{"id":194934,"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00194934","sets":["1164:6389:9696:9719"]},"path":["9719"],"owner":"44499","recid":"194934","title":["アグリゲート・メッセージ認証方式の実装と評価"],"pubdate":{"attribute_name":"公開日","attribute_value":"2019-02-28"},"_buckets":{"deposit":"95a1ee1a-5642-4b5a-bf3d-9b2d6e8a8475"},"_deposit":{"id":"194934","pid":{"type":"depid","value":"194934","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"アグリゲート・メッセージ認証方式の実装と評価","author_link":["462780","462775","462781","462779","462778","462787","462784","462777","462783","462788","462774","462773","462776","462782","462786","462785"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"アグリゲート・メッセージ認証方式の実装と評価"},{"subitem_title":"Implementation and evaluation of aggregate message authentication method","subitem_title_language":"en"}]},"item_type_id":"4","publish_date":"2019-02-28","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"ジヤパンデータコム株式会社"},{"subitem_text_value":"株式会社ニッシン"},{"subitem_text_value":"株式会社ニッシン"},{"subitem_text_value":"ジヤパンデータコム株式会社/福井大学"},{"subitem_text_value":"ジヤパンデータコム株式会社"},{"subitem_text_value":"NECセキユリテイ研究所"},{"subitem_text_value":"横浜国立大学大学院環境情報研究院/先端科学高等研究院"},{"subitem_text_value":"横浜国立大学大学院環境情報研究院/先端科学高等研究院/国立研究開発法人情報通信研究機構"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Japan Datacom co.,Ltd.,","subitem_text_language":"en"},{"subitem_text_value":"Nissin Inc.,","subitem_text_language":"en"},{"subitem_text_value":"Nissin Inc.,","subitem_text_language":"en"},{"subitem_text_value":"Japan Datacom co.,Ltd., / The University of Fukui,","subitem_text_language":"en"},{"subitem_text_value":"Japan Datacom co.,Ltd.,","subitem_text_language":"en"},{"subitem_text_value":"NEC Corporation,Graduate School of Environment and Information Science, Yokohama National University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Environment and Information Science, Yokohama National University / National Institute of Information and Communications Technology (NICT),","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/194934/files/IPSJ-SPT19032008.pdf","label":"IPSJ-SPT19032008.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-SPT19032008.pdf","filesize":[{"value":"436.0 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"5859fb7f-6ddf-43ef-b973-507c6ae8a5da","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2019 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"山岸, 篤弘"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"竹久, 達也"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"西浦, 英一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"廣瀬, 勝一"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"今村, 祐"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"峯松, 一彦"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"四方, 順司"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"中尾, 康二"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Atsuhiro, Yamagishi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Tatsuya, Takehisa","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Hidekazu, Nishimura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Shouichi, Hirose","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yu, Imamura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kazuhiko, Minematsu","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Junji, Shikata","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Koji, Nakao","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12628305","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8671","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"高速ネットワーク環境の普及に伴って,様々な機器がネットワークに接続されるようになってきた.なかでも,IoT デバイスは,攻撃対象となる可能性が高く,セキュリティ対策を行う必要がある.IoT デバイスが出力するデータに基づいてシステムの挙動が決まるため,IoT デバイスの機器認証やデバイスが扱うデータ認証が重要となる.殊に,ワイヤレス環境に置かれる IoT デバイスでは,送信データ毎にデータ認証用の認証子を付加する必要があるため,データ認証に係る通信トラフィックの増大により無線リソースの逼迫を招くという課題がある.そこで,データの信頼性と送信データ量の削減を目指して,これまで著者らは追跡機能付きアグリゲートメッセージ認証方式を研究開発してきた.本稿では,研究開発したアグリゲート認証技術を IoT ワイヤレスデバイスと IoT ハブに実装しデータの信頼性と送信データ量の削減効果の検証を行ったのでその結果を報告する.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Recently, many and various devices are connected to the Internet with the spread of high-speed network environments, and the security of IoT devices is essential under the threat of cyber attacks. Specifically, guaranteeing the device authentication and data authentication for IoT devices is very important. In particular, we usually append an authenticator (or a tag) to each data for authentication, and it raises the challenges in a wireless environment brought by an increase of data communication traffic due to data authentication. Therefore, with the aim of reducing the total amount of authenticators while keeping the reliability of the data, we have developed aggregate message authentication schemes with detecting capability of invalid messages. In this paper, we implement such aggregate message authentication schemes in IoT devices and IoT hubs, and we evaluate its performance and effectiveness from several aspects such as total amount of authenticators.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"5","bibliographic_titles":[{"bibliographic_title":"研究報告セキュリティ心理学とトラスト(SPT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2019-02-28","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"8","bibliographicVolumeNumber":"2019-SPT-32"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"updated":"2025-01-19T23:16:55.880150+00:00","created":"2025-01-19T00:59:57.397660+00:00","links":{}}