Mario Hoffmann (Chair) Fraunhofer Institute SIT, Germany Wang, Hu (Vice Chair) Huawei Technologies, China.

Slides:



Advertisements
Similar presentations
FIA Stockholm: RWI Session IV.6 Alexander Gluhak, The University of Surrey Neeli Prasad, Aalborg University Srdjan Krco, Ericsson Manfred Hauswirth, DERI.
Advertisements

Fraunhofer Institute Secure Telecooperation Areas of Work.
Vehicle-infrastructure integration: creating co-operative mobility systems and services Hearing EU Parliament, 22 January 2009 Hermann Meyer, CEO.
How are we going to get there? Perry Correll Xirrus, Principal Technologist How will White Spaces impact the consumer market?
Security Challenges in a Connected World Security Challenges in a Connected World ISACA Roundtable, Breukelen, The Netherlands March 2013 Yiru Zhong, Analyst.
Information Day on Embedded Systems - Call 5 Jens Schumacher The Product Avatar Concept as a Platform for Networked Embedded.
Move Through Life Inc strategic plan The Big Picture vision To inspire and enable adults to sustain a love of dance throughout their lives,
From devices to governance: ICT as a key enabler in Genoa Smart City Strategy.
HUAWEI TECHNOLOGIES CO., LTD. International Cooperation / Global markets and EU competitiveness: how to ensure win-win partnership through.
. Smart Cities and the Ageing Population Sustainable smart cities: from vision to reality 13 October ITU, Geneva Knud Erik Skouby, CMI/ Aalborg University-Cph.
Page 1 WWRF - Vision Committee - 15 September 2008 Sudhir Dixit, Chair, Vision Committee WWRF 2020 Vision – Draft V 1.4.
EHealth Challenges and Opportunities E-health: Multi-disciplinary of E (ICT) and Healthcare, or applied ICT in healthcare (Design oriented), or healthcare.
ITIS 6010/8010 Wireless Network Security Dr. Weichao Wang Fall 2011.
Challenges in Ubiquitous Computing and Networking Management Jong T. Park Kyungpook National University Korea APNOMS 2003 DEP, Fukuoka,
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Impact of “Cloud Content” and “Relevant Location” on Geospatial Industry World Geospatial Forum Dimensions and Directions of Geospatial Industry Kanwar.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All TIA PSO Report to GSC-16 TIA “Advancing Global Communications” Cheryl Blum VP, Technology and Standards.
Intelligent Media Systems & Services Laboratory (imss) Informatics Research Centre, Computer Science Department School of Systems Engineering University.
Ss Cyril and Methodius University – Skopje Faculty of Electrical Engineering and Information Technologies (FEEIT) Institute of Telecommunications VIPSI.
Communication System Design, KTH1 Security And Availability For Wireless Communication Organization Post & Telestyrelse : Anders Rafting Coach : Lars Adolfsson.
Wireless Network Security By Patrick Yount and CIS 4360 Fall 2009 CIS 4360 Fall 2009.
(Josef Noll) -> MasterThesis Masteroppgaver 2008 Josef Noll, Prof. stip. Mohammad M. R. Chowdhury, PhD student.
Page 1 WWRF General Assembly London, June 25/26, 2002 Agenda General Assembly London, June 2002   Confirmation of new members and membership upgrades.
1 IoT Standardization Activities in CCSA China Communications Standards Association Duo Liu 21th meeting CJK UNIOT-WG Jun ,
5 PR Projektpraktikum - Bakkalaureatsprojekt Gabriele Kotsis Sommer Term 2009.
Presenter - Bob Kinicki Internet of Things Fall 2015
September 23, 2004 © The Daidalos Consortium, Page 1 Integrated Project “Daidalos” Designing Advanced network Interfaces for the Delivery.
IST 2006 – 22/11/2006 Aljosa Pasic Atos Origin Security, Dependability and Trust in Service Infrastructures.
1 © NOKIA FILENAMs.PPT/ DATE / NN WWRF Status & Direction (Wireless World Research Forum) July 12, 2002 S00VISION A.
Thesis draft ide. Draft v1.0 ide commented by jin.
Cross Programme Themes in the IST programme - Cross Programme Actions - Cross Programme Clusters.
IT 351 Mobile &Wireless Computing Semester 1, Dr. Hala Mokhtar Room th floor.
Communications Government Services, Incorporated Software Defined Radio for Public Safety Presentation to the National Conference on Emergency Communication.
CWNA Guide to Wireless LANs, Second Edition1 A Day in the Life of a Wireless User: Hotspots: Wireless local area network (WLAN Bluetooth wireless standard.
Page 1 WWRF Briefing WG2-br2 · Kellerer/Arbanowski · · 03/2005 · WWRF13, Korea Stefan Arbanowski, Olaf Droegehorn, Wolfgang.
Semantic Based Service in the Wireless World WWRF WG2 White Paper - Scope, Objectives and Approach.
NETWORKED EUROPEAN SOFTWARE & SERVICES INITIATIVE Future research challenges in dependability - an industrial perspective from NESSI Aljosa Pasic Atos.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Master Course /11/ Some additional words about pervasive/ubiquitous computing Lionel Brunie National Institute of Applied Science (INSA)
1 Ubiquitous Computing Nov. 15, 2006 Ki-Joune Li.
Page 1Wireless World Research Forum (WWRF) WWRF WG2 Service Architectures for the Wireless World  WG2 Overview  WG2 Chair:Dr. Stefan Arbanowski Fraunhofer.
Page 1Wireless World Research Forum (WWRF) WWRF WG2 Service infrastructure of the wireless world  Chair: Prof. Radu Popescu-Zeletin, Fraunhofer FOKUS,
WG2 – Enabling Technologies Status of white paper Olaf Droegehorn, Klaus David University of Kassel Chair for Communication Technology (ComTec)
Motivations for Innovations in Operational Excellence Bruce Rodin VP – Wireless Technology Bell Canada.
Internet of Things (Ref: Slideshare)
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Internet of Things in Industries
An Architecture for Multi-Sensor Fusion in Mobile Environments Presented by شمسان محمد علي قعشه.
Government and Industry IT: one vision, one community Vice Chairs April Meeting Agenda Welcome and Introductions GAPs welcome meeting with ACT Board (John.
Standardization activities on Wireless Access in CCSA CCSA DOCUMENT #:GSC13-GRSC6-18 FOR:Presentation SOURCE:CCSA AGENDA ITEM:GRSC; 4.2
 Market Trends & Directions  CDMA2000 Evolution  3x Air Interface Capacity Improvements  System Enhancements  Service Enhancements  Services and.
Stefan Arbanowski, FOKUS Wolfgang Kellerer, DoCoMo Euro-Labs WWRF13, Jeju, Korea, Feb.
Telematics, Smartphones and the security threats they pose when integrated with Automobiles Carl Jaeger COSC 4765.
Page 1Wireless World Research Forum (WWRF) September 18, 2001.
Fuego Core 2005/7 Possible Directions Kimmo Raatikainen Principal Scientist Helsinki Institute for Information Technology
Driving Innovation Internet of Things Special Interest Group 20 February 2012.
Thesis draft ide. Draft v1.2 ide commented by jin brainstorming with takuro & mics.
Security of the Internet of Things: perspectives and challenges
1 USDOT Next Generation Initiative Laurie Flaherty EMS Division, NHTSA.
1 June 9 th, WARD ICT Mobile Summit W D 4 WP1 - BIRD Business Innovation, Regulation and Dissemination Luis M. Correia, IST-TUL, PT Klaus.
IoT R&I on IoT integration and platforms INTERNET OF THINGS
1 Enabling Smart Cities/Campuses to Serve the Internet of People Florence Hudson Senior Vice President & Chief Innovation Officer Internet2 TNC16 June.
Lasse Andresen Founder / CTO ForgeRock
Wireless Access Standardization in China
Ramy Ahmed Fathy ITU-T SG20 Vice Chairman
Ambient Intelligence -by Internal Guide: M.Preethi(10C91A0563)
THE WIRELESS WORLD RESEARCH FORUM -
THE WIRELESS WORLD RESEARCH FORUM -
LM 7. Mobile Network Overview
Presentation transcript:

Mario Hoffmann (Chair) Fraunhofer Institute SIT, Germany Wang, Hu (Vice Chair) Huawei Technologies, China Special Interest Group 2 “Security & Trust“ General Information

page 2 WWRF · SIG2 · General Information SIG2: Introduction – Vision & Mission MISSION -SIG 2 focusses on identifying and promoting research areas that strive to understand and resolve the needs of users, operators, service providers and other players for secure and trustworthy wireless systems -Provide White Paper material to share these ideas with the Wireless World Community VISION Security and privacy are key enablers of the Wireless World. Whereas context awareness and ambient intelligence will considerably drive the development of mobile devices, services, and networks, holistic and multilateral security approaches will be the essential ingredient for their successful and sustainable introduction to end users.

page 3 WWRF · SIG2 · General Information SIG2: Introduction – A horizontal action SIG3: SIG3: Self-Organization in Wireless World Systems Vision Committee SIG1: Spectrum Topics SIG2: SIG2: Security & Trust WG1: WG1: Human Perspective and Service Concepts WG2: WG2: Service Architecture WG3: WG3: Cooperative & Ad-Hoc Networks WG4: WG4: New Air Interfaces, Relay-based Systems & Smart Antennas WG5: WG5: Short-range Wireless Communication Systems WG6: WG6: Reconfigurability Management Team General Assembly Chair Secretariat Steering Board... to be refined because of re-structuring

page 4 WWRF · SIG2 · General Information SIG2: Layered approach to identify security implications Mobile and Wireless Networks Smart Tags, RFID, Sensors, NFC WLAN, ZigBee, Bluetooth, UWB 2,5G -> 4G, WiMAX, D{V,A}B All IP / Mobile IP / IPv6 Service Enabling Technologies Identity Managment Seamless Service Usage Context Awareness Web Services Mobile Scenarios and Applications Tourism, Mobile Office Emergency, Healthcare Automotive, Telematics Mobile Devices Operating SystemsIdentificationUser Interfaces Device Enabling Technologies Mobile Users (Based on the reference model)

page 5 WWRF · SIG2 · General Information SIG2: 1. White Paper “The Big Picture“  6 major topics to be introduced -Risk Assessment -Utilisation and User Perception -Trust -Privacy -Identity Managment Security for Accounting and Charging (A4C), Christos, Seppo -Malicious mobile Code

page 6 WWRF · SIG2 · General Information SIG2: White Paper Roadmap NYBeijingOsloToronto User-centric Security? “The Big Picture” 1.Security & Trust – The Big Picture: Basic Challenges and Threats across all Working Groups 2. Specific topics are going to be defined for “San Diego“-Meeting Identity Management? Malicious Mobile Code? JejuSan DiegoParis