The search functionality is under construction.

Keyword Search Result

[Keyword] resilient(30hit)

1-20hit(30hit)

  • Fault-Resilient Robot Operating System Supporting Rapid Fault Recovery with Node Replication

    Jonghyeok YOU  Heesoo KIM  Kilho LEE  

     
    LETTER-Software System

      Pubricized:
    2023/07/07
      Vol:
    E106-D No:10
      Page(s):
    1742-1746

    This paper proposes a fault-resilient ROS platform supporting rapid fault detection and recovery. The platform employs heartbeat-based fault detection and node replication-based recovery. Our prototype implementation on top of the ROS Melodic shows a great performance in evaluations with a Nvidia development board and an inverted pendulum device.

  • A New Characterization of 2-Resilient Rotation Symmetric Boolean Functions

    Jiao DU  Ziyu CHEN  Le DONG  Tianyin WANG  Shanqi PANG  

     
    LETTER-Cryptography and Information Security

      Pubricized:
    2023/03/09
      Vol:
    E106-A No:9
      Page(s):
    1268-1271

    In this paper, the notion of 2-tuples distribution matrices of the rotation symmetric orbits is proposed, by using the properties of the 2-tuples distribution matrix, a new characterization of 2-resilient rotation symmetric Boolean functions is demonstrated. Based on the new characterization of 2-resilient rotation symmetric Boolean functions, constructions of 2-resilient rotation symmetric Boolean functions (RSBFs) are further studied, and new 2-resilient rotation symmetric Boolean functions with prime variables are constructed.

  • Doppler Resilient Waveforms Design in MIMO Radar via a Generalized Null Space Method

    Li SHEN  Jiahuan WANG  Wei GUO  Rong LUO  

     
    LETTER-Digital Signal Processing

      Pubricized:
    2022/05/23
      Vol:
    E105-A No:11
      Page(s):
    1503-1507

    To mitigate the interference caused by range sidelobes in multiple-input multiple-output (MIMO) radar, we propose a new method to construct Doppler resilient complementary waveforms from complete complementary code (CCC). By jointly designing the transmit pulse train and the receive pulse weights, the range sidelobes can vanish within a specified Doppler interval. In addition, the output signal-to-noise ratio (SNR) is maximized subject to the Doppler resilience constraint. Numerical results show that the designed waveforms have better Doppler resilience than the previous works.

  • A Novel Construction of 2-Resilient Rotation Symmetric Boolean Functions

    Jiao DU  Shaojing FU  Longjiang QU  Chao LI  Tianyin WANG  Shanqi PANG  

     
    PAPER-Cryptography and Information Security

      Pubricized:
    2021/08/03
      Vol:
    E105-A No:2
      Page(s):
    93-99

    In this paper, by using the properties of the cyclic Hadamard matrices of order 4t, an infinite class of (4t-1)-variable 2-resilient rotation symmetric Boolean functions is constructed, and the nonlinearity of the constructed functions are also studied. To the best of our knowledge, this is the first class of direct constructions of 2-resilient rotation symmetric Boolean functions. The spirit of this method is different from the known methods depending on the solutions of an equation system proposed by Du Jiao, et al. Several situations are examined, as the direct corollaries, three classes of (4t-1)-variable 2-resilient rotation symmetric Boolean functions are proposed based on the corresponding sequences, such as m sequences, Legendre sequences, and twin primes sequences respectively.

  • Virtual Vault: A Practical Leakage Resilient Scheme Using Space-Hard Ciphers

    Yuji KOIKE  Takuya HAYASHI  Jun KURIHARA  Takanori ISOBE  

     
    PAPER

      Vol:
    E104-A No:1
      Page(s):
    182-189

    Due to the legal reform on the protection of personal information in US/Japan and the enforcement of the General Data Protection Regulation (GDPR) in Europe, service providers are obliged to more securely manage the sensitive data stored in their server. In order to protect this kind of data, they generally employ a cryptographic encryption scheme and secure key management schemes such as a Hardware Security Module (HSM) and Trusted Platform Module (TPM). In this paper, we take a different approach based on the space-hard cipher. The space-hard cipher has an interesting property called the space hardness. Space hardness guarantees sufficient security against the adversary who gains a part of key data, e.g., 1/4 of key data. Combined with a simple network monitoring technique, we develop a practical leakage resilient scheme Virtual Vault, which is secure against the snapshot adversary who has full access to the memory in the server for a short period. Importantly, Virtual Vault is deployable by only a low-price device for network monitoring, e.g. L2 switch, and software of space-hard ciphers and packet analyzer, while typical solutions require a dedicated hardware for secure key managements such as HSM and TPM. Thus, Virtual Vault is easily added on the existing servers which do not have such dedicated hardware.

  • Data Synchronization Method among Isolated Servers Using Mobile Relays

    Kazuya ANAZAWA  Toshiaki MIYAZAKI  Peng LI  

     
    PAPER-Wireless Communication Technologies

      Pubricized:
    2018/04/04
      Vol:
    E101-B No:10
      Page(s):
    2239-2249

    After large-scale disasters, information sharing among people becomes more important than usual. This, however, is extremely difficult to achieve in disaster zones due to serious damage to the existing network infrastructure, power outages, and high traffic congestion. For the quick provision of alternative networks to serve heavy communication demands after disasters, establishing local area networks (LANs) consisting of portable servers with data storage has been considered as one of the most promising solutions. Based on the established LAN and a data server in each area, people can share many kinds of disaster-related information such as emergency information and supply/demand information via deployed neighboring servers. However, due to the lack of stable Internet connection, these servers are isolated and cannot be synchronized in real time. To enable and guarantee more efficient information sharing across the whole disaster-hit area, data stored on each server should be synchronized without the Internet. Our solution is to propose an intermittent data synchronization scheme that uses moving vehicles as relays to exchange data between isolated servers after disasters. With the objective of maximizing the total number of synchronized high priority data under the capability constraints of mobile relays, we first propose a data allocation scheme (DAS) from a server to a mobile relay. After that, we propose a trajectory planning scheme for the relays which is formulated as a Mixed Integer Linear Fractional Programming (MILFP) problem, and an algorithm to solve it efficiently. Extensive simulations and comparisons with other methods show the superior performance of our proposals.

  • NerveNet Architecture and Its Pilot Test in Shirahama for Resilient Social Infrastructure Open Access

    Masugi INOUE  Yasunori OWADA  

     
    INVITED PAPER-Network

      Pubricized:
    2017/03/22
      Vol:
    E100-B No:9
      Page(s):
    1526-1537

    From past experience of the large-scale cutoff of existing networks as a result of the East Japan Great Earthquake and tsunamis, and from previous research on stabilizing ad hoc networks that lack control mechanisms, we have strengthened the resilience of NerveNet. NerveNet was originally designed and developed as an access network for providing context-aware services with the use of sensors and actuators. Thus, at present, it has the capability to enable resilient information sharing and communications in a region even if access to the Internet is impossible in emergency situations. NerveNet is composed of single or multiple base stations interconnected by a variety of Ethernet-based wired or wireless transmission systems. A network is formed using line, star, tree, or mesh topology. Network and data management works in each base station in a distributed manner, resulting in the resilience of this system. In collaboration with the town of Shirahama in Wakayama prefecture in Japan, we have been conducting a pilot test with the NerveNet testbed. The test includes nine base stations interconnected by 5.6-GHz Wi-Fi and Fixed Wireless Access (FWA), providing tourists and residents with Internet access. In the future, we expect that not only NerveNet but also other novel technologies will contribute to solving social problems and enriching people's lives.

  • Generic Transformation for Signatures in the Continual Leakage Model

    Yuyu WANG  Keisuke TANAKA  

     
    PAPER

      Vol:
    E100-A No:9
      Page(s):
    1857-1869

    In ProvSec 2014, Wang and Tanaka proposed a transformation which converts weakly existentially unforgeable (wEUF) signature schemes into strongly existentially unforgeable (sEUF) ones in the bounded leakage model. To obtain the construction, they combined leakage resilient (LR) chameleon hash functions with the Generalised Boneh-Shen-Waters (GBSW) transformation proposed by Steinfeld, Pieprzyk, and Wang. However, their transformation cannot be used in a more realistic model called continual leakage model since secret keys of LR chameleon hash functions cannot be updated. In this paper, we propose a transformation which can convert wEUF signature schemes into sEUF ones in the continual leakage model. To achieve our goal, we give a new definition of continuous leakage resilient (CLR) chameleon hash function and construct it based on the CLR signature scheme proposed by Malkin, Teranishi, Vahlis, and Yung. Although our CLR chameleon hash functions satisfy the property of strong collision-resistance, due to the existence of the updating algorithm, an adversary may find the kind of collisions such that messages are the same but randomizers are different. Hence, we cannot combine our chameleon hash functions with the GBSW transformation directly, or the sEUF security of the transformed signature schemes cannot be achieved. To solve this problem, we improve the original GBSW transformation by making use of the Groth-Sahai proof system and then combine it with CLR chameleon hash functions.

  • Two Classes of 1-Resilient Prime-Variable Rotation Symmetric Boolean Functions

    Lei SUN  Fang-Wei FU  Xuan GUANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E100-A No:3
      Page(s):
    902-907

    Recent research has shown that the class of rotation symmetric Boolean functions is beneficial to cryptographics. In this paper, for an odd prime p, two sufficient conditions for p-variable rotation symmetric Boolean functions to be 1-resilient are obtained, and then several concrete constructions satisfying the conditions are presented. This is the first time that resilient rotation symmetric Boolean functions have been systematically constructed. In particular, we construct a class of 2-resilient rotation symmetric Boolean functions when p=2m+1 for m ≥ 4. Moreover, several classes of 1-order correlation immune rotation symmetric Boolean functions are also got.

  • Delay Tolerant Network for Disaster Information Transmission in Challenged Network Environment Open Access

    Yoshitaka SHIBATA  Noriki UCHIDA  

     
    INVITED PAPER-Network

      Vol:
    E100-B No:1
      Page(s):
    11-16

    After the East Japan great earthquake on March 11, 2011, many Japanese coastal resident areas were isolated from other because of destruction of information infrastructure, disconnection of communication network and excessive traffic congestion. The undelivered disaster information influenced the speed of evacuation, rescue of injured residents, and sending life-support materials to evacuation shelters. From the experience of such disaster, more robust and resilient networks are strongly required, particularly for preparation of large scale disasters. In this paper, in order to respond to those problems, we introduce Delay Tolerant Network (DTN) for disaster information transmission application in challenged network environment. Message delivery by transport vehicles such as cars between disaster-response headquarter and evacuation shelters in challenged network environment is considered. A improved message delivery method combined with DTN protocols and cognitive wireless network is explained. The computer simulation for the actual rural area in Japan is made to evaluate the performance and effectiveness of proposed method.

  • Performance Improvement of Error-Resilient 3D DWT Video Transmission Using Invertible Codes

    Kotoku OMURA  Shoichiro YAMASAKI  Tomoko K. MATSUSHIMA  Hirokazu TANAKA  Miki HASEYAMA  

     
    PAPER-Video Coding

      Vol:
    E99-A No:12
      Page(s):
    2256-2265

    Many studies have applied the three-dimensional discrete wavelet transform (3D DWT) to video coding. It is known that corruptions of the lowest frequency sub-band (LL) coefficients of 3D DWT severely affect the visual quality of video. Recently, we proposed an error resilient 3D DWT video coding method (the conventional method) that employs dispersive grouping and an error concealment (EC). The EC scheme of our conventional method adopts a replacement technique of the lost LL coefficients. In this paper, we propose a new 3D DWT video transmission method in order to enhance error resilience. The proposed method adopts an error correction scheme using invertible codes to protect LL coefficients. We use half-rate Reed-Solomon (RS) codes as invertible codes. Additionally, to improve performance by using the effect of interleave, we adopt a new configuration scheme at the RS encoding stage. The evaluation by computer simulation compares the performance of the proposed method with that of other EC methods, and indicates the advantage of the proposed method.

  • ResilientFlow: Deployments of Distributed Control Channel Maintenance Modules to Recover SDN from Unexpected Failures

    Takuya OMIZO  Takuma WATANABE  Toyokazu AKIYAMA  Katsuyoshi IIDA  

     
    PAPER

      Vol:
    E99-B No:5
      Page(s):
    1041-1053

    Although SDN provides desirable characteristics such as the manageability, flexibility and extensibility of the networks, it has a considerable disadvantage in its reliability due to its centralized architecture. To protect SDN-enabled networks under large-scale, unexpected link failures, we propose ResilientFlow that deploys distributed modules called Control Channel Maintenance Module (CCMM) for every switch and controllers. The CCMMs makes switches able to maintain their own control channels, which are core and fundamental part of SDN. In this paper, we design, implement, and evaluate the ResilientFlow.

  • Plug-and-Play Optical Interconnection Using Digital Coherent Technology for Resilient Network Based on Movable and Deployable ICT Resource Unit

    Tetsuro KOMUKAI  Hirokazu KUBOTA  Toshikazu SAKANO  Toshihiko HIROOKA  Masataka NAKAZAWA  

     
    PAPER

      Vol:
    E97-B No:7
      Page(s):
    1334-1341

    Triggered by the Great East Japan Earthquake in March 2011, the authors have been studying a resilient network whose key element is a movable and deployable ICT resource unit. The resilient network needs a function of robust and immediate connection to a wide area network active outside the damaged area. This paper proposes an application of digital coherent technology for establishing optical interconnection between the movable ICT resource unit and existing network nodes through a photonic network, rapidly, easily and with the minimum in manual work. We develop a prototype of a 100Gbit/s digital coherent transponder which is installable to our movable and deployable ICT resource unit and experimentally confirm the robust and immediate connection by virtue of the plug and play function.

  • Randomness Leakage in the KEM/DEM Framework

    Hitoshi NAMIKI  Keisuke TANAKA  Kenji YASUNAGA  

     
    PAPER-Public Key Based Cryptography

      Vol:
    E97-A No:1
      Page(s):
    191-199

    Recently, there have been many studies on constructing cryptographic primitives that are secure even if some secret information leaks. In this paper, we consider the problem of constructing public-key encryption schemes that are resilient to leaking the randomness used in the encryption algorithm. In particular, we consider the case in which public-key encryption schemes are constructed from the KEM/DEM framework, and the leakage of randomness in the encryption algorithms of KEM and DEM occurs independently. For this purpose, we define a new security notion for KEM. Then we provide a generic construction of a public-key encryption scheme that is resilient to randomness leakage from any KEM scheme satisfying this security. Also we construct a KEM scheme that satisfies the security from hash proof systems.

  • Construction and Counting of 1-Resilient Rotation Symmetric Boolean Functions on pq Variables

    Jiao DU  Qiaoyan WEN  Jie ZHANG  Shanqi PANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E96-A No:7
      Page(s):
    1653-1656

    In this letter, a property of the characteristic matrix of the Rotation Symmetric Boolean Functions (RSBFs) is characterized, and a sufficient and necessary condition for RSBFs being 1st correlation-immune (1-CI for simplicity) is obtained. This property is applied to construct resilient RSBFs of order 1 (1-resilient for simplicity) on pq variables, where p and q are both prime consistently in this letter. The results show that construction and counting of 1-resilient RSBFs on pq variables are equivalent to solving an equation system and counting the solutions. At last, the counting of all 1-resilient RSBFs on pq variables is also proposed.

  • A Resilient Forest-Based Application Level Multicast for Real-Time Streaming

    Kazuya TAKAHASHI  Tatsuya MORI  Yusuke HIROTA  Hideki TODE  Koso MURAKAMI  

     
    PAPER-Internet

      Vol:
    E96-B No:7
      Page(s):
    1874-1885

    In recent years, real-time streaming has become widespread as a major service on the Internet. However, real-time streaming has a strict playback deadline. Application level multicasts using multiple distribution trees, which are known as forests, are an effective approach for reducing delay and jitter. However, the failure or departure of nodes during forest-based multicast transfer can severely affect the performance of other nodes. Thus, the multimedia data quality is degraded until the distribution trees are repaired. This means that increasing the speed of recovery from isolation is very important, especially in real-time streaming services. In this paper, we propose three methods for resolving this problem. The first method is a random-based proactive method that achieves rapid recovery from isolation and gives efficient “Randomized Forwarding” via cooperation among distribution trees. Each node forwards the data it receives to child nodes in its tree, and then, the node randomly transferring it to other trees with a predetermined probability. The second method is a reactive method, which provides a reliable isolation recovery method with low overheads. In this method, an isolated node requests “Continuous Forwarding” from other nodes if it detects a problem with a parent node. Forwarding to the nearest nodes in the IP network ensures that this method is efficient. The third method is a hybrid method that combines these two methods to achieve further performance improvements. We evaluated the performances of these proposed methods using computer simulations. The simulation results demonstrated that our proposed methods delivered isolation recovery and that the hybrid method was the most suitable for real-time streaming.

  • Performance of Spatial and Temporal Error Concealment Method for 3D DWT Video Coding in Packet Loss Channel

    Hirokazu TANAKA  Sunmi KIM  Takahiro OGAWA  Miki HASEYAMA  

     
    PAPER-Image Processing

      Vol:
    E95-A No:11
      Page(s):
    2015-2022

    A new spatial and temporal error concealment method for three-dimensional discrete wavelet transform (3D DWT) video coding is analyzed. 3D DWT video coding employing dispersive grouping (DG) and two-step error concealment is an efficient method in a packet loss channel [20],[21]. In the two-step error concealment method, the interpolations are only spatially applied however, higher efficiency of the interpolation can be expected by utilizing spatial and temporal similarities. In this paper, we propose an enhanced spatial and temporal error concealment method in order to achieve higher error concealment (EC) performance in packet loss networks. In the temporal error concealment method, structural similarity (SSIM) index is employed for inter group of pictures (GOP) EC and minimum mean square error (MMSE) is used for intra GOP EC. Experimental results show that the proposed method can obtain remarkable performance compared with the conventional methods.

  • A Practical Code Rate Decision Scheme Based on Playable Bitrate Model for Error-Resilient Joint Source-Channel Coding

    Yo-Won JEONG  Kwang-Deok SEO  Kyu Ho PARK  

     
    PAPER

      Vol:
    E94-B No:3
      Page(s):
    676-685

    Joint source-channel coding (JSCC) is a method to jointly allocate the given total transmission bitrate to the source coding and channel coding to maximize the video quality at the receiving end. In this paper, we propose a practical model for efficiently determining a near-optimal code rate for JSCC in real-time video communications. The conventional code rate decision schemes using analytical source coding distortion model and channel-induced distortion model are usually complex, and typically employ the process of model parameter training which involves potentially high computational complexity and implementation cost. To avoid the complex modeling procedure, we introduce a very simple video quality model based on the playable bitrate which is defined as the total bit amount per unit time that is not affected by the channel loss during transmission including correctly recovered bits by the channel decoder. Because the video quality at the receiving end is clearly commensurate with the playable bitrate, we can easily determine the quality-oriented near-optimal code rate by finding the code rate that maximizes the playable bitrate at the sender side. The proposed playable bitrate model is very simple because it does not require the complex training procedure for obtaining model parameters, which is usually required in the conventional code rate decision method. It is shown by simulations that the proposed code rate decision scheme based on the playable bitrate model can efficiently determine the near-optimal code rate for JSCC in terms of high accuracy on the optimal code rate.

  • Dynamic Bandwidth Allocation Performance for Dual QoS Classes in Resilient Packet Ring

    Yasuyuki OKUMURA  

     
    PAPER-Network

      Vol:
    E91-B No:10
      Page(s):
    3226-3231

    This paper proposes an improved dynamic bandwidth allocation algorithm for dual Quality of Service (QoS) classes to maximize the utilization rate of the Resilient Packet Ring (RPR). To achieve dynamic bandwidth allocation for the two QoS classes in the RPR, each node measures the high priority traffic flow and assigns the appropriate bandwidth; the remaining bandwidth is used for low priority traffic. It passes a control frame containing the measured bandwidth of the high priority traffic to the other nodes. Based on the advertised high priority traffic bandwidth, any node that is congested transmits, to the other nodes, a fairness message to fairly allocate the remaining low priority bandwidth. Simulations demonstrate that the proposed algorithm enhances the utilization rate and reduces the delay of high priority frames.

  • Efficient Flexible Macroblock Ordering Technique

    Kostas PSANNIS  Yutaka ISHIBASHI  

     
    PAPER-Multimedia Systems for Communications

      Vol:
    E91-B No:8
      Page(s):
    2692-2701

    The H.264/AVC standard provides several new error-resilient features to enable the reliable transmission of compressed video signals over lossy packet networks. Flexible Macroblock Ordering (FMO) is one of the most interesting resilient features within the H.264/AVC standard. Unlike former standards, in which slices were constructed out of consecutive raster scan macroblocks, FMO suggests new slices composed of spatially distributed Macroblocks (MBs), and organized in a mixed-up fashion. H.264/AVC specifies seven types of FMO. The standard defines also an explicit FMO type (Type 6), which allows explicitly assignment of each MB within the frame to any available slice groups. Therefore new FMO types can be used and integrated into H264/AVC without violating the standard. In this paper we propose a new Explicit Chessboard-Wipe (ECW) Flexible Macroblocks Ordering (FMO) technique, which outperforms all other FMO types. The new ECW ordering results in effective error scattering which maximizes the number of correctly received macroblocks located around corrupted macroblocks, leading to better error concealment. Performance evaluations demonstrate that the proposed Explicit FMO approach outperforms all the FMO types. Both subjective and objective visual quality comparative study has been also carried out in order to validate the proposed approach.

1-20hit(30hit)