Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631263
Yves Adou, E. Markova, I. Gudkova
According to the latest data from the leading participants in the telecommunications market, such as Cisco Systems, the volume of traffic generated in modern wireless networks is increasing exponentially. The rapid growth of traffic, which appears in the context of providing a wide range of high-quality multimedia services to mobile network users leads to a lack of available radio spectrum. This is becoming a major problem in the development of modern wireless technologies. Mobile network operators offer various methods for solving this problem, such as the frameworks LAA and LSA, which allow more efficient use of available resources in the frequency band. In addition, as part of the implementation of various technologies to provide users services with the required level of QoS, mechanisms for managing radio resources, such as reducing the downlink power and interrupting users services can be applied. Models implementing such mechanisms can be described in the form of a queuing system with unreliable servers. This paper analyzes the performance metrics of a possible scheme for accessing the radio resources of a wireless network implemented through a mechanism for reducing the downlink power and interrupting user service. The mechanism itself is described in the form of a queuing system with unreliable servers, that are affected by a random environment.
{"title":"Performance Measures Analysis of Admission Control Scheme Model for Wireless Network, Described by a Queuing System Operating in Random Environment","authors":"Yves Adou, E. Markova, I. Gudkova","doi":"10.1109/ICUMT.2018.8631263","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631263","url":null,"abstract":"According to the latest data from the leading participants in the telecommunications market, such as Cisco Systems, the volume of traffic generated in modern wireless networks is increasing exponentially. The rapid growth of traffic, which appears in the context of providing a wide range of high-quality multimedia services to mobile network users leads to a lack of available radio spectrum. This is becoming a major problem in the development of modern wireless technologies. Mobile network operators offer various methods for solving this problem, such as the frameworks LAA and LSA, which allow more efficient use of available resources in the frequency band. In addition, as part of the implementation of various technologies to provide users services with the required level of QoS, mechanisms for managing radio resources, such as reducing the downlink power and interrupting users services can be applied. Models implementing such mechanisms can be described in the form of a queuing system with unreliable servers. This paper analyzes the performance metrics of a possible scheme for accessing the radio resources of a wireless network implemented through a mechanism for reducing the downlink power and interrupting user service. The mechanism itself is described in the form of a queuing system with unreliable servers, that are affected by a random environment.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132497502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631232
V. Kulik, R. Kirichek
The architecture of the heterogeneous Internet of Things (IoT) gateway and the problems of its integration with the Industrial Internet of Things (IIoT) are investigated in this article. In particular, the issue of the usage of heterogeneous gateway for conversion of packages, which formed on various industrial protocols, is raised. To solve this problem, authors are created the architecture of software for data formats transformation between different industrial protocols. As a possible solution, authors propose computer appliance, that use heterogeneous IoT gateways. Study the data format for packets of various IoT protocols and the main fields of packets, which needed for message conversion between each others, are conducted.
{"title":"The Heterogeneous Gateways in the Industrial Internet of Things","authors":"V. Kulik, R. Kirichek","doi":"10.1109/ICUMT.2018.8631232","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631232","url":null,"abstract":"The architecture of the heterogeneous Internet of Things (IoT) gateway and the problems of its integration with the Industrial Internet of Things (IIoT) are investigated in this article. In particular, the issue of the usage of heterogeneous gateway for conversion of packages, which formed on various industrial protocols, is raised. To solve this problem, authors are created the architecture of software for data formats transformation between different industrial protocols. As a possible solution, authors propose computer appliance, that use heterogeneous IoT gateways. Study the data format for packets of various IoT protocols and the main fields of packets, which needed for message conversion between each others, are conducted.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117054545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631265
Jan Mucha, J. Mekyska, M. Faúndez-Zanuy, K. L. D. Ipiña, Vojtech Zvoncak, Z. Galaz, Tomas Kiska, Z. Smékal, L. Brabenec, I. Rektorová
Parkinson's disease (PD) is one of the most frequent neurodegenerative disorder with progressive decline in several motor and non-motor skills. Due to time-consuming and partially subjective conventional PD diagnosis, several more effective approaches based on signal processing and machine learning, e. g. online handwriting analysis, have been proposed. This paper introduces a new methodology of PD dysgraphia analysis based on fractional derivatives applied in PD handwriting quantification. The proposed methodology was evaluated on a database that consists 33 PD patients and 36 healthy controls who performed several handwriting tasks. Employing random forests classifier in combination with 5 kinematic features based on fractional-order derivatives we reached 90% classification accuracy, 89% sensitivity, and 91 % specificity. In comparison with the results of other related works dealing with the same database, the proposed approach brings improvements in PD dysgraphia diagnosis and confirms the impact of fractional derivatives in kinematic analysis.
{"title":"Advanced Parkinson's Disease Dysgraphia Analysis Based on Fractional Derivatives of Online Handwriting","authors":"Jan Mucha, J. Mekyska, M. Faúndez-Zanuy, K. L. D. Ipiña, Vojtech Zvoncak, Z. Galaz, Tomas Kiska, Z. Smékal, L. Brabenec, I. Rektorová","doi":"10.1109/ICUMT.2018.8631265","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631265","url":null,"abstract":"Parkinson's disease (PD) is one of the most frequent neurodegenerative disorder with progressive decline in several motor and non-motor skills. Due to time-consuming and partially subjective conventional PD diagnosis, several more effective approaches based on signal processing and machine learning, e. g. online handwriting analysis, have been proposed. This paper introduces a new methodology of PD dysgraphia analysis based on fractional derivatives applied in PD handwriting quantification. The proposed methodology was evaluated on a database that consists 33 PD patients and 36 healthy controls who performed several handwriting tasks. Employing random forests classifier in combination with 5 kinematic features based on fractional-order derivatives we reached 90% classification accuracy, 89% sensitivity, and 91 % specificity. In comparison with the results of other related works dealing with the same database, the proposed approach brings improvements in PD dysgraphia diagnosis and confirms the impact of fractional derivatives in kinematic analysis.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115563753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631210
D. Vorobieva, Igro Kefeli, M. Kolbanev, A. Shamin
The new high-quality level of information and communication technologies, their standardization and massive implementation ensure a passage to a new stage in the development of the information society – to digital economy, which has become the political, economic and cultural purpose of all developed countries of the modern world. The move towards this purpose is supported by government programs, development programs of regions and national economy sectors and a large number of other initiatives. Building a digital economy involves solving a number of problems, which have one common root cause – cardinal change of information communication technologies. In process of practical movement to new principles of management the contradiction between private and general approaches to their introduction becomes more acute. On the one hand, we can see financial growth of an increasing number of local tasks, the development of certain technologies, pilot projects and start-ups, and, on the other hand, insufficient attention to the development of an integrated systematic approach to the study of the digital economy as a holistic technological project that uses generalized information models and architecture. It's clear that without studying the properties of the digital economy as a large digital information system, it is impossible to form new markets and activity models in any of the application areas. The problem solved in the article is to resolve this contradiction. Goal of the work – the construction of an architectural model of a digital economy that unites the entire set of fundamental principles of its technological organization that are embodied in a set of digital technologies, the connections of technologies with each other and with the external environment. The following tasks are solved: • the properties and attributes of the digital economy are analyzed, • precondition of the architectural description of the digital economy are identified, • a stratified architectural model of digital economy is developed. It is shown that the architectural model of the digital economy must contain infrastructure and subject-oriented levels. The first group includes physical laws and technologies for constructing real and virtual digital datal sources, networks and storing systems, data processing and distribution, as well as cloudy and foggy computing. The second – technologies for creating structures and data analysis, building digital platforms and applications, creating a digital platform ecosystem, digital markets and business processes models. The methodology of the conducted research uses the principles of designing models system developed in the construction of digital infocommunications systems architectures; cloud computing, industrial Internet, big data, overlaid services and other technologies of the third informatization platform. The methodology used made possible to divide the entire complex process of creating the digital economy into simple pa
{"title":"Architecture of Digital Economy","authors":"D. Vorobieva, Igro Kefeli, M. Kolbanev, A. Shamin","doi":"10.1109/ICUMT.2018.8631210","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631210","url":null,"abstract":"The new high-quality level of information and communication technologies, their standardization and massive implementation ensure a passage to a new stage in the development of the information society – to digital economy, which has become the political, economic and cultural purpose of all developed countries of the modern world. The move towards this purpose is supported by government programs, development programs of regions and national economy sectors and a large number of other initiatives. Building a digital economy involves solving a number of problems, which have one common root cause – cardinal change of information communication technologies. In process of practical movement to new principles of management the contradiction between private and general approaches to their introduction becomes more acute. On the one hand, we can see financial growth of an increasing number of local tasks, the development of certain technologies, pilot projects and start-ups, and, on the other hand, insufficient attention to the development of an integrated systematic approach to the study of the digital economy as a holistic technological project that uses generalized information models and architecture. It's clear that without studying the properties of the digital economy as a large digital information system, it is impossible to form new markets and activity models in any of the application areas. The problem solved in the article is to resolve this contradiction. Goal of the work – the construction of an architectural model of a digital economy that unites the entire set of fundamental principles of its technological organization that are embodied in a set of digital technologies, the connections of technologies with each other and with the external environment. The following tasks are solved: • the properties and attributes of the digital economy are analyzed, • precondition of the architectural description of the digital economy are identified, • a stratified architectural model of digital economy is developed. It is shown that the architectural model of the digital economy must contain infrastructure and subject-oriented levels. The first group includes physical laws and technologies for constructing real and virtual digital datal sources, networks and storing systems, data processing and distribution, as well as cloudy and foggy computing. The second – technologies for creating structures and data analysis, building digital platforms and applications, creating a digital platform ecosystem, digital markets and business processes models. The methodology of the conducted research uses the principles of designing models system developed in the construction of digital infocommunications systems architectures; cloud computing, industrial Internet, big data, overlaid services and other technologies of the third informatization platform. The methodology used made possible to divide the entire complex process of creating the digital economy into simple pa","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125569598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631240
Konstantin Mikhaylov, A. Moiz, A. Pouttu, J. Rapun, Sergio Ayuso Gascon
The energy grids became a cardiovascular system of the today's civilization. In the recent years the new political initiatives aiming at reducing the pollution by increasing the share of energy generated by renewables have gained momentum, which introduces novel challenges and use cases. In the paper we investigate the utility and report our experiences of deploying a prototype wind-turbine monitoring solution based on the recently developed low power wide area network (LPWAN) technology named LoRaWAN. We engineer, instrument and deploy the complete end-to-end solution, starting from the power generation monitoring sensor node and up to the IoT platform with a web-based graphical user interface. The details of the design and deployment choices, and the results and lessons learned coming from analysis of operation of the deployed system over the nine-month period are reported. These results show that LPWANs in general and LoRaWAntechnology in particular is suitable for monitoring the energy infrastructure.
{"title":"LoRa WAN for Wind Turbine Monitoring: Prototype and Practical Deployment","authors":"Konstantin Mikhaylov, A. Moiz, A. Pouttu, J. Rapun, Sergio Ayuso Gascon","doi":"10.1109/ICUMT.2018.8631240","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631240","url":null,"abstract":"The energy grids became a cardiovascular system of the today's civilization. In the recent years the new political initiatives aiming at reducing the pollution by increasing the share of energy generated by renewables have gained momentum, which introduces novel challenges and use cases. In the paper we investigate the utility and report our experiences of deploying a prototype wind-turbine monitoring solution based on the recently developed low power wide area network (LPWAN) technology named LoRaWAN. We engineer, instrument and deploy the complete end-to-end solution, starting from the power generation monitoring sensor node and up to the IoT platform with a web-based graphical user interface. The details of the design and deployment choices, and the results and lessons learned coming from analysis of operation of the deployed system over the nine-month period are reported. These results show that LPWANs in general and LoRaWAntechnology in particular is suitable for monitoring the energy infrastructure.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"32 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125711556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631278
I. Noskov, S. Bezzateev
In this paper, we consider traceability schemes that are used for traitor tracing. We use finite geometry such as affine geometry and projective geometry for making them. Then we modify traceability schemes to improve performance. And we describe the technique of embedding for traceability schemes.
{"title":"Traceability Schemes Usings Finite Geometry","authors":"I. Noskov, S. Bezzateev","doi":"10.1109/ICUMT.2018.8631278","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631278","url":null,"abstract":"In this paper, we consider traceability schemes that are used for traitor tracing. We use finite geometry such as affine geometry and projective geometry for making them. Then we modify traceability schemes to improve performance. And we describe the technique of embedding for traceability schemes.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124917907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631244
I. Zaryadov, E. Bogdanova, T. Milovanova, Sergey Matushenko, Daria Pyatkina
Consideration is given to the queuing system, consisting of one server and a queue of unlimited capacity, with the implemented mechanism of general renovation and feedback. This mechanism, which may be considered as a variant of an active queue management scheme, works as follows. In this short note we show how the main ingredients needed to compute some of the main stationary performance characteristics of the system can be found. The basic methods are transform techniques and methods for the solutions of Volterra integral equations of the second kind with the kernels of convolution type. We concentrate on the stationary distribution of the embedded Markov chain, show how it is related with the stationary distribution of the process, describing the evolution of the total number of customers in the system. Under the two assumptions about the service discipline and the order in which the customers are removed from the queue whenever renovation occurs, we derive expressions for stationary loss probability and the sojourn time distribution in terms of Laplace-Stielties transform.
{"title":"Stationary Characteristics of the GI/M/1 Queue with General Renovation and Feedback","authors":"I. Zaryadov, E. Bogdanova, T. Milovanova, Sergey Matushenko, Daria Pyatkina","doi":"10.1109/ICUMT.2018.8631244","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631244","url":null,"abstract":"Consideration is given to the queuing system, consisting of one server and a queue of unlimited capacity, with the implemented mechanism of general renovation and feedback. This mechanism, which may be considered as a variant of an active queue management scheme, works as follows. In this short note we show how the main ingredients needed to compute some of the main stationary performance characteristics of the system can be found. The basic methods are transform techniques and methods for the solutions of Volterra integral equations of the second kind with the kernels of convolution type. We concentrate on the stationary distribution of the embedded Markov chain, show how it is related with the stationary distribution of the process, describing the evolution of the total number of customers in the system. Under the two assumptions about the service discipline and the order in which the customers are removed from the queue whenever renovation occurs, we derive expressions for stationary loss probability and the sojourn time distribution in terms of Laplace-Stielties transform.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125019028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631208
A. Yastrebova, R. Kirichek, Y. Koucheryavy, A. Borodin, A. Koucheryavy
New technologies are approaching with big footsteps. In the decades ahead it is expected significant changes in technologies regarding to new types of devices, system and functions that they perform. We are expecting new services with various requirements, and new applications such as holographic telepresence, instant data transmission, remote surgery, minimized IoT terminals, autonomous transportation system, etc. Wide adaptation of new applications depends on how good they are supported by the network infrastructure. That is why the estimation of next generation network architecture is required. By the year 2030 the applications of new technologies are expected to generate an enormous amount of traffic. The architecture of the future networks must consider all the gaps of already existing networks in order to ensure the highest robustness, extremely low latency, Ubiquitous coverage as new applications and services require.
{"title":"Future Networks 2030: Architecture & Requirements","authors":"A. Yastrebova, R. Kirichek, Y. Koucheryavy, A. Borodin, A. Koucheryavy","doi":"10.1109/ICUMT.2018.8631208","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631208","url":null,"abstract":"New technologies are approaching with big footsteps. In the decades ahead it is expected significant changes in technologies regarding to new types of devices, system and functions that they perform. We are expecting new services with various requirements, and new applications such as holographic telepresence, instant data transmission, remote surgery, minimized IoT terminals, autonomous transportation system, etc. Wide adaptation of new applications depends on how good they are supported by the network infrastructure. That is why the estimation of next generation network architecture is required. By the year 2030 the applications of new technologies are expected to generate an enormous amount of traffic. The architecture of the future networks must consider all the gaps of already existing networks in order to ensure the highest robustness, extremely low latency, Ubiquitous coverage as new applications and services require.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126309434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631275
D. Osipov
When combined with frequency hopping and error correction coding reception techniques based on distribution-free tests provide strong immunity to various types of interference (including multiuser interference) which makes systems using such techniques promising candidates for various applications such as IoT (Internet of Things) and D2D (Device to Device) communications. Unfortunately complexity considerations impose drastic restrictions on code parameters. In this paper a decoding technique is proposed that combines list decoding, ordered statistics decoding and recently proposed distribution-free reception technique in order to ease those restrictions. It is shown that the proposed approach provides considerable Frame Error Rate decrease for the same transmission rates.
{"title":"Decoding Techniques for Coded FH OFDMA with Nonparametric Reception","authors":"D. Osipov","doi":"10.1109/ICUMT.2018.8631275","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631275","url":null,"abstract":"When combined with frequency hopping and error correction coding reception techniques based on distribution-free tests provide strong immunity to various types of interference (including multiuser interference) which makes systems using such techniques promising candidates for various applications such as IoT (Internet of Things) and D2D (Device to Device) communications. Unfortunately complexity considerations impose drastic restrictions on code parameters. In this paper a decoding technique is proposed that combines list decoding, ordered statistics decoding and recently proposed distribution-free reception technique in order to ease those restrictions. It is shown that the proposed approach provides considerable Frame Error Rate decrease for the same transmission rates.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131847060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-11-01DOI: 10.1109/ICUMT.2018.8631228
J. Hajny, Petr Dzurenda, Sara Ricci, L. Malina, K. Vrba
The paper deals with the implementation aspects of the bilinear pairing operation over an elliptic curve on constrained devices, such as smart cards, embedded devices, smart meters and similar devices. Although cryptographic constructions, such as group signatures, anonymous credentials or identity-based encryption schemes, often rely on the pairing operation, the implementation of such schemes into practical applications is not straightforward, in fact, it may become very difficult. In this paper, we show that the implementation is difficult not only due to the high computational complexity, but also due to the lack of cryptographic libraries and programming interfaces. In particular, we show how difficult it is to implement pairing-based schemes on constrained devices and show the performance of various libraries on different platforms. Furthermore, we show the performance estimates of fundamental cryptographic constructions, the group signatures. The purpose of this paper is to reduce the gap between the cryptographic designers and developers and give performance results that can be used for the estimation of the implementability and performance of novel, upcoming schemes.
{"title":"Performance Analysis of Pairing-Based Elliptic Curve Cryptography on Constrained Devices","authors":"J. Hajny, Petr Dzurenda, Sara Ricci, L. Malina, K. Vrba","doi":"10.1109/ICUMT.2018.8631228","DOIUrl":"https://doi.org/10.1109/ICUMT.2018.8631228","url":null,"abstract":"The paper deals with the implementation aspects of the bilinear pairing operation over an elliptic curve on constrained devices, such as smart cards, embedded devices, smart meters and similar devices. Although cryptographic constructions, such as group signatures, anonymous credentials or identity-based encryption schemes, often rely on the pairing operation, the implementation of such schemes into practical applications is not straightforward, in fact, it may become very difficult. In this paper, we show that the implementation is difficult not only due to the high computational complexity, but also due to the lack of cryptographic libraries and programming interfaces. In particular, we show how difficult it is to implement pairing-based schemes on constrained devices and show the performance of various libraries on different platforms. Furthermore, we show the performance estimates of fundamental cryptographic constructions, the group signatures. The purpose of this paper is to reduce the gap between the cryptographic designers and developers and give performance results that can be used for the estimation of the implementability and performance of novel, upcoming schemes.","PeriodicalId":211042,"journal":{"name":"2018 10th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124606696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}