コロキアムB発表

日時: 6月9日(火)3限(13:30~15:00)


会場: L1

司会: 小林 泰介
CHENG YU M, 1回目発表 ネットワークシステム学 岡田 実, 林 優一, 東野 武史, DUONG QUANG THANG, Chen Na
Title: Research on Constant Output Voltage Design for Underwater WPT System
Abstract: For a long time, providing stable, safe, and efficient power supply for underwater electromechanical equipment has always been a concern in the deep-sea exploration. Compared with the complicated docking mechanism, potential safety hazards, and expensive price of traditional wet-mate connectors, wireless power transmission (WPT) technology can transmit energy without any electrical contact between the power supply and the electrical equipment, which provides an effective solution to the aforementioned drawbacks of wired charging. There are many uncontrollable factors in the seawater working environment. Therefore, this topic takes the equivalent circuit and magnetic field distribution as the theoretical basis to study the energy transmission characteristics of underwater WPT and proposes corresponding improvements and solutions to the current problems and deficiencies. Especially for the output voltage of the receiver unstable.
Language of the presentation: English
 
PHAN TRIDUNG M, 1回目発表 コンピューティング・アーキテクチャ 中島 康彦, 林 優一, 中田 尚, TRAN THI HONG, 張 任遠

Tittle: Implementation SHA-3 High throughput and Low power consumption on hardware architecture.
Abstract: The SHA-3 (Secure Hash Algorithm-3) is the lastest member of the cryptographic hash algorithm, which based on a novel approach called "Sponge Construction." SHA-3 is proposed as a faster and more hardware efficiency than the others. To enhance performance and eliminate the necessity of software in IoT devices. In this research, we try to implement the SHA-3 on hardware acceleration architecture. Firstly, we have finished implementing original SHA-3 on FPGA, ASIC design (post-layout) and archive in the hardware efficiency than the previous implementation.
English 発表題目: *** この部分を発表題目に ***
発表概要: *** この部分を発表概要に ***
 
PHAN VAN DAI M, 1回目発表 コンピューティング・アーキテクチャ 中島 康彦, 林 優一, 中田 尚, TRAN THI HONG, 張 任遠
title: Ultra-low Power Consumption Blockchain Accelerator
abstract: Nowadays, most applications require massive data capacity due to the results of advanced technology immigration, such as Artificial Intelligence (AI), Internet of Thing (IoT), and Blockchain. The legitimacy of data must be verified before data is processed. Secure Hash Algorithm (SHA) is used to generate the message digest and apply widely for verifying data in many systems. Thus, speeding up the calculation of SHA is inevitable to maintain the high computing speed throughout the system. Coarse-Grained Reconfigurable Architecture (CGRA) couples the host processor and the programmable arrays to allow more efficient implementation of many algorithms with high performance. This research aims to the heterogeneous CGRA that supports high-performance computing for SHA-256 and to be programmable for many security algorithms.
language of the presentation: English
 
PHETCHAI PONPAT M, 2回目発表 サイバーレジリエンス構成学 門林 雄基, 林 優一, 安本 慶一, 妙中 雄三
Title: Towards Differentiating DDoS from Flash Crowd Traffic by Entropy-based Approach Leveraging IP Addresses’ Geolocation Information
Abstract:
Distributed Denial of Service (DDoS) attack is one of the costless to learn and easy to execute attack, which have been existing for an extensive period of time. However, there are still many cases that proved the attack is still persistently successful. One of the famous examples is the Mirai IoT botnet. The DDoS attacks uses a simple concept of flooding packets to the target device or network until it reaches the physical or logical limits, which resulted in inaccessible of legitimate uses to the device or network. Therefore, Denial of Service (DoS). To be Distributed DoS, the key to success is the number of devices under control and the packets being send to destination without being blocked or detected by the target. Hence, a way to avoid that is to forge the source IP addresses. Comparing with a similar type of traffic called flash crowd, resulted from Slashdot effect, where the users intended to get the information at the same time. Flash crowd have no intention to forge the IP addresses. With the believes that the righteous user should have the right to access, where the DDoS should not. We are currently researching on a method to distinguish the difference between the DDoS attack from flash crowd traffic by using the traffic behaviour with regards to the geolocation information by utilising the entropy-based approach. Since there are many approaches and effort on detecting DDoS attack, but rarely did focus on the geolocation distribution and unique characteristic of the 2 types of traffic. If we can distinguish the two types of traffic, we could not only minimise the error in DDoS detection for various other models, but to detect the DDoS itself as well.

In this presentation, we approach the problem by divide it into 2 tasks to achieve our goals: DDoS detection and distinguishing DDoS from flash crowd. First of all, we will provide you some background and the reason why we aiming to focus on this topic. An introduction to some of the endless efforts that researchers in this field have been working on and provide the reason why much more attention is needed to prevent such kind of attacks. For DDoS detection, we discuss our proposal that could achieve 99.8429% accuracy on our selected dataset. Together with this, we will discuss on our aspect and concept to the resolution of distinguishing DDoS and flash crowd by deriving geolocation information. Moreover, the expected goals and our current progress will also be reported here.
Language of the presentation: English
 
DOUHA NGUESSAN YVES ROLAND M, 1回目発表 サイバーレジリエンス構成学 門林 雄基, 安本 慶一, 林 優一, 妙中 雄三
title: Security and Privacy Issues in Smart Homes: Multi-layer Risks
abstract: The Smart Home is a key application of the Internet of Things (IoT), which is taking an essential role in our daily lives. The number of IoT attacks has been increasing steadily in recent years. In the field of smart homes, these attacks may compromise the security and privacy of dwellers and even endanger their life. Thus, it becomes crucial and vital to analyze security risks in smart homes and propose countermeasures. In this study, we evaluate the smart home environment through threat levels of stakeholders. We also assess the security of IoT devices and investigate one common and potential risk, namely backdoors. Moreover, we study the significant contribution of technologies such as blockchain, SDN, and NFV for the security and privacy of the smart home. Finally, for future work, we will investigate the intrusion detection systems to improve anomaly detection in smart homes.
language of the presentation: English
発表題目: *** この部分を発表題目に ***
発表概要: *** この部分を発表概要に ***