The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We consider the problem of a client efficiently, privately and securely delegating the computation of multiple group exponentiations to a computationally more powerful server (e.g. a cloud server). We provide the first practical and provable solutions to this batch delegation problem for groups commonly used in cryptography, based on discrete logarithm and RSA hardness assumptions. Previous results...
The objective of the PKA encryption scheme is to complement, or replace, existing Public Key Infrastructures (PKI) [1]. In this scheme, the initialization step is based on the secure exchange of addressable cryptographic tables between the communicating parties. These tables are generated either with random numbers, or with arrays of addressable Physical Unclonable Function (PUFs). The subsequent...
We show that it is possible to achieve information theoretic location privacy for secondary users (SUs) in database-driven cognitive radio networks (CRNs) with an end-to-end delay less than a second, which is significantly better than that of the existing alternatives offering only a computational privacy. This is achieved based on a keen observation that, by the requirement of Federal Communications...
With the recent emergence of smartphones, cloud computing, and the Internet of Things (IoT), our society has become more dependent on the Internet. In these circumstances, increasing energy consumption in data centers is becoming a crucial problem worldwide and data center managers are required to run them efficiently in terms of energy consumption. This study aims to reduce cooling airflow energy...
This paper presents a multi-layer distributed performance management model for Internet of Things (IoT) as a service for caregivers. Performance monitoring and control of IoT devices and services are vital functions for e-health systems. Cloud-based IoT systems with centralized data centers further underline the need for distributed management. The main contribution of this paper is a model and prototype...
Container-based virtualization offers several advantages such as high performance, resource efficiency, and agile environment, which can make IoT device management easy. Though previous studies introduce container-based virtualization to IoT devices, they do not address different network modes of containers and the performance issues. Because the network performance is an important factor in IoT,...
In this paper, we propose a Mobile Crowd Sensing application based on Community Information-Centric Networking to collect opportunistic sensing data in limited area where it restricts radius of Bluetooth Low Energy beacon. The application has more valuable features by comparing with common Mobile Crowd Sensing one. First is to support data integrity and utilize simple communication model according...
In the 5G era, radio IP capacity is expected to reach 20 Gbit/s per sector, and ultra-large content traffic will travel across the faster wireless/wireline access network and packet core network. Also massive and mission-critical IoT is the main differentiator of 5G services. These types of real-time and large-bandwidth consuming services require radio latency of less than 1ms, and end-to-end latency...
Distributed Denial of Service (DDoS) attack has been bringing serious security concerns on banks, finance incorporation, public institutions, and data centers. Also, the emerging wave of Internet of Things (IoT) raises new concerns on the smart devices. Software Defined Networking (SDN) and Network Functions Virtualization (NFV) have provided a new paradigm for network security. In this paper, we...
Making the data plane of a SDN flexible enough to satisfy the various requirements of heterogeneous IoT applications is very desirable for Software Defined IoT (SD-IoT) networking. The network device having programmable data plane provides an ability to add new packet and data processing procedures dynamically to the IoT applications. Previously proposed solutions for adding programmability to the...
Software Quality Assurance is a sub-process that ensures that developed software meets and complies with defined or standardized quality specifications. Focusing on source code, there are characteristics that can be used to evaluate the quality. Introductory courses must encourage freshmen students to improve internal quality of their source code, but only as sophomore they have contact with Software...
When a standard TCP implementation using the minimum retransmission timeout (RTOmin) of 200 ms is used in distributed file systems in data centers, a well-known throughput degradation called TCP Incast occurs, because 200 ms is too large as an RTOmin in data centers. In order to avoid TCP Incast, a TCP implementation using a much smaller RTOmin attained by a fine-grained kernel timer is proposed....
With the development of ICT (Information and Communication Technology), computer and the Internet have become indispensable for people's social activities while cyber security threats keep on increase trend. Unfortunately, the current popular security facilities cannot efficiently detect cyber attacks due to a tremendous amount of network traffic needs to be analyzed. In this paper, we focus on DNS...
A unidirectional security gateway is a network system in which data can travel in only one direction. Therefore, the system are used in protecting the safety and reliability of various critical infrastructures. Most of all, it has to be deployed with send and receive transceivers disconnected for one direction to ensure information security. In this paper, we introduce a unidirectional security gateway...
Recently, the specifications for 5G system architecture and procedures including TS 23.501 and 23.502 are being developed by 3GPP. In the specifications, one of key principles and concept is to separate the user plane (UP) functions from the control plane (CP) functions, allowing independent scalability, evolution and flexible deployments and modularize the functions design to enable flexible and...
Recently, attempts have been made to change the paradigm of existing plants by applying ICT to the manufacturing industry. It can be seen as an extension of factory automation, which used to automate production facilities and unmanned work in the past, but Smart Factory is an advanced model to predict and respond to the future situation. In this paper, we propose a controller that is optimized for...
The wide spread use of Internet allows advertisers to reach significantly more consumers through online advertisement compared to traditional advertising media. However, currently online advertisement is facing challenges associated with advertisement (ad) frauds such as ad replacement, ad stacking, click fraud, and click hijacking. It is important to teach students this emerging topic, and help students...
Recently, a micro-service architecture has been adopted to an edge device in smart factory due to its maintainability and scalability. In the architecture, all services are generally implemented as Docker containers and deployed by Docker APIs which might be harsh to a factory operator. In this paper, we propose an easy-to-use web-based service deployment method for containerized service to in-factory...
We need more skilled cybersecurity professionals because the number of cyber threats and ingenuity of attackers is ever growing. Knowledge and skills required for cyber defence can be developed and exercised by lectures and lab sessions, or by active learning, which is seen as a promising and attractive alternative. In this paper, we present experience gained from the preparation and execution of...
Recently many industries and companies are developing machine learning algorithms and services, and they are publishing them on the internet. However, because most of people who want to use the machine learning services to analyze data are familiar with sheet data rather than programming language, it is difficult to use those services written in programming language. For the reason, we developed a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.