首页 > 最新文献

2019 International Conference on Platform Technology and Service (PlatCon)最新文献

英文 中文
A Study on smart city security policy based on blockchain in 5G Age 5G时代基于区块链的智慧城市安全策略研究
Pub Date : 2019-03-18 DOI: 10.1109/PLATCON.2019.8669406
Jong-ho Noh, Hun-Yeong Kwon
The smart city is aiming for an intelligent connected society beyond the concept of U-City with simple ICT. In particular, the rapid development of information and communications, such as 5G, and blockchain, has led to a paradigm shift to a new digital urban environment. As smart energy and smart transportation are integrated or interlocked, the technical and institutional arrangement should be preceded from the time of user authentication to provide reliability, transparency, and efficiency. For this purpose, this study aims to investigate the technical and institutional plans for the implementation of safe urban life utilizing blockchain technology. In order to apply smart city services using block-chain technology, it is necessary to fully agree and practice among various stakeholders such as public, business, academia, and civic groups. It is expected to be implemented as a people-centered smart city by gradually applying the block chain-based pilot service, which is made and participated together.
智慧城市的目标是超越U-City的概念,通过简单的ICT实现智能互联社会。特别是,信息和通信的快速发展,如5G和区块链,导致了向新的数字城市环境的范式转变。由于智慧能源与智慧交通是一体或环环相扣的,从用户认证开始,就需要先进行技术和制度安排,提供可靠、透明、高效的服务。为此,本研究旨在探讨利用区块链技术实施安全城市生活的技术和制度计划。为了应用区块链技术的智慧城市服务,需要公共、企业、学术界、市民团体等各利益相关方的充分同意和实践。预计将通过逐步应用共同制定和参与的区块链试点服务,作为以人为本的智慧城市实施。
{"title":"A Study on smart city security policy based on blockchain in 5G Age","authors":"Jong-ho Noh, Hun-Yeong Kwon","doi":"10.1109/PLATCON.2019.8669406","DOIUrl":"https://doi.org/10.1109/PLATCON.2019.8669406","url":null,"abstract":"The smart city is aiming for an intelligent connected society beyond the concept of U-City with simple ICT. In particular, the rapid development of information and communications, such as 5G, and blockchain, has led to a paradigm shift to a new digital urban environment. As smart energy and smart transportation are integrated or interlocked, the technical and institutional arrangement should be preceded from the time of user authentication to provide reliability, transparency, and efficiency. For this purpose, this study aims to investigate the technical and institutional plans for the implementation of safe urban life utilizing blockchain technology. In order to apply smart city services using block-chain technology, it is necessary to fully agree and practice among various stakeholders such as public, business, academia, and civic groups. It is expected to be implemented as a people-centered smart city by gradually applying the block chain-based pilot service, which is made and participated together.","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133558528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Security Evaluation Methodology for Software Defined Network Solutions 软件定义网络解决方案的安全评估方法
Pub Date : 2019-01-01 DOI: 10.1109/PLATCON.2019.8669405
Jean Claude Nikoue, S. Butakov, Yasir Malik
Software Defined Networking (SDN) has introduced both innovative opportunities and additional risks in the computer networking. Among disadvantages of SDNs one can mention their susceptibility to vulnerabilities associated with both virtualization and the traditional networking. Selecting a proper controller for an organization may not be a trivial task as there is a variety of SDN controllers on the market and each of them may come with its own pros and cons from the security point of view. This research proposes a comprehensive methodology for organizations to evaluate security-related features available in SDN controllers. The methodology can serve as a guideline in the decisions related to SDN choice. The proposed security assessment follows a structured approach to evaluate each layer of the SDN architecture and each metrics defined in presented research has been matched with the security controls defined in NIST 800-53. Through the tests on actual controllers the paper provides an example on how the proposed methodology can be used to evaluate existing SDN solutions.
软件定义网络(SDN)给计算机网络带来了创新的机会和额外的风险。在sdn的缺点中,可以提到它们容易受到与虚拟化和传统网络相关的漏洞的影响。为组织选择合适的控制器可能不是一件小事,因为市场上有各种各样的SDN控制器,从安全的角度来看,每种控制器都有自己的优缺点。本研究为组织评估SDN控制器中可用的安全相关功能提供了一种全面的方法。该方法可以作为SDN选择相关决策的指导方针。拟议的安全评估遵循结构化方法来评估SDN体系结构的每一层,所提出的研究中定义的每个指标都与NIST 800-53中定义的安全控制相匹配。通过对实际控制器的测试,本文提供了一个示例,说明所提出的方法如何用于评估现有的SDN解决方案。
{"title":"Security Evaluation Methodology for Software Defined Network Solutions","authors":"Jean Claude Nikoue, S. Butakov, Yasir Malik","doi":"10.1109/PLATCON.2019.8669405","DOIUrl":"https://doi.org/10.1109/PLATCON.2019.8669405","url":null,"abstract":"Software Defined Networking (SDN) has introduced both innovative opportunities and additional risks in the computer networking. Among disadvantages of SDNs one can mention their susceptibility to vulnerabilities associated with both virtualization and the traditional networking. Selecting a proper controller for an organization may not be a trivial task as there is a variety of SDN controllers on the market and each of them may come with its own pros and cons from the security point of view. This research proposes a comprehensive methodology for organizations to evaluate security-related features available in SDN controllers. The methodology can serve as a guideline in the decisions related to SDN choice. The proposed security assessment follows a structured approach to evaluate each layer of the SDN architecture and each metrics defined in presented research has been matched with the security controls defined in NIST 800-53. Through the tests on actual controllers the paper provides an example on how the proposed methodology can be used to evaluate existing SDN solutions.","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127119654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
PlatCon 2019 Copyright Page PlatCon 2019版权页面
Pub Date : 2019-01-01 DOI: 10.1109/platcon.2019.8668956
{"title":"PlatCon 2019 Copyright Page","authors":"","doi":"10.1109/platcon.2019.8668956","DOIUrl":"https://doi.org/10.1109/platcon.2019.8668956","url":null,"abstract":"","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123754499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal Specification Technique in Smart Contract Verification 智能合约验证中的形式化规范技术
Pub Date : 2019-01-01 DOI: 10.1109/PLATCON.2019.8669419
Seung-min Lee, Soojin Park, Young B. Park
The block chain technology is changing rapidly. The block chain guarantees the integrity of the book through a specific consensus of the participants. In the past, the block chain technology had a limited range of applications. However, the use of block chain technology is gradually expanding as smart contracts that can formulate general business logic are mentioned. Already studied the components of smart contracts in other studies and proposed the possibility of extending them on the basis of ontology. And research on securing traceability of smart contract based on ontology has been carried out. However, research on various transactions constituting smart contracts is lacking. In this paper, the constituent elements of smart contract are analyzed and expressed by ontology. And the process of negotiating the components is represented by each transaction. Finally, we construct the component represented by the ontology as XML by including the state information in the transaction. In this way, the smart contract is represented in a formal language that contains state information. It also laid the foundation for a smart contract that can be reused and verified.
区块链技术正在迅速发展。区块链通过参与者的特定共识来保证账本的完整性。过去,区块链技术的应用范围有限。然而,随着可以制定通用业务逻辑的智能合约的出现,区块链技术的使用正在逐步扩大。已经在其他研究中研究了智能合约的组成部分,并提出了在本体的基础上对其进行扩展的可能性。并对基于本体的智能合约可追溯性保护进行了研究。然而,缺乏对构成智能合约的各种交易的研究。本文对智能合约的构成要素进行了本体分析和表达。组件的协商过程由每个事务表示。最后,通过在事务中包含状态信息,将本体表示的组件构造为XML。通过这种方式,智能合约用包含状态信息的正式语言表示。它还为可重用和可验证的智能合约奠定了基础。
{"title":"Formal Specification Technique in Smart Contract Verification","authors":"Seung-min Lee, Soojin Park, Young B. Park","doi":"10.1109/PLATCON.2019.8669419","DOIUrl":"https://doi.org/10.1109/PLATCON.2019.8669419","url":null,"abstract":"The block chain technology is changing rapidly. The block chain guarantees the integrity of the book through a specific consensus of the participants. In the past, the block chain technology had a limited range of applications. However, the use of block chain technology is gradually expanding as smart contracts that can formulate general business logic are mentioned. Already studied the components of smart contracts in other studies and proposed the possibility of extending them on the basis of ontology. And research on securing traceability of smart contract based on ontology has been carried out. However, research on various transactions constituting smart contracts is lacking. In this paper, the constituent elements of smart contract are analyzed and expressed by ontology. And the process of negotiating the components is represented by each transaction. Finally, we construct the component represented by the ontology as XML by including the state information in the transaction. In this way, the smart contract is represented in a formal language that contains state information. It also laid the foundation for a smart contract that can be reused and verified.","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121630399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Android Application Risk Indicator Based on Feature Analysis Utilizing Machine Learning 基于机器学习特征分析的Android应用程序风险指标
Pub Date : 2019-01-01 DOI: 10.1109/PLATCON.2019.8669424
H. Baek, Minhee Joo, Won Park, Youngin You, K. Lee
As the penetration rate of smart mobile devices has increased, threats targeting the Android platform, which accounts for the majority of mobile operating systems, have increased. As a typical example, a fake Korea Financial Supervisory Service application(app) appeared at the end of 2017. When users installed this app and called the Financial Supervisory Service, there was a case of fake loan consultation, which resulted in financial loss and leakage of personal information. There have been a variety of malicious apps targeting mobile devices. As a result, it became necessary to detect the risks to such malicious apps and to make decisions about the apps. In this paper, we created a model to evaluate the risk of apps in Android and define the characteristics of each element. In addition, the risk from the model is used to make a risk map for decision making using unsupervised algorithms. To make the risk map in this paper uses the data of 2970 apps that is malicious or benign. As a result of the experiment, some of the benign apps were classified as very high risk. They had a lot of high-risk permissions, and there was a need for users to be careful. The results of this study can help users know the exact risk of Android apps and help detect unknown malicious apps.
随着智能移动设备普及率的提高,针对Android平台的威胁也在增加,Android平台在移动操作系统中占比最大。一个典型的例子是,2017年底出现了一个假冒的韩国金融监督院应用程序(app)。当用户安装该应用程序并打电话给金融监督院时,发生了虚假贷款咨询,导致财务损失和个人信息泄露的事件。针对移动设备的各种恶意应用程序层出不穷。因此,有必要检测这些恶意应用程序的风险,并对这些应用程序做出决定。在本文中,我们创建了一个模型来评估Android应用程序的风险,并定义了每个元素的特征。此外,该模型的风险被用于制作风险图,用于使用无监督算法进行决策。本文的风险图使用了2970个恶意或良性应用程序的数据。实验的结果是,一些良性应用被归类为高风险应用。它们有很多高风险的权限,用户需要小心。这项研究的结果可以帮助用户了解Android应用的确切风险,并帮助检测未知的恶意应用。
{"title":"Android Application Risk Indicator Based on Feature Analysis Utilizing Machine Learning","authors":"H. Baek, Minhee Joo, Won Park, Youngin You, K. Lee","doi":"10.1109/PLATCON.2019.8669424","DOIUrl":"https://doi.org/10.1109/PLATCON.2019.8669424","url":null,"abstract":"As the penetration rate of smart mobile devices has increased, threats targeting the Android platform, which accounts for the majority of mobile operating systems, have increased. As a typical example, a fake Korea Financial Supervisory Service application(app) appeared at the end of 2017. When users installed this app and called the Financial Supervisory Service, there was a case of fake loan consultation, which resulted in financial loss and leakage of personal information. There have been a variety of malicious apps targeting mobile devices. As a result, it became necessary to detect the risks to such malicious apps and to make decisions about the apps. In this paper, we created a model to evaluate the risk of apps in Android and define the characteristics of each element. In addition, the risk from the model is used to make a risk map for decision making using unsupervised algorithms. To make the risk map in this paper uses the data of 2970 apps that is malicious or benign. As a result of the experiment, some of the benign apps were classified as very high risk. They had a lot of high-risk permissions, and there was a need for users to be careful. The results of this study can help users know the exact risk of Android apps and help detect unknown malicious apps.","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114257643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Source Code Analysis for Static Prediction of Dynamic Memory Usage 源代码分析动态内存使用的静态预测
Pub Date : 2019-01-01 DOI: 10.1109/PLATCON.2019.8669417
Sangwho Kim, Jaecheol Ryou
We studied source code analysis techniques to predict statically how real programs work and use memory. If we can recognize problems of memory usage in the source code, we are able to prevent them and improve security in the software development phase. The problem detection techniques which are already existed can detect whether the program includes weak code such as Common Vulnerabilities and Exposures, Common Weakness Enumeration. However, these methods are not useful for finding problems in programs that do not include OpenSource. because they use hash value or pattern of weak code contained in OpenSource. Therefore, we propose a static prediction technique for dynamic memory usage with source code analysis without using techniques such as similarity detection. Also, we present how to calculate the values used for static prediction from the source code.
我们研究了源代码分析技术,以静态地预测实际程序如何工作和使用内存。如果我们能够识别源代码中的内存使用问题,我们就能够在软件开发阶段防止它们并提高安全性。现有的问题检测技术可以检测程序中是否存在薄弱代码,如常见漏洞和暴露、常见弱点枚举等。然而,这些方法对于在不包含开源的程序中发现问题是没有用的。因为它们使用散列值或开源中包含的弱代码模式。因此,我们提出了一种静态预测技术,用于动态内存使用的源代码分析,而不使用相似度检测等技术。此外,我们还介绍了如何从源代码计算用于静态预测的值。
{"title":"Source Code Analysis for Static Prediction of Dynamic Memory Usage","authors":"Sangwho Kim, Jaecheol Ryou","doi":"10.1109/PLATCON.2019.8669417","DOIUrl":"https://doi.org/10.1109/PLATCON.2019.8669417","url":null,"abstract":"We studied source code analysis techniques to predict statically how real programs work and use memory. If we can recognize problems of memory usage in the source code, we are able to prevent them and improve security in the software development phase. The problem detection techniques which are already existed can detect whether the program includes weak code such as Common Vulnerabilities and Exposures, Common Weakness Enumeration. However, these methods are not useful for finding problems in programs that do not include OpenSource. because they use hash value or pattern of weak code contained in OpenSource. Therefore, we propose a static prediction technique for dynamic memory usage with source code analysis without using techniques such as similarity detection. Also, we present how to calculate the values used for static prediction from the source code.","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121322504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on the Needs for Enhancement of Personal Information Protection in Cloud Computing Security Certification System 云计算安全认证体系中加强个人信息保护的需求研究
Pub Date : 2019-01-01 DOI: 10.1109/PLATCON.2019.8669413
Minju Kang, Hunyeong Kwon
Recently, the development of cloud computing technology has brought not only an easier access on information, but also security issues on personal information in the cloud industry. In this response, Cloud Security Certification System is implemented to solve the various cloud security problems in Korea. However, it is difficult to see that the level of technical protection measures of the cloud security certification system is satisfied with all the technical protection measures required by the personal information protection laws and regulations. As a result, it was proposed that security products that are highly related to the contents of the personal information protection laws and regulations should be in line with the CC(common criteria) certified product group. In this paper, we propose items that the cloud security certification system should supplement from the viewpoint of security requirements that are compliant with the CC certified product line
近年来,云计算技术的发展不仅给信息的获取带来了便利,同时也带来了云产业中个人信息的安全问题。为此,为了解决国内的各种云安全问题,实施了云安全认证制度。但是,很难看出云安全认证体系的技术保护措施水平满足个人信息保护法律法规要求的所有技术保护措施。因此,有人提出,与个人信息保护法律法规内容高度相关的安全产品应符合CC(通用标准)认证产品组。本文从符合CC认证产品线的安全需求角度,提出了云安全认证体系应补充的项目
{"title":"A Study on the Needs for Enhancement of Personal Information Protection in Cloud Computing Security Certification System","authors":"Minju Kang, Hunyeong Kwon","doi":"10.1109/PLATCON.2019.8669413","DOIUrl":"https://doi.org/10.1109/PLATCON.2019.8669413","url":null,"abstract":"Recently, the development of cloud computing technology has brought not only an easier access on information, but also security issues on personal information in the cloud industry. In this response, Cloud Security Certification System is implemented to solve the various cloud security problems in Korea. However, it is difficult to see that the level of technical protection measures of the cloud security certification system is satisfied with all the technical protection measures required by the personal information protection laws and regulations. As a result, it was proposed that security products that are highly related to the contents of the personal information protection laws and regulations should be in line with the CC(common criteria) certified product group. In this paper, we propose items that the cloud security certification system should supplement from the viewpoint of security requirements that are compliant with the CC certified product line","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114558582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ICMPv6SD: A Compact Service Discovery Protocol Supporting Plug-and-Play in Home Networks ICMPv6SD:支持家庭网络即插即用的紧凑型服务发现协议
Pub Date : 2019-01-01 DOI: 10.1109/PLATCON.2019.8669421
Zi-Chao Lin, Chun-Feng Liao
UPnP (Universal Plug and Play) is popular in home networks because it provides a general service management schemes for heterogeneous hardware and software based on open standards. Meanwhile, the rise of the internet of things (IoT) results in the rapid growth of the number of small or embedded devices which makes the IPv4 address exhaustion even worse. Hence, IPv6 is widely adopted in recent years. It is worthy to note that IPv6 also improves the design of the family of IP-based management protocols, namely, ICMPv6, so that the efficiency of transmission is significantly improved. Following this trend, UPnP also supports IPv6, but this extension concentrates on the address compatibility and neglects to utilize the improved design in IPv6. In light of this, this paper proposes a new service discovery protocol which bases on ICMPv6 in order to make the service discovery of UPnP more compact and efficient. Also, we develop a monitoring tool for developers to troubleshoot the problems of the proposed protocol. We hope this enhancement can make the deployment of IoT in the smart home network more scalable and robust.
UPnP (Universal Plug and Play,即通用即插即用)基于开放标准为异构硬件和软件提供了通用的业务管理方案,在家庭网络中非常流行。同时,物联网(IoT)的兴起导致小型或嵌入式设备数量的快速增长,使得IPv4地址枯竭更加严重。因此,IPv6在近年来被广泛采用。值得注意的是,IPv6还改进了基于ip的管理协议家族ICMPv6的设计,使传输效率得到了显著提高。遵循这一趋势,UPnP也支持IPv6,但这个扩展集中在地址兼容性和忽略利用IPv6改进的设计。鉴于此,本文提出了一种新的基于ICMPv6的服务发现协议,以使UPnP的服务发现更加紧凑和高效。此外,我们还为开发人员开发了一个监控工具,以排除所提议协议的问题。我们希望这种增强可以使物联网在智能家居网络中的部署更具可扩展性和鲁棒性。
{"title":"ICMPv6SD: A Compact Service Discovery Protocol Supporting Plug-and-Play in Home Networks","authors":"Zi-Chao Lin, Chun-Feng Liao","doi":"10.1109/PLATCON.2019.8669421","DOIUrl":"https://doi.org/10.1109/PLATCON.2019.8669421","url":null,"abstract":"UPnP (Universal Plug and Play) is popular in home networks because it provides a general service management schemes for heterogeneous hardware and software based on open standards. Meanwhile, the rise of the internet of things (IoT) results in the rapid growth of the number of small or embedded devices which makes the IPv4 address exhaustion even worse. Hence, IPv6 is widely adopted in recent years. It is worthy to note that IPv6 also improves the design of the family of IP-based management protocols, namely, ICMPv6, so that the efficiency of transmission is significantly improved. Following this trend, UPnP also supports IPv6, but this extension concentrates on the address compatibility and neglects to utilize the improved design in IPv6. In light of this, this paper proposes a new service discovery protocol which bases on ICMPv6 in order to make the service discovery of UPnP more compact and efficient. Also, we develop a monitoring tool for developers to troubleshoot the problems of the proposed protocol. We hope this enhancement can make the deployment of IoT in the smart home network more scalable and robust.","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114361218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PlatCon 2019 TOC
Pub Date : 2019-01-01 DOI: 10.1109/platcon.2019.8669433
{"title":"PlatCon 2019 TOC","authors":"","doi":"10.1109/platcon.2019.8669433","DOIUrl":"https://doi.org/10.1109/platcon.2019.8669433","url":null,"abstract":"","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124783925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation System of a Reservation-Based 3D Intersection Crossing Scheme for UAVs 基于预约的无人机三维交叉方案仿真系统
Pub Date : 2019-01-01 DOI: 10.1109/PLATCON.2019.8669427
Areeya Rubenecia, Myungwhan Choi, Hyohyun Choi
This paper presents the simulation system of a three dimensional intersection crossing model. In this model, multiple UAVs must access the intersection without colliding with each other. The system uses reservation-based scheduling to manage the entrance of the UAVs in the intersection wherein there will be no collision among the UAVs that are travelling in the intersection at the same time. It also finds the path to be taken by the UAV through which it will reach the exit of the intersection in the shortest time. The simulation system is implemented using object-oriented programming. UML diagrams are used to describe the simulation system’s structure. Along with the UML diagram, we discussed the classes, attributes, methods and the relationship of the classes in the simulation.
本文介绍了一种三维交叉模型的仿真系统。在该模型中,多架无人机必须在不发生碰撞的情况下进入交叉口。该系统采用基于预约调度的方式对无人机进入交叉口进行管理,使同时在交叉口行驶的无人机之间不会发生碰撞。并找出无人机在最短时间内到达交叉口出口的路径。仿真系统采用面向对象的编程方法实现。UML图用于描述仿真系统的结构。通过UML图,我们讨论了仿真中的类、属性、方法和类之间的关系。
{"title":"Simulation System of a Reservation-Based 3D Intersection Crossing Scheme for UAVs","authors":"Areeya Rubenecia, Myungwhan Choi, Hyohyun Choi","doi":"10.1109/PLATCON.2019.8669427","DOIUrl":"https://doi.org/10.1109/PLATCON.2019.8669427","url":null,"abstract":"This paper presents the simulation system of a three dimensional intersection crossing model. In this model, multiple UAVs must access the intersection without colliding with each other. The system uses reservation-based scheduling to manage the entrance of the UAVs in the intersection wherein there will be no collision among the UAVs that are travelling in the intersection at the same time. It also finds the path to be taken by the UAV through which it will reach the exit of the intersection in the shortest time. The simulation system is implemented using object-oriented programming. UML diagrams are used to describe the simulation system’s structure. Along with the UML diagram, we discussed the classes, attributes, methods and the relationship of the classes in the simulation.","PeriodicalId":364838,"journal":{"name":"2019 International Conference on Platform Technology and Service (PlatCon)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121649234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 International Conference on Platform Technology and Service (PlatCon)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1