Welcome to the Media Center, where you can find the latest original video content from ComSoc's conferences and events. Featuring keynotes speakers, executive forums, keynote workshops, industry panels, and much more from ComSoc's events, including the IEEE Global Communications Conference (GLOBECOM) and the IEEE International Conference on Communications (ICC). These videos bring insights to you when you need it. Your ComSoc membership offers free access to many of these valuable contents simply by logging in with your IEEE account.
IEEE and Non-Members can purchase videos after logging into their IEEE Account. If you do not have an IEEE account, click 'Create Account" to create a FREE account to make a purchase.
TCP/IP is not secure, a fundamental change is required. One owner environments (VPN and firewalls) do not support shared operations and devices. This presentation will examine the fundamental weaknesses of TCP/IP and why can we not fix the existing infrastructure. Also, what will be the protocol requirements for TCP/IP replacement taking into account security and efficiency considerations and how digital rights can be defined, managed and protected.
Security issues in Internet communication tend not to be subtle mathematical flaws in the cryptography, but instead, broader system issues. For example, humans using the Internet. We have lovely cryptography. We have certificates. We have great protocols for doing authentication. But does that really assure a human that they are talking to what they think they are talking to? What about authenticating people? What kinds of names should people have, so that the name is unique, and someone that wants to talk to a human will know what name to use? What about distributed systems that are provably correct, provided that all the components are doing what they are supposed to be doing, but do not work correctly if some components misbehave? How can we design systems that will be robust despite misbehaving participants? Will digital signatures on data assure us that data that we read on the Internet is true? Is the simple answer to everything that we should blame users if things go wrong, and just complain that users need more training? (hint…no) Or maybe using blockchain everywhere will make everything secure? (hint…no)
5G will provide significant societal value as it is used for critical infrastructure, mission critical applications, smart manufacturing, connected car, and other use cases. As a result of this new usage, our risk tolerance must be decreased because of the increased impact of cyberattacks on the 5G network. This requires a risk-based approach to securing Radio Access Networks (RAN) as it evolves to Open RAN that is virtualized, disaggregated, cloud-native, automated, and intelligent. Along with new secure use cases, there is an emerging requirement for Open RAN which can be implemented using the approaches of virtual RAN, Cloud RAN, and O-RAN. These new technologies in the wireless cellular space bring inherent security benefits while also introducing new security risks. This presentation will address the Open RAN approaches and the security risks for each. Open RAN security topics that will be discussed include 3GPP 5G security, cloud security, security-by-design, and secure use of open source software. ORAN’s expanded threat surface, with additional interfaces and functions, introduces additional security risks that will also be discussed. The presentation will also introduce concepts to achieve a zero-trust architecture for Open RAN that can be implemented in Cloud RAN and O-RAN. The multi-party relationship between the operator, cloud provider, and system integrator requires security roles and responsibilities are clearly defined in this presentation.
In the last few years a variety of players have entered the quantum race, ranging from tech giants - such as IBM and Google – to several small start-up companies, as well as states and governments, with massive public funds to be distributed over the next years. Standardization efforts are already ongoing, such as the one within the Internet Engineering Task Force (IETF). The IEEE has become involved in this effort. Within the context of a real quantum revolution, the vision is to build a quantum network infrastructure, also known as the Quantum Internet, to interconnect remote quantum devices so that quantum communications among them are enabled. We will give an overview about the main challenges and open problems arising in the design of a distributed quantum computing architecture. Quantum computing is on the verge of sparking a paradigm shift. Software reliant on this nascent technology, one rooted in the physical laws of nature, could soon revolutionize computing forever. We will focus on the current quantum computer technology from the hardware and software point of view, providing a detailed roadmap for next years. In this context, specific integration of classical and quantum computing that represents a huge step in accelerating the execution of quantum circuits, or sequences of quantum operations, on real Quantum systems will be described.
Satellite communication (SatCom) offers the prospect of service continuity over uncovered and under-covered areas, service ubiquity, and service scalability. In addition, the integration of SatCom, aerial networks, and terrestrial communications into a single wireless network, called space-air-ground integrated network (SAGIN), is deemed from now on crucial. However, several challenges must first be addressed to realize these benefits, as the resource management, network control, network security, spectrum management, and energy usage of satellite networks are more challenging than that of terrestrial networks. This panel will offer a general overview of emerging and future trends in SatCom. More specifically, the potential of SatCom and then the challenges facing diverse aspects of these systems will be discussed. The panel will also be a forum to debate the various proposed solutions.
Post-quantum cryptography (PQC) is the cornerstone to build quantum-safe 6G network. This presentation will introduce NIST PQC standardization effort and discuss PQC applications in 6G network security.
It is undeniable that artificial intelligence and machine learning algorithms are at the heart of a fast-growing number of new telecommunication technologies. With our panel of experts, we will explore a variety of IP protection strategies that include copyrights, trade secrets and patents, as well as their applicability to data and AI technologies.
We have often spoken of the "flaws" in public policies and regulatory frameworks of states or cities as so many opportunities for imaginative entrepreneurs to create disruptive businesses (think of Airbnb or Uber for example). But the flip side is that much often, these same public policies do not keep pace with the increasingly rapid pace of changing technological innovations or business models in such a way that they constitute a constraint or even a brake on their development. Imagine, just a little, the spaghetti of regulations of all kinds, from local, regional or national authorities, faced by those who want to test, in the public space, a prototype of an autonomous vehicle, for example, in an urban environment. Hell! Our three panelists have had to deal or are currently dealing with this type of context and will share their observations, the lessons they have learned from them as well as some possible solutions, both for those who want to innovate and for public decision-makers.
Internet traffic is undergoing constant change. One prominent example is the COVID-19 outbreak, a global pandemic, in March 2020. As a result, billions of people were either encouraged or forced by their governments to stay home to reduce the spread of the virus. This caused many to turn to the Internet for work, education, social interaction, and entertainment. With the Internet demand rising at an unprecedented rate, the question of whether the Internet could sustain this additional load emerged. To answer this question, we review the impact of the first year of the COVID-19 pandemic on Internet traffic. Next, we will take a look at the rise of IoT devices and their traffic patterns. Bio: Anja Feldmann studied CS in Paderborn, Germany and continued her studies at Carnegie Mellon University, where she earned her Ph.D in 1995. The next four years she did research work at AT\&T Labs Research, before taking professor positions at Saarland University, the TU Munich, and the TU Berlin. In May 2012, she was elected the first woman on the employer side of the Supervisory Board of SAP. Since the 2018, Anja is a director at the Max Planck Institute for Informatics in Saarbrücken, Germany. Her current research interests include Internet measurement, traffic engineering and traffic characterization, network performance debugging, and network architecture. She has published more than 70 papers and has served on more than 60 program committees, including as Co-Chair of ACM SIGCOMM 2003 and ACM IMC 2011 and as Co-PC-Chair of ACM SIGCOMM 2007, ACM IMC 2009, ACM HotNets 2014, and ACM CoNext 2020. She is a recipient of the Gottfried Wilhelm Leibniz Preis, the Berliner Wissenschaftspreis, the Schelling Preis, and the Vodafone Innovation Award. She is a member of the German Academy of Sciences Leopoldina, the BBAW, and acatech.
Traditional network’s “best-effort” forwarding gradually fails to meet the needs of booming real-time applications, such as industrial internet, vehicle networking and artificial intelligence, etc. Time-sensitive and deterministic networking has become a promising technology to achieve strict QoS guarantees, such as bounded end-to-end latency and jitter, and higher reliability. However, as the massive deployment of time-sensitive and deterministic networking, it also brings many challenges, such as synchronous and asynchronous scheduling and shaping mechanisms and so on. Thus the Workshop on “Time-sensitive and Deterministic Networking” gives the opportunity to gather the researchers from the academia and industry in order to investigate the challenges and identify the further directions for the ultra-reliable and low latency communication.
5G networks and devices are now a reality with wide deployment and spread among population, but the demand for more data rate is still booming, and will soon need for a newer generation for wireless/cellular communication, the 6G. It will be a new standard that not only provides huge data rate (+1Tbps) and extremely low delay (0.1ms), but also will enable the “hyper-connected” paradigm that will connect users and things. Artificial Intelligence (AI) will play a major role within 6G, and thus more computation and communication resources will be consumed, where their optimization is a must. 6G communications will bring new challenges due to their sensitivity to scenario conditions, thereby requiring highly adaptive techniques that will adapt extremely fast, in order to guarantee a delay less than 100 microseconds. Spectrum and resources management will be crucial within 6G in order to account for the extremely heterogeneous scenario. The networks complexity will also be unprecedented, due to the very diverse applications such as ultra‐low latency requirements for critical vehicle communication, the growing demand of high positioning accuracy for location‐based services, and dense heterogeneous architectures. Several emerging topics are encountered within 6G and this workshop will focus on such emerging topics, and potential solutions will be presented. Researchers and engineers from academia and industry are invited to submit their recent results and innovations.
5G networks and devices are now a reality with wide deployment and spread among population, but the demand for more data rate is still booming, and will soon need for a newer generation for wireless/cellular communication, the 6G. It will be a new standard that not only provides huge data rate (+1Tbps) and extremely low delay (0.1ms), but also will enable the “hyper-connected” paradigm that will connect users and things. Artificial Intelligence (AI) will play a major role within 6G, and thus more computation and communication resources will be consumed, where their optimization is a must. 6G communications will bring new challenges due to their sensitivity to scenario conditions, thereby requiring highly adaptive techniques that will adapt extremely fast, in order to guarantee a delay less than 100 microseconds. Spectrum and resources management will be crucial within 6G in order to account for the extremely heterogeneous scenario. The networks complexity will also be unprecedented, due to the very diverse applications such as ultra‐low latency requirements for critical vehicle communication, the growing demand of high positioning accuracy for location‐based services, and dense heterogeneous architectures. Several emerging topics are encountered within 6G and this workshop will focus on such emerging topics, and potential solutions will be presented. Researchers and engineers from academia and industry are invited to submit their recent results and innovations.