{"title":"A physical layer security-based routing protocol in mobile ad-hoc wireless networks","authors":"Kyusung Shim, Tri Nhu Do, Beongku An","doi":"10.23919/ICACT.2018.8323777","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323777","url":null,"abstract":"Physical layer security has been considered as a sustainable technique that is competitive with existing cryptographic approaches to combat security attacks in the next generation wireless networks. In this paper, we study the vulnerability of mobile ad-hoc wireless networks in which there is an eavesdropper monitoring for the data transmissions in the networks. To this end, we propose a Physical Layer Security-based Routing protocol, called PLSR, which uses ad-hoc on-demand distance vector as the underlying technology. The main features and contributions of the proposed PLSR are as follows. First, PLSR considers a cross-layer approach that uses the information of both physical layer and network layer together to support QoS transmission (i.e., secure transmission) efficiently. When a routing route is established, both the physical layer information, PLS information using distance between neighbors and eavesdroppers, and the network layer information, i.e., the number of hops, are considered together as the parameters for route establishment. Second, PLSR establishes the routing routes that can avoid the eavesdroppers to support secure transmission. The performance evaluation of the proposed PLSR using OPNET shows that PLSR can efficiently support the security capability of routing and multi-hop transmission in mobile ad-hoc wireless networks.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129313284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jaeguk Ahn, Jong-Beom Kim, W. Choi, Jong-Oh Kim, S. Choi
{"title":"Load distribution method using multicore based NIC for high-performance computing system","authors":"Jaeguk Ahn, Jong-Beom Kim, W. Choi, Jong-Oh Kim, S. Choi","doi":"10.23919/ICACT.2018.8323655","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323655","url":null,"abstract":"Cloud computing is becoming more important in Software Defined Networking (SDN) / Network Function Virtualization (NFV). Virtual Machine (VM) and various services require higher performance servers. Accordingly, the performance of the server also requires high capacity and high performance. As the performance of hardware increases, it is required to increase the speed in the data plane area. In order to increase the speed of the data plane area, it is necessary to adjust the core affinity for each flow. When passing through the kernel, the kernel performs packet header parsing, which is overhead in terms of speed. Therefore we propose a data plane acceleration technology with load distribution of multicore (28 core) based Network Interface Card (NIC) in the test environment that delivers packets at 20 Gbps.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130016578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The architecture of multi media multi path system","authors":"B. Lee, Hea-Sook Park","doi":"10.23919/ICACT.2018.8323845","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323845","url":null,"abstract":"The defense network uses a strategic network, a tactical network, etc., and these networks are operated in isolation from the Internet. In addition to wired and wireless networks, it also uses diverse and complex private networks such as walkie-talkie networks, military telephone networks, and military satellite networks. In particular, because the defense network must ensure the survivability of the network, even if the network is managed by the army itself and the military support facilities are well, the network can be restored by the emergency backup operation should be possible. In this paper, we investigate the technology trends and technology to guarantee the survivability, stability and security of wired and wireless networks in various defense networks using various media, and develop a multi — media multi — path adaptive network technology.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130047452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jae Kyu Lee, Hyeon Yang, Kyeong Ho Park, S. Lee, S. Choi
{"title":"The flow-reduced malware detection system by controlling inactive/active timeout","authors":"Jae Kyu Lee, Hyeon Yang, Kyeong Ho Park, S. Lee, S. Choi","doi":"10.23919/ICACT.2018.8323759","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323759","url":null,"abstract":"This paper shows the flow reduction effect of malware detection system through inactive/active timeout control. In the gigabyte network environment, the DB search speed of the malware detection system that processes high-speed, largecapacity data is affected by the number of stored flows. Therefore, it is necessary to reduce the number of stored flows. The malware detection system captures network data with the First-N technique and adjusts the session length by modifying the inactive/active timeout. A drill-down mechanism is used for malware inspection of network data stored in DB. Inactive/active timeout is adjusted to verify that the number of flows decreases as the session length increases.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130557333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An approach to evaluating the number of potential cycles in an all-one base matrix","authors":"Sheng Jiang, F. Lau","doi":"10.23919/ICACT.2018.8323661","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323661","url":null,"abstract":"The “Tree Method” is usually used to identify potential cycles in low-density parity-check codes. However, with the increasing demand of high girth codes, the method becomes hard to implement because of the exponential increase of both space complexity and time complexity. In this paper, a new method is introduced to evaluate potential cycles for all-one base matrix. The method applies to large cycle length and arbitrary size base matrix. The principle of potential cycle and potential cycle duplication are studied to support the new approach. Instead of doing low efficient exhaustive search, the approach gives the number of potential cycles without duplication directly. The results of cycle numbers are given, which are verified by the “Tree Method”.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132499861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ishraq Haider Chowdhury, Afsana Abida, Mehedi Hasan Muaz
{"title":"Automated vehicle parking system and unauthorized parking detector","authors":"Ishraq Haider Chowdhury, Afsana Abida, Mehedi Hasan Muaz","doi":"10.23919/ICACT.2018.8323823","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323823","url":null,"abstract":"In this modern world, with the rapid growth of population vehicle traffic has become a part of our day to day life. Moreover, unauthorized vehicle has also increased. Thus our proposed system aims to ensure proper management of vehicles in the public places such as educational institute, office etc in order to prevent unauthorized vehicle parking and traffic. The features include detection of permitted and non-permitted vehicles on the main gate, detection of unauthorized vehicle parking in the restricted zone thus sending SMS to the authority to take action and taking fine from the vehicle user. Parking charge is also taken from the parked vehicles inside the parking lot before they leave. There are also parking lights which will be lit whenever a car enters a specific parking lot.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123331022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study on detection of anomaly behavior in automation industry","authors":"SuMi Ryu, Young Jin Kang, H. Lee","doi":"10.23919/ICACT.2018.8323763","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323763","url":null,"abstract":"After the Third Industrial Revolution, which was based on computers and the Internet, recently the fourth industrial revolution appeared based on ICT convergence such as artificial intelligence, robots, and Internet of Things. Already in the tertiary industrial revolution, most of the machines were automated and the concept of Smart Factory appeared. This makes industrial systems easier to access and emphasizes the importance of security. Therefore, there are many security methods and systems for external intrusion and attack. Also, internal security is important because information leakage by insiders, tampering operations, and security accidents caused by malfunctions of machines also occur. However, there are not many systems, solutions, and methods for information leakage and attack in a damaging internal environment, and there is a low awareness of security. In this paper, we analyze the trends on the system, solutions and research for the detection of anomaly behavior in the present automation industry system and internal.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"31 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126301955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Size-miniaturized half-mode substrate integrated waveguide bandpass filter incorporating E-shaped defected ground structure for wideband communication and radar applications","authors":"Chen-Cheng Wang, Zijun Wang, Y. Huang","doi":"10.23919/ICACT.2018.8323627","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323627","url":null,"abstract":"In this paper, a size-miniaturized bandpass filter based on the half-mode substrate integrated waveguide (HM-SIW) and embedded E-shaped detected ground structure (DGS) is presented. Two pairs of embedded E-shaped DGSs are face-to-face configured and loaded into the conventional HMSIW section to constitute a HMSIW-DGS unit cell. First of all, the HMSIW is with inherent highpass characteristic, while the embedded E-shaped DGS is with bandgap function. By integrating these two characteristics together, the proposed HMSIW-DGS unit cell will exhibit bandpass transmission response, as the cutoff frequency of the HMSIW is lower than the resonant bandgap frequency of the DGS. Utilizing HMSIW instead of SIW can help to reduce size of the unit cell. Meanwhile, the electrically small DGS is also useful for the size miniaturization. Subsequently, the stepped-impedance structure is introduced into the E-shaped DGS to decrease its electrical size, which will effectively improve the tuning flexibility of the unit cell, and can consequently make the DGS with same physical size operate lower bandgap frequency. That is to say, the stepped-impedance structure can contribute to further size reduction of the DGS. Thirdly, the proposed unit cell is systematically investigated by using the theory of guided waves, with its propagation constant and dispersion characteristic being studied in detail, from which the bandpass transmission response can be captured obviously. To verify the transmission properties of the proposed unit cell, a bandpass filter with three cascading unit cells is implemented. The fabricated prototype achieves a central frequency of 10GHz, a fractional bandwidth of 23%, an insertion loss of 1.2dB and a return loss of 20dB. As compared with some reported SIW filters, the proposed one is with smaller size and similar performance, which illustrates its suitability for the wideband communication and radar applications.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115322913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Minjae Park, Hyunah Kim, Hyun Ahn, Kwanghoon Pio Kim
{"title":"An IoT-aware workflow model designer for smart alarm service about companion animal health check","authors":"Minjae Park, Hyunah Kim, Hyun Ahn, Kwanghoon Pio Kim","doi":"10.23919/ICACT.2018.8323899","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323899","url":null,"abstract":"Process-based application-driven environments are becoming very diverse. As IoT-based application implementations are widely used, an execution environment that can run IoT devices is needed. We want to use this IoT environment as a way to check the health of companion animals. We describe a workflow designer that supports an alarm service to provide an alarm service for health checks. This will provide access to one workflow designer to support the new service, and through these extensions, we will develop a workflow that supports a variety of IoT environments.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"186 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122424123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sergio Peñafiel, N. Baloian, J. Pino, Jorge Quinteros, Alvaro Riquelme, Horacio Sanson, Douglas Teoh
{"title":"Associating risks of getting strokes with data from health checkup records using Dempster-Shafer Theory","authors":"Sergio Peñafiel, N. Baloian, J. Pino, Jorge Quinteros, Alvaro Riquelme, Horacio Sanson, Douglas Teoh","doi":"10.23919/ICACT.2018.8323709","DOIUrl":"https://doi.org/10.23919/ICACT.2018.8323709","url":null,"abstract":"Prediction of future diseases from historical data of medical patients is a topic that has gained increasing interest given the growing availability of such data in electronic format. Most of the developed systems are based on machine learning techniques, which are good to find relations between data but do not help explaining causalities. In particular, it would be difficult to get a meaningful medical explanation for the relationship between a patient's health checkup data and the risk of developing a certain disease. On the other hand, expert system approaches, like Bayesian networks, are based on medical knowledge but have trouble dealing with high levels of uncertainty, which is crucial in this kind of scenario. In this work we present a prediction system for the risk of a patient having a (heart or brain) stroke based on past medical checkup data. The system is based on the Dempster-Shafer Theory of plausibility which is good for handling uncertainty. The data used belongs to a rural hospital in Okayama, Japan, where people are compelled to undergo annual health checkups by law. The model also produces rules that are able to relate data from exam results with the aforementioned risk, thus proposing a cause from the medical point of view. Experiments comparing the results of the Dempster-Shafer method with other machine learning methods like Multilayer perceptron, Quadratic discriminant analysis and Naive Bayes show that our approach performed the best in general, with an overall prediction accuracy of 61% and with the best precision value on true positive cases of stroke.","PeriodicalId":228625,"journal":{"name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123104091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}