ICT has the capability to improve the quality of life experienced by our citizens through education, training, new services, innovation and automated control systems. ICT especially the emerging technologies investigated here are of immense importance to supporting education, health, innovation and infrastructure. AI and Big Data systems show great potential for achieving the United Nations Sustainable Development Goals which currently requires immediate global action in areas like climate change, poverty and pollution to ensure that additional damage to societies and the planet is prevented.
{"title":"Introduction to the Special Issue on: Big Data/AI Standardization in the Journal of ICT Standardization","authors":"Ray Walshe","doi":"","DOIUrl":"https://doi.org/","url":null,"abstract":"ICT has the capability to improve the quality of life experienced by our citizens through education, training, new services, innovation and automated control systems. ICT especially the emerging technologies investigated here are of immense importance to supporting education, health, innovation and infrastructure. AI and Big Data systems show great potential for achieving the United Nations Sustainable Development Goals which currently requires immediate global action in areas like climate change, poverty and pollution to ensure that additional damage to societies and the planet is prevented.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10258069/10258060.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68009016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
5G security is a very hot topic today but adequate information and understanding is still missing even among the technical society. In this special issue of the journal we present 5 papers discussing 5G security as per 3GPP specifications written by experts in the field. These papers are based on “3GPP 5G Security Workshop” we organized with 5GMF in cooperation with 3GPP and ARIB on 1st July 2019 at Tokyo, Japan. All the papers were thoroughly reviewed before acceptance for publication.
{"title":"Editorial Foreword","authors":"Anand R. Prasad;Sivabalan Arumugam","doi":"","DOIUrl":"https://doi.org/","url":null,"abstract":"5G security is a very hot topic today but adequate information and understanding is still missing even among the technical society. In this special issue of the journal we present 5 papers discussing 5G security as per 3GPP specifications written by experts in the field. These papers are based on “3GPP 5G Security Workshop” we organized with 5GMF in cooperation with 3GPP and ARIB on 1st July 2019 at Tokyo, Japan. All the papers were thoroughly reviewed before acceptance for publication.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10258063/10258105.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68106282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper reports a design and fabrication of a functional nano robot “Sootha Vennai Parpam- cutavanai - Parpam - SVP” of 150–200 nm size which behaves more or less like a human physician in nano form inside the body. This nanorobot is a medicine which has artificial intelligence i.e. the distin-guishing ability, decision making ability and some basic behavioral properties such as target detection ability, self-propelling capability and handling the infection in the case of breast cancer. This nanorobot can also aid in cancer therapy, site-specific or target drug delivery, and tissue repair.
{"title":"Design, Development and Performance Evaluation of Nano Robot in Traditional Siddha Medicines for Cancer Treatment","authors":"Kaviarasu Balakrishnan;Sivabalan Arumugam;Guna Magesan","doi":"10.13052/jicts2245-800X.833","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.833","url":null,"abstract":"This paper reports a design and fabrication of a functional nano robot “Sootha Vennai Parpam- cutavanai - Parpam - SVP” of 150–200 nm size which behaves more or less like a human physician in nano form inside the body. This nanorobot is a medicine which has artificial intelligence i.e. the distin-guishing ability, decision making ability and some basic behavioral properties such as target detection ability, self-propelling capability and handling the infection in the case of breast cancer. This nanorobot can also aid in cancer therapy, site-specific or target drug delivery, and tissue repair.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10258043/10258100.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68139272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.13052/jicts2245-800X.832
Mark Hobart
Back in 2016, IDC forecast a ten-fold increase on business data processed globally by 2025. Combine this with increasing regulatory compliance and demand for quality data, then it is perhaps not a surprise to find that many businesses are feeling somewhat over-whelmed by the enormity of the data management and governance task they face. But, don't despair, there is a compelling business case, both in terms of efficiency gains and tangible finan-cial savings in adopting a strategy for centralising information governance and automating the management of your data. This paper will explore the emerging problem domain of data and look at the business case for use of automated data management tools to better prepare your organisation for the tsunami of data coming its way.
{"title":"The Business Case for Automating Data Management","authors":"Mark Hobart","doi":"10.13052/jicts2245-800X.832","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.832","url":null,"abstract":"Back in 2016, IDC forecast a ten-fold increase on business data processed globally by 2025. Combine this with increasing regulatory compliance and demand for quality data, then it is perhaps not a surprise to find that many businesses are feeling somewhat over-whelmed by the enormity of the data management and governance task they face. But, don't despair, there is a compelling business case, both in terms of efficiency gains and tangible finan-cial savings in adopting a strategy for centralising information governance and automating the management of your data. This paper will explore the emerging problem domain of data and look at the business case for use of automated data management tools to better prepare your organisation for the tsunami of data coming its way.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10258043/10258074.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68139275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The 3GPP Rel-16 5G System focuses on enabling support for Industrial Internet of Things (IIoT) for Industry 4.0. Building blocks of 5G supporting use cases and requirements from the manufacturing sector are extreme mobile broadband, massive machine-type communication, ultra-reliable critical machine communication, non-public networks, time sensitive communication, 5G LAN communication, precise positioning. While for all of them, security plays an important role, the focus of this paper is on the 3GPP Rel-16 architecture and security concept of 5GS Non-Public Networks. We conclude with insights on the challenges for using 5G in the Operational Technology Industry.
{"title":"3GPP Non-Public Network Security","authors":"Anja Jerichow;Betsy Covell;Devaki Chandramouli;Ali Rezaki;Atte Lansisalmi;Juergen Merkel","doi":"10.13052/jicts2245-800X.815","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.815","url":null,"abstract":"The 3GPP Rel-16 5G System focuses on enabling support for Industrial Internet of Things (IIoT) for Industry 4.0. Building blocks of 5G supporting use cases and requirements from the manufacturing sector are extreme mobile broadband, massive machine-type communication, ultra-reliable critical machine communication, non-public networks, time sensitive communication, 5G LAN communication, precise positioning. While for all of them, security plays an important role, the focus of this paper is on the 3GPP Rel-16 architecture and security concept of 5GS Non-Public Networks. We conclude with insights on the challenges for using 5G in the Operational Technology Industry.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10258063/10258108.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68105557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.13052/jicts2245-800X.812
Alec Brusilovsky;Ira McDonald
Current cellular architecture will not be suitable for 5G because it will not scale to the anticipated number of connected endpoints and their rich diversity. The distribution of the previously centralized Core Network (CN) functionality, e.g., Access Authentication and Authorization, has to be decentralized, leading to the demise of the most utilized tool of network security engineering, Physical Security Perimeter. The asserted and attested Platform Integrity of the network nodes that comprise the edges of the network, the network cloud, “network fog”, and the endpoints will allow mobile network operators (MNOs) to create Virtual Network Perimeters and allow highly reliable, diverse, and flexible 5G networks. This article describes the reasons for such network transformation, provides references to applicable standardization activities, and uses the examples of support for Unmanned Aerial Vehicles (UAV) and connected automobiles by 5G networks to justify the need for Platform Integrity.
{"title":"5G and the Need for Platform Integrity","authors":"Alec Brusilovsky;Ira McDonald","doi":"10.13052/jicts2245-800X.812","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.812","url":null,"abstract":"Current cellular architecture will not be suitable for 5G because it will not scale to the anticipated number of connected endpoints and their rich diversity. The distribution of the previously centralized Core Network (CN) functionality, e.g., Access Authentication and Authorization, has to be decentralized, leading to the demise of the most utilized tool of network security engineering, Physical Security Perimeter. The asserted and attested Platform Integrity of the network nodes that comprise the edges of the network, the network cloud, “network fog”, and the endpoints will allow mobile network operators (MNOs) to create Virtual Network Perimeters and allow highly reliable, diverse, and flexible 5G networks. This article describes the reasons for such network transformation, provides references to applicable standardization activities, and uses the examples of support for Unmanned Aerial Vehicles (UAV) and connected automobiles by 5G networks to justify the need for Platform Integrity.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10258063/10258064.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68106279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.13052/jicts2245-800X.814
Andreas Kunz;Apostolis Salkintzis
Non-3GPP Access technologies such as WLAN technologies can be connected to the 3GPP core network like EPC (Evolved Packet Core) in various ways based on the operator's business models and architectural preferences. The desire to provide this access to the 5G core network, currently defined in 3GPP, requires the design of new protocols and procedures in order to fulfill all requirements. This paper describes the current status of the specification in Release 15 of the untrusted non-3GPP access where the mobile operator does not trust the access point and tunnels all traffic to a trusted gateway in the mobile network. Further, the paper provides an outlook of the new Release 16 feature for trusted non-3GPP access, i.e. the mobile operator trusts the access point, as well as the feature for 5G core network access from WLAN devices with 3GPP credentials that do not support the Non Access Stratum protocol.
{"title":"Non-3GPP Access Security in 5G","authors":"Andreas Kunz;Apostolis Salkintzis","doi":"10.13052/jicts2245-800X.814","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.814","url":null,"abstract":"Non-3GPP Access technologies such as WLAN technologies can be connected to the 3GPP core network like EPC (Evolved Packet Core) in various ways based on the operator's business models and architectural preferences. The desire to provide this access to the 5G core network, currently defined in 3GPP, requires the design of new protocols and procedures in order to fulfill all requirements. This paper describes the current status of the specification in Release 15 of the untrusted non-3GPP access where the mobile operator does not trust the access point and tunnels all traffic to a trusted gateway in the mobile network. Further, the paper provides an outlook of the new Release 16 feature for trusted non-3GPP access, i.e. the mobile operator trusts the access point, as well as the feature for 5G core network access from WLAN devices with 3GPP credentials that do not support the Non Access Stratum protocol.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10258063/10258098.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68105556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
At the dawn of a new decade 2020, 5G Networks is about to take over the world stage. 5G will pave the way for innovative technologies. Thus, this is the right time to start evaluating the current global challenges experienced by our society and look ahead for the technologies and future uses cases needed to tackle them.
{"title":"Editorial Foreword","authors":"Paulo Sergio Rufino Henrique","doi":"","DOIUrl":"https://doi.org/","url":null,"abstract":"At the dawn of a new decade 2020, 5G Networks is about to take over the world stage. 5G will pave the way for innovative technologies. Thus, this is the right time to start evaluating the current global challenges experienced by our society and look ahead for the technologies and future uses cases needed to tackle them.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10258043/10258068.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68139273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.13052/jicts2245-800X.821
Ray Walshe;Kevin Casey;Jane Kernan;Donal Fitzpatrick
Emerging Technologies like Artificial Intelligence (AI), Big Data, Internet of Things (IoT), Blockchain and 5G communications are innovation accelerators creating new products, processes and industries by disrupting the Information Communication Technologies status quo. International Standards Development Organisations (SDOs) and Standard Setting Organisations (SSOs) develop and evolve consensus documents of the state of the art and publish these international agreements as Standards. In this document the authors present uses cases where some of these emerging technologies can contribute significantly to achieving the United Nations Sustainable Development Goals.
{"title":"AI and Big Data Standardization: Contributing to United Nations Sustainable Development Goals","authors":"Ray Walshe;Kevin Casey;Jane Kernan;Donal Fitzpatrick","doi":"10.13052/jicts2245-800X.821","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.821","url":null,"abstract":"Emerging Technologies like Artificial Intelligence (AI), Big Data, Internet of Things (IoT), Blockchain and 5G communications are innovation accelerators creating new products, processes and industries by disrupting the Information Communication Technologies status quo. International Standards Development Organisations (SDOs) and Standard Setting Organisations (SSOs) develop and evolve consensus documents of the state of the art and publish these international agreements as Standards. In this document the authors present uses cases where some of these emerging technologies can contribute significantly to achieving the United Nations Sustainable Development Goals.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10258069/10258085.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68009014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.13052/jicts2245-800X.813
Mireille Pauliac
If you ask anybody what is the name of the card inside his mobile phone, he will for sure answer SIM card, without knowing it is an acronym for Subscriber Identity Module. But, what about the USIM (Universal Subscriber Identity Module)? The USIM plays a key role in the mobile telecommunication services since it brings a host of fundamental features that are now perfected for 5G. This paper gives an overview of the new functionalities offered by the USIM in 5G system including new authentication schemes, subscriber privacy, Steering of Roaming, UE Parameters Update over NAS, and Long Term Key Update Procedure.
{"title":"USIM in 5G Era","authors":"Mireille Pauliac","doi":"10.13052/jicts2245-800X.813","DOIUrl":"https://doi.org/10.13052/jicts2245-800X.813","url":null,"abstract":"If you ask anybody what is the name of the card inside his mobile phone, he will for sure answer SIM card, without knowing it is an acronym for Subscriber Identity Module. But, what about the USIM (Universal Subscriber Identity Module)? The USIM plays a key role in the mobile telecommunication services since it brings a host of fundamental features that are now perfected for 5G. This paper gives an overview of the new functionalities offered by the USIM in 5G system including new authentication schemes, subscriber privacy, Steering of Roaming, UE Parameters Update over NAS, and Long Term Key Update Procedure.","PeriodicalId":36697,"journal":{"name":"Journal of ICT Standardization","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/10251929/10258063/10258075.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"68105555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}