2019 Blockchain and Internet of Things Conference BIOTC 2019 - July 7-9, 2019 Okinawa, Japan
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
2019 Blockchain and Internet of Things Conference 2019 Blockchain and Internet of Things Conference(BIOTC 2019) July 7-9, 2019 Okinawa, Japan Supported by Indexed by http://www.biotc.net/ 1
2019 Blockchain and Internet of Things Conference Welcome Message from Organizing Committee It is our great pleasure to invite you to join our international conferences - 2019 Blockchain and Internet of Things Conference (BIOTC 2019). This event will provide a unique opportunity for editors and authors to get together and share their latest research findings and results. We look forward to welcoming you at Okinawa, Japan. We’re confident that over the two days you’ll get the theoretical grounding, practical knowledge, and personal contacts that will help you build long-term, profitable and sustainable communication among researchers and practitioners working in a wide variety of scientific areas with a common interest in Blockchain and Internet of Things. On behalf of all the conference committees, we would like to thank all the authors as well as the technical program committee members and reviewers. Their high competence, their enthusiasm, their time and expertise knowledge, enabled us to prepare the high-quality final program and helped to make the conference become a successful event. We truly hope you’ll enjoy the conference and get what you expect from the conference. Organizing Committee 2019.7.7 2
2019 Blockchain and Internet of Things Conference Table of Contents Keynote Speakers Introductions ...................................................................................................................... 3 Conference Introductions ................................................................................................................................ 7 Conference Venue ........................................................................................................................................... 8 Registration Guide ........................................................................................................................................... 9 Presentation Instructions .............................................................................................................................. 10 Schedule for Conference ............................................................................................................................... 11 Morning Session ............................................................................................................................................ 12 Opening Remarks (9:00-9:10) ....................................................................................................... 12 Keynote Speech I (9:10-9:55) ........................................................................................................ 12 Keynote Speech II (9:55-10:40) ..................................................................................................... 13 Coffee Break & Group Photo Taking 10:40-11:00.................................................................................. 13 Keynote Speech III (11:00-11:45).................................................................................................. 14 Keynote Speech IV (11:45-12:30) ................................................................................................. 15 Lunch 12:30-14:00 ................................................................................................................................. 15 Oral Presentation Abstracts........................................................................................................................... 16 Session 1- Communication System ........................................................................................................ 16 IE0003 Presentation 1 (14:00-14:15)............................................................................................. 16 IE0004-A Presentation 2 (14:15-14:30) ......................................................................................... 16 IE0012 Presentation 3 (14:30-14:45)............................................................................................. 17 IE0017 Presentation 4 (14:45-15:00)............................................................................................. 17 IE0024 Presentation 5 (15:00-15:15)............................................................................................. 18 IE0002 Presentation 6 (15:15-15:30)............................................................................................. 18 Session 2- Blockchain Protocol Design and Optimization ..................................................................... 19 BI0007 Presentation 7 (14:00-14:15) ............................................................................................ 19 BI0009 Presentation 8 (14:15-14:30) ............................................................................................ 19 BI0011 Presentation 9 (14:30-14:45) ............................................................................................ 20 BI0027-A Presentation 10 (14:45-15:00)....................................................................................... 20 BI0028 Presentation 11 (15:00-15:15) .......................................................................................... 20 BI0034 Presentation 12 (15:15-15:30) .......................................................................................... 21 Coffee Break 15:30-15:50 ...................................................................................................................... 21 Session 3- Network Security .................................................................................................................. 22 IE0006 Presentation 13 (15:50-16:05)........................................................................................... 22 1
2019 Blockchain and Internet of Things Conference IE0005 Presentation 14 (16:05-16:20)........................................................................................... 22 IE0014 Presentation 15 (16:20-16:35)........................................................................................... 22 IE0015 Presentation 16 (16:35-16:50)........................................................................................... 23 IE0019 Presentation 17 (16:50-17:05)........................................................................................... 23 IE0007 Presentation 18 (17:05-17:20)........................................................................................... 24 BI0002 Presentation 19 (17:20-17:35) .......................................................................................... 24 Session 4- Blockchain Applications ........................................................................................................ 25 BI0004 Presentation 20 (15:50-16:05) .......................................................................................... 25 BI0010 Presentation 21 (16:05-16:20) .......................................................................................... 25 BI0013-A Presentation 22 (16:20-16:35)....................................................................................... 26 BI0026-A Presentation 23 (16:35-16:50)....................................................................................... 26 BI0035-A Presentation 24 (16:50-17:05)....................................................................................... 27 BI0001 Presentation 25 (17:05-17:20) ....................................................................................... 27 Dinner 18:00-19:00 ............................................................................................................................... 27 Poster session ................................................................................................................................................ 28 BI0017 Poster 1 ............................................................................................................................. 28 BI0020 Poster 2 ............................................................................................................................. 28 BI0021 Poster 3 ............................................................................................................................. 28 BI0029 Poster 4 ............................................................................................................................. 29 BI0033 Poster 5 ............................................................................................................................. 29 One Day Visit ................................................................................................................................................. 30 2
2019 Blockchain and Internet of Things Conference Keynote Speakers Introductions Keynote Speaker I Prof. Qun Jin Dean of Graduate School of Human Sciences, Waseda University, Japan Qun Jin is a Professor at the Networked Information Systems Laboratory, Department of Human Informatics and Cognitive Sciences, Faculty of Human Sciences, Waseda University, Japan. He is currently the Dean of Graduate School of Human Sciences. He has been extensively engaged in research works in the fields of computer science, information systems, and social and human informatics. His recent research interests cover human-centric ubiquitous computing, behavior and cognitive informatics, big data, personal analytics and individual modeling, intelligence computing, blockchain, cyber security, cyber-enabled applications in healthcare, and computing for well-being. He is a senior member of Association of Computing Machinery (ACM), Institute of Electrical and Electronics Engineers (IEEE), and Information Processing Society of Japan (IPSJ). 3
2019 Blockchain and Internet of Things Conference Keynote Speaker II Prof. Maode Ma School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore Prof. Maode Ma received his Ph.D. degree in computer science from Hong Kong University of Science and Technology in 1999. Now, Dr. Ma is an Associate Professor in the School of Electrical and Electronic Engineering at Nanyang Technological University in Singapore. He has extensive research interests including network security and wireless networking. Dr. Ma has over 400 international academic publications including 200 journal papers and more than 200 conference papers. He has delivered over 60 keynote speeches at various international conferences. He has served as conference chairs for over 100 international conferences. He currently serves as the Editor-in-Chief of International Journal of Computer and Communication Engineering and International Journal of Electronic Transport. He also serves as a Senior Editor or an Associate Editor for other 5 international academic journals. Dr. Ma is a Fellow of IET, a Senior Member of IEEE Communication Society and IEEE Education Society, and a Member of ACM. He is the Secretary of the IEEE Singapore Section and the Chair of the ACM, Singapore Chapter. He has served as an IEEE Communication Society Distinguished Lecturer from 2013-2016. 4
2019 Blockchain and Internet of Things Conference Keynote Speaker III Prof. Wai-Kong Lee Universiti Tunku Abdul Rahman, Malaysia Prof. Wai-Kong Lee received the B.Eng. degree in electronics and the M.Sc. degree from Multimedia University in 2006 and 2009, respectively。 He obtained Ph.D. degree in engineering from Universiti Tunku Abdul Rahman, Malaysia, in 2018. He was a Visiting Scholar with Carleton University, Canada, in 2017, Feng Chia University, Taiwan, in 2016 and 2018, and OTH Regensburg, Germany, in 2015. His research interests are in the areas of cryptography, Blockchain, GPU computing, Internet of Things, numerical algorithms and energy harvesting. He also served as the reviewers for several reputable journals, including IEEE Transactions on Dependable and Secure Computing (2017), IEEE Sensors (2018), IEEE Transactions on Circuits and Systems II: Express Brief (2018, 2019), ETRI Journal (2019), IEEE Access (2019) and Neural Computing and Applications (2019). In the past, he also served as the technical committee in several international conferences (ACes 2019, ISPEC 2019, ICGHIT 2019, ICISSP 2018 and IoP 2018). Currently, he serve as the Deputy Dean (Research and Development) in Faculty of Information and Communication Technology, Universiti Tunku Abdul Rahman. 5
2019 Blockchain and Internet of Things Conference Keynote Speaker IV Prof. Chin-Chen Chang Feng Chia University, Taiwan Prof. C.C. Chang obtained his Ph.D. degree in computer engineering from National Chiao Tung University. He's first degree is Bachelor of Science in Applied Mathematics and master degree is Master of Science in computer and decision sciences. Both were awarded in National Tsing Hua University. Dr. Chang served in National Chung Cheng University from 1989 to 2005. His current title is Chair Professor in Department of Information Engineering and Computer Science, Feng Chia University, from Feb. 2005. Prior to joining Feng Chia University, Professor Chang was an associate professor in Chiao Tung University, professor in National Chung Hsing University, chair professor in National Chung Cheng University. He had also been Visiting Researcher and Visiting Scientist to Tokyo University and Kyoto University, Japan. During his service in Chung Cheng, Professor Chang served as Chairman of the Institute of Computer Science and Information Engineering, Dean of College of Engineering, Provost and then Acting President of Chung Cheng University and Director of Advisory Office in Ministry of Education, Taiwan. Professor Chang's specialties include, but not limited to, data engineering, database systems, computer cryptography and information security. A researcher of acclaimed and distinguished services and contributions to his country and advancing human knowledge in the field of information science, Professor Chang has won many research awards and honorary positions by and in prestigious organizations both nationally and internationally. He is currently a Fellow of IEEE and a Fellow of IEE, UK. On numerous occasions, he was invited to serve as Visiting Professor, Chair Professor, Honorary Professor, Honorary Director, Honorary Chairman, Distinguished Alumnus, Distinguished Researcher, Research Fellow by universities and research institutes. He also published over 1,100 papers in Information Sciences. In the meantime, he participates actively in international academic organizations and performs advisory work to government agencies and academic organizations. 6
2019 Blockchain and Internet of Things Conference Conference Introductions Welcome to 2019 BIOTC Okinawa conference. This conference is organized by ACM Chapter Singapore. The objective of the conference is to provide a platform for researchers, engineers, academicians as well as industrial professionals from all over the world to present their research results and development activities in Blockchain and Internet of Things. Papers will be published in the following proceeding: International Conference Proceedings Series by ACM (ISBN: 978-1-4503-7177-3), which will be archived in the ACM Digital Library, and indexed by Ei Compendex, Scopus and submitted to be reviewed by Thomson Reuters Conference Proceedings Citation Index (CPCI). Conference website and email: http://www.biotc.net and biotc.contact@gmail.com 7
2019 Blockchain and Internet of Things Conference Conference Venue Okinawa Institute of Science and Technology Graduate University (OIST) Add: 1919-1 Tancha, Onna-son, Kunigami-gun, Okinawa, Japan 904-0495 IECC&BIOTC 2019 OIST hosts international workshops to enhance cooperation with Japanese and overseas research and academic institutions in order to pursue world-class research and education in science and technology in Okinawa. Another objective of OIST is to actively contribute to the sustainable development of the region. To facilitate these objectives, OIST offers state-of-the-art facilities for research, comfortable and convenient lodging for visiting professors and exchange students, and attractive and functional venues for international symposia, workshops, and industrial-related and community-related events. Guest wireless LAN is provided free of charge across the campus. 8
2019 Blockchain and Internet of Things Conference Registration Guide July 7, 2019 (Sunday) Time: 10:00-17:00 Venue: Okinawa Institute of Science and Technology Graduate University Registration Steps 1. Arrive at Okinawa Institute of Science and Technology Graduate University; 2. Inform the conference staff of your paper ID; 3. Sign your name on the Participants list; 4. Sign your name on Lunch & Dinner requirement list; 5. Check your conference kits: (1 conference program, 1 lunch coupon, 1 dinner coupon, 1 receipt, 1 name card, 1 flash disk (papers collection), 1 laptop bag); Finish registration. Tips: Please arrive at the conference to upload or copy Slides (PPT) into the laptop room 10 minutes before the session begins. Note: (1) The organizer doesn’t provide accommodation, and we suggest you make an early reservation. (2) One Best Presentation will be selected from each presentation session, and the Certificate for Best Presentation will be awarded at the end of each session on July 8, 2019. (3) One day tour includes lunch but does not include attractions tickets, and participants need to take care of themselves. 9
2019 Blockchain and Internet of Things Conference Presentation Instructions Instructions for Oral Presentations Devices Provided by the Conference Organizer: Laptop Computer (MS Windows Operating System with MS PowerPoint and Adobe Acrobat Reader) Digital Projectors and Screen Laser Sticks Materials Provided by the Presenters: PowerPoint or PDF Files (Files should be copied to the Conference laptop at the beginning of each Session.) Duration of each Presentation (Tentatively): Regular Oral Presentation: about 13 Minutes of Presentation and 2 Minutes of Question and Answer Instructions for Poster Presentation Materials Provided by the Conference Organizer: The place to put poster Materials Provided by the Presenters: Home-made Posters Maximum poster size is A1 Load Capacity: Holds up to 0.5 kg Best Presentation Award One Best Presentation will be selected from each presentation session, and the Certificate for Best Presentation will be awarded at the end of each session on July 8, 2019. Dress code Please wear formal clothes or national representative of clothing. 10
2019 Blockchain and Internet of Things Conference Schedule for Conference Okinawa Institute of Science and Technology Graduate University (OIST) Conference Center Lobby July 7 (10:00-17:00) Arrival and Registration Conference Center –Meeting Room 1, July 8 (9:00-12:30) Opening Remark (9:00-9:10) Prof. Chin-Chen Chang, Feng Chia University, Taiwan Keynote Speech I (9:10-9:55) Title: Individual Modeling Based on Personal Data Analysis and Smart Services Enabled by Cyber Technology Convergence Prof. Qun Jin, Dean of Graduate School of Human Sciences, Waseda University, Japan Keynote Speech II (9:55-10:40) Title: A Secure and Efficient Fast Initial Link Setup Scheme against Key Reinstallation Attacks Prof. Maode Ma, Nanyang Technological University, Singapore Coffee Break & Group Photo (10:40-11:00) Keynote Speech III (11:00-11:45) Title: Blockchain Technology: Overview, Applications to Medical Information System and Research Directions Prof. Wai-Kong Lee, Universiti Tunku Abdul Rahman, Malaysia Keynote Speech IV (11:45-12:30) Title: Current Research on Information Hiding Prof. Chin-Chen Chang, Feng Chia University, Taiwan Lunch (12:30-14:00) Conference Center –Meeting Room 3&4 July 8 (14:00-18:00) Session 1 (14:00-15:30) Session 2 (14:00-15:30) Communication System Blockchain Protocol Design and Optimization Chair: Prof. Qun Jin Chair: Prof. Weidong Shi Conference Center –Meeting Room 1 Conference Center –Meeting Room 2 Coffee Break (15:30-15:50) Session 3 (15:50-17:35) Session 4 (15:50-17:20) Network Security Blockchain Applications Chair: Prof. Maode Ma Chair: Prof. Wai-Kong Lee Conference Center –Meeting Room 1 Conference Center –Meeting Room 2 Dinner (18:00-19:00) Pending July 8 (10:40-15:50) Poster Session July 9 (9:00-17:00) One-Day Tour 11
2019 Blockchain and Internet of Things Conference Morning Session Morning, July 8, 2019 (Monday) Time: 9:00-12:30 Venue: Okinawa Institute of Science and Technology Graduate University Opening Remarks (9:00-9:10) Addressed by Prof. Chin-Chen Chang from Feng Chia University in Taiwan Keynote Speech I (9:10-9:55) Title: Individual Modeling Based on Personal Data Analysis and Smart Services Enabled by Cyber Technology Convergence Prof. Qun Jin Dean of Graduate School of Human Sciences, Waseda University, Japan Abstract— In recent years, convergence of emerging cyber technologies, such as big data, Internet of Things (IoT), and artificial intelligence (AI), which is highly expected to enable and drive innovative solutions and applications, has gained increasing worldwide attention. In this talk, after briefly introducing cyber technology convergence in national strategies, such as Industry 4.0 in German, and Society 5.0 in Japan, our vision and work on personal analytics and individual modeling based on big data will be addressed and explained. Furthermore, promising solution and application of IoT-empowered and AI-enhanced smart services in healthcare to improve quality of life (QoL) and promote well-being for all of the people will be described and discussed. 12
2019 Blockchain and Internet of Things Conference Keynote Speech II (9:55-10:40) Title: A Secure and Efficient Fast Initial Link Setup Scheme against Key Reinstallation Attacks Prof. Maode Ma Nanyang Technological University, Singapore Abstract—With the increasing demands for fast and secure wireless link connections to the access points (APs) supporting large quantities of devices in wireless local networks (WLANs), the Fast Initial Link Setup (FILS) is a recently standardized approach specified in IEEE 802.11ai. It is a new amendment to IEEE 802.11 standard family to support massively deployed wireless nodes. However, security concerns on the link connection have not been fully eliminated, especially for the authentication process. For example, a type of recently revealed malicious attack, Key Reinstallation Attack (KRA) might be a threat to the FILS authentication. To prevent the success of the KRAs, in this talk, we present a Secure and Efficient FILS (SEF) protocol as its optional substitute. The SEF is designed to eradicate potential threats from the KRAs without degrading the network performance. Coffee Break & Group Photo Taking 10:40-11:00 13
2019 Blockchain and Internet of Things Conference Keynote Speech III (11:00-11:45) Title: Blockchain Technology: Overview, Applications to Medical Information System and Research Directions Prof. Wai-Kong Lee Universiti Tunku Abdul Rahman, Malaysia Abstract—Blockchain is a paradigm shifting technology that potentially revolutionize many aspects in our daily life. Since its inceptions, Blockchain has been developing by leaps and bounds, evolving from the first generation Bitcoin (Blockchain 1.0) to smart contract (Blockchain 2.0), and now inter-connected Blockchain systems (Blockchain 3.0). In this talk, a short overview on the development of Blockchain is given, together with its application to medical information system. The talk rounds up by providing some potential research directions in Blockchain, including storage reduction, lightweight consensus and security under post-quantum era. 14
2019 Blockchain and Internet of Things Conference Keynote Speech IV (11:45-12:30) Title: Current Research on Information Hiding Prof. Chin-Chen Chang Feng Chia University, Taiwan Abstract— Steganography is the science of secret message delivery using cover media. A digital image is a flexible medium used to carry a secret message because the slight modification of a cover image is hard to distinguish by human eyes. In this talk, I will introduce some novel steganographic methods based on different magic matrices. Among them, one method that uses a turtle shell magic matrix to guide cover pixels’ modification in order to imply secret data is the newest and the most interesting one. Experimental results demonstrated that this method, in comparison with previous related works, outperforms in both visual quality of the stego image and embedding capacity. In addition, I will introduce some future research issues that derived from the steganographic method based on the magic matrix. Lunch 12:30-14:00 15
2019 Blockchain and Internet of Things Conference Oral Presentation Abstracts Session 1- Communication System Tips: The schedule for each presentation is for reference only. In order not to miss your presentation, we strongly suggest that you attend the whole session. Afternoon, July 8, 2019 (Monday) Time: 14:00-15:30 Venue: Okinawa Institute of Science and Technology Graduate University Conference Center –Meeting Room 1 Session Chair: Prof. Qun Jin IE0003 Presentation 1 (14:00-14:15) Self-Localization of Robot by the Integration of Laser Sensor and Omni-Vision System Shu-Yin Chiang, Che-Wei Chang and Kuan-Jheng Liao Ming Chuan University, Taiwan Abstract—In this study, we designed an autonomous mobile robot following the field and rules of the Federation of International Robot-soccer Association (FIRA) RoboSot category and proposed a self- localization algorithm for the robot based on the integration of laser sensor mouse and white line image patterns. The proposed algorithm used the laser sensor mouse to estimate the moving distance of the robot and then the image of white line patterns are integrated to reduce the accumulated errors by the inertial sensor of gyroscope and laser sensor mouse. The experiment results show that the localization error is only less than 10 cm for 5 to 10-minute operation. The localization scheme can be practically implemented in the robot soccer competitions. IE0004-A Presentation 2 (14:15-14:30) Design of the IoT Supported Solar Blocks Based on the Concept of Lego Style Yu-Tso Chen National United University, Taiwan Abstract—The growing global demand on renewable energy triggers various kinds of energy-related researches and innovates different power-related electronics. In the past decade, solar power devices have played a critical role in the field of renewable energy. However, the proposed technologies such as Building Integrated Photovoltaic, mobile solar power, Lego-style solar panel are still insufficient to integrating the functional requirements of portability, space flexibility, scale dynamics, compatibility with the Mains electricity, and availability with the existed buildings into a system. For solving this problem, this study leverages the strength of Internet of Things (IoT) and the concept of Lego-style to design a novel solar power electronics, called Solar Blocks. The implemented Solar Blocks can be portably deploymented in any place due to its advantage of small-size and light-weight. In addition, the Solar Blocks based system demonstrates the distinct feature of dynamic scale combitions on demand; it is also a relay-embedded solar battery enabling the cooperation with the Mains electricity to advance the optimization of power consumption. 16
2019 Blockchain and Internet of Things Conference Besides, since the support of IoT, the presented Solar Bolcks system with built-in sensors and machine- learning models can provide real-time situational awareness to make energy-saving applications smarter and enhance the overall power management. IE0012 Presentation 3 (14:30-14:45) Learning One-class Support Vector Machine by Using Artificial Bee Colony Algorithm and Its Application for Disease Classification Ming-Huwi Horng, Yung-Nien Sun, Yu-Lun Hong and Zhe-Yuan Zhan Natioal Pingtung University, Taiwan Abstract—The one-classification support vector (OCSVM) is a variant of SVM which only uses the positive class sample set in training stage. It has been widely used in the applications of disease diagnose, handwritten signature verification, remote sensing and document classification. However, there are many parameters needed to regulate. The mistake of parameter setting makes OCSVM it to be not effectiveness. Therefore, in this paper we proposed a learning algorithm based on the artificial bee colony algorithm to select the parameters. The construction algorithm of OSCVM is called the artificial bee colony based OSCVM (ABC-OCSVM) algorithm. Experimental results of two medical datasets of UCI data repository showed that our proposed ABC-OCSVM method outperforms the conventional LIBSVM package. IE0017 Presentation 4 (14:45-15:00) A 3D-Touch Interface by Using EMG Jinhyuck Park, Younghoon Seo, Dongryeol Shin and Choonsung Nam Sungkyunkwan University, South Korea Abstract—The 2D-Touch interaction for users to provide on-screen position values as user input provides various input methods such as Touch, Long Touch, Drag and so on. However, it does not provide a way for the user to provide input through control of the force. To achieve this, 3D-Touch interface came out. This is a new way of interacting that can be used by adding force values as input in 2D-Touch. 3D-Touch adds depth of force to add the strength z of force to the coordinates of the existing position input x, y. Therefore, it is possible to diversify the input by force input in an environment where 2D-Touch is not possible, such as constrained space. However, 3D-Touch has the disadvantage that it can be measured only by a screen device capable of measuring force. For this reason, the 3D-Touch interface is not popularly used and is used only in limited products. Another way to measure force is through electromyogram, EMG. EMG (surface electromyography signal) is a biological signal used to sense the degree of activation and mobilization patterns of the nerve roots that are regulated by the nervous system during muscle. The EMG signal can cause a change in the signal to distinguish the 3D-Touch from the 2D-Touch by the applied force. Therefore, if users uses a device that can measure EMG signals, they can use 3D-Touch interaction on devices that do not provide a 3D-Touch screen. In this paper, we test whether the three input methods of Touch, Peek, and Pop can be classified into EMG signals. CNN (Convolutional Neural Networks) is used to distinguish the EMG signals of each input. 17
2019 Blockchain and Internet of Things Conference IE0024 Presentation 5 (15:00-15:15) The Voltage-Mode TITO Biquadratic Filter Based on CCDCVC and URC Sorapong Wachirarattanapornkul King Mongkut's Institute of Technology Ladkrabang, Thailand Abstract—This paper presents the biquadratic filter with three input and two output (TITO) based on current-controlled differential current voltage conveyor (CCDCVC) and uniformly distributed RC (URC) in the voltage-mode. The proposed circuit requires only two CCDCVC, one URC and one double capacitive layers uniformly distributed RC (DURC). This circuit has functional filter to four types at first output and three types filter at second output, and the characteristic in sensitivities have low. We using the PSPICE simulation program to confirm the theoretical in this work. IE0002 Presentation 6 (15:15-15:30) Tom-Talker: Pet robot social incentive system for urban Chenwei Lou, Jian Zhao, Huapeng Wei, Xiangbin Liu, Xingqian Li and Hongwei Zhao Jilin University, China Abstract—With the fast development of network information technology, more and more people are immersed in the virtual community environment brought by the network, ignoring the social interaction in real life. The consequent urban autism problem has become more and more serious. This article focuses on "promoting offline communication between people " to solve this problem, and has developed a design called "Tom". "Tom" is a smart pet robot with a pet robot-based social mechanism called "Tom-Talker". The main contribution of this paper is to propose a social mechanism called "Tom-Talker" that encourages users to socialize offline. And "Tom-Talker" also has a corresponding reward mechanism and a friend recommendation algorithm. This paper designs experiments and analyzes the results. The results show that our pet robots have a good effect on solving urban autism problems. 18
2019 Blockchain and Internet of Things Conference Oral Presentation Abstracts Session 2- Blockchain Protocol Design and Optimization Tips: The schedule for each presentation is for reference only. In order not to miss your presentation, we strongly suggest that you attend the whole session. Afternoon, July 8, 2019 (Monday) Time: 14:00-15:30 Venue: Okinawa Institute of Science and Technology Graduate University Conference Center –Meeting Room 2 Session Chair: Prof. Weidong Shi BI0007 Presentation 7 (14:00-14:15) Smart Insurance Contracts Based on Virtual Currency: Legal Sources and Chosen Issues Remy Remigius Zgraggen FMA, Liechtenstein Abstract—In this paper it has been analyzed whether and under what conditions an insurance company can accept insurance premiums and claims payments in bitcoins or other crypto currency based on a smart insurance contract. On the one hand the question has been explored with regard to private law, especially insurance contract law; on the other with regard to public law, in particular financial supervisory law. The research for the present paper has been conducted primarily by taking into consideration the relevant legal frameworks in the European Union, Switzerland, UK and Liechtenstein, while referring at the same time to general legal principles of public and private law, which have their validity in most other jurisdictions of common or civil law, such as for example in the US, Hong Kong or Japan. In legal research the classification of smart contracts as well as legal issues concerning crypto assets in general are to a large extent still unexplored today. Therefore the author of the present paper shall point out some key questions and main challenges within these fields of research without being able to claim providing readymade solutions. BI0009 Presentation 8 (14:15-14:30) Auction Based Rewards Distribution Method in Pool Mining Keyang Liu and Yukio Ohsawa The University of Tokyo, Japan Abstract—Proof of Work (PoW) plays an essential role in Cryptocurrency fields. In PoW, some limited resources, like computation power, are spent to create consensus. As a result, the total amount of these resources determine the security of the system. Blockchain systems that adopt PoW usually distribute rewards among participants according to the blocks they found as a motivation. In the real world, miners usually join pools to share the variance of these kind of rewards they can get. In this work, we will compare different reward distribution mechanisms in a long-term condition. The result shows that all existed mechanisms cannot motivate miners continuously to mine in a pool. For solving this problem, we propose an auction-based method to improve the motivation of miners and the condition of the pool. 19
2019 Blockchain and Internet of Things Conference BI0011 Presentation 9 (14:30-14:45) Blockchain Technology as a Support Infrastructure in E-Government Evolution at Dubai Economic Department Shafaq Naheed Khan1, Mohammed Shael2 and Munir Majdalawieh1 1: Zayed University, United Arab Emirates; 2: Dubai Economic Department , United Arab Emirates Abstract—World is experiencing revolution with the proliferation of technologies like blockchain, artificial intelligence, IOT, and cloud computing in our lives. This study explores Dubai Economic Department’s (DED) electronic government (e-government) stages of integrating emerging technologies as its contribution in creating a smarter city. Our findings suggest that blockchain technology can be used as a platform to transform the e-business operating models in order to offer fully integrated services and to enforce common business rules. It can help governments in making processes simpler and faster and for syncing of data across different departments, automatically & instantaneously. This work provides policy makers, enterprise architects and IT managers with useful guidelines to define and drive their e-government strategy and planning actions towards the most appropriate domains of implementation. BI0027-A Presentation 10 (14:45-15:00) Blockchain for Option Pricing in Incomplete Cross-Currency Market Yu-Min Lian Fu Jen Catholic University, Taiwan Abstract—In this study, we evaluate the quanto option prices under stochastic interest rates when the dynamics of the foreign equity price and the foreign exchange rate are driven by a Markovian regime- switching cross-currency market model with both individual jumps and concurrent jumps. Due to the security market described by the dynamic model is incomplete, we employ the random Esscher transform to determine the pricing kernel for option valuation. After obtaining the pricing formula, blockchain can be applied for the improvement of efficiency in derivative-currency market. The main developments in blockchain use cases in finance are: Clearing and Settlement, Digital Identity, Payments, Smart Assets and Smart Contracts. There are others but, for now, focus investment thinking on these as financial blockchains are going to give investors the short-term gains and long-term benefits. In the view of academic contribution, this study focuses on the construction of the financial innovation on quanto options. Furthermore, it practically provides arbitrage-free pricing calculating to derivative-currency markets and is useful for the application of blockchain in finance. BI0028 Presentation 11 (15:00-15:15) HelixMesh: a Consensus Protocol for IoT Dmitrii Zhelezov and Oliver Fohrmann Helix Research Team, Germany Abstract—We provide a technical exposition of the HelixMesh proto-col and the underlying DAG-based transaction ledger. The HelixMesh is optimized for high-throughput IoT networks on the premise that most transactions carry only a data payload rather than a value transfer. The consensus al- gorithm is a novel implementation of the hybrid on-/off- chain MeshCash framework based on probabilistic peer sam- pling for the off-chain layer. We further introduce a flexible “Proof-Of-Contribution” adversarial model which supports both closed permissioned (with standard BFT assumptions) and persmissionless (e.g. based on Proof-Of-Work) networks. 20
2019 Blockchain and Internet of Things Conference BI0034 Presentation 12 (15:15-15:30) Private and Secure Mixing in Credit Networks Roopa Vishwanathan, Lalitha Muthu Subramanian and Guruprasad Eswaraiah New Mexico State University, United States Abstract—In this paper, we propose a system for mixing transactions in payment networks such as credit networks. Credit networks like Ripple and Stellar are increasingly popular, and can facilitate crosscurrency transactions in a fraction of the time it would take for banks or other financial institutions to process the same transaction, and at a fraction of the cost. Unlike for cryptocurrencies, there has been little work in the area of designing secure and private mixers for credit networks. Mixers for cryptocurrencies such as Bitcoin cannot be directly applied to the credit network domain because credit networks have an inherently different structure and purpose than cryptocurrencies. We design a system that uses cryptographic constructs such as ring signatures, commitments, and zero knowledge proofs to provide security/integrity of all transactions, ensures privacy of the users involved in a transaction, as well as privacy of the amount transacted. We also provide preliminary experimental results. Coffee Break 15:30-15:50 21
2019 Blockchain and Internet of Things Conference Oral Presentation Abstracts Session 3- Network Security Tips: The schedule for each presentation is for reference only. In order not to miss your presentation, we strongly suggest that you attend the whole session. Afternoon, July 8, 2019 (Monday) Time: 15:50-17:35 Venue: Okinawa Institute of Science and Technology Graduate University Conference Center –Meeting Room 1 Session Chair: Prof. Maode Ma IE0006 Presentation 13 (15:50-16:05) Association Extraction from Functional Testing Scenarios Pakorn Leesutthipornchai and Denduang Pradubsuwun Thammasat University, Thailand Abstract—In this paper, we propose an approach to extract association among software pages from functional test case scenarios. This knowledge helps us to re-design user interfaces of a software application for the purpose of usability. Initially, functional test case scenarios are applied to the association extraction approach. The association sets are then obtained and post-processed. The association is considered in two aspects including 1) all frequent pages association and 2) consecutive pages association. Both associations are used to simplify user interfaces of the software application. We demonstrate our proposed method with the Mobile Application Development Quiz in [7] as a case study. IE0005 Presentation 14 (16:05-16:20) A Simple Patch Antenna with Wideband Circularly Polarised for GNSS Application Phanuphong Boontamchauy, Nathapat Supreeyatitikul and Anupan Phungasem Civil Aviation Training Center, Thailand Abstract—A low profile patch antenna for GNSS application is presented, which is designed by a legacy L feed underneath the slot to provide a circular polarization. The simulation reveals a wide impedance bandwidth of 46.15% from 1.05 to 1.68 GHz (RLBW≤-10 dB), a wide axial ratio bandwidth of 40.84% from 1.13 to 1.71 GHz (ARBW≤3 dB) and gain is in between 1.62 and 3.14 dBi. Although the proposed antenna are inexpensive, compact size, weightless and easy to fabricate, but the measured results can reach to the GNSS requirements for an entire band (1.146-1.616 GHz). IE0014 Presentation 15 (16:20-16:35) Privacy Preservation in a Global Mobility Communication Network Hsiao-Ling Wu, Chin-Chen Chang and Long-Sheng Chen Chaoyang University of Technology, Taiwan 22
2019 Blockchain and Internet of Things Conference Abstract—A global mobility communication network (GLOMONT) allows mobile users to obtain roaming service, in which the service is provided by a foreign agent when users are in foreign territory. Therefore, the mutual authentication and key agreement are integral to the GLOMONT. In addition, the conditional privacy preservation, which enhances anonymity and fairness, is another important issue. In other words, mobile users can receive service without leaking an identity to anyone except the home agent, and the home agent should receive the payment from mobile users. Thus, in this paper, we propose a conditional privacy preservation authentication scheme in GLOMONT. The secure analyses show that our proposed scheme can achieve the security requirements and against many well-known attacks. IE0015 Presentation 16 (16:35-16:50) PhishLedger: A Decentralized Phishing Data Sharing Mechanism Dongjie Liu, Wei Wang, Yang Wang and Yaling Tan University of Chinese Academy of Sciences, China Abstract—In recent years, phishing has become one of the biggest security threats on the Internet. To combat phishing, it requires multiple steps and multi-agency participation and thus desperately need uniform data sharing format and unobstructed sharing channels, which unfortunately is just what is lacking currently. This paper proposes a novel phishing data sharing mechanism based on the consortium blockchain. It designs four types of nodes, including reporting node, accounting node, servicing node and supervising node and illustrates the roles of each type. Then it demonstrates the process of reporting, accounting and servicing and designs the process of post-supervision, which ensures the operation of the mechanism stable and fastest; and then discusses its implementation on Hyperledger Fabric. The proposed mechanism includes multi-source reporting, anti-tamper accounting, multi-channel disposal of phishing data and post-supervision. It provides a platform for multi-party participation, transparent and efficient coordination and unified standard and overcomes the current prominent problems of phishing data sharing; and the participants on the consortium blockchain all have a strong desire to combat phishing, which ensures the proposed mechanism is also very practical and highly feasible. IE0019 Presentation 17 (16:50-17:05) Comparison of Energy-Efficient Key Management Protocols for Wireless Sensor Networks Laurin Dörr1, Michael Heigl1, Dalibor Fiala2 and Martin Schramm1 1. Deggendorf Institute of Technology, Germany; 2. University of West Bohemia, Czechia Abstract—A Wireless Sensor Network (WSN) contains small sensor nodes which monitor physical or environmental conditions. WSN is an important technology for digitalization of industrial periphery and is often used in environments which are not hardened against security impacts. These networks are easy to attack due to the open communication medium and low computing resources of the applied devices. Establishing security mechanisms is difficult while taking into account low energy consumption. Low cost sensors with limited resources make the implementation of cryptographic algorithms even more challenging. For WSNs cryptographic functions are needed without high impact on energy consumption and latency. Therefore, security in WSNs is a challenging field of research. This paper compares lightweight energy- efficient key exchange protocols which are suitable for WSN. The protocols were also implemented in WSN- capable Texas Instrument boards and the energy consumption was measured during the key exchange. This paper shows that schemes have to be chosen depending on the specific network requirements and that the 23
2019 Blockchain and Internet of Things Conference usage of asymmetric cryptography does not always result in a high energy consumption. IE0007 Presentation 18 (17:05-17:20) Residual Learning Based Convolutional Neural Network for Super Resolution Hwei Jen Lin1, Yoshimasa Tokuyama2 and Zi-Jun Lin1 1. Tamkang University, Taiwan; 2. Tokyo Polytechnic University, Japan Abstract— Recently, there have been many methods of super resolution proposed in the literature, in which convolutional neural networks have been confirmed to achieve good results. C. Dong et al. proposed a convolutional neural network structure (SRCNN) to effectively solve the super resolution problem. J. Kim et al. proposed a much deeper convolutional neural network (VDSR) to improve C. Dong et al.’s method. However, unlike VDSR proposed by J. Kim et al. which trained residue images, SRCNN proposed by C. Dong et al. directly trained high-resolution images. Consequently, we surmise the improvement of VDSR is due to not only to the depth of the neural network structure but also the training of residue images. This paper studies and compares the performance of training high-resolution images and training residue images associated with the two neural network structures, SRCNN and VDSR. Some deep CNNs proceed zero padding which pads the input to each convolutional layer with zeros around the border so the feature maps remain the same size. SRCNN proposed by C. Dong et al. does not carry out padding, so the size of the resulting high-resolution images is smaller than expected. The study also proposes two revised versions of SRCNN that remain the size the same as the input image. BI0002 Presentation 19 (17:20-17:35) Algebraic Approach to Verification and Testing of Distributed Applications Vladimir Peschanenko1, Oleksandr Letychevskyi2, Viktor Radchenko3, Maxim Orlovsky4 and Andrey Sobol4 1: Kherson State University, Ukraine; 2: Institute of Cybernetics, Ukraine; 3: Garuda AI B.V., Netherlands; 4: Pandora Core AG, Switzerland Abstract—Challenges in developing distributed applications have given rise to various different design techniques and technologies. This paper presents an algebraic approach using formal verification and model-based testing that can be applied to different development stages. The insertion modeling system software developed by the authors of this paper is used to implement this approach and to apply it to the model-driven development of distributed systems based on blockchain consensus protocols. 24
2019 Blockchain and Internet of Things Conference Oral Presentation Abstracts Session 4- Blockchain Applications Tips: The schedule for each presentation is for reference only. In order not to miss your presentation, we strongly suggest that you attend the whole session. Afternoon, July 8, 2019 (Monday) Time: 15:50-17:20 Venue: Okinawa Institute of Science and Technology Graduate University Conference Center –Meeting Room 2 Session Chair: Prof. Wai-Kong Lee BI0004 Presentation 20 (15:50-16:05) Delegated Proof of Reputation: a Novel Blockchain Consensus Thuat Do1, Thao Nguyen2 and Hung Pham2 1: Hong Kong University of Science and Technology, Viet Nam; 2: Umbala INC, Viet Nam Abstract—Consensus mechanism is the heart of any blockchain network. Many projects have proposed alternative protocols to improve restricted scalability of Proof of Work originated since Bitcoin. As an improvement of Delegated Proof of Stake, in this paper, we introduce a novel consensus, namely, Delegated Proof of Reputation, which is scalable, secure with an acceptable decentralization. Our innovative idea is replacing pure coin-staking by a reputation ranking system essentially based on ranking theories (PageRank, NCDawareRank and HodgeRank). BI0010 Presentation 21 (16:05-16:20) Solar Energy Distribution Using Blockchain and IoT Integration Rishabh Jain and Aniket Dogra Amity University, India Abstract—This research focuses on the distribution of solar energy between networks using IoT (Internet of Things) enabled devices and Blockchain technology. The Solar panels will charge the physical battery which is connected to the microcontroller. The microcontroller will update the data to the cloud database and then that database is accessed by the application logic. The application logic checks for the required conditions and if it approves the transaction takes place and the blockchain is updated - a block is created and added to the blockchain. On the physical side, the IoT device will receive a command to allow transfer of energy to and from the particular node. IoT will provide a medium for software part to interact with the physical part which is energy and transmission grid. IoT connects the physical battery containing energy to the cloud database which is then used to interact with the software. IoT also enables the transfer of energy through the physical medium on the command given by the user through the user application. To make the system decentralized, blockchain is used, which will help to connect all the users in the network where they can transact without the need of knowing each other or having the obligation of any intermediary. Decentralisation helps in achieving a system which doesn’t require any middleman and works on the cumulative trust of the nodes - often referred to as the Consensus-Based Algorithm. There are a number of 25
2019 Blockchain and Internet of Things Conference such algorithms but Proof of Work (PoW) and Proof of Stake (PoS) are widely used for blockchains. We will be using the PoW algorithm. Blockchain also offers security, transparency, immutability and customer centricity to develop the most advanced and automated platform. The application logic on the server side will be responsible to apply certain conditions to enable a valid transaction (similar to smart contracts on Ethereum). BI0013-A Presentation 22 (16:20-16:35) Building a Collaborative Framework of Blockchain for the Elderly People Hsien-Ming Chou Chung Yuan Christian University, Taiwan Abstract—With the trend of aging and working families, homecare services for elderly people are becoming more and more important issues. In Taiwan, caregivers, who are dispatched from human resources agencies of long-term care, are main supervisors in charge of elderly people. However, most of agencies only consider the availability of their own caregivers and ignore other caregivers of other agencies. The data of the availability of all caregivers is not connected and used in real-time based on existing frameworks. In addition, they also do not consider the suitability of the people so that the mismatched collaboration could happen all the time. Both of issues could lead long-term care system to failure and inefficiency. This research proposes a new collaborative framework of healthy Blockchain technology to solve the issues of the availability and suitability of human resources agencies, which are under the third-party authorization. The proposed framework also can save the cost of transmission and integration through quick and direct data exchanges between caregivers and the elderly people. Through the Blockchain, the collaborative framework could ensure the non-destructibility of data, which can make the electronic long-term care record of the elderly people more secure. BI0026-A Presentation 23 (16:35-16:50) Civil Liability in the Era of New Technology: the Influence of Blockchain Luigi Buonanno Bocconi University, Italy Abstract—The presentation aims to evaluate the impact of Blockchain on private law’s civil liability sector, attempting to describe its future path and envisage future regulation. The need to identify the person responsible for either malfunction in the chains or illegal activities perpetrated against them, thereby causing economic damage to end users, clashes with the highly decentralized nature of this technology. On the basis of an activity risk analysis carried out on Blockchain platforms, the paper argues that the strict liability of the relevant operators will increasingly become the reference paradigm for civil liability, definitively supplanting the fault-based rule. Meanwhile, the need to consider the introduction of a mandatory insurance scheme for Blockchain platform operators is emphasized, with a view to not only protecting the assets of operators but also ensuring full compensation for end users in the event a malfunction or attack results in the loss of assets held on the decentralized network. The renewal described will perhaps involve a new basic philosophy that will oblige civil law and common law legal orders to face the challenge of a regulation that will be increasingly intertwined with economic evaluations. 26
2019 Blockchain and Internet of Things Conference BI0035-A Presentation 24 (16:50-17:05) Enabling Blockchain Based Payment for IoT Devices Lei Xu1, Lin Chen2, Zhimin Gao3, Shouhuai Xu4 and Weidong Shi5 1: University of Texas Rio Grande Valley, United States; 2: Texas Tech University, United States; 3: Auburn University at Montgomery, United States; 4: University of Texas at San Antonio, United States; 5: University of Houston, United States Abstract—Payment is one of the most significant applications of blockchain technology, e.g., cryptocurrency systems like Bitcoin using public blockchain and payment systems built by banks using permissioned blockchain. For both cases, a user of the payment system needs to able to verify transactions. A simple method is that each user keeps a local copy of the whole blockchain. Since the size of the blockchain keeps growing, this method becomes less practical, especially for lightweight IoT devices such as coffee machine and vendor machine. In order to deal with this problem, several methods have been proposed. However, existing approaches either achieve a limited storage reduction (e.g., simple payment verification (SPV) protocol), or rely on some strong security assumptions (e.g., the use of trusted server). In this paper, we propose a novel and efficient payment verification scheme for blockchain based payment systems, which leverages cryptographic accumulator to compress the whole ledger. This solution is particularly suitable for IoT, who only need to store a small amount of data that is independent of the size of the blockchain. BI0001 Presentation 25 (17:05-17:20) IoT-based “All-Round 3D Technology Security Circle” in New Taipei City Police Department Chun-Young Chang1, Lin-Chien Chien2, En-Chun Kuo3 and Yuh-Shyan Hwang 1: National Taipei University of Technology, Taiwan; 2: Central Police University, Taiwan; 3: New Taipei City Police Department, Taiwan Abstract—New Taipei City is a metropolitan area in Taiwan, with a prosperous economy and a large population. Many parades and public assemblies are held within the jurisdiction and they might have unintended consequences such as traffic, overcrowding, or even serious risks and mishaps. Many cities around the world face similar problems and threats, such as domestic violence in Turkey and the Boston Marathon bombing. Combating new types of public safety threats has become a primary task. Setting up a complete surveillance system at an event site would give a command center access to the site and allow them to respond to an incident in real time. The system’s digital records would help track a crime scene, as well as providing insight into how criminals commit crimes. The New Taipei City Police Department has established an “All-Round 3D Technology Security Circle” equipped with various cameras that transmit images back to a command center based on an Internet of Things connection. Innovative technology combined with smart equipment gives three-dimensional coverage of an area to ensure public safety Dinner 18:00-19:00 27
You can also read