Difference between revisions of "TEK5110/List of papers"
Josef.Noll (Talk | contribs) (→IoT Management) |
Josef.Noll (Talk | contribs) (→Topics on industrial security) |
||
(43 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
<small>[[TEK5110|back to TEK5110]]</small> | <small>[[TEK5110|back to TEK5110]]</small> | ||
== Evaluation criteria == | == Evaluation criteria == | ||
+ | {{TOCright}} | ||
Your presentation is expected to last for 15 minutes, you will be stopped after 16 min. That means you need to identify the key messages of the selected paper. There is penalty for both being too short and for being too long. You will get questions about your paper and your presentation. One block of presentation and questions will approximately take 20 min. | Your presentation is expected to last for 15 minutes, you will be stopped after 16 min. That means you need to identify the key messages of the selected paper. There is penalty for both being too short and for being too long. You will get questions about your paper and your presentation. One block of presentation and questions will approximately take 20 min. | ||
Line 24: | Line 25: | ||
= List of papers for TEK5110 = | = List of papers for TEK5110 = | ||
− | Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics. | + | Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics. [https://owncloud.basicinternet.org/index.php/s/uGG7vlfHKckCRCy H21-list of papers] |
− | <big> '''to be completed''' </big> | + | |
+ | <!----<big> '''to be completed''' </big> ----> | ||
== Radio == | == Radio == | ||
− | :1) Relation between transmitted effect and received power of an antenna: Barry McLarnon - http://www.tapr.org/ve3jf.dcc97.html | + | <!--- : '''not available''' 1) Relation between transmitted effect and received power of an antenna: Barry McLarnon - http://www.tapr.org/ve3jf.dcc97.html ---> |
+ | : '''Tanjir''' - 1: Riki Patel, Arpan Desai, Vigneswaran Dhasarathan, Meandered low profile multiband antenna for wireless communication applications, 2021, DOI:10.1007/s11276-020-02437-6 | ||
== Propagation models == | == Propagation models == | ||
Line 35: | Line 38: | ||
== Mobile Network evolution == | == Mobile Network evolution == | ||
− | :3) Mobile coverage, capacity and cost aspects of future mobile and wireless networks | + | :3) Richard N. Clarke, Expanding mobile wireless capacity: The challenges presented by technology and economics, Telecommunications Policy, Volume 38, Issues 8–9, 2014, Pages 693-708, https://doi.org/10.1016/j.telpol.2013.11.006. http://www.sciencedirect.com/science/article/pii/S0308596113001900, Keywords: Spectrum; Reuse; Mobile; Wireless; Network; LTE Mobile coverage, capacity and cost aspects of future mobile and wireless networks |
− | :4) J Noll, S Dixit, D Radovanovic, M Morshedi, C Holst, AS Winkler, [http://its-wiki.no/images/0/09/5G_Network_Slicing_Digital_Inclusion_Noll_Jan2018.pdf 5G network slicing for digital inclusion], IEEE COMSNETS, 2018 | + | |
+ | :4) J Noll, S Dixit, D Radovanovic, M Morshedi, C Holst, AS Winkler, [http://its-wiki.no/images/0/09/5G_Network_Slicing_Digital_Inclusion_Noll_Jan2018.pdf 5G network slicing for digital inclusion]''', IEEE COMSNETS, 2018 | ||
== Wifi evolution == | == Wifi evolution == | ||
− | :5) | + | :5) A. Mukherjee et al., "Licensed-Assisted Access LTE: coexistence with IEEE 802.11 and the evolution toward 5G," in IEEE Communications Magazine, vol. 54, no. 6, pp. 50-57, June 2016, keywords: {IEEE 802.11 Standard;Long Term Evolution;Radiation detectors;Local area networks;Physical layer;Downlink;Spread spectrum management}, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7497766&isnumber=7497754 |
− | + | ||
== Network Management == | == Network Management == | ||
− | :6) Wireless Network Virtualization: A Survey, Some Research Issues and Challenges - https://ieeexplore.ieee.org/abstract/document/6887287/ | + | : '''Yngve''' - 6) Wireless Network Virtualization: A Survey, Some Research Issues and Challenges - https://ieeexplore.ieee.org/abstract/document/6887287/ |
:7) A TR069 WAN management protocol for WIA-PA Wireless sensor Networks - https://ieeexplore.ieee.org/document/7506555/ | :7) A TR069 WAN management protocol for WIA-PA Wireless sensor Networks - https://ieeexplore.ieee.org/document/7506555/ | ||
− | :8) | + | :8) Augmented Wi-Fi: An AI-based Wi-Fi Management Framework for Wi-Fi/LTE Coexistence''' - https://ieeexplore.ieee.org/document/9269064 |
− | :9) | + | :'''Anders''' - 9) Improving Network-Assisted Roaming for Controller-Less Wi-Fi''' - https://ieeexplore.ieee.org/document/9217269 |
− | == IoT Management == | + | == IoT and Energy Management == |
− | :10) | + | :'''Steven''' - 10) Internet of things based smart energy management in a vanadium redox flow battery storage integrated bio-solar microgrid - https://www.sciencedirect.com/science/article/abs/pii/S2352152X20318028 |
− | :11) | + | :'''Alireza''' - 11) IoT based real time energy monitoring system using Raspberry Pi - https://www.sciencedirect.com/science/article/abs/pii/S2542660520301244 |
− | :12) | + | :12) Energy management system design oriented for energy cost optimization in electric water heaters''' - https://www.sciencedirect.com/science/article/abs/pii/S0378778821002966 |
− | : | + | :13) Towards the Real-World Deployment of a Smart Home EMS: A DP Implementation on the Raspberry Pi ''' - https://www.mdpi.com/2076-3417/9/10/2120 |
− | :14) | + | :'''Mahsoud''' - 14) Home automation using general purpose household electric appliances with Raspberry Pi and commercial smartphone - https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0238480 |
− | :15) | + | :15) Design of Raspberry Pi Web-based Energy Monitoring System for Residential Electricity Consumption - https://ieeexplore.ieee.org/document/9264926 |
− | :16) | + | :16) PV Monitoring System for a Water Pumping Scheme with a Lithium-Ion Battery Using Free Open-Source Software and IoT Technologies - https://www.mdpi.com/2071-1050/12/24/10651 |
+ | |||
+ | :17) Decentralized Demand-Side Contribution to Primary Frequency Control - https://ieeexplore.ieee.org/abstract/document/5471113 | ||
+ | |||
+ | :18) Cyber–Physical System Security for the Electric Power Grid - https://ieeexplore.ieee.org/abstract/document/6032699 | ||
+ | |||
+ | :19) 5G - IoT, e.g. https://www.sciencedirect.com/science/article/pii/S2452414X18300049 | ||
+ | |||
+ | :20) Anomaly detection in sensor communications | ||
== Wireless Infrastructure == | == Wireless Infrastructure == | ||
− | : | + | :21) Sharing low-cost wireless infrastructures with telecommunications operators to bring 3G services to rural communities - https://www.sciencedirect.com/science/article/pii/S1389128615003163 |
+ | |||
+ | :22) Alternative Networks: Toward Global Access to the Internet for All''' - https://ieeexplore.ieee.org/abstract/document/7934183/ | ||
+ | |||
+ | :23) A Wireless Network Infrastructure Architecture for Rural Communities - https://www.researchgate.net/profile/Okoro-Osahon-2/publication/318319751_A_Wireless_Network_Infrastructure_Architecture_for_Rural_Communities/links/5f16244d299bf1e548c6ef0d/A-Wireless-Network-Infrastructure-Architecture-for-Rural-Communities.pdf | ||
+ | |||
+ | :24) Experiences from building an outdoor testbed for community wireless networks - https://ieeexplore.ieee.org/abstract/document/7140404/ | ||
− | : | + | :25) Connectivity Strategies Where People Matter: Community-led small-scale telecommunication infrastructure networks in the global South - https://idl-bnc-idrc.dspacedirect.org/bitstream/handle/10625/59165/IDL-59165.pdf |
− | + | == Topics on industrial security == | |
+ | Automated systems face numerous security challenges across various domains. In critical infrastructure, complex interactions between software, physical components, and human operators create vulnerabilities (Adepu et al., 2019). Automotive cybersecurity is particularly challenging due to increased reliance on external inputs and reduced driver supervision (Förster et al., 2022). Healthcare automated devices raise concerns about credibility and future security threats (Jangid et al., 2020). Smart building automation systems encounter cybersecurity issues similar to industrial control systems, with additional human safety and privacy considerations (Stamatescu et al., 2020). Robotic Process Automation and Intelligent Automation face challenges in logging, auditing, and access control (Al-Slais & Ali, 2023). Home automation systems also present security vulnerabilities that can compromise residents' safety (Chakraborti et al., 2019). As automation increases, so do risks to data security and privacy (Alimzhanova & Baiuzakova, 2023). Addressing these challenges requires interdisciplinary collaboration, rigorous security mechanisms, and ongoing research to develop new solutions (Hamad & Steinhorst, 2023). | ||
− | |||
− | : | + | [[Media:Elicit-SecurityChallenges_AutomatedSystems.txt]] - download and rename to .csv |
Latest revision as of 12:22, 27 August 2024
Wiki for ITS | ||||||
---|---|---|---|---|---|---|
|
Evaluation criteria
Your presentation is expected to last for 15 minutes, you will be stopped after 16 min. That means you need to identify the key messages of the selected paper. There is penalty for both being too short and for being too long. You will get questions about your paper and your presentation. One block of presentation and questions will approximately take 20 min.
Your presentation will be evaluated with respect to the following criteria:
Knowledge and Overview over topics in the paper
- what is the paper about, which specific aspects are addressed?
Identification of key findings of the paper:
- why are the findings key findings, to what extend are they different from the state-of-knowledge?
- what are the strengths/weaknesses of the approaches being mentioned
Scientifically precise presentation
- Be precise in your formulations, avoid story telling.
- Use numbers where appropriate, e.g. 20% more instead of much more
Evaluation of the paper
- what is your take on the paper? Criticism, own thoughts,...
Style:
- clear structure, clear and concise slides
- Provide examples, and respect the time
List of papers for TEK5110
Attached is a list of papers, from whom you may select one to be presented later in the course. Alternatively, select an academic paper of your choice. We suggest to start with Google Scholar or Microsoft Academics. H21-list of papers
Radio
- Tanjir - 1: Riki Patel, Arpan Desai, Vigneswaran Dhasarathan, Meandered low profile multiband antenna for wireless communication applications, 2021, DOI:10.1007/s11276-020-02437-6
Propagation models
- 2) Book chapter on propagation - http://www2.it.lut.fi/kurssit/04-05/010651000/Luennot/Chapter4.pdf
Mobile Network evolution
- 3) Richard N. Clarke, Expanding mobile wireless capacity: The challenges presented by technology and economics, Telecommunications Policy, Volume 38, Issues 8–9, 2014, Pages 693-708, https://doi.org/10.1016/j.telpol.2013.11.006. http://www.sciencedirect.com/science/article/pii/S0308596113001900, Keywords: Spectrum; Reuse; Mobile; Wireless; Network; LTE Mobile coverage, capacity and cost aspects of future mobile and wireless networks
- 4) J Noll, S Dixit, D Radovanovic, M Morshedi, C Holst, AS Winkler, 5G network slicing for digital inclusion, IEEE COMSNETS, 2018
Wifi evolution
- 5) A. Mukherjee et al., "Licensed-Assisted Access LTE: coexistence with IEEE 802.11 and the evolution toward 5G," in IEEE Communications Magazine, vol. 54, no. 6, pp. 50-57, June 2016, keywords: {IEEE 802.11 Standard;Long Term Evolution;Radiation detectors;Local area networks;Physical layer;Downlink;Spread spectrum management}, http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7497766&isnumber=7497754
Network Management
- Yngve - 6) Wireless Network Virtualization: A Survey, Some Research Issues and Challenges - https://ieeexplore.ieee.org/abstract/document/6887287/
- 7) A TR069 WAN management protocol for WIA-PA Wireless sensor Networks - https://ieeexplore.ieee.org/document/7506555/
- 8) Augmented Wi-Fi: An AI-based Wi-Fi Management Framework for Wi-Fi/LTE Coexistence - https://ieeexplore.ieee.org/document/9269064
- Anders - 9) Improving Network-Assisted Roaming for Controller-Less Wi-Fi - https://ieeexplore.ieee.org/document/9217269
IoT and Energy Management
- Steven - 10) Internet of things based smart energy management in a vanadium redox flow battery storage integrated bio-solar microgrid - https://www.sciencedirect.com/science/article/abs/pii/S2352152X20318028
- Alireza - 11) IoT based real time energy monitoring system using Raspberry Pi - https://www.sciencedirect.com/science/article/abs/pii/S2542660520301244
- 12) Energy management system design oriented for energy cost optimization in electric water heaters - https://www.sciencedirect.com/science/article/abs/pii/S0378778821002966
- 13) Towards the Real-World Deployment of a Smart Home EMS: A DP Implementation on the Raspberry Pi - https://www.mdpi.com/2076-3417/9/10/2120
- Mahsoud - 14) Home automation using general purpose household electric appliances with Raspberry Pi and commercial smartphone - https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0238480
- 15) Design of Raspberry Pi Web-based Energy Monitoring System for Residential Electricity Consumption - https://ieeexplore.ieee.org/document/9264926
- 16) PV Monitoring System for a Water Pumping Scheme with a Lithium-Ion Battery Using Free Open-Source Software and IoT Technologies - https://www.mdpi.com/2071-1050/12/24/10651
- 17) Decentralized Demand-Side Contribution to Primary Frequency Control - https://ieeexplore.ieee.org/abstract/document/5471113
- 18) Cyber–Physical System Security for the Electric Power Grid - https://ieeexplore.ieee.org/abstract/document/6032699
- 19) 5G - IoT, e.g. https://www.sciencedirect.com/science/article/pii/S2452414X18300049
- 20) Anomaly detection in sensor communications
Wireless Infrastructure
- 21) Sharing low-cost wireless infrastructures with telecommunications operators to bring 3G services to rural communities - https://www.sciencedirect.com/science/article/pii/S1389128615003163
- 22) Alternative Networks: Toward Global Access to the Internet for All - https://ieeexplore.ieee.org/abstract/document/7934183/
- 23) A Wireless Network Infrastructure Architecture for Rural Communities - https://www.researchgate.net/profile/Okoro-Osahon-2/publication/318319751_A_Wireless_Network_Infrastructure_Architecture_for_Rural_Communities/links/5f16244d299bf1e548c6ef0d/A-Wireless-Network-Infrastructure-Architecture-for-Rural-Communities.pdf
- 24) Experiences from building an outdoor testbed for community wireless networks - https://ieeexplore.ieee.org/abstract/document/7140404/
- 25) Connectivity Strategies Where People Matter: Community-led small-scale telecommunication infrastructure networks in the global South - https://idl-bnc-idrc.dspacedirect.org/bitstream/handle/10625/59165/IDL-59165.pdf
Topics on industrial security
Automated systems face numerous security challenges across various domains. In critical infrastructure, complex interactions between software, physical components, and human operators create vulnerabilities (Adepu et al., 2019). Automotive cybersecurity is particularly challenging due to increased reliance on external inputs and reduced driver supervision (Förster et al., 2022). Healthcare automated devices raise concerns about credibility and future security threats (Jangid et al., 2020). Smart building automation systems encounter cybersecurity issues similar to industrial control systems, with additional human safety and privacy considerations (Stamatescu et al., 2020). Robotic Process Automation and Intelligent Automation face challenges in logging, auditing, and access control (Al-Slais & Ali, 2023). Home automation systems also present security vulnerabilities that can compromise residents' safety (Chakraborti et al., 2019). As automation increases, so do risks to data security and privacy (Alimzhanova & Baiuzakova, 2023). Addressing these challenges requires interdisciplinary collaboration, rigorous security mechanisms, and ongoing research to develop new solutions (Hamad & Steinhorst, 2023).
Media:Elicit-SecurityChallenges_AutomatedSystems.txt - download and rename to .csv