データセントリックな信頼志向データ流通管理の研究
项目来源
项目主持人
项目受资助机构
立项年度
立项时间
项目编号
项目级别
研究期限
受资助金额
学科
学科代码
基金类别
关键词
参与者
参与机构
1.Growth Monitoring Sensor Network System for Supporting Operations of Aquaponics
- 关键词:
- Fish ponds;Agricultural system;Aquaponic;Growth monitoring;Individual identification;Monitoring sensors;MQTT;Nitrogen cycles;Production outputs;Sensor network systems;Sensors network
- Yukami, Tomoya;Miyaji, Hideaki;Yamamoto, Hiroshi
- 《2025 IEEE International Conference on Consumer Electronics, ICCE 2025》
- 2025年
- January 11, 2025 - January 14, 2025
- Las Vegas, NV, United states
- 会议
In recent years, to ensure a secure and stable food supply, aquaponics is gaining attention. The aquaponics is a novel agricultural system that integrates hydroponics and aquaculture and utilizes the nitrogen cycle facilitated by fish, plants, and bacteria without the need for pesticides. However, the management of the aquaponics is challenging because the nitrogen cycle should carefully be optimizes so as to maximize the production output of the fish and plants. Existing studies propose a system that automates the control of aquaponics systems, but does not support to automatically estimate fish and plant growth. Therefore, we propose a system that not only measures environmental conditions such as water temperature and pH, but also estimates the size of plants and fish to assess whether the condition of the field is appropriate for them or not. To continuously monitor the growth of fish, the proposed system includes a fish identification feature and an estimation feature of the length of each fish based on images captured by a stereo camera. Furthermore, in order to share the collected and estimated information among the fields, the proposed system is equipped with a secure data sharing system based on secure MQTT model. © 2025 IEEE.
...2.Reliability Verification Method for Sensor Data Based on Collaboration of Heterogeneous Wireless Sensor Networks
- 关键词:
- ;Adjacent nodes;Data reliability;Data reliability verification;Interaction of sensor network;Sensors data;Sensors network;Temporal networks;Time series characteristic;Verification method;Wireless sensor
- Zhang, Haoting;Yamamoto, Hiroshi
- 《39th International Conference on Information Networking, ICOIN 2025》
- 2025年
- January 15, 2025 - January 17, 2025
- Kantary Hills, Chiang Mai, 44, 44/1-4 Nimmanhaemin Road, Soi 12, Suthep, Muang, Chiang Mai, Thailand
- 会议
Efforts towards the realization of smart cities are gaining increasing attention to improve the efficiency and comfort of social activities. The smart cities are built on the IoT systems that gather and analyze various sensor data from different parts of the city. The wireless sensor networks are essential for constructing the IoT systems but have various vulnerabilities (e.g., data tampering, eavesdropping) to the integrity of the sensor data due to the openness of wireless communication. The existing study proposes a system for detecting anomalies in the sensor data by verifying the correctness of the time-series characteristics. However, it is difficult for the existing system to detect attacks that tamper with the sensor data to simulate the realistic pattern of the time series. Therefore, in this study, we assume that sensor nodes physically close in proximity can generate sensor data with similar information, and propose a new method to ensure the integrity of the sensor data by enabling nodes participating in different sensor networks to collaborate with the adjacent nodes to verify the data. Even if multiple wireless sensor networks use different communication protocols (e.g., ZigBee, Thread), nearby sensor nodes can temporarily change the mode (e.g., BLE) to form a temporal network for data verification. Within the temporal network, each sensor node shares its data with adjacent nodes on the other networks, and compares time-series characteristics to ensure the integrity of the sensor data. © 2025 IEEE.
...3.Extended ACME Protocol with Time-Limited VC Tokens for Automated Organization Validation
- 关键词:
- Carrier sense multiple access;Automated certificate management environment;Certificate management;Internet communication;Management environments;Organization validation certificate;Public key infrastructure;Time limited;Validation process;Verifiable credential;Web servers
- Ooka, Toi;Sasada, Taisho;Abe, Ryosuke;Taenaka, Yuzo;Kadobayashi, Youki;Suzuki, Shigeya
- 《39th International Conference on Information Networking, ICOIN 2025》
- 2025年
- January 15, 2025 - January 17, 2025
- Kantary Hills, Chiang Mai, 44, 44/1-4 Nimmanhaemin Road, Soi 12, Suthep, Muang, Chiang Mai, Thailand
- 会议
The Public Key Infrastructure (PKI) plays an essential role in securing Internet communications by enabling Certificate Authorities (CAs) to issue TLS certificates to web servers. These certificates enable browsers to authenticate web servers, though their expiration can disrupt website availability. To mitigate the problem, the Automated Certificate Management Environment (ACME) protocol automates certificate issuance and domain certification. However, Organization Validation (OV) certificate management is not automated because organization validation involves validating an organization's legal status and intent that are manually conducted, and are challenging to automate. This paper proposes an extended ACME protocol using Verifiable Credentials (VCs) to automate organization validation. VCs are digitally signed credentials issued by trusted authorities containing verifiable information, such as identity or educational qualifications. Reusing a previously issued VC for organization validation can pose significant risks by potentially enabling malicious actors to bypass the validation process. The proposed protocol solves this challenge by forcing a client requesting an OV certificate to obtain a short-lived VC after initiating the organization validation process, thereby limiting the reuse of VC and preventing unauthorized use. Our experimental results demonstrate that this protocol enhances security by preventing misuse of invalid VC while minimizing delays in certificate issuance. © 2025 IEEE.
...4.Speaker Identification for Low-End Devices: A Secure Voice Biometric Solution for Mobile Banking
- 关键词:
- Authentication;Banking;Biometrics;Crime;Cryptography;Deep learning;Mobile security;Network security;Speech recognition;Antispoofing;Biometric authentication;End-devices;Financial inclusions;Liveness detection;Mobile bankings;Resourceconstrained devices;Speaker identification;Voice biometric authentication;Voice biometrics
- Oluwatobi Oyewale, Oyebode;Taenaka, Yuzo;Kadobayashi, Youki
- 《11th IEEE International Conference on Privacy Computing and Data Security, PCDS 2025》
- 2025年
- August 1, 2025 - August 4, 2025
- Hakodate, Japan
- 会议
The rise of the mobile era, especially with the availability of the internet, has significantly contributed to the growth of mobile banking, enhancing financial inclusion, particularly among underserved populations. However, reliance on basic mobile devices without advanced biometric security features exposes users to risks of financial fraud, unauthorized account access, and identity theft. This study introduces a lightweight speaker identification system tailored to improve the security of mobile banking in low-resource environments. By utilizing voice biometric authentication, the system confirms the user's identity through their voice at the end of each transaction, ensuring that only the authorized user can complete the transaction even if their Personal Identification Number (PIN) is compromised. The system combines advanced deep learning models, such as Whisper-large-v3 and Emphasized Channel Attention, Propagation, and Aggregation in Time Delay Neural Network (ECAPA-TDNN), to extract detailed voice features, including linguistic patterns and unique speaker traits, ensuring high accuracy and reliability in real-time identification. Additionally, liveness detection is integrated to defend against advanced spoofing, further enhancing system security. Evaluations on real-world data demonstrate the system's robust performance, achieving 99.59% accuracy, 99.62 % precision, and an Equal Error Rate (EER) of 0.0017, validating the system's practicality in constrained environments without requiring extensive computational resources. This solution provides a scalable and secure voice authentication method that is particularly beneficial for underserved communities, advancing both mobile banking security and financial inclusion. © 2025 IEEE.
...5.Optimizing Voice Biometric Verification in Banking with Machine Learning for Speaker Identification
- 关键词:
- Adaptive filters;Adversarial machine learning;Banking;Contrastive Learning;Speech enhancement;Wiener filtering;Biometric verification;Identity authentication;Identity verification;Implicit wiener filter;Machine-learning;Speaker identification;Spectral subtractions;Voice biometrics;Voice variations;Wiener filter
- Oyewale, Oyebode Oluwatobi;Hossain, Md Delwar;Taenaka, Yuzo;Kadobayashi, Youki
- 《29th IEEE Asia Pacific Conference on Communications, APCC 2024》
- 2024年
- November 5, 2024 - November 7, 2024
- Bali, Indonesia
- 会议
Biometric verification is essential for secure identity verification and authentication during banking transactions using fingerprints, facial features, irises, and voices. Among these methods, voice biometrics is a promising alternative owing to its potential for robust and convenient user authentication. However, their effectiveness is significantly challenged by variations in the voice caused by different device configurations and environmental conditions. These variations can reduce the effectiveness of speaker identification and undermine the reliability of voice-based systems for securing online transactions. For an effective comparative solution, this study addresses these challenges by focusing on the difficulties posed by voice variations due to differences in device hardware, microphone quality, and environmental noise. Our approach employs machine-learning techniques using advanced speech enhancement methods to improve the consistency and accuracy of voice biometric verification across diverse devices. Specifically, we employ an adaptive filter model that enhances signal extraction, noise suppression, and predictive precision. Furthermore, our empirical demonstration showed that the adaptive filter significantly improved the accuracy of voice biometric systems by mitigating the impact of device-induced voice variations. In addition, we evaluate the performance of this model using a range of metrics. © 2024 IEEE.
...
