Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436739
S. Nam, Ju-Hyung Lee, C. Yoon, Young-Chai Ko
In this paper, we statistically analyze the BER performance of a threshold-based parallel multiple beam selection scheme for a free-space optical (FSO) based system with wavelength division multiplexing (WDM) in cases where a pointing error has occurred under Gamma turbulence conditions, which are a good approximation of Gamma-Gamma distribution. Our derived results based on the Gamma distribution as an approximation of the Gamma-Gamma distribution can be used as approximated performance measure (lower) bounds.
{"title":"BER Analysis of Wavelength Division Multiplexing-Based Multiple Beam Scheduling Scheme Based on Gamma Approximation Channel","authors":"S. Nam, Ju-Hyung Lee, C. Yoon, Young-Chai Ko","doi":"10.1109/ICUFN.2018.8436739","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436739","url":null,"abstract":"In this paper, we statistically analyze the BER performance of a threshold-based parallel multiple beam selection scheme for a free-space optical (FSO) based system with wavelength division multiplexing (WDM) in cases where a pointing error has occurred under Gamma turbulence conditions, which are a good approximation of Gamma-Gamma distribution. Our derived results based on the Gamma distribution as an approximation of the Gamma-Gamma distribution can be used as approximated performance measure (lower) bounds.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132790484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436761
Doyoung Chung, Hae Sook Jeon
Route Plan describes recommended movement of vessels. It consists of waypoints, and each waypoint demonstrates expected arrival/depature times, angle, and direction. The importance of route plan is become more important as appearance of autonomous ship. To achieve safe and smart voyage, integrity of route plan is very important. To avoid forgery and temper of route plan, and clarify who is responsible, digital signature is one of reliable solution. In this study, we suggest route plan management scheme which demonstrates how to manage digital signature of route plan based on block chain.
{"title":"Route Plan Exchange Scheme Based on Block Chain","authors":"Doyoung Chung, Hae Sook Jeon","doi":"10.1109/ICUFN.2018.8436761","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436761","url":null,"abstract":"Route Plan describes recommended movement of vessels. It consists of waypoints, and each waypoint demonstrates expected arrival/depature times, angle, and direction. The importance of route plan is become more important as appearance of autonomous ship. To achieve safe and smart voyage, integrity of route plan is very important. To avoid forgery and temper of route plan, and clarify who is responsible, digital signature is one of reliable solution. In this study, we suggest route plan management scheme which demonstrates how to manage digital signature of route plan based on block chain.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133075362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436641
Junghoon Oh, Hoyoung Song
The 3GPP Release-13 has introduced a Narrowband Internet of Things (NB-IOT) which is capable of Low Power Wide Area (LPWA) IoT service. NB-IoT can interfere with LTE cellular because the NB-IoT uses the license band differently from the LPWA IoT (Sig-fox, LoRa, and so on) using the unlicensed band. In this paper, it is shown that NB-IoT can cause interference even though subcarrier frequency 15 kHz like LTE is used, and the degree of interference is shown through testing. The test results show how to suppress NB-IoT interference for LTE and LTE resource allocation.
{"title":"Study on the Effect of LTE on the Coexistence of NB-IoT","authors":"Junghoon Oh, Hoyoung Song","doi":"10.1109/ICUFN.2018.8436641","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436641","url":null,"abstract":"The 3GPP Release-13 has introduced a Narrowband Internet of Things (NB-IOT) which is capable of Low Power Wide Area (LPWA) IoT service. NB-IoT can interfere with LTE cellular because the NB-IoT uses the license band differently from the LPWA IoT (Sig-fox, LoRa, and so on) using the unlicensed band. In this paper, it is shown that NB-IoT can cause interference even though subcarrier frequency 15 kHz like LTE is used, and the degree of interference is shown through testing. The test results show how to suppress NB-IoT interference for LTE and LTE resource allocation.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130378625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436802
Xianyong Meng, K. Qian, D. Lo, P. Bhattacharya
With the time-to-market pressures for mobile app development is increasing, its development cycle is getting shorter and developers have little to no time for security remediation. Many mobile app developers overlook the security quality of the software in the development cycle. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Early elimination of possible security vulnerability will help to secure our software, and mitigate the security risk threats from potential malicious attacking. However, many developers lack awareness of the importance of security vulnerability and the necessary secure software development knowledge and skills. An effective security vulnerability detecting tools integrated with IDE would be very beneficial for software developers. In this paper we explore the Android common ICC vulnerability and present ICC intent flaw detectors with open source FindSecurityBugs integrated in Android Studio IDE.
随着手机应用开发的上市时间压力越来越大,其开发周期越来越短,开发者几乎没有时间进行安全修复。许多手机应用开发者在开发周期中忽视了软件的安全质量。移动应用程序的缺陷和安全缺陷可能为黑客轻易攻击移动应用程序敞开大门。尽早消除可能的保安漏洞,有助保障我们的软件的安全,并减低潜在恶意攻击的保安风险威胁。然而,许多开发人员缺乏对安全漏洞的重要性和必要的安全软件开发知识和技能的认识。一个与IDE集成的有效的安全漏洞检测工具将对软件开发人员非常有益。本文探讨了Android常见的ICC漏洞,并在Android Studio IDE中集成了开源的FindSecurityBugs,提出了ICC意图漏洞检测器。
{"title":"Detectors for Intent ICC Security Vulnerability with Android IDE","authors":"Xianyong Meng, K. Qian, D. Lo, P. Bhattacharya","doi":"10.1109/ICUFN.2018.8436802","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436802","url":null,"abstract":"With the time-to-market pressures for mobile app development is increasing, its development cycle is getting shorter and developers have little to no time for security remediation. Many mobile app developers overlook the security quality of the software in the development cycle. Mobile app flaws and security defects could open doors for hackers to easily attack mobile apps. Early elimination of possible security vulnerability will help to secure our software, and mitigate the security risk threats from potential malicious attacking. However, many developers lack awareness of the importance of security vulnerability and the necessary secure software development knowledge and skills. An effective security vulnerability detecting tools integrated with IDE would be very beneficial for software developers. In this paper we explore the Android common ICC vulnerability and present ICC intent flaw detectors with open source FindSecurityBugs integrated in Android Studio IDE.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"149 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113991601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436776
R. Ali, N. Shahin, Arslan Musaddiq, Byung-Seo Kim, S. Kim
License Assisted Access-WiFi (LAA-WiFi) coexistence allows the operations on the unlicensed spectrum for Long Term Evolution (LTE) along with existing unlicensed wireless local area networks (WLANs). The current spectrum access process of legacy WLANs uses clear channel assessment (CCA) and carrier sense multiple access with collision avoidance (CSMA/CA), where the spectrum is sensed before use and a random binary exponential backoff (BEB) mechanism is employed for collision avoidance. While LAA uses a listen-before-talk (LBT) mechanism, moderately similar to the CCA CSMA/CA for channel access. However, there is a fairness issue when these two technologies coexist. In this paper, we propose a channel observation-based LBT (CoLBT) mechanism for fairness in LAA-Wi-Fi coexistence scenarios. Specifically, we introduce a more realistic practical channel observation-based collision probability observed by the LAA evolved Node B (eNB) to adaptively scale-up and scale-down the backoff contention window for channel contention, to reduce the waste of resources and improve LAA-WiFi coexistence performance. Simulation results validate that the proposed CoLBT mechanism is effective in LAA-WiFi coexistence scenario and can improve fairness performance, compared with the current mechanism of LBT.
LAA-WiFi (License Assisted Access-WiFi)共存,允许在LTE (Long Term Evolution)的无授权频谱上与现有的无授权无线局域网(wlan)一起运行。传统无线局域网目前的频谱接入过程采用清晰信道评估(CCA)和载波感知多址避碰(CSMA/CA),其中频谱在使用前被感知,并采用随机二进制指数后退(BEB)机制来避免碰撞。而LAA使用先听后讲(LBT)机制,与CCA的CSMA/CA通道访问适度相似。然而,当这两种技术共存时,存在公平性问题。在本文中,我们提出了一种基于信道观测的LBT (CoLBT)机制来实现LAA-Wi-Fi共存场景下的公平性。具体而言,我们引入了一种更现实的基于实际信道观测的碰撞概率,由LAA进化节点B (eNB)自适应地放大和缩小信道争用的退退争用窗口,以减少资源浪费,提高LAA- wifi共存性能。仿真结果验证了所提出的CoLBT机制在LAA-WiFi共存场景下的有效性,与现有的LBT机制相比,可以提高公平性性能。
{"title":"Fair and Efficient Channel Observation-Based Listen-Before Talk (CoLBT) for LAA-WiFi Coexistence in Unlicensed LTE","authors":"R. Ali, N. Shahin, Arslan Musaddiq, Byung-Seo Kim, S. Kim","doi":"10.1109/ICUFN.2018.8436776","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436776","url":null,"abstract":"License Assisted Access-WiFi (LAA-WiFi) coexistence allows the operations on the unlicensed spectrum for Long Term Evolution (LTE) along with existing unlicensed wireless local area networks (WLANs). The current spectrum access process of legacy WLANs uses clear channel assessment (CCA) and carrier sense multiple access with collision avoidance (CSMA/CA), where the spectrum is sensed before use and a random binary exponential backoff (BEB) mechanism is employed for collision avoidance. While LAA uses a listen-before-talk (LBT) mechanism, moderately similar to the CCA CSMA/CA for channel access. However, there is a fairness issue when these two technologies coexist. In this paper, we propose a channel observation-based LBT (CoLBT) mechanism for fairness in LAA-Wi-Fi coexistence scenarios. Specifically, we introduce a more realistic practical channel observation-based collision probability observed by the LAA evolved Node B (eNB) to adaptively scale-up and scale-down the backoff contention window for channel contention, to reduce the waste of resources and improve LAA-WiFi coexistence performance. Simulation results validate that the proposed CoLBT mechanism is effective in LAA-WiFi coexistence scenario and can improve fairness performance, compared with the current mechanism of LBT.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114351257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8437025
Hyun-Soo Jeong, Kyunyeol Park, Sung-Jin Cho, Seok-Tae Kim
In this paper, we propose a new color medical image encryption method using two-dimensional chaotic map and C-MLCA. The two-dimensional chaotic map is a structure with self-preserving properties, which moves the position of the pixel and encrypts the image. C-MLCA uses a maximum length PN sequence based on the properties of CA. The sequences with unpredictably complex rules create a basis image and the basis image is XOR-computed with the original image. That is, C-MLCA encrypts the image by changing the eigenvalues of the pixels through the computation process. Using these two features, we introduce an effective encryption method to overcome the limitations of the existing encryption methods. By comparing and analyzing the encrypted image with the original image, we were able to confirm that the proposed encryption method has a high level of stability and security.
{"title":"Color Medical Image Encryption Using Two-Dimensional Chaotic Map and C-MLCA","authors":"Hyun-Soo Jeong, Kyunyeol Park, Sung-Jin Cho, Seok-Tae Kim","doi":"10.1109/ICUFN.2018.8437025","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437025","url":null,"abstract":"In this paper, we propose a new color medical image encryption method using two-dimensional chaotic map and C-MLCA. The two-dimensional chaotic map is a structure with self-preserving properties, which moves the position of the pixel and encrypts the image. C-MLCA uses a maximum length PN sequence based on the properties of CA. The sequences with unpredictably complex rules create a basis image and the basis image is XOR-computed with the original image. That is, C-MLCA encrypts the image by changing the eigenvalues of the pixels through the computation process. Using these two features, we introduce an effective encryption method to overcome the limitations of the existing encryption methods. By comparing and analyzing the encrypted image with the original image, we were able to confirm that the proposed encryption method has a high level of stability and security.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114871461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436723
Mohammad Al Mojamed, Awwadh Al-Shehri
MANET is a decentralized network optimized for an infrastructure-less area. Its applications are designed to operate in a distributed manner. Peer-to-peer (P2P) overlays are a possible addition to MANETs to aid in managing resources and information sharing in distributed networks. In this paper, the Kademlia P2P overlay is deployed over a dynamic and different MANET underlaying technologies. This overlay was combined with two different types of MANET routing: OLSR and AODV. An extensive evaluation is carried out for the performance of these combinations in different dynamic network settings. The results show that in most cases, Kademlia achieves its best performance when layered over AODV. However, OLSR-based Kademlia outperforms AODV in terms of delay and network load.
{"title":"Performance Evaluation of Kademlia in Mobile Ad Hoc Networks","authors":"Mohammad Al Mojamed, Awwadh Al-Shehri","doi":"10.1109/ICUFN.2018.8436723","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436723","url":null,"abstract":"MANET is a decentralized network optimized for an infrastructure-less area. Its applications are designed to operate in a distributed manner. Peer-to-peer (P2P) overlays are a possible addition to MANETs to aid in managing resources and information sharing in distributed networks. In this paper, the Kademlia P2P overlay is deployed over a dynamic and different MANET underlaying technologies. This overlay was combined with two different types of MANET routing: OLSR and AODV. An extensive evaluation is carried out for the performance of these combinations in different dynamic network settings. The results show that in most cases, Kademlia achieves its best performance when layered over AODV. However, OLSR-based Kademlia outperforms AODV in terms of delay and network load.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123214226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436839
Ren-Song Ko
The scalability challenge of many problems in massively -dense wireless sensor networks may be mitigated from a macroscopic perspective. One example is the weak formulation of the load-balancing routing problem, which solution can be used to route information. Hence, a routing algorithm, the distributed Gauss-Seidel iteration (DGSI), was proposed to coordinate sensors to solve the weak formulation iteratively. In this paper, we propose the atomic red-black distributed Gauss-Seidel iteration with finite element method (ARB-DGSI-FEM) to eliminate the early termination problem of DGSI due to the presence of holes, and thus improve the accuracy of numerical solutions. In addition, ARB-DGSI-FEM allows the values of unknowns to be updated in the red-black order to achieve the maximum degree of parallelism and reduce the convergence time. Our simulation results reveal that ARB-DGSI-FEM significantly improves the parallelism without too much sacrifice of accuracy.
{"title":"To Improve the Convergence and Parallelism of Gauss-Seidel Routing Algorithm with Finite Element Method for Wireless Sensor Networks","authors":"Ren-Song Ko","doi":"10.1109/ICUFN.2018.8436839","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436839","url":null,"abstract":"The scalability challenge of many problems in massively -dense wireless sensor networks may be mitigated from a macroscopic perspective. One example is the weak formulation of the load-balancing routing problem, which solution can be used to route information. Hence, a routing algorithm, the distributed Gauss-Seidel iteration (DGSI), was proposed to coordinate sensors to solve the weak formulation iteratively. In this paper, we propose the atomic red-black distributed Gauss-Seidel iteration with finite element method (ARB-DGSI-FEM) to eliminate the early termination problem of DGSI due to the presence of holes, and thus improve the accuracy of numerical solutions. In addition, ARB-DGSI-FEM allows the values of unknowns to be updated in the red-black order to achieve the maximum degree of parallelism and reduce the convergence time. Our simulation results reveal that ARB-DGSI-FEM significantly improves the parallelism without too much sacrifice of accuracy.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121909969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8437012
Dongho You, Eunyoung Jeong, Dong Ho Kim
In this paper, we propose tile-based hybrid stereoscopic 360° video streaming service, in which low-quality 2D, high-quality 2D and 3D services can be provided by a single scalable HEVC (SHVC) en/decoder. In addition to this, its associated MPEG-DASH media presentation description (MPD) signaling is also presented as an example.
{"title":"MPEG-DASH MPD for Tile-based Hybrid Stereoscopic 360-degree Video Streaming","authors":"Dongho You, Eunyoung Jeong, Dong Ho Kim","doi":"10.1109/ICUFN.2018.8437012","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8437012","url":null,"abstract":"In this paper, we propose tile-based hybrid stereoscopic 360° video streaming service, in which low-quality 2D, high-quality 2D and 3D services can be provided by a single scalable HEVC (SHVC) en/decoder. In addition to this, its associated MPEG-DASH media presentation description (MPD) signaling is also presented as an example.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122061771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-07-01DOI: 10.1109/ICUFN.2018.8436784
Woo-Suk Park, Dongyeop Hwang, Ki-Hyung Kim
In this paper, we propose a new authentication method to prevent authentication vulnerability of Claim Token method of Membership Service provide in Private BlockChain. We chose Hyperledger Fabric v1.0 using JWT authentication method of membership service. TOTP, which generate OTP tokens and user authentication codes that generate additional time-based password on existing authentication servers, has been applied to enforce security and two-factor authentication method to provide more secure services.
{"title":"A TOTP-Based Two Factor Authentication Scheme for Hyperledger Fabric Blockchain","authors":"Woo-Suk Park, Dongyeop Hwang, Ki-Hyung Kim","doi":"10.1109/ICUFN.2018.8436784","DOIUrl":"https://doi.org/10.1109/ICUFN.2018.8436784","url":null,"abstract":"In this paper, we propose a new authentication method to prevent authentication vulnerability of Claim Token method of Membership Service provide in Private BlockChain. We chose Hyperledger Fabric v1.0 using JWT authentication method of membership service. TOTP, which generate OTP tokens and user authentication codes that generate additional time-based password on existing authentication servers, has been applied to enforce security and two-factor authentication method to provide more secure services.","PeriodicalId":224367,"journal":{"name":"2018 Tenth International Conference on Ubiquitous and Future Networks (ICUFN)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122096782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}