better security with significantly less overhead than other existing secure AODV protocols.


international workshop on security | 2012

Security challenges for the intelligent transportation system

Meiyuan Zhao; Jesse Walker; Chieh-Chih Wang

There has been considerable work addressing security in vehicular network systems for Intelligent Transportation System (ITS) usages. We examine the risks and proposed security solutions in this space. Our analysis leads to several key observations. The current security work misses many practical ITS usage and security requirements, since it fails to consider practical economic models and critical ITS functional requirements as a control system. Consequently, the standardized ITS communication message authenticity solutions have little utility relative to addressing the real threats. Furthermore, we discovered that fundamental re-thinking of the public key infrastructure support for secure vehicular communication is essential, because of the multi-stakeholder and cross-domain nature of many ITS usages. Based on our analysis, we call for future research directions in analyzing practical problems and designing solutions to secure vehicular communication in order to achieve its full potential.


Security and Communication Networks | 2009

SEAR: A secure efficient ad hoc on demand routing protocol for wireless networks

Qing Li; Meiyuan Zhao; Jesse Walker; Yih Chun Hu; Adrian Perrig; Wade Trappe

Multi-hop routing is essential to the operation of wireless ad hoc networks. Unfortunately, it is very easy for an adversary to forge or modify routing messages to inflict severe damage on the underlying routing protocol. In this paper, we present SEAR, a secure efficient ad hoc routing (SEAR) protocol for ad hoc networks that is mainly based on efficient symmetric cryptography, with asymmetric cryptography used only for the distribution of initial key commitments. SEAR uses one-way hash functions to protect the propagation of the routing messages. Intermediate nodes verify the routing messages by applying one-way functions, while malicious nodes cannot construct beneficial false routing messages when forwarding them. Route error (RERR) messages are protected through a variation of the TESLA broadcast authentication scheme. The SEAR protocol does not require any additional routing packet formats, and thus follows the same basic design as ad hoc on-demand distance vector (AODV). We show, through both theoretical examination and simulations, that SEAR provides better security with significantly less overhead than other existing secure AODV (SAODV) protocols. Copyright


IEEE Journal on Emerging and Selected Topics in Circuits and Systems | 2013

Challenges and Opportunities for Securing Intelligent Transportation System

Meiyuan Zhao; Jesse Walker; Chieh-Chih Wang

There has been considerable work addressing security in vehicular network systems for intelligent transportation system (ITS) usages. We examine the proposed security framework and solutions in this space. Our analysis leads to several key observations. The current security work misses many practical ITS usage and security requirements, since it fails to consider practical economic models and critical ITS functional requirements as a control system. Consequently, the standardized ITS communication message authenticity solutions have little utility relative to addressing the real threats. Furthermore, we analyzed the missing requirements for public key infrastructure support for secure vehicular communication. Based on our analysis, we call for future research directions in analyzing practical problems and designing solutions to secure vehicular communication in order to achieve its full potential.


Future Internet | 2017

A Security Framework for the Internet of Things in the Future Internet Architecture

Xiruo Liu; Meiyuan Zhao; Sugang Li; Feixiong Zhang; Wade Trappe

The Internet of Things (IoT) is a recent trend that extends the boundary of the Internet to include a wide variety of computing devices. Connecting many stand-alone IoT systems through the Internet introduces many challenges, with security being front-and-center since much of the collected information will be exposed to a wide and often unknown audience. Unfortunately, due to the intrinsic capability limits of low-end IoT devices, which account for a majority of the IoT end hosts, many traditional security methods cannot be applied to secure IoT systems, which open a door for attacks and exploits directed both against IoT services and the broader Internet. This paper addresses this issue by introducing a unified IoT framework based on the MobilityFirst future Internet architecture that explicitly focuses on supporting security for the IoT. Our design integrates local IoT systems into the global Internet without losing usability, interoperability and security protection. Specifically, we introduced an IoT middleware layer that connects heterogeneous hardware in local IoT systems to the global MobilityFirst network. We propose an IoT name resolution service (IoT-NRS) as a core component of the middleware layer, and develop a lightweight keying protocol that establishes trust between an IoT device and the IoT-NRS.


Archive | 2006

Wireless local area network and methods for secure resource reservations for fast roaming

Jesse Walker; Kapil Sood; Meiyuan Zhao


Archive | 2007

APPARATUS AND METHOD FOR DERIVING KEYS FOR SECURING PEER LINKS

Meiyuan Zhao; Jesse Walker


Archive | 2007

Apparatus and methods for negotiating a capability in establishing a peer-to-peer communication link

Meiyuan Zhao; Jesse Walker


Archive | 2007

Techniques for negotiation of security policies in wireless mesh networks

Jesse Walker; Meiyuan Zhao


Archive | 2007

TECHNIQUES FOR KEY DERIVATION FOR SECURE COMMUNICATION IN WIRELESS MESH NETWORKS

Jesse Walker; Meiyuan Zhao

Collaboration


Dive into the Meiyuan Zhao's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chieh-Chih Wang

National Taiwan University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge