The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] (42807hit)

7281-7300hit(42807hit)

  • Grammar-Driven Workload Generation for Efficient Evaluation of Signature-Based Network Intrusion Detection Systems

    Min SHAO  Min S. KIM  Victor C. VALGENTI  Jungkeun PARK  

     
    PAPER-Information Network

      Pubricized:
    2016/05/13
      Vol:
    E99-D No:8
      Page(s):
    2090-2099

    Network Intrusion Detection Systems (NIDS) are deployed to protect computer networks from malicious attacks. Proper evaluation of NIDS requires more scrutiny than the evaluation for general network appliances. This evaluation is commonly performed by sending pre-generated traffic through the NIDS. Unfortunately, this technique is often limited in diversity resulting in evaluations incapable of examining the complex data structures employed by NIDS. More sophisticated methods that generate workload directly from NIDS rules consume excessive resources and are incapable of running in real-time. This work proposes a novel approach to real-time workload generation for NIDS evaluation to improve evaluation diversity while maintaining much higher throughput. This work proposes a generative grammar which represents an optimized version of a context-free grammar derived from the set of strings matching to the given NIDS rule database. The grammar is memory-efficient and computationally light when generating workload. Experiments demonstrate that grammar-generated workloads exert an order of magnitude more effort on the target NIDS. Even better, this improved diversity comes at much smaller cost in memory and speeds four times faster than current approaches.

  • Hough Transform-Based Clock Skew Measurement by Dynamically Locating the Region of Offset Majority

    Komang OKA SAPUTRA  Wei-Chung TENG  Takaaki NARA  

     
    PAPER-Information Network

      Pubricized:
    2016/05/19
      Vol:
    E99-D No:8
      Page(s):
    2100-2108

    A network-based remote host clock skew measurement involves collecting the offsets, the differences between sending and receiving times, of packets from the host within a period of time. Although the variant and immeasurable delay in each packet prevents the measurer from getting the real clock offset, the local minimum delays and the majority of delays delineate the clock offset shifts, and are used by existing approaches to estimate the skew. However, events during skew measurement like time synchronization and rerouting caused by switching network interface or base transceiver station may break the trend into multi-segment patterns. Although the skew in each segment is theoretically of the same value, the skew derived from the whole offset-set usually differs with an error of unpredictable scale. In this work, a method called dynamic region of offset majority locating (DROML) is developed to detect multi-segment cases, and to precisely estimate the skew. DROML is designed to work in real-time, and it uses a modified version of the HT-based method [8] both to measure the skew of one segment and to detect the break between adjacent segments. In the evaluation section, the modified HT-based method is compared with the original method and with a linear programming algorithm (LPA) on accumulated-time and short-term measurement. The fluctuation of the modified method in the short-term experiment is 0.6 ppm (parts per million), which is obviously less than the 1.23 ppm and 1.45 ppm from the other two methods. DROML, when estimating a four-segment case, is able to output a skew of only 0.22 ppm error, compared with the result of the normal case.

  • New Estimation Method for the Operational Low Frequency End of Antipodal Vivaldi Antennas

    Hien Ba CHU  Hiroshi SHIRAI  Chien Dao NGOC  

     
    PAPER-Electromagnetic Theory

      Vol:
    E99-C No:8
      Page(s):
    947-955

    A simple approach is presented for designing an antipodal Vivaldi antenna in this paper. A new and better estimation of the low frequency end of the operational range is shown. Final dimensions of the antenna parameters are determined by using the High Frequency Structure Simulator (HFSS). The proposed antenna has a simple configuration but exhibits low return loss, good radiation characteristics, and high and flat gain in the operating ultra wideband frequency range (3.1-10.6 GHz). Lastly, the fabrication has been done along with the specification to confirm the properties by measurements.

  • Welch FFT Segment Size Selection Method for Spectrum Awareness System

    Hiroki IWATA  Kenta UMEBAYASHI  Samuli TIIRO  Janne J. LEHTOMÄKI  Miguel LÓPEZ-BENÍTEZ  Yasuo SUZUKI  

     
    PAPER-Fundamental Theories for Communications

      Vol:
    E99-B No:8
      Page(s):
    1813-1823

    We create a practical method to set the segment size of the Welch FFT for wideband and long-term spectrum usage measurements in the context of hierarchical dynamic spectrum access (DSA). An energy detector (ED) based on the Welch FFT can be used to detect the presence or absence of primary user (PU) signal and to estimate the duty cycle (DC). In signal detection with the Welch FFT, segment size is an important design parameter since it determines both the detection performance and the frequency resolution. Between these two metrics, there is a trade-off relationship which can be controlled by adjusting the segment size. To cope with this trade-off relationship, we define an optimum and, more easy to analyze sub-optimum segment size design criterion. An analysis of the sub-optimum segment size criterion reveals that the resulting segment size depends on the signal-to-noise ratio (SNR) and the DC. Since in practice both SNR and DC are unknown, proper segment setting is difficult. To overcome this problem, we propose an adaptive segment size selection (ASSS) method that uses noise floor estimation outputs. The proposed method does not require any prior knowledge on the SNR or the DC. Simulation results confirm that the proposed ASSS method matches the performance achieved with the optimum design criterion.

  • Simultaneous Decoupling and Matching Technique for Short-Range MIMO

    Kentaro MURATA  Naoki HONMA  Kentaro NISHIMORI  Naobumi MICHISHITA  Hisashi MORISHITA  

     
    PAPER-Antennas and Propagation

      Vol:
    E99-B No:8
      Page(s):
    1846-1858

    This paper presents a novel simultaneous decoupling and matching technique for transmitting (Tx) and receiving (Rx) ports in short-range multiple-input multiple-output (SR-MIMO) systems. The principal difference with conventional decoupling and matching network (DMN) approaches is that the proposed technique considers strong mutual coupling between closely-positioned Tx/Rx arrays, and the S-parameter variation due to the presence of each other's array. This technique has two stages; first, 180-degree hybrid couplers are connected to both Tx/Rx ports of a plane-symmetrical MIMO system. This decouples both Tx/Rx ports, and moreover, channels between them are orthogonalized. That is, the MIMO system is transformed into multi orthogonalized single-input single-output (SISO) systems. Second, Tx/Rx ports of each orthogonalized SISO system are simultaneously matched based on conjugate matching theory. Consequently, the transmission power of the short-range MIMO system is maximized. Numerical results show that the proposed technique realizes higher channel capacity than the conventional DMN; indeed it achieves the theoretically possible capacity. In addition to theoretical analyses, we provide an example for microstrip line (MSL) circuit implementation. This MSL model offers good simultaneous decoupling and matching performance yielding channel capacity comparable to that of an ideally-designed circuit model. This validates the implementation feasibility of the proposed technique.

  • Multi-Cell Structure Backscatter Based Wireless-Powered Communication Network (WPCN)

    Shin Hyuk CHOI  Dong In KIM  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:8
      Page(s):
    1687-1696

    In this paper, we propose a multi-cell structure backscatter based wireless-powered communication network (WPCN) where a number of backscatter cells are locally separated, each containing a subset of users around a carrier emitter. The multi-cell structure backscatter based WPCN can be implemented in two ways, namely time-division multiplexing (TDM) and frequency-division multiplexing (FDM). Here users harvest energy from the carrier signal transmitted by the carrier emitter, and then transmit their own information in a passive way via the reflection of the carrier signal using frequency-shift keying modulation. We characterize the energy-free condition and the signal-to-noise ratio (SNR) outage zone in a backscatter based WPCN. Also, a backscatter based harvest-then-transmit protocol is adopted to maximize the sum-throughput of all users by optimally allocating time for energy harvesting and information transmission. Numerical results demonstrate that the backscatter based WPCN ensures an increased long-range coverage and a diminished SNR outage zone compared to conventional radio based WPCNs. Also, comparing the two types of multi-cell structure backscatter based WPCN, TDM within each backscatter cell and FDM across backscatter cells versus FDM within each backscatter cell and TDM across backscatter cells, numerical results confirm that which one yields a better performance.

  • Algorithm Design of Relative Magnitude Coefficients Using Brent's Method on the K-User MIMO-IFC

    Kunitaka MATSUMURA  Tomoaki OHTSUKI  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:8
      Page(s):
    1902-1909

    Interference alignment (IA) is a method to improve the capacity of cell-edge users and thus attracts an intense research interest. We focus on the IA extended to the multiple-input multiple-output (MIMO) interference network. In this method, each coordinated transmitter generates beamforming vectors to align interference from different transmitters into confined subspace at each receiver. Then, using singular value decomposition (SVD) with the relative magnitude coefficients, transmitters calculate the beamforming vectors and the received vectors. However, in this method it is difficult to determine the value of the relative magnitude coefficients so that the system capacity is improved, because it is necessary to solve the non-linear function of multivariable. In this paper, we propose a design method of the relative magnitude coefficients of interference channels to improve system capacity using Brent's method on the K-User MIMO interference channel (MIMO-IFC). The proposed method can improve system capacity, though the system complexity increases due to Brent's method that requires multiple SVD calculation to calculate the null space. Thus, instead of using SVD, we introduce the complexity reduction method to calculate the null space of the matrix. Furthermore, we extend the proposed method to be applicable for more common systems where all base stations have the same number of transmit antennas. Through simulation, we show that the proposed method achieves a higher system capacity than the conventional one. We also show that the method that calculates the null space needs much lower complexity than SVD. In addition, we show that the proposed design method reduces the degradation of the system capacity caused by the interference not eliminated, and achieves the fairness of capacities among users for an increase of the number of design coefficients.

  • Flow Clustering Based Efficient Consolidated Middlebox Positioning Approach for SDN/NFV-Enabled Network

    Duc Tiep VU  Kyungbaek KIM  

     
    LETTER-Information Network

      Pubricized:
    2016/05/19
      Vol:
    E99-D No:8
      Page(s):
    2177-2181

    Recently in an SDN/NFV-enabled network, a consolidated middlebox is proposed in which middlebox functions required by a network flow are provided at a single machine in a virtualized manner. With the promising advantages such as simplifying network traffic routing and saving resources of switches and machines, consolidated middleboxes are going to replace traditional middleboxes in the near future. However, the location of consolidated middleboxes may affect the performance of an SDN/NFV network significantly. Accordingly, the consolidated middlebox positioning problem in an SDN/NFV-enabled network must be addressed adequately with service chain constraints (a flow must visit a specific type of consolidated middlebox), resource constraints (switch memory and processing power of the machine), and performance requirements (end-to-end delay and bandwidth consumption). In this paper, we propose a novel solution of the consolidated middlebox positioning problem in an SDN/NFV-enabled network based on flow clustering to improve the performance of service chain flows and utilization of a consolidated middlebox. Via extensive simulations, we show that our solution significantly reduces the number of routing rules per switch, the end-to-end delay and bandwidth consumption of service flows while meeting service chain and resource constraints.

  • BFWindow: Speculatively Checking Data Property Consistency against Buffer Overflow Attacks

    Jinli RAO  Zhangqing HE  Shu XU  Kui DAI  Xuecheng ZOU  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2002-2009

    Buffer overflow is one of the main approaches to get control of vulnerable programs. This paper presents a protection technique called BFWindow for performance and resource sensitive embedded systems. By coloring data structure in memory with single associate property bit to each byte and extending the target memory block to a BFWindow(2), it validates each memory write by speculatively checking consistency of data properties within the extended buffer window. Property bits are generated by compiler statically and checked by hardware at runtime. They are transparent to users. Experimental results show that the proposed mechanism is effective to prevent sequential memory writes from crossing buffer boundaries which is the common scenario of buffer overflow exploitations. The performance overhead for practical protection mode across embedded system benchmarks is under 1%.

  • FOREWORD Open Access

    Guojun WANG  

     
    FOREWORD

      Vol:
    E99-D No:8
      Page(s):
    1964-1965
  • Linear Complexity of New Generalized Cyclotomic Sequences of Order Two with Odd Length

    Yu-qian ZHOU  Fei GAO  Jie ZHANG  Qian-yan WEN  Zu-ling CHANG  

     
    LETTER-Spread Spectrum Technologies and Applications

      Vol:
    E99-A No:8
      Page(s):
    1639-1644

    Based on the generalized cyclotomy of order two with respect to n=p1e1+1p2e2+1…ptet+1, where p1, p2, …,pt are pairwise distinct odd primes and e1, e2,…, et are non-negative integers satisfying gcd (piei (pi-1), pjej (pj-1)) = 2 for all i ≠ j, this paper constructs a new family of generalized cyclotomic sequences of order two with length n and investigates their linear complexity. In the view of cascade theory, this paper obtains the linear complexity of a representative sequence.

  • SNGR: Scalable Name-Based Geometric Routing for ICN

    Yanbin SUN  Yu ZHANG  Binxing FANG  Hongli ZHANG  

     
    PAPER-Network

      Vol:
    E99-B No:8
      Page(s):
    1835-1845

    Information-Centric Networking (ICN) treats contents as first class citizens and adopts name-based routing for content distribution and retrieval. Content names rather than IP addresses are directly used for routing. However, due to the location-independent naming and the huge namespace, name-based routing faces scalability and efficiency issues including large routing tables and high path stretches. This paper proposes a universal Scalable Name-based Geometric Routing scheme (SNGR), which is a careful synthesis of geometric routing and name resolution. To provide scalable and efficient underlying routing, a universal geometric routing framework (GRF) is proposed. Any geometric routing scheme can be used directly for name resolution based on GRF. To implement an overlay name resolution system, SNGR utilizes a bi-level grouping design. With this design, a resolution node that is close to the consumer can always be found. Our theoretical analyses guarantee the performance of SNGR, and experiments show that SNGR outperforms similar routing schemes in terms of node state, path stretch, and reliability.

  • Spectral Features Based on Local Hu Moments of Gabor Spectrograms for Speech Emotion Recognition

    Huawei TAO  Ruiyu LIANG  Cheng ZHA  Xinran ZHANG  Li ZHAO  

     
    LETTER-Pattern Recognition

      Pubricized:
    2016/05/06
      Vol:
    E99-D No:8
      Page(s):
    2186-2189

    To improve the recognition rate of the speech emotion, new spectral features based on local Hu moments of Gabor spectrograms are proposed, denoted by GSLHu-PCA. Firstly, the logarithmic energy spectrum of the emotional speech is computed. Secondly, the Gabor spectrograms are obtained by convoluting logarithmic energy spectrum with Gabor wavelet. Thirdly, Gabor local Hu moments(GLHu) spectrograms are obtained through block Hu strategy, then discrete cosine transform (DCT) is used to eliminate correlation among components of GLHu spectrograms. Fourthly, statistical features are extracted from cepstral coefficients of GLHu spectrograms, then all the statistical features form a feature vector. Finally, principal component analysis (PCA) is used to reduce redundancy of features. The experimental results on EmoDB and ABC databases validate the effectiveness of GSLHu-PCA.

  • A Secure RFID Application Revocation Scheme for IoT

    Kai FAN  Zhao DU  Yuanyuan GONG  Yue WANG  Tongjiang YAN  Hui LI  Yintang YANG  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2027-2035

    Radio Frequency Identification (RFID) plays a crucial role in IoT development. With the extensive use of RFID, the fact that a single RFID tag integrates multiple applications has become a mainstream. To facilitate users to use the multi-application RFID tag and revoke some applications in the tag securely and efficiently, a secure RFID application revocation scheme is proposed in this paper. In the scheme, each response for the challenge between tag and reader is different, and a group has the feature of many tags. Even if the group index number and corresponding group are revealed, a specific tag does not be precisely found and tracked. Users are anonymous completely. The scheme also allows users to set the validity period for an application or some applications. If the application contains the validity period and expires, the server will remove the validity period and revoke the application automatically in the tag when the RFID tag accesses server again. The proposed scheme cannot only be used in multi-application RFID tag but also be used in one-application RFID tag. Furthermore, compared with other existing schemes, the scheme provides a higher level of security and has an advantage of performance. Our scheme has the ability of mutual authentication and Anti-replay by adding a random number r2, and it is easy to against synchronization attack. Security proof is given in our paper and performance advantage are mainly reflected in the following points such as forward security, synchronization, storage complexity, computational complexity, etc. Finally, the proposed scheme can be used in multi-application RFID tag to promote the development of the IoT.

  • A Matrix Based ORAM: Design, Implementation and Experimental Analysis

    Steven GORDON  Atsuko MIYAJI  Chunhua SU  Karin SUMONGKAYOTHIN  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2044-2055

    Oblivious RAM is a technique for hiding the access patterns between a client and an untrusted server. However, current ORAM algorithms incur large communication or storage overhead. We propose a novel ORAM construction using a matrix logical structure for server storage where a client downloads blocks from each row, choosing the column randomly to hide the access pattern. Both a normal construction and recursive construction, where a position map normally stored on the client is also stored on the server, are presented. We show our matrix ORAM achieves constant bandwidth cost for the normal construction, uses similar storage to the existing Path ORAM, and improves open the bandwidth cost compared to Path ORAM under certain conditions in the recursive construction.

  • Implementation of µNaCl on 32-bit ARM Cortex-M0

    Toshifumi NISHINAGA  Masahiro MAMBO  

     
    PAPER

      Pubricized:
    2016/05/31
      Vol:
    E99-D No:8
      Page(s):
    2056-2060

    By the deployment of Internet of Things, embedded systems using microcontroller are nowadays under threats through the network and incorporating security measure to the systems is highly required. Unfortunately, microcontrollers are not so powerful enough to execute standard security programs and need light-weight, high-speed and secure cryptographic libraries. In this paper, we port NaCl cryptographic library to ARM Cortex-M0(M0+) Microcontroller, where we put much effort in fast and secure implementation. Through the evaluation we show that the implementation achieves about 3 times faster than AVR NaCl result and reduce half of the code size.

  • Adaptive Interference-Aware Receiver for Multiuser MIMO Downlink Transmission in IEEE 802.11ac Wireless LAN Systems

    Minjoon KIM  Yunho JUNG  Jaeseok KIM  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:8
      Page(s):
    1884-1893

    This paper presents an adaptive interference-aware receiver for multiuser multiple-input multiple-output (MU-MIMO) downlink systems in wireless local area network (WLAN) systems. The MU-MIMO downlink technique is one of the key techniques that are newly applied to WLAN systems in order to support a very high throughput. However, the simultaneous communication of several users causes inter-user interference (IUI), which adversely affects receivers. Therefore, in order to prevent IUI, a precoding technique is defined at the transmitter based on feedback from the receiver. Unfortunately, however, the receiver still suffers from interference, because the precoding technique is prone to practical errors from the feedback quantization and subcarrier grouping scheme. Whereas ordinary detection schemes are available to mitigate such interference, such schemes are unsuitable because of their low performance or high computational complexity. In this paper, we propose an switching algorithm based on the norm ratio between an effective channel matrix for the desired signal and that of the interfering signals. Simulation results based on the IEEE 802.11ac standard show that the proposed algorithm can achieve near-optimal performance with a 70% reduction in computational complexity.

  • Self-Organized Inter-Cell Interference Coordination Based on Partial CSI Sharing in Heterogeneous Networks Employing Cell Range Expansion

    Takuya KAMENOSONO  Megumi KANEKO  Kazunori HAYASHI  Lila BOUKHATEM  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E99-B No:8
      Page(s):
    1780-1788

    Many research efforts are being focused upon the design of dynamic Inter-Cell Interference Coordination (ICIC) schemes for macrocell/picocell heterogeneous networks employing Cell Range Expansion (CRE). In order to protect the expanded Pico User Equipments (ePUEs) located in the CRE region from severe Macro Base Station (MBS) interference in downlink, the conventional methods reduce the transmit power of the MBS in the Almost Blank Subframes (ABSs), where ePUEs can be scheduled. However, this severely limits the amount of usable resources/power for the MBS as compared to Resource Block (RB)-based dynamic allocation. Instead, we propose a self-organized RB-based dynamic resource allocation method. Based on the proposed partial Channel State Information (CSI) sharing, the MBS obtains ePUEs' CSI and predicts their RB allocation. Then, the MBS reduces its transmit power in RBs where the ePUEs' allocation probability is estimated to be high. The simulation results show that the proposed scheme achieves excellent macrocell/picocell performance trade-offs, even when taking into account the overhead increase due to the partial CSI sharing.

  • Trellis Coded Orbital Angular Momentum Modulation

    Chao ZHANG  Lu MA  

     
    LETTER-Digital Signal Processing

      Vol:
    E99-A No:8
      Page(s):
    1618-1621

    Trellis coded modulation (TCM) concept is applied to the mode constellation points of orbital angular momentum (OAM) modulation. OAM modulation considers the multiple OAM modes as additional constellation points and maps a first part of a block of information bits to the transmitting OAM modes. Therefore, spatial multiplexing gains are retained and spectral efficiency is boosted. The second part of the block of information bits is mapped to a complex symbol using conventional digital modulation schemes. At any particular time instant, only one OAM mode is active. The receiver estimates the transmitted symbol and the active OAM mode, then uses the two estimates to retrieve the original block of data bits. Simulation reveals that with the TCM employed both for the OAM constellation points and the signal constellation points, a considerable bit error rate (BER) gain can be obtained under all turbulence conditions, compared with that of the no coding scheme.

  • Fast Search of a Similar Patch for Self-Similarity Based Image Super Resolution

    Jun-Sang YOO  Ji-Hoon CHOI  Kang-Sun CHOI  Dae-Yeol LEE  Hui-Yong KIM  Jong-Ok KIM  

     
    LETTER-Image Processing and Video Processing

      Pubricized:
    2016/05/16
      Vol:
    E99-D No:8
      Page(s):
    2194-2198

    In the self-similarity super resolution (SR) approach, similar examples are searched across down-scales in the image pyramid, and the computations of searching similar examples are very heavy. This makes it difficult to work in a real-time way under common software implementation. Therefore, the search process should be further accelerated at an algorithm level. Cauchy-Schwarz inequality has been used previously for fast vector quantization (VQ) encoding. The candidate patches in the search region of SR are analogous to the code-words in the VQ, and Cauchy-Schwarz inequality is exploited to exclude implausible candidate patches early. Consequently, significant acceleration of the similar patch search process is achieved. The proposed method can easily make an optimal trade-off between running speed and visual quality by appropriately configuring the bypass-threshold.

7281-7300hit(42807hit)