Sasase, Iwao

写真a

Affiliation

Faculty of Science and Technology, Department of Information and Computer Science (Yagami)

Position

Professor

E-mail Address

E-mail address

External Links

Profile 【 Display / hide

  • Iwao Sasase was born in Osaka, Japan in 1956. He received the B.E., M.E., and D. Eng. degrees in Electrical Engineering from Keio University, Yokohama, Japan, in 1979, 1981 and 1984, respectively. From 1984 to 1986, he was a Post Doctoral Fellow and Lecturer of Electrical Engineering at University of Ottawa, ON, Canada. He is currently a Professor of Information and Computer Science at Keio University, Yokohama, Japan. His research interests include modulation and coding, broadband mobile and wireless communications, optical communications, communication networks, information theory and network security. He has authored more than 300 journal papers and 455 international conference papers. He granted 47 Ph.D. degrees to his students in the above field. Dr. Sasase received the 1984 IEEE Communications Society (ComSoc) Student Paper Award (Region 10), 1986 Inoue Memorial Young Engineer Award, 1988 Hiroshi Ando Memorial Young Engineer Award, 1988 Shinohara Memorial Young Engineer Award, 1996 Institute of Electronics, Information, and Communication Engineers (IEICE) of Japan Switching System Technical Group Best Paper Award, WPMC2008 Best Paper Award、2015 The Telecommunication Advancement Foundation Telecom Technical Award, and 2018 IEICE Communications Society Magazine Award. He was IEEE Tokyo Section Chair(2017-2018), Board of Governors Member-at-Large (2010-2012), Japan Chapter Chair (2011-2012), Director of the Asia Pacific Region (2004-2005), Chair of the Satellite and Space Communications Technical Committee (2000-2002) of IEEE ComSoc., President (2020-2021), President in Elect (2019-2020), Vice President of IEICE (2014-2015), President (2013-2014), President in Elect (2012-2013) and Vice President of the IEICE Communications Society (2004-2006), Chair of the Network System Technical Committee (2004-2006), Chair of the Communication System Technical Committee (2002-2004) of IEICE Communications Society, Director of the Society of Information Theory and Its Applications in Japan (2001-2002). He is Fellow of IEICE, Senior Member of IEEE, Member of Information Processing Society of Japan, respectively.

Profile Summary 【 Display / hide

  • His research interests include modulation and coding, broadband mobile and wireless communications, optical communications, communication networks, information theory, network security, IoT, and ad-hoc and Sensor networks. He has published more than 300 refereed journal papers and presented more than 455 international conference papers. He is the co-author of the books “Advanced Modulation Technology (in Japanese) Triceps, 1995 and “Optical Synchronous CDMA (Encyclopedia of Telecommunications and Signal Processing)”, Wiley. He granted 47 Ph.D. degrees to his students in the above field.

Career 【 Display / hide

  • 1984.04
    -
    1985.04

    カナダ オタワ大学(工学部電気工学科) ,ポストドクトラルフェロー

  • 1985.05
    -
    1986.03

    カナダ オタワ大学(工学部電気工学科) ,講師

  • 1986.04
    -
    1988.03

    慶應義塾大学(理工学部電気工学科) ,助手

  • 1986.04
    -
    1989.03

    理工学部2年 ,クラス担任

  • 1988.04
    -
    1989.03

    電気工学科カリキュラム検討委員会 ,委員

display all >>

Academic Background 【 Display / hide

  • 1979.03

    Keio University, Faculty of Engineering, 電気工学科

    University, Graduated

  • 1981.03

    Keio University, Graduate School, Division of Engineering, 電気工学専攻

    Graduate School, Completed, Master's course

  • 1984.03

    Keio University, Graduate School, Division of Engineering, 電気工学専攻

    Graduate School, Completed, Doctoral course

Academic Degrees 【 Display / hide

  • 工学 , Keio University, 1984.03

 

Research Areas 【 Display / hide

  • Communication/Network engineering (Information and Communication Engineering)

Research Keywords 【 Display / hide

  • IoT

  • アドホック・センサーネットワーク

  • Wireless Communication

  • Oprical Communications

  • 情報セキュリティ

display all >>

Research Themes 【 Display / hide

  • Broadband Mobile Communocation joint Research Project, 

    2003
    -
    2007

     View Summary

    The broadband mobile communication joint research with NTT DoCoMo for 4G mobile communications

 

Books 【 Display / hide

  • 情報伝送の理論と方式

    SASASE IWAO, 2006.06

    Scope: 333

  • Encyclopedia of Telecommunications and Signal Processing

    Tomoaki Ohtsuki and Iwao Sasase, Wiley, 2002

  • 改訂 電子情報通信用語辞典

    SASASE IWAO, 1999.06

    Scope: 1280

  • 「マルチメディア産業応用技術大系」

    片方善治監修, (笹瀬巌 第2編第8節 「ディジタル変復調技術」(276-289p.)を分担執筆), 1206p, フジテクノシステム, 1997.08

  • 「次世代ディジタル変復調技術」

    笹瀬巌監修,笹瀬巌 1-6章(1-116p.), 占部健三 7章, 都竹愛一郎 8章, 前田和貴 9章, 矢田博昭 10章を分担執筆) 239p, トリケップス, 1995.05

Papers 【 Display / hide

  • An energy-efficient defense against message flooding attacks in delay tolerant networks

    ASAHINA H., ARAI K., HARUTA S., MATHIOPOULOS P.T., SASASE I.

    IEICE Transactions on Communications (IEICE Transactions on Communications)  E104.B ( 4 ) 348 - 359 2021.04

    ISSN  09168516

     View Summary

    Delay Tolerant Networks (DTNs) are vulnerable to message flooding attacks in which a very large number of malicious messages are sent so that network resources are depleted. To address this problem, previous studies mainly focused on constraining the number of messages that nodes can generate per time slot by allowing nodes to monitor the other nodes' communication history. Since the adversaries may hide their attacks by claiming a false history, nodes exchange their communication histories and detect an attacker who has presented an inconsistent communication history. However, this approach increases node energy consumption since the number of communication histories increases every time a node communicates with another node. To deal with this problem, in this paper, we propose an energy-efficient defense against such message flooding attacks. The main idea of the proposed scheme is to time limit the communication history exchange so as to reduce the volume while ensuring the effective detection of inconsistencies. The advantage of this approach is that, by removing communication histories after they have revealed such inconsistencies, the energy consumption is reduced. To estimate such expiration time, analytical expressions based upon a Markov chain based message propagation model, are derived for the probability that a communication history reveals such inconsistency in an arbitrary time. Extensive performance evaluation results obtained by means of computer simulations and several performance criteria verify that the proposed scheme successfully improves the overall energy efficiency. For example, these performance results have shown that, as compared to other previously known defenses against message flooding attacks, the proposed scheme extends by at least 22% the battery lifetime of DTN nodes, while maintaining the same levels of protection.

  • A lightweight detection using bloom filter against flooding DDOS attack

    Choi S., An Y., Sasase I.

    IEICE Transactions on Information and Systems (IEICE Transactions on Information and Systems)  E103D ( 12 ) 2600 - 2610 2020.12

    ISSN  09168532

     View Summary

    The flooding DDoS attack is a serious problem these days. In order to detect the flooding DDoS attack, the survival approaches and the mitigation approaches have been investigated. Since the survival approach occurs the burden on the victims, the mitigation approach is mainly studied. As for the mitigation approaches, to detect the flooding DDoS attack, the conventional schemes using the bloom filter, machine learning, and pattern analyzation have been investigated. However, those schemes are not effective to ensure the high accuracy (ACC), the high true positive rate (TPR), and the low false positive rate (FPR). In addition, the data size and calculation time are high. Moreover, the performance is not effective from the fluctuant attack packet per second (pps). In order to effectively detect the flooding DDoS attack, we propose the lightweight detection using bloom filter against flooding DDoS attack. To detect the flooding DDoS attack and ensure the high accuracy, the high true positive rate, and the low false positive rate, the dec-all (decrement-all) operation and the checkpoint are flexibly changed from the fluctuant pps in the bloom filter. Since we only consider the IP address, all kinds of flooding attacks can be detected without the blacklist and whitelist. Moreover, there is no complexity to recognize the attack. By the computer simulation with the datasets, we show our scheme achieves an accuracy of 97.5%. True positive rate and false positive rate show 97.8% and 6.3%, respectively. The data size for processing is much small as 280bytes. Furthermore, our scheme can detect the flooding DDoS attack at once in 11.1sec calculation time.

  • A Preprocessing Methodology by Using Additional Steganography on CNN-based Steganalysis

    Kato H., Osuge K., Haruta S., Sasase I.

    2020 IEEE Global Communications Conference, GLOBECOM 2020 - Proceedings (2020 IEEE Global Communications Conference, GLOBECOM 2020 - Proceedings)   2020.12

    ISSN  9781728182988

     View Summary

    There exists a need of 'image steganalysis' which reveals whether steganographic signals are embedded in an image to improve information security. Among various steganalysis, Convolutional Neural Networks (CNN) based steganalysis is promising since it can automatically learn the features of diverse steganographic algorithms. However, we discover the detection performance of CNN is degraded when an image is intentionally reduced by the nearest-neighbor interpolation before steganography. This is because spatial frequency in a reduced image gets high, which disturbs the training. In order to overcome this shortcoming, in this paper, we propose a preprocessing methodology by using additional steganography on CNN-based steganalysis. In the proposed preprocessing, steganographic signals are additionally embedded into both reduced original images and reduced steganographic ones since a difference of spatial frequencies between them gets obvious, which helps CNN learn features. Whenever reduced images are trained in CNN or inspected whether they are steganographic ones or not, steganography is applied to them once by the proposed preprocessing. Thus, an image is regarded as a steganographic one if the trained model judges steganography is applied to it twice; otherwise it is an original one. Since the proposed methodology is very simple, its computational cost is low. Our evaluation shows accuracy in a model with the proposed preprocessing is 10.6% higher than that in the conventional one. Besides, even in the situation where another steganography is additionally embedded, the proposed preprocessing yields 7% higher accuracy compared with the conventional one.

  • A Scheduling Scheme for Cooperative Merging at a Highway On-Ramp with Maximizing Average Speed of Automated Vehicles

    Yoshida M., Asahina H., Shigeno H., Sasase I.

    IEEE Vehicular Technology Conference (IEEE Vehicular Technology Conference)  2020-November 2020.11

    ISSN  9781728194844

     View Summary

    Recently, connected and automated vehicles have potential to mitigate traffic congestion and improve traffic efficiency at a highway on-ramp. Especially, vehicle to infrastructure communication based scheduling schemes are paid attention because a central control server can assign merging timing to automated vehicles to improve traffic efficiency on whole roads. Although several schemes calculate merging timing based on their criteria, these schemes cause traffic congestion when inflow traffic becomes high. In order to solve this problem, it is necessary to schedule merging timing of vehicles such that density of vehicles decreases on whole roads. In this paper, we propose a scheduling scheme for cooperative merging at a highway on-ramp with maximizing average speed of automated vehicles. The main idea of the proposed scheme is to utilize the traffic model that density and speed of vehicles have a negative correlation. By utilizing the traffic model, the proposed scheme preferentially assigns merging timing to vehicles which are on a congested road by maximizing average speed of all vehicles on whole roads. Simulation result shows that the proposed scheme decreases density of vehicles on whole roads even if inflow traffic becomes high. Furthermore, the proposed scheme improves outflow traffic from a highway on-ramp by 400 (veh/h) at most in comparison with related schemes.

  • A Server-Based Distributed Storage Using Secret Sharing with AES-256 for Lightweight Safety Restoration

    Choi S., Haruta S., An Y., Sasase I.

    IEICE Transactions on Information and Systems (IEICE Transactions on Information and Systems)  E103D ( 7 ) 1647 - 1659 2020.07

    ISSN  09168532

     View Summary

    Copyright © 2020 The Institute of Electronics, Information and Communication Engineers. Since the owner's data might be leaked from the centralized server storage, the distributed storage schemes with the server storage have been investigated. To ensure the owner's data in those schemes, they use Reed Solomon code. However, those schemes occur the burden of data capacity since the parity data are increased by how much the disconnected data can be restored. Moreover, the calculation time for the restoration will be higher since many parity data are needed to restore the disconnected data. In order to reduce the burden of data capacity and the calculation time, we proposed the server-based distributed storage using Secret Sharing with AES-256 for lightweight safety restoration. Although we use Secret Sharing, the owner's data will be safely kept in the distributed storage since all of the divided data are divided into two pieces with the AES-256 and stored in the peer storage and the server storage. Even though the server storage keeps the divided data, the server and the peer storages might know the pair of divided data via Secret Sharing, the owner's data are secure in the proposed scheme from the inner attack of Secret Sharing. Furthermore, the owner's data can be restored by a few parity data. The evaluations show that our proposed scheme is improved for lightweight, stability, and safety.

display all >>

Papers, etc., Registered in KOARA 【 Display / hide

Presentations 【 Display / hide

  • False Density Information Attack Detection Scheme Using Overlap of Communication Range in VANE

    Masashi Yoshida, Hiromu Asahina, Shuichiro Haruta and underline{Iwao Sasase

    電子情報通信学会通信方式研究会, 2018.11, Oral Presentation(general)

  • Feature Selection Scheme for Android ICC-related Features Based on the Gap of the Appearance Ratio

    Kyohei Osuge, Hiroya Kato, Shuichiro Haruta and Iwao Sasase

    電子情報通信学会通信方式研究会, 2018.11, Oral Presentation(general)

  • Wi-Fiフレデータを用いた大学図書館における滞在時間の推定手法

    SASASE IWAO

    電子情報通信学会通信方式研究会, 2018.11, Oral Presentation(general)

  • 図書・雑誌検索実験から得られた大学図書館ユーザ行動調査

    SASASE IWAO

    電子情報通信学会通信方式研究会, 2018.11, Oral Presentation(general)

  • Encounter Record Reduction Scheme based on Theoretical Contact Probability for Flooding Attack Mitigation in DTN

    Keisuke Arai, Shuichiro Haruta, Hiromu Asahina and Iwao Sasase

    電子情報通信学会通信方式研究会 (沖縄) , 2018.07, Oral Presentation(general), 電子情報通信学会通信方式研究会

display all >>

Research Projects of Competitive Funds, etc. 【 Display / hide

  • IoTにおける安全なWebインタフェースおよび高効率なデータ配信方式に関する研究

    2017.04
    -
    2020.03

    MEXT,JSPS, Grant-in-Aid for Scientific Research, 笹瀬 巌, Grant-in-Aid for Scientific Research (C), Principal Investigator

  • Research of Secure Access Control Schemes for Realization of IoT with High Reliability

    2014.04
    -
    2017.03

    MEXT,JSPS, Grant-in-Aid for Scientific Research, 笹瀬 巌, Grant-in-Aid for Scientific Research (C), Principal Investigator

     View Summary

    IoT (Internet of Things), which builds a network between the devices automatically, is the important technology which achieves the realization of useful applications such as a monitoring of a structure, an accident detection, the automatic meter reading and inventory control, and thus, power-saving, real time, high reliability and security are required. However the consideration about power-saving, high reliability and security is not enough.
    In this research, we considered the routing, media access control and aggressive defense with power-saving, high reliability and high security when assuming the next generation application in the above-mentioned IoT.

Awards 【 Display / hide

  • 義塾賞

    2018.11, 慶應義塾, 情報通信ネットワーク分野における先駆者的研究・教育および人材育成への貢献

    Type of Award: Keio commendation etc.

  • 第一回電子錠通信学会通信ソサイエティマガジン賞

    笹瀬 巌, 2018.05, 田氏情報通信学会通信ソサイエティ, 受賞論文;「難関国際会議への論文投稿を通じた若手の育成 ―持続可能な研究コミュニティの確立― 」40号 Vol. 10 No.4 , 2017年3月掲載

    Country: 日本

  • 第30回電気通信普及財団賞(テレコムシステム技術賞賞奨励賞)

    豊田健太郎、笹瀬巌, 2015.03, 電気通信普及財団, 受賞論文:「Unsupervised Clustering-based SPITters Detection Scheme (論文掲載:Journal of Information Processing, Vol. 23, No.1, 2015年1月

     View Description

    受賞理由:IP電話の普及に伴い、広告や詐欺を目的とした迷惑電話の増加が問題となってい る。電話が着信したとき、受信者は応答するまで通話内容を把握でき ないた め、リアルタイムに迷惑電話かどうか判別することは困難である。本論文は、プ ラーバシーの点で問題のない迷惑電話判別法として、通話の特徴 量を元に2つの クラスに分類することで、通話内容を知ることなく判別できる手法を提案し、そ の有効性を定量的に示しており、従来判別が困難であっ た、詐欺を目的とする 低発信頻度の迷惑電話発信者の判別にも有効であることを明らかにしており、安 心・安全な通信に貢献する論文であり、テレコム システム技術賞奨励賞にふさ わしい論文と評価される。

  • 第30回電気通信普及財団賞(テレコムシステム技術賞賞奨励賞)

    豊田健太郎, 笹瀬巌, 2014.03, 電気通信普及財団, 受賞論文:「Unsupervised Clustering-based SPITters Detection Scheme (論文掲載:Journal of Information Processing, Vol. 23, No.1, 2015年1月

    Country: 日本

     View Description

    受賞理由:IP電話の普及に伴い、広告や詐欺を目的とした迷惑電話の増加が問題となってい る。電話が着信したとき、受信者は応答するまで通話内容を把握でき ないた め、リアルタイムに迷惑電話かどうか判別することは困難である。本論文は、プ ラーバシーの点で問題のない迷惑電話判別法として、通話の特徴 量を元に2つの クラスに分類することで、通話内容を知ることなく判別できる手法を提案し、そ の有効性を定量的に示しており、従来判別が困難であっ た、詐欺を目的とする 低発信頻度の迷惑電話発信者の判別にも有効であることを明らかにしており、安 心・安全な通信に貢献する論文であり、テレコム システム技術賞奨励賞にふさ わしい論文と評価される。

  • 電子情報通信学会フェロー

    2009.09, 電子情報通信学会

display all >>

 

Courses Taught 【 Display / hide

  • RECITATION IN INFORMATION AND COMPUTER SCIENCE

    2021

  • LABORATORIES IN INFORMATION AND COMPUTER SCIENCE 1B

    2021

  • LABORATORIES IN INFORMATION AND COMPUTER SCIENCE 1A

    2021

  • INFORMATION THEORY

    2021

  • INDEPENDENT STUDY ON SCIENCE FOR OPEN AND ENVIRONMENTAL SYSTEMS

    2021

display all >>

 

Social Activities 【 Display / hide

  • 電波監理審議会委員

    総務省

    2021.03
    -
    Present
  • 日本学術会議連携委員

    政府

    2020.10
    -
    Present
  • 戦略的情報通信開発推進事業「地域ICT振興型評価委員会」主査・委員

    総務省関東総合通信局

    2019.04
    -
    Present
  • 科学技術振興機構未来社会創造事業運営委員

    科学技術振興機構

    2018.08
    -
    Present
  • 電気通信協会ブロードバンドユビキタス調査会 主査

    電気通信協会

    2018.04
    -
    Present

display all >>

Memberships in Academic Societies 【 Display / hide

  • 電子情報通信学会知的情報とセンサネットワーク研究会, 

    2013.05
    -
    Present
  • 電子情報通信学会第25回情報伝送と信号処理ワークショップ, 

    2012.04
    -
    2012.11
  • The 10th International Conference on Optical Internet (COIN2012), 

    2012.01
    -
    2012.05
  • The Forth International Conference on Communications and Electronics (ICCE2012), 

    2012.01
    -
    2012.08
  • 電子情報通信学会第24回情報伝送と信号処理ワークショップ, 

    2011.04
    -
    2011.11

display all >>

Committee Experiences 【 Display / hide

  • 2021.04
    -
    Present

    実行委員, 電子情報通信学会第32回情報伝送と信号処理ワークショップ

  • 2021.03
    -
    Present

    電波監理審議会委員, 総務省

  • 2020.10
    -
    Present

    連携会員, 日本学術会議

  • 2020.06
    -
    2021.06

    会長, 電子情報通信学会

  • 2019.06
    -
    2020.06

    次期会長, 電子情報通信学会

display all >>