The search functionality is under construction.

Author Search Result

[Author] Ruidong LI(7hit)

1-7hit
  • Secure Sensor Sharing Framework for Mobile and Sensor Access Platform Network

    Ruidong LI  Masugi INOUE  

     
    PAPER

      Vol:
    E94-B No:6
      Page(s):
    1565-1576

    We are researching a mobile and sensor access platform network for the future called NerveNet, which accommodates ubiquitous sensors and provides services in local areas. The realization of reliable and accountable information collection, processing and provision over NerveNet poses a challenging and fundamental issue in promotion of the sensor business field. As a first step toward a reliable NerveNet, we investigate privacy preservation and the collection of reliable sensor information for prospective personalized sensor applications. The privacy requirement impels the logic separation between sensor networks and the communication platform in the design of NerveNet architecture. To enable sensor network users (SNUs) to reliably interact with sensors managed by different sensor network owners (SNOs), we designed a secure sensor sharing framework (S3F) based on two business models – the Ad Hoc Sales Model (AHSM) and Shopping Center Sales Model (SCSM). With S3F-AHSM, an SNU acquires permission from an SNO each time she wants to obtain information from a sensor. On the other hand, with S3F-SCSM, an SNU can obtain the access privilege to a flexible set of sensors based on the queried preferences via a third party called a sensor network service provider (SNSP). In S3F-SCSM, SNSPs that share the sensors owned by various SNOs have the ability to search the preferred sensors and provide the authorization certificate to the SNUs.

  • Cefore: Software Platform Enabling Content-Centric Networking and Beyond Open Access

    Hitoshi ASAEDA  Atsushi OOKA  Kazuhisa MATSUZONO  Ruidong LI  

     
    INVITED PAPER

      Pubricized:
    2019/03/22
      Vol:
    E102-B No:9
      Page(s):
    1792-1803

    Information-Centric or Content-Centric Networking (ICN/CCN) is a promising novel network architecture that naturally integrates in-network caching, multicast, and multipath capabilities, without relying on centralized application-specific servers. Software platforms are vital for researching ICN/CCN; however, existing platforms lack a focus on extensibility and lightweight implementation. In this paper, we introduce a newly developed software platform enabling CCN, named Cefore. In brief, Cefore is lightweight, with the ability to run even on top of a resource-constrained device, but is also easily extensible with arbitrary plugin libraries or external software implementations. For large-scale experiments, a network emulator (Cefore-Emu) and network simulator (Cefore-Sim) have also been developed for this platform. Both Cefore-Emu and Cefore-Sim support hybrid experimental environments that incorporate physical networks into the emulated/simulated networks. In this paper, we describe the design, specification, and usage of Cefore as well as Cefore-Emu and Cefore-Sim. We show performance evaluations of in-network caching and streaming on Cefore-Emu and content fetching on Cefore-Sim, verifying the salient features of the Cefore software platform.

  • NerveNet: A Regional Platform Network for Context-Aware Services with Sensors and Actuators Open Access

    Masugi INOUE  Masaaki OHNISHI  Chao PENG  Ruidong LI  Yasunori OWADA  

     
    INVITED PAPER

      Vol:
    E94-B No:3
      Page(s):
    618-629

    Wireless access networks of the future could provide a variety of context-aware services with the use of sensor information in order to solve regional social problems and improve the quality of residents' lives as a part of the regional infrastructure. NerveNet is a conceptual regional wireless access platform in which multiple service providers provide their own services with shared use of the network and sensors, enabling a range of context-aware services. The platform acts like a human nervous system. Densely located, interconnected access points with databases and data processing units will provide mobility to terminals without a location server and enable secure sensor data transport on a highly reliable, managed mesh network. This paper introduces the motivations, concept, architecture, system configuration, and preliminary performance results of NerveNet.

  • RF-Drone: Multi-Tag System for RF-ID Enables Drone Tracking in GPS-Denied Environments

    Xiang LU  Ziyang CHEN  Lianpo WANG  Ruidong LI  Chao ZHAI  

     
    PAPER

      Pubricized:
    2019/04/26
      Vol:
    E102-B No:10
      Page(s):
    1941-1950

    In resent years, providing location services for mobile targets in a closed environment has been a growing interest. In order to provide good localization and tracking performance for drones in GPS-denied scenarios, this paper proposes a multi-tag radio frequency identification (RFID) system that is easy to equip and does not take up the limited resources of the drone which is not susceptible to processor performance and cost constraints compared with computer vision based approaches. The passive RFID tags, no battery equipped, have an ultra-high resolution of millimeter level. We attach multiple tags to the drone and form multiple sets of virtual antenna arrays during motion, avoiding arranging redundant antennas in applications, and calibrating the speed chain to improve tracking performance. After combining the strap-down inertial navigation system (SINS) carried by the drone, we have established a coupled integration model that can suppress the drift error of SINS with time. The experiment was designed in bi-dimensional and three-dimensional scenarios, and the integrated positioning system based on SINS/RFID was evaluated. Finally, we discussed the impact of some parameters, this innovative approach is verified in real scenarios.

  • Satellite Constellation Based on High Elevation Angle for Broadband LEO Constellation Satellite Communication System

    Jun XU  Dongming BIAN  Chuang WANG  Gengxin ZHANG  Ruidong LI  

     
    PAPER

      Pubricized:
    2019/05/07
      Vol:
    E102-B No:10
      Page(s):
    1960-1966

    Due to the rapid development of small satellite technology and the advantages of LEO satellite with low delay and low propagation loss as compared with the traditional GEO satellite, the broadband LEO constellation satellite communication system has gradually become one of the most important hot spots in the field of satellite communications. Many countries and satellite communication companies in the world are formulating the project of broadband satellite communication system. The broadband satellite communication system is different from the traditional satellite communication system. The former requires a higher transmission rate. In the case of high-speed transmission, if the low elevation constellation is adopted, the satellite beam will be too much, which will increase the complexity of the satellite. It is difficult to realize the low-cost satellite. By comparing the complexity of satellite realization under different elevation angles to meet the requirement of terminal speed through link computation, this paper puts forward the conception of building broadband LEO constellation satellite communication system with high elevation angle. The constraint relation between satellite orbit altitude and user edge communication elevation angle is proposed by theoretical Eq. deduction. And the simulation is carried out for the satellite orbit altitude and edge communication elevation angle.

  • Design and Implementation of Security for HIMALIS Architecture of Future Networks

    Ved P. KAFLE  Ruidong LI  Daisuke INOUE  Hiroaki HARAI  

     
    PAPER

      Vol:
    E96-D No:2
      Page(s):
    226-237

    For flexibility in supporting mobility and multihoming in edge networks and scalability of the backbone routing system, future Internet is expected to be based on the concept of ID/locator split. Heterogeneity Inclusion and Mobility Adaptation through Locator ID Separation (HIMALIS) has been designed as a generic future network architecture based on ID/locator split concept. It can natively support mobility, multihoming, scalable backbone routing and heterogeneous protocols in the network layer of the new generation network or future Internet. However, HIMALIS still lacks security functions to protect itself from various attacks during the procedures of storing, updating, and retrieving of ID/locator mappings, such as impersonation attacks. Therefore, in this paper, we address the issues of security functions design and implementation for the HIMALIS architecture. We present an integrated security scheme consisting of mapping registration and retrieval security, network access security, communication session security, and mobility security. Through the proposed scheme, the hostname to ID and locator mapping records can be securely stored and updated in two types of name registries, domain name registry and host name registry. Meanwhile, the mapping records retrieved securely from these registries are utilized for securing the network access process, communication sessions, and mobility management functions. The proposed scheme provides comprehensive protection of both control and data packets as well as the network infrastructure through an effective combination of asymmetric and symmetric cryptographic functions.

  • A Hybrid Trust Management Framework for Wireless Sensor and Actuator Networks in Cyber-Physical Systems Open Access

    Ruidong LI  Jie LI  Hitoshi ASAEDA  

     
    INVITED PAPER

      Vol:
    E97-D No:10
      Page(s):
    2586-2596

    To secure a wireless sensor and actuator network (WSAN) in cyber-physical systems, trust management framework copes with misbehavior problem of nodes and stimulate nodes to cooperate with each other. The existing trust management frameworks can be classified into reputation-based framework and trust establishment framework. There, however, are still many problems with these existing trust management frameworks, which remain unsolved, such as frangibility under possible attacks. To design a robust trust management framework, we identify the attacks to the existing frameworks, present the countermeasures to them, and propose a hybrid trust management framework (HTMF) to construct trust environment for WSANs in the paper. HTMF includes second-hand information and confidence value into trustworthiness evaluation and integrates the countermeasures into the trust formation. We preform extensive performance evaluations, which show that the proposed HTMF is more robust and reliable than the existing frameworks.