2018 International Conference on Information Networking (ICOIN)最新文献

筛选
英文 中文
Study on information security sharing system among the industrial IoT service and product provider 工业物联网服务和产品提供商信息安全共享系统研究
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343179
Jong-Seok Choi, Yongtae Shin, Sunok Cho
{"title":"Study on information security sharing system among the industrial IoT service and product provider","authors":"Jong-Seok Choi, Yongtae Shin, Sunok Cho","doi":"10.1109/ICOIN.2018.8343179","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343179","url":null,"abstract":": IoT is being applied to various industries, and market activation is in full swing in home-appliance, medical, and transportation fields closely related to life. However, IoT can be extended to the real world because the application field is directly linked to all things in our real life. Currently, security vulnerabilities of various industries are reported in various fields, but only security requirements exist, but there is no technical countermeasure, and policy issues and security matters are discussed only in the field of standardization. Therefore, in order to cope with the widespread infringement accidents, information security sharing system in the IoT environment that can be applied directly in the field is needed. In this paper, we set up the functional requirements in the IoT information security sharing system in order to confirm the functions to be performed between the individuals in the reference model of the IoT information security sharing system.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134147568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Real-time 360-degree video streaming over millimeter wave communication 实时360度视频流通过毫米波通信
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343244
Thanh-Tuan Le, Dien Nguyen Van, Eun‐Seok Ryu
{"title":"Real-time 360-degree video streaming over millimeter wave communication","authors":"Thanh-Tuan Le, Dien Nguyen Van, Eun‐Seok Ryu","doi":"10.1109/ICOIN.2018.8343244","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343244","url":null,"abstract":"This paper provides an adaptive scheme of real-time video streaming in millimeter wave (mmWave) system. It consists of two parts: (1) real-time video streaming over mmWave 802.11ad 60 GHz wireless link; (2) 360-degree video decoding, post-processing and displaying by using Scalable high-efficiency video coding (SHVC). The mmWave communication is high-speed wireless technology to increase the capacity of video transmission. However, the current video streaming over mmWave researches are for long-distance and mobile device almost processes many tasks such as video decoding, post processing and display by itself. Therefore, the performance of mobile device is quite low in case high-resolution video streaming like 4K. In addition, the synchronization of real-time video streaming in high speed is big issue to ensure the quality of service (QoS), especially when mobile device is moving. Thus, this paper focus on real-time video streaming over mmWave with optimized QoS for high-resolution video. Specifically, this paper implemented an offloading mechanism to handle the offloading task between two UEs. The experimental demonstration shows that the proposed scheme provided real-time video streaming with high performance in accepted QoS-sensitive video streaming applications.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134463844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Strategic defense and attack in deception based network security 基于欺骗的网络安全中的战略防御与攻击
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343103
Daniel Fraunholz, H. Schotten
{"title":"Strategic defense and attack in deception based network security","authors":"Daniel Fraunholz, H. Schotten","doi":"10.1109/ICOIN.2018.8343103","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343103","url":null,"abstract":"Prodigious increases in interconnectivity, highly professionalized electronic crime and espionage syndicates expose today's networks and applications to an extensive threat level. Established defense mechanisms hardly cope with this emerging threat landscape. Adversaries implemented counter measures for most defense mechanisms such as polymorphism to circumvent antivirus software, encryption against deep packet inspection and reverse connections to avoid ingress filtering or poorly configured firewalls. Deception based information security is a promising solution to enhance those established mechanisms. This research paper transfers strategic security and defense concepts from operations research, reliability engineering and game theory to deception based information security mechanisms. Feature and parameter sets for the proposed model are analyzed and discussed. Based on our developed model, network security implications are analyzed in defender and attacker perspectives.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134588570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Number ofpeople grasp system of neighboring terminals using Bluetooth low energy 数人把握系统相邻终端采用蓝牙低功耗
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343093
Kazuki Uemura, Hiroki Murotsu, Koki Matsumoto, Shingo Nakajima, T. Wada, K. Ohtsuki
{"title":"Number ofpeople grasp system of neighboring terminals using Bluetooth low energy","authors":"Kazuki Uemura, Hiroki Murotsu, Koki Matsumoto, Shingo Nakajima, T. Wada, K. Ohtsuki","doi":"10.1109/ICOIN.2018.8343093","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343093","url":null,"abstract":"For many years, people all over the world have been lost their lives due to catastrophic disasters, such as fires, terrorist attacks, and earthquakes. Main causes of the damage expansion in these disasters include the escape delay of evacuees. So we have proposed a system using terminals in real time providing evacuation assistance that is Emergency Rescue Evacuation Support System (ERESS). This system is automatic disaster detection by mobile phone holders around the terminals and information gathering, analysis and sharing, evacuation quickly. This paper focuses on the evacuation route finding, and we propose the number of people grasp system of neighboring terminals using Bluetooth Low Energy (BLE). We perform the performance evaluation by experiments to show the effectiveness of the proposed method.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130392428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Network lifetime enhancement of multi-hop wireless sensor network by RF energy harvesting 基于射频能量收集的多跳无线传感器网络寿命增强研究
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343216
P. S. Lakshmi, M. Jibukumar, V. Neenu
{"title":"Network lifetime enhancement of multi-hop wireless sensor network by RF energy harvesting","authors":"P. S. Lakshmi, M. Jibukumar, V. Neenu","doi":"10.1109/ICOIN.2018.8343216","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343216","url":null,"abstract":"Wireless Sensor Networks (WSN) can be made more energy efficient by adopting multihop communication rather than single hop communication. Relaying heavy data traffic through nearby nodes of sink arises energy holes which is very crucial to prolong network lifetime. This paper propose an efficient RF energy harvesting scheme using multiple dedicated RF sources to avert energy holes. The work aims to 1) Optimally place the energy transmitters and 2) Determine optimal number of energy transmitters required to avoid energy holes in multihop WSNs. A utility function is defined for placing the energy transmitters, ensuring more weight for supplying energy to relay nodes and to maintain a minimum energy among all sensor nodes. For optimum number of energy transmitters, an optimization problem is solved while satisfying the constraint on minimum energy charged by each sensor node. Simulation results are provided which illustrate the performance of multihop WSN with Wireless Energy Transfer in terms of energy charged, number of energy transmitter's, throughput and outage in the network.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115051202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Broadcast MAC protocol using relative distance for periodic safety messages in vehicular networks 车载网络中使用相对距离的周期性安全消息广播MAC协议
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343162
Yafeng Deng, Young-June Choi
{"title":"Broadcast MAC protocol using relative distance for periodic safety messages in vehicular networks","authors":"Yafeng Deng, Young-June Choi","doi":"10.1109/ICOIN.2018.8343162","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343162","url":null,"abstract":"Vehicles broadcast basic safety message (BSM) every 100 ms as an essential service in vehicular networks. However, it is difficult to meet the reliability requirement without efficient broadcast protocols. Some of the state-of-the-art protocols are based on TDMA which provides a constant transmission slot to each vehicle in every TDMA frame. It can guarantee collision-free transmissions when every vehicle has a unique transmission slot. In this paper, we propose a TDMA-based sequential broadcast MAC, where each vehicle chooses its transmission slot by calculating the relative distance among vehicles based on receiving power, which roughly makes the order of their transmission slot match with the order among vehicles on the road. The proposed scheme implements a neighbor notification to handle the collision resolution of broadcast messages under non-ideal channel condition. The simulation results show that our protocol can achieve a packet delivery ratio of 97% while decreasing merging collisions.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117083448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quality control scheme based on VBR characteristics for improving QoE of UHD streaming service 基于VBR特性的超高清流媒体服务质量控制方案
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343102
Minsu Kim, K. Chung
{"title":"Quality control scheme based on VBR characteristics for improving QoE of UHD streaming service","authors":"Minsu Kim, K. Chung","doi":"10.1109/ICOIN.2018.8343102","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343102","url":null,"abstract":"Recently, the demand for UHD (Ultra High Definition) streaming service is increasing due to the increased availability of the broadband access and the spread of various smart devices. In order to improve QoE (Quality of Experience) in HTTP Adaptive Streaming, quality control schemes considering network bandwidth and buffer occupancy have been studied. The existing techniques adaptively adjust the quality by distinguishing the buffer state based on the predicted bandwidth and the fixed buffer threshold. However, unnecessary quality changes and playback interruptions occurs due to insufficient consideration of the characteristics of VBR (Variable Bit Rate) contents of video. In this paper, we propose a quality control scheme based on VBR content characteristics for QoE enhancement of UHD streaming service. The proposed scheme estimates the bandwidth by considering the characteristics of the segment and smoothens it based on the difference of the adaptability between the segments. Also, video quality is dynamically controlled by classifying quality control region based on buffer occupancy and bandwidth utilization. Experimental results show that the proposed scheme can improve QoE by rapidly responding to bandwidth changes and minimizing unnecessary quality change and playback interruption.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117274286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementation and optimization of image acquisition with smartphones in computer vision 计算机视觉中智能手机图像采集的实现与优化
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343121
Lingyan Xiu, Bojiao Ma, Konglin Zhu, Lin Zhang
{"title":"Implementation and optimization of image acquisition with smartphones in computer vision","authors":"Lingyan Xiu, Bojiao Ma, Konglin Zhu, Lin Zhang","doi":"10.1109/ICOIN.2018.8343121","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343121","url":null,"abstract":"With many emerging function modules, such as image acquisition, front-end local processing, wireless transmission and so on, the smartphone becomes a major front-end hardware in the mobile-cloud computer vision system. However, due to the limitations of local resources and camera performance, there are many problems in image acquisition with smartphones. For example, the images are not as clear as those captured by professional camera equipment. And the performance of image acquisition is much more sensitive to background procedures and environment. These shortcomings have brought great challenges in terms of accuracy and delay in computer vision. In this paper, the Resolution Adaptive Algorithm (RAA) is proposed to select the optimal resolution for image acquisition in different situations. Furthermore, in order to improve the efficiency of local resources and reduce the processing delay, a low-quality image filtered method is presented to delete the invalid images. In our experiment, the average delay between image acquisition and display is about 100ms, which meets the requirement of detection in real time.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122978915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards a new security approach based on heartbeat authentication to ensure security of cloud data access 提出了一种基于心跳认证的云数据访问安全新方法
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343080
Hamza Hammami, H. Brahmi, S. Yahia
{"title":"Towards a new security approach based on heartbeat authentication to ensure security of cloud data access","authors":"Hamza Hammami, H. Brahmi, S. Yahia","doi":"10.1109/ICOIN.2018.8343080","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343080","url":null,"abstract":"Cloud computing represents the most recent trends in the world of information technology. It uses the latest virtualization techniques to offer the user several types of SaaS, PaaS or IaaS services. It also introduces new security challenges, especially regarding access control, confidentiality and availability. The concerns about security issues remain the main obstacle to the adoption of the cloud by companies. As a consequence, a lot of researchers have been interested in protecting access to data stored in cloud environments. The aim of this work is, on the one hand, to study the security mechanisms proposed to ensure the security of data, whose two fields of investigation are the management of access to the data of the distant users and the management of the confidentiality of these data in the cloud, and on the other hand, to explore the possibility of adapting the opportunities offered by these mechanisms, so as to put forward our security solution. The security schema we suggest in this paper allows a distant user to access of all their data anywhere in the cloud by means of authentication based on the signature of their heartbeat. The performed experiments demonstrate the efficiency of our proposed approach, which sharply outperforms the other approaches in terms of execution time, robustness, and a set of simulated attacks.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121884952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ISO as a real source of funding. Pricing issues ISO是一个真正的资金来源。定价问题
2018 International Conference on Information Networking (ICOIN) Pub Date : 1900-01-01 DOI: 10.1109/ICOIN.2018.8343193
D. Demidenko, E. Malevskaia-Malevich, Y. Dubolazova
{"title":"ISO as a real source of funding. Pricing issues","authors":"D. Demidenko, E. Malevskaia-Malevich, Y. Dubolazova","doi":"10.1109/ICOIN.2018.8343193","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343193","url":null,"abstract":"It is difficult to deny the impact of the formation of the so-called crypto-economy on existing financial institutions. This current trend has taken shape and has taken its place in the current economic environment. Despite this, in view of the absence of regulatory and legal regulation, basic concepts, methods of evaluation, management and optimization of crypto-economics processes have not yet been formulated. The present study is devoted to the pricing of ICO as a source of financing for the activities of enterprises that are used practically in all sectors of the economy.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125203842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信