Updated on 2024/10/18

写真a

 
KAWANO Keita
 
Organization
Center for Information Technology and Management Associate Professor
Position
Associate Professor
External link

Degree

  • 博士(情報科学) ( 大阪大学 )

Research Areas

  • Informatics / Information network

  • Informatics / Computer system

  • Informatics / Information security

 

Papers

  • Public WLAN Virtualization for Multiple Services Reviewed

    Kazuhiko KINOSHITA, Kazuki GINNAN, Keita KAWANO, Hiroki NAKAYAMA, Tsunemasa HAYASHI, Takashi WATANABE

    IEICE Transactions on Communications   E102.B ( 4 )   832 - 844   2019.4

     More details

    Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transcom.2018ebp3159

    researchmap

  • Exceptional Execution Permission Using Additional Certificate Chains on Application Execution Control System for Educational Windows PCs Reviewed

    Riichi Sekine, Keita Kawano, Nariyoshi Yamai, Naoya Kitagawa

    59 ( 5 )   1310 - 1320   2018.5

     More details

  • Construction of Single Sign-On Infrastructure Capable of Controlling Authentication Levels with Cooperatioin between Shibboleth and OpenAM Reviewed

    Keita KAWANO, Takashi HIEDA, Motonori NAKAMURA

    ( 21 )   71 - 81   2017.9

     More details

  • A Spectrum Sharing Method Based on Users' Behavior and Providers' Profit Reviewed

    KINOSHITA Kazuhiko, MARUYAMA Yukika, KAWANO Keita, WATANABE Takashi

    IEICE Transactions on Communications   100 ( 10 )   1928 - 1938   2017

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    <p>In recent years, spectrum sharing has received much attention as a technique for more efficient spectrum use. In the case in which all providers are cooperative, spectrum sensing can easily be realized and can improve user throughput (on average). If that is not the case, providers are not cooperative, i.e., spectrum trading, spectrum bands are rented to promote spectrum sharing. To ensure more profit, however, non-cooperative providers must correctly estimate the fluctuation of the number of connected users to be able to determine the offered channel price. In this paper, we propose a spectrum sharing method to achieve both higher throughput and provider profit via appropriate pricing using a disaggregate behavioral model. Finally, we confirm the effectiveness of the proposed method using simulation experiments.</p>

    DOI: 10.1587/transcom.2016EBP3369

    Scopus

    CiNii Article

    researchmap

  • Development of Authentication Method Grouping Function for Authentication Federations with Shibboleth Reviewed

    Keita Kawano, Motonori Nakamura

    57 ( 3 )   1008 - 1021   2016.3

     More details

  • Strict Application Execution Control with Hierarchical Group Management Using Digital Certificates on Educational Windows PCs Reviewed

    Daisuke Okamoto, Keita Kawano, Nariyoshi Yamai, Tokumi Yokohira

    Journal of information processing   23 ( 4 )   449 - 457   2015.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    We have developed a system (traditional system) to flexibly provide the requested applications environment on educational Windows PCs. The traditional system dynamically controls the execution of applications installed on each educational PC depending on the rules defined by teachers as well as by administrators. The traditional system, however, has a low tolerance for malicious attacks. If the execution file of a certain application is falsified, the corresponding rules already applied become invalid. In addition, though the traditional system has a function to define groups of controlled applications, it does not support hierarchical groups. This reduces the usability of the traditional system. In order to address these issues, this paper proposes a control method of application execution using digital certificates. The proposed method has a high tolerance for the falsification of execution files by controlling their executions based on the reliability of the corresponding digital certificates. It also improves its usability by introducing hierarchical group management utilizing hierarchical structure for digital certificates.

    DOI: 10.2197/ipsjjip.23.449

    Scopus

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00144432/

  • Countermeasure of Spam Mails Sent by Trusted MTAs on E-mail Priority Delivery System Reviewed

    Gada, Masayuki Matsuoka, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura

    IPSJ Journal   56 ( 3 )   777 - 787   2015.3

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Enormous traffic generated by spam mails brings heavy load to networks and mail servers, which causes a large delay on legitimate mail delivery. In order to deliver important e-mails without unnecessary delay, we proposed an e-mail priority delivery system, where a dedicated receiving Mail Transfer Agent (MTA) receives all messages sent from trusted MTAs and performs only simple anti-spam measures. However, this system has some problems such that the dedicated receiving MTA easily receives even spam mails sent from trusted MTAs through only simple anti-spam measures. In this paper, we propose a method to perform full anti-spam measures on suspicious messages sent from trusted sending MTAs, by introducing tempfailing and SMTP session abort on the dedicated receiving MTA.

    CiNii Article

    CiNii Books

    researchmap

  • An Efficient Spectrum Sharing Method Based on Genetic Algorithm in Heterogeneous Wireless Network Reviewed

    K. Kinoshita, M. Nakagawa, K. Kawano, K. Murakami

    International Journal of Computer Networks & Communications (IJCNC)   6 ( 5 )   145 - 156   2014.9

     More details

  • Domain Registration Date Retrieval System for Improving Spam Mail Discrimination Reviewed

    Yamai Nariyoshi, Matsuoka Masayuki, Okayama Kiyohiko, Kawano Keita, Nakamura Motonori, Minda Masato

    Journal of information processing   22 ( 3 )   480 - 485   2014.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    Recently, many spam mails associated with "One-click fraud," "Phishing," and so on have been sent to unspecified large number of e-mail users. According to some previous works, most spam mails contained some URLs whose domains were registered relatively recently, such that the age of the domain used in the URL in the messages would be a good criterion for spam mail discrimination. However, it is difficult to obtain the age or the registration date of a specific domain for each message by WHOIS service since most WHOIS services would block frequent queries. In this paper, we propose a domain registration date retrieval system, which updates zone files of some Top Level Domains (TLDs) every day, keeps track of the registration date for new domains, and works as a DNS server that replys with the registration date of the queried domain. According to the performance evaluation, the prototype system could update the registration date for all the domains of "com" TLD in two hours.Recently, many spam mails associated with "One-click fraud," "Phishing," and so on have been sent to unspecified large number of e-mail users. According to some previous works, most spam mails contained some URLs whose domains were registered relatively recently, such that the age of the domain used in the URL in the messages would be a good criterion for spam mail discrimination. However, it is difficult to obtain the age or the registration date of a specific domain for each message by WHOIS service since most WHOIS services would block frequent queries. In this paper, we propose a domain registration date retrieval system, which updates zone files of some Top Level Domains (TLDs) every day, keeps track of the registration date for new domains, and works as a DNS server that replys with the registration date of the queried domain. According to the performance evaluation, the prototype system could update the registration date for all the domains of "com" TLD in two hours.

    DOI: 10.2197/ipsjjip.22.480

    Scopus

    CiNii Article

    CiNii Books

    researchmap

  • A Flexible Execution Control Method of Application Software for Educational Windows PCs Reviewed

    Keita Kawano, Daisuke Okamoto, Masanori Fujiwara, Nariyoshi Yamai

    Journal of information processing   22 ( 2 )   161 - 174   2014.4

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Information Processing Society of Japan  

    Recently, many educational institutions have had to maintain a large number of PCs (educational PCs). It is common for the administrators of these institutions to use a disk image distribution system to manage them all together. It allows the administrators to keep all of their educational PCs in the same configuration with ease. This method, however, robs them of the flexibility of management. Suppose that use of certain application software is restricted to specific users or sites in those institutions. Suppose also that use of other application software is requested to be prohibited by teachers during classes. It is hard for the administrators to satisfy all of these requirements with the traditional method since it causes heavy administrative burden. This paper proposes a flexible method to manage application software on educational Windows PCs without significant efforts of the administrators even with these requirements. The proposed method controls the execution of individual application software on each educational PC to create the requested environments. Teachers as well as the administrators can directly and dynamically change its configuration during their classes. An execution control system was actually implemented as a prototype to show the feasibility of the proposed method.

    DOI: 10.2197/ipsjjip.22.161

    Scopus

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00100892/

  • レイヤ3スイッチによる動的ホワイトリストを用いた電子メール優先配送システム Reviewed

    ガーダ, 山井 成良, 岡山 聖彦, 河野 圭太, 中村 素典

    情報処理学会論文誌   55 ( 3 )   1151 - 1159   2014

     More details

  • Joint Spectrum Sharing and Routing for WiFi/WiMAX Interworking Mesh Networks Reviewed

    K. Kinoshita, K. Kawano, K. Murakami

    International Journal of Multimedia Technology   3 ( 3 )   74 - 79   2013

     More details

  • A Dynamic Spectrum Assignment Method for Call Blocking Probability Reduction in WiFi/WiMAX Integrated Networks Reviewed

    KINOSHITA Kazuhiko, KANAMORI Yuichi, KAWANO Keita, MURAKAMI Koso

    IEICE Trans. Commun.   94 ( 12 )   3498 - 3504   2011

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    With advances in communication technologies, network services provided via the Internet have become widely diversified, and people can use these services not only via wired networks but also via wireless networks. There are several wireless systems in practical use such as cellular, WiMAX and WiFi. Although these wireless network systems have developed independently of each other, they should be integrated for seamless access by users. However, each system uses an individual spectrum prescribed by law to avoid radio interference. To overcome such a situation, dynamic spectrum access technology is receiving much attention. We propose a dynamic spectrum assignment method in which a WiFi system temporarily uses a spectrum band of the WiMAX system in WiFi/WiMAX integrated networks to reduce call blocking probability of multimedia communication services. We confirm the effectiveness of the proposed method by simulation experiments.

    DOI: 10.1587/transcom.E94.B.3498

    Web of Science

    CiNii Article

    researchmap

  • An Anti-spam Method with SMTP Session Abort Reviewed

    50 ( 3 )   940 - 949   2009.3

     More details

    Language:Japanese  

    Tempfailing, which temporarily refuses the first delivery attempt of a message from an untrusted Mail Transfer Agent (MTA), is one of typical anti-spam technologies commonly used in many organizations. This method can refuse spam mails considerably. However, it also may refuse legitimate mails sent from domains resending the temporarily failed message with a different MTA or those without resending function. In such a case, an administrator of the receiver MTA has to register those domains by hand. In this paper, in order to reduce these drawbacks, we propose an anti-spam method introducing SMTP session abort function. This method performs the same effect as existing tempfailing methods by means of SMTP session abort during the first delivery attempt. In addition, this method can obtain the header or the whole message even if it would not be resent and can use the header for second delivery checking and can use the whole message of unresent messages in case of false positives. According to the operation tests of the prototype systems, we confirmed that the proposed method received messages from domains using a different MTA for retry.

    CiNii Article

    CiNii Books

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00009235/

  • A Distributed Network Mobility Management Scheme for Hierarchical Mobile IPv6 Networks Reviewed

    KAWANO Keita, KINOSHITA Kazuhiko, YAMAI Nariyoshi

    IEICE Trans. Commun.   91 ( 7 )   2272 - 2278   2008.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Route optimization for network mobility is a key technique for providing a node in a mobile network (Mobile Network Node or MNN) with high quality broadband communications. Many schemes adding route optimization function to Network Mobility (NEMO) Basic Support protocol, the standardized network mobility management protocol from the IETF nemo working group, have already been proposed in recent years. One such scheme, a scheme using Hierarchical Mobile IPv6 (HMIPv6) aims to overcome micromobility management issues as well by applying a mechanism based on HMIPv6. The traditional scheme, however, suffers from a significant number of signaling messages as the number of MNNs and/or the number of their Correspondent Nodes (CNs) increase, because many messages notifying the MNNs' Home Agents (HAMNNs) and the CNs of the mobile network's movement are generated simultaneously each time the mobile network moves to the domain of another micromobility management router (Mobility Anchor Point or MAP). This paper proposes a scheme to overcome this problem. Our scheme reduces the number of signaling messages generated at the same time by managing the mobility of MNNs using multiple MAPs distributed within a network for load sharing. The results of simulation experiments show that our scheme works efficiently compared to the traditional scheme when a mobile network has many MNNs and/or these MNNs communicate with many CNs.

    DOI: 10.1093/ietcom/e91-b.7.2272

    Web of Science

    CiNii Article

    CiNii Books

    researchmap

  • 無線LAN環境における二重暗号化回避による通信効率の改善手法 Reviewed

    岡山 聖彦, 山井 成良, 河野 圭太

    情報処理学会論文誌   49 ( 3 )   1072 - 1080   2008

     More details

  • 部外者からの組織内限定サービスへのアクセスを保護するLANアクセス制御システム Reviewed

    山井 成良, 岡山 聖彦, 木澤 政雄, 土居 正行, 河野 圭太, 大隅 淑弘

    情報処理学会論文誌   48 ( 4 )   1573 - 1583   2007

     More details

  • 大規模VLAN環境におけるVLANの相互接続方式 Reviewed

    岡山 聖彦, 山井 成良, 二串 信弘, 河野 圭太, 岡本 卓爾

    情報処理学会論文誌   48 ( 4 )   1584 - 1594   2007

     More details

  • Multilevel Hierarchical Mobility Management in Densely Meshed Networks Reviewed

    KAWANO Keita, KINOSHITA Kazuhiko, MURAKAMI Koso

    IEICE Trans. Commun., B   89 ( 7 )   2002 - 2011   2006.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Micromobility management is a key issue for the deployment of broadband mobile communication services. The packet loss during handover and the handover latency need to be minimized to maintain the high quality of these services. We have previously proposed a mobility management scheme that addresses this issue in wide-area mobile networks that employed hierarchical multiple mobility management routers (Mobility Anchor Points or MAPs). Our scheme directs a Mobile Terminal (MT) to a suitable MAP to fully minimize packet loss during handover, and handover latency of the MTs. In our previous work, we confirmed the effectiveness of our scheme using a simple tree network. Actual networks however, always have densely meshed topologies to provide some redundancy for the elimination of single points of failure. In such networks, it is difficult to deduce the relationships between the MAPs, and this makes it difficult for our scheme to select a suitable MAP for an MT, because the selection is performed using both the MT's smoothed speed and the relationships existing between the MAPs located above the Access Router (AR), to which the MT is connected. In this paper, we propose a method to overcome this problem, by autonomously adjusting the selection criteria that are individually configured for use at a particular AR, and we evaluate this method using simulation experiments. The results show that our mobility management scheme works well in densely meshed networks using the proposed additional method.

    DOI: 10.1093/ietcom/e89-b.7.2002

    Web of Science

    CiNii Article

    CiNii Books

    researchmap

  • A Study on Estimation of Mobility of Terminals for Hierarchical Mobility Management Scheme Reviewed

    Keita KAWANO, Kazuhiko KINOSHITA, Koso MURAKAMI

    IEICE TRANSACTIONS on Communications   E87-B ( 9 )   2557 - 2566   2004.9

     More details

    Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    Hierarchical Mobile IPv6 (HMIPv6) has been proposed to manage the mobility of Mobile Terminals (MTs) hierarchically to reduce packet losses during local handover. HMIPv6 uses a mobility manageable router in a domain visited by the MTs to manage the micromobility of the MTs. The router is called Mobility Anchor Point (MAP). As a hierarchical mobility management scheme based on HMIPv6, we have already proposed a multilevel hierarchical distributed IP mobility management scheme to manage the mobility of MTs in a decentralized manner using multiple MAPs. Our scheme manages the mobility of an MT using a MAP having a suitable management domain. This usage of MAPs aims to efficiently decentralize the load of mobility management. Our scheme estimates the movement speed of the NIT and then estimates the mobility of the MT based on the estimated movement speed of the MT to achieve the objective. However, recent simulation results obtained with more realistic mobility model indicate that our scheme has two problems in estimating the mobility of MTs: One is that our current scheme misestimates the movement speed of an NIT in some cases, and the other is that our current scheme does not notice the changes in the mobility of an MT when the MT decelerates and stays in the same access area for a long time. Thus, an enhanced mobility estimation method is proposed in this paper. The enhanced method has an ability to estimate the movement speed of MTs more correctly and an ability to urge decelerated MTs to degrade their MAP quickly. Finally, the performance of the proposed mobility estimation method is evaluated using simulation experiments. The simulation results show that the enhanced method allows our scheme to estimate the mobility of MTs more correctly and so achieve more efficient load sharing.

    Web of Science

    researchmap

  • A Design for Integrated Wireless Network with Flexible Bandwidth Assignment Reviewed

    Takanori NOMURA, Keita KAWANO, Kazuhiko KINOSHITA, Koso MURAKAMI

    IEICE TRANSACTIONS on Communications   E87-B ( 5 )   1177 - 1183   2004.5

     More details

    Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    As various mobile communication systems have developed, dramatically integrated wireless network, where users can communicate seamlessly via several wireless access systems, have become expected. At present, there are many studies of integrated wireless network, but no study of a network design method. Therefore, in this paper, we discuss a network design method for integrated wireless networks. Because of the handover procedure, the network design where adjacent base stations are connected to the same router, regardless of radio system type, is simply considered. However, in such a design, where mobile users crowd into a particular area and users' access to the base stations located there increases, the load of these accesses is centralized to the single router. To overcome this problem, we propose a new network design wherein the base stations of heterogeneous wireless communication systems, the service areas of which overlap, are connected to a different router. In the proposed network design, although users' accesses are concentrated on the base stations located in a particular area, users in that area can be assigned bandwidth of several upper links according to the access conditions of the base stations in neighboring areas. Finally, we show the excellent performance of the proposed design by simulation experiments.

    Web of Science

    researchmap

  • A Mobility-Based Terminal Management in IPv6 Networks Reviewed

    Keita KAWANO, Kazuhiko KINOSHITA, Koso MURAKAMI

    IEICE TRANSACTIONS on Communications   E85-B ( 10 )   2090 - 2099   2002.10

     More details

    Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    Hierarchical Mobile IPv6 (HMIPv6) has been proposed to accommodate frequent mobility of terminals within the Internet. It utilizes a router, named Mobility Anchor Point (MAP), so that networks can manage mobile terminals without floods of signaling message. Note here that, particularly in a wide area network, such as a mobile communication network, it is efficient to distribute several MAPs within the same network and make the MAP domains cover overlapped areas. This enables the network to manage the terminals in a flexible manner according to their different mobility scenarios. The method described in the Internet-Draft at the IETF, however, lets mobile terminals select its MAP. This may cause load concentration at some particular MAPs and/or floods of signaling messages, because the terminals may not select a feasible MAP in a desirable manner. In this paper, a MAP selection method in distributed-MAPs environment is proposed. It reduces signaling messages to/from outside networks without load concentration at any particular MAPs. Finally, we show that the proposed method works effectively by simulation experiments.

    Web of Science

    researchmap

  • Network Map Architecture Using Inter-Agent Communication Techniques for Multiple QoS Routing Reviewed

    Kazuhiko KINOSHITA, Tomokazu MASUDA, Keita KAWANO, Hideaki TANIOKA, Tetsuya TAKINE, Koso MURAKAMI

    IEICE TRANSACTIONS on Communications   E85-B ( 7 )   1333 - 1341   2002.7

     More details

    Publishing type:Research paper (scientific journal)   Publisher:IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG  

    To diffuse multimedia information services, communication networks must guarantee the quality of services (QoSs) requested by users. In addition, users should be allowed to observe the network in order to customize their own services. A new network management architecture is therefore essential. It must perceive not only node connectivity, but also network failure points and the traffic situation dynamically. This paper introduces the network map as such an architecture on personalized multimedia communication networks and proposes multiple QoS routing using the network map. Moreover, a prototype system is built in order to verify the availability of the network map. key words: network management, multimedia communication, QoS routing, agent communication.

    Web of Science

    researchmap

  • 複数のQoSを考慮したサービス情報検索方式 Reviewed

    河野 圭太, 益田 智員, 木下 和彦, 村上 孝三

    電子情報通信学会論文誌 B   J84-B ( 3 )   443 - 451   2001

     More details

    Publishing type:Research paper (scientific journal)  

    researchmap

▼display all

MISC

  • Channel Assignment and Access System Selection in Heterogeneous Wireless Network with Unlicensed Bands Reviewed

    Kazuhiko Kinoshita, Kazuki Ginnan, Keita Kawano, Hiroki Nakayama, Tsunemasa Hayashi, Takashi Watanabe

    2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS)   2020.9

     More details

  • 情報セキュリティにおけるリスクアセスメントツールの開発

    大隅 淑弘, 河野 圭太, 村上 昌己

    第23回学術情報処理研究集会発表論文集   2019.9

     More details

  • 岡山大学における多人数ノートPC必携授業のための無線LAN環境の改善

    河野圭太, 藤原崇起, 岡山聖彦, 村上昌己

    学術情報処理研究集会発表論文集(Web)   22nd   1 - 6   2018.9

  • 岡山大学における情報機器の脆弱性対策の取り組み

    大隅 淑弘, 村上 昌己, 河野 圭太

    第22回学術情報処理研究集会発表論文集   7 - 12   2018.9

     More details

  • アンライセンスバンドを用いた稠密なLTE/WiFiネットワークにおけるチャネル割り当てと接続先選択手法

    銀杏 一輝, 木下 和彦, 河野 圭太, 中山 裕貴, 林 經正, 渡辺 尚

    信学技報   117 ( 491 )   115 - 120   2018.3

     More details

  • A CoMP clustering method in consideration of spectrum sharing for fairness improvement Reviewed

    Kazuhiko Kinoshita, Shusaku Shibata, Keita Kawano, Takashi Watanabe

    2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)   2017.11

     More details

  • Backhaul virtualization for multiple services in public WLANs Reviewed

    Kazuki Ginnan, Keita Kawano, Kazuhiko Kinoshita, Hiroki Nakayama, Tsunemasa Hayashi, Takashi Watanabe

    2017 19th Asia-Pacific Network Operations and Management Symposium (APNOMS)   2017.9

     More details

  • CoMP Clustering Method in Consideration of Spectrum Sharing for Fairness Improvement

    116 ( 428 )   77 - 82   2017.1

     More details

  • Access point virtualization for multiple services in heterogeneous WLANs Reviewed

    Kazuki Ginnan, Keita Kawano, Kazuhiko Kinoshita, Takashi Watanabe

    2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC)   2017.1

     More details

  • 岡山大学におけるグローバルIPアドレスの削減に関する取り組み

    稗田隆, 岡山聖彦, 河野圭太, 村上昌己, 藤原崇起

    学術情報処理研究集会発表論文集(Web)   21st   2017

  • Backhaul Virtualization for Bandwidth Guaranty in Public Wireless LANs

    116 ( 324 )   31 - 35   2016.11

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • Virtual Access Point Configuration for Multiple Services in Heterogeneous Wireless LANs

    116 ( 44 )   75 - 80   2016.5

     More details

  • A fair spectrum sharing method in consideration of CoMP Reviewed

    Shusaku Shibata, Kazuhiko Kinoshita, Keita Kawano, Takashi Watanabe

    NOMS 2016 - 2016 IEEE/IFIP Network Operations and Management Symposium   2016.4

     More details

  • Capacity and Coverage Optimization Considering Guaranteed Bandwidth Service with Heterogeneous Wireless Access Systems

    115 ( 483 )   145 - 150   2016.3

     More details

  • B-6-107 Virtual AP Configuration with Heterogeneous Quality of Service Consideration

    Ginnan Kazuki, Matsuyama Hiroki, Kawano Keita, Kinoshita Kazuhiko, Watanabe Takashi

    Proceedings of the IEICE General Conference   2016 ( 2 )   107 - 107   2016.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • アクティブラーニングに向けた新情報実習室の構築

    稗田隆, 河野圭太, 岡山聖彦, 村上昌己

    学術情報処理研究集会発表論文集(CD-ROM)   20th   2016

  • Strict Application Execution Control with Hierarchical Group Management Using Digital Certificates on Educational Windows PCs

    Daisuke Okamoto, Keita Kawano, Nariyoshi Yamai, Tokumi Yokohira

    56 ( 6 )   2015.6

     More details

  • A Spectrum Sharing Method based on Users' Behavior and Providers' Profit

    MARUYAMA Yukika, KAWANO Keita, KINOSHITA Kazuhiko, WATANABE Takashi

    IEICE technical report. Information and communication management   114 ( 523 )   43 - 48   2015.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Mobile terminals such as smartphones and tablets which can use multimedia communication are widespread nowadays. On the other hand, wireless traffic is increasing and lack of spectrum resources has become an important problem. To use spectrum resources efficiently, spectrum sharing technology receives much attention. It use spectrum effectively by dynamically channel assignment between systems which differ in the range of cover area, transmission rate, etc. In a case where all providers are non-cooperative and pursue their own profit, they have to estimate the fluctuation of the number of their connecting users correctly in order to decide the channel price. In this paper, we propose a spectrum sharing method to achieve both higher throughput and providers' profit by appropriate pricing using disaggregate behavioral model.

    CiNii Article

    CiNii Books

    researchmap

  • B-6-22 Throughput Improvement in cell edge areas with CoMP and spectrum sharing

    Shibata Shusaku, Kinoshita Kazuhiko, Kawano Keita, Watanabe Takashi

    Proceedings of the IEICE General Conference   2015 ( 2 )   22 - 22   2015.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • 岡大クラウドラーニングシステム構築に関する一考察

    稗田隆, 河野圭太, 岡山聖彦

    情報処理学会全国大会講演論文集   77th ( 4 )   2015

  • A Spectrum Sharing by Estimating Users' Behavior between Non-cooperative WiMAX/WiFi Providers

    MARUYAMA Yukika, KAWANO Keita, KINOSHITA Kazuhiko, WATANABE Takashi

    IEICE technical report   114 ( 252 )   43 - 44   2014.10

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Lack of spectrum resources has become an important problem due to the increasing of wireless traffic. To use spectrum resources efficiently, spectrum sharing receives much attention. In a case where all providers are non-cooperative, they need to estimate the income which is decided by the channel rental fee and service charge from users. In this study, we propose an efficient spectrum sharing method based on estimation of users' behavior between non-cooperative WiMAX/WiFi providers.

    CiNii Article

    CiNii Books

    researchmap

  • Introduction of Multi-Factor Authentication Considering Cooperation with Shibboleth in Okayama University Administrative Information System

    Keita Kawano, Takaoki Fujiwara, Takashi Hieda

    IPSJ SIG Technical Reports   2014 ( 5 )   1 - 6   2014.10

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    In Okayama University, we replaced our administrative information system in July 2014. The new system introduces a multi-factor authentication system. Users are to be authenticated with their IC card and PIN code when they use their virtual desktop. Single sign-on for some applications is also controlled using the multi-factor authentication system. Users are to be re-authenticated with their IC card when they use some important applications. This report describes an introduction of multi-factor authentication in the new system. A problem of the multi-factor authentication system emerging when it cooperates with Shibboleth and its countermeasure are also described.

    CiNii Article

    CiNii Books

    researchmap

  • Practice of Large e-Learning Class with Combination of Flipped Learning and Group Learning

    ( 18 )   45 - 50   2014.9

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • Performance Improvement of SCTP Communication Using Selective Bicasting on Lossy Multihoming Environment Reviewed

    Koki Okamoto, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura, Tokumi Yokohira

    2014 IEEE 38TH ANNUAL INTERNATIONAL COMPUTERS, SOFTWARE AND APPLICATIONS CONFERENCE (COMPSAC)   551 - 557   2014.7

     More details

    Language:English   Publisher:IEEE  

    In recent years, with proliferation of smart phones and tablet PCs, speedup of wireless LAN communication is required for dealing with increase of traffic in wireless networks. However, transmission speed through a wireless network often slows down in comparison with that through a wired network since packets of wireless networks frequently drop due to the influence of surrounding environment such as electromagnetic noise. In this paper, we propose a method to mitigate the impacts caused by packet loss by virtue of SCTP bicasting in lossy multihoming environment with two or more wireless networks. This method bicasts not all packets but only important packets concerning retransmission for efficiency since bicasting all packets would cause congestion. We also implemented a prototype system based on the proposed method. According to the result of performance evaluation experiment, we confirmed the effectiveness of the proposed method by the fact that the prototype system performed faster transmission than normal SCTP transmission even in high packet loss rate environment.

    DOI: 10.1109/COMPSAC.2014.78

    Web of Science

    researchmap

  • Development of Authentication Method Grouping Function Considering LoA on Shibboleth IdP

    Keita Kawano, Motonori Nakamura

    IPSJ SIG Technical Reports   2014 ( 2 )   1 - 6   2014.6

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Using multiple authentication methods with different Levels of Assurance (LoAs) enables secure and practical federated authentication. Shibboleth, widely deployed at academic institutions like universities, has a practical issue, to realize this. Service Providers (SPs) are supposed to understand all the authentication methods (and their LoAs) on the correspondent Identity Providers (IdPs) beforehand. We develop an authentication method grouping function on Shibboleth IdP, to overcome this issue.

    CiNii Article

    CiNii Books

    researchmap

  • Design of Flexible and Strict Application Execution Control using Digital Certification on Educational Windows PCs

    Daisuke Okamoto, Keita Kawano, Nariyoshi Yamai, Tokumi Yokohira

    IPSJ SIG Technical Reports   2014 ( 3 )   1 - 8   2014.6

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    We have developed an Application Execution Control System (traditional system) which provides individual application environments on each educational PC by controlling its execution. The traditional system uses a hash value of the execution file to control target application. If the execution file is falsified, a rule already set gets invalid. In addition, the traditional system has a function to set rules for multiple application at once. However, it cannot handle multiple groups at once. In order to solve these problems, this paper proposes a control method using digital certificates. It supports strict control and flexible group management by using hierarchical structure of digital certificates.

    CiNii Article

    CiNii Books

    researchmap

  • B-6-112 A Study on Spectrum Sharing for Multiple Non-cooperative Primary Users

    Sameshima Yosuke, Kawano Keita, Kinoshita Kazuhiko, Watanabe Takashi

    Proceedings of the IEICE General Conference   2014 ( 2 )   112 - 112   2014.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • Countermeasure against Spam Mail Submissions with Password Cracking

    2014 ( 9 )   1 - 6   2014.2

     More details

  • A Spectrum Sharing Method based on Adaptive Threshold Management between Non-cooperative WiMAX/WiFi Providers Reviewed

    Y. Maruyama, K. Kawano, K. Kinoshita, K. Murakami

    Proceedings of the 13th International Conference on Networks (ICN 2014)   2014.2

     More details

  • Encouragement Talk : A Study on Influence of Users' Behavior on Spectrum Sharing between Uncooperative WiMAX/WiFi Providers

    MARUYAMA Yukika, KAWANO Keita, KINOSHITA Kazuhiko, MURAKAMI Koso, WATANABE Takashi

    IEICE technical report   113 ( 388 )   13 - 18   2014.1

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    With advances of wireless communication technology, people can use multimedia services with mobile terminals. On the other hand, lack of spectrum resources has become an important problem due to the increasing of wireless traffic. To use spectrum resources efficiently, spectrum sharing technology receives much attention. Although providers assign additional channels based on transaction price and income from users, there are few studies that considered the influence of users' behavior on the spectrum sharing. In this paper, we consider the effect that the action of the user gives to spectrum sharing method between uncooperative WiMAX/WiFi providers.

    CiNii Article

    CiNii Books

    researchmap

  • High-speed SCTP Communication using Selective Bicasting on Multi-ISP Wireless LAN Environment

    ( 2013 )   1 - 8   2013.12

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • Processing of Spam Mail Sent by Trusted MTAs on E-mail Priority Delivery System

    ( 2013 )   99 - 102   2013.12

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • RL-004 Redundant Configuration of Replication Servers for Failover and Failback Among Servers in Different Locations

    Ohsumi Yoshihiro, Yamai Nariyoshi, Okayama Kiyohiko, Kawano Keita, Fujiwara Takaoki

    12 ( 4 )   23 - 27   2013.8

     More details

    Language:Japanese   Publisher:Forum on Information Technology  

    CiNii Article

    CiNii Books

    researchmap

  • メッセージ中URLに基づくドメイン登録日検索システムを用いた迷惑メール判別機構

    松岡政之, 井上達貴, 山井成良, 岡山聖彦, 河野圭太, 中村素典, 民田雅人

    マルチメディア、分散協調とモバイルシンポジウム2013論文集   ( 2013 )   766 - 771   2013.7

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • Domain Registration Date Retrieval System of URLs in E-Mail Messages for Improving Spam Discrimination Reviewed

    Masayuki Matsuoka, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura, Masato Minda

    2013 IEEE 37th Annual Computer Software and Applications Conference Workshops   2013.7

     More details

  • Target Application Grouping Function Considering Software Updates on Application Execution Control System Reviewed

    Daisuke Okamoto, Masanori Fujiwara, Keita Kawano, Nariyoshi Yamai

    2013 IEEE 37th Annual Computer Software and Applications Conference Workshops   2013.7

     More details

  • E-mail Priority Delivery System with Dynamic White list in the Layer 3 Switch Reviewed

    Gada, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura

    2013 IEEE 37TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS (COMPSACW)   581 - 586   2013.7

     More details

    Language:English   Publisher:IEEE  

    In order to deliver important e-mails without unnecessary delay, some priority delivery methods with a whitelist, which includes trusted sending Mail Transfer Agents (MTAs), are proposed so far. However, most conventional methods have some problems with a large sized whitelist such as performance degradation, delivery failure, and so on. To alleviate these problems,we proposed a priority delivery system (Prototype system) by using a layer 3 switch (L3SW) with policy based routing (PBR) function. By updating PBR entries dynamically, prototype system implements a large sized whitelist without performance degradation. In this paper,we investigated the case many sending MTAs same time send Email performance of the prototype system. we also describe prototype system improvements.

    DOI: 10.1109/COMPSACW.2013.78

    Web of Science

    researchmap

  • A Spectrum Sharing by Adaptively Threshold Management between Non-cooperative WiMAX/WiFi Providers

    MARUYAMA Yukika, KAWANO Keita, KINOSHITA Kazuhiko, MURAKAMI Koso

    IEICE technical report   113 ( 35 )   89 - 94   2013.5

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    With advances in wireless communication tecnology, people can use multimedia services with mobile terminals. On the other hand, lack of spectrum resourses has become an inportant problem with increasing of wireless traffic. To use spectrum resourses efficiently, spectrum sharing technology receives much attension. Some existing spectrum sharing methods achieve to improve mean user throughput. But, it works well only if WiMAX/WiFi providers are cooperative. In this paper, we propose a spectrum sharing method between non-cooperative WiMAX/WiFi providers who cannot guess the right number of their users when spectrum is shared. Finally we confirm the effectiveness of the proposed method by simulation experiments.

    CiNii Article

    CiNii Books

    researchmap

  • Operation Issues of Large Scale Authentication Network in Okayama University

    2013 ( 10 )   1 - 6   2013.3

     More details

  • レイヤ3スイッチによる動的ホワイトリストを用いた電子メール優先配送システムの評価

    ガーダ, 山井成良, 岡山聖彦, 河野圭太, 中村素典

    全国大会講演論文集   2013 ( 1 )   377 - 379   2013.3

     More details

    Language:Japanese   Publisher:一般社団法人情報処理学会  

    重要な電子メールを遅延なく受信者へ配送するために,信頼できる送信MTAをあらかじめホワイトリストに登録し,優先的に配送する仕組みが考えられている.しかし,従来の方法では大規模なホワイトリストを扱えないか,扱える場合でも速度が遅くなるなどの問題があった.これに対して,我々はレイヤ3スイッチのポリシールーティング機能を用いてホワイトリストを実現し,また登録する送信MTAを動的に変更することにより,大規模なホワイトリストでも速度を落とさずに優先配送できるシステムを提案した.本稿では,提案システムを用いてメール配送を行った場合の評価を行い,その結果をもとに改良すべき点を考察する.

    CiNii Article

    CiNii Books

    researchmap

  • 統合認証基盤システム構築に関する一考察

    稗田隆, 河野圭太, 岡田俊明, 大隅淑弘

    第75回全国大会講演論文集   2013 ( 1 )   357 - 358   2013.3

     More details

    Language:Japanese  

    情報システムの重要性、システムの多様化に伴い、認証基盤システムに対する機能追加が要望されている。また、在校生等の現役に加えて卒業生、退職教職員等の幅広い対象への拡充と、生涯に亘って継続的なサービスの提供も必要になる。さらに、統合認証基盤システムでは提供する各種システムへのシングル・サイン・オン(SSO)に加え、プリンタ等の装置類、ネットワークへのアクセス制限機能と利用者との関係を管理するなど、ICT全体の統合管理を実現する必要がある。 統合認証基盤システムへの複雑化する要求に柔軟に対抗可能な情報管理方法、運用を可能な限り省力化できるサービス提供方法を明確にし、そのシステム構成を明らかにする。

    CiNii Article

    CiNii Books

    researchmap

  • B-6-143 An Effective Spectrum Sharing by Simple Management betWeen Non-cooperative WiMAX/WiFi Providers

    Maruyama Yukika, Kawano Keita, Kinoshita Kazuhiko, Murakami Koso

    Proceedings of the IEICE General Conference   2013 ( 2 )   143 - 143   2013.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • A Spectrum Sharing Method Considering Users' Behavior for Uncooperative WiFi/WiMAX Providers Reviewed

    H. Takemoto, K. Kawano, K. Kinoshita, K. Murakami

    Proceedings of the 12th International Conference on Networks (ICN 2013)   2013.2

     More details

  • A Study on Spectrum Sharing between Uncooperative WiFi/WiMAX Providers

    TAKEMOTO Hiroaki, KAWANO Keita, KINOSHITA Kazuhiko, MURAKAMI Koso

    IEICE technical report   112 ( 231 )   113 - 118   2012.10

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, with advances in wireless communication technology such as WiFi and WiMAX, the number of users increases more and more. It leads lack of spectrum resources, which becomes an important issue. To overcome this problem, spectrum sharing technology that a WiFi system temporarily uses a spectrum band of WiMAX system receives much attention. Although existing works assumed that WiMAX and WiFi providers were cooperative, it may not be realistic. In addition, users' behavior are not considered. In this paper, we propose a spectrum sharing method that behaves properly even if WiMAX provider, WiFi providers and users are uncooperative. Finaly, we confirm the effectiveness of the proposed method by simulation experiments.

    CiNii Article

    CiNii Books

    researchmap

  • Design and Implementation of Spam Mail Discrimination System Based on Response of DNS Queries

    2012 ( 6 )   1 - 6   2012.9

     More details

  • Introduction of Integrated Authentication System and its Cooperation with Electronic Journals at Okayama University

    59 ( 3 )   192 - 194   2012.9

     More details

  • An Execution Control System for Application Software Reducing Administrative Burden of Educational PCs Reviewed

    Masanori Fujiwara, Keita Kawano, Nariyoshi Yamai

    2012 IEEE/IPSJ 12th International Symposium on Applications and the Internet   2012.7

     More details

  • Spam Mail Discrimination System Based on Behavior of DNS Servers Associated with URLs Reviewed

    Shuji Suwa, Nariyoshi Yamai, Kiyohiko Okayama, Motonori Nakamura, Keita Kawano, Gada

    2012 IEEE/IPSJ 12TH INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET (SAINT)   381 - 386   2012.7

     More details

    Language:English   Publisher:IEEE  

    As one of anti-spam technologies, DNSBL based on the URLs or their corresponding IP addresses in the messages is well used. However, some spam mails cannot be filtered by conventional DNSBLs since the spammers create websites using various techniques such as botnet, fast-flux and Wildcard DNS record. To discriminate such spam mails, we ananalyzed DNS record characteristics corresponding to the domain name in the URLs in actual spam mails. According to this analysis, in this paper we propose a spam mail discrimination system based on the behavior of DNS servers. Since the behavior checking process is likely to wait for a timeout, the system queries some records to a DNS server simultaneously and decides whether the mail is spam or not on receiving the first reply. In addition, the system also introduces a blacklist for the IP addresses of the DNS servers.

    DOI: 10.1109/saint.2012.68

    Web of Science

    researchmap

  • Redundant Configuration of Replica Servers by IP Alias and IP Routing

    2012 ( 4 )   1 - 6   2012.6

     More details

  • B-6-18 A Dynamic Spectrum Assignment Considering Throughput and Providers' Profit in WiFi/WiMAX Integrated Network

    Takemoto Hiroaki, Kawano Keita, Kinoshita Kazuhiko, Murakami Koso

    Proceedings of the IEICE General Conference   2012 ( 2 )   18 - 18   2012.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • On-demand Configuration Feature of Target Programs Manageable for Teachers on Application Execution Control System

    2011   59 - 66   2011.11

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • A Fair and Efficient Spectrum Assignment for WiFi/WiMAX Integrated Networks Reviewed

    K. Kinoshita, M. Nakagawa, K. Kawano, K. Murakami

    Proceedings of the 6th International Conference on Systems and Networks Communications (ICSNC 2011)   117 - 121   2011.10

     More details

  • A Spectrum Sharing Method Considering Handover in WiFi/WiMAX Integrated Network

    NAKAGAWA Masashi, KAWANO Keita, KINOSHITA Kazuhiko, MURAKAMI Koso

    IEICE technical report   110 ( 448 )   211 - 216   2011.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    With advances in wireless communication technologies, people can use multimedia services not only via wired networks but also via wireless networks such as Cellular, WiMAX, and WiFi. On the other hand, however, lack of spectrum resources becomes an important problem for future wireless networks. To overcome this problem, dynamic spectrum sharing method based on genetic algorithm in which a WiFi system temporarily uses a spectrum band of WiMAX system in WiFi/WiMAX integrated network has been proposed. However, this method does not take the handover of users into account. In this paper, we enhance the spectrum sharing method to improve fairness in addition to provide higher throughput considering handover. Finally we confirm the effectiveness of the proposed method by simulation experiments.

    CiNii Article

    CiNii Books

    researchmap

  • Construction of Integrated Authentication System to Realize Permanent ID in Okayama University

    ( 15 )   171 - 175   2011

     More details

  • Teacher Configurable Execution Control System for Application Software on Educational Windows PCs

    2010   1 - 8   2010.12

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • A Spectrum Sharing Method Considering Intersystem Fairness in WiFi/WiMAX Integrated Network

    NAKAGAWA Masashi, KAWANO Keita, KINOSHITA Kazuhiko, MURAKAMI Koso

    IEICE technical report   110 ( 190 )   85 - 90   2010.8

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    With advances in wireless communication technologies, people can use multimedia services not only via wired networks but also via wireless networks such as Cellular, WiMAX, and WiFi. On the other hand, however, lack of spectrum resources becomes an important problem for future wireless networks. To overcome this problem, dynamic spectrum sharing method based on genetic algorithm in which a WiFi system temporarily uses a spectrum band of WiMAX system in WiFi/WiMAX integrated network has been proposed. However, this method does not take the fairness between WiFi system and WiMAX system into account. In this paper, we enhance the spectrum sharing method to consider intersystem fairness in addition to provide higher throughput. Finally we confirm the effectiveness of the proposed method by simulation experiments.

    CiNii Article

    CiNii Books

    researchmap

  • A Dynamic Spectrum Assignment Method Based on Call Blocking Probability Prediction in WiFi/WiMAX Integrated Networks Reviewed

    Kazuhiko Kinoshita, Yuichi Kanamori, Keita Kawano, Koso Murakami

    2010 Proceedings of 19th International Conference on Computer Communications and Networks   2010.8

     More details

  • A Solution for Mail Forwarding Problem of SPF by Tracing Recipient Addresses Reviewed

    Takumi Seike, Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, Motonori Nakamura

    2010 10th IEEE/IPSJ International Symposium on Applications and the Internet   2010.7

     More details

    Publisher:IEEE  

    DOI: 10.1109/saint.2010.22

    researchmap

  • An effective spectrum sharing method for WiFi/WiMAX interworking mesh network Reviewed

    Kazuhiko Kinoshita, Masanori Yoshimoto, Koso Murakami, Keita Kawano

    2010 8th IEEE International Conference on Industrial Informatics   2010.7

     More details

  • B-6-130 Routing and Channel Assignment for WiMAX/WiFi Interworking Mesh Network

    Sugimoto Takafumi, Kawano Keita, Kinoshita Kazuhiko, Murakami Koso

    Proceedings of the IEICE General Conference   2010 ( 2 )   130 - 130   2010.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • A Dynamic Spectrum Assignment based on Loss Probability Prediction in WiFi/WiMAX Integrated Network

    KANAMORI Yuichi, KAWANO Keita, KINOSHITA Kazuhiko, MURAKAMI Koso

    IEICE technical report   109 ( 448 )   49 - 54   2010.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, as wireless systems diversifies, an integrated wireless network which uses some wireless systems selectively to provide seamless accesses and an effective services to users receives much attention. However, by the spread of multimedia communications via wireless systems leads the spectrum shortage moreover. Although each system uses an individual spectrum prescribed by radio law to avoid radio interference, a number of unused spectrum bands exist on a certain time and/or space in each system. To overcome this problem, dynamic spectrum access technology which can provide an effective spectrum assignment receives much attention. In this paper, we propose a dynamic spectrum assignment method in which a WiFi system temporarily uses a spectrum band of the WiMAX system in WiFi/WiMAX integrated networks to reduce call loss probability of multimedia communication services. The proposed method assigns additional spectrum from WiMAX to WiFi access points based on loss probability prediction.

    CiNii Article

    CiNii Books

    researchmap

  • Execution Control System for Application Software Considering the Number of Concurrent Use on Educational Windows PCs

    SEKIYA AKIHITO, KAWAKAMI TAKASHI, KAWANO KEITA, YAMAI NARIYOSHI

    2010 ( 1 )   1 - 6   2010.2

  • A Dynamic Spectrum Assignment in WiFi/WiMAX Integrated Network for Multimedia Services

    KANAMORI Yuichi, KAWANO Keita, KINOSHITA Kazuhiko, MURAKAMI Koso

    IEICE technical report   109 ( 60 )   89 - 94   2009.5

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    With advances in communication technologies, network services provided via the Internet have been widely diversified, and people can use these services not only via wired networks but also via wireless networks. There are several wireless systems in practical use such as Cellular, WiMAX and WiFi. Although these wireless network systems have developed independently of each other, they should be integrated for seamless access by users. On the other hand, each system uses an individual spectrum prescribed by law to avoid radio interference. To overcome this problem, dynamic spectrum access technology receives much attention. We propose a dynamic spectrum assignment method in which a WiFi system temporarily uses a spectrum band of the WiMAX system in WiFi/WiMAX integrated networks to reduce call blocking probability of multimedia communication services. We confirm the effectiveness of the proposed method by simulation experiments.

    CiNii Article

    CiNii Books

    researchmap

  • B-6-87 An Effective Spectrum Assignment based on Genetic Algorithm for WiMAX/WiFi Intergrated Network

    Nakagawa Masashi, Kawano Keita, Kinoshita Kazuhiko, Murakami Koso

    Proceedings of the IEICE General Conference   2009 ( 2 )   87 - 87   2009.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • Configuration of Redundant Network in Okayama University via Regional IXes and SINET

    YAMAI Nariyoshi, OKAYAMA Kiyohiko, JIN Yong, KAWANO Keita, OOSUMI Yoshihiro

    IPSJ SIG Technical Reports   4   113 - 118   2009.2

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Okayama University has been operating an external link and many inter-campus links via Science Information Network (SINET) and regional Internet eXchanges (IXes) operated by local governments. However, since there were no redundant links for them, we often experienced problems that external connections and inter-campus connections failed in case of some troubles on these links. To overcome these problems, we added a link between Misasa Campus and SINET via regional IXes and Tottori University in addition to the external link between Tsushima Campus and SINET, so that made redundant logical links for the external link and the inter-campus link between Tsushima and Misasa Campuses. According to operations test, we confirmed fault tolerance of these links was improved.

    CiNii Article

    CiNii Books

    researchmap

  • A Solving Method for SPF Forwarded Mail Problem by Tracing Recipient Addresses

    SEIKE Takumi, OKAYAMA Kiyohiko, KAWANO Keita, NAKAMURA Motonori, YAMAI Nariyoshi

    IPSJ SIG Technical Reports   4   119 - 124   2009.2

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    Recently, one of sender authentication methods called SPF has been popularized as Anti-spam technology. However, SPF has a problem that the forwarded e-mail could not be authenticated. In this paper, we propose a solving method for SPF forwarded mail problem by tracing changing history of recipient address. According to the experiments, 88.3% of mails were authenticated with in the proposed method, and 69.5% of mails failed by the original SPF were authenticated in the proposed method.

    CiNii Article

    CiNii Books

    researchmap

  • An Effective Spectrum Sharing Method in WiMAX/WiFi Interworking Mesh Network

    YOSHIMOTO Masanori, KAWANO Keita, KINOSHITA Kazuhiko, MURAKAMI Koso

    IEICE technical report   108 ( 457 )   395 - 398   2009.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    For advanced mobile multimedia services, it is expected that wireless access networks have much wider bandwidth. As a promising technology to realize such a network, a mesh network based on WiMAX or WiFi has attracted attention over the years. Moreover, WiMAX/WiFi interworking mesh network where some APs connect to WiMAX base station as a gateway to the Internet has been proposed and spotlighted. In this paper, we propose the effective spectrum sharing method in such a WiMAX/WiFi interworking mesh network by using the dynamic spectrum access technology in order to improve the network throughput. Finally, we show the effectiveness of the proposed method by simulation experiments.

    CiNii Article

    CiNii Books

    researchmap

  • An Effective Dynamic Spectrum Assignment in WiFi/WiMAX Integrated Networks Reviewed

    Yuichi Kanamori, Keita Kawano, Kazuhiko Kinoshita, Koso Murakami

    2009 Eighth International Conference on Networks   2009

     More details

  • A spectrum assignment method based on genetic algorithm in WiMAX/WiFi integrated network Reviewed

    Masashi Nakagawa, Kazuhiko Kinoshita, Koso Murakami, Keita Kawano

    Proceedings of the 5th international student workshop on Emerging networking experiments and technologies - Co-Next Student Workshop '09   2009

     More details

    Publisher:ACM Press  

    DOI: 10.1145/1658997.1659004

    researchmap

  • Implementation of Okayama University E-mail Service using Google Apps

    Journal for academic computing and networking   ( 13 )   111 - 115   2009

     More details

  • A Sending Timing Control Method of Mobility Management Messages for Large-Scale Mobile Networks

    HAMAGUCHI Wataru, KAWANO Keita, KINOSHITA Kazuhiko, YAMAI Nariyoshi

    IEICE technical report   108 ( 359 )   83 - 88   2008.12

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    It is necessary to manage the mobility of a moving network efficiently. The traditional method achieves it in a distributed manner using multiple routers called MAPs (Mobility Anchor Points). However, especially when the moving network having a lot of MNs (Mobile Nodes) moves and then changes its MAP, the traditional method has a problem. It takes a lot of time to resume these MNs' session after MAP handover, causing many lost packets. This is because many MNs send their mobility management messages simultaneously in that case. To address this problem, this paper proposes a method that controls a sending timing of MNs' mobility management messages, according to their traffic volumes. We implemented computer simulation experiments to confirm the effectiveness of the proposed method. As a result, we confirmed that the proposed method can reduce the number of lost packets efficiently.

    CiNii Article

    CiNii Books

    researchmap

  • A distributed mobility management scheme for large-scale Mobile Networks Reviewed

    Keita Kawano, Kazuhiko Kinoshita, Nariyoshi Yamai

    2008 33rd IEEE Conference on Local Computer Networks (LCN)   2008.10

     More details

  • An Anchor Point Selection Method for Efficient Distributed Management of Network Mobility

    HAMAGUCHI Wataru, KAWANO Keita, KINOSHITA Kazuhiko, YAMAI Nariyoshi

    IEICE technical report   107 ( 524 )   13 - 18   2008.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    It is necessary to manage the mobility of a moving network having a lot of MNs (Mobile Nodes) efficiently. We have proposed a method that distributedly manages the mobility of MNs within a moving network using multiple MAPs (Mobility Anchor Points) whose management areas partially overlap with each other. The traditional method, however, has a problem that it does not have sophisticated MAP selection method in multi-layered MAPs environment. This disturbs the efficient reduction of the number of lost packets during handovers because the traditional method cannot effectively use higher-level MAPs having wider management areas. To address this problem, this paper proposes a method that lets an MN select its MAP according to its traffic volume. We implemented computer simulation experiments to confirm the effectiveness of the proposed method. As a result, we confirmed that the proposed method can reduce the number of lost packets efficiently thanks to effective use of higher-level MAPs.

    CiNii Article

    CiNii Books

    researchmap

  • Delivery Path Analysis of E-mail for Spam Mail Filtering

    SEIKE Takumi, HARUKUNI Tatsuya, OKAYAMA Kiyohiko, KAWANO Keita, NAKAMURA Motonori, YAMAI Nariyoshi

    IEICE technical report   107 ( 525 )   443 - 448   2008.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Spam mails which bother us are dramatically been increasing. Filtering is one of the effective Anti-spam method. But if it based on analyzing the body of mail, some legitimate mails are not deliver to destination. In this thesis, we focused on Received field in the mail header, and analyze the delivery path. This paper presents delivery delay time at a legitimate mail server tends to be a constant. Furthermore, spam mails delivery delay time are dispersedly. Additionally, we described some spam mais uses wrong summer time, and have special count of Received fields.

    CiNii Article

    CiNii Books

    researchmap

  • An Effective Spectrum Sharing Method for WiMAX/WLAN Integrated Network using Cognitive Radio Technology

    YAMADA Tsuyoshi, KAWANO Keita, KINOSHITA Kazuhiko, MURAKAMI Koso

    IEICE technical report   107 ( 524 )   325 - 328   2008.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, wireless systems develop and multimedia communications spread more and more. Moreover, WiMAX/WLAN integrated network which uses WiMAX and WLAN seamlessly is expected. Although it allows users to select an adequate access system, the number of the unused spectrum band may exists on a certain time and space in each system. Therefore, it is said that the utilization efficiency of the radio frequency spectrum is not so improved. In this paper, we consider the effective usage of the radio frequency spectrum by using cognitive radio technology and propose the effective spectrum sharing method which allocates the unused band of WiMAX to WLAN. Finally, we confirm the effectiveness of the proposed method by simulation experiments.

    CiNii Article

    CiNii Books

    researchmap

  • B-6-55 A Dynamic Spectrum Assignment using Cognitive Radio Technology to reduce Call Dropping Probability for Multimedia Service

    Kanamori Yuichi, Yamada Tsuyoshi, Kawano Keita, Kinoshita Kazuhiko, Murakami Koso

    Proceedings of the IEICE General Conference   2008 ( 2 )   55 - 55   2008.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • An Anti-Spam Method with SMTP Session Abort Reviewed

    N. Yamai, K. Okayama, T. Seike, K. Kawano, M. Nakamura, S. Maruyama

    Proceedings of the MIT Spam Conference 2008 (SC 2008)   2008.3

     More details

  • PCの仮想化環境によるUNIX系OSの演習環境の構築

    甲本卓也, 籠谷裕人, 岡山聖彦, 河野圭太

    電気・情報関連学会中国支部連合大会講演論文集(CD-ROM)   59th   2008

  • Handoff Performance Enhancement by using IEEE 802.11e for TCP-based Streaming Services

    YOSHIMOTO Masanori, KAWANO Keita, KINOSHITA Kazuhiko, MATSUDA Takahiro, MURAKAMI Koso

    IEICE technical report   107 ( 311 )   59 - 62   2007.11

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Streaming services in mobile networks have been realizing with wider bandwidth of wireless networks. Especially, from the perspective of user-friendliness, they can be widely accepted via some TCP-based protocols such as HTTP. However, the throughput of TCP-based communication on heterogeneous wireless networks is drastically degraded by decreasing of TCP congestion window size (cwnd) because of packet losses due to handoff. In this paper, we proposed the method to immediately increase the cwnd by using IEEE 802.11e EDCA. It can be implemented without extension of the existing TCP. Finally, we show the effectiveness of the proposed method by simulation experiments.

    CiNii Article

    CiNii Books

    researchmap

  • Handoff Performance Enhancement for TCP-based Streaming Services in Heterogeneous Networks Reviewed

    M. Yoshimoto, K. Kawano, K. Kinoshita, T. Matsuda, K. Murakami

    Proceedings of the 32nd IEEE Conference on Local Computer Networks (LCN 2007)   703 - 707   2007.10

     More details

  • B-6-7 A Management Router Selection Method Considering Traffic Volume for Distributed Network Mobility Management

    Hamaguchi Wataru, Kawano Keita, Kinoshita Kazuhiko, Yamai Nariyoshi

    Proceedings of the IEICE General Conference   2007 ( 2 )   7 - 7   2007.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • B-6-8 Handoff Performance Enhancement for TCP-based Streaming Services in Heterogeneous Networks

    Yoshimoto Masanori, Kawano Keita, Kinoshita Kazuhiko, Matsuda Takahiro, Murakami Koso

    Proceedings of the IEICE General Conference   2007 ( 2 )   8 - 8   2007.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • A Distributed Mobility Management Scheme for Mobile Networks with Many Mobile Network Nodes

    KAWANO Keita, KINOSHITA Kazuhiko, YAMAI Nariyoshi

    IEICE technical report   106 ( 577 )   47 - 52   2007.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    A network mobility management scheme using Hierarchical Mobile IPv6 has been proposed to overcome problems with route optimization and micromobility for moving networks. It manages the mobility of a moving network using a router located in a network the moving network moves to (Mobility Anchor Point or MAP). The traditional scheme, however, cannot manage the mobility of a moving network efficiently, especially when the moving network has many nodes and/or these nodes communicate with many correspondent nodes. This paper proposes a distributed network mobility management scheme overcoming this problem, by managing the mobility of a moving network using multiple MAPs.

    CiNii Article

    CiNii Books

    researchmap

  • A Multicast Tree Reconstruction Method for Many-to-Many Mobile Communications with Delay Constraint Reviewed

    Tsuyoshi Yamada, Shoji Yoshimura, Keita Kawano, Kazuhiko Kinoshita, Koso Murakami

    Proceedings. 2006 31st IEEE Conference on Local Computer Networks   2006.11

     More details

  • Recostruction of Core-baced Multicast Tree for Many-to-Many Mobile Communications with Delay Constraint

    YAMADA Tsuyoshi, YOSHIMURA Shoji, KAWANO Keita, KINOSHITA Kazuhiko, MURAKAMI Koso

    IEICE technical report   106 ( 310 )   111 - 114   2006.10

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, as the performance of mobile hosts rapidly improves and the bandwidth of wireless access networks grows up, the expectation for mobile multimedia communication services including many-to-many communications such as video-conferencing begins building. Multicasting is one of the key technologies to provide such services efficiently. The existing multicast protocol called Core Based Trees (CBT) is suitable for many-to-many communications in wired networks. In mobile networks, however, it has problems that the number of links of the multicast tree may increase and the end-to-end delay may not satisfy the QoS requirement from users due to tree reconstruction after handovers. Thus, we propose to change the core in consideration of the delay from the core to member nodes when a handover occurs and a new path is constructed. As a result, the proposed method decreases both the number of members who do not satisfy the delay constraint and the average number of total links of the multicast tree.

    CiNii Article

    CiNii Books

    researchmap

  • A LAN Access Control System with Protection of Restricted Services from Guest Users

    KIZAWA Masao, YAMAI Nariyoshi, OKAYAMA Kiyohiko, DOI Masayuki, KAWANO Keita, OOSUMI Yoshihiro

    41   97 - 102   2006.5

     More details

    Language:Japanese   Publisher:Information Processing Society of Japan (IPSJ)  

    LAN access control systems are often used at many organizations such as universities, to provide network accessibility to both insiders and guest users. However, most of existing LAN access control systems have some problems such that guest users can access services restricted to insiders. In this paper, we propose a LAN access control system to protect restricted services from guest users, without modifying any existing servers by applying NAT function conditionally. According to a field testing, the proposed system has been confirmed to be effective and practical.

    CiNii Article

    CiNii Books

    researchmap

  • B-6-78 A Delay-Constrained Multicast Routing for Mobile Many-to-Many Multicast Communication

    Yamada Tsuyoshi, Kawano Keita, Kinoshita Kazuhiko, Murakami Koso

    Proceedings of the IEICE General Conference   2006 ( 2 )   78 - 78   2006.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • Several Methods for Transparently Establishing Virtual Links on Hierarchical VPN

    3 ( 1 )   2006

     More details

    Language:Japanese  

    CiNii Article

    researchmap

  • センター紹介 岡山大学総合情報基盤センター

    河野 圭太, 岡山 聖彦, 山井 成良

    学術情報処理研究   ( 10 )   107 - 111   2006

     More details

    Language:Japanese   Publisher:学術情報処理研究編集委員会  

    CiNii Article

    CiNii Books

    researchmap

  • B-6-2 An Efficient Network Mobility Management Scheme using Hierarchical Mobile IPv6

    Kawano Keita, Kinoshita Kazuhiko, Yamai Nariyoshi

    Proceedings of the IEICE General Conference   2 - 2   2006

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • A Method of Dynamic Interconnection of VLANs for Large Scale VLAN Environment Reviewed

    Okayama Kiyohiko, Yamai Nariyoshi, Miyashita Takuya, Kawano Keita, Okamoto Takuji

    Information and Telecommunication Technologies   427 - 432   2005.11

     More details

    Language:English   Publisher:IEEE  

    <p>VLAN (Virtual LAN) is a technology which can configure logical networks independent of the physi cal network structure. With VLAN, users in common spaces (such as meeting rooms) can access to their department networks temporarily because changing of logical network structure is achieved only by con figuration of VLAN switches. However, in the general configuration method, because VLANs are managed statically by admin istrators, various problems such as high adminis trative cost and conflict or insufficiency of VLAN IDs may arise especially in large scale organiza tions where VLANs are managed by each depart ment. To solve these problems, we propose a method which provides an interconnection between a tem porary configured VLAN in a common space and a VLAN of a user's department. In the proposed method, a user in a common space can access to his/her department network seamlessly by convert ing a temporary VLAN-ID in the common space and a VLAN-ID used in his/her department each other automatically. The effectiveness of the pro posed method is confirmed by the experiment on the actual network using VLAN managers, VLAN ID converters and authentication servers based on the proposed method. </p>

    DOI: 10.1109/apsitt.2005.203697

    CiNii Article

    researchmap

  • LL-008 A Routing Method Considering QoS and Access Policy on Hierarchical Virtual Private Networks

    Okayama Kiyohiko, Yamai Nariyoshi, Kawano Keita, Ishibashi Hayato, Matsuura Toshio

    ( 4 )   293 - 296   2005.8

     More details

    Language:Japanese   Publisher:Forum on Information Technology  

    CiNii Article

    CiNii Books

    researchmap

  • A Mobile Multicast Routing with Delay Constraint

    YOSHIMURA Shoji, UENO Hajime, KAWANO Keita, KINOSHITA Kazuhiko, MURAKAMI Koso

    IEICE technical report   105 ( 195 )   17 - 20   2005.7

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Mobile multicasting is one of key technologies to provide broadband communication services efficiently. In recent years, some mobile multicast protocols with mobile IP have been proposed. In these protocols, however, the total path length from a multicast source to a Foreign Agent is not considered. They are unsuitable for broadband communication services in which transmission delay has great influences on the QoS. This paper proposes a new mobile multicast routing. It constructs an efficient multicast tree while satisfying the delay constraint by a simple procedure. Finally, simulation experiments show the excellent performance of the proposed method.

    CiNii Article

    CiNii Books

    researchmap

  • B-6-86 A Mobile Multicast Routing for Broadband Communication Services

    Yoshimura Shoji, Ueno Hajime, Nomura Takanori, Kawano Keita, Kinoshita Kazuhiko, Murakami Koso

    Proceedings of the IEICE General Conference   2005 ( 2 )   86 - 86   2005.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • An Autonomous Load Balancing Criteria Configuration Method for Multilevel Hierarchical Mobility Management

    KAWANO Keita, KINOSHITA Kazuhiko, MURAKAMI Koso

    IEICE technical report   104 ( 690 )   285 - 288   2005.2

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    We have previously proposed a multilevel hierarchical mobility management scheme to balance mobility management load in wide-area mobile networks. Our scheme manages the mobility of Mobile Terminals (MTs) using mobility management routers placed hierarchically in the networks (Mobility Anchor Points or MAPs). More precisely, in our scheme, the mobility of an MT is managed using a MAP matched to the MT's mobility characteristics. This paper proposes an autonomous load balancing criteria configuration method. The proposed method allows our scheme to work well, even when the MAP domains intricately overlap with each other to increase system robustness.

    CiNii Article

    CiNii Books

    researchmap

  • Mobile multicast routing for broadband communication services Reviewed

    S Yoshimura, H Ueno, K Kawano, K Kinoshita, K Murakami

    ICCCN 2005: 14th International Conference on Computer Communications and Networks, Proceedings   598 - 598   2005

     More details

    Language:English   Publisher:IEEE  

    Web of Science

    researchmap

  • Management and Provision of Access Point Information Considering Service Continuity Reviewed

    H. Ueno, T. Nomura, K. Kawano, K. Kinoshita, K. Murakami

    Proceedings of the 1st International Workshop on Mobility Aware Technologies and Applications (MATA 2004)   19 - 24   2004.10

     More details

  • An Enhanced Mobility Estimation Method for Hierarchical Mobility Management Reviewed

    K. Kawano, K. Kinoshita, K. Murakami

    Proceedings of the IASTED International Conference on Communication Systems and Applications (CSA 2004)   30 - 35   2004.7

     More details

  • B-6-30 A Study on Management and Provision of Access Point Information for Selecting Radio Communication System with Consideration to Continuity of Service Areas

    Ueno Hajime, Nomura Takanori, Kawano Keita, Kinoshita Kazuhiko, Murakami Koso

    Proceedings of the IEICE General Conference   2004 ( 2 )   30 - 30   2004.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • Multilevel hierarchical mobility management scheme in complicated structured networks Reviewed

    K. Kawano, K. Kinoshita, K. Murakami

    29th Annual IEEE International Conference on Local Computer Networks   2004

     More details

    Publisher:IEEE (Comput. Soc.)  

    DOI: 10.1109/lcn.2004.83

    Web of Science

    researchmap

  • A Design for Integrated Wireless Network with Flexible Bandwidth Assignment Reviewed

    T. Nomura, K. Kawano, K. Kinoshita, K. Murakami

    Proceedings of the IASTED International Conference on Communication Systems and Networks (CSN 2003)   125 - 130   2003.9

     More details

  • SB-14-5 A Distributed IP Mobility Management Scheme for Efficient Utilization of Network Resources

    Kawano Keita, Kinoshita Kazuhiko, Murakami Koso

    Proceedings of the IEICE General Conference   2003 ( 2 )   "SE - 14"-"SE-15"   2003.3

     More details

    Language:English   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • A Design for Integrated Wireless Network with Flexibile Bandwidth Assignment

    Nomura Takanori, Kawano Keita, Kinoshita Kazuhiko, Murakami Koso

    Proceedings of the IEICE General Conference   2003 ( 2 )   87 - 87   2003.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • A Distributed IP Mobility Management in Multilevel Hierarchy Focusing on the Speed of Mobile Terminals

    KAWANO Keita, KINOSHITA Kazuhiko, MURAKAMI Koso

    IEICE technical report   102 ( 129 )   17 - 20   2002.6

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    It is effective to distribute several mobility manageable routers within a wide area network with multilevel hierarchy like mobile communication networks with Hierarchical Mobile IPv6 (HMIPv6). This enables the network to manage Mobile Terminals (MTs) in a flexible manner according to their different mobility scenarios, and reduces the number of signaling messages more efficiently. The purposeful management, however, may be disturbed with present HMIPv6, because HMIPv6 lets MTs select their MAP. In this paper, a method which achieves the purposeful management by focusing on the speed of MTs is proposed. This aims to reduce the number of signaling messages without load concentration at any particular routers.

    CiNii Article

    CiNii Books

    researchmap

  • A multilevel hierarchical distributed IP mobility management scheme for wide area networks Reviewed

    K. Kawano, K. Kinoshita, K. Murakami

    Proceedings. Eleventh International Conference on Computer Communications and Networks   2002

     More details

  • An Efficient Method to Search for the Location of Multimedia Services Considered with Link State Information

    KAWANO Keita, MASUDA Tomokazu, KINOSHITA Kazuhiko, MURAKAMI Koso

    Technical report of IEICE. SSE   100 ( 394 )   55 - 60   2000.10

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    Recently, the multimedia communication services have much attention with the advancement of high speed networks and the enhancement of users' request for communication networks. To have these services comfortably, it is desirable that networks guarantee multiple QoS requirements. Moreover, the method to search for the location of services considered with multiple QoSs is also required. in general, QoS required for multimedia communication services includes transmission delay, delay jitter, movie quality and so on. Traditional searching methods, however, do not consider link state information. In this paper, we propose an efficient method to search for the location of multimedia communication services by utilizing link state information. It can know the location fast by adopting the method which searches adjacent nodes first. Finally, we show that the proposed method has good performance by simulation experiments.

    CiNii Article

    CiNii Books

    researchmap

  • An Efficient Method to Search for the Location of Network Services with Multiple QoSs Guarantee Reviewed

    K. Kawano, T. Masuda, K. Kinoshita, K. Murakami

    The 8th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2000)   665 - 674   2000.10

     More details

  • Service Searching Considered with Link State Information in Network Maps

    Kawano K., Masuda T., Kinoshita K., Murakami K.

    Proceedings of the IEICE General Conference   2000 ( 2 )   118 - 118   2000.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • B-7-151 Network Map Design for QoS Routing

    Masuda T., Kawano K., Tanioka H., Kinoshita K., Takine T., Murakami K.

    Proceedings of the IEICE General Conference   1999 ( 2 )   260 - 260   1999.3

     More details

    Language:Japanese   Publisher:The Institute of Electronics, Information and Communication Engineers  

    CiNii Article

    CiNii Books

    researchmap

  • Network map design for QoS routing on WAN Reviewed

    T. Masuda, K. Kawano, H. Tanioka, K. Kinoshita, T. Takine, K. Murakami

    Fifth Asia-Pacific Conference on ... and Fourth Optoelectronics and Communications Conference on Communications,   1999

     More details

    Publisher:IEEE  

    DOI: 10.1109/apcc.1999.824500

    researchmap

▼display all

Presentations

  • 大学における利用者認証の現状とこれから

    NII学術情報基盤オープンフォーラム  2020.6 

     More details

  • パスワード不要のシンプルで堅牢な認証システム構築に向けて

    大学ICT推進協議会2019年度年次大会  2019.12 

     More details

  • 岡山大学における多要素認証の導入に向けた取り組み

    第11回統合認証シンポジウム  2018.3 

     More details

  • [奨励講演]公衆無線LANのバックホール仮想化における異種サービスを考慮した帯域割り当て手法

    電子情報通信学会 情報通信マネジメント研究会  2017 

     More details

  • OpenAMとの連携によるLoAを考慮したShibboleth V3の認証

    大学ICT推進協議会 認証連携部会 2015年度第2回部会  2016.3 

     More details

  • ShibbolethとOpenAMの連携による認証レベルを考慮した統合認証システムの構築

    大学ICT推進協議会 2016年度年次大会  2016 

     More details

  • 教育用PCにおける電子証明書の信頼性操作と複数の証明書チェインによる柔軟なアプリケーション実行制御

    情報処理学会 インターネットと運用技術研究会  2016 

     More details

  • 高密度無線LAN環境における異種サービスを考慮した仮想アクセスポイント構成手法

    マルチメディア、分散、協調とモバイル(DICOMO2016)シンポジウム  2016 

     More details

  • 動画を活用した学習高度化に向けた環境整備

    大学ICT推進協議会 2016年度年次大会  2016 

     More details

  • 異種無線システムを考慮したカバレッジ最適化に関する一検討

    マルチメディア,分散,協調とモバイル(DICOMO2015)シンポジウム  2015 

     More details

  • [ポスター講演]基地局間協調送受信を考慮した周波数共用による公平性向上

    電子情報通信学会 ネットワークシステム研究会  2015 

     More details

  • 岡山大学事務情報システムにおける多要素認証の導入

    大学ICT推進協議会 2014年度年次大会  2014.12 

     More details

  • BCP対応の大学情報バックアップサービスの構築

    大学ICT推進協議会 2014年度年次大会  2014 

     More details

  • 岡山大学 ケーススタディ ~生涯IDを考慮した統合認証の取り組み~

    学認CAMP 2013  2013.9 

     More details

  • 岡山大学における大規模認証ネットワークの運用と課題(2)

    情報処理学会 インターネットと運用技術研究会  2013 

     More details

  • 岡山大学における統合認証の取り組み

    大学ICT推進協議会 2012年度年次大会  2012.12 

     More details

  • SPのシボ化を調達した場合

    NIIオープンハウス  2012.6 

     More details

  • スタートアップ事例紹介

    学認シンポジウム2012  2012.3 

     More details

  • 迷惑メール判定精度向上のためのメッセージ中URLのドメイン登録日検索システム

    第5回インターネットと運用技術シンポジウム(IOTS 2012)  2012 

     More details

  • 大学ネットワークにおける匿名IEEE802.1X認証システムの実装

    2012年電子情報通信学会総合大会  2012 

     More details

  • 認証連携の「いろは」とケースタディ

    大学ICT推進協議会 2012年度年次大会  2012 

     More details

  • 岡山大学における統合認証の取り組みと学認との連携

    SINET&学認説明会  2011.12 

     More details

  • 岡山大学における認証・ロケーションフリーネットワークの構築

    第15回学術情報処理研究集会  2011 

     More details

  • 岡山大学における情報通信インフラ整備のためのWLAN導入例

    メルー・ネットワークス無線LAN導入事例セミナー  2010.10 

     More details

  • DNSとの連携による動的ファイアウォールシステムの提案

    コンピュータセキュリティシンポジウム2010(CSS 2010)  2010 

     More details

  • WiMAX/WiFi統合網におけるスループット向上のための遺伝的アルゴリズムを用いた周波数割当方式

    電子情報通信学会 ネットワークシステム研究会  2009 

     More details

  • 無線メッシュネットワークにおける通信量を考慮した優先度制御方式

    平成20年度電気・情報関連学会中国支部第59回連合大会  2008 

     More details

  • 大規模移動ネットワークのための経路制御メッセージ送信待ち時間制御手法

    平成20年度電気・情報関連学会中国支部第59回連合大会  2008 

     More details

  • SMTPセッションの強制切断によるspamメール対策手法

    第5回情報科学技術フォーラム(FIT 2006)  2006 

     More details

  • サービスの連続性を考慮したアクセスポイント情報管理提供法

    電子情報通信学会 ネットワークシステム研究会/無線通信システム研究会  2004 

     More details

  • サービスエリアの連続性を考慮したアクセスポイント情報管理提供法

    2004年電子情報通信学会総合大会  2004 

     More details

  • 異種アクセス網間での負荷分散を考慮した無線統合ネットワーク構成法

    電子情報通信学会 ネットワークシステム研究会/無線通信システム研究会  2003 

     More details

  • 多階層分散型IPモビリティ制御方式のための端末移動特性類推手法に関する検討

    電子情報通信学会 コミュニケーションクオリティ研究会/モバイルマルチメディア通信研究会  2002 

     More details

  • ホロニックネットワークにおける端末の移動を考慮した経路切り替え方式

    2002年電子情報通信学会総合大会  2002 

     More details

▼display all

Research Projects

  • Development of Integrated Authentication System Allowing Users and Services to Customize Its Authentication Mechanism

    Grant number:26330158  2014.04 - 2017.03

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    Kawano Keita, NAKAMURA Motonori

      More details

    Grant amount:\2080000 ( Direct expense: \1600000 、 Indirect expense:\480000 )

    In an integrated authentication environment where authentication for a variety of systems is enforced using a single authentication server, selecting authentication methods in consideration of users and services characteristics enables a secure and convenient federated authentication. We proposed a system that enables such feature by incorporating a grouping function of authentication methods into Shibboleth IdP V2, widely deployed at academic institutions like universities, and developed its prototype. We also conducted similar consideration for Shibboleth IdP V3, released during the research period. As a result, we proposed a system that enables that feature efficiently, and introduced it into the integrated authentication system of our university.

    researchmap

  • An anti-spam method against sophisticated techniques

    Grant number:23500122  2011 - 2013

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (C)

    YAMAI NARIYOSHI, OKAYAMA Kiyohiko, KAWANO Keita, NAKAMURA Motonori, MINDA Masato

      More details

    Grant amount:\5200000 ( Direct expense: \4000000 、 Indirect expense:\1200000 )

    As an anti-spam method, a filtering technology based on URLs for advertisement, phishing, and so on (target URLs) is frequently used. Recently, however, to avoid this technology, spammers use a sophisticated countermeasure such as frequent change of target URLs. Therefore, a new method against this countermeasure is required. In this research, we established an anti-spam method based on basically unforgeable characteristics such as the registration date of the domain in a target URL, the behavior of the DNS (Domain Name System) server of the domain related to the target URL, and so on.

    researchmap

  • Development of a Practical Inter-organization Anonymous Authentication under Ubiquitous Environment and its Experimental Study

    Grant number:21300004  2009 - 2011

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

    MORIKAWA Yoshitaka, NAKANISHI Toru, NOGAMI Yasuyuki, OKAYAMA Kiyohiko, KAWANO Keita

      More details

    Grant amount:\10140000 ( Direct expense: \7800000 、 Indirect expense:\2340000 )

    This study first researched an efficient anonymous authentication technique based on elliptic curve pairing cryptography. Then, a network protocol based on the anonymous authentication was designed and its practicality was successfully examined. The result of this study will be applied to an advanced but complicated inter-organization network cooperation that requires anonymous authentication such as the wireless LAN roaming between universities.

    researchmap

  • An Efficient Network Mobility Management Scheme based-on Autonomous Collaboration between Mobile Terminals

    Grant number:19700063  2007 - 2008

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Young Scientists (B)

    KAWANO Keita

      More details

    Grant amount:\1910000 ( Direct expense: \1700000 、 Indirect expense:\210000 )

    バスや電車内に設置されたネットワークのように、それに接続する端末数が多い"ネットワーク"が移動する環境では、その移動に伴う通信の断絶を回避するための制御メッセージが同時多発することにより、ネットワーク全体としての通信品質が劣化する。本研究では、端末間で自律的な協調動作をすることにより、この影響を最小限にとどめる手法を提案し、その有効性を確認した。

    researchmap

  • Effective Anti-Spam Method with SMTP Session Abort

    Grant number:17300018  2005 - 2007

    Japan Society for the Promotion of Science  Grants-in-Aid for Scientific Research  Grant-in-Aid for Scientific Research (B)

    YAMAI Nariyoshi, NAKAMURA Motonori, MIYASHITA Takuya, OKAYAMA Kiyohiko, KAWANO Keita

      More details

    Grant amount:\6250000 ( Direct expense: \5800000 、 Indirect expense:\450000 )

    This research project aims to develop an effective anti-spam method with minimal administration. This method introduces SMTP session abort function to obtain the header or the body of a message without actual delivery, in combination with existing techniques organically. This method has the following features.
    1. Speeding up processing
    We have developed a speeding up method of the existing tempfailing technique by introducing a secondary mail gateway (SMG). With this method, the sender would immediately resend the failed messages to the SMG after SMTP session abort, and hence delivery delay would be reduced.
    2. Improving spam detection rate
    Since most of non-resent messages destined to non-existing recipients are spam, we have improved the spam detection rate of the existing tempfailing method by registering them automatically into a distributed collaborative spam database. In addition, we have shown that delivery delay and the number ofReceived fields are possible criteria of spam detection according to delivery path analysis.
    3. Reducing administrative cost
    We have developed an advanced method of retransmission judgment using some header field or the message body obtained on the first delivery attempt. Since this method accepts a message from an untrusted SMTP client even in case of the second time delivery from a different SMTP client, the administrator does not have to keep such SMTP clients in the white list any more. In addition, this method can recover the non-rent messages in case of false positive, by showing their headers or bodies to users.
    4. Suppressing bounce mails
    5. Suppressing address leakage
    We have adopted the existing method that receives all messages even to non-existing recipients and sends bounce mails only if sender authentication by Sender Policy Framework (SPF) succeeds. However, SPF has some drawback that it is difficult to authenticate forwarded messages. We have solved this drawback by tracing recipient addresses in the header.

    researchmap

  • ネットワークの移動を考慮した移動通信制御負荷分散手法に関する研究

    Grant number:17700064  2005 - 2006

    日本学術振興会  科学研究費助成事業  若手研究(B)

    河野 圭太

      More details

    Grant amount:\1500000 ( Direct expense: \1500000 )

    前年度は、多数のMobile Node(MN)が接続されているネットワークが移動する環境において、制御ドメインが互いに部分的に重なり合う複数のMobility Anchor Point(MAP)を利用することにより、制御メッセージの氾濫による制御効率の低下を抑制する分散型ネットワークモビリティ制御方式を提案した。
    今年度は、より効率的な分散型モビリティ制御を実現するために、ネットワーク内に多様な制御ドメインの大きさを持つ複数MAPが展開される状況に着目し、それらの複数MAPを移動ネットワーク内のMN群が効率的に利用するためのMAP選択手法に関して研究を進めた。ここで、ネットワーク内に複数のMAPが存在する環境下では、同一移動ネットワーク内のMN群が、それらのMAPを均一的に分散利用することが望ましいが、その一方で、制御能力(制御ドメインの大きさ)が異なる複数MAPが存在する場合には、MN群が自身の要求に合致する制御能力を持つMAPを利用できることも望まれる。そこで、本研究では、これらの要求を満たすため、移動ネットワーク内の全MN群に対する自身の相対的な通信量を基に、そのMNが利用するMAPを決定する手法を提案した。また、C++を用いたコンピュータシミュレーション実験を行い、提案方式を用いることにより、複数MAPの分散利用を維持しつつ、移動ネットワーク全体としてのパケットロス数を低減できることを確認した。

    researchmap

▼display all

 

Class subject in charge

  • Internet and federated authentication (2024academic year) Fourth semester  - 火3~4

  • Internet and federated authentication (2024academic year) 3rd and 4th semester  - 水9

  • Introduction to Information Processing 1 (2024academic year) 1st semester  - 月1,木1

  • Introduction to Information Processing 1 (2024academic year) 1st semester  - 月4,木4

  • Introduction to Information Processing 2 (2024academic year) Second semester  - 月3~4

  • Introduction to Information Processing 3 (2024academic year) Third semester  - 月1~2

  • Introduction to Information Processing 3 (2024academic year) Third semester  - 月3~4

  • Internet and federated authentication (2023academic year) Fourth semester  - 火3~4

  • Internet and federated authentication (2023academic year) 3rd and 4th semester  - 水9

  • Introduction to Information Processing 1 (2023academic year) 1st semester  - 月1,木1

  • Introduction to Information Processing 1 (2023academic year) Fourth semester  - 火7~8

  • Introduction to Information Processing 1 (2023academic year) 1st semester  - 月6,木6

  • Introduction to Information Processing 1 (2023academic year) 1st semester  - 月4,木4

  • Introduction to Information Processing 2 (2023academic year) Second semester  - 月3~4

  • Introduction to Information Processing 3 (2023academic year) Third semester  - 月1~2

  • Introduction to Information Processing 3 (2023academic year) Third semester  - 月3~4

  • Internet and federated authentication (2022academic year) Fourth semester  - 火3~4

  • Internet and federated authentication (2022academic year) 3rd and 4th semester  - 水9

  • Introduction to Information Processing 1 (2022academic year) 1st semester  - 月4,木4

  • Introduction to Information Processing 1 (2022academic year) Fourth semester  - 火7~8

  • Introduction to Information Processing 1 (2022academic year) 1st semester  - 月6,木6

  • Introduction to Information Processing 2 (2022academic year) Second semester  - 月3~4

  • Introduction to Information Processing 2 (2022academic year) Second semester  - 月5~6

  • Introduction to Information Processing 3 (2022academic year) Third semester  - 月3~4

  • Internet and federated authentication (2021academic year) Fourth semester  - 火3~4

  • Internet and federated authentication (2021academic year) 3rd and 4th semester  - 水9

  • Introduction to Information Processing 1 (2021academic year) 1st semester  - 月4,木4

  • Introduction to Information Processing 1 (2021academic year) 1st semester  - 火7~8

  • Introduction to Information Processing 1 (2021academic year) 1st semester  - 月6,木6

  • Introduction to Information Processing 2 (2021academic year) Second semester  - 月3~4

  • Introduction to Information Processing 2 (2021academic year) Second semester  - 月5~6

  • Introduction to Information Processing 3 (2021academic year) Third semester  - 月3~4

  • Internet and federated authentication (2020academic year) Fourth semester  - 火3,火4

  • Internet and federated authentication (2020academic year) 3rd and 4th semester  - 水9

  • Introduction to Information Processing 1 (2020academic year) 1st semester  - 月4,木4

  • Introduction to Information Processing 1 (2020academic year) 1st semester  - 火7,火8

  • Introduction to Information Processing 1 (2020academic year) 1st semester  - 月6,木6

  • Introduction to Information Processing 2 (2020academic year) Second semester  - 月3,月4

  • Introduction to Information Processing 2 (2020academic year) Second semester  - 月5,月6

  • Introduction to Information Processing 3 (2020academic year) Third semester  - 月3,月4

▼display all