Naoki Shibata’s research while affiliated with Nara Institute of Science and Technology and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (88)


Fig. 1: Event Chain.
Fig. 2: Reducing log size using Markel tree.
Fig. 3: Map for Simulation.
Secure Payment System Utilizing MANET for Disaster Areas
  • Preprint
  • File available

February 2020

·

155 Reads

·

Naoki Shibata

·

Juntao Gao

Mobile payment system in a disaster area have the potential to provide electronic transactions for people purchasing recovery goods like foodstuffs, clothes, and medicine. Conversely, to enable transactions in a disaster area, current payment systems need communication infrastructures (such as wired networks and cellular networks) which may be ruined during such disasters as large-scale earthquakes and flooding and thus cannot be depended on in a disaster area. In this paper, we introduce a new mobile payment system utilizing infrastructureless MANETs to enable transactions that permit users to shop in disaster areas. Specifically, we introduce an endorsement-based mechanism to provide payment guarantees for a customer-to-merchant transaction and a multilevel endorsement mechanism with a lightweight scheme based on Bloom filter and Merkle tree to reduce communication overheads. Our mobile payment system achieves secure transaction by adopting various schemes such as location-based mutual monitoring scheme and blind signature, while our newly introduce event chain mechanism prevents double spending attacks. As validated by simulations, the proposed mobile payment system is useful in a disaster area, achieving high transaction completion ratio, 65% - 90% for all scenario tested, and is storage-efficient for mobile devices with an overall average of 7MB merchant message size.

Download

FIGURE 1: Distributed timestamp server in Bitcoin [1]
FIGURE 2: Distributed timestamp server in a minimal PoS scheme
FIGURE 3: Distributed timestamp server in the proposed method
FIGURE 4: Probability of a fork after a block is added, with N miniblocks
Proof-of-Search: Combining Blockchain Consensus Formation With Solving Optimization Problems

November 2019

·

1,518 Reads

·

45 Citations

IEEE Access

To address the large amount of energy wasted by blockchains, we propose a decentralized consensus protocol for blockchains in which the computation can be used to search for good approximate solutions to any optimization problem. Our protocol allows the wasted energy to be used for finding approximate solutions to problems submitted by any nodes (called clients). Our protocol works in a similar way to proof-of-work, and it makes nodes evaluate a large number of solution candidates to add a new block to the chain. A client provides a search program that implements any search algorithm that finds a good solution by evaluating a large number of solution candidates. The node that finds the best approximate solution is rewarded by the client. Our analysis shows that the probability of a fork and the variance in the block time with our protocol are lower than those in proof-of-work.


Providing Reliable Communications over Static-node-assisted Vehicular Networks Using Distance-vector Routing

October 2018

·

79 Reads

·

5 Citations

Mobile Networks and Applications

To support various practical applications that are expected to work over vehicular networks, it is important to develop a network infrastructure that provides quality communications on which applications can rely. However, since a vehicular network is essentially a delay tolerant network (DTN) in which connected paths to the destinations do not always exist, providing reliable communications on such a network is a challenging research goal. In this paper, we propose a new table-driven distance-vector routing protocol called RDV (Reliable Distance-Vector routing) for static-node-assisted vehicular networks. RDV provides the guarantee that the expected packet delivery ratio exceeds the preconfigured value by creating the necessary number of packet copies sent on the shortest path. Evaluation results show that RDV provides a stably high packet delivery ratio and outperforms other conventional routing schemes in both packet delivery ratio and overhead of packet copies.


Monitoring-Based Method for Securing Link State Routing against Byzantine Attacks in Wireless Networks

February 2018

·

638 Reads

·

4 Citations

Journal of Information Processing

Secure communications is essential in many areas such as disaster management and battlefield communications. To detect and prevent attacks in such applications, most existing protocols adopt a cryptography-based approach, trust-based approach (reputation of nodes), or incentive-based approach. However, such protocols still have drawbacks, such as expensive overhead, difficulty in maintaining secure key and session management, or leaving routes unsecured against Byzantine attacks. In this paper, we introduce a monitoring-based method in the link state routing protocol to secure the packets’ route against Byzantine attacks. The goal of our proposed scheme is to guarantee communication among connected benign nodes in the network. Specifically, each node monitors the action of neighboring nodes and compares the optimal packet route against the packet route history. Nodes in the network create a packet history field which is used to record all activities of an intermediate node when receiving and forwarding packets. Our scheme provides mutual monitoring in which nodes in the network can validate the packet history field of other nodes and report malicious activities. Also, our scheme uses a statistical method to know if a node is dropping packets intentionally by analyzing the packet dropping behavior of each node. The proposed scheme provides protection against colluding attacks and other Byzantine attacks. The proposed monitoring-based method achieves an average of 89% to 96% packet delivery ratio when 11% to 21% active malicious links are excluded from the network.


Secure Payment System Utilizing MANET for Disaster Areas

September 2017

·

157 Reads

·

48 Citations

IEEE Transactions on Systems Man and Cybernetics Systems

Mobile payment system in a disaster area have the potential to provide electronic transactions for people purchasing recovery goods like foodstuffs, clothes, and medicine. Conversely, to enable transactions in a disaster area, current payment systems need communication infrastructures (such as wired networks and cellular networks) which may be ruined during such disasters as large-scale earthquakes and flooding and thus cannot be depended on in a disaster area. In this paper, we introduce a new mobile payment system utilizing infrastructureless mobile adhoc networks to enable transactions that permit users to shop in disaster areas. Specifically, we introduce an endorsement-based mechanism to provide payment guarantees for a customer-to-merchant transaction and a multilevel endorsement (MLE) mechanism with a lightweight scheme based on Bloom filter and Merkle tree to reduce communication overheads. Our mobile payment system achieves secure transaction by adopting various schemes such as location-based mutual monitoring scheme and blind signature, while our newly introduced event chain mechanism prevents double spending attacks. As validated by simulations, the proposed mobile payment system is useful in a disaster area, achieving high transaction completion ratio, 65%-90% for all scenario tested, and is storage-efficient for mobile devices with an overall average of 7 MB merchant message size.



Reliable Distance-Vector Routing for Static-node-assisted Vehicular Networks

November 2016

·

12 Reads

·

1 Citation

We propose a new static-node-assisted routing scheme RDV (Reliable Distance Vector routing) for vehicular networks. In RDV, static nodes located at intersections behave as distance-vector routers to assist packet forwarding, i.e., they exchange messages, compute paths, and help packets travel along the computed forwarding paths to their destinations. To support various practical applications over vehicular networks, RDV provides reliable communications such that the average packet delivery ratio exceeds the preconfigured delivery ratio by creating the necessary number of packet copies sent on the shortest path. Evaluation results show that the proposed scheme provides stably high packet delivery ratio, and outperforms other existing routing schemes in both packet delivery ratio and the number of generated packet copies.



A Method for Navigating Cars in Multilevel Parking Facility

July 2015

·

59 Reads

·

2 Citations

Journal of Information Processing

·

Naoki Shibata

·

Masahiro Kenmotsu

·

[...]

·

Minoru Ito

In this paper, we focus on multilevel parking facilities and propose a navigation system that minimizes the time required for cars to find vacant parking spaces. Parking zones at large parking facilities provide drivers conditions to drivers due to differences in distances from the entrance of the parking facility or to the entrances of the shopping areas. This leads to many cars concentrating at some parking zones while other zones are not occupied. It is not easy for car drivers entering a large parking facility to know which parking zones are vacant. It is fairly common that parking facilities have indicators that show occupancy information to the drivers. However, since these indicators deliver the same information to all drivers, this method tends to make a new congested zone by sending many drivers to that zone. In this paper, we propose a system that provides each driver with a recommended route in the parking facility that minimizes the expected parking time. Our method estimates the occupancy of each zone from the information sensed by the cars that implement the proposed method. This information is collected to a server installed in the facility, and then the server disseminates the processed information to the cars. The cars then calculates the recommended route from this information. We conducted a simulation-based evaluation of the proposed method using a realistic model simulating a real parking facility in Nara. As a result, we confirmed that the proposed method reduced parking waiting time by 20%-70% even with low penetration ratio.


An Endorsement Based Mobile Payment System for A Disaster Area

March 2015

·

59 Reads

·

8 Citations

A payment system in a disaster area is essential for people to buy necessities such as groceries, clothing, and medical supplies. However, existing payment systems require the needed communication infrastructures (like wired networks and cellular networks) to enable transactions, so that these systems cannot be relied on in disaster areas, where these communication infrastructures may be destroyed. In this paper, we propose a mobile payment system, adopting infrastructureless mobile ad-hoc networks (MANETs), which allow users to shop in disaster areas while providing secure transactions. Specifically, we propose an endorsement-based scheme to guarantee each transaction and a scheme to provide monitoring based on location information, and thus achieve transaction validity and reliability. Our mobile payment system can also prevent collusion between two parties and reset and recover attacks by any user. Security is ensured by using location-based mutual monitoring by nearby users, avoiding thereby double spending in the system.


Citations (63)


... No mesmo ano, o consumo energético da rede Bitcoin foi estimado em 2,55 gigawatts -valor comparável ao consumo de países como a Irlanda, com 3,1 gigawatts [de Vries 2018]. A principal crítica ao PoW reside justamente no fato de que esse esforço computacional não resulta em benefício prático adicional, sendo utilizado unicamente para encontrar um hash válido [Bizzaro et al. 2020, Shibata 2019]. ...

Reference:

Análise de Viabilidade na Utilização de Algoritmos Meta-heurísticos como Mineradores em Redes Blockchain
Proof-of-Search: Combining Blockchain Consensus Formation With Solving Optimization Problems

IEEE Access

... However, it has potential on performing authentication by identifying from neighboring node which utilizes hash chain at faster pace. SDSDV [36] is known for its data integrity, but it also offers significant network overhead. SLSP [37] offers better resistivity towards denial of service attack, but it cannot withstand colluding attack. ...

Monitoring-Based Method for Securing Link State Routing against Byzantine Attacks in Wireless Networks
  • Citing Article
  • February 2018

Journal of Information Processing

... Hu et al. present a real-time routing protocol for mobile wireless sensor nodes in industrial environments, effectively reducing latency by optimizing the number of packet forwarding hops [16]. Yoshihiro et al. provide a new table-driven distance vector routing protocol [17]. This protocol ensures PDR and reduces the packet copy cost by creating the necessary number of packets to be sent via the shortest path. ...

Providing Reliable Communications over Static-node-assisted Vehicular Networks Using Distance-vector Routing

Mobile Networks and Applications

... In response, rescue workers and volunteers used ANET to set up temporary wireless networks for emergency communication, rescue coordination, and information sharing. On the basis of ANET, Ojetunde, Shibata, and Gao (2019) proposed a mobile payment system using an infrastructure-free, self-organizing network to enable secure and reliable electronic transactions in disaster areas, helping maintain postdisaster order. ...

Secure Payment System Utilizing MANET for Disaster Areas
  • Citing Article
  • September 2017

IEEE Transactions on Systems Man and Cybernetics Systems

... These six layers-application layer, transport layer, network later, adaptation layer, MAC layer as well as physical layer-constitute the OSI network's tiered structure for IoT, as delineated in Table 2 [74]. [74][75][76][77]. At the physical and data-link layers, denial-of-service (DoS) assaults are among the most prevalent dangers. ...

Securing Link State Routing for Wireless Networks against Byzantine Attacks: A Monitoring Approach
  • Citing Conference Paper
  • July 2017

... Other factors that affect customers' behavior, such as service quality attributes and external variables, were computed to determine their association with travelers' flexible behavior and ascertain their range and strength of association using Pearson Correlation Coefficients and Multiple Regression Analysis. Shibata, Ueda, Sun, and Ito (2016) proposed an online scheduling system for tours by one-way electric vehicle (EV) sharing. The system focuses on taking reservations of tours with their multiple destinations, and time windows stay time for visiting each destination. ...

EVTour: Online Scheduling System for Tours with Multiple Destinations by One-Way EV Sharing
  • Citing Conference Paper
  • September 2016

... 'Green Wave' is a method of traffic management in which the signal sequence is optimized to limit congestions by creating a flow where traffic can pass through junctions without meeting a red light (Xu et al., 2014;De Coensel et al., 2012). The goal of a Green Wave is to reduce congestion and by proxy, vehicle emissions by optimizing flow. ...

GreenSwirl: Combining traffic signal control and route guidance for reducing traffic congestion
  • Citing Conference Paper
  • December 2014

... Integrated planning connecting destination choice and itinerary problem will provide tourists with more comprehensive arrangements. Many studies have been conducted to explore the tourism recommender system [7,13,19,25,26]. In these previous studies, some methods list the recommended tourist sites to users, so that they can select their favorite sites. ...

A Personal Navigation System with a Schedule Planning Facility Based on Multi-Objective Criteria
  • Citing Article
  • January 2005