scispace - formally typeset
Search or ask a question
Author

Yan-Jun Wang

Bio: Yan-Jun Wang is an academic researcher from Minghsin University of Science and Technology. The author has contributed to research in topics: Combustion & Air quality index. The author has an hindex of 1, co-authored 1 publications receiving 131 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This paper will give demonstrations on what have caused weaknesses in the mutual authentication protocol for RFID, and more of that, an improved protocol is also proposed which are free from worries of the problems mentioned above.
Abstract: RFID, capable of remote automatic identification, is taking the place of barcodes to become electronic tags of the new generation. However, the information transmitted in the air could easily be intercepted and eavesdropped due to its radio transmission nature. On top of this, its prevalence has brought the stress on its security and privacy issues. EPC Class 1 Generation 2 (Gen 2) has served as the most popular standard for passive tags. Passive tags possess limited computation ability and capacity that just makes designing of the security protocol even more challenging. Researchers have proposed quite a few security protocols for RFID, but most of them are just too complicated to be implemented on Gen 2. Chien and Chen (2007) proposed a mutual authentication protocol conforming to this standard. However, it is found vulnerable to DoS attacks. Due to the bad properties of the CRC function used in the protocol, the claimed security objectives are also not met. Moreover, the database must use brute search for each tag's authentication. This paper will give demonstrations on what have caused these weaknesses, and more of that, an improved protocol is also proposed which are free from worries of the problems mentioned above. The improved protocol could thus be applied in high security demanding environments.

138 citations

Journal ArticleDOI
TL;DR: In this paper , a cavity ring-down spectrometer was used to quantify the NH3 emissions of combustion sources in the cold season at a rural site in Xianghe on the North China Plain.
Abstract: Although combustion is considered a common source of ammonia (NH3) in the atmosphere, field measurements quantifying such emissions of NH3 are still lacking. In this study, online measurements of NH3 were performed by a cavity ring-down spectrometer, in the cold season at a rural site in Xianghe on the North China Plain. We found that the NH3 concentrations were mostly below 65 ppb during the study period. However, from 18 to 21 November 2017, a close burn event (~100 m) increased the NH3 concentrations to 145.6 ± 139.9 ppb. Using a machine-learning technique, we quantified that this burn event caused a significant increase in NH3 concentrations by 411%, compared with the scenario without the burn event. In addition, the ratio of ∆NH3/∆CO during the burn period was 0.016, which fell in the range of biomass burning. Future investigations are needed to evaluate the impacts of the NH3 combustion sources on air quality, ecosystems, and climate in the context of increasing burn events worldwide.

1 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This paper compares security issues between IoT and traditional network, and discusses opening security issues of IoT, and analyzes the cross-layer heterogeneous integration issues and security issues in detail.

285 citations

Journal ArticleDOI
TL;DR: Although most RFID authentication schemes cannot satisfy all security requirements and have satisfactory performance, it is found that there are three recently proposed ECC-based authentication schemes suitable for the healthcare environment in terms of their performance and security.
Abstract: Advances in information and communication technologies have led to the emergence of Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings convenience to physicians and patients as they can be applied to various medical areas (such as constant real-time monitoring, patient information management, medical emergency management, blood information management, and health management). The radio-frequency identification (RFID) technology is one of the core technologies of IoT deployments in the healthcare environment. To satisfy the various security requirements of RFID technology in IoT, many RFID authentication schemes have been proposed in the past decade. Recently, elliptic curve cryptography (ECC)-based RFID authentication schemes have attracted a lot of attention and have been used in the healthcare environment. In this paper, we discuss the security requirements of RFID authentication schemes, and in particular, we present a review of ECC-based RFID authentication schemes in terms of performance and security. Although most of them cannot satisfy all security requirements and have satisfactory performance, we found that there are three recently proposed ECC-based authentication schemes suitable for the healthcare environment in terms of their performance and security.

281 citations

Book ChapterDOI
Gangqiang Yang1, Bo Zhu1, Valentin Suder1, Mark D. Aagaard1, Guang Gong1 
13 Sep 2015
TL;DR: Simeck as discussed by the authors combines the good design components from both Simon and Speck, in order to devise even more compact and efficient block ciphers, which can satisfy the area, power, and throughput requirements in passive RFID tags.
Abstract: Two lightweight block cipher families, Simon and Speck, have been proposed by researchers from the NSA recently. In this paper, we introduce Simeck, a new family of lightweight block ciphers that combines the good design components from both Simon and Speck, in order to devise even more compact and efficient block ciphers. For Simeck32/64, we can achieve 505 GEs (before the Place and Route phase) and 549 GEs (after the Place and Route phase), with the power consumption of 0.417 \(\mu W\) in CMOS 130 nm ASIC, and 454 GEs (before the Place and Route phase) and 488 GEs (after the Place and Route phase), with the power consumption of 1.292 \(\mu W\) in CMOS 65 nm ASIC. Furthermore, all of the instances of Simeck are smaller than the ones of hardware-optimized cipher Simon in terms of area and power consumption in both CMOS 130 nm and CMOS 65 nm techniques. In addition, we also give the security evaluation of Simeck with respect to many traditional cryptanalysis methods, including differential attacks, linear attacks, impossible differential attacks, meet-in-the-middle attacks, and slide attacks. Overall, all of the instances of Simeck can satisfy the area, power, and throughput requirements in passive RFID tags.

215 citations

Journal ArticleDOI
01 Jul 2014
TL;DR: A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol that can achieve mutual authentication and satisfy the essential requirements of RFID system is proposed.
Abstract: IoT (Internet of Things) is a type of network where ICT (Information and Communication Technology) links any physical objects to the internet to perform information exchange. Owing to the congenital advantages RFID is expected to play a key role as enabling identification technology in IoT. At the same time, its integration with sensing technologies brings wide applicability in many productive sectors. On the other hand, security appears to be one of the most challenging areas about designing the RFID system. The problems of authentication and privacy are fundamental to RFID security. It is well known that elliptic curve cryptosystem (ECC) based algorithms would be best choice among PKC algorithms due to their small key sizes and efficient computations. In this paper, we proposed a secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. The proposed scheme can achieve mutual authentication and satisfy the essential requirements of RFID system. Performance evolution and function comparison demonstrate that the proposed scheme is well suited for RFID tags with the scarceness of resources.

174 citations

Journal ArticleDOI
TL;DR: This paper proposes a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes and shows strong security properties that are provided from the proposed authentication scheme.
Abstract: The radio frequency identification (RFID) technology has been widely adopted and being deployed as a dominant identification technology in a health care domain such as medical information authentication, patient tracking, blood transfusion medicine, etc. With more and more stringent security and privacy requirements to RFID based authentication schemes, elliptic curve cryptography (ECC) based RFID authentication schemes have been proposed to meet the requirements. However, many recently published ECC based RFID authentication schemes have serious security weaknesses. In this paper, we propose a new ECC based RFID authentication integrated with an ID verifier transfer protocol that overcomes the weaknesses of the existing schemes. A comprehensive security analysis has been conducted to show strong security properties that are provided from the proposed authentication scheme. Moreover, the performance of the proposed authentication scheme is analyzed in terms of computational cost, communicational cost, and storage requirement.

83 citations