About
147
Publications
27,044
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,648
Citations
Introduction
Additional affiliations
April 2006 - June 2010
Publications
Publications (147)
The authentication protocol for HTTP proposed in RFC 8120 has been model checked under different assumptions. Four security properties have been taken into account: (1) Key Secrecy Property (K-SEC), (2) Key Sharing Property (K-SHR), (3) Correspondence Property from a client point of view (C-CORR), and (4) Correspondence Property from a server point...
We report on a case study in which we have formally specified a ride-sharing system in Maude, a rewriting logic-based specification/programming language and model checked that the system enjoys desired liveness as well as safety properties with the Maude LTL model checker. In our approach to formal specification of the system, a map, a collection o...
Cybersecurity education and training are being conducted on an ever-increasing scale, as most organizations need to improve their readiness in dealing with the more and more frequent cyberattacks. However, most systems used for such education and training purposes are built from scratch, are highly customized, and often proprietary. This is true es...
This demonstration shows an interactive urban flood damage prediction system "ARIA" that simulates urban flood, the sufferer, and network failure in an integrated manner. In terms of disaster mitigation, it is important to confirm an affected area and issue an evacuation advisory. ARIA predicts flood damages - the number of sufferers or the locatio...
In this study, we propose AOBAKO, a testbed for context-aware applications, which focuses on the testing of mobile applications using Bluetooth Low Energy (BLE) for indoor positioning. AOBAKO emulates BLE-beacon communications based on accurate frame-level emulation. In the proposed testbed, the emulation result is transferred to a physical space a...
Hands-on cybersecurity education and training activities are critical given that cyberattacks occur nowadays on an ever-increasing scale. Only such practical activities can ensure that trainees will acquire the actual skills necessary to promptly deal with security incidents in real-life situations. However, current programs rely significantly on t...
Given the worldwide proliferation of cyberattacks, it is imperative that cybersecurity education and training are addressed in a timely manner. These activities typically require trainees to do hands-on practice in order to consolidate and improve their skills, for which purpose training environments called cyber ranges are used. In this paper we p...
In a world in which cyber-attacks occur on a daily basis, cybersecurity education and training are indispens-able. Current training programs rely on manual setup and configuration for hands-on activities, which is atedious and error-prone task. In this paper we present CyTrONE, an integrated cybersecurity training frame-work that we designed and im...
Wireless networks take advantage of various technologies that wired networks do not use, such as authentication and ad hoc networks. Although it is important to verify such wireless network technologies, it is expensive or technologically difficult to repeatedly reproduce the wireless environments required for verification. Additionally, large-scal...
p>Efficient bandwidth utilization is paramount in wireless communication systems, particulary in fading
environments, since fading is one of the major constraints that impair communication in wireless systems.
The bandwidth efficiency of a wireless communication system can be enhanced significantly by employing
power and modulation adaptation polic...
We present a scheme that improves accuracy of 2.4GHz RF tag based indoor positioning. The accuracy of indoor positioning using 2.4GHz RF tags is affected by propagation loss caused by human body shielding, especially in crowded situations. This paper proposes a RSSI compensation scheme that estimate a crowd density level based on detected 2.4 GHz R...
Interactive network experiments are useful for finding solutions to network problems, for teaching and for training purposes. In this demonstration we shall present an interactive experiment framework that allows users to directly control the experiment scenario by using a touch panel interface. This framework uses the network emulation module name...
In this paper we present a framework for evaluating wireless network performance through emulation. The framework uses a hybrid design in which the PHY layer is represented by a probabilistic model, whereas the MAC layer is executed as a functional module. Actual network applications and protocols are employed in order to create realistic test cond...
At present, vast numbers of information resources are available on the Internet. However, one emerging issue is how to search and exploit these information resources in an efficient and flexible manner with high scalability. In this study, we focused our attention on the design of a distributed hash table (DHT)-based search system that supports eff...
Evaluating a system in real-time to test its performance has always been a challenging task. Although real-world wireless testbeds offer great value, on the other hand they are expensive in terms of hardware cost and very hard to maintain. Network simulations are synthetic environments for running representations of mathematical models. However, ne...
Given the high importance of communication for disaster management and
recovery operations, it is essential to develop solutions for
restoring network connectivity after natural catastrophes. We have
used a disaster emulation framework built on top of the large-scale
network testbed StarBED in order to virtually recreate a series of
disaster condit...
Disaster situations require resilient ICT systems in order to provide as good as possible communication conditions in such catastrophic circumstances. The resiliency verification of ICT systems is however difficult, because reproducing large-scale disaster conditions in production networks is impossible without affecting their users. In this paper...
Thermal comfort is an essential aspect for the control and verification of many smart home services. In this research, we design and implement simulation which models thermal environment of a smart house testbed. Our simulation can be used to evaluate thermal comfort in various conditions of home environment. In order to increase the accuracy of th...
Wireless devices are widely used today to access the Internet, despite the intermittent network connectivity they often provide, especially in mobile circumstances. The paradigm of Delay/Disruption Tolerant Networks (DTN) can be applied in such cases to improve the user experience. In this paper we present a network testbed for DTN applications and...
Wireless networks offer the opportunity for the users to move as they use the network in scenarios such as voice and video communication, search-and-rescue operations, etc. User mobility typically takes place in inhabited areas, hence it is subject to constraints regarding the road and building infrastructure in those areas. In this paper we propos...
The wide popularity of Kerberos made it the de-facto standard for authentication in enterprise networks. Moreover, the lightweight nature of Kerberos makes it a candidate of choice for securing network communications in emerging non-enterprise information systems such as industrial control networks, building automation and intelligent transportatio...
IEEE802.16 technology due to its outstanding larger coverage area, high data rates, inexpensive equipments, ease of deployment and guaranteed QoS make it a suitable candidate for future broadband wireless access networks. The Mobile WiMAX has been designed to provide Broadband Internet service to mobile users. The VoIP is flexible and provides low...
IEEE 802.15.4 based devices are a key component for mobile and pervasive computing. However, their small dimensions and reduced resources, together with the intrinsic properties of wireless communication, make it difficult to evaluate such networked systems through real-world trials. In this paper we present an emulation testbed intended for the ev...
In this paper we present the design and implementation of a framework for hybrid experiments that integrates a real-world wireless testbed with a wireless network emulation testbed. The real-world component of the framework, that we call "physical realm", can be used for those experiment aspects that are difficult to perform through emulation, such...
In this paper we present a series of experiments that evaluate the performance of two DTN implementations, DTN2 and IBR-DTN, in urban mobility scenarios. The experiments were carried out on the wireless network emulation testbed named QOMB, which was extended to support such DTN evaluations. Our quantitative assessment verified the basic behavior o...
Today, when a huge number of information resources appear in the Internet, one problem arising is how to search and exploit these information resources efficiently and flexibly with high scalability. We believe that the realization of multiple-attribute searching in a distributed manner is an important solution for this problem. In this paper, we p...
The wireless medium is a key technology for enabling ubiquitous and
continuous network connectivity. It is becoming more and more important
in our daily life especially with the increasing adoption of networking
technologies in many fields such as medical care and transportation
systems. Although most wireless technologies nowadays provide satisfyi...
We always have possibilities of being involved in various network troubles because of system misconfigurations and trouble by natural disasters, etc. So evaluations of network technologies under these situations are important. We are developing a framework for emulating environments with failures and evaluating technologies for recovering from them...
StarBED is a network testbed begun in 2002 focused on running actual program code for software and hardware implementations. As hardware technologies develops, its facilities such as PCs and network equipments have been updated and we additionally developed SpringOS, a software support suite consisting of numerous program modules. The performance o...
Scalable and reliable experiment support software needs to be developed to enable construction of large-scale experiment environments and experiments on the environment. The number of management servers in an experiment environment is generally less than the number of experiment nodes. This creates one-to-many communication when transferring data s...
The central IPv4 address pool managed by Internet Assigned Numbers Authority (IANA) was depleted in January 2011. Nevertheless, almost all nodes on the Internet still continue communicating with each other by using Internet protocol version 4 (IPv4). Since IPv4 addresses have been employed for a long time, it is difficult to immediately shift netwo...
Wireless network testbeds have emerged as a valuable alternative to network simulation, but actually using them for experiments presents a number of challenges. We use the ORBIT testbed at Rutgers University, New Jersey, USA as a case study to illustrate the most important issues in this context. We performed several types of evaluation tests on OR...
In Partitioned Optical Passive Stars POPS network, nodes and couplers become free after slot to slot in some computation. It is necessary to efficiently utilize free couplers and nodes to be cost effective. Improving parallelism, we present the fast data summation algorithm for multiple problem spaces on PO P S(g, g) with smaller number of nodes fo...
IEEE 802.15.4 networks are promising solutions for wireless personal area networks, and in particular for wireless home area networks. IEEE 802.15.4 has numerous applications in fields such as energy management and home automation. However, real-world trials with 802.15.4 devices are difficult because of the characteristics of these devices (small...
This paper proposes a load and interference-aware routing metric for wireless mesh networks, named Channel Utilisation and Contention Window Based (C2WB) metric. Our metric assigns weights to individual links which are proportional to the links service times estimated from both channel utilisation and the average contention window of the CSMA/CA me...
There are several name resolution proposals such as SRV-RR and mDNS, which provide application layer identifiers to describe service resources in the Internet. However, ordinary network applications can't leverage the identifiers offered by these approaches. The reason simply comes from the fact that almost every network softwares are constructed u...
As network technologies have been infiltrated into our daily life, reliability of networks and technologies which compose them is important. In order to guarantee them to be safe, various network experiments are performed and researchers discuss these methodologies to improve them. We have developed and managed StarBED; large-scale general purpose...
Advances in wireless communications along with improvements in hardware have allowed smart phones to interact with computers in an open environment where virus can diffuse. While many studies have modeled the spread of malware, little has been done to take into account different types of devices that may exist in an ad hoc wireless network. In this...
Doing research on mobile ad hoc network (MANET) security involves several constraints, some of which are wireless environment's attributes, such as bandwidth and delay, and the correctness of network topology. Testing and evaluating using real wireless devices are costly and somehow impractical, so many tools have been developed in order to create...
This paper presents several evaluation tests, as well as a case study of large-scale wireless network emulation exper-iments performed using QOMB, the wireless network emu-lation testbed at the National Institute of Information and Communications Technology, Hokuriku Research Center in Ishikawa, Japan. The evaluation tests demonstrate the ac-curacy...
P2P network is now widely pervasive and increase usability of Internet. However, with the difficulty of tracing flow of P2P traffic, security incident of P2P network has become now serious problem. In this paper we propose Blink, Large-scale P2P network monitoring and visualization system enhanced by VM introspection. We discuss a monitoring and vi...
In this paper, we present AEROMAN (Architecture to Evaluate Routing Protocols for Multi-hop Ad-hoc Networks) which is designed and implemented for evaluation of routing protocols for multi-hop wireless networks. AEROMAN uses QOMET, a wireless link emulation tool, to compute parameters of wireless links, such as bandwidth, delay, packet loss rate, i...
As virtualization technologies are widely used, we are fac-ing new security problem in virtualized and complicated network envi-ronment. In this paper we propose an enhancement of trusted domain enforcement for the dynamic protection of virtual cluster using live mi-gration. TDE (Trusted domain enforcement) is an extension of TE (Type Enforcement)...
Advances in wireless communications along with improvements in hardware have allowed smart phones to interact with each other easier in an open environment where virus can diffuse. While many studies have modeled the spread of malware, little has been done to take into account different types of devices that may concurrently exist in a mixed wirele...
Smart phones, with the fast improvement both in hardware and software, are now able to interact and work with computer through numerous communications technologies thus expose themselves to the risk of being infected by virus. Athough many researchers devote to study the spread of malware, little effort has been done to take into account the differ...
In this paper, we present an architecture to emulate multi-hop wireless networks on StarBED, a wired-network testbed at Hokuriku Research Center of NICT, Japan. The architecture uses a distributed approach, and it can effectively emulate in real time the properties of WLAN contention-based media access mechanism.
In this paper, we propose a simulation environment for home network systems. The simulation environment consists of real houses, large-scale simulation testbeds and many simulation components such as environment, home appliances, electric power and human activity. These home simulations can install simulation components with different complexities....
There are two types of network traffic in experimental environments. One is traffic which is derived from target elements and the other one is background traffic which is derived from surrounding elements. There is very little knowledge on the relationships between new elements and existing elements; therefore, surrounding elements that seem to hav...
In this paper we present RUBIQ, a polymorphic ubiquitous network testbed. RUBIQ works on StarBED, which is a network testbed consisting of hundreds of PCs connected to each other. RUBIQ consists of a set of subcomponents such as RUNE and QOMET that make it possible to simulate ubiquitous network systems in huge scale that can hardly ever be experim...
The design and development of active RFID tag systems requires several iterations, and thorough testing in order to ensure that the prototype systems behave as intended. Facilitating these operations contributes significantly to faster product development and to a quicker time to market. The emulation framework that we present makes it easier to ca...
Distributed hash tables (DHTs) which provide scalable key-value store and lookup sevices are methods to construct Peer-to-Peer(P2P) networks. However, existing algorithms of DHTs don't consider problems caused by NATs. We must consider NATs which are very serious hindrance for P2P networks when designing and implementing P2P network applications, b...
Since the scale of experiment targets and testbeds used for network simulation and emulation are increasing, the ability of tools for network experiment is becoming more important to reduce humane efforts and boost automation. One of the tools which helps realize that goal is programming language and it is also the main focus in this study. Traditi...
Virtual machine monitor provides the drastic improvement of isolation, consolidation and flexibility in running virtual machine. Also, virtual cluster becomes one of the hot topics for the combination of capacity planning, HPC (high performance computing) and virtualization technologies. In this paper we propose a dynamic protection system of Web s...
In this paper we present QOMB, a testbed we designed and implemented for the evaluation of wireless network systems, protocols and applications. The testbed uses the wireless network emulation set of tools QOMET so as to reproduce in a wired network, in real time, the wireless network conditions corresponding to a given scenario. In this context QO...
In this paper, we introduce a distributed emulator for a pedestrian tracking system using active tags that is currently being developed by the authors. The emulator works on StarBED, which is a network testbed consisting of hundreds of PCs connected to each other by Ethernet. The three major components of the emulator (the processor emulator of the...
New technologies that will be introduced to the Internet should be practically tested for effectiveness and for side effects. A realistic environment that simulates the Internet is needed to experimentally test such technologies, which will be widely deployed on the Internet. To support experimentation in a realistic, Internet-like environment, we...
Several choices have to be made during the design process of active tag based systems. Since the number of properties that must be decided before production and wide-scale deployment is relatively high, the use of real experiments in the design phase may be prohibitive. We propose the use of emulation for performing large-scale experiments with act...
Now that smart phones can interact with computers through numerous interface technologies such as Bluetooth, infrared, or the 802.11 family of IEEE specifications, they are working in an environment where malware can propagate. While many studies have modeled malware proliferation, little has been done to take into account the different types of de...
Smart phones and computers now are able to co-work in a wireless environment where malware can propagate. Although many investigations
have modeled the spread of malware, little has been done to take into account different characteristics of items to see how
they affect disease diffusion in an ad hoc network. We have therefore developed a novel fra...
In the last decade, since the advent of advanced wireless technology, wireless mobile ad hoc networks have grown in both size and complexity, and their applications are also expanding at a great rate due to their many advantages, principally mobility and the fact that they do not require a fixed supporting structure. Security, routing protocols, an...
In this paper we present an active tag emulation system that is used to carry out live experiments with active tag applications. Its two main components are the wireless communication emulator QOMET, and an active tag processor emulator. Experiments are performed using the experiment-support software RUNE on StarBED, the large-scale network testbed...
In this paper we present the methodology we propose for the performance assessment of ubiquitous networked systems. Our methodology relies on emulation of both the ubiquitous nodes and the network interconnections between them. This approach makes it possible to conveniently perform experiments with a large number of nodes in controlled network con...
When an IP Multicast network is constructed on a switch-based network, many IP Multicast packet broadcasts are generated, and these broadcasts cause trouble for all of the other kinds of communication. To solve this problem, implementing IGMP Snooping on various switches has been proposed. However, some switches have insufficient IP Multicast packe...
Now that smart phones can interact with computers through various interface technologies such as Bluetooth, infrared, or the 802.11 family of IEEE specifications, they are working in an environment where malware can propagate. While many studies have modeled the spread of malware, little has been done to take into account the different types of dev...
Recently mobile robots act in various situations such as disaster areas, office buildings, factories and homes. When these new mobile robots are released, they should be confirmed to work correctly and safety from evaluation. In this paper, we propose large-scale simulation environment of mobile robots on StarBED which is a large-scale networked te...
Research on wireless sensor networks has recently received much attention as they offer an advantage of monitoring various kinds of environment by sensing physical phenomenon. Among various issues, energy consumption is one of the most important criteria for routing protocol in wireless sensor networks (WSNs). This paper introduces an energy effici...
Hands-on experiences are indispensable to train IT operators. However, it is often difficult to conduct hands-on practices in many locations due to lack of resources such as PCs and network equipments. The cost of gathering lecturers and participants at one hands-on site is another possible problem in this situation. Utilization of remotely located...