329 research outputs found

    China's race to global technology leadership

    Get PDF
    ISPI. L’ISPI è un think tank indipendente dedicato allo studio delle dinamiche politiche ed economiche internazionali fondato nel 1934. È l’unico istituto italiano – e tra i pochissimi in Europa – ad affiancare all’attività di ricerca un significativo impegno nella formazione, nella convegnistica e nell’analisi dei rischi e delle opportunità a livello mondiale per le imprese e le istituzioni. L’ISPI privilegia un approccio interdisciplinare e “policy-oriented” reso possibile da un team di ricerca di oltre 50 analisti e può inoltre contare su un network internazionale di 70 università, think tank e centri di ricerca. Nella classifica redatta dall’Università di Pennsylvania, l’ISPI si è posizionato al primo posto al mondo tra i “Think Tank to Watch” nel 2019

    China's race to global technology leadership

    Get PDF
    The current trade war between the US and China looks like a small piece in a much larger puzzle over world leadership in which China plays the part of the ascending challenger seeking to upset the existing balance of power. Technology and innovation seem to be Beijing\u2019s weapons of choice in its frontal assault on Washington in sectors traditionally led by the US. China is not only acquiring technology. Its ambitions include the regulation of international trade and global governance. Just what a China-led global order would look like is still unclear, but the inherent dangers of technology need to be meticulously assessed, as they have the potential to alter the core values of modern societies. To what extent will technology facilitate China\u2019s rise

    Explaining US Cybersecurity Policy Integration Through a National Regime Lens

    Get PDF
    This research uses the Policy Regime Framework to analyze which of two policy ‎problems, US-China rivalry or IT/OT convergence, better explain degrees of coherence ‎and integration in the US cybersecurity regime. It explains how regime actors address and ‎negotiate these problems across the ICT and energy sectors. A process-tracing ‎methodology was used to track outcomes and explanatory factors, linking causal ‎mechanisms through an analysis of the Congressional record and in-depth stakeholder ‎interviews. The results indicate how the idea of Chinese ICTs as a Trojan horse for the ‎Chinese Community Party’s strategy was more effective than IT/OT convergence at ‎mobilizing interests and advancing coherent cybersecurity policy. Trade and ICT policies ‎were successfully integrated to achieve cybersecurity goals as regime interests bargained ‎to 'weaponize' critical trade interdependencies through the US competitive advantage in ‎the semiconductor industry. This research lends further validity to the Policy Regime ‎Framework in researching cross-sector-spanning policy problems in the ICT space ‎especially given recent calls for whole-of-government approaches to address emerging ‎strategic technologies.‎Ph.D

    Spectrum Sharing, Latency, and Security in 5G Networks with Application to IoT and Smart Grid

    Get PDF
    The surge of mobile devices, such as smartphones, and tables, demands additional capacity. On the other hand, Internet-of-Things (IoT) and smart grid, which connects numerous sensors, devices, and machines require ubiquitous connectivity and data security. Additionally, some use cases, such as automated manufacturing process, automated transportation, and smart grid, require latency as low as 1 ms, and reliability as high as 99.99\%. To enhance throughput and support massive connectivity, sharing of the unlicensed spectrum (3.5 GHz, 5GHz, and mmWave) is a potential solution. On the other hand, to address the latency, drastic changes in the network architecture is required. The fifth generation (5G) cellular networks will embrace the spectrum sharing and network architecture modifications to address the throughput enhancement, massive connectivity, and low latency. To utilize the unlicensed spectrum, we propose a fixed duty cycle based coexistence of LTE and WiFi, in which the duty cycle of LTE transmission can be adjusted based on the amount of data. In the second approach, a multi-arm bandit learning based coexistence of LTE and WiFi has been developed. The duty cycle of transmission and downlink power are adapted through the exploration and exploitation. This approach improves the aggregated capacity by 33\%, along with cell edge and energy efficiency enhancement. We also investigate the performance of LTE and ZigBee coexistence using smart grid as a scenario. In case of low latency, we summarize the existing works into three domains in the context of 5G networks: core, radio and caching networks. Along with this, fundamental constraints for achieving low latency are identified followed by a general overview of exemplary 5G networks. Besides that, a loop-free, low latency and local-decision based routing protocol is derived in the context of smart grid. This approach ensures low latency and reliable data communication for stationary devices. To address data security in wireless communication, we introduce a geo-location based data encryption, along with node authentication by k-nearest neighbor algorithm. In the second approach, node authentication by the support vector machine, along with public-private key management, is proposed. Both approaches ensure data security without increasing the packet overhead compared to the existing approaches

    A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions

    Get PDF
    Security has become the primary concern in many telecommunications industries today as risks can have high consequences. Especially, as the core and enable technologies will be associated with 5G network, the confidential information will move at all layers in future wireless systems. Several incidents revealed that the hazard encountered by an infected wireless network, not only affects the security and privacy concerns, but also impedes the complex dynamics of the communications ecosystem. Consequently, the complexity and strength of security attacks have increased in the recent past making the detection or prevention of sabotage a global challenge. From the security and privacy perspectives, this paper presents a comprehensive detail on the core and enabling technologies, which are used to build the 5G security model; network softwarization security, PHY (Physical) layer security and 5G privacy concerns, among others. Additionally, the paper includes discussion on security monitoring and management of 5G networks. This paper also evaluates the related security measures and standards of core 5G technologies by resorting to different standardization bodies and provide a brief overview of 5G standardization security forces. Furthermore, the key projects of international significance, in line with the security concerns of 5G and beyond are also presented. Finally, a future directions and open challenges section has included to encourage future research.European CommissionNational Research Tomsk Polytechnic UniversityUpdate citation details during checkdate report - A

    Cyber Threats and NATO 2030: Horizon Scanning and Analysis

    Get PDF
    The book includes 13 chapters that look ahead to how NATO can best address the cyber threats, as well as opportunities and challenges from emerging and disruptive technologies in the cyber domain over the next decade. The present volume addresses these conceptual and practical requirements and contributes constructively to the NATO 2030 discussions. The book is arranged in five short parts...All the chapters in this book have undergone double-blind peer review by at least two external experts.https://scholarworks.wm.edu/asbook/1038/thumbnail.jp

    Building the Future Internet through FIRE

    Get PDF
    The Internet as we know it today is the result of a continuous activity for improving network communications, end user services, computational processes and also information technology infrastructures. The Internet has become a critical infrastructure for the human-being by offering complex networking services and end-user applications that all together have transformed all aspects, mainly economical, of our lives. Recently, with the advent of new paradigms and the progress in wireless technology, sensor networks and information systems and also the inexorable shift towards everything connected paradigm, first as known as the Internet of Things and lately envisioning into the Internet of Everything, a data-driven society has been created. In a data-driven society, productivity, knowledge, and experience are dependent on increasingly open, dynamic, interdependent and complex Internet services. The challenge for the Internet of the Future design is to build robust enabling technologies, implement and deploy adaptive systems, to create business opportunities considering increasing uncertainties and emergent systemic behaviors where humans and machines seamlessly cooperate
    • …
    corecore