{"title":"Optimizing Packet Transmission for Ledger-Based Points Transfer System in LPWAN: Solutions, Evaluation and Standardization","authors":"Xin Qi, Keping Yu, Toshio Sato, Kouichi Shibata, Eric Brigham, Takanori Tokutake, Rikiya Eguchi, Yusuke Maruyama, Zheng Wen, Kazuhiko Tamesue, Yutaka Katsuyama, Kazue Sako, Takuro Sato","doi":"10.23919/ITUK53220.2021.9662101","DOIUrl":"https://doi.org/10.23919/ITUK53220.2021.9662101","url":null,"abstract":"Low Power Wide Area Network (LPWAN) is a long-range low-power wireless communication network. Its features, such as wide network coverage and low power consumption of terminals, make it suitable for large-scale deployment of IoT applications. The points transfer system, especially points transfer system in LPWAN, as a typical third-party payment application, is being closely attended by both industry and academia. Recent studies have shown that distributed ledger technology, because ofits characteristics such as high confidentiality, non-tampering, and decentralization, is a good solution to problems such as low-security performance due to centralized storage for a points transfer system. However, the distributed ledger will generate a large amount of data traffic in recording the transactions of network participants, which is a challenge for resource-constrained IoT devices. To address these issues, we propose an optimized packet transmission mechanism for a ledger-based points transfer system in LPWAN. Simulation results show that our proposed mechanism can well reduce the packet transmission ofthe whole system and meet the requirements of LPWAN. Moreover, we update the reader with information about distributed ledger and standardization-related activities in this paper.","PeriodicalId":423554,"journal":{"name":"2021 ITU Kaleidoscope: Connecting Physical and Virtual Worlds (ITU K)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126437873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing the System Model for home Interior Design Using Augmented Reality","authors":"D. Kumar, Panchalingam Srinidhy, Ved P. Kafle","doi":"10.23919/ITUK53220.2021.9662114","DOIUrl":"https://doi.org/10.23919/ITUK53220.2021.9662114","url":null,"abstract":"Home interior design is often a challenging and time-consuming task due to several mismatches between the selection of interiors in a shop and their composition in a target room. One of these mismatches is a lack of knowledge in relation to the target room and to other interiors when an item is seen in a shop. In this paper, we propose to design and develop a system model by which users can virtually try out various settings of home interiors by using marker-less Augmented Reality (AR). To minimize the latency of the system, we apply the hybrid approach of combining an AR framework with a Simultaneous Localization And Mapping (SLAM) algorithm, where the 3D feature points are updated dynamically, thereby avoiding occlusion when multiple interiors are placed on the real-world view. Dimension scanning is deployed to provide accurate live-size scaling to the real-world environment whereas transformations are handled efficiently by means of a touch gesture recognition. The proposed system model for home interior design can be easily implemented as a mobile application. The performance evaluation through experiments shows that with the SLAM algorithm, the average response time of the proposed system improves by 43%. The proposed system is intended to meet the requirements of virtual and augmented reality services specified by ITU-T Study Group 16.","PeriodicalId":423554,"journal":{"name":"2021 ITU Kaleidoscope: Connecting Physical and Virtual Worlds (ITU K)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124664422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strengthen the Security of Cyberspace with Device-Independent Quantum Randomness","authors":"Ming-Han Li, Qiang Zhang","doi":"10.23919/ITUK53220.2021.9662105","DOIUrl":"https://doi.org/10.23919/ITUK53220.2021.9662105","url":null,"abstract":"With the advancement of the information age, the risk of information security keeps increasing. Randomness is the core of network and information system security, and it is the basic support of the entire network trust system. In this paper, we introduce the concept of Device-Independent Quantum Random Number Generator (DIQRNG), which provides randomness with the highest security level. To better integrate with Information and Communications Technology (ICT) systems, we propose the principle and architectural framework of a randomness beacon based on DIQRNG. It is a public service that can be applied in multiple scenarios, such as contract signing and confidential disclosure. Its related application cases are also currently being studied in the ITU QIT4N focus group.","PeriodicalId":423554,"journal":{"name":"2021 ITU Kaleidoscope: Connecting Physical and Virtual Worlds (ITU K)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133475133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Vulnerability Expressions: A Technology for Empowering Novice Practitioners Around the World with Security Maturity Capabilities","authors":"Jacques R. Francoeur","doi":"10.23919/ITUK53220.2021.9662106","DOIUrl":"https://doi.org/10.23919/ITUK53220.2021.9662106","url":null,"abstract":"The evolution of security over several decades by advanced countries has generated vast amounts of valuable security knowledge (“Knowledge”) contained in standards, regulations and guidance (“Frameworks”) published in the form of documents and spreadsheets. Knowledge captured in this form is very difficult to consume and adapt, especially by novice practitioners. If this barrier could be removed, it would release its enormous locked-in value to the rest of the world who desperately need it. A model and enabling software application (“Technology”) is proposed for novice practitioners to quickly ingest existing, readily available knowledge contained in frameworks; thereby enabling easy access, search, visualization, navigation, and consumption of the frameworks and their maps. This technology will be made available as open source to the world.","PeriodicalId":423554,"journal":{"name":"2021 ITU Kaleidoscope: Connecting Physical and Virtual Worlds (ITU K)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128538670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zakaria Benomar, F. Longo, Giovanni Merlino, A. Puliafito
{"title":"Deviceless: A Serverless Approach for the Internet of Things","authors":"Zakaria Benomar, F. Longo, Giovanni Merlino, A. Puliafito","doi":"10.23919/ITUK53220.2021.9662096","DOIUrl":"https://doi.org/10.23919/ITUK53220.2021.9662096","url":null,"abstract":"Developers of cloud-native applications have rapidly adopted the Serverless/Function-as-a-Service (FaaS) paradigm as it exempts them from provisioning and operating the infrastructure. Within this context, an interesting approach that can foster IoT applications’ development is extending the serverless paradigm towards the network edge to cover IoT environments: a paradigm that we refer to as ‘deviceless’. In this approach, an IoT infrastructure composed of devices deployed at the network edge can seamlessly be integrated as an application execution infrastructure to enable interactions with hosted sensors/actuators. This paper discusses several perspectives available in the literature on the (IoT) edge-based serverless paradigm and related use cases in an IoT/edge computing context. Besides, we present our preliminary prototype for implementing the deviceless approach to show its viability. We exploit the deviceless paradigm to conceive data pipelines under a flow-based development environment leveraging a geographically distributed IoT infrastructure.","PeriodicalId":423554,"journal":{"name":"2021 ITU Kaleidoscope: Connecting Physical and Virtual Worlds (ITU K)","volume":"324 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133407225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wireless Channel Scenario Recognition Based on Neural Networks","authors":"Xiaojing Xu, Ruimei Li, Hua Rui, Wei Lin, Xiangfeng Liu, Wei Cao","doi":"10.23919/ITUK53220.2021.9662102","DOIUrl":"https://doi.org/10.23919/ITUK53220.2021.9662102","url":null,"abstract":"Wireless channel scenario recognition plays a key role in improving the performance of mobile communication systems. This paper combines wireless channel characteristics extracted using expert experience and neural networks, and proposes a wireless channel scenario recognition framework based on neural networks. Firstly, the wireless propagation environment is analyzed, and some wireless channel characteristics are extracted, such as the frequency domain fading factor, multipath power delay distribution, time domain energy peak response ratio and time correlation characteristics. Secondly, the combined algorithm model using the wireless channel characteristics and neural networks are proposed. Finally, after simulation verification, the new method has a greater improvement in the recognition accuracy than the traditional threshold algorithm.","PeriodicalId":423554,"journal":{"name":"2021 ITU Kaleidoscope: Connecting Physical and Virtual Worlds (ITU K)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127387573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gang Zhao, Feng Zhang, Le Yu, Hongyang Zhang, Qin Qiu, Sijia Xu
{"title":"Collaborative 5G Multiaccess Computing Security: Threats, Protection Requirements and Scenarios","authors":"Gang Zhao, Feng Zhang, Le Yu, Hongyang Zhang, Qin Qiu, Sijia Xu","doi":"10.23919/ITUK53220.2021.9662088","DOIUrl":"https://doi.org/10.23919/ITUK53220.2021.9662088","url":null,"abstract":"5G MEC is a new model for 5G network architecture that moves cloud computing capabilities and IT service environments to the edge of mobile communication networks, providing nearby services for users. This establishes a carrier-class service environment with high performance, low latency, and high bandwidth. 5G MEC enables new applications by moving core network functionsto the network edge. However, it also brings new security challenges and increases security supervision difficulty. Thispaper proposes 5G MEC security protection policies for operators and 5G industry customers by drawing on successful industry practices. The goal of these policies is to help industry customers implement the three sync requirements (synchronous planning, synchronous construction, and synchronous maintenance) on securitywhile developing 5G MEC applications, as well as guiding the industry to improve MEC security capabilities.","PeriodicalId":423554,"journal":{"name":"2021 ITU Kaleidoscope: Connecting Physical and Virtual Worlds (ITU K)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125080946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identification of Deadliest Mosquitoes Using Wing Beats Sound Classification on Tiny Embedded System Using Machine Learning and Edge Impulse Platform","authors":"Kirankumar Trivedi, H. Shroff","doi":"10.23919/ITUK53220.2021.9662116","DOIUrl":"https://doi.org/10.23919/ITUK53220.2021.9662116","url":null,"abstract":"Mosquitoes are the deadliest animal on the planet, infecting about 700 million people each year and causing over one million deaths, accounting for 17% of all infectious illnesses worldwide. We are still fighting the three most deadly mosquito species, Anopheles, Aedes, and Culex, 124 years after Sir Ronald Ross made the first pivotal discovery. Mosquitoes are difficult to detect manually since they are small and fly rapidly. The auditory categorization of mosquito wing beats may be used to detect them using machine learning. This article discusses an Arduino Nano BLE 33 Sense-based prototype that collects audio data from mosquito wing beats and utilizes TinyML to automatically classify mosquito species. With 88.3% accuracy, the TinyML system developed by Edge Impulse based on the HumBug project mosquito wing beats dataset recognizes mosquito types. To conduct this research, the frequency of mosquito wing beats was graphically represented as a feature using a spectrogram. Furthermore, live mosquito detection studies using the low-cost Arduino Nano BLE 33 Sense yielded excellent results. During testing, the model had an accuracy of 88.3% and a loss of 0.26. The use of machine learning to solve the challenge of manual mosquito type identification is efficient and has the potential to have a large impact on vector-borne illness management. The model may still be fine-tuned to get more accurate results with reduced latency. In addition, the deployment went as expected.","PeriodicalId":423554,"journal":{"name":"2021 ITU Kaleidoscope: Connecting Physical and Virtual Worlds (ITU K)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133649777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
João Borges, Ailton Pinto De Oliveira, Felipe Henrique Bastos E Bastos, Daniel Takashi Ne Do Nascimento Suzuki, Emerson Santos De Oliveira Junior, Lucas Matni Bezerra, C. Nahum, P. Batista, Aldebaro Barreto Da Rocha Klautau Junior
{"title":"Reinforcement Learning for Scheduling and Mimo beam Selection using Caviar Simulations","authors":"João Borges, Ailton Pinto De Oliveira, Felipe Henrique Bastos E Bastos, Daniel Takashi Ne Do Nascimento Suzuki, Emerson Santos De Oliveira Junior, Lucas Matni Bezerra, C. Nahum, P. Batista, Aldebaro Barreto Da Rocha Klautau Junior","doi":"10.23919/ITUK53220.2021.9662100","DOIUrl":"https://doi.org/10.23919/ITUK53220.2021.9662100","url":null,"abstract":"This paper describes a framework for research on Reinforcement Learning (RL) applied to scheduling and MIMO beam selection. This framework consists of asking the RL agent to schedule a user and then choose the index of a beamforming codebook to serve it. A key aspect of this problem is that the simulation of the communication system and the artificial intelligence engine is based on a virtual world created with AirSim and the Unreal Engine. These components enable the so-called CAVIAR methodology, which leads to highly realistic 3D scenarios. This paper describes the communication and RL modeling adopted in the framework and also presents statistics concerning the implemented RL environment, such as data traffic, as well as results for three baseline systems.","PeriodicalId":423554,"journal":{"name":"2021 ITU Kaleidoscope: Connecting Physical and Virtual Worlds (ITU K)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121670449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}