Cungang Yang's research while affiliated with Ryerson University and other places
What is this page?
This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.
If you're a ResearchGate member, you can follow this page to keep up with this author's work.
If you are this author, and you don't want us to display this page anymore, please let us know.
Publications (63)
We propose a Centralized Tree based Diffie-Hellman (CTDH) protocol for wireless mesh networks, which take into account the characteristics of mesh network operations, wireless routers and mobile devices. Performance analysis shows that CTDH is more efficient than the Tree-Based Group Diffie-Hellman Protocol (TGDH).
Electronic payment systems for wireless mesh networ
ks need to take into account the limited computatio
nal
and communicational ability of mesh clients. Microp
ayment scheme is well suited for this scenario sinc
e it
is specifically designed for efficient operations i
n payment transactions. In this article, we propose
a one
way hash chain structur...
Service Oriented Architecture (SOA) changes the way of conducting business by opening their services to the larger business world over the networks. However, the “open” and “interoperable” properties of SOA make privacy a sensitive security issue. In SOA, service providers (SPs) limit permission of access to specific authorized Access Requestors (A...
This paper describes a Security Enhanced AODV rout-ing protocol for wireless mesh networks (SEAODV). SEAODV employs Blom's key pre-distribution scheme to compute the pairwise transient key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the group transient key (GTK). PTK and GTK are used...
In this paper, we propose a Security Enhanced AODV routing protocol (SEAODV) for wireless mesh networks (WMN). SEAODV employs Blom's key pre-distribution scheme to compute the pairwise transient key (PTK) through the flooding of enhanced HELLO message and subsequently uses the established PTK to distribute the group transient key (GTK). PTK and GTK...
Recently increasing connections of various kinds and sizes of distributed generators (DGs) on the distribution feeders have imposed considerable impacts on the existing feeder protective devices that were designed for traditional distribution systems of mostly radial configuration. The DG connections have laid tremendous challenges on reliability o...
There is a growing threat of illegal computer access to Web-based application and security measures are now being implemented for applications that incorporate security logic in addition to business logic. This paper introduces a framework for Web security, which protects against illegal computer access to resources by granting different layers of...
This paper presents new simple formulations for digital implementation of pilot protective relaying schemes. Pilot relaying systems use a communication channel to deliver information from a local relay terminal to a remote relay terminal. The pilot relaying allows high-speed tripping for faults occurring on its designated protected line that improv...
This paper studies a novel location-based design for secure and efficient wireless sensor networks. With this scheme, the sensing area is divided into a number of location cells and a logical group consists of four location cells. A pairwise key is established for each pair of sensor nodes in a logical group based on grid-based bivariate t-degree p...
Operations of electricity power systems have recently become more intricate due to development of microgrids, execution of open access competition, and use of network-controlled devices, etc. Computer networks therefore turn into an integral component of modern power-grid operations. This paper proposes a new utility computer network security manag...
Dispersed generations (DGs) from renewable energy resources are becoming popular and start to show benefits, but their connection to distribution systems brings operation challenges and supply uncertainty that must be carefully monitored and forecasted to provide data for correct controls of the systems. This paper proposes a distributed monitoring...
Recent development of microgrids in power systems, introduction of open access competition by governments in electricity industries, and increased use of network-controlled devices in power systems have resulted utilities in a greater reliance on computer networks for proper power-grid operations. This paper proposes a new network access control st...
This paper proposes a new network cyber-security architecture for smart (energy-efficient, environmental-friendly, cost-effective, etc.) power distribution system operations. The focus is on providing cyber-security for smart (time-of-use scheduling, smart metering, dispersed generation tracking, etc.) load-management devices that are networked for...
Distributed generations (DGs) powered by renewable energy resources have become increasingly popular and starts to show benefits, but their connection to distribution systems brings operation challenges that must be carefully monitored and controlled. This paper proposes a new network-enabled, real-time monitoring strategy for tracking the operatin...
Connections of distributed generations (DGs) powered by renewable energy resources on power systems start to show benefits but cause new concerns in system operations such as challenges in feeder protections. This paper proposes a new strategy for network-integrated adaptive protection and control of distribution feeders connected with DGs. The pro...
Recently increased use of network-enabled devices in power systems, rapid development of distributed generations from renewable energy resources, and government-imposed open access competition have resulted utilities in greater reliance on computer networks for proper power grid operations. This paper proposes a new two-level architecture for power...
Recently electricity generation from wind power has been increasingly popular worldwide. This paper proposes an adaptive protection and control strategy for interfacing the wind-powered distributed generators into the utility power distribution grids. The requirements for the interfacing are defined according to the IEEE-1547 standards. This paper...
In this paper, we present a simple, lightweight, but robust security protocol for resource-constrained communications. This protocol is based on the backward property of RC4 stream cipher and achieves data confidentiality, data authentication, data integrity, and data freshness with low overhead and simple operations. Furthermore, an RC4-based hash...
Induction motors are the workhorse of our industries, continuously applied in new areas with improved performance utilizing modern power electronics and digital controls. This paper proposes a new computationally efficient real-time control for induction motor drives using state-of-the-art digital signal processing (DSP) technology, but without usi...
Prospect residential secondary services (smart metering, time-of-use scheduling, dispersed generation tracking, etc.) may account for potentially thousands of devices through networked load-management-collaborative (LMC) computing to realize smart distribution systems. Although TCP/IP-based networks can provide communication infrastructure for thes...
This paper presents a new strategy for computer network security authentication of power system operations. Recently operations of electricity power distribution systems have become fairly complex due to introduction of distributed generations and microgrids, execution of open access competition, increased use of network-controlled devices, etc. Co...
In this paper, we present an security protocol for Wireless Sensor Networks (WSNs). It is based on the forward and backward property of RC4 states and achieves data confidentiality, data authentication, data integrity, and data freshness with low overhead and simple operation. Furthermore, an RC4-based hash function for the generation of Message Au...
This paper proposes a new strategy and platform for computer network-assisted corrective actions against voltage instability in the power distribution systems. The objective of the proposed strategy is to save the distribution system from imminent voltage collapse due to contingencies occurring in the power systems by executing corrective operation...
This paper proposes a new computer network-facilitated voltage stability control strategy for electricity power distribution systems connected with distributed generations. The proposed strategy aims to determine stability enhancement operations on two aspects: one is to increase power system operation security during normal conditions, and the oth...
Renewable-energy powered distributed generations (DGs) of electricity are becoming popular and start to show benefits, but their connection to the utility distribution systems brings operation challenges and supply uncertainty that must be carefully monitored and forecasted to provide data for correct controls of the systems. This paper proposes a...
Operations of electricity power systems have recently become more intricate due to development of microgrids, execution of open access competition, and use of network-controlled devices, etc. Computer network therefore turns into a key integral of modern power-grid operations. This paper proposes a new utility computer network security management a...
Recent development of microgrids in power systems, introduction of open access competition by governments in electricity industries, and increased use of network-controlled devices in power systems have resulted utilities in a greater reliance on computer networks for proper power-grid operations. This paper proposes a new network access control st...
Distributed generations (DGs) powered by renewable energy resources have become increasingly popular and show benefits, but their connection to distribution systems brings operation challenges that must be carefully monitored. This paper proposes a new network-enabled, real-time monitoring strategy for tracking the operating states of the distribut...
Various kinds of distributed generations (DGs) are being increasingly connected on the distribution systems and computer network-based controls are introduced to assist the system operations. This paper proposes a new network-based adaptive strategy for protection of distribution-system feeders connected with DGs. The proposed strategy provides an...
This paper presents a network-integrated adaptive protection and control of electricity distribution systems connected with dispersed or distributed generations (DGs). A focus of this paper is to demonstrate the effective use of state-of-the-art digital signal processing (DSP) technology for real-time determination of correct protection and control...
As an addition to bulk electricity generations by utilities, dispersed generations (DGs) from alternative energy resources have become increasingly popular and started to show benefits, but their connection to distribution systems brings operation challenges that must be carefully monitored. This paper proposes a new web-based, real-time monitoring...
Dispersed generations (DGs) from renewable energy resources are becoming popular and start to show benefits, but their connection to distribution systems brings operation challenges and supply uncertainty that must be carefully monitored and forecasted to provide data for correct controls of the systems. This paper proposes a distributed monitoring...
Recently electricity generation from wind power has been increasingly popular worldwide as one of the most promising renewable energy sources. This paper proposes an adaptive control strategy for interfacing distributed generations (DGs) from wind power to utility distribution grids. This paper presents the voltage control requirements and protecti...
Recently increased use of network-enabled devices in power systems, rapid development of distributed generations from alternate energy resources, and government-imposed open access competition have resulted utilities in greater reliance on computer networks for proper power grid operations. The focus of this paper is to propose a new two-level arch...
Distributed generations (DGs) have been increasingly connected on the distribution feeders that impose challenges on traditional feeder protections. This paper proposes a new adaptive strategy for protection of distribution-system feeders connected with DGs using state-of-the-art digital signal processing (DSP) technology. The proposed strategy ove...
Cyber-security for computer networks has become a fairly serious concern for electricity utilities due to recent deregulations and distributed generations (DGs) launched in the power system. This paper proposes a new computer network security strategy for coordinated distribution system operations with open access electricity generations. A novel u...
Recent introduction of open access competition by governments in the electricity industry and increase use of network-controlled devices in the power system have resulted utilities in greater reliance on computer networks for their power system operations. This paper proposes a new network access control model that significantly increases the power...
In secure multicast applications, members may join or leave frequently and key management is one of the most challenging problems. In this research, we proposed a modified CLIQUES key management protocol. It was the modification of CLIQUES that consisted of two stages: Static CLIQUES and Hierarchical CLIQUES. In Static CLIQUES, a static group contr...
In the secure domain computing environments, it is im- portant to keep resources and information integrity from unauthorized access. Therefore, there is a strong demand on the access control for shared resources. In the past few years, Role-based Access Control (RBAC) has been introduced and offered a powerful means of specifying ac- cess control d...
Sensor networks are often deployed in unattended environment, thus leaving those networks vulnerable to false data injection attacks. Attackers often inject false data into the network in order to deceive the base station or deplete the resource and the energy of the relaying nodes. The existing authentication mechanisms cannot prevent this kind of...
In this paper, a practical method that can be employed to manage security policies using the eXtensible Markup Language (XML) is presented. The method efficiently ad- ministrates security policies based on the object oriented role-based access control model (ORBAC). Moreover, an information flow analysis technique is introduced for checking whether...
As distributed computing system grow in size, complexity and variety of application, the problem of protecting sensitive data
from unauthorized disclosure and tampering becomes increasingly important. In this paper, we present a cryptographic key management
solution to the role-based access control (RBAC) model in distributed systems. The key manag...
Increase of automation in power systems, combined with introduction of open-access competition, has resulted in greater reliance by utilities on computer networks for their power system operations. This paper presents an effective security method to address uprising serious concerns about access controls of utility computer networks, particularly u...
Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. Even though strong anonymity and privacy guarantees are critical for many applications, current Internet networking protocols provide no support for masking the identity of communication endpoints. In this paper, we proposed an enhanced IPSec...
The Role-based access control (RBAC) is a super set of mandatory access control (MAC) and discretionary access control (DAC).
Since MAC and DAC are useful in information flow control that protects privacy within an application, it is certainly that
we can use RBAC for privacy concerns. The key benefits of the fundamental RBAC are simplified systems...
As distributed computing systems grow in size, complexity and variety of applications, the protection of sensitive data against unauthorized disclosure and tampering becomes increasingly important. In this paper, a cryptographic Role-Based kEy Management (RBEM) is developed for the access control in distributed systems. This paper presents features...
This paper presents a cryptographic key management solution to solve the access control problem in a hierarchy. Based on one-way hash functions, an efficient key assignment and derivation method is proposed. This solution uses limited number of keys and hash functions. Also, the dynamic access control problems, such as adding/deleting nodes, or mod...
This paper presents a cryptographic key management solution to solve the access control problem in the role hierarchy. Based on one-way hash functions, we propose an efficient key assignment and derivation method. This solution uses a limited number of keys and hash functions. Also, the dynamic access control problems, such as adding/deleting roles...
Proposes an object-oriented role-based access control (ORBAC) model to efficiently represent the real world. Though ORBAC is a good model, administration of ORBAC, including creating and maintaining an access control security policy, still remains a challenging problem. Presents a practical method that can be employed in an enterprise environment t...
The rapid proliferation of the Internet and the cost-effective growth of its key enabling technologies are revolutionizing information technology and creating unpredicted opportunities for developing large scale distributed applications. In this paper, an efficient method for managing security policies using XML and role-based access control are pr...
In this paper, we conclude that confinement problem may occur on the Object Oriented Role-based Access Control model (ORBAC). In order to solve the problem, a technique called information flow analysis is proposed. Moreover, based on the information flow technique and the principle of mandatory access control principles, a message filtering algorit...
Information flow analysis is a necessary step to determine the information security for a given system. In this paper, we introduce an object oriented role-based access control model (ORBAC) and illustrate that the confinement problem may occur on the ORBAC based system. In order to deal with the problem, a technique called information flow analysi...
In distributed computing environments, users like to share resources and communicate with each other in order to perform their jobs more efficiently. It is important to keep resources and information from unexpected use by unauthorized users. Therefore, in the past few years there has been a strong demand for access control of distributed shared re...
In distributed computing environments, users would like to share
resources and communicate with each other to perform their jobs more
efficiently. For better performance, it is important to keep resources
and information integrity from unexpected use by unauthorized users.
Therefore, there is a strong demand for access control of distributed
shared...
Access control for protection and sharing of information and
physical resources is an essential component of any multi-user computer
systems. Role-based-access-control (RBAC) has been introduced and has
offered a powerful means of specifying access control decisions, as well
as reducing the cost of administrating access control policies and
making...
Citations
... The authentication is performed with different new features towards data encryption towards security development. Yang and Li (2019) presented a Behavior-based Key Agreement (BEKA) scheme which uses strategies of mesh routers and clients in the key maintenance. The method uses different keys at join and leaves procedures to reduce key overhead. ...
... Storage service brings the benefit of group sharing, such as storage of e-learning resource. Celia Li et al. [9] proposed Diffie-Hellman cryptographic protocol dependent on the key tree approach, a scalable and efficient group sharing method for public cloud. This scheme uses the key tree structure for scalability and minimal key computation and distribution. ...
... 1. The demand of the RBAC mechanisms as the object-oriented decision which is capable to reduce complexity of the LIS administration [1,2]. ...
... Thus, the impedance " seen " by the relay depends upon the current contributions from the other terminals, which can result in incorrect operation [6]. Permissive underreaching transfer trip scheme (PUTT) was chosen as the teleprotection scheme [7]. This type of teleprotection scheme requires reliable telecommunication infrastructure for the operation criteria transmission from one line end to the other, or in this instance, two remaining ends. ...
... Centralized network is a kind of stellate reticulum model. The principle of Linux-HA project [5] is similar with centralized model, Khan et al. [6] and Hamlyn [7] have researched this centralized framework in distribution system. Nevertheless, if the central one is down, the system can't keep running which means it is the bottleneck of system. ...
... Voltage collapse is a rapid progressive voltage fall and settling at certain value defined by system parameters, it is more complex than simple voltage instability and usually the result of a sequence of events accompany voltage instability leading to a low voltage profile in a significant part of the power system lasting long periods [11][12][13][14][15][16]. Voltage stability is the ability of a power system to maintain steady acceptable voltages at all buses in the system under normal operating conditions and after being subjected to a disturbance. ...
... [61,62]. Secure routing protocols, such as [63][64][65][66][67][68], were developed for wireless ad hoc networks and they rely on a pre-established and underlying key management scheme to securely route data through the network. ...
... It is an open, future-oriented and a new generation of communication protocols of the substation automation system.XML is used to achieve the conversion of communication protocols, in which the most important task is to model the communication frames. In the IEC61870 series of standards[4], 60870-5-1describes the formats of the transmission frame which are mainly classified as FT1.1, FT1.2, FT2 and FT3. The frame formats of FT1.2 described later can be further divided into those of variable frame length, fixed frame length and single control byte, of which the specific formats are shown infig.2 ...
... Difference in predicted and actual value determines feasibility of this scheme. A number of authors presented deployment knowledge based security scheme in [20][21][22]. All these schemes introduce huge storage overhead. ...
... A medium voltage protection system consists of protection relays, breakers, disconnectors, and instrument transformers. There are types of protection relays such as instantaneous overcurrent relays, normal/over reverse time overcurrent relays, directional overcurrent relays, impedance relays and directional impedance relays [1]. IEEE defines relay as an electrical device tasked with detecting the faults and providing the necessary actions in a short time [2]. ...