2019 Blockchain and Internet of Things Conference BIOTC 2019 - July 7-9, 2019 Okinawa, Japan

Page created by Elizabeth Meyer
 
CONTINUE READING
2019 Blockchain and Internet of Things Conference BIOTC 2019 - July 7-9, 2019 Okinawa, Japan
2019 Blockchain and Internet of Things Conference

2019 Blockchain and Internet of Things
     Conference(BIOTC 2019)

                     July 7-9, 2019

                     Okinawa, Japan

                        Supported by

                         Indexed by

                     http://www.biotc.net/

                                1
2019 Blockchain and Internet of Things Conference BIOTC 2019 - July 7-9, 2019 Okinawa, Japan
2019 Blockchain and Internet of Things Conference

                 Welcome Message from Organizing Committee
It is our great pleasure to invite you to join our international conferences - 2019 Blockchain and Internet of
Things Conference (BIOTC 2019). This event will provide a unique opportunity for editors and authors to get
together and share their latest research findings and results. We look forward to welcoming you at Okinawa,
Japan.
We’re confident that over the two days you’ll get the theoretical grounding, practical knowledge, and
personal contacts that will help you build long-term, profitable and sustainable communication among
researchers and practitioners working in a wide variety of scientific areas with a common interest in
Blockchain and Internet of Things.
On behalf of all the conference committees, we would like to thank all the authors as well as the technical
program committee members and reviewers. Their high competence, their enthusiasm, their time and
expertise knowledge, enabled us to prepare the high-quality final program and helped to make the
conference become a successful event.
We truly hope you’ll enjoy the conference and get what you expect from the conference.

                                                                                      Organizing Committee
                                                                                                   2019.7.7

                                                      2
2019 Blockchain and Internet of Things Conference BIOTC 2019 - July 7-9, 2019 Okinawa, Japan
2019 Blockchain and Internet of Things Conference

                                                            Table of Contents
Keynote Speakers Introductions ...................................................................................................................... 3
Conference Introductions ................................................................................................................................ 7
Conference Venue ........................................................................................................................................... 8
Registration Guide ........................................................................................................................................... 9
Presentation Instructions .............................................................................................................................. 10
Schedule for Conference ............................................................................................................................... 11
Morning Session ............................................................................................................................................ 12
              Opening Remarks (9:00-9:10) ....................................................................................................... 12

              Keynote Speech I (9:10-9:55) ........................................................................................................ 12

              Keynote Speech II (9:55-10:40) ..................................................................................................... 13
       Coffee Break & Group Photo Taking 10:40-11:00.................................................................................. 13
              Keynote Speech III (11:00-11:45).................................................................................................. 14

              Keynote Speech IV (11:45-12:30) ................................................................................................. 15
     Lunch 12:30-14:00 ................................................................................................................................. 15
Oral Presentation Abstracts........................................................................................................................... 16
     Session 1- Communication System ........................................................................................................ 16
              IE0003 Presentation 1 (14:00-14:15)............................................................................................. 16

              IE0004-A Presentation 2 (14:15-14:30) ......................................................................................... 16

              IE0012 Presentation 3 (14:30-14:45)............................................................................................. 17

              IE0017 Presentation 4 (14:45-15:00)............................................................................................. 17

              IE0024 Presentation 5 (15:00-15:15)............................................................................................. 18

              IE0002 Presentation 6 (15:15-15:30)............................................................................................. 18
       Session 2- Blockchain Protocol Design and Optimization ..................................................................... 19
              BI0007 Presentation 7 (14:00-14:15) ............................................................................................ 19

              BI0009 Presentation 8 (14:15-14:30) ............................................................................................ 19

              BI0011 Presentation 9 (14:30-14:45) ............................................................................................ 20

              BI0027-A Presentation 10 (14:45-15:00)....................................................................................... 20

              BI0028 Presentation 11 (15:00-15:15) .......................................................................................... 20

              BI0034 Presentation 12 (15:15-15:30) .......................................................................................... 21
       Coffee Break 15:30-15:50 ...................................................................................................................... 21
       Session 3- Network Security .................................................................................................................. 22
              IE0006 Presentation 13 (15:50-16:05)........................................................................................... 22

                                                                               1
2019 Blockchain and Internet of Things Conference BIOTC 2019 - July 7-9, 2019 Okinawa, Japan
2019 Blockchain and Internet of Things Conference

               IE0005 Presentation 14 (16:05-16:20)........................................................................................... 22

               IE0014 Presentation 15 (16:20-16:35)........................................................................................... 22

               IE0015 Presentation 16 (16:35-16:50)........................................................................................... 23

               IE0019 Presentation 17 (16:50-17:05)........................................................................................... 23

               IE0007 Presentation 18 (17:05-17:20)........................................................................................... 24

               BI0002 Presentation 19 (17:20-17:35) .......................................................................................... 24
       Session 4- Blockchain Applications ........................................................................................................ 25
               BI0004 Presentation 20 (15:50-16:05) .......................................................................................... 25

               BI0010 Presentation 21 (16:05-16:20) .......................................................................................... 25

               BI0013-A Presentation 22 (16:20-16:35)....................................................................................... 26

               BI0026-A Presentation 23 (16:35-16:50)....................................................................................... 26

               BI0035-A Presentation 24 (16:50-17:05)....................................................................................... 27

               BI0001 Presentation 25                 (17:05-17:20) ....................................................................................... 27
     Dinner 18:00-19:00 ............................................................................................................................... 27
Poster session ................................................................................................................................................ 28
               BI0017 Poster 1 ............................................................................................................................. 28

               BI0020 Poster 2 ............................................................................................................................. 28

               BI0021 Poster 3 ............................................................................................................................. 28

               BI0029 Poster 4 ............................................................................................................................. 29

               BI0033 Poster 5 ............................................................................................................................. 29
One Day Visit ................................................................................................................................................. 30

                                                                                2
2019 Blockchain and Internet of Things Conference BIOTC 2019 - July 7-9, 2019 Okinawa, Japan
2019 Blockchain and Internet of Things Conference

                Keynote Speakers Introductions
                                       Keynote Speaker I

                                              Prof. Qun Jin
                  Dean of Graduate School of Human Sciences, Waseda University, Japan

Qun Jin is a Professor at the Networked Information Systems Laboratory, Department of Human Informatics
and Cognitive Sciences, Faculty of Human Sciences, Waseda University, Japan. He is currently the Dean of
Graduate School of Human Sciences. He has been extensively engaged in research works in the fields of
computer science, information systems, and social and human informatics. His recent research interests
cover human-centric ubiquitous computing, behavior and cognitive informatics, big data, personal analytics
and individual modeling, intelligence computing, blockchain, cyber security, cyber-enabled applications in
healthcare, and computing for well-being. He is a senior member of Association of Computing Machinery
(ACM), Institute of Electrical and Electronics Engineers (IEEE), and Information Processing Society of Japan
(IPSJ).

                                                     3
2019 Blockchain and Internet of Things Conference BIOTC 2019 - July 7-9, 2019 Okinawa, Japan
2019 Blockchain and Internet of Things Conference

                                       Keynote Speaker II

                                              Prof. Maode Ma
                              School of Electrical and Electronic Engineering,
                               Nanyang Technological University, Singapore

Prof. Maode Ma received his Ph.D. degree in computer science from Hong Kong University of Science and
Technology in 1999. Now, Dr. Ma is an Associate Professor in the School of Electrical and Electronic
Engineering at Nanyang Technological University in Singapore. He has extensive research interests including
network security and wireless networking. Dr. Ma has over 400 international academic publications
including 200 journal papers and more than 200 conference papers. He has delivered over 60 keynote
speeches at various international conferences. He has served as conference chairs for over 100 international
conferences. He currently serves as the Editor-in-Chief of International Journal of Computer and
Communication Engineering and International Journal of Electronic Transport. He also serves as a Senior
Editor or an Associate Editor for other 5 international academic journals. Dr. Ma is a Fellow of IET, a Senior
Member of IEEE Communication Society and IEEE Education Society, and a Member of ACM. He is the
Secretary of the IEEE Singapore Section and the Chair of the ACM, Singapore Chapter. He has served as an
IEEE Communication Society Distinguished Lecturer from 2013-2016.

                                                      4
2019 Blockchain and Internet of Things Conference BIOTC 2019 - July 7-9, 2019 Okinawa, Japan
2019 Blockchain and Internet of Things Conference

                                     Keynote Speaker III

                                            Prof. Wai-Kong Lee
                                Universiti Tunku Abdul Rahman, Malaysia

Prof. Wai-Kong Lee received the B.Eng. degree in electronics and the M.Sc. degree from Multimedia
University in 2006 and 2009, respectively。 He obtained Ph.D. degree in engineering from Universiti Tunku
Abdul Rahman, Malaysia, in 2018. He was a Visiting Scholar with Carleton University, Canada, in 2017, Feng
Chia University, Taiwan, in 2016 and 2018, and OTH Regensburg, Germany, in 2015. His research interests
are in the areas of cryptography, Blockchain, GPU computing, Internet of Things, numerical algorithms and
energy harvesting. He also served as the reviewers for several reputable journals, including IEEE
Transactions on Dependable and Secure Computing (2017), IEEE Sensors (2018), IEEE Transactions on
Circuits and Systems II: Express Brief (2018, 2019), ETRI Journal (2019), IEEE Access (2019) and Neural
Computing and Applications (2019). In the past, he also served as the technical committee in several
international conferences (ACes 2019, ISPEC 2019, ICGHIT 2019, ICISSP 2018 and IoP 2018). Currently, he
serve as the Deputy Dean (Research and Development) in Faculty of Information and Communication
Technology, Universiti Tunku Abdul Rahman.

                                                    5
2019 Blockchain and Internet of Things Conference

                                      Keynote Speaker IV

                                         Prof. Chin-Chen Chang
                                       Feng Chia University, Taiwan

Prof. C.C. Chang obtained his Ph.D. degree in computer engineering from National Chiao Tung University.
He's first degree is Bachelor of Science in Applied Mathematics and master degree is Master of Science in
computer and decision sciences. Both were awarded in National Tsing Hua University. Dr. Chang served in
National Chung Cheng University from 1989 to 2005. His current title is Chair Professor in Department of
Information Engineering and Computer Science, Feng Chia University, from Feb. 2005.
Prior to joining Feng Chia University, Professor Chang was an associate professor in Chiao Tung University,
professor in National Chung Hsing University, chair professor in National Chung Cheng University. He had
also been Visiting Researcher and Visiting Scientist to Tokyo University and Kyoto University, Japan. During
his service in Chung Cheng, Professor Chang served as Chairman of the Institute of Computer Science and
Information Engineering, Dean of College of Engineering, Provost and then Acting President of Chung Cheng
University and Director of Advisory Office in Ministry of Education, Taiwan.
Professor Chang's specialties include, but not limited to, data engineering, database systems, computer
cryptography and information security. A researcher of acclaimed and distinguished services and
contributions to his country and advancing human knowledge in the field of information science, Professor
Chang has won many research awards and honorary positions by and in prestigious organizations both
nationally and internationally. He is currently a Fellow of IEEE and a Fellow of IEE, UK. On numerous
occasions, he was invited to serve as Visiting Professor, Chair Professor, Honorary Professor, Honorary
Director, Honorary Chairman, Distinguished Alumnus, Distinguished Researcher, Research Fellow by
universities and research institutes. He also published over 1,100 papers in Information Sciences. In the
meantime, he participates actively in international academic organizations and performs advisory work to
government agencies and academic organizations.

                                                     6
2019 Blockchain and Internet of Things Conference

                    Conference Introductions

Welcome to 2019 BIOTC Okinawa conference. This conference is organized by ACM Chapter
Singapore. The objective of the conference is to provide a platform for researchers,
engineers, academicians as well as industrial professionals from all over the world to present
their research results and development activities in Blockchain and Internet of Things.
Papers will be published in the following proceeding:

International Conference Proceedings Series by ACM (ISBN: 978-1-4503-7177-3), which will
be archived in the ACM Digital Library, and indexed by Ei Compendex, Scopus and submitted
to be reviewed by Thomson Reuters Conference Proceedings Citation Index (CPCI).

Conference website and email: http://www.biotc.net and biotc.contact@gmail.com

                                               7
2019 Blockchain and Internet of Things Conference

                                 Conference Venue
  Okinawa Institute of Science and Technology Graduate University
                                                  (OIST)
                 Add: 1919-1 Tancha, Onna-son, Kunigami-gun, Okinawa, Japan 904-0495

                                                           IECC&BIOTC 2019

OIST hosts international workshops to enhance cooperation with Japanese and overseas research and
academic institutions in order to pursue world-class research and education in science and technology in
Okinawa. Another objective of OIST is to actively contribute to the sustainable development of the region.
To facilitate these objectives, OIST offers state-of-the-art facilities for research, comfortable and convenient
lodging for visiting professors and exchange students, and attractive and functional venues for international
symposia, workshops, and industrial-related and community-related events. Guest wireless LAN is provided
free of charge across the campus.
                                                       8
2019 Blockchain and Internet of Things Conference

                                 Registration Guide
                                        July 7, 2019 (Sunday)

                                            Time: 10:00-17:00

   Venue: Okinawa Institute of Science and Technology Graduate University

Registration Steps

1. Arrive at Okinawa Institute of Science and Technology Graduate University;

2. Inform the conference staff of your paper ID;

3. Sign your name on the Participants list;

4. Sign your name on Lunch & Dinner requirement list;

5. Check your conference kits: (1 conference program, 1 lunch coupon, 1 dinner coupon, 1 receipt, 1 name

    card, 1 flash disk (papers collection), 1 laptop bag);

Finish registration.
Tips: Please arrive at the conference to upload or copy Slides (PPT) into the laptop room 10 minutes before
the session begins.
Note:
(1) The organizer doesn’t provide accommodation, and we suggest you make an early reservation.
(2) One Best Presentation will be selected from each presentation session, and the Certificate for Best
Presentation will be awarded at the end of each session on July 8, 2019.
(3) One day tour includes lunch but does not include attractions tickets, and participants need to take
care of themselves.

                                                       9
2019 Blockchain and Internet of Things Conference

                          Presentation Instructions
Instructions for Oral Presentations
Devices Provided by the Conference Organizer:
Laptop Computer (MS Windows Operating System with MS PowerPoint and Adobe Acrobat Reader)
Digital Projectors and Screen
Laser Sticks

Materials Provided by the Presenters:
PowerPoint or PDF Files (Files should be copied to the Conference laptop at the beginning of each Session.)

Duration of each Presentation (Tentatively):
Regular Oral Presentation: about 13 Minutes of Presentation and 2 Minutes of Question and Answer

Instructions for Poster Presentation
Materials Provided by the Conference Organizer:
The place to put poster

Materials Provided by the Presenters:
Home-made Posters
Maximum poster size is A1
Load Capacity: Holds up to 0.5 kg

Best Presentation Award
One Best Presentation will be selected from each presentation session, and the Certificate for Best
Presentation will be awarded at the end of each session on July 8, 2019.

Dress code
Please wear formal clothes or national representative of clothing.

                                                    10
2019 Blockchain and Internet of Things Conference

                          Schedule for Conference
    Okinawa Institute of Science and Technology Graduate University (OIST) Conference Center Lobby
                                             July 7 (10:00-17:00)
                                          Arrival and Registration

                         Conference Center –Meeting Room 1, July 8 (9:00-12:30)
                                      Opening Remark (9:00-9:10)
                             Prof. Chin-Chen Chang, Feng Chia University, Taiwan
                                       Keynote Speech I (9:10-9:55)
Title: Individual Modeling Based on Personal Data Analysis and Smart Services Enabled by Cyber Technology
                                                 Convergence
              Prof. Qun Jin, Dean of Graduate School of Human Sciences, Waseda University, Japan
                                       Keynote Speech II (9:55-10:40)
        Title: A Secure and Efficient Fast Initial Link Setup Scheme against Key Reinstallation Attacks
                        Prof. Maode Ma, Nanyang Technological University, Singapore
                             Coffee Break & Group Photo (10:40-11:00)
                                   Keynote Speech III (11:00-11:45)
Title: Blockchain Technology: Overview, Applications to Medical Information System and Research Directions
                        Prof. Wai-Kong Lee, Universiti Tunku Abdul Rahman, Malaysia
                                    Keynote Speech IV (11:45-12:30)
                                Title: Current Research on Information Hiding
                             Prof. Chin-Chen Chang, Feng Chia University, Taiwan
                      Lunch (12:30-14:00) Conference Center –Meeting Room 3&4

                                             July 8 (14:00-18:00)
          Session 1 (14:00-15:30)                                   Session 2 (14:00-15:30)
            Communication System                           Blockchain Protocol Design and Optimization
                Chair: Prof. Qun Jin                                    Chair: Prof. Weidong Shi
     Conference Center –Meeting Room 1                        Conference Center –Meeting Room 2

                                         Coffee Break (15:30-15:50)

          Session 3 (15:50-17:35)                                   Session 4 (15:50-17:20)
                Network Security                                      Blockchain Applications
               Chair: Prof. Maode Ma                                   Chair: Prof. Wai-Kong Lee
     Conference Center –Meeting Room 1                        Conference Center –Meeting Room 2
                                        Dinner (18:00-19:00) Pending

                                             July 8 (10:40-15:50)

                                               Poster Session

                                              July 9 (9:00-17:00)
                                               One-Day Tour

                                                      11
2019 Blockchain and Internet of Things Conference

                                   Morning Session
                                 Morning, July 8, 2019 (Monday)

                                            Time: 9:00-12:30

   Venue: Okinawa Institute of Science and Technology Graduate University
Opening Remarks (9:00-9:10)
Addressed by Prof. Chin-Chen Chang from Feng Chia University in Taiwan

Keynote Speech I (9:10-9:55)
Title: Individual Modeling Based on Personal Data Analysis and Smart Services Enabled
by Cyber Technology Convergence

Prof. Qun Jin

Dean of Graduate School of Human Sciences, Waseda University, Japan
Abstract— In recent years, convergence of emerging cyber technologies, such as big data, Internet of
Things (IoT), and artificial intelligence (AI), which is highly expected to enable and drive innovative solutions
and applications, has gained increasing worldwide attention. In this talk, after briefly introducing cyber
technology convergence in national strategies, such as Industry 4.0 in German, and Society 5.0 in Japan, our
vision and work on personal analytics and individual modeling based on big data will be addressed and
explained. Furthermore, promising solution and application of IoT-empowered and AI-enhanced smart
services in healthcare to improve quality of life (QoL) and promote well-being for all of the people will be
described and discussed.

                                                       12
2019 Blockchain and Internet of Things Conference

Keynote Speech II (9:55-10:40)
Title: A Secure and Efficient Fast Initial Link Setup Scheme against Key Reinstallation
Attacks

Prof. Maode Ma

Nanyang Technological University, Singapore

Abstract—With the increasing demands for fast and secure wireless link connections to the access points
(APs) supporting large quantities of devices in wireless local networks (WLANs), the Fast Initial Link Setup
(FILS) is a recently standardized approach specified in IEEE 802.11ai. It is a new amendment to IEEE 802.11
standard family to support massively deployed wireless nodes. However, security concerns on the link
connection have not been fully eliminated, especially for the authentication process. For example, a type of
recently revealed malicious attack, Key Reinstallation Attack (KRA) might be a threat to the FILS
authentication. To prevent the success of the KRAs, in this talk, we present a Secure and Efficient FILS (SEF)
protocol as its optional substitute. The SEF is designed to eradicate potential threats from the KRAs without
degrading the network performance.

            Coffee Break & Group Photo Taking 10:40-11:00

                                                     13
2019 Blockchain and Internet of Things Conference

Keynote Speech III (11:00-11:45)
Title: Blockchain Technology:        Overview, Applications to Medical Information System and
Research Directions

Prof. Wai-Kong Lee

Universiti Tunku Abdul Rahman, Malaysia

Abstract—Blockchain is a paradigm shifting technology that potentially revolutionize many aspects in our
daily life. Since its inceptions, Blockchain has been developing by leaps and bounds, evolving from the first
generation Bitcoin (Blockchain 1.0) to smart contract (Blockchain 2.0), and now inter-connected Blockchain
systems (Blockchain 3.0). In this talk, a short overview on the development of Blockchain is given, together
with its application to medical information system.
The talk rounds up by providing some potential research directions in Blockchain, including storage
reduction, lightweight consensus and security under post-quantum era.

                                                     14
2019 Blockchain and Internet of Things Conference

Keynote Speech IV (11:45-12:30)
Title: Current Research on Information Hiding

Prof. Chin-Chen Chang

Feng Chia University, Taiwan

Abstract— Steganography is the science of secret message delivery using cover media. A digital image is a
flexible medium used to carry a secret message because the slight modification of a cover image is hard to
distinguish by human eyes. In this talk, I will introduce some novel steganographic methods based on
different magic matrices. Among them, one method that uses a turtle shell magic matrix to guide cover
pixels’ modification in order to imply secret data is the newest and the most interesting one. Experimental
results demonstrated that this method, in comparison with previous related works, outperforms in both
visual quality of the stego image and embedding capacity. In addition, I will introduce some future research
issues that derived from the steganographic method based on the magic matrix.

                                     Lunch 12:30-14:00

                                                    15
2019 Blockchain and Internet of Things Conference

                     Oral Presentation Abstracts
                           Session 1- Communication System
Tips: The schedule for each presentation is for reference only. In order not to miss your presentation, we
strongly suggest that you attend the whole session.

                               Afternoon, July 8, 2019 (Monday)
                                          Time: 14:00-15:30
   Venue: Okinawa Institute of Science and Technology Graduate University
                            Conference Center –Meeting Room 1
                                   Session Chair: Prof. Qun Jin
IE0003 Presentation 1 (14:00-14:15)
Self-Localization of Robot by the Integration of Laser Sensor and Omni-Vision System
Shu-Yin Chiang, Che-Wei Chang and Kuan-Jheng Liao
Ming Chuan University, Taiwan

Abstract—In this study, we designed an autonomous mobile robot following the field and rules of the
Federation of International Robot-soccer Association (FIRA) RoboSot category and proposed a self-
localization algorithm for the robot based on the integration of laser sensor mouse and white line image
patterns. The proposed algorithm used the laser sensor mouse to estimate the moving distance of the robot
and then the image of white line patterns are integrated to reduce the accumulated errors by the inertial
sensor of gyroscope and laser sensor mouse. The experiment results show that the localization error is only
less than 10 cm for 5 to 10-minute operation. The localization scheme can be practically implemented in
the robot soccer competitions.

IE0004-A Presentation 2 (14:15-14:30)
Design of the IoT Supported Solar Blocks Based on the Concept of Lego Style
Yu-Tso Chen
National United University, Taiwan

Abstract—The growing global demand on renewable energy triggers various kinds of energy-related
researches and innovates different power-related electronics. In the past decade, solar power devices have
played a critical role in the field of renewable energy. However, the proposed technologies such as Building
Integrated Photovoltaic, mobile solar power, Lego-style solar panel are still insufficient to integrating the
functional requirements of portability, space flexibility, scale dynamics, compatibility with the Mains
electricity, and availability with the existed buildings into a system. For solving this problem, this study
leverages the strength of Internet of Things (IoT) and the concept of Lego-style to design a novel solar power
electronics, called Solar Blocks. The implemented Solar Blocks can be portably deploymented in any place
due to its advantage of small-size and light-weight. In addition, the Solar Blocks based system demonstrates
the distinct feature of dynamic scale combitions on demand; it is also a relay-embedded solar battery
enabling the cooperation with the Mains electricity to advance the optimization of power consumption.
                                                     16
2019 Blockchain and Internet of Things Conference

Besides, since the support of IoT, the presented Solar Bolcks system with built-in sensors and machine-
learning models can provide real-time situational awareness to make energy-saving applications smarter
and enhance the overall power management.

IE0012 Presentation 3 (14:30-14:45)
Learning One-class Support Vector Machine by Using Artificial Bee Colony Algorithm and Its Application for
Disease Classification
Ming-Huwi Horng, Yung-Nien Sun, Yu-Lun Hong and Zhe-Yuan Zhan
Natioal Pingtung University, Taiwan

Abstract—The one-classification support vector (OCSVM) is a variant of SVM which only uses the positive
class sample set in training stage. It has been widely used in the applications of disease diagnose,
handwritten signature verification, remote sensing and document classification. However, there are many
parameters needed to regulate. The mistake of parameter setting makes OCSVM it to be not effectiveness.
Therefore, in this paper we proposed a learning algorithm based on the artificial bee colony algorithm to
select the parameters. The construction algorithm of OSCVM is called the artificial bee colony based OSCVM
(ABC-OCSVM) algorithm. Experimental results of two medical datasets of UCI data repository showed that
our proposed ABC-OCSVM method outperforms the conventional LIBSVM package.

IE0017 Presentation 4 (14:45-15:00)
A 3D-Touch Interface by Using EMG
Jinhyuck Park, Younghoon Seo, Dongryeol Shin and Choonsung Nam
Sungkyunkwan University, South Korea

Abstract—The 2D-Touch interaction for users to provide on-screen position values as user input provides
various input methods such as Touch, Long Touch, Drag and so on. However, it does not provide a way for
the user to provide input through control of the force. To achieve this, 3D-Touch interface came out. This is
a new way of interacting that can be used by adding force values as input in 2D-Touch. 3D-Touch adds depth
of force to add the strength z of force to the coordinates of the existing position input x, y. Therefore, it is
possible to diversify the input by force input in an environment where 2D-Touch is not possible, such as
constrained space. However, 3D-Touch has the disadvantage that it can be measured only by a screen device
capable of measuring force. For this reason, the 3D-Touch interface is not popularly used and is used only
in limited products. Another way to measure force is through electromyogram, EMG. EMG (surface
electromyography signal) is a biological signal used to sense the degree of activation and mobilization
patterns of the nerve roots that are regulated by the nervous system during muscle. The EMG signal can
cause a change in the signal to distinguish the 3D-Touch from the 2D-Touch by the applied force. Therefore,
if users uses a device that can measure EMG signals, they can use 3D-Touch interaction on devices that do
not provide a 3D-Touch screen. In this paper, we test whether the three input methods of Touch, Peek, and
Pop can be classified into EMG signals. CNN (Convolutional Neural Networks) is used to distinguish the EMG
signals of each input.

                                                      17
2019 Blockchain and Internet of Things Conference

IE0024 Presentation 5 (15:00-15:15)
The Voltage-Mode TITO Biquadratic Filter Based on CCDCVC and URC
Sorapong Wachirarattanapornkul
King Mongkut's Institute of Technology Ladkrabang, Thailand

Abstract—This paper presents the biquadratic filter with three input and two output (TITO) based on
current-controlled differential current voltage conveyor (CCDCVC) and uniformly distributed RC (URC) in the
voltage-mode. The proposed circuit requires only two CCDCVC, one URC and one double capacitive layers
uniformly distributed RC (DURC). This circuit has functional filter to four types at first output and three types
filter at second output, and the characteristic in sensitivities have low. We using the PSPICE simulation
program to confirm the theoretical in this work.

IE0002 Presentation 6 (15:15-15:30)
Tom-Talker: Pet robot social incentive system for urban
Chenwei Lou, Jian Zhao, Huapeng Wei, Xiangbin Liu, Xingqian Li and Hongwei Zhao
Jilin University, China

Abstract—With the fast development of network information technology, more and more people are
immersed in the virtual community environment brought by the network, ignoring the social interaction in
real life. The consequent urban autism problem has become more and more serious. This article focuses
on "promoting offline communication between people " to solve this problem, and has developed a design
called "Tom". "Tom" is a smart pet robot with a pet robot-based social mechanism called "Tom-Talker". The
main contribution of this paper is to propose a social mechanism called "Tom-Talker" that encourages users
to socialize offline. And "Tom-Talker" also has a corresponding reward mechanism and a friend
recommendation algorithm. This paper designs experiments and analyzes the results. The results
show that our pet robots have a good effect on solving urban autism problems.

                                                       18
2019 Blockchain and Internet of Things Conference

                     Oral Presentation Abstracts
          Session 2- Blockchain Protocol Design and Optimization
Tips: The schedule for each presentation is for reference only. In order not to miss your presentation, we
strongly suggest that you attend the whole session.

                               Afternoon, July 8, 2019 (Monday)
                                         Time: 14:00-15:30
   Venue: Okinawa Institute of Science and Technology Graduate University
                            Conference Center –Meeting Room 2
                               Session Chair: Prof. Weidong Shi
BI0007 Presentation 7 (14:00-14:15)
Smart Insurance Contracts Based on Virtual Currency: Legal Sources and Chosen Issues
Remy Remigius Zgraggen
FMA, Liechtenstein
Abstract—In this paper it has been analyzed whether and under what conditions an insurance company can
accept insurance premiums and claims payments in bitcoins or other crypto currency based on a smart
insurance contract. On the one hand the question has been explored with regard to private law, especially
insurance contract law; on the other with regard to public law, in particular financial supervisory law. The
research for the present paper has been conducted primarily by taking into consideration the relevant legal
frameworks in the European Union, Switzerland, UK and Liechtenstein, while referring at the same time to
general legal principles of public and private law, which have their validity in most other jurisdictions of
common or civil law, such as for example in the US, Hong Kong or Japan.
In legal research the classification of smart contracts as well as legal issues concerning crypto assets in
general are to a large extent still unexplored today. Therefore the author of the present paper shall point
out some key questions and main challenges within these fields of research without being able to claim
providing readymade solutions.

BI0009 Presentation 8 (14:15-14:30)
Auction Based Rewards Distribution Method in Pool Mining
Keyang Liu and Yukio Ohsawa
The University of Tokyo, Japan
Abstract—Proof of Work (PoW) plays an essential role in Cryptocurrency fields. In PoW, some limited
resources, like computation power, are spent to create consensus. As a result, the total amount of these
resources determine the security of the system. Blockchain systems that adopt PoW usually distribute
rewards among participants according to the blocks they found as a motivation. In the real world, miners
usually join pools to share the variance of these kind of rewards they can get. In this work, we will compare
different reward distribution mechanisms in a long-term condition. The result shows that all existed
mechanisms cannot motivate miners continuously to mine in a pool. For solving this problem, we propose
an auction-based method to improve the motivation of miners and the condition of the pool.

                                                     19
2019 Blockchain and Internet of Things Conference

BI0011 Presentation 9 (14:30-14:45)
Blockchain Technology as a Support Infrastructure in E-Government Evolution at Dubai Economic
Department
Shafaq Naheed Khan1, Mohammed Shael2 and Munir Majdalawieh1
1: Zayed University, United Arab Emirates; 2: Dubai Economic Department , United Arab Emirates
Abstract—World is experiencing revolution with the proliferation of technologies like blockchain, artificial
intelligence, IOT, and cloud computing in our lives. This study explores Dubai Economic Department’s (DED)
electronic government (e-government) stages of integrating emerging technologies as its contribution in
creating a smarter city. Our findings suggest that blockchain technology can be used as a platform to
transform the e-business operating models in order to offer fully integrated services and to enforce common
business rules. It can help governments in making processes simpler and faster and for syncing of data across
different departments, automatically & instantaneously. This work provides policy makers, enterprise
architects and IT managers with useful guidelines to define and drive their e-government strategy and
planning actions towards the most appropriate domains of implementation.

BI0027-A Presentation 10 (14:45-15:00)
Blockchain for Option Pricing in Incomplete Cross-Currency Market
Yu-Min Lian
Fu Jen Catholic University, Taiwan
Abstract—In this study, we evaluate the quanto option prices under stochastic interest rates when the
dynamics of the foreign equity price and the foreign exchange rate are driven by a Markovian regime-
switching cross-currency market model with both individual jumps and concurrent jumps. Due to the
security market described by the dynamic model is incomplete, we employ the random Esscher transform
to determine the pricing kernel for option valuation. After obtaining the pricing formula, blockchain can be
applied for the improvement of efficiency in derivative-currency market. The main developments in
blockchain use cases in finance are: Clearing and Settlement, Digital Identity, Payments, Smart Assets and
Smart Contracts. There are others but, for now, focus investment thinking on these as financial blockchains
are going to give investors the short-term gains and long-term benefits. In the view of academic contribution,
this study focuses on the construction of the financial innovation on quanto options. Furthermore, it
practically provides arbitrage-free pricing calculating to derivative-currency markets and is useful for the
application of blockchain in finance.

BI0028 Presentation 11 (15:00-15:15)
HelixMesh: a Consensus Protocol for IoT
Dmitrii Zhelezov and Oliver Fohrmann
Helix Research Team, Germany
Abstract—We provide a technical exposition of the HelixMesh proto-col and the underlying DAG-based
transaction ledger. The HelixMesh is optimized for high-throughput IoT networks on the premise that most
transactions carry only a data payload rather than a value transfer. The consensus al- gorithm is a novel
implementation of the hybrid on-/off- chain MeshCash framework based on probabilistic peer sam- pling
for the off-chain layer. We further introduce a flexible “Proof-Of-Contribution” adversarial model which
supports both closed permissioned (with standard BFT assumptions) and persmissionless (e.g. based on
Proof-Of-Work) networks.

                                                     20
2019 Blockchain and Internet of Things Conference

BI0034 Presentation 12 (15:15-15:30)
Private and Secure Mixing in Credit Networks
Roopa Vishwanathan, Lalitha Muthu Subramanian and Guruprasad Eswaraiah
New Mexico State University, United States
Abstract—In this paper, we propose a system for mixing transactions in payment networks such as credit
networks. Credit networks like Ripple and Stellar are increasingly popular, and can facilitate crosscurrency
transactions in a fraction of the time it would take for banks or other financial institutions to process the
same transaction, and at a fraction of the cost. Unlike for cryptocurrencies, there has been little work in the
area of designing secure and private mixers for credit networks. Mixers for cryptocurrencies such as Bitcoin
cannot be directly applied to the credit network domain because credit networks have an inherently
different structure and purpose than cryptocurrencies. We design a system that uses cryptographic
constructs such as ring signatures, commitments, and zero knowledge proofs to provide security/integrity
of all transactions, ensures privacy of the users involved in a transaction, as well as privacy of the amount
transacted. We also provide preliminary experimental results.

                                Coffee Break 15:30-15:50

                                                      21
2019 Blockchain and Internet of Things Conference

                      Oral Presentation Abstracts
                                 Session 3- Network Security
Tips: The schedule for each presentation is for reference only. In order not to miss your presentation, we
strongly suggest that you attend the whole session.

                                Afternoon, July 8, 2019 (Monday)
                                           Time: 15:50-17:35
   Venue: Okinawa Institute of Science and Technology Graduate University
                             Conference Center –Meeting Room 1
                                  Session Chair: Prof. Maode Ma

IE0006 Presentation 13 (15:50-16:05)
Association Extraction from Functional Testing Scenarios
Pakorn Leesutthipornchai and Denduang Pradubsuwun
Thammasat University, Thailand

Abstract—In this paper, we propose an approach to extract association among software pages from
functional test case scenarios. This knowledge helps us to re-design user interfaces of a software application
for the purpose of usability. Initially, functional test case scenarios are applied to the association extraction
approach. The association sets are then obtained and post-processed. The association is considered in two
aspects including 1) all frequent pages association and 2) consecutive pages association. Both associations
are used to simplify user interfaces of the software application. We demonstrate our proposed method with
the Mobile Application Development Quiz in [7] as a case study.

IE0005 Presentation 14 (16:05-16:20)
A Simple Patch Antenna with Wideband Circularly Polarised for GNSS Application
Phanuphong Boontamchauy, Nathapat Supreeyatitikul and Anupan Phungasem
Civil Aviation Training Center, Thailand

Abstract—A low profile patch antenna for GNSS application is presented, which is designed by a legacy L
feed underneath the slot to provide a circular polarization. The simulation reveals a wide impedance
bandwidth of 46.15% from 1.05 to 1.68 GHz (RLBW≤-10 dB), a wide axial ratio bandwidth of 40.84% from
1.13 to 1.71 GHz (ARBW≤3 dB) and gain is in between 1.62 and 3.14 dBi. Although the proposed antenna
are inexpensive, compact size, weightless and easy to fabricate, but the measured results can reach to the
GNSS requirements for an entire band (1.146-1.616 GHz).

IE0014 Presentation 15 (16:20-16:35)
Privacy Preservation in a Global Mobility Communication Network
Hsiao-Ling Wu, Chin-Chen Chang and Long-Sheng Chen
Chaoyang University of Technology, Taiwan

                                                       22
2019 Blockchain and Internet of Things Conference

Abstract—A global mobility communication network (GLOMONT) allows mobile users to obtain roaming
service, in which the service is provided by a foreign agent when users are in foreign territory. Therefore,
the mutual authentication and key agreement are integral to the GLOMONT. In addition, the conditional
privacy preservation, which enhances anonymity and fairness, is another important issue. In other words,
mobile users can receive service without leaking an identity to anyone except the home agent, and the
home agent should receive the payment from mobile users. Thus, in this paper, we propose a conditional
privacy preservation authentication scheme in GLOMONT. The secure analyses show that our proposed
scheme can achieve the security requirements and against many well-known attacks.

IE0015 Presentation 16 (16:35-16:50)
PhishLedger: A Decentralized Phishing Data Sharing Mechanism
Dongjie Liu, Wei Wang, Yang Wang and Yaling Tan
University of Chinese Academy of Sciences, China

Abstract—In recent years, phishing has become one of the biggest security threats on the Internet. To
combat phishing, it requires multiple steps and multi-agency participation and thus desperately need
uniform data sharing format and unobstructed sharing channels, which unfortunately is just what is lacking
currently. This paper proposes a novel phishing data sharing mechanism based on the consortium
blockchain. It designs four types of nodes, including reporting node, accounting node, servicing node and
supervising node and illustrates the roles of each type. Then it demonstrates the process of reporting,
accounting and servicing and designs the process of post-supervision, which ensures the operation of the
mechanism stable and fastest; and then discusses its implementation on Hyperledger Fabric. The proposed
mechanism includes multi-source reporting, anti-tamper accounting, multi-channel disposal of phishing
data and post-supervision. It provides a platform for multi-party participation, transparent and efficient
coordination and unified standard and overcomes the current prominent problems of phishing data sharing;
and the participants on the consortium blockchain all have a strong desire to combat phishing, which
ensures the proposed mechanism is also very practical and highly feasible.

IE0019 Presentation 17 (16:50-17:05)
Comparison of Energy-Efficient Key Management Protocols for Wireless Sensor Networks
Laurin Dörr1, Michael Heigl1, Dalibor Fiala2 and Martin Schramm1
1. Deggendorf Institute of Technology, Germany; 2. University of West Bohemia, Czechia

Abstract—A Wireless Sensor Network (WSN) contains small sensor nodes which monitor physical or
environmental conditions. WSN is an important technology for digitalization of industrial periphery and is
often used in environments which are not hardened against security impacts. These networks are easy to
attack due to the open communication medium and low computing resources of the applied devices.
Establishing security mechanisms is difficult while taking into account low energy consumption. Low cost
sensors with limited resources make the implementation of cryptographic algorithms even more challenging.
For WSNs cryptographic functions are needed without high impact on energy consumption and latency.
Therefore, security in WSNs is a challenging field of research. This paper compares lightweight energy-
efficient key exchange protocols which are suitable for WSN. The protocols were also implemented in WSN-
capable Texas Instrument boards and the energy consumption was measured during the key exchange. This
paper shows that schemes have to be chosen depending on the specific network requirements and that the
                                                    23
2019 Blockchain and Internet of Things Conference

usage of asymmetric cryptography does not always result in a high energy consumption.

IE0007 Presentation 18 (17:05-17:20)
Residual Learning Based Convolutional Neural Network for Super Resolution
Hwei Jen Lin1, Yoshimasa Tokuyama2 and Zi-Jun Lin1
1. Tamkang University, Taiwan; 2. Tokyo Polytechnic University, Japan

Abstract— Recently, there have been many methods of super resolution proposed in the literature, in which
convolutional neural networks have been confirmed to achieve good results. C. Dong et al. proposed a
convolutional neural network structure (SRCNN) to effectively solve the super resolution problem. J. Kim et
al. proposed a much deeper convolutional neural network (VDSR) to improve C. Dong et al.’s method.
However, unlike VDSR proposed by J. Kim et al. which trained residue images, SRCNN proposed by C. Dong
et al. directly trained high-resolution images. Consequently, we surmise the improvement of VDSR is due to
not only to the depth of the neural network structure but also the training of residue images. This paper
studies and compares the performance of training high-resolution images and training residue images
associated with the two neural network structures, SRCNN and VDSR. Some deep CNNs proceed zero
padding which pads the input to each convolutional layer with zeros around the border so the feature maps
remain the same size. SRCNN proposed by C. Dong et al. does not carry out padding, so the size of the
resulting high-resolution images is smaller than expected. The study also proposes two revised versions of
SRCNN that remain the size the same as the input image.

BI0002 Presentation 19 (17:20-17:35)
Algebraic Approach to Verification and Testing of Distributed Applications
Vladimir Peschanenko1, Oleksandr Letychevskyi2, Viktor Radchenko3, Maxim Orlovsky4 and Andrey Sobol4
1: Kherson State University, Ukraine; 2: Institute of Cybernetics, Ukraine; 3: Garuda AI B.V., Netherlands;
4: Pandora Core AG, Switzerland

Abstract—Challenges in developing distributed applications have given rise to various different design
techniques and technologies. This paper presents an algebraic approach using formal verification and
model-based testing that can be applied to different development stages. The insertion modeling system
software developed by the authors of this paper is used to implement this approach and to apply it to the
model-driven development of distributed systems based on blockchain consensus protocols.

                                                    24
2019 Blockchain and Internet of Things Conference

                     Oral Presentation Abstracts
                           Session 4- Blockchain Applications
Tips: The schedule for each presentation is for reference only. In order not to miss your presentation, we
strongly suggest that you attend the whole session.

                               Afternoon, July 8, 2019 (Monday)
                                         Time: 15:50-17:20
   Venue: Okinawa Institute of Science and Technology Graduate University
                            Conference Center –Meeting Room 2
                               Session Chair: Prof. Wai-Kong Lee

BI0004 Presentation 20 (15:50-16:05)
Delegated Proof of Reputation: a Novel Blockchain Consensus
Thuat Do1, Thao Nguyen2 and Hung Pham2
1: Hong Kong University of Science and Technology, Viet Nam; 2: Umbala INC, Viet Nam
Abstract—Consensus mechanism is the heart of any blockchain network. Many projects have proposed
alternative protocols to improve restricted scalability of Proof of Work originated since Bitcoin. As an
improvement of Delegated Proof of Stake, in this paper, we introduce a novel consensus, namely, Delegated
Proof of Reputation, which is scalable, secure with an acceptable decentralization. Our innovative idea is
replacing pure coin-staking by a reputation ranking system essentially based on ranking theories (PageRank,
NCDawareRank and HodgeRank).

BI0010 Presentation 21 (16:05-16:20)
Solar Energy Distribution Using Blockchain and IoT Integration
Rishabh Jain and Aniket Dogra
Amity University, India
Abstract—This research focuses on the distribution of solar energy between networks using IoT (Internet of
Things) enabled devices and Blockchain technology. The Solar panels will charge the physical battery which
is connected to the microcontroller. The microcontroller will update the data to the cloud database and then
that database is accessed by the application logic. The application logic checks for the required conditions
and if it approves the transaction takes place and the blockchain is updated - a block is created and added
to the blockchain. On the physical side, the IoT device will receive a command to allow transfer of energy to
and from the particular node. IoT will provide a medium for software part to interact with the physical part
which is energy and transmission grid. IoT connects the physical battery containing energy to the cloud
database which is then used to interact with the software. IoT also enables the transfer of energy through
the physical medium on the command given by the user through the user application. To make the system
decentralized, blockchain is used, which will help to connect all the users in the network where they can
transact without the need of knowing each other or having the obligation of any intermediary.
Decentralisation helps in achieving a system which doesn’t require any middleman and works on the
cumulative trust of the nodes - often referred to as the Consensus-Based Algorithm. There are a number of

                                                     25
2019 Blockchain and Internet of Things Conference

such algorithms but Proof of Work (PoW) and Proof of Stake (PoS) are widely used for blockchains. We will
be using the PoW algorithm. Blockchain also offers security, transparency, immutability and customer
centricity to develop the most advanced and automated platform. The application logic on the server side
will be responsible to apply certain conditions to enable a valid transaction (similar to smart contracts on
Ethereum).

BI0013-A Presentation 22 (16:20-16:35)
Building a Collaborative Framework of Blockchain for the Elderly People
Hsien-Ming Chou
Chung Yuan Christian University, Taiwan
Abstract—With the trend of aging and working families, homecare services for elderly people are becoming
more and more important issues. In Taiwan, caregivers, who are dispatched from human resources agencies
of long-term care, are main supervisors in charge of elderly people. However, most of agencies only consider
the availability of their own caregivers and ignore other caregivers of other agencies. The data of the
availability of all caregivers is not connected and used in real-time based on existing frameworks. In addition,
they also do not consider the suitability of the people so that the mismatched collaboration could happen
all the time. Both of issues could lead long-term care system to failure and inefficiency. This research
proposes a new collaborative framework of healthy Blockchain technology to solve the issues of the
availability and suitability of human resources agencies, which are under the third-party authorization. The
proposed framework also can save the cost of transmission and integration through quick and direct data
exchanges between caregivers and the elderly people. Through the Blockchain, the collaborative framework
could ensure the non-destructibility of data, which can make the electronic long-term care record of the
elderly people more secure.

BI0026-A Presentation 23 (16:35-16:50)
Civil Liability in the Era of New Technology: the Influence of Blockchain
Luigi Buonanno
Bocconi University, Italy
Abstract—The presentation aims to evaluate the impact of Blockchain on private law’s civil liability sector,
attempting to describe its future path and envisage future regulation. The need to identify the person
responsible for either malfunction in the chains or illegal activities perpetrated against them, thereby
causing economic damage to end users, clashes with the highly decentralized nature of this technology. On
the basis of an activity risk analysis carried out on Blockchain platforms, the paper argues that the strict
liability of the relevant operators will increasingly become the reference paradigm for civil liability,
definitively supplanting the fault-based rule. Meanwhile, the need to consider the introduction of a
mandatory insurance scheme for Blockchain platform operators is emphasized, with a view to not only
protecting the assets of operators but also ensuring full compensation for end users in the event a
malfunction or attack results in the loss of assets held on the decentralized network.
The renewal described will perhaps involve a new basic philosophy that will oblige civil law and common
law legal orders to face the challenge of a regulation that will be increasingly intertwined with economic
evaluations.

                                                      26
2019 Blockchain and Internet of Things Conference

BI0035-A Presentation 24 (16:50-17:05)
Enabling Blockchain Based Payment for IoT Devices
Lei Xu1, Lin Chen2, Zhimin Gao3, Shouhuai Xu4 and Weidong Shi5
1: University of Texas Rio Grande Valley, United States; 2: Texas Tech University, United States; 3: Auburn
University at Montgomery, United States; 4: University of Texas at San Antonio, United States; 5: University
of Houston, United States
Abstract—Payment is one of the most significant applications of blockchain technology, e.g., cryptocurrency
systems like Bitcoin using public blockchain and payment systems built by banks using permissioned
blockchain. For both cases, a user of the payment system needs to able to verify transactions. A simple
method is that each user keeps a local copy of the whole blockchain. Since the size of the blockchain keeps
growing, this method becomes less practical, especially for lightweight IoT devices such as coffee machine
and vendor machine. In order to deal with this problem, several methods have been proposed. However,
existing approaches either achieve a limited storage reduction (e.g., simple payment verification (SPV)
protocol), or rely on some strong security assumptions (e.g., the use of trusted server). In this paper, we
propose a novel and efficient payment verification scheme for blockchain based payment systems, which
leverages cryptographic accumulator to compress the whole ledger. This solution is particularly suitable for
IoT, who only need to store a small amount of data that is independent of the size of the blockchain.

BI0001 Presentation 25 (17:05-17:20)
IoT-based “All-Round 3D Technology Security Circle” in New Taipei City Police Department
Chun-Young Chang1, Lin-Chien Chien2, En-Chun Kuo3 and Yuh-Shyan Hwang
1: National Taipei University of Technology, Taiwan; 2: Central Police University, Taiwan; 3: New Taipei City
Police Department, Taiwan

Abstract—New Taipei City is a metropolitan area in Taiwan, with a prosperous economy and a large
population. Many parades and public assemblies are held within the jurisdiction and they might have
unintended consequences such as traffic, overcrowding, or even serious risks and mishaps. Many cities
around the world face similar problems and threats, such as domestic violence in Turkey and the Boston
Marathon bombing. Combating new types of public safety threats has become a primary task. Setting up a
complete surveillance system at an event site would give a command center access to the site and allow
them to respond to an incident in real time. The system’s digital records would help track a crime scene, as
well as providing insight into how criminals commit crimes. The New Taipei City Police Department has
established an “All-Round 3D Technology Security Circle” equipped with various cameras that transmit
images back to a command center based on an Internet of Things connection. Innovative technology
combined with smart equipment gives three-dimensional coverage of an area to ensure public safety

                                     Dinner 18:00-19:00

                                                     27
You can also read