Pub Date : 2010-11-18DOI: 10.1109/ICIN.2010.5640936
Ivan Krevatin
Modern telecom environment provides a rich set of services that require secure and reliable authentication. Biometric recognition is the only authentication technique that relies on person's characteristics for personal authentication. This paper gives an overview of a biometric system and biometric recognition techniques that use characteristics that are most suitable for application in telecom environment. Further, it analyses potential use case scenarios where those techniques could be applied.
{"title":"Biometric recognition in telecom environment","authors":"Ivan Krevatin","doi":"10.1109/ICIN.2010.5640936","DOIUrl":"https://doi.org/10.1109/ICIN.2010.5640936","url":null,"abstract":"Modern telecom environment provides a rich set of services that require secure and reliable authentication. Biometric recognition is the only authentication technique that relies on person's characteristics for personal authentication. This paper gives an overview of a biometric system and biometric recognition techniques that use characteristics that are most suitable for application in telecom environment. Further, it analyses potential use case scenarios where those techniques could be applied.","PeriodicalId":173857,"journal":{"name":"2010 14th International Conference on Intelligence in Next Generation Networks","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121358653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-18DOI: 10.1109/ICIN.2010.5640920
Jannis Rake-Revelant, Oliver Holschke, Philipp Offermann, Udo Bub
Telecommunication providers are still searching for business models beyond the bit pipe. While added-value services like Software-as-a-Service (SaaS) become more and more common for private customers as well as small and medium enterprises, in this paper we demonstrate the opportunities of Platform-as-a-Service offerings for specific business domains. By offering such platforms as cloud services, telecommunication providers can leverage their existing communications infrastructure to provide added-value services. Customer-specific SaaS can be created rapidly on such platforms, enabling customized business applications on a rental pricing scheme.
{"title":"Platform-as-a-Service for business customers","authors":"Jannis Rake-Revelant, Oliver Holschke, Philipp Offermann, Udo Bub","doi":"10.1109/ICIN.2010.5640920","DOIUrl":"https://doi.org/10.1109/ICIN.2010.5640920","url":null,"abstract":"Telecommunication providers are still searching for business models beyond the bit pipe. While added-value services like Software-as-a-Service (SaaS) become more and more common for private customers as well as small and medium enterprises, in this paper we demonstrate the opportunities of Platform-as-a-Service offerings for specific business domains. By offering such platforms as cloud services, telecommunication providers can leverage their existing communications infrastructure to provide added-value services. Customer-specific SaaS can be created rapidly on such platforms, enabling customized business applications on a rental pricing scheme.","PeriodicalId":173857,"journal":{"name":"2010 14th International Conference on Intelligence in Next Generation Networks","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123473706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-18DOI: 10.1109/ICIN.2010.5640919
T. Ahmed, Delphin Barankanira, S. Antoine, Xiaofeng Huang, Herve Duvocelle
EPS (Evolved Packet System) was designed with a new radio access network LTE (Long Term Evolution). But EPS also supports natively non-3GPP accesses with associated QoS (Quality of Service), security and mobility requirements. Although the initial EPS deployment would be with the introduction of LTE for providing higher data rate, operators would still need to introduce non-3GPP accesses, e.g. WiFi, WiMAX, etc. in EPS for various reasons, most notably to cope with “data tsunami” and reduce the cost per bit in their network. In this context, EPS has to consider that different non-3GPP accesses possess different characteristics in terms of security, bandwidth and tariffs. Moreover, EPS mobility management mechanism has to provide mobility support for non-3GPP accesses, which can be based on either client-based mobility protocol (e.g. Dual Stack Mobile IPv6 - DSMIPv6) or network-based mobility protocol (e.g. Proxy Mobile IPv6 - PMIPv6). This paper discusses various technical issues related to the migration of non-3GPP accesses in EPS.
{"title":"Inter-system mobility in evolved packet system (EPS): Connecting non-3GPP accesses","authors":"T. Ahmed, Delphin Barankanira, S. Antoine, Xiaofeng Huang, Herve Duvocelle","doi":"10.1109/ICIN.2010.5640919","DOIUrl":"https://doi.org/10.1109/ICIN.2010.5640919","url":null,"abstract":"EPS (Evolved Packet System) was designed with a new radio access network LTE (Long Term Evolution). But EPS also supports natively non-3GPP accesses with associated QoS (Quality of Service), security and mobility requirements. Although the initial EPS deployment would be with the introduction of LTE for providing higher data rate, operators would still need to introduce non-3GPP accesses, e.g. WiFi, WiMAX, etc. in EPS for various reasons, most notably to cope with “data tsunami” and reduce the cost per bit in their network. In this context, EPS has to consider that different non-3GPP accesses possess different characteristics in terms of security, bandwidth and tariffs. Moreover, EPS mobility management mechanism has to provide mobility support for non-3GPP accesses, which can be based on either client-based mobility protocol (e.g. Dual Stack Mobile IPv6 - DSMIPv6) or network-based mobility protocol (e.g. Proxy Mobile IPv6 - PMIPv6). This paper discusses various technical issues related to the migration of non-3GPP accesses in EPS.","PeriodicalId":173857,"journal":{"name":"2010 14th International Conference on Intelligence in Next Generation Networks","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124684146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-18DOI: 10.1109/ICIN.2010.5640939
Collin Mulliner
Accessing the Internet and specifically the World Wide Web from a mobile phone is common today. Especially since the usage fees for packet-data access dropped to a point where anybody who can can afford a mobile phone can afford mobile Internet access. Almost every mobile phone today comes with an integrated web browser that can display HTML web pages and execute JavaScript. Almost all major web sites such as news sites, social networks, and shopping sites run websites that are optimized for small displays of mobile phones. Due to the broad use of mobile web access we investigated possible privacy problems of mobile phone web access. We conducted a study where we monitor all HTTP headers sent from mobile phones to our web server. We analyzed the logged data for privacy problems. Through this study we determined that a world wide privacy problem exists when accessing the world wide web from a mobile phone. We show what kind of data is leaked and who leaks it.
{"title":"Privacy leaks in mobile phone internet access","authors":"Collin Mulliner","doi":"10.1109/ICIN.2010.5640939","DOIUrl":"https://doi.org/10.1109/ICIN.2010.5640939","url":null,"abstract":"Accessing the Internet and specifically the World Wide Web from a mobile phone is common today. Especially since the usage fees for packet-data access dropped to a point where anybody who can can afford a mobile phone can afford mobile Internet access. Almost every mobile phone today comes with an integrated web browser that can display HTML web pages and execute JavaScript. Almost all major web sites such as news sites, social networks, and shopping sites run websites that are optimized for small displays of mobile phones. Due to the broad use of mobile web access we investigated possible privacy problems of mobile phone web access. We conducted a study where we monitor all HTTP headers sent from mobile phones to our web server. We analyzed the logged data for privacy problems. Through this study we determined that a world wide privacy problem exists when accessing the world wide web from a mobile phone. We show what kind of data is leaked and who leaks it.","PeriodicalId":173857,"journal":{"name":"2010 14th International Conference on Intelligence in Next Generation Networks","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114925330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-10-14DOI: 10.1109/ICIN.2010.5640892
K. Stanoevska-Slabeva, T. Wozniak
This paper analyzes how new mobile platforms change existing value networks in the mobile service industry and describes how mobile network operators (MNOs) can react to such changes to remain competitive. A state-of-the-art analysis takes stock of mobile platforms provided by, e.g., device manufacturers and Internet companies. The business model of and ecosystem around such platforms are examined. This includes application stores, which are often tied to a mobile platform and enable developers to distribute and monetize their applications. MNOs' efforts to open up towards 3rd parties by exposing network capabilities through APIs are examined. MNOs' joint efforts to decrease fragmentation of their platforms and application stores are analyzed. Based on the results of the analysis, several options for MNOs' potential role in a mobile service industry dominated by mobile platforms are discussed.
{"title":"Opportunities and threats by mobile platforms: The (new) role of mobile network operators","authors":"K. Stanoevska-Slabeva, T. Wozniak","doi":"10.1109/ICIN.2010.5640892","DOIUrl":"https://doi.org/10.1109/ICIN.2010.5640892","url":null,"abstract":"This paper analyzes how new mobile platforms change existing value networks in the mobile service industry and describes how mobile network operators (MNOs) can react to such changes to remain competitive. A state-of-the-art analysis takes stock of mobile platforms provided by, e.g., device manufacturers and Internet companies. The business model of and ecosystem around such platforms are examined. This includes application stores, which are often tied to a mobile platform and enable developers to distribute and monetize their applications. MNOs' efforts to open up towards 3rd parties by exposing network capabilities through APIs are examined. MNOs' joint efforts to decrease fragmentation of their platforms and application stores are analyzed. Based on the results of the analysis, several options for MNOs' potential role in a mobile service industry dominated by mobile platforms are discussed.","PeriodicalId":173857,"journal":{"name":"2010 14th International Conference on Intelligence in Next Generation Networks","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133959747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-10-01DOI: 10.1109/ICIN.2010.5640905
K. Tutschku, Albert Rafetseder, J. Eisl, Werner Wiedermann
High quality and sustained multi media experience is expected to be a major feature of the Future Mobile Internet (FMI). Currently deployed novel mobile network technologies such as LTE (Long Term Evolution) make use of the Internet and its best-effort TCP/IP protocol stack to enable applications. The orientation towards TCP/IP is logical due to the success of the Internet. However, TCP/IP still provides almost no support for Quality of Service (QoS). Hence, it seams to be a contradiction that high quality services can be reached by TCP/IP. In this contribution, we discuss recent advances for sustained high quality multi media experience in FMI. Therefore, we first cast some new lights on the achievement in video streaming. We review the LTE and EPS (Evolved Packet System) architecture of the anticipated FMI, and discuss particularly the concept of bearers, which is also used an abstraction for QoS support. Subsequently, we introduce new network concepts which might contribute to improved QoS and performance management in the FMI such as flow-based QoS enforcement in routers, Network Virtualization, and Network Federation. Based on this analysis, we develop an initial service for supporting improved flow management for video streaming service in the FMI. Finally, we outline how flow management can improve the quality of videos, but outline also what happens if inappropriate flow switching mechanisms are applied.
{"title":"Towards sustained multi media experience in the Future Mobile Internet","authors":"K. Tutschku, Albert Rafetseder, J. Eisl, Werner Wiedermann","doi":"10.1109/ICIN.2010.5640905","DOIUrl":"https://doi.org/10.1109/ICIN.2010.5640905","url":null,"abstract":"High quality and sustained multi media experience is expected to be a major feature of the Future Mobile Internet (FMI). Currently deployed novel mobile network technologies such as LTE (Long Term Evolution) make use of the Internet and its best-effort TCP/IP protocol stack to enable applications. The orientation towards TCP/IP is logical due to the success of the Internet. However, TCP/IP still provides almost no support for Quality of Service (QoS). Hence, it seams to be a contradiction that high quality services can be reached by TCP/IP. In this contribution, we discuss recent advances for sustained high quality multi media experience in FMI. Therefore, we first cast some new lights on the achievement in video streaming. We review the LTE and EPS (Evolved Packet System) architecture of the anticipated FMI, and discuss particularly the concept of bearers, which is also used an abstraction for QoS support. Subsequently, we introduce new network concepts which might contribute to improved QoS and performance management in the FMI such as flow-based QoS enforcement in routers, Network Virtualization, and Network Federation. Based on this analysis, we develop an initial service for supporting improved flow management for video streaming service in the FMI. Finally, we outline how flow management can improve the quality of videos, but outline also what happens if inappropriate flow switching mechanisms are applied.","PeriodicalId":173857,"journal":{"name":"2010 14th International Conference on Intelligence in Next Generation Networks","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128497520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}