Yi-Li Huang
Tunghai University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yi-Li Huang.
Mathematical and Computer Modelling | 2013
Yi-Li Huang; Fang-Yie Leu; Ko-Chung Wei
Abstract Recently, wireless networks, such as Wi-Fi and 3G, have been widely equipped and popularly used in the world. People holding smart devices can conveniently access the Internet services through modern wireless networks. However, when people are enjoying using wireless systems, network security has been a crucial challenge because wireless messages, encrypted or unencrypted, may be maliciously intercepted by hackers. After analyzing and/or decrypting the messages, hackers can illegally capture or steal important information, such as credit card numbers or usernames/passwords, carried in the messages. Currently, SSL and IPsec are utilized to protect the delivery of these types of information. However, each of the two security protocols has its own drawbacks both in their key exchange and message encryption/decryption processes. To solve these drawbacks, in this paper, we propose a secure communication system, named the Wi reless S ecurity System with D ata C onnection Core (WiSDC for short), which consists of two security schemes, including a symmetric key exchange process and a two-dimensional stream cipher mechanism. The former employs random numbers and the connection keys contained in the D ata C onnection C ore (the DCC for short) to generate internal keys, through which the security level of the key exchange process can be enhanced. Here, the DCC is a set of random numbers created when the underlying user registers himself/herself with the wireless system being considered, and the random numbers are only known to the user and AAA server of the wireless system. The latter invokes two operators, including exclusive-or ⊕ and binary adder + 2 operators, and two Pseudo Random Number Sequences (PRNSs) to encrypt plaintext so as to well protect the ciphertext. The WiSDC also adopts a pseudo random number generator, which feeds back keys in current stage as a part of the inputs of the next stage, to generate more complicated keys for data encryption. Experimental results show that the WiSDC can effectively protect transmitted messages for wireless environments. The analytical results indicate that the WiSDC has higher security level and execution efficiency than those of the SSL and IPsec.
global communications conference | 2012
Fang-Yie Leu; Ilsun You; Yi-Li Huang; Kangbin Yim; Cheng-Ru Dai
In recent years, LTE (Long Term Evolution) has been one of the mainstreams of current wireless communication systems. But when its HSS authenticates UEs, the random number RAND generated by HSS for creating other keys during its delivery from HSS to UE is unencrypted. Also, many parameters are generated by invoking a function with only one input key, thus very easily to be cracked. So in this paper, we propose an improved approach in which the Diffie-Hellman algorithm is employed to solve the exposure problem of RAND in the authentication process, and an Pair key mechanism is deployed when creating other parameters, i.e., parameters are generated by invoking a function with at least two input keys. The purpose is increasing the security levels of all generated parameters so as to make LTE more secure than before.
Intelligent Automation and Soft Computing | 2014
Chin-Ling Chen; Tsai-Tung Yang; Fang-Yie Leu; Yi-Li Huang
With the rapid development of information technology and the continual progress of cloud computing technology, numerous studies have been focused on cloud services; many countries actively promote cloud systems which enhance the convenience of medical treatment and services, an important issue in remote areas. In this paper, we combine the cloud platform and mobile devices to compensate for the lack of medical resources in certain remote areas. We also use cryptographic technology to protect the patients personal information; additionally, the technology can authorize the medical treatment. The proposed scheme can minimize the misuse of medical resources; patients can employ a simple password and use mobile devices to log in to the public cloud such that the authentication, integrity, privacy and non-repudiation issues can be satisfied. Our scheme can also satisfy other specific security requirements. For example: defend against offline password guessing attacks, replay attacks, impersonation attacks, ma...
Mobile Information Systems | 2011
Yi-Fu Ciou; Fang-Yie Leu; Yi-Li Huang; Kangbin Yim
In this paper, we propose a handover authentication mechanism, called the handover key management and authentication scheme HaKMA for short, which as a three-layer authentication architecture is a new version of our previous work, the Diffie-Hellman-PKDS-based authentication method DiHam for short improving its key generation flow and adding a handover authentication scheme to respectively speed up the handover process and increase the security level for mobile stations MSs. AAA server supported authentication is also enhanced by invoking an improved extensible authentication protocol EAP. According to the analyses of this study the HaKMA can effectively and efficiently provide user authentication and balance data security and system performance during handover.
soft computing | 2014
Fang-Yie Leu; Jung-Chun Liu; Ya-Ting Hsu; Yi-Li Huang
Recently, researchers have tried to better understand human behaviors so as to let robots act in more human ways, which means a robot may have its own emotions defined by its designers. To achieve this goal, in this study, we designed and simulated a robot, named Shiau_Lu, which is empowered with six universal human emotions, including happiness, anger, fear, sadness, disgust and surprise. When we input a sentence to Shiau_Lu through voice, it recognizes the sentence by invoking the Google speech recognition method running on an Android system, and outputs a sentence to reveal its current emotional states. Each input sentence affects the strength of the six emotional variables used to represent the six emotions, one corresponding to one. After that, the emotional variables will change into new states. The consequent fuzzy inference process infers and determines the most significant emotion as the primary emotion, with which an appropriate output sentence as a response of the input is chosen from its Output-sentence database. With the new states of the six emotional variables, when the robot encounters another sentence, the above process repeats and another output sentence is then selected and replied. Artificial intelligence and psychological theories of human behaviors have been applied to the robot to simulate how emotions are influenced by the outside world through languages. In fact, the robot may help autistic children to interact more with the world around them and relate themselves well to the outside world.
IEEE Access | 2016
Kun-Lin Tsai; Yi-Li Huang; Fang-Yie Leu; Ilsun You
With a trusted-third-party (TTP)-based key exchange protocol, when a user would like to transmit a message to another user, the transmitted data are encrypted by a session key exchanged between the two ends of the corresponding connection with the help of the TTP. Up to present, due to the assistance of a TTP, this type of protocols has performed well in protecting messages delivered between two authorized users. Even this, inflexibility, unreliability, and inefficiency problems still exist in these previously proposed protocols. Therefore, in this paper, a multi-key exchange protocol, named the TTP-based high-efficient multi-key exchange protocol (THMEP), is proposed to provide users with a secure and efficient protocol, which employs the elliptic curve cryptography, a 2-D operation, and a current time encryption key, to exchange their session keys. The proposed protocol not only effectively hides important encryption parameters, but also achieves fully mutual authentication between a user and his/her trusted server. It can resist known-key, impersonation, replay, eavesdropping, and forgery attacks. Besides, the THMEP generates 40 session keys in a key exchange process, meaning the proposed protocol can support 40 sessions simultaneously. It also shortens the processing time, which is 3.78 times faster than that of a specific previous study. Its security level and performance are higher than those of the compared state-of-the-art protocols. In other words, the THMEP is very suitable for IoT applications.
The Journal of Supercomputing | 2014
Yi-Li Huang; Fang-Yie Leu; Ilsun You; Yao-Kuo Sun; Cheng-Chung Chu
In broadband wireless technology, due to having many salient advantages, such as high data rates, quality of service, scalability, security, mobility, etc., LTE-A currently has been one of the trends of wireless system development. This system provides several sophisticated authentication and encryption techniques to enhance its system security. However, LTE-A still suffers from various attacks, like eavesdropping and replay attacks. Therefore, in this paper, we propose a novel security scheme, called the security system for a 4Genvironment (Se4GE for short), which as an LTE-A-based system integrates the RSA and Diffie–Hellman algorithms to solve some of LTE-A’s security drawbacks where LTE-A stands for LTE-Advance which is a 4G system. The Se4GE is an end-to-end ciphertext transfer mechanism which dynamically changes encryption keys to enforce the security of data transmission in an LTE-A system. The Se4GE also produces several logically connected random keys, called the intelligent protection-key chain, which invokes two encryption/decryption techniques to provide users with broader demands for security services. The analytical results show that the Se4GE has higher security level than that of an LTE-A system.
Electronic Commerce Research and Applications | 2015
Fang-Yie Leu; Yi-Li Huang; Sheng-Mao Wang
The SMoSS does not require extra restrictions and resources on cash flow.Credit card fraud can be effectively avoided.Our analysis shows that the SMoSS is indeed a feasible mobile shopping system.The SMoSS can still protect a mobile phone, even the mobile phone is lost.The SMoSS can ensure the communication privacy, integrity, and non-repudiation. Nowadays the demands for wireless Internet shopping are increasing. But credit card fraud has been serious, and SET and SSL have their own problems. To enhance the security of online shopping, in this paper, we propose a secure m-commerce scheme, called the Secure M-Commerce System (SMCS for short), with which users can create a safe credit-card transaction for Internet shopping. Basically, the SMCS coordinates the cash flow of a trading system and its credit card entities to effectively protect the issued transactions against different attacks and avoid information leakage. The proposed system also employs a Data Connection Core (DCC for short) to link the card-issuing bank and consumers before their wireless communication starts so as to significantly improve the security level of our m-commerce environment. Theoretical analysis shows that the SMCS is more secure than SET and SSL. The performance analysis indicates that the SMCS is indeed a feasible m-commerce system.
broadband and wireless computing, communication and applications | 2013
Yu-Shin Huang; Fang-Yie Leu; Jung-Chun Liu; Yi-Li Huang; William C. Chu
With the rising popularity of mobile devices, the requirements of accessing wireless networks through mobile devices have been significantly higher than before. Many researches try their best to develop different communication functions and services to serve users. On the other hand, up to present from 2008 Long Term Evolution (LTE for short) has still stayed in its spotlight. Also, the population of mobile users increases significantly in recent years. When a user equipment (UE for short) moves from an evolved Node B (eNB for short) to another, the LTE needs to perform handover to help the serving and target eNBs to manage the provided resources so as to maintain the connections connecting the UE and the eNBs. If handover incompletely performed, users will experience a longer transmission delay, or even the connections are disconnected. Currently, the factor that affects the time consumed by the handover procedure is still considered as the radio issue. However, it is insufficient if we only measure the strength of the radio that the UE receives from its serving eNB to determine whether UE needs to hand over or not since the UEs location, moving speed and moving direction are also the important factors that may affect the handover quality. In this study, we employs a GPS system to help the determination of handover of the LTE system so as to more accurately choose the most suitable target eNB and improve the performance of handover.
innovative mobile and internet services in ubiquitous computing | 2012
Ko-Chung Wei; Yi-Li Huang; Fang-Yie Leu
In this paper, we propose a new symmetric key exchange system, named the Wireless Security System with Data Connection Core (WiSDC for short), which can not only verify whether a user is a legitimate one or not, but also produce internally used parameters, named internal keys, and speed up the key exchange process for a wireless session as well. Moreover, the WiSDC adopts a pseudo random number generator, which has a feedback control mechanism, to generate more complicated keys for data encryption. Experimental results show that the WiSDC can effectively enhance the security level of a wireless environment.