Welcome to the Media Center, where you can find the latest original video content from ComSoc's conferences and events. Featuring keynotes speakers, executive forums, keynote workshops, industry panels, and much more from ComSoc's events, including the IEEE Global Communications Conference (GLOBECOM) and the IEEE International Conference on Communications (ICC). These videos bring insights to you when you need it. Your ComSoc membership offers free access to many of these valuable contents simply by logging in with your IEEE account.
IEEE and Non-Members can purchase videos after logging into their IEEE Account. If you do not have an IEEE account, click 'Create Account" to create a FREE account to make a purchase.
Random Numbers are needed to generate the essential seed for encryption in secure communication systems. If the randomness of the seed is compromised, this may eventually load to comprising the entire encryption method. The global cybercrime is expected to reach up to 10.5 Trillion USD by 2025. Furthermore, the demand for high rates of random numbers is also increasing as several billion IoT devices are getting connected to the Internet. A True Random Number Generator (TRNG) extracts entropy from physical phenomenon rather than mathematical algorithms like a PRNG, hence it is more reliable for seed generation. The state-of-the-art TRNGs are either limited in speed (up to 1.5 to 2 Gbps) or require very high power for high data rates (up to 200 mW) due to high static power consumption. However, high speed and low power are highly desirable in the next generation of 5G/6G communication systems and IoT applications.
Wireless network cybersecurity has become a complex topic involving everything from physical-layer to network and application-layer techniques. Because the threat surface of 5G is larger than previous generations and because the technologies are so involved, we engineers dive into those complexities with detailed explanations and myriad acronyms (DDOS, MiTM, OpenSSL, SBA, SEAF, SEPP, SCAS, etc.). Because wireless security involves interwoven disciplines of radio, mobile networking, datacomms, and computer security principles, and even the sociological study of the anticipation of malicious behavior, experts in any one of these areas find at least one of the others difficult to grasp. Addressing security is also a mix of addressing security by specification, by design, by implementation, and by operational practice. This presentation will provide a fundamental framework for building understanding across these disciplines—especially between the wireless domain and the cybersecurity domain. From a design and measurement perspective, this talk will provide a practical foundation for both communities based on the context of two important perspectives: 1) Fundamentals for better understanding; 2) Proposals for a better approach to measure network security.
Ensuring end to end Security is the implicit requirement of any communication system. While there are several key based encryption techniques in practice today, they fail to provide foolproof security. In order to decrypt and consume the message, the encryption key is to be transferred to the receiving end over an alternative channel. It is still risky and often retrieved by a hacker with powerful and affordable computing power. Consequently, organizations such as banks and financial institutions handling sensitive information of the customers are hesitant to put the data over the channel to consume cloud based applications. This talk provides an alternative for the encryption key transfer, called homomorphic encryption wherein decryption of the data is not required before the consumption of the applications, especially the AI inferencing models, over the cloud. Homomorphic encryption however has a set of Implementation issues, solved to an extent by the upcoming quantum computing technology.
With the significant publicity campaigns around Quantum Technologies and specifically Quantum Communication, and the flurry of Standardization and Certification as well as industrial cooperation activities (ETSI, ISO, ITU-T, CEN-CENELEC, GSMA) we intend to have a serious discussion on the practical applicability of Quantum Key Distribution (QKD). On the one hand it is paramount to understand what are the realistic or to be anticipated risks against which QKD can ensure protection. On the other it is to be elaborated, how QKD can be compared to suggested alternatives, specifically Post Quantum Cryptography (PQC). Further the utilization strategy of QKD is to be discussed. Very often some partially unrealistic and often exaggerated requirements such as dedicated fiber infrastructures and trust centers at short distances plus expectations for a specific and very expensive technology are put forward that make QKD technology appear unaffordable financially, This is to be addressed critically in conjunction with issues such as authentication in these cases. It is to be understood what practically relevant but affordable use cases can be addressed using QKD.
This presentation will discuss two aspects of 6G Native AI support: AI4Net, using AI technology to improve network performance and Net4AI, providing AI as a service by the network as a whole. Recently 6G discussions on vision and enabling technologies have become hot topics in both industry and academia. AI for wireless has attracted even more research in the past few years. By now, it is well understood that AI can be useful to improve wireless network performance especially for tasks such as resource management, network planning and power saving where precise mathematical models are difficult to obtain. Standardization efforts are ongoing to facilitate these applications. Less conclusive is the application of AI in the physical layer design, even though we have seen various scenarios where AI can indeed improve the link level performance. Breakthrough research is needed in this area to warrant a radical new design. One the other hand, there are many usage scenarios being proposed for 6G, ranging from down to the earth 5G evolved use cases to over the moon (literally) space applications. In this talk, we will focus on AI as a service for 6G, in other words, 6G serves as a platform to provide distributed and collaborative AI learning and inference services. This is motivated by the proliferation of AI applications, data privacy concerns and regulations, as well as the need for real-time AI. The existing cloud base centralized AI learning model would not be scalable and sustainable, while on-device AI has limited computing capability and power. Distributed and collaborative AI is thus the key to large scale AI applications. A 6G network integrating sensing, communication, and computing would be a promising platform to support such distributed learning and inference AI services.
While the mobile industry is now focusing on the realization of what 5G technologies promised, we can see that initial consideration about the next generation of mobile communications, i.e., 6G, is already happening. Considering the general trend of introducing new services with higher requirements over different generations of communication systems, it would be natural to expect that 6G technologies need to be developed to envision more advanced services than 5G. Examples of such new services include truly immersive XR, mobile hologram, and digital replica. Initial investigation already suggests rough estimates of performance requirements for 6G such as 1 Tbps peak rate, 1 Gbps user-experienced data rate, and 0.1 ms air latency. Use of terahertz spectrum would naturally be considered to provide such high data rate. Novel approaches, e.g., reconfigurable intelligent surfaces, further advanced duplex technologies, use of AI/ML, would need to be considered to satisfy the expected performance requirements. In this proposed industry presentation session, industry experts will present their views on 6G vision and enablers. Technologies for Hyper Connected Experience for All in 6G, On the Path to 6G : Industry Alignment and Collaboration is key to bring it to life Technology Advancements on the Path to 6G The road to the next generation wireless network
TCP/IP is not secure, a fundamental change is required. One owner environments (VPN and firewalls) do not support shared operations and devices. This presentation will examine the fundamental weaknesses of TCP/IP and why can we not fix the existing infrastructure. Also, what will be the protocol requirements for TCP/IP replacement taking into account security and efficiency considerations and how digital rights can be defined, managed and protected.
Future wireless systems will require a paradigm shift in how they are networked, organized, configured, optimized, and recovered automatically, based on their operating situations. Emerging Internet of Things (IoT) and Cyber-Physical Systems (CPS) applications aim to bring people, data, processes, and things together, to fulfill the needs of our everyday lives. With the emergence of software defined networks, adaptive services and applications are gaining much attention since they allow automatic configuration of devices and their parameters, systems, and services to the user's context change. It is expected that upcoming Fifth Generation and Beyond (5G&B) wireless networks, known as more than an extension to 4G, will be the backbone of IoT and CPS, and will support IoT systems by expanding their coverage, reducing latency and enhancing data rate. However, there are several challenges to be addressed to provide resilient connections supporting the massive number of often resource-constrained IoT and other wireless devices. Hence, due to several unique features of emerging applications, such as low latency, low cost, low energy consumption, resilient and reliable connections, traditional communication protocols and techniques are not suitable.
In this talk, we present an integration of blockchain technology into federated learning for secure and reliable federated learning. The concept of reputation is introduced as a reliable metric for federated learning workers. Based on this metric, a reliable worker select.
Global cybercrime is expected to reach 10.5 trillion USD by 2025 with an annual increase of 15 percent from 3 trillion USD in 2015. As communication technology evolves and the world gets more connected, the need for securing network communications is ever increasing. Cryptographic Algorithms, such as AES and RSA, are widely used to secure two-way communications between clients and servers on the internet and are also ubiquitous in high security applications such as credit cards, military communications etc. AES is still considered secure even when it is published, as long as the private key is kept secure. However, if an attacker obtains the private key, the security is compromised and may stay compromised for a long time until the user detects this breach and then changes the key. We present a novel approach to cryptography through which the modules of an algorithm such as Confusion, Diffusion, and KeyMixing etc. are evolved to produce cryptographically secure Customized Encryptors. These evolutionary encryption methods maintain security even after the encryption key has been compromised. At least one parameter or a transformation (Confusion Box/ Diffusion Box/ Key Mixing/ Round Logic) may be modified periodically in an encryption algorithm to temporally evolve its behavior by creating a genetically modified variant of the original algorithm. This reduces an attacker's awareness of the structure and operation of encryption algorithm by adding security in the behavior dimension independent of the key. Modifications may be event based, for instance, at the start of a new communication session, periodic, every few milliseconds, or based on a counter of few bytes of data passed. By evolving AES 128, our solution provides a cryptographic strength of 2908 bits while running at a fraction of the processing power of AES 256 that only provides 256 bits security.
Security issues in Internet communication tend not to be subtle mathematical flaws in the cryptography, but instead, broader system issues. For example, humans using the Internet. We have lovely cryptography. We have certificates. We have great protocols for doing authentication. But does that really assure a human that they are talking to what they think they are talking to? What about authenticating people? What kinds of names should people have, so that the name is unique, and someone that wants to talk to a human will know what name to use? What about distributed systems that are provably correct, provided that all the components are doing what they are supposed to be doing, but do not work correctly if some components misbehave? How can we design systems that will be robust despite misbehaving participants? Will digital signatures on data assure us that data that we read on the Internet is true? Is the simple answer to everything that we should blame users if things go wrong, and just complain that users need more training? (hint…no) Or maybe using blockchain everywhere will make everything secure? (hint…no)
5G will provide significant societal value as it is used for critical infrastructure, mission critical applications, smart manufacturing, connected car, and other use cases. As a result of this new usage, our risk tolerance must be decreased because of the increased impact of cyberattacks on the 5G network. This requires a risk-based approach to securing Radio Access Networks (RAN) as it evolves to Open RAN that is virtualized, disaggregated, cloud-native, automated, and intelligent. Along with new secure use cases, there is an emerging requirement for Open RAN which can be implemented using the approaches of virtual RAN, Cloud RAN, and O-RAN. These new technologies in the wireless cellular space bring inherent security benefits while also introducing new security risks. This presentation will address the Open RAN approaches and the security risks for each. Open RAN security topics that will be discussed include 3GPP 5G security, cloud security, security-by-design, and secure use of open source software. ORAN’s expanded threat surface, with additional interfaces and functions, introduces additional security risks that will also be discussed. The presentation will also introduce concepts to achieve a zero-trust architecture for Open RAN that can be implemented in Cloud RAN and O-RAN. The multi-party relationship between the operator, cloud provider, and system integrator requires security roles and responsibilities are clearly defined in this presentation.
This academic keynote is on Security & Differential Privacy in Edge Computing. Bio: Anna Scaglione (M.Sc.'95, Ph.D. '99) is currently a professor of Electrical, Computer and Energy Engineering at Arizona State University. Prior to that she was a professor at UC Davis (2008-2014) and at Cornell University (2001-2008) and at the University of New Mexico (2000-2001). Dr. Scaglione’s expertise is in the broad area of statistical signal processing with application to communication networks, electric power systems/intelligent infrastructure and network science. Dr. Scaglione was elected an IEEE fellow in 2011. She is the recipient of the 2000 IEEE Signal Processing Transactions Best Paper Award, the 2013, IEEE Donald G. Fink Prize Paper Award for the best review paper in that year among all IEEE publications. With her student she earned the 2013 IEEE Signal Processing Society Young Author Best Paper Award (Lin Li) and several best conference paper awards. She was SPS Distinguished Lecturer for the years 2019-2020 and is the recipient of the 2020 Technical Achievement Award from the IEEE Communication Society Technical Committee on Smart Grid Communications. Her record of service is extensive. She was on board of governors of the IEEE Signal Processing Society during 2011-2014 and was member of the SPS Awards Board in 2016-2017. She was Editor in Chief of the IEEE Signal Processing Letters in (2012-2013) and served as associate editor for the IEEE Transactions on Wireless Communications from 2002 to 2005 for the IEEE Transactions on Signal Processing from 2008-2009, where she was area editor in 2010-11. She is currently serving as Deputy EiC for the IEEE Transactions on Control of Networked Systems where she was before Associate Editor 2016-2017 and then Senior Editor 2018-2019. She was General Chair of the SPAWC 2005 workshop and member of Signal Processing for Communication Committee from 2004 to 2009. She has been an IEEE SmartGridComm Conference steering committee from 2010 to 2013. She has also served in a number of IEEE conference technical committees and as Technical Chair for DCOSS 2010, SmartgridComm 2012 and
One of the main reasons attributed to the digital divide is the business cost and return on investment (RoI). In poorer or lower population density regions, the cost of deployment of optical fiber in the backbone network and related infrastructure, in particular a reliable electrical power grid, becomes prohibitively large, whereas the RoI remains marginal at best. In this scenario, a viable solution to cut down on the cost factor is to deploy satellites in the backbone network in order to provide connectivity to far-flung or less populated areas, to passengers in airplanes, ships, and trains, or to disconnected people in areas affected by natural disasters. More specifically, a constellation of satellites can provide worldwide coverage if a sufficient number of those are utilized. For instance, in recent years, different constellations of satellites have been proposed to provide global broadband access to Internet which includes the Starlink supported by SpaceX with 12000 LEO satellites, Amazon’s Project Kuiper with 3236 LEO satellites , and Telesat LEO with 300 to 500 satellites. Such a large number of satellites has allowed mass production of components, thereby resulting in a significant reduction in satellite manufacturing costs. Alternatively, if a large footprint on the remote location is not required, a high altitude platform (HAP) or a swarm/cascade of HAP’s or balloons/helikites can be used in the backbone network in the sky. The service model envisaged in this regard comprises of two configurations. In the first arrangement, a single HAP functions in a “tower-in-the-air” configuration whereby it relays data obtained from the ground station (uplink) to various service delivery stations (such as base stations) in the downlink. In the second configuration, a swarm/cascade of HAP’s is used as both relay nodes and service delivery devices for the local users. The same configuration can also be used in conjunction with LEO or MEO satellites if the area to be covered is significantly large. In this context, this panel aims to go over the recently proposed integrated space-air-terrestrial network solutions to provide high-speed connectivity not only in under-covered/remote/rural areas but also to moving cells in the air (airplanes) and the sea (cruises/ships).