Wednesday,
21st April 10:45am - 12:00pm
Tutorial # 1:
Standard Compliance, Testing the Wireless Data
Infrastructure Performance in the Lab
|
Dr. Habib Riazi, Clearwire, VA,
USA
|
Abstract:
Development of commercial mobile
wireless infrastructure starts with a standard. The
standard body defines the requirements for various
elements, which will then be used by manufacturers to
design their product accordingly.
Although the standard development is a
collaborative effort involving experts from the
industry, the implementation is prone to individual
manufactures interpretation of the standard. Hence there
exists a standard certification test process before the
equipment is offered on the market.
However, the standard conformance test while
comprehensive in verifying compliance, by its nature, is
performed in isolation and under static conditions. i.e.
each network element is tested separately and not in an
end-to-end test bed specific to the network topologies
that they will be utilized in, and definitely not under
dynamic conditions of loading and mobility, as intended
by the end user.
On the other hand, with the advent of software
defined radios, modern telecom equipment provides
flexible options in functionality and performance. The
flexibility is possible by using a large set of soft
parameters. The latter can be optimized for a desired
use case and service policy, and to ensure user
experience and prevent surprises after an expensive
deployment.
In this session, we discuss the pros and cons of the
need for laboratory performance testing of mobile
wireless data access infrastructure beyond the standard
conformance test, and nuances of benchmarking the link
level and system level performance of the actual
hardware and software with emulated real-world
conditions in a consistent laboratory environment.
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Wednesday,
21st April 2:00pm - 3:00pm
Tutorial # 2:
Current Usage and Issues in Cellular TV Phone
|
Dr. J. P. Shim,
Mississippi State University, USA |
Dr. J. P. Shim,
Mississippi State University,
MS, USA .
Dr. J. P. Shim,
Larry and Tonya Favreau Notable Scholar
and John Grisham Master Teacher, is Professor of MIS and
Director of IBSP at Mississippi State University. He
received his PhD from University of Nebraska and
completed Harvard Business School’s Executive Education
Program. He taught Information Systems at Georgia State
University, New York University, Chinese University of
Hong Kong while he was on sabbatical. He serves on
senior editor, associate editor, and editorial
board/referee for Information Systems journals.
Professor Shim has received various professional awards,
grants and distinctions, including National Science
Foundation, Microsoft Corp., Mississippi Institutions of
Higher Learning, Booz-Allen & Hamilton, University of
Wisconsin Systems. He is a nine time recipient of the
outstanding faculty award at MSU. He has written over
150 research papers in information systems and DSS.
Recently, he has served as a program chair for US-Japan
e-business conference sponsored by NSF and as a keynote
speaker at international ubiquitous and embedded
conference. He has lectured in the USA, UK, France,
Korea, Kuwait, Hong Kong, Taiwan, Japan, Jamaica,
Portugal, Turkey, and China.
Abstract:
The rapidly evolving technological developments have
affected the nature of cellular TV phone. Current
cellular TV phone standards, usage, and issues will be
discussed. The real tracking data, collected from
server's logs from South Korean digital multimedia
broadcasting (DMB) providers, will be analyzed according
to users' age group, peak viewing time of program,
location usage, and program duration. These findings
benefit the strategic planning of the cellular
communications and entertainment content industries
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Thursday,
22nd April 8:30am - 10:45am
Tutorial # 3:
Network Security Architecture in Practice
|
Dr. François Cosquer,
Head of Solutions Security, Alcatel-Lucent
Corporate Solutions and Marketing |
Abstract:
After an introduction to
security architecture followed by a review of deployment
models and scenarios, the tutorial illustrates how
security design principles can be applied in practice.
Based on concrete examples of services such as Corporate
VoIP and Carrier IPTV, we will discuss how - using
known building blocks and design principles - to build
secure architectures. The main objective of this session
is to get a solid basis for the design and deployment of
secure architecture.
List of topics:
Network Security Architecture Key
Principles and standards
Definitions: Network security architecture and management
Risk and threats
Standards
Security triade (opportunity, motive, capability)
Security lifecycle (prevention, detection,
reaction)
Security toolkit
Device, service, content&media protection
IDS / IPS
Signature, behaviour
Secure Logging (post mortem)
Aggregation , normalization, correlation
Case study
Corporate Voice over IP deployment
Carrier Residential IPTV
deployment
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
Thursday,
22nd April 6:00pm - 7:30pm
Tutorial # 4:
Introduction to Information Security in Wireless
Networks
|
Dr. Xuan Hung Le
iCONS Research
University of South Florida, USA
|
|
Mr.Ismail Butun
iCONS Research
University of South Florida, USA |
Dr. Xuan Hung Le
is a Postdoctoral Research Associate in the
iCONS Lab at
the Department of Electrical Engineering, University of
South Florida. Previously, he was a research professor
at Kyung Hee University, Korea. He holds a Ph.D. in
Computer Engineering from Kyung Hee University, Korea.
His research interests are wireless sensor networks and
information security. He has been working on a number of
projects on wireless sensor network security security
and its application to healthcare and has published more
than 30 articles in these areas.
Mr. Ismail Butun
is a Ph.D. Candidate
in the iCONS
Lab, Electrical Engineering, University of South
Florida. His research interests focus on the following
areas: cryptography and information security, digital
signatures and wireless sensor network security.
Abstract:
Security
is an indispensable part of most applications such as
finance, e-government, computer systems, and in wired
and wireless networks. Generally, it guarantees
Confidentiality, Integrity, and Availability (known as
‘CIA’) of information. This tutorial is designed to
provide an introduction to Information Security, and
then review the state-of-the-art of Security in Wireless
Networks, in particular Wireless Sensor Networks. First,
we will briefly introduce well-known
algorithms/techniques in Information Security including
Symmetric (Private) Key Cryptography (e.g. Data
Encryption Standard (DES), Advanced Encryption Standard
(AES)), and Asymmetric (Public) Key Cryptography (e.g.
River-Shamir-Adleman (RSA), Elliptic Curve Cryptography
(ECC)). Then, we will review the state-of-the-art,
problems and challenges of Security in Wireless
Networks, in particular Wireless Sensor Networks. Due to
open wireless environments and unattended node
deployment, Wireless Sensor Networks are more security
vulnerable than other networks. Furthermore, due to
inherent resource and computing constraints, Security in
Wireless Sensor Networks poses more difficult
challenges. From this tutorial, participants will get a
background of information security and understand the
important impact of security in wireless networks.
|