This page has only limited features, please log in for full access.

Unclaimed
Yen-Wu Ti
College of Artificial Intelligence, Yango University, Fuzhou, Fujian 35000, China

Honors and Awards

The user has no records in this section


Career Timeline

The user has no records in this section.


Short Biography

The user biography is not available.
Following
Followers
Co Authors
The list of users this user is following is empty.
Following: 0 users

Feed

Research article
Published: 03 November 2020 in Mobile Information Systems
Reads 0
Downloads 0

In health care, medication errors can result in serious health risks to patients, and hospitals require a secure medication administration system to prevent such errors. This paper therefore proposes a secure medication administration method based on threshold sharing technology. When a patient visits a doctor and the doctor prescribes n medications, a photo and the personal information of the patient are encoded into n QR code transparencies that can be decoded by common QR code scanners available for smartphones. The prescription and n QR code transparencies are then stored in a hospital’s medication administration system. When the patient receives their medicine, they can scan these n QR code transparencies using a smartphone to ensure that they have all the medicines prescribed by the doctor; this function is accessible even if the patient’s phone does not have Internet access. The main purpose of the proposed system is to prevent hospitals from giving medicine to the wrong patient, or giving less than the prescribed dosage of medicine to the patient. The focus is not on the internal medicine packaging process in hospitals but on reducing the probability of counter staff giving medicine to the wrong patient. This function is of considerable importance to non-English-speaking people who are not used to reading medicine names in English.

ACS Style

Yen-Wu Ti; Shang-Kuan Chen; Wen-Chieh Wu. A New Visual Cryptography-Based QR Code System for Medication Administration. Mobile Information Systems 2020, 2020, 1 -10.

AMA Style

Yen-Wu Ti, Shang-Kuan Chen, Wen-Chieh Wu. A New Visual Cryptography-Based QR Code System for Medication Administration. Mobile Information Systems. 2020; 2020 ():1-10.

Chicago/Turabian Style

Yen-Wu Ti; Shang-Kuan Chen; Wen-Chieh Wu. 2020. "A New Visual Cryptography-Based QR Code System for Medication Administration." Mobile Information Systems 2020, no. : 1-10.

Journal article
Published: 01 August 2020 in Electronics
Reads 0
Downloads 0

Software-defined networking (SDN) is a new networking architecture with a centralized control mechanism. SDN has proven to be successful in improving not only the network performance, but also security. However, centralized control in the SDN architecture is associated with new security vulnerabilities. In particular, user-datagram-protocol (UDP) flooding attacks can be easily launched and cause serious packet-transmission delays, controller-performance loss, and even network shutdown. In response to applications in the Internet of Things (IoT) field, this study considers UDP flooding attacks in SDN and proposes two lightweight countermeasures. The first method sometimes sacrifices address-resolution-protocol (ARP) requests to achieve a high level of security. In the second method, although packets must sometimes be sacrificed when undergoing an attack before starting to defend, the detection of the network state can prevent normal packets from being sacrificed. When blocking a network attack, attacks from the affected port are directly blocked without affecting normal ports. The performance and security of the proposed methods were confirmed by means of extensive experiments. Compared with the situation where no defense is implemented, or similar defense methods are implemented, after simulating a UDP flooding attack, our proposed method performed better in terms of the available bandwidth, central-processing-unit (CPU) consumption, and network delay time.

ACS Style

Yung-Hao Tung; Hung-Chuan Wei; Yen-Wu Ti; Yao-Tung Tsou; Neetesh Saxena; Chia-Mu Yu. Counteracting UDP Flooding Attacks in SDN. Electronics 2020, 9, 1239 .

AMA Style

Yung-Hao Tung, Hung-Chuan Wei, Yen-Wu Ti, Yao-Tung Tsou, Neetesh Saxena, Chia-Mu Yu. Counteracting UDP Flooding Attacks in SDN. Electronics. 2020; 9 (8):1239.

Chicago/Turabian Style

Yung-Hao Tung; Hung-Chuan Wei; Yen-Wu Ti; Yao-Tung Tsou; Neetesh Saxena; Chia-Mu Yu. 2020. "Counteracting UDP Flooding Attacks in SDN." Electronics 9, no. 8: 1239.

Journal article
Published: 24 December 2019 in IEEE Access
Reads 0
Downloads 0

Recently, the rapid development of Internet of things (IoT) has resulted in the generation of a considerable amount of data, which should be stored. Therefore, it is necessary to develop methods that can easily capture, save, and modify these data. The data generated using IoT contain private information; therefore sufficient security features should be incorporated to ensure that potential attackers cannot access the data. Researchers from various fields are attempting to achieve data security. One of the major challenges is that IoT is a paradigm of how each device in the Internet infrastructure is interconnected to a globally dynamic network. When searching in dynamic cloud-stored data, sensitive data can be easily leaked. IoT data storage and retrieval from untrusted cloud servers should be secure. Searchable symmetric encryption (SSE) is a vital technology in the field of cloud storage. SSE allows users to use keywords to search for data in an untrusted cloud server but the keywords and the data content are concealed from the server. However, an SSE database is seldom used by cloud operators because the data stored on the cloud server is often modified. The server cannot update the data without decryption because the data are encrypted by the user. Therefore, dynamic SSE (DSSE) has been developed in recent years to support the aforementioned requirements. Instead of decrypting the data stored by customers, DSSE adds or deletes encrypted data on the server. A number of DSSE systems based on linked list structures or blind storage (a new primitive) have been proposed. From the perspective of functionality, extensibility, and efficiency, these DSSE systems each have their own advantages and drawbacks. The most crucial aspect of a system that is used in the cloud industry is the trade-off between performance and security. Therefore, we compared the efficiency and security of multiple DSSE systems and identified their shortcomings to develop an improved system.

ACS Style

Yen-Wu Ti; Chia-Feng Wu; Chia-Mu Yu; Sy-Yen Kuo. Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications. IEEE Access 2019, 8, 1715 -1732.

AMA Style

Yen-Wu Ti, Chia-Feng Wu, Chia-Mu Yu, Sy-Yen Kuo. Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications. IEEE Access. 2019; 8 (99):1715-1732.

Chicago/Turabian Style

Yen-Wu Ti; Chia-Feng Wu; Chia-Mu Yu; Sy-Yen Kuo. 2019. "Benchmarking Dynamic Searchable Symmetric Encryption Scheme for Cloud-Internet of Things Applications." IEEE Access 8, no. 99: 1715-1732.