Telekom Challenge TOP 5 Introduction Sample Post

The TOP 5 finalists of the first Telekom Challenge edition are nominated! In this article you will find a short introduction to the frontrunners from the Research Stream and the Development Stream.

RESEARCH STREAM

Hybrid Wi-Fi/LiFi network to deliver 5G services in premises
A team of experts from Fraunhofer HHI (Germany) submitted a research paper where they propose to deliver Li-Fi via power lines from the wireless router to the luminaires in the home. Furthermore, they describe how their proposal would transmit the waveform over the optical wireless link. All luminaires in one room would form a distributed wireless access point with homogeneous coverage and reduced risk of blockage. In this way, premises can be covered by a hybrid home network through which 5G services are tunneled by supporting an existing interface to the 5G core network.

Uninterruptible Smart Home Processes
A researcher from TU Berlin (Germany) applied with a research paper to solve a demanding challenge. Today’s Smart Home protocols specify the functionality and interfaces of smart devices, but they cannot represent arbitrary, complex processes defined by the user. The user relies on central systems often located in the cloud to realize such processes.  If the connection to the Internet breaks down or the involved centralized systems crash, most Smart Home processes will stop working. The research paper builds on the existing protocols and proposes a decentralized approach where the defined process descriptions are directly transferred to the devices. The devices can interpret the processes themselves via a Distributed Process Engine and thus communicate directly with the other devices.

Multi-hop IPv6 over BLE: The next go-to solution in IoT home networks 
A team of researchers from FU Berlin and HAW Hamburg (Germany)  presented a research paper which proposed a system solution that enables multi-hop IP over BLE on low-end devices, connecting them to the Internet. Their proposal explores current drawbacks in the BLE standard and fixes them. Their solution expands connectivity in common smart home scenarios without introducing new hardware or changing existing specifications but still meet current and future requirements for reliability and energy efficiency

A Wireless-Wireline Physically Converged Architecture for In-home Networks
Experts from a startup called PhyTunes from Palo Alto (United States of America) submitted a research proposal where an approach is described for a converged architecture that reuses the existing wireline infrastructure to carry wireless signals and thereby improve delivery of 5G/Wi-Fi indoors. The converged architecture provides reliable indoor data distribution transparently without needing any changes in the existing Wi-Fi and 5G networks and devices. This research can be widely applied to residential areas replacing expensive and unstable mesh systems and boosters with lower interference and higher security.

Opportunistic 5G Campus-Networks at Home 
A team of researchers from Hochschule Bonn-Rhein-Sieg and Fraunhofer FKIE (Germany) submitted a white paper which focuses on the idea of an architecture to use 5G Campus Networks at home. Since the unlicensed WiFi spectrums are overloaded they propose to use the 5G Campus Network frequencies opportunistically to create macro 5G cells as an alternative for data distribution in home networks. In their architecture, they deal with the components of a new edge device, vertical handovers between Wi-Fi and 5G, traffic steering, primary-user detection, and coordination of small cells. Finally, they consider the benefits for the end user as well as for the network operators by those concepts. 

 

DEVELOPMENT STREAM

Automatic network isolation of smart home IoT devices based on perceptual user security and privacy metrics
A team of researchers from TU Dresden (Germany) created a software implementation and edge-cloud-architecture to automatically and seamlessly secure smart home IoT networks from internal attacks such as mirai-style malware infections & malicious IoT devices. The software automatically identifies all IoT devices in the network, their corresponding security vulnerabilities and groups them into fully-isolated segments to reduce the attack surface of the network and limit the reach of malicious or infected devices.

IoTrimmer: Defending Against IoT Privacy and Security Threats
A team of experts from Imperial College London (United Kingdom) and Northeastern University in Boston (United States of America) are developing a solution to automatically monitor and block IoT devices’ non-essential network activities, and to limit their information exposure and security threats, using privacy-preserving AI techniques to build insights and personalized behavioral models. IoTrimmer components run on the home router, and can be controlled through a smartphone app, a computer or the user’s voice (It offers easy-to-use, plug and play protection). 

Edge Cloud @ Home 
A team of experts and researchers from Chocolate Cloud ApS (Denmark), which is associated with Aarhus University, and O&O Software GmbH (Germany) developed a solution for a GDPR-compliant cloud setup for home networks, that places the protection of user privacy as its number one priority. Users store the data right at home and distribute it between several cloud storage providers, thus not only giving the users more security for their data, but also to give them a choice of where and with whom to store their very personal and private data. Designed to secure data for storage and backup on site, Edge Cloud @ Home allows users to access their data anytime by its reliance on a set of independent cloud providers and locations selected by the customer.

Bitteiler: Distributed and collaborative private cloud architecture 
A team of researchers from TU Dresden (Germany) developed a demonstrator which is a sustainable solution that ‘clears the air’ for even more IoT devices without reducing the information content by seamlessly integrating recent advancements from the research fields of compression and AI. Thanks to Bitteiler’s in-network compression and coding, IoT data is made suitable for efficient transmission and storage while it also makes sure that sensitive information is difficult to decipher. Bitteiler can also easily identify malicious packets and detect anomalies.

BGU team – Green Fi
Israel leads the world in the development of online security systems and know-how. Ben-Gurion University of the Negev (BGU) is at the forefront of this battle, bringing together academic expertise, professional experience and the enthusiasm, drive and passion of our researchers and students to create an environment that encourages innovation while developing real-world solutions.