Noriharu Miyaho

Learn More
This paper proposes an evaluation result of a high security distribution and rake technology for realizing disaster recovery. In an experimental evaluation, the encryption and spatial scrambling performance and the average response time have been estimated in terms of the file data size. Discussion is also provided on an effective shuffling algorithm to(More)
Telemedicine can be implemented using a sensor network that carries users’ biometric information collected by tiny intelligent sensors attached to the human body. We propose a communication system that can be used for telemedicine to improve the Quality of Life of individuals, which uses a sensor network and a sensor database with mutual(More)
An innovative mechanism of a file-backup system concept is discussed. In the proposed file backup mechanism, the combination of the following technologies such as a spatial random scrambling of file data, a subsequent random fragmentation of the file, the corresponding encryption and duplication for each fragmented one by using a stream cipher in each(More)
Recently, versatile types of wireless ad hoc nodes with multi hop functions have been developed. In particular, they are applied to the sensor network applications [1]. Ad hoc OnDemand Distance Vector (AODV)[2] and Optimized Link State Routing(OLSR)[3] are widely used as the popular communication protocols in this field . However, in the conventional(More)
An innovative mechanism of a file-backup system concept is proposed. In the proposed file backup mechanism, the combination of the following technologies such as a spatial random scrambling of file data, a subsequent random fragmentation of the file, the corresponding encryption and duplication for each fragmented one by using a stream cipher code in each(More)
A practical mechanism for a file-backup system concept is proposed. In this paper, it is demonstrated that a highly secure file backup mechanism can be achieved by combining technologies that implement the following: spatial random scrambling of file data, subsequent random fragmentation of the file, the duplication and encryption of each file fragment(More)
In an ad hoc network, communication distance is limited by the need to minimize the power consumption of the communication nodes. To deal with this, we usually employ multi-hop relaying functions that use the number of hops as a routing metric. But in an environment where traffic density is high, the same relaying node may be used by multiple sending nodes(More)
Recently, methods of data collection and practical use of the collected data in sensor networks have been proposed. In this paper, we propose the method of collecting sensor data from two geographically different spots (Tokyo Denki University in Chiba and Hachinohe National College of Technology in Hachinohe Aomori), of monitoring and controlling the(More)
There is an increasing demand for secure communication services that can dynamically reflect user needs. Conventional dedicated services such as an Internet VPN or IPVPN using IPsec and MPLS have inherent shortcomings, making it difficult for them to dynamically reflect user requirements when faced with limited network resources. It is also quite important(More)