WTS
2010
9th ANNUAL WIRELESS TELECOMMUNICATION SYMPOSIUM
                    EMBASSY SUITES USF / BUSCH GARDENS
                              TAMPA, FLORIDA, USA


                 21-23 APRIL 2010
HOME  •  PROGRAM  •  CALL FOR PAPERS   •  CALL FOR PROPOSALS  •  COMMITTEE  • SPONSORS
       

Wednesday, 21st April 10:45am - 12:00pm
Tutorial # 1: Standard Compliance, Testing the Wireless Data Infrastructure Performance in the Lab

Dr. Habib Riazi, Clearwire, VA, USA  

Abstract:

Development of commercial mobile wireless infrastructure starts with a standard. The standard body defines the requirements for various elements, which will then be used by manufacturers to design their product accordingly.  Although the standard development is a collaborative effort involving experts from the industry, the implementation is prone to individual manufactures interpretation of the standard. Hence there exists a standard certification test process before the equipment is offered on the market.  However, the standard conformance test while comprehensive in verifying compliance, by its nature, is performed in isolation and under static conditions. i.e. each network element is tested separately and not in an end-to-end test bed specific to the network topologies that they will be utilized in, and definitely not under dynamic conditions of loading and mobility, as intended by the end user.  On the other hand, with the advent of software defined radios, modern telecom equipment provides flexible options in functionality and performance. The flexibility is possible by using a large set of soft parameters. The latter can be optimized for a desired use case and service policy, and to ensure user experience and prevent surprises after an expensive deployment.  In this session, we discuss the pros and cons of the need for laboratory performance testing of mobile wireless data access infrastructure beyond the standard conformance test, and nuances of benchmarking the link level and system level performance of the actual hardware and software with emulated real-world conditions in a consistent laboratory environment.

----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

 Wednesday, 21st April 2:00pm - 3:00pm
Tutorial # 2: 
Current Usage and Issues in Cellular TV Phone

Dr. J. P. Shim, Mississippi State University, USA

Dr. J. P. Shim, Mississippi State University, MS, USA . Dr. J. P. Shim, Larry and Tonya Favreau Notable Scholar and John Grisham Master Teacher, is Professor of MIS and Director of IBSP at Mississippi State University. He received his PhD from University of Nebraska and completed Harvard Business School’s Executive Education Program. He taught Information Systems at Georgia State University, New York University, Chinese University of Hong Kong while he was on sabbatical. He serves on senior editor, associate editor, and editorial board/referee for Information Systems journals. Professor Shim has received various professional awards, grants and distinctions, including National Science Foundation, Microsoft Corp., Mississippi Institutions of Higher Learning, Booz-Allen & Hamilton, University of Wisconsin Systems. He is a nine time recipient of the outstanding faculty award at MSU. He has written over 150 research papers in information systems and DSS. Recently, he has served as a program chair for US-Japan e-business conference sponsored by NSF and as a keynote speaker at international ubiquitous and embedded conference. He has lectured in the USA, UK, France, Korea, Kuwait, Hong Kong, Taiwan, Japan, Jamaica, Portugal, Turkey, and China.

Abstract:

The rapidly evolving technological developments have affected the nature of cellular TV phone. Current cellular TV phone standards, usage, and issues will be discussed. The real tracking data, collected from server's logs from South Korean digital multimedia broadcasting (DMB) providers, will be analyzed according to users' age group, peak viewing time of program, location usage, and program duration. These findings benefit the strategic planning of the cellular communications and entertainment content industries

----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Thursday,  22nd April 8:30am - 10:45am
Tutorial # 3: 
Network Security Architecture in Practice

Dr. François Cosquer, Head of Solutions Security, Alcatel-Lucent Corporate Solutions and Marketing

Abstract:

After an introduction to security architecture followed by a review of deployment models and scenarios, the tutorial illustrates how security design principles can be applied in practice. Based on concrete examples of services such as Corporate VoIP and Carrier IPTV, we will discuss how  - using known building blocks and design principles - to build secure architectures. The main objective of this session is to get a solid basis for the design and deployment of secure architecture.

List of topics: 

Network Security Architecture Key Principles and standards
         Definitions: Network security architecture and management
        
Risk and threats
        
Standards
        
Security triade (opportunity, motive, capability)
        
Security lifecycle (prevention, detection, reaction)
Security toolkit
        
Device, service, content&media protection
       
 IDS / IPS
        
Signature, behaviour
        
Secure Logging (post mortem)
        
Aggregation , normalization, correlation
Case study
        
Corporate Voice over IP deployment
        
Carrier Residential IPTV deployment

----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Thursday, 22nd April 6:00pm - 7:30pm
Tutorial # 4:
Introduction to Information Security in Wireless Networks


Dr. Xuan Hung Le

iCONS Research
University of South Florida, USA
                                    
Mr.Ismail Butun 
iCONS Research
University of South Florida, USA

Dr. Xuan Hung Le is a Postdoctoral Research Associate in the iCONS Lab at the Department of Electrical Engineering, University of South Florida. Previously, he was a research professor at Kyung Hee University, Korea. He holds a Ph.D. in Computer Engineering from Kyung Hee University, Korea. His research interests are wireless sensor networks and information security. He has been working on a number of projects on wireless sensor network security security and its application to healthcare and has published more than 30 articles in these areas.

Mr. Ismail Butun
is a Ph.D. Candidate in the iCONS Lab, Electrical Engineering, University of South Florida. His research interests focus on the following areas: cryptography and information security, digital signatures and wireless sensor network security.

Abstract:

Security is an indispensable part of most applications such as finance, e-government, computer systems, and in wired and wireless networks. Generally, it guarantees Confidentiality, Integrity, and Availability (known as ‘CIA’) of information. This tutorial is designed to provide an introduction to Information Security, and then review the state-of-the-art of Security in Wireless Networks, in particular Wireless Sensor Networks. First, we will briefly introduce well-known algorithms/techniques in Information Security including Symmetric (Private) Key Cryptography (e.g. Data Encryption Standard (DES), Advanced Encryption Standard (AES)), and Asymmetric (Public) Key Cryptography (e.g. River-Shamir-Adleman (RSA), Elliptic Curve Cryptography (ECC)). Then, we will review the state-of-the-art, problems and challenges of Security in Wireless Networks, in particular Wireless Sensor Networks. Due to open wireless environments and unattended node deployment, Wireless Sensor Networks are more security vulnerable than other networks. Furthermore, due to inherent resource and computing constraints, Security in Wireless Sensor Networks poses more difficult challenges. From this tutorial, participants will get a background of information security and understand the important impact of security in wireless networks.