Ronggong Song
National Research Council
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Ronggong Song.
security of ad hoc and sensor networks | 2005
Ronggong Song; Larry Korba; George Yee
Security, anonymity, and scalability are still important issues for mobile ad hoc network routing protocols. We first expose the limitations of several existing mobile ad hoc network routing protocols with security and anonymity constraints and analyze their scalabilities. Based on the analysis, we propose a new anonymous dynamic source routing protocol (AnonDSR) to provide three levels of security protection. We compare their scalabilities with security constraints, and analyze the new protocol to show it has strong security and anonymity protection, and very good scalability.
international conference on parallel processing | 2003
Khalil El-Khatib; Larry Korba; Ronggong Song; George Yee
An ad hoc wireless network permits wireless mobile nodes to communicate without prior infrastructure. Due to the limited range of each wireless node, communication sessions between two nodes are usually established through a number of intermediate nodes. Unfortunately, some of these intermediate nodes might be malicious, forming a threat to the security or confidentiality of exchanged data. While data encryption can protect the content exchanged between nodes, analysis of communication patterns may reveal valuable information about end users and their relationships. Using anonymous paths for communication provides security and privacy against traffic analysis. To establish these anonymous paths, all nodes build a global view of the network by exchanging routing information. In dynamic ad hoc networks, building this global view is not an option. In this paper, we propose and analyze a distributed route construction algorithm for use in the establishment of anonymous routing paths in ad hoc wireless networks.
IEEE Transactions on Industrial Informatics | 2005
Yuefei Xu; Ronggong Song; Larry Korba; Lihui Wang; Weiming Shen; Sherman Y. T. Lang
In todays globalized business world, outsourcing, joint ventures, mobile and cross-border collaborations have led to work environments distributed across multiple organizational and geographical boundaries. The new requirements of portability, configurability and interoperability of distributed device networks put forward new challenges and security risks to the systems design and implementation. There are critical demands on highly secured collaborative control environments and security enhancing mechanisms for distributed device control, configuration, monitoring, and interoperation. This paper addresses the collaborative control issues of distributed device networks under open and dynamic environments. The security challenges of authenticity, integrity, confidentiality, and execution safety are considered as primary design constraints. By adopting policy-based network security technologies and XML processing technologies, two new modules of Secure Device Control Gateway and Security Agent are introduced into regular distributed device control networks to provide security and safety enhancing mechanisms. The core architectures, applied mechanisms, and implementation considerations are presented in detail in this paper.
Internet Research | 2005
Ying-Chieh Chen; Patrick S. Chen; Jing‐Jang Hwang; Larry Korba; Ronggong Song; George Yee
Purpose – To arouse the public awareness of online gaming‐related crimes and other societal influences so that these problems can be solved through education, laws and appropriate technologies.Design/methodology/approach – A total of 613 criminal cases of online gaming crimes that happened in Taiwan during 2002 were gathered and analyzed. They were analyzed for special features then focusing on the tendency for online gaming crime. Related prosecutions, offenders, victims, criminal methods, and so on, were analyzed.Findings – According to our analysis of online gaming characteristics in Taiwan, the majority of online gaming crime is theft (73.7 percent) and fraud (20.2 percent). The crime scene is mainly in internet cafes (54.8 percent). Most crimes are committed within the 12:00 to 14:00 time period (11.9 percent). Identity theft (43.4 percent) and social engineering (43.9 percent) are the major criminal means. The offenders (95.8 percent) and victims (87.8 percent) are mainly male and offenders always p...
Archive | 2007
Ronggong Song; Larry Korba; George Yee
The tremendous growth of the Internet is successfully making a variety of e-services a part of citizens everyday life. E-services such as: Web-banking, Web shopping, e-learning, e-healthcare, and e-government, are available in most countries around the world. Trust in E-Services: Technologies, Practices and Challenges provides an overview of e-service trust issues, including: definitions, constructs, and relationships with other research topics such as security, privacy, reputation, and risk. Trust in E-Services: Technologies, Practices and Challenges introduces and discusses the existing trust platforms and management tools such as trust evaluation, reasoning approaches, and mechanisms for e-services. This book also offers contributions from researchers and practitioners with real-life experience and practice on how to build a trust environment for e-government services.
Lecture Notes in Computer Science | 2002
Larry Korba; Ronggong Song; George Yee
Anonymous communication techniques are vital for some types of e-commerce applications. There have been several different approaches developed for providing anonymous communication over the Internet. In this paper, we review key techniques for anonymous communication and describe an alternate anonymous networking approach based on agile agents intended to provide anonymous communication protection for mobile agent systems.
cooperative design, visualization, and engineering | 2006
Larry Korba; Ronggong Song; George Yee; Andrew S. Patrick
Inter-networked computers enable virtual collaborative work. In the course of interacting with one another, individuals send and receive messages and files of various sorts. This may be done within specialized collaborative work environments, or by simply employing a combination of different communication tools and applications. In the course of doing their work, collaborators perform different actions that create and/or otherwise manipulate digital artifacts that are related to different aspects of their collaboration. Social network analysis is used to develop a fuller understanding of interactions between people. We describe a software prototype of a tool that automatically measures and analyzes aspects of collaboration developing visualizations of likely social interactions. In this paper we describe the system, some early results, and several different possible applications of the technology.
IEEE Communications Letters | 2008
Ronggong Song; Larry Korba; George Yee
Group key management brings challenges on scalability for multicast security. In this paper, we propose a new group key management protocol and demonstrate that it has better scalability when compared with other important centralized protocols.
military communications conference | 2009
Ronggong Song; Larry Korba
Robustness, security, anonymity, and scalability are valued features for mobile ad hoc network routing protocols. Unfortunately, the existing ad hoc routing protocols have limitations in each area. In this paper, we first analyze several existing mobile ad hoc routing protocols for robustness, security, anonymity, and scalability. Based on the analysis, we propose a new robust anonymous ad hoc on-demand routing protocol based on a proposed anonymous neighborhood trust model. We demonstrate that the protocol has strong security and anonymity protection, better scalability and is more robust when compared with other protocols.
advanced information networking and applications | 2006
George Yee; Larry Korba; Ronggong Song; Ying-Chieh Chen
The multiplayer gaming industry has become very successful in Asia. With the growth of online gaming, there has been an amazing growth in online gaming-related crime, especially in massively multiplayer online role-playing games (MMORPGs). In Taiwan, more than 37% of criminal cases relate to online gaming crime with most offenders in the age range of 15-20 years. Most of these crimes can be attributed to the fact that these online games were not designed to be secure. This paper applies a design for security approach to MMORPGs and then examines what crimes could have been avoided if the games were designed to be secure from the beginning. The approach also uncovers some potential new threats and gives countermeasures for them