{"created":"2025-01-19T00:32:13.319037+00:00","updated":"2025-01-20T12:48:26.504485+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00159076","sets":["1164:1579:8444:8683"]},"path":["8683"],"owner":"11","recid":"159076","title":["遅延耐性ネットワークにおける接触回避ルーティングの検討"],"pubdate":{"attribute_name":"公開日","attribute_value":"2016-05-02"},"_buckets":{"deposit":"55f69122-7407-4d01-a055-44dcdba87b24"},"_deposit":{"id":"159076","pid":{"type":"depid","value":"159076","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"遅延耐性ネットワークにおける接触回避ルーティングの検討","author_link":["305504","305505","305503","305508","305506","305507"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"遅延耐性ネットワークにおける接触回避ルーティングの検討"},{"subitem_title":"A Study of Contact Avoidance Routing in Delay Tolerant Networks","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ディペンダブルコンピューティング","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2016-05-02","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"首都大学東京大学院システムデザイン研究科"},{"subitem_text_value":"首都大学東京システムデザイン学部"},{"subitem_text_value":"首都大学東京システムデザイン学部"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Graduate School of System Design, Tokyo Metropolitan University","subitem_text_language":"en"},{"subitem_text_value":"Faculty School of System Design, Tokyo Metropolitan University","subitem_text_language":"en"},{"subitem_text_value":"Faculty School of System Design, Tokyo Metropolitan University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/159076/files/IPSJ-ARC16220003.pdf","label":"IPSJ-ARC16220003.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-ARC16220003.pdf","filesize":[{"value":"295.5 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"16"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"98a6d5ca-215a-4a48-9178-f752a5e204e3","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2016 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"小薄, 誠也"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"酒井, 和哉"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"福本, 聡"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Tomoya, Osuki","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kazuya, Sakai","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Satoshi, Fukumoto","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN10096105","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8574","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"本研究では,通信リンクが断続的である遅延耐性ネットワーク (DTNs, Delay Tolerant Networks) における,安全なルーティング手法について議論する.暗号化はエンド・ツー・エンドの通信におけるデータ保護手法として強力ではある.しかし,例えば攻撃者が潜伏している危険なエリアを回避するような,完全な予防策を講じるのが理想的である.そのため,データを持つノードが攻撃者と接触するのを避ける,接触回避という新しい考え方を導入する.さらに接触回避ルーティングプロトコルについて検討し,シミュレーションによって提案手法は安全到達率が向上することを示す.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"We address a secure routing in delay tolerant networks (DTNs) that lack continuous network connectivity. While cryptographic operations are powerful tool to protect encrypted data for end-to-end communications, outright prevention, i.e., avoiding insecure area where adversaries are located, is an ideal solution. To this end, we first formulate a new class of routing problem, called contact avoidance, in which the node with a message tries to avoid having a contact with adversaries. Then, we studied on a contact avoidance routing protocol and demonstrate that the proposed scheme significantly improves the secure delivery rate by simulations.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"4","bibliographic_titles":[{"bibliographic_title":"研究報告システム・アーキテクチャ(ARC)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2016-05-02","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"3","bibliographicVolumeNumber":"2016-ARC-220"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"id":159076,"links":{}}