Tetsuya Noguchi, O. Takyu, F. Sasamori, S. Handa, T. Fujii, T. Ohtsuki
{"title":"Transmit control for secure information sharing in untrusted relay with two antennas","authors":"Tetsuya Noguchi, O. Takyu, F. Sasamori, S. Handa, T. Fujii, T. Ohtsuki","doi":"10.1109/ICOIN.2018.8343222","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343222","url":null,"abstract":"Relay network assisted wireless terminal has an advantage for easily constructing wireless network but a disadvantage for information leak to the wireless terminal. For secure wireless communication, an encryption but the sharing of secrete key between information source and destination are required. A secure information sharing with artificial noise and mirroring null steering for avoiding the information leak to untrusted relay has been proposed. In this paper, for enhancing the security of this proposed secure information sharing, we consider two transmit controls, transmit power control (TPC) and the adaptive node selection of information source. We evaluate the secure capacity by computer simulation.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117012942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dat Vuong, Jaejin Lee, Sunggil Hong, Won-Yong Shin, Myungsik Yoo
{"title":"Interpixel interference mitigation using differential coding in vehicular visible light communication based image sensor","authors":"Dat Vuong, Jaejin Lee, Sunggil Hong, Won-Yong Shin, Myungsik Yoo","doi":"10.1109/ICOIN.2018.8343241","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343241","url":null,"abstract":"This paper proposes the differential coding in visible light communication using image sensor. The transmitted frame is a result of comparing the current bitstream with previous bitstreams. The purpose of this scheme is limiting the number of white LED in one frame to mitigate the interpixel interference (IPI). The image sensor is used to take snap consecutive image frames. The simulation outcome shows that proposed scheme gains the BER performance.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131976712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Occupancy-based adaptive dimmable lighting energy management scheme combined with cyber physical system","authors":"Changmin Lee, Duckhee Lee, Jaiyong Lee","doi":"10.1109/ICOIN.2018.8343190","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343190","url":null,"abstract":"Research is continuing to increase the efficiency of energy used by buildings due to environmental problems such as greenhouse effect. The need for minimizing the energy used by the lighting is becoming more and more important because lighting energy is responsible for a large portion of the energy used by buildings. In addition, a method of applying a Cyber Physical System(CPS) to existing buildings is being studied in order to efficiently maintain the buildings. In this paper, we utilize the CPS infrastructure to be built in a building to optimize the energy of the lighting used by the building. We propose a Self-error correction Occupancy Counting Algorithm(SOCA) by applying a self-error correction algorithm to the existing occupancy measurement algorithm in order to measure the occupancy of accurate buildings by utilizing the building IoT(Internet of Things) infrastructure called CPS. In addition, we propose an Adaptive Dimmable Lighting Energy Management Scheme(ADLS) to maximize the user's satisfaction and to optimize the lighting energy of the building by using the accurately measured occupancy. We applied the proposed algorithms to the space to evaluate the energy conservation performance of buildings. As a result of applying it to various spaces, energy saving performance up to 70% was obtained. The effectiveness of the proposed algorithm is evaluated by modeling several spaces and simulating the effectiveness of the proposed algorithm.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130819596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On similarities of string and query sequence for DGA botnet detection","authors":"Chun-De Chang, Hui-Tang Lin","doi":"10.1109/ICOIN.2018.8343094","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343094","url":null,"abstract":"The Internet plays an important role in people's lives nowadays. However, Internet security is a major concern. Among the various threats facing the Internet and Internet users are so-called botnet attacks. A typical botnet is composed of a botmaster, a Command and Control (C&C) server and many compromised devices called bots. A botmaster can control these bots via the C&C server to launch various attacks, such as DDOS attacks, phishing, spam distribution, and so on. Among all botnets, Domain Generation Algorithm (DGA) botnets are particularly resilient to traditional detection by associating the C&C server to one of the generated domains in each bot. Accordingly, this study presents a robust approach for detecting DGA botnets based on an inspection of the DNS traffic in a system. In the proposed approach, the DNS records are filtered to remove known benign or malicious domains and are then clustered using a modified Chinese Whispers algorithm. The nature of each group (i.e., malicious or benign) is then identified by means of a Sequence Similarity Module and a Query Sequence Similarity Module. It is shown that the proposed method successfully detects various types of botnet in a real-world, large scale network.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123982268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SINR-ordered cross link interference control scheme for dynamic TDD in 5G system","authors":"J. W. Lee, C. Kang, M. Rim","doi":"10.1109/ICOIN.2018.8343141","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343141","url":null,"abstract":"Dynamic time division duplexing (TDD) is discussed as one of the key features to increase radio resource utilization in an ultra dense network (UDN) for the 5th-generation (5G) standard. However, overall system performance can be critically degraded by the cross-link interference (CLI) between base stations (BSs) or between user equipments (UEs) under dynamic TDD. In this paper, we propose a new means of reducing the CLI in the dynamic TDD system. It is a hybrid approach that combines both static and dynamic features into a simple SINR-ordered arrangement, so that UE location-specific interference level can be naturally handled. It has been shown that the proposed hybrid TDD scheme outperforms the conventional TDD schemes without compromising the lower 5% UE performance, implying that it is more effective in reducing the CLI.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123759995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Chung-Ming Huang, Meng-Shu Chiang, Wei-Long Su, Duy-Tuan Dao
{"title":"SDN-based V2V offloading for cellular network using the LifeTime-based network state routing (LT-NSR)","authors":"Chung-Ming Huang, Meng-Shu Chiang, Wei-Long Su, Duy-Tuan Dao","doi":"10.1109/ICOIN.2018.8343124","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343124","url":null,"abstract":"This paper proposed a control scheme for offloading vehicular communication traffic from the cellular network to V2V paths that can exist in Vehicular Ad Hoc Networks (VANETs). The Software Defined Network (SDN) architecture is adopted to tackle the complicated issues of VANET V2V offloading. The performance analysis for the proposed SDN-based offloading control scheme shows that it has better throughput in both the 4G link and the V2V paths when vehicle's density is in the middle.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"2005 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123642733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Toward hybrid RPL based IoT sensing for smart city","authors":"Yahya Al Sawafi, A. Touzene, K. Day, N. Alzeidi","doi":"10.1109/ICOIN.2018.8343189","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343189","url":null,"abstract":"Smart cities rely on monitoring information gathered by a large number of Wireless Sensor Network (WSN) nodes for decision and policymaking. Recently, Mobile Crowd Sensing (MCS) leveraging the latest smartphone features of sensing and networking has also participated in many smart city monitoring applications. However, both of these sensing technologies come with challenges. WSN faces network latency and limited lifetime problems due to the nature of the used constrained IoT small devices. In the other hand, most of MCS current applications use direct internet connection for sending collected data to the server using a 3G or LTE network. However, this is considered costly in terms of data tariff and high battery consumption. This paper proposes a new technique which combines both sensing technologies (WSN and MCS) in a cost effective way to overcome their limitations and leverage their benefits. The idea is to design a hybrid routing protocol framework based on the RPL protocol which will enable the integration of WSN and MCS. The aim is to benefit from MCS nodes opportunistically to support static WSN.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126997148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Latency-based graph selection manager for end-to-end network service on heterogeneous infrastructures","authors":"Changwoo Kim, Yujeong Oh, Jaiyong Lee","doi":"10.1109/ICOIN.2018.8343176","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343176","url":null,"abstract":"As Network Functions Virtualization (NFV) / Software Defined Networking (SDN) technologies gradually mature as representative next-generation network technologies, management and orchestration (MANO) technologies that manage the Service Function Chain (SFC) have received plenty of attention from industry and academia. However, a number of present research challenges have been addressing only resource efficiency related with usage rates of Virtualized Network Functions (VNFs) without network properties in terms of NFV-MANO orchestrator. Different network characteristics are considered due to use network slicing technology which provides dedicated logical networks from a physical network for tailored network services. In this paper, we proposed Graph Selection Manager (GSM) to provide one or more VNF forwarding graphs under maximum latency considering inter-latency and intra-latency as well as VNFs and network capacity. As a result of experimental emulation, we found one or more VNF forwarding graphs meeting service level agreement (SLA) of a tenant in limited network capacity, and established one or more end-to-end network services with sustained low latency.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132358527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wonjung Kim, Taeyoon Kim, Sohyun Joo, Sangheon Pack
{"title":"An opportunistic MAC protocol for full duplex wireless LANs","authors":"Wonjung Kim, Taeyoon Kim, Sohyun Joo, Sangheon Pack","doi":"10.1109/ICOIN.2018.8343230","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343230","url":null,"abstract":"In this paper, we propose an opportunistic MAC protocol for full duplex communications in WLANs. The proposed MAC protocol solves the problem of channel under-utilization that occur in the FD environment. Depending on the transmission time difference between uplink and downlink transmissions, a secondary backoff is performed to enable additional transmission to the under-utilized parts. Extensive simulation results demonstrate that the proposed MAC protocol can improve the throughput and solve the problem of channel under-utilization.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"46 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114050631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tanaphol Suebchua, Bundit Manaskasemsak, A. Rungsawang, H. Yamana
{"title":"History-enhanced focused website segment crawler","authors":"Tanaphol Suebchua, Bundit Manaskasemsak, A. Rungsawang, H. Yamana","doi":"10.1109/ICOIN.2018.8343090","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343090","url":null,"abstract":"The primary challenge in focused crawling research is how to efficiently utilize computing resources, e.g., bandwidth, disk space, and time, to find as many web pages related to a specific topic as possible. To meet this challenge, we previously introduced a machine-learning-based focused crawler that aims to crawl a group of relevant web pages located in the same directory path, called a website segment, and has achieved high efficiency so far. One of the limitations of our previous approach is that it may repeatedly visit a website that does not serve any relevant website segments, in the scenario where the website segments share the same linkage characteristics as the relevant ones in the training dataset. In this paper, we propose a “history-enhanced focused website segment crawler” to solve the problem. The idea behind it is that the priority score of an unvisited website segment should be reduced if the crawler has consecutively downloaded many irrelevant web pages from the website. To implement this idea, we propose a new prediction feature, called the “history feature”, that is extracted from the recent crawling results, i.e., relevant and irrelevant web pages gathered from the target website. Our experiment shows that our newly proposed feature could improve the crawling efficiency of our focused crawler by a maximum of approximately 5%.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-04-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134111452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}