2018 International Conference on Information Networking (ICOIN)最新文献

筛选
英文 中文
Transmit control for secure information sharing in untrusted relay with two antennas 在双天线非可信中继中实现安全信息共享的传输控制
2018 International Conference on Information Networking (ICOIN) Pub Date : 2018-04-19 DOI: 10.1109/ICOIN.2018.8343222
Tetsuya Noguchi, O. Takyu, F. Sasamori, S. Handa, T. Fujii, T. Ohtsuki
{"title":"Transmit control for secure information sharing in untrusted relay with two antennas","authors":"Tetsuya Noguchi, O. Takyu, F. Sasamori, S. Handa, T. Fujii, T. Ohtsuki","doi":"10.1109/ICOIN.2018.8343222","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343222","url":null,"abstract":"Relay network assisted wireless terminal has an advantage for easily constructing wireless network but a disadvantage for information leak to the wireless terminal. For secure wireless communication, an encryption but the sharing of secrete key between information source and destination are required. A secure information sharing with artificial noise and mirroring null steering for avoiding the information leak to untrusted relay has been proposed. In this paper, for enhancing the security of this proposed secure information sharing, we consider two transmit controls, transmit power control (TPC) and the adaptive node selection of information source. We evaluate the secure capacity by computer simulation.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117012942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interpixel interference mitigation using differential coding in vehicular visible light communication based image sensor 基于差分编码的车载可见光通信图像传感器像素间干扰抑制
2018 International Conference on Information Networking (ICOIN) Pub Date : 2018-04-19 DOI: 10.1109/ICOIN.2018.8343241
Dat Vuong, Jaejin Lee, Sunggil Hong, Won-Yong Shin, Myungsik Yoo
{"title":"Interpixel interference mitigation using differential coding in vehicular visible light communication based image sensor","authors":"Dat Vuong, Jaejin Lee, Sunggil Hong, Won-Yong Shin, Myungsik Yoo","doi":"10.1109/ICOIN.2018.8343241","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343241","url":null,"abstract":"This paper proposes the differential coding in visible light communication using image sensor. The transmitted frame is a result of comparing the current bitstream with previous bitstreams. The purpose of this scheme is limiting the number of white LED in one frame to mitigate the interpixel interference (IPI). The image sensor is used to take snap consecutive image frames. The simulation outcome shows that proposed scheme gains the BER performance.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131976712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Occupancy-based adaptive dimmable lighting energy management scheme combined with cyber physical system 结合网络物理系统的基于占用的自适应可调光照明能源管理方案
2018 International Conference on Information Networking (ICOIN) Pub Date : 2018-04-19 DOI: 10.1109/ICOIN.2018.8343190
Changmin Lee, Duckhee Lee, Jaiyong Lee
{"title":"Occupancy-based adaptive dimmable lighting energy management scheme combined with cyber physical system","authors":"Changmin Lee, Duckhee Lee, Jaiyong Lee","doi":"10.1109/ICOIN.2018.8343190","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343190","url":null,"abstract":"Research is continuing to increase the efficiency of energy used by buildings due to environmental problems such as greenhouse effect. The need for minimizing the energy used by the lighting is becoming more and more important because lighting energy is responsible for a large portion of the energy used by buildings. In addition, a method of applying a Cyber Physical System(CPS) to existing buildings is being studied in order to efficiently maintain the buildings. In this paper, we utilize the CPS infrastructure to be built in a building to optimize the energy of the lighting used by the building. We propose a Self-error correction Occupancy Counting Algorithm(SOCA) by applying a self-error correction algorithm to the existing occupancy measurement algorithm in order to measure the occupancy of accurate buildings by utilizing the building IoT(Internet of Things) infrastructure called CPS. In addition, we propose an Adaptive Dimmable Lighting Energy Management Scheme(ADLS) to maximize the user's satisfaction and to optimize the lighting energy of the building by using the accurately measured occupancy. We applied the proposed algorithms to the space to evaluate the energy conservation performance of buildings. As a result of applying it to various spaces, energy saving performance up to 70% was obtained. The effectiveness of the proposed algorithm is evaluated by modeling several spaces and simulating the effectiveness of the proposed algorithm.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130819596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On similarities of string and query sequence for DGA botnet detection DGA僵尸网络检测中字符串和查询序列的相似度研究
2018 International Conference on Information Networking (ICOIN) Pub Date : 2018-04-19 DOI: 10.1109/ICOIN.2018.8343094
Chun-De Chang, Hui-Tang Lin
{"title":"On similarities of string and query sequence for DGA botnet detection","authors":"Chun-De Chang, Hui-Tang Lin","doi":"10.1109/ICOIN.2018.8343094","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343094","url":null,"abstract":"The Internet plays an important role in people's lives nowadays. However, Internet security is a major concern. Among the various threats facing the Internet and Internet users are so-called botnet attacks. A typical botnet is composed of a botmaster, a Command and Control (C&C) server and many compromised devices called bots. A botmaster can control these bots via the C&C server to launch various attacks, such as DDOS attacks, phishing, spam distribution, and so on. Among all botnets, Domain Generation Algorithm (DGA) botnets are particularly resilient to traditional detection by associating the C&C server to one of the generated domains in each bot. Accordingly, this study presents a robust approach for detecting DGA botnets based on an inspection of the DNS traffic in a system. In the proposed approach, the DNS records are filtered to remove known benign or malicious domains and are then clustered using a modified Chinese Whispers algorithm. The nature of each group (i.e., malicious or benign) is then identified by means of a Sequence Similarity Module and a Query Sequence Similarity Module. It is shown that the proposed method successfully detects various types of botnet in a real-world, large scale network.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123982268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
SINR-ordered cross link interference control scheme for dynamic TDD in 5G system 5G系统中动态TDD的sinr有序交联干扰控制方案
2018 International Conference on Information Networking (ICOIN) Pub Date : 2018-04-19 DOI: 10.1109/ICOIN.2018.8343141
J. W. Lee, C. Kang, M. Rim
{"title":"SINR-ordered cross link interference control scheme for dynamic TDD in 5G system","authors":"J. W. Lee, C. Kang, M. Rim","doi":"10.1109/ICOIN.2018.8343141","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343141","url":null,"abstract":"Dynamic time division duplexing (TDD) is discussed as one of the key features to increase radio resource utilization in an ultra dense network (UDN) for the 5th-generation (5G) standard. However, overall system performance can be critically degraded by the cross-link interference (CLI) between base stations (BSs) or between user equipments (UEs) under dynamic TDD. In this paper, we propose a new means of reducing the CLI in the dynamic TDD system. It is a hybrid approach that combines both static and dynamic features into a simple SINR-ordered arrangement, so that UE location-specific interference level can be naturally handled. It has been shown that the proposed hybrid TDD scheme outperforms the conventional TDD schemes without compromising the lower 5% UE performance, implying that it is more effective in reducing the CLI.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123759995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
SDN-based V2V offloading for cellular network using the LifeTime-based network state routing (LT-NSR) 基于sdn的基于寿命的网络状态路由(LT-NSR)的蜂窝网络V2V卸载
2018 International Conference on Information Networking (ICOIN) Pub Date : 2018-04-19 DOI: 10.1109/ICOIN.2018.8343124
Chung-Ming Huang, Meng-Shu Chiang, Wei-Long Su, Duy-Tuan Dao
{"title":"SDN-based V2V offloading for cellular network using the LifeTime-based network state routing (LT-NSR)","authors":"Chung-Ming Huang, Meng-Shu Chiang, Wei-Long Su, Duy-Tuan Dao","doi":"10.1109/ICOIN.2018.8343124","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343124","url":null,"abstract":"This paper proposed a control scheme for offloading vehicular communication traffic from the cellular network to V2V paths that can exist in Vehicular Ad Hoc Networks (VANETs). The Software Defined Network (SDN) architecture is adopted to tackle the complicated issues of VANET V2V offloading. The performance analysis for the proposed SDN-based offloading control scheme shows that it has better throughput in both the 4G link and the V2V paths when vehicle's density is in the middle.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"2005 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123642733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Toward hybrid RPL based IoT sensing for smart city 面向智慧城市的基于混合RPL的物联网传感
2018 International Conference on Information Networking (ICOIN) Pub Date : 2018-04-19 DOI: 10.1109/ICOIN.2018.8343189
Yahya Al Sawafi, A. Touzene, K. Day, N. Alzeidi
{"title":"Toward hybrid RPL based IoT sensing for smart city","authors":"Yahya Al Sawafi, A. Touzene, K. Day, N. Alzeidi","doi":"10.1109/ICOIN.2018.8343189","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343189","url":null,"abstract":"Smart cities rely on monitoring information gathered by a large number of Wireless Sensor Network (WSN) nodes for decision and policymaking. Recently, Mobile Crowd Sensing (MCS) leveraging the latest smartphone features of sensing and networking has also participated in many smart city monitoring applications. However, both of these sensing technologies come with challenges. WSN faces network latency and limited lifetime problems due to the nature of the used constrained IoT small devices. In the other hand, most of MCS current applications use direct internet connection for sending collected data to the server using a 3G or LTE network. However, this is considered costly in terms of data tariff and high battery consumption. This paper proposes a new technique which combines both sensing technologies (WSN and MCS) in a cost effective way to overcome their limitations and leverage their benefits. The idea is to design a hybrid routing protocol framework based on the RPL protocol which will enable the integration of WSN and MCS. The aim is to benefit from MCS nodes opportunistically to support static WSN.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126997148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Latency-based graph selection manager for end-to-end network service on heterogeneous infrastructures 基于延迟的图形选择管理器,用于异构基础设施上的端到端网络服务
2018 International Conference on Information Networking (ICOIN) Pub Date : 2018-04-19 DOI: 10.1109/ICOIN.2018.8343176
Changwoo Kim, Yujeong Oh, Jaiyong Lee
{"title":"Latency-based graph selection manager for end-to-end network service on heterogeneous infrastructures","authors":"Changwoo Kim, Yujeong Oh, Jaiyong Lee","doi":"10.1109/ICOIN.2018.8343176","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343176","url":null,"abstract":"As Network Functions Virtualization (NFV) / Software Defined Networking (SDN) technologies gradually mature as representative next-generation network technologies, management and orchestration (MANO) technologies that manage the Service Function Chain (SFC) have received plenty of attention from industry and academia. However, a number of present research challenges have been addressing only resource efficiency related with usage rates of Virtualized Network Functions (VNFs) without network properties in terms of NFV-MANO orchestrator. Different network characteristics are considered due to use network slicing technology which provides dedicated logical networks from a physical network for tailored network services. In this paper, we proposed Graph Selection Manager (GSM) to provide one or more VNF forwarding graphs under maximum latency considering inter-latency and intra-latency as well as VNFs and network capacity. As a result of experimental emulation, we found one or more VNF forwarding graphs meeting service level agreement (SLA) of a tenant in limited network capacity, and established one or more end-to-end network services with sustained low latency.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132358527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An opportunistic MAC protocol for full duplex wireless LANs 全双工无线局域网的机会MAC协议
2018 International Conference on Information Networking (ICOIN) Pub Date : 2018-04-19 DOI: 10.1109/ICOIN.2018.8343230
Wonjung Kim, Taeyoon Kim, Sohyun Joo, Sangheon Pack
{"title":"An opportunistic MAC protocol for full duplex wireless LANs","authors":"Wonjung Kim, Taeyoon Kim, Sohyun Joo, Sangheon Pack","doi":"10.1109/ICOIN.2018.8343230","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343230","url":null,"abstract":"In this paper, we propose an opportunistic MAC protocol for full duplex communications in WLANs. The proposed MAC protocol solves the problem of channel under-utilization that occur in the FD environment. Depending on the transmission time difference between uplink and downlink transmissions, a secondary backoff is performed to enable additional transmission to the under-utilized parts. Extensive simulation results demonstrate that the proposed MAC protocol can improve the throughput and solve the problem of channel under-utilization.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"46 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114050631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
History-enhanced focused website segment crawler 历史增强的重点网站分段爬虫
2018 International Conference on Information Networking (ICOIN) Pub Date : 2018-04-19 DOI: 10.1109/ICOIN.2018.8343090
Tanaphol Suebchua, Bundit Manaskasemsak, A. Rungsawang, H. Yamana
{"title":"History-enhanced focused website segment crawler","authors":"Tanaphol Suebchua, Bundit Manaskasemsak, A. Rungsawang, H. Yamana","doi":"10.1109/ICOIN.2018.8343090","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343090","url":null,"abstract":"The primary challenge in focused crawling research is how to efficiently utilize computing resources, e.g., bandwidth, disk space, and time, to find as many web pages related to a specific topic as possible. To meet this challenge, we previously introduced a machine-learning-based focused crawler that aims to crawl a group of relevant web pages located in the same directory path, called a website segment, and has achieved high efficiency so far. One of the limitations of our previous approach is that it may repeatedly visit a website that does not serve any relevant website segments, in the scenario where the website segments share the same linkage characteristics as the relevant ones in the training dataset. In this paper, we propose a “history-enhanced focused website segment crawler” to solve the problem. The idea behind it is that the priority score of an unvisited website segment should be reduced if the crawler has consecutively downloaded many irrelevant web pages from the website. To implement this idea, we propose a new prediction feature, called the “history feature”, that is extracted from the recent crawling results, i.e., relevant and irrelevant web pages gathered from the target website. Our experiment shows that our newly proposed feature could improve the crawling efficiency of our focused crawler by a maximum of approximately 5%.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134111452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信