{"updated":"2025-01-23T03:16:28.169713+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00009650","sets":["581:586:597"]},"path":["597"],"owner":"1","recid":"9650","title":["無線センサネットワークにおけるFalse Event の検知"],"pubdate":{"attribute_name":"公開日","attribute_value":"2008-02-15"},"_buckets":{"deposit":"df7db858-7722-4a0f-9bae-f60f4022f0a8"},"_deposit":{"id":"9650","pid":{"type":"depid","value":"9650","revision_id":0},"owners":[1],"status":"published","created_by":1},"item_title":"無線センサネットワークにおけるFalse Event の検知","author_link":["0","0"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"無線センサネットワークにおけるFalse Event の検知"},{"subitem_title":"False Event Detection in Wireless Sensor Networks","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"特集:情報洪水時代のネットワークサービス","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2008-02-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"東京大学"},{"subitem_text_value":"東京大学 独立行政法人国立情報学研究所"}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"The University of Tokyo","subitem_text_language":"en"},{"subitem_text_value":"The University of Tokyo,National Institute of Informatics","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/9650/files/IPSJ-JNL4902009.pdf"},"date":[{"dateType":"Available","dateValue":"2010-02-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL4902009.pdf","filesize":[{"value":"351.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"7915968c-810c-4385-9c1f-5c24b75997c3","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2008 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"清, 雄一"},{"creatorName":"本位田真一"}],"nameIdentifiers":[{}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yuichi, Sei","creatorNameLang":"en"},{"creatorName":"Shinichi, Honiden","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"大規模なセンサネットワークでは,個々のセンサがセキュリティ侵害を受けやすい.セキュリティ侵害を受けたセンサは,嘘のイベント(False Event)を発生させるのに利用される.この攻撃は,イベントの受け取り手を混乱させるだけではなく,個々のセンサの有限のエネルギーを消費させる.False Event 攻撃に対する既存のセキュリティデデザインの共通目標は,小さな閾値を設定し,閾値未満の数のセンサがセキュリティ侵害を受けた場合のFalse Event を,In-network で検知することである.だが既存研究は,実際に発生したイベントが失われたり,独自のルーティングアルゴリズムを利用する必要があったりするという課題や,閾値以上のセンサがセキュリティ侵害を受けた場合にネットワーク全体のセキュリティが崩壊してしまうという課題を持つ.本論文では,ルーティングアルゴリズムの指定を行わず,閾値以上のセンサがセキュリティ侵害を受けた場合でも,ネットワーク全体のセキュリティをある程度保つことができる新しい機構を提案する.ルーティングアルゴリズムの指定を行わない既存研究と比較し,少ないホップ数でFalse Event の検知ができることを,数学的な解析やシミュレーションによって示す.","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"In a large scale sensor network, sensor nodes have a high risk of being captured and compromised. A compromised node can be used to generate false events. Such false events can deceive the user into wrong decisions. They can also waste a significant amount of network resources. Related works have problems; some works lose correct events stochastically and/or need to use their original routing protocols only for their methods. We propose a new method for detecting false events, which does not lose any correct events and does not specify any routing algorithms. Moreover, many security designs can address only a small threshold number of compromised nodes; the security protection completely breaks down when the threshold is exceeded. Our proposed method can achieve resiliency against an increasing number of compromised nodes. When we set the probability of losing correct events to 1%, our proposed method can detect more false events than related works do. We show this by mathematical analysis and simulations.","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"638","bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicPageStart":"628","bibliographicIssueDates":{"bibliographicIssueDate":"2008-02-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"49"}]},"relation_version_is_last":true,"item_2_alternative_title_2":{"attribute_name":"その他タイトル","attribute_value_mlt":[{"subitem_alternative_title":"無線・モバイルネットワーク"}]},"weko_creator_id":"1"},"created":"2025-01-18T22:44:48.566951+00:00","id":9650,"links":{}}