首页 > 最新文献

Annals of Telecommunications最新文献

英文 中文
Editorial to the special issue on AI for cybersecurity (CSNet 2024) 人工智能网络安全特刊社论(CSNet 2024)
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2026-01-03 DOI: 10.1007/s12243-025-01141-w
Hassan N. Noura, Guy Pujolle, Ola Salman, Nicolas Puech
{"title":"Editorial to the special issue on AI for cybersecurity (CSNet 2024)","authors":"Hassan N. Noura, Guy Pujolle, Ola Salman, Nicolas Puech","doi":"10.1007/s12243-025-01141-w","DOIUrl":"10.1007/s12243-025-01141-w","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"929 - 931"},"PeriodicalIF":2.2,"publicationDate":"2026-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new similarity-based classification scheme of drone network attacks 基于相似度的无人机网络攻击分类新方案
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-12-10 DOI: 10.1007/s12243-025-01139-4
Salah-Dine Maham, Guy Pujolle, Atiq Ahmed, Dominique Gaiti

The Internet of drones (IoD) paradigm is an emerging technology that has gained significant attention from the research community in the recent years. Drone networks are now widely utilized in various sectors and industries. However, like all emerging technologies, these networks face numerous challenges, with security being the most critical. The wireless nature of drone communication makes them vulnerable to a variety of cyber attacks. In addition, the limited resources of drones pose challenges in implementing effective security solutions. This paper proposes a new approach to classifying drone cyber-attacks based on their similarities. We introduce a new step-by-step framework model to classify cyber attacks. Then, we highlight the existence of commonalities between different cyber attacks that can occur in drone network systems. This classification will serve as the foundation for the development of future unified solutions capable of efficiently mitigating multiple attack types simultaneously.

无人机互联网(Internet of drones, IoD)范式是近年来备受研究界关注的新兴技术。无人机网络现已广泛应用于各个部门和行业。然而,像所有新兴技术一样,这些网络面临着许多挑战,其中安全性是最关键的。无人机通信的无线特性使它们容易受到各种网络攻击。此外,无人机有限的资源给实施有效的安全解决方案带来了挑战。本文提出了一种基于相似度的无人机网络攻击分类方法。我们引入了一个新的分步框架模型来对网络攻击进行分类。然后,我们强调了无人机网络系统中可能发生的不同网络攻击之间存在的共性。这种分类将成为未来开发能够同时有效减轻多种攻击类型的统一解决方案的基础。
{"title":"A new similarity-based classification scheme of drone network attacks","authors":"Salah-Dine Maham,&nbsp;Guy Pujolle,&nbsp;Atiq Ahmed,&nbsp;Dominique Gaiti","doi":"10.1007/s12243-025-01139-4","DOIUrl":"10.1007/s12243-025-01139-4","url":null,"abstract":"<div><p>The Internet of drones (IoD) paradigm is an emerging technology that has gained significant attention from the research community in the recent years. Drone networks are now widely utilized in various sectors and industries. However, like all emerging technologies, these networks face numerous challenges, with security being the most critical. The wireless nature of drone communication makes them vulnerable to a variety of cyber attacks. In addition, the limited resources of drones pose challenges in implementing effective security solutions. This paper proposes a new approach to classifying drone cyber-attacks based on their similarities. We introduce a new step-by-step framework model to classify cyber attacks. Then, we highlight the existence of commonalities between different cyber attacks that can occur in drone network systems. This classification will serve as the foundation for the development of future unified solutions capable of efficiently mitigating multiple attack types simultaneously.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1121 - 1141"},"PeriodicalIF":2.2,"publicationDate":"2025-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Large language models: applications, limitations, challenges, and recommendations in cybersecurity, digital forensics, and ethical hacking 大型语言模型:网络安全、数字取证和道德黑客中的应用、限制、挑战和建议
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-11-21 DOI: 10.1007/s12243-025-01134-9
Jean Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Guy Pujolle

Large Language Models (LLMs) are a significant leap in Artificial Intelligence (AI), providing tremendous capabilities for understanding and creating human-like language. LLMs offer significant advantages in automating and enhancing cybersecurity practices, but their deployment in sensitive domains like cybersecurity, ethical hacking, and digital forensics is a challenge. LLMs improve cybersecurity, digital forensics, and ethical hacking by automating processes such as reconnaissance and advanced attack simulation to confront new digital threats. This study examines LLMs’ strengths and weaknesses and proposes mitigation strategies, such as encryption, adversarial training, and strict data governance, to ensure their safe and effective integration in high-stakes situations. The results highlight the necessity of ongoing improvement, supervision, and ethical concerns to fully utilise LLM while reducing dangers and guaranteeing its appropriate deployment.

大型语言模型(llm)是人工智能(AI)的一个重大飞跃,为理解和创造类似人类的语言提供了巨大的能力。法学硕士在自动化和增强网络安全实践方面具有显著优势,但在网络安全、道德黑客和数字取证等敏感领域的部署是一个挑战。llm通过自动化侦察和高级攻击模拟等流程来应对新的数字威胁,从而改善网络安全、数字取证和道德黑客。本研究考察了法学硕士的优势和劣势,并提出了缓解策略,如加密、对抗性训练和严格的数据治理,以确保其在高风险情况下安全有效地整合。研究结果强调了持续改进、监督和道德问题的必要性,以充分利用LLM,同时减少危险并保证其适当部署。
{"title":"Large language models: applications, limitations, challenges, and recommendations in cybersecurity, digital forensics, and ethical hacking","authors":"Jean Paul A. Yaacoub,&nbsp;Hassan N. Noura,&nbsp;Ola Salman,&nbsp;Guy Pujolle","doi":"10.1007/s12243-025-01134-9","DOIUrl":"10.1007/s12243-025-01134-9","url":null,"abstract":"<div><p>Large Language Models (LLMs) are a significant leap in Artificial Intelligence (AI), providing tremendous capabilities for understanding and creating human-like language. LLMs offer significant advantages in automating and enhancing cybersecurity practices, but their deployment in sensitive domains like cybersecurity, ethical hacking, and digital forensics is a challenge. LLMs improve cybersecurity, digital forensics, and ethical hacking by automating processes such as reconnaissance and advanced attack simulation to confront new digital threats. This study examines LLMs’ strengths and weaknesses and proposes mitigation strategies, such as encryption, adversarial training, and strict data governance, to ensure their safe and effective integration in high-stakes situations. The results highlight the necessity of ongoing improvement, supervision, and ethical concerns to fully utilise LLM while reducing dangers and guaranteeing its appropriate deployment.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"933 - 973"},"PeriodicalIF":2.2,"publicationDate":"2025-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SDN-API-Sec-Fast: a performance-enhanced conflict-free blockchain-based authorization for cross-domain SDNs SDN-API-Sec-Fast:针对跨域sdn的基于区块链的性能增强无冲突授权
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-11-18 DOI: 10.1007/s12243-025-01133-w
Majd Latah, Kubra Kalkan

Software-defined networking (SDN) is a pioneering paradigm that adds a new level of management and programmability to computer networks. Despite its benefits, SDN opens the door for new attacks against the network by targeting different SDN components, especially when they need to interact with each other through application programming interfaces (APIs). In this work, we focus on protecting those APIs by proposing SDN-API-Sec-Fast, a cross-domain access control method based on the key characteristics of blockchain technology. We enhance our previous work SDN-API-Sec by introducing SDN-API-Sec-Fast, which combines conflict detection with read-only mode to achieve better performance. We investigate the performance of the blockchain side and the overall authorization process.

软件定义网络(SDN)是一种开创性的范例,它将计算机网络的管理和可编程性提高到一个新的水平。尽管SDN有诸多好处,但它也为针对不同SDN组件的新攻击打开了大门,尤其是当它们需要通过应用程序编程接口(api)相互交互时。在这项工作中,我们通过提出SDN-API-Sec-Fast来保护这些api, SDN-API-Sec-Fast是一种基于区块链技术关键特征的跨域访问控制方法。我们通过引入SDN-API-Sec- fast来增强我们之前的工作SDN-API-Sec,它将冲突检测与只读模式相结合,以获得更好的性能。我们研究区块链端的性能和整个授权过程。
{"title":"SDN-API-Sec-Fast: a performance-enhanced conflict-free blockchain-based authorization for cross-domain SDNs","authors":"Majd Latah,&nbsp;Kubra Kalkan","doi":"10.1007/s12243-025-01133-w","DOIUrl":"10.1007/s12243-025-01133-w","url":null,"abstract":"<div><p>Software-defined networking (SDN) is a pioneering paradigm that adds a new level of management and programmability to computer networks. Despite its benefits, SDN opens the door for new attacks against the network by targeting different SDN components, especially when they need to interact with each other through application programming interfaces (APIs). In this work, we focus on protecting those APIs by proposing SDN-API-Sec-Fast, a cross-domain access control method based on the key characteristics of blockchain technology. We enhance our previous work SDN-API-Sec by introducing SDN-API-Sec-Fast, which combines conflict detection with read-only mode to achieve better performance. We investigate the performance of the blockchain side and the overall authorization process.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"997 - 1014"},"PeriodicalIF":2.2,"publicationDate":"2025-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An FCM-based hybrid method for DDoS attack detection in resource-constrained devices 一种基于fcm的资源受限设备DDoS攻击检测混合方法
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-27 DOI: 10.1007/s12243-025-01130-z
Prathibha Keshavamurthy, Sarvesh Kulkarni

Smart interconnected devices belonging to the Internet of Things ecosystem are resource-constrained in terms of hardware and software. They are also prime attack targets for malicious parties. Although there has been an extensive exploration of attack detection methods rooted in machine learning, such approaches necessitate high processing overhead, which is ill-suited for devices of modest processing capabilities. Furthermore, machine learning algorithms are opaque black boxes. Therefore, we present a novel hybrid approach to detect distributed denial-of-service attacks using fuzzy cognitive maps paired with machine learning feature selection. Our approach incorporates contextual information (features) drawn from network packets. We utilize feature selection methods to compute the weights of the features. The weights capture the influence of each input feature on the target output feature that determines the classification of any packet as malicious or benign. The features and weights are used to construct a fuzzy cognitive map for each type of attack. The fuzzy cognitive map is then used to train and test the dataset. We also auto-compute a threshold value that allows our model to classify a packet as malicious or benign. Our model performs best using the weights computed by two particular statistical feature selection algorithms, namely, SelectKBest-Classification and SelectKBest Chi-squared, combined with FCM. Our experiments show that this hybrid approach is simple, reliable, and transparent with a low memory footprint, and therefore well-suited for devices with limited resources.

属于物联网生态系统的智能互联设备在硬件和软件方面都是资源受限的。它们也是恶意方的主要攻击目标。尽管人们对基于机器学习的攻击检测方法进行了广泛的探索,但这种方法需要很高的处理开销,这并不适合处理能力中等的设备。此外,机器学习算法是不透明的黑盒子。因此,我们提出了一种新的混合方法,使用模糊认知地图与机器学习特征选择相结合来检测分布式拒绝服务攻击。我们的方法结合了从网络数据包中提取的上下文信息(特征)。我们利用特征选择方法来计算特征的权重。权重捕获每个输入特征对目标输出特征的影响,确定任何数据包的分类为恶意或良性。利用特征和权值为每种攻击类型构建模糊认知图。然后使用模糊认知图来训练和测试数据集。我们还自动计算一个阈值,允许我们的模型将数据包分类为恶意或良性。我们的模型使用两种特定的统计特征选择算法(即SelectKBest- classification和SelectKBest Chi-squared)结合FCM计算的权重时表现最佳。我们的实验表明,这种混合方法简单、可靠、透明,内存占用少,因此非常适合资源有限的设备。
{"title":"An FCM-based hybrid method for DDoS attack detection in resource-constrained devices","authors":"Prathibha Keshavamurthy,&nbsp;Sarvesh Kulkarni","doi":"10.1007/s12243-025-01130-z","DOIUrl":"10.1007/s12243-025-01130-z","url":null,"abstract":"<div><p>Smart interconnected devices belonging to the Internet of Things ecosystem are resource-constrained in terms of hardware and software. They are also prime attack targets for malicious parties. Although there has been an extensive exploration of attack detection methods rooted in machine learning, such approaches necessitate high processing overhead, which is ill-suited for devices of modest processing capabilities. Furthermore, machine learning algorithms are opaque black boxes. Therefore, we present a novel hybrid approach to detect distributed denial-of-service attacks using fuzzy cognitive maps paired with machine learning feature selection. Our approach incorporates contextual information (features) drawn from network packets. We utilize feature selection methods to compute the weights of the features. The weights capture the influence of each input feature on the target output feature that determines the classification of any packet as malicious or benign. The features and weights are used to construct a fuzzy cognitive map for each type of attack. The fuzzy cognitive map is then used to train and test the dataset. We also auto-compute a threshold value that allows our model to classify a packet as malicious or benign. Our model performs best using the weights computed by two particular statistical feature selection algorithms, namely, SelectKBest-Classification and SelectKBest Chi-squared, combined with FCM. Our experiments show that this hybrid approach is simple, reliable, and transparent with a low memory footprint, and therefore well-suited for devices with limited resources.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1071 - 1094"},"PeriodicalIF":2.2,"publicationDate":"2025-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-025-01130-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced data-driven anomalies detection and diagnosis for cyber-physical energy systems 先进的数据驱动的网络物理能源系统异常检测和诊断
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-21 DOI: 10.1007/s12243-025-01123-y
Hassan N. Noura, Zaid Allal, Ola Salman, Ali Chehab

Cyber-physical energy systems (CPES) are the core components of an energy system. A CPES is characterized by a high level of complexity and uncertainty, while ensuring a more resilient and efficient distributed energy system, including robust energy security and economic viability. This work presents a novel and effective approach for anomaly detection in CPES systems using advanced tree-based machine learning models. The proposed approach is centralized with a minimal set of features that achieve a maximum detection rate and system performance. The results emphasize the effectiveness of ML methods in this domain, showcasing their ability to handle complex, high-dimensional datasets while providing interpretability and efficiency. The study also highlights associated challenges such as scalability and adversarial resilience, proposing future research directions such as hybrid models and interpretable AI for real-world deployment.

信息物理能源系统是能源系统的核心组成部分。CPES的特点是高度复杂性和不确定性,同时确保更具弹性和效率的分布式能源系统,包括强大的能源安全和经济可行性。这项工作提出了一种新颖而有效的方法,用于在CPES系统中使用先进的基于树的机器学习模型进行异常检测。所提出的方法是集中使用最小的特征集来实现最大的检测率和系统性能。结果强调了机器学习方法在该领域的有效性,展示了它们处理复杂、高维数据集的能力,同时提供了可解释性和效率。该研究还强调了相关的挑战,如可扩展性和对抗弹性,提出了未来的研究方向,如混合模型和可解释的人工智能在现实世界的部署。
{"title":"Advanced data-driven anomalies detection and diagnosis for cyber-physical energy systems","authors":"Hassan N. Noura,&nbsp;Zaid Allal,&nbsp;Ola Salman,&nbsp;Ali Chehab","doi":"10.1007/s12243-025-01123-y","DOIUrl":"10.1007/s12243-025-01123-y","url":null,"abstract":"<div><p>Cyber-physical energy systems (CPES) are the core components of an energy system. A CPES is characterized by a high level of complexity and uncertainty, while ensuring a more resilient and efficient distributed energy system, including robust energy security and economic viability. This work presents a novel and effective approach for anomaly detection in CPES systems using advanced tree-based machine learning models. The proposed approach is centralized with a minimal set of features that achieve a maximum detection rate and system performance. The results emphasize the effectiveness of ML methods in this domain, showcasing their ability to handle complex, high-dimensional datasets while providing interpretability and efficiency. The study also highlights associated challenges such as scalability and adversarial resilience, proposing future research directions such as hybrid models and interpretable AI for real-world deployment.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1159 - 1182"},"PeriodicalIF":2.2,"publicationDate":"2025-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-empowered e-ticket distribution system for secure and efficient transactions, validation, and audits 区块链授权的电子票务分发系统,用于安全高效的交易、验证和审计
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-21 DOI: 10.1007/s12243-025-01125-w
Adrián Guayasamín, Walter Fuertes, Nahir Carrera, Luis Tello-Oquendo, Valeria Suango

Secure and efficient electronic ticket (e-ticket) management in the entertainment industry is important for both the compliance of service-level agreements and the pride of those involved. Despite its numerous benefits, the ease of duplication, fraud, and illegal resale poses several issues in the industry, which can adversely impact event organizers and legitimate buyers. Furthermore, security breaches could compromise buyers’ personal and financial information. An e-ticketing system based on blockchain is implemented, mainly designed for managing raffles. This system issues e-tickets recorded in encrypted form in a blockchain with multiple blocks. The system digitally signs each ticket, links it to the buyer, records the data on-chain, and conducts draws using secure cryptographic randomness. At the end of the process, the system provides an option to download an audit chain that facilitates the validation and audit of the draws. We used the agile Scrum methodology and Java to develop the e-ticket system, implementing the blockchain with a PostgreSQL database and a custom hash function. We store each block in an unstructured JSON-type field. To optimize response times in processing the proof-of-work (PoW) blockchain, a Java socket server was implemented to manage mining pools and distribute the load among miners. We organized the load into groups by applying the K-means algorithm to historical performance data. This classification enabled the formation of efficient groups that accelerated PoW resolution, enhancing the security and performance of raffle creation, signing, and execution, particularly under increased hash difficulty. Each miner received rewards based on their contribution, fostering community participation and encouraging continuous improvement in individual performance. We evaluated the system with an average block time of 30 s and a cost of ($ )0.005, demonstrating economic viability for popular raffles with affordable ticket prices. In security tests, 10% of counterfeit tickets were successfully injected and rejected, demonstrating tamper resistance. These results confirm the feasibility of open, secure, and auditable raffles through blockchain verification, strengthening trust in public systems based on distributed technologies.

在娱乐行业中,安全和有效的电子票务管理对于服务水平协议的遵从性和相关人员的自豪感都很重要。尽管它有很多好处,但复制、欺诈和非法转售的便利性给行业带来了几个问题,这可能对活动组织者和合法买家产生不利影响。此外,安全漏洞可能会危及买家的个人和财务信息。实现了一个基于区块链的电子票务系统,主要用于彩票管理。该系统发出的电子票证以加密形式记录在带有多个块的区块链中。系统对每张票进行数字签名,将其链接到买家,在链上记录数据,并使用安全加密随机性进行抽签。在流程的最后,系统提供了一个下载审核链的选项,以方便对抽签进行验证和审核。我们使用敏捷Scrum方法和Java开发电子票务系统,使用PostgreSQL数据库和自定义散列函数实现区块链。我们将每个块存储在非结构化json类型字段中。为了优化处理工作量证明(PoW)区块链的响应时间,实现了一个Java套接字服务器来管理矿池并在矿工之间分配负载。我们通过对历史性能数据应用K-means算法将负载分组。这种分类支持形成有效的组,从而加速PoW解析,增强抽奖创建、签名和执行的安全性和性能,特别是在哈希难度增加的情况下。每位矿工根据他们的贡献获得奖励,鼓励社区参与并鼓励个人绩效的不断提高。我们对该系统进行了评估,平均阻塞时间为30秒,成本为($ ) 0.005,证明了以可承受的票价进行流行抽奖的经济可行性。在安全测试中,10% of counterfeit tickets were successfully injected and rejected, demonstrating tamper resistance. These results confirm the feasibility of open, secure, and auditable raffles through blockchain verification, strengthening trust in public systems based on distributed technologies.
{"title":"Blockchain-empowered e-ticket distribution system for secure and efficient transactions, validation, and audits","authors":"Adrián Guayasamín,&nbsp;Walter Fuertes,&nbsp;Nahir Carrera,&nbsp;Luis Tello-Oquendo,&nbsp;Valeria Suango","doi":"10.1007/s12243-025-01125-w","DOIUrl":"10.1007/s12243-025-01125-w","url":null,"abstract":"<div><p>Secure and efficient electronic ticket (e-ticket) management in the entertainment industry is important for both the compliance of service-level agreements and the pride of those involved. Despite its numerous benefits, the ease of duplication, fraud, and illegal resale poses several issues in the industry, which can adversely impact event organizers and legitimate buyers. Furthermore, security breaches could compromise buyers’ personal and financial information. An e-ticketing system based on blockchain is implemented, mainly designed for managing raffles. This system issues e-tickets recorded in encrypted form in a blockchain with multiple blocks. The system digitally signs each ticket, links it to the buyer, records the data on-chain, and conducts draws using secure cryptographic randomness. At the end of the process, the system provides an option to download an audit chain that facilitates the validation and audit of the draws. We used the agile Scrum methodology and Java to develop the e-ticket system, implementing the blockchain with a PostgreSQL database and a custom hash function. We store each block in an unstructured JSON-type field. To optimize response times in processing the proof-of-work (PoW) blockchain, a Java socket server was implemented to manage mining pools and distribute the load among miners. We organized the load into groups by applying the <i>K</i>-means algorithm to historical performance data. This classification enabled the formation of efficient groups that accelerated PoW resolution, enhancing the security and performance of raffle creation, signing, and execution, particularly under increased hash difficulty. Each miner received rewards based on their contribution, fostering community participation and encouraging continuous improvement in individual performance. We evaluated the system with an average block time of 30 s and a cost of <span>($ )</span>0.005, demonstrating economic viability for popular raffles with affordable ticket prices. In security tests, 10% of counterfeit tickets were successfully injected and rejected, demonstrating tamper resistance. These results confirm the feasibility of open, secure, and auditable raffles through blockchain verification, strengthening trust in public systems based on distributed technologies.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1195 - 1220"},"PeriodicalIF":2.2,"publicationDate":"2025-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight hybrid lattice–based session key agreement protocol for multimedia IoT 多媒体物联网的轻量级混合格会话密钥协议
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-20 DOI: 10.1007/s12243-025-01122-z
Akanksha Singh, Harish Chandra, Saurabh Rana

In this study, we introduce a quantum-resistant and lightweight authenticated key agreement protocol tailored for the Multimedia Internet of Things (MIoT) environment. MIoT devices gather and send sensitive multimedia data to cloud servers, which means that secure mutual authentication and quick session key creation are needed. To accomplish feasible lattice-based key exchange, our scheme uses a reconciliation technique and the Ring Learning With Errors (RLWE) assumption. While informal analysis demonstrates resilience to common threats like replay and impersonation, the random oracle model formally proves security. The robustness of the protocol against a variety of active attacks is confirmed through additional verification using the AVISPA tool. Further performance analysis shows that the suggested method clearly improves post-quantum security and computational efficiency when compared to current authenticated key agreement schemes, while facing slightly higher communication costs to ensure stronger security. In general, this work strengthens the provable security of smart devices enabled by the MIoT. Future research will investigate more extensive MIoT applications and energy-efficient optimizations.

在本研究中,我们介绍了一种针对多媒体物联网(MIoT)环境量身定制的抗量子轻量级认证密钥协议。物联网设备收集敏感多媒体数据并将其发送到云服务器,这意味着需要安全的相互认证和快速的会话密钥创建。为了实现可行的基于格子的密钥交换,我们的方案使用了调和技术和带错误环学习(RLWE)假设。虽然非正式分析证明了对重播和模拟等常见威胁的弹性,但随机oracle模型正式证明了安全性。通过使用AVISPA工具进行额外验证,确认了协议对各种主动攻击的鲁棒性。进一步的性能分析表明,与现有的认证密钥协议方案相比,该方法明显提高了后量子安全性和计算效率,同时面临略高的通信成本以确保更强的安全性。总的来说,这项工作加强了由工业物联网启用的智能设备的可证明的安全性。未来的研究将探讨更广泛的工业物联网应用和节能优化。
{"title":"Lightweight hybrid lattice–based session key agreement protocol for multimedia IoT","authors":"Akanksha Singh,&nbsp;Harish Chandra,&nbsp;Saurabh Rana","doi":"10.1007/s12243-025-01122-z","DOIUrl":"10.1007/s12243-025-01122-z","url":null,"abstract":"<div><p>In this study, we introduce a quantum-resistant and lightweight authenticated key agreement protocol tailored for the Multimedia Internet of Things (MIoT) environment. MIoT devices gather and send sensitive multimedia data to cloud servers, which means that secure mutual authentication and quick session key creation are needed. To accomplish feasible lattice-based key exchange, our scheme uses a reconciliation technique and the Ring Learning With Errors (RLWE) assumption. While informal analysis demonstrates resilience to common threats like replay and impersonation, the random oracle model formally proves security. The robustness of the protocol against a variety of active attacks is confirmed through additional verification using the AVISPA tool. Further performance analysis shows that the suggested method clearly improves post-quantum security and computational efficiency when compared to current authenticated key agreement schemes, while facing slightly higher communication costs to ensure stronger security. In general, this work strengthens the provable security of smart devices enabled by the MIoT. Future research will investigate more extensive MIoT applications and energy-efficient optimizations.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1033 - 1051"},"PeriodicalIF":2.2,"publicationDate":"2025-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed zero trust architecture based on policy negotiation secured by DPP in blockchain b区块链中基于DPP安全策略协商的分布式零信任体系结构
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-18 DOI: 10.1007/s12243-025-01124-x
Fatemeh Stodt, Philipp Ruf, Christoph Reich, Fabrice Theoleyre

Distributed policy negotiation is a key issue in modern manufacturing landscapes. However, existing solutions struggle with ensuring efficient policy negotiation and enforcement across entities while maintaining device authentication and trust in dynamic, cross-organizational environments. Specifically, the reliance on distributed architectures introduces challenges related to scalability, data fairness, and implementation complexity, limiting its applicability in large-scale industrial networks. This paper provides an overview of foundational concepts critical to understanding the proposed distributed policy consensus with blockchain integration: the proposed architecture leverages the decentralized and immutable nature of blockchain to achieve secure and transparent consensus among the distributed policy engines (PE), addressing challenges in policy negotiation within a distributed zero trust architecture (ZTA). The proposed methodology is applied in the context of a multinational supply chain network, involving various stakeholders such as manufacturers, suppliers, logistics providers, distributors, and retailers. The methodology provides a scalable foundation for advancing secure cross-company interactions in increasingly interconnected systems.

分布式策略协商是现代制造业环境中的一个关键问题。然而,现有的解决方案难以确保跨实体的有效策略协商和执行,同时在动态的跨组织环境中维护设备身份验证和信任。具体来说,对分布式架构的依赖带来了与可伸缩性、数据公平性和实现复杂性相关的挑战,限制了其在大规模工业网络中的适用性。本文概述了对理解具有区块链集成的拟议分布式策略共识至关重要的基本概念:拟议的体系结构利用区块链的去中心化和不可变特性在分布式策略引擎(PE)之间实现安全透明的共识,解决了分布式零信任体系结构(ZTA)中的策略协商挑战。所提出的方法应用于跨国供应链网络的背景下,涉及各种利益相关者,如制造商、供应商、物流供应商、分销商和零售商。该方法为在日益互联的系统中推进安全的跨公司交互提供了可扩展的基础。
{"title":"Distributed zero trust architecture based on policy negotiation secured by DPP in blockchain","authors":"Fatemeh Stodt,&nbsp;Philipp Ruf,&nbsp;Christoph Reich,&nbsp;Fabrice Theoleyre","doi":"10.1007/s12243-025-01124-x","DOIUrl":"10.1007/s12243-025-01124-x","url":null,"abstract":"<div><p>Distributed policy negotiation is a key issue in modern manufacturing landscapes. However, existing solutions struggle with ensuring efficient policy negotiation and enforcement across entities while maintaining device authentication and trust in dynamic, cross-organizational environments. Specifically, the reliance on distributed architectures introduces challenges related to scalability, data fairness, and implementation complexity, limiting its applicability in large-scale industrial networks. This paper provides an overview of foundational concepts critical to understanding the proposed distributed policy consensus with blockchain integration: the proposed architecture leverages the decentralized and immutable nature of blockchain to achieve secure and transparent consensus among the distributed policy engines (PE), addressing challenges in policy negotiation within a distributed zero trust architecture (ZTA). The proposed methodology is applied in the context of a multinational supply chain network, involving various stakeholders such as manufacturers, suppliers, logistics providers, distributors, and retailers. The methodology provides a scalable foundation for advancing secure cross-company interactions in increasingly interconnected systems.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1053 - 1070"},"PeriodicalIF":2.2,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bridging digital and physical realms: cross-evaluating intrusion detection models in cyber-physical systems 桥接数字和物理领域:网络物理系统中入侵检测模型的交叉评估
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-11 DOI: 10.1007/s12243-025-01119-8
Henry Chima Ukwuoma, Gilles Dusserre, Gouenou Coatrieux, Johanne Vincent, Nasir Baba-Ahmed, Stéphane Lecoeuche, Emmanuel Song Shombot

The application of digital models in industries is recently being used as a means to enhance the operational efficiency of cyber-physical systems (CPSs). However, this comes with challenges bordering mostly around the detection of cyber-attacks using replication as a means. This study considers a synthetic digital object dataset and its equivalent physical object for intrusion detection using principal component analysis (PCA) and an autoencoder for dimensionality reduction. Application of random forest and XGBoost machine learning on both objects is applied to compare the performance on the two objects. To fill a methodological gap, the study implemented the developed model on the digital object dataset and its physical object equivalent to assess intrusion detection capability. The study established that the application of the developed random forest model on the use case digital object dataset varies slightly from its physical equivalent as assessed using standard performance metrics, though revealing very good performance for both objects, which validates the digital object and its applicability in the real world.

数字模型在工业中的应用最近被用作提高网络物理系统(cps)运行效率的手段。然而,这带来的挑战主要是围绕使用复制作为手段检测网络攻击。本研究考虑了一个合成的数字对象数据集及其等效的物理对象,用于使用主成分分析(PCA)和用于降维的自编码器进行入侵检测。在两个对象上应用随机森林和XGBoost机器学习来比较两个对象上的性能。为了填补方法上的空白,该研究在数字对象数据集及其物理对象当量上实现了开发的模型,以评估入侵检测能力。该研究确定,开发的随机森林模型在用例数字对象数据集上的应用与使用标准性能指标评估的物理等效略有不同,尽管这两个对象都显示出非常好的性能,这验证了数字对象及其在现实世界中的适用性。
{"title":"Bridging digital and physical realms: cross-evaluating intrusion detection models in cyber-physical systems","authors":"Henry Chima Ukwuoma,&nbsp;Gilles Dusserre,&nbsp;Gouenou Coatrieux,&nbsp;Johanne Vincent,&nbsp;Nasir Baba-Ahmed,&nbsp;Stéphane Lecoeuche,&nbsp;Emmanuel Song Shombot","doi":"10.1007/s12243-025-01119-8","DOIUrl":"10.1007/s12243-025-01119-8","url":null,"abstract":"<div><p>The application of digital models in industries is recently being used as a means to enhance the operational efficiency of cyber-physical systems (CPSs). However, this comes with challenges bordering mostly around the detection of cyber-attacks using replication as a means. This study considers a synthetic digital object dataset and its equivalent physical object for intrusion detection using principal component analysis (PCA) and an autoencoder for dimensionality reduction. Application of random forest and XGBoost machine learning on both objects is applied to compare the performance on the two objects. To fill a methodological gap, the study implemented the developed model on the digital object dataset and its physical object equivalent to assess intrusion detection capability. The study established that the application of the developed random forest model on the use case digital object dataset varies slightly from its physical equivalent as assessed using standard performance metrics, though revealing very good performance for both objects, which validates the digital object and its applicability in the real world.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1143 - 1158"},"PeriodicalIF":2.2,"publicationDate":"2025-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Annals of Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1