著者
Hiroki Kashiwazaki
雑誌
研究報告インターネットと運用技術(IOT) (ISSN:21888787)
巻号頁・発行日
vol.2018-IOT-42, no.7, pp.1-4, 2018-06-21

An author is a spider-like creature who has decided that, since he is intelligent, he will resist the instincts which lead his species through an exceptionally violent life-cycle which they call “the Plan” - including a drop in intelligence during “winter”. Last December, a certain university announced large-scale personal information leak caused on several systems by several unauthorized accesses. Security advisory consulting companies order the university to “strengthen governance in their own institutes”. This paper shows an aftermath of the personal information leak incident in the university and how administration bureau deals with a lot of the vulnerability in the university.
著者
Hiroki Kashiwazaki Hideki Takase Yuzo Taenaka Teruaki Yokoyama
雑誌
研究報告インターネットと運用技術(IOT) (ISSN:21888787)
巻号頁・発行日
vol.2022-IOT-58, no.15, pp.1-5, 2022-07-05

Japan is a country where forests cover 70% of the land. Although smart forestry using IoT devices is being implemented, but its diffusion is limited due to the poor availability of power sources and the lack of mobile network base stations. Cell phone base stations require licenses and government permits for installation, and the costs of installation, operation, and removal are expensive. Even tower-type mobile base stations installed in the suburbs have a coverage area of only about 10 km, so even though the population coverage rate has already reached over 99%, the area coverage rate is still less than 70% for all carriers. The purpose of this research is to establish a method to extend Internet Protocol (IP) connectivity to non-electrified areas by patrolling autonomous vehicles using Low Power Wide Area (LPWA) communication systems, especially IEEE802.11ah as the core. and standardize new communication methods.
著者
Hiroki Kashiwazaki
雑誌
研究報告インターネットと運用技術(IOT) (ISSN:21888787)
巻号頁・発行日
vol.2021-IOT-55, no.4, pp.1-5, 2021-08-30

In 2017 and 2020, respectively, the author reported on his research on qualitative and quantitative performance evaluation of relatively low-cost Network Attached Storage. This report is a continuation of the 2020 report, in which the NIC of Synology's FS6400 all-flash storage was replaced with a 40Gigabit Ethernet NIC, and a 100Gigabit Ethernet Switch was used to connect the 100Gigabit Ethernet NIC to a Linux server. From a Linux server with a 100Gigabit Ethernet NIC connected by a 100Gigabit Ethernet Switch, I prepared multiple values with multiple parameters using the I/O test tool fio, and conducted exhaustive measurements to benchmark all combinations of these values. The measurement results were formatted and visualized in a heat map. This time, I applied this method to disk arrays with a unit price of 100 USD/TB terabytes, all-flash storage with a price of 250 USD/TB, and all-flash storage with a price of 5000 USD/TB.
著者
Hiroki Kashiwazaki
雑誌
研究報告インターネットと運用技術(IOT) (ISSN:21888787)
巻号頁・発行日
vol.2020-IOT-51, no.2, pp.1-4, 2020-08-27

This paper proposes a sustainable IP network using small-scale power generation facilities and renewable energy in off-grid areas with wireless LAN APs that consist of adaptive autonomous mobile robots. The wireless LAN access points are designed to use biodegradable materials as much as possible to minimize the impact on the natural environment, even if they break down during operation and are difficult to recover. We will also design and implement a new mesh network protocol among wireless LAN APs that is robust to changes in the natural environment.
著者
Hiroki Kashiwazaki
雑誌
研究報告インターネットと運用技術(IOT) (ISSN:21888787)
巻号頁・発行日
vol.2018-IOT-41, no.25, pp.1-4, 2018-05-10

In December 2017, a Japanese university announced large-scale personal information leak. According to open information, the leak was caused on several systems by several unauthorized accesses. Also in February 2018, a Japanese research institute announced a large-scale security incident. Even only in Japan, many reports of cyber security incidents are announced for a year. After security incidents occur, a supervisory agency (in these cases, Ministry of Education, Culture, Sports, Science and Technology a.k.a MEXT) and security advisory consulting companies order the institutes to “strengthen governance in their own institutes”. This paper shows an example of personal information leak incident in an university and a beast that asked what is the governance in the university at the heart of the university.