{"title":"Determination of Optimum Threshold Values for NPRACH Preamble Detection in NB-IoT Systems","authors":"S. Cho, Hyungjin Kim, Gweondo Jo","doi":"10.1109/ICUFN.2018.8436646","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436646","url":null,"abstract":"In this paper, we describe the NPRACH of 3GPP NB-IoT system and propose a possible receiver algorithm for NPRACH detection and timing advance estimation. We present simulation results for the performance of the random access preamble detection and timing advance for the proposed NPRACH detection scheme. In addition, we analyze the detection performance according to the detection threshold value and derive the optimal threshold value.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134483512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Service Mediation Gateway for Heterogenous IoT Services Harmonization","authors":"S. Kum, Jaewon Moon","doi":"10.1109/ICUFN.2018.8437044","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437044","url":null,"abstract":"To populate IoT service, having remote control on a smart device is not enough. More complicated IoT services are needed by combining each IoT service, and enabling communication between independent services are essential to them. There are several solutions and services to provide interactivity between IoT services in the market such as IFTTT or Muzzley. However, most of these services are implemented on the cloud, which makes it difficult to get prompt response for application request. In this paper, a Service Mediation Gateway is proposed to improve connectivity between IoT services with less response time. The proposed gateway is located between IoT services and the application, just like an edge or fog device, and works as a data cache for IoT resources on the cloud. The proposed gateway can be implemented both on the cloud and on the edge, so that provide more prompt response to the application. The proposed gateway has been implemented with existing IoT services, and the comparison with existing cloud services is evaluated.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124397219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rank Prediction for Portfolio Management Using Artificial Neural Networks","authors":"Jiyoon Bae, Ghudae Sim, Hyungbin Yun, Junhee Seok","doi":"10.1109/ICUFN.2018.8436983","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436983","url":null,"abstract":"The rank of equities is often used to determine the investment portfolio instead of prices because ranking is in general believed to be robust. In this paper, we propose a rank prediction method for portfolio management using ANN. While an ANN requires a large dataset to train the model, the sample size is usually insufficient in stock market data. Therefore, the proposed method uses data augmentation and an ensemble ANN model. In the simulation study, the proposed method shows 13 percentage of performance improvement from the other methods to predict the profit rank of equities in South-East Asian market.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116847550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Memory-Efficient Random Forest Generation Method for Network Intrusion Detection","authors":"Seok-Hwan Choi, DongHyun Ko, SeonJin Hwang, Yoon-Ho Choi","doi":"10.1109/ICUFN.2018.8436590","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436590","url":null,"abstract":"Along with the steady growth of wired and wireless networks, the various new attacks targeting networks are also constantly emerging and transforming. As a efficient way to cope with various attacks, the Random Forest(RF) algorithm has frequently been used as the core engine of intrusion detection because of the faster learning speed and the higher attack detection accuracy. However, the RF algorithm has to input the number of the tree composing the forest as a parameter. In this paper, we proposed a new algorithm that limit the number of trees composing the forest using the McNemar test. To evaluate the performance of the proposed RF algorithm, we compared learning time, accuracy and memory usage of the proposed algorithm with the original RF algorithm and other algorithm by using the KDDcup99 dataset. Under the same detection accuracy, the proposed RF algorithm improves the performance of the original RF algorithm by as much as 97.76% at learning time, 91.86% at test time, and 99.02% in memory usage on average.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123991399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Automated System Recovery Using BlockChain","authors":"S. Bae, Yongtae Shin","doi":"10.1109/ICUFN.2018.8437040","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437040","url":null,"abstract":"The existing Disaster Recovery(DR) system has a technique for integrity of the duplicated file to be used for recovery, but it could not be used if the file was changed. In this study, a duplicate file is generated as a block and managed as a block-chain. If the duplicate file is corrupted, the DR system will check the integrity of the duplicated file by referring to the block-chain and proceed with the recovery. The proposed technology is verified through recovery performance evaluation and scenarios.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124833909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spectrogram-Based Automatic Modulation Recognition Using Convolutional Neural Network","authors":"Sinjin Jeong, Uhyeon Lee, S. Kim","doi":"10.1109/ICUFN.2018.8436654","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436654","url":null,"abstract":"We study a system for classifying modulation types with spectrograms obtained through short-time Fourier transform. AWGN-based carrier modulated signals and their spectrograms are generated. In order to extract features from spectrogram automatically, we learned our convolutional neural network model with the generated data. Even at low SNRs, the performance is fairly good, but additional modulation type applications and comparisons with others in various environments are necessary.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128609676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Myeonggeon Lee, Gwangjun Choi, Junsang Park, Seong-je Cho
{"title":"Study of Analyzing and Mitigating Vulnerabilities in uC/OS Real-Time Operating System","authors":"Myeonggeon Lee, Gwangjun Choi, Junsang Park, Seong-je Cho","doi":"10.1109/ICUFN.2018.8436965","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436965","url":null,"abstract":"Programmable Logic Controllers (PLCs) have been widely used in real-time and embedded control applications including safety-critical control systems. Due to their ubiquity and network connectivity, PLCs are prone to various security attacks. Buffer overflow attacks, which target software vulnerabilities in operating system (OS) and application software, are the most common security attacks because of their relatively easy exploitation. Therefore, it is important to have knowledge about software vulnerabilities in OSs for PLCs in order to prevent or mitigate them in PLC design and implementation. Many PLCs use Micrium uC/OS as their OS. In this paper, we present an approach to analyzing and mitigating some software two vulnerabilities, buffer overflows and integer overflows in uC/OS. We first check if there are vulnerable functions in uC/OS system. We then propose a technique to prevent or mitigate the vulnerabilities associated with the functions.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129161047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relay-Based iBGP Multicasting in Software Defined Networks","authors":"U. Bassey, A. Nayak","doi":"10.1109/ICUFN.2018.8437020","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437020","url":null,"abstract":"In the Internet today, learnt prefixes are forwarded within autonomous systems (ASs) over internal Border Gateway Protocol (iBGP) sessions. Existing schemes for iBGP routing include the full-mesh (FM) solution, route reflection (RR) solution and confederation. Optimal prefix routing and route diversity are the main strength of the FM solution. However, it is rarely employed in a large networks due to its poor scalability. The RR scheme solves the scalability challenge at the cost of FM optimality due to Route Reflector's partial view of the network. The concept of Software Defined Networking (SDN) entails decoupling of the control plane from the forwarding plane such that the control plane is logically centralized benefiting from an overall knowledge of the network for decision making. In this work, we propose a solution based on multicasting which employs relay nodes in the iBGP message dissemination. The relay nodes are elected and act as boundaries of multicast groups, relaying and filtering prefixes into other multicast groups. We evaluate the use of single and multiple relay nodes per multicast group. Our solution brings session management scalability and minimization of duplicate prefix announcement through elimination of peer sessions deemed unnecessary. SDN controller is employed to configure and coordinate the multicast tree.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125525550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Pedestrian Detection Based on Faster R-CNN and Hippocampal Neural Network","authors":"B. Hao, Su-Bin Park, D. Kang","doi":"10.1109/ICUFN.2018.8436974","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436974","url":null,"abstract":"This paper use Faster-RCNN and hippocampal neural network algorithms to research. Firstly use convolutional neural network to extract the features of the input image, and then use Region Proposal Networks to extract the standard frame. Here we can judge whether there are objects in the standard frame and know the location of the standard box, then use the Non-Maximum Suppression to select the standard box, finally perform the classification operation and regression operation. The final classification network is the hippocampal neural network. The hippocampal neural network is a spatial structure model that mimics the hippocampus of human brain.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126778562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authentication Protocol for Wearable Devices Using Mobile Authentication Proxy","authors":"Doo-Hee Hwang, Jinmyeong Shin, Yoon-Ho Choi","doi":"10.1109/ICUFN.2018.8436650","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436650","url":null,"abstract":"The data transmitted from the wearable device commonly includes sensitive data. So, application service using the data collected from the unauthorized wearable devices can cause serious problems. Also, it is important to authenticate any wearable device and then, protect the transmitted data between the wearable devices and the application server. In this paper, we propose an authentication protocol, which is designed by using the Transport Layer Security (TLS) handshake protocol combined with a mobile authentication proxy. By using the proposed authentication protocol, we can authenticate the wearable device. And we can secure data transmission since session key is shared between the wearable device and the application server. In addition, the proposed authentication protocol is secure even when the mobile authentication proxy is unreliable.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126229335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}