The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

5561-5580hit(42807hit)

  • Research Challenges for Network Function Virtualization - Re-Architecting Middlebox for High Performance and Efficient, Elastic and Resilient Platform to Create New Services - Open Access

    Kohei SHIOMOTO  

     
    INVITED SURVEY PAPER-Network

      Pubricized:
    2017/07/21
      Vol:
    E101-B No:1
      Page(s):
    96-122

    Today's enterprise, data-center, and internet-service-provider networks deploy different types of network devices, including switches, routers, and middleboxes such as network address translation and firewalls. These devices are vertically integrated monolithic systems. Software-defined networking (SDN) and network function virtualization (NFV) are promising technologies for dis-aggregating vertically integrated systems into components by using “softwarization”. Software-defined networking separates the control plane from the data plane of switch and router, while NFV decouples high-layer service functions (SFs) or Network Functions (NFs) implemented in the data plane of a middlebox and enables the innovation of policy implementation by using SF chaining. Even though there have been several survey studies in this area, this area is continuing to grow rapidly. In this paper, we present a recent survey of this area. In particular, we survey research activities in the areas of re-architecting middleboxes, state management, high-performance platforms, service chaining, resource management, and trouble shooting. Efforts in these research areas will enable the development of future virtual-network-function platforms and innovation in service management while maintaining acceptable capital and operational expenditure.

  • On the Security of Block Scrambling-Based EtC Systems against Extended Jigsaw Puzzle Solver Attacks

    Tatsuya CHUMAN  Kenta KURIHARA  Hitoshi KIYA  

     
    PAPER

      Pubricized:
    2017/10/16
      Vol:
    E101-D No:1
      Page(s):
    37-44

    The aim of this paper is to apply automatic jigsaw puzzle solvers, which are methods of assembling jigsaw puzzles, to the field of information security. Encryption-then-Compression (EtC) systems have been considered for the user-controllable privacy protection of digital images in social network services. Block scrambling-based encryption schemes, which have been proposed to construct EtC systems, have enough key spaces for protecting brute-force attacks. However, each block in encrypted images has almost the same correlation as that of original images. Therefore, it is required to consider the security from different viewpoints from number theory-based encryption methods with provable security such as RSA and AES. In this paper, existing jigsaw puzzle solvers, which aim to assemble puzzles including only scrambled and rotated pieces, are first reviewed in terms of attacking strategies on encrypted images. Then, an extended jigsaw puzzle solver for block scrambling-based encryption scheme is proposed to solve encrypted images including inverted, negative-positive transformed and color component shuffled blocks in addition to scrambled and rotated ones. In the experiments, the jigsaw puzzle solvers are applied to encrypted images to consider the security conditions of the encryption schemes.

  • On the Use of Information and Infrastructure Technologies for the Smart City Research in Europe: A Survey Open Access

    Juan Ramón SANTANA  Martino MAGGIO  Roberto DI BERNARDO  Pablo SOTRES  Luis SÁNCHEZ  Luis MUÑOZ  

     
    INVITED SURVEY PAPER

      Pubricized:
    2017/07/05
      Vol:
    E101-B No:1
      Page(s):
    2-15

    The Smart City paradigm has become one of the most important research topics around the globe. Particularly in Europe, it is considered as a solution for the unstoppable increase of high density urban environments and the European Commission has included the Smart City research as one of the key objectives for the FP7 (Seventh Framework Program) and H2020 (Horizon 2020) research initiatives. As a result, a considerable amount of quality research, with particular emphasis on information and communication technologies, has been produced. In this paper, we review the current efforts dedicated in Europe to this research topic. Particular attention is paid in the review to the platforms and infrastructure technologies adopted to introduce the Internet of Things into the city, taking into account the constraints and harshness of urban environments. Furthermore, this paper also considers the efforts in the experimental perspective, which includes the review of existing Smart City testbeds, part of wider European initiatives such as FIRE (Future Internet Research and Experimentation) and FIWARE. Last but not least, the main efforts in providing interoperability between the different experimental facilities are also presented.

  • A Stackelberg Game Based Pricing and User Association for Spectrum Splitting Macro-Femto HetNets

    Bo GU  Zhi LIU  Cheng ZHANG  Kyoko YAMORI  Osamu MIZUNO  Yoshiaki TANAKA  

     
    PAPER-Network

      Pubricized:
    2017/07/10
      Vol:
    E101-B No:1
      Page(s):
    154-162

    The demand for wireless traffic is increasing rapidly, which has posed huge challenges to mobile network operators (MNOs). A heterogeneous network (HetNet) framework, composed of a marcocell and femtocells, has been proved to be an effective way to cope with the fast-growing traffic demand. In this paper, we assume that both the macrocell and femtocells are owned by the same MNO, with revenue optimization as its ultimate goal. We aim to propose a pricing strategy for macro-femto HetNets with a user centric vision, namely, mobile users would have their own interest to make rational decisions on selecting between the macrocell and femtocells to maximize their individual benefit. We formulate a Stackelberg game to analyze the interactions between the MNO and users, and obtain the equilibrium solution for the Stackelberg game. Via extensive simulations, we evaluate the proposed pricing strategy in terms of its efficiency with respect to the revenue optimization.

  • Semi-Blind Interference Cancellation with Single Receive Antenna for Heterogeneous Networks

    Huiyu YE  Kazuhiko FUKAWA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2017/06/28
      Vol:
    E101-B No:1
      Page(s):
    232-241

    In order to cope with severe interference in heterogeneous networks, this paper proposes a semi-blind interference cancellation scheme, which does not require multiple receive antennas or knowledge about training sequences of the interfering signals. The proposed scheme performs joint channel estimation and signal detection (JCESD) during the training period in order to blindly estimate channels of the interfering signals. On the other hand, maximum likelihood detection (MLD), which can be considered the optimum JCESD, must perform channel estimation for all transmitted signal candidates of the interfering signals and must search for the most likely signal candidate. Therefore, MLD incurs a prohibitive amount of computational complexity. To reduce such complexity drastically, the proposed scheme enhances the quantized channel approach, and applies the enhanced version to JCESD. In addition, a recalculation scheme is introduced to avoid inaccurate channel estimates due to local minima. Using the estimated channels, the proposed scheme performs multiuser detection (MUD) of the data sequences in order to cancel the interference. Computer simulations show that the proposed scheme outperforms a conventional scheme based on the Viterbi algorithm, and can achieve almost the same average bit error rate performance as the MUD with channels estimated from sufficiently long training sequences of both the desired signal and the interfering signals, while reducing the computational complexity significantly compared with full search involving all interfering signal candidates during the training period.

  • Flow-Based Routing for Flow Entry Aggregation in Software-Defined Networking

    Koichi YOSHIOKA  Kouji HIRATA  Miki YAMAMOTO  

     
    PAPER

      Pubricized:
    2017/07/05
      Vol:
    E101-B No:1
      Page(s):
    49-57

    In recent years, software-defined networking (SDN), which performs centralized network management with software, has attracted much attention. Although packets are transmitted based on flow entries in SDN switches, the number of flow entries that the SDN switches can handle is limited. To overcome this difficulty, this paper proposes a flow-based routing method that performs flexible routing control with a small number of flow entries. The proposed method provides mixed integer programming. It assigns common paths to flows that can be aggregated at intermediate switches, while considering the utilization of network links. Because it is difficult for mixed integer programming to compute large-scale problems, the proposed method also provides a heuristic algorithm for them. Through numerical experiments, this paper shows that the proposed method efficiently reduces both the number of flow entries and the loads of congested links.

  • Classification of Linked Data Sources Using Semantic Scoring

    Semih YUMUSAK  Erdogan DOGDU  Halife KODAZ  

     
    PAPER

      Pubricized:
    2017/09/15
      Vol:
    E101-D No:1
      Page(s):
    99-107

    Linked data sets are created using semantic Web technologies and they are usually big and the number of such datasets is growing. The query execution is therefore costly, and knowing the content of data in such datasets should help in targeted querying. Our aim in this paper is to classify linked data sets by their knowledge content. Earlier projects such as LOD Cloud, LODStats, and SPARQLES analyze linked data sources in terms of content, availability and infrastructure. In these projects, linked data sets are classified and tagged principally using VoID vocabulary and analyzed according to their content, availability and infrastructure. Although all linked data sources listed in these projects appear to be classified or tagged, there are a limited number of studies on automated tagging and classification of newly arriving linked data sets. Here, we focus on automated classification of linked data sets using semantic scoring methods. We have collected the SPARQL endpoints of 1,328 unique linked datasets from Datahub, LOD Cloud, LODStats, SPARQLES, and SpEnD projects. We have then queried textual descriptions of resources in these data sets using their rdfs:comment and rdfs:label property values. We analyzed these texts in a similar manner with document analysis techniques by assuming every SPARQL endpoint as a separate document. In this regard, we have used WordNet semantic relations library combined with an adapted term frequency-inverted document frequency (tfidf) analysis on the words and their semantic neighbours. In WordNet database, we have extracted information about comment/label objects in linked data sources by using hypernym, hyponym, homonym, meronym, region, topic and usage semantic relations. We obtained some significant results on hypernym and topic semantic relations; we can find words that identify data sets and this can be used in automatic classification and tagging of linked data sources. By using these words, we experimented different classifiers with different scoring methods, which results in better classification accuracy results.

  • Gender Attribute Mining with Hand-Dorsa Vein Image Based on Unsupervised Sparse Feature Learning

    Jun WANG  Guoqing WANG  Zaiyu PAN  

     
    LETTER-Artificial Intelligence, Data Mining

      Pubricized:
    2017/10/12
      Vol:
    E101-D No:1
      Page(s):
    257-260

    Gender classification with hand-dorsa vein information, a new soft biometric trait, is solved with the proposed unsupervised sparse feature learning model, state-of-the-art accuracy demonstrates the effectiveness of the proposed model. Besides, we also argue that the proposed data reconstruction model is also applicable to age estimation when comprehensive database differing in age is accessible.

  • Scalable Cache Component in ICN Adaptable to Various Network Traffic Access Patterns

    Atsushi OOKA  Eum SUYONG  Shingo ATA  Masayuki MURATA  

     
    PAPER

      Pubricized:
    2017/07/05
      Vol:
    E101-B No:1
      Page(s):
    35-48

    Information-centric networking (ICN) has received increasing attention from all over the world. The novel aspects of ICN (e.g., the combination of caching, multicasting, and aggregating requests) is based on names that act as addresses for content. The communication with name has the potential to cope with the growing and complicating Internet technology, for example, Internet of Things, cloud computing, and a smart society. To realize ICN, router hardware must implement an innovative cache replacement algorithm that offers performance far superior to a simple policy-based algorithm while still operating with feasible computational and memory overhead. However, most previous studies on cache replacement policies in ICN have proposed policies that are too blunt to achieve significant performance improvement, such as first-in first-out (popularly, FIFO) and random policies, or impractical policies in a resource-restricted environment, such as least recently used (LRU). Thus, we propose CLOCK-Pro Using Switching Hash-tables (CUSH) as the suitable policy for network caching. CUSH can identify and keep popular content worth caching in a network environment. CUSH also employs CLOCK and hash-tables, which are low-overhead data structure, to satisfy the cost requirement. We numerically evaluate our proposed approach, showing that our proposal can achieve cache hits against the traffic traces that simple conventional algorithms hardly cause any hits.

  • Efficient Three-Way Split Formulas for Binary Polynomial Multiplication and Toeplitz Matrix Vector Product

    Sun-Mi PARK  Ku-Young CHANG  Dowon HONG  Changho SEO  

     
    PAPER-Algorithms and Data Structures

      Vol:
    E101-A No:1
      Page(s):
    239-248

    In this paper, we present a new three-way split formula for binary polynomial multiplication (PM) with five recursive multiplications. The scheme is based on a recently proposed multievaluation and interpolation approach using field extension. The proposed PM formula achieves the smallest space complexity. Moreover, it has about 40% reduced time complexity compared to best known results. In addition, using developed techniques for PM formulas, we propose a three-way split formula for Toeplitz matrix vector product with five recursive products which has a considerably improved complexity compared to previous known one.

  • On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants

    Kota KONDO  Yu SASAKI  Yosuke TODO  Tetsu IWATA  

     
    PAPER

      Vol:
    E101-A No:1
      Page(s):
    88-98

    SIMON is a lightweight block cipher designed by NSA in 2013. NSA presented the specification and the implementation efficiency, but they did not provide detailed security analysis nor the design rationale. The original SIMON has rotation constants of (1,8,2), and Kölbl et al. regarded the constants as a parameter (a,b,c), and analyzed the security of SIMON block cipher variants against differential and linear attacks for all the choices of (a,b,c). This paper complements the result of Kölbl et al. by considering integral and impossible differential attacks. First, we search the number of rounds of integral distinguishers by using a supercomputer. Our search algorithm follows the previous approach by Wang et al., however, we introduce a new choice of the set of plaintexts satisfying the integral property. We show that the new choice indeed extends the number of rounds for several parameters. We also search the number of rounds of impossible differential characteristics based on the miss-in-the-middle approach. Finally, we make a comparison of all parameters from our results and the observations by Kölbl et al. Interesting observations are obtained, for instance we find that the optimal parameters with respect to the resistance against differential attacks are not stronger than the original parameter with respect to integral and impossible differential attacks. Furthermore, we consider the security against differential attacks by considering differentials. From the result, we obtain a parameter that is potential to be better than the original parameter with respect to security against these four attacks.

  • A Pseudorandom-Function Mode Based on Lesamnta-LW and the MDP Domain Extension and Its Applications

    Shoichi HIROSE  Hidenori KUWAKADO  Hirotaka YOSHIDA  

     
    PAPER

      Vol:
    E101-A No:1
      Page(s):
    110-118

    This paper discusses a mode for pseudorandom functions (PRFs) based on the hashing mode of Lesamnta-LW and the domain extension called Merkle-Damgård with permutation (MDP). The hashing mode of Lesamnta-LW is a plain Merkle-Damgård iteration of a block cipher with its key size half of its block size. First, a PRF mode is presented which produces multiple independent PRFs with multiple permutations and initialization vectors if the underlying block cipher is a PRP. Then, two applications of the PRF mode are presented. One is a PRF with minimum padding. Here, padding is said to be minimum if the produced message blocks do not include message blocks only with the padded sequence for any non-empty input message. The other is a vector-input PRF using the PRFs with minimum padding.

  • Q-Class Authentication System for Double Arbiter PUF

    Risa YASHIRO  Takeshi SUGAWARA  Mitsugu IWAMOTO  Kazuo SAKIYAMA  

     
    PAPER

      Vol:
    E101-A No:1
      Page(s):
    129-137

    Physically Unclonable Function (PUF) is a cryptographic primitive that is based on physical property of each entity or Integrated Circuit (IC) chip. It is expected that PUF be used in security applications such as ID generation and authentication. Some responses from PUF are unreliable, and they are usually discarded. In this paper, we propose a new PUF-based authentication system that exploits information of unreliable responses. In the proposed method, each response is categorized into multiple classes by its unreliability evaluated by feeding the same challenges several times. This authentication system is named Q-class authentication, where Q is the number of classes. We perform experiments assuming a challenge-response authentication system with a certain threshold of errors. Considering 4-class separation for 4-1 Double Arbiter PUF, it is figured out that the advantage of a legitimate prover against a clone is improved form 24% to 36% in terms of success rate. In other words, it is possible to improve the tolerance of machine-learning attack by using unreliable information that was previously regarded disadvantageous to authentication systems.

  • Simplified Vehicle Vibration Modeling for Image Sensor Communication

    Masayuki KINOSHITA  Takaya YAMAZATO  Hiraku OKADA  Toshiaki FUJII  Shintaro ARAI  Tomohiro YENDO  Koji KAMAKURA  

     
    PAPER

      Vol:
    E101-A No:1
      Page(s):
    176-184

    Image sensor communication (ISC), derived from visible light communication (VLC) is an attractive solution for outdoor mobile environments, particularly for intelligent transport systems (ITS). In ITS-ISC, tracking a transmitter in the image plane is critical issue since vehicle vibrations make it difficult to selsct the correct pixels for data reception. Our goal in this study is to develop a precise tracking method. To accomplish this, vehicle vibration modeling and its parameters estimation, i.e., represetative frequencies and their amplitudes for inherent vehicle vibration, and the variance of the Gaussian random process represnting road surface irregularity, are required. In this paper, we measured actual vehicle vibration in a driving situation and determined parameters based on the frequency characteristics. Then, we demonstrate that vehicle vibration that induces transmitter displacement in an image plane can be modeled by only Gaussian random processes that represent road surface irregularity when a high frame rate (e.g., 1000fps) image sensor is used as an ISC receiver. The simplified vehicle vibration model and its parameters are evaluated by numerical analysis and experimental measurement and obtained result shows that the proposed model can reproduce the characteristics of the transmitter displacement sufficiently.

  • Dynamic Texture Classification Using Multivariate Hidden Markov Model

    Yu-Long QIAO  Zheng-Yi XING  

     
    LETTER-Image

      Vol:
    E101-A No:1
      Page(s):
    302-305

    Dynamic textures are sequences of images of moving scenes that exhibit certain stationarity properties in time. Hidden Markov model (HMM) is a statistical model, which has been used to model the dynamic texture. However, the texture is a region property. The traditional HMM models the property of a single pixel along the time, and does not consider the dependence of the spatial adjacent pixels of the dynamic texture. In this paper, the multivariate hidden Markov model (MHMM) is proposed to characterize and classify the dynamic textures. Specifically, the spatial adjacent pixels are modeled with multivariate hidden Markov model, in which the hidden states of those pixels are modeled with the multivariate Markov chain, and the intensity values of those pixels are modeled as the observation variables. Then the model parameters are used to describe the dynamic texture and the classification is based on the maximum likelihood criterion. The experiments on two benchmark datasets demonstrate the effectiveness of the introduced method.

  • Universal Scoring Function Based on Bias Equalizer for Bias-Based Fingerprinting Codes

    Minoru KURIBAYASHI  Nobuo FUNABIKI  

     
    PAPER

      Vol:
    E101-A No:1
      Page(s):
    119-128

    The study of universal detector for fingerprinting code is strongly dependent on the design of scoring function. The optimal detector is known as MAP detector that calculates an optimal correlation score for a given single user's codeword. However, the knowledge about the number of colluders and their collusion strategy are inevitable. In this paper, we propose a new scoring function that equalizes the bias between symbols of codeword, which is called bias equalizer. We further investigate an efficient scoring function based on the bias equalizer under the relaxed marking assumption such that white Gaussian noise is added to a pirated codeword. The performance is compared with the MAP detector as well as some state-of-the-art scoring functions.

  • Development of Complex-Valued Self-Organizing-Map Landmine Visualization System Equipped with Moving One-Dimensional Array Antenna

    Erika KOYAMA  Akira HIROSE  

     
    BRIEF PAPER-Electromagnetic Theory

      Vol:
    E101-C No:1
      Page(s):
    35-38

    This paper reports the development of a landmine visualization system based on complex-valued self-organizing map (CSOM) by employing one-dimensional (1-D) array of taper-walled tapered slot antennas (TSAs). Previously we constructed a high-density two-dimensional array system to observe and classify complex-amplitude texture of scattered wave. The system has superiority in its adaptive distinction ability between landmines and other clutters. However, it used so many (144) antenna elements with many mechanical radio-frequency (RF) switches and cables that it has difficulty in its maintenance and also requires long measurement time. The 1-D array system proposed here uses only 12 antennas and adopts electronic RF switches, resulting in easy maintenance and 1/4 measurement time. Though we observe stripe noise specific to this 1-D system, we succeed in visualization with effective solutions.

  • Daily Activity Recognition with Large-Scaled Real-Life Recording Datasets Based on Deep Neural Network Using Multi-Modal Signals

    Tomoki HAYASHI  Masafumi NISHIDA  Norihide KITAOKA  Tomoki TODA  Kazuya TAKEDA  

     
    PAPER-Engineering Acoustics

      Vol:
    E101-A No:1
      Page(s):
    199-210

    In this study, toward the development of smartphone-based monitoring system for life logging, we collect over 1,400 hours of data by recording including both the outdoor and indoor daily activities of 19 subjects, under practical conditions with a smartphone and a small camera. We then construct a huge human activity database which consists of an environmental sound signal, triaxial acceleration signals and manually annotated activity tags. Using our constructed database, we evaluate the activity recognition performance of deep neural networks (DNNs), which have achieved great performance in various fields, and apply DNN-based adaptation techniques to improve the performance with only a small amount of subject-specific training data. We experimentally demonstrate that; 1) the use of multi-modal signal, including environmental sound and triaxial acceleration signals with a DNN is effective for the improvement of activity recognition performance, 2) the DNN can discriminate specified activities from a mixture of ambiguous activities, and 3) DNN-based adaptation methods are effective even if only a small amount of subject-specific training data is available.

  • Design and Measurements of Two-Gain-Mode GaAs-BiFET MMIC Power Amplifier Modules with Small Phase Discontinuity for WCDMA Data Communications

    Kazuya YAMAMOTO  Miyo MIYASHITA  Kenji MUKAI  Shigeru FUJIWARA  Satoshi SUZUKI  Hiroaki SEKI  

     
    PAPER-Microwaves, Millimeter-Waves

      Vol:
    E101-C No:1
      Page(s):
    65-77

    This paper describes the design and measurements of two-gain-mode MMIC power amplifier modules (PAMs) for Band 1 and Band 5 WCDMA data communications. The PAMs are based on the two-stage single-chain amplifier topology with an L-shaped FET step attenuator (ATT) placed at the interstage, featuring not only high-efficiency operation but also both a small phase discontinuity and a small input return loss variation between the two gain modes: a high-gain mode (0-dB thru state for the ATT) and a low-gain mode (14-dB attenuation state for the ATT). The PAMs are assembled on a 3 mm × 3 mm FR-4 laminate together with several surface mount devices, and a high-directivity, 20-dB bilayer-type directional coupler is integrated on the laminate for accurate forward-power monitoring even under a 2.5:1-VSWR load mismatching condition. To validate the design and analysis for the PAMs using the L-shaped ATT, two PAM products — a Band 1 PAM and a Band 5 PAM — were fabricated using our in-house GaAs-BiFET process. The main RF measurements under the condition of a WCDMA (R99) modulated signal and a 3.4-V supply voltage are as follows. The Band 1 PAM can deliver a power-added efficiency (PAE) as high as 46% at an output power (Pout) of 28.25 dBm while maintaining a ±5-MHz-offset adjacent channel power ratio (ACLR1) of approximately -40 dBc or less and a small phase discontinuity of less than 5°. The Band 5 PAM can also deliver a high PAE of 46% at the same Pout and ACLR1 levels with small phase discontinuity of less than 4°. This small discontinuity is due to the phase-shift compensation capacitance embedded in the ATT. The measured input return loss is well maintained at better than 10 dB at the two modes. In addition, careful coupler design achieves a small detection error of less than 0.5 dB even under a 2.5:1-VSWR load mismatching condition.

  • Cryptographic Multilinear Maps and Their Cryptanalysis

    Jung HEE CHEON  Changmin LEE  Hansol RYU  

     
    INVITED PAPER

      Vol:
    E101-A No:1
      Page(s):
    12-18

    Multilinear maps have lots of cryptographic applications including multipartite key exchange and indistinguishability obfuscations. Since the concept of multilinear map was suggested, three kinds of candidate multilinear maps are constructed. However, the security of multilinear maps suffers from various attacks. In this paper, we overview suggested multilinear maps and cryptanalysis of them in diverse cases.

5561-5580hit(42807hit)