• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Authentication and Privacy-preserving Technologies for IoT Environment

Research Project

Project/Area Number 15K16005
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeMulti-year Fund
Research Field Information security
Research InstitutionThe University of Aizu (2017)
Osaka University (2016)
Japan Advanced Institute of Science and Technology (2015)

Principal Investigator

Su Chunhua  会津大学, コンピュータ理工学部, 准教授 (40716966)

Project Period (FY) 2015-04-01 – 2018-03-31
Project Status Completed (Fiscal Year 2017)
Budget Amount *help
¥2,860,000 (Direct Cost: ¥2,200,000、Indirect Cost: ¥660,000)
Fiscal Year 2017: ¥780,000 (Direct Cost: ¥600,000、Indirect Cost: ¥180,000)
Fiscal Year 2016: ¥910,000 (Direct Cost: ¥700,000、Indirect Cost: ¥210,000)
Fiscal Year 2015: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
KeywordsIoTセキュリティ / プライバシ保護 / IoT機器認証 / 軽量化認証暗号 / IoT生体認証 / IoT機器プライバシ / IoTデバイス認証 / 共通鍵暗号 / プライバシ保護技術 / 暗号技術 / IoT機器向けの認証 / Oblivious RAM / 共通鍵暗号の解析
Outline of Final Research Achievements

Many of inter-connected devices used for IoT environments have restricted computing power and memory, so it is difficult to efficiently to execute secure authentication using conventional security techniques. Also, different from conventional information systems, the features of mobility and socialization in IoT environments, and security and privacy problems that occurred when utilizing data gathered from connected devices are getting more and more complicated.
In this research, in order to solve these problems mentioned above, we have researched and developed new technologies for IoT authentication and privacy protection. Specifically, we proposed some batch authentication schemes and biometric authentication method for IoT devices achieving both security and efficiency. Furthermore, we proposed a framework to integrate intrusion and anomaly detection systems to collect and manage data privacy in IoT environment, and demonstrated its effectiveness in implementation verification.

Report

(4 results)
  • 2017 Annual Research Report   Final Research Report ( PDF )
  • 2016 Research-status Report
  • 2015 Research-status Report
  • Research Products

    (53 results)

All 2018 2017 2016 2015 Other

All Int'l Joint Research (12 results) Journal Article (16 results) (of which Int'l Joint Research: 16 results,  Peer Reviewed: 16 results,  Open Access: 9 results,  Acknowledgement Compliant: 4 results) Presentation (24 results) (of which Int'l Joint Research: 21 results,  Invited: 1 results) Book (1 results)

  • [Int'l Joint Research] Denmark University of Technology(デンマーク)

    • Related Report
      2017 Annual Research Report
  • [Int'l Joint Research] University of Surrey(英国)

    • Related Report
      2017 Annual Research Report
  • [Int'l Joint Research] University of Mahidol(タイ)

    • Related Report
      2017 Annual Research Report
  • [Int'l Joint Research] Monash University(Australia)

    • Related Report
      2016 Research-status Report
  • [Int'l Joint Research] Aalto University(Finland)

    • Related Report
      2016 Research-status Report
  • [Int'l Joint Research] National Dong Hwa University(Taiwan)

    • Related Report
      2016 Research-status Report
  • [Int'l Joint Research] Central China Normal University(China)

    • Related Report
      2016 Research-status Report
  • [Int'l Joint Research] Thammasat University(タイ)

    • Related Report
      2016 Research-status Report
  • [Int'l Joint Research] SIIT(タイ)

    • Related Report
      2015 Research-status Report
  • [Int'l Joint Research] Singapore Management University/Institute of Inforcomm Research(シンガポール)

    • Related Report
      2015 Research-status Report
  • [Int'l Joint Research] 福建師範大学/華中師範大学/南京財経大学(中国)

    • Related Report
      2015 Research-status Report
  • [Int'l Joint Research] Aalto University(フィンランド)

    • Related Report
      2015 Research-status Report
  • [Journal Article] Special Issue on Advanced Persistent Threat2018

    • Author(s)
      Chen Jiageng、Su Chunhua、Yeh Kuo-Hui、Yung Moti
    • Journal Title

      Future Generation Computer Systems

      Volume: 79 Pages: 243-246

    • DOI

      10.1016/j.future.2017.11.005

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] I Walk, Therefore I Am: Continuous User Authentication with Plantar Biometrics2018

    • Author(s)
      Yeh Kuo-Hui、Su Chunhua、Chiu Wayne、Zhou Lu
    • Journal Title

      IEEE Communications Magazine

      Volume: 56 Issue: 2 Pages: 150-157

    • DOI

      10.1109/mcom.2018.1700339

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] A User-Friendly Privacy Framework for Users to Achieve Consents With Nearby BLE Devices2018

    • Author(s)
      Cha Shi-Cho、Chuang Ming-Shiung、Yeh Kuo-Hui、Huang Zi-Jia、Su Chunhua
    • Journal Title

      IEEE Access

      Volume: 6 Pages: 20779-20787

    • DOI

      10.1109/access.2018.2820716

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Enhancing Trust Management for Wireless Intrusion Detection via Traffic Sampling in the Era of Big Data2018

    • Author(s)
      Meng Weizhi、Li Wenjuan、Su Chunhua、Zhou Jianying、Lu Rongxing
    • Journal Title

      IEEE Access

      Volume: 6 Pages: 7234-7243

    • DOI

      10.1109/access.2017.2772294

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Towards False Alarm Reduction Using Fuzzy If-Then Rules for Medical Cyber Physical Systems2018

    • Author(s)
      Li Wenjuan、Meng Weizhi、Su Chunhua、Kwok Lam For
    • Journal Title

      IEEE Access

      Volume: 6 Pages: 6530-6539

    • DOI

      10.1109/access.2018.2794685

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] A simple authentication encryption scheme2017

    • Author(s)
      Mazumder Rashed、Miyaji Atsuko、Su Chunhua
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: 29 Issue: 16 Pages: 16-16

    • DOI

      10.1002/cpe.4058

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Probably Secure Keyed-Function Based Authenticated Encryption Schemes for Big Data2017

    • Author(s)
      Mazumder Rashed、Miyaji Atsuko、Su Chunhua
    • Journal Title

      International Journal of Foundations of Computer Science

      Volume: 28 Issue: 06 Pages: 661-682

    • DOI

      10.1142/s0129054117400123

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] Special issue on Secure Computation on Encrypted Data2017

    • Author(s)
      Chen Jiageng、He Debiao、Su Chunhua、Xia Zhe
    • Journal Title

      Journal of Information Security and Applications

      Volume: 34 Pages: 205-206

    • DOI

      10.1016/j.jisa.2017.05.010

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] A Novel Certificateless Signature Scheme for Smart Objects in the Internet-of-Things2017

    • Author(s)
      Yeh Kuo-Hui、Su Chunhua、Choo Kim-Kwang Raymond、Chiu Wayne
    • Journal Title

      Sensors

      Volume: 17 Issue: 5 Pages: 1001-1001

    • DOI

      10.3390/s17051001

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Towards Accurate Statistical Analysis of Security Margins: New Searching Strategies for Differential Attacks2017

    • Author(s)
      Chen Jiageng、Teh Jesen、Liu Zhe、Su Chunhua、Samsudin Azman、Xiang Yang
    • Journal Title

      IEEE Transactions on Computers

      Volume: 66 Issue: 10 Pages: 1763-1777

    • DOI

      10.1109/tc.2017.2699190

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Recursive Matrix Oblivious RAM: An ORAM Construction for Constrained Storage Devices2017

    • Author(s)
      Gordon Steven、Huang Xinyi、Miyaji Atsuko、Su Chunhua、Sumongkayothin Karin、Wipusitwarakun Komwut
    • Journal Title

      IEEE Transactions on Information Forensics and Security

      Volume: 12 Issue: 12 Pages: 3024-3038

    • DOI

      10.1109/tifs.2017.2730584

    • NAID

      120006469242

    • Related Report
      2017 Annual Research Report
    • Peer Reviewed / Open Access / Int'l Joint Research
  • [Journal Article] Variable message encryption through blockcipher compression function2017

    • Author(s)
      Jiageng Chen, Rashed Mazumder, Atsuko Miyaji, Chunhua Su
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: Volume 29, Issue 7 Issue: 7 Pages: 1-16

    • DOI

      10.1002/cpe.3956

    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Formal Analysis on RFID Authentication Protocols against De-synchronization Attack2017

    • Author(s)
      Kuo-Hui Yeh, Nai-Wei Lo, Ren-Zong Kuo, Chunhua SU, Hsuan-Yu Chen,
    • Journal Title

      Journal of Internet Technology,

      Volume: Vol. 18, No.4

    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Int'l Joint Research
  • [Journal Article] A Matrix Based ORAM: Design, Implementation and Experimental Analysis2016

    • Author(s)
      Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayothin
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: E99.D Issue: 8 Pages: 2044-2055

    • DOI

      10.1587/transinf.2015INP0012

    • NAID

      130005254057

    • ISSN
      0916-8532, 1745-1361
    • Related Report
      2016 Research-status Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Universally Composable RFID Mutual Authentication2015

    • Author(s)
      Chunhua Su, Bagus Santoso, Yingjiu Li, Robert H. Deng, and Xinyi Huang
    • Journal Title

      IEEE Transactions on Dependable and Secure Computing

      Volume: 99 Pages: 1-1

    • DOI

      10.1109/tdsc.2015.2434376

    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Open Access / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Improved Handover Authentication and Key Pre-distribution for Wireless Mesh Networks2015

    • Author(s)
      Xu Yang, Xinyi Huang, Jinguang Han and Chunhua Su
    • Journal Title

      Concurrency and Computation: Practice and Experience

      Volume: 99 Issue: 10 Pages: 11-11

    • DOI

      10.1002/cpe.3544

    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Open Access / Int'l Joint Research / Acknowledgement Compliant
  • [Presentation] A simple construction of encryption for a tiny domain message2017

    • Author(s)
      Rashed Mazumder, Atsuko Miyaji, Chunhua Su
    • Organizer
      51st Annual Conference on Information Sciences and Systems, CISS 2017
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] DABEHR: Decentralized Attribute-Based Electronic Health Record System with Constant-Size Storage Complexity.2017

    • Author(s)
      Ye Li, Kaitai Liang, Chunhua Su, Wei Wu
    • Organizer
      Green, Pervasive, and Cloud Computing - 12th International Conference, GPC 2017
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Evaluating the Impact of Juice Filming Charging Attack in Practical Environments2017

    • Author(s)
      Weizhi Meng, Lee Wang Hao, Zhe Liu, Chunhua Su, Yan Li:
    • Organizer
      nformation Security and Cryptology - ICISC 2017 - 20th International Conference
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Automatic Encryption Schemes Based on the Neural Networks: Analysis and Discussions on the Various Adversarial Models2017

    • Author(s)
      Yidan Zhang, Marino Anthony James, Jiageng Chen, Chunhua Su, Jinguang Han
    • Organizer
      Information Security Practice and Experience - 13th International Conference, ISPEC 2017
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study2017

    • Author(s)
      Lijun Jiang, Weizhi Meng, Yu Wang, Chunhua Su, Jin Li
    • Organizer
      Network and System Security - 11th International Conference, NSS 2017
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Provable Secure Post-Quantum Signature Scheme Based on Isomorphism of Polynomials in Quantum Random Oracle Model.2017

    • Author(s)
      Bagus Santoso, Chunhua Su
    • Organizer
      Provable Security - 11th International Conference, ProvSec 2017
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2.2017

    • Author(s)
      Hiroshi Nomaguchi, Atsuko Miyaji, Chunhua Su
    • Organizer
      The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2017)
    • Related Report
      2017 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Cryptography-based Solutions for security and privacy in eHealth environment2017

    • Author(s)
      Chunhua Su
    • Organizer
      The 2nd International Conference on Information Technology (InCIT 2017)
    • Related Report
      2017 Annual Research Report
    • Invited
  • [Presentation] : Privacy-Preserving Mining of Association Rules for Horizontally Distributed Databases Based on FP-Tree.2016

    • Author(s)
      Yaoan Jin, Chunhua Su, Na Ruan, Weijia Jia
    • Organizer
      International Conference on Information Security Practice and Experience ISPEC 2016
    • Place of Presentation
      Zhangjiajie, China
    • Year and Date
      2016-11-16
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research
  • [Presentation] Recursive M-ORAM: A Matrix ORAM for Clients with Constrained Storage Space2016

    • Author(s)
      Karin Sumongkayothin, Steven Gordon, Atsuko Miyaji, Chunhua Su, Komwut Wipusitwarakun
    • Organizer
      International Conference on Applications and Techniques in Information Security ATIS 2016
    • Place of Presentation
      Cairns, QLD, Australia
    • Year and Date
      2016-10-26
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research
  • [Presentation] A Blockcipher Based Authentication Encryption2016

    • Author(s)
      Rashed Mazumder, Atsuko Miyaji, Chunhua Su
    • Organizer
      International Conference on Availability, Reliability, and Security, CD-ARES 2016
    • Place of Presentation
      Salzburg, Austria
    • Year and Date
      2016-08-31
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research
  • [Presentation] An Efficient Construction of a Compression Function for Cryptographic Hash2016

    • Author(s)
      Rashed Mazumder, Atsuko Miyaji, Chunhua Su
    • Organizer
      International Conference on Availability, Reliability, and Security, CD-ARES 2016
    • Place of Presentation
      Salzburg, Austria
    • Year and Date
      2016-08-31
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research
  • [Presentation] Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework2016

    • Author(s)
      Jiageng Chen, Jesen Teh, Chunhua Su, Azman Samsudin, Junbin Fang
    • Organizer
      Australasian Conference on Information Security and Privacy ACISP 2016
    • Place of Presentation
      Melbourne, VIC, Australia
    • Year and Date
      2016-07-04
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research
  • [Presentation] Secure and Traceable Framework for Data Circulation2016

    • Author(s)
      Kaitai LiangAtsuko Miyaji, Chunhua Su
    • Organizer
      Australasian Conference on Information Security and Privacy ACISP 2016
    • Place of Presentation
      Melbourne, VIC, Australia
    • Year and Date
      2016-07-04
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research
  • [Presentation] Efficient Multi-Function Data Sharing and Searching Mechanism for Cloud-Based Encrypted Data2016

    • Author(s)
      Kaitai Liang, Chunhua Su, Jiageng Chen, Joseph K. Liu
    • Organizer
      ASIA CCS '16, the 11th ACM on Asia Conference on Computer and Communications Security
    • Place of Presentation
      Xian, China
    • Year and Date
      2016-05-30
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research
  • [Presentation] :Security and experimental performance analysis of a matrix ORAM2016

    • Author(s)
      Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayyothi
    • Organizer
      2016 IEEE International Conference on Communications (ICC)
    • Place of Presentation
      Kuala Lumpur, Malaysia
    • Year and Date
      2016-05-22
    • Related Report
      2016 Research-status Report
    • Int'l Joint Research
  • [Presentation] Secure and Mutual Traceable Distributing Scheme for Big Data2016

    • Author(s)
      Kaitai Liang, Atsuko Miyaji, Chunhua Su
    • Organizer
      SCIS2016 暗号と情報セキュリティシンポジウム
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ (熊本県熊本市)
    • Year and Date
      2016-01-19
    • Related Report
      2015 Research-status Report
  • [Presentation] Improved Differential Characteristic Searching Methods2015

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh.
    • Organizer
      2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing
    • Place of Presentation
      New York City (USA)
    • Year and Date
      2015-11-03
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] A New Statistical Approach for Integral Attack2015

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, Chunhua Su and Liang Zhao
    • Organizer
      The 9th International Conference on Network and System Security (NSS 2015)
    • Place of Presentation
      New York City( USA)
    • Year and Date
      2015-11-03
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] Accurate Estimation of the Full Differential Distribution for General Feistel Structures2015

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, Chunhua Su and Je Sen Teh
    • Organizer
      The 11th China International Conference on Information Security and Cryptology (Inscrypt 2015)
    • Place of Presentation
      Beijing (China)
    • Year and Date
      2015-11-01
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] Analysis of Path ORAM toward Practical2015

    • Author(s)
      Steven Gordon, Atsuko Miyaji, Chunhua Su, Karin Sumongkayyothin.
    • Organizer
      UtilizationThe 18th International Conference on Network-Based Information Systems (NBiS 2015)
    • Place of Presentation
      Taipei (Taiwan)
    • Year and Date
      2015-09-02
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] M-ORAM: A Matrix ORAM with logN bandwidth cost2015

    • Author(s)
      Steven Gordon, Atsuko Miyaji, Chunhua Su and Karin Sumongkayothin
    • Organizer
      The 16th International Workshop on Information Security Applications (WISA 2015)
    • Place of Presentation
      Jeju (Korea)
    • Year and Date
      2015-08-25
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] Improved Lightweight Pseudo-Random Number Generators for the Low-Cost RFID Tags2015

    • Author(s)
      Jiageng Chen, Atsuko Miyaji, Hiroyuki Sato, Chunhua Su
    • Organizer
      The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-15)
    • Place of Presentation
      Helsinki (Finland)
    • Year and Date
      2015-08-20
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] Experimental Analysis of Path ORAM in Practical Implementation2015

    • Author(s)
      Karin Sumongkayothin, Atsuko Miyaji, Chunhua Su, Steve Gordon
    • Organizer
      情報セキュリティ研究会
    • Place of Presentation
      名古屋市中小企業振興会館 (愛知県名古屋)
    • Year and Date
      2015-07-02
    • Related Report
      2015 Research-status Report
  • [Book] Network and System Security - 10th International Conference, NSS 20162017

    • Author(s)
      Jiageng Chen, Vincenzo Piuri, Chunhua Su, Moti Yung
    • Total Pages
      540
    • Publisher
      Springer
    • Related Report
      2016 Research-status Report

URL: 

Published: 2015-04-16   Modified: 2022-06-16  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi