Ericsson Research Blog | Page 4 of 46 | Research, insights and technology reflections

Ericsson Research Blog

Research, insights and technology reflections

LURK at the IETF 102

In our previous post, we talked about the role of IETF in shaping the future of the internet and the exciting IETF meeting Montreal will host this summer. One topic we consider important in this context is the design of cryptographic protocols with formal proofs. We believe that formal methods have an important role to play; they should be more systematically applied in standardization to prove important security properties.

One of the items we from Ericsson Research will work on during the IETF 102 is the Limited Usage of Remote Keys (LURK) protocol. Bearing in mind that formal validations are a prerequisite for high levels of security assurance, we design and develop LURK by relying on formal methods to prove security guarantees.

Read more

Building the Internet of tomorrow @ IETF 102 in Montreal!

In about two weeks, it’s time for the Internet Engineering Task Force 102 meeting in Montreal. The IETF is a large community that aims at making the internet better, and the IETF meeting is a prime opportunity to contribute to building the internet of tomorrow. Even more so since several other, related events are also taking place.

We’ve put together an overview of what will happen and how it all contributes to the internet evolution – with some extra advice to newcomers.

Read more

Test your 5G application in the Urban ICT Arena

The 5G test platform that Ericsson offers to innovators and service developers in the Urban ICT Arena (UICTA) now includes an edge cloud. Applications that need to be executed close to the end user – in other words, those that need very low latency or deal with a lot of local data – can now be tested in a real network environment. Find out more about this test environment and how it can support faster application development.

Read more

5G and eye-tracking enabling mobile VR

How do we cope with the anticipated huge demands on bandwidth and device computational power coming from high-quality virtual reality as video resolutions grow higher and higher? Researchers from Ericsson Research, the Royal Institute of Technology KTH, Stockholm, Sweden, and Tobii have demonstrated how bandwidth and device computational requirements can be dramatically reduced by using smart eye-tracking combined with low-latency 5G networks and distributed cloud. This allows network service providers to provide excellent experiences at a fraction of the network burden.

Read more

Detecting false base stations in mobile networks

3GPP standardization takes yet another step to combat false base stations. The security group in 3GPP (called SA3) identified that radio condition information received from devices – which is an integral part of all generations of mobile networks (2G/3G/4G/5G) – could contain fingerprints of false base stations. SA3 has described a solid framework based on this information, enabling mobile networks to reliably detect such false base stations. The framework complements other mechanisms introduced in 5G to protect users against false base stations, for example encrypted long-term identifiers and fresh short-term identifiers. This blog post outlines the framework and describes some practical experiments we have performed in our lab.

Read more

Machine Intelligence at the NOC

Network Operations Centers – the centralized monitoring and control stations for telecom networks – primarily deal with fault management and performance management to maintain network efficiency and customer satisfaction. The already high degree of automation in Ericsson’s NOCs is being enhanced using machine intelligence technologies – advanced analytics, deep learning, machine reasoning – to drive intelligent network operations that will enable emerging 5G systems to be highly performant while also being easy to use

Read more

QUIC – a vehicle for transport protocol evolution

The Internet is evolving from both a usage and connectivity point of view as are the underlying architecture and protocols. The quest for more responsive applications, the emergence of new security and privacy concerns and the web style of design and implementation is impacting everything from ways of working to the delivery and deployment protocols and standards. The QUIC transport protocol is a concrete example of such impact. While the IETF is working on QUIC to create a usable and deployable transport protocol ensuring the protocol evolution, 3GPP is considering using QUIC for the 5G packet core. Hence, QUIC is becoming a vehicle for transport protocol evolution and we are actively contributing to that evolution.

Read more