The search functionality is under construction.

Keyword Search Result

[Keyword] IoT(122hit)

61-80hit(122hit)

  • Assessing Lightweight Virtualization for Security-as-a-Service at the Network Edge Open Access

    Abderrahmane BOUDI  Ivan FARRIS  Miloud BAGAA  Tarik TALEB  

     
    INVITED PAPER

      Pubricized:
    2018/11/22
      Vol:
    E102-B No:5
      Page(s):
    970-977

    Accounting for the exponential increase in security threats, the development of new defense strategies for pervasive environments is acquiring an ever-growing importance. The expected avalanche of heterogeneous IoT devices which will populate our industrial factories and smart houses will increase the complexity of managing security requirements in a comprehensive way. To this aim, cloud-based security services are gaining notable impetus to provide security mechanisms according to Security-as-a-Service (SECaaS) model. However, the deployment of security applications in remote cloud data-centers can introduce several drawbacks in terms of traffic overhead and latency increase. To cope with this, Edge Computing can provide remarkable advantages avoiding long routing detours. On the other hand, the limited capabilities of edge node introduce potential constraints in the overall management. This paper focuses on the provisioning of virtualized security services in resource-constrained edge nodes by leveraging lightweight virtualization technologies. Our analysis aims at shedding light on the feasibility of container-based security solutions, thus providing useful guidelines towards the orchestration of security at the edge. Our experiments show that the overhead introduced by the containerization is very light.

  • Numerical Channel Characterizations for Liver-Implanted Communications Considering Different Human Subjects

    Pongphan LEELATIEN  Koichi ITO  Kazuyuki SAITO  Manmohan SHARMA  Akram ALOMAINY  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/10/22
      Vol:
    E102-B No:4
      Page(s):
    876-883

    This paper presents a numerical study of the wireless channel characteristics of liver implants in a frequency range of 4.5-6.5GHz, considering different digital human phantoms by employing two inhomogeneous male and female models. Path loss data for in-body to on-body and in-body to off-body communication scenarios are provided. The influence of respiration-induced organ movement on signal attenuation is demonstrated. A narrower range of attenuation deviation is observed in the female model as compared to the male model. The path loss data in the female body is between 40-80dB which is around 5-10dB lower than the male model. Path loss data for the in-body to off-body scenario in both models suggest that in-body propagation is the main component of total path loss in the channel. The results demonstrate that channel characteristics are subject dependent, and thus indicate the need to take subject dependencies into consideration when investigating in-body communication channels.

  • Privacy-Aware Human-Detection and Tracking System Using Biological Signals Open Access

    Toshihiro KITAJIMA  Edwardo Arata Y. MURAKAMI  Shunsuke YOSHIMOTO  Yoshihiro KURODA  Osamu OSHIRO  

     
    PAPER

      Pubricized:
    2018/10/15
      Vol:
    E102-B No:4
      Page(s):
    708-721

    The arrival of the era of the Internet of Things (IoT) has ensured the ubiquity of human-sensing technologies. Cameras have become inexpensive instruments for human sensing and have been increasingly used for this purpose. Because cameras produce large quantities of information, they are powerful tools for sensing; however, because camera images contain information allowing individuals to be personally identified, their use poses risks of personal privacy violations. In addition, because IoT-ready home appliances are connected to the Internet, camera-captured images of individual users may be unintentionally leaked. In developing our human-detection method [33], [34], we proposed techniques for detecting humans from unclear images in which individuals cannot be identified; however, a drawback of this method was its inability to detect moving humans. Thus, to enable tracking of humans even through the images are blurred to protect privacy, we introduce a particle-filter framework and propose a human-tracking method based on motion detection and heart-rate detection. We also show how the use of integral images [32] can accelerate the execution of our algorithms. In performance tests involving unclear images, the proposed method yields results superior to those obtained with the existing mean-shift method or with a face-detection method based on Haar-like features. We confirm the acceleration afforded by the use of integral images and show that the speed of our method is sufficient to enable real-time operation. Moreover, we demonstrate that the proposed method allows successful tracking even in cases where the posture of the individual changes, such as when the person lies down, a situation that arises in real-world usage environments. We discuss the reasons behind the superior behavior of our method in performance tests compared to those of other methods.

  • Low-Profile Supergain Antenna Composed of Asymmetric Dipole Elements Backed by Planar Reflector for IoT Applications Open Access

    Suguru KOJIMA  Takuji ARIMA  Toru UNO  

     
    PAPER-Antennas and Propagation

      Pubricized:
    2018/10/15
      Vol:
    E102-B No:4
      Page(s):
    884-890

    This paper proposes a low-profile unidirectional supergain antenna applicable to wireless communication devices such as mobile terminals, the Internet of Things and so on. The antennas used for such systems are required to be not only electrically low-profile but also unsusceptible to surrounding objects such as human body and/or electrical equipment. The proposed antenna achieves both requirements due to its supergain property using planar elements and a closely placed planar reflector. The primary antenna is an asymmetric dipole type, and consists of a monopole element mounted on an edge of a rectangular conducting plane. Both elements are placed on a dielectric substrate backed by the planar reflector. It is numerically and experimentally shown that the supergain property is achieved by optimizing the geometrical parameters of the antenna. It is also shown that the impedance characteristics can be successfully adjusted by changing the lengths of the ground plane element and the monopole element. Thus, no additional impedance matching circuit is necessary. Furthermore, it is shown that surrounding objects have insignificant impact on the antenna performance.

  • Design and Calibration of a Small-Footprint, Low-Frequency, and Low-Power Gate Leakage Timer Using Differential Leakage Technique Open Access

    Yuya NISHIO  Atsuki KOBAYASHI  Kiichi NIITSU  

     
    PAPER

      Vol:
    E102-C No:4
      Page(s):
    269-275

    This study proposes a design and calibration method for a small-footprint, low-frequency, and low-power gate leakage timer using a differential leakage technique for IoT applications. The proposed gate leakage timer is different from conventional ones because it is composed of two leakage sources and exploits differential leakage current for the charging capacitor. This solution alleviates the inherent trade-off between small-footprint and low-frequency in the conventional gate leakage timer. Furthermore, a calibration method to suppress variations of the output frequency is proposed in this paper. To verify the effectiveness of the proposed gate leakage timer, a test chip was fabricated using 55-nm-DDC-CMOS technology. The test chip successfully demonstrates the highest figure of merit (FoM) of the product of the capacitor area (0.072µm2) and output frequency (0.11Hz), which corresponds to an improvement by a factor of 2,121 compared to the conventional one. It also demonstrates the operation with 4.5pW power consumption. The total footprint can be reduced to be 28µm2, which enables low-cost and low-power IoT edges. The scaling scenario shows that the proposed technique is conducive to technology scaling.

  • A MAC Address Routing VPN Architecture for Connecting Non-IP Wireless Sensor Networks to Data Centers

    Hiroaki HATA  

     
    PAPER

      Pubricized:
    2018/10/15
      Vol:
    E102-B No:4
      Page(s):
    690-698

    Most wireless networks are specified as using the data link protocol, i.e. layer 2 (L2). Recently, IoT and big data processing have promoted the use of wireless sensor networks to connect and send data to data center applications over the Internet. To do so, the implementation of an IP stack on the wireless node, or the gateway of the IP and wireless L2 network, has been proposed. Both approaches were developed to allow applications on the IP network to access L2 wireless network nodes. However, since wireless sensor networks do not require any network protocol, an IP is not essential for collecting data. Therefore, we propose a novel bridging VPN for connecting wireless networks, in which the application and wireless end nodes are not required to acknowledge an IP address or network protocol. In this way, the IP network merely serves to transport the data link frames of wireless networks. We believe that this is another style of IoT and recommend that this VPN be used as a test bed for small IoT businesses and institutions before they start to implement an IP stack on their systems.

  • A Deadline-Aware Scheduling Scheme for Connected Car Services Using Mobile Networks with Quality Fluctuation Open Access

    Nobuhiko ITOH  Motoki MORITA  Takanori IWAI  Kozo SATODA  Ryogo KUBO  

     
    PAPER

      Pubricized:
    2018/09/20
      Vol:
    E102-B No:3
      Page(s):
    474-483

    Traffic collision is an extremely serious issue in the world today. The World Health Organization (WHO) reported the number of road traffic deaths globally has plateaued at 1.25 million a year. In an attempt to decrease the occurrence of such traffic collisions, various driving systems for detecting pedestrians and vehicles have been proposed, but they are inadequate as they cannot detect vehicles and pedestrians in blind places such as sharp bends and blind intersections. Therefore, mobile networks such as long term evolution (LTE), LTE-Advanced, and 5G networks are attracting a great deal of attention as platforms for connected car services. Such platforms enable individual devices such as vehicles, drones, and sensors to exchange real-time information (e.g., location information) with each other. To guarantee effective connected car services, it is important to deliver a data block within a certain maximum tolerable delay (called a deadline in this work). The Third Generation Partnership Project (3GPP) stipulates that this deadline be 100 ms and that the arrival ratio within the deadline be 0.95. We investigated an intersection at which vehicle collisions often occur to evaluate a realistic environment and found that schedulers such as proportional fairness (PF) and payload-size and deadline-aware (PayDA) cannot satisfy the deadline and arrival ratio within the deadline, especially as network loads increase. They fail because they do not consider three key elements — radio quality, chunk size, and the deadline — when radio resources are allocated. In this paper, we propose a deadline-aware scheduling scheme that considers chunk size and the deadline in addition to radio quality and uses them to prioritize users in order to meet the deadline. The results of a simulation on ns-3 showed that the proposed method can achieve approximately four times the number of vehicles satisfying network requirements compared to PayDA.

  • Program File Placement Problem for Machine-to-Machine Service Network Platform Open Access

    Takehiro SATO  Eiji OKI  

     
    PAPER

      Pubricized:
    2018/09/20
      Vol:
    E102-B No:3
      Page(s):
    418-428

    The Machine-to-Machine (M2M) service network platform accommodates M2M communications traffic efficiently by using tree-structured networks and the computation resources deployed on network nodes. In the M2M service network platform, program files required for controlling devices are placed on network nodes, which have different amounts of computation resources according to their position in the hierarchy. The program files must be dynamically repositioned in response to service quality requests from each device, such as computation power, link bandwidth, and latency. This paper proposes a Program File Placement (PFP) method for the M2M service network platform. First, the PFP problem is formulated in the Mixed-Integer Linear Programming (MILP) approach. We prove that the decision version of the PFP problem is NP-complete. Next, we present heuristic algorithms that attain sub-optimal but attractive solutions. Evaluations show that the heuristic algorithm based on the number of devices that share a program file reduces the total number of placed program files compared to the algorithm that moves program files based on their position.

  • Design Exploration of SHA-3 ASIP for IoT on a 32-bit RISC-V Processor

    Jinli RAO  Tianyong AO  Shu XU  Kui DAI  Xuecheng ZOU  

     
    PAPER-Cryptographic Techniques

      Pubricized:
    2018/08/22
      Vol:
    E101-D No:11
      Page(s):
    2698-2705

    Data integrity is a key metric of security for Internet of Things (IoT) which refers to accuracy and reliability of data during transmission, storage and retrieval. Cryptographic hash functions are common means used for data integrity verification. Newly announced SHA-3 is the next generation hash function standard to replace existing SHA-1 and SHA-2 standards for better security. However, its underlying Keccak algorithm is computation intensive and thus limits its deployment on IoT systems which are normally equipped with 32-bit resource constrained embedded processors. This paper proposes two efficient SHA-3 ASIPs based on an open 32-bit RISC-V embedded processor named Z-scale. The first operation-oriented ASIP (OASIP) focuses on accelerating time-consuming operations with instruction set extensions to improve resource efficiency. And next datapath-oriented ASIP (DASIP) targets exploiting advance data and instruction level parallelism with extended auxiliary registers and customized datapath to achieve high performance. Implementation results show that both proposed ASIPs can effectively accelerate SHA-3 algorithm with 14.6% and 26.9% code size reductions, 30% and 87% resource efficiency improvements, 71% and 262% better maximum throughputs as well as 40% and 288% better power efficiencies than reference design. This work makes SHA-3 algorithm integration practical for both low-cost and high-performance IoT systems.

  • Queueing Delay Analysis and Optimization of Statistical Data Aggregation and Transmission Systems

    Hideaki YOSHINO  Kenko OTA  Takefumi HIRAGURI  

     
    PAPER-Network

      Pubricized:
    2018/04/02
      Vol:
    E101-B No:10
      Page(s):
    2186-2195

    Data aggregation, which is the process of summarizing a large amount of data, is an effective method for saving limited communication resources, such as radio frequency and sensor-node energy. Packet aggregation in wireless LAN and sensed-data aggregation in wireless sensor networks are typical examples. We propose and analyze two queueing models of fundamental statistical data aggregation schemes: constant interval and constant aggregation number. We represent each aggregation scheme by a tandem queueing network model with a gate at the aggregation process and a single server queue at a transmission process. We analytically derive the stationary distribution and Laplace-Stieltjes transform of the system time for each aggregation and transmission process and of the total system time. We then numerically evaluate the stationary mean system time characteristics and clarify that each model has an optimal aggregation parameter (i.e., an optimal aggregation interval or optimal aggregation number), that minimizes the mean total system time. In addition, we derive the explicit optimal aggregation parameter for a D/M/1 transmission model with each aggregation scheme and clarify that it provides accurate approximation of that of each aggregation model. The optimal aggregation interval was determined by the transmission rate alone, while the optimal aggregation number was determined by the arrival and transmission rates alone with explicitly derived proportional constants. These results can provide a theoretical basis and a guideline for designing aggregation devices, such as IoT gateways.

  • Underground Infrastructure Management System using Internet of Things Wireless Transmission Technology Open Access

    Yo YAMAGUCHI  Yosuke FUJINO  Hajime KATSUDA  Marina NAKANO  Hiroyuki FUKUMOTO  Shigeru TERUHI  Kazunori AKABANE  Shuichi YOSHINO  

     
    INVITED PAPER

      Vol:
    E101-C No:10
      Page(s):
    727-733

    This paper presents a water leakage monitoring system that gathers acoustic data of water pipes using wireless communication technology and identifies the sound of water leakage using machine leaning technology. To collect acoustic data effectively, this system combines three types of data-collection methods: drive-by, walk-by, and static. To design this system, it is important to ascertain the wireless communication distance that can be achieved with sensors installed in a basement. This paper also reports on radio propagation from underground manholes made from reinforced concrete and resin concrete in residential and commercial areas using the 920 MHz band. We reveal that it is possible to design a practical system that uses radio communication from underground sensors.

  • Facilitating Dynamic RT-QoS for Massive-Scale Autonomous Cyber-Physical Systems Open Access

    David W. McKEE  Xue OUYANG  Jie XU  

     
    INVITED PAPER

      Pubricized:
    2018/02/22
      Vol:
    E101-B No:8
      Page(s):
    1760-1767

    With the evolution of autonomous distributed systems such as smart cities, autonomous vehicles, smart control and scheduling systems there is an increased need for approaches to manage the execution of services to deliver real-time performance. As Cloud-hosted services are increasingly used to provide intelligence and analytic functionality to Internet of Things (IoT) systems, Quality of Service (QoS) techniques must be used to guarantee the timely service delivery. This paper reviews state-of-the-art QoS and Cloud techniques for real-time service delivery and data analysis. A review of straggler mitigation and a classification of real-time QoS techniques is provided. Then a mathematical framework is presented capturing the relationship between the host execution environment and the executing service allowing the response-times to predicted throughout execution. The framework is shown experimentally to reduce the number of QoS violations by 21% and provides alerts during the first 14ms provide alerts for 94% of future violations.

  • A Hardware-Based Caching System on FPGA NIC for Blockchain

    Yuma SAKAKIBARA  Shin MORISHIMA  Kohei NAKAMURA  Hiroki MATSUTANI  

     
    PAPER-Computer System

      Pubricized:
    2018/02/02
      Vol:
    E101-D No:5
      Page(s):
    1350-1360

    Engineers and researchers have recently paid attention to Blockchain. Blockchain is a fault-tolerant distributed ledger without administrators. Blockchain is originally derived from cryptocurrency, but it is possible to be applied to other industries. Transferring digital asset is called a transaction. Blockchain holds all transactions, so the total amount of Blockchain data will increase as time proceeds. On the other hand, the number of Internet of Things (IoT) products has been increasing. It is difficult for IoT products to hold all Blockchain data because of their storage capacity. Therefore, they access Blockchain data via servers that have Blockchain data. However, if a lot of IoT products access Blockchain network via servers, server overloads will occur. Thus, it is useful to reduce workloads and improve throughput. In this paper, we propose a caching technique using a Field Programmable Gate Array-based (FPGA) Network Interface Card (NIC) which possesses four 10Gigabit Ethernet (10GbE) interfaces. The proposed system can reduce server overloads, because the FPGA NIC instead of the server responds to requests from IoT products if cache hits. We implemented the proposed hardware cache to achieve high throughput on NetFPGA-10G board. We counted the number of requests that the server or the FPGA NIC processed as an evaluation. As a result, the throughput improved by on average 1.97 times when hitting the cache.

  • Smart Farm: Applying the Use of NodeMCU, IOT, NETPIE and LINE API for a Lingzhi Mushroom Farm in Thailand Open Access

    Ekkarat BOONCHIENG  Oran CHIEOCHAN  Anukit SAOKAEW  

     
    INVITED PAPER

      Pubricized:
    2017/07/05
      Vol:
    E101-B No:1
      Page(s):
    16-23

    This research aims to find the best practice of prototyping a smart Lingzhi mushroom farm in Thailand. This research applied the use of NodeMCU with a humidity sensor and IOT platform to measure and monitor the humidity in the Lingzhi mushroom farm. The humidity data proceeds through NETPIE was developed and provided by NECTEC, Thailand as a free service for IOT. The humidity data was stored into a NET FEED (a sub service from NETPIE) and displayed on mobile devices and computers through NET FREEBOARD (another sub service of NETPIE). This technology also automatically controlled the sprinkler, fog pumps, and the functional status (switching on and off periodically) of push notifications through LINE API on the LINE Application. The equipment and tools used in this research were NodeMCU, humidity sensor, RTC (real time clock), relay module, sprinkler and fog pumps. C++ and Node.JS were used for programming. The services and protocol used were NETPIE (Network Platform for internet of everything) with subservices such as NETPIE FEED, NETPIE FREEBOARD, and NETPIE REST API. The LINE API was also included. The results of the research show that using NodeMCU with the humidity sensor and IOT platform demonstrates the best practice of smart farming.

  • Robustness Evaluation of Restricted Boltzmann Machine against Memory and Logic Error

    Yasushi FUKUDA  Zule XU  Takayuki KAWAHARA  

     
    BRIEF PAPER-Integrated Electronics

      Vol:
    E100-C No:12
      Page(s):
    1118-1121

    In an IoT system, neural networks have the potential to perform advanced information processing in various environments. To clarify this, the robustness of a restricted Boltzmann machine (RBM) used for deep neural networks, such as a deep belief network (DBN), was studied in this paper. Even if memory or logic errors occurred in the circuit operating in the RBM while pre-training the DBN, they did not affect the identification rate of the DBN, showing the robustness of the RBM. In addition, robustness against soft errors was evaluated. The soft errors had almost no influence on the RBM unless they were as large as 1012 times or more in the 50-nm CMOS process.

  • Relay Mobile Device Discovery with Proximity Services for User-Provided IoT Networks

    Masanori ISHINO  Yuki KOIZUMI  Toru HASEGAWA  

     
    PAPER-Network

      Pubricized:
    2017/05/19
      Vol:
    E100-B No:11
      Page(s):
    2038-2048

    Internet of Things (IoT) devices deployed in urban areas are seen as data sources for urban sensing IoT applications. Since installing cellular interfaces on a huge number of IoT devices is expensive, we propose to use a user equipment (UE) device with a local wireless interface as a mobile IoT gateway for fixed IoT devices. In this paper, we design a new mobile architecture based on cellular networks to accommodate non-cellular fixed IoT devices by UE devices working as IoT gateways. One key feature is that our architecture leverages proximity services (ProSe) to discover relay UE devices with low overhead in terms of discovery messages. Through simulation studies, we clarify the feasibility of our architecture including the relay UE discovery mechanism in urban areas.

  • High-Speed 3-D Electroholographic Movie Playback Using a Digital Micromirror Device Open Access

    Naoki TAKADA  Masato FUJIWARA  ChunWei OOI  Yuki MAEDA  Hirotaka NAKAYAMA  Takashi KAKUE  Tomoyoshi SHIMOBABA  Tomoyoshi ITO  

     
    INVITED PAPER

      Vol:
    E100-C No:11
      Page(s):
    978-983

    This study involves proposing a high-speed computer-generated hologram playback by using a digital micromirror device for high-definition spatiotemporal division multiplexing electroholography. Consequently, the results indicated that the study successfully reconstructed a high-definition 3-D movie of 3-D objects that was comprised of approximately 900,000 points at 60 fps when each frame was divided into twelve parts.

  • Evolution of Millimeter-Wave Multi-Antenna Systems in the IoT Era Open Access

    Kazuaki TAKAHASHI  Hidekuni YOMO  Takashi MATSUOKA  Junji SATO  Yoichi NAKAGAWA  Makoto YASUGI  Masataka IRIE  Naganori SHIRAKATA  Koji TAKINAMI  

     
    INVITED PAPER

      Vol:
    E100-C No:10
      Page(s):
    809-817

    In this paper, we present the roles played by millimeter-waves in the realization of an Internet of Things (IoT) society. Millimeter-waves are becoming essential frequency resources, enabling ultra-high-speed wireless networks supporting massive data traffic and high-resolution sensor devices. Multiple antenna technologies such as phased arrays, sector antennas, and MIMO signal processing are key technologies for putting these into practical use. In this paper, various examples of integration of multi-antenna systems are shown, as well as demonstration on 60GHz-band millimeter-wave wireless access and 79GHz-band high-resolution radar. We also propose applications to ITS for an IoT society, combining millimeter-wave wireless access and radar sensors, and discuss technical issues to be solved in the future.

  • A Smart City Based on Ambient Intelligence Open Access

    Tomoaki OHTSUKI  

     
    INVITED PAPER-Network

      Pubricized:
    2017/03/22
      Vol:
    E100-B No:9
      Page(s):
    1547-1553

    The United Nations (UN) reports that the global population reached 7 billion in 2011, and today, it stands at about 7.3 billion. This dramatic increase has been driven largely by the extension of people's lifetime. The urban population has been also increasing, which causes a lot of issues for cities, such as congestion and increased demand for resources, including energy, water, sanitation, education, and healthcare services. A smart city has been expected a lot to solve those issues. The concept of a smart city is not new. Due to the progress of information and communication technology (ICT), including the Internet of Things (IoT) and big data (BD), the concept of a smart city has been being realized in various aspects. This paper introduces the concept and definition of a smart city. Then it explains the ambient intelligence that supports a smart city. Moreover, it introduces several key components of a smart city.

  • Evolution and Future of Information Networks Open Access

    Tohru ASAMI  Katsunori YAMAOKA  Takuji KISHIDA  

     
    INVITED SURVEY PAPER-Network

      Pubricized:
    2017/03/22
      Vol:
    E100-B No:9
      Page(s):
    1595-1605

    This paper looks at the history of research in the Technical Committee on Information Networks from the time of its inception to the present and provides an overview of the latest research in this area based on the topics discussed in recent meetings of the committee. It also presents possible future developments in the field of information networks.

61-80hit(122hit)