Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Satoshi Matsuura is active.

Publication


Featured researches published by Satoshi Matsuura.


symposium on applications and the internet | 2007

Live E! Project: Establishment of Infrastructure Sharing Environmental Information

Satoshi Matsuura; Hiroki Ishizuka; Hideya Ochiai; Shinichi Doi; Shinichi Ishida; Masaya Nakayama; Hiroshi Esaki; Hideki Sunahara

The Live E! project is an open research consortium among industry and academia to explore the platform to share the digital information related with the Earth and our living environment. We have getting a lot of low cost sensor nodes with Internet connectivity. The deployment of broadband and ubiquitous networks will enable autonomous and global digital information sharing over the globe. In this paper, we describe the technical and operational overview of Live E! project, while discussing the objective, such as education, disaster protection/reduction/recovery or business cases, and goal of this project activity


symposium on applications and the internet | 2009

A Fault Detection System for Large Scale Sensor Networks Considering Reliability of Sensor Data

Masato Yamanouchi; Satoshi Matsuura; Hideki Sunahara

In recent years, sensors have become smaller, more affordable, and widely used. Also, Internet spreads all over the globe, and made possible transfer large data instantly. Thereby, large scale weather sensor networks have been constructible. In this kind of sensor network, we need to consider load balancing, network redundancy, and reliability of sensor data. Using P2P technology is one of the solutions for load balancing and network redundancy. Fault detection is a method for calculating reliability of sensor data. We propose a system that can calculate reliability of sensor data. This system can install method of fault detection by plug-in. It can install and update not only existing method but also new method. In other words, this system is a sustainable fault detection system. In these days, pinpoint heavy rain is occurring frequently. In this paper, we validate a fault detection system at a pinpoint heavy rain. We consider a validation, and improve a plug-in that can be useful at a pinpoint heavy rain. We install the improved plug-in to system, and experiment it using real pinpoint heavy rain data. The result shows that our system can detect 100% of data fault at pinpoint heavy rain which occurred in August 29th, 2008.


symposium on applications and the internet | 2011

A Case Study of UTMesh: Design and Impact of Real World Experiments with Wi-Fi and Bluetooth Devices

Hideya Ochiai; Kenji Matsuo; Satoshi Matsuura; Hiroshi Esaki

This paper presents UTMesh -- a test bed for wireless mesh networking and delay (or disruption) tolerant networking developed in the University of Tokyo. We have customized 51 embedded Linux computers for experiment-oriented use cases, and let them powered by rechargeable batteries in order to flexibly deploy everywhere depending on the experiment scenarios. This paper summarizes the requirements for our test bed design, identifies an operation model of real world experiments, and presents a sample experiment and its results. UTMesh allows many types of real world experiments in a lightweight manner with Linux consoles, software importability and physical portability. This paper describes a link-level measurement study as a sample experiment. It has measured the differences of Wi-Fi multicast/unicast links and Bluetooth links. One of the lessons we must learn from the result is that Wi-Fi unicast sockets sometimes work poorly even if the node can communicate with multicast sockets especially when the network scale becomes large.


asian internet engineering conference | 2006

Live e! project: sensing the earth

Masaya Nakayama; Satoshi Matsuura; Hiroshi Esaki; Hideki Sunahara

The Live E! project is an open research consortium among industry and academia to explore the platform to share the digital information related with the earth and our living environment. We have getting a lot of low cost sensor nodes with Internet connectivity. The deployment of broadband and ubiquitous networks will enable autonomous and global digital information sharing over the globe. In this paper, we describe the technical and operational overview of Live E! project, while discussing the objective, such as education, disaster protection/reduction/recovery or business cases, and goal of this project activity.


mobile data management | 2006

Collecting Adaptive Data for Isolated Wireless Sensors with Patrol Nodes in Live E

Hiroki Ishizuka; Kenji Sasaki; Satoshi Matsuura; Makoto Kamiya; Hideki Sunahara; Hiroshi Esaki

Recently, Technology of sensor networks develops rapidly. In addition, people have started utilizing many kinds of sensors. Sensors independently collect environmental information all over the world. Unfortunately those sensed data are not shared and open to the public. Therefore, we have constructed super-large-scale sensor network system to share sensed data collected from sensors all over the world. We call such a project Live E!. In a part of Live E!, To sense a public area in whole, we assume public objects(mailbox, bus stop, dumpster) uniformly allocate in a district evenly is equipped with a sensor and a wireless device. The public objects often dose not have connectivity to a network. Those are Isolated Wireless Sensor Nodes (ISNs). .. Then, we need to consider the way of collecting from the ISNs. Accordingly, we utilize a Patrol Node (PN) that moves around ISNs, and collects sensed data from ISNs. The ISN stores the sensed data until the time PN comes back. However, because the communication time to the PN depends on the speed of the PN, ISNs can not necessarily transmit all the maintained sensed data to the PN. Therefore, we suggest that the ISN should send adaptive data according to the speed of PN. We propose a technique for transmitting adaptive data depending on the movement of the PN. In addition, we have implemented a prototype of our proposal and verified the effectiveness of our proposed system. Finally, we show that our system improves the performance of the sensor network.


international conference on computer communications and networks | 2016

Enhancement of VPN Authentication Using GPS Information with Geo-Privacy Protection

Yong Jin; Masahiko Tomoishi; Satoshi Matsuura

VPN (Virtual Private Network) technology is well used for remote access to the internal server in order to mitigate intrusion attacks and data breaches. In the current VPN technologies, PKI (Public Key Infrastructure) based certificate authentication and user ID/Password authentication are well used. However, in case of password leakage and lost of mobile devices, those authentication methods cannot effectively prevent the malicious accesses. In this paper, we propose an enhancement method of VPN authentication using GPS (Global Positioning System) information with geo-privacy protection. In this method, the GPS information of the client is used for VPN authentication without leaking the raw GPS coordinates of the client. Specifically, the hash values of GPS coordinate ranges will be registered on the VPN authentication server in order to protect the user geo-privacy. By using the proposed method, the remote access via VPN tunnel can be controlled within all designated areas so that the risk of intrusion attacks can be mitigated significantly. We achieved the GPS coordinates in our lab for one month and checked their hit rates in the GPS coordinate ranges achieved from the Google Maps. The results showed about 99.29% and 92.96% hit rates in the latitude and longitude respectively which are acceptable for real operation.


computer software and applications conference | 2016

Design of a Concealed File System Adapted for Mobile Devices Based on GPS Information

Yong Jin; Masahiko Tomoishi; Satoshi Matsuura

The Internet Security Threat Report by Symantec announced that the number of data breaches increased 23 percent in 2014 and the causes by theft or loss of devices reached to 21 percent. Carrying mobile devices with business data and private information is indispensable for humans social activities nowadays and unexpected data breach is one of the severe ongoing issues in cyber security. In this paper, we propose a concealed file system adapted for mobile devices based on GPS (Global Positioning System) information which is only mountable in the designated area. Differs from conventional encryption technologies, the proposed file system can be completely isolated from the viruses and attacks outside the designated area. Moreover, instead of the GPS information of the designated area, the encrypted hash value will be stored in mobile devices for the privacy concerns. We statistically analyzed the GPS information logged in our lab and defined an algorithm for deciding the designated area without leaking the GPS information. Based on the algorithm, we evaluated the proposed file system using Veracrypt by adding the hash of GPS information indicating the designated area as one of the attributes for mounting authentication. As a result, we confirmed that the proposed file system was mounted with about 91% success rate within average in the designated area even with noise interference.


testbeds and research infrastructures for the development of networks and communities | 2014

AnaVANET: An Experiment and Visualization Tool for Vehicular Networks

Manabu Tsukada; José Santa; Satoshi Matsuura; Thierry Ernst; Kazutoshi Fujikawa

The experimental evaluation of wireless and mobile networks is a challenge that rarely substitutes simulation in research works. This statement is even more evident in vehicular communications, due to the equipment and effort needed to obtain significant and realistic results. In this paper, key issues in vehicular experimental evaluation are analyzed by an evaluation tool called AnaVANET, especially designed for assessing the performance of vehicular networks. This software processes the output of well-known testing tools such as ping or iperf, together with navigation information, to generate geo-aware performance figures of merit both in numeric and graphical forms. Its main analysis capabilities are used to validate the good performance in terms of delay, packet delivery ratio and throughput of NEMO, when using a road-side segment based on IPv6 GeoNetworking.


arXiv: Networking and Internet Architecture | 2014

On the Experimental Evaluation of Vehicular Networks: Issues, Requirements and Methodology Applied to a Real Use Case

Manabu Tsukada; José Santa; Satoshi Matsuura; Thierry Ernst; Kazutoshi Fujikawa

One of the most challenging fields in vehicular communications has been the experimental assessment of protocols and novel technologies. Researchers usually tend to simulate vehicular scenarios and/or partially validate new contributions in the area by using constrained testbeds and carrying out minor tests. In this line, the present work reviews the issues that pioneers in the area of vehicular communications and, in general, in telematics, have to deal with if they want to perform a good evaluation campaign by real testing. The key needs for a good experimental evaluation is the use of proper software tools for gathering testing data, post-processing and generating relevant figures of merit and, finally, properly showing the most important results. For this reason, a key contribution of this paper is the presentation of an evaluation environment called AnaVANET, which covers the previous needs. By using this tool and presenting a reference case of study, a generic testing methodology is described and applied. This way, the usage of the IPv6 protocol over a vehicle-to-vehicle routing protocol, and supporting IETF-based network mobility, is tested at the same time the main features of the AnaVANET system are presented. This work contributes in laying the foundations for a proper experimental evaluation of vehicular networks and will be useful for many researchers in the area.


international conference on its telecommunications | 2013

Vehicle clustering algorithm for sharing information on traffic congestion

Yohei Kanemaru; Satoshi Matsuura; Masatoshi Kakiuchi; Satoru Noguchi; Atsuo Inomata; Kazutoshi Fujikawa

We present a method for clustering vehicles that are in the same congested traffic flow. Our goal is to provide a mechanism for sharing information between vehicles in the same situation to ease traffic congestion in urban areas. Because the most accurate source of information about the congested traffic flow is the vehicle at the head of the traffic flow, it first needs to be identified. To do so, we adapt a clustering algorithm by trajectory abstraction. By grouping the vehicles that have the same or similar trajectory into the same cluster, the vehicle at the tail of the traffic flow can discover the vehicle at the head of the traffic flow. Moreover, we adapt an abstracted trajectory representation to compensate for the error in GPS information. Simulation results show that the proposed algorithm provides a higher rate of correctness than existing commonly used clustering algorithms.

Collaboration


Dive into the Satoshi Matsuura's collaboration.

Top Co-Authors

Avatar

Kazutoshi Fujikawa

Nara Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Hideki Sunahara

Nara Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Atsuo Inomata

Nara Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Satoru Noguchi

Nara Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shinichi Doi

Nara Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Masahiko Tomoishi

Tokyo Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Masatoshi Kakiuchi

Nara Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Yong Jin

Tokyo Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge