{"title":"AI BOX: Artificial intelligence-based autonomous abnormal network traffic response mechanism","authors":"Jiann-Liang Chen, Zhengxu Chen, Youg-Sheng Chang, Ching-Iang Li, Tien-I Kao, Yu-Ting Lin, Yu-Yi Xiao, Jian-Fu Qiu","doi":"10.1109/ICOIN56518.2023.10048979","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048979","url":null,"abstract":"This paper presents an artificial intelligence-based approach to detecting intrusions. The artificial intelligence analyses intercepted packets and detect the presence of network attacks or abnormal network traffic based on artificial intelligence algorithms. If the network traffic behavior is unnatural or disruptive, it decides whether to interrupt, modify or isolate it immediately. Artificial intelligence models are used to detect anomalies. It enables or restricts data transmission to secure information technology (IT) and operational (OT) devices against attacks from anomalous network traffic, system outages, betrayal, and other threats. It can also move freely between heterogeneous networks to support data processing and transformation. We have developed machine learning models, packet tracking capabilities, and AI BOX environment options. We trained the model using two public datasets and obtained a 99.9% prediction accuracy. The AI BOX device successfully tested the effect of artificial intelligence models.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123689129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LSTM-based PdM Platform for Automobile SCU Inspection Equipment","authors":"S. Oh, J. Kim","doi":"10.1109/ICOIN56518.2023.10048924","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048924","url":null,"abstract":"With the recent rapid development of the Industrial Internet of Things(IIoT), factory automation has become an important issue. Accordingly, research on Predictive Maintenance(PdM) technology is being conducted to improve the Remaining Useful Lifetime(RUL) of equipment in factory automation. PdM technology predicts the condition of equipment based on Artificial Intelligence(AI) and based on this, repairs equipment before problems occur to improve the lifespan of the equipment. In this paper, we intend to apply PdM to inspection equipment that inspects Shift-by-wire Control Unit(SCU), a type of electric vehicle transmission. The proposed technology is to perform equipment condition prediction based on Long Short-Term Memory(LSTM) and visualize the prediction results through monitoring program development. As a result of the simulation, it was confirmed that the prediction results through the LSTM model follow the trend of the actual values.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129921385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DCGit: Decentralized Internet Hosting for Software Development","authors":"Pratham Gupta, Kunjan Shah, Ankit Agrawal, Ritika Bhatia, Ashutosh Bhatia, Kamlesh Tiwari","doi":"10.1109/ICOIN56518.2023.10049006","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10049006","url":null,"abstract":"Git has been the de-facto version control system for the Software Development industry. Although Git is distributed, developers’ tools for collaboration, such as GitHub, are centralized entities owned by large corporations such as Microsoft. The centralization creates trust and privacy issues for software development companies (preserving their intellectual property), along with a significant\" single point of failure\" issue. In addition, such centralized systems are susceptible to Sybil and distributed denial of service (DDoS) attacks due to the presence of malicious individuals. Blockchain technology has many key characteristics (such as decentralization, transparency, immutability, and audibility), solving these centralization issues. However, the requirement of having a storage system to store the user’s repositories over the blockchain creates a scalability issue (in terms of storage). Most importantly, it makes data (code) privacy more severe due to its open nature. In this paper, we propose a privacy-preserving decentralized alternative solution and framework named \"DCGit\" powered by Web3 technologies such as the Ethereum Blockchain and InterPlanetary File System (IPFS) to provide security and scalability yet user-friendly collaboration for software development.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125319621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Collaborative UAV Routing Algorithm for Time Sensitive Surveillance Tasks","authors":"Yang Yu, Sanghwan Lee","doi":"10.1109/ICOIN56518.2023.10048936","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048936","url":null,"abstract":"Surveillance and monitoring of an area are fundamental to a variety of missions, especially in the military field, where quadrotor UAV swarms can be used for area reconnaissance to build awareness of the environment and targets of interest. Aiming at the problem of surveillance and monitoring of a given area, this paper proposes a distributed cooperative vehicle routing algorithm for multi-quadrotor UAV swarms called MUCS-BS. In order to reduce the complexity of the algorithm, we use sweep search to search the area with a \"square wave signal\" path. In this algorithm, each UAV covers a segment of the \"square wave signal\" path in such a way that the surveillance time can be minimized.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128378996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
O. Wongwirat, Supannada Chotipant, Tadchapon Hongtong, Nattawat Suttijumnong
{"title":"Development of WLAN Topology Display System","authors":"O. Wongwirat, Supannada Chotipant, Tadchapon Hongtong, Nattawat Suttijumnong","doi":"10.1109/ICOIN56518.2023.10048958","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048958","url":null,"abstract":"Currently, packet sniffer tools can capture packets and provide information for monitoring, analyzing, and troubleshooting networks, e.g., traffic, bandwidth, protocol, etc. However, these tools lack the capability, or feature, to display a network topology diagram on the screen, particularly for a WLAN (Wireless Local Area Network), which is different from expensive network monitoring software sold commercially in the market. Therefore, it is difficult for a network administrator to visualize which client is connected to which AP (Access point) in the service areas of WLAN, or hotspots, for monitoring. This paper presents the development of the WLAN topology display system to support the network administrator in monitoring and enhancing the network services in the future. The system acquires the packet data captured by the packet sniffer tool, i.e., Wireshark. Then, the packet information is analyzed by using the data from the MAC (Medium Access Control) header following the IEEE802.11 standard to find the types, connection modes, and MAC addresses. Finally, the mapping table associated with the connected devices, i.e., client stations and APs, is constructed and used to create the WLAN topology diagram to display on the screen. The prototype system is implemented and tested in the laboratory environment, and the WLAN topology diagram showing the connections between the clients and the APs can be displayed on screen accurately as required.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128549335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Peter Sossalla, Johannes Hofer, Christian L. Vielhaus, Justus Rischke, F. Fitzek
{"title":"Offloading Visual SLAM Processing to the Edge: An Energy Perspective","authors":"Peter Sossalla, Johannes Hofer, Christian L. Vielhaus, Justus Rischke, F. Fitzek","doi":"10.1109/ICOIN56518.2023.10048921","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048921","url":null,"abstract":"Localization of mobile systems with visual Simultaneous Localization and Mapping (SLAM) is computationally expensive and therefore leads to high power consumption. The higher power consumption results in a shorter runtime for battery-powered mobile systems. A feasible solution to save energy for mobile systems is to offload SLAM to an external server. To achieve low latencies this server should be in close proximity to the mobile system at the edge. We evaluate the energy savings for three different offloading schemes for visual SLAM: (i) local computation on the mobile system, (ii) partially offloaded, and (iii) fully offloaded. We demonstrate that the power consumption can be reduced by up to 43 % by fully offloading the computation of visual SLAM. Furthermore, for the partially offloading scheme, the power consumption can be reduced by more than 20 % with the advantage of requiring a lower bit rate to transmit the sensor data compared to the fully offloaded scheme. Our paper shows the trade-off between power consumption and network utilization for offloading visual SLAM.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126392813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive Streaming Scheme with Reinforcement Learning in Edge Computing Environments","authors":"Jeong-Gu Kang, K. Chung","doi":"10.1109/ICOIN56518.2023.10048966","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048966","url":null,"abstract":"DASH is an effective way to improve the Quality of Experience (QoE) of video streaming. However, existing schemes lack consideration for a multi-client environment, so QoE fairness deteriorates when multiple clients stream video through the same network. In this paper, we propose an adaptive streaming scheme with reinforcement learning in edge computing environments. The proposed scheme learns policy based on reinforcement learning to improve QoE and uses edge computing to improve QoE fairness. We evaluated the performance of the proposed scheme through simulation-based experiments under various network conditions. Through the experimental results, we confirmed that the proposed scheme achieves better performance than the existing schemes in a multi-client environment.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128021650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
F. M. V. Filho, B. Batista, J. Celestino, J. Souza
{"title":"Heimdall: Blockchain-Based Consent Management Framework","authors":"F. M. V. Filho, B. Batista, J. Celestino, J. Souza","doi":"10.1109/ICOIN56518.2023.10048920","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048920","url":null,"abstract":"The healthcare sector has undergone drastic changes with the adoption of information technology. One of the main changes in healthcare is the creation of the Electronic Health Record (EHR), which records all the patient’s medical data in a digital medium. However, with creating the General Data Protection Regulation (GDPR), the data owner must grant consent for third parties to collect, process, and store user data. In this context, the present work proposes Heimdall, a blockchain-based consent management framework that meets the requirements set by GDPR. We used a queuing system to assist in receiving requests, an object storage system to store patient data, and a memory database to record the transaction status. In our tests, Heimdall managed consents satisfactorily, where we were able to achieve a consistent amount of reading and writing transactions before saturating our test environment.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133257337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Application of Distributed Ledger Technology in Agribusiness","authors":"Zheyu Chen","doi":"10.1109/ICOIN56518.2023.10048992","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048992","url":null,"abstract":"This paper is about the simulation analysis of the dynamics of an agribusiness enterprise under the assessment and improvement of Distributed Ledger Technology (DLT). In recent years, the company has been under pressure from the industry to provide more data on the traceability of its entire supply chain system and raw materials. However, the existing food traceability system is often faced with many challenging problems and difficulties under technical limitations, such as different regulations and restrictive policies, lack of standardized data management system; and complicated product tracing is often accompanied by human error, classification difficulty, tracing speed, and low efficiency. By analyzing the successful application paths of DLT in two well-known agricultural enterprises, this paper qualitatively and quantitatively evaluates the utilization of DLT. Using the logistic regression equation, it is proposed that the company check the factor variables in the real environment through the hypothetical pilot project to popularize DLT application. The study verifies that DLT can help agribusiness improve the traceability performance of raw materials and the entire supply chain and provides empirical evidence for the transparency and traceability of supply chain information in the industry. At the end of the paper, to further explore the reverso context of cases on DLT.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129509299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. S. Kolahi, Tahany Shaheen, Eli Aderson, Rahaf Aljadani, Asma Ceyddique
{"title":"IEEE 802.11ac WLAN Analysis in 160Mhz Channel","authors":"S. S. Kolahi, Tahany Shaheen, Eli Aderson, Rahaf Aljadani, Asma Ceyddique","doi":"10.1109/ICOIN56518.2023.10048903","DOIUrl":"https://doi.org/10.1109/ICOIN56518.2023.10048903","url":null,"abstract":"In this paper, we measure WLAN 802.11ac performance using the 160MHz Channel size; for IPv4, IPv6, UDP, and TCP protocols. Tests are done for both client-server and peer-peer LANs. We measure Throughput, Round Trip Time (RTT), and CPU utilization. Results show that the client-server using UDP and IPv4 gave us the highest throughput results at 1124 Mb/s which was over 100 Mb/s higher than the result for IPv6. This is less than the theoretical value of 1700 Mbps which cannot be achieved. Results also show how much the client-server throughput is higher than peer-to-peer, IPv4 higher than IPv6, and UDP higher than TCP.","PeriodicalId":285763,"journal":{"name":"2023 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131129984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}