2019. 2nd Issue

Volume XI, Number 2

Table of contents 

Full issue  (11,7MB)



Pal Varga
Impactful Surveys for the 70th Anniversary of HTE 
The impact of a scientific achievement is hard to measure, especially in the short run. Still, human lifespan is relatively short when compared to the wide spread applications of theoretical breakthroughs – so we define ”factors” predicting the possible impact of new ideas and contributions.




Dorottya Papp, Kristóf Tamás and Levente Buttyán
IoT Hacking – A Primer 
The Internet of Things (IoT) enables many new and exciting applications, but it also creates a number of new risks related to information security. Several recent attacks on IoT devices and systems illustrate that they are notoriously insecure. It has also been shown that a major part of the attacks resulted in full adversarial control over IoT devices, and the reason for this is that IoT devices themselves are weakly protected and they often cannot resist even the most basic attacks. Penetration testing or ethical hacking of IoT devices can help discovering and fixing their vulnerabilities that, if exploited, can result in highly undesirable conditions, including damage of expensive physical equipment or even loss of human life. In this paper, we give a basic introduction into hacking IoT devices. We give an overview on the methods and tools for hardware hacking, firmware extraction and unpacking, and performing basic firmware analysis. We also provide a survey on recent research on more advanced firmware analysis methods, including static and dynamic analysis of binaries, taint analysis, fuzzing, and symbolic execution techniques. By giving an overview on both practical methods and readily available tools as well as current scientific research efforts, our work can be useful for both practitioners and academic researchers.

DOI: 10.36244/ICJ.2019.2.1


Laszlo Gyongyosi, Laszlo Bacsardi and Sandor Imre
A Survey on Quantum Key Distribution 
Quantum key distribution (QKD) protocols represent an important practical application of quantum information theory. QKD schemes enable legal parties to establish unconditionally secret communication by exploiting the fundamental attributes of quantum mechanics. Here we present an overview of QKD rotocols. We review the principles of QKD systems, the implementation basis, and the application of QKD protocols in the standard Internet and the quantum Internet.

DOI: 10.36244/ICJ.2019.2.2


Eszter Udvary
Visible Light Communication Survey 
Communication applying visible light technology is a novel approach. Visible Light Communication (VLC) development is motivated by the increasing demand for wireless communication technologies. It has the potential to provide highspeed data communication with good security and improved energy efficiency. The rapid evolution of VLC was sustained by the LEDs performances. The Light-Emitting-Diode (LED) luminaires are capable of switching to the different light intensity at a fast rate. This function can be used for data transmission. This article focuses on the physical layer of the VLC links. It reviews the technology, the topology of the proposed connection, and the benefits of this approach. The main research trends are identified emphasizing state of the art in this area. It shows how VLC technology evolved and what are the performances achieved at this time. Various structures of the transmitter and receiver are studied, and different modulation schemes are investigated. Finally, numerous applications of VLC technology are presented.

DOI: 10.36244/ICJ.2019.2.3


Sándor Rácz, Géza Szabó and József Pető
Performance Evaluation of Closed-loop Industrial Applications Over Imperfect Networks 
5G networks provide technology enablers targeting industrial applications. One key enabler is the Ultra Reliable Low Latency Communication (URLLC). This paper studies the performance impact of network delay on closed-loop control for industrial applications. We investigate the performance of the closed-loop control of an UR5 industrial robot arm assuming fix delay. The goal is to stress the system at the upper limit of the possible network delay. We prove that to achieve the maximum speed, URLLC is a must have.

DOI: 10.36244/ICJ.2019.2.4


Zoltán Jakó, Ádám Knapp and Nadim El Sayed
Wireless Authentication Solution and TTCN-3 based Test Framework for ISO-15118 Wireless V2G Communication 
Vehicle to grid (V2G) communication for electric vehicles and their charging points is already well established by the ISO 15118 standard. The standard allows vehicles to communicate with the charging station using the power cable, i.e. a wired link, but it is improved to enable wireless (WLAN) links as well. This paper aims to provide an implementation accomplishes a wireless authentication solution (WAS). With that the electric vehicles can establish V2G connection when approaching the charging pool, then identify and authenticate the driver and/or the vehicle. Furthermore, the paper presents a TTCN-3 based validation and verification (V&V) framework in order to test the conformance of the prototype implementation against the standard.

DOI: 10.36244/ICJ.2019.2.5


Gazi Zahirul Islam and Mohammod Abul Kashem
An OFDMA-based Hybrid MAC Protocol for IEEE 802.11ax 
Two types of MAC mechanisms i.e., random access and reservation could be adopted for OFDMA-based wireless LANs. Reservation-based MAC is more appropriate than random access MAC for connection-oriented applications as connectionoriented applications provide strict requirements of traffic demands. On the other hand, random access mechanism is a preferred choice for bursty traffic i.e., data packets which have no fixed pattern and rate. As OFDMA-based wireless networks promise to support heterogeneous applications, researchers assume that applications with and without traffic specifications will coexist. Eventually, OFDMA-based wireless LAN will deploy hybrid MAC mechanisms inheriting traits from random access and reservation. In this article, we design a new MAC protocol which employs one kind of hybrid mechanism that will provide high throughput of data as well as maintains improved fair access policy to the medium among the terminals. The protocol works in two steps, where at step 1 sub-channels are approximately evenly distributed to the terminals and at step 2 terminals within in a subchannel will contend for medium randomly if the total number of terminals of the system is larger than the number of sub-channels. The details of the protocol is illustrated in the paper and we analyze the performance of our OFDMA-based multi-channel hybrid protocol using comprehensive computer simulations. Simulation results validate that our proposed protocol is more robust than the conventional CSMA/CA protocol in terms of throughput, collision reduction and fair access. In addition, the theoretical analysis of the saturation throughput of the protocol is also evaluated using an existing comprehensive model.

DOI: 10.36244/ICJ.2019.2.6


Máté Nagy, János Tapolcai and Gábor Rétvári
R3D3: A Doubly Opportunistic Data Structure for Compressing and Indexing Massive Data 
Opportunistic data structures are used extensively in big data practice to break down the massive storage space requirements of processing large volumes of information. A data structure is called (singly) opportunistic if it takes advantage of the redundancy in the input in order to store it in iformationtheoretically minimum space. Yet, efficient data processing requires a separate index alongside the data, whose size often substantially exceeds that of the compressed information. In this paper, we introduce doubly opportunistic data structures to not only attain best possible compression on the input data but also on the index. We present R3D3 that encodes a bitvector of length n and Shannon entropy H0 to nH0 bits and the accompanying index to nH0(1/2 + O(log C/C)) bits, thus attaining provably minimum space (up to small error terms) on both the data and the index, and supports a rich set of queries to arbitrary position in the compressed bitvector in O(C) time when C = o(log n). Our R3D3 prototype attains several times space reduction beyond known compression techniques on a wide range of synthetic and real data sets, while it supports operations on the compressed data at comparable speed.

DOI: 10.36244/ICJ.2019.2.7


ICC 2020, Dublin, Ireland

Cognitive Infocommunications Theory and Applications



Guidelines for our Authors



Technical Co-Sponsors





National Cooperation Fund, Hungary