{"title":"Recognition of the upper structure using the RCS characteristic of the automotive radar","authors":"J. Oh, Heemang Song, Hyun-Chool Shin","doi":"10.1109/ICOIN.2018.8343264","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343264","url":null,"abstract":"Recently, Automotive radar sensors achieve a greatly increasingly market influence and essentially used for providing driving environment information required by driver assistance systems. Although they are good at measuring the distance and the radial velocity of other objects even under bad weather circumstance, they have difficulty in distinguishing clearly upper structure and stationary vehicle for ambiguity in elevation. As a result, upper structure(e. g overpass, road signal, bridge so on) crossing lane of the ego vehicle may look similar to stationary vehicle. For this reason, AEB(Autonomous Emergency Braking) system fails to operate properly. As closer to the upper structure and the stationary vehicle, the pattern of RCS(Radar Cross Section) measured from the object is different. This difference of RCS pattern can be used to provide features to distinguish the upper structure and the stationary vehicle. There may exists certain features that can help classify them base only on RCS. Feature calculated from real FMCW(Frequency Modulated Continuos Wave) radar sensor data show potential availability in real traffic condition.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129863977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy efficient K-means clustering-based routing protocol for WSN using optimal packet size","authors":"M. Razzaq, Devarani Devi Ningombam, Seokjoo Shin","doi":"10.1109/ICOIN.2018.8343195","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343195","url":null,"abstract":"In wireless sensor networks (WSNs), sensor nodes are operated by small batteries, thus they have limited energy resources which need careful utilization. The proposed algorithm is an energy efficient K-means clustering-based routing protocol and considers an optimal fixed packet size according to the radio parameters and channel conditions of the transceiver. This approach can minimize the energy consumption of individual node and increase the network lifetime as a whole. Moreover, different power levels are considered for data transmission from cluster head to cluster member and base station. Simulation results show that the proposed algorithm performs better than the conventional K-means based energy aware clustering (KEAC) in terms of network lifetime and increases the overall throughput of the network.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129499315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying signal source using channel state information in wireless LANs","authors":"Yonghwi Kim, S. An, Jungmin So","doi":"10.1109/ICOIN.2018.8343192","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343192","url":null,"abstract":"In this paper, we study the feasibility of identifying signal source in wireless LANs using channel state information obtained from preambles. In current standard, the signal source can be identified by reading the MAC header which requires high SNR and takes more time than receiving the preamble. For each packet, CSI is obtained for each (group of) subcarriers and for each TX-RX path, which makes the information rich in features to be used for machine learning-based classification. Experiments in a typical office environment show that with simple kNN or neural network models, we can classify tens of signal sources with over 90% accuracy. Moreover, confidence levels differ significantly between correct and incorrect samples, which can be exploited to avoid false positives with little sacrifice of correct samples. The CSI-based source identification method can be used to improve spectral efficiency of WLANs, and can be used along with schemes such as BSS coloring included in the IEEE 802.11ax standard for highly efficiency WLANs.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128042569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed dynamic power-aware buffering for multi-Gbps video streaming in IEEE 802.11ad fast session transfer","authors":"Dohyun Kwon, Joongheon Kim","doi":"10.1109/ICOIN.2018.8343249","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343249","url":null,"abstract":"This paper proposes a distributed and stochastic algorithm for power-aware buffer management in 60 GHz IEEE 802.11ad wireless video streaming. Since 60 GHz wireless packets are very weak in non-line-of-sight scenarios due to the high attenuation, related 60 GHz wireless algorithms have been investigated including beamforming, relaying, fast session transfer (FST). Among them, FST defines the policy for the inter-operation between 2.4/5 GHz and 60 GHz wireless channels. This paper designs a distributed and stochastic algorithm that computes the amounts of power allocations for streaming video packets in the multi-hop wireless networks of FST devices. The algorithm aims on the joint optimization of (i) minimization of the sum of time average expected power consumption and (ii) video transmission buffer stability. Our simulation results show the improvement and the tradeoffs between the two optimization criteria.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"82 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131591647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jongho Moon, Youngsook Lee, Hyungkyu Yang, Taeui Song, Dongho Won
{"title":"Cryptanalysis of a privacy-preserving and provable user authentication scheme for wireless sensor networks based on Internet of Things security","authors":"Jongho Moon, Youngsook Lee, Hyungkyu Yang, Taeui Song, Dongho Won","doi":"10.1109/ICOIN.2018.8343154","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343154","url":null,"abstract":"User authentication in wireless sensor networks is more complex than normal networks due to sensor network characteristics such as unmanned operation, limited resources, and unreliable communication. For this reason, various authentication protocols have been presented to provide secure and efficient communication. In 2017, Wu et al. presented a provable and privacy-preserving user authentication protocol for wireless sensor networks. Unfortunately, we found that Wu et al.'s protocol was still vulnerable against user impersonation attack, and had a problem in the password change phase. We show how an attacker can impersonate an other user and why the password change phase is ineffective.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121224974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Danish Mehmood Mughal, S. T. Shah, Daniyal Munir, K. Park, M. Chung
{"title":"Throughput analysis of multi-antenna based SWIPT relay network","authors":"Danish Mehmood Mughal, S. T. Shah, Daniyal Munir, K. Park, M. Chung","doi":"10.1109/ICOIN.2018.8343136","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343136","url":null,"abstract":"Radio frequency (RF) energy harvesting is a promising solution to increase the lifetime of energy-constrained wireless sensor networks. In this paper, we studied the performance of simultaneous wireless information and power transfer (SWIPT) based multi-antenna decode and forward relay network where relay and destination can have multiple antennas. Energy constraint relay, first harvest energy from the source signal and uses harvested energy to forward the information to the destination, employing time switching (TS) receiver architecture. Deploying multiple antennas on relay and destination, we investigated its benefits using maximum ratio combining (MRC) and maximal ratio transmit (MRT) techniques in delay tolerant and delay limited transmission modes. We have analyzed our system numerically, in terms of throughput and outage. Through simulation results, we have provided key insights on possible benefits of using multiple antennas including throughput, outage, and harvested power.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126490712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nhu-Ngoc Dao, Duc-Nghia Vu, Yunseong Lee, Minho Park, Sungrae Cho
{"title":"MAEC-X: DDoS prevention leveraging multi-access edge computing","authors":"Nhu-Ngoc Dao, Duc-Nghia Vu, Yunseong Lee, Minho Park, Sungrae Cho","doi":"10.1109/ICOIN.2018.8343118","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343118","url":null,"abstract":"The convergence of access networks in the fifth-generation (5G) evolution promises multi-tier networking infrastructures for the successes of various applications realizing the Internet-of-Everything era. However, in this context, the support of a massive number of connected devices also opens great opportunities for attackers to exploit these devices in illegal actions against their victims, especially within the distributed denial-of-services (DDoS) attacks. Nowadays, DDoS prevention still remains an open issue in term of performance improvement although there is a significant number of existing solutions have been proposed in the literature. In this paper, we investigate the advances of multi-access edge computing (MAEC), which is considered as one of the most important emerging technologies in 5G networks, in order to provide an effective DDoS prevention solution (referred to be MAEC-X). The proposed MAEC-X architecture and mechanism are developed as well as proved its effectiveness against DDoS attacks through intensive security analysis.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127833609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Video streaming service and CD sales","authors":"K. Yoshida, Tomonori Manabe","doi":"10.1109/ICOIN.2018.8343161","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343161","url":null,"abstract":"Various studies have analyzed the effects of online video services, such as YouTube, on compact disc (CD) sales. They reported both positive and negative effects of online video services on CD sales. Their positive effect is advertisement. Their negative effect is the existence of free alternatives such as pirated copies. The results of such studies vary according to the area of study, date, method, etc. To promote new Internet services, analyzing the effect of new services on traditional businesses is important in order to obtain support from business persons. Thus, in this study, we attempt to conduct such an analysis. It should be noted that the Japanese CD market has unique characteristics. For example, the sale of CDs still has a large volume in the music market. It is important to investigate the effects of online video services on CD sales. We have analyzed such effects by analyzing the initial-week sales and, decay ratio of CD sales and online video services. We found that 1) frequent viewings of YouTube increased CD sales in later periods. Thus, it has a positive advertising effect on CD sales in the Japanese Market. 2) The initial-week sale had already decreased before a large online video service, i.e., YouTube, became available. 3) In contrast, the decay speed of the CD sales increased after the second week, which was a negative effect of online video services. In this paper, we discuss how to utilize this contradicting information in business scenarios.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127660136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient processing of range spatial keyword queries over moving objects","authors":"Sujin Oh, HaRim Jung, U. Kim","doi":"10.1109/ICOIN.2018.8343174","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343174","url":null,"abstract":"In this paper, we propose an efficient method of processing range spatial keyword queries. In particular, we focus on minimizing (i) the computation cost at the server and (ii) the communication cost between moving objects and the server. As the moving objects dynamically change their location, they should contact the server. This, however, increases the communication cost as well as the server computation cost, as the number of moving objects is increased. In the traditional researches, the concept of safe region is used. A safe region assigned to each moving object o is an area such that o cannot affect the results of the queries as long as it is moving within this area. However, the construction cost of the safe region can become a burden to the server. Therefore, we introduce pruning rules to decrease the overhead of constructing the safe region. In addition, the proposed algorithm for processing continuous range spatial keyword queries over moving objects utilizes a new spatial index structure, called the partition retrieved list, to help the system quickly construct the safe region of each object. Through experimental evaluations, we verify the effectiveness of our proposed algorithm.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130701292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of efficiency of using bank smart-card in Russian financial institutions","authors":"A. Bataev, D. Rodionov, E. S. Kosonogova","doi":"10.1109/ICOIN.2018.8343187","DOIUrl":"https://doi.org/10.1109/ICOIN.2018.8343187","url":null,"abstract":"The introduction of information technology happened in all spheres of economic development. Therefore, there occurs a concept “information economy”, designating economic activity, based on application of information and communication technologies. One of the leaders on investment into information technologies is financial institutions, which strongly take the second place after IT companies. One of the areas of information and communication technologies application are remote banking systems. In the paper, the classification of bank plastic cards is considered. The method for assessing the effectiveness of using smart bank cards, based on comparing the expenses on introducing and using bank chip cards and reducing the volume of stolen funds from bank cards, was proposed. On the basis of the offered methodology, the economic efficiency of the application of bank smart cards was calculated using the example of PJSC “SBERBANK”, which is one of the banking sector leaders.","PeriodicalId":228799,"journal":{"name":"2018 International Conference on Information Networking (ICOIN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116826757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}