Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IA |
2020-11-09 14:57 |
Hokkaido |
(Primary: On-site, Secondary: Online) |
Development and evaluation of efficient vulnerability scanning system for IoT networks Kazusyoshi Watanabe, Katsuyoshi Iida, Yoshiaki Takai (Hokkaido Univ) IA2020-19 |
In recent years, a security incident called DRDoS attack, which is a kind of DoS attack using reflections and amplificat... [more] |
IA2020-19 pp.7-12 |
CS |
2020-07-17 13:30 |
Hokkaido |
Ripura(Rishiri Fuji) (Primary: On-site, Secondary: Online) |
Device identification based on RF circuit imperfections Taisei Nakada, Ryota Shinoda, Yuichi Miyaji, Hideyuki Uehara (TUT) CS2020-31 |
In this report we introduce device identification based on physical information specific to wireless devices, which is a... [more] |
CS2020-31 pp.61-66 |
SR, NS, SeMI, RCC, RCS (Joint) |
2020-07-09 14:15 |
Online |
Online |
Study on Chaos-based Multi-user Interleave Division Multiple Access Scheme Mamoru Okumura, Tomoki Kaga, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCC2020-7 NS2020-36 RCS2020-70 SR2020-15 SeMI2020-7 |
In the fifth-generation mobile communications system (5G), massive machine-type communications (mMTC), which accommodate... [more] |
RCC2020-7 NS2020-36 RCS2020-70 SR2020-15 SeMI2020-7 pp.31-36(RCC), pp.31-36(NS), pp.73-78(RCS), pp.37-42(SR), pp.25-30(SeMI) |
CQ, CS (Joint) |
2020-06-26 11:40 |
Online |
Online |
Intrusion detection system for IoT networks Ginga Katsurai, Hiroaki Mukai (KIT) CS2020-12 |
In recent years, while IoT technology has been introduced into various fields, cyber-attacks targeting the IoT devices a... [more] |
CS2020-12 pp.49-52 |
RCS |
2020-06-24 16:10 |
Online |
Online |
Study on Applying Radio -Wave Encryption to Interleave Division Multiple Access Scheme Mamoru Okumura, Tomoki Kaga, Eiji Okamoto (NIT), Tetsuya Yamamoto (Panasonic) RCS2020-30 |
One of the main use cases of the fifth-generation mobile communications system (5G) is massive machine-type communicatio... [more] |
RCS2020-30 pp.43-48 |
ISEC |
2020-05-20 16:05 |
Online |
Online |
Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT) ISEC2020-12 |
With a rapid increase in the number of IoT devices, many
identity-based authenticated key exchange (IBAKE) protocols fo... [more] |
ISEC2020-12 pp.55-61 |
NS, IN (Joint) |
2020-03-06 09:50 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
Framework to Utilize Others' Behavior without Sharing Privacy Information Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.) IN2019-114 |
A cyberattack to operate home IoT devices by attackers is a serious problem, which may damage the users. We have propose... [more] |
IN2019-114 pp.213-218 |
NS, IN (Joint) |
2020-03-06 10:10 |
Okinawa |
Royal Hotel Okinawa Zanpa-Misaki (Cancelled but technical report was issued) |
Anomaly Detection in Smart Home Networks using Situation Estimation in-Home Activities Masahiro Tanaka, Masaaki Yamauchi, Yuichi Ohsita, Masayuki Murata (Osaka Univ.), Kensuke Ueda, Yoshiaki Kato (mitsubishi) IN2019-115 |
In this paper, we propose a method to detect the anomalous operation of home IoT devices focusing on the condition.
Our... [more] |
IN2019-115 pp.219-224 |
CS, CAS |
2020-02-27 15:20 |
Kumamoto |
|
IoT devices management for outdoor wireless sensor networks Kazuki Shigemori, Kazuma Asou, Wataru Maruyama, Hiroaki Mukai, Tesuya Yokotani (KIT) CAS2019-109 CS2019-109 |
In recent years, deployment of IoT technology is expected in various fields such as environmental monitoring, disaster p... [more] |
CAS2019-109 CS2019-109 pp.67-72 |
MWP, PN, EMT, PEM, IEE-EMT [detail] |
2020-01-31 10:00 |
Kyoto |
Dosisha Univ. |
[Invited Talk]
A research on data collection, analysis, and exploitation platform
-- Dataflow processing platform for IoT, DevOps, and Security -- Toyokazu Akiyama (Kyoto Sangyo Univ.) PN2019-47 EMT2019-87 MWP2019-61 |
Building a prototype IoT application for an experiment requires a certain amount of development cost. The authors have b... [more] |
PN2019-47 EMT2019-87 MWP2019-61 pp.79-85 |
KBSE |
2020-01-25 13:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
CC-CASE: SAFETY& SECURITY ENGINEERING METHODOLOGY FOR AI/IOT Tomoko Kaneko, Nobukazu Yoshioka (NII) KBSE2019-42 |
We aim to develop a safe and secure development methodology for complex systems in the AI / IoT era. We will show a new ... [more] |
KBSE2019-42 pp.25-30 |
RISING (2nd) |
2019-11-26 14:10 |
Tokyo |
Fukutake Learning Theater, Hongo Campus, Univ. Tokyo |
[Poster Presentation]
A method of improving device identification based on multiple identification methods Yuki Imamura (Osaka City Univ.), Nobuyuki Nakamura, Taketsugu Yao (OKI), Shingo Ata, Ikuo Oka (Osaka City Univ.) |
With recent development in communication technology, the number of devices connected to a network is increasing, and sec... [more] |
|
IA |
2019-11-15 13:40 |
Tokyo |
Kwansei Gakuin University, Tokyo Marunouchi Campus (Sapia Tower) |
Towards creating a defense mechanism of IP camera: Recognizing potential risks through firmware backdooring Yves-Roland Douha, Shun Yonamine, Yuzo Taenaka, Youki Kadobayashi (NAIST) IA2019-42 |
Internet of Things (IoT) is an emerging and promising technology allowing users to interact with physical items through ... [more] |
IA2019-42 pp.85-90 |
VLD, DC, CPSY, RECONF, ICD, IE, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC (Joint) [detail] |
2019-11-15 09:40 |
Ehime |
Ehime Prefecture Gender Equality Center |
Modeling attacks against device authentication using CMOS image sensor PUF Hiroshi Yamada, Shunsuke Okura, Mitsuru Shiozaki, Masayoshi Shirahata, Takeshi Fujino (Ritsumeikan Univ.) ICD2019-34 IE2019-40 |
A CMOS image sensor physically unclonable function (CIS-PUF) for device authentication by the unique responses extracted... [more] |
ICD2019-34 IE2019-40 pp.31-36 |
HWS, ICD [detail] |
2019-11-01 13:25 |
Osaka |
DNP Namba SS Bld. |
An Implementation of Tate and Ate Pairing of Embedding Degree 14 Zihao Song, Rikuya Matsumura, Yuki Nanjo, Yasuyuki Nogami, Takuya Kusaka (Okayama Univ.) HWS2019-58 ICD2019-19 |
Following a coming new age of IoT (Internet of Things) and tremendous growth of processing power of a personal
computer... [more] |
HWS2019-58 ICD2019-19 pp.7-12 |
ICTSSL, IN |
2019-10-17 16:10 |
Oita |
|
[Invited Talk]
Buildings and Cyber Security in the IoT X AI era Takeshi Watanabe (NTT FACILITIES CHUO), Shingo Kashima (NTT Communications) ICTSSL2019-27 IN2019-41 |
(To be available after the conference date) [more] |
ICTSSL2019-27 IN2019-41 pp.63-67 |
IA |
2019-10-04 16:25 |
Tokyo |
Tokyo Univ., Hongo Campus, Takeda Hall |
Device management method for IoT security by network equipment Yoshifumi Atarashi (Alaxala), Ray Atarashi (IIJ-II), Yutaka Oiwa (AIST) IA2019-21 |
The security of industrial system (i.e. factories, hospitals) are important. So we developed security management systems... [more] |
IA2019-21 pp.7-14 |
MIKA (2nd) |
2019-10-04 10:15 |
Hokkaido |
Hokkaido Univ. |
[Poster Presentation]
Study for an advanced secure PDS service Yuka Miyagi, Hiroki Yanagisawa, Noriharu Miyaho (TDU) |
In recent years, personal information management technology called PDS (Personal Data Store) has been devel... [more] |
|
MIKA (2nd) |
2019-10-04 10:15 |
Hokkaido |
Hokkaido Univ. |
[Poster Presentation]
Estimating of congestion level in wireless network using the result of network scan Kenta Suzuki, Takuya Kurihara, Kazuto Yano, Yoshinori Suzuki (ATR) |
As a part of countermeasure against cyber attacks targeting vulnerabilities of IoT devices without enough security level... [more] |
|
NS, IN, CS, NV (Joint) |
2019-09-06 13:30 |
Miyagi |
Research Institute of Electrical Communication, Tohoku Univ. |
Improvement of Device Identification by using Multiple Monitoring Methods Yuki Imamura (Osaka City Univ.), Nobuyuki Nakamura, Taketsugu Yao (OKI), Shingo Ata, Ikuo Oka (Osaka City Univ.) IN2019-28 |
With recent development in communication technology, security in communication devices especially in IoT devices becomes... [more] |
IN2019-28 pp.29-34 |