WEKO3
アイテム
{"_buckets": {"deposit": "686842e1-6dc4-4f62-9202-821f53377c0a"}, "_deposit": {"created_by": 18, "id": "10033", "owners": [18], "pid": {"revision_id": 0, "type": "depid", "value": "10033"}, "status": "published"}, "_oai": {"id": "oai:muroran-it.repo.nii.ac.jp:00010033", "sets": ["46", "316", "352"]}, "author_link": ["56563", "39157", "21131"], "item_79_biblio_info_10": {"attribute_name": "書誌情報", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2018-01-11", "bibliographicIssueDateType": "Issued"}, "bibliographicIssueNumber": "6", "bibliographicPageEnd": "2587", "bibliographicPageStart": "2579", "bibliographicVolumeNumber": "14", "bibliographic_titles": [{"bibliographic_title": "IEEE Transactions on Industrial Informatics", "bibliographic_titleLang": "en"}]}]}, "item_79_description_23": {"attribute_name": "フォーマット", "attribute_value_mlt": [{"subitem_description": "application/pdf", "subitem_description_type": "Other"}]}, "item_79_description_7": {"attribute_name": "抄録", "attribute_value_mlt": [{"subitem_description": "Sensing devices acting as interconnected data sources are becoming increasingly ubiquitous in concepts of Internet of Things (IoT)-enabled smart cities, but they typically lack physical protection and are susceptible to being compromised. To address this issue, a great-alternative-region (GAR)-based approach for deploying network monitors to locate compromised data sources is proposed. The GAR concept is introduced according to the network topology and connectivity characteristics, and the GARs with the most complete connectivity are identified as the candidate monitor locations, thereby transforming the problem of monitor deployment into a traditional K-center problem. Based on the demonstrated relationship between the monitor locations and the locating accuracy, the optimization objective for reasonably deploying monitors is designed to minimize the maximum number of hops between the data sources and their nearest monitors, and the optimal deployment pattern is achieved using an improved genetic algorithm. Finally, simulation-based results are presented to illustrate the performance of this approach.", "subitem_description_language": "en", "subitem_description_type": "Abstract"}]}, "item_79_link_17": {"attribute_name": "出版者版へのリンク", "attribute_value_mlt": [{"subitem_link_text": "10.1109/TII.2018.2791941", "subitem_link_url": "https://doi.org/10.1109/TII.2018.2791941"}]}, "item_79_link_5": {"attribute_name": "室蘭工業大学研究者データベースへのリンク", "attribute_value_mlt": [{"subitem_link_text": "(太田 香)OTA Kaoru", "subitem_link_url": "http://rdsoran.muroran-it.ac.jp/html/100000140_ja.html"}, {"subitem_link_text": "(董 冕雄)DONG Mianxiong", "subitem_link_url": "http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html"}]}, "item_79_publisher_11": {"attribute_name": "出版者", "attribute_value_mlt": [{"subitem_publisher": "IEEE", "subitem_publisher_language": "en"}]}, "item_79_relation_18": {"attribute_name": "DOI", "attribute_value_mlt": [{"subitem_relation_type": "isVersionOf", "subitem_relation_type_id": {"subitem_relation_type_id_text": "10.1109/TII.2018.2791941", "subitem_relation_type_select": "DOI"}}]}, "item_79_rights_19": {"attribute_name": "権利", "attribute_value_mlt": [{"subitem_rights": "© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.", "subitem_rights_language": "en"}]}, "item_79_source_id_12": {"attribute_name": "ISSN", "attribute_value_mlt": [{"subitem_source_identifier": "1551-3203", "subitem_source_identifier_type": "PISSN"}]}, "item_79_source_id_14": {"attribute_name": "書誌レコードID", "attribute_value_mlt": [{"subitem_source_identifier": "AA12023428", "subitem_source_identifier_type": "NCID"}]}, "item_79_subject_9": {"attribute_name": "日本十進分類法", "attribute_value_mlt": [{"subitem_subject": "007", "subitem_subject_scheme": "NDC"}]}, "item_79_text_4": {"attribute_name": "著者ID(非表示)", "attribute_value_mlt": [{"subitem_text_value": "1000050713971@@@1000020728274"}]}, "item_79_version_type_21": {"attribute_name": "著者版フラグ", "attribute_value_mlt": [{"subitem_version_resource": "http://purl.org/coar/version/c_ab4af688f83e57aa", "subitem_version_type": "AM"}]}, "item_access_right": {"attribute_name": "アクセス権", "attribute_value_mlt": [{"subitem_access_right": "open access", "subitem_access_right_uri": "http://purl.org/coar/access_right/c_abf2"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "TAO, Ming", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "56563", "nameIdentifierScheme": "WEKO"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [{"affiliationNameIdentifier": "10103", "affiliationNameIdentifierScheme": "kakenhi"}], "affiliationNames": [{"affiliationName": "室蘭工業大学", "affiliationNameLang": "ja"}, {"affiliationName": "Muroran Institute of Technology", "affiliationNameLang": "en"}]}], "creatorNames": [{"creatorName": "OTA, Kaoru", "creatorNameLang": "en"}, {"creatorName": "太田, 香", "creatorNameLang": "ja"}, {"creatorName": "オオタ, カオル", "creatorNameLang": "ja-Kana"}], "familyNames": [{"familyName": "OTA", "familyNameLang": "en"}, {"familyName": "太田", "familyNameLang": "ja"}, {"familyName": "オオタ", "familyNameLang": "ja-Kana"}], "givenNames": [{"givenName": " Kaoru", "givenNameLang": "en"}, {"givenName": "香", "givenNameLang": "ja"}, {"givenName": "カオル", "givenNameLang": "ja-Kana"}], "nameIdentifiers": [{"nameIdentifier": "21131", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "1000050713971", "nameIdentifierScheme": "NRID", "nameIdentifierURI": "https://nrid.nii.ac.jp/ja/nrid/1000050713971"}]}, {"creatorAffiliations": [{"affiliationNameIdentifiers": [{"affiliationNameIdentifier": "10103", "affiliationNameIdentifierScheme": "kakenhi"}], "affiliationNames": [{"affiliationName": "室蘭工業大学", "affiliationNameLang": "ja"}, {"affiliationName": "Muroran Institute of Technology", "affiliationNameLang": "en"}]}], "creatorNames": [{"creatorName": "DONG, Mianxiong", "creatorNameLang": "en"}, {"creatorName": "トウ, メンユウ", "creatorNameLang": "ja-Kana"}, {"creatorName": "董, 冕雄", "creatorNameLang": "ja"}], "familyNames": [{"familyName": "DONG", "familyNameLang": "en"}, {"familyName": "トウ", "familyNameLang": "ja-Kana"}, {"familyName": "董", "familyNameLang": "ja"}], "givenNames": [{"givenName": " Mianxiong", "givenNameLang": "en"}, {"givenName": "メンユウ", "givenNameLang": "ja-Kana"}, {"givenName": "冕雄", "givenNameLang": "ja"}], "nameIdentifiers": [{"nameIdentifier": "39157", "nameIdentifierScheme": "WEKO"}, {"nameIdentifier": "1000020728274", "nameIdentifierScheme": "NRID", "nameIdentifierURI": "https://nrid.nii.ac.jp/ja/nrid/1000020728274"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2019-08-22"}], "displaytype": "detail", "download_preview_message": "", "file_order": 0, "filename": "IEEETII_14_6_2579_2587.pdf", "filesize": [{"value": "1.0 MB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_note", "mimetype": "application/pdf", "size": 1000000.0, "url": {"label": "IEEETII_14_6_2579_2587", "objectType": "fulltext", "url": "https://muroran-it.repo.nii.ac.jp/record/10033/files/IEEETII_14_6_2579_2587.pdf"}, "version_id": "2675bcfb-07e1-4aad-be10-feb817080cb1"}]}, "item_keyword": {"attribute_name": "キーワード", "attribute_value_mlt": [{"subitem_subject": "Monitoring", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Smart cities", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Euclidean distance", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Genetic algorithms", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Informatics", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Network topology", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}, {"subitem_subject": "Optimization", "subitem_subject_language": "en", "subitem_subject_scheme": "Other"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "journal article", "resourceuri": "http://purl.org/coar/resource_type/c_6501"}]}, "item_title": "Locating Compromised Data Sources in IoT-Enabled Smart Cities: A Great-Alternative-Region-Based Approach", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Locating Compromised Data Sources in IoT-Enabled Smart Cities: A Great-Alternative-Region-Based Approach", "subitem_title_language": "en"}]}, "item_type_id": "79", "owner": "18", "path": ["46", "316", "352"], "permalink_uri": "http://hdl.handle.net/10258/00009981", "pubdate": {"attribute_name": "PubDate", "attribute_value": "2019-08-22"}, "publish_date": "2019-08-22", "publish_status": "0", "recid": "10033", "relation": {}, "relation_version_is_last": true, "title": ["Locating Compromised Data Sources in IoT-Enabled Smart Cities: A Great-Alternative-Region-Based Approach"], "weko_shared_id": -1}
Locating Compromised Data Sources in IoT-Enabled Smart Cities: A Great-Alternative-Region-Based Approach
http://hdl.handle.net/10258/00009981
http://hdl.handle.net/10258/000099815d4c0ce4-a446-425f-95a4-4201ba356eea
名前 / ファイル | ライセンス | アクション |
---|---|---|
IEEETII_14_6_2579_2587 (1.0 MB)
|
|
Item type | 学術雑誌論文 / Journal Article.(1) | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
公開日 | 2019-08-22 | |||||||||||||||||
タイトル | ||||||||||||||||||
言語 | en | |||||||||||||||||
タイトル | Locating Compromised Data Sources in IoT-Enabled Smart Cities: A Great-Alternative-Region-Based Approach | |||||||||||||||||
言語 | ||||||||||||||||||
言語 | eng | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | Monitoring | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | Smart cities | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | Euclidean distance | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | Genetic algorithms | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | Informatics | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | Network topology | |||||||||||||||||
キーワード | ||||||||||||||||||
言語 | en | |||||||||||||||||
主題Scheme | Other | |||||||||||||||||
主題 | Optimization | |||||||||||||||||
資源タイプ | ||||||||||||||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||||||||||
資源タイプ | journal article | |||||||||||||||||
アクセス権 | ||||||||||||||||||
アクセス権 | open access | |||||||||||||||||
アクセス権URI | http://purl.org/coar/access_right/c_abf2 | |||||||||||||||||
著者 |
TAO, Ming
× TAO, Ming× 太田, 香
WEKO
21131
× 董, 冕雄
WEKO
39157
|
|||||||||||||||||
室蘭工業大学研究者データベースへのリンク | ||||||||||||||||||
(太田 香)OTA Kaoru | ||||||||||||||||||
http://rdsoran.muroran-it.ac.jp/html/100000140_ja.html | ||||||||||||||||||
室蘭工業大学研究者データベースへのリンク | ||||||||||||||||||
(董 冕雄)DONG Mianxiong | ||||||||||||||||||
http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html | ||||||||||||||||||
抄録 | ||||||||||||||||||
内容記述タイプ | Abstract | |||||||||||||||||
内容記述 | Sensing devices acting as interconnected data sources are becoming increasingly ubiquitous in concepts of Internet of Things (IoT)-enabled smart cities, but they typically lack physical protection and are susceptible to being compromised. To address this issue, a great-alternative-region (GAR)-based approach for deploying network monitors to locate compromised data sources is proposed. The GAR concept is introduced according to the network topology and connectivity characteristics, and the GARs with the most complete connectivity are identified as the candidate monitor locations, thereby transforming the problem of monitor deployment into a traditional K-center problem. Based on the demonstrated relationship between the monitor locations and the locating accuracy, the optimization objective for reasonably deploying monitors is designed to minimize the maximum number of hops between the data sources and their nearest monitors, and the optimal deployment pattern is achieved using an improved genetic algorithm. Finally, simulation-based results are presented to illustrate the performance of this approach. | |||||||||||||||||
言語 | en | |||||||||||||||||
書誌情報 |
en : IEEE Transactions on Industrial Informatics 巻 14, 号 6, p. 2579-2587, 発行日 2018-01-11 |
|||||||||||||||||
出版者 | ||||||||||||||||||
言語 | en | |||||||||||||||||
出版者 | IEEE | |||||||||||||||||
出版者版へのリンク | ||||||||||||||||||
10.1109/TII.2018.2791941 | ||||||||||||||||||
https://doi.org/10.1109/TII.2018.2791941 | ||||||||||||||||||
DOI | ||||||||||||||||||
関連タイプ | isVersionOf | |||||||||||||||||
識別子タイプ | DOI | |||||||||||||||||
関連識別子 | 10.1109/TII.2018.2791941 | |||||||||||||||||
日本十進分類法 | ||||||||||||||||||
主題Scheme | NDC | |||||||||||||||||
主題 | 007 | |||||||||||||||||
ISSN | ||||||||||||||||||
収録物識別子タイプ | PISSN | |||||||||||||||||
収録物識別子 | 1551-3203 | |||||||||||||||||
書誌レコードID | ||||||||||||||||||
収録物識別子タイプ | NCID | |||||||||||||||||
収録物識別子 | AA12023428 | |||||||||||||||||
権利 | ||||||||||||||||||
言語 | en | |||||||||||||||||
権利情報 | © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |||||||||||||||||
著者版フラグ | ||||||||||||||||||
出版タイプ | AM | |||||||||||||||||
出版タイプResource | http://purl.org/coar/version/c_ab4af688f83e57aa | |||||||||||||||||
フォーマット | ||||||||||||||||||
内容記述タイプ | Other | |||||||||||||||||
内容記述 | application/pdf |