Showing posts with label ETSI. Show all posts
Showing posts with label ETSI. Show all posts

Saturday 23 April 2016

5G & Accident Free Driving


ETSI recently held a workshop titled "5G: From Myth to Reality". There were some interesting presentations and discussions, hopefully I will get a chance to write a bit more about it.

One interesting presentation was how 5G will make accident free driving a reality. While the current approach is to use the 802.11p standards that uses the license exempt 5.9GHz band, there is a possibility of enhancements based on 5G


As the final 2 slides say, What could be the use cases for 5G in vehicles? The answer suggested:

  • Map update for highly automatic driving - Instantly update the map of vehicle's surrounding. The challenge of this use case is that the vehicle is currently in the tile that needs to be updated, hence a very quick update is required. 
  • Precise Positioning high speed, no GPS, support for vehicles without high precision location tracking like cars 
  • Audio / Video Streaming (Entertainment) 
  • Online Gaming - side jobs 
  • Sensor- and State Map Sharing (Sensor Raw Data) - Transmit raw sensor data such that others can use their own classifiers to infer decisions
  • Camera and Radar sharing to improve visibility, including See-Through Share sensor information to augment ego vehicle's view. Allows for better visibility in presence of obstructing vehicles, heavy rain / fog, etc. 
  • Short-Term Sensor sharing for crash mitigation - Mitigate crash between multiple vehicle by last-minute traffic exchange 
  • Traffic forwarding using cars as relays Extend coverage or improve efficiency by using the car as a relay 
  • Teleoperated Driving "Let car be controlled by off-site driver / car operator e.g. car sharing, taxi operator, …“ 
  • Augemented Reality, e.g. Daytime-Visibility at night)

Here is the complete presentation, let me know what you think:



Monday 24 August 2015

Some interesting presentations from ETSI Security workshop


ETSI held their security week from 22-26 June 2015 at their headquarters. There are lots of interesting presentations (see agenda [PDF]); I am embedding some here.


This is a good presentation providing a summary of the reasons for IoT security issues and some of the vulnerabilities that have been seen as a result of that.




The next one is The Threat landscape of connected vehicles and ITS (Intelligent Transportation Systems) integration in general



This presentation provides a good summary of the threats in the connected cars/vehicles which is only going to become more common. Some of these issues will have to be solved now before we move on to the autonomous vehicles in future. Security issues there will be catastrophic and many lives can be lost.

The final presentation is from 3GPP SA3 that provides a quick summary of security related work in 3GPP.



Sunday 15 February 2015

5G and NFV


In my 5G: A 2020 vision presentation, I argued that some of the technologies that will be necessary for 5G is in fact independent of 5G. One such technology is NFV. Having said that, I also argue that the minimum prototype for 5G would require an NFV based implementation.


Tieto gave an interesting presentation in our last Small Cell SIG event explaining how the network will be implemented based on NFV. The presentation is embedded below:



There is also an interesting paper that expands on this further, available from Slideshare here.

Saturday 17 May 2014

NFV and SDN - Evolution Themes and Timelines


We recently held our first Virtual Networks SIG event in Cambridge Wireless. There were some great presentations. The one by the UK operator EE summarised everything quite well. For those who are not familiar with what NFV and SDN is, I would recommend watching the video on my earlier post here.

One of the term that keeps being thrown around is 'Orchestration'. While I think I understand what it means, there is no easy way to explain it. Here are some things I found on the web that may explain it:
Orchestration means Automation, Provisioning, Coordination and Management of Physical and Virtual resources.  
Intelligent service orchestration primarily involves the principles of SDN whereby switches, routers and applications at Layer 7 can be programmed from a centralized component called the controller with intelligent decisions regarding individual flow routing in real time.
If you can provide a better definition, please do so.
There are quite a few functions and services that can be virtualised and there are some ambitious timelines.

ETSI has been working on NFV and as I recently found out (see tweet below) there may be some 3GPP standardisation activity starting soon.
Anyway, here is the complete presentation by EE:



There was another brilliant presentation by Huawei but the substance was more in the talk, rather than the slides. The slides are here in case you want to see and download.

Related post:



Saturday 25 January 2014

Security and other development on the Embedded SIM


Its no surprise that GSMA has started working on Embedded SIM specifications. With M2M getting more popular every day, it would make sense to have the SIM (or UICC) embedded in them during the manufacturing process. The GSMA website states:

The GSMA’s Embedded SIM delivers a technical specification to enable the remote provisioning and management of Embedded SIMs to allow the “over the air” provisioning of an initial operator subscription and the subsequent change of subscription from one operator to another.
The Embedded SIM is a vital enabler for Machine to Machine (M2M) connections including the simple and seamless mobile connection of all types of connected vehicles. In the M2M market the SIM may not easily be changed via physical access to the device or may be used in an environment that requires a soldered connection, thus there is a need for ‘over the air’ provisioning of the SIM with the same level of security as achieved today with traditional “pluggable” SIM. It is not the intention for the Embedded SIM to replace the removable SIM currently used as the removable SIM still offers many benefits to users and operators in a number of different ways – for example, the familiarity of the form factor, easy of portability, an established ecosystem and proven security model.
















The last time I talked about embedded SIM was couple of years back, after the ETSI security workshop here. Well, there was another of these workshops recently and an update to these information.


The ETSI presentation is not embedded here but is available on Slideshare here. As the slide says:

An embedded UICC is a “UICC which is not easily accessible or replaceable, is not intended to be removed or replaced in the terminal, and enables the secure changing of subscriptions” (ETSI TS 103 383)


Finally, Embedded SIM should not be confused with Soft-SIM. My last post on Soft-SIM, some couple of years back here, has over 15K views which shows how much interest is there in the soft SIM. As the slide says:

Soft or Virtual SIM is a completely different concept that does not use existing SIM hardware form factors and it raises a number of strong security issues:

  • Soft SIM would store the Operator secret credentials in software within the Mobile device operating system - the same system that is often attacked to modify the handset IMEI, perform SIM-Lock hacking and ‘jail-break’ mobile OS’s
  • Operators are very concerned about the reduction in security of their credentials through the use of Soft SIM. Any SIM approach not based on a certified hardware secure element will be subject to continual attack by the hacking community and if compromised result in a serious loss of customer confidence in the security of Operator systems
  • Multiple Soft SIM platforms carrying credentials in differing physical platforms, all requiring security certification and accreditation would become an unmanageable overhead – both in terms of resource, and proving their security in a non-standardised virtual environment

The complete GSMA presentation is as follows:



You may also like my old paper:

Thursday 16 January 2014

3GPP Rel-12 and Future Security Work


Here is the 3GPP presentation from the 9th ETSI Security workshop. Quite a few bits on IMS and IMS Services and also good to see new Authentication algorithm TUAK as an alternative to the widely used Milenage algorithm.



Wednesday 27 November 2013

ETSI Summit on Future Mobile and Standards for 5G



Edited from the original in 3GPP News:

The ETSI Future Mobile Summit has heard how the mobile internet will evolve over the next ten to fifteen years, and how 3GPP systems will ensure future stability as the network copes with an explosive growth in complexity and usage.


With 3GPP providing the evolutionary framework for mobility, via its Releases of new functionality and features, the more radical thinking, at the Summit, came in the form of Research projects and some future focused industry initiatives, such as the WWRF, the METIS Project and the DVB Project.

In his keynote address, Mario Campolargo - of the European Commission - introduced a new initiative on research & innovation that will provide momentum to funded work on research. The 5G Public Private Partnership is being launched as a blueprint for the deployment of 5G, in the years after 2020. 



In summing up the Summit’s main themes, the ETSI CTO, Adrian Scrase identified some certainties; “...traffic will continue to increase, connected devices will increase dramatically over time, new device types will significantly contribute to that increase (e.g., probes, sensors, meters, machines etc) and new sectors will bring new priorities (e.g, critical infrastructures).”

On the concept of 5G, Mr. Scrase reported that ultra-reliable 5G networks should, among other things, enable the tactile internet, the perception of infinite capacity and bring in augmented reality.



Download the presentations:
5G, the way forward!
Mario Campolargo, Director, Net Futures, DG Connect, European Commission
A new initiative 5GPPP, to accelerate and structure research & innovation."...Industry to co-create the "vision" and build global convergence by end 2015.
Who needs 5G?
Hans D. Schotten, University of Kaiserslautern
Long Term Evolution of LTE (linear evolution) or Something new (5G)?
Why 5G?
Rahim Tafazolli, Director of CCSR and 5GIC, The university of Surrey
Perceived infinite capacity, a new communication paradigm for 5G and Beyond
The 5G mobile and wireless communications system 
Afif Osseiran, Project Coordinator of METIS
Explanation of 5G scenarios (selected) and examples of 5G technology components
Next generation wireless for a cognitive & energy-efficient future
Nigel Jefferies, Wireless World Research Forum Chairman
"New technology challenges: huge number of nodes, latency , energy efficiency, backhaul and over the air signaling design...May require a whole new approach to: physical layer, air interface and spectrum usage, resources management & optimization..."
 3GPP RAN has started a new innovation cycle which will be shaping next generation cellular systems
Spectrum for 5G, a big deal?
Jens Zander, KTH, Royal Institute of Technology  
 A World Divided - The coverage world versus the capacity world
Opportunities for TV services over future mobile networks
Nick Wells, Chairman Technical Module, DVB
 Can broadcasters and mobile industry cooperate to define a new worldwide standard that will benefit both broadcasters and mobile industry?
3GPP core network & services evolution
Atle Monrad, 3GPP CT Chairman
Architecture evolution, More new nodes, CS-domain removal?, new ways of design of networks?
The impact of NFV on future mobile
Uwe Janssen, Deutsche Telekom, lead delegate to Network Functions Virtualisation ISG
 The challenge for Operators, Suppliers and Standards Bodies
The tactile internet - Driving 5G
Gerhard Fettweis, Technical University of Dresden
 3D Chip-Stacks & High-Rate Inter-Chip Communications, Monitoring / Sensing, Tactile internet - Latency Goals
Summit conclusions
Adrian Scrase, ETSI CTO, Head of 3GPP MCC
 Includes the 'Standardization Challenges' raised by the Summit.

Tuesday 15 October 2013

What is Network Function Virtualisation (NFV)?


Software Defined Networking (SDN) and Network Function Virtualization (NFV) are the two recent buzzwords taking the telecoms market by storm. Every network vendor now has some kind of strategy to use this NFV and SDN to help operators save money. So what exactly is NFV? I found a good simple video by Spirent that explains this well. Here it is:


To add a description to this, I would borrow an explanation and a very good example from Wendy Zajack, Director Product Communications, Alcatel-Lucent in ALU blog:

Let’s take this virtualization concept to a network environment. For me cloud means I can get my stuff where ever I am and on any device –  meaning I can pull out my smart phone, my iPad, my computer – and show my mom the  latest pictures of  her grand kids.  I am not limited to only having one type of photo album I put my photos in – and only that. I can also show her both photos and videos together – and am not just limited to showing her the kids in one format and on one device.
Today in a telecom network is a lot of equipment that can only do one thing.  These machines are focused on what they are do and they do it really well – this is why telecom providers are considered so ‘trusted.’ Back in the days of landline phones even when the power was out you could always make a call.  These machines run alone with dedicated resources.  These machines are made by various different vendors and speak various languages or ‘protocols’ to exchange information with each other when necessary. Some don’t even talk at all – they are just set-up and then left to run.  So, every day your operator is running a mini United Nations and corralling that to get you to access all of your stuff.  But it is a United Nations with a fixed number of seats, and with only a specific nation allowed to occupy a specific seat, with the seat left unused if there was a no-show. That is a lot of underutilized equipment that is tough and expensive to manage.  It also has a shelf life of 15 years… while your average store-bought computer is doubling in speed every 18 months.
Virtualizing the network means the ability to run a variety of applications (or functions) on a standard piece of computing equipment, rather than on dedicated, specialized processors and equipment, to drive lower costs (more value), more re-use of the equipment between applications (more sharing), and a greater ability to change what is using the equipment to meet the changing user needs (more responsiveness).  This has already started in enterprises as a way to control IT costs and improve the performance and of course way greener.
To give this a sports analogy – imagine if in American football instead of having specialists in all the different positions (QB, LB, RB, etc), you had a bunch of generalists who could play any position – you might only need a 22 or 33 man squad (2 or 3 players for every position) rather than the normal squad of  53.   The management of your team would be much simpler as ‘one player fits all’ positions.   It is easy to see how this would benefit a service provider – simplifying the procurement and management of the network elements (team) and giving them the ability to do more, with less.

Dimitris Mavrakis from Informa wrote an excellent summary from the IIR SDN and NFV conference in Informa blog here. Its worth reading his article but I want to highlight one section that shows how the operators think deployment would be done:

The speaker from BT provided a good roadmap for implementing SDN and NFV:
  1. Start with a small part of the network, which may not be critical for the operation of the whole. Perhaps introduce incremental capacity upgrades or improvements in specific and isolated parts of the network.
  2. Integrate with existing OSS/BSS and other parts of the network.
  3. Plan a larger-scale rollout so that it fits with the longer-term network strategy.
Deutsche Telecom is now considered to be deploying in the first phase, with a small trial in Hrvatski Telecom, its Croatian subsidiary, called Project Terrastream. BT, Telefonica, NTT Communications and other operators are at a similar stage, although DT is considered the first to deploy SDN and NFV for commercial network services beyond the data center.
Stage 2 in the roadmap is a far more complicated task. Integrating with existing components that may perform the same function but are not virtualized requires east-west APIs that are not clearly defined, especially when a network is multivendor. This is a very active point of discussion, but it remains to be seen whether Tier-1 vendors will be willing to openly integrate with their peers and even smaller, specialist vendors. OSS/BSS is also a major challenge, where multivendor networks are controlled by multiple systems and introducing a new service may require risking several parameters in many of these OSS/BSS consoles. This is another area that is not likely to change rapidly but rather in small, incremental steps.
The final stage is perhaps the biggest barrier due to the financial commitment and resources required. Long-term strategy may translate to five or even 10 years ahead – when networks are fully virtualized – and the economic environment may not allow such bold investments. Moreover, it is not clear if SDN and NFV guarantee new services and revenues outside the data center or operator cloud. If they do not, both technologies – and similar IT concepts – are likely to be deployed incrementally and replace equipment that reaches end-of-life. Cost savings in the network currently do not justify forklift upgrades or the replacement of adequately functional network components.
There is also a growing realization that bare-metal platforms (i.e., the proprietary hardware-based platforms that power today’s networks) are here to stay for several years. This hardware has been customized and adapted for use in telecom networks, allowing high performance for radio, core, transport, fixed and optical networks. Replacing these high-capacity components with virtualized ones is likely to affect performance significantly and operators are certainly not willing to take the risk of disrupting the operation of their network.
A major theme at the conference was that proprietary platforms (particularly ATCA) will be replaced by common off-the-shelf (COTS) hardware. ATCA is a hardware platform designed specifically for telecoms, but several vendors have adapted the platform to their own cause, creating fragmentation, incompatibility and vendor lock-in. Although ATCA is in theory telecoms-specific COTS, proprietary extensions have forced operators to turn to COTS, which is now driven by IT vendors, including Intel, HP, IBM, Dell and others.


ETSI has just published first specifications on NFV. Their press release here says:

ETSI has published the first five specifications on Network Functions Virtualisation (NFV). This is a major milestone towards the use of NFV to simplify the roll-out of new network services, reduce deployment and operational costs and encourage innovation.
These documents clearly identify an agreed framework and terminology for NFV which will help the industry to channel its efforts towards fully interoperable NFV solutions. This in turn will make it easier for network operators and NFV solutions providers to work together and will facilitate global economies of scale.
The IT and Network industries are collaborating in ETSI's Industry Specification Group for Network Functions Virtualisation (NFV ISG) to achieve a consistent approach and common architecture for the hardware and software infrastructure needed to support virtualised network functions. Early NFV deployments are already underway and are expected to accelerate during 2014-15. These new specifications have been produced in less than 10 months to satisfy the high industry demand – NFV ISG only began work in January 2013.
NFV ISG was initiated by the world's leading telecoms network operators. The work has attracted broad industry support and participation has risen rapidly to over 150 companies of all sizes from all over the world, including network operators, telecommunication equipment vendors, IT vendors and technology providers. Like all ETSI standards, these NFV specifications have been agreed by a consensus of all those involved.
The five published documents (which are publicly available via www.etsi.org/nfv) include four ETSI Group Specifications (GSs) designed to align understanding about NFV across the industry. They cover NFV use cases, requirements, the architectural framework, and terminology. The fifth GS defines a framework for co-ordinating and promoting public demonstrations of Proof of Concept (PoC) platforms illustrating key aspects of NFV. Its objective is to encourage the development of an open ecosystem by integrating components from different players.
Work is continuing in NFV ISG to develop further guidance to industry, and more detailed specifications are scheduled for 2014. In addition, to avoid the duplication of effort and to minimise fragmentation amongst multiple standards development organisations, NFV ISG is undertaking a gap analysis to identify what additional work needs to be done, and which bodies are best placed to do it.
The ETSI specifications are available at: http://www.etsi.org/technologies-clusters/technologies/nfv

The first document that shows various use cases is embedded below:


Friday 25 March 2011

Interesting M2M Video by ETSI

Machine-to Machine Communications - David Boswarthick (15/02/2011) from ETSI – World Class Standards on Vimeo.

ETSI M2M: Building the Internet of Things

Presented by: David Boswarthick, ETSI Technical Expert

Live Presentation during MWC 2011: ETSI stand, Monday, 15 February 2011

_ _ _ _ _ _ _

About the presenter:

David Boswarthick, Technical Officer, ETSI

David has been extensively involved for over 10 years in the standardization activities of mobile, fixed and convergent networks in both the European Telecommunications Standards Institute (ETSI) and the 3rd Generation Partnership Project (3GPP). He is currently involved in the M2M standards group which is defining an end to end architecture and requirements for multiple M2M applications including Smart Metering, healthcare and enhanced home living. David holds a Bachelor's Honours Degree in Telecommunications from the University of Plymouth, and a Master's Degree in Networks and Distributed systems from the University of Nice and Sophia Antipolis, France.

Tuesday 1 February 2011

6th ETSI Security Workshop

6th ETSI Security workshop was held last month. There were some very interesting areas of discussion including Wireless/Mobile Security, Smart Grids Security, etc.
All presentations are available to download from here.

Monday 1 November 2010

ETSI M2M Workshop summary and conclusions

As I mentioned earlier about the M2M workshop held in Paris, the following are the highlights from press release after the event:

ETSI's first Open Machine-to-Machine Workshop broke all records for attendance, laying out the next steps for achieving M2M applications worldwide, and confirming a leading role for the standards organisation.

'Machine-to-Machine (M2M) communications need standards – and ETSI is taking the lead to make sure that the standards are in place.' This was the main conclusion from ETSI's M2M workshop which took place on 19 and 20 October. With over 220 attendees from across the world, this was the most popular ETSI workshop to date, with the high degree of interest reflecting the enormous potential that is foreseen for M2M applications and technologies.

Participants heard how existing and evolving communication technologies networks (mostly wireless (cellular and low-power), but also fixed networks, including power line communications) provide a firm basis for connecting M2M sensors and applications. Specification of appropriate interfaces that allow network technology neutrality is a priority, and one that ETSI is already addressing.

The workshop included two live demonstrations organised by InterDigital Inc. These demonstrated an M2M gateway and core network, and an M2M Wireless Personal Area Network (sensors connecting via low-power wireless devices to a database, simulating e-Health, home automation and security application scenarios). The implementations were based on current specifications from ETSI's M2M Technical Committee and confirmed both the effectiveness of the implications and of the ETSI specifications. In addition, poster sessions presented the work of six research and development projects related to M2M and the Future Internet, part of the European Commission's 7th Framework Programme (FP7).

The standards work of ETSI's M2M Technical Committee is reaching an advanced stage, and many network operators are encouraging a first release of M2M standards by early 2011. The committee is currently finalising the architecture for the service platform that will enable the integration of multiple vertical M2M applications. The workshop confirmed that ETSI is well placed to address a vital aspect of standardisation in support of M2M – the specification of interfaces that will facilitate the interconnection and interoperability of the diverse applications and of the networks that will underlie them.

Marylin Arndt of France Telecom, Chairman of ETSI's M2M Technical Committee, said: 'The committee will continue in its role of creating standards that build on what we already have, to ensure that the emerging 'vertical' M2M applications can be supported effectively. At the same time, the committee (and ETSI in general) has a vital responsibility to co-ordinate and direct the wider work on M2M. We are here to lead the way.'

All presentations could be downloaded from here.

The conclusions from the meeting is summarised in the presentation embedded below: