Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Taketsugu Yao is active.

Publication


Featured researches published by Taketsugu Yao.


embedded and ubiquitous computing | 2006

Reliable broadcast message authentication in wireless sensor networks

Taketsugu Yao; Shigeru Fukunaga; Toshihisa Nakai

Due to the low-cost nature of sensor network nodes, we cannot generally assume the availability of a high-performance CPU and tamper-resistant hardware. Firstly, we propose a reliable broadcast message authentication working under the above-mentioned circumstances. The proposed scheme, although based on symmetric cryptographic primitives, is secure against anyone who knew the message authentication key as well as the malicious router nodes in multi-hop networks. The proposed scheme consists of three steps; (i) reliable broadcast of a message, (ii) legitimate acknowledgments from all the nodes in the network, and (iii) disclosure of the message authentication key. Secondly, we propose a way to reduce the amount of the stored information until the disclosure of the key, in which the server transmits the message integrity code of a message before transmitting the message. Finally, we consider the characteristic and the security issues of the proposed schemes.


IEEE Transactions on Consumer Electronics | 2009

Initial common secret key sharing using random plaintexts for short-range wireless communications

Taketsugu Yao; Kiyoshi Fukui; Jun Nakashima; Toshihisa Nakai

With the advent of radio frequency-based remote controls, we have to consider new security threats of eavesdropping and unauthorized controls in exchange for user-friendliness. Against these attacks, it is effective to encrypt and authenticate control commands. However, it will be a challenge to design how we establish a common secret key for encryption and authentication between a remote control and a controlled device. We propose new initial common key sharing protocol, which extends the over-the-air key transport in plaintext with suppressing the transmission power. Our proposed protocol increases the amount of transmission data by sharing the secret data to multiple random plaintexts, and makes it difficult for the eavesdroppers that are not located near the transmitter to obtain secret data by increasing the probability of the transmission error at the eavesdroppers. We evaluate the security level of our proposed protocol based on IEEE 802.15.4 specification, and show the relationships among the amount of transmission data, the bit error rate at eavesdroppers, and the number of trials to find the secret data through a brute force attack.


Archive | 2010

Communication data freshness confirmation system

Taketsugu Yao; Kiyoshi Fukui


Archive | 2010

Communication system and device

Taketsugu Yao; Kiyoshi Fukui; Jun Nakashima


Archive | 2009

Transmission terminal, reception terminal, and information distribution system

Taketsugu Yao; Toshihisa Nakai; Kiyoshi Fukui


Archive | 2005

Communication timing control apparatus, communication timing control method, node, and communication system

Taketsugu Yao; Masaaki Date; Yukihiro Morita; Shigeru Fukunaga


Archive | 2011

Communication terminal using a temporary network key for assembling a secure communication frame

Taketsugu Yao; Jun Nakashima; Kiyoshi Fukui


Archive | 2012

PROXY SYSTEM FOR SECURITY PROCESSING WITHOUT ENTRUSTING CERTIFIED SECRET INFORMATION TO A PROXY

Taketsugu Yao; Jun Nakashima; Kiyoshi Fukui


Archive | 2014

NETWORK REGISTRATION SYSTEM FOR REGISTERING COMMUNICATOR ON NETWORK AND NETWORK DEVICE THEREFOR

Taketsugu Yao; Masanori Nozaki; Yuzuru Igarashi; Yoshihisa Nakano; Kiyoshi Fukui


Archive | 2014

Data Authentication for Software Updates redistributed by Wireless Multi-hop Nodes

Taketsugu Yao; Jun Nakashima; Kiyoshi Fukui

Collaboration


Dive into the Taketsugu Yao's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge