The search functionality is under construction.

Keyword Search Result

[Keyword] IoT(122hit)

1-20hit(122hit)

  • Why the Controversy over Displacement Currents never Ends? Open Access

    Masao KITANO  

     
    PAPER

      Pubricized:
    2023/10/27
      Vol:
    E107-C No:4
      Page(s):
    82-90

    Displacement current is the last piece of the puzzle of electromagnetic theory. Its existence implies that electromagnetic disturbance can propagate at the speed of light and finally it led to the discovery of Hertzian waves. On the other hand, since magnetic fields can be calculated only with conduction currents using Biot-Savart's law, a popular belief that displacement current does not produce magnetic fields has started to circulate. But some people think if this is correct, what is the displacement current introduced for. The controversy over the meaning of displacement currents has been going on for more than hundred years. Such confusion is caused by forgetting the fact that in the case of non-stationary currents, neither magnetic fields created by conduction currents nor those created by displacement currents can be defined. It is also forgotten that the effect of displacement current is automatically incorporated in the magnetic field calculated by Biot-Savart's law. In this paper, mainly with the help of Helmholtz decomposition, we would like to clarify the confusion surrounding displacement currents and provide an opportunity to end the long standing controversy.

  • Thermoelectric Effect of Ga-Sn-O Thin Films for Internet-of-Things Application

    Yuhei YAMAMOTO  Naoki SHIBATA  Tokiyoshi MATSUDA  Hidenori KAWANISHI  Mutsumi KIMURA  

     
    BRIEF PAPER-Electronic Materials

      Pubricized:
    2023/07/10
      Vol:
    E107-C No:1
      Page(s):
    18-21

    Thermoelectric effect of Ga-Sn-O (GTO) thin films has been investigated for Internet-of-Things application. It is found that the amorphous GTO thin films provide higher power factors (PF) than the polycrystalline ones, which is because grain boundaries block the electron conduction in the polycrystalline ones. It is also found that the GTO thin films annealed in vacuum provide higher PF than those annealed in air, which is because oxygen vacancies are terminated in those annealed in air. The PF and dimensionless figure of merit (ZT) is not so excellent, but the cost effectiveness is excellent, which is the most important for some examples of the Internet-of-Things application.

  • Adaptive K-Repetition Transmission with Site Diversity Reception for Energy-Efficient Grant-Free URLLC in 5G NR

    Arif DATAESATU  Kosuke SANADA  Hiroyuki HATANO  Kazuo MORI  Pisit BOONSRIMUANG  

     
    PAPER

      Pubricized:
    2023/10/11
      Vol:
    E107-B No:1
      Page(s):
    74-84

    The fifth-generation (5G) new radio (NR) standard employs ultra-reliable and low-latency communication (URLLC) to provide real-time wireless interactive capability for the internet of things (IoT) applications. To satisfy the stringent latency and reliability demands of URLLC services, grant-free (GF) transmissions with the K-repetition transmission (K-Rep) have been introduced. However, fading fluctuations can negatively impact signal quality at the base station (BS), leading to an increase in the number of repetitions and raising concerns about interference and energy consumption for IoT user equipment (UE). To overcome these challenges, this paper proposes novel adaptive K-Rep control schemes that employ site diversity reception to enhance signal quality and reduce energy consumption. The performance evaluation demonstrates that the proposed adaptive K-Rep control schemes significantly improve communication reliability and reduce transmission energy consumption compared with the conventional K-Rep scheme, and then satisfy the URLLC requirements while reducing energy consumption.

  • Stackelberg Game for Wireless-Powered Relays Assisted Batteryless IoT Networks

    Yanming CHEN  Bin LYU  Zhen YANG  Fei LI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2023/08/10
      Vol:
    E106-B No:12
      Page(s):
    1479-1490

    In this paper, we investigate a wireless-powered relays assisted batteryless IoT network based on the non-linear energy harvesting model, where there exists an energy service provider constituted by the hybrid access point (HAP) and an IoT service provider constituted by multiple clusters. The HAP provides energy signals to the batteryless devices for information backscattering and the wireless-powered relays for energy harvesting. The relays are deployed to assist the batteryless devices with the information transmission to the HAP by using the harvested energy. To model the energy interactions between the energy service provider and IoT service provider, we propose a Stackelberg game based framework. We aim to maximize the respective utility values of the two providers. Since the utility maximization problem of the IoT service provider is non-convex, we employ the fractional programming theory and propose a block coordinate descent (BCD) based algorithm with successive convex approximation (SCA) and semi-definite relaxation (SDR) techniques to solve it. Numerical simulation results confirm that compared to the benchmark schemes, our proposed scheme can achieve larger utility values for both the energy service provider and IoT service provider.

  • An Optimal Satellite Selection Schema in Feeder Link Mapping for High-Capacity Scenario

    Rui CHEN  Wen-nai WANG  Wei WU  

     
    PAPER-Satellite Communications

      Pubricized:
    2023/07/24
      Vol:
    E106-B No:11
      Page(s):
    1237-1243

    Non-Terrestrial-Network (NTN) can provide seamless and ubiquitous connectivity of massive devices. Thus, the feeder links between satellites and gateways need to provide essentially high data transmission rates. In this paper, we focus on a typical high-capacity scenario, i.e., LEO-IoT, to find an optimal satellite selection schema to maximize the capacity of feeder links. The proposed schema is able to obtain the optimal mapping among all the satellites and gateways. By comparing with maximum service time algorithm, the proposed schema can construct a more balanced and reasonable connection pattern to improve the efficiency of the gateways. Such an advantage will become more significant as the number of satellites increases.

  • A Network Design Scheme in Delay Sensitive Monitoring Services Open Access

    Akio KAWABATA  Takuya TOJO  Bijoy CHAND CHATTERJEE  Eiji OKI  

     
    PAPER-Network Management/Operation

      Pubricized:
    2023/04/19
      Vol:
    E106-B No:10
      Page(s):
    903-914

    Mission-critical monitoring services, such as finding criminals with a monitoring camera, require rapid detection of newly updated data, where suppressing delay is desirable. Taking this direction, this paper proposes a network design scheme to minimize this delay for monitoring services that consist of Internet-of-Things (IoT) devices located at terminal endpoints (TEs), databases (DB), and applications (APLs). The proposed scheme determines the allocation of DB and APLs and the selection of the server to which TE belongs. DB and APL are allocated on an optimal server from multiple servers in the network. We formulate the proposed network design scheme as an integer linear programming problem. The delay reduction effect of the proposed scheme is evaluated under two network topologies and a monitoring camera system network. In the two network topologies, the delays of the proposed scheme are 78 and 80 percent, compared to that of the conventional scheme. In the monitoring camera system network, the delay of the proposed scheme is 77 percent compared to that of the conventional scheme. These results indicate that the proposed scheme reduces the delay compared to the conventional scheme where APLs are located near TEs. The computation time of the proposed scheme is acceptable for the design phase before the service is launched. The proposed scheme can contribute to a network design that detects newly added objects quickly in the monitoring services.

  • Nonvolatile Storage Cells Using FiCC for IoT Processors with Intermittent Operations

    Yuki ABE  Kazutoshi KOBAYASHI  Jun SHIOMI  Hiroyuki OCHI  

     
    PAPER

      Pubricized:
    2023/04/13
      Vol:
    E106-C No:10
      Page(s):
    546-555

    Energy harvesting has been widely investigated as a potential solution to supply power for Internet of Things (IoT) devices. Computing devices must operate intermittently rather than continuously, because harvested energy is unstable and some of IoT applications can be periodic. Therefore, processors for IoT devices with intermittent operation must feature a hibernation mode with zero-standby-power in addition to energy-efficient normal mode. In this paper, we describe the layout design and measurement results of a nonvolatile standard cell memory (NV-SCM) and nonvolatile flip-flops (NV-FF) with a nonvolatile memory using Fishbone-in-Cage Capacitor (FiCC) suitable for IoT processors with intermittent operations. They can be fabricated in any conventional CMOS process without any additional mask. NV-SCM and NV-FF are fabricated in a 180nm CMOS process technology. The area overhead by nonvolatility of a bit cell are 74% in NV-SCM and 29% in NV-FF, respectively. We confirmed full functionality of the NV-SCM and NV-FF. The nonvolatile system using proposed NV-SCM and NV-FF can reduce the energy consumption by 24.3% compared to the volatile system when hibernation/normal operation time ratio is 500 as shown in the simulation.

  • Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware

    Koji NAKAO  Katsunari YOSHIOKA  Takayuki SASAKI  Rui TANABE  Xuping HUANG  Takeshi TAKAHASHI  Akira FUJITA  Jun'ichi TAKEUCHI  Noboru MURATA  Junji SHIKATA  Kazuki IWAMOTO  Kazuki TAKADA  Yuki ISHIDA  Masaru TAKEUCHI  Naoto YANAI  

     
    INVITED PAPER

      Pubricized:
    2023/06/08
      Vol:
    E106-D No:9
      Page(s):
    1302-1315

    In this paper, we developed the latest IoT honeypots to capture IoT malware currently on the loose, analyzed IoT malware with new features such as persistent infection, developed malware removal methods to be provided to IoT device users. Furthermore, as attack behaviors using IoT devices become more diverse and sophisticated every year, we conducted research related to various factors involved in understanding the overall picture of attack behaviors from the perspective of incident responders. As the final stage of countermeasures, we also conducted research and development of IoT malware disabling technology to stop only IoT malware activities in IoT devices and IoT system disabling technology to remotely control (including stopping) IoT devices themselves.

  • iLEDGER: A Lightweight Blockchain Framework with New Consensus Method for IoT Applications

    Veeramani KARTHIKA  Suresh JAGANATHAN  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2023/03/06
      Vol:
    E106-A No:9
      Page(s):
    1251-1262

    Considering the growth of the IoT network, there is a demand for a decentralized solution. Incorporating the blockchain technology will eliminate the challenges faced in centralized solutions, such as i) high infrastructure, ii) maintenance cost, iii) lack of transparency, iv) privacy, and v) data tampering. Blockchain-based IoT network allows businesses to access and share the IoT data within their organization without a central authority. Data in the blockchain are stored as blocks, which should be validated and added to the chain, for this consensus mechanism plays a significant role. However, existing methods are not designed for IoT applications and lack features like i) decentralization, ii) scalability, iii) throughput, iv) faster convergence, and v) network overhead. Moreover, current blockchain frameworks failed to support resource-constrained IoT applications. In this paper, we proposed a new consensus method (WoG) and a lightweight blockchain framework (iLEDGER), mainly for resource-constrained IoT applications in a permissioned environment. The proposed work is tested in an application that tracks the assets using IoT devices (Raspberry Pi 4 and RFID). Furthermore, the proposed consensus method is analyzed against benign failures, and performance parameters such as CPU usage, memory usage, throughput, transaction execution time, and block generation time are compared with state-of-the-art methods.

  • A Large-Scale Investigation into the Possibility of Malware Infection of IoT Devices with Weak Credentials

    Kosuke MURAKAMI  Takahiro KASAMA  Daisuke INOUE  

     
    PAPER

      Pubricized:
    2023/05/31
      Vol:
    E106-D No:9
      Page(s):
    1316-1325

    Since the outbreak of IoT malware “Mirai,” several incidents have occurred in which IoT devices have been infected with malware. The malware targets IoT devices whose Telnet and SSH services are accessible from the Internet and whose ID/Password settings are not strong enough. Several IoT malware families, including Mirai, are also known that restrict access to Telnet and other services to keep the devices from being infected by other malware after infection. However, tens of thousands of devices in Japan can be still accessed Telnet services over the Internet according to network scan results. Does this imply that these devices can avoid malware infection by setting strong enough passwords, and thus cannot be used as a stepping stone for cyber attacks? In February 2019, we initiated the National Operation Toward IoT Clean Environment (NOTICE) project in Japan to investigate IoT devices with weak credentials and notify the device users. In this study, we analyze the results of the NOTICE project from February 2021 to May 2021 and the results of the large-scale darknet monitoring to reveal whether IoT devices with weak credentials are infected with malware or not. Moreover, we analyze the IoT devices with weak credentials to find out the factors that prevent these devices from being infected with malware and to assess the risk of abuse for cyber attacks. From the results of the analysis, it is discovered that approximately 2,000 devices can be easily logged in using weak credentials in one month in Japan. We also clarify that no device are infected with Mirai and its variants malware due to lack of functions used for malware infection excluding only one host. Finally, even the devices which are logged in by NOTICE project are not infected with Mirai, we find that at least 80% and 93% of the devices can execute arbitrary scripts and can send packets to arbitrary destinations respectively.

  • IoT Modeling and Verification: From the CaIT Calculus to UPPAAL

    Ningning CHEN  Huibiao ZHU  

     
    PAPER-Fundamentals of Information Systems

      Pubricized:
    2023/06/02
      Vol:
    E106-D No:9
      Page(s):
    1507-1518

    With the support of emerging technologies such as 5G, machine learning, edge computing and Industry 4.0, the Internet of Things (IoT) continues to evolve and promote the construction of future networks. Existing work on IoT mainly focuses on its practical applications, but there is little research on modeling the interactions among components in IoT systems and verifying the correctness of the network deployment. Therefore, the Calculus of the Internet of Things (CaIT) has previously been proposed to formally model and reason about IoT systems. In this paper, the CaIT calculus is extended by introducing broadcast communications. For modeling convenience, we provide explicit operations to model node mobility as well as the interactions between sensors (or actuators) with the environment. To support the use of UPPAAL to verify the temporal properties of IoT networks described by the CaIT calculus, we establish a relationship between timed automata and the CaIT calculus. Using UPPAAL, we verify six temporal properties of a simple “smart home” example, including Boiler On Manually, Boiler Off Automatically, Boiler On Automatically, Lights On, Lights Mutually, and Windows Simultaneously. The verification results show that the “smart home” can work properly.

  • A Cause of Momentary Level Shifts Appearing in Broadcast Satellite Signals Open Access

    Ryouichi NISHIMURA  Byeongpyo JEONG  Hajime SUSUKITA  Takashi TAKAHASHI  Kenichi TAKIZAWA  

     
    PAPER-Sensing

      Pubricized:
    2023/02/24
      Vol:
    E106-B No:8
      Page(s):
    714-722

    The degree of reception of BS signals is affected by various factors. After routinely recording it at two observation points at two locations, we found that momentary upward and downward level shifts occurred multiple times, mainly during daytime. These level shifts were observed at one location. No such signal was sensed at the other location. After producing an algorithm to extract such momemtary level shifts, their statistical properties were investigated. Careful analyses, including assessment of the signal polarity, amplitude, duration, hours, and comparison with actual flight schedules and route information implied that these level shifts are attributable to the interference of direct and reflected waves from aircraft flying at approximately tropopause altitude. This assumption is further validated through computer simulations of BS signal interference.

  • OPENnet: Object Position Embedding Network for Locating Anti-Bird Thorn of High-Speed Railway

    Zhuo WANG  Junbo LIU  Fan WANG  Jun WU  

     
    LETTER-Intelligent Transportation Systems

      Pubricized:
    2022/11/14
      Vol:
    E106-D No:5
      Page(s):
    824-828

    Machine vision-based automatic anti-bird thorn failure inspection, instead of manual identification, remains a great challenge. In this paper, we proposed a novel Object Position Embedding Network (OPENnet), which can improve the precision of anti-bird thorn localization. OPENnet can simultaneously predict the location boxes of the support device and anti-bird thorn by using the proposed double-head network. And then, OPENnet is optimized using the proposed symbiotic loss function (SymLoss), which embeds the object position into the network. The comprehensive experiments are conducted on the real railway video dataset. OPENnet yields competitive performance on anti-bird thorn localization. Specifically, the localization performance gains +3.65 AP, +2.10 AP50, and +1.22 AP75.

  • Parts Supply Support Method for Leveling Workload in In-Process Logistics

    Noriko YUASA  Masahiro YAMAGUCHI  Kosuke SHIMA  Takanobu OTSUKA  

     
    PAPER

      Pubricized:
    2022/10/20
      Vol:
    E106-D No:4
      Page(s):
    469-476

    At manufacturing sites, mass customization is expanding along with the increasing variety of customer needs. This situation leads to complications in production planning for the factory manager, and production plans are likely to change suddenly at the manufacturing site. Because such sudden fluctuations in production often occur, it is particularly difficult to optimize the parts supply operations in these production processes. As a solution to such problems, Industry 4.0 has expanded to promote the use of digital technologies at manufacturing sites; however, these solutions can be expensive and time-consuming to introduce. Therefore, not all factory managers are favorable toward introducing digital technology. In this study, we propose a method to support parts supply operations that decreases work stagnation and fluctuation without relying on the experience of workers who supply parts in the various production processes. Furthermore, we constructed a system that is inexpensive and easy to introduce using both LPWA and BLE communications. The purpose of the system is to level out work in in-process logistics. In an experiment, the proposed method was introduced to a manufacturing site, and we compared how the workload of the site's workers changed. The experimental results show that the proposed method is effective for workload leveling in parts supply operations.

  • Noncoherent Demodulation and Decoding via Polynomial Zeros Modulation for Pilot-Free Short Packet Transmissions over Multipath Fading Channels

    Yaping SUN  Gaoqi DOU  Hao WANG  Yufei ZHANG  

     
    PAPER-Transmission Systems and Transmission Equipment for Communications

      Pubricized:
    2022/09/21
      Vol:
    E106-B No:3
      Page(s):
    213-220

    With the advent of the Internet of Things (IoT), short packet transmissions will dominate the future wireless communication. However, traditional coherent demodulation and channel estimation schemes require large pilot overhead, which may be highly inefficient for short packets in multipath fading scenarios. This paper proposes a novel pilot-free short packet structure based on the association of modulation on conjugate-reciprocal zeros (MOCZ) and tail-biting convolutional codes (TBCC), where a noncoherent demodulation and decoding scheme is designed without the channel state information (CSI) at the transceivers. We provide a construction method of constellation sets and demodulation rule for M-ary MOCZ. By deriving low complexity log-likelihood ratios (LLR) for M-ary MOCZ, we offer a reasonable balance between energy and bandwidth efficiency for joint coding and modulation scheme. Simulation results show that our proposed scheme can attain significant performance and throughput gains compared to the pilot-based coherent modulation scheme over multipath fading channels.

  • A Resource-Efficient Green Paradigm For Crowdsensing Based Spectrum Detection In Internet of Things Networks

    Xiaohui LI  Qi ZHU  Wenchao XIA  Yunpei CHEN  

     
    PAPER-Terrestrial Wireless Communication/Broadcasting Technologies

      Pubricized:
    2022/09/12
      Vol:
    E106-B No:3
      Page(s):
    275-286

    Crowdsensing-based spectrum detection (CSD) is promising to enable full-coverage radio resource availability for the increasingly connected machines in the Internet of Things (IoT) networks. The current CSD scheme consumes a lot of energy and network resources for local sensing, processing, and distributed data reporting for each crowdsensing device. Furthermore, when the amount of reported data is large, the data fusion implemented at the requestor can easily cause high latency. For improving efficiencies in both energy and network resources, this paper proposes a green CSD (GCSD) paradigm. The ambient backscatter (AmB) is used to enable a battery-free mode of operation in which the received spectrum data is reported directly through backscattering without local processing. The energy for backscattering can be provided by ambient radio frequency (RF) sources. Then, relying on air computation (AirComp), the data fusion can be implemented during the backscattering process and over the air by utilizing the summation property of wireless channel. This paper illustrates the model and the implementation process of the GCSD paradigm. Closed-form expressions of detection metrics are derived for the proposed GCSD. Simulation results verify the correctness of the theoretical derivation and demonstrate the green properties of the GCSD paradigm.

  • Wireless-Powered Relays Assisted Batteryless IoT Networks Empowered by Energy Beamforming

    Yanming CHEN  Bin LYU  Zhen YANG  Fei LI  

     
    LETTER-Mobile Information Network and Personal Communications

      Pubricized:
    2022/08/23
      Vol:
    E106-A No:2
      Page(s):
    164-168

    In this letter, we propose an energy beamforming empowered relaying scheme for a batteryless IoT network, where wireless-powered relays are deployed between the hybrid access point (HAP) and batteryless IoT devices to assist the uplink information transmission from the devices to the HAP. In particular, the HAP first exploits energy beamforming to efficiently transmit radio frequency (RF) signals to transfer energy to the relays and as the incident signals to enable the information backscattering of batteryless IoT devices. Then, each relay uses the harvested energy to forward the decoded signals from its corresponding batteryless IoT device to the HAP, where the maximum-ratio combing is used for further performance improvement. To maximize the network sum-rate, the joint optimization of energy beamforming vectors at the HAP, network time scheduling, power allocation at the relays, and relection coefficient at the users is investigated. As the formulated problem is non-convex, we propose an alternating optimization algorithm with the variable substitution and semi-definite relaxation (SDR) techniques to solve it efficiently. Specifically, we prove that the obtained energy beamforming matrices are always rank-one. Numerical results show that compared to the benchmark schemes, the proposed scheme can achieve a significant sum-rate gain.

  • Performance Analysis of Mobile Cellular Networks Accommodating Cellular-IoT Communications with Immediate Release of Radio Resources

    Shuya ABE  Go HASEGAWA  Masayuki MURATA  

     
    PAPER-Network

      Pubricized:
    2022/06/20
      Vol:
    E105-B No:12
      Page(s):
    1477-1486

    It is now becoming important for mobile cellular networks to accommodate all kinds of Internet of Things (IoT) communications. However, the contention-based random access and radio resource allocation used in traditional cellular networks, which are optimized mainly for human communications, cannot efficiently handle large-scale IoT communications. For this reason, standardization activities have emerged to serve IoT devices such as Cellular-IoT (C-IoT). However, few studies have been directed at evaluating the performance of C-IoT communications with periodic data transmissions, despite this being a common characteristic of many IoT communications. In this paper, we give the performance analysis results of mobile cellular networks supporting periodic C-IoT communications, focusing on the performance differences between LTE and Narrowband-IoT (NB-IoT) networks. To achieve this, we first construct an analysis model for end-to-end performance of both the control plane and data plane, including random access procedures, radio resource allocation, establishing bearers in the Evolved Packet Core network, and user-data transmissions. In addition, we include the impact of the immediate release of the radio resources proposed in 3GPP. Numerical evaluations show that NB-IoT can support more IoT devices than LTE, up to 8.7 times more, but imposes a significant delay in data transmissions. We also confirm that the immediate release of radio resources increases the network capacity by up to 17.7 times.

  • 920MHz Path Loss Prediction Formula Based on FDTD Method for IoT Wireless System close to Ceiling with Concrete Beam

    Naotake YAMAMOTO  Taichi SASAKI  Atsushi YAMAMOTO  Tetsuya HISHIKAWA  Kentaro SAITO  Jun-ichi TAKADA  Toshiyuki MAEYAMA  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2022/06/22
      Vol:
    E105-B No:12
      Page(s):
    1540-1547

    A path loss prediction formula for IoT (Internet of Things) wireless communication close to ceiling beams in the 920MHz band is presented. In first step of our investigation, we conduct simulations using the FDTD (Finite Difference Time Domain) method and propagation tests close to a beam on the ceiling of a concrete building. In the second step, we derive a path loss prediction formula from the simulation results by using the FDTD method, by dividing into three regions of LoS (line-of-sight) situation, situation in the vicinity of the beam, and NLoS (non-line-of-sight) situation, depending on the positional relationship between the beam and transmitter (Tx) and receiver (Rx) antennas. For each condition, the prediction formula is expressed by a relatively simple form as a function of height of the antennas with respect to the beam bottom. Thus, the prediction formula is very useful for the wireless site planning for the IoT wireless devices set close to concrete beam ceiling.

  • Performance and Security Evaluation of Table-Based Access Control Applied to IoT Data Distribution Method Open Access

    Masaki YOSHII  Ryohei BANNO  Osamu MIZUNO  

     
    PAPER

      Pubricized:
    2022/05/27
      Vol:
    E105-B No:11
      Page(s):
    1390-1399

    New services can use fog nodes to distribute Internet of Things (IoT) data. To distribute IoT data, we apply the publish/subscribe messaging model to a fog computing system. A service provider assigns a unique identifier, called a Tag ID, to a player who owes data. A Tag ID matches multiple IDs and resolves the naming rule for data acquisition. However, when users configure their fog node and distribute IoT data to multiple players, the distributed data may contain private information. We propose a table-based access control list (ACL) to manage data transmission permissions to address this issue. It is possible to avoid unnecessary transmission of private data by using a table-based ACL. Furthermore, because there are fewer data transmissions, table-based ACL reduces traffic. Consequently, the overall system's average processing delay time can be reduced. The proposed method's performance was confirmed by simulation results. Table-based ACL, particularly, could reduce processing delay time by approximately 25% under certain conditions. We also concentrated on system security. The proposed method was used, and a qualitative evaluation was performed to demonstrate that security is guaranteed.

1-20hit(122hit)