{"created":"2023-06-19T10:29:56.527055+00:00","id":10033,"links":{},"metadata":{"_buckets":{"deposit":"686842e1-6dc4-4f62-9202-821f53377c0a"},"_deposit":{"created_by":18,"id":"10033","owners":[18],"pid":{"revision_id":0,"type":"depid","value":"10033"},"status":"published"},"_oai":{"id":"oai:muroran-it.repo.nii.ac.jp:00010033","sets":["216:316","216:352","46"]},"author_link":["56563","39157","21131"],"item_79_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2018-01-11","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"6","bibliographicPageEnd":"2587","bibliographicPageStart":"2579","bibliographicVolumeNumber":"14","bibliographic_titles":[{"bibliographic_title":"IEEE Transactions on Industrial Informatics","bibliographic_titleLang":"en"}]}]},"item_79_description_23":{"attribute_name":"フォーマット","attribute_value_mlt":[{"subitem_description":"application/pdf","subitem_description_type":"Other"}]},"item_79_description_7":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Sensing devices acting as interconnected data sources are becoming increasingly ubiquitous in concepts of Internet of Things (IoT)-enabled smart cities, but they typically lack physical protection and are susceptible to being compromised. To address this issue, a great-alternative-region (GAR)-based approach for deploying network monitors to locate compromised data sources is proposed. The GAR concept is introduced according to the network topology and connectivity characteristics, and the GARs with the most complete connectivity are identified as the candidate monitor locations, thereby transforming the problem of monitor deployment into a traditional K-center problem. Based on the demonstrated relationship between the monitor locations and the locating accuracy, the optimization objective for reasonably deploying monitors is designed to minimize the maximum number of hops between the data sources and their nearest monitors, and the optimal deployment pattern is achieved using an improved genetic algorithm. Finally, simulation-based results are presented to illustrate the performance of this approach.","subitem_description_language":"en","subitem_description_type":"Abstract"}]},"item_79_link_17":{"attribute_name":"出版者版へのリンク","attribute_value_mlt":[{"subitem_link_text":"10.1109/TII.2018.2791941","subitem_link_url":"https://doi.org/10.1109/TII.2018.2791941"}]},"item_79_link_5":{"attribute_name":"室蘭工業大学研究者データベースへのリンク","attribute_value_mlt":[{"subitem_link_text":"(太田 香)OTA Kaoru","subitem_link_url":"http://rdsoran.muroran-it.ac.jp/html/100000140_ja.html"},{"subitem_link_text":"(董 冕雄)DONG Mianxiong","subitem_link_url":"http://rdsoran.muroran-it.ac.jp/html/100000145_ja.html"}]},"item_79_publisher_11":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"IEEE","subitem_publisher_language":"en"}]},"item_79_relation_18":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type":"isVersionOf","subitem_relation_type_id":{"subitem_relation_type_id_text":"10.1109/TII.2018.2791941","subitem_relation_type_select":"DOI"}}]},"item_79_rights_19":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.","subitem_rights_language":"en"}]},"item_79_source_id_12":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1551-3203","subitem_source_identifier_type":"PISSN"}]},"item_79_source_id_14":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12023428","subitem_source_identifier_type":"NCID"}]},"item_79_subject_9":{"attribute_name":"日本十進分類法","attribute_value_mlt":[{"subitem_subject":"007","subitem_subject_scheme":"NDC"}]},"item_79_version_type_21":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_ab4af688f83e57aa","subitem_version_type":"AM"}]},"item_access_right":{"attribute_name":"アクセス権","attribute_value_mlt":[{"subitem_access_right":"open access","subitem_access_right_uri":"http://purl.org/coar/access_right/c_abf2"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"TAO, Ming","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{}],"affiliationNames":[{},{}]}],"creatorNames":[{"creatorName":"OTA, Kaoru","creatorNameLang":"en"},{"creatorName":"太田, 香","creatorNameLang":"ja"},{"creatorName":"オオタ, カオル","creatorNameLang":"ja-Kana"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]},{"creatorAffiliations":[{"affiliationNameIdentifiers":[{}],"affiliationNames":[{},{}]}],"creatorNames":[{"creatorName":"DONG, Mianxiong","creatorNameLang":"en"},{"creatorName":"トウ, メンユウ","creatorNameLang":"ja-Kana"},{"creatorName":"董, 冕雄","creatorNameLang":"ja"}],"familyNames":[{},{},{}],"givenNames":[{},{},{}],"nameIdentifiers":[{},{}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2019-08-22"}],"displaytype":"detail","filename":"IEEETII_14_6_2579_2587.pdf","filesize":[{"value":"1.0 MB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"IEEETII_14_6_2579_2587","objectType":"fulltext","url":"https://muroran-it.repo.nii.ac.jp/record/10033/files/IEEETII_14_6_2579_2587.pdf"},"version_id":"2675bcfb-07e1-4aad-be10-feb817080cb1"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Monitoring","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Smart cities","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Euclidean distance","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Genetic algorithms","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Informatics","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Network topology","subitem_subject_language":"en","subitem_subject_scheme":"Other"},{"subitem_subject":"Optimization","subitem_subject_language":"en","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Locating Compromised Data Sources in IoT-Enabled Smart Cities: A Great-Alternative-Region-Based Approach","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Locating Compromised Data Sources in IoT-Enabled Smart Cities: A Great-Alternative-Region-Based Approach","subitem_title_language":"en"}]},"item_type_id":"79","owner":"18","path":["46","316","352"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2019-08-22"},"publish_date":"2019-08-22","publish_status":"0","recid":"10033","relation_version_is_last":true,"title":["Locating Compromised Data Sources in IoT-Enabled Smart Cities: A Great-Alternative-Region-Based Approach"],"weko_creator_id":"18","weko_shared_id":-1},"updated":"2023-10-24T01:52:40.227666+00:00"}