Building an integrated energy system (IES) is an excellent solution to environmental pollution an... more Building an integrated energy system (IES) is an excellent solution to environmental pollution and energy consumption currently. However, there are usually various IES configurations with different performances, and it is usually difficult for the decision-makers to select the most sustainable IES solution among multiple choices. In this paper, we attempt to design an evaluation method that considers the renewable energy and energy system model for evaluating the benefit of an IES. Firstly, this paper constructs an evaluation index system including four dimensions of technology, economy, environment, and society, based on the physical architecture of IES and its benefit influencing factors. It focuses on multiple energy sources or systems, and satisfies the overall evaluation of IES, resulting in accurate benefit evaluation results. Secondly, the subjective weight is determined by combining the triangular fuzzy number (TFN) and the analytic hierarchy process (AHP). The objective wei...
In recent years, due to the rapid development of information techniques and network technologies,... more In recent years, due to the rapid development of information techniques and network technologies, more and more medical documents have been replaced by electronic files for sharing and transmitting in real time. However, medical data transmitted over public communication channels may suffer from security attacks and privacy threats. Blockchain technology has been gotten many attentions in different areas due to its unique properties such as anonymity, verifiability, immutability and decentralization. In order to secure patient privacy and provide more personal healthcare services, in this paper, we propose a data aggregation scheme based on Blockchain technology for medical environments. Moreover, in order to implement remote medical monitoring, we design a group authentication mechanism for multiple authorized users (such as patient, doctors, caregivers, family and friends) to freely access patient's personal health records. The authorized group members in a group will agree on a group session key and use it to protect patient's sensitive information. In case of a new member joins the medical group or an old member leaves the medical group, the group session key needs to be updated at any time. Finally, the electronic medical system will become more secure, reliable and useful by our proposed scheme. INDEX TERMS Electronic medical record, data aggregation, blockchain technology, group authentication, electronic medical system.
In recent years, the concept of the Internet of Things has been introduced. Information, communic... more In recent years, the concept of the Internet of Things has been introduced. Information, communication, and network technology can be integrated, so that the unmanned aerial vehicle (UAV) from consumer leisure and entertainment toys can be utilized in high value commercial, agricultural, and defense field applications, and become a killer product. In this paper, a traceable and privacy-preserving authentication is proposed to integrate the elliptic curve cryptography (ECC), digital signature, hash function, and other cryptography mechanisms for UAV application. For sensitive areas, players must obtain flight approval from the ground control station before they can control the UAV in these areas. The traditional cryptography services such as integrity, confidentiality, anonymity, availability, privacy, non-repudiation, defense against DoS (Denial-of-Service) attack, and spoofing attack can be ensured. The feasibility of mutual authentication was proved by BAN logic. In addition, the computation cost and the communication cost of the proposed scheme were analyzed. The proposed scheme provides a novel application field.
In recent years, with the increase in degenerative diseases and the aging population in advanced ... more In recent years, with the increase in degenerative diseases and the aging population in advanced countries, demands for medical care of older or solitary people have increased continually in hospitals and healthcare institutions. Applying wireless sensor networks for the IoT-based telemedicine system enables doctors, caregivers or families to monitor patients' physiological conditions at anytime and anyplace according to the acquired information. However, transmitting physiological data through the Internet concerns the personal privacy of patients. Therefore, before users can access medical care services in IoT-based medical care system, they must be authenticated. Typically, user authentication and data encryption are most critical for securing network communications over a public channel between two or more participants. In 2016, Liu and Chung proposed a bilinear pairing-based password authentication scheme for wireless healthcare sensor networks. They claimed their authentication scheme cannot only secure sensor data transmission, but also resist various well-known security attacks. In this paper, we demonstrate that Liu-Chung's scheme has some security weaknesses, and we further present an improved secure authentication and data encryption scheme for the IoT-based medical care system, which can provide user anonymity and prevent the security threats of replay and password/sensed data disclosure attacks. Moreover, we modify the authentication process to reduce redundancy in protocol design, and the proposed scheme is more efficient in performance compared with previous related schemes. Finally, the proposed scheme is provably secure in the random oracle model under ECDHP.
The advancement of public-key cryptography in recent years has offered strong background support ... more The advancement of public-key cryptography in recent years has offered strong background support for the invention of numerous new system applications vastly employed in electronic business as well as other fields. However, that does not change the fact that the one-and-only Internet still remains open and unprotected. Therefore, for the sake of information security, confirming the legality of an entity's public key is always critical. Typically, a key authentication scheme needs one or more authorities to authenticate keys. To make a difference, in this study, we have developed a new key authentication scheme using generalized Communicated by A. Di Nola.
Blockchain technology is essentially a decentralized database maintained by relevant parties and ... more Blockchain technology is essentially a decentralized database maintained by relevant parties and has been widely used in various scenarios such as logistics and finance. In terms of applications in the medical field, it is becoming more and more important because the patient's symptoms may be related to a certain vaccine. Whether the patient has been vaccinated with this vaccine will lead to different diagnostic results by the doctor. However, in the current vaccination environment of many regions, the vaccination record (VR) can only be kept in the patient's vaccination booklet, which is easy to lose or destroy. erefore, the doctor needs to retrieve the patient's VR through a centralized database maintained by the government, which is time-consuming and will increase the medical risk. is study proposes a traceable blockchain-based vaccination record storage and sharing system. In the proposed system, the patient gets the vaccination at any legal clinic and the VR can be saved accompanied by the signature into the blockchain center, which ensures traceability. When the patient visits the hospital for treatment, the doctor can obtain the detail of the VR from the blockchain center and then make a diagnosis. e security of the proposed system will be protected by the programmed smart contracts. rough mutual authentication, our system can also provide and guarantee data integrity and nonrepudiation. Moreover, the proposed system has resistance to replay and man-in-the-middle attacks, and the performance is good.
Internet of Things (IoT) is the network of physical objects where information and communication t... more Internet of Things (IoT) is the network of physical objects where information and communication technology connect multiple embedded devices to the Internet for collecting and exchanging data. An important advancement is the ability to connect such devices to large resource pools such as cloud. The integration of embedded devices and cloud servers offers wide applicability of IoT to many areas of our life. With the aging population increasing every day, embedded devices with cloud server can provide the elderly with more flexible service without the need to visit hospitals. Despite the advantages of the sensor-cloud model, it still has various security threats. Therefore, the design and integration of security issues, like authentication and data confidentiality for ensuring the elderly's privacy, need to be taken into consideration. In this paper, an intelligent and secure health monitoring scheme using IoT sensor based on cloud computing and cryptography is proposed. The proposed scheme achieves authentication and provides essential security requirements.
RF-based gesture sensing and recognition has increasingly attracted intense academic and industri... more RF-based gesture sensing and recognition has increasingly attracted intense academic and industrial interest due to its various device-free applications in daily life, such as elder monitoring, mobile games. State-of-the-art approaches achieved accurate gesture sensing by using fine-grained RF signatures (such as CSI, Doppler effect) while could not achieve the same accuracy with coarse-grained RF signatures such as received signal strength (RSS). This paper presents rRuler, a novel feature extraction method which aims to get fine-grained human gesture features with coarse-grained RSS readings, which means rought ruler could measure fine things. In order to further verify the performance of rRuler, we further propose rRuler-HMM, a hidden Markov model (HMM) based human gesture sensing and prediction algorithm which utilizes the features extracted by rRuler as input. We implemented rRuler and rRuler-HMM using TI Sensortag platforms and off-the-shelf (CTOS) laptops in an indoor environment, extensively performance evaluations show that rRuler and rRuler-HMM stand out for their low cost and high practicability, and the average gesture sensing accuracy of rRuler-HMM can achieve 95.71% in NLoS scenario and 97.14% in LoS scenario, respectively, which is similar to the performance that fine-grained RF signatures based approaches could achieve.
The digital rights management of museums is a mechanism that protects digital content from being ... more The digital rights management of museums is a mechanism that protects digital content from being abused by controlling and managing its usage rights. Traditional museums attach importance to the collection, display, research, and education functions of "objects". In response to natural or man-made disasters, people are often caught off guard, destroying material, intangible assets, and spiritual symbolism. Therefore, with the advancement of digital technology, this research is based on the mechanism of blockchain, through the authorization of cryptographic proxy re-encryption, and proposes a new method for the preservation and authorization of digital content in museums, which can effectively display, store, and promote "important cultural relics and digital archives". In this research, the Elliptic Curve Digital Signature Algorithm (ECDSA), blockchain, and smart contracts are used to design a sustainable and traceable cultural relic exhibition mechanism. The proposed scheme achieves publicly verifiable, transparency, unforgeability, traceability, non-repudiation, standardization of stored data, timeliness, etc., goals. It is the museum's preservation and innovation approach for the unpredictable future. Through appropriate preservation and management mechanisms, it has extremely important practical significance for the protection of museum collections, the inheritance of historical and cultural heritage, and the expansion of social education.
In addition to the exhibition, collection, research, and educational functions of the museum, the... more In addition to the exhibition, collection, research, and educational functions of the museum, the development of a future museum includes the trend of leisure and sightseeing. Although the museum is a non-profit organization, if it can provide digital exhibits and collections under the premises of "intellectual property rights" and "cultural assets protection", and licensing and adding value in various fields, it can generate revenue from digital licensing and handle the expenses of museum operations. This will be a new trend in the sustainable development of museum operations. Especially since the outbreak of COVID-19 at the beginning of this year (2020), the American Alliance of Museums (AAM) recently stated that nearly a third of the museums in the United States may be permanently closed since museum operations are facing "extreme financial difficulties." This research is aimed at museums using the business model of "digital authorization". It proposes an authorization mechanism based on blockchain technology protecting the museums' digital rights in the business model and the application of cryptography. The signature and time stamp mechanism achieve non-repudiation and timeless mechanism, which combines blockchain and smart contracts to achieve verifiability, un-forgery, decentralization, and traceability, as well as the non-repudiation of the issue of cash flow with signatures and digital certificates, for the digital rights of museums in business. The business model proposes achievable sustainable development. Museums not only achieve the goal of promoting social education, but also solve their financial problems.
In recent years, with the rapid levels of economic development, there have been more and more pro... more In recent years, with the rapid levels of economic development, there have been more and more problems in property inheritance and distribution. In today's society, people still have many taboos when writing a will. Writing a will not only involves various laws and regulations but also costs a lot of money and time, which can be daunting. However, with the development of the Internet, blockchain technology has gradually been applied to many applications. Blockchain technology uses consensus algorithms to ensure consistency and records transaction information in blocks to ensure the effectiveness of transactions. In this paper, we use the cryptography mechanism to propose an online will system based on blockchain and smart contract technology. The architecture considers effectiveness and cost reduction. By combining this with blockchain technology, will assets are saved in blocks, which provides comprehensive will security and non-tamperable security protection. In addition, combined with a smart contract, it realizes the method of automatic property distribution. At the same time, this mechanism also proposes an arbitration solution when there are disputes over wills, and ensures the integrity of data, public verifiability, unforgeability, nonrepudiation, irreversibility of information, and the ability to resist counterfeiting attacks.
The coming of information age makes the integrated electronic food security sensor management in ... more The coming of information age makes the integrated electronic food security sensor management in industrial field face new challenges. This paper takes the security management food security sensor management of food industry the industrial area as the researching object, discussing the architecture of ASAAC standard food security sensor management, by means of a RSSI-based Information Hiding Algorithm (RIHA) analysis method, it puts forward ideas of assessment on the food security sensor management safety. And uses RSSI (Received Signal Strength Indication) as hidden information carrier and designs. It does not affect original data or bring additional communication cost. The simulation results show that RIHA has high hidden information transmission accuracy without bringing additional communication energy consumption.
Recently, private security services have become increasingly needed by the public. The proposed s... more Recently, private security services have become increasingly needed by the public. The proposed scheme involves blockchain technology with a smart contract. When a private security company signs a contract with a client, they install an Internet of Things (IoTs) device in the client's house and connect it with the IoT main controller; then, the IoT main controller connects to the security control center (SCC). Once there is an event triggered (e.g., a break-in or fire incident) by the IoTs device, the controller sends a message to the SCC. The SCC allocates a security guard (SG) to the incident scene immediately. After the task is accomplished, the SG sends a message to the SCC. All of these record the messages and events chained in the blockchain center. The proposed scheme makes security event records have the following characteristics: authenticated, traceable, and integral. The proposed scheme is proved by a security analysis with mutual authentication, traceability, integrity, and non-repudiation. The known attacks (e.g., man-in-the-middle attack, replay attack, forgery attack) are avoided by message encryption and a signing mechanism. Threat models in the communication phase can also be avoided. Finally, computation cost, communication performance, and comparison with related works are also discussed to prove its applicability. We also provide an arbitration mechanism, so that the proposed scheme can reduce disputes between private security companies and the client.
In recent years, due to the slowdown of the global economy and the instability of the stock marke... more In recent years, due to the slowdown of the global economy and the instability of the stock market and real estate market, the art market has gradually become the third-largest investment market after the former two. As more and more funds flow into the art market, the two seemingly unrelated industries, art, and finance have increasingly close cooperation due to the growing prosperity of the art market. As a very important part of the process of art financialization, the development of art banks has also received extensive attention from all walks of life. In addition, blockchain, as a technology to jointly maintain reliable databases through trustlessness and decentralization, has grown rapidly in recent years, and is gradually applied in various fields. The advantages of blockchain technology are decentralization, anonymity, immutability, and traceability of stored information. The proposed scheme applies the characteristics of blockchain technology to Art Bank's art rental system, and will have the following advantages: the use of Hyperledger technology, various art banks being merged into an alliance, and information among alliance members being shared, which is convenient for tenants to comprehensively query a single item. Using blockchain technology, in an environment where there is no central authority, under the premise of preventing the tampering of artwork-related information, ensures that the detailed information of the artwork is shared. Traditional leasing agreements can be compiled into smart contract leasing contracts to automatically run and manipulate data. The proposed protocol satisfies the following security requirements: identities' mutual authentication, non-repudiation between every two parties, and other major security requirements based on blockchain. When a dispute arises, our proposed scheme also has an arbitration mechanism to clarify responsibilities.
With the rapid development of power grid informatization, the power system has evolved into a mul... more With the rapid development of power grid informatization, the power system has evolved into a multi-dimensional heterogeneous complex system with high cyber-physical integration, denoting the Cyber-Physical Power System (CPPS). Network attack, in addition to faults, becomes an important factor restricting the stable operation of the power system. Under the influence of network attacks, to improve the operational stability of CPPSs, this paper proposes a CPPS network attack detection method based on ensemble learning. First, to solve the shortcomings of a low detection precision caused by insufficient network attack samples, a power data balancing processing method was proposed. Then, the LightGBM ensemble was constructed to detect network attack events and lock the fault points caused by the attack. At the same time, in the process of gradient boost, the focal loss was introduced to optimize the attention weight of the classifier to the misclassified samples, thus improving the network attack detection precision. Finally, we propose an effective evaluation method of the network attack detection model based on cyber-physical comprehensive consideration. In addition, the cyber-physical power system stability under the action of the network attack detection model is quantitatively analyzed. The experimental results show that the F1 score of network attack detection increases by 16.73%, and the precision increases by 15.67%.
Humans frequently need to construct a huge number of buildings for occupants in large cities to w... more Humans frequently need to construct a huge number of buildings for occupants in large cities to work or live in a highly developed civilization; people who live in the same building or same area are defined as a community. A thief stealing items, a burglary, fire hazards, flood hazards, earthquakes, emergency aid, abnormal gas leakage, strange behavior, falling in a building, fainting in a building, and other incidents all threaten the community's safety. Therefore, we proposed a blockchain-based community safety security system that is combined with IoT devices. In the proposed scheme, we designed multiple phases to process the alarm triggered by IoT devices. IoT devices can be set up in two types areas: private and public areas. Both types of IoT devices' alarms have different process flow for the response and records checking phase. All records are saved in the Blockchain Center to assure the data can be verified and cannot be forged. During the communication between sender and receiver, we implemented some security methods to prevent message repudiation, prevent transmission intercept, prevent replay attacks, and ensure data integrity. We also implemented a clarifying mechanism to ensure that all system participants can have confidence in the system's processing methods. The proposed scheme can be used in communities to improve community safety and prevent unnecessary conflicts.
In some liberal democracies, governments allow people to legally own guns to protect their lives ... more In some liberal democracies, governments allow people to legally own guns to protect their lives and property. However, gun crime has been increasing in recent years. Taking the United States, for example, a report pointed out that Americans are 10 times more likely to be shot than citizens of other countries. Murder using guns in the United States is 25 times more than that in the other 22 high-income countries. Most of these guns came from other cities. These illegally circulating guns are directly linked to deadly street violence. This means that effective firearm management can reduce deadly violence. In the past few years, Radio Frequency IDentification (RFID) technology was often used to track the supply chain. However, in the traditional supply chain, only the participants of the supply chain can query information. Furthermore, only the participants can verify the correctness of the data. This result causes information to be not transparent. On the other hand, blockchain technology, with a unique combination of features such as distributed notes, decentralized structure, consensus algorithm, storage mechanism, asymmetric encryption, and smart contract, ensures network visibility, transparency, and security. Therefore, we combine blockchain and RFID technology to propose a traceable firearm management system based on blockchain and Internet of Things (IoT) technology. The proposed method achieves several goals. First of all, the characteristic data through the blockchain can be publicly verified and the information will not be modified. The traceability of the data and the application of RFID can effectively manage the production chain. In addition, we used Burrows-Abadi-Needham logic (BAN logic) logic to prove mutual authentication, and the nonrepudiation and integrity method can also be achieved in our proposed scheme.
In recent years, blockchain-related technologies and applications have gradually emerged. Blockch... more In recent years, blockchain-related technologies and applications have gradually emerged. Blockchain technology is essentially a decentralized database maintained by the collective, and it is now widely applied in various fields. At the same time, with the growth of medical technology, medical information is becoming increasingly important in terms of patient identity background, medical payment records, and medical history. Medical information can be the most private information about a person, but due to issues such as operation errors within the network or a hacking attack by a malicious person, there have been major leaks of sensitive personal information in the past. In any case, this has become an issue worth studying to ensure the privacy of patients and protect these medical materials. On the other hand, under the current medical system, the patient's EMR (electronic medical record) cannot be searched across the hospital. When the patient attends the hospital for treatment, repeated examinations will occur, resulting in a waste of medical resources. Therefore, we propose a blockchain-based secure inter-hospital EMR sharing system in this article. Through the programmatic authorization mechanism by smart contracts, the security of EMR is guaranteed. In addition to the essential mutual authentication, the proposed scheme also provides and guarantees data integrity, nonrepudiation, user untraceability, forward and backward secrecy, and resistance to replay attack.
One of the foundational and key means of optimizing network service in the field of network secur... more One of the foundational and key means of optimizing network service in the field of network security is traffic identification. Various data transmission encryption technologies have been widely employed in recent years. Wrongdoers usually bypass the defense of network security facilities through VPN to carry out network intrusion and malicious attacks. The existing encrypted traffic identification system faces a severe problem as a result of this phenomenon. Previous encrypted traffic identification methods suffer from feature redundancy, data class imbalance, and low identification rate. To address these three problems, this paper proposes a VPN-encrypted traffic identification method based on ensemble learning. Firstly, aiming at the problem of feature redundancy in VPNencrypted traffic features, a method of selecting encrypted traffic features based on mRMR is proposed; secondly, aiming at the problem of data class imbalance, improving the Xgboost identification model by using the focal loss function for the data class imbalance problem; Finally, in order to improve the identification rate of VPN-encrypted traffic identification methods, an ensemble learning model parameter optimization method based on optimal Bayesian is proposed. Experiments revealed that our proposed VPN-encrypted traffic identification method produced more desirable VPN-encrypted traffic identification outcomes. Meanwhile, using two encrypted traffic datasets, eight common identification algorithms are compared, and the method appears to be more accurate in identifying encrypted traffic.
Uploads
Papers by Chin-ling Chen