Josef Noll | University of Oslo (original) (raw)
Papers by Josef Noll
2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI), Nov 25, 2021
The digital society has become ubiquitous, so are the concerns about trust and societal security.... more The digital society has become ubiquitous, so are the concerns about trust and societal security. However, despite their apparent link, studies on these phenomena remain fragmented. Consequently, the dilemma is that we have limited knowledge of how digitalisation affects trust and societal security and how to ensure these in digital societies. We address it by proposing an interdisciplinary approach that contributes to the body of knowledge by building on the socio-technical systems perspective to integrate the three concepts: societal security, trust and digital societies, to further develop a coherent framework to understand and explain their relationship. We conclude by reiterating our theoretical contribution and implications for policy and practice and future research.
2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion), 2018
Internet of Things (IoT) is an emerging technology that expands wireless and mobile networks into... more Internet of Things (IoT) is an emerging technology that expands wireless and mobile networks into heterogeneous network of connected devices. Trustable remote monitoring and management systems are required to establish a controlled environment for new services and devices in order to (i) improve the quality of existing services and (ii) enable novel services. However, monitoring and remote management can cause security and privacy concerns and thus affect the trust formation between customer and service provider. This paper introduces a trust model considering institutions as mediators to assess trustability of remote monitoring and management systems. The proposed model considers governance as an approach to audit remote monitoring and management systems and accordingly provides institutional assurance in form of certificate or labels in order to facilitate trust decision making and motivate trustworthy behaviors. The proposed model utilized the multi-metric method to measure governance criteria objectively and represent level of trustworthiness with A-F labels. Representing governance criteria with labels accompanied by color coding facilitates trust decision making based on application context or requirements for everyone regardless of level of expertise. Meanwhile, issuing trustworthiness certificate or A-F labels will encourage service providers to improve trustability of their remote monitoring and management approaches, which improve acceptability and efficiency of managed services.
Nordic and Baltic Journal of Information and Communications Technologies, 2018
The Digital Divide is one of the key challenges for mankind. Despite attempts to digitally includ... more The Digital Divide is one of the key challenges for mankind. Despite attempts to digitally include people, the divide is bigger than ever. This contribution [1] to a sustainable future promotes "Internet lite" as the new paradigm for providing everyone with the opportunity to participate in the digital society. The current paper first addresses the reasons for the digital divide, thereafter addresses free access to information as catalyst for the sustainable development goals (SDGs) and provides the path towards "Internet lite for all".
2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
The growing number of Wi-Fi networks at homes, buildings and public areas can consume excessive e... more The growing number of Wi-Fi networks at homes, buildings and public areas can consume excessive energy and therefore increase CO2 emissions. Hence, the aim of this paper is to investigate the energy consumption of Wi-Fi networks in general. This study is based on real-world observations both usage and energy consumption of Wi-Fi access points. A variety of off-the-shelf Wi-Fi access points were examined to investigate to what degree clients' usage patterns, especially the signal to noise ratio (SNR) affects the energy consumption. The results indicate that low SNR increases the energy consumption up to 136% in various Wi-Fi access points. Therefore, confining clients with a low level of SNR can reduce the energy consumption of Wi-Fi access points while increases network throughput. Hence, findings of this paper can improve the energy efficiency of Wi-Fi networks in particular energy and cost efficiency of public hotspots. Index Terms-Energy efficiency; Wi-Fi networks; energy monitoring; power consumption; green computing.
The Fifth International Conference on Mobile Services, Resources, and Users (MOBILITY 2015), held... more The Fifth International Conference on Mobile Services, Resources, and Users (MOBILITY 2015), held between June 21-26, 2015, in Brussels, Belgium, continued a series of events dedicated to mobility- at-large, dealing with challenges raised by mobile services and applications considering user, device and service mobility. Users increasingly rely on devices in different mobile scenarios and situations. "Everything is mobile", and mobility is now ubiquitous. Services are supported in mobile environments, through smart devices and enabling software. While there are well known mobile services, the extension to mobile communities and on-demand mobility requires appropriate mobile radios, middleware and interfacing. Mobility management becomes more complex, but is essential for every business. Mobile wireless communications, including vehicular technologies bring new requirements for ad hoc networking, topology control and interface standardization. We take here the opportunity to warmly thank all the members of the MOBILITY 2015 Technical Program Committee, as well as the numerous reviewers. The creation of such a broad and high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to MOBILITY 2015. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions. Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors. We are grateful to the members of the MOBILITY 2015 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success. We hope that MOBILITY 2015 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the areas of mobile services, resources and users. We are convinced that the participants found the event useful and communications very open. We hope that Brussels, Belgium, provided a pleasant environment during the conference and everyone saved some time to enjoy the charm of the city.
Digital Inequalities in the Global South, 2020
This chapter aims at documenting how digital divide determinants are affecting the ability of dig... more This chapter aims at documenting how digital divide determinants are affecting the ability of digital infrastructure to be used as a platform for health information and education in Sub-Saharan Africa. More specifically, the chapter draws from case studies in Madagascar, Niger, Cote d’Ivoire, Senegal, and Tanzania, and we showcase the best praxis on how digital technologies are used to improve learning and health information usage. Some tested experiments have been successful but rarely scaled up, depriving part of the population—the poorest and those living in rural areas who “consume” few public resources—from opportunities to access improved education and health services. Along with the aforementioned challenges, we identify a need for the key performance indicators (KPIs) related to digital inclusion projects in Global South.
This paper analyzes economical and technological aspects for service provisioning on varying netw... more This paper analyzes economical and technological aspects for service provisioning on varying networks. Though mobile networks are continuously evolving, the use of mobile broadband is and will be limited. Availability and affordability are two aspects, which are addressed in this paper through the introduction of basic information and low capacity (LC) services. The paper addresses how information provisioning and network-aware applications work together to achieve a digital society including everyone, rather than enhancing the digital gap. Initiatives like Facebook’s Free Basic and the Basic Internet Foundation and their approaches on LC-service and information provisioning are addressed. The second focus is on a proactive approach for mobile applications (apps), adjusting to the network capacity and bandwidth limitations. The main results are recommendations towards a low-capacity Internet for everyone, supported by examples of LC-service provisioning, as well as network-aware app...
The Basic Internet Foundation aims at optimized content delivery for capacity-limited networks, a... more The Basic Internet Foundation aims at optimized content delivery for capacity-limited networks, and thus provides free access to basic information to everyone. In this paper we describe the main technological challenges of the content delivery, being the concept of information, the remote administration of access points and the inclusion of Internet of Things (IoT) information. Basic Internet aims at offering free access to information on low capacity Internet lines to people lacking Internet coverage or the ability to pay for mobile data. The main contributions of this paper are solutions that the foundation as well as other programs or companies have addressed encouraging digital development and inclusion. Keywords–Internet; foundation; broadband; devices; network; information; developing economies.
Privacy is currently in distress and in need of rescue, much like princesses in the all-familiar ... more Privacy is currently in distress and in need of rescue, much like princesses in the all-familiar fairytales. We employ storytelling and metaphors from fairytales to make reader-friendly and streamline our arguments about how a complex concept of Privacy Labeling (the ‘knight in shining armor’) can be a solution to the current state of Privacy (the ‘princess in distress’). We give a precise definition of Privacy Labeling (PL), painting a panoptic portrait from seven different perspectives (the ‘seven helpers’): Business, Legal, Regulatory, Usability and Human Factors, Educative, Technological, and Multidisciplinary. We describe a common vision, proposing several important ‘traits of character’ of PL as well as identifying ‘undeveloped potentialities’, i.e., open problems on which the community can focus. More specifically, this position paper identifies the stakeholders of the PL and their needs with regard to privacy, describing how PL should be and look like in order to address the...
JMIR mHealth and uHealth, Jan 14, 2018
The increasing prevalence of gestational diabetes mellitus (GDM) among women of different ethnic ... more The increasing prevalence of gestational diabetes mellitus (GDM) among women of different ethnic backgrounds provides new challenges for health care professionals, who often find it difficult to provide information about the management of this disease to such individuals. Mobile health (mHealth) may act as a useful tool for blood sugar control and care process enhancement. However, little is known about health care professionals' experiences and attitudes toward the use of mHealth for women with GDM. The aim of this study was to explore how health care professionals perceived the provision of care to pregnant women who managed their GDM using the culture-sensitive Pregnant+ app in a randomized controlled trial. Individual interviews with 9 health care professionals providing care for women with GDM were conducted. Braun and Clark's method of thematic content analysis inspired the analysis. This study included health care professionals who were primarily responsible for provi...
BMC Pregnancy and Childbirth
Background Intimate partner violence (IPV) during pregnancy is a global health problem with adver... more Background Intimate partner violence (IPV) during pregnancy is a global health problem with adverse consequences for mothers, infants and families. We hypothesise that information about IPV and safety behaviours during pregnancy has the potential to increase quality of life and the use of safety behaviours and prevent IPV. Methods A multicentre randomised controlled trial among culturally diverse pregnant women in Norway, to test the effect of a tablet-based video intervention about IPV and safety behaviours. Women attending routine antenatal check-ups alone (baseline) were screened for violence (Abuse Assessment Screen) by responding to questions on a tablet, and randomised (1:1) by computer to receive an intervention or a control video. The intervention video presented information about IPV and safety behaviours. The controls viewed a video promoting healthy pregnancy in general. Outcome measures were assessed three months post-partum: The World Health Organization Quality of Life...
Background Porcine cysticercosis is endemic in Tanzania, especially in the southern, central part... more Background Porcine cysticercosis is endemic in Tanzania, especially in the southern, central part and northern highlands of the country. The disease reduces meat quality and affects pig industry. This study investigated porcine cysticercosis prevalence and possible risk factors for reference in preparation for sustainable control measures. Methods Current seroprevalence and potential risk factors were studied in selected ward/villages of Iringa district council, in the southern highland of Tanzania, prior to a digital health education intervention. A total of 346 pigs from 88 households of Izazi, Migoli and Mlowa wards were studied using an enzyme-linked immunosorbent assay (ELISA), which detects Taenia species antigens (Ag) in sera. Questionnaire used to dig information on pig management and sanitation and hygiene practices. Results The AgELISA detected 22.3% of the surveyed pigs as positive for porcine cysticercosis. The detected porcine cysticercosis seropositivity ranged between...
African Journal of Science, Technology, Innovation and Development, 2021
on the previous events on advanced wireless technologies, wireless networking, and wireless appli... more on the previous events on advanced wireless technologies, wireless networking, and wireless applications. ICWMC 2016 addressed wireless related topics concerning integration of latest technological advances to realize mobile and ubiquitous service environments for advanced applications and services in wireless networks. Mobility and wireless, special services and lessons learnt from particular deployment complemented the traditional wireless topics. We take here the opportunity to warmly thank all the members of the ICWMC 2016 Technical Program Committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to ICWMC 2016. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions. Also, this event could not have been a reality without th...
Berichte aus dem Institut für Meereskunde an der Christian-Albrechts-Universität Kiel No 143, 1996
Abstract—One of the main aspects of modern life is the interaction with sensors and other embedde... more Abstract—One of the main aspects of modern life is the interaction with sensors and other embedded systems. These systems become increasingly more integrated with daily life activities. They enable the interaction between a variety of components or parties (people, actuator, sensor, software, etc.). This interaction causes the appearance of new challenges in the design of security-related aspects of embedded systems. This paper uses the SHIELD methodology of the JU Artemis to provide Security, Privacy and Dependability (SPD) levels of embedded systems. We propose an extension of the methodology to take into consideration interactions between components, and introduce functions describing the significance of the interconnections. The complete methodology enables the composition of SPD as an add-on or as a built-in feature, and is thus applicable to an already built embedded system or to the development of embedded systems. Keywords- security composition; safety composition; component...
2018 10th International Conference on Communication Systems & Networks (COMSNETS), 2018
This paper focusses on the societal challenges related to Digital Inclusion. It revisits the 5G m... more This paper focusses on the societal challenges related to Digital Inclusion. It revisits the 5G mobile communication objectives, and states the need for digital inclusion for all. Special focus is put on the entry into the digital society, including both discussion on key performance indicators (KPIs) as well as health information as the starting point for digital development. Main focus of this paper lies on the proof of the Internet light concept of free provision of information in developing economies. Both, the results from the first pilots in The Democratic Republik of Congo (DRC), and the ongoing installations of Internet light hotspots in Tanzania support the objective of sustainable business operation with free access to information for all, thus fostering digital inclusion.
2020 International Conference on Advanced Technologies for Communications (ATC), 2020
Abstract—In the recent years, we have seen a clear trend in consumer devices being equipped with ... more Abstract—In the recent years, we have seen a clear trend in consumer devices being equipped with multiple radio interfaces such as GSM, UMTS, WiFi. These types of devices will soon be ubiquitous. Since radio frequency is a limited resource, the need for sharing and re-using a radio spectrum will be even more noticeable than before. Studies show that collaboration when allocating a radio spectrum will result in better network performance. This paper proposes a solution that identifies radio devices in a specific area. Starting from the identification of the location of possible interfering devices, better decisions can be made, prior and under spectrum allocation through cooperation. Our solution provides the location information in an overlay network without need for additional exchange of information messages. By storing the geographic location directly in the node-id, all members of the overlay network can extract the exact location of all known nodes. Using geocast, we show that ...
2021 14th CMI International Conference - Critical ICT Infrastructures and Platforms (CMI), Nov 25, 2021
The digital society has become ubiquitous, so are the concerns about trust and societal security.... more The digital society has become ubiquitous, so are the concerns about trust and societal security. However, despite their apparent link, studies on these phenomena remain fragmented. Consequently, the dilemma is that we have limited knowledge of how digitalisation affects trust and societal security and how to ensure these in digital societies. We address it by proposing an interdisciplinary approach that contributes to the body of knowledge by building on the socio-technical systems perspective to integrate the three concepts: societal security, trust and digital societies, to further develop a coherent framework to understand and explain their relationship. We conclude by reiterating our theoretical contribution and implications for policy and practice and future research.
2018 IEEE/ACM International Conference on Utility and Cloud Computing Companion (UCC Companion), 2018
Internet of Things (IoT) is an emerging technology that expands wireless and mobile networks into... more Internet of Things (IoT) is an emerging technology that expands wireless and mobile networks into heterogeneous network of connected devices. Trustable remote monitoring and management systems are required to establish a controlled environment for new services and devices in order to (i) improve the quality of existing services and (ii) enable novel services. However, monitoring and remote management can cause security and privacy concerns and thus affect the trust formation between customer and service provider. This paper introduces a trust model considering institutions as mediators to assess trustability of remote monitoring and management systems. The proposed model considers governance as an approach to audit remote monitoring and management systems and accordingly provides institutional assurance in form of certificate or labels in order to facilitate trust decision making and motivate trustworthy behaviors. The proposed model utilized the multi-metric method to measure governance criteria objectively and represent level of trustworthiness with A-F labels. Representing governance criteria with labels accompanied by color coding facilitates trust decision making based on application context or requirements for everyone regardless of level of expertise. Meanwhile, issuing trustworthiness certificate or A-F labels will encourage service providers to improve trustability of their remote monitoring and management approaches, which improve acceptability and efficiency of managed services.
Nordic and Baltic Journal of Information and Communications Technologies, 2018
The Digital Divide is one of the key challenges for mankind. Despite attempts to digitally includ... more The Digital Divide is one of the key challenges for mankind. Despite attempts to digitally include people, the divide is bigger than ever. This contribution [1] to a sustainable future promotes "Internet lite" as the new paradigm for providing everyone with the opportunity to participate in the digital society. The current paper first addresses the reasons for the digital divide, thereafter addresses free access to information as catalyst for the sustainable development goals (SDGs) and provides the path towards "Internet lite for all".
2019 International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
The growing number of Wi-Fi networks at homes, buildings and public areas can consume excessive e... more The growing number of Wi-Fi networks at homes, buildings and public areas can consume excessive energy and therefore increase CO2 emissions. Hence, the aim of this paper is to investigate the energy consumption of Wi-Fi networks in general. This study is based on real-world observations both usage and energy consumption of Wi-Fi access points. A variety of off-the-shelf Wi-Fi access points were examined to investigate to what degree clients' usage patterns, especially the signal to noise ratio (SNR) affects the energy consumption. The results indicate that low SNR increases the energy consumption up to 136% in various Wi-Fi access points. Therefore, confining clients with a low level of SNR can reduce the energy consumption of Wi-Fi access points while increases network throughput. Hence, findings of this paper can improve the energy efficiency of Wi-Fi networks in particular energy and cost efficiency of public hotspots. Index Terms-Energy efficiency; Wi-Fi networks; energy monitoring; power consumption; green computing.
The Fifth International Conference on Mobile Services, Resources, and Users (MOBILITY 2015), held... more The Fifth International Conference on Mobile Services, Resources, and Users (MOBILITY 2015), held between June 21-26, 2015, in Brussels, Belgium, continued a series of events dedicated to mobility- at-large, dealing with challenges raised by mobile services and applications considering user, device and service mobility. Users increasingly rely on devices in different mobile scenarios and situations. "Everything is mobile", and mobility is now ubiquitous. Services are supported in mobile environments, through smart devices and enabling software. While there are well known mobile services, the extension to mobile communities and on-demand mobility requires appropriate mobile radios, middleware and interfacing. Mobility management becomes more complex, but is essential for every business. Mobile wireless communications, including vehicular technologies bring new requirements for ad hoc networking, topology control and interface standardization. We take here the opportunity to warmly thank all the members of the MOBILITY 2015 Technical Program Committee, as well as the numerous reviewers. The creation of such a broad and high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to MOBILITY 2015. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions. Also, this event could not have been a reality without the support of many individuals, organizations, and sponsors. We are grateful to the members of the MOBILITY 2015 organizing committee for their help in handling the logistics and for their work to make this professional meeting a success. We hope that MOBILITY 2015 was a successful international forum for the exchange of ideas and results between academia and industry and for the promotion of progress in the areas of mobile services, resources and users. We are convinced that the participants found the event useful and communications very open. We hope that Brussels, Belgium, provided a pleasant environment during the conference and everyone saved some time to enjoy the charm of the city.
Digital Inequalities in the Global South, 2020
This chapter aims at documenting how digital divide determinants are affecting the ability of dig... more This chapter aims at documenting how digital divide determinants are affecting the ability of digital infrastructure to be used as a platform for health information and education in Sub-Saharan Africa. More specifically, the chapter draws from case studies in Madagascar, Niger, Cote d’Ivoire, Senegal, and Tanzania, and we showcase the best praxis on how digital technologies are used to improve learning and health information usage. Some tested experiments have been successful but rarely scaled up, depriving part of the population—the poorest and those living in rural areas who “consume” few public resources—from opportunities to access improved education and health services. Along with the aforementioned challenges, we identify a need for the key performance indicators (KPIs) related to digital inclusion projects in Global South.
This paper analyzes economical and technological aspects for service provisioning on varying netw... more This paper analyzes economical and technological aspects for service provisioning on varying networks. Though mobile networks are continuously evolving, the use of mobile broadband is and will be limited. Availability and affordability are two aspects, which are addressed in this paper through the introduction of basic information and low capacity (LC) services. The paper addresses how information provisioning and network-aware applications work together to achieve a digital society including everyone, rather than enhancing the digital gap. Initiatives like Facebook’s Free Basic and the Basic Internet Foundation and their approaches on LC-service and information provisioning are addressed. The second focus is on a proactive approach for mobile applications (apps), adjusting to the network capacity and bandwidth limitations. The main results are recommendations towards a low-capacity Internet for everyone, supported by examples of LC-service provisioning, as well as network-aware app...
The Basic Internet Foundation aims at optimized content delivery for capacity-limited networks, a... more The Basic Internet Foundation aims at optimized content delivery for capacity-limited networks, and thus provides free access to basic information to everyone. In this paper we describe the main technological challenges of the content delivery, being the concept of information, the remote administration of access points and the inclusion of Internet of Things (IoT) information. Basic Internet aims at offering free access to information on low capacity Internet lines to people lacking Internet coverage or the ability to pay for mobile data. The main contributions of this paper are solutions that the foundation as well as other programs or companies have addressed encouraging digital development and inclusion. Keywords–Internet; foundation; broadband; devices; network; information; developing economies.
Privacy is currently in distress and in need of rescue, much like princesses in the all-familiar ... more Privacy is currently in distress and in need of rescue, much like princesses in the all-familiar fairytales. We employ storytelling and metaphors from fairytales to make reader-friendly and streamline our arguments about how a complex concept of Privacy Labeling (the ‘knight in shining armor’) can be a solution to the current state of Privacy (the ‘princess in distress’). We give a precise definition of Privacy Labeling (PL), painting a panoptic portrait from seven different perspectives (the ‘seven helpers’): Business, Legal, Regulatory, Usability and Human Factors, Educative, Technological, and Multidisciplinary. We describe a common vision, proposing several important ‘traits of character’ of PL as well as identifying ‘undeveloped potentialities’, i.e., open problems on which the community can focus. More specifically, this position paper identifies the stakeholders of the PL and their needs with regard to privacy, describing how PL should be and look like in order to address the...
JMIR mHealth and uHealth, Jan 14, 2018
The increasing prevalence of gestational diabetes mellitus (GDM) among women of different ethnic ... more The increasing prevalence of gestational diabetes mellitus (GDM) among women of different ethnic backgrounds provides new challenges for health care professionals, who often find it difficult to provide information about the management of this disease to such individuals. Mobile health (mHealth) may act as a useful tool for blood sugar control and care process enhancement. However, little is known about health care professionals' experiences and attitudes toward the use of mHealth for women with GDM. The aim of this study was to explore how health care professionals perceived the provision of care to pregnant women who managed their GDM using the culture-sensitive Pregnant+ app in a randomized controlled trial. Individual interviews with 9 health care professionals providing care for women with GDM were conducted. Braun and Clark's method of thematic content analysis inspired the analysis. This study included health care professionals who were primarily responsible for provi...
BMC Pregnancy and Childbirth
Background Intimate partner violence (IPV) during pregnancy is a global health problem with adver... more Background Intimate partner violence (IPV) during pregnancy is a global health problem with adverse consequences for mothers, infants and families. We hypothesise that information about IPV and safety behaviours during pregnancy has the potential to increase quality of life and the use of safety behaviours and prevent IPV. Methods A multicentre randomised controlled trial among culturally diverse pregnant women in Norway, to test the effect of a tablet-based video intervention about IPV and safety behaviours. Women attending routine antenatal check-ups alone (baseline) were screened for violence (Abuse Assessment Screen) by responding to questions on a tablet, and randomised (1:1) by computer to receive an intervention or a control video. The intervention video presented information about IPV and safety behaviours. The controls viewed a video promoting healthy pregnancy in general. Outcome measures were assessed three months post-partum: The World Health Organization Quality of Life...
Background Porcine cysticercosis is endemic in Tanzania, especially in the southern, central part... more Background Porcine cysticercosis is endemic in Tanzania, especially in the southern, central part and northern highlands of the country. The disease reduces meat quality and affects pig industry. This study investigated porcine cysticercosis prevalence and possible risk factors for reference in preparation for sustainable control measures. Methods Current seroprevalence and potential risk factors were studied in selected ward/villages of Iringa district council, in the southern highland of Tanzania, prior to a digital health education intervention. A total of 346 pigs from 88 households of Izazi, Migoli and Mlowa wards were studied using an enzyme-linked immunosorbent assay (ELISA), which detects Taenia species antigens (Ag) in sera. Questionnaire used to dig information on pig management and sanitation and hygiene practices. Results The AgELISA detected 22.3% of the surveyed pigs as positive for porcine cysticercosis. The detected porcine cysticercosis seropositivity ranged between...
African Journal of Science, Technology, Innovation and Development, 2021
on the previous events on advanced wireless technologies, wireless networking, and wireless appli... more on the previous events on advanced wireless technologies, wireless networking, and wireless applications. ICWMC 2016 addressed wireless related topics concerning integration of latest technological advances to realize mobile and ubiquitous service environments for advanced applications and services in wireless networks. Mobility and wireless, special services and lessons learnt from particular deployment complemented the traditional wireless topics. We take here the opportunity to warmly thank all the members of the ICWMC 2016 Technical Program Committee, as well as the numerous reviewers. The creation of such a high quality conference program would not have been possible without their involvement. We also kindly thank all the authors who dedicated much of their time and efforts to contribute to ICWMC 2016. We truly believe that, thanks to all these efforts, the final conference program consisted of top quality contributions. Also, this event could not have been a reality without th...
Berichte aus dem Institut für Meereskunde an der Christian-Albrechts-Universität Kiel No 143, 1996
Abstract—One of the main aspects of modern life is the interaction with sensors and other embedde... more Abstract—One of the main aspects of modern life is the interaction with sensors and other embedded systems. These systems become increasingly more integrated with daily life activities. They enable the interaction between a variety of components or parties (people, actuator, sensor, software, etc.). This interaction causes the appearance of new challenges in the design of security-related aspects of embedded systems. This paper uses the SHIELD methodology of the JU Artemis to provide Security, Privacy and Dependability (SPD) levels of embedded systems. We propose an extension of the methodology to take into consideration interactions between components, and introduce functions describing the significance of the interconnections. The complete methodology enables the composition of SPD as an add-on or as a built-in feature, and is thus applicable to an already built embedded system or to the development of embedded systems. Keywords- security composition; safety composition; component...
2018 10th International Conference on Communication Systems & Networks (COMSNETS), 2018
This paper focusses on the societal challenges related to Digital Inclusion. It revisits the 5G m... more This paper focusses on the societal challenges related to Digital Inclusion. It revisits the 5G mobile communication objectives, and states the need for digital inclusion for all. Special focus is put on the entry into the digital society, including both discussion on key performance indicators (KPIs) as well as health information as the starting point for digital development. Main focus of this paper lies on the proof of the Internet light concept of free provision of information in developing economies. Both, the results from the first pilots in The Democratic Republik of Congo (DRC), and the ongoing installations of Internet light hotspots in Tanzania support the objective of sustainable business operation with free access to information for all, thus fostering digital inclusion.
2020 International Conference on Advanced Technologies for Communications (ATC), 2020
Abstract—In the recent years, we have seen a clear trend in consumer devices being equipped with ... more Abstract—In the recent years, we have seen a clear trend in consumer devices being equipped with multiple radio interfaces such as GSM, UMTS, WiFi. These types of devices will soon be ubiquitous. Since radio frequency is a limited resource, the need for sharing and re-using a radio spectrum will be even more noticeable than before. Studies show that collaboration when allocating a radio spectrum will result in better network performance. This paper proposes a solution that identifies radio devices in a specific area. Starting from the identification of the location of possible interfering devices, better decisions can be made, prior and under spectrum allocation through cooperation. Our solution provides the location information in an overlay network without need for additional exchange of information messages. By storing the geographic location directly in the node-id, all members of the overlay network can extract the exact location of all known nodes. Using geocast, we show that ...