Sasase, Iwao

写真a

Affiliation

Faculty of Science and Technology (Mita)

Position

Professor Emeritus

External Links

Profile 【 Display / hide

  • Iwao Sasase was born in Osaka, Japan in 1956. He received the B.E., M.E., and D. Eng. degrees in Electrical Engineering from Keio University, Yokohama, Japan, in 1979, 1981 and 1984, respectively. From 1984 to 1986, he was a Post Doctoral Fellow and Lecturer of Electrical Engineering at University of Ottawa, ON, Canada. He is currently a Professor of Information and Computer Science at Keio University, Yokohama, Japan. His research interests include modulation and coding, broadband mobile and wireless communications, optical communications, communication networks, information theory and network security. He has authored more than 300 journal papers and 455 international conference papers. He granted 47 Ph.D. degrees to his students in the above field. Dr. Sasase received the 1984 IEEE Communications Society (ComSoc) Student Paper Award (Region 10), 1986 Inoue Memorial Young Engineer Award, 1988 Hiroshi Ando Memorial Young Engineer Award, 1988 Shinohara Memorial Young Engineer Award, 1996 Institute of Electronics, Information, and Communication Engineers (IEICE) of Japan Switching System Technical Group Best Paper Award, WPMC2008 Best Paper Award、2015 The Telecommunication Advancement Foundation Telecom Technical Award, and 2018 IEICE Communications Society Magazine Award. He was IEEE Tokyo Section Chair(2017-2018), Board of Governors Member-at-Large (2010-2012), Japan Chapter Chair (2011-2012), Director of the Asia Pacific Region (2004-2005), Chair of the Satellite and Space Communications Technical Committee (2000-2002) of IEEE ComSoc., President (2020-2021), President in Elect (2019-2020), Vice President of IEICE (2014-2015), President (2013-2014), President in Elect (2012-2013) and Vice President of the IEICE Communications Society (2004-2006), Chair of the Network System Technical Committee (2004-2006), Chair of the Communication System Technical Committee (2002-2004) of IEICE Communications Society, Director of the Society of Information Theory and Its Applications in Japan (2001-2002). He is Fellow of IEICE, Senior Member of IEEE, Member of Information Processing Society of Japan, respectively.

Profile Summary 【 Display / hide

  • His research interests include modulation and coding, broadband mobile and wireless communications, optical communications, communication networks, information theory, network security, IoT, and ad-hoc and Sensor networks. He has published more than 300 refereed journal papers and presented more than 455 international conference papers. He is the co-author of the books “Advanced Modulation Technology (in Japanese) Triceps, 1995 and “Optical Synchronous CDMA (Encyclopedia of Telecommunications and Signal Processing)”, Wiley. He granted 47 Ph.D. degrees to his students in the above field.

Career 【 Display / hide

  • 1984.04
    -
    1985.04

    カナダ オタワ大学(工学部電気工学科) ,ポストドクトラルフェロー

  • 1985.05
    -
    1986.03

    カナダ オタワ大学(工学部電気工学科) ,講師

  • 1986.04
    -
    1988.03

    慶應義塾大学(理工学部電気工学科) ,助手

  • 1986.04
    -
    1989.03

    理工学部2年 ,クラス担任

  • 1988.04
    -
    1989.03

    電気工学科カリキュラム検討委員会 ,委員

display all >>

Academic Background 【 Display / hide

  • 1979.03

    Keio University, Faculty of Engineering, 電気工学科

    University, Graduated

  • 1981.03

    Keio University, Graduate School, Division of Engineering, 電気工学専攻

    Graduate School, Completed, Master's course

  • 1984.03

    Keio University, Graduate School, Division of Engineering, 電気工学専攻

    Graduate School, Completed, Doctoral course

Academic Degrees 【 Display / hide

  • 工学 , Keio University, 1984.03

 

Research Areas 【 Display / hide

  • Manufacturing Technology (Mechanical Engineering, Electrical and Electronic Engineering, Chemical Engineering) / Communication and network engineering (Information and Communication Engineering)

Research Keywords 【 Display / hide

  • IoT

  • アドホック・センサーネットワーク

  • Wireless Communication

  • Oprical Communications

  • 情報セキュリティ

display all >>

Research Themes 【 Display / hide

  • Broadband Mobile Communocation joint Research Project, 

    2003
    -
    2007

     View Summary

    The broadband mobile communication joint research with NTT DoCoMo for 4G mobile communications

 

Books 【 Display / hide

  • 情報伝送の理論と方式

    SASASE IWAO, 2006.06

    Scope: 333

  • Encyclopedia of Telecommunications and Signal Processing

    Tomoaki Ohtsuki and Iwao Sasase, Wiley, 2002

  • 改訂 電子情報通信用語辞典

    SASASE IWAO, 1999.06

    Scope: 1280

  • 「マルチメディア産業応用技術大系」

    片方善治監修, (笹瀬巌 第2編第8節 「ディジタル変復調技術」(276-289p.)を分担執筆), 1206p, フジテクノシステム, 1997.08

  • 「次世代ディジタル変復調技術」

    笹瀬巌監修,笹瀬巌 1-6章(1-116p.), 占部健三 7章, 都竹愛一郎 8章, 前田和貴 9章, 矢田博昭 10章を分担執筆) 239p, トリケップス, 1995.05

Papers 【 Display / hide

  • Rogue Access Point Detection by Using ARP Failure under the MAC Address Duplication

    Igarashi K., Kato H., Sasase I.

    IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC (IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, PIMRC)  2021-September   1469 - 1474 2021.09

    ISSN  9781728175867

     View Summary

    Detecting a Rogue Access Point (RAP) in Wi-Fi network is imperative. The previous scheme is user side detection focusing on two channels used by a RAP. That scheme can detect a RAP in stable traffic environment by revealing the channel used with a Legitimate Access Point (LAP) with intentional interference. However, the detection performance is degraded in the real environment where traffic is more unstable because it affects the traffic on the channel. Thus, it is necessary to design the scheme which is independent of such factors. In this paper, we propose RAP detection by using Address Resolution Protocol (ARP) failure under the Media Access Control (MAC) address duplication. Our main idea is that the traffic is relayed via a RAP and a LAP on the LAN path between a client and a gateway under the attack. This is because the RAP must be established between a client and a LAP to provide Internet connection. On the basis of this idea, the proposed scheme reveals that the Access Point (AP) with which a client connects is a RAP by discovering the MAC address of a LAP on the path. In order to find the MAC address, we leverage the phenomenon that a client cannot receive ARP reply packets in the situation where its MAC address and that of a AP are duplicated on the path. By doing this, the presence of a LAP is revealed, which can judge that the connected AP is a RAP. In our evaluation, the proposed scheme achieves accuracy of 96.5% even in unstable traffic environment. True positive rate and false positive rate are 31.0% higher and 9.0% lower than the previous scheme. Furthermore, the proposed scheme can detect RAPs accurately in real environment where the previous scheme cannot.

  • An energy-efficient defense against message flooding attacks in delay tolerant networks

    ASAHINA H., ARAI K., HARUTA S., MATHIOPOULOS P.T., SASASE I.

    IEICE Transactions on Communications (IEICE Transactions on Communications)  E104.B ( 4 ) 348 - 359 2021.04

    ISSN  09168516

     View Summary

    Delay Tolerant Networks (DTNs) are vulnerable to message flooding attacks in which a very large number of malicious messages are sent so that network resources are depleted. To address this problem, previous studies mainly focused on constraining the number of messages that nodes can generate per time slot by allowing nodes to monitor the other nodes' communication history. Since the adversaries may hide their attacks by claiming a false history, nodes exchange their communication histories and detect an attacker who has presented an inconsistent communication history. However, this approach increases node energy consumption since the number of communication histories increases every time a node communicates with another node. To deal with this problem, in this paper, we propose an energy-efficient defense against such message flooding attacks. The main idea of the proposed scheme is to time limit the communication history exchange so as to reduce the volume while ensuring the effective detection of inconsistencies. The advantage of this approach is that, by removing communication histories after they have revealed such inconsistencies, the energy consumption is reduced. To estimate such expiration time, analytical expressions based upon a Markov chain based message propagation model, are derived for the probability that a communication history reveals such inconsistency in an arbitrary time. Extensive performance evaluation results obtained by means of computer simulations and several performance criteria verify that the proposed scheme successfully improves the overall energy efficiency. For example, these performance results have shown that, as compared to other previously known defenses against message flooding attacks, the proposed scheme extends by at least 22% the battery lifetime of DTN nodes, while maintaining the same levels of protection.

  • Indoor crowd estimation scheme using the number of Wi-Fi probe requests under MAC address randomization

    Furuya Y., Asahina H., Yoshida M., Sasase I.

    IEICE Transactions on Information and Systems (IEICE Transactions on Information and Systems)  E104D ( 9 ) 1420 - 1426 2021

    ISSN  09168532

     View Summary

    As smartphones have become widespread in the past decade, Wi-Fi signal-based crowd estimation schemes are receiving increased attention. These estimation schemes count the number of unique MAC addresses in Wi-Fi signals, hereafter called probe requests (PRs), instead of counting the number of people. However, these estimation schemes have low accuracy of crowd estimation under MAC address randomization that replaces a unique MAC address with various dummy MAC addresses. To solve this problem, in this paper, we propose an indoor crowd estimation scheme using the number of PRs under MAC address randomization. The main idea of the proposed scheme is to leverage the fact that the number of PRs per a unit of time changes in proportion to the number of smartphones. Since a smartphone tends to send a constant number of PRs per a unit of time, the proposed scheme can estimate the accurate number of smartphones. Various experiment results show that the proposed scheme reduces estimation error by at most 75% compared to the conventional Wi-Fi signal-based crowd estimation scheme in an indoor environment.

  • Android Malware Detection Based on Composition Ratio of Permission Pairs

    Kato H., Sasaki T., Sasase I.

    IEEE Access (IEEE Access)  9   130006 - 130019 2021

     View Summary

    Detecting Android malware is imperative. Among various detection schemes, permission pair based ones are promising for practical detection. However, conventional schemes cannot simultaneously meet requirements for practical use in terms of efficiency, intelligibility, and stability of detection performance. Although the latest scheme relies on differences of frequent pairs between benign apps and malware, it cannot meet the stability. This is because recent malware tends to require unnecessary permissions to imitate benign apps, which makes using the frequencies ineffective. To meet all the requirements, in this paper, we propose Android malware detection based on a Composition Ratio (CR) of permission pairs. We define the CR as a ratio of a permission pair to all pairs in an app. We focus on the fact that the CR tends to be small in malware because of unnecessary permissions. To obtain features without using the frequencies, we construct databases about the CR. For each app, we calculate similarity scores based on the databases. Finally, eight scores are fed into machine learning (ML) based classifiers as features. By doing this, stable performance can be achieved. Since our features are just eight-dimensional, the proposed scheme takes less training time and is compatible with other ML based schemes. Furthermore, our features can quantitatively offer clear information that helps human to understand detection results. Our scheme is suitable for practical use because all the requirements can be met. By using real datasets, our results show that our scheme can detect malware with up to 97.3% accuracy. Besides, compared with an existing scheme, our scheme can reduce the feature dimensions by about 99% with maintaining comparable accuracy on recent datasets.

  • A scheduling scheme for autonomous vehicle highway merging with an outflow traffic and fairness analysis

    Kunibe M., Asahina H., Shigeno H., Sasase I.

    IEEE Access (IEEE Access)  9   49219 - 49232 2021

     View Summary

    Recently, vehicle-to-infrastructure (V2I) communication-based scheduling schemes for connected and automated vehicles (CAVs) on highway on-ramps have received attention because the schemes assign optimal merging times to CAVs based on their criteria, such as first-in first-out order or minimizing CAV total travel time. However, these schemes cause traffic congestion due to the criteria when the vehicle inflow traffic becomes high. To mitigate traffic congestion, a scheduling scheme should assign merging times to CAVs to decrease road vehicle density. In this paper, we propose a scheduling scheme for autonomous vehicle highway merging with an outflow traffic and fairness analysis. We formulate a multiobjective function that achieves both outflow traffic maximization and fairness in assigned merging times. Since more vehicles pass a highway on-ramp as highway on-ramp outflow traffic increases, the proposed scheme decreases vehicle density on roads by maximizing the outflow traffic. Furthermore, the proposed scheme distributes the vehicle density on both the main and ramp roads by fairly assigning their merging times. Simulation results show that the proposed scheme mitigates the potential traffic congestion of previous scheduling schemes. Furthermore, the proposed scheme improves outflow traffic from highway on-ramps by more than 200 veh/h compared with the previous scheduling schemes.

display all >>

Papers, etc., Registered in KOARA 【 Display / hide

Presentations 【 Display / hide

  • False Density Information Attack Detection Scheme Using Overlap of Communication Range in VANE

    Masashi Yoshida, Hiromu Asahina, Shuichiro Haruta and underline{Iwao Sasase

    電子情報通信学会通信方式研究会, 

    2018.11

    Oral presentation (general)

  • Feature Selection Scheme for Android ICC-related Features Based on the Gap of the Appearance Ratio

    Kyohei Osuge, Hiroya Kato, Shuichiro Haruta and Iwao Sasase

    電子情報通信学会通信方式研究会, 

    2018.11

    Oral presentation (general)

  • Wi-Fiフレデータを用いた大学図書館における滞在時間の推定手法

    SASASE IWAO

    電子情報通信学会通信方式研究会, 

    2018.11

    Oral presentation (general)

  • 図書・雑誌検索実験から得られた大学図書館ユーザ行動調査

    SASASE IWAO

    電子情報通信学会通信方式研究会, 

    2018.11

    Oral presentation (general)

  • Encounter Record Reduction Scheme based on Theoretical Contact Probability for Flooding Attack Mitigation in DTN

    Keisuke Arai, Shuichiro Haruta, Hiromu Asahina and Iwao Sasase

    電子情報通信学会通信方式研究会 (沖縄) , 

    2018.07

    Oral presentation (general), 電子情報通信学会通信方式研究会

display all >>

Research Projects of Competitive Funds, etc. 【 Display / hide

  • IoTにおける安全なWebインタフェースおよび高効率なデータ配信方式に関する研究

    2017.04
    -
    2020.03

    MEXT,JSPS, Grant-in-Aid for Scientific Research, Grant-in-Aid for Scientific Research (C), Principal investigator

  • Research of Secure Access Control Schemes for Realization of IoT with High Reliability

    2014.04
    -
    2017.03

    MEXT,JSPS, Grant-in-Aid for Scientific Research, Grant-in-Aid for Scientific Research (C), Principal investigator

     View Summary

    IoT (Internet of Things), which builds a network between the devices automatically, is the important technology which achieves the realization of useful applications such as a monitoring of a structure, an accident detection, the automatic meter reading and inventory control, and thus, power-saving, real time, high reliability and security are required. However the consideration about power-saving, high reliability and security is not enough.
    In this research, we considered the routing, media access control and aggressive defense with power-saving, high reliability and high security when assuming the next generation application in the above-mentioned IoT.

Awards 【 Display / hide

  • 義塾賞

    2018.11, 慶應義塾, 情報通信ネットワーク分野における先駆者的研究・教育および人材育成への貢献

    Type of Award: Keio commendation etc.

  • 第一回電子錠通信学会通信ソサイエティマガジン賞

    笹瀬 巌, 2018.05, 田氏情報通信学会通信ソサイエティ, 受賞論文;「難関国際会議への論文投稿を通じた若手の育成 ―持続可能な研究コミュニティの確立― 」40号 Vol. 10 No.4 , 2017年3月掲載

  • 第30回電気通信普及財団賞(テレコムシステム技術賞賞奨励賞)

    豊田健太郎、笹瀬巌, 2015.03, 電気通信普及財団, 受賞論文:「Unsupervised Clustering-based SPITters Detection Scheme (論文掲載:Journal of Information Processing, Vol. 23, No.1, 2015年1月

     View Description

    受賞理由:IP電話の普及に伴い、広告や詐欺を目的とした迷惑電話の増加が問題となってい る。電話が着信したとき、受信者は応答するまで通話内容を把握でき ないた め、リアルタイムに迷惑電話かどうか判別することは困難である。本論文は、プ ラーバシーの点で問題のない迷惑電話判別法として、通話の特徴 量を元に2つの クラスに分類することで、通話内容を知ることなく判別できる手法を提案し、そ の有効性を定量的に示しており、従来判別が困難であっ た、詐欺を目的とする 低発信頻度の迷惑電話発信者の判別にも有効であることを明らかにしており、安 心・安全な通信に貢献する論文であり、テレコム システム技術賞奨励賞にふさ わしい論文と評価される。

  • 第30回電気通信普及財団賞(テレコムシステム技術賞賞奨励賞)

    豊田健太郎, 笹瀬巌, 2014.03, 電気通信普及財団, 受賞論文:「Unsupervised Clustering-based SPITters Detection Scheme (論文掲載:Journal of Information Processing, Vol. 23, No.1, 2015年1月

     View Description

    受賞理由:IP電話の普及に伴い、広告や詐欺を目的とした迷惑電話の増加が問題となってい る。電話が着信したとき、受信者は応答するまで通話内容を把握でき ないた め、リアルタイムに迷惑電話かどうか判別することは困難である。本論文は、プ ラーバシーの点で問題のない迷惑電話判別法として、通話の特徴 量を元に2つの クラスに分類することで、通話内容を知ることなく判別できる手法を提案し、そ の有効性を定量的に示しており、従来判別が困難であっ た、詐欺を目的とする 低発信頻度の迷惑電話発信者の判別にも有効であることを明らかにしており、安 心・安全な通信に貢献する論文であり、テレコム システム技術賞奨励賞にふさ わしい論文と評価される。

  • 電子情報通信学会フェロー

    2009.09, 電子情報通信学会

display all >>

 

Courses Taught 【 Display / hide

  • ADVANCED COURSE ON INFORMATION AND COMPUTER SCIENCE B

    2024

  • ADVANCED COURSE ON DIGITAL COMMUNICATION THEORY

    2024

  • ADVANCED COURSE ON INFORMATION AND COMPUTER SCIENCE B

    2023

  • ADVANCED COURSE ON DIGITAL COMMUNICATION THEORY

    2023

  • ADVANCED COURSE ON INFORMATION AND COMPUTER SCIENCE B

    2022

display all >>

 

Social Activities 【 Display / hide

  • 電波監理審議会委員

    総務省

    2021.03
    -
    Present
  • 日本学術会議連携委員

    政府

    2020.10
    -
    Present
  • 科学技術振興機構未来社会創造事業運営委員

    科学技術振興機構

    2018.08
    -
    Present
  • 戦略的情報通信研究開発推進事業(SCOPE)に係る課題の専門評価委員

    総務省

    2016.10
    -
    Present
  • 情報通信機構 外部評価委員会 委員

    情報通信機構

    2013.10
    -
    Present

display all >>

Media Coverage 【 Display / hide

  • 戦略的情報通信開発推進事業「地域ICT振興型評価委員会」主査・委員

    総務省関東総合通信局, 2019.04

  • 電波利用料による研究開発などの評価会合 主査・委員

    総務省, 2018.04

  • 電気通信協会ブロードバンドユビキタス調査会 主査

    電気通信協会, 2018.04

Academic Activities 【 Display / hide

  • テレコム先端技術支援センター 研究助成審査専門部会 専門委員

    2013.10
    -
    Present

  • 通信技術委員会 表彰選考委員会委員

    通信技術委員会, 

    2013.04
    -
    Present

  • JEITA教育実施検討WG委員

    2010.07
    -
    Present

Memberships in Academic Societies 【 Display / hide

  • 電子情報通信学会知的情報とセンサネットワーク研究会, 

    2013.05
    -
    Present
  • 電子情報通信学会第25回情報伝送と信号処理ワークショップ, 

    2012.04
    -
    2012.11
  • The 10th International Conference on Optical Internet (COIN2012), 

    2012.01
    -
    2012.05
  • The Forth International Conference on Communications and Electronics (ICCE2012), 

    2012.01
    -
    2012.08
  • 電子情報通信学会第24回情報伝送と信号処理ワークショップ, 

    2011.04
    -
    2011.11

display all >>

Committee Experiences 【 Display / hide

  • 2021.04
    -
    Present

    実行委員, 電子情報通信学会第32回情報伝送と信号処理ワークショップ

  • 2021.03
    -
    Present

    電波監理審議会委員, 総務省

  • 2020.10
    -
    Present

    連携会員, 日本学術会議

  • 2020.06
    -
    2021.06

    会長, 電子情報通信学会

  • 2019.06
    -
    2020.06

    次期会長, 電子情報通信学会

display all >>