Академический Документы
Профессиональный Документы
Культура Документы
I. I NTRODUCTION
Manuscript received December 15, 2014; revised May 25, 2015; accepted
June 28, 2015. This work was supported in part by the project, Cognitive
Security: A New Approach to Securing Future Large Scale and Distributed
Mobile Applications, of Japan-US Network Opportunity: R&D for Beyond
Trillions of Objects supported by the National Institute of Information and
Communications Technology (NICT), Japan, and in part by the U.S. National
Science Foundation Grant CNS-1405747.
Y. Kawamoto, H. Nishiyama, and N. Kato are with the Graduate School
of Information Sciences, Tohoku University, Sendai 980-8577, Japan (e-mail:
youpsan@it.ecei.tohoku.ac.jp; hiroki.nishiyama.1983@ieee.org; kato@it.ecei.
tohoku.ac.jp).
Y. Shimizu with the NTT Network Innovation Laboratories, NTT Corporation, Yokosuka 239-0847, Japan (e-mail: shimizu.yoshitaka@lab.ntt.co.jp).
A. Takahara with NTT Electronics Corporation, Yokohama 243-0032, Japan
(e-mail: takahara-atsushi@ntt-el.com).
T. Jiang with Virginia Polytechnic Institute and State University, Blacksburg,
VA 24061 USA (e-mail: virjtt03@vt.edu).
Digital Object Identifier 10.1109/JSYST.2015.2456878
example of an industrial IoT application. In location-based authentication systems, ambient information is collected from
a significant number of diverse devices, which are deployed in
an IoT society. The ambient information is taken as unique data
and a certain time at a certain place that varies along with the
surrounding network environment. By using the unique ambient
information, the authentication system can guarantee the users
location. The authentication system is considered to be used
by many other location-based applications in the industrial
society. For example, an application can require transmission of
confidential data to only some limited users in predetermined
areas, such as military facilities or a conference room for a
secret meeting. Additionally, it is possible to use this system for
couponing to limited people inside a shop. As just described,
a location-based authentication system can be used in many
situations and has large expansivity for the future industrial IoT
society.
However, a location-based authentication system requires
continuous collection of ambient information from numerous
devices because the ambient information is always changing.
However, due to the limitation of network resources, it is difficult to collect data from numerous devices in real time. Thus,
it is necessary to control the data collection in order to improve
the performance of the authentication system. Therefore, in this
paper, we propose a novel data collection method for authentication systems. In this proposal, the data collection is controlled
according to requirements from the system. Although there are
many previous researches on data collection from sensors, mobile terminals, and so on, to improve the network performance,
as for the novelty of our research, the proposed method dynamically controls its parameters according to the surrounding
environment and the requirements from the application side. In
this proposal, the freshness and the number of the collected data
is controlled to satisfy the requirements. As a result, it improves
the performance of the authentication system while using the
network resources efficiently.
The remainder of this paper is organized as follows. The
authentication system using ambient information that we focus
on in this paper is introduced in Section II. In addition, the
requirements from the authentication system to the network
side are presented. In Section III, the supposed system model
is constructed. Additionally, a model to evaluate the accuracy
of the authentication system is introduced. Section IV describes
our proposed method to effectively collect data from numerous
devices in real time. Section V contains the results of the
numerical analysis. Finally, concluding remarks are provided
in Section VI.
1932-8184 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
2
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
KAWAMOTO et al.: EFFECTIVELY COLLECTING DATA FOR THE LOCATION-BASED AUTHENTICATION IN IoT
APs coverage (
device (
User
(speed is
AP
2)
Data at device
(current)
aa
bb
cc
dd
ee
Data at server
(collected 10 units time ago)
aa
bb
cc
dd
xx
device (
device
Data at device
(current)
ff
gg
hh
ii
jj
Data at server
(collected 10 units time ago)
ff
gg
hh
yy
zz
device
Devices coverage (
(1)
where SAPi and Sdi represent the dimension of the APs and the
devices coverage, respectively, where the AP has identification
number i. Additionally, SAPi and Sdi are expressed as follows:
3 3
SAPi =
Ri2
(2)
2
3 3 2
ri .
Sd i =
(3)
2
Thus, from (1)(3), ri is expressed as follows:
Ri
ri = .
Ni
(4)
(5)
(6)
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
4
(7)
1
pi (1 pi )m
m=0
2m CWmin l
2
pi (1 pi )m
m=
CWmax l
2
(8)
i Ni l
.
Ti
(10)
Here, we assume that each device sends only one packet to the
AP through its data sending process. Additionally, the traffic
arrival rate at the AP can be assumed to follow the Poisson
distribution because each device waits a random period before
sending the data. At this time, since CSMA/CA is supposed
to be used as the access control scheme in this proposal, the
probability that the data transmission from a device succeeds,
pi , is expressed as follows [16]:
pi =
eaGi
Gi (1 + 2a) + eaGi
where a denotes the ratio of propagation delay to packet transmission time. Moreover, the throughput, i.e., i (packets/slot),
is expressed as follows:
(11)
i = Gi pi =
Gi eaGi
.
Gi (1 + 2a) + eaGi
(12)
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
KAWAMOTO et al.: EFFECTIVELY COLLECTING DATA FOR THE LOCATION-BASED AUTHENTICATION IN IoT
(13)
The guaranteed maximum error of the measured users location is expressed as ri . Additionally, the error of the users
calculated position is turned into a metric with a time unit
by considering the average moving speed of the users inside
the coverage of the AP. Thus, maximum accuracy degradation
level, which is related to the maximum error of the users calculated position is expressed as ri /vi . Therefore, the minimum
accuracy t units time after the data was collected at a user close
to the device with identification number as ni is expressed as
follows:
ri
xni .
(14)
Ani (t) = fni (t)
vi
To improve the accuracy of the authentication system, each
AP collects data to maximize the average value of Ani of all
devices under the APs coverage. Here, the average value of
Ani (t) of all the devices under its coverage at arbitrary timing
is defined as Ai (t), which is expressed as follows:
Ai (t) =
Ni
1
ri
fni (t) xi
Ni n =1
vi
i
(15)
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
6
TABLE I
PARAMETER S ETTINGS
Ni
1
Ri
1
fn (Ti )
xi .
Ni n =1 i
Ni vi
(16)
Gi Ti
.
Ni l
(17)
(18)
where fni (0) shows the value of fni (t) at the start of the
interval. As shown in this expression, the value of fni (Ti ) is
also controlled by Ti .
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
KAWAMOTO et al.: EFFECTIVELY COLLECTING DATA FOR THE LOCATION-BASED AUTHENTICATION IN IoT
Fig. 3. Existence of the maximized accuracy and the tradeoff relationship between the freshness and density of the collected data. (a) fi (Ti ). (b) D(Ti ).
(c) Ai (Ti ).
Therefore, by controlling the value of Ti , the objective function can be maximized. Thus, the value of Ti , which maximizes
the objective function, i.e., Tiopt , is expressed as follows:
Tiopt = arg max Ai (Ti ).
(19)
Ti
V. P ERFORMANCE E VALUATION
Here, the existence of the optimal value of Ti to maximize the
accuracy of the authentication system is described. Additionally, the effectiveness of the proposed method is also presented.
The mathematical results are provided by using the analysis in
previous sections.
A. Parameter Settings
The parameter settings are summarized in Table I. In this
numerical analysis, the accuracy of the authentication system
constructed by devices under an APs coverage is evaluated.
The radius of the coverage of the AP is set to 30 m. Additionally, we assume that the users and the devices are deployed
randomly in the coverage of the AP. The users average moving
speed is set to 1 m/s. The number of devices in the coverage
of the AP is set to 1000. As the parameters used in the process
of the data collection, the length of a time slot and the ratio of
propagation delay to packet transmission time are set to 50 s
and 10, respectively.
B. Existence of the Optimal Value of Ti
First, the existence of an optimal value of Ti , which maximizes the accuracy of the authentication system is proved.
Fig. 3(a) and (b) shows the change in the freshness and density
of the collected data to the value of the interval, respectively.
Here, as the index to evaluate the density of the collected data,
the value, which is equal to (ri /vi ) xni that is the second
term of (16) is used. Additionally, we express the index as
D(Ti ) in this evaluation. Moreover, Fig. 3(c) shows the change
in accuracy when the value of the interval is varied. From
Fig. 3(c), it is clearly shown that there is an optimal value of
Ti , which maximizes the accuracy of the authentication system.
This is because there is a tradeoff relationship between the
freshness and density of the collected data with different values
of the interval that can be confirmed from Fig. 3(a) and (b). A
Fig. 4. Change in the accuracy when the value of the changing rate of the
freshness of the ambient information is varied.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
8
0.9
With proposal
Without proposal
Ai (Ti )
0.8
0.7
0.6
0.5
Fig. 5. Accuracy in each case where the value of fni (0) is set to 0.6,
0.7, and 0.8.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
KAWAMOTO et al.: EFFECTIVELY COLLECTING DATA FOR THE LOCATION-BASED AUTHENTICATION IN IoT
Nei Kato (F13) received the B.S. degree from Polytechnic University, Tokyo, Japan, in 1986, and the
M.S. and Ph.D. degrees in information engineering
from Tohoku University, Sendai, Japan, in 1988 and
1991, respectively.
He joined the Computer Center of Tohoku University as an Assistant Professor in 1991, and was
promoted to Full Professor position with the Graduate School of Information Sciences, Tohoku University, in 2003. He became a Strategic Adviser to the
President of Tohoku University in 2013. He has been
engaged in research on computer networking, wireless mobile communications,
satellite communications, ad hoc & sensor & mesh networks, smart grid, and
pattern recognition. He has published more than 300 papers in peer-reviewed
journals and conference proceedings.
Dr. Kato currently serves as a Member-at-Large on the Board of Governors,
IEEE Communications Society, the Chair of IEEE Ad Hoc & Sensor Networks
Technical Committee, the Chair of IEEE ComSoc Sendai Chapter, the Editorin-Chief of IEEE Network Magazine, the Associate Editor-in-Chief of IEEE
Internet of Things Journal, and an Area Editor of IEEE T RANSACTIONS ON
V EHICULAR T ECHNOLOGY. He has served as the Chair of IEEE ComSoc
Satellite and Space Communications Technical Committee (20102012), the
Chair of IEICE Satellite Communications Technical Committee (20112012).
He was the recipient of the Minoru Ishida Foundation Research Encouragement Prize(2003), the Distinguished Contributions to Satellite Communications
Award from the IEEE Communications Society, Satellite and Space Communications Technical Committee (2005), the FUNAI information Science
Award (2007), the TELCOM System Technology Award from Foundation
for Electrical Communications Diffusion (2008), the IEICE Network System
Research Award (2009), the IEICE Satellite Communications Research Award
(2011), the KDDI Foundation Excellent Research Award (2012), and the IEICE
Communications Society Distinguished Service Award (2012), Distinguished
Contributions to Disaster-resilient Networks R&D Award from Ministry of
Internal Affairs and Communications, Japan (2014), seven Best Paper Awards
from IEEE GLOBECOM/WCNC/VTC, and IEICE Communications Society
Best Paper Award (2012). Aside from his academic activities, he also serves
on the Expert Committee of Telecommunications Council, Ministry of Internal
Affairs and Communications, and as the chairperson of ITU-R SG4 and SG7,
Japan. He is a Distinguished Lecturer of IEEE Communications Society and
Vehicular Technology Society. He is a Fellow of Institute of Electronics,
Information and Communication Engineers.
Yoshitaka Shimizu received the B.E. and M.S. degrees in electrical engineering from Tokyo Institute
of Technology, Yokohama, Japan, in 1995 and 1997,
respectively.
He joined NTT Wireless Systems Laboratories in
1997. He is currently engaged in the research and development of wireless access systems with the NTT
Network Innovation Laboratories, NTT Corporation.