{"title":"Kuramoto-Inspired Wireless Resource Allocation for Weighted Networks","authors":"Kimchheang Chhea, Sengly Muy, Jung-Ryun Lee","doi":"10.1109/ICOIN56518.2023.10048922","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048922","url":null,"abstract":"Considering the exponential growth of wireless devices with data-starving applications fused with artificial intelligence, the significance of wireless network scalability using distributed behavior and fairness among users is a crucial feature in guaranteeing reliable service to numerous users in the network environment. In this work, we apply the Kuramoto model to achieve a weighted fair resource allocation in a wireless network, where each user has different quality of service (QoS) requirements. We propose a new weighting parameter for representing requirement of each node resource and modify the Kuramoto model to achieve weighted fair resource allocation for users with different QoS requirements. The proposed modified Kuramoto model allocates all users the resource based on their weight among contending nodes in a distributed manner. We analyze the convergence condition for the proposed model, and the results reveal that the proposed algorithm achieves a weighted fair resource allocation and with potentially high convergence speed compared to previous algorithm.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127791823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sara Badar, Souad Labghough, Almaha Al-Abdulghani, E. Mohammed, O. Bouhali, K. Qaraqe
{"title":"Machine Learning Assisted Approach for Water Leaks Detection","authors":"Sara Badar, Souad Labghough, Almaha Al-Abdulghani, E. Mohammed, O. Bouhali, K. Qaraqe","doi":"10.1109/ICOIN56518.2023.10048954","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048954","url":null,"abstract":"This study examines the use of machine learning algorithms to detect water leaks in water pipes. Multiple types of sensors have been used in a water-bed system that simulates water pipelines and leaks while gathering data. Both pressure sensors and flow sensors are employed. The obtained data is then utilized to develop an AI algorithm that can detect whether a leak occurred within the pipes based on the acquired data. We tested a number of machine learning methods to train the data and use it. These tests were conducted to evaluate the accuracy of each algorithm and determine the most effective method for predicting leaks.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130681232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UAVs Reformation Approach Based on Packet Loss in GPS-Denied Environments","authors":"Issaree Srisomboon, Sanghwan Lee","doi":"10.1109/ICOIN56518.2023.10049031","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10049031","url":null,"abstract":"Drone technology, which is employed by a large number of industries and institutions, including the military and commercial, makes use of the Global Positioning System (GPS) to precisely pinpoint locations and has given a huge rise in aerial surveillance applications. Though drones without GPS can still be operated, there is no certainty that the locations are precise due to a lack of real-time position information and existing environmental influences. In this paper, we perform network packet transmission over a drone swarm to relocate imprecise positions of formation when GPS is unavailable. We introduce a reformation approach based on packet loss, which relocates the drone swarm’s formation into the initially intended one to preserve the original coverage area as much as possible. Through simulations, we show that our proposed approach guarantees to acquire the lost coverage area by improving inaccurate formation within a reasonable period of time. Although the adjusted formation is not exactly as originally desired in some cases, the coverage area is still higher obtained than the imprecise one.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130791849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gyusun Kim, Hyun-Yong Lee, C. Park, Soyi Jung, Jae-Hyun Kim, Joongheon Kim
{"title":"Hybrid MAC for Military UAV Networks","authors":"Gyusun Kim, Hyun-Yong Lee, C. Park, Soyi Jung, Jae-Hyun Kim, Joongheon Kim","doi":"10.1109/ICOIN56518.2023.10048910","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048910","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) are being studied extensively for military use because of their advantages of fast maneuverability and ability to penetrate deep into enemy positions. In particular, when UAVs are operated for military purposes, swarm flight and stable communication technology must be considered due to the nature of mission performance. In this paper, we propose a Hybrid MAC UAV model that can communicate at high speed even in swarm flight of multiple UAVs by varying the communication method (CSMA/TDMA) according to the movement of the UAVs on the battlefield. The sensor accepts nine sensor parameters and recognizes the external environment of the UAV. Based on this, it aims to create an \"External Environment Self-Learning-based MAC (Medium Access Control).\" By making a UAV with Raspberry PI and implementing it through actual flight tests, it evaluates the practical communication excellence of the Hybrid MAC UAV and suggests its applicability on the battlefield.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116950906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Feng Xiao, Jin Wang, Min Wei, Chang Liu, Van-Hoan Le, Jiangpei Xu
{"title":"Privacy Data Protection Scheme of Industrial Field Equipment Based on Fully Homomorphic Encryption","authors":"Feng Xiao, Jin Wang, Min Wei, Chang Liu, Van-Hoan Le, Jiangpei Xu","doi":"10.1109/ICOIN56518.2023.10049058","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10049058","url":null,"abstract":"With the increasing value of industrial data, it has become an important demand to effectively protect the security of industrial network data. In the edge cloud collaborative environment of industrial Internet, how to transmit and process private data to avoid exposure and tampering caused by attacks is an urgent problem to be solved. The privacy data security of industrial field equipment is the basis of creating a secure environment for industrial edge computing. Therefore, how to ensure the security of private data of industrial field equipment, resist attacks of attackers and avoid privacy data leakage has become a research hotspot. This paper designs a privacy data protection method for industrial field equipment based on fully homomorphic encryption, and builds a test simulation platform to verify the proposed method. The results show that this method can effectively protect the privacy data of field equipment according to the sensitivity of the industrial field equipment data to the edge gateway and industrial cloud platform.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132817305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Practical HMM-Based Map-Matching Method for Pedestrian Navigation","authors":"Shengjie Ma, Hyukjoon Lee","doi":"10.1109/ICOIN56518.2023.10049007","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10049007","url":null,"abstract":"Map-matching is an important component in pedestrian navigation. The proliferation of pedestrian navigation applications is being limited by the severe inaccuracies of the current GPS available on smartphones, especially in dense urban areas where the distance between neighboring streets and alleys is smaller than the typical GPS error range. Although map-matching methods based on HMM are considered as a practical approach for GPS error correction, there exist a few issues to be addressed before a wide-scale deployment can be made. In this paper, we propose an algorithm to determine the initial probabilities of hidden states using a small number of GPS measurements. An arrival probability is computed for each past GPS measurement, which indicates the probability that a past GPS measurement will arrive at a road segment within the initialization duration. The experimental results show that the proposed map-matching initialization algorithm can effectively determine the initial road segment compared with the traditional HMM-based map-matching methods and increase the accuracy of pedestrian map-matching.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128159756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ashfaq Ahmad, D. Choi, Hyeong Jung Kim, Yun Hwang Lee, Oh Mi Kyung, Geun Ok Lee
{"title":"Design and Analysis of 29 GHz Millimeter-waves Phased Array Antenna with Reduced Mutual Coupling","authors":"Ashfaq Ahmad, D. Choi, Hyeong Jung Kim, Yun Hwang Lee, Oh Mi Kyung, Geun Ok Lee","doi":"10.1109/ICOIN56518.2023.10048974","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048974","url":null,"abstract":"In this study, a multiple-input multiple-output (MIMO) antenna for wide scanning operating at 29 GHz is designed. Each element of the MIMO antenna is situated at a distance of λ/2. The proposed high isolation and wide scanning antenna combine to achieve the desired phased-array antenna. To minimize the mutual coupling between the radiators, slits are introduced in the radiating part. The MIMO antenna maintains a compact structure of 43.5 × 5.3 mm2, Roger’s 4350B laminated with a thickness of 0.8 mm was employed as a substrate. The proposed array has a very low mutual coupling of (S21< -24 dB), and realize gain of 9.3 dBi at a scanning angle of 70°, The antenna performance was studied in term of the S-parameter, beam scanning performances, and surface current distribution.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"1 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131688516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
W. R. Bezerra, R. N. Boing, Cristiano Antonio de Souza, Carlos Becker Westphall
{"title":"An Experimentation on CoAP Multi Factor Authentication Mechanism with Reputation for Internet of Things Constrained Devices and Low Power Wide Area Network","authors":"W. R. Bezerra, R. N. Boing, Cristiano Antonio de Souza, Carlos Becker Westphall","doi":"10.1109/ICOIN56518.2023.10048959","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048959","url":null,"abstract":"The security of constrained devices in Internet of Things presents itself as a challenge due to the limitation of existing resources. It is important to analyze appropriate security mechanisms for this resource-constrained environment, specifically for authentication. This study presents an experiment that analyzes a proposal for an original Constrained Application Protocol Multi-Factor Authentication with Reputation, in comparison to simple authentication and a reference with no authentication. From this experience it was possible to prove that multi-factor authentication with reputation is also an adequate solution for Low Power Wide Area Network and constrained devices and does not require much more resources than simple authentication. With this work it is possible to evaluate the adoption of Multi Factor Authentication with Reputation on Constrained Devices and to subsidize choices of Internet of Things projects with this type of configuration.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132138519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Avi Deb Raha, M. S. Munir, Apurba Adhikary, Yu Qiao, Seong-Bae Park, C. Hong
{"title":"An Artificial Intelligent-Driven Semantic Communication Framework for Connected Autonomous Vehicular Network","authors":"Avi Deb Raha, M. S. Munir, Apurba Adhikary, Yu Qiao, Seong-Bae Park, C. Hong","doi":"10.1109/ICOIN56518.2023.10049005","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10049005","url":null,"abstract":"Semantic communication will considerably enhance transmission efficiency by exploring and only transmitting semantic information. However, most of the previous work in this field is limited to particular applications such as text, audio, or images and does not consider task-oriented communications, where the effectiveness of the transmitted information must be taken into account for completing a specific task. This paper focuses on developing a semantic communication framework for a high altitude platform (HAP)-supported fully connected autonomous vehicle network. A system model is proposed in which the traffic infrastructure (TI) transmits its semantic information to the macro base station (MBS) whenever it observes a connected and autonomous vehicle (CAV). The semantic information has been extracted using a convolutional autoencoder (CAE) as the encoder of CAE gives a smaller representation of the input data. Then, after receiving the semantic concept, the MBS decides on an appropriate action for the CAVs. A proximal policy optimization (PPO) algorithm in the MBS for interpreting and making a decision for the semantic concepts. Simulation results show that the proposed method can reduce up to 63.26% of the communication cost.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123085333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Seokshin Son, Soohyun Park, Haemin Lee, Youngkee Kim, Dongwan Kim, Joongheon Kim
{"title":"Introduction to MITRE ATT&CK: Concepts and Use Cases","authors":"Seokshin Son, Soohyun Park, Haemin Lee, Youngkee Kim, Dongwan Kim, Joongheon Kim","doi":"10.1109/ICOIN56518.2023.10048930","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048930","url":null,"abstract":"As networks become more complex and large-scale, the types of attacks become more diverse, and the importance of cyber security is increasing. Therefore, a need for security analysis is growing to classify and analyze several cyber attack types to prepare for the attacks. To solve this problem, MITRE presented ATT&CK as an attack classification model that systematically classifies cyber attackers’ tactics, techniques, and procedures. Therefore, we review MITRE’s ATT&CK in terms of concept and the use cases.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124079304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}