Cungang Yang's research while affiliated with Ryerson University and other places

Publications (63)

Conference Paper
We propose a Centralized Tree based Diffie-Hellman (CTDH) protocol for wireless mesh networks, which take into account the characteristics of mesh network operations, wireless routers and mobile devices. Performance analysis shows that CTDH is more efficient than the Tree-Based Group Diffie-Hellman Protocol (TGDH).
Article
Full-text available
Electronic payment systems for wireless mesh networ ks need to take into account the limited computatio nal and communicational ability of mesh clients. Microp ayment scheme is well suited for this scenario sinc e it is specifically designed for efficient operations i n payment transactions. In this article, we propose a one way hash chain structur...
Article
Full-text available
Service Oriented Architecture (SOA) changes the way of conducting business by opening their services to the larger business world over the networks. However, the “open” and “interoperable” properties of SOA make privacy a sensitive security issue. In SOA, service providers (SPs) limit permission of access to specific authorized Access Requestors (A...
Article
This paper describes a Security Enhanced AODV rout-ing protocol for wireless mesh networks (SEAODV). SEAODV employs Blom's key pre-distribution scheme to compute the pairwise transient key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the group transient key (GTK). PTK and GTK are used...
Article
In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs Blom's key pre-distribution scheme to compute the pairwise transient key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the group transient key (GTK). PTK and GTK...
Conference Paper
Recently increasing connections of various kinds and sizes of distributed generators (DGs) on the distribution feeders have imposed considerable impacts on the existing feeder protective devices that were designed for traditional distribution systems of mostly radial configuration. The DG connections have laid tremendous challenges on reliability o...
Article
There is a growing threat of illegal computer access to Web-based application and security measures are now being implemented for applications that incorporate security logic in addition to business logic. This paper introduces a framework for Web security, which protects against illegal computer access to resources by granting different layers of...
Article
This paper presents new simple formulations for digital implementation of pilot protective relaying schemes. Pilot relaying systems use a communication channel to deliver information from a local relay terminal to a remote relay terminal. The pilot relaying allows high-speed tripping for faults occurring on its designated protected line that improv...
Article
This paper studies a novel location-based design for secure and efficient wireless sensor networks. With this scheme, the sensing area is divided into a number of location cells and a logical group consists of four location cells. A pairwise key is established for each pair of sensor nodes in a logical group based on grid-based bivariate t-degree p...
Conference Paper
Operations of electricity power systems have recently become more intricate due to development of microgrids, execution of open access competition, and use of network-controlled devices, etc. Computer networks therefore turn into an integral component of modern power-grid operations. This paper proposes a new utility computer network security manag...
Conference Paper
Dispersed generations (DGs) from renewable energy resources are becoming popular and start to show benefits, but their connection to distribution systems brings operation challenges and supply uncertainty that must be carefully monitored and forecasted to provide data for correct controls of the systems. This paper proposes a distributed monitoring...
Conference Paper
Recent development of microgrids in power systems, introduction of open access competition by governments in electricity industries, and increased use of network-controlled devices in power systems have resulted utilities in a greater reliance on computer networks for proper power-grid operations. This paper proposes a new network access control st...
Conference Paper
This paper proposes a new network cyber-security architecture for smart (energy-efficient, environmental-friendly, cost-effective, etc.) power distribution system operations. The focus is on providing cyber-security for smart (time-of-use scheduling, smart metering, dispersed generation tracking, etc.) load-management devices that are networked for...
Conference Paper
Distributed generations (DGs) powered by renewable energy resources have become increasingly popular and starts to show benefits, but their connection to distribution systems brings operation challenges that must be carefully monitored and controlled. This paper proposes a new network-enabled, real-time monitoring strategy for tracking the operatin...
Conference Paper
Connections of distributed generations (DGs) powered by renewable energy resources on power systems start to show benefits but cause new concerns in system operations such as challenges in feeder protections. This paper proposes a new strategy for network-integrated adaptive protection and control of distribution feeders connected with DGs. The pro...
Conference Paper
Recently increased use of network-enabled devices in power systems, rapid development of distributed generations from renewable energy resources, and government-imposed open access competition have resulted utilities in greater reliance on computer networks for proper power grid operations. This paper proposes a new two-level architecture for power...
Conference Paper
Recently electricity generation from wind power has been increasingly popular worldwide. This paper proposes an adaptive protection and control strategy for interfacing the wind-powered distributed generators into the utility power distribution grids. The requirements for the interfacing are defined according to the IEEE-1547 standards. This paper...
Conference Paper
Full-text available
In this paper, we present a simple, lightweight, but robust security protocol for resource-constrained communications. This protocol is based on the backward property of RC4 stream cipher and achieves data confidentiality, data authentication, data integrity, and data freshness with low overhead and simple operations. Furthermore, an RC4-based hash...
Article
Induction motors are the workhorse of our industries, continuously applied in new areas with improved performance utilizing modern power electronics and digital controls. This paper proposes a new computationally efficient real-time control for induction motor drives using state-of-the-art digital signal processing (DSP) technology, but without usi...
Article
Prospect residential secondary services (smart metering, time-of-use scheduling, dispersed generation tracking, etc.) may account for potentially thousands of devices through networked load-management-collaborative (LMC) computing to realize smart distribution systems. Although TCP/IP-based networks can provide communication infrastructure for thes...
Conference Paper
This paper presents a new strategy for computer network security authentication of power system operations. Recently operations of electricity power distribution systems have become fairly complex due to introduction of distributed generations and microgrids, execution of open access competition, increased use of network-controlled devices, etc. Co...
Article
Full-text available
In this paper, we present an security protocol for Wireless Sensor Networks (WSNs). It is based on the forward and backward property of RC4 states and achieves data confidentiality, data authentication, data integrity, and data freshness with low overhead and simple operation. Furthermore, an RC4-based hash function for the generation of Message Au...
Article
This paper proposes a new strategy and platform for computer network-assisted corrective actions against voltage instability in the power distribution systems. The objective of the proposed strategy is to save the distribution system from imminent voltage collapse due to contingencies occurring in the power systems by executing corrective operation...
Article
This paper proposes a new computer network-facilitated voltage stability control strategy for electricity power distribution systems connected with distributed generations. The proposed strategy aims to determine stability enhancement operations on two aspects: one is to increase power system operation security during normal conditions, and the oth...
Article
Renewable-energy powered distributed generations (DGs) of electricity are becoming popular and start to show benefits, but their connection to the utility distribution systems brings operation challenges and supply uncertainty that must be carefully monitored and forecasted to provide data for correct controls of the systems. This paper proposes a...
Conference Paper
Operations of electricity power systems have recently become more intricate due to development of microgrids, execution of open access competition, and use of network-controlled devices, etc. Computer network therefore turns into a key integral of modern power-grid operations. This paper proposes a new utility computer network security management a...
Conference Paper
Recent development of microgrids in power systems, introduction of open access competition by governments in electricity industries, and increased use of network-controlled devices in power systems have resulted utilities in a greater reliance on computer networks for proper power-grid operations. This paper proposes a new network access control st...
Conference Paper
Distributed generations (DGs) powered by renewable energy resources have become increasingly popular and show benefits, but their connection to distribution systems brings operation challenges that must be carefully monitored. This paper proposes a new network-enabled, real-time monitoring strategy for tracking the operating states of the distribut...
Conference Paper
Various kinds of distributed generations (DGs) are being increasingly connected on the distribution systems and computer network-based controls are introduced to assist the system operations. This paper proposes a new network-based adaptive strategy for protection of distribution-system feeders connected with DGs. The proposed strategy provides an...
Conference Paper
This paper presents a network-integrated adaptive protection and control of electricity distribution systems connected with dispersed or distributed generations (DGs). A focus of this paper is to demonstrate the effective use of state-of-the-art digital signal processing (DSP) technology for real-time determination of correct protection and control...
Conference Paper
As an addition to bulk electricity generations by utilities, dispersed generations (DGs) from alternative energy resources have become increasingly popular and started to show benefits, but their connection to distribution systems brings operation challenges that must be carefully monitored. This paper proposes a new web-based, real-time monitoring...
Conference Paper
Dispersed generations (DGs) from renewable energy resources are becoming popular and start to show benefits, but their connection to distribution systems brings operation challenges and supply uncertainty that must be carefully monitored and forecasted to provide data for correct controls of the systems. This paper proposes a distributed monitoring...
Conference Paper
Recently electricity generation from wind power has been increasingly popular worldwide as one of the most promising renewable energy sources. This paper proposes an adaptive control strategy for interfacing distributed generations (DGs) from wind power to utility distribution grids. This paper presents the voltage control requirements and protecti...
Conference Paper
Recently increased use of network-enabled devices in power systems, rapid development of distributed generations from alternate energy resources, and government-imposed open access competition have resulted utilities in greater reliance on computer networks for proper power grid operations. The focus of this paper is to propose a new two-level arch...
Conference Paper
Distributed generations (DGs) have been increasingly connected on the distribution feeders that impose challenges on traditional feeder protections. This paper proposes a new adaptive strategy for protection of distribution-system feeders connected with DGs using state-of-the-art digital signal processing (DSP) technology. The proposed strategy ove...
Conference Paper
Cyber-security for computer networks has become a fairly serious concern for electricity utilities due to recent deregulations and distributed generations (DGs) launched in the power system. This paper proposes a new computer network security strategy for coordinated distribution system operations with open access electricity generations. A novel u...
Conference Paper
Recent introduction of open access competition by governments in the electricity industry and increase use of network-controlled devices in the power system have resulted utilities in greater reliance on computer networks for their power system operations. This paper proposes a new network access control model that significantly increases the power...
Article
In secure multicast applications, members may join or leave frequently and key management is one of the most challenging problems. In this research, we proposed a modified CLIQUES key management protocol. It was the modification of CLIQUES that consisted of two stages: Static CLIQUES and Hierarchical CLIQUES. In Static CLIQUES, a static group contr...
Article
In the secure domain computing environments, it is im- portant to keep resources and information integrity from unauthorized access. Therefore, there is a strong demand on the access control for shared resources. In the past few years, Role-based Access Control (RBAC) has been introduced and offered a powerful means of specifying ac- cess control d...
Conference Paper
Sensor networks are often deployed in unattended environment, thus leaving those networks vulnerable to false data injection attacks. Attackers often inject false data into the network in order to deceive the base station or deplete the resource and the energy of the relaying nodes. The existing authentication mechanisms cannot prevent this kind of...
Article
In this paper, a practical method that can be employed to manage security policies using the eXtensible Markup Language (XML) is presented. The method efficiently ad- ministrates security policies based on the object oriented role-based access control model (ORBAC). Moreover, an information flow analysis technique is introduced for checking whether...
Conference Paper
As distributed computing system grow in size, complexity and variety of application, the problem of protecting sensitive data from unauthorized disclosure and tampering becomes increasingly important. In this paper, we present a cryptographic key management solution to the role-based access control (RBAC) model in distributed systems. The key manag...
Conference Paper
Increase of automation in power systems, combined with introduction of open-access competition, has resulted in greater reliance by utilities on computer networks for their power system operations. This paper presents an effective security method to address uprising serious concerns about access controls of utility computer networks, particularly u...
Conference Paper
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. Even though strong anonymity and privacy guarantees are critical for many applications, current Internet networking protocols provide no support for masking the identity of communication endpoints. In this paper, we proposed an enhanced IPSec...
Conference Paper
The Role-based access control (RBAC) is a super set of mandatory access control (MAC) and discretionary access control (DAC). Since MAC and DAC are useful in information flow control that protects privacy within an application, it is certainly that we can use RBAC for privacy concerns. The key benefits of the fundamental RBAC are simplified systems...
Conference Paper
As distributed computing systems grow in size, complexity and variety of applications, the protection of sensitive data against unauthorized disclosure and tampering becomes increasingly important. In this paper, a cryptographic Role-Based kEy Management (RBEM) is developed for the access control in distributed systems. This paper presents features...
Article
This paper presents a cryptographic key management solution to solve the access control problem in a hierarchy. Based on one-way hash functions, an efficient key assignment and derivation method is proposed. This solution uses limited number of keys and hash functions. Also, the dynamic access control problems, such as adding/deleting nodes, or mod...
Conference Paper
This paper presents a cryptographic key management solution to solve the access control problem in the role hierarchy. Based on one-way hash functions, we propose an efficient key assignment and derivation method. This solution uses a limited number of keys and hash functions. Also, the dynamic access control problems, such as adding/deleting roles...
Article
Proposes an object-oriented role-based access control (ORBAC) model to efficiently represent the real world. Though ORBAC is a good model, administration of ORBAC, including creating and maintaining an access control security policy, still remains a challenging problem. Presents a practical method that can be employed in an enterprise environment t...
Conference Paper
The rapid proliferation of the Internet and the cost-effective growth of its key enabling technologies are revolutionizing information technology and creating unpredicted opportunities for developing large scale distributed applications. In this paper, an efficient method for managing security policies using XML and role-based access control are pr...
Conference Paper
In this paper, we conclude that confinement problem may occur on the Object Oriented Role-based Access Control model (ORBAC). In order to solve the problem, a technique called information flow analysis is proposed. Moreover, based on the information flow technique and the principle of mandatory access control principles, a message filtering algorit...
Article
Information flow analysis is a necessary step to determine the information security for a given system. In this paper, we introduce an object oriented role-based access control model (ORBAC) and illustrate that the confinement problem may occur on the ORBAC based system. In order to deal with the problem, a technique called information flow analysi...
Article
In distributed computing environments, users like to share resources and communicate with each other in order to perform their jobs more efficiently. It is important to keep resources and information from unexpected use by unauthorized users. Therefore, in the past few years there has been a strong demand for access control of distributed shared re...
Conference Paper
In distributed computing environments, users would like to share resources and communicate with each other to perform their jobs more efficiently. For better performance, it is important to keep resources and information integrity from unexpected use by unauthorized users. Therefore, there is a strong demand for access control of distributed shared...
Conference Paper
Access control for protection and sharing of information and physical resources is an essential component of any multi-user computer systems. Role-based-access-control (RBAC) has been introduced and has offered a powerful means of specifying access control decisions, as well as reducing the cost of administrating access control policies and making...

Citations

... The authentication is performed with different new features towards data encryption towards security development. Yang and Li (2019) presented a Behavior-based Key Agreement (BEKA) scheme which uses strategies of mesh routers and clients in the key maintenance. The method uses different keys at join and leaves procedures to reduce key overhead. ...
... Storage service brings the benefit of group sharing, such as storage of e-learning resource. Celia Li et al. [9] proposed Diffie-Hellman cryptographic protocol dependent on the key tree approach, a scalable and efficient group sharing method for public cloud. This scheme uses the key tree structure for scalability and minimal key computation and distribution. ...
... 1. The demand of the RBAC mechanisms as the object-oriented decision which is capable to reduce complexity of the LIS administration [1,2]. ...
... Thus, the impedance " seen " by the relay depends upon the current contributions from the other terminals, which can result in incorrect operation [6]. Permissive underreaching transfer trip scheme (PUTT) was chosen as the teleprotection scheme [7]. This type of teleprotection scheme requires reliable telecommunication infrastructure for the operation criteria transmission from one line end to the other, or in this instance, two remaining ends. ...
... Centralized network is a kind of stellate reticulum model. The principle of Linux-HA project [5] is similar with centralized model, Khan et al. [6] and Hamlyn [7] have researched this centralized framework in distribution system. Nevertheless, if the central one is down, the system can't keep running which means it is the bottleneck of system. ...
... Voltage collapse is a rapid progressive voltage fall and settling at certain value defined by system parameters, it is more complex than simple voltage instability and usually the result of a sequence of events accompany voltage instability leading to a low voltage profile in a significant part of the power system lasting long periods [11][12][13][14][15][16]. Voltage stability is the ability of a power system to maintain steady acceptable voltages at all buses in the system under normal operating conditions and after being subjected to a disturbance. ...
... [61,62]. Secure routing protocols, such as [63][64][65][66][67][68], were developed for wireless ad hoc networks and they rely on a pre-established and underlying key management scheme to securely route data through the network. ...
... It is an open, future-oriented and a new generation of communication protocols of the substation automation system.XML is used to achieve the conversion of communication protocols, in which the most important task is to model the communication frames. In the IEC61870 series of standards[4], 60870-5-1describes the formats of the transmission frame which are mainly classified as FT1.1, FT1.2, FT2 and FT3. The frame formats of FT1.2 described later can be further divided into those of variable frame length, fixed frame length and single control byte, of which the specific formats are shown infig.2 ...
... Difference in predicted and actual value determines feasibility of this scheme. A number of authors presented deployment knowledge based security scheme in [20][21][22]. All these schemes introduce huge storage overhead. ...
... A medium voltage protection system consists of protection relays, breakers, disconnectors, and instrument transformers. There are types of protection relays such as instantaneous overcurrent relays, normal/over reverse time overcurrent relays, directional overcurrent relays, impedance relays and directional impedance relays [1]. IEEE defines relay as an electrical device tasked with detecting the faults and providing the necessary actions in a short time [2]. ...