{"updated":"2025-01-20T06:44:21.440545+00:00","links":{},"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00141602","sets":["581:7706:7710"]},"path":["7710"],"owner":"11","recid":"141602","title":["Accumulative Secure Group Association in an Ad-hoc and Ubiquitous Network (Version 3.0)"],"pubdate":{"attribute_name":"公開日","attribute_value":"2015-04-15"},"_buckets":{"deposit":"a72175b8-9b22-4c3c-843f-db030f055dda"},"_deposit":{"id":"141602","pid":{"type":"depid","value":"141602","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"Accumulative Secure Group Association in an Ad-hoc and Ubiquitous Network (Version 3.0)","author_link":["207165","207166","207163","207164"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Accumulative Secure Group Association in an Ad-hoc and Ubiquitous Network (Version 3.0)"},{"subitem_title":"Accumulative Secure Group Association in an Ad-hoc and Ubiquitous Network (Version 3.0)","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[一般論文] secure mobile group, secure group association, out-of-band channel, certification","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2015-04-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"University of Tsukuba"},{"subitem_text_value":"University of Tsukuba"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"University of Tsukuba","subitem_text_language":"en"},{"subitem_text_value":"University of Tsukuba","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"publish_status":"0","weko_shared_id":11,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/141602/files/IPSJ-JNL5604016.pdf","label":"IPSJ-JNL5604016"},"date":[{"dateType":"Available","dateValue":"2017-04-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL5604016.pdf","filesize":[{"value":"1.1 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"82487e0d-9d62-4084-b23d-4dc6f3cfb671","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2015 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Oyuntungalag, Chagnaadorj"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Jiro, Tanaka"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Oyuntungalag, Chagnaadorj","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Jiro, Tanaka","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"The increased popularity of mobile devices, such as laptops, mobile phones, tablets, accessory devices, and more, brings new challenges in the area of network security in the ubiquitous environment, where ad-hoc networks may be formed using mobile devices. There has been little discussion of setting up secure connections among a group of devices. A number of group security protocols has been proposed; however, these have tended to focus on a scenario whereby all devices must be located in one place at one time. In this paper, we describe a new secure group association method that associates mobile devices in an accumulative manner, so it does not require all group members to be physically present. It utilizes digital certification and extends the concept of out-of-band channels, through which the authentication data can be transferred using human user involvement. We have implemented a prototype system and conducted a comparative user experiment to demonstrate viability of the accumulative association.\n\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.23(2015) No.3 (online)\n------------------------------","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The increased popularity of mobile devices, such as laptops, mobile phones, tablets, accessory devices, and more, brings new challenges in the area of network security in the ubiquitous environment, where ad-hoc networks may be formed using mobile devices. There has been little discussion of setting up secure connections among a group of devices. A number of group security protocols has been proposed; however, these have tended to focus on a scenario whereby all devices must be located in one place at one time. In this paper, we describe a new secure group association method that associates mobile devices in an accumulative manner, so it does not require all group members to be physically present. It utilizes digital certification and extends the concept of out-of-band channels, through which the authentication data can be transferred using human user involvement. We have implemented a prototype system and conducted a comparative user experiment to demonstrate viability of the accumulative association.\n\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.23(2015) No.3 (online)\n------------------------------","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2015-04-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"4","bibliographicVolumeNumber":"56"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":141602,"created":"2025-01-19T00:19:09.858182+00:00"}