Papers - OKAZAKI Naonobu
-
A new routing protocol for data-centric sensor networks
SATO Yusuke, ABURADA Kentaro, OKAZAKI Naonobu, TOMITA Shigeyuki, PARK Mi Rang
IEICE technical report 107 ( 39 ) 125 - 130 2007.5
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:The Institute of Electronics, Information and Communication Engineers
For sensor networks consisting of battery-powered sensor nodes, power saving is significant challenge. It is effective to reduce the amount of communication for sensor networks where power resource is scarce, because sensor nodes consume energy most in communication. We propose a routing protocol, HVGF (Hop-Vector based Greedy Forwarding), which reduces the amount of communication and doesn't need geographic information. In this method, we introduce n base points, and assign n-dimensional hop-vector consist of number of hops from each base point to each nodes. Then, each node forwards packets greedily based on distance between hop-vectors of the node and destination. The simulation results show that HVGF works well in the low density network or network which contains a large void in the center compared to existing greedy forwarding method using information of real geographical position.
-
データセントリックセンサネットワークにおけるルーティング方式の検討
佐藤雄亮, 油田健太郎, 岡崎直宣, 冨田重幸, 朴 美娘
電子情報通信学会技術研究報告, MoMuC, 107 ( 39 ) 125 - 130 2007.5
Language:Japanese Publishing type:Research paper (other academic)
-
分散DoS 攻撃追跡手法の効率化に関する検討
古賀勝寛, 岡崎直宣
電気学会研究会資料,IS 07 ( 15 ) 31 - 36 2007.4
Language:Japanese Publishing type:Research paper (other academic)
-
センサネットワークにおける一方向鍵チェーンを用いたリンクベースのメッセージ認証方式の提案
玉里 梨香, 岡崎 直宣
情報処理学会火の国情報シンポジウム2007論文集 ( B-1-5 ) 1 - 8 2007.3
Language:Japanese Publishing type:Research paper (other academic)
-
トラフィック監視によるネットワーク攻撃追跡方式の効率化に関する一検討
古賀 勝寛, 矢羽田 哲也, 岡崎 直宣
情報処理学会火の国情報シンポジウム2007論文集 ( B-4-3 ) 1 - 8 2007.3
Language:Japanese Publishing type:Research paper (other academic)
-
センサネットワークにおけるホップ数に基づくルーティング方式の提案と評価
佐藤 雄亮, 守田 可南子, 岡崎 直宣
情報処理学会火の国情報シンポジウム2007論文集 ( B-1-3 ) 1 - 8 2007.3
Language:Japanese Publishing type:Research paper (other academic)
-
TAKEO DAISUKE, ITO MASASHI, SUZUKI HIDEKAZU, OKAZAKI NAONOBU, WATANABE AKIRA
IPSJ Journal 48 ( 2 ) 644 - 655 2007.2
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Information Processing Society of Japan (IPSJ)
Attackers usually use Stepping-stone attacks in order to hide their identity. To detect these kinds of attacks, timing-based method is conventionally used that detects the correlation of the traffic between receiving packets and sending packets at the Stepping-stone. However, this method can detect only remote-login chains and it takes tens of seconds. In this paper, we focus on the fact that a Stepping-stone always begins a TCP connection after receiving command sequence from the attacker. We propose a connection-based method that detects two specific TCP packets are within a certain period of time. The two packets are, a TCP SYN packet which is transmitted from a Stepping-stone to a target, and a remote-login packet that is transmitted from an attacker to a Stepping-stone. The proposed method can detect not only remote-login chains, but all kinds of Stepping-stone attacks immediately. We implemented our proposed connection-based method in a network monitor device and confirmed that the device effectively detect the attacks.
-
MIYOSAWA TADASHI, KOUI YUUJI, OKAZAKI NAONOBU, NAKAYA NAOSHI, KAMEYAMA WATARU
IPSJ Journal 48 ( 2 ) 743 - 754 2007.2
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Information Processing Society of Japan (IPSJ)
Recently broadband Internet such as ADSL and FTTH is getting popular, Many PC and home appliance becomes always connected to Internet not only in office environment but also in home environment. Remote access attracts attention as a technique for supporting such connected equipment like PC. However, when remote PC is connected to the Internet via a router which has function of Network Address Translator, remote access to such PC from the outside is difficult. We have developed the method that PC can be assisted by the remote assistant without security issues even if that PC is connected via a router. It was jointly developed and evaluated by several Universities and local companies who want to provide this kind of services such as Help Desk. In this paper, we propose remote access system, which is using "Relay Server" to relay client and assistant connection and encrypting data with SSL. In University, after several prototype implementation and experiments, "Remote Access Platform" was developed, and several local companies built their services based on this "Platform". Collaboration between academia and industry enables the practical implementation of remote access system using relay server.
-
センサネットワークにおける位置情報を用いないルーティング方式の検討
守田 可南子, 佐藤 雄亮, 岡崎 直宣, 朴 美娘
情報処理学会研究報告,DBS 2007 ( 141 ) 171 - 178 2007.1
Language:Japanese Publishing type:Research paper (other academic)
-
PARK MIRANG, OKAZAKI NAONOBU, BABA YOSHIMASA
IPSJ Journal 47 ( 7 ) 2058 - 2070 2006.7
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Information Processing Society of Japan (IPSJ)
Rapid deployment of wireless technology has led to rapid growth of high-speed wireless LAN (WLAN). For constructing a ubiquitous network, the high-speed WLAN attracts attention as an infrastructure for global access. However, some issues are impeding further adoption of the technology, in particular, security problems including user authentication, message compromising, connection hijacking and handoff problems of moving users. In this paper, we discuss a seamless user authentication method of mobile terminals in WLAN. To achieve a fast IP layer handoff between Access Points (APs) and mobile terminals and sharing of a session key between users, we propose a seamless pre-authentication and key distribution protocol based on cached Pre-Shared Keys and FMIPv6 messages.
-
アドホックネットワークにおける階層型複数経路構築手法の評価
油田 健太郎,守田 可南子,岡崎 直宣,冨田 重幸, 朴 美娘
電子情報通信学会技術研究報告, MoMuC, 106 ( 44 ) 119 - 124 2006.5
Language:Japanese Publishing type:Research paper (other academic)
-
Okazaki Naonobu, Sueyoshi Toshiaki
Memoirs of the Faculty of Engineering, Miyazaki University 34 219 - 226 2005.8
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Miyazaki University
-
An experimental evaluation of trace-back techniques of Distributed Denial of Service attacks
Okazaki Naonobu, Yahata Tetsuya, Kawamura Shigehisa
Memoirs of the Faculty of Engineering, Miyazaki University 34 227 - 234 2005.8
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Miyazaki University
-
無線LANシステムにおけるシームレスユーザ認証方法に関する考察 Reviewed
朴 美娘, 馬場 義昌, 岡崎 直宣
情報処理学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2005)論文集 97 - 100 2005.7
Language:Japanese Publishing type:Research paper (other academic)
-
アドホックネットワークにおける階層化複数経路構築手法の提案 Reviewed
油田 健太郎, 岡崎 直宣, 冨田 重幸
情報処理学会マルチメディア,分散,協調とモバイルシンポジウム(DICOMO2005)論文集 317 - 320 2005.7
Language:Japanese Publishing type:Research paper (other academic)
-
モバイルアドホックネットワーク上のPeer to Peerシステムにおける情報検索手法の一検討
小林 亜衣, 蛯原 敏博, 油田 健太郎, 岡崎 直宣, 朴 美娘
情報処理学会火の国情報シンポジウム2005論文集 ( A-2-1 ) 1 - 8 2005.3
Language:Japanese Publishing type:Research paper (other academic)
-
アドホックネットワークにおける階層型複数経路構築手法の検討
油田 健太郎, 本田 浩一, 岡崎 直宣, 冨田 重幸, 朴美娘
情報処理学会火の国情報シンポジウム2005論文集 ( A-2-2 ) 1 - 8 2005.3
Language:Japanese Publishing type:Research paper (other academic)
-
A Zone-Based Maltipath routing for ad hoc network
ABURADA Kentaro, HONDA Koichi, OKAZAKI Naonobu, TOMITA Shigeyuki
IPSJ SIG technical reports 2004 ( 114 ) 63 - 70 2004.11
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Information Processing Society of Japan (IPSJ)
A global positioning system (GPS)-based routing protocol, called zone-based hierarchical link state (ZHLS) routing protocol, have been proposed for routing data packets for ad hoc networks. In this protocol, the network is divided into non-overlapping zones. Each node only knows the node connectivity within its zone and the zone connectivity of the whole network. The link state routing is performed on two levels : local node and global zone levels. Hierarchical approach reduces the amount of overhead of dynamic changing topology. ZHLS is, however, single-path protocol which detects only one route. In ad hoc networks, due to mobility of nodes and instability of communication links, multipath protocols are required. In this paper, we propose an eXtended ZHLS (called XZHLS) which generates disjoint paths in global zone level. If a disconnected link is detected in the currently using route, packet transmission is switched to another route.
-
An experimental evaluation of trace-back techniques of Denial of Service attacks
KAWAMURA Shigehisa, OKAZAKI Naonobu
IPSJ SIG technical reports 2004 ( 114 ) 111 - 118 2004.11
Language:Japanese Publishing type:Research paper (scientific journal) Publisher:Information Processing Society of Japan (IPSJ)
Recently, frequency of Denial of Service attacks are increased, and it is difficult to trace packets with incorrect, or "spoofed", source address. Savage et al. proposed a method to trace flooding attacks by "marking" packets. This method, however, has some problems including the time consuming for gathering packets to re-configure the attacking paths. We proposed a method to solve this problem by extending marking area in each packet. In this paper, we will implement the both algorithms to estimate the usability of them. From the results of some experiments, we will conclude the effectiveness of the extended method.
-
アドホックネットワークにおける階層型複数経路構築手法の提案
油田 健太郎,本田 浩一,岡崎 直宣,冨田 重幸
情報処理学会研究報告, MBL 2004 ( 114 ) 63 - 70 2004.11
Language:Japanese Publishing type:Research paper (other academic)