submit Opinions CrossRef Open Access Subscribe New Journal Ideal

Click on image to enlarge

Indexed in Scopus

Journal of ICT Standardization

Open Access

Editor-in-Chief: Anand R. Prasad, wenovator, Japan

Associate Editor: Sivabalan Arumugam, Rakuten Mobile Inc, Japan

ISSN: 2245-800X (Print Version),

ISSN: 2246-0853 (Online Version)
Vol: 2   Issue: 2

Published In:   December 2014

Publication Frequency: Triannual

Articles in 2020

Search Available Volume and Issue for Journal of ICT Standardization

Journal Description        Editorial Foreword        Read Full Articles        Editorial Board        Subscription        Indexed       Opinions

“Cyber Parallel TrafficWorld” Cloud Service in 5G Mobile Networks

Yoshitoshi Murata1 and Shinya Saito2

11Professor, Faculty of Software and Information Science, Iwate Prefectural University, Takizawa, Iwate, Japan
22Graduate School of Software and Information Science, Iwate Prefectural University Graduate School, Japan

Abstract: [+]    |    Download File [ 2128KB ]    |   Read Article Online

Abstract: Remarkable progress has been made in intelligent transportation systems. For example, autonomous vehicles can now detect their positions, as well as those of other vehicles, pedestrians, and obstacles. Pedestrians with smartphones can also determine their positions and send this information to the Internet. However, even though vehicles and pedestrians can instantly determine their positions, the information used for this purpose is rarely sent to a cloud service. Here, we propose a new cloud service, called “cyber parallel traffic world” (CPTW), in which vehicles, pedestrians, and temporary obstacles exist and move in synchronization with their real-world counterparts. In addition, virtual vehicles and pedestrians in the CPTW can communicate with real/virtual vehicles and pedestrians. The CPTW service could make driving safer and less stressful; provide people with experience in driving on roads throughout the world, etc. We describe how to construct its virtual world and establish communications.

Keywords: ITS, smart mobility, cloud service, safety drive, virtual world, 5G mobile networks, Internet of Things, IOT.

An Evolutionary Way to Standardize the Internet of Things

Subin Shen1 and Marco Carugi2

1School of Computer, Nanjing University of Posts and Telecommunications, Nanjing, China
2Study Group 13, International Telecommunication Union, Telecommunication Standardization Section, Geneva, Switzerland

Abstract: [+]    |    Download File [ 2415KB ]    |   Read Article Online

Abstract: The current situation of technology separation among the different application domains of the Internet of Things (IoT) results in a market separation per application domain. This issue hinders the technical innovation and investments in the IoT business. In order to solve the issue, it is necessary to standardize common technologies of the IoT across the different application domains. This paper argues that a key direction of the future standardization of the IoT, in addition to standardizing specific technologies, is building over a standardized new architecture reference model for the IoT. Based on the analysis of existing key activities concerning the standardization of OSI, NGN and IoT from a functional architecture perspective, it suggests that the IoT standardization work be progressed in an evolutionary way in order to enable the integration of existing technologies, and focus on the interactions among functional entities or deployable components of the IoT to impose minimum constraints on future technical innovations. Topics discussed in the paper include characteristic capabilities of the IoT, ways of integrating the cloud computing technologies in the IoT perspective, and challenges faced by the IoT standardization work. Journal of

Keywords: architecture reference model, functional entity, interaction, Internet of Things, Next Generation Network, Open System Interconnection, standardization.

Optimisation of a TV White Space Broadband Market Model for Rural Entrepreneurs

Sindiso M Nleya1, Antoine Bagula2, Marco Zennaro3 and Ermmano Pietrosemoli3

1University of Cape Town, ISAT Lab, South Africa,
2University of Western Cape, ISAT Lab, South Africa
3The Abdus Salam International Centre for Theoretical Physics mzenarro, Italy

Abstract: [+]    |    Download File [ 1215KB ]    |   Read Article Online

Abstract: Leveraging on recent TV white space communications developments in regulations, standards initiatives and technology, this paper considers a suitable next generation network comprising of two primary users (PUs) that compete to offer a service to a group of secondary users (SUs) in the form of mesh routers that belong to different entrepreneurs participating in a noncooperative TV white space trading. From a game theoretic perspective the non-cooperative interaction of the PUs is viewed as a pricing problem wherein each PU strives to maximize its own profit. Subsequently the problem is formulated as a Bertrand game in an oligopolistic market where the PUs are players who are responsible for selling TV white spectrum in the market while the SUs are the players who are the buyers of the TV white spectrum. The PUs strategise by way of price adjustment, so much such that SUs tend to favour the lowest price when buying. The inter- operator agreements are based on the delay and throughput QoS performance optimization metrics respectively. A performance evaluation of both models is comparatively performed with regards to parameters such as cost, generated revenue, profit, best response in price adjustments and channel quality. The throughput based analytic model fares better in terms of providing channel quality as it has a better strategy which is a decreased price value.

Keywords: White Spaces, Smart Radio, Non-Cooperative, Optimization, Game Theory, Broadband Market, Traffic Engineering.

Performance Analysis of RoFSO Links with Diversity Reception for Transmission of OFDM Signals Under Correlated Log-normal Fading Channels

Fan Bai, Yuwei Su and Takuro Sato

Graduate School of Globe Information and Telecommunication Studies, Waseda University, Tokyo 169-0072, Japan

Abstract: [+]    |    Download File [ 3002KB ]    |   Read Article Online

Abstract: Free space optical (FSO) communication has been receiving growing attention with recent commercialization successes as a cost-effective and high bandwidth optical access technique. Meanwhile, FSO communication has been regard as an attractive solution to bridging the gap between the wireless communications and optical fiber communications. However, a significant performance degradation in FSO communication system due to the atmospheric turbulence impairs the transmission performance improvement. FSO system employing the spatial diversity technique can be used to mitigate the effect of turbulence and improve the transmission performance. In this paper, a novel analytical approach is presented to evaluate the transmission performance of OFDM-FSO system with diversity reception considering effect of channel correlation.Adetailed mathematical model for OFDM-FSO system over turbulent channel modeled by correlated Log-normal distribution is provided. Then, We derive the signal-to-noise ratio (SNR), bit error ratio (BER) and outage probability expressions taking into account the diversity combining schemes (i.e. MRC, EGC), effects of atmospheric turbulence, channel correlation and aperture size of receiver lens. The results of this study show that the most significant parameters that degrade the system performance. Furthermore, the obtained numerical results can be useful for designing, evaluating and enhancing the FSO system’s ability to transmit wireless signal under actual conditions.

Keywords: Free Space Optical (FSO), Orthogonal Frequency Division Multiplexing (OFDM), spatial diversity, channel correlation, atmospheric turbulence, Maximum Ratio Combining (MRC), Equal Gain Combining (EGC).

Detecting and Mitigating Repaying Attack in Expressive Internet Architecture (XIA)

Beny Nugraha1, Rahamatullah Khondoker2, Ronald Marx2, and Kpatcha Bayarou2

1Department of Electrical Engineering, Mercu Buana University, Jakarta, Indonesia
2Fraunhofer SIT, Rheinstr. 75, Darmstadt, Germany

Abstract: [+]    |    Download File [ 4366KB ]    |   Read Article Online

Abstract: Several Future Internet (FI) architectures have been proposed to address the problems of the Internet including flexibility (so called IP bottleneck), host-based addressing (addressing a host rather than the content itself), and security. In the beginning of this article, we survey the security solutions of seven FI architectures, namely XIA, RINA, NENA, SONATE, Mobility-First, NDN, and SONATE, based on literatures, prototypes, and demonstrations. It has been found that none of the architectures can fulfill all of the security goals: confidentiality, authentication, integrity and availability. Further in this article, we focus on eXpressive Internet Architecture (XIA) as it is the most secure and open-source Content-Centric Network (CCN). CCN is claimed by the Future Content Networks (FCN) Group to be the Future Internet. However, XIA does not have any mechanisms to mitigate the replaying attack, thus, this article proposes and implements a solution to mitigate it. Several existing solutions have been analyzed to derive the requirements for the proposed solution. By implementing the proposed protocol, XIA is now able to mitigate all of the reviewed network attacks. The evaluation shows that the proposed solution is more secure and less complex over the existing solutions.

Keywords: Replaying Attack, Session Key, eXpressive Internet Architecture (XIA), Future Internet (FI), CCN.

Challenges of Security Assurance Standardization in ICT

Marcus Wong

Huawei Technologies (USA), Bridgewater, New Jersey, USA

Abstract: [+]    |    Download File [ 524KB ]    |   Read Article Online

Abstract: The explosion of mobile broadband growth has created a greater demand on the operators and vendors working together to place more and more telecom gears into wireless networks at a record pace to satisfy the users’ insatiable appetite for mobile data. The desire for undiminished security coupled with more sophisticated attacks in an ICT world where the traditionally closed telecom networks are going through a change of open architecture, open platform, and virtualization, the entire telecommunication community has taken a proactive approach to re-evaluate the security assurance process to ensure that the products are as secure as ever. The operators and the vendors have come together under the roof of 3GPP to create such a security assurance standards to be applied, recognized, and accepted in all areas for which 3GPP network products are sold and marketed. This paper will examine the many issues, hurdles, and challenges of the standardization of security assurance.

Keywords: Security Assurance, 3GPP, standards.

River Publishers: Journal of ICT Standardization