Blockchains have recently gained significant momentum as an emerging method for instantaneous transaction verification among businesses, public or private organizations and industries. However, the potential use of this disruptive technology spawn to each and every application that need to evolve from a centralized authorization entity acting as a trusted intermediary or sometimes a third-party verifiable trust anchor, towards a purely distributed authentication model.
A blockchain is a tamper-proof, distributed data structure that is replicated and shared among the members of a network. This data structure acts as a log whose elements (or blocks) are batched into timestamped entries, uniquely identified by a specific cryptographic hash. This hash is generated either on the block's content or its header, contains a subset of the overall transactions record made by all interconnected nodes with proper access to the system, and includes a reference to the preceding block’s hash. This method forms a link between blocks that connects them to a form of chain, the blockchain. The only slightly different block is the first block of the chain, called Genesis, which is distributed to all clients having access to the blockchain network and can be used as a "key" to the encrypted content of the blockchain. Through this process and upon certain requests towards neighboring nodes with complementary snapshots of the blockchain, each node becomes capable of parsing the entire information set stored in the overall data structure. This provides an accurate impression of the whole network on any given time.
The following figure introduces an IoT deployment which utilizes blockchain principles to enhance its overall security. A cloud deployment where all sensors and interconnected nodes have access to the Genesis block, thus being able to create immutable blocks that update the existing blockchain, makes authentication tasks conducted by the Secure Gateway straightforward. Benevolent messages could be instantly categorized as part of the affiliated blockchain by simply checking its most recent blocks. No extensive packet inspection is needed and the overall process will be rapidly concluded. Inter-cloud communication will also become much more efficient, since access to a neighbouring cloud deployment will be granted through a copy of the necessary Genesis block. Such level of transparency even allows the IoT Server of Cloud A to obtain information originating from sensor B of Cloud B, since blockchain enables trustless networks.
The fifth generation of mobile networks is rapidly evolving while mobile data services are now more popular than ever before. This is good news for mobile network operators because it means growth in average revenue per user (APRU). However, network resources are already being strained by the increase in video traffic. Video optimization refers specifically to web-based video and audio content passing through the network. Video optimization must support a wide range of "off-deck" media and content, including videos from user-generated Web sites, such as YouTube, and media files and videos from popular news and entertainment Web sites, such as CNN and BBC. 5G will bring new unique service capabilities for consumers but also for new industrial stakeholders, while 5G Systems will provide user access through transparently selecting the best performing 5G access among heterogeneous technologies like WiFi and new radio interfaces for each user.
Multimedia is content that uses a combination of different content forms such as text, audio, images, animations, video and interactive content. Multimedia contrasts with media that use only rudimentary computer displays such as text-only or traditional forms of printed or hand-produced material.
Multimedia can be recorded and played, displayed, interacted with or accessed by information content processing devices, such as computerized and electronic devices, but can also be part of a live performance. Multimedia devices are electronic media devices used to store and experience multimedia content. Multimedia is distinguished from mixed media in fine art; for example, by including audio it has a broader scope. In the early years of multimedia the term "rich media" was synonymous with interactive multimedia, and "hypermedia" was an application of multimedia.
Emerging fifth generation (5G) networks and services are being characterized by strict requirements regarding throughput gain and consumed energy. This evolution of wireless mobile networking towards higher data rates and capacity, ultra low latency and increased resilience is fueled by the rapid penetration of advanced smart mobile applications and their diverse nature in terms of quality of experience, security and ubiquity. Moreover, the foreseen increase of the connected devices in the near future and the resulted data volumes stretches the capabilities of current network deployments to satisfy the future network requirements. The 5G paradigm as it emerges in recent studies and early pilots adopts a number of technological solutions to form the building blocks of the next generation wireless mobile network architecture and address all these challenges. Specifically, the future networking environment will be characterized by highly dense heterogeneous cells. This heterogeneity is extended not only to the diverse radio access technologies that 5G networks will incorporate (i.e., 3G, 4G, 5G, etc.) but also to the different type of cells that future wireless networks will consider, including macro, pico and small cells. Cloud is already anticipated to be the cornerstone of 5G deployments and as such Cloud-RAN is considered as a key enabler for efficient base band processing in the cloud. As the future networking environment begins to materialize, it seems that the concept of cooperated small cells may provide a basis for the mobile cell architecture. Towards this end, Network Coding by incorporating either linear or non-linear coding schemes, is being considered as a key enabler for achieving the requirements for increased throughput and high resilience for wireless mobile networks.
The future networking environment will also be characterized by flows of confidential information being downloaded and uploaded and processed via trusted or un-trusted mobile small cell networks. Hence, security is rapidly emerging as a paramount concern for both mobile operators and users. In an era where cyber crime is an occurring theme in the internet highways national authorities and telecommunication stakeholders have invested heavily into preventive measures that include service denials, intrusion attacks, and false identity among others. Therefore, the 5G paradigm needs also to address a number of energy efficient secure network coding solutions.