Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ming-Huang Guo is active.

Publication


Featured researches published by Ming-Huang Guo.


Iet Information Security | 2010

Cluster-based secure communication mechanism in wireless ad hoc networks

Ming-Huang Guo; Horng-Twu Liaw; Der-Jiunn Deng; Han-Chieh Chao

In a multi-agent system, there are many intelligent agents distributed in the network. To connect with these agents easily and arbitrarily, wireless ad hoc network is a candidate. Wireless ad hoc network is a distinct network environment with characteristics in self-organisation, dynamical network topologies and easy construction. To provide such networks with secure communication, many researchers tried different ways to create the session key(s). However, there are some drawbacks in session key generation procedure, and the robust session key could not be created. The authors propose a cluster-based secure communication mechanism in wireless ad hoc networks. The proposal applies the Diffie–Hellman key exchange protocol for the session key creation. It helps the clusterhead to reduce the communication overload, to avoid the time synchronisation problem in nodes authentication and to preserve the complete secrecy requirements.


Security and Communication Networks | 2016

On decentralized group key management mechanism for vehicular ad hoc networks

Ming-Huang Guo; Horng-Twu Liaw; Meng-Yu Chiu; Der-Jiunn Deng

In a vehicular ad hoc network VANET environment, it is not easy to keep data secure and private. If the private data are stolen, the hacker might have the user identity and do some bad things. To provide secure transmitting, some data encryption mechanisms are necessary. In this paper, we proposed a group key management mechanism for data communication in VANETs. It is exploited on the basis of a decentralized architecture with the hierarchical key tree and cluster heads. The proposed mechanism not only provides a rekeying method in reducing the communication cost but also furnishes the forward security and backward security. Copyright


Security and Communication Networks | 2013

Centralized group key management mechanism for VANET

Ming-Huang Guo; Horng-Twu Liaw; Der-Jiunn Deng; Han-Chieh Chao

The vehicular ad hoc network (VANET) is a novel wireless network and suffers security threats as other networks. Information exchanged in the network might be stolen by malicious users, and some secure mechanisms are needed to provide the privacy. In VANET, the vehicles can be separated to different groups. When vehicles in the same group want to communicate with others, they can use the group key to protect the messages, and the privacy in the group communication is preserved. In this paper, we propose a group key management method with centralized key management scheme for VANET. In each group, there is a group leader, and the group leader will manage the members and the keys. By managing the group keys properly, the communication in the group can be secure. In the performance evaluation and analysis, our proposal provides better rekey mechanisms to related works and also achieves the forward secrecy and backward secrecy. Copyright


Security and Communication Networks | 2012

Secure authentication mechanism for RFID tag in WLAN convergence 3G networks

Ming-Huang Guo; Horng-Twu Liaw; Jyun-Fu Chen; Der-Jiunn Deng

In the convergence network, the different technologies can be integrated to offer pervasive networking. Although it is able to provide better networking ability, the technical differentiation will make the management be more difficult. Especially when the security issues are considered, it is very necessary and important to develop some proper mechanisms for such a convergence environment. In this paper, we propose a secure authentication mechanism for third-generation telecommunication (3G) and wireless local area network integrated networks. The proposed scheme is developed based on TS 33.234 and improves the network security with radio frequency identification tags. The analysis shows that the proposed scheme not only provides more functions but also satisfies more secure considerations for authentication in 3G network and wireless local area network convergence environment. Copyright


Computer Communications | 2011

An RFID secure authentication mechanism in WLAN

Ming-Huang Guo; Horng-Twu Liaw; Der-Jiunn Deng; Han-Chieh Chao

With the thriving evolution of information technology, network technology attains to maturity and Wireless Local Area Network (WLAN) becomes universal as well. To discipline the right of network usage, network system identifies users before providing network services or resources. In the historical researches, the conventional authentication mechanisms frequently adopted the names and passwords of users as login authentication. However, these Single Factor Authentication mechanisms are proved to be defective. In virtue of enhancing security, recent researches on authentication are built on Two-Factor Authentication schemes. Nevertheless, the expensive cost of building Two-Factor Authentication approaches has affected the will of users. For the purpose of lifting the rate of usage, in this paper, we apply low-cost passive Radio Frequency Identification (RFID) tag along with the names and passwords of users as login authentication. The analytic comparison indicates the research not only reduces the cost of Two-Factor Authentication schemes, but provides security in the same way as smart cards technology.


Security and Communication Networks | 2013

Authentication with low-cost RFID tags in mobile networks

Chih-Ta Yen; Ming-Huang Guo; Nai-Wei Lo; Der-Jiunn Deng

Recently, mobile networks and radio frequency identification (RFID) technologies are both widely applied by many enterprises to develop their applications. The third-generation (3G) mobile network technology is one of the popular mobile network technologies because service providers can serve users anytime and anywhere through 3G mobile network technology. A solution that combines RFID technology with 3G mobile network technology could identify users anytime and anywhere. However, RFID tags are limited in computation power and suffered from security threats, especially on mobile networks. An authentication with low-cost RFID tags in Mobile Networks should be proposed in this paper. This paper designs a key agreement mechanism to achieve consistency, integration, legality, and safety. In order to design a low-cost scheme, our authentication mechanism is built of simple XOR operations and one-way hash function. Although the computation cost of our proposed mechanism is not the best, our proposed mechanism can achieve more security requirements for practical applications. Copyright


International Conference on Security-Enriched Urban Computing and Smart Grid | 2011

High Security Authentication Mechanism for Mobile Networks

Ming-Huang Guo; Horng-Twu Liaw; Jui-Kheng Tang; Chih-Ta Yen

Because of the more and more services wireless communication technology can offer nowadays, the quality of wireless communication became an important key. In this research, 3G/UMTS and WLAN will be mentioned mainly. The former offers a wide-range, high-mobility, complete and safe record of accounting; the latter offers a narrow range, low mobility, high speed transmission access on the Internet. The complementary between these two techniques can not only enhance the quality of wireless communication but offer more services for customers to choose, and customers can use wireless application services regardless of any environmental limit. This research will focus on the problem of fast-handover when 3G/UMTS and WLAN is interworking, such as authentication and authorization. About the two formers, we will use W-SKE to accomplish authentication procedure, and achieve safer Mutual Full Authentication and Fast-Authentication.


Security and Communication Networks | 2014

A simple and rapid authentication protocol in mobile networks

Ming-Huang Guo

Recently, mobile networks are more and more popular in providing the most pursuing pervasive networking services. Many technologies are deployed in mobile networks, such as Universal Mobile Telecommunication System (UMTS). In these communication systems, user secrecy and privacy are important issues and should be managed seriously. To avoid security threats, many studies on authentication in the mobile networks are proposed. In 2008, Juang and Wu introduced an authentication scheme with user privacy protection in UMTS networks. It resisted and avoided many security attacks and threats, but there are still some problems, such as the incomplete defense against the impersonation attack and data with International Mobile Subscriber Identity exchanged outside home networks. In this paper, we proposed a simple and rapid authentication scheme in mobile networks. The proposal applies the Elliptic Curve Diffie–Hellman key agreement protocol to exchange the session key safely and Elliptic Curve Digital Signature Algorithm to improve the mobile security. It also deploys the temporary key mechanism to speed up the authentication while user is roaming in the mobile networks. The analysis shows that our mechanism not only improves Juang and Wus proposal but also is a more secure and simple authentication protocol. Copyright


grid and pervasive computing | 2010

The routing mechanism with interference aware and congestion aware for IEEE 802.16j networks

Wei-Hang Liang; Horng-Twu Liaw; Li-Lin Hsiao; Jyun-Fu Chen; Ming-Huang Guo

In this paper, we introduce a new routing mechanism for IEEE 802.16j The proposed mechanism can avoid interference between nodes, stabilize the efficiency of transmission, and also provide backup path According to the simulation results, our mechanism provides better performance than other researches on the theme of functional integrity Also, the proposal greatly improves stability of transmission, packet delay time, and throughput.


Iet Information Security | 2010

Digital product transaction mechanism for electronic auction environment

Chih-Ta Yen; Tzong-Chen Wu; Ming-Huang Guo; Chuan-Kai Yang; Han-Chieh Chao

The rapid development in electronic commerce and information technology drives the traditional physical product trading evolved to digital product trading. With the effect of the multi-agents system in the Internet environment and the promotions of Government, digital product industry grows fast. The authors proposed a digital product transaction mechanism for electronic auction in the multi-agents system environment. The research introduced a convenient platform to protect the privacies of both buyers and sellers, and track digital product further in an electronic auction environment. In addition, by using simple cryptography techniques supplemented with encryption, the authors ensure the security of information transactions, thereby providing a mechanism of safe and fair digital product electronic auction.

Collaboration


Dive into the Ming-Huang Guo's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Der-Jiunn Deng

National Changhua University of Education

View shared research outputs
Top Co-Authors

Avatar

Chih-Ta Yen

National Taiwan University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Han-Chieh Chao

National Dong Hwa University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Chuan-Kai Yang

National Taiwan University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Nai-Wei Lo

National Taiwan University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge