首页 > 最新文献

2019 International Conference on Information Networking (ICOIN)最新文献

英文 中文
Infection Dynamics of Self-Evolving Botnets with Deterministic Modeling 基于确定性建模的自进化僵尸网络感染动力学
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718173
Yuya Kumai, Koki Hongyo, Tomotaka Kimura, K. Hirata
In the past, the concept of self-evolving botnets, where computing resources of infected hosts are exploited to discover vulnerabilities, have been introduced in the literature. This paper proposes a deterministic epidemic model that represents the infection dynamics of self-evolving botnets. The proposed epidemic model represents the infection dynamics of the self-evolving botnet with ordinary differential equations based on a Susceptible-Infected-Recovered-Susceptible model, which is widely used for general epidemic models of malware infection. Through numerical calculations, we show the infection behavior of self-evolving botnets.
过去,文献中已经引入了自进化僵尸网络的概念,即利用受感染主机的计算资源来发现漏洞。本文提出了一种表征自进化僵尸网络感染动态的确定性流行病模型。本文提出的流行模型基于易感-感染-恢复-易感模型,用常微分方程表示自进化僵尸网络的感染动态,该模型广泛用于一般的恶意软件感染流行模型。通过数值计算,我们展示了自进化僵尸网络的感染行为。
{"title":"Infection Dynamics of Self-Evolving Botnets with Deterministic Modeling","authors":"Yuya Kumai, Koki Hongyo, Tomotaka Kimura, K. Hirata","doi":"10.1109/ICOIN.2019.8718173","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718173","url":null,"abstract":"In the past, the concept of self-evolving botnets, where computing resources of infected hosts are exploited to discover vulnerabilities, have been introduced in the literature. This paper proposes a deterministic epidemic model that represents the infection dynamics of self-evolving botnets. The proposed epidemic model represents the infection dynamics of the self-evolving botnet with ordinary differential equations based on a Susceptible-Infected-Recovered-Susceptible model, which is widely used for general epidemic models of malware infection. Through numerical calculations, we show the infection behavior of self-evolving botnets.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116416239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trustless Two-Factor Authentication Using Smart Contracts in Blockchains 在区块链中使用智能合约的无信任双因素身份验证
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718198
Varun Amrutiya, S. Jhamb, Pranjal Priyadarshi, Ashutosh Bhatia
Two-factor authentication (2FA) is widely prevalent in banking, emails and virtual private networks (VPN) connections or in accessing any secure web service. In 2FA, to get authenticated the users are expected to provide additional secret information along with the password. Typically, this secret information (tokens) is generated by a centralized trusted third party upon receiving an authentication request from users. Thus, this additional layer of security comes at the cost of inherently trusting the third party for their services. The security of such authentication systems is always under the threat of the trusted party is being compromised. In this paper, we propose a novel approach to make server authentication even more secure by building 2FA over the blockchain platform which is distributed in nature. The proposed solution does not require any trusted third party between claimant (user) and the verifier (server) for the authentication purpose. To demonstrate the idea of using blockchain technology for 2FA, we have added an extra layer of security component to the OpenSSH server a widely used application for Secure Shell (SSH) protocol.
双因素认证(2FA)在银行、电子邮件和虚拟专用网络(VPN)连接或访问任何安全web服务中广泛流行。在2FA中,为了获得身份验证,用户需要提供额外的秘密信息和密码。通常,这个秘密信息(令牌)是由一个集中可信的第三方在接收到来自用户的身份验证请求时生成的。因此,这一额外的安全层是以信任第三方的服务为代价的。这类认证系统的安全性总是受到受信任方被泄露的威胁。在本文中,我们提出了一种新颖的方法,通过在分布式区块链平台上构建2FA,使服务器身份验证更加安全。提议的解决方案不需要在索赔人(用户)和验证者(服务器)之间存在任何可信的第三方来进行身份验证。为了演示在2FA中使用区块链技术的想法,我们向OpenSSH服务器添加了一个额外的安全组件层,OpenSSH服务器是一个广泛使用的SSH协议应用程序。
{"title":"Trustless Two-Factor Authentication Using Smart Contracts in Blockchains","authors":"Varun Amrutiya, S. Jhamb, Pranjal Priyadarshi, Ashutosh Bhatia","doi":"10.1109/ICOIN.2019.8718198","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718198","url":null,"abstract":"Two-factor authentication (2FA) is widely prevalent in banking, emails and virtual private networks (VPN) connections or in accessing any secure web service. In 2FA, to get authenticated the users are expected to provide additional secret information along with the password. Typically, this secret information (tokens) is generated by a centralized trusted third party upon receiving an authentication request from users. Thus, this additional layer of security comes at the cost of inherently trusting the third party for their services. The security of such authentication systems is always under the threat of the trusted party is being compromised. In this paper, we propose a novel approach to make server authentication even more secure by building 2FA over the blockchain platform which is distributed in nature. The proposed solution does not require any trusted third party between claimant (user) and the verifier (server) for the authentication purpose. To demonstrate the idea of using blockchain technology for 2FA, we have added an extra layer of security component to the OpenSSH server a widely used application for Secure Shell (SSH) protocol.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116943978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Popularity-Based Content Cache Management for in-Network Caching 用于网络缓存的基于流行度的内容缓存管理
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718180
Taketo Fukushima, M. Iio, K. Hirata, M. Yamamoto
In-network caching is a technique that stores contents in caches of routers, and thus reduces the loads for content servers and networks. To further enhance the performance of in-network caching, this paper proposes a popularity-based content cache management method. The proposed method divides the cached contents into some groups based on their popularity and manages information on content placement of each group in a distributed manner with a distributed hash table mechanism. The proposed method enables users to download contents stored in near routers with low overheads. This paper shows that the proposed method enhances the cache utilization efficiently through simulation experiments.
网络内缓存是一种将内容存储在路由器缓存中的技术,从而减少了内容服务器和网络的负载。为了进一步提高网络内缓存的性能,本文提出了一种基于流行度的内容缓存管理方法。该方法根据缓存内容的受欢迎程度将其划分为若干组,并利用分布式哈希表机制对每组内容的位置信息进行分布式管理。该方法使用户能够以较低的开销下载存储在附近路由器中的内容。仿真实验表明,该方法有效地提高了缓存利用率。
{"title":"Popularity-Based Content Cache Management for in-Network Caching","authors":"Taketo Fukushima, M. Iio, K. Hirata, M. Yamamoto","doi":"10.1109/ICOIN.2019.8718180","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718180","url":null,"abstract":"In-network caching is a technique that stores contents in caches of routers, and thus reduces the loads for content servers and networks. To further enhance the performance of in-network caching, this paper proposes a popularity-based content cache management method. The proposed method divides the cached contents into some groups based on their popularity and manages information on content placement of each group in a distributed manner with a distributed hash table mechanism. The proposed method enables users to download contents stored in near routers with low overheads. This paper shows that the proposed method enhances the cache utilization efficiently through simulation experiments.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134512557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Experimental Evaluation of Mobile Core Networks on Simultaneous Access from M2M/IoT Terminals M2M/IoT终端同时接入移动核心网的实验评估
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718176
Masaki Ueno, G. Hasegawa, M. Murata
Handling congestion in LTE/5G cellular networks has become a critical issue due to recent, rapid increase in cellular network traffic. Control plane congestion becomes particularly serious when accommodating massive M2M/IoT terminals into cellular networks. Although various methods have been proposed for accommodation of M2M/IoT terminals, most of them are mainly based on mathematical analysis and simulation experiments. In this paper, we show the experimental evaluation results of the performance of a mobile core network to assess the impact of bursty access from M2M/IoT terminals. First, we constructed our experimental environment based on open-source implementation of mobile core networks and emulated user terminals. Then, we conducted experiments on simultaneous attach requests from multiple user terminals and measured the processing delay at each mobile core node. The results of our evaluations proved that concentrating attach requests from forty user terminals increases the processing time at a mobility management entity (MME) by up to around 510% when an MME node is operated on a virtual machine with 1 GHz / 1 core CPU.
由于最近蜂窝网络流量的快速增长,处理LTE/5G蜂窝网络中的拥塞已成为一个关键问题。当大量M2M/IoT终端接入蜂窝网络时,控制平面拥塞变得尤为严重。虽然针对M2M/IoT终端的适配提出了各种方法,但大多数方法主要是基于数学分析和仿真实验。在本文中,我们展示了移动核心网性能的实验评估结果,以评估来自M2M/IoT终端的突发接入的影响。首先,我们构建了基于开源实现的移动核心网和仿真用户终端的实验环境。然后,我们对来自多个用户终端的同时附加请求进行了实验,并测量了每个移动核心节点的处理延迟。我们的评估结果证明,当移动管理实体(MME)节点在具有1 GHz / 1核CPU的虚拟机上操作时,集中来自40个用户终端的附加请求将使MME的处理时间增加约510%。
{"title":"Experimental Evaluation of Mobile Core Networks on Simultaneous Access from M2M/IoT Terminals","authors":"Masaki Ueno, G. Hasegawa, M. Murata","doi":"10.1109/ICOIN.2019.8718176","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718176","url":null,"abstract":"Handling congestion in LTE/5G cellular networks has become a critical issue due to recent, rapid increase in cellular network traffic. Control plane congestion becomes particularly serious when accommodating massive M2M/IoT terminals into cellular networks. Although various methods have been proposed for accommodation of M2M/IoT terminals, most of them are mainly based on mathematical analysis and simulation experiments. In this paper, we show the experimental evaluation results of the performance of a mobile core network to assess the impact of bursty access from M2M/IoT terminals. First, we constructed our experimental environment based on open-source implementation of mobile core networks and emulated user terminals. Then, we conducted experiments on simultaneous attach requests from multiple user terminals and measured the processing delay at each mobile core node. The results of our evaluations proved that concentrating attach requests from forty user terminals increases the processing time at a mobility management entity (MME) by up to around 510% when an MME node is operated on a virtual machine with 1 GHz / 1 core CPU.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"34 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114021006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
System Designing and Plototyping on IoT for a Factory 工厂物联网系统设计与规划
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718196
Daiki Takemura, Atsusuke Murata, Kensei Miyakoshi, T. Yokotani, Y. Kobayashi, Y. Kobayashi
In manufacturing fields, the deployment of IoT has been discussed for creating new functionalities of products and for enhancing the manufacturing efficiency. However, most machines in a factory do not support communication interfaces for IoT. This study proposes monitoring systems using sensors and wireless networks for machines used in manufacturing, which lack communication interfaces. In addition, this study proposes monitoring the power consumption of machines using clamping current sensors and the status of machines using color sensors. These monitoring schemes do not impact traditional machines that lack communication interfaces. Furthermore, the network performance of the proposed monitoring system and the implementation of prototyping systems are also discussed.
在制造领域,物联网的部署已经被讨论用于创造产品的新功能和提高制造效率。然而,工厂中的大多数机器不支持物联网的通信接口。这项研究提出了使用传感器和无线网络的监测系统,用于缺乏通信接口的制造机器。此外,本研究建议使用夹紧电流传感器监测机器的功耗,使用颜色传感器监测机器的状态。这些监控方案不会影响缺乏通信接口的传统机器。此外,还讨论了所提出的监控系统的网络性能和原型系统的实现。
{"title":"System Designing and Plototyping on IoT for a Factory","authors":"Daiki Takemura, Atsusuke Murata, Kensei Miyakoshi, T. Yokotani, Y. Kobayashi, Y. Kobayashi","doi":"10.1109/ICOIN.2019.8718196","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718196","url":null,"abstract":"In manufacturing fields, the deployment of IoT has been discussed for creating new functionalities of products and for enhancing the manufacturing efficiency. However, most machines in a factory do not support communication interfaces for IoT. This study proposes monitoring systems using sensors and wireless networks for machines used in manufacturing, which lack communication interfaces. In addition, this study proposes monitoring the power consumption of machines using clamping current sensors and the status of machines using color sensors. These monitoring schemes do not impact traditional machines that lack communication interfaces. Furthermore, the network performance of the proposed monitoring system and the implementation of prototyping systems are also discussed.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128749080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
TALON: Tenant Throughput Allocation Through Traffic Load-Balancing in Virtualized Software-Defined Networks TALON:虚拟化软件定义网络中基于流量负载均衡的租户吞吐量分配
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8717976
Heesang Jin, Gyeongsik Yang, Bong-yeol Yu, C. Yoo
Virtualized software-defined networking (SDN) has been drawing increasing attention in data centers. SDN enables the creation of arbitrary and flexible virtual networks. However, given that the physical network is shared among multiple tenants, the throughput of a tenant can interfere with that of the other tenants, and the throughput requirement on each tenant cannot be met. To solve this problem, we propose TALON, a throughput allocation scheme based on traffic load-balancing. TALON allocates a throughput per tenant flow by calculating multiple paths to fulfill the traffic requirement. We design and implement TALON using an open-source network hypervisor. The evaluation results show that each tenant's throughput requirements are nearly met. In addition, the throughput increases by up to 2.29 times compared to that of a non-load-balancing network.
虚拟化软件定义网络(SDN)在数据中心越来越受到关注。SDN可以创建任意灵活的虚拟网络。但是,如果物理网络在多个租户之间共享,则一个租户的吞吐量可能会干扰其他租户的吞吐量,并且无法满足每个租户的吞吐量需求。为了解决这个问题,我们提出了一种基于流量负载均衡的吞吐量分配方案TALON。TALON通过计算多条路径来为每个租户流分配吞吐量,以满足流量需求。我们使用开源网络管理程序设计和实现TALON。评估结果表明,每个租户的吞吐量要求基本满足。此外,与非负载均衡网络相比,吞吐量提高了2.29倍。
{"title":"TALON: Tenant Throughput Allocation Through Traffic Load-Balancing in Virtualized Software-Defined Networks","authors":"Heesang Jin, Gyeongsik Yang, Bong-yeol Yu, C. Yoo","doi":"10.1109/ICOIN.2019.8717976","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8717976","url":null,"abstract":"Virtualized software-defined networking (SDN) has been drawing increasing attention in data centers. SDN enables the creation of arbitrary and flexible virtual networks. However, given that the physical network is shared among multiple tenants, the throughput of a tenant can interfere with that of the other tenants, and the throughput requirement on each tenant cannot be met. To solve this problem, we propose TALON, a throughput allocation scheme based on traffic load-balancing. TALON allocates a throughput per tenant flow by calculating multiple paths to fulfill the traffic requirement. We design and implement TALON using an open-source network hypervisor. The evaluation results show that each tenant's throughput requirements are nearly met. In addition, the throughput increases by up to 2.29 times compared to that of a non-load-balancing network.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117034109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Publication & Copyright 出版及版权
Pub Date : 2019-01-01 DOI: 10.1109/icufn.2013.6614759
{"title":"Publication & Copyright","authors":"","doi":"10.1109/icufn.2013.6614759","DOIUrl":"https://doi.org/10.1109/icufn.2013.6614759","url":null,"abstract":"","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115497268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of the Geographic Routing Protocols Scalability 地理路由协议可扩展性的性能评估
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718178
Akashah Arshad, Z. Hanapi, S. Shamala, R. Latip
Scalability is an important design factor for evaluating the performance of routing protocols as the network size or traffic load increases. One of the most appropriate design methods is to use geographic routing approach to ensure scalability. This paper describes a scalability study comparing Secure Region Based Geographic Routing (SRBGR) and Dynamic Window Secure Implicit Geographic Forwarding (DWSIGF) protocols in various network density scenarios based on an end-to-end delay performance metric. The simulation studies were conducted in MATLAB 2106b where the network densities were varied according to the network topology size with increasing traffic rates. The results showed that DWSIGF has a lower end-to-end delay as compared to SRBGR for both sparse (15.4%) and high density (63.3%) network scenarios.Despite SRBGR having good security features, there is a need to improve the performance of its end-to-end delay to fulfil the application requirements.
随着网络规模或流量负载的增加,可伸缩性是评估路由协议性能的一个重要设计因素。最合适的设计方法之一是使用地理路由方法来保证可伸缩性。本文基于端到端延迟性能指标,对基于安全区域的地理路由(SRBGR)和动态窗口安全隐式地理转发(DWSIGF)协议在不同网络密度场景下的可扩展性进行了比较研究。仿真研究在MATLAB 2106b中进行,网络密度随网络拓扑大小和流量速率的增加而变化。结果表明,与SRBGR相比,DWSIGF在稀疏(15.4%)和高密度(63.3%)网络场景下都具有更低的端到端延迟。尽管SRBGR具有良好的安全特性,但仍需要改进其端到端延迟的性能,以满足应用程序的需求。
{"title":"Performance Evaluation of the Geographic Routing Protocols Scalability","authors":"Akashah Arshad, Z. Hanapi, S. Shamala, R. Latip","doi":"10.1109/ICOIN.2019.8718178","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718178","url":null,"abstract":"Scalability is an important design factor for evaluating the performance of routing protocols as the network size or traffic load increases. One of the most appropriate design methods is to use geographic routing approach to ensure scalability. This paper describes a scalability study comparing Secure Region Based Geographic Routing (SRBGR) and Dynamic Window Secure Implicit Geographic Forwarding (DWSIGF) protocols in various network density scenarios based on an end-to-end delay performance metric. The simulation studies were conducted in MATLAB 2106b where the network densities were varied according to the network topology size with increasing traffic rates. The results showed that DWSIGF has a lower end-to-end delay as compared to SRBGR for both sparse (15.4%) and high density (63.3%) network scenarios.Despite SRBGR having good security features, there is a need to improve the performance of its end-to-end delay to fulfil the application requirements.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115779032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving TDoA Based Positioning Accuracy Using Machine Learning in a LoRaWan Environment 在LoRaWan环境中使用机器学习提高基于TDoA的定位精度
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718160
Jae-Hun Cho, Dongyeop Hwang, Ki-Hyung Kim
LoRa is one of the low power wide area communication technologies (LPWA) that enables low cost chip module design due to low power, high receiver sensitivity and license-exempt bandwidth. Because of this, It is a technology suitable for IoT services with low data throughput and variability. For low-power-based positioning in $L$ oRa environments While varinous techniques have been tried, The error is It is over a hundred meters. Because of this It is difficult to commercialize practical location services. In this paper, To reduce the TDoA positioning error, a train was made to correct the time error that occurs when transmitting. We propose a method of learning the time error in the DNN model and correcting it using the learned model in actual positioning. The experimental environment was constructed using python and keras. Experiment result, We confirmed that the error range decreases when the number of reference nodes and collected data are large and the mobile node is close to the reference node.
LoRa是一种低功耗广域通信技术(LPWA),由于低功耗、高接收器灵敏度和免许可带宽,可以实现低成本的芯片模块设计。因此,它是一种适用于低数据吞吐量和可变性的物联网服务的技术。对于在低功耗环境下的定位,虽然已经尝试了各种技术,但误差超过一百米。因此,实用性定位服务很难实现商业化。为了减小TDoA定位误差,本文设计了一列列车对发射时产生的时间误差进行校正。我们提出了一种学习DNN模型中的时间误差并在实际定位中使用学习到的模型进行修正的方法。使用python和keras构建实验环境。实验结果表明,当参考节点和采集数据数量较大,移动节点离参考节点较近时,误差范围减小。
{"title":"Improving TDoA Based Positioning Accuracy Using Machine Learning in a LoRaWan Environment","authors":"Jae-Hun Cho, Dongyeop Hwang, Ki-Hyung Kim","doi":"10.1109/ICOIN.2019.8718160","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718160","url":null,"abstract":"LoRa is one of the low power wide area communication technologies (LPWA) that enables low cost chip module design due to low power, high receiver sensitivity and license-exempt bandwidth. Because of this, It is a technology suitable for IoT services with low data throughput and variability. For low-power-based positioning in $L$ oRa environments While varinous techniques have been tried, The error is It is over a hundred meters. Because of this It is difficult to commercialize practical location services. In this paper, To reduce the TDoA positioning error, a train was made to correct the time error that occurs when transmitting. We propose a method of learning the time error in the DNN model and correcting it using the learned model in actual positioning. The experimental environment was constructed using python and keras. Experiment result, We confirmed that the error range decreases when the number of reference nodes and collected data are large and the mobile node is close to the reference node.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114738484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
BLE-Enabled Medication Events Monitoring System (MEMS) for Community Dwelling Seniors 基于ble的社区老年人用药事件监测系统(MEMS)
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718112
Avinash Subramaniam, H. Tan, Hwee-Pink Tan
In this paper, we propose a low-cost Medication Events Monitoring System (MEMS) that can be deployed as a stand-alone solution for community dwelling seniors. The system comprises a mains-powered Raspberry Pi Zero W as the gateway, and a plastic box instrumented with a sensor node. The sensor node is composed of an Estimote beacon that is attached with a reed switch, and a magnet that is attached to the lid of the plastic box. We evaluate the performance of the MEMS in terms of its sensing accuracy and its transmission reliability through experiments conducted in a research laboratory environment. Our results suggest that the performance of the proposed MEMS depends on the event interval, as well as the distance between the MEMS node and the gateway. At 2m (8m) apart, reliable sensing and transmission can be achieved when the interval between box opening and closing events is 15 sec (20 sec) or greater. These conditions seem reasonable and will need to be further validated when deployed in a home setting for community dwelling seniors.
在本文中,我们提出了一种低成本的药物事件监测系统(MEMS),可以作为一个独立的解决方案部署在社区居住的老年人。该系统包括一个主电源供电的树莓派Zero W作为网关,以及一个带有传感器节点的塑料盒。传感器节点由连接有簧片开关的Estimote信标和连接在塑料盒盖上的磁铁组成。我们通过在研究实验室环境中进行的实验,评估了MEMS在传感精度和传输可靠性方面的性能。我们的研究结果表明,MEMS的性能取决于事件间隔,以及MEMS节点和网关之间的距离。在相距2m (8m)处,当箱体开闭事件间隔为15秒(20秒)或更大时,可实现可靠的传感和传输。这些条件似乎是合理的,需要在社区居住老年人的家庭环境中进一步验证。
{"title":"BLE-Enabled Medication Events Monitoring System (MEMS) for Community Dwelling Seniors","authors":"Avinash Subramaniam, H. Tan, Hwee-Pink Tan","doi":"10.1109/ICOIN.2019.8718112","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718112","url":null,"abstract":"In this paper, we propose a low-cost Medication Events Monitoring System (MEMS) that can be deployed as a stand-alone solution for community dwelling seniors. The system comprises a mains-powered Raspberry Pi Zero W as the gateway, and a plastic box instrumented with a sensor node. The sensor node is composed of an Estimote beacon that is attached with a reed switch, and a magnet that is attached to the lid of the plastic box. We evaluate the performance of the MEMS in terms of its sensing accuracy and its transmission reliability through experiments conducted in a research laboratory environment. Our results suggest that the performance of the proposed MEMS depends on the event interval, as well as the distance between the MEMS node and the gateway. At 2m (8m) apart, reliable sensing and transmission can be achieved when the interval between box opening and closing events is 15 sec (20 sec) or greater. These conditions seem reasonable and will need to be further validated when deployed in a home setting for community dwelling seniors.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128128626","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2019 International Conference on Information Networking (ICOIN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1