APP1 – Key technologies for application areas

Wednesday, 20 June 2018, 11:00-12:30, Štih hall
Session chair: Ralph Stübner  (COST Association, Belgium)

11:00 – Interoperability and Decentralization as Key Technologies for Future Smart Urban Environments

Marcin Plociennik (Poznan Supercomputing and Networking Center, Poland); Mario Drobics (AIT Austrian Institute of Technology GmbH, Austria); Ivana Podnar Zarko (University of Zagreb, Croatia); Konstantinos V. Katsaros (Intracom S.A. Telecom Solutions, Greece); Sergios Soursos (Intracom SA Telecom Solutions, Greece); Ivan Gojmerac (AIT – Austrian Institute of Technology, Austria)
In the current Internet of Things (IoT), centralized IoT structures greatly limit the direct, efficient and privacy preserving interaction with the locally available resources. A sustainable path for the future development of Smart Urban Environments, from Smart Homes and Offices, to Smart Neighborhoods and Cities, requires next-generation IoT solutions which are interoperable and decentralized. Building on direct device-to-device interactions and the existing infrastructure operated by open and interoperable platforms, a novel decentralized IoT architecture is required to offer both privacy-preserving and smart real-time interactions in Smart Spaces, leading thus to truly trustful ambient intelligence serving ordinary citizens in everyday situations. We present the key interoperability and security-related aspects which are designed and implemented within the H2020 project symbIoTe to pave the way for such decentralized IoT solutions. Furthermore, we analyze the requirements and technologies, namely Distributed Ledger Technology (DLT), intelligent agents and edge technologies, as the building blocks for the next-generation IoT solutions.



11:18 – Combining Measurements and Simulations for Evaluation of Tracking Algorithms

Klemen Bregar (Jožef Stefan Institute, Slovenia); Roman Novak (Jozef Stefan Institute, Slovenia); Mihael Mohorcic (Jozef Stefan Institute & Jozef Stefan International Postgraduate School, Slovenia)
Wireless device position tracking has been already thoroughly studied in literature. Most of the studies rely on the presumption that location information is acquired based on range measurements that are performed in a very short period of time. However, in time-division-multiple-access (TDMA) two-way-ranging (TWR) ultra-wideband (UWB) wireless localization networks, those ranging measurements are always spread in time by significant time delays. Those delays have negative impact on the tracking performance and the effects of ranging in these systems should be evaluated accordingly. In this paper we propose a time-of-flight (ToF) simulation-based approach for indoor tracking algorithm evaluation with a measurement calibration which enables changing the size of TDMA slots and thus observing the tracking performance degradation. A constant velocity movement model with a random curvature of walking path is proposed to simulate the person’s random walking pattern inside the room as naturally as possible.



11:36 – Interference Coordination in Ultra-Reliable and Low Latency Communication Networks

Bikramjit Singh and Olav Tirkkonen (Aalto University, Finland); Zexian Li and Mikko Uusitalo (Nokia Bell Labs, Finland)
5G cellular communication is envisioned to enable connectivity for a wide range of new use cases. The focus on mission-critical communications, such as industrial automation and motion control, presses the demand for 5G ultra-reliable communication. High availability, e.g., 99.999 % can be strived to reduce the outage probability. However, in multi-cell networks, interference from neighboring cells can be damaging in the ultra-reliable communication region. This presses a need for a coordination amongst the interfering cells to relieve the interference in order to improve the network availability. In MIMO based networks where the interference is colored, multiple access points can coordinate by precluding the usage of precoders that increases the overall interference strongly. With this, multiple cells can jointly improve the minimum cell rate without inflicting harm to the other cell users, and thereby improve the network availability.We demonstrate the usability of the proposed protocol in a factory scenario.



11:54 – Smart Contracts for the Internet of Things: Opportunities and Challenges

Nikos Fotiou (Mobile Multimedia Lab, Athens University of Economics and Business, Greece); George C. Polyzos (Athens University of Economics and Business, Greece)
With the Internet of Things (IoT), Things are expected to live in different “domains” and “contexts” during their lifetime. Information generated by and associated with Things should be manageable by multiple, diverse stakeholders accordingly. Moreover, the scope of the information related to Things can range from private and confidential to public and auditable. Identification, security, and interoperability in this vivid environment are expected to be challenging. In this paper we discuss how smart contracts and blockchain technologies create the potential for a viable solution. To this end, we present smart contract-based solutions that improve security and information management, we identify new opportunities and challenges, and we provide security recommendations and guidelines.



12:12 – Factors Influencing Market Adoption and Evolution of NFV/SDN Cybersecurity Solutions. Evidence from SHIELD Project

Dimitrios Katsianis and Ioannis Neokosmidis (Incites Consulting, Luxembourg); Antonio Pastor (Telefonica I+D, Spain); Ludovic Jacquin (Hewlett Packard Labs & Hewlett Packard Enterprise, United Kingdom (Great Britain)); Georgios Gardikis (Space Hellas S.A., Greece)
SHIELD is an EU-funded project, targeting at the design and development of a novel cybersecurity framework, with the aim of which offers security-as-a-Service in an evolved telco environment. The SHIELD framework leverages NFV (Network Functions Virtualization) and SDN (Software-Defined Networking) for virtualization and dynamic placement of virtualised security appliances in the network (virtual Network Security Functions – vNSFs), Big Data analytics for real-time incident detection and mitigation, as well as attestation techniques for securing both the infrastructure and the services. This paper presents a detail Roadmapping analysis identifies the factors that will affect market adoption and evolution of SHIELD or similar cybersecurity solutions.