{"title":"Study on information security sharing system among the industrial IoT service and product provider","authors":"Jong-Seok Choi, Yongtae Shin, Sunok Cho","doi":"10.1109/ICOIN.2018.8343179","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343179","url":null,"abstract":": IoT is being applied to various industries, and market activation is in full swing in home-appliance, medical, and transportation fields closely related to life. However, IoT can be extended to the real world because the application field is directly linked to all things in our real life. Currently, security vulnerabilities of various industries are reported in various fields, but only security requirements exist, but there is no technical countermeasure, and policy issues and security matters are discussed only in the field of standardization. Therefore, in order to cope with the widespread infringement accidents, information security sharing system in the IoT environment that can be applied directly in the field is needed. In this paper, we set up the functional requirements in the IoT information security sharing system in order to confirm the functions to be performed between the individuals in the reference model of the IoT information security sharing system.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134147568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time 360-degree video streaming over millimeter wave communication","authors":"Thanh-Tuan Le, Dien Nguyen Van, Eun‐Seok Ryu","doi":"10.1109/ICOIN.2018.8343244","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343244","url":null,"abstract":"This paper provides an adaptive scheme of real-time video streaming in millimeter wave (mmWave) system. It consists of two parts: (1) real-time video streaming over mmWave 802.11ad 60 GHz wireless link; (2) 360-degree video decoding, post-processing and displaying by using Scalable high-efficiency video coding (SHVC). The mmWave communication is high-speed wireless technology to increase the capacity of video transmission. However, the current video streaming over mmWave researches are for long-distance and mobile device almost processes many tasks such as video decoding, post processing and display by itself. Therefore, the performance of mobile device is quite low in case high-resolution video streaming like 4K. In addition, the synchronization of real-time video streaming in high speed is big issue to ensure the quality of service (QoS), especially when mobile device is moving. Thus, this paper focus on real-time video streaming over mmWave with optimized QoS for high-resolution video. Specifically, this paper implemented an offloading mechanism to handle the offloading task between two UEs. The experimental demonstration shows that the proposed scheme provided real-time video streaming with high performance in accepted QoS-sensitive video streaming applications.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134463844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strategic defense and attack in deception based network security","authors":"Daniel Fraunholz, H. Schotten","doi":"10.1109/ICOIN.2018.8343103","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343103","url":null,"abstract":"Prodigious increases in interconnectivity, highly professionalized electronic crime and espionage syndicates expose today's networks and applications to an extensive threat level. Established defense mechanisms hardly cope with this emerging threat landscape. Adversaries implemented counter measures for most defense mechanisms such as polymorphism to circumvent antivirus software, encryption against deep packet inspection and reverse connections to avoid ingress filtering or poorly configured firewalls. Deception based information security is a promising solution to enhance those established mechanisms. This research paper transfers strategic security and defense concepts from operations research, reliability engineering and game theory to deception based information security mechanisms. Feature and parameter sets for the proposed model are analyzed and discussed. Based on our developed model, network security implications are analyzed in defender and attacker perspectives.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134588570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kazuki Uemura, Hiroki Murotsu, Koki Matsumoto, Shingo Nakajima, T. Wada, K. Ohtsuki
{"title":"Number ofpeople grasp system of neighboring terminals using Bluetooth low energy","authors":"Kazuki Uemura, Hiroki Murotsu, Koki Matsumoto, Shingo Nakajima, T. Wada, K. Ohtsuki","doi":"10.1109/ICOIN.2018.8343093","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343093","url":null,"abstract":"For many years, people all over the world have been lost their lives due to catastrophic disasters, such as fires, terrorist attacks, and earthquakes. Main causes of the damage expansion in these disasters include the escape delay of evacuees. So we have proposed a system using terminals in real time providing evacuation assistance that is Emergency Rescue Evacuation Support System (ERESS). This system is automatic disaster detection by mobile phone holders around the terminals and information gathering, analysis and sharing, evacuation quickly. This paper focuses on the evacuation route finding, and we propose the number of people grasp system of neighboring terminals using Bluetooth Low Energy (BLE). We perform the performance evaluation by experiments to show the effectiveness of the proposed method.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130392428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network lifetime enhancement of multi-hop wireless sensor network by RF energy harvesting","authors":"P. S. Lakshmi, M. Jibukumar, V. Neenu","doi":"10.1109/ICOIN.2018.8343216","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343216","url":null,"abstract":"Wireless Sensor Networks (WSN) can be made more energy efficient by adopting multihop communication rather than single hop communication. Relaying heavy data traffic through nearby nodes of sink arises energy holes which is very crucial to prolong network lifetime. This paper propose an efficient RF energy harvesting scheme using multiple dedicated RF sources to avert energy holes. The work aims to 1) Optimally place the energy transmitters and 2) Determine optimal number of energy transmitters required to avoid energy holes in multihop WSNs. A utility function is defined for placing the energy transmitters, ensuring more weight for supplying energy to relay nodes and to maintain a minimum energy among all sensor nodes. For optimum number of energy transmitters, an optimization problem is solved while satisfying the constraint on minimum energy charged by each sensor node. Simulation results are provided which illustrate the performance of multihop WSN with Wireless Energy Transfer in terms of energy charged, number of energy transmitter's, throughput and outage in the network.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115051202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Broadcast MAC protocol using relative distance for periodic safety messages in vehicular networks","authors":"Yafeng Deng, Young-June Choi","doi":"10.1109/ICOIN.2018.8343162","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343162","url":null,"abstract":"Vehicles broadcast basic safety message (BSM) every 100 ms as an essential service in vehicular networks. However, it is difficult to meet the reliability requirement without efficient broadcast protocols. Some of the state-of-the-art protocols are based on TDMA which provides a constant transmission slot to each vehicle in every TDMA frame. It can guarantee collision-free transmissions when every vehicle has a unique transmission slot. In this paper, we propose a TDMA-based sequential broadcast MAC, where each vehicle chooses its transmission slot by calculating the relative distance among vehicles based on receiving power, which roughly makes the order of their transmission slot match with the order among vehicles on the road. The proposed scheme implements a neighbor notification to handle the collision resolution of broadcast messages under non-ideal channel condition. The simulation results show that our protocol can achieve a packet delivery ratio of 97% while decreasing merging collisions.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117083448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quality control scheme based on VBR characteristics for improving QoE of UHD streaming service","authors":"Minsu Kim, K. Chung","doi":"10.1109/ICOIN.2018.8343102","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343102","url":null,"abstract":"Recently, the demand for UHD (Ultra High Definition) streaming service is increasing due to the increased availability of the broadband access and the spread of various smart devices. In order to improve QoE (Quality of Experience) in HTTP Adaptive Streaming, quality control schemes considering network bandwidth and buffer occupancy have been studied. The existing techniques adaptively adjust the quality by distinguishing the buffer state based on the predicted bandwidth and the fixed buffer threshold. However, unnecessary quality changes and playback interruptions occurs due to insufficient consideration of the characteristics of VBR (Variable Bit Rate) contents of video. In this paper, we propose a quality control scheme based on VBR content characteristics for QoE enhancement of UHD streaming service. The proposed scheme estimates the bandwidth by considering the characteristics of the segment and smoothens it based on the difference of the adaptability between the segments. Also, video quality is dynamically controlled by classifying quality control region based on buffer occupancy and bandwidth utilization. Experimental results show that the proposed scheme can improve QoE by rapidly responding to bandwidth changes and minimizing unnecessary quality change and playback interruption.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117274286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation and optimization of image acquisition with smartphones in computer vision","authors":"Lingyan Xiu, Bojiao Ma, Konglin Zhu, Lin Zhang","doi":"10.1109/ICOIN.2018.8343121","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343121","url":null,"abstract":"With many emerging function modules, such as image acquisition, front-end local processing, wireless transmission and so on, the smartphone becomes a major front-end hardware in the mobile-cloud computer vision system. However, due to the limitations of local resources and camera performance, there are many problems in image acquisition with smartphones. For example, the images are not as clear as those captured by professional camera equipment. And the performance of image acquisition is much more sensitive to background procedures and environment. These shortcomings have brought great challenges in terms of accuracy and delay in computer vision. In this paper, the Resolution Adaptive Algorithm (RAA) is proposed to select the optimal resolution for image acquisition in different situations. Furthermore, in order to improve the efficiency of local resources and reduce the processing delay, a low-quality image filtered method is presented to delete the invalid images. In our experiment, the average delay between image acquisition and display is about 100ms, which meets the requirement of detection in real time.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122978915","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a new security approach based on heartbeat authentication to ensure security of cloud data access","authors":"Hamza Hammami, H. Brahmi, S. Yahia","doi":"10.1109/ICOIN.2018.8343080","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343080","url":null,"abstract":"Cloud computing represents the most recent trends in the world of information technology. It uses the latest virtualization techniques to offer the user several types of SaaS, PaaS or IaaS services. It also introduces new security challenges, especially regarding access control, confidentiality and availability. The concerns about security issues remain the main obstacle to the adoption of the cloud by companies. As a consequence, a lot of researchers have been interested in protecting access to data stored in cloud environments. The aim of this work is, on the one hand, to study the security mechanisms proposed to ensure the security of data, whose two fields of investigation are the management of access to the data of the distant users and the management of the confidentiality of these data in the cloud, and on the other hand, to explore the possibility of adapting the opportunities offered by these mechanisms, so as to put forward our security solution. The security schema we suggest in this paper allows a distant user to access of all their data anywhere in the cloud by means of authentication based on the signature of their heartbeat. The performed experiments demonstrate the efficiency of our proposed approach, which sharply outperforms the other approaches in terms of execution time, robustness, and a set of simulated attacks.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121884952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Demidenko, E. Malevskaia-Malevich, Y. Dubolazova
{"title":"ISO as a real source of funding. Pricing issues","authors":"D. Demidenko, E. Malevskaia-Malevich, Y. Dubolazova","doi":"10.1109/ICOIN.2018.8343193","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343193","url":null,"abstract":"It is difficult to deny the impact of the formation of the so-called crypto-economy on existing financial institutions. This current trend has taken shape and has taken its place in the current economic environment. Despite this, in view of the absence of regulatory and legal regulation, basic concepts, methods of evaluation, management and optimization of crypto-economics processes have not yet been formulated. The present study is devoted to the pricing of ICO as a source of financing for the activities of enterprises that are used practically in all sectors of the economy.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125203842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}