Pub Date : 2026-01-03DOI: 10.1007/s12243-025-01141-w
Hassan N. Noura, Guy Pujolle, Ola Salman, Nicolas Puech
{"title":"Editorial to the special issue on AI for cybersecurity (CSNet 2024)","authors":"Hassan N. Noura, Guy Pujolle, Ola Salman, Nicolas Puech","doi":"10.1007/s12243-025-01141-w","DOIUrl":"10.1007/s12243-025-01141-w","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"929 - 931"},"PeriodicalIF":2.2,"publicationDate":"2026-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-10DOI: 10.1007/s12243-025-01139-4
Salah-Dine Maham, Guy Pujolle, Atiq Ahmed, Dominique Gaiti
The Internet of drones (IoD) paradigm is an emerging technology that has gained significant attention from the research community in the recent years. Drone networks are now widely utilized in various sectors and industries. However, like all emerging technologies, these networks face numerous challenges, with security being the most critical. The wireless nature of drone communication makes them vulnerable to a variety of cyber attacks. In addition, the limited resources of drones pose challenges in implementing effective security solutions. This paper proposes a new approach to classifying drone cyber-attacks based on their similarities. We introduce a new step-by-step framework model to classify cyber attacks. Then, we highlight the existence of commonalities between different cyber attacks that can occur in drone network systems. This classification will serve as the foundation for the development of future unified solutions capable of efficiently mitigating multiple attack types simultaneously.
无人机互联网(Internet of drones, IoD)范式是近年来备受研究界关注的新兴技术。无人机网络现已广泛应用于各个部门和行业。然而,像所有新兴技术一样,这些网络面临着许多挑战,其中安全性是最关键的。无人机通信的无线特性使它们容易受到各种网络攻击。此外,无人机有限的资源给实施有效的安全解决方案带来了挑战。本文提出了一种基于相似度的无人机网络攻击分类方法。我们引入了一个新的分步框架模型来对网络攻击进行分类。然后,我们强调了无人机网络系统中可能发生的不同网络攻击之间存在的共性。这种分类将成为未来开发能够同时有效减轻多种攻击类型的统一解决方案的基础。
{"title":"A new similarity-based classification scheme of drone network attacks","authors":"Salah-Dine Maham, Guy Pujolle, Atiq Ahmed, Dominique Gaiti","doi":"10.1007/s12243-025-01139-4","DOIUrl":"10.1007/s12243-025-01139-4","url":null,"abstract":"<div><p>The Internet of drones (IoD) paradigm is an emerging technology that has gained significant attention from the research community in the recent years. Drone networks are now widely utilized in various sectors and industries. However, like all emerging technologies, these networks face numerous challenges, with security being the most critical. The wireless nature of drone communication makes them vulnerable to a variety of cyber attacks. In addition, the limited resources of drones pose challenges in implementing effective security solutions. This paper proposes a new approach to classifying drone cyber-attacks based on their similarities. We introduce a new step-by-step framework model to classify cyber attacks. Then, we highlight the existence of commonalities between different cyber attacks that can occur in drone network systems. This classification will serve as the foundation for the development of future unified solutions capable of efficiently mitigating multiple attack types simultaneously.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1121 - 1141"},"PeriodicalIF":2.2,"publicationDate":"2025-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-21DOI: 10.1007/s12243-025-01134-9
Jean Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Guy Pujolle
Large Language Models (LLMs) are a significant leap in Artificial Intelligence (AI), providing tremendous capabilities for understanding and creating human-like language. LLMs offer significant advantages in automating and enhancing cybersecurity practices, but their deployment in sensitive domains like cybersecurity, ethical hacking, and digital forensics is a challenge. LLMs improve cybersecurity, digital forensics, and ethical hacking by automating processes such as reconnaissance and advanced attack simulation to confront new digital threats. This study examines LLMs’ strengths and weaknesses and proposes mitigation strategies, such as encryption, adversarial training, and strict data governance, to ensure their safe and effective integration in high-stakes situations. The results highlight the necessity of ongoing improvement, supervision, and ethical concerns to fully utilise LLM while reducing dangers and guaranteeing its appropriate deployment.
{"title":"Large language models: applications, limitations, challenges, and recommendations in cybersecurity, digital forensics, and ethical hacking","authors":"Jean Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Guy Pujolle","doi":"10.1007/s12243-025-01134-9","DOIUrl":"10.1007/s12243-025-01134-9","url":null,"abstract":"<div><p>Large Language Models (LLMs) are a significant leap in Artificial Intelligence (AI), providing tremendous capabilities for understanding and creating human-like language. LLMs offer significant advantages in automating and enhancing cybersecurity practices, but their deployment in sensitive domains like cybersecurity, ethical hacking, and digital forensics is a challenge. LLMs improve cybersecurity, digital forensics, and ethical hacking by automating processes such as reconnaissance and advanced attack simulation to confront new digital threats. This study examines LLMs’ strengths and weaknesses and proposes mitigation strategies, such as encryption, adversarial training, and strict data governance, to ensure their safe and effective integration in high-stakes situations. The results highlight the necessity of ongoing improvement, supervision, and ethical concerns to fully utilise LLM while reducing dangers and guaranteeing its appropriate deployment.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"933 - 973"},"PeriodicalIF":2.2,"publicationDate":"2025-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-18DOI: 10.1007/s12243-025-01133-w
Majd Latah, Kubra Kalkan
Software-defined networking (SDN) is a pioneering paradigm that adds a new level of management and programmability to computer networks. Despite its benefits, SDN opens the door for new attacks against the network by targeting different SDN components, especially when they need to interact with each other through application programming interfaces (APIs). In this work, we focus on protecting those APIs by proposing SDN-API-Sec-Fast, a cross-domain access control method based on the key characteristics of blockchain technology. We enhance our previous work SDN-API-Sec by introducing SDN-API-Sec-Fast, which combines conflict detection with read-only mode to achieve better performance. We investigate the performance of the blockchain side and the overall authorization process.
{"title":"SDN-API-Sec-Fast: a performance-enhanced conflict-free blockchain-based authorization for cross-domain SDNs","authors":"Majd Latah, Kubra Kalkan","doi":"10.1007/s12243-025-01133-w","DOIUrl":"10.1007/s12243-025-01133-w","url":null,"abstract":"<div><p>Software-defined networking (SDN) is a pioneering paradigm that adds a new level of management and programmability to computer networks. Despite its benefits, SDN opens the door for new attacks against the network by targeting different SDN components, especially when they need to interact with each other through application programming interfaces (APIs). In this work, we focus on protecting those APIs by proposing SDN-API-Sec-Fast, a cross-domain access control method based on the key characteristics of blockchain technology. We enhance our previous work SDN-API-Sec by introducing SDN-API-Sec-Fast, which combines conflict detection with read-only mode to achieve better performance. We investigate the performance of the blockchain side and the overall authorization process.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"997 - 1014"},"PeriodicalIF":2.2,"publicationDate":"2025-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-10-27DOI: 10.1007/s12243-025-01130-z
Prathibha Keshavamurthy, Sarvesh Kulkarni
Smart interconnected devices belonging to the Internet of Things ecosystem are resource-constrained in terms of hardware and software. They are also prime attack targets for malicious parties. Although there has been an extensive exploration of attack detection methods rooted in machine learning, such approaches necessitate high processing overhead, which is ill-suited for devices of modest processing capabilities. Furthermore, machine learning algorithms are opaque black boxes. Therefore, we present a novel hybrid approach to detect distributed denial-of-service attacks using fuzzy cognitive maps paired with machine learning feature selection. Our approach incorporates contextual information (features) drawn from network packets. We utilize feature selection methods to compute the weights of the features. The weights capture the influence of each input feature on the target output feature that determines the classification of any packet as malicious or benign. The features and weights are used to construct a fuzzy cognitive map for each type of attack. The fuzzy cognitive map is then used to train and test the dataset. We also auto-compute a threshold value that allows our model to classify a packet as malicious or benign. Our model performs best using the weights computed by two particular statistical feature selection algorithms, namely, SelectKBest-Classification and SelectKBest Chi-squared, combined with FCM. Our experiments show that this hybrid approach is simple, reliable, and transparent with a low memory footprint, and therefore well-suited for devices with limited resources.
{"title":"An FCM-based hybrid method for DDoS attack detection in resource-constrained devices","authors":"Prathibha Keshavamurthy, Sarvesh Kulkarni","doi":"10.1007/s12243-025-01130-z","DOIUrl":"10.1007/s12243-025-01130-z","url":null,"abstract":"<div><p>Smart interconnected devices belonging to the Internet of Things ecosystem are resource-constrained in terms of hardware and software. They are also prime attack targets for malicious parties. Although there has been an extensive exploration of attack detection methods rooted in machine learning, such approaches necessitate high processing overhead, which is ill-suited for devices of modest processing capabilities. Furthermore, machine learning algorithms are opaque black boxes. Therefore, we present a novel hybrid approach to detect distributed denial-of-service attacks using fuzzy cognitive maps paired with machine learning feature selection. Our approach incorporates contextual information (features) drawn from network packets. We utilize feature selection methods to compute the weights of the features. The weights capture the influence of each input feature on the target output feature that determines the classification of any packet as malicious or benign. The features and weights are used to construct a fuzzy cognitive map for each type of attack. The fuzzy cognitive map is then used to train and test the dataset. We also auto-compute a threshold value that allows our model to classify a packet as malicious or benign. Our model performs best using the weights computed by two particular statistical feature selection algorithms, namely, SelectKBest-Classification and SelectKBest Chi-squared, combined with FCM. Our experiments show that this hybrid approach is simple, reliable, and transparent with a low memory footprint, and therefore well-suited for devices with limited resources.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1071 - 1094"},"PeriodicalIF":2.2,"publicationDate":"2025-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-025-01130-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-10-21DOI: 10.1007/s12243-025-01123-y
Hassan N. Noura, Zaid Allal, Ola Salman, Ali Chehab
Cyber-physical energy systems (CPES) are the core components of an energy system. A CPES is characterized by a high level of complexity and uncertainty, while ensuring a more resilient and efficient distributed energy system, including robust energy security and economic viability. This work presents a novel and effective approach for anomaly detection in CPES systems using advanced tree-based machine learning models. The proposed approach is centralized with a minimal set of features that achieve a maximum detection rate and system performance. The results emphasize the effectiveness of ML methods in this domain, showcasing their ability to handle complex, high-dimensional datasets while providing interpretability and efficiency. The study also highlights associated challenges such as scalability and adversarial resilience, proposing future research directions such as hybrid models and interpretable AI for real-world deployment.
{"title":"Advanced data-driven anomalies detection and diagnosis for cyber-physical energy systems","authors":"Hassan N. Noura, Zaid Allal, Ola Salman, Ali Chehab","doi":"10.1007/s12243-025-01123-y","DOIUrl":"10.1007/s12243-025-01123-y","url":null,"abstract":"<div><p>Cyber-physical energy systems (CPES) are the core components of an energy system. A CPES is characterized by a high level of complexity and uncertainty, while ensuring a more resilient and efficient distributed energy system, including robust energy security and economic viability. This work presents a novel and effective approach for anomaly detection in CPES systems using advanced tree-based machine learning models. The proposed approach is centralized with a minimal set of features that achieve a maximum detection rate and system performance. The results emphasize the effectiveness of ML methods in this domain, showcasing their ability to handle complex, high-dimensional datasets while providing interpretability and efficiency. The study also highlights associated challenges such as scalability and adversarial resilience, proposing future research directions such as hybrid models and interpretable AI for real-world deployment.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1159 - 1182"},"PeriodicalIF":2.2,"publicationDate":"2025-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-10-21DOI: 10.1007/s12243-025-01125-w
Adrián Guayasamín, Walter Fuertes, Nahir Carrera, Luis Tello-Oquendo, Valeria Suango
Secure and efficient electronic ticket (e-ticket) management in the entertainment industry is important for both the compliance of service-level agreements and the pride of those involved. Despite its numerous benefits, the ease of duplication, fraud, and illegal resale poses several issues in the industry, which can adversely impact event organizers and legitimate buyers. Furthermore, security breaches could compromise buyers’ personal and financial information. An e-ticketing system based on blockchain is implemented, mainly designed for managing raffles. This system issues e-tickets recorded in encrypted form in a blockchain with multiple blocks. The system digitally signs each ticket, links it to the buyer, records the data on-chain, and conducts draws using secure cryptographic randomness. At the end of the process, the system provides an option to download an audit chain that facilitates the validation and audit of the draws. We used the agile Scrum methodology and Java to develop the e-ticket system, implementing the blockchain with a PostgreSQL database and a custom hash function. We store each block in an unstructured JSON-type field. To optimize response times in processing the proof-of-work (PoW) blockchain, a Java socket server was implemented to manage mining pools and distribute the load among miners. We organized the load into groups by applying the K-means algorithm to historical performance data. This classification enabled the formation of efficient groups that accelerated PoW resolution, enhancing the security and performance of raffle creation, signing, and execution, particularly under increased hash difficulty. Each miner received rewards based on their contribution, fostering community participation and encouraging continuous improvement in individual performance. We evaluated the system with an average block time of 30 s and a cost of ($ )0.005, demonstrating economic viability for popular raffles with affordable ticket prices. In security tests, 10% of counterfeit tickets were successfully injected and rejected, demonstrating tamper resistance. These results confirm the feasibility of open, secure, and auditable raffles through blockchain verification, strengthening trust in public systems based on distributed technologies.
在娱乐行业中,安全和有效的电子票务管理对于服务水平协议的遵从性和相关人员的自豪感都很重要。尽管它有很多好处,但复制、欺诈和非法转售的便利性给行业带来了几个问题,这可能对活动组织者和合法买家产生不利影响。此外,安全漏洞可能会危及买家的个人和财务信息。实现了一个基于区块链的电子票务系统,主要用于彩票管理。该系统发出的电子票证以加密形式记录在带有多个块的区块链中。系统对每张票进行数字签名,将其链接到买家,在链上记录数据,并使用安全加密随机性进行抽签。在流程的最后,系统提供了一个下载审核链的选项,以方便对抽签进行验证和审核。我们使用敏捷Scrum方法和Java开发电子票务系统,使用PostgreSQL数据库和自定义散列函数实现区块链。我们将每个块存储在非结构化json类型字段中。为了优化处理工作量证明(PoW)区块链的响应时间,实现了一个Java套接字服务器来管理矿池并在矿工之间分配负载。我们通过对历史性能数据应用K-means算法将负载分组。这种分类支持形成有效的组,从而加速PoW解析,增强抽奖创建、签名和执行的安全性和性能,特别是在哈希难度增加的情况下。每位矿工根据他们的贡献获得奖励,鼓励社区参与并鼓励个人绩效的不断提高。我们对该系统进行了评估,平均阻塞时间为30秒,成本为($ ) 0.005,证明了以可承受的票价进行流行抽奖的经济可行性。在安全测试中,10% of counterfeit tickets were successfully injected and rejected, demonstrating tamper resistance. These results confirm the feasibility of open, secure, and auditable raffles through blockchain verification, strengthening trust in public systems based on distributed technologies.
{"title":"Blockchain-empowered e-ticket distribution system for secure and efficient transactions, validation, and audits","authors":"Adrián Guayasamín, Walter Fuertes, Nahir Carrera, Luis Tello-Oquendo, Valeria Suango","doi":"10.1007/s12243-025-01125-w","DOIUrl":"10.1007/s12243-025-01125-w","url":null,"abstract":"<div><p>Secure and efficient electronic ticket (e-ticket) management in the entertainment industry is important for both the compliance of service-level agreements and the pride of those involved. Despite its numerous benefits, the ease of duplication, fraud, and illegal resale poses several issues in the industry, which can adversely impact event organizers and legitimate buyers. Furthermore, security breaches could compromise buyers’ personal and financial information. An e-ticketing system based on blockchain is implemented, mainly designed for managing raffles. This system issues e-tickets recorded in encrypted form in a blockchain with multiple blocks. The system digitally signs each ticket, links it to the buyer, records the data on-chain, and conducts draws using secure cryptographic randomness. At the end of the process, the system provides an option to download an audit chain that facilitates the validation and audit of the draws. We used the agile Scrum methodology and Java to develop the e-ticket system, implementing the blockchain with a PostgreSQL database and a custom hash function. We store each block in an unstructured JSON-type field. To optimize response times in processing the proof-of-work (PoW) blockchain, a Java socket server was implemented to manage mining pools and distribute the load among miners. We organized the load into groups by applying the <i>K</i>-means algorithm to historical performance data. This classification enabled the formation of efficient groups that accelerated PoW resolution, enhancing the security and performance of raffle creation, signing, and execution, particularly under increased hash difficulty. Each miner received rewards based on their contribution, fostering community participation and encouraging continuous improvement in individual performance. We evaluated the system with an average block time of 30 s and a cost of <span>($ )</span>0.005, demonstrating economic viability for popular raffles with affordable ticket prices. In security tests, 10% of counterfeit tickets were successfully injected and rejected, demonstrating tamper resistance. These results confirm the feasibility of open, secure, and auditable raffles through blockchain verification, strengthening trust in public systems based on distributed technologies.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1195 - 1220"},"PeriodicalIF":2.2,"publicationDate":"2025-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-10-20DOI: 10.1007/s12243-025-01122-z
Akanksha Singh, Harish Chandra, Saurabh Rana
In this study, we introduce a quantum-resistant and lightweight authenticated key agreement protocol tailored for the Multimedia Internet of Things (MIoT) environment. MIoT devices gather and send sensitive multimedia data to cloud servers, which means that secure mutual authentication and quick session key creation are needed. To accomplish feasible lattice-based key exchange, our scheme uses a reconciliation technique and the Ring Learning With Errors (RLWE) assumption. While informal analysis demonstrates resilience to common threats like replay and impersonation, the random oracle model formally proves security. The robustness of the protocol against a variety of active attacks is confirmed through additional verification using the AVISPA tool. Further performance analysis shows that the suggested method clearly improves post-quantum security and computational efficiency when compared to current authenticated key agreement schemes, while facing slightly higher communication costs to ensure stronger security. In general, this work strengthens the provable security of smart devices enabled by the MIoT. Future research will investigate more extensive MIoT applications and energy-efficient optimizations.
{"title":"Lightweight hybrid lattice–based session key agreement protocol for multimedia IoT","authors":"Akanksha Singh, Harish Chandra, Saurabh Rana","doi":"10.1007/s12243-025-01122-z","DOIUrl":"10.1007/s12243-025-01122-z","url":null,"abstract":"<div><p>In this study, we introduce a quantum-resistant and lightweight authenticated key agreement protocol tailored for the Multimedia Internet of Things (MIoT) environment. MIoT devices gather and send sensitive multimedia data to cloud servers, which means that secure mutual authentication and quick session key creation are needed. To accomplish feasible lattice-based key exchange, our scheme uses a reconciliation technique and the Ring Learning With Errors (RLWE) assumption. While informal analysis demonstrates resilience to common threats like replay and impersonation, the random oracle model formally proves security. The robustness of the protocol against a variety of active attacks is confirmed through additional verification using the AVISPA tool. Further performance analysis shows that the suggested method clearly improves post-quantum security and computational efficiency when compared to current authenticated key agreement schemes, while facing slightly higher communication costs to ensure stronger security. In general, this work strengthens the provable security of smart devices enabled by the MIoT. Future research will investigate more extensive MIoT applications and energy-efficient optimizations.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1033 - 1051"},"PeriodicalIF":2.2,"publicationDate":"2025-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-10-18DOI: 10.1007/s12243-025-01124-x
Fatemeh Stodt, Philipp Ruf, Christoph Reich, Fabrice Theoleyre
Distributed policy negotiation is a key issue in modern manufacturing landscapes. However, existing solutions struggle with ensuring efficient policy negotiation and enforcement across entities while maintaining device authentication and trust in dynamic, cross-organizational environments. Specifically, the reliance on distributed architectures introduces challenges related to scalability, data fairness, and implementation complexity, limiting its applicability in large-scale industrial networks. This paper provides an overview of foundational concepts critical to understanding the proposed distributed policy consensus with blockchain integration: the proposed architecture leverages the decentralized and immutable nature of blockchain to achieve secure and transparent consensus among the distributed policy engines (PE), addressing challenges in policy negotiation within a distributed zero trust architecture (ZTA). The proposed methodology is applied in the context of a multinational supply chain network, involving various stakeholders such as manufacturers, suppliers, logistics providers, distributors, and retailers. The methodology provides a scalable foundation for advancing secure cross-company interactions in increasingly interconnected systems.
{"title":"Distributed zero trust architecture based on policy negotiation secured by DPP in blockchain","authors":"Fatemeh Stodt, Philipp Ruf, Christoph Reich, Fabrice Theoleyre","doi":"10.1007/s12243-025-01124-x","DOIUrl":"10.1007/s12243-025-01124-x","url":null,"abstract":"<div><p>Distributed policy negotiation is a key issue in modern manufacturing landscapes. However, existing solutions struggle with ensuring efficient policy negotiation and enforcement across entities while maintaining device authentication and trust in dynamic, cross-organizational environments. Specifically, the reliance on distributed architectures introduces challenges related to scalability, data fairness, and implementation complexity, limiting its applicability in large-scale industrial networks. This paper provides an overview of foundational concepts critical to understanding the proposed distributed policy consensus with blockchain integration: the proposed architecture leverages the decentralized and immutable nature of blockchain to achieve secure and transparent consensus among the distributed policy engines (PE), addressing challenges in policy negotiation within a distributed zero trust architecture (ZTA). The proposed methodology is applied in the context of a multinational supply chain network, involving various stakeholders such as manufacturers, suppliers, logistics providers, distributors, and retailers. The methodology provides a scalable foundation for advancing secure cross-company interactions in increasingly interconnected systems.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1053 - 1070"},"PeriodicalIF":2.2,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-10-11DOI: 10.1007/s12243-025-01119-8
Henry Chima Ukwuoma, Gilles Dusserre, Gouenou Coatrieux, Johanne Vincent, Nasir Baba-Ahmed, Stéphane Lecoeuche, Emmanuel Song Shombot
The application of digital models in industries is recently being used as a means to enhance the operational efficiency of cyber-physical systems (CPSs). However, this comes with challenges bordering mostly around the detection of cyber-attacks using replication as a means. This study considers a synthetic digital object dataset and its equivalent physical object for intrusion detection using principal component analysis (PCA) and an autoencoder for dimensionality reduction. Application of random forest and XGBoost machine learning on both objects is applied to compare the performance on the two objects. To fill a methodological gap, the study implemented the developed model on the digital object dataset and its physical object equivalent to assess intrusion detection capability. The study established that the application of the developed random forest model on the use case digital object dataset varies slightly from its physical equivalent as assessed using standard performance metrics, though revealing very good performance for both objects, which validates the digital object and its applicability in the real world.
{"title":"Bridging digital and physical realms: cross-evaluating intrusion detection models in cyber-physical systems","authors":"Henry Chima Ukwuoma, Gilles Dusserre, Gouenou Coatrieux, Johanne Vincent, Nasir Baba-Ahmed, Stéphane Lecoeuche, Emmanuel Song Shombot","doi":"10.1007/s12243-025-01119-8","DOIUrl":"10.1007/s12243-025-01119-8","url":null,"abstract":"<div><p>The application of digital models in industries is recently being used as a means to enhance the operational efficiency of cyber-physical systems (CPSs). However, this comes with challenges bordering mostly around the detection of cyber-attacks using replication as a means. This study considers a synthetic digital object dataset and its equivalent physical object for intrusion detection using principal component analysis (PCA) and an autoencoder for dimensionality reduction. Application of random forest and XGBoost machine learning on both objects is applied to compare the performance on the two objects. To fill a methodological gap, the study implemented the developed model on the digital object dataset and its physical object equivalent to assess intrusion detection capability. The study established that the application of the developed random forest model on the use case digital object dataset varies slightly from its physical equivalent as assessed using standard performance metrics, though revealing very good performance for both objects, which validates the digital object and its applicability in the real world.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1143 - 1158"},"PeriodicalIF":2.2,"publicationDate":"2025-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}