Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
NS, IN (Joint) |
2024-03-01 11:10 |
Okinawa |
Okinawa Convention Center |
Blockchain-based malicious node detection and defense method for potential-based routing Kanato Otsu (Osaka Univ.), Naomi Kuze (Wakayama Univ.) NS2023-200 |
In recent years, the scale and complexity in networks have grown such as the Internet of Things (IoT).
For controlling... [more] |
NS2023-200 pp.166-171 |
SeMI, RCS, NS, SR, RCC (Joint) |
2019-07-11 10:40 |
Osaka |
I-Site Nanba(Osaka) |
[Poster Presentation]
A Study on Efficient Secure Routing Protocol based on AODV for Large Scale Ad Hoc Networks Yuma Shibasaki, Koya Sato, Keiichi Iwamura (TUS) RCC2019-31 NS2019-67 RCS2019-124 SR2019-43 SeMI2019-40 |
This paper proposes a secure routing protocol based on Ad hoc On-demand Distance Vector (AODV) that achieves both securi... [more] |
RCC2019-31 NS2019-67 RCS2019-124 SR2019-43 SeMI2019-40 pp.101-106(RCC), pp.127-132(NS), pp.123-128(RCS), pp.133-138(SR), pp.115-120(SeMI) |
CPSY, DC, IPSJ-SLDM, IPSJ-EMB, IPSJ-ARC [detail] |
2017-03-10 10:40 |
Okinawa |
Kumejima Island |
Wormhole attack prevention in MANET using multipath routing protocol Chika Onodera, Takashi Minohara (Takushoku Univ.) CPSY2016-147 DC2016-93 |
In recent years, mobile ad hoc networks(MANET) are becoming more and more important when it is hard to use normal networ... [more] |
CPSY2016-147 DC2016-93 pp.309-314 |
DC |
2016-12-16 15:05 |
Yamagata |
Sakata Sogo-Bunka Center(Sakata-City) |
An Evaluation Measures for Contact Avoidance in Delay Tolerant Networks Tomoya Osuki, Kazuya Sakai, Satoshi Fukumoto (Tokyo Metropolitan Univ.) DC2016-69 |
We address a secure routing in delay tolerant networks (DTNs) that lack continuous network connec-tivity. The idea of co... [more] |
DC2016-69 pp.27-30 |
CPSY, DC, IPSJ-ARC [detail] |
2016-05-09 14:10 |
Toyama |
Unaduki Suginoi Hotel |
A Study of Contact Avoidance Routing in Delay Tolerant Networks Tomoya Osuki, Kazuya Sakai, Satoshi Fukumoto (Tokyo Metropolitan Univ.) CPSY2016-3 DC2016-3 |
We address a secure routing in delay tolerant networks (DTNs) that lack continuous network connectivity. While cryptogra... [more] |
CPSY2016-3 DC2016-3 pp.11-14 |
IN, IA (Joint) |
2015-12-17 16:10 |
Hiroshima |
Hiroshima City University |
Neighbor-Disjoint Multi-Route Avoidance Routing Tetsuya Kanachi, Hiroaki Higaki (Tokyo Denki Univ.) IN2015-79 |
This paper proposes a novel routing protocol called neighbor-disjoint routing protocol in wireless multihop networks for... [more] |
IN2015-79 pp.49-54 |
IN |
2015-10-16 12:40 |
Osaka |
Osaka University |
Contact Avoidance Routing in Delay Tolerant Networks Tomoya Osuki, Kazuya Sakai, Satoshi Fukumoto (TMU), Masayuki Arai (Nihon Univ.) IN2015-57 |
In this paper, we address a secure routing in delay tolerant networks(DTNs) that lack continuous network connectivity. W... [more] |
IN2015-57 pp.25-28 |
IN, NS, CS, NV (Joint) |
2015-09-03 11:40 |
Iwate |
Iwate-ken Kokaido |
Report on ICDCS 2015 Kazuya Sakai (TMU) IN2015-41 |
ICDCS 2015 was held in Columbus, OH, between June 28th and July 2nd, 2015. In this paper, we present the summary of our ... [more] |
IN2015-41 pp.13-16 |
SR (2nd) |
2014-10-30 - 2014-10-31 |
Overseas |
I2R, Singapore |
[Poster Presentation]
Neighborhood connectivity based trust scheme to prevent acitve black hole attacks Ruojun Cai, Peter Han Joo Chong (NTU) |
Active black hole attack is one of the most severe security threats that can be easily employed against normal routing i... [more] |
|
IA |
2014-09-12 17:15 |
Tokyo |
Tokyo Tech Front |
[Invited Talk]
Issues and perspectives on RPKI and BGPSEC Taiji Kimura (JPNIC) IA2014-21 |
– Resource Public-Key Infrastructure, is a mechanism to issue digital certificates that certify allocation/assignm... [more] |
IA2014-21 pp.41-45 |
NS, IN (Joint) |
2013-03-08 14:00 |
Okinawa |
Okinawa Zanpamisaki Royal Hotel |
Low Latency Route Construction considering Radio Duty Cycling in 6LoWPAN/RPL-compliant Wireless Sensor Networks Shoichi Kagawa, Shiro Sakata, Nobuyoshi Komuro (Chiba Univ.) IN2012-203 |
In recent years, wireless sensor networks (WSNs) have been emerging in the field of automation, security and disaster pr... [more] |
IN2012-203 pp.293-298 |
SR, AN, USN (Joint) |
2009-10-23 11:50 |
Miyagi |
Tohoku Univ. |
[Invited Talk]
Hot Research Topics and Attempts for Practical Applications on Ad Hoc Networks Nei Kato (Tohoku Univ.) SR2009-65 AN2009-35 USN2009-38 |
Ad hoc networks area has been extremely active during recent years. In this presentation, an overview of ad hoc networks... [more] |
SR2009-65 AN2009-35 USN2009-38 pp.95-102(SR), pp.87-94(AN), pp.69-76(USN) |
AN |
2009-07-23 13:00 |
Kyoto |
Kyoto Univ. |
[Invited Talk]
Mobile Ad Hoc Network Technologies with Scalability and Adaptability Yoshiaki Kakuda, Tomoyuki Ohta, Shinji Inoue, Eitaro Kohno (Hiroshima City Univ.) AN2009-9 |
In order to realize large-scaled mobile ad hoc networks that momentarily change their topologies, it is necessary to dev... [more] |
AN2009-9 pp.1-6 |
IN, NS (Joint) |
2009-03-04 09:40 |
Okinawa |
Okinawa-Zanpamisaki Royal Hotel |
A Study on Gateway Selection Protocol in DYMO-based Hybrid MANET Takeshi Matsuda (Tohoku Univ.), Hidehisa Nakayama (Tohoku Inst. of Tech.), Nei Kato (Tohoku Univ.) NS2008-208 |
Dynamic MANET On-demand (DYMO) is a new routing protocol for mobile ad hoc Networks (MANETs), which is compliant with th... [more] |
NS2008-208 pp.367-372 |
ICM, CQ, NS (Joint) |
2008-11-13 18:00 |
Fukushima |
Nihon University |
A plan of the method of controlling the NGN route using an indivisual security policy Yasuyoshi Okada, Yasuhiro Nishikawa, Naoshi Sato (IISEC) CQ2008-51 |
The number of Internet users by the enterprise, the organization, and the individual increases by the spread and the de... [more] |
CQ2008-51 pp.33-38 |
MoNA, IPSJ-MBL |
2008-05-23 14:50 |
Okinawa |
Okinawa-seinen-kaikan |
Node-Disjoint Multipath Construction Method on Hop by Hop Routing Protocols and its Evaluation Takumi Mori, Osamu Takahashi (FUN) |
Multipath routing protocols aim at improvement in the data arrival rate and shortening the delay time is studied in MANE... [more] |
MoMuC2008-25 pp.141-146 |
NS, IN (Joint) |
2008-03-07 13:10 |
Okinawa |
Bankoku Shinryokan |
Communication Node Identifying Architecture
-- Identifier Resolution Architecture -- Ved P. Kafle, Kiyohide Nakauchi, Masugi Inoue (NICT) IN2007-202 |
This is a technical report on an ID/locator separated network architecture that is being progressed in the AKARI Archite... [more] |
IN2007-202 pp.259-264 |
IN |
2008-01-17 13:40 |
Aichi |
Nagoya Institute of Technology |
Sub-Marine Attack and its Defense in Ad Hoc Network Routing Protocols XiaoYang Zhang, Yasushi Wakahara (Univ. of Tokyo) IN2007-120 |
Recently, significant attention has been devoted to developing secure routing protocols for an Ad hoc network. In this p... [more] |
IN2007-120 pp.7-12 |
NS, CS, IN (Joint) |
2007-09-21 09:50 |
Miyagi |
Tohoku University |
A Practical Feasibility Study of a Network Control Method for Sharing DDoS-Attack Mitigation Devices Takeshi Yagi, Takeshi Kuwahara, Junichi Murayama (NTT) IN2007-60 |
This paper reports results of feasibility study about dynamic traffic control methods to re-route traffic into DDoS-atta... [more] |
IN2007-60 pp.99-104 |
MoNA, IPSJ-MBL |
2007-05-18 08:55 |
Okinawa |
Okinawa-seinen-kaikan |
A Classification of Defense Method in Ad-hoc Networks and Proposal for the Anti Attack Ad-hoc Routing Protocol Architecture Takumi Mori, Ikumi Mori, Osamu Takahashi (FUN) |
There are various kinds of attack for ad-hoc networks. Now, many defense methods are defense to detect the attack patter... [more] |
MoMuC2007-15 pp.73-78 |