Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yao-Hsin Chen is active.

Publication


Featured researches published by Yao-Hsin Chen.


computer and communications security | 2012

PassMap: a map based graphical-password authentication system

Hung-Min Sun; Yao-Hsin Chen; Chiung-Cheng Fang; Shih-Ying Chang

Text passwords have been used in authentication systems for many decades. Users must recall the textual strings selected during registration to pass authentication. However, there are some serious problems with text passwords---recollection and security. Hence, various graphical-password authentication systems have been proposed to solve the problems of text passwords. Previous studies indicate that humans are better at recognizing and recalling images than texts. In 2005, Wiedenbeck et al. proposed PassPoints in which a password consists of a sequence of click-points (5 to 8) that a user chooses on an image. In the paper, we proposed an alternative system in which users can memorize fewer points while providing more security than PassPoints. Based on the idea of using an extremely large image as the password space, we propose a novel world map based graphical-password authentication system called PassMap in which a password consists of a sequence of 2 click-points that a user selects on an large world map. We also conducted a user study for evaluation. The result shows that the passwords of PassMap are easy to memorize for humans and PassMap is friendly to use in practice. Furthermore, PassMap provides higher entropy than PassPoints and also increases the cost of attacks.


Expert Systems With Applications | 2014

Eliminating rouge femtocells based on distance bounding protocol and geographic information

Chien-Ming Chen; Yao-Hsin Chen; Yue-Hsun Lin; Hung-Min Sun

Recently, femtocell solutions have been attracting increasing attention since coverage for broadband radios can effectively eliminate wireless notspots. To restrict malicious subscribers from accessing femtocells, 3G/WiMAX standards introduce an access control strategy, called Closed Subscriber Group (CSG). However, CSG only prevents malicious clients, but not rouge femtocells. In 2009, Han et al. proposed the first mutual authentication mechanism. This mechanism does not consider the case that an attacker can locate femtocells in an unregistered area even these femtocells are legitimate. In this paper, we first define two attacks, sinkhole and wormhole attacks, in femtocell-enabled mobile networks. Then, we design two approaches based on distance bounding protocols and geographic information to defend against these two attacks. In our design, a subscriber can confirm whether or not the femtocell he connected with is physically-present. Experiment results demonstrate that the distance bounding protocol can estimate an approximate distance between a subscribers device and the deployed femtocell. Moreover, femtocells that are deployed inside or outside can both be identified and distinguished without the bias of signal strength based on our design.


asia-pacific services computing conference | 2008

Secure and Efficient Handover Schemes for Heterogeneous Networks

Hung-Min Sun; Shuai-Min Chen; Yao-Hsin Chen; Heng-Jeng Chung; I-Hung Lin

With the rapid development of wireless communication, mobile users are able to manually switch their network interfaces to different types of networks. The IEEE 802.21 Draft Standard was proposed to integrate the Media Independent Handover (MIHs) between the wireless network interfaces, such as WiFi, WiMAX, 3 GPP, and 3GPP2. However, it may not hold the seamless roaming character and does not provide the security mechanism.In this paper, we propose an efficient handover mechanism among WiFi and WiMAX networks to meet the seamless roaming character by reducing the authentication processes. In addition, the proposed scheme involves security mechanisms that guarantee the handover messages to be secure and maintain the authenticity for the reduced steps.


ubiquitous computing | 2013

A collaborative routing protocol against routing disruptions in MANETs

Hung-Min Sun; Chiung-Hsun Chen; Chih-Wen Yeh; Yao-Hsin Chen

Mobile ad hoc networks (MANETs) are vulnerable to active attacks, such as dropping attacks, replay attacks, collusion attacks, and tampering attacks. Many researches have been proposed to provide security transmission. However, they cannot effectively and efficiently resist colluding attacks. Therefore, we propose a collaborative routing protocol (CRP) to detect and isolate colluding attackers via monitor mechanism. Monitor nodes observe and record the behavior of intermediate nodes. Based on the records of intermediate nodes, source node can distinguish malicious nodes and isolate them. Finally, security analyses and simulation verify that CRP can effectively and efficiently resist black hole attacks, gray hole attacks, modify and fake packet attacks, rushing attacks, and collusion attacks.


ieee region 10 conference | 2007

The design and implementation of IPSec conflict avoiding and recovering system

Hung-Min Sun; Shih-Ying Chang; Yao-Hsin Chen; Bing-Zhe He; Chang-Kai Chen

IPSec has been popularly used in protecting data over IP network; however, how to detect and avoid policy conflicts is a big challenge. Under current architecture, user- space process can directly manipulate security associations database (SADB) or security policies database (SPDB) causing inter-application conflict, lack of access control, lack of conflict avoiding and recovering, and conflict diffusion. Previous proposed algorithms can only detect conflicts afterward instead of preventing them in advance. Therefore we propose a new architecture to avoid conflicts and provide recovery mechanism. Finally, we implement these functionalities and the evaluation of performance shows that this architecture is realistic and practical.


IEEE Transactions on Information Forensics and Security | 2012

oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks

Hung-Min Sun; Yao-Hsin Chen; Yue-Hsun Lin


Archive | 2011

Captcha image authentication method and system

Hung-Min Sun; Chun-Hao Yeh; Yao-Hsin Chen


IEEE Transactions on Mobile Computing | 2010

SPATE: Small-Group PKI-Less Authenticated Trust Establishment

Yue-Hsun Lin; Ahren Studer; Yao-Hsin Chen; Hsu-Chun Hsiao; Li-Hsiang Kuo; Jason Lee; Jonathan M. McCune; King-Hang Wang; Maxwell N. Krohn; Phen-Lan Lin; Adrian Perrig; Hung-Min Sun; Bo-Yin Yang


Archive | 2013

SASHIMI: Secure Aggregation via Successively Hierarchical Inspecting of Message Integrity on WSN

Chien-Ming Chen; Yue-Hsun Lin; Yao-Hsin Chen


Archive | 2009

Mobile station, access point, gateway apparatus, base station, and handshake method thereof for use in a wireless network framework

Frank Chee-Da Tsai; Chien-Chien Chiu; I-Hung Lin; Hung-Min Sun; Shuai-Min Chen; Yao-Hsin Chen; Heng-Jeng Chung

Collaboration


Dive into the Yao-Hsin Chen's collaboration.

Top Co-Authors

Avatar

Hung-Min Sun

National Tsing Hua University

View shared research outputs
Top Co-Authors

Avatar

Yue-Hsun Lin

National Tsing Hua University

View shared research outputs
Top Co-Authors

Avatar

Shih-Ying Chang

National Tsing Hua University

View shared research outputs
Top Co-Authors

Avatar

Bing-Zhe He

National Tsing Hua University

View shared research outputs
Top Co-Authors

Avatar

Chiung-Hsun Chen

National Tsing Hua University

View shared research outputs
Top Co-Authors

Avatar

Heng-Jeng Chung

National Tsing Hua University

View shared research outputs
Top Co-Authors

Avatar

Shao-Wei Huang

National Tsing Hua University

View shared research outputs
Top Co-Authors

Avatar

Shuai-Min Chen

National Tsing Hua University

View shared research outputs
Top Co-Authors

Avatar

Chien-Ming Chen

Harbin Institute of Technology Shenzhen Graduate School

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge