IEEE Global Communications Conference
4–8 December 2022 // Rio de Janeiro, Brazil // Hybrid: In-Person and Virtual Conference
Accelerating the Digital Transformation through Smart Communications

Industry Presentations

Most of the Industry Program will be happening on-site and live streamed to remote attendees, while a small part will be only virtual. All presentations and panels will be available to be watched on-demand on the virtual platform from the conference dates.

LIST OF PRESENTATIONS:


IP 1: BILL OF MATERIALS (BOMS): A PREREQUISITE SOLUTION FOR NEXT GENERATION NETWORKS (BY SMART TALK BEACON)

Presenter:
Alfred Strauch, Smart Talk Beacon 
Steven Carbno, Smart Talk Beacon
Irfan Al-Anbagi, Smart Talk Beacon
 
Abstract: 
xBOMs are the foundation to Enable; Chain of Custody and Security Operations for Network Virtualization From the National Telecommunications and Information Administration's SBOM FAQ "A Software Bill of Materials (SBOM) is a complete, formally structured list of components, libraries, and modules that are required to build (i.e. compile and link) a given piece of software and the supply chain relationships between them. These components can be open source or proprietary, free or paid, and widely available or restricted access." Infrastructure is defined as a standard implementation of services required to securely operate, manage and support IT/OT infrastructure including sharing of information, solutions, devices and users. Considerable effort has and is being invested in the definition, implementation and use of SBOMs to reduce security risks and improve software development and support processes. Similar efforts related to hardware identification should occur using similar SBOM concepts to mitigate failures and security risk. SBOMs and hardware (HBOMs) concepts can be applied to network design, security, operation and performance optimization. Implementing xBOMs to simplify the processes to deliver complex tasks required to operate, manage and support a new infrastructure is the focus of this presentation. There are 3 types of BOMs discussed in the Industrial Internet Consortium (IIC) Secure Communications Infrastructure by Design (SCID) Group: NBOM - Network connection points and properties SBOM - Software and supply chain (includes network and hardware software) HBOM - Attached hardware and dependencies Important questions need to be asked related to: What happens when you link xBOMs together? How are security operations impacted by xBOM operations? What are the tools required for a new core infrastructure: Path management Packet Management QoS Inventory management Error management Some of these tools and concepts will be addressed in this presentation.
 
Biography:

 

IP 2: MULTI-CLOUD DEPLOYMENT OF 5G NETWORKS WITH PROACTIVE AND POLYMORPHIC ORCHESTRATION (BY IS-WIRELESS)

Presenter:
Robert Gdowski, IS-Wireless
 
Abstract: 
Motivation of the presentation: The complexity of multi-cloud and edge deployment of 5G raises many challenges related to an efficient deployment across different cloud domains (public and private) as well as how to optimally adapt to changing workloads and application's requirements. The MORPHEMIC platform provides a novel approach of adapting and optimizing cloud and edge computing applications by introducing the concepts of polymorphic and proactive adaptation. The description of the Cloud and Edge applications is enclosed in a very expressive Cloud Application Modelling and Execution Language (CAMEL) formalism allowing for definition of deployment requirements, as well as utility-based deployment optimisation. The objective of this demo is to showcase an example of deploying 5G as a form of disaggregated radio access network (RAN) in the intelligent multi-cloud environment by using the Morphemic platform. Context of the presentation: The industrial presentation will start by providing a technical background behind intelligent multi-cloud deployment of 5G networks. The economic justification of disaggregated 5G and several aspects of Open RAN deployment in the multi-cloud environment of 5G will be provided to reflect the benefits of the MORPHEMIC platform. Moreover, a vision of multi cloud deployment of the RAN components (e.g., RU/DU/CU) will be presented and the deployment is fueled by utility-based optimization as well as AI based prediction mechanism harnessed into a proactive adaptation scheme. This part of the will also addresses both the challenges and the approach related to multi-cloud deployment of 5G networks. A practical demonstration by providing a glimpse into the real deployment of the 5G RAN components in the multi-cloud environment, the role of the orchestrator to provision the RAN will be the key elements of the presentation.
 
Biography:

 

IP 3: CELL-FREE MMIMO SUPPORT IN THE O-RAN ARCHITECTURE TO IMPROVE THE PERFORMANCE FOR FUTURE 6G NETWORKS (BY IS-WIRELESS)

Presenter:
Adam Girycki, IS-Wireless
Md Arifur Rahman, IS-Wireless
 
Abstract: 
Communication by joint precoded transmission from many distributed radio units (RUs), called cell-free massive multiple-input multiple-output (CF mMIMO), is a promising concept for future 6G networks. The CF mMIMO architecture is showing huge potential in terms of improving the spectral efficiency (SE) and energy efficiency. The emerging CF mMIMO network architectures target dense deployments providing extreme flexibility in allocating resources to users. One of the key challenging aspects of CF mMIMO is to efficiently manage radio resources to maximize the KPI's of the networks. In parallel, the open Radio Access Networks (RAN) paradigm transforms the RAN towards virtualized, fully interoperable and intelligent architecture. In this presentation, we will highlight the current O-RAN ALLIANCE terminology and link it up with common CF mMIMO terminology used in the several research literatures. We will discuss the main O-RAN innovations to enable CF mMIMO and suggest several deployment options of CF mMIMO by utilizing O-RAN split 7.2x. To exploit the O-RAN entities optimally, and meet diverse requirements of future communication systems, 6G will provide enhanced flexibility through the dynamic scheduling of the available resources. Given the densification of networks, and the introduction of cell-free mMIMO architecture, the availability of RAN resources is unseen, and is only limited by the potential of the resource allocation methods. In this industrial presentation talk, we will provide a brief overview of practical aspects of the radio resource scheduling algorithm implementations providing a clear insight in the remaining challenges and innovation needed to implement CF mMIMO from theory to practice.
 
Biography:

 

IP 4: MACHINE LEARNING FOR INDUSTRIAL WIRELESS COMMUNICATIONS: THEORY, SIMULATIONS AND PRACTICE (BY NOKIA, SIEMENS, BOSCH)

Presenter:
Ilaria Malanchini, Nokia
Alberto Martínez Alba, Siemens
Nikolaj Marchenko, Bosch
 
Abstract:
One of the main focuses of 5G and beyond technologies is about supporting vertical industries. Connected driving, agriculture, logistics, and health are undoubtedly important target businesses, but today, industrial automation, production facilities, and the industrial Internet of Things are seen as the most demanding and, probably, most attractive new application areas. This includes new levels of human-robot interaction, advanced concepts of human-machine-interaction, support for fleets of automated guided vehicles (AGVs), and collaborative robots. In order to support the complexity of 5G systems as well as enable full automation, AI/ML needs to be a fundamental component in the designing and operation of industrial networks. As a matter of fact, ML has in the last years proven to be a powerful tool for classification of events, detection of anomalies, prediction, and tactical decision making. The scope of this industry presentation is to highlight the synergies resulting from applying AI/ML in industrial environment by presenting and discussing the overall vision and results of the German funded project KICK. This project, which started in 2020 and will come to an end in December 2022, brought together a diverse group of partners, ranging from manufacturing and communication industries to research institutes with a strong ML expertise, which created a unique perspective on ML-empowered industrial communications. Taking place in the same month in which the project will end, Globecom 2022 is the perfect venue for presenting our results. Furthermore, we are planning to both present technical results as well as discuss the implementation of proof-of-concepts in real industrial factories, which we believe will be highly relevant for the Globecom audience - typically composed by both industrial and academic attendees.
 
Biography:

 

IP 5: 5G/6G ORAN ENABLES RADIOS EVERYWHERE (BY ANALOG DEVICES)

Presenter:
John Cowles, Analog Devices
 
Abstract: 
The disaggregation of the cellular network is intended to open the architecture and drive more innovation for the different layers of hardware and software. An additional benefit is the ability to scale different Radio Units for different applications while still following the common front-haul interface to the Distribution Units. The split option 7-2x has emerged as an excellent compromise that combines the RF radio with the Low-Phy in the RU while the MAC and High-Phy remain on the DU. The deployment flexibility and interoperability of the network means that automobiles, drones, IoT, satellite ground stations, et. al. can also plug in to the cellular network for full, seamless connectivity. The open hardware philosophy implies open software development, which would include algorithms that assist and optimize the hardware and that serve edge applications.
 
Biography:

 

IP 6: TESTING CONSIDERATIONS FOR AI AND ML IN WIRELESS NETWORKS (BY KEYSIGHT)

Presenter:
Sarah LaSelva, Keysight
 
Abstract:
Artificial Intelligence (AI) and Machine Learning (ML) are core technologies that will pervasive and expansive in 6G.  Thinking about how to test AI/ML communications systems present new challenges compared to traditional methods.  There are 3 different types of AI/ML testing to consider—datasets (recorded from real world scenarios or artificially generated) are needed to train the AI/ML, AI/ML based test can be applied to wireless networks (for example, an AI/ML based signal identification), and finally testing to look at the performance of the AI/ML algorithm itself at a subcomponent level and at a system level.  This session will dive into each of these three areas with a goal to leave attendees with a better understanding what test and validation means for AI and ML in wireless systems.
 
Biography:

SARAH LASELVA

Sarah leads the marketing efforts for Keysight in 6G.  She has over a decade of experience in test and measurement concentrating on wireless communications, both studying and promoting the latest wireless technologies.  Throughout her career she has spent time in marketing, test engineering, and applications engineering. Prior to joining Keysight, Sarah worked as a product marketing manager for software defined radios with a focus on advanced wireless research. During this time, she gained a deep knowledge of prototyping hardware, software, and wireless communications.  Sarah’s background is in microwave and millimeter wave technology. She has a BS in electrical engineering from Texas Tech University.
 

IP 7: HOW TO MAKE MACHINES SMART ENOUGH FOR AUTONOMOUS OPERATION (BY ERICSSON)

Presenter:
Jörg Niemöller, Ericsson
 
Abstract: 
An autonomous operation system with serious zero-touch capabilities needs to be intelligent enough to make the right decisions. It needs to understand the consequences and utility of its actions and adapt sensibly to new and unforeseen situations. A machine with these capabilities is challenging to design. In this presentation, we will discuss the requirements for capable and trusted autonomous systems, technologies for implementing this level of intelligence and the important role of intents and its modelling for the realization of this vision.
 
Biography:

 

IP 8: EVOLUTIONS AND TECHNOLOGIES OF MILLIMETER-WAVE RADIATIONS FOR 5G AND BEYOND (BY VISIONOX, ERICSSON, TMTY)

Presenter:
Huan-Chu Huang, Visionox 
Victoria Wang, Ericsson
Su-Wei Chang, TMTY
 
Abstract:
Due to the 5G and B5G eras, the millimeter-Wave (mm-Wave), i.e., 3GPP Frequency Range 2 (FR2), technologies and applications are getting more and more important and popular. The global mm-Wave spectrum planning and deployments for 5G and beyond hence are the core. Also, for the mm-Wave wireless communication performance, apparently, radiations of mm-Wave are quite crucial. However, the mm-Wave radiation technologies and solutions, such as antennas, circuits, and measurements, are significantly different from those for the legacy or planned 3GPP FR1 (i.e., non-mm-Wave) cellular bands. As a result, the industry presentations will discuss, share and complement the technological understanding of and information updates on the latest hot topics and promising trends, commercialized progress, and emerging developments in mm-Wave spectrum and radiation technologies and solutions for 5G and beyond. Through the industry presentations, the latest updates, deeper understanding, new inspiration, and scope expansion for the researchers and designers from the communications and other communities thus can be nicely achieved to facilitate and benefit their future studies or the product developments. In summary, the industry presentations will focus on the challenges and technologies of mm-Wave radiation for 5G and beyond, which includes the latest updates on mm-Wave bands for 5G and B5G, mm-Wave antenna designs, mm-Wave beamformer designs, and OTA (over-the-air) measurements. The discussions and sharing aim to enhance the deeper mutual understanding and enable the further mutual inspirations between AP (antennas and propagation) and Communications communities (but not limited). Therefore, ALL interested audience from all communities are cordially welcome to enjoy this industry panel!
 
Biography:

 

IP 9: LESSONS LEARNED FROM 5G PRIVATE NETWORK ENABLING USE CASES IN SMT INDUSTRIAL SHOP FLOOR (BY FLEXTRONICS, NOKIA)

Presenter:
Gabriel Fré, Flextronics
Catello (Lelio) Di Martin, Nokia
 
Abstract: 
Reliable, low-latency and high-performance 5G access is one of the key pillars sustaining the vision of industry 4.0 and of the reconfigurable factory of the future. The ambition is to be able to rearrange entire factory production lines both logically and physically in the factory space with a zero-touch approach to enable a quick adaptation to changing market demands. To enable this vision, factory elements must replace their wired OT (Operation Technology) highly reliable wired connection with wireless access links, like WiFi-6 and private 5G SA (Stand Alone) networks. This presentation introduces the challenges faced in covering a representative production environment of an SMT (Surface Mounted Technology) production line with a live 5G SA (Stand Alone) private network. This work contributes to the body of empirical knowledge on how a live 5G networks perform in a live factory environment. Results demonstrates the feasibility of few "data shower" use cases focusing on using the 5G network to perform live OTA (Over the Air) firmware programming of devices produced in the SMT production line. Data show an increase of about of factor 5x and 10x of the productivity of the production line (estimated in number of devices produced per hour) line when performing the OTA firmware upgrade over 5G, with respect to WiFi-6 and WiFi-4, respectively. The presentation provides technical details on the platform used for testing the network under stressful workload conditions and describes a few future research directions for enabling programmable factory-aware networking.
 
Biography:

 

IP 10: NEXTG SYSTEM RESILIENCY IMPROVEMENTS THROUGH END-TO-END ANALYTICS (BY MITRE LABS)

Presenter:
Venkatesh Ramaswamy, MITRE Labs
 
Abstract: 
The minimum technical performance requirements as specified in REPORT ITU-R M.2410 does not include resiliency as a requirement for 5G technologies. However, to support mission critical application, NextG/6G technologies must provide resiliency guarantees. In this talk, we provide a meaningful way to define and measure resiliency and argue that standardization bodies need to include resiliency requirements in minimum technical performance requirements from NextG/6G (IMT 2030). We will start by highlighting some important characteristics of highly resilient systems and argue that adding network situational awareness will improve overall system resiliency. We will then talk about some of the analytics framework specified by the 3GPP and how they can be utilized and enhanced to provide end-to-end situational awareness and connected intelligence. Finally, we will illustrate, using a real-world use-case involving mobile edge computing, how the ideas presented in this talk can be applied to realize resiliency improvements.
 
Biography:

VENKATESH RAMASWAMY

Dr. Venkatesh Ramaswamy is Chief Technologist at MITRE Labs in Bedford, Massachusetts where he currently leads technical innovation and R&D activities in 5G/xG technologies. He has more than 20 years of experience in the telecommunications industry and has held technical leadership positions at top technology companies, startups and research labs. He has published more than 50 peer-reviewed publications and patents, served as a TPC member for various conferences, and participated in several technical panels. He received his PhD in Electrical Engineering from the University of Mississippi.

 

IP 11: 6G NETWORK SECURITY: BACK TO BASICS AND A NEW PERSPECTIVE (BY KEYSIGHT)

Presenter:
Roger Nichols, Keysight
 
Abstract: 
Wireless network cybersecurity has become a complex topic involving everything from physical-layer to network and application-layer techniques. Because the threat surface of 5G is larger than previous generations and because the technologies are so involved, we engineers dive into those complexities with detailed explanations and myriad acronyms (DDOS, MiTM, OpenSSL, SBA, SEAF, SEPP, SCAS, etc.). Because wireless security involves interwoven disciplines of radio, mobile networking, datacomms, and computer security principles, and even the sociological study of the anticipation of malicious behavior, experts in any one of these areas find at least one of the others difficult to grasp. Addressing security is also a mix of addressing security by specification, by design, by implementation, and by operational practice. This presentation will provide a fundamental framework for building understanding across these disciplines—especially between the wireless domain and the cybersecurity domain. From a design and measurement perspective, this talk will provide a practical foundation for both communities based on the context of two important perspectives: 1) Fundamentals for better understanding; 2) Proposals for a better approach to measure network security.
 
Biography:

ROGER NICHOLS

Roger Nichols is an acknowledged subject matter expert in mobile wireless communications design and measurement technologies. He has 37 years of engineering and management experience at Hewlett-Packard, Agilent, and Keysight Technologies spanning roles in R&D, marketing, and manufacturing. He has managed projects, programs, and departments beginning with analog cellular radio evolving to 6G and on every standard in between.  He directed Keysight’s 5G program starting in 2014 and has been directing Keysight’s 6G program since its inception in 2019.
He is a member of the FCC Technical Advisory Council. Roger holds a BSEE from the University of Colorado, Boulder.

 

IP 12: ACCELERATING INNOVATIONS IN 5G/6G NON-TERRESTRIAL NETWORKS (BY KEYSIGHT)

Presenter:
Raymond Shen, Keysight
 
Abstract: 
One of the new features of 5G currently being defined by the 3GPP standards body is NR-NTN. This feature hopes to achieve ubiquitous, or greater, coverage of 5G through space-borne or air-borne assets in areas that would not have coverage otherwise. Such a feature would be useful for ad hoc military networks on the battlefield, or for first responder applications, or for commercial and military usage across mountains, skies, or seas. As this feature is currently in the standards development phase, prototypes with commercial off-the-shelf devices are not yet available. However, with commercial off the shelf software and equipment, you can simulate NTN links in software and prototype them in hardware. A variety of NTN-based scenarios can be simulated. We will present the basis of NTN networks and how to prototype them for research and development.
 
Biography:

 

IP 13: EXPLAINABLE, CAUSAL AND SAFE AI TECHNIQUES FOR NETWORK AUTOMATION OPERATIONS (BY ERICSSON)

Presenter:
Rafia Inam, Ericsson
Serene Banerjee, Ericsson
Alexandros Nikou, Ericsson
Vandita Singh, Ericsson
 
Abstract: 
The motivation of this industrial presentation is to provide the GLEBECOM community with recent research findings in explainable, causal and safe AI techniques that support trustworthiness in various network operations and use cases. Ericsson researchers are leading in the field of the aforementioned technologies and we believe this talk will provide with new insights in telecom domain, from an industrial perspective, and give the opportunity to research, industrial or other participants to exchange ideas and enhance collaboration opportunities. The presentation will include the four aforementioned speakers in on the following topics: 1. Explainable AI (XAI) and Explainable RL (XRL): Motivating the need of Explainable AI and XRL, the XAI framework, and with the examples form telecom industry implementing XAI and XRL. 2. Symbolic safe reinforcement learning for RAN control that provides novel formal techniques that assure safe learning in live deployment of RL agents on the network. 3. Causal AI: Causal ML and RL models have better sample efficiency and improved out-of distributional generalization compared to models built on observational data only. We will demonstrate impact of Causal AI for Telecom problems, such as Radio root cause analysis and fronthaul congestion control. 4. Trustworthiness measures. The aim is to provide means to measure and analyze the properties and performance of different explanation methods by exploration and implementation of metrics.
 
Biography:

 

IP 14: NETWORK DIGITAL TWIN: IN-PRODUCTION TESTING & SLA-DRIVEN NETWORKING FOR INDUSTRIAL WIRELESS NETWORKS (BY NOKIA)

Presenter:
Catello Di Martino, Nokia
 
Abstract:
Uninterrupted and high-quality data communication is one of the most important prerequisites for implementing OT (Operation Technology)-grade private wireless like LTE and 5G NR for industrial automation. Such networks are expected to enable operations 24/7 in the covered area with given network service level agreements (SLA), e.g., bandwidth and latency requirements that are use-case specific. One of the main challenges in designing 5G industrial networks is that the network conditions might change drastically over a short time due to a variety of factors, including moving parts, changes in the factory floor layout, and stored goods temporarily affecting the wireless signal. Motivated by the complexity and variety of current factory use cases, this proposes a new platform enabling continuous testing and SLA management of wireless networks that enables: i) the creation and management of SLA definitions for each connected device through a custom-built SLA compiler, ii) all the automation needed to continuously test the network continuously, according to the defined SLAs, and iii) an adaptation engine that is capable of reallocating software resources on the edge (e.g., docker containers or Kubernetes pods) according to the programmed SLA. The platform, called Network Digital Twin enables the monitoring of any network in real time and can predict reconfiguration actions and potential downtime in advance. The merit of the proposed platform is to be able to provide a virtual representation of the communications requirements, along with its operating environment and real network capabilities. The presentation includes experimental results obtained from several use cases in real industrial settings. Results show that the platform can substantially reduce the testing cost and enable new use cases, like AGV (Autonomous Guided Vehicle) and drone-driven automated network testing as a service.
 
Biography:

 

IP 15: DNS CORRELATION: THE GOOD, THE BAD AND THE SOLUTION (BY BENOCS)

Presenter:
Danny Alex Lachos Perez, BENOCS
 
Abstract: 
Network data correlations are widely used to obtain multi-dimensional traffic information. Netflow streams, for instance, are correlated with BGP to generate enriched information about the ASes, IP-Addresses, and traffic volume. However, this is not enough to know the applications/infrastructures behind those IP-Addresses/ASes. Currently, we have different applications (Disney+, AmazonPrime) using different infrastructures (CDNs) to distribute their content. In this context, two key questions are missing to answer: What are those applications/infrastructures and how much traffic comes from them?. The DNS correlation is to annotate the traffic information with the domain name they came from, so that two new dimensions can be obtained: infrastructure and application. With those new dimensions, it is possible to know, for example, the amount of traffic which the Disney+ application is providing over different infrastructures such as akamai.net, fastly.net, etc. The DNS correlation, however, is not an easy task and there are a set of research/technical challenges. This presentation covers the main aspects of how Benocs is dealing with this topic: from the motivation (the good), going through the challenges (the bad), until the PoCs/implementations (the solution) to finally generate a new product that extends our current analytics/visualizations tools.
 
Biography:

DANNY ALEX LACHOS PEREZ

Danny Lachos has a particular interest in new and flexible network and application integration mechanisms in the context of multi-domain environments. Currently working as a Senior Network Engineer at Benocs. Founded in 2013, Benocs offers intelligent traffic optimization and analytics solutions for operators and large network providers. He received his Ph.D. and M.Sc. degree in Computer Engineering from the University of Campinas (UNICAMP), Brazil, in 2021 and 2016, respectively. During this time, He was involved as a software and Internet researcher in different academy-industry collaboration projects related to networked systems (e.g., 5G, SDN, NFV, data center networking, Internet routing). He holds a Computer Engineering degree from Pedro Ruiz Gallo University (UNPRG), Peru

 

IP 16: CONCURRENTLY DEPLOYING MULTIPLE VERTICAL USE CASES IN A COST-EFFICIENT WAY (BY TELENOR)

Presenter:
Min Xie, Telenor
 
Abstract: 
As 5G is widely deployed to provision network services for various vertical industrials, it becomes essential for mobile operators to design and optimize the deployment strategies of network slicing such that multiple vertical customers can be served concurrently with assured quality of services (QoS) whereas the operational cost efficiency is improved for mobile operators. One fundamental capability required is to create multiple network slices and associate them with vertical applications. The deployment strategies answer several key questions, such as: "How many network slice instances should be created to serve all subscribed vertical customers?"; "How these network slice instances should be isolated to assure the QoS and quality of experience (QoE) of these customers?"; "How the cost efficiency could be improved? e.g., via resource sharing, which, however, contradicts the isolation requirement". The answer to these questions decides the values created by network slicing to both mobile operators and vertical industries. Deploying the network slices and vertical applications according to the decided strategies imposes a series of challenges, particularly the unprecedent complexity in integration caused by the multi-vendor and multi-tenant deployment environment. Then enabling technologies are demanded to facilitate the practical deployment, e.g., automation, intelligence, integration, and open APIs. This presentation first reviews the requirements of deploying multiple network slices and services in 5G, followed by the current status of typical deployment decisions. Then challenges and open questions are overviewed for the future work.
 
Biography:

 

IP 17: GENERATIVE NETWORK PERFORMANCE PREDICTION WITH NETWORK DIGITAL TWINS (BY NOKIA BELL LABS)

Presenter:
Bilgehan Erman, Nokia Bell Labs
 
Abstract: 
The presentation is about a solution to improve and streamline industrial private wireless network performance predictions using generative digital twin models. There are several open problems in designing, delivering, and maintaining private wireless networks for autonomous industrial settings. In these dynamic environments with changing use cases and SLA profiles, immediate detection of performance problems becomes critical. The existing instrumentation methods proven useful for public networks are not as effective for maintaining these private industrial networks, where use-case-dependent performance prediction becomes a necessity. The described solution builds on the existing Nokia Digital Twin platform used for continuous testing and SLA management of 5G networks for industrial automation. The solution first builds an association between the field measurements and the digital representations of the environment by making use of Deep Neural Network (DNN) techniques. Then in subsequent steps, Generative Adversarial Network (GAN) methods are used to create what-if scenarios with alternate equipment and layout configurations to examine potential concerns, and to explore options towards more optimal performance outcomes.
 
Biography:

BILGEHAN ERMAN

Bilgehan is a Researcher at the Network Systems and Security Research organization at Nokia Bell Labs. Bilgehan’s areas of interests include cognitive network control, network control models with embodied intelligence, network transformation at the edge, mesh networks, and high-dimensional real-time visualization. He holds MS degree in Computer Engineering and BS degree in Electrical Engineering both from METU at Ankara Turkey. Bilgehan has seventeen granted/applied patents

 

 

IP 18: EVOLVING CRYPTOGRAPHY (BY WILAN, PI INVENT ENTERPRISES)

Presenter:
Ken Stanwood, WiLAN
Muddassar Farooq, PI Invent Enterprises
 
Abstract: 
Global cybercrime is expected to reach 10.5 trillion USD by 2025 with an annual increase of 15 percent from 3 trillion USD in 2015. As communication technology evolves and the world gets more connected, the need for securing network communications is ever increasing. Cryptographic Algorithms, such as AES and RSA, are widely used to secure two-way communications between clients and servers on the internet and are also ubiquitous in high security applications such as credit cards, military communications etc. AES is still considered secure even when it is published, as long as the private key is kept secure. However, if an attacker obtains the private key, the security is compromised and may stay compromised for a long time until the user detects this breach and then changes the key. We present a novel approach to cryptography through which the modules of an algorithm such as Confusion, Diffusion, and KeyMixing etc. are evolved to produce cryptographically secure Customized Encryptors. These evolutionary encryption methods maintain security even after the encryption key has been compromised. At least one parameter or a transformation (Confusion Box/ Diffusion Box/ Key Mixing/ Round Logic) may be modified periodically in an encryption algorithm to temporally evolve its behavior by creating a genetically modified variant of the original algorithm. This reduces an attacker's awareness of the structure and operation of encryption algorithm by adding security in the behavior dimension independent of the key. Modifications may be event based, for instance, at the start of a new communication session, periodic, every few milliseconds, or based on a counter of few bytes of data passed. By evolving AES 128, our solution provides a cryptographic strength of 2908 bits while running at a fraction of the processing power of AES 256 that only provides 256 bits security.
 
Biography:

 

IP 19: MM-WAVE DUPLEXER AND MODULATOR FOR ON CHIP INTEGRATION (BY WILAN)

Presenter:
Kenneth Stanwood, WiLAN
Rashad M Ramzan, WiLAN
 
Abstract:
Duplexers are selective components used to isolate or combine signals having different central frequencies. They form the essential core components of FDD communication systems, comprised of mobile telephony, radio transmission, broadband wireless communications and satellite communication systems. The 5G/6G market is expected to grow to more than 30 Billion USD by 2025. High performing duplexers are essential devices which will be widely used in these systems and are required to operate at very high throughputs in the mm-Wave bands. This 3-port filtering device provides good isolation between transmitter and receiver signals while maintaining a low insertion loss. Generally, the duplexers consist of two-channel filters and a common point is used to combine the two filters to form a multiport network. These duplexers provide a mechanism for transmitters and receivers to share a common antenna simultaneously. The antenna operates at both bands and the duplexer allows simultaneous communication with maximum isolation between the TX and RX bands. As the mm-Wave band is getting more attention for 5G communications, duplexers are needed for 28-32 GHz band. Depending on the application scenario, the passbands for these might require wide bandwidth for higher data rates, or a narrow bandwidth for high frequency selectivity. A set of on-chip duplexers that can fulfill both these criteria for the mm-Wave band (28-30 GHz), by leveraging the Fano, EIT, and Lorentz resonance phenomena are presented. Such duplexers can be used for 5G/6G communication systems.
 
Biography:

 

IP 20: PHYSICAL LAYER SECURITY SYSTEMS FOR 5G/6G COMMUNICATION DEVICES (BY WILAN)

Presenter:
Kenneth Stanwood, WiLAN
Rashad M Ramzan, WiLAN
 
Abstract: 
Random Numbers are needed to generate the essential seed for encryption in secure communication systems. If the randomness of the seed is compromised, this may eventually load to comprising the entire encryption method. The global cybercrime is expected to reach up to 10.5 Trillion USD by 2025. Furthermore, the demand for high rates of random numbers is also increasing as several billion IoT devices are getting connected to the Internet. A True Random Number Generator (TRNG) extracts entropy from physical phenomenon rather than mathematical algorithms like a PRNG, hence it is more reliable for seed generation. The state-of-the-art TRNGs are either limited in speed (up to 1.5 to 2 Gbps) or require very high power for high data rates (up to 200 mW) due to high static power consumption. However, high speed and low power are highly desirable in the next generation of 5G/6G communication systems and IoT applications.
 
Biography:

 

Platinum Patrons

Gold Patrons

Supporting Sponsors