首页 > 最新文献

Journal of ICT Standardization最新文献

英文 中文
LoRa-Alliance Regional Parameters Overview LoRa联盟区域参数概述
Q3 Decision Sciences Pub Date : 2021-01-01 DOI: 10.13052/jicts2245-800X.914
Dave Kjendal
The LoRaWAN® Regional Parameters specification defines the adaptation of the LoRaWAN® Link Layer specification to comply with the various regulations enforced throughout the world on the use of various frequency bands of unlicensed spectrum which are available. It defines default values for Link Layer parameters and channel plans. Each of the regional channel plans can be broadly characterized as dynamic channel plans, with a small number of default channels, or fixed channel plans, where all channels are defined then selectively activated by the network. Regional parameters are defined for a vast majority of countries in the world, using 9 main channel plans, and support for additional countries is regularly added.
LoRaWAN®区域参数规范定义了LoRaWAN™链路层规范的适配,以符合世界各地关于使用可用的未授权频谱的各种频带的各种规定。它定义了链接层参数和通道平面的默认值。每个区域信道计划可以被广泛地描述为具有少量默认信道的动态信道计划,或者固定信道计划,其中所有信道都被定义,然后由网络选择性地激活。使用9个主要渠道计划,为世界上绝大多数国家定义了区域参数,并定期增加对其他国家的支持。
{"title":"LoRa-Alliance Regional Parameters Overview","authors":"Dave Kjendal","doi":"10.13052/jicts2245-800X.914","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.914","url":null,"abstract":"The LoRaWAN® Regional Parameters specification defines the adaptation of the LoRaWAN® Link Layer specification to comply with the various regulations enforced throughout the world on the use of various frequency bands of unlicensed spectrum which are available. It defines default values for Link Layer parameters and channel plans. Each of the regional channel plans can be broadly characterized as dynamic channel plans, with a small number of default channels, or fixed channel plans, where all channels are defined then selectively activated by the network. Regional parameters are defined for a vast majority of countries in the world, using 9 main channel plans, and support for additional countries is regularly added.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 1","pages":"35-46"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255463/10255478.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68113987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data-Driven Business Model Innovation for 6G 6G数据驱动的商业模式创新
Q3 Decision Sciences Pub Date : 2021-01-01 DOI: 10.13052/jicts2245-800X.935
Sriganesh K. Rao
Futuristic disruptive technologies like 6G, could further transform the way we live and work, beyond what was enabled by 5G. The expected features could enable massive high-speed and low-latency connectivity across diverse devices giving rise to new applications enabling instant availability of data related to Smart Cities, Industries 4.0, Intelligent Transport Systems, Utilities, Healthcare, Security, Media & Entertainment, etc. They will further make it possible to scale current real-time data collection strategies, adding more devices without the need for wired connections or fear of interference. Data is considered as the new oil due to tremendous possibilities it can bring in the business world through predictive and prescriptive analytics. This gives rise to the importance of data-driven business model innovation to provide actionable insights to the business owners, helping them to develop sustainable business models. Organizations using big data and analytics within their innovation process are more likely to remain competitive and sustainable. This paper discusses the importance of harnessing “Real-time Data” to create value, the challenges in harnessing value from data especially “dark data,” the role of “Data-driven Business Model Innovation” in creating sustainable business and Intelligent Transport System Data-driven Business Model Innovation as an example.
6G等未来颠覆性技术可能会进一步改变我们的生活和工作方式,超越5G。预期的功能可以实现不同设备之间的大规模高速和低延迟连接,从而产生新的应用程序,实现与智能城市、工业4.0、智能交通系统、公用事业、医疗保健、安全、媒体和娱乐等相关的数据的即时可用性,添加更多的设备,而不需要有线连接或担心干扰。数据被认为是新的石油,因为它可以通过预测和规定的分析为商业世界带来巨大的可能性。这就产生了数据驱动的商业模式创新的重要性,为企业主提供可操作的见解,帮助他们开发可持续的商业模式。在创新过程中使用大数据和分析的组织更有可能保持竞争力和可持续性。本文讨论了利用“实时数据”创造价值的重要性,利用数据(尤其是“暗数据”)创造价值的挑战,“数据驱动的商业模式创新”在创造可持续商业中的作用,以及智能交通系统数据驱动的商业模式创新。
{"title":"Data-Driven Business Model Innovation for 6G","authors":"Sriganesh K. Rao","doi":"10.13052/jicts2245-800X.935","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.935","url":null,"abstract":"Futuristic disruptive technologies like 6G, could further transform the way we live and work, beyond what was enabled by 5G. The expected features could enable massive high-speed and low-latency connectivity across diverse devices giving rise to new applications enabling instant availability of data related to Smart Cities, Industries 4.0, Intelligent Transport Systems, Utilities, Healthcare, Security, Media & Entertainment, etc. They will further make it possible to scale current real-time data collection strategies, adding more devices without the need for wired connections or fear of interference. Data is considered as the new oil due to tremendous possibilities it can bring in the business world through predictive and prescriptive analytics. This gives rise to the importance of data-driven business model innovation to provide actionable insights to the business owners, helping them to develop sustainable business models. Organizations using big data and analytics within their innovation process are more likely to remain competitive and sustainable. This paper discusses the importance of harnessing “Real-time Data” to create value, the challenges in harnessing value from data especially “dark data,” the role of “Data-driven Business Model Innovation” in creating sustainable business and Intelligent Transport System Data-driven Business Model Innovation as an example.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 3","pages":"405-426"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255453/10255491.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
LoRa Alliance Certification - Journal of ICT LoRa联盟认证-ICT杂志
Q3 Decision Sciences Pub Date : 2021-01-01 DOI: 10.13052/jicts2245-800X.912
Derek Hunt
LoRaWAN® Certification of devices is critical for effective and efficient mass deployment of LoRaWAN Networks, as it ensures devices will work on any network, under all conditions. Certified Devices significantly reduce the support costs as any product failures detected later when the device is deployed is far more expensive to repair and poor RF performance of the device increase number of gateways needed and cost of the network infostructure.
LoRaWAN®设备认证对于LoRaWAN网络的有效和高效大规模部署至关重要,因为它可以确保设备在任何网络上、任何条件下都能工作。Certified Devices显著降低了支持成本,因为稍后部署设备时检测到的任何产品故障的修复成本都要高得多,而设备的射频性能差会增加所需网关的数量和网络信息结构的成本。
{"title":"LoRa Alliance Certification - Journal of ICT","authors":"Derek Hunt","doi":"10.13052/jicts2245-800X.912","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.912","url":null,"abstract":"LoRaWAN® Certification of devices is critical for effective and efficient mass deployment of LoRaWAN Networks, as it ensures devices will work on any network, under all conditions. Certified Devices significantly reduce the support costs as any product failures detected later when the device is deployed is far more expensive to repair and poor RF performance of the device increase number of gateways needed and cost of the network infostructure.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 1","pages":"13-20"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255463/10255488.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68113985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Intent-Driven Closed Loops for Autonomous Networks 自主网络的意图驱动闭环
Q3 Decision Sciences Pub Date : 2021-01-01 DOI: 10.13052/jicts2245-800X.929
Pedro Henrique Gomes;Magnus Buhrgard;János Harmatos;Swarup Kumar Mohalik;Dinand Roeland;Jörg Niemöller
Closed loops are key enablers for automation that have been successfully used in many industries for long, and more recently for computing and networking applications. The Zero-touch network and service management (ZSM) framework introduced standardized components that allow the creation, execution, and governance of multiple closed loops, enabling zero-touch management of end-to-end services across different management domains. However, the coordinated and optimal instantiation and operation of multiple closed loops is an open question that is left for implementation by the ZSM specifications. In this paper, we propose a methodology that uses intents as a way of communicating requirements to be considered by autonomous management domains to coordinate hierarchies of closed loops. The intent-driven methodology facilitates hierarchical and peer interactions for delegation and escalation of intents. Furthermore, it extends the existing management capabilities of the ZSM framework and facilitates conflict-free integration of closed loops by setting optimal (and non-conflicting) goals that each closed loop in the hierarchy needs to account for. We show an example of the application of the proposed methodology in a network slicing assurance use case. The new capabilities introduced in this paper can be considered as an extension of the ZSM framework to be used in scenarios where multiple intent-driven closed loops exist.
闭环是自动化的关键推动者,已在许多行业成功使用了很长时间,最近还用于计算和网络应用。零接触网络和服务管理(ZSM)框架引入了标准化组件,允许创建、执行和管理多个闭环,从而实现跨不同管理域的端到端服务的零接触管理。然而,多个闭环的协调和优化实例化和操作是一个有待ZSM规范实现的悬而未决的问题。在本文中,我们提出了一种方法,该方法使用意图作为传达自治管理域所考虑的需求的一种方式,以协调闭环的层次结构。意图驱动的方法促进了授权和意图升级的层次和对等交互。此外,它扩展了ZSM框架的现有管理能力,并通过设置层次结构中每个闭环需要考虑的最佳(和非冲突)目标,促进了闭环的无冲突集成。我们展示了所提出的方法在网络切片保证用例中的应用示例。本文中引入的新功能可以被视为ZSM框架的扩展,用于存在多个意图驱动闭环的场景。
{"title":"Intent-Driven Closed Loops for Autonomous Networks","authors":"Pedro Henrique Gomes;Magnus Buhrgard;János Harmatos;Swarup Kumar Mohalik;Dinand Roeland;Jörg Niemöller","doi":"10.13052/jicts2245-800X.929","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.929","url":null,"abstract":"Closed loops are key enablers for automation that have been successfully used in many industries for long, and more recently for computing and networking applications. The Zero-touch network and service management (ZSM) framework introduced standardized components that allow the creation, execution, and governance of multiple closed loops, enabling zero-touch management of end-to-end services across different management domains. However, the coordinated and optimal instantiation and operation of multiple closed loops is an open question that is left for implementation by the ZSM specifications. In this paper, we propose a methodology that uses intents as a way of communicating requirements to be considered by autonomous management domains to coordinate hierarchies of closed loops. The intent-driven methodology facilitates hierarchical and peer interactions for delegation and escalation of intents. Furthermore, it extends the existing management capabilities of the ZSM framework and facilitates conflict-free integration of closed loops by setting optimal (and non-conflicting) goals that each closed loop in the hierarchy needs to account for. We show an example of the application of the proposed methodology in a network slicing assurance use case. The new capabilities introduced in this paper can be considered as an extension of the ZSM framework to be used in scenarios where multiple intent-driven closed loops exist.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 2","pages":"257-290"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255460/10255461.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68121006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Authentication Mechanisms in the 5G System 5G系统中的认证机制
Q3 Decision Sciences Pub Date : 2021-01-01 DOI: 10.13052/jicts2245-800X.921
Xiaoting Huang;Takahito Yoshizawa;Sheeba Backia Mary Baskaran
The 5G system introduces multiple new authentication mechanisms. The initial 5G specification in 3GPP Release 15 defines the initial security solution including primary and secondary authentication. Further enhancements and additional security features are added in Release 16; some of them introduce new types of authentication. As a result, the scope and meaning of ‘authentication’ has expanded. This is a new trend in the 5G system as it introduces new concepts that did not exist in the preceding generation systems. One such example is the slice authentication for which the authentication is performed at the network slice level. As a result, the authentication mechanisms become more complex. This paper clarifies the details of each of these different authentication mechanisms.
5G系统引入了多种新的身份验证机制。3GPP Release 15中的初始5G规范定义了包括初级和次级认证的初始安全解决方案。Release 16中添加了进一步的增强功能和附加的安全功能;其中一些引入了新类型的身份验证。因此,“身份验证”的范围和含义得到了扩展。这是5G系统的一个新趋势,因为它引入了前一代系统中不存在的新概念。一个这样的例子是在网络切片级别执行认证的切片认证。因此,身份验证机制变得更加复杂。本文阐明了每种不同身份验证机制的细节。
{"title":"Authentication Mechanisms in the 5G System","authors":"Xiaoting Huang;Takahito Yoshizawa;Sheeba Backia Mary Baskaran","doi":"10.13052/jicts2245-800X.921","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.921","url":null,"abstract":"The 5G system introduces multiple new authentication mechanisms. The initial 5G specification in 3GPP Release 15 defines the initial security solution including primary and secondary authentication. Further enhancements and additional security features are added in Release 16; some of them introduce new types of authentication. As a result, the scope and meaning of ‘authentication’ has expanded. This is a new trend in the 5G system as it introduces new concepts that did not exist in the preceding generation systems. One such example is the slice authentication for which the authentication is performed at the network slice level. As a result, the authentication mechanisms become more complex. This paper clarifies the details of each of these different authentication mechanisms.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 2","pages":"61-78"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255460/10255480.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68121013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
I2BN: Intelligent Intent Based Networks I2BN:基于智能意图的网络
Q3 Decision Sciences Pub Date : 2021-01-01 DOI: 10.13052/jicts2245-800X.926
Péter Szilágyi
Intent based network management reduces the complexity of network programming from a growing set of deeply technical APIs to context-free high-level objectives that the network should autonomously achieve and keep. The practical implementation of an intent based network requires substantial automation technology embedded in the network. Automation should cover the entire lifecycle of intents, from their ingestion to fulfillment and assurance. This article investigates the feasibility of automatically assembling interworking implementation units into intent specific automation pipelines, where units are reusable self-learning closed loop micro-services with self-declared capabilities. Each closed loop may gain knowledge and respond to dynamically changing network conditions, thereby enabling network autonomy in reaching the declared intent objectives. The human-network intent interface for expressing intents is proposed to be based on the aggregation of the deployed network and service automation capabilities, rather than a formalism decoupled from the actual network implementation. This principle removes the ambiguity and compatibility gap between human intent definition and machine intent fulfillment, while retaining the flexibility and extendibility of the intents offered by any specific system via onboarding additional micro-services with novel capabilities. The concepts discussed by the article fit into the architecture and closed loop work items already defined by ETSI ZSM and provides considerations towards new areas such as intent driven autonomous networks and enablers for automation.
基于意图的网络管理降低了网络编程的复杂性,从一组不断增长的深度技术API到网络应该自主实现和保持的无上下文高级目标。基于意图的网络的实际实现需要在网络中嵌入大量的自动化技术。自动化应该涵盖意图的整个生命周期,从接受到实现和保证。本文研究了将互通实现单元自动组装到特定意图的自动化管道中的可行性,其中单元是具有自我声明能力的可重复使用的自学习闭环微服务。每个闭环可以获得知识并对动态变化的网络条件做出响应,从而实现网络自主性以达到所声明的意图目标。用于表达意图的人际网络意图接口被提议基于所部署的网络和服务自动化能力的集合,而不是与实际网络实现解耦的形式。这一原则消除了人类意图定义和机器意图实现之间的模糊性和兼容性差距,同时通过引入具有新颖功能的额外微服务,保留了任何特定系统提供的意图的灵活性和可扩展性。本文讨论的概念适合ETSI ZSM已经定义的体系结构和闭环工作项,并提供了对新领域的考虑,如意图驱动的自主网络和自动化使能器。
{"title":"I2BN: Intelligent Intent Based Networks","authors":"Péter Szilágyi","doi":"10.13052/jicts2245-800X.926","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.926","url":null,"abstract":"Intent based network management reduces the complexity of network programming from a growing set of deeply technical APIs to context-free high-level objectives that the network should autonomously achieve and keep. The practical implementation of an intent based network requires substantial automation technology embedded in the network. Automation should cover the entire lifecycle of intents, from their ingestion to fulfillment and assurance. This article investigates the feasibility of automatically assembling interworking implementation units into intent specific automation pipelines, where units are reusable self-learning closed loop micro-services with self-declared capabilities. Each closed loop may gain knowledge and respond to dynamically changing network conditions, thereby enabling network autonomy in reaching the declared intent objectives. The human-network intent interface for expressing intents is proposed to be based on the aggregation of the deployed network and service automation capabilities, rather than a formalism decoupled from the actual network implementation. This principle removes the ambiguity and compatibility gap between human intent definition and machine intent fulfillment, while retaining the flexibility and extendibility of the intents offered by any specific system via onboarding additional micro-services with novel capabilities. The concepts discussed by the article fit into the architecture and closed loop work items already defined by ETSI ZSM and provides considerations towards new areas such as intent driven autonomous networks and enablers for automation.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 2","pages":"159-200"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255460/10255479.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68121018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Model-Driven and Business Approach to Autonomic Network Management 自主网络管理的模型驱动和业务方法
Q3 Decision Sciences Pub Date : 2021-01-01 DOI: 10.13052/jicts2245-800X.928
Mehdi Bezahaf;Stephen Cassidy;David Hutchison;Daniel King;Nicholas Race;Charalampos Rotsos
As corporate networks continue to expand, the technologies that underpin these enterprises must be capable of meeting the operational goals of the operators that own and manage them. Automation has enabled the impressive scaling of networks from the days of Strowger. The challenge now is not only to keep pace with the continuing huge expansion of capacity but at the same time to manage a huge increase in complexity - driven by the range of customer solutions and technologies. Recent advances in automation, programmable network interfaces, and model-driven networking will provide the possibility of closed-loop, self-optimizing, and self-healing networks. Collectively these support the goals of a truly automated network, commonly understood as “autonomic networking” even though this is a prospect yet to be achieved. This paper outlines the progress made towards autonomic networking and the framework and procedures developed during the UK Next Generation Converged Digital Infrastructure (NG-CDI) project. It outlines the operator-driven requirements and capabilities that have been identified, and proposes an autonomic management framework, and summarizes current art and the challenges that remain.
随着企业网络的不断扩大,支撑这些企业的技术必须能够满足拥有和管理这些企业的运营商的运营目标。自动化使Strowger时代的网络实现了令人印象深刻的扩展。现在的挑战不仅是跟上容量的持续巨大扩张,同时还要管理复杂性的巨大增加——这是由一系列客户解决方案和技术驱动的。自动化、可编程网络接口和模型驱动网络的最新进展将提供闭环、自优化和自修复网络的可能性。这些共同支持了真正自动化网络的目标,通常被理解为“自主网络”,尽管这是一个尚未实现的前景。本文概述了自主网络的进展,以及英国下一代融合数字基础设施(NG-CDI)项目期间制定的框架和程序。它概述了已经确定的运营商驱动的需求和能力,提出了自主管理框架,并总结了当前的技术和仍然存在的挑战。
{"title":"A Model-Driven and Business Approach to Autonomic Network Management","authors":"Mehdi Bezahaf;Stephen Cassidy;David Hutchison;Daniel King;Nicholas Race;Charalampos Rotsos","doi":"10.13052/jicts2245-800X.928","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.928","url":null,"abstract":"As corporate networks continue to expand, the technologies that underpin these enterprises must be capable of meeting the operational goals of the operators that own and manage them. Automation has enabled the impressive scaling of networks from the days of Strowger. The challenge now is not only to keep pace with the continuing huge expansion of capacity but at the same time to manage a huge increase in complexity - driven by the range of customer solutions and technologies. Recent advances in automation, programmable network interfaces, and model-driven networking will provide the possibility of closed-loop, self-optimizing, and self-healing networks. Collectively these support the goals of a truly automated network, commonly understood as “autonomic networking” even though this is a prospect yet to be achieved. This paper outlines the progress made towards autonomic networking and the framework and procedures developed during the UK Next Generation Converged Digital Infrastructure (NG-CDI) project. It outlines the operator-driven requirements and capabilities that have been identified, and proposes an autonomic management framework, and summarizes current art and the challenges that remain.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 2","pages":"229-256"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255460/10255465.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68121019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
LoRaWAN Security LoRaWAN安全
Q3 Decision Sciences Pub Date : 2021-01-01 DOI: 10.13052/jicts2245-800X.915
Olivier Seller
The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-vetted algorithms, and end-to-end security. The fundamental properties supported in LoRaWAN security are mutual end-point authentication, data origin authentication, integrity and replay protection, and confidentiality. The use of symmetric cryptography and prior secret key sharing between a device and a server enables an extremely power efficient and network efficient activation procedure.
LoRaWAN安全设计遵循最先进的原则:使用标准、经过严格审查的算法和端到端安全。LoRaWAN安全性支持的基本属性是相互端点身份验证、数据源身份验证、完整性和重放保护以及机密性。在设备和服务器之间使用对称密码术和先前的密钥共享能够实现极其节能和网络高效的激活过程。
{"title":"LoRaWAN Security","authors":"Olivier Seller","doi":"10.13052/jicts2245-800X.915","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.915","url":null,"abstract":"The LoRaWAN security design adheres to state-of-the-art principles: use of standard, well-vetted algorithms, and end-to-end security. The fundamental properties supported in LoRaWAN security are mutual end-point authentication, data origin authentication, integrity and replay protection, and confidentiality. The use of symmetric cryptography and prior secret key sharing between a device and a server enables an extremely power efficient and network efficient activation procedure.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 1","pages":"47-60"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255463/10255484.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70607661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Editorial Foreword 编辑前言
Q3 Decision Sciences Pub Date : 2021-01-01
Ramjee Prasad;Anand R. Prasad
This special issue is based on the workshop “6G Knowledge Lab Opening and 36th GISFI Workshop” held 21–22 December 2020, organized jointly by the CTIF Global Capsule (CGC) and the Global ICT Standardisation Forum for India (GISFI). The special issue is divided in 2 parts of which this is the first part consisting of 5 papers.
本特刊基于2020年12月21日至22日举行的研讨会“6G知识实验室开放和第36届GISFI研讨会”,该研讨会由CTIF全球胶囊(CGC)和印度全球ICT标准化论坛(GISFI)联合组织。特刊分为两部分,其中第一部分由5篇论文组成。
{"title":"Editorial Foreword","authors":"Ramjee Prasad;Anand R. Prasad","doi":"","DOIUrl":"https://doi.org/","url":null,"abstract":"This special issue is based on the workshop “6G Knowledge Lab Opening and 36th GISFI Workshop” held 21–22 December 2020, organized jointly by the CTIF Global Capsule (CGC) and the Global ICT Standardisation Forum for India (GISFI). The special issue is divided in 2 parts of which this is the first part consisting of 5 papers.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 3","pages":"i-ii"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255453/10255454.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68097853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Model-Based Approach to Multi-Domain Monitoring Data Aggregation 一种基于模型的多域监测数据聚合方法
Q3 Decision Sciences Pub Date : 2021-01-01 DOI: 10.13052/jicts2245-800X.9210
Antonio Pastor;Diego R. López;Jose Ordonez-Lucena;Sonia Fernández;Jesús Folgueira
The essential propellant for any closed-loop management mechanism is data related to the managed entity. While this is a general evidence, it becomes even more true when dealing with advanced closed-loop systems like the ones supported by Artificial Intelligence (AI), as they require a trustworthy, up-to-date and steady flow of state data to be applicable. Modern network infrastructures provide a vast amount of disparate data sources, especially in the multi-domain scenarios considered by the ETSI Industry Specification Group (ISG) Zero Touch Network and Service Management (ZSM) framework, and proper mechanisms for data aggregation, pre-processing and normalization are required to make possible AI-enabled closed-loop management. So far, solutions proposed for these data aggregation tasks have been specific to concrete data sources and consumers, following ad-hoc approaches unsuitable to address the vast heterogeneity of data sources and potential data consumers. This paper presents a model-based approach to a data aggregator framework, relying on standardized data models and telemetry protocols, and integrated with an open-source network orchestration stack to support their incorporation within network service lifecycles.
任何闭环管理机制的基本推动力都是与被管理实体相关的数据。虽然这是一个普遍的证据,但在处理像人工智能(AI)支持的先进闭环系统时,这一点变得更加真实,因为它们需要可靠、最新和稳定的状态数据流才能适用。现代网络基础设施提供了大量不同的数据源,特别是在ETSI行业规范组(ISG)零接触网络和服务管理(ZSM)框架所考虑的多域场景中,需要适当的数据聚合、预处理和规范化机制,以实现人工智能闭环管理。到目前为止,为这些数据聚合任务提出的解决方案都是针对具体的数据源和消费者的,采用了不适合解决数据源和潜在数据消费者的巨大异质性的特别方法。本文提出了一种基于模型的数据聚合器框架方法,该方法依赖于标准化的数据模型和遥测协议,并与开源网络编排堆栈集成,以支持将其纳入网络服务生命周期。
{"title":"A Model-Based Approach to Multi-Domain Monitoring Data Aggregation","authors":"Antonio Pastor;Diego R. López;Jose Ordonez-Lucena;Sonia Fernández;Jesús Folgueira","doi":"10.13052/jicts2245-800X.9210","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.9210","url":null,"abstract":"The essential propellant for any closed-loop management mechanism is data related to the managed entity. While this is a general evidence, it becomes even more true when dealing with advanced closed-loop systems like the ones supported by Artificial Intelligence (AI), as they require a trustworthy, up-to-date and steady flow of state data to be applicable. Modern network infrastructures provide a vast amount of disparate data sources, especially in the multi-domain scenarios considered by the ETSI Industry Specification Group (ISG) Zero Touch Network and Service Management (ZSM) framework, and proper mechanisms for data aggregation, pre-processing and normalization are required to make possible AI-enabled closed-loop management. So far, solutions proposed for these data aggregation tasks have been specific to concrete data sources and consumers, following ad-hoc approaches unsuitable to address the vast heterogeneity of data sources and potential data consumers. This paper presents a model-based approach to a data aggregator framework, relying on standardized data models and telemetry protocols, and integrated with an open-source network orchestration stack to support their incorporation within network service lifecycles.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":"9 2","pages":"291-310"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10255460/10255466.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68121007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of ICT Standardization
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1