Sasase, Iwao

写真a

Affiliation

Faculty of Science and Technology, Department of Information and Computer Science (Yagami)

Position

Professor

E-mail Address

E-mail address

External Links

Profile 【 Display / hide

  • Iwao Sasase was born in Osaka, Japan in 1956. He received the B.E., M.E., and D. Eng. degrees in Electrical Engineering from Keio University, Yokohama, Japan, in 1979, 1981 and 1984, respectively. From 1984 to 1986, he was a Post Doctoral Fellow and Lecturer of Electrical Engineering at University of Ottawa, ON, Canada. He is currently a Professor of Information and Computer Science at Keio University, Yokohama, Japan. His research interests include modulation and coding, broadband mobile and wireless communications, optical communications, communication networks, information theory and network security. He has authored more than 285 journal papers and 437 international conference papers. He granted 44 Ph.D. degrees to his students in the above field. Dr. Sasase received the 1984 IEEE Communications Society (ComSoc) Student Paper Award (Region 10), 1986 Inoue Memorial Young Engineer Award, 1988 Hiroshi Ando Memorial Young Engineer Award, 1988 Shinohara Memorial Young Engineer Award, 1996 Institute of Electronics, Information, and Communication Engineers (IEICE) of Japan Switching System Technical Group Best Paper Award, WPMC2008 Best Paper Award、2015 The Telecommunication Advanvecement Foundation Telecom Technical Award, and 2018 IEICE Communications Society Maganine AWard. He is now serving as IEEE Tokyo Section Chair. He was Board of Governors Member-at-Large (2010-2012), Japan Chapter Chair (2011-2012), Director of the Asia Pacific Region (2004-2005), Chair of the Satellite and Space Communications Technical Committee (2000-2002) of IEEE ComSoc., President (2013-2014), Vice President of IEICE (2014-2015), President in Elect (2012-2013) and Vice President of the IEICE Communications Society (2004-2006), Chair of the Network System Technical Committee (2004-2006), Chair of the Communication System Technical Committee (2002-2004) of IEICE Communications Society, Director of the Society of Information Theory and Its Applications in Japan (2001-2002). He is Fellow of IEICE, Senior Member of IEEE, Member of Information Processing Society of Japan, respectively.

Profile Summary 【 Display / hide

  • His research interests include modulation and coding, broadband mobile and wireless communications, optical communications, communication networks, information theory, network security, IoT, and adghon and Sendor networks. He has authored more than 285 journal papers and 437 international conference papers. He granted 44 Ph.D. degrees to his students in the above field. In the Keio University COE program on Optical and Electronic Device Technology for Access Network, he is engaged in the following research topics; (1) High-speed transmission and QoS control in the broadband mobile communications by utilizing adaptive modulation, space and time coding, multiple access, and interference suppression, (2) QoS control and resource management in wireless home link and ad-hoc networks, (3) Flexible networking at the edge node of the photonic network to satisfy multicast and QoS requests by utilizing optical CDMA, WDMA, and optical burst switching. His main research interests include broadband mobile communications, wireless home link, and photonic networks. His main research contribution include the pioneer research on wireless home link scheme known as “wireless 1394”, and the broadband mobile communication joint research with NTT DoCoMo for 4G mobile communications. He has published more than 275 refereed journal papers and presented more than 405 international conference papers. He is the co-author of the books “Advanced Modulation Technology (in Japanese) Triceps, 1995 and “Optical Synchronous CDMA (Encyclopedia of Telecommunications and Signal Processing)”, Wiley.

Career 【 Display / hide

  • 1984.04
    -
    1985.04

    カナダ オタワ大学(工学部電気工学科) ,ポストドクトラルフェロー

  • 1985.05
    -
    1986.03

    カナダ オタワ大学(工学部電気工学科) ,講師

  • 1986.04
    -
    1988.03

    慶應義塾大学(理工学部電気工学科) ,助手

  • 1986.04
    -
    1989.03

    理工学部2年 ,クラス担任

  • 1988.04
    -
    1989.03

    電気工学科カリキュラム検討委員会 ,委員

display all >>

Academic Background 【 Display / hide

  • 1979.03

    Keio University, Faculty of Engineering, 電気工学科

    University, Graduated

  • 1981.03

    Keio University, Graduate School, Division of Engineering, 電気工学専攻

    Graduate School, Completed, Master's course

  • 1984.03

    Keio University, Graduate School, Division of Engineering, 電気工学専攻

    Graduate School, Completed, Doctoral course

Academic Degrees 【 Display / hide

  • 工学 , Keio University, 1984.03

 

Research Areas 【 Display / hide

  • Communication/Network engineering (Information and Communication Engineering)

Research Keywords 【 Display / hide

  • IoT

  • アドホック・センサーネットワーク

  • Wireless Communication

  • Oprical Communications

  • 情報セキュリティ

display all >>

Research Themes 【 Display / hide

  • Broadband Mobile Communocation joint Research Project, 

    2003
    -
    2007

     View Summary

    The broadband mobile communication joint research with NTT DoCoMo for 4G mobile communications

 

Books 【 Display / hide

  • 情報伝送の理論と方式

    SASASE IWAO, 2006.06

    Scope: 333

  • Encyclopedia of Telecommunications and Signal Processing

    Tomoaki Ohtsuki and Iwao Sasase, Wiley, 2002

  • 改訂 電子情報通信用語辞典

    SASASE IWAO, 1999.06

    Scope: 1280

  • 「マルチメディア産業応用技術大系」

    片方善治監修, (笹瀬巌 第2編第8節 「ディジタル変復調技術」(276-289p.)を分担執筆), 1206p, フジテクノシステム, 1997.08

  • 「次世代ディジタル変復調技術」

    笹瀬巌監修,笹瀬巌 1-6章(1-116p.), 占部健三 7章, 都竹愛一郎 8章, 前田和貴 9章, 矢田博昭 10章を分担執筆) 239p, トリケップス, 1995.05

Papers 【 Display / hide

  • A Server-Based Distributed Storage Using Secret Sharing with AES-256 for Lightweight Safety Restoration

    Choi S., Haruta S., An Y., Sasase I.

    IEICE Transactions on Information and Systems (IEICE Transactions on Information and Systems)  E103D ( 7 ) 1647 - 1659 2020.07

    ISSN  09168532

     View Summary

    Copyright © 2020 The Institute of Electronics, Information and Communication Engineers. Since the owner's data might be leaked from the centralized server storage, the distributed storage schemes with the server storage have been investigated. To ensure the owner's data in those schemes, they use Reed Solomon code. However, those schemes occur the burden of data capacity since the parity data are increased by how much the disconnected data can be restored. Moreover, the calculation time for the restoration will be higher since many parity data are needed to restore the disconnected data. In order to reduce the burden of data capacity and the calculation time, we proposed the server-based distributed storage using Secret Sharing with AES-256 for lightweight safety restoration. Although we use Secret Sharing, the owner's data will be safely kept in the distributed storage since all of the divided data are divided into two pieces with the AES-256 and stored in the peer storage and the server storage. Even though the server storage keeps the divided data, the server and the peer storages might know the pair of divided data via Secret Sharing, the owner's data are secure in the proposed scheme from the inner attack of Secret Sharing. Furthermore, the owner's data can be restored by a few parity data. The evaluations show that our proposed scheme is improved for lightweight, stability, and safety.

  • RPL-based tree construction scheme for target-specific code dissemination in wireless sensors networks

    Asahina H., Toyoda K., Mathiopoulos P.T., Sasase I., Yamamoto H.

    IEICE Transactions on Communications (IEICE Transactions on Communications)  E103B ( 3 ) 190 - 199 2020

    ISSN  09168516

     View Summary

    © 2020 The Institute of Electronics. Distributing codes to specific target sensors in order to fix bugs and/or install a new application is an important management task in WSNs (Wireless Sensor Networks). For the energy efficient dissemination of such codes to specific target sensors, it is required to select the minimum required number of forwarders with the fewest control messages. In this paper, we propose a novel RPL (Routing Protocol for Low-power and lossy networks)-based tree construction scheme for target-specific code dissemination, which is called R-TCS. The main idea of R-TCS is that by leveraging the data collection tree created by a standard routing protocol RPL, it is possible to construct the code dissemination tree with the minimum numbers of non-target sensors and control messages. Since by creating a data collection tree each sensor exchanges RPL messages with the root of the tree, every sensor knows which sensors compose its upwards route, i.e. the route towards the root, and downwards route, i.e. the route towards the leaves. Because of these properties, a target sensor can select the upward route that contains the minimum number of non-target sensors. In addition, a sensor whose downward routes do not contain a target sensor is not required to transmit redundant control messages which are related to the code dissemination operation. In this way, R-TCS can reduce the energy consumption which typically happens in other target-specific code dissemination schemes by the transmission of control messages. In fact, various performance evaluation results obtained by means of computer simulations show that R-TCS reduces by at least 50% energy consumption as compared to the other previous known target-specific code dissemination scheme under the condition where ratio of target sensors is 10% of all sensors.

  • Android malware detection scheme based on level of SSL server certificate

    Kato H., Haruta S., Sasase I.

    IEICE Transactions on Information and Systems (IEICE Transactions on Information and Systems)  E103D ( 2 ) 379 - 389 2020

    ISSN  09168532

     View Summary

    Copyright © 2020 The Institute of Electronics, Information and Communication Engineers. Detecting Android malwares is imperative. As a promising Android malware detection scheme, we focus on the scheme leveraging the differences of traffic patterns between benign apps and malwares. Those differences can be captured even if the packet is encrypted. However, since such features are just statistic based ones, they cannot identify whether each traffic is malicious. Thus, it is necessary to design the scheme which is applicable to encrypted traffic data and supports identification of malicious traffic. In this paper, we propose an Android malware detection scheme based on level of SSL server certificate. Attackers tend to use an untrusted certificate to encrypt malicious payloads in many cases because passing rigorous examination is required to get a trusted certificate. Thus, we utilize SSL server certificate based features for detection since their certificates tend to be untrusted. Furthermore, in order to obtain the more exact features, we introduce required permission based weight values because malwares inevitably require permissions regarding malicious actions. By computer simulation with real dataset, we show our scheme achieves an accuracy of 92.7%. True positive rate and false positive rate are 5.6% higher and 3.2% lower than the previous scheme, respectively. Our scheme can cope with encrypted malicious payloads and 89 malwares which are not detected by the previous scheme.

  • Traffic Feature-Based Botnet Detection Scheme Emphasizing the Importance of Long Patterns

    An Y., Haruta S., Choi S., Sasase I.

    Advances in Intelligent Systems and Computing (Advances in Intelligent Systems and Computing)  1062   181 - 188 2020

    ISSN  9783030312534

     View Summary

    © 2020, Springer Nature Switzerland AG. The botnet detection is imperative. Among several detection schemes, the promising one uses the communication sequences. The main idea of that scheme is that the communication sequences represent special feature since they are controlled by programs. That sequence is tokenized to truncated sequences by n-gram and the numbers of each pattern’s occurrence are used as a feature vector. However, although the features are normalized by the total number of all patterns’ occurrences, the number of occurrences in larger n are less than those of smaller n. That is, regardless of the value of n, the previous scheme normalizes it by the total number of all patterns’ occurrences. As a result, normalized long patterns’ features become very small value and are hidden by others. In order to overcome this shortcoming, in this paper, we propose a traffic feature-based botnet detection scheme emphasizing the importance of long patterns. We realize the emphasizing by two ideas. The first idea is normalizing occurrences by the total number of occurrences in each n instead of the total number of all patterns’ occurrences. By doing this, smaller occurrences in larger n are normalized by smaller values and the feature becomes more balanced with larger value. The second idea is giving weights to the normalized features by calculating ranks of the normalized feature. By weighting features according to the ranks, we can get more outstanding features of longer patterns. By the computer simulation with real dataset, we show the effectiveness of our scheme.

  • Android malware detection scheme based on level of SSL server certificate

    Kato H., Haruta S., Sasase I.

    2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings (2019 IEEE Global Communications Conference, GLOBECOM 2019 - Proceedings)   2019.12

    ISSN  9781728109626

     View Summary

    © 2019 IEEE. Detecting Android malware is imperative. As a promising Android malware detection scheme, we focus on the scheme leveraging the differences of traffic patterns between benign apps and malware. Those differences can be captured even if the packet is encrypted. However, since such features are just statistic based ones, they cannot identify whether each traffic is malicious. Thus, it is necessary to design the scheme which is applicable to encrypted traffic data and supports identification of malicious traffic. In this paper, we propose an Android malware detection scheme based on the level of SSL server certificate. Attackers tend to use an untrusted certificate to encrypt malicious payloads in many cases because passing rigorous examination is required to get a trusted certificate. Thus, we utilize SSL server certificate based features for detection since their certificates tend to be untrusted. Furthermore, in order to obtain the more exact features, we introduce required permission based weight values because malware inevitably require permissions regarding malicious actions. By computer simulation with real dataset, we show our scheme achieves an accuracy of 92.7 %. True positive rate and false positive rate are 5.6% higher and 3.3% lower than the previous scheme, respectively. Our scheme can cope with encrypted malicious payloads and 89 malware which are not detected by the previous scheme.

display all >>

Papers, etc., Registered in KOARA 【 Display / hide

Presentations 【 Display / hide

  • False Density Information Attack Detection Scheme Using Overlap of Communication Range in VANE

    Masashi Yoshida, Hiromu Asahina, Shuichiro Haruta and underline{Iwao Sasase

    電子情報通信学会通信方式研究会, 2018.11, Oral Presentation(general)

  • Feature Selection Scheme for Android ICC-related Features Based on the Gap of the Appearance Ratio

    Kyohei Osuge, Hiroya Kato, Shuichiro Haruta and Iwao Sasase

    電子情報通信学会通信方式研究会, 2018.11, Oral Presentation(general)

  • Wi-Fiフレデータを用いた大学図書館における滞在時間の推定手法

    SASASE IWAO

    電子情報通信学会通信方式研究会, 2018.11, Oral Presentation(general)

  • 図書・雑誌検索実験から得られた大学図書館ユーザ行動調査

    SASASE IWAO

    電子情報通信学会通信方式研究会, 2018.11, Oral Presentation(general)

  • Encounter Record Reduction Scheme based on Theoretical Contact Probability for Flooding Attack Mitigation in DTN

    Keisuke Arai, Shuichiro Haruta, Hiromu Asahina and Iwao Sasase

    電子情報通信学会通信方式研究会 (沖縄) , 2018.07, Oral Presentation(general), 電子情報通信学会通信方式研究会

display all >>

Research Projects of Competitive Funds, etc. 【 Display / hide

  • IoTにおける安全なWebインタフェースおよび高効率なデータ配信方式に関する研究

    2017.04
    -
    2020.03

    MEXT,JSPS, Grant-in-Aid for Scientific Research, 笹瀬 巌, Grant-in-Aid for Scientific Research (C), Principal Investigator

  • Research of Secure Access Control Schemes for Realization of IoT with High Reliability

    2014.04
    -
    2017.03

    MEXT,JSPS, Grant-in-Aid for Scientific Research, 笹瀬 巌, Grant-in-Aid for Scientific Research (C), Principal Investigator

     View Summary

    IoT (Internet of Things), which builds a network between the devices automatically, is the important technology which achieves the realization of useful applications such as a monitoring of a structure, an accident detection, the automatic meter reading and inventory control, and thus, power-saving, real time, high reliability and security are required. However the consideration about power-saving, high reliability and security is not enough.
    In this research, we considered the routing, media access control and aggressive defense with power-saving, high reliability and high security when assuming the next generation application in the above-mentioned IoT.

Awards 【 Display / hide

  • 義塾賞

    2018.11, 慶應義塾, 情報通信ネットワーク分野における先駆者的研究・教育および人材育成への貢献

    Type of Award: Keio commendation etc.

  • 第一回電子錠通信学会通信ソサイエティマガジン賞

    笹瀬 巌, 2018.05, 田氏情報通信学会通信ソサイエティ, 受賞論文;「難関国際会議への論文投稿を通じた若手の育成 ―持続可能な研究コミュニティの確立― 」40号 Vol. 10 No.4 , 2017年3月掲載

    Country: 日本

  • 第30回電気通信普及財団賞(テレコムシステム技術賞賞奨励賞)

    豊田健太郎、笹瀬巌, 2015.03, 電気通信普及財団, 受賞論文:「Unsupervised Clustering-based SPITters Detection Scheme (論文掲載:Journal of Information Processing, Vol. 23, No.1, 2015年1月

     View Description

    受賞理由:IP電話の普及に伴い、広告や詐欺を目的とした迷惑電話の増加が問題となってい る。電話が着信したとき、受信者は応答するまで通話内容を把握でき ないた め、リアルタイムに迷惑電話かどうか判別することは困難である。本論文は、プ ラーバシーの点で問題のない迷惑電話判別法として、通話の特徴 量を元に2つの クラスに分類することで、通話内容を知ることなく判別できる手法を提案し、そ の有効性を定量的に示しており、従来判別が困難であっ た、詐欺を目的とする 低発信頻度の迷惑電話発信者の判別にも有効であることを明らかにしており、安 心・安全な通信に貢献する論文であり、テレコム システム技術賞奨励賞にふさ わしい論文と評価される。

  • 第30回電気通信普及財団賞(テレコムシステム技術賞賞奨励賞)

    豊田健太郎, 笹瀬巌, 2014.03, 電気通信普及財団, 受賞論文:「Unsupervised Clustering-based SPITters Detection Scheme (論文掲載:Journal of Information Processing, Vol. 23, No.1, 2015年1月

    Country: 日本

     View Description

    受賞理由:IP電話の普及に伴い、広告や詐欺を目的とした迷惑電話の増加が問題となってい る。電話が着信したとき、受信者は応答するまで通話内容を把握でき ないた め、リアルタイムに迷惑電話かどうか判別することは困難である。本論文は、プ ラーバシーの点で問題のない迷惑電話判別法として、通話の特徴 量を元に2つの クラスに分類することで、通話内容を知ることなく判別できる手法を提案し、そ の有効性を定量的に示しており、従来判別が困難であっ た、詐欺を目的とする 低発信頻度の迷惑電話発信者の判別にも有効であることを明らかにしており、安 心・安全な通信に貢献する論文であり、テレコム システム技術賞奨励賞にふさ わしい論文と評価される。

  • 電子情報通信学会フェロー

    2009.09, 電子情報通信学会

display all >>

 

Courses Taught 【 Display / hide

  • SPECIAL EXERCISES ON INFORMATION AND COMPUTER SCIENCE

    2020

  • RECITATION IN INFORMATION AND COMPUTER SCIENCE

    2020

  • LABORATORIES IN INFORMATION AND COMPUTER SCIENCE 1B

    2020

  • LABORATORIES IN INFORMATION AND COMPUTER SCIENCE 1A

    2020

  • INFORMATION THEORY

    2020

display all >>

 

Social Activities 【 Display / hide

  • JEITA教育実施検討WG

    2010.07
    -
    Present
  • 日本放送協会

    2010.04
    -
    2016.03
  • 経済産業省地域技術開発支援事業

    2010.04
    -
    2010.09
  • 科学技術振興機構

    2009.04
    -
    2012.03
  • 総務省

    2009.01
    -
    Present

display all >>

Memberships in Academic Societies 【 Display / hide

  • 電子情報通信学会知的情報とセンサネットワーク研究会, 

    2013.05
    -
    Present
  • 電子情報通信学会第25回情報伝送と信号処理ワークショップ, 

    2012.04
    -
    2012.11
  • The 10th International Conference on Optical Internet (COIN2012), 

    2012.01
    -
    2012.05
  • The Forth International Conference on Communications and Electronics (ICCE2012), 

    2012.01
    -
    2012.08
  • 電子情報通信学会第24回情報伝送と信号処理ワークショップ, 

    2011.04
    -
    2011.11

display all >>

Committee Experiences 【 Display / hide

  • 2018.04
    -
    Present

    実行委員, 電子情報通信学会第31回情報伝送と信号処理ワークショップ

  • 2018.04
    -
    Present

    主査, 電気通信協会ブロードバンドユビキタス調査会

  • 2017.04
    -
    2018.03

    実行委員, 電子情報通信学会第30回情報伝送と信号処理ワークショップ

  • 2017.01
    -
    Present

    Chair, IEEE Tokyo Section

  • 2016.10
    -
    Present

    戦略的情報通信研究開発推進事業(SCOPE)に係る課題の専門評価委員, 総務省

display all >>