IEEE VT Wireless World Research Forum (WWRF) Journal Series - IEEE ...

1 downloads 0 Views 92KB Size Report
FROM THE GUEST EDITORS. IEEE VT Wireless World Research Forum (WWRF) Journal Series. James Womack, Amardeo Sarma, and Olaf Drögehorn.
FROM THE GUEST EDITORS

IEEE VT Wireless World Research Forum (WWRF) Journal Series € gehorn James Womack, Amardeo Sarma, and Olaf Dro

T

he Wireless World Research Forum (WWRF; www.wirelessworld-research.org) was established in 2001 to bring together industry and academic researchers to create a clear view of the future of mobile communications and of the research issues that needed to be addressed. This forum is a global organization with more than 140 members from five continents, representing all sectors of mobile communications industry and the research community, with the mission to shape a wireless future. The forum provides strategic future research directions in the wireless field to generate, identify, and promote research areas and technical trends for mobile and wireless system technologies. Members discuss how new insights will impact on the provision in typical application areas and on value chains in the future. Besides several publications at regular journals, invited talks, sessions, and panels at major conferences, the WWRF has established the following two major publication channels. Besides the Wiley WWRF Book Series, with four books being published and additional ones to come, this special issue is a part of WWRF publications in the IEEE Vehicular Technology Magazine WWRF journal series. This special issue contains a selection of papers from the 23rd WWRF meeting that was hosted by China Mobile as a three-day meeting Digital Object Identifier 10.1109/MVT.2009.935538

under the theme ‘‘Cognition and Cooperation in Mobile Internet.’’ Out of more than 60 papers presented at WWRF#23 in Beijing, 20–22 October 2009, this edition has selected seven of the best papers. They cover a wide technical range of subjects from user requirements, regulatory views, physical layer, networking, and services representing part of the

ideas as they interacted with the other users, and were monitored and interviewed as this was transpiring. Some specifics of the Seventh Framework Programme project are provided in the article ‘‘Usability of Music for Social Inclusion of Children’’ by Laakkonen et al. The Jamming Mobile application is central to the project. It allows groups of children to create sometimes

THIS SPECIAL ISSUE CONTAINS A SELECTION OF PAPERS FROM THE 23RD WWRF MEETING HOSTED BY CHINA MOBILE. scope of the WWRF. Vehicular communication for pedestrian safety and intelligent transport systems feature in two of the papers selected this year. Sørensen and Nicolajsen, in their article ‘‘Service Innovations,’’ take the well-known need for service providers to continuously generate new ideas to attract and excite potential users. They develop a framework for doing so by using the converged advanced mobile media platform and do this by involving the potential customers themselves in the process. However, there are a number of theoretical and practical issues that need to be dealt with, especially when developing ideas for rich media services. It is not a simple matter of interviewing potential users on preferences. Indeed, this article discusses the idea-generation process of people who actively used the service that interacted with other users, created new

MARCH 2010 | IEEE VEHICULAR TECHNOLOGY MAGAZINE

fairly complex music under the guidance and oversight of a teacher. This is done with devices that need to communicate with each other and display services. The requirements for the middleware between the graphical user interface (GUI) and application and the other services become involved. The authors simplify the task by splitting them into six groups, collect a number of them under each group, and then prioritize them. This leads to four middleware modules that allow for the devices to be connected and allow for the interaction of the children. In the article ‘‘User ID Routing Architecture’’ by Li et al., the authors overcome the inherent localization and identification normally implied by an Internet Protocol (IP) address and overcome them by utilizing the user identifier protocol (UIP). They take advantage of the fact that UIP allows for a user to be identified with

||| 21

and the publishing staff of the magazine for their help.

WE WOULD LIKE TO THANK ALL THE CONTRIBUTORS WHO SUBMITTED THEIR PAPERS AND ALL THE ANONYMOUS REVIEWERS AND THE WORKING GROUP CHAIRS AND VICE CHAIRS OF THE WWRF WHO HELPED US IN THE REVIEW PROCESS.

several devices, something that is becoming important as the mobile devices proliferate. They further exploit subscriber location servers and domain routers to support domain-based location queries. David and Flach introduce, in their article ‘‘CAR-2-X and Pedestrian Safety,’’ collision avoidance techniques, with the target of reducing car accidents with pedestrians and cyclists. The proposed techniques use the fact that most people will have a personal communication device available. If the phone and an approach vehicle have ad-hoc technology, the communication between the two can alert the person to a potential danger. There are alternatives of coupling location technologies and cellular services. Of course, the ability of these techniques to prevent calamity is dependent on vehicle speeds and wireless system time delays. The authors provide an extensive analysis to show when they will be effective. In another article related to vehicles and transport, Dimitrakopoulos and Demestichas present in ‘‘Intelligent Transportation Systems’’ how cognitive network principles are applied to the development of systems for more efficient and safer mobility. By allowing learning to take place in the network, inefficiencies in a transportation system may be overcome. The authors couple wireless sensor networks with cognitive systems to make this happen. They create functionality that provides valuable information to drives as well as transportation infrastructure.

22 |||

Author Information

Simulations are used to provide insights into the performance of common cryptographic standards using IP Security (IPsec) at the endpoints in 802.16 networks in the article ‘‘End-toEnd Security Protection’’ by Nazaryan et al. They determine the processing times, given the processor speeds and packet sizes for advanced encryption standard (AES), message digest 5 (MD5), 3-data encryption standard (3DES), and DES encryption standards. They conclude that AES is the best cryptographic algorithm to use with IPSec over worldwide interoperability for microwave access (WiMAX). Finally, Ismail et al., in their article ‘‘A Pragmatic Approach Space–Time Code Design,’’ use the observation that the code matrix for space–time code matrix elements are linear combinations of the symbol block and can be considered a new, higher signal constellation. The pragmatic space–time code design uses a regularly spaced signal constellation that allows for simple mapping of information bits. This technique shows promising results while offering a gain in peak-to-average power reduction. We would like to take this opportunity to thank all the contributors who submitted their papers to this special issue and to all the anonymous reviewers and the working group chairs and vice chairs of the WWRF who helped us in the review process. We hope the readership will find this issue interesting and valuable for their research and development efforts. We would also like to express our gratitude to the editor-in-chief

James Womack ([email protected]) graduated with a Ph.D. degree in electrical engineering from the University of Oklahoma in 1991. Since then, he was with Motorola, working on paging and cellular technologies, and is now with Research In Motion, where he is senior director, Advanced Technology, and is involved in research selected to have an impact on current and future 3GPP RAN standardization efforts. His interests include channel modeling, air interface technologies, and cognitive radio. Amardeo Sarma received his bachelor of technology degree from the Indian Institute of Technology, Delhi, in 1977 and his master’s degree from the Technical University of Darmstadt in 1980, both in electrical engineering. He has worked with Deutsche Telekom and EURESCOM and is now at NEC Laboratories Europe in Heidelberg. His interests are identity management, security, and car-to-car communication. He holds leading positions in standardization organizations and is currently the technical project manager of the European ICT SWIFT project within the Seventh Framework Programme of the European Union. Olaf Dr€ ogehorn (droegehorn@ uni-kassel.de) received the diploma in computer science from the Technical University of Dortmund in 1996. Since 2001, he was a senior researcher at the University of Kassel. He was an assistant professor since 2004 and received his Ph.D. degree in engineering from the University of Kassel in the same year. His current research interests include service infrastructures, service architectures as well as service composition, service modeling, and service design for next-generation networks. He is the chair of the Working Group 2 on services and service architectures of the WWRF.

IEEE VEHICULAR TECHNOLOGY MAGAZINE | MARCH 2010