Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ronggong Song is active.

Publication


Featured researches published by Ronggong Song.


security of ad hoc and sensor networks | 2005

AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks

Ronggong Song; Larry Korba; George Yee

Security, anonymity, and scalability are still important issues for mobile ad hoc network routing protocols. We first expose the limitations of several existing mobile ad hoc network routing protocols with security and anonymity constraints and analyze their scalabilities. Based on the analysis, we propose a new anonymous dynamic source routing protocol (AnonDSR) to provide three levels of security protection. We compare their scalabilities with security constraints, and analyze the new protocol to show it has strong security and anonymity protection, and very good scalability.


international conference on parallel processing | 2003

Secure dynamic distributed routing algorithm for ad hoc wireless networks

Khalil El-Khatib; Larry Korba; Ronggong Song; George Yee

An ad hoc wireless network permits wireless mobile nodes to communicate without prior infrastructure. Due to the limited range of each wireless node, communication sessions between two nodes are usually established through a number of intermediate nodes. Unfortunately, some of these intermediate nodes might be malicious, forming a threat to the security or confidentiality of exchanged data. While data encryption can protect the content exchanged between nodes, analysis of communication patterns may reveal valuable information about end users and their relationships. Using anonymous paths for communication provides security and privacy against traffic analysis. To establish these anonymous paths, all nodes build a global view of the network by exchanging routing information. In dynamic ad hoc networks, building this global view is not an option. In this paper, we propose and analyze a distributed route construction algorithm for use in the establishment of anonymous routing paths in ad hoc wireless networks.


IEEE Transactions on Industrial Informatics | 2005

Distributed device networks with security constraints

Yuefei Xu; Ronggong Song; Larry Korba; Lihui Wang; Weiming Shen; Sherman Y. T. Lang

In todays globalized business world, outsourcing, joint ventures, mobile and cross-border collaborations have led to work environments distributed across multiple organizational and geographical boundaries. The new requirements of portability, configurability and interoperability of distributed device networks put forward new challenges and security risks to the systems design and implementation. There are critical demands on highly secured collaborative control environments and security enhancing mechanisms for distributed device control, configuration, monitoring, and interoperation. This paper addresses the collaborative control issues of distributed device networks under open and dynamic environments. The security challenges of authenticity, integrity, confidentiality, and execution safety are considered as primary design constraints. By adopting policy-based network security technologies and XML processing technologies, two new modules of Secure Device Control Gateway and Security Agent are introduced into regular distributed device control networks to provide security and safety enhancing mechanisms. The core architectures, applied mechanisms, and implementation considerations are presented in detail in this paper.


Internet Research | 2005

An analysis of online gaming crime characteristics

Ying-Chieh Chen; Patrick S. Chen; Jing‐Jang Hwang; Larry Korba; Ronggong Song; George Yee

Purpose – To arouse the public awareness of online gaming‐related crimes and other societal influences so that these problems can be solved through education, laws and appropriate technologies.Design/methodology/approach – A total of 613 criminal cases of online gaming crimes that happened in Taiwan during 2002 were gathered and analyzed. They were analyzed for special features then focusing on the tendency for online gaming crime. Related prosecutions, offenders, victims, criminal methods, and so on, were analyzed.Findings – According to our analysis of online gaming characteristics in Taiwan, the majority of online gaming crime is theft (73.7 percent) and fraud (20.2 percent). The crime scene is mainly in internet cafes (54.8 percent). Most crimes are committed within the 12:00 to 14:00 time period (11.9 percent). Identity theft (43.4 percent) and social engineering (43.9 percent) are the major criminal means. The offenders (95.8 percent) and victims (87.8 percent) are mainly male and offenders always p...


Archive | 2007

Trust in E-services: Technologies, Practices and Challenges

Ronggong Song; Larry Korba; George Yee

The tremendous growth of the Internet is successfully making a variety of e-services a part of citizens everyday life. E-services such as: Web-banking, Web shopping, e-learning, e-healthcare, and e-government, are available in most countries around the world. Trust in E-Services: Technologies, Practices and Challenges provides an overview of e-service trust issues, including: definitions, constructs, and relationships with other research topics such as security, privacy, reputation, and risk. Trust in E-Services: Technologies, Practices and Challenges introduces and discusses the existing trust platforms and management tools such as trust evaluation, reasoning approaches, and mechanisms for e-services. This book also offers contributions from researchers and practitioners with real-life experience and practice on how to build a trust environment for e-government services.


Lecture Notes in Computer Science | 2002

Anonymous Communications for Mobile Agents

Larry Korba; Ronggong Song; George Yee

Anonymous communication techniques are vital for some types of e-commerce applications. There have been several different approaches developed for providing anonymous communication over the Internet. In this paper, we review key techniques for anonymous communication and describe an alternate anonymous networking approach based on agile agents intended to provide anonymous communication protection for mobile agent systems.


cooperative design, visualization, and engineering | 2006

Automated social network analysis for collaborative work

Larry Korba; Ronggong Song; George Yee; Andrew S. Patrick

Inter-networked computers enable virtual collaborative work. In the course of interacting with one another, individuals send and receive messages and files of various sorts. This may be done within specialized collaborative work environments, or by simply employing a combination of different communication tools and applications. In the course of doing their work, collaborators perform different actions that create and/or otherwise manipulate digital artifacts that are related to different aspects of their collaboration. Social network analysis is used to develop a fuller understanding of interactions between people. We describe a software prototype of a tool that automatically measures and analyzes aspects of collaboration developing visualizations of likely social interactions. In this paper we describe the system, some early results, and several different possible applications of the technology.


IEEE Communications Letters | 2008

A Scalable Group Key Management Protocol

Ronggong Song; Larry Korba; George Yee

Group key management brings challenges on scalability for multicast security. In this paper, we propose a new group key management protocol and demonstrate that it has better scalability when compared with other important centralized protocols.


military communications conference | 2009

A robust anonymous ad hoc on-demand routing

Ronggong Song; Larry Korba

Robustness, security, anonymity, and scalability are valued features for mobile ad hoc network routing protocols. Unfortunately, the existing ad hoc routing protocols have limitations in each area. In this paper, we first analyze several existing mobile ad hoc routing protocols for robustness, security, anonymity, and scalability. Based on the analysis, we propose a new robust anonymous ad hoc on-demand routing protocol based on a proposed anonymous neighborhood trust model. We demonstrate that the protocol has strong security and anonymity protection, better scalability and is more robust when compared with other protocols.


advanced information networking and applications | 2006

Towards Designing Secure Online Games

George Yee; Larry Korba; Ronggong Song; Ying-Chieh Chen

The multiplayer gaming industry has become very successful in Asia. With the growth of online gaming, there has been an amazing growth in online gaming-related crime, especially in massively multiplayer online role-playing games (MMORPGs). In Taiwan, more than 37% of criminal cases relate to online gaming crime with most offenders in the age range of 15-20 years. Most of these crimes can be attributed to the fact that these online games were not designed to be secure. This paper applies a design for security approach to MMORPGs and then examines what crimes could have been avoided if the games were designed to be secure from the beginning. The approach also uncovers some potential new threats and gives countermeasures for them

Collaboration


Dive into the Ronggong Song's collaboration.

Top Co-Authors

Avatar

Larry Korba

National Research Council

View shared research outputs
Top Co-Authors

Avatar

George Yee

National Research Council

View shared research outputs
Top Co-Authors

Avatar

Ying-Chieh Chen

National Chiao Tung University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yuefei Xu

National Research Council

View shared research outputs
Top Co-Authors

Avatar

Khalil El-Khatib

University of Ontario Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Liqiang Geng

National Research Council

View shared research outputs
Top Co-Authors

Avatar

Scott Buffett

National Research Council

View shared research outputs
Top Co-Authors

Avatar

Yunli Wang

National Research Council

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge