Time filter

Source Type

Tirupati, India

Wu W.-C.,Computer Center | Liaw H.-T.,Shih Hsin University
Journal of Sensors

In mobile ad hoc networks (MANETs), the more applications we use, the more security is required. In this paper, we propose a high secure and efficient routing scheme that not only satisfies the properties of anonymity, security, authentication, nonrepudiation, and unforgeability that the previous paper achieved for ad hoc networks, but also satisfies other necessary properties such as confidentiality, traceability, and flexibility for multipaths in order to make the ad hoc environment more secure and practicable. © 2015 Wei-Chen Wu and Horng-Twu Liaw. Source

Wu W.-C.,Computer Center | Liaw H.-T.,Shih Hsin University
Lecture Notes in Electrical Engineering

Because of the more and more services wireless communication tech- nology can offer nowadays, the quality of wireless communication became an important key. In this research, 3G/UMTS and WLAN, which are two major wireless communication techniques will be mentioned mainly. The former offers a wide-range, high-movability, complete and safe record of accounting; the latter offers a narrow-range, low-movability, high-speed-transmission access on the Internet. The complementary between these two techniques can not only enhance the quality of wireless communication but offer more services for customers to choose, and customers can use wireless application services regardless of any environmental limit. This research will focus on the problem of fast-handover when 3G/UMTS and WLAN is interworking, such as authentication and authorization. About the two formers, we will use W-SKE to accomplish authentication proce- dure, and achieve safer Mutual Full Authentication and Fast-Authentication. © Springer Science+Business Media Dordrecht 2015. Source

Zhao M.X.,Computer Center
Advanced Materials Research

This paper mainly researches trim and transplantation of the Linux kernel at the platform of ARM.Transplantation of operating system can be done in the following steps: configuration, trim of source code, cross-compilation. This paper make a detailed description about items above,and the realization of it. Transplantation of operating system is the base of embedded system,so it has a important significance on development of embedded system. © (2013) Trans Tech Publications, Switzerland. Source

Wu W.-C.,National Central University | Wu W.-C.,Computer Center | Chen Y.-M.,National Central University
Applied Mathematics and Information Sciences

Vehicular ad hoc networks (VANETs) are emerging to improve road safety and traffic management. Privacy and security are very important in VANETs. Existing authentication protocols to secure VANETs raise challenges such as certificate distribution and reduction of the strong reliance on tamper-proof devices. Recently, Yeh et al. proposed a portable privacy-preserving authentication and access control protocol in vehicular ad hoc networks (PAACP). However, PAACP in the authorization phase is breakable and cannot keep privacy in VANETs. In this paper, we present a cryptanalysis of an attachable blind signature and show that the PAACP's Authorized Credential (AC) is not secure and private even the AC secretly stored in a tamper-proof device. Our analysis showed that in PAACP, an eavesdropper can construct the AC from an intercepted blind document. As a result, PAACP in the authorization phase is breakable, and as any outsider can know who has which access privileges to access which service, the user's privacy in VANETs is jeopardized. © 2012 NSP Natural Sciences Publishing Cor. Source

Ma L.,Zhejiang University of Science and Technology | Wang K.,Zhejiang University | Shao M.,Computer Center
Measurement: Journal of the International Measurement Confederation

Strapdown inertial navigation system cannot easily implement initial alignment on moving base if without the prior "one shot" transfer from another master inertial navigation system and strict constraints on moving trajectory, because the initial coarse attitude cannot be effectively achieved. In this paper, a novel method using the GPS measurements to assist to solve initial attitude matrix is investigated as coarse alignment. Specific vectors are constructed with GPS measurements and used for attitude matrix computation like in analytic alignment algorithm. Several moving conditions of carrier are assumed to test the new alignment method, and the results indicate that the initial attitude angles can be achieved with small errors, which is suitable for the conventional fine alignment afterward. © 2013 Elsevier Ltd. All rights reserved. Source

Discover hidden collaborations