The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] mobile(969hit)

41-60hit(969hit)

  • Congestion-Adaptive and Deadline-Aware Scheduling for Connected Car Services over Mobile Networks Open Access

    Nobuhiko ITOH  Takanori IWAI  Ryogo KUBO  

     
    PAPER-Network

      Pubricized:
    2020/04/21
      Vol:
    E103-B No:10
      Page(s):
    1117-1126

    Road traffic collisions are an extremely serious and often fatal issue. One promising approach to mitigate such collisions is the use of connected car services that share road traffic information obtained from vehicles and cameras over mobile networks. In connected car services, it is important for data chunks to arrive at a destination node within a certain deadline constraint. In this paper, we define a flow from a vehicle (or camera) to the same vehicle (or camera) via an MEC server, as a mission critical (MC) flow, and call a deadline of the MC flow the MC deadline. Our research objective is to achieve a higher arrival ratio within the MC deadline for the MC flow that passes through both the radio uplink and downlink. We previously developed a deadline-aware scheduler with consideration for quality fluctuation (DAS-QF) that considers chunk size and a certain deadline constraint in addition to radio quality and utilizes these to prioritize users such that the deadline constraints are met. However, this DAS-QF does not consider that the congestion levels of evolved NodeB (eNB) differ depending on the eNB location, or that the uplink congestion level differs from the downlink congestion level in the same eNB. Therefore, in the DAS-QF, some data chunks of a MC flow are discarded in the eNB when they exceed either the uplink or downlink deadline in congestion, even if they do not exceed the MC deadline. In this paper, to reduce the eNB packet drop probability due to exceeding either the uplink and downlink deadline, we propose a deadline coordination function (DCF) that adaptively sets each of the uplink and downlink deadlines for the MC flow according to the congestion level of each link. Simulation results show that the DAS-QF with DCF offers higher arrival ratios within the MC deadline compared to DAS-QF on its own

  • Contextual Integrity Based Android Privacy Data Protection System

    Fan WU  He LI  Wenhao FAN  Bihua TANG  Yuanan LIU  

     
    PAPER-Cryptography and Information Security

      Vol:
    E103-A No:7
      Page(s):
    906-916

    Android occupies a very large market share in the field of mobile devices, and quantities of applications are created everyday allowing users to easily use them. However, privacy leaks on Android terminals may result in serious losses to businesses and individuals. Current permission model cannot effectively prevent privacy data leakage. In this paper, we find a way to protect privacy data on Android terminals from the perspective of privacy information propagation by porting the concept of contextual integrity to the realm of privacy protection. We propose a computational model of contextual integrity suiting for Android platform and design a privacy protection system based on the model. The system consists of an online phase and offline phase; the main function of online phase is to computing the value of distribution norm and making privacy decisions, while the main function of offline phase is to create a classification model that can calculate the value of the appropriateness norm. Based on the 6 million permission requests records along with 2.3 million runtime contextual records collected by dynamic analysis, we build the system and verify its feasibility. Experiment shows that the accuracy of offline classifier reaches up to 0.94. The experiment of the overall system feasibility illustrates that 70% location data requests, 84% phone data requests and 46% storage requests etc., violate the contextual integrity.

  • Byzantine-Tolerant Gathering of Mobile Agents in Asynchronous Arbitrary Networks with Authenticated Whiteboards

    Masashi TSUCHIDA  Fukuhito OOSHITA  Michiko INOUE  

     
    PAPER-Dependable Computing

      Pubricized:
    2020/04/15
      Vol:
    E103-D No:7
      Page(s):
    1672-1682

    We propose two algorithms for the gathering of k mobile agents in asynchronous Byzantine environments. For both algorithms, we assume that graph topology is arbitrary, each node is equipped with an authenticated whiteboard, agents have unique IDs, and at most f weakly Byzantine agents exist. Here, a weakly Byzantine agent can make arbitrary behavior except falsifying its ID. Under these assumptions, the first algorithm achieves a gathering without termination detection in O(m+fn) moves per agent (m is the number of edges and n is the number of nodes). The second algorithm achieves a gathering with termination detection in O(m+fn) moves per agent by additionally assuming that agents on the same node are synchronized, $f

  • Detecting Reinforcement Learning-Based Grey Hole Attack in Mobile Wireless Sensor Networks

    Boqi GAO  Takuya MAEKAWA  Daichi AMAGATA  Takahiro HARA  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2019/11/21
      Vol:
    E103-B No:5
      Page(s):
    504-516

    Mobile wireless sensor networks (WSNs) are facing threats from malicious nodes that disturb packet transmissions, leading to poor mobile WSN performance. Existing studies have proposed a number of methods, such as decision tree-based classification methods and reputation based methods, to detect these malicious nodes. These methods assume that the malicious nodes follow only pre-defined attack models and have no learning ability. However, this underestimation of the capability of malicious node is inappropriate due to recent rapid progresses in machine learning technologies. In this study, we design reinforcement learning-based malicious nodes, and define a novel observation space and sparse reward function for the reinforcement learning. We also design an adaptive learning method to detect these smart malicious nodes. We construct a robust classifier, which is frequently updated, to detect these smart malicious nodes. Extensive experiments show that, in contrast to existing attack models, the developed malicious nodes can degrade network performance without being detected. We also investigate the performance of our detection method, and confirm that the method significantly outperforms the state-of-the-art methods in terms of detection accuracy and false detection rate.

  • Auction-Based Resource Allocation for Mobile Edge Computing Networks

    Ben LIU  Ding XU  

     
    LETTER-Communication Theory and Signals

      Vol:
    E103-A No:4
      Page(s):
    718-722

    Mobile edge computing (MEC) is a new computing paradigm, which provides computing support for resource-constrained user equipments (UEs). In this letter, we design an effective incentive framework to encourage MEC operators to provide computing service for UEs. The problem of jointly allocating communication and computing resources to maximize the revenue of MEC operators is studied. Based on auction theory, we design a multi-round iterative auction (MRIA) algorithm to solve the problem. Extensive simulations have been conducted to evaluate the performance of the proposed algorithm and it is shown that the proposed algorithm can significantly improve the overall revenue of MEC operators.

  • Secure Resilient Edge Cloud Designed Network Open Access

    Tarek SAADAWI  Akira KAWAGUCHI  Myung Jong LEE  Abbe MOWSHOWITZ  

     
    INVITED PAPER

      Pubricized:
    2019/10/08
      Vol:
    E103-B No:4
      Page(s):
    292-301

    Systems for Internet of Things (IoT) have generated new requirements in all aspects of their development and deployment, including expanded Quality of Service (QoS) needs, enhanced resiliency of computing and connectivity, and the scalability to support massive numbers of end devices in a variety of applications. The research reported here concerns the development of a reliable and secure IoT/cyber physical system (CPS), providing network support for smart and connected communities, to be realized by means of distributed, secure, resilient Edge Cloud (EC) computing. This distributed EC system will be a network of geographically distributed EC nodes, brokering between end-devices and Backend Cloud (BC) servers. This paper focuses on three main aspects of the CPS: a) resource management in mobile cloud computing; b) information management in dynamic distributed databases; and c) biological-inspired intrusion detection system.

  • Malicious Code Detection for Trusted Execution Environment Based on Paillier Homomorphic Encryption Open Access

    Ziwang WANG  Yi ZHUANG  

     
    PAPER-Fundamental Theories for Communications

      Pubricized:
    2019/09/20
      Vol:
    E103-B No:3
      Page(s):
    155-166

    Currently, mobile terminals face serious security threats. A Trusted Execution Environment (TEE) which can provide an isolated execution environment for sensitive workloads, is seen as a trusted relay for providing security services for any mobile application. However, mobile TEE's architecture design and implementation strategy are not unbreakable at present. The existing researches lack of detect mechanisms for attack behaviour and malicious software. This paper proposes a Malicious code Detection scheme for Trusted Execution Environment based on Homomorphic Encryption (HE-TEEMD), which is a novel detection mechanism for data and code in the trusted execution environment. HE-TEEMD uses the Paillier additive homomorphic algorithm to implement the signature matching and transmits the ciphertext information generated in the TEE to the normal world for detection by the homomorphism and randomness of the homomorphic encryption ciphertext. An experiment and security analysis proves that our scheme can achieve malicious code detection in the secure world with minimal cost. Furthermore, evaluation parameters are introduced to address the known plaintext attack problem of privileged users.

  • A Survey on Mobile Malware Detection Techniques

    Vasileios KOULIARIDIS  Konstantia BARMPATSALOU  Georgios KAMBOURAKIS  Shuhong CHEN  

     
    INVITED PAPER

      Pubricized:
    2019/11/27
      Vol:
    E103-D No:2
      Page(s):
    204-211

    Modern mobile devices are equipped with a variety of tools and services, and handle increasing amounts of sensitive information. In the same trend, the number of vulnerabilities exploiting mobile devices are also augmented on a daily basis and, undoubtedly, popular mobile platforms, such as Android and iOS, represent an alluring target for malware writers. While researchers strive to find alternative detection approaches to fight against mobile malware, recent reports exhibit an alarming increase in mobile malware exploiting victims to create revenues, climbing towards a billion-dollar industry. Current approaches to mobile malware analysis and detection cannot always keep up with future malware sophistication [2],[4]. The aim of this work is to provide a structured and comprehensive overview of the latest research on mobile malware detection techniques and pinpoint their benefits and limitations.

  • Study on the Vulnerabilities of Free and Paid Mobile Apps Associated with Software Library

    Takuya WATANABE  Mitsuaki AKIYAMA  Fumihiro KANEI  Eitaro SHIOJI  Yuta TAKATA  Bo SUN  Yuta ISHII  Toshiki SHIBAHARA  Takeshi YAGI  Tatsuya MORI  

     
    PAPER-Network Security

      Pubricized:
    2019/11/22
      Vol:
    E103-D No:2
      Page(s):
    276-291

    This paper reports a large-scale study that aims to understand how mobile application (app) vulnerabilities are associated with software libraries. We analyze both free and paid apps. Studying paid apps was quite meaningful because it helped us understand how differences in app development/maintenance affect the vulnerabilities associated with libraries. We analyzed 30k free and paid apps collected from the official Android marketplace. Our extensive analyses revealed that approximately 70%/50% of vulnerabilities of free/paid apps stem from software libraries, particularly from third-party libraries. Somewhat paradoxically, we found that more expensive/popular paid apps tend to have more vulnerabilities. This comes from the fact that more expensive/popular paid apps tend to have more functionality, i.e., more code and libraries, which increases the probability of vulnerabilities. Based on our findings, we provide suggestions to stakeholders of mobile app distribution ecosystems.

  • Simulation Study of Low-Latency Network Model with Orchestrator in MEC Open Access

    Krittin INTHARAWIJITR  Katsuyoshi IIDA  Hiroyuki KOGA  Katsunori YAMAOKA  

     
    PAPER-Network

      Pubricized:
    2019/05/16
      Vol:
    E102-B No:11
      Page(s):
    2139-2150

    Most of latency-sensitive mobile applications depend on computational resources provided by a cloud computing service. The problem of relying on cloud computing is that, sometimes, the physical locations of cloud servers are distant from mobile users and the communication latency is long. As a result, the concept of distributed cloud service, called mobile edge computing (MEC), is being introduced in the 5G network. However, MEC can reduce only the communication latency. The computing latency in MEC must also be considered to satisfy the required total latency of services. In this research, we study the impact of both latencies in MEC architecture with regard to latency-sensitive services. We also consider a centralized model, in which we use a controller to manage flows between users and mobile edge resources to analyze MEC in a practical architecture. Simulations show that the interval and controller latency trigger some blocking and error in the system. However, the permissive system which relaxes latency constraints and chooses an edge server by the lowest total latency can improve the system performance impressively.

  • High Efficiency Class-E and Compact Doherty Power Amplifiers with Novel Harmonics Termination for Handset Applications

    Tsuyoshi SUGIURA  Satoshi FURUTA  Tadamasa MURAKAMI  Koki TANJI  Norihisa OTANI  Toshihiko YOSHIMASU  

     
    PAPER

      Vol:
    E102-C No:10
      Page(s):
    699-706

    This paper presents high efficiency Class-E and compact Doherty power amplifiers (PAs) with novel harmonics termination for handset applications using a GaAs/InGaP heterojunction bipolar transistor (HBT) process. The novel harmonics termination circuit effectively reduces the insertion loss of the matching circuit, allowing a device with a compact size. The Doherty PA uses a lumped-element transformer which consists of metal-insulator-metal (MIM) capacitors on an IC substrate, a bonding-wire inductor and short micro-strip lines on a printed circuit board (PCB). The fabricated Class-E PA exhibits a power added efficiency (PAE) as high as 69.0% at 1.95GHz and as high as 67.6% at 2.535GHz. The fabricated Doherty PA exhibits an average output power of 25.5dBm and a PAE as high as 50.1% under a 10-MHz band width quadrature phase shift keying (QPSK) 6.16-dB peak-to-average-power-ratio (PAPR) LTE signal at 1.95GHz. The fabricated chip size is smaller than 1mm2. The input and output Doherty transformer areas are 0.5mm by 1.0mm and 0.7mm by 0.7mm, respectively.

  • Multi-Autonomous Robot Enhanced Ad-Hoc Network under Uncertain and Vulnerable Environment Open Access

    Ming FENG  Lijun QIAN  Hao XU  

     
    INVITED PAPER

      Pubricized:
    2019/04/26
      Vol:
    E102-B No:10
      Page(s):
    1925-1932

    This paper studies the problem of real-time routing in a multi-autonomous robot enhanced network at uncertain and vulnerable tactical edge. Recent network protocols, such as opportunistic mobile network routing protocols, engaged social network in communication network that can increase the interoperability by using social mobility and opportunistic carry and forward routing algorithms. However, in practical harsh environment such as a battlefield, the uncertainty of social mobility and complexity of vulnerable environment due to unpredictable physical and cyber-attacks from enemy, would seriously affect the effectiveness and practicality of these emerging network protocols. This paper presents a GT-SaRE-MANET (Game Theoretic Situation-aware Robot Enhanced Mobile Ad-hoc Network) routing protocol that adopt the online reinforcement learning technique to supervise the mobility of multi-robots as well as handle the uncertainty and potential physical and cyber attack at tactical edge. Firstly, a set of game theoretic mission oriented metrics has been introduced to describe the interrelation among network quality, multi-robot mobility as well as potential attacking activities. Then, a distributed multi-agent game theoretic reinforcement learning algorithm has been developed. It will not only optimize GT-SaRE-MANET routing protocol and the mobility of multi-robots online, but also effectively avoid the physical and/or cyber-attacks from enemy by using the game theoretic mission oriented metrics. The effectiveness of proposed design has been demonstrated through computer aided simulations and hardware experiments.

  • APS: Audience Presentation System Using Mobile Devices Open Access

    Haeyoung LEE  

     
    LETTER-Educational Technology

      Pubricized:
    2019/06/04
      Vol:
    E102-D No:9
      Page(s):
    1887-1889

    It is not easy for a student to present a question or comment to the lecturer and other students in large classes. This paper introduces a new audience presentation system (APS), which creates slide presentations of students' mobile responses in the classroom. Experimental surveys demonstrate the utility of this APS for classroom interactivity.

  • Recent Activities of 5G Experimental Trials on Massive MIMO Technologies and 5G System Trials Toward New Services Creation Open Access

    Yukihiko OKUMURA  Satoshi SUYAMA  Jun MASHINO  Kazushi MURAOKA  

     
    INVITED PAPER

      Pubricized:
    2019/02/22
      Vol:
    E102-B No:8
      Page(s):
    1352-1362

    In order to cope with recent growth of mobile data traffic and emerging various services, world-wide system trials for the fifth-generation (5G) mobile communication system that dramatically extends capability of the fourth-generation mobile communication system are being performed to launch its commercial service in 2020. In addition, research and development of new radio access technologies for 5G evolution and beyond 5G systems are beginning to be made all over the world. This paper introduces our recent activities on 5G transmission experiments that aim to validate Massive MIMO technologies using higher frequency bands such as SHF/EHF bands, that is, 5G experimental trials. Recent results of 5G system trials to create new services and applications in 5G era in cooperation with partners in vertical industries are also introduced.

  • Heterogeneous Delay Tomography for Wide-Area Mobile Networks Open Access

    Hideaki KINSHO  Rie TAGYO  Daisuke IKEGAMI  Takahiro MATSUDA  Jun OKAMOTO  Tetsuya TAKINE  

     
    PAPER-Network

      Pubricized:
    2019/02/06
      Vol:
    E102-B No:8
      Page(s):
    1607-1616

    In this paper, we consider network monitoring techniques to estimate communication qualities in wide-area mobile networks, where an enormous number of heterogeneous components such as base stations, routers, and servers are deployed. We assume that average delays of neighboring base stations are comparable, most of servers have small delays, and delays at core routers are negligible. Under these assumptions, we propose Heterogeneous Delay Tomography (HDT) to estimate the average delay at each network component from end-to-end round trip times (RTTs) between mobile terminals and servers. HDT employs a crowdsourcing approach to collecting RTTs, where voluntary mobile users report their empirical RTTs to a data collection center. From the collected RTTs, HDT estimates average delays at base stations in the Graph Fourier Transform (GFT) domain and average delays at servers, by means of Compressed Sensing (CS). In the crowdsourcing approach, the performance of HDT may be degraded when the voluntary mobile users are unevenly distributed. To resolve this problem, we further extend HDT by considering the number of voluntary mobile users. With simulation experiments, we evaluate the performance of HDT.

  • Performance Analysis of Fiber-Optic Relaying with Simultaneous Transmission and Reception on the Same Carrier Frequency Open Access

    Hiroki UTATSU  Hiroyuki OTSUKA  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2019/02/20
      Vol:
    E102-B No:8
      Page(s):
    1771-1780

    Denser infrastructures can reduce terminal-to-infrastructure distance and thus improve the link budget in mobile communication systems. One such infrastructure, relaying can reduce the distance between the donor evolved node B (eNB) and user equipment (UE). However, conventional relaying suffers from geographical constraints, i.e., installation site, and difficulty in simultaneous transmission and reception on the same carrier frequency. Therefore, we propose a new type of fiber-optic relaying in which the antenna facing the eNB is geographically separated from the antenna facing the UE, and the two antennas are connected by an optical fiber. This structure aims to extend coverage to heavily shadowed areas. Our primary objective is to establish a design method for the proposed fiber-optic relaying in the presence of self-interference, which is the interference between the backhaul and access links, when the backhaul and access links simultaneously operate on the same carrier frequency. In this paper, we present the performance of the fiber-optic relaying in the presence of intra- and inter-cell interferences as well as self-interference. The theoretical desired-to-undesired-signal ratio for both uplink and downlink is investigated as parameters of the optical fiber length. We demonstrate the possibility of fiber-optic relaying with simultaneous transmission and reception on the same carrier frequency for the backhaul and access links. We validate the design method for the proposed fiber-optic relay system using these results.

  • MocLis: A Moving Cell Support Protocol Based on Locator/ID Split for 5G System

    Takamasa OCHIAI  Kohei MATSUEDA  Takao KONDO  Hiroaki TAKANO  Ryota KIMURA  Ryo SAWAI  Fumio TERAOKA  

     
    PAPER-Network

      Pubricized:
    2019/02/20
      Vol:
    E102-B No:8
      Page(s):
    1649-1659

    In LTE (Long Term Evolution) / LTE-Advanced (LTE-A) system, the user-plane for a user equipment (UE) is provided by tunneling, which increases header overhead, processing overhead, and management overhead. In addition, the LTE-A system does not support moving cells which are composed of a mobile Relay Node (RN) and UEs attached to the mobile RN. Although there are several proposals for moving cells in the LTE-A system and the 5G system, all of them rely on tunneling for the user-plane, which means that none of them avoid the tunneling overheads. This paper proposes MocLis, a moving cell support protocol based on a Locator/ID split approach. MocLis does not use tunneling. Nested moving cells are supported. Signaling cost for handover of a moving cell is independent of the number of UEs and nested RNs in the moving cell. A MocLis prototype, implemented in Linux, includes user space daemons and modified kernel. Measurements show that the attachment time and handover time are short enough for practical use. MocLis has higher TCP throughput than the tunneling based approaches.

  • Information Dissemination Using MANET for Disaster Evacuation Support Open Access

    Tomoyuki OHTA  Masahiro NISHI  Toshikazu TERAMI  Yoshiaki KAKUDA  

     
    INVITED PAPER

      Pubricized:
    2018/10/15
      Vol:
    E102-B No:4
      Page(s):
    670-678

    To minimize the damage caused by landslides resulting from torrential rain, residents must quickly evacuate to a place of refuge. To make the decision to evacuate, residents must be able to collect and share disaster information. Firstly, this paper introduces the Grass-roots Information Distribution System and a fixed type monitoring system which our research group has been developing. The fixed type monitoring system is deployed at the location of apparent danger, whereas the Grass-roots Information Distribution System distributes disaster information acquired from the fixed type monitoring system through a mobile ad hoc network (MANET) to residents. The MANET is configured using mobile terminals of residents. Next, in this paper, an information dissemination scheme utilizing a MANET and cellular networks to communicate among mobile terminals is proposed and simulated in the area where our research group has been deploying the distribution system. The MANET topology and information distribution obtained from the simulation results for further field experiments are then discussed.

  • A Highly Accurate Transportation Mode Recognition Using Mobile Communication Quality

    Wataru KAWAKAMI  Kenji KANAI  Bo WEI  Jiro KATTO  

     
    PAPER

      Pubricized:
    2018/10/15
      Vol:
    E102-B No:4
      Page(s):
    741-750

    To recognize transportation modes without any additional sensor devices, we demonstrate that the transportation modes can be recognized from communication quality factors. In the demonstration, instead of using global positioning system (GPS) and accelerometer sensors, we collect mobile TCP throughputs, received-signal strength indicators (RSSIs), and cellular base-station IDs (Cell IDs) through in-line network measurement when the user enjoys mobile services, such as video streaming. In accuracy evaluations, we conduct two different field experiments to collect the data in six typical transportation modes (static, walking, riding a bicycle, riding a bus, riding a train and riding a subway), and then construct the classifiers by applying a support-vector machine (SVM), k-nearest neighbor (k-NN), random forest (RF), and convolutional neural network (CNN). Our results show that these transportation modes can be recognized with high accuracy by using communication quality factors as well as the use of accelerometer sensors.

  • Design and Feasibility Study: Customized Virtual Buttons for Electronic Mobile Devices

    Seungtaek SONG  Namhyun KIM  Sungkil LEE  Joyce Jiyoung WHANG  Jinkyu LEE  

     
    LETTER-Algorithms and Data Structures

      Vol:
    E102-A No:4
      Page(s):
    668-671

    Smartphone users often want to customize the positions and functions of physical buttons to accommodate their own usage patterns; however, this is unfeasible for electronic mobile devices based on COTS (Commercial Off-The-Shelf) due to high production costs and hardware design constraints. In this letter, we present the design and implementation of customized virtual buttons that are localized using only common built-in sensors of electronic mobile devices. We develop sophisticated strategies firstly to detect when a user taps one of the virtual buttons, and secondly to locate the position of the tapped virtual button. The virtual-button scheme is implemented and demonstrated in a COTS-based smartphone. The feasibility study shows that, with up to nine virtual buttons on five different sides of the smartphone, the proposed virtual buttons can operate with greater than 90% accuracy.

41-60hit(969hit)