2019 21st International Conference on Advanced Communication Technology (ICACT)最新文献

筛选
英文 中文
Blockchain-based secure firmware management system in IoT environment 物联网环境下基于区块链的安全固件管理系统
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8701959
Minsung Son, Heeyoul Kim
{"title":"Blockchain-based secure firmware management system in IoT environment","authors":"Minsung Son, Heeyoul Kim","doi":"10.23919/ICACT.2019.8701959","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701959","url":null,"abstract":"Following the recent increase in smart factories and smart cities and the fourth industrial revolution, the number of IoT devices has been increasing and accordingly, the security of IoT devices has also become an important issue. However, due to reasons such as the low performance of IoT devices, the currently existing security solutions can be hardly applied and even if safe firmware is supplied, security problems may arise due to attacks such as man-in-the-middle attacks and roll-back attacks. To resolve such problems, we propose a new firmware management architecture using blockchains and IPFS (The InterPlanetary File System). Using IPFS can ensure the integrity of the firmware. However, IoT device version management and IPFS URL integrity cannot be guaranteed. Therefore, IoT devices are enabled to be provided with firmware information and updated through blockchian networks to ensure the integrity of the IPFS URL, and an IoT devices management function is provided. The proposed system enables safe firmware distribution and update, and IoT devices' security level is expected to be higher. Through the proposed system, safe firmware distribution and update will become possible and IoT device security levels are expected to be enhanced.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131885323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Conceptualizing the cyber incident & event statistics reporting standards 概念化网络事件和事件统计报告标准
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8702015
Sang-Oun Lee, H. Seo
{"title":"Conceptualizing the cyber incident & event statistics reporting standards","authors":"Sang-Oun Lee, H. Seo","doi":"10.23919/ICACT.2019.8702015","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8702015","url":null,"abstract":"The development of technology led the cyberspace to be directly connected to the daily life. For a nation, it is essential to collect and analyze the statistics produced from cyber-attack incidents to formulate a policy. Specifically, in the Republic of Korea, the second most cyber-attacked country in the world, the synchronization between the cybersecurity technology and policy is essential. However, in current status, the statistics collected by the government ministries in Korea is varied. For instance, the Ministry of Defense and the Ministry of Science & Technology has a different standard in defining the event and incident and its numbers. Thus, the study aims to propose a standardized concept of cyber incident and event statistics which can provide singularized criteria which can be adopted across the ministerial disciplines. In order to provide aforementioned concept, the authors have posed following research questions. First, how to conceptualize the different types of cyber-attacks into a single standard of reporting cyber incidents? Second, what is the proper definition for cyber incident in both national and international levels of policy dialogue? Third, will the established concept can be proposed as an international standard? The authors first breakdown the scattered conceptual knowledge of cybersecurity by the methodology proposed by Gerring (1999) to provide a better concept which can deliver the better knowledge in cybersecurity policy. After, the authors propose the qualitative method in order to develop the single standard in collecting cyber incident statistics. Finally, the authors leave the possible extensions for future related research area based on the proposed method.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134618645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICACT 2019 Author Index ICACT 2019作者索引
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/icact.2019.8701963
{"title":"ICACT 2019 Author Index","authors":"","doi":"10.23919/icact.2019.8701963","DOIUrl":"https://doi.org/10.23919/icact.2019.8701963","url":null,"abstract":"","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133250316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a General Reporting Program for Measurement Uncertainty 测量不确定度通用报告程序的制定
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8701940
S. Hwang, J. Woo, Thomas Byeongnam Yoon
{"title":"Development of a General Reporting Program for Measurement Uncertainty","authors":"S. Hwang, J. Woo, Thomas Byeongnam Yoon","doi":"10.23919/ICACT.2019.8701940","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701940","url":null,"abstract":"A computer program, named Uncertainty-Bot, has been developed for calculating and reporting measurement uncertainty. In order to satisfy the conditions requested by GUM, the authentic reference guide, we have included several statistical calculation steps and printing procedures for the uncertainty report. The program included fundamental steps such as follows; 1) editing steps for mathematical model equation of measurand, 2) steps for standard uncertainty of assigned probability density function (PDF) of each input quantity 3) steps for combined standard uncertainty with uncertainty propagation using partial derivative of each input quantity, 4) steps for extended uncertainty interval with statistical confidence level, 5) printing steps after evaluation and calculating measurement uncertainty. Including these fundamental steps, we included the calculation step of uncertainty which appears in the calibration curve using linear regression method. In the step, the standard uncertainty is calculated in the measurement incorporated by 1st order to 5th order linear regression method. In addition to describing the feature of the program, here, we presented two examples of uncertainty evaluation; one for simple comparison process of measurement, another for including 1st order linear regression process. All the results were confirmed and validated by separate procedure of calculation using Microsoft Excel.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132325005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ICACT 2019 Keynote 2
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/icact.2019.8701913
{"title":"ICACT 2019 Keynote 2","authors":"","doi":"10.23919/icact.2019.8701913","DOIUrl":"https://doi.org/10.23919/icact.2019.8701913","url":null,"abstract":"","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125121773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Event Observation of Date-time Stamps for ADS Reconstruction ADS重建中日期-时间戳的事件观测
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8701988
Da-Yu Kao, Yuan Chen, En-Cih Chang
{"title":"Event Observation of Date-time Stamps for ADS Reconstruction","authors":"Da-Yu Kao, Yuan Chen, En-Cih Chang","doi":"10.23919/ICACT.2019.8701988","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701988","url":null,"abstract":"Alternate Data Streams (ADS) is a method of information hiding that is only possible on NTFS file systems. Criminals are using it to hide data because the ADS can hide any size and type of data in NTFS file system. ADS is invisible to users. However, ADS operation updates the temporal attribute of cover medium, which could be a trace for ADS evaluating. Cover medium indicates to the file/folder which is used for ADS operation (creating, modifying and overwriting). In general file/folder operation, if we create (archive/copy) a file into folder, it updates certain timestamps attributes of folder and file itself. Same result takes place when modifying/overwriting the file within folder. Based on this concept, we took a file within folder as a cover medium and applied some operations (create, modify and overwrite) on it to observe the timestamps variation on both folder and cover medium.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115350657","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Churn Resilience of Distributed Content Service System on Smart Terminals Network 智能终端网络下分布式内容服务系统的客户流失弹性
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8701903
Hanxing Xue, Jiali You, Jinlin Wang
{"title":"Churn Resilience of Distributed Content Service System on Smart Terminals Network","authors":"Hanxing Xue, Jiali You, Jinlin Wang","doi":"10.23919/ICACT.2019.8701903","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701903","url":null,"abstract":"Recently, the content service system is shifting from a centralized model to distributed model with the capabilities of terminal devices increasing. In addition to providing service to local users, the smart terminals utilize unused bandwidth and storage resources to provide proximity services to neighbor terminals in the overlay network. How to ensure the performance of the distributed system with the continuous process of terminals joining or leaving the overlay network (churn) is a crucial issue. Existing strategies maintain the system’s service under churn through the central server scheduling or constructing complex topology. In this paper, we propose a hierarchical topology for terminals network. The inter-cluster and intra-cluster overlay use the unstructured network. The connectivity of topology is easy to be maintained under the churn. Further, we offer a decentralized replications diffusion and maintenance mechanism on the topology. Under the churn of terminals, the number of replications can be maintained autonomously to a reasonable amount. In the ordinary churn, the success rate of services in our network only drops by about 9% and is well kept. The mechanism can also quickly restore the performance of the network under the extremely churn.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115529286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ICACT 2019 Keynote 1
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/icact.2019.8701991
{"title":"ICACT 2019 Keynote 1","authors":"","doi":"10.23919/icact.2019.8701991","DOIUrl":"https://doi.org/10.23919/icact.2019.8701991","url":null,"abstract":"","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124452302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Apache Storm With Writing Scripts Apache Storm的性能评估与编写脚本
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8701904
Lemi Isaac Yoseke Laku, A. F. Y. Mohammed, F. Hazemi, Chan-Hyun Youn
{"title":"Performance Evaluation of Apache Storm With Writing Scripts","authors":"Lemi Isaac Yoseke Laku, A. F. Y. Mohammed, F. Hazemi, Chan-Hyun Youn","doi":"10.23919/ICACT.2019.8701904","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701904","url":null,"abstract":"With the exponential growth of stream data emanating from a variety of sources, today, big data presents a new era in data exploration and usage. The understanding of the performance of real-time stream data processing technologies has become a key pre-requisite while considering any deployment. Although many technologies for stream data analytics exist, little is known about the impact of writing scripts on their performance. Using a MapReduce programming model on a pseudo cluster, we conduct a word count, experimental evaluation of Apache Storm using five writing scripts; English, Arabic, Hindi, Chinese and Japanese. We define our word count as the number of time a word is written in a body of text. Static and structured data made up of 300 English sentences is translated into the scripts under study and loaded into Apache Storm. The results show that Apache Storm analyzes, English, Arabic and Hindi script sentences with ease as compared to those written in Chinese and Japanese script. Apache Storm also executes and distinguishes individual words and performs a word count on English, Arabic and Hindi sentences faster than those written in Chinese and Japanese. However, in terms of processing, the reverse is true, sentences written in Chinese and Japanese are processed faster than those written in English, Arabic and Hindi scripts.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121358214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
1.8V-to-1.0V CMOS 65 nm MIPI RFFE Interface Circuit for Millimeter-wave Beamforming Array 用于毫米波波束形成阵列的1.8 v -1.0 v CMOS 65nm MIPI RFFE接口电路
2019 21st International Conference on Advanced Communication Technology (ICACT) Pub Date : 2019-02-01 DOI: 10.23919/ICACT.2019.8701901
Seunghyun Jang, Sunwoo Kong, Hui-Dong Lee, Jeehoon Park, Kwang-Seon Kim, Kwangchun Lee
{"title":"1.8V-to-1.0V CMOS 65 nm MIPI RFFE Interface Circuit for Millimeter-wave Beamforming Array","authors":"Seunghyun Jang, Sunwoo Kong, Hui-Dong Lee, Jeehoon Park, Kwang-Seon Kim, Kwangchun Lee","doi":"10.23919/ICACT.2019.8701901","DOIUrl":"https://doi.org/10.23919/ICACT.2019.8701901","url":null,"abstract":"A 1.8V MIPI RF front-end (RFFE) circuit for a slave with a 1.0V supply is designed using a CMOS 65 nm process as a control block for a millimeter-wave beamforming array. It is consisted of a MIPI RFFE slave logic, power-on-reset (PoR), SCLK receiver, and SDATA transceiver to support the MIPI RFFE master-slave interface with MIPI RFFE bus. According to simulation results, the designed MIPI RFFE interface circuit provides rise and fall time of less than 3.3 ns with a 26 pF load (one master-eight slave configuration) at the transmission rate of 26 MHz, satisfying the requirement of 6.5 ns in the MIPI RFFE specification version 1.10.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"320 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115942938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信