Journal of ICT Standardization
https://journals.riverpublishers.com/index.php/JICTS
<div class="JL3"> <div class="journalboxline"> <div class="JL3"> <div class="journalboxline"> <p><img src="https://journals.riverpublishers.com/public/site/images/wendym/jict-small.jpg" alt="" width="250" height="333" align="left" hspace="10"></p> <h1>Journal of ICT Standardization</h1> <p>The aims of this journal is to publish standardized as well as related work making "standards" accessible to a wide public - from practitioners to new comers. The journal aims at publishing in-depth as well as overview work including papers discussing standardization process and those helping new comers to understand how standards work.</p> <p> </p> <p> </p> <p> </p> <p> </p> </div> </div> </div> </div> <p> </p>RIVER Publishersen-USJournal of ICT Standardization2245-800XTrustworthy Local Breakout
https://journals.riverpublishers.com/index.php/JICTS/article/view/30109
<p>The newer generations of mobile networks (e.g., fifth generation) provide increasingly lower latencies in the home operator’s (HO’s) network, and there is similar expectation from subscribers while roaming. Moreover, regulations, like the EU’s Roam Like At Home, mandate that the roaming subscribers receive comparable service quality without additional charge from the visited operator (VO) in the roaming country. However, the currently most widely adopted roaming approach, home routed, adds significant latency because the roaming traffic traverses all the way back to the HO, while with local breakout, the subscriber is served locally by the VO, resulting in lower latency. Yet, local breakout has not been adopted by most operators, primarily because of trust issues in tracking the data used by a roaming subscriber, which currently is only done by the VO. This paper presents a trustworthy local breakout (LBO) solution that addresses the trust issue by having both the roaming user equipment and the VO keep record of data usage, thus leveraging their opposing incentives to keep both parties accurate. In addition, the solution streamlines the 5G registration process by enabling authentication and authorization directly with the VO, thus significantly speeding up the registration. The solution utilizes verifiable credentials to record the subscriber’s usage information and for the 5G registration. The analysis demonstrates that the registration process is streamlined, and usage information is now more trustworthy compared to the current LBO.</p>Mukesh ThakurYki Kortesniemi
Copyright (c) 2026 Journal of ICT Standardization
2026-03-152026-03-151–361–3610.13052/jicts2245-800X.1411Evaluation and Application of International Standard Conversion: An Applicability-based Approach
https://journals.riverpublishers.com/index.php/JICTS/article/view/30389
<p>Bodies such as ISO, IEC, ASTM, and ITU develop international standards that help ensure interoperability, quality assurance, and similar rules across various industries worldwide. So, since the world has many different rules, technologies, cultures, and economies, these standards must be transformed and made relevant for each context. The review examines the main theories, methods, and approaches used to transform international standards in different countries. The review examines using comparative gap analysis, Delphi expert consensus, and MCDA, as well as following guidelines such as ISO/IEC Guide 21 and new approaches such as TRIZ. In healthcare, information security, and civil engineering, examples of the issues and ways international standards can be suitable for each sector are given. It highlights common issues, including rules, technologies, language, and resources. It proposes solutions like national applicability matrices, involvement of both the public and private sectors, capacity building, and ensuring openness. Finally, it points out that emerging technologies like AI and SMART standards can help make standard conversion easy, effective, and fair. It provides a clear roadmap for policymakers, standardization bodies, and industry stakeholders who want to bring global standardization goals in line with what is possible locally and boost sustainable development, innovation, and interoperability across the globe.</p>Jia Li
Copyright (c) 2026 Journal of ICT Standardization
2026-03-152026-03-15125–164125–16410.13052/jicts2245-800X.1415A Cross-layer Bitrate Optimization Framework for Low-bandwidth Video Transmission Using Lightweight Adaptive Encoding
https://journals.riverpublishers.com/index.php/JICTS/article/view/31293
<p>Efficient video transmission over low-bandwidth and unstable networks remains a central challenge for real-time applications such as telemedicine, remote surveillance, and edge-based video analytics. Conventional adaptive streaming approaches such as DASH and HLS operate primarily at the application layer, adjusting bitrates reactively based on buffer occupancy or short-term throughput. These strategies often fail under abrupt bandwidth fluctuations, leading to quality oscillations and excessive rebuffering. This paper proposes a cross-layer bitrate optimization framework that unifies lightweight adaptive encoding with a control-theoretic feedback loop driven by real-time network metrics. The framework jointly considers content complexity, encoder parameters, and network congestion signals to dynamically regulate bitrate across both the network and application layers. A lightweight encoder enhancement module performs perceptually guided bit allocation using saliency-aware analysis, while the control loop ensures fast convergence of target bitrate and stability against throughput variability. Extensive experiments across Wi-Fi, 4G, and simulated edge-network traces show that the proposed system achieves 30–40% bitrate reduction compared with H.264/H.265 adaptive streaming baselines, with PSNR gains up to 1.2 dB and SSIM improvements of 0.02, while reducing buffering time by over 35%. These results establish that the synergy of control-theoretic adaptation and lightweight encoding yields a scalable, low-complexity solution suitable for next-generation low-bitrate video communication systems operating on mobile and edge devices.</p>Yusen ChengTao Li
Copyright (c) 2026 Journal of ICT Standardization
2026-03-152026-03-1537–6837–6810.13052/jicts2245-800X.1412Fog Node Trust Evaluation Technology Combined with a Consensus Mechanism and its Application
https://journals.riverpublishers.com/index.php/JICTS/article/view/30993
<p>To address the issue of node trustworthiness in fog computing networks, this study proposes a fog node trust evaluation technique that integrates consensus mechanisms. This paper adopts the innovative proof of interest algorithm (PoIA) consensus mechanism to achieve lightweight verification. The core methods include formulaic reputation evaluation algorithms to quantify node behavior and economic incentives, as well as deposit mechanisms to increase attack costs. Experimental studies have shown that this technology can still maintain 93.2% availability even under high malicious node rates. After applying this technology, the throughput of the fog computing network is 985TPS, the latency is reduced to 125 ms, and the energy consumption is reduced by 26.8%. The experiment confirmed that this technology significantly improves the accuracy of malicious behavior detection and resource allocation efficiency through the collaborative innovation of dynamic reputation evaluation and PoIA lightweight consensus, providing a reliable solution for large-scale fog computing deployment.</p>Guanglei Sheng Qingtao Wu
Copyright (c) 2026 Journal of ICT Standardization
2026-03-152026-03-1569–10069–10010.13052/jicts2245-800X.1413Standardization of Power Transaction Data Interaction Protocol Based on Smart Contracts – Extended Application of IEC 62325
https://journals.riverpublishers.com/index.php/JICTS/article/view/30559
<p>In view of the problems of insufficient automation, trust dependence centralization, and real-time limitation in the IEC 62325 standard, this study proposes an extension protocol integrating blockchain and smart contract. By defining the trigger points of the three-layer contract, the standard message process is seamlessly embedded, and the automatic execution of quotation verification, transaction matching, and settlement and clearing is realized. Design parametric contract templates and extend EDM message segments (sc: contract address, data hash, digital signature) to support non-intrusive business rule injection and tamper-proof verification. A three-layer decoupling architecture (data access layer, contract execution layer, and message conversion layer) is constructed for compatible heterogeneous systems, and the XSLT engine is combined to realize the two-way mapping of EDM packets and on-chain data. Experiments based on real data in the Dutch electricity market show that the scheme reduces transaction delay by 62.5% to 45 milliseconds, increases data consistency rate to 99.1%, doubles throughput by 310 transactions per second, and sharply reduces the settlement error rate by 95.7%, effectively improving the automation level and credibility of high-frequency electricity trading.</p>Mo PingyanLu YanqianLi KaiWen YouRen Ying
Copyright (c) 2026 Journal of ICT Standardization
2026-03-152026-03-15101–124101–12410.13052/jicts2245-800X.1414