scispace - formally typeset
Search or ask a question
Institution

Future University Hakodate

EducationHakodate, Japan
About: Future University Hakodate is a education organization based out in Hakodate, Japan. It is known for research contribution in the topics: Network packet & Mobile ad hoc network. The organization has 485 authors who have published 1338 publications receiving 13204 citations. The organization is also known as: Mirai Daigaku (Future University) Hakodate Japan.


Papers
More filters
Journal ArticleDOI
01 May 2013
TL;DR: This paper explores a general theoretical framework that enables the achievable throughput analysis to be conducted for a directional antenna-based MANET, and shows that the maximum achievable throughput obtained matches nicely with that obtained from simulation under a realistic model.
Abstract: A major obstacle stunting the application of mobile ad hoc networks (MANETs) is the lack of a general throughput analysis theory for such networks. The available works in this area mainly focus on asymptotic throughput study (order sense) in MANETs with omnidirectional antennas or directional antennas. Although the order sense results can help us to understand the general scaling behaviors, it tells us little about the exact achievable throughput. This paper studies the achievable throughput of a MANET where each node is equipped with a directional antenna of beamwidth ? for transmission. A generalized two hop relay scheme with packet redundancy f is adopted for packet routing. Based on the Markov chain and automatic feedback theory, we explore a general theoretical framework that enables the achievable throughput analysis to be conducted for a directional antenna-based MANET. Based on the results of the achievable per node throughput, we further explore the throughput optimization problem for a fixed beamwidth ? and determine the corresponding optimal setting of f to achieve the optimal throughput. Numerical studies are also conducted to demonstrate the efficiency of these models.It shows that the maximum achievable throughput obtained from our theoretical framework matches nicely (with at most 7% difference) with that obtained from simulation under a realistic model.

30 citations

Proceedings ArticleDOI
21 May 2007
TL;DR: This scheme deals with data standardization in order to make the result more reasonable and secure, and it is shown that the scheme is secure and complete with good efficiency.
Abstract: K-means clustering is a powerful and frequently used technique in data mining. However, privacy breaching is a serious problem if the k-means clustering is used without any security treatment, while privacy is a real concern in many practical applications. Recently, four privacy-preserving solutions based on cryptography have been proposed by different researchers. Unfortunately none of these four schemes can achieve both security and completeness with good efficiency. In this paper, we present a new scheme to overcome the problems occurred previously. Our scheme deals with data standardization in order to make the result more reasonable. We show that our scheme is secure and complete with good efficiency.

30 citations

Proceedings ArticleDOI
02 Sep 2004
TL;DR: A novel type of game using biological signals was developed as an entertainment device and the change in skin conductance caused by sweating was measured as a signal reflecting the player's agitation during the game.
Abstract: There are many computer games in the world, but generally game players challenge either the computer, or real players in the case of many person games. In view of the strong connectivity advocated between communication and entertainment in the field of entertainment computing, the use of biological signals for computer games is of interest. Here, a novel type of game using biological signals was developed as an entertainment device. The change in skin conductance caused by sweating was measured as a signal reflecting the player's agitation during the game. This type of game incorporates various characteristics relating to communication. First, players of the game challenge themselves because they are able to view their detected biological signals. In this situation, a kind of self-reference system is constructed. Second, the environments in which the game is played changed how the game was enjoyed. Third, the game system reveals differences of context between player and observer. From these characteristics, it is considered that the use of biological signals is attractive for entertainment computing.

30 citations

Journal ArticleDOI
TL;DR: This article proposes a general and lightweight PHY-layer authentication framework for the Internet of Things (IoT) devices in smart cities, based on tag embedding and tag verification, and provides numerical results to validate these analytical models and to illustrate how authentication performance against the typical impersonation attack varies with system parameters.
Abstract: This article proposes a general and lightweight PHY-layer authentication framework for the Internet of Things (IoT) devices in smart cities, based on tag embedding and tag verification. More specifically, a tag signal carefully designed to be independent of the message signal of a transmitter [i.e., an IoT device (IoTD)] is encrypted and embedded into the signal of the device, and the tag signal is then retrieved at a receiver based on signal detection techniques to verify if it is from the legitimate IoTD or from an illegitimate adversary. With the help of matrix analysis and composite hypothesis testing theories, analytical models are further developed to depict the authentication performance of the proposed authentication framework under various tag signal models. We then provide numerical results to validate these analytical models and to illustrate how authentication performance against the typical impersonation attack varies with system parameters. Finally, we include discussions to demonstrate the effectiveness of the proposed authentication solution in resisting against other various attacks like replay, unauthorized detection, tampering, and man-in-the-middle.

30 citations

Journal ArticleDOI
TL;DR: This paper designs an incentive mechanism that stimulates jammers to generate artificial jamming for security enhancement, and develops a non-cooperative game framework to resolve the jamming power setting issue.
Abstract: This paper focuses on the QoS-aware secure routing design based on the physical layer security technology for a multi-hop wireless network consisting of legitimate nodes, malicious eavesdroppers, and selfish jammers. We first provide theoretical modeling for a given route to reveal how its end-to-end security/QoS performance is related to the transmitting power of legitimate nodes along the route and the jamming power of jammers in the network. We then design an incentive mechanism that stimulates jammers to generate artificial jamming for security enhancement, and also develop a non-cooperative game framework to resolve the jamming power setting issue here. Based on the security/QoS performance modeling of the route and jamming power setting, we further propose a theoretical framework to determine the optimal transmitting power of nodes along the route such that its optimal transmission security can be achieved under a QoS constraint. Finally, with the help of the power setting results of the given route, we formulate a shortest weighted path-finding problem to identify the optimal route for data delivery in the network, which can be solved by employing the Bellman-Ford or Dijkstra’s algorithm. It is demonstrated that the proposed routing scheme is individually rational , stable , distributed and computationally efficient .

29 citations


Authors

Showing all 490 results

NameH-indexPapersCitations
Elizabeth D. Mynatt5322612992
Sidney Fels383846288
Kouichi Sakurai335686154
Tsuyoshi Takagi333725342
Toshiyuki Nakagaki321035469
Misako Takayasu302003596
Fagen Li291862910
Kenichiro Tanaka291473594
Masahiko Yoshimoto273813809
Xiaohong Jiang263223275
Howon Kim252702788
Daisuke Sakamoto25962103
Tetsuo Ono24822470
Shin-ichi Minato221492779
Yoshisuke Ueda22792279
Network Information
Related Institutions (5)
Waseda University
46.8K papers, 837.8K citations

84% related

Nara Institute of Science and Technology
14.2K papers, 419.2K citations

84% related

Nokia
28.3K papers, 695.7K citations

83% related

Nippon Telegraph and Telephone
22.3K papers, 430.4K citations

83% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20233
20227
202145
202072
201985
201887