Posted by Therese Christoffersen 11147 Hits
Image showing clouds and signs
Event type: Interoperability Events
Event Technology: Multi-access Edge Computing (MEC), Network Functions Virtualisation (NFV)

In the context of the NFV Plugtests Programme, ETSI's Centre for Testing and Interoperability organized the NFV&MEC Remote API Plugtests 2021 event from 1 to 28 February 2021. The event was held remotely.


Posted by Sabine Dahmen-Lhuissier 9716 Hits
Decoration
Event type: Webinars
Event Technology: Digital Enhanced Cordless Telecommunications (DECT)

3:00 pm CET (2:00 pm UTC) to 4:15 pm CET - on ETSI BRIGHTTALK CHANNEL

This webinar will introduce the newly released ETSI standard: DECT-2020 NR. It fills a gap currently in the IoT connectivity environment; it addresses industrial applications requiring either or both massive scale (mMTC) and/or ultra-reliable low latency (URLLC), complementing today’s 5G technology. The technology enables simple deployment and very cost-efficient operation, demanded by various industries such as logistics and asset tracking, industry 4.0 and building automation as well as condition monitoring. Thanks to its ultra-reliable autonomous and automatic operation, there is no need for network infrastructure nor for a network operator. It can be deployed anywhere by anyone in no time. The standard applies modern radio technologies such as OFDM modulation, efficient channel codings and HARQ. It also has a dedicated global spectrum at around 1900 MHz, ensuring low interference levels. Wirepas has been one of the key contributors to the new standard, which builds on current Wirepas technology.

Presented by: Jussi Numminen (Vice Chair of the ETSI TC DECT and Head of RF at Wirepas), Teppo Hemiä (CEO of Wirepas)

{ "channelId": 12761, "language": "en-US", "commId": 453117, "displayMode": "standalone", "height": "auto" }

View all past and upcoming ETSI webinars on our webinar page.


Posted by Emmanuelle Boswarthick 12735 Hits

This one-day tutorial took place on Monday 21 October in ETSI and was dedicated to understanding and experiencing the use of oneM2M opensource solutions, with practical hands-on development activities.


Posted by Emmanuelle Boswarthick 18170 Hits

The ETSI IoT Workshop, taking place in ETSI premises (Sophia Antipolis, FR), will start on 22 October and end on 25 October. The workshop attendees will have the opportunity to visit the IoT Standard Showcases during the coffee and lunch breaks on 22–24 October.

The event will include an essential update on the major IoT standardization, such as those ongoing in ETSI, oneM2M, SmartM2M and 3GPP.

An essential element of deploying IoT services is the choice and the availability of IoT communication technologies such as those developed by the 3GPP partnership project (NB-IoT, LTE- M). Selecting the right IoT connectivity technologies, that are optimized for multiple IoT solutions and work at scale, is essential to ensuring futureproof and sustainable IoT deployments.

Interoperability and interworking remain key factors for a successful development of IoT. This is particularly true when it comes to ensuring the security and semantic interoperability. The standards being developed in ETSI, oneM2M and 3GPP, act as the essential “glue" between the various technologies that are present in the complex IoT ecosystem.

The workshop will cover:

IoT connectivity: 5G, NB-IoT, and more - which technology for which application, IoT for industry and manufacturing: How IoT is used to support manufacturing, production, maintenance, monitoring and distribution, and the new business models, IoT security and privacy: Exploring the specific Security and Privacy challenges for IoT, IoT semantic and ontology-based interoperability: Explaining the importance of SAREF (Smart Applications REFerence ontology), the European lead solution for intra and inter sector semantic data interoperability, AI and big data in the IoT standards, Mobile Edge Computing in the context of IoT services, and more: smart energy, smart home, buildings and environment, smart cities and communities, water management, cooperative and connected mobility, asset monitoring and management, logistics and supply chain, smart agriculture, wearables/body area networks, e-health/ageing well.

The IoT Standard Showcases will enable attendees to see and interact with real-life implementations of standard based technologies for oneM2M standard and SAREF, communication networks (e.g. 3GPP cellular 5G) applied to IoT services. 


Posted by Emmanuelle Boswarthick 7305 Hits
Event type: None

The Smart Body Area Network Workshop takes place in the Amphitheatre IRIS.


Posted by Emmanuelle Boswarthick 7385 Hits
Event type: None

The oneM2M Developer's tutorial will be presented by Mahdi Ben Alaya. 


Posted by Emmanuelle Boswarthick 8366 Hits
Event type: None

The Challenging IoT Security & Privacy workshop takes place in the Amphitheatre ATHENA.


Posted by Emmanuelle Boswarthick 8796 Hits
Event type: None

The ETSI IoT workshop takes place in the Amphitheatre ATHENA.


Posted by Sabine Dahmen-Lhuissier 13462 Hits

Scope

Cybersecurity is at the heart of the digital economy. Policy makers are taking up ambitious legislative initiatives for a secure digital economy for Europe and beyond. The industry is challenged to provide products and services which comply with such legislation. And standards are expected to play an important role in support as well. Will the policy, industrial and standardization actions succeed in making the cyber world safer?

The workshop looked at the panorama of cybersecurity, taking in the primary security issues and drivers.

This looked at the major technical issues and challenges to protecting information, infrastructure, customers, industry and assets from attack and failure. Then we reviewed the high-level drivers such as regulations, directives and mandates that help support cybersecurity. Finally, we looked at supporting vulnerability and disclosure schemes.

Target Audience

This event was of interest for those wishing to understand the latest context and direction of Cybersecurity initiatives: This will include C Level (such as CISO, CTOs), those responsible for security and involved in Standards making.


Posted by Sabine Dahmen-Lhuissier 13526 Hits
Event type: None

Scope

The principal focus of this workshop was on the cyber security aspects of network middleboxes. The term "middlebox" includes any device between user end-points other than a transparent switch. They embrace an enormous number of functional physical and virtual equipment components that exist in the complex paths typically found between communication endpoints. Middleboxes are essential to the operation of all telecommunication and ICT networks today, and large infrastructures will typically have thousands of ubiquitously deployed middleboxes. By almost any metric, middleboxes also represent perhaps the most active and innovative sector of network technology, research, and product development today with scholar research search engines displaying more than 10,000 published papers over the past decade and hundreds of new ones appearing every month. The published papers treating middlebox and transport cryptographic protocols number in the hundreds over the past three years and represent one of the most critically important developments and challenge in the cyber security field today. The workshop objective was significantly related to five new work items of the ETSI Cyber Security Technical Committee to produce a middlebox cyber security protocol (MSP).

Event Objectives

The workshop intended to:

Provide a unique global forum for significant technical papers and dialogue from industry and academia on both in-band and out-of-band secure protocols, techniques, and innovations for discovering and managing implementations of middleboxes within operator networks and virtual instantiations at data centres and their controlled, trusted visibility of encrypted traffic for cyber defence and privacy purposes. Provide related use case examples. Consider the usefulness of instantiating the protocols and techniques in publicly available technical specifications with demonstrations.

Target audience

This event was of interest to Industry and academic R&D researchers, cyber security centres of excellence, network and cloud data centre operators, enterprise network users, and public officials concerned about the challenges of cyber security and management of encrypted network traffic between hosted services and user or device end points – especially for mobile, NFV, 5G, automotive, and IoT uses.

ETSI provided free on-line public availability of all papers with persistent identifiers for widespread reference and citation.