Editorial Foreword
Anand R. Prasad1 and Sivabalan Arumugam2
1Editor-in-Chief,
Rakuten Mobile Network, Japan
1Associate Editor,
NEC Technologies India Private Limited, India
Abstract: [+] | Download File [ 17KB ] | Read Article Online
Abstract: We present 4 papers in this issue of the journal. These unpublished and original research papers are direct submission to this journal. All the directly submitted papers were thoroughly reviewed before acceptance for publication.
Abstract: In an era of digital imagery, the analog film archives around the world
continue to age and perish. With a decaying film stock and conditions such
as inadequate storing and limited reliable backup methods, an irreversible
and progressively more rapid loss of recorded material is observed. Since
the 1930’s the FIAF (International Federation of Film Archives) has been
contributing to significant efforts in order to avoid the permanent loss of
these materials. UNESCO (The United Nations Educational, Scientific and
Cultural Organisation), understanding the certainty of such a future gave the
official status of World Heritage to international film archives in the 1980s
in an effort to promote the works for its preservation. Despite these efforts
though, constraints in fostering these works still exist. The 5G Networks that
are being architected to pave the way for new technological services by 2020,
will help to overcome some of those difficulties. This paper will address the
service orchestration to protect the film archives around the world under the
new 5G era.
Keywords: 5G, IMT-2020, 4K, 8K, Film Archives, Film Preservation,
QoE, Media and Broadcasting, Cloud Services, OTT, CODECs, Next-Gen
Optical Disk.
Abstract: The emergence of the Internet of Things (IoT) with its sprawling set of
technologies and use cases paves way for diversified and new service providers
to develop a plethora of connected products and services for a go-ahead
business and enrich lives of individuals. As the new service providers may be
unaware of the threats their services face and the emerging categories of first
time connected devices, IoT services, use cases and the network types comes
along with a new threat landscape there is a huge possibility for even a Zeroday
exploits. The provision of wide area connectivity to an ever-widening
variety of IoT services will increase the whole ecosystem’s exposure to fraud
and attack. As the security issues are a significant inhibitor to the deployment
of many new IoT services and attackers are showing ever greater interest in
this area, this research article presents an overview of the threat vectors to the
IoT ecosystem and the expected security features with Security-as-a-Network
Service (SENSE) and other solutions that need to be in place to thwart the
evolving security threats.
Keywords: Internet of Things, Network security threat, Communication
security, LTE, 5G and SENSE
Abstract: Mobile communication systems are ubiquitous nowadays. The main requirements
of these networks are privacy and security of the subscriber as well
as a high performance. To provide these properties the 3GPP (Third Generation
Partnership Project) developed the LTE (Long Term Evolution) mobile
communication network which is deployed worldwide.
In this paper, we give a brief overview of the LTE Network Architecture
as well as a look on the security mechanism as defined by 3GPP.We describe
the security architecture and discuss possible threats and attacks on the core
and on the access network. Due to these possible attacks we developed a
program which is able to extract certain security relevant information out of
the message flow in real time and to detect a possible attach flood attack.
Finally, we validate the function of the program with three test cases and
discuss the impact of such flood attacks on the LTE network and other future
work to extend it to other protocol exchanges.
Keywords: LTE, LTE Security, Blockmon.
Abstract: Internet Protocol security (IPSec) is an end-to-end security scheme to provide
security at the IP network layer, but this comes with performance implications
leading to throughput reduction and resource consumption. In this paper we
present a throughput performance analysis of IPSec protocol, for both IPv4
and IPv6, using various cryptographic algorithms as recommended in the standards
[13]. In this study we have considered only throughput performance for
authenticated encryption algorithms AES-GCM and AES-CCM, encryption
algorithms AES-CBC, AES-CTR, and 3DES, and authentication algorithms
SHA1, SHA2 and XCBC. The result shows that AES-GCM provides better
performance compared to the other recommended algorithms.
Keywords: IPSec, Authentication, 3GPP, NDS/IP, LTE/SAE, AES, IPv6.