2019 IEEE Conference on Standards for Communications and Networking (CSCN)最新文献

筛选
英文 中文
CSCN 2019 Committees
2019 IEEE Conference on Standards for Communications and Networking (CSCN) Pub Date : 2019-10-01 DOI: 10.1109/cscn.2019.8931383
{"title":"CSCN 2019 Committees","authors":"","doi":"10.1109/cscn.2019.8931383","DOIUrl":"https://doi.org/10.1109/cscn.2019.8931383","url":null,"abstract":"","PeriodicalId":102095,"journal":{"name":"2019 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124850352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unified Statistical Channel Model of Ship (or Shore)-to-Ship FSO Communications with Pointing Errors 具有指向误差的船(岸)对船FSO通信的统一统计信道模型
2019 IEEE Conference on Standards for Communications and Networking (CSCN) Pub Date : 2019-10-01 DOI: 10.1109/CSCN.2019.8931342
Kug-Jin Jung, S. Nam, Mohamed-Slim Alouini, Young-Chai Ko
{"title":"Unified Statistical Channel Model of Ship (or Shore)-to-Ship FSO Communications with Pointing Errors","authors":"Kug-Jin Jung, S. Nam, Mohamed-Slim Alouini, Young-Chai Ko","doi":"10.1109/CSCN.2019.8931342","DOIUrl":"https://doi.org/10.1109/CSCN.2019.8931342","url":null,"abstract":"In this paper, we assume free space optical link between ships or between ship and shore and modeled the pointing error that occurs according to three typical movements of the ship. Then, we combined the pointing error models with weak atmospheric turbulence and derived the composite probability density functions (PDF) for each case of pointing errormodels. Also, using the similarity of the composite PDFs, we obtain a unified expression for the composite PDF. The numerical results confirm that the derived composite PDFs give precise prediction by comparing it with Monte-Carlo simulations.","PeriodicalId":102095,"journal":{"name":"2019 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127973492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Standardizing Security Evaluation Criteria for Connected Vehicles: A Modular Protection Profile 网联汽车安全评估标准标准化:模块化保护配置文件
2019 IEEE Conference on Standards for Communications and Networking (CSCN) Pub Date : 2019-10-01 DOI: 10.1109/CSCN.2019.8931344
K. Maliatsos, Christos Lyvas, P. Pantazopoulos, C. Lambrinoudakis, A. Kanatas, Matthieu Gay, A. Amditis
{"title":"Standardizing Security Evaluation Criteria for Connected Vehicles: A Modular Protection Profile","authors":"K. Maliatsos, Christos Lyvas, P. Pantazopoulos, C. Lambrinoudakis, A. Kanatas, Matthieu Gay, A. Amditis","doi":"10.1109/CSCN.2019.8931344","DOIUrl":"https://doi.org/10.1109/CSCN.2019.8931344","url":null,"abstract":"The so-far most credible approach to Security Evaluation, the Common Criteria standard, relies on a thorough methodology to provide confidence that the security requirements of an IT system are satisfied. Towards that end, a Protection Profile (PP) document gathers carefully all required data and identifies in an implementation-independent way the security requirements of the studied system, referred to as Target of Evaluation (ToE). When the connected vehicles paradigm that integrates a mosaic of third-party modules and interfaces constitutes the ToE, the PP development calls for agile solutions.In this work, we introduce a modular approach to the design of a PP for connected vehicles, as developed in the SAFERtec project. Our starting point is a generic architecture of the Vehicle (V-ITS-S) that helps us identify all involved assets and accordingly introduce a flexible discrimination of the base and associated PP modules as well as their interplay. We discuss the way our modular PP can cope with various V-ITS-S implementation approaches and provide insights on its applicability on a real-world V-ITS-S bench we have developed. The proposed solution can pave the way for devising standardized security assurance arguments towards safer connected driving.","PeriodicalId":102095,"journal":{"name":"2019 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131302332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trustworthiness in IoT – A Standards Gap Analysis on Security, Data Protection and Privacy 物联网中的可信度——安全、数据保护和隐私的标准差距分析
2019 IEEE Conference on Standards for Communications and Networking (CSCN) Pub Date : 2019-10-01 DOI: 10.1109/CSCN.2019.8931393
Nader S. Labib, Matthias R. Brust, Grégoire Danoy, P. Bouvry
{"title":"Trustworthiness in IoT – A Standards Gap Analysis on Security, Data Protection and Privacy","authors":"Nader S. Labib, Matthias R. Brust, Grégoire Danoy, P. Bouvry","doi":"10.1109/CSCN.2019.8931393","DOIUrl":"https://doi.org/10.1109/CSCN.2019.8931393","url":null,"abstract":"With the emergence of new digital trends like Internet of Things (IoT), more industry actors and technical committees pursue research in utilising such technologies as they promise a better and optimised management, improved energy efficiency and a better quality living through a wide array of value-added services. However, as sensing, actuation, communication and control become increasingly more sophisticated, such promising data-driven systems generate, process, and exchange larger amounts of security-critical and privacy-sensitive data, which makes them attractive targets of attacks. In turn this affirms the importance of trustworthiness in IoT and emphasises the need of a solid technical and regulatory foundation. The goal of this paper is to first introduce the concept of trustworthiness in IoT, its main pillars namely, security, privacy and data protection, and then analyse the state-of-the-art in research and standardisation for each of these subareas. Throughout the paper, we develop and refer to Unmanned Aerial Vehicles (UAVs) as a promising value-added service example of mobile IoT devices. The paper then presents a thorough gap analysis and concludes with recommendations for future work.","PeriodicalId":102095,"journal":{"name":"2019 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116564358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Improving Hardware Security for LoRaWAN 提高LoRaWAN的硬件安全性
2019 IEEE Conference on Standards for Communications and Networking (CSCN) Pub Date : 2019-10-01 DOI: 10.1109/CSCN.2019.8931397
Jorge Navarro-Ortiz, Natalia Chinchilla-Romero, J. Ramos-Muñoz, P. Luengo
{"title":"Improving Hardware Security for LoRaWAN","authors":"Jorge Navarro-Ortiz, Natalia Chinchilla-Romero, J. Ramos-Muñoz, P. Luengo","doi":"10.1109/CSCN.2019.8931397","DOIUrl":"https://doi.org/10.1109/CSCN.2019.8931397","url":null,"abstract":"The Internet of Things is one of the hottest topics in communications today, with current revenues of $151B, around 7 billion connected devices, and an unprecedented growth expected for next years. LoRaWAN is one of the most outstanding technologies for massive IoT communications due to features such as large coverage and low power consumption. In this context, where end-devices may be placed on remote or unattended locations, physical security is a major concern. In this paper, a cost-effective solution is proposed to provide hardware security to LoRaWAN end-devices. A 3GPP-like security scheme is designed and implemented as a proof-of-concept using real equipment. By using this solution, end-devices will be no longer vulnerable to security threats such as impersonation or cloning attacks.","PeriodicalId":102095,"journal":{"name":"2019 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125106901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
5GEN: A tool to generate 5G infrastructure graphs 5GEN:生成5G基础设施图的工具
2019 IEEE Conference on Standards for Communications and Networking (CSCN) Pub Date : 2019-10-01 DOI: 10.1109/CSCN.2019.8931334
Jorge Martín-Pérez, Luca Cominardi, C. Bernardos, Alain A. M. Mourad
{"title":"5GEN: A tool to generate 5G infrastructure graphs","authors":"Jorge Martín-Pérez, Luca Cominardi, C. Bernardos, Alain A. M. Mourad","doi":"10.1109/CSCN.2019.8931334","DOIUrl":"https://doi.org/10.1109/CSCN.2019.8931334","url":null,"abstract":"Ongoing research on 5G is looking into software platforms to evaluate new developments on 5G networks. Some 5G hardware is now starting to be available, but it is scarce and very limited, which makes validation and performance evaluation of 5G quite challenging. Simulation is the tool of choice for most of the cases, but this requires creating large descriptor files representing a 5G network. This brings forward the need for tools that facilitate the generation of 5G networks’ topologies. In this paper we present 5GEN, a tool that automatically creates graphs representing 5G networks. With 5GEN, a researcher can simply define the number of resources, and 5GEN will generate the nodes and edges that interconnect them across the infrastructure. The tool has been successfully used to test several 5G network scenarios within the EU 5G-CORAL project.","PeriodicalId":102095,"journal":{"name":"2019 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131289245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Kalman-Filter-Based Tracking of Millimeter-Wave Channel Parameters for V2X Applications 基于卡尔曼滤波的V2X毫米波信道参数跟踪
2019 IEEE Conference on Standards for Communications and Networking (CSCN) Pub Date : 2019-10-01 DOI: 10.1109/CSCN.2019.8931350
A. R. Paiva, Gábor Fodor, W. Freitas, Y. Silva, Carlos F. M. Silva
{"title":"Kalman-Filter-Based Tracking of Millimeter-Wave Channel Parameters for V2X Applications","authors":"A. R. Paiva, Gábor Fodor, W. Freitas, Y. Silva, Carlos F. M. Silva","doi":"10.1109/CSCN.2019.8931350","DOIUrl":"https://doi.org/10.1109/CSCN.2019.8931350","url":null,"abstract":"The spectrum of millimeter waves, when properly exploited, represents an important asset for achieving the high data rates and low latencies required by applications in vehicular communications. However, vehicle scenarios are characterized by high mobility, which results in frequent misalignment of beams. Therefore, in these types of scenarios, beam tracking algorithms are important because they can keep the beams aligned with a low training overhead. Kalman filters are strong candidates for the implementation of such algorithms, because they ensure high channel tracking performance over a wide range of signal-to-noise-ratios (SNR) and are easy to implement. This work evaluates the performance of channel tracking methods based on Kalman filters for high mobility. Our numerical results show that the proposed Kalman filter-based channel tracking method has high performance at low SNR regimes compared to least square-based methods, and improve the robustness when using planar instead of linear arrays. Moreover, the proposed channel tracking method is shown to perform well in multipath fading scenarios, while achieving high performance in the presence of strong line-of-sight components.","PeriodicalId":102095,"journal":{"name":"2019 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114710491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Docker Enabled Virtualized Nanoservices for Local IoT Edge Networks 为本地物联网边缘网络启用Docker虚拟化纳米服务
2019 IEEE Conference on Standards for Communications and Networking (CSCN) Pub Date : 2019-10-01 DOI: 10.1109/CSCN.2019.8931321
J. Islam, E. Harjula, T. Kumar, Pekka Karhula, M. Ylianttila
{"title":"Docker Enabled Virtualized Nanoservices for Local IoT Edge Networks","authors":"J. Islam, E. Harjula, T. Kumar, Pekka Karhula, M. Ylianttila","doi":"10.1109/CSCN.2019.8931321","DOIUrl":"https://doi.org/10.1109/CSCN.2019.8931321","url":null,"abstract":"Edge computing is a novel computing paradigm moving server resources closer to end-devices. It helps unleashing the full potential of high-performance access networks with respect to ultra-low latency and transfer rate and improve resilience to problems at core networks and data centers. Multi-access Edge Computing (MEC), is a standard solution by European Telecommunications Standards Institute (ETSI) for access network-level edge computing. MEC, operating at access network level, is an ideal solution for the most cases. However, there are still some challenges to address: first is related to the vulnerability to access network problems and the second is about the high load inflicted to access networks and MEC servers. This is a particular issue in massive-scale Internet of Things (IoT) use cases, where numerous sensors may produce high amounts of data, or where critical system functionalities must be ensured also during access network problems. In this paper, we study the feasibility of bringing some edge functions to the local level as virtualized and dynamically deployable components utilizing local hardware capacity. For the study, we have implemented a local edge networking prototype based on local microservices, called nanoservices, implemented using Docker containers and deployed using Docker Swarm-based orchestration. Since IoT networks typically consist of constrained-capacity devices, our focus is in optimizing the resources of the proposed nanoservices.","PeriodicalId":102095,"journal":{"name":"2019 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121447394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Secure Keying Scheme for Network Slicing in 5G Architecture 5G架构下网络切片的安全密钥控制方案
2019 IEEE Conference on Standards for Communications and Networking (CSCN) Pub Date : 2019-10-01 DOI: 10.1109/CSCN.2019.8931330
P. Porambage, Y. Miché, Aapo Kalliola, Madhusanka Liyanage, M. Ylianttila
{"title":"Secure Keying Scheme for Network Slicing in 5G Architecture","authors":"P. Porambage, Y. Miché, Aapo Kalliola, Madhusanka Liyanage, M. Ylianttila","doi":"10.1109/CSCN.2019.8931330","DOIUrl":"https://doi.org/10.1109/CSCN.2019.8931330","url":null,"abstract":"Network slicing is one of the key enabling technologies of evolving fifth generation (5G) mobile communication that fulfills multitudes of service demands of 5G networks. Although the concept of network slicing, its deployment scenarios and some security aspects like slice isolation are discussed in detail, key management for network slicing based applications is still not a well-investigated research area. In this paper, we propose a secure keying scheme that is suitable for network slicing architecture when the slices are accessed by the third party applications. Since the secure keying scheme is designed using a multi-party computation mechanism, it ensures the consent of monitored use cases or devices which the data is acquired. We discuss the performance, scalability and security properties of the keying scheme to demonstrate its appropriateness under evolving 5G paradigm.","PeriodicalId":102095,"journal":{"name":"2019 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127018664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
iFUSION: Standards-based SDN Architecture for Carrier Transport Network iFUSION:基于标准的运营商传输网络SDN架构
2019 IEEE Conference on Standards for Communications and Networking (CSCN) Pub Date : 2019-10-01 DOI: 10.1109/CSCN.2019.8931386
L. Contreras, Ó. D. Dios, V. López, J. Palacios, Jesús Folgueira
{"title":"iFUSION: Standards-based SDN Architecture for Carrier Transport Network","authors":"L. Contreras, Ó. D. Dios, V. López, J. Palacios, Jesús Folgueira","doi":"10.1109/CSCN.2019.8931386","DOIUrl":"https://doi.org/10.1109/CSCN.2019.8931386","url":null,"abstract":"Network softwarization will permit the dynamic configuration of the transport infrastructure, in order to facilitate the adaptation needed for future advanced services. However, the promise of full flexibility can only be achieved through proper levels of abstraction and by means of normalized interfaces and service and device models. This paper presents the SDN architecture that is being defined by Telefónica for the management and control of its transport networks, including a variety of technologies such as IP, optics and microwave radio links, pursuing a standard-based approach for an effective and future-proof introduction of softwarized operations.","PeriodicalId":102095,"journal":{"name":"2019 IEEE Conference on Standards for Communications and Networking (CSCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134043311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信