Four tutorials are scheduled for Monday 3 october. Here you will find information as soon as they are available.

  • [T1] OFDM Relay Technologies for the New Generation Wireless Communication Systems (09:30 - 12:30) (see details)
  • [T2] Sensor networks, protocols and energy (09:30 - 12:30) (see details)
  • [T3] Wireless Information Infrastructures and the Future Internet: Protocol Components, System Architectures, Security and Privacy (13:15 - 16:15 please note this update) (see details)
  • [T4] M2M (Machine-to-Machine): services, standardization, technological issues and business aspects (14:00 - 17:00) (see details)

OFDM Relay Technologies for the New Generation Wireless Communication Systems // [T1] 09:30 - 12:30

It appears you don't have Adobe Reader or PDF support in this web browser. Click here to download the PDF

by Prof.dr Milica Pejanovic-Djurisic
Faculty of Electrical Engineering
University of Montenegro
Click here to download the PDF

Monday 3 October. 09:30 - 12:30

The new generation wireless communications systems are facing a great challenge to fulfill demands in terms of capacity, quality of service and reliability, due to the great number of new emerging services and multimedia applications. In that sense for example, by increasing the employed center frequency and the occupied bandwidth, the capacity problem could be solved. However, this logical solution is leading towards the constraints with the communication range, i.e. the path-loss will significantly increase in the high working frequencies as well as the noise power as a consequence of a larger bandwidth. The range problem could be resolved by implementing a greater number of base stations, which is an expensive and not very practical approach, especially in dense populated urban areas. Therefore, relaying appears as a solution for extending the base station coverage area, which at the same time enables the system’s capacity to be increased.

The relaying concept is not a new idea. It appeared for the first time in 1971 when the communication system with three terminals was analyzed. However, up to a recent time, there was an inconsiderable interest for the relaying systems. Nowadays, the intensive research work on relaying systems is ongoing, as they are recognized as an interesting solution for the new generation WWAN (Wireless Wide Area Network) and WLAN (Wireless Local Area Network) systems. This is particularly due to the fact that in those systems a special attention is dedicated towards solving the problem of “far” users, situated near the cell edges, where the low level signal strength and interference with users from neighboring cells make the challenge of achieving required quality of service to be considerable. Thus, it is not surprising that the relay systems have attracted a great research interest in recent years, as they have proved the ability to increase coverage area and capacity of wireless systems, which means to solve some of the mentioned problems specific for the new generation wireless networks. Combined with the OFDM as a transmission technology, relaying systems are recognized as an attractive solution for the new generation of WLAN, WMAN and WWAN systems, which is confirmed through the acceptance of the IEEE 802.16j standard named Mobile multi-hop Relay for the WiMAX systems, as well as through the recent acceptance of LTE-Advanced and WirelessMAN-Advanced systems, which both incorporate relaying, as IMT-Advanced technologies.

In its simplest form, a relay system enables the communication between the source (S) terminal and destination (D) terminal via the relay (R) terminal, which receives the signal from S, then performs appropriate signal processing and forwards the signal to D. This kind of relay system is named dual-hop relaying system. The signal processing at R usually assumes one of the following two methods: amplifying-and-forwarding or decoding-and-forwarding of the received signal. Thus two corresponding kinds of relaying could be identified and they are denoted as AF and DF, respectively. In the AF relaying method, fixed gain relaying or variable gain relaying may be implemented, depending on the possibility of R to estimate the S-R channel. The DF mode assumes that the relay terminal performs decoding of the received signal and then re-encoding before further transmission.

Apart from the detailed explanations regarding the relay concepts and performance analyses of single carrier relaying systems in different channel conditions, as well as for different relaying strategies, this tutorial is focused towards multicarrier relaying systems using Orthogonal Frequency Division Multiplexing (OFDM) as transmission technique. Actually, OFDM brings about additional freedom of making decisions on a subcarrier basis at the relay station, according to the channel conditions on the source-relay and relay-destination links. In this tutorial it is shown that a considerable wireless system performance improvement can be achieved if a subcarrier permutation (SCP) scheme is performed at R. Moreover, it is explained how to optimize the OFDM relay system performance using an adequate combination of different SCP schemes, depending on transmission conditions.

Generally, this tutorial on OFDM relay technologies for the new generation wireless communication systems is dedicated towards fostering closer interactions among the researchers themselves, as well as among the industry and researchers, providing an excellent opportunity for all to find the best solutions for OFDM based relay systems in the next generation wireless networks.

Milica Pejanovic-Djurisic is a full professor in telecommunications at the University of Montenegro, Faculty of Electrical Engineering, Podgorica, Montenegro. She is also a director of the Center for Telecommunications at the University of Montenegro. Mrs. Pejanovic-Djurisic graduated in 1982. at the University of Montenegro with BSc degree in Electrical Engineering. She has got MSc and PhD degrees in Telecommunications at University of Belgrade. For the period of two years, prof. Pejanovic-Djurisic has also performed research in mobile communications at the University of Birmingham, UK. She has been teaching at the University of Montenegro basic telecommunications courses on graduate and postgraduate levels, as well as courses in mobile communications and computer communications and networks, being the author of three books and many strategic studies. She has published more than 200 scientific papers in international and domestic journals and conference proceedings. She has organized several workshops, giving tutorials and speeches at many scientific and technical international conferences. Her main research interests are: wireless communications theory, wireless networks performance improvement, broadband transmission techniques, optimization of telecommunication development policy. Prof. Pejanovic-Djurisic has considerable industry and operating experiences working as industry consultant (Ericsson, Siemens) and Telecom Montenegro Chairman of the Board. She has been in charge of GSM and wireless networks design and implementation in Montenegro and in the region of SEEurope. Prof.Pejanovic-Djurisic has taken part in many internationally and EU funded ICT projects with domestic and international partners. She is an evaluation expert for EU FP7 projects in the field of ICT and a member of IEEE and IEICE.

Prof. Pejanovic-Djurisic has also a considerable experience in the field of telecommunication regulation. Being an ITU expert, she participates in a number of missions and ITU activities related with regulation issues, development strategies and new technological solutions.

(see also: website)


Sensor networks, protocols and energy // [T2] 09:30 - 12:30

by David Simplot-Ryl
Director of the Lille - Nord Europe Inria research center

Monday 3 October. 09:30 - 12:30

Sensor networks consist of autonomous nodes with limited  battery and of base stations with theoretical infinite energy. In this  tutorial, we will focus on energy efficiency of communication layers  in such networks. In particular, we will explore routing protocols  (including broadcasting, unicasting, multicasting, anycasting) and  activity scheduling. For instance, in broadcasting issue, the simplest  and most widely used approach to broadcast is blind flooding, which  lets every node in the network to rebroadcast a receiving packet to  all its neighbors. This causes redundancy of broadcast packets and  results in unnecessary collisions and bandwidth waste. To overcome  these problems, a number of research groups have proposed more  efficient broadcasting schemes with the goal of minimizing the  retransmissions, while still guaranteeing that a broadcast packet is  delivered to all the nodes in the network. In activity scheduling, we  consider that nodes can sleep to extend the lifespan of the network  without compromising neither area coverage nor network connectivity.  All theses problems can be addressed in a localized manner which  guarantees the scalability and robustness of the proposal in the  context of limited devices.

David Simplot-Ryl is director of the Lille - Nord Europe Inria  research center. He was nominated as member of the Institut  Universitaire de France in 2009 and scientific head of the  POPS project-team (joint project of Inria, Université Lille1 and CNRS  from 2004 to 2011) which is focused on small computing devices like  smartcards, electronic tags and sensor networks. After a PhD (1997) in  theoretical computer science, he joined the Université Lille1 -  Sciences et Technologies where he is full professor since 2004. His  research interests include sensor and mobile ad hoc networks, mobile  and distributed computing, embedded operating systems, smart objects  and RFID technologies. He is involved in numerous international  conferences and workshops (e.g.recently AdHocNets 2010-2011, IEEE MASS  2010-2011, IEEE INFOCOM 2011-2012) and in editorial activities (e.g.  special issue in IEEE Network Magazine, IEEE Communication Magazine or  member of associate editor of IEEE Transactions Parallel and  Distributed Systems). Together with his research group, he contributed  to the implementation of SensLab sensor networks, that led to the  creation of FIT – Future Internet (of Things) as part of the  excellence-in-equipment (EquipEx) project. In the Lille - Nord Europe  Inria research centre, he served from 2008 to 2011 as scientific  deputy in charge of the development and the evaluation of research  activities of the research centre. In particular, he is involved in  regional entities like CITC-EuraRFID, Picom or Maud.

(see also: website)

Wireless Information Infrastructures and the Future Internet: Protocol Components, System Architectures, Security and Privacy // [T3] 14:00 - 17:00

It appears you don't have Adobe Reader or PDF support in this web browser. Click here to download the PDF

by John Baras
Founding Director, ISR
University of Maryland, USA
Click here to download the PDF

Monday 3 October. 14:00 - 17:00

Broadband Communication Infrastructures are expanding rapidly and are becoming ubiquitous. They are affecting every aspect of life and work. They are shaping the architecture, protocols and operation of the evolving future Internet. In this tutorial we describe major recent advances, challenges and opportunities in this critical area, from an integrated systems perspective. Hardware and physical layer advances are making possible new programmable types of networks and services. In the wireless arena physical layer advances mitigate interference (OFDM, MIMO, etc.) and will provide energy and bandwidth efficient and reliable communications. Services over the Future Internet and associated architectures are rapidly expanding and are increasingly interacting and integrated.

We present a new methodology to design wireless communication network protocols based on the decomposition of protocols into fundamental components and the use of optimization techniques for tradeoff analysis and synthesis. The new formal and model-based approach allows a systematic study of network performance and cross-layer analysis and design of routing, scheduling, MAC and PHY layer protocols. This approach, called Component Based Networking (CBN), combines and extends ideas and methods from component-based software engineering, formal models, performance models, optimization and trade-off analysis, compositional synthesis. We describe the current state of development and in particular applications to wireless network routing protocol design, and wireless network design that is cross-layer and beyond. Within this context we describe optimization methods that combine loss network models for wireless networks with automatic differentiation, generalized potential and routing, constrained shortest path problems and effects of network topology. We demonstrate the power of the methodology in the example of routing protocols, which are divided into multiple components. We use the method to design new and improved neighbor discovery and topology dissemination components for mobile wireless networks. To analyze and optimize the topology dissemination component we introduce the stable path topology control problem for link-state routing in mobile multihop networks. We formulate the selective link-state broadcast as a graph pruning problem with restricted local neighborhood information and we develop general conditions for the distributed local policies to preserve the stable routing paths globally.

Trust and reputation are critical concepts in networks – communication, control, computer, social, web-based, economic, biological. Trust evaluation leads to the development of relations and collaborations. These evaluations are based either on direct ‘communal’ monitoring and inference by the nodes, or on indirect references and credentials. We describe new fundamental ways for analyzing and evaluating trust in autonomic networked systems. Due to the dynamic and changing nature of autonomic networks trust evidence and the resulting evaluations may be uncertain and incomplete. The indirect evaluation process is modeled as a path problem on a directed graph, where nodes represent entities, and edges represent trust relations. We develop a novel formulation of trust computation as ‘linear’ iterations on partially ordered semirings. Using the theory of semirings, we analyze several key problems on the performance of trust algorithms. This allows us to formulate problems of resilience of trust metrics and trust evaluation to attacks. The direct trust evaluation process is modeled as iterated games on dynamic graphs. We present several explicit examples. We present the methodology of constrained coalitional dynamic games that we have developed for studying the effects of trust on collaboration.

We describe and solve various problems of wireless network security, information assurance and trust in dynamic wireless networks. These include detection and defense against attacks, detection of propagating viruses, evaluation of intrusion systems, attacks at the physical, MAC and routing protocols, trust establishment-dynamics-management. We describe the use of distributed change detection methods and algorithms for intrusion detection and the use of non-cooperative games for the detection and defense against attacks at all layers. We demonstrate how Bayesian decision theory can be used to evaluate intrusion detection systems and we resolve some key problems in this area. We use game theoretic methods again to develop robust protocols against attacks, including Byzantine ones. We provide an in-depth investigation of trust establishment and computation in such networks. We describe various methods for distributed trust evaluation and the associated trust (and mistrust) ‘spreading’ dynamics.

Authentication is the process where claims of identity are verified. Most mechanisms of authentication (e.g., digital signatures and certificates) exist above the physical layer, though some (e.g., spread spectrum communications) exist at the physical layer often with an additional cost in bandwidth. We introduce a general analysis and design framework for authentication at the physical layer where the authentication information is transmitted concurrently with the data. By superimposing a carefully designed secret modulation on the waveforms, authentication is added to the signal without requiring additional bandwidth, as do spread spectrum methods. The authentication is designed to be stealthy to the uninformed user, robust to interference, and secure for identity verification. The tradeoffs between these three goals are identified and analyzed in block fading channels. We describe further extensions to OFDM and multicarrier wireless devices. We also describe several other methods for authentication and security at the physical layer including the use of signal characteristics to authenticate mobile wireless devices, the discovery of unshakable physical characteristics in fingerprint sensors, the use of special-purpose trusted chips for increasing the security of portable computers and wireless devices and the use of hardware-based security towards establishing compositional security schemes. We demonstrate that allocating some of the security functions to hardware and the physical layer not only considerably strengthens the security of many wireless devices and networks, but is rapidly becoming a necessary component in the overall security architecture of modern and future networks, especially mobile wireless. In this part of the tutorial we cover security and trust in broadband wireless networks including physical layer security (signal processing, TPM, MTM, TCN, biometrics, PUFs and the integration of combinations) and universally composable security, including security aware network protocol design. We also give example applications in distributed estimation, fusion and trust, and smart grid cybersecurity.

Social networks over the web are also becoming ubiquitous and pose a unique set of challenges stemming primarily from the interactions of humans and technological networks. We describe new approaches in modeling and analysis of social networks and their dynamics including geometric and algebraic models, security and trust, privacy, reputation systems. Again the emphasis is on an integrated systems perspective and the need for appropriate model-based analytics. We close with an integrated model of the communication, information and cognitive layers of future networks and a description of certain foundational problems it implies for networked systems.

John S. Baras holds a permanent joint appointment as professor in the department of electrical and computer engineering and the Institute for Systems Research (ISR). During 1985-1991 he was the founding director of ISR, which is one of the first six National Science Foundation engineering research centers. Since 1991 Dr. Baras holds the Lockheed Martin Chair in Systems Engineering and is the founding and current director of the Maryland Hybrid Networks Center (HyNet) an industry-university-government center of excellence on all aspects of hybrid communication network technologies. He also serves as a faculty member of the university's Interdisciplinary Program in Applied Mathematics and an affiliate professor in the Fischell Bioengineering Department.
Dr. Baras’ research interests include scalable multicast security; integrated management of hybrid communication networks; modeling and performance evaluation of large broadband hybrid networks; fast internet over heterogeneous (wireless-wireline) networks; manufacturing process selection for electromechanical products; intelligent control; wavelets; robust speaker identification; low complexity, high fidelity, low rate speech coding; image processing and understanding; learning clustering algorithms and classification; distributed control (or decision) systems; stochastic dynamic model building; stochastic control and scheduling; real-time sequential detection and estimation; computer-aided control systems design; queuing systems; quantum communications; nonlinear systems; and model based systems engineering.
A Fellow of the IEEE, Dr. Baras has served the organization in various leadership positions. He is also a Foreign Member of the Royal Swedish Academy of Engineering Sciences (IVA). He has received many awards for his research including the 1980 George Axelby Prize from the IEEE Control Systems Society and the 2006 Leonard Abraham Prize from the IEEE Communications Society. He also serves on the editorial boards of numerous mathematics and engineering journals and book series, and consults extensively with industry and government on various automation and telecommunication problems. He is the recipient of three Invention of the Year awards from the University of Maryland, holds five patents, and has received many awards for his research and publications including the 1980 George Axelby Prize from the IEEE Control Systems Society and the 2006 Leonard Abraham Prize from the IEEE Communications Society. Dr. Baras received his B.S. in electrical engineering from the National Technical University of Athens, Greece, and the M.S. and Ph.D. degrees in Applied Math from Harvard University.

(see also: website)


M2M (Machine-to-Machine): services, standardization, technological issues and business aspects // [T4] 14:00 - 17:00

by Benoît Ponsard, Founding Director of Kimeggi

Monday 3 October. 14:00 - 17:00

Keywords: machine-to-machine, M2M, ecosystem, cellular networks, service architecture, standardization, business challenges, GPRS, EDGE, 3G

Machine-to-machine (M2M) is nothing new, neither in concept nor in reality. It's just a connectivity service delivered to machines over cellular networks without direct human action. Nevertheless M2M services require many technical improvements and many business innovations, compared to human-to-human services. Therefore M2M space is a brand new paradigm for all actors involved in its value chain. To set the scene of M2M services, the tutorial starts with representative use cases and key figures of this fast growing market. Then we define M2M and compare it with the Internet of Things. The next part covers technical architecture required by M2M services and highlights some of the key issues that must be addressed to deliver M2M services: theft-proof SIM cards, large size numbering plan, network congestion, low mobility devices, security management, … Then the tutorial introduces standardization work that is being conducted by various committees. We present the overall high-level architecture and the specific cellular network improvements that are under standardization to deliver M2M services more efficiently. We conclude by presenting the M2M ecosystem, its key players and the business challenges they face when addressing the market.

Benoit Ponsard received the PhD degree from Telecom ParisTech in 1991 and the master degree in electrical engineering (electronics) from Ecole Superieure d'Electricité in 1985.
Dr Ponsard spent his entire career in the telecom business where he held various positions in project management and team management within major world companies. Among others, he contributed to military communication systems, pre-cellular CT2 systems, GSM value-added services.
From 2004 to 2010, Dr Ponsard was appointed as professor in Grenoble University (France), where he taught telecommunication to master-level students. During this time, he conducted researches in the field of sensor networks.
In 2009, Benoit Ponsard founded Kimeggi, a consulting company specialized in machine connectivity. Kimeggi gives advise to companies willing to develop innovative products and services based on m2m connectivity. As a recognized m2m expert, Dr Ponsard gave talks to m2m Paris tradeshow in 2010 and 2011. Dr Ponsard holds two patents and one pending.

(see also: website)



Powered by diasite