submit Opinions CrossRef Open Access Subscribe New Journal Ideal

Click on image to enlarge

Journal of ICT Standardization

Editor-in-Chief: Anand R. Prasad, Rakuten Mobile Inc, Japan

Associate Editor: Sivabalan Arumugam, Rakuten Mobile Inc, Japan


ISSN: 2245-800X (Print Version),

ISSN: 2246-0853 (Online Version)
Vol: 7   Issue: 1

Published In:   January 2019

Publication Frequency: Triannual


Search Available Volume and Issue for Journal of ICT Standardization


Journal Description        Read Full Articles        Editorial Board        Subscription        Indexed       Opinions

Editorial Foreword


Anand R. Prasad1 and Sivabalan Arumugam2

1Editor-in-Chief, Rakuten Mobile Network, Japan
1Associate Editor, NEC Technologies India Private Limited, India

Abstract: [+]    |    Download File [ 17KB ]    |   Read Article Online

Abstract: We present 4 papers in this issue of the journal. These unpublished and original research papers are direct submission to this journal. All the directly submitted papers were thoroughly reviewed before acceptance for publication.

Service Orchestration for Film Preservation Over 5G

doi: https://doi.org/10.13052/jicts2245-800X.711
Paulo Sergio Rufino Henrique1 and José Maria Pereira Lopes2

1Integration Engineer, Spideo, France
2Film Archives Coordinator; Director TV and Film Restoration, TV Cultura, Brazil

Abstract: [+]    |    Download File [ 1677KB ]    |   Read Article Online

Abstract: In an era of digital imagery, the analog film archives around the world continue to age and perish. With a decaying film stock and conditions such as inadequate storing and limited reliable backup methods, an irreversible and progressively more rapid loss of recorded material is observed. Since the 1930’s the FIAF (International Federation of Film Archives) has been contributing to significant efforts in order to avoid the permanent loss of these materials. UNESCO (The United Nations Educational, Scientific and Cultural Organisation), understanding the certainty of such a future gave the official status of World Heritage to international film archives in the 1980s in an effort to promote the works for its preservation. Despite these efforts though, constraints in fostering these works still exist. The 5G Networks that are being architected to pave the way for new technological services by 2020, will help to overcome some of those difficulties. This paper will address the service orchestration to protect the film archives around the world under the new 5G era.

Keywords: 5G, IMT-2020, 4K, 8K, Film Archives, Film Preservation, QoE, Media and Broadcasting, Cloud Services, OTT, CODECs, Next-Gen Optical Disk.

Internet of Things Security

doi: https://doi.org/10.13052/jicts2245-800X.712
Sheeba Backia Mary Baskaran

NEC Technologies India Pvt. Ltd., India

Abstract: [+]    |    Download File [ 1733KB ]    |   Read Article Online

Abstract: The emergence of the Internet of Things (IoT) with its sprawling set of technologies and use cases paves way for diversified and new service providers to develop a plethora of connected products and services for a go-ahead business and enrich lives of individuals. As the new service providers may be unaware of the threats their services face and the emerging categories of first time connected devices, IoT services, use cases and the network types comes along with a new threat landscape there is a huge possibility for even a Zeroday exploits. The provision of wide area connectivity to an ever-widening variety of IoT services will increase the whole ecosystem’s exposure to fraud and attack. As the security issues are a significant inhibitor to the deployment of many new IoT services and attackers are showing ever greater interest in this area, this research article presents an overview of the threat vectors to the IoT ecosystem and the expected security features with Security-as-a-Network Service (SENSE) and other solutions that need to be in place to thwart the evolving security threats.

Keywords: Internet of Things, Network security threat, Communication security, LTE, 5G and SENSE

Security Study and Monitoring of LTE Networks

doi: https://doi.org/10.13052/jicts2245-800X.713
Dominik Ernsberger1, K. Jijo George2

1University of Applied Sciences Munich, Germany
2NEC Technologies India Private Ltd. Chennai, India

Abstract: [+]    |    Download File [ 1634KB ]    |   Read Article Online

Abstract: Mobile communication systems are ubiquitous nowadays. The main requirements of these networks are privacy and security of the subscriber as well as a high performance. To provide these properties the 3GPP (Third Generation Partnership Project) developed the LTE (Long Term Evolution) mobile communication network which is deployed worldwide.

In this paper, we give a brief overview of the LTE Network Architecture as well as a look on the security mechanism as defined by 3GPP.We describe the security architecture and discuss possible threats and attacks on the core and on the access network. Due to these possible attacks we developed a program which is able to extract certain security relevant information out of the message flow in real time and to detect a possible attach flood attack. Finally, we validate the function of the program with three test cases and discuss the impact of such flood attacks on the LTE network and other future work to extend it to other protocol exchanges.

Keywords: LTE, LTE Security, Blockmon.

IPSec: Performance Analysis in IPv4 and IPv6

doi: https://doi.org/10.13052/jicts2245-800X.714
Prabhu Thiruvasagam and K. Jijo George

NEC India Private Limited, India

Abstract: [+]    |    Download File [ 1761KB ]    |   Read Article Online

Abstract: Internet Protocol security (IPSec) is an end-to-end security scheme to provide security at the IP network layer, but this comes with performance implications leading to throughput reduction and resource consumption. In this paper we present a throughput performance analysis of IPSec protocol, for both IPv4 and IPv6, using various cryptographic algorithms as recommended in the standards [13]. In this study we have considered only throughput performance for authenticated encryption algorithms AES-GCM and AES-CCM, encryption algorithms AES-CBC, AES-CTR, and 3DES, and authentication algorithms SHA1, SHA2 and XCBC. The result shows that AES-GCM provides better performance compared to the other recommended algorithms.

Keywords: IPSec, Authentication, 3GPP, NDS/IP, LTE/SAE, AES, IPv6.

River Publishers: Journal of ICT Standardization