Maha Aljohani, Manal Alruqi, Ohoud Alboqomi, Abeer Alqahtani
End-users share various personal information with different types of websites such as governmental, social networking, or educational websites. Websites vary in importance to the user and sensitivity of the information they involved about users. The password is the access key to the user account on websites and the first defense against unauthorized access. Previous studies mostly focused on the strength and weaknesses of passwords. This paper focuses on the passwords and the password’s relevance to the website’s sensitivity based on the type of information shared on them. A survey and think-aloud experiment, and post-interview are conducted in our laboratory. The participants were asked to create passwords to register on three different websites while thinking aloud so experimenters can prove and reject some hypotheses. The study’s results confirm that the importance of a website affects users’ behaviors and passwords.
{"title":"An Experimental Study to Understand How Users Choose Password","authors":"Maha Aljohani, Manal Alruqi, Ohoud Alboqomi, Abeer Alqahtani","doi":"10.1145/3440749.3442643","DOIUrl":"https://doi.org/10.1145/3440749.3442643","url":null,"abstract":"End-users share various personal information with different types of websites such as governmental, social networking, or educational websites. Websites vary in importance to the user and sensitivity of the information they involved about users. The password is the access key to the user account on websites and the first defense against unauthorized access. Previous studies mostly focused on the strength and weaknesses of passwords. This paper focuses on the passwords and the password’s relevance to the website’s sensitivity based on the type of information shared on them. A survey and think-aloud experiment, and post-interview are conducted in our laboratory. The participants were asked to create passwords to register on three different websites while thinking aloud so experimenters can prove and reject some hypotheses. The study’s results confirm that the importance of a website affects users’ behaviors and passwords.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127782752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the number of networked devices and applications rapidly grows, particularly the Internet of Things applications, billions of devices are connected to the network and therefore managing the generated traffic becomes a needy task. Effectively managing these devices to support reliable, secure, and high-quality applications become challenging. The main solution to manage network traffic is the automatic classification of application aimed at identifying the semantic type of the application by analyzing its network traffic and wide range of new features. This article proposes a model for dynamic network traffic classification in Software-Defined Networks based on the modified k-means algorithm for network resources distribution to prioritized types of traffic, which allows network applications optimization
{"title":"Dynamic Flow Classification Model for Resource Distribution in SDN Networks","authors":"S. Muhizi, M. Al-Bahri","doi":"10.1145/3440749.3442613","DOIUrl":"https://doi.org/10.1145/3440749.3442613","url":null,"abstract":"As the number of networked devices and applications rapidly grows, particularly the Internet of Things applications, billions of devices are connected to the network and therefore managing the generated traffic becomes a needy task. Effectively managing these devices to support reliable, secure, and high-quality applications become challenging. The main solution to manage network traffic is the automatic classification of application aimed at identifying the semantic type of the application by analyzing its network traffic and wide range of new features. This article proposes a model for dynamic network traffic classification in Software-Defined Networks based on the modified k-means algorithm for network resources distribution to prioritized types of traffic, which allows network applications optimization","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131834597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Quantum computing has quickly become at the vanguard of many computer science fields today. This is motivated by quantum computers ability to perform computational tasks with efficiencies that are not possible with classical computers. Quantum computing technology has a lasting potential impact on society and a broad implications on many aspects of our lives. Communications Industry Researchers (CIR) estimates that the global quantum-computing market is expected to reach $1.9 billion in 2023, increasing to $8 billion by 2027, in spending on associated software and services. Although quantum computing has several advantages, it threatens the current cryptographic techniques, which are necessary for today’s Internet standards like the Transport Layer Security (TLS). This is due to its ability to perform infinite complex computations in parallel. Therefore, it is expected that quantum computers will be able to solve the key distribution problem and break every single cryptography and authentication algorithm based on Asymmetric cryptography, such as: RSA, ECC, and Diffie-Hellman. New emerging technologies such as the Internet of Things (IoT), blockchain, autonomous vehicles, 5G, Artificial Intelligence (AI) and robotics all rely on cryptography for their secure operation. Although quantum computing supports technological evolution and growth, it will pose a threat to the current progress and future development of these technologies. Therefore, cryptography and authentication techniques need improvements as introducing quantum computing would put today’s cybersecurity in serious risk. NSA and NIST proposed solutions to tackle these challenges. However, these solutions are still immature as they need major upgrade of hardware implementation. Instead, the recommendations focus on what is called post-quantum, quantum-proof, quantum-safe or quantum-resistant cryptosystems. This talk outlines how the impact of quantum technologies on authentication, data exchange, and data storage, as well as areas where cryptography plays an essential role, such as: blockchain, 5G, IoT, and AI technologies. It investigate the possible impact of quantum technologies on these emerging technologies. Finally, it discusses some of the current quantum security solution that are devoted to protect the devices and systems in the quantum era, and mitigate quantum attacks.
{"title":"Security Challenges Posed by Quantum Computing on Emerging Technologies","authors":"A. Abuarqoub","doi":"10.1145/3440749.3442651","DOIUrl":"https://doi.org/10.1145/3440749.3442651","url":null,"abstract":"Quantum computing has quickly become at the vanguard of many computer science fields today. This is motivated by quantum computers ability to perform computational tasks with efficiencies that are not possible with classical computers. Quantum computing technology has a lasting potential impact on society and a broad implications on many aspects of our lives. Communications Industry Researchers (CIR) estimates that the global quantum-computing market is expected to reach $1.9 billion in 2023, increasing to $8 billion by 2027, in spending on associated software and services. Although quantum computing has several advantages, it threatens the current cryptographic techniques, which are necessary for today’s Internet standards like the Transport Layer Security (TLS). This is due to its ability to perform infinite complex computations in parallel. Therefore, it is expected that quantum computers will be able to solve the key distribution problem and break every single cryptography and authentication algorithm based on Asymmetric cryptography, such as: RSA, ECC, and Diffie-Hellman. New emerging technologies such as the Internet of Things (IoT), blockchain, autonomous vehicles, 5G, Artificial Intelligence (AI) and robotics all rely on cryptography for their secure operation. Although quantum computing supports technological evolution and growth, it will pose a threat to the current progress and future development of these technologies. Therefore, cryptography and authentication techniques need improvements as introducing quantum computing would put today’s cybersecurity in serious risk. NSA and NIST proposed solutions to tackle these challenges. However, these solutions are still immature as they need major upgrade of hardware implementation. Instead, the recommendations focus on what is called post-quantum, quantum-proof, quantum-safe or quantum-resistant cryptosystems. This talk outlines how the impact of quantum technologies on authentication, data exchange, and data storage, as well as areas where cryptography plays an essential role, such as: blockchain, 5G, IoT, and AI technologies. It investigate the possible impact of quantum technologies on these emerging technologies. Finally, it discusses some of the current quantum security solution that are devoted to protect the devices and systems in the quantum era, and mitigate quantum attacks.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121235240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Carta, S. Consoli, Andrea Corriga, Raffaele Dapiaggi, Alessandro Sebastian Podda, D. R. Recupero
Financial forecasting represents a challenging task, mainly due to the irregularity of the market, high fluctuations and noise of the involved data, as well as collateral phenomena including investor mood and mass psychology. In recent years, many researchers focused their work on predicting the performance of the market by exploiting novel Machine Learning and Deep Learning tools and techniques. However, many of the approaches proposed in the literature do not take adequately into account some important specific domain issues in the analysis of the results. Among these, it is worth to mention the bias introduced by the choice of model weights initialization and the considered observation periods, as well as the narrow separation between significant results and noise, typical of the financial domain. A thorough analysis of these peculiar issues lead to a substantial increase of the experiments and results to analyze, making the discovery of meaningful hidden patterns very difficult and time consuming to perform. To cope with these concerns and accompanying the current Machine Learning Interpretability trend, in this paper we propose a visual framework for in-depth analysis of results obtained from Deep Learning approaches, tackling classification tasks within the financial domain and aiming at a better interpretation and explanation of the trained Deep Learning models. Our framework offers a modular view, both general and targeted, of results data, providing several financial specific metrics, including Sharpe and Sortino ratios, Equity curves and Maximum Drawdown, as well as custom period analysis and reports, experiment comparison tools, and evaluation features for different algorithms.
{"title":"HawkEye: a Visual Framework for Agile Cross-Validation of Deep Learning Approaches in Financial Forecasting","authors":"S. Carta, S. Consoli, Andrea Corriga, Raffaele Dapiaggi, Alessandro Sebastian Podda, D. R. Recupero","doi":"10.1145/3440749.3442653","DOIUrl":"https://doi.org/10.1145/3440749.3442653","url":null,"abstract":"Financial forecasting represents a challenging task, mainly due to the irregularity of the market, high fluctuations and noise of the involved data, as well as collateral phenomena including investor mood and mass psychology. In recent years, many researchers focused their work on predicting the performance of the market by exploiting novel Machine Learning and Deep Learning tools and techniques. However, many of the approaches proposed in the literature do not take adequately into account some important specific domain issues in the analysis of the results. Among these, it is worth to mention the bias introduced by the choice of model weights initialization and the considered observation periods, as well as the narrow separation between significant results and noise, typical of the financial domain. A thorough analysis of these peculiar issues lead to a substantial increase of the experiments and results to analyze, making the discovery of meaningful hidden patterns very difficult and time consuming to perform. To cope with these concerns and accompanying the current Machine Learning Interpretability trend, in this paper we propose a visual framework for in-depth analysis of results obtained from Deep Learning approaches, tackling classification tasks within the financial domain and aiming at a better interpretation and explanation of the trained Deep Learning models. Our framework offers a modular view, both general and targeted, of results data, providing several financial specific metrics, including Sharpe and Sortino ratios, Equity curves and Maximum Drawdown, as well as custom period analysis and reports, experiment comparison tools, and evaluation features for different algorithms.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"30 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124231928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper determines the application of the network coding method in the system for gathering information from wireless body area networks based on unmanned flying platforms. Application of network coding methods is carried out using the proposed model of a data acquisition network. The limits of applicability of the proposed method are estimated and statistical modeling is carried out using various checksum algorithms, taking into account the features of the problem being solved. The analysis of the simulation results is carried out.
{"title":"Network Coding for the Interaction of Unmanned Flying Platforms in Data Acquisition Networks","authors":"S. Vladimirov, R. Kirichek, V. Vishnevsky","doi":"10.1145/3440749.3442622","DOIUrl":"https://doi.org/10.1145/3440749.3442622","url":null,"abstract":"The paper determines the application of the network coding method in the system for gathering information from wireless body area networks based on unmanned flying platforms. Application of network coding methods is carried out using the proposed model of a data acquisition network. The limits of applicability of the proposed method are estimated and statistical modeling is carried out using various checksum algorithms, taking into account the features of the problem being solved. The analysis of the simulation results is carried out.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121551707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A coordinated ranking as the opinion of an expert group usually can be represented by the well-known Kemeny's median. The Kemeny's median is the least different ranking from other rankings and is free of known contradictions of the majority rule problem. As a mathematical principle, the Kemeny's median gives a decision in any case, in particular, for conflicting experts’ decisions in ordinal scales. In practice, competing opinions are usually modified by special approval procedures to achieve the required level of consensus. The known approach consists in assigning weights to experts’ opinions. In this paper, the problem to find the median for a linear combination of experts’ rankings is investigated using the well-known locally optimal Kemeny's algorithm. It is proposed to use the weighted loss matrix in it.
{"title":"Developing the Kemeny's Weighted Median for the Rank Aggregation Problem","authors":"S. Dvoenko, D. O. Pshenichny","doi":"10.1145/3440749.3442652","DOIUrl":"https://doi.org/10.1145/3440749.3442652","url":null,"abstract":"A coordinated ranking as the opinion of an expert group usually can be represented by the well-known Kemeny's median. The Kemeny's median is the least different ranking from other rankings and is free of known contradictions of the majority rule problem. As a mathematical principle, the Kemeny's median gives a decision in any case, in particular, for conflicting experts’ decisions in ordinal scales. In practice, competing opinions are usually modified by special approval procedures to achieve the required level of consensus. The known approach consists in assigning weights to experts’ opinions. In this paper, the problem to find the median for a linear combination of experts’ rankings is investigated using the well-known locally optimal Kemeny's algorithm. It is proposed to use the weighted loss matrix in it.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"277 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131748196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Khan, S. Z. Zukhraf, Asrin Abdollahi, S. Imran, I. Qureshi, M. A. Aziz, Syed Bilal Hussain Shah
Effective communication plays a pivotal role to measure the quality of experience in networks. Recent technological development in the area of wireless communication and many other fields are emerged like flying ad hoc networks, internet of everything. Due to dynamic structure of unmanned aerial vehicles the mobile topological structure is having direct concerns about communication technology performance. Conventional routing techniques are utilized in communication to ensure effective connectivity of two or more workstations. This research study performs comprehensive comparative evaluation wireless communication technology generation for various parameters arrangements. Also qualified learning study is incorporated about different routing protocols in the area of flying ad hoc networks.
{"title":"Reinforce Based Optimization in Wireless Communication Technologies and Routing Techniques Using Internet of Flying Vehicles","authors":"I. Khan, S. Z. Zukhraf, Asrin Abdollahi, S. Imran, I. Qureshi, M. A. Aziz, Syed Bilal Hussain Shah","doi":"10.1145/3440749.3442621","DOIUrl":"https://doi.org/10.1145/3440749.3442621","url":null,"abstract":"Effective communication plays a pivotal role to measure the quality of experience in networks. Recent technological development in the area of wireless communication and many other fields are emerged like flying ad hoc networks, internet of everything. Due to dynamic structure of unmanned aerial vehicles the mobile topological structure is having direct concerns about communication technology performance. Conventional routing techniques are utilized in communication to ensure effective connectivity of two or more workstations. This research study performs comprehensive comparative evaluation wireless communication technology generation for various parameters arrangements. Also qualified learning study is incorporated about different routing protocols in the area of flying ad hoc networks.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134244668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Vasiliev, I. Zharikov, V. Fadeenko, I. Fadeenko, V. Davydov
The article describes a modification of fiber optic communication lines for transmitting microwave signals. Development of microwave transmission lines proposed as an improvement in an educational institution, taking into account the technical requirements for a station in operation. Improving the receiving path is to create a multifunctional walker with the ability to transmit microwave signals. The use of a fiber-optic microwave signal transmission line in the receiving path allows it to be installed in objects with increased electromagnetic activity (for example, a sea-based object). A multifunctional radar with advanced waves can be used to detect various moving and stationary targets in air and sea space, as well as on the Earth’s surface. Studies have shown that the dynamic range of the developed FOCL is 80 dBm. This result is not worse than that of a coaxial cable. The dependence of the tangential sensitivity on the frequency of the received microwave signal was investigated. The results showed that when using the modernized fiber optic link, the sensitivity of the receiving path does not increase.
{"title":"Optimization of designs for fiber optic communication line","authors":"D. Vasiliev, I. Zharikov, V. Fadeenko, I. Fadeenko, V. Davydov","doi":"10.1145/3440749.3442664","DOIUrl":"https://doi.org/10.1145/3440749.3442664","url":null,"abstract":"The article describes a modification of fiber optic communication lines for transmitting microwave signals. Development of microwave transmission lines proposed as an improvement in an educational institution, taking into account the technical requirements for a station in operation. Improving the receiving path is to create a multifunctional walker with the ability to transmit microwave signals. The use of a fiber-optic microwave signal transmission line in the receiving path allows it to be installed in objects with increased electromagnetic activity (for example, a sea-based object). A multifunctional radar with advanced waves can be used to detect various moving and stationary targets in air and sea space, as well as on the Earth’s surface. Studies have shown that the dynamic range of the developed FOCL is 80 dBm. This result is not worse than that of a coaxial cable. The dependence of the tangential sensitivity on the frequency of the received microwave signal was investigated. The results showed that when using the modernized fiber optic link, the sensitivity of the receiving path does not increase.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"747 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133227268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The recent worldwide COVID-19 pandemic created the urgent need for innovative solutions to aid in early detection and control of this disease. This research begins by introducing the coronavirus strand and ends with the proposed SmartGate to detect the potential of the virus in patients without human intervention. This is to reduce the manual use of thermometers to measure temperature and to shift the detection to automation. Triz theory principles have been considered in the process of the innovative proposed design of the SmartGate. Implementing the proposed SmartGate in public places such as shopping malls, gardens, schools, supermarkets, etc. will avoid the need for manual measurement and thus reduce exposure to infected people. Furthermore, it aids in identifying infected people in order to guide them to visit the assigned hospitals and prevent the spread of infection. The relational COVID-19 tracking database (RCTD) of possibly infected people can be shared with assigned (to treat COVID-19 patients) local hospital module for further appropriate actions. In this paper, several available technologies are integrated to build an innovative solution that will help the world to live safer and provide a better future for the coming generations.
{"title":"SmartGate system: Automating the detection and control of COVID-19","authors":"Mashael M. Khayyat, Raafat M Munshi","doi":"10.1145/3440749.3442602","DOIUrl":"https://doi.org/10.1145/3440749.3442602","url":null,"abstract":"The recent worldwide COVID-19 pandemic created the urgent need for innovative solutions to aid in early detection and control of this disease. This research begins by introducing the coronavirus strand and ends with the proposed SmartGate to detect the potential of the virus in patients without human intervention. This is to reduce the manual use of thermometers to measure temperature and to shift the detection to automation. Triz theory principles have been considered in the process of the innovative proposed design of the SmartGate. Implementing the proposed SmartGate in public places such as shopping malls, gardens, schools, supermarkets, etc. will avoid the need for manual measurement and thus reduce exposure to infected people. Furthermore, it aids in identifying infected people in order to guide them to visit the assigned hospitals and prevent the spread of infection. The relational COVID-19 tracking database (RCTD) of possibly infected people can be shared with assigned (to treat COVID-19 patients) local hospital module for further appropriate actions. In this paper, several available technologies are integrated to build an innovative solution that will help the world to live safer and provide a better future for the coming generations.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134068617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The very fundamental principles of digital and wireless communications reveal that the provision of ubiquitous super-connectivity in the global scale – i.e., beyond indoors, dense downtown or campus-type areas – is infeasible with the legacy terrestrial network architecture as this would require prohibitively expensive gross over-provisioning. The problem will only exacerbate with even more demanding use-cases of 2030s such as UAVs requiring connectivity (ex: delivery drones), thus the 3D super-connectivity. The roots of today’s wireless access architecture (the terrestrial 4G & 5G cellular network) go back to 1940s. The access architecture has evolved substantially over the decades. However, rapid developments in a number of domains outside telecommunications, including those in aerospace and satellite industries as well as in artificial intelligence, will likely result in a disruptive transformation in the wireless access architecture in the next 20+ years. In this talk, an ultra-agile, dynamic, distributed, and partly-autonomous vertical heterogeneous network (VHetNet) architecture with very low earth orbit satellites (VLEOs), high-altitude platform station (HAPS) systems, and UAV-BSs (UxNB in 3GPP terminology) for almost-ubiquitous super-connectivity will be presented. In the envisioned VHetNet architecture, the HAPS systems constitute arguably the most promising tier. For more information on HAPS systems, please refer to the below papers under review: [5],[1],[4],[2],[3].
{"title":"Wireless Access Architecture: The Next 20+ Years","authors":"H. Yanikomeroglu","doi":"10.1145/3440749.3442647","DOIUrl":"https://doi.org/10.1145/3440749.3442647","url":null,"abstract":"The very fundamental principles of digital and wireless communications reveal that the provision of ubiquitous super-connectivity in the global scale – i.e., beyond indoors, dense downtown or campus-type areas – is infeasible with the legacy terrestrial network architecture as this would require prohibitively expensive gross over-provisioning. The problem will only exacerbate with even more demanding use-cases of 2030s such as UAVs requiring connectivity (ex: delivery drones), thus the 3D super-connectivity. The roots of today’s wireless access architecture (the terrestrial 4G & 5G cellular network) go back to 1940s. The access architecture has evolved substantially over the decades. However, rapid developments in a number of domains outside telecommunications, including those in aerospace and satellite industries as well as in artificial intelligence, will likely result in a disruptive transformation in the wireless access architecture in the next 20+ years. In this talk, an ultra-agile, dynamic, distributed, and partly-autonomous vertical heterogeneous network (VHetNet) architecture with very low earth orbit satellites (VLEOs), high-altitude platform station (HAPS) systems, and UAV-BSs (UxNB in 3GPP terminology) for almost-ubiquitous super-connectivity will be presented. In the envisioned VHetNet architecture, the HAPS systems constitute arguably the most promising tier. For more information on HAPS systems, please refer to the below papers under review: [5],[1],[4],[2],[3].","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128672669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}