首页 > 最新文献

Annals of Telecommunications最新文献

英文 中文
Towards greener digital infrastructures for ICT and vertical markets 为信息通信技术和垂直市场打造更环保的数字基础设施
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-06-13 DOI: 10.1007/s12243-023-00961-y
Dominique Chiaroni, Raffaele Luca Amalfi, Jos George, Maximilian Riegel

One of the most important challenges of this century will be to minimise as much as possible the energy consumption of the worldwide digital infrastructure to have a significant contribution on our emissions of CO2 reduction since energy consumption and emission of CO2 are directly linked. Therefore, after an introduction (part 1), in part 2 of this paper, we will describe the status of the worldwide production of electricity, the contribution of information and communications technology (ICT) in terms of electricity consumption, and the identification of the critical network segments that can have a significant environmental impact. In part 3, we will focus on the data centres and core services that represent important network segments responsible for the largest emission of CO2. In part 4, we will address the access and aggregation part, which represents the second important network segment to optimise. Part 5 will focus on the home networking and enterprise. And before an estimation of the energy savings obtained when adopting the innovations proposed, the impact of the vertical market will be discussed in part 6. Finally, the conclusion (part 7) will summarise the results and perspectives will be proposed to complete the analysis.

本世纪最重要的挑战之一将是尽可能减少全球数字基础设施的能源消耗,以对我们的二氧化碳减排做出重大贡献,因为能源消耗和二氧化碳排放是直接相关的。因此,在引言(第1部分)之后,在本文的第2部分,我们将描述全球电力生产的现状,信息和通信技术在电力消耗方面的贡献,以及确定可能对环境产生重大影响的关键网络部分。在第3部分中,我们将重点关注数据中心和核心服务,它们代表了造成最大二氧化碳排放的重要网络部分。在第4部分中,我们将讨论访问和聚合部分,它代表了要优化的第二个重要网段。第5部分将侧重于家庭网络和企业。在估计采用所提出的创新所节省的能源之前,第6部分将讨论垂直市场的影响。最后,结论(第7部分)将总结结果,并提出完成分析的观点。
{"title":"Towards greener digital infrastructures for ICT and vertical markets","authors":"Dominique Chiaroni,&nbsp;Raffaele Luca Amalfi,&nbsp;Jos George,&nbsp;Maximilian Riegel","doi":"10.1007/s12243-023-00961-y","DOIUrl":"10.1007/s12243-023-00961-y","url":null,"abstract":"<div><p>One of the most important challenges of this century will be to minimise as much as possible the energy consumption of the worldwide digital infrastructure to have a significant contribution on our emissions of CO<sub>2</sub> reduction since energy consumption and emission of CO<sub>2</sub> are directly linked. Therefore, after an introduction (part 1), in part 2 of this paper, we will describe the status of the worldwide production of electricity, the contribution of information and communications technology (ICT) in terms of electricity consumption, and the identification of the critical network segments that can have a significant environmental impact. In part 3, we will focus on the data centres and core services that represent important network segments responsible for the largest emission of CO<sub>2</sub>. In part 4, we will address the access and aggregation part, which represents the second important network segment to optimise. Part 5 will focus on the home networking and enterprise. And before an estimation of the energy savings obtained when adopting the innovations proposed, the impact of the vertical market will be discussed in part 6. Finally, the conclusion (part 7) will summarise the results and perspectives will be proposed to complete the analysis.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 5-6","pages":"255 - 275"},"PeriodicalIF":1.9,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50477759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust adaptive beamforming algorithm for coherent signals based on virtual array 基于虚拟阵列的相干信号鲁棒自适应波束形成算法
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-06-12 DOI: 10.1007/s12243-023-00966-7
Yuxi Du, Weijia Cui, Fengtong Mei, Chunxiao Jian, Bin Ba

Aiming at the problem of beamforming performance degradation under the coherent signals model, this paper proposes an adaptive beamforming algorithm based on the virtual array. Compared with previous work, the creative construction of virtual arrays in this paper allows the algorithm to ensure strong coherent signal processing and superior output performance with no degradation in coherence capability. The proposed algorithm firstly constructs a virtual array symmetric to the physical array to form a virtual antenna array model; secondly, a full-rank covariance matrix is obtained by matrix reconstruction; then, the direction vector and power of the signals are estimated; finally, the estimated parameters are used to reconstruct the interference plus noise covariance matrix (INCM) and calculate the weight vector. Simulation analysis verifies the superiority of the algorithm and the validity of theoretical analysis.

针对相干信号模型下波束形成性能下降的问题,提出了一种基于虚拟阵列的自适应波束形成算法。与以往的工作相比,本文创造性地构建了虚拟阵列,使该算法能够在不降低相干能力的情况下,确保较强的相干信号处理和优越的输出性能。该算法首先构造与物理阵列对称的虚拟阵列,形成虚拟天线阵列模型;其次,通过矩阵重构得到全秩协方差矩阵;然后,估计信号的方向矢量和功率;最后,利用估计的参数重构干扰加噪声协方差矩阵(INCM)并计算权重向量。仿真分析验证了算法的优越性和理论分析的有效性。
{"title":"Robust adaptive beamforming algorithm for coherent signals based on virtual array","authors":"Yuxi Du,&nbsp;Weijia Cui,&nbsp;Fengtong Mei,&nbsp;Chunxiao Jian,&nbsp;Bin Ba","doi":"10.1007/s12243-023-00966-7","DOIUrl":"10.1007/s12243-023-00966-7","url":null,"abstract":"<div><p>Aiming at the problem of beamforming performance degradation under the coherent signals model, this paper proposes an adaptive beamforming algorithm based on the virtual array. Compared with previous work, the creative construction of virtual arrays in this paper allows the algorithm to ensure strong coherent signal processing and superior output performance with no degradation in coherence capability. The proposed algorithm firstly constructs a virtual array symmetric to the physical array to form a virtual antenna array model; secondly, a full-rank covariance matrix is obtained by matrix reconstruction; then, the direction vector and power of the signals are estimated; finally, the estimated parameters are used to reconstruct the interference plus noise covariance matrix (INCM) and calculate the weight vector. Simulation analysis verifies the superiority of the algorithm and the validity of theoretical analysis.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"641 - 651"},"PeriodicalIF":1.9,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50475666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to the special issue: 5+G network energy consumption, energy efficiency and environmental impact 特刊简介:5+G网络能耗、能效与环境影响
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-06-12 DOI: 10.1007/s12243-023-00967-6
Cédric Ware, Marceau Coupechoux, Ekram Hossain, Carmen Mas-Machuca, Vinod Sharma, Anna Tzanakaki
{"title":"Introduction to the special issue: 5+G network energy consumption, energy efficiency and environmental impact","authors":"Cédric Ware,&nbsp;Marceau Coupechoux,&nbsp;Ekram Hossain,&nbsp;Carmen Mas-Machuca,&nbsp;Vinod Sharma,&nbsp;Anna Tzanakaki","doi":"10.1007/s12243-023-00967-6","DOIUrl":"10.1007/s12243-023-00967-6","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 5-6","pages":"249 - 251"},"PeriodicalIF":1.9,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50474537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Telephony speech system performance based on the codec effect 基于编解码器效应的电话语音系统性能
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-05-31 DOI: 10.1007/s12243-023-00968-5
Mohamed Hamidi, Ouissam Zealouk, Hassan Satori

Abstract

This paper is a part of our contribution to research on the enhancement of network automatic speech recognition system performance. We built a highly configurable platform by using hidden Markov models, Gaussian mixture models, and Mel frequency spectral coefficients, in addition to VoIP G.711-u and GSM codecs. To determine the optimal values for maximum performance, different acoustic models are prepared by varying the hidden Markov models (from 3 to 5) and Gaussian mixture models (8–16-32) with 13 feature extraction coefficients. Additionally, our generated acoustic models are tested by unencoded and encoded speech data based on G.711 and GSM codecs. The best parameterization performance is obtained for 3 HMM, 8–16 GMMs, and G.711 codecs.

本文是我们对提高网络自动语音识别系统性能的研究所做贡献的一部分。我们通过使用隐马尔可夫模型、高斯混合模型和梅尔频谱系数,以及VoIP G.711-u和GSM编解码器,构建了一个高度可配置的平台。为了确定最大性能的最佳值,通过改变具有13个特征提取系数的隐马尔可夫模型(从3到5)和高斯混合模型(8-16-32)来制备不同的声学模型。此外,我们生成的声学模型通过基于G.711和GSM编解码器的未编码和编码语音数据进行了测试。对于3个HMM、8-16个GMM和G.711编解码器,获得了最佳的参数化性能。
{"title":"Telephony speech system performance based on the codec effect","authors":"Mohamed Hamidi,&nbsp;Ouissam Zealouk,&nbsp;Hassan Satori","doi":"10.1007/s12243-023-00968-5","DOIUrl":"10.1007/s12243-023-00968-5","url":null,"abstract":"<div><h2>Abstract\u0000</h2><div><p>This paper is a part of our contribution to research on the enhancement of network automatic speech recognition system performance. We built a highly configurable platform by using hidden Markov models, Gaussian mixture models, and Mel frequency spectral coefficients, in addition to VoIP G.711-u and GSM codecs. To determine the optimal values for maximum performance, different acoustic models are prepared by varying the hidden Markov models (from 3 to 5) and Gaussian mixture models (8–16-32) with 13 feature extraction coefficients. Additionally, our generated acoustic models are tested by unencoded and encoded speech data based on G.711 and GSM codecs. The best parameterization performance is obtained for 3 HMM, 8–16 GMMs, and G.711 codecs.</p></div></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"617 - 625"},"PeriodicalIF":1.9,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50529706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SHAKE-ESDRL-based energy efficient intrusion detection and hashing system 基于 SHAKE-ESDRL 的高能效入侵检测和散列系统
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-05-31 DOI: 10.1007/s12243-023-00963-w
Geo Francis E, S. Sheeja

Outstanding progress in unsolicited intrusions along with security threats, which interrupt the normal operations of wireless sensor networks (WSNs), have been attracted by the proliferation of WSNs and their applications. In WSNs, this demands an intrusion detection system (IDS), which can detect such attacks with higher detection accuracy. Designing an effective model for IDS using the SDK-LSHB-based SHAKE-ESDRL algorithm to improve accuracy and lessen training time and response time is the goal of this work. At first, duplicate removal, missing data removal, and data transfer are the steps through which the dataset was processed. From the processed data, by providing the extracted attributes as input to the entropy-based generalized discriminant analysis (E-GDA) method, the number of attributes is reduced. After that, the LogSwish-based deep reinforcement learning algorithm (LS-DRLA) method wielded the reduced attributes for intrusion detection (ID). By utilizing the SHAKE 256 algorithm, the attributes that fall into the attacked class label are hashed and stored in the hash table during this process. Next, to test the real-time data with the trained IDS, the WSN nodes are initialized. For this, by utilizing the supremum distance (SD-K-Means) algorithm, the sensor nodes (SNs) are clustered centered on the cluster heads (CHs) selected by the linear scaling-based honey badger optimization algorithm (LS-HBOA) method. At last, utilizing real-world-based datasets, the proposed algorithms are evaluated and the results are compared using statistical metrics.

随着无线传感器网络(WSN)及其应用的激增,主动入侵及其安全威胁取得了显著进展,这些威胁干扰了无线传感器网络(WSN)的正常运行。在 WSN 中,这就要求入侵检测系统(IDS)能以更高的检测精度检测出此类攻击。使用基于 SDK-LSHB 的 SHAKE-ESDRL 算法为 IDS 设计一个有效的模型,以提高准确率并减少训练时间和响应时间,是这项工作的目标。首先,对数据集进行重复删除、缺失数据删除和数据传输等处理。从处理过的数据中,通过将提取的属性作为基于熵的广义判别分析(E-GDA)方法的输入,减少了属性的数量。之后,基于 LogSwish 的深度强化学习算法(LS-DRLA)方法利用减少的属性进行入侵检测(ID)。在此过程中,通过使用 SHAKE 256 算法,对属于被攻击类别标签的属性进行哈希处理并存储在哈希表中。接下来,为了用训练有素的 IDS 测试实时数据,需要对 WSN 节点进行初始化。为此,利用超和距离(SD-K-Means)算法,以基于线性缩放的蜜獾优化算法(LS-HBOA)方法选出的簇头(CH)为中心,对传感器节点(SN)进行聚类。最后,利用基于真实世界的数据集对所提出的算法进行评估,并使用统计指标对结果进行比较。
{"title":"SHAKE-ESDRL-based energy efficient intrusion detection and hashing system","authors":"Geo Francis E,&nbsp;S. Sheeja","doi":"10.1007/s12243-023-00963-w","DOIUrl":"10.1007/s12243-023-00963-w","url":null,"abstract":"<div><p>Outstanding progress in unsolicited intrusions along with security threats, which interrupt the normal operations of wireless sensor networks (WSNs), have been attracted by the proliferation of WSNs and their applications. In WSNs, this demands an intrusion detection system (IDS), which can detect such attacks with higher detection accuracy. Designing an effective model for IDS using the SDK-LSHB-based SHAKE-ESDRL algorithm to improve accuracy and lessen training time and response time is the goal of this work. At first, duplicate removal, missing data removal, and data transfer are the steps through which the dataset was processed. From the processed data, by providing the extracted attributes as input to the entropy-based generalized discriminant analysis (E-GDA) method, the number of attributes is reduced. After that, the LogSwish-based deep reinforcement learning algorithm (LS-DRLA) method wielded the reduced attributes for intrusion detection (ID). By utilizing the SHAKE 256 algorithm, the attributes that fall into the attacked class label are hashed and stored in the hash table during this process. Next, to test the real-time data with the trained IDS, the WSN nodes are initialized. For this, by utilizing the supremum distance (SD-K-Means) algorithm, the sensor nodes (SNs) are clustered centered on the cluster heads (CHs) selected by the linear scaling-based honey badger optimization algorithm (LS-HBOA) method. At last, utilizing real-world-based datasets, the proposed algorithms are evaluated and the results are compared using statistical metrics.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 5-6","pages":"381 - 396"},"PeriodicalIF":1.8,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72509855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attribute-based encryption of LSSS access structure with expressive dynamic attributes based on consortium blockchain 基于联盟区块链的LSSS访问结构的属性加密
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-05-18 DOI: 10.1007/s12243-023-00949-8
Shengzhou Hu, Tingting Zhong, Hua He, Wenhao Li

Attribute-based encryption (ABE) allows users to encrypt and decrypt data based on attributes. It realizes fine-grained access control and can effectively solve the one-to-many encryption and decryption problem in open cloud application. Linear secret sharing scheme (LSSS) is the common access structure with a matrix on the attributes in ABE schemes, which may depict AND, OR, threshold operations, etc. However, LSSS access structure does not depict the complex and dynamic access policy of attributes, such as the complicated relationship of different attributes and the generation of dynamic attributes. It severely restricts the expansion of the practical application of ABE. Besides, there exists another problem; attribute authority (AA) in traditional ABE has a concentration of power and easily suffers from single-point failure or privacy leakage for being attacked or corrupted. Blockchain is a decentralized, tamper-free, traceable, and multi-party distributed database technology. Consortium blockchain (CB) is a partially centralized blockchain, whose openness is between the public blockchain and the private blockchain. In this paper, an ABE scheme on LSSS access structure with expressive dynamic attributes (EDA) based on CB (LSSS-EDA-ABE-CB) was proposed to resolve the above issues. EDA can construct the comprehensive attribute calculation expressions by conducting various operations, such as arithmetic operations, relational operations, and string operations. In virtue of the application of EDA, the proposed scheme can reconstruct new composite attributes to realize the dynamic adjustment of attributes. A partitioning method of EDA avoids one attribute appearing in two different EDA expressions. The CB technology enhanced the authority and trustworthiness of AA by openly recording AA’s attribute key distributions in CB transactions. The scheme in the paper was proven CPA-secure under the decision q-PBDHE assumption in standard model in the CB application environment. The scheme provides a more general data access policy and maintains the fine-grained character of ABE simultaneously. Finally, the security and performance analysis shows that the proposed scheme is secure and highly efficient.

基于属性的加密(ABE)允许用户根据属性对数据进行加密和解密。它实现了细粒度的访问控制,可以有效地解决开放云应用中的一对多加密解密问题。线性秘密共享方案(LSSS)是ABE方案中常见的在属性上有矩阵的访问结构,可以描述AND、OR、阈值运算等。然而,LSSS访问结构并没有描述属性的复杂动态访问策略,例如不同属性之间的复杂关系和动态属性的生成。这严重制约了ABE实际应用的拓展。此外,还存在另一个问题;传统ABE中的属性权威(AA)具有权力集中性,容易遭受单点故障或隐私泄露的攻击或破坏。区块链是一种去中心化、无篡改、可追溯和多方分布式数据库技术。联盟区块链(CB)是一种部分集中的区块链,其开放性介于公共区块链和私有区块链之间。针对上述问题,本文提出了一种基于CB的具有表达动态属性的LSSS访问结构(EDA)的ABE方案(LSSS-EDA-ABE-CB)。EDA可以通过进行算术运算、关系运算和字符串运算等各种运算来构造综合属性计算表达式。借助EDA的应用,该方案可以重构新的复合属性,实现属性的动态调整。EDA的一种划分方法避免了一个属性出现在两个不同的EDA表达式中。CB技术通过公开记录AA在CB交易中的属性密钥分布,增强了AA的权威性和可信度。在CB应用环境中,在标准模型的决策q-PBDHE假设下,证明了本文的方案是CPA安全的。该方案提供了一种更通用的数据访问策略,同时保持了ABE的细粒度特性。最后,安全性和性能分析表明,该方案安全高效。
{"title":"Attribute-based encryption of LSSS access structure with expressive dynamic attributes based on consortium blockchain","authors":"Shengzhou Hu,&nbsp;Tingting Zhong,&nbsp;Hua He,&nbsp;Wenhao Li","doi":"10.1007/s12243-023-00949-8","DOIUrl":"10.1007/s12243-023-00949-8","url":null,"abstract":"<div><p>Attribute-based encryption (ABE) allows users to encrypt and decrypt data based on attributes. It realizes fine-grained access control and can effectively solve the one-to-many encryption and decryption problem in open cloud application. Linear secret sharing scheme (LSSS) is the common access structure with a matrix on the attributes in ABE schemes, which may depict AND, OR, threshold operations, etc. However, LSSS access structure does not depict the complex and dynamic access policy of attributes, such as the complicated relationship of different attributes and the generation of dynamic attributes. It severely restricts the expansion of the practical application of ABE. Besides, there exists another problem; attribute authority (AA) in traditional ABE has a concentration of power and easily suffers from single-point failure or privacy leakage for being attacked or corrupted. Blockchain is a decentralized, tamper-free, traceable, and multi-party distributed database technology. Consortium blockchain (CB) is a partially centralized blockchain, whose openness is between the public blockchain and the private blockchain. In this paper, an ABE scheme on LSSS access structure with expressive dynamic attributes (EDA) based on CB (LSSS-EDA-ABE-CB) was proposed to resolve the above issues. EDA can construct the comprehensive attribute calculation expressions by conducting various operations, such as arithmetic operations, relational operations, and string operations. In virtue of the application of EDA, the proposed scheme can reconstruct new composite attributes to realize the dynamic adjustment of attributes. A partitioning method of EDA avoids one attribute appearing in two different EDA expressions. The CB technology enhanced the authority and trustworthiness of AA by openly recording AA’s attribute key distributions in CB transactions. The scheme in the paper was proven CPA-secure under the decision q-PBDHE assumption in standard model in the CB application environment. The scheme provides a more general data access policy and maintains the fine-grained character of ABE simultaneously. Finally, the security and performance analysis shows that the proposed scheme is secure and highly efficient.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 7-8","pages":"509 - 524"},"PeriodicalIF":1.9,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50494392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Backscatter communication system efficiency with diffusing surfaces 具有散射表面的后向散射通信系统效率
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-05-11 DOI: 10.1007/s12243-023-00955-w
Jean-Marc Kelif, Dinh-Thuy Phan-Huy, Philippe Ratajczak, Orange Innovation/Networks

In an ambient backscatter communication system, the waves generated by a source are reflected by a tag, in a variable manner in time. Therefore, the tag can transmit a message to a reader, without generating any radio wave and without battery. As a consequence, such a communication system is a promising technology for ultra-low energy wireless communications. In the simplest implementation of such a system, the tag sends a binary message by oscillating between two states and the reader detects the bits by comparing the two distinct received powers. In this paper, for the first time, we propose to analyze the impact of the shape of diffusing flat panel surfaces that diffuse in all directions, on an ambient backscatter communication system. We establish the analytical closed form expression of the power contrast in the presence of flat panels, by considering a rectangular surface and a disk-shaped surface, and we show that diffusing surfaces improve the power contrast. Moreover, our approach allows us to express the contrast to noise ratio, and therefore to establish the BER performance. Furthermore, we show that it makes it possible to improve the energetic performance, thanks to diffusing surfaces. For any configuration characterized by a fixed source, tag and reader, we moreover determine the precise locations of diffusing surfaces, which induce a maximum efficiency of the surfaces, whatever the wavelength. Furthermore, we show that it becomes possible to easily determine an optimal frequency which maximizes the contrast power, thanks to the expression of the contrast power.

在环境反向散射通信系统中,源产生的波被标签以可变的方式在时间上反射。因此,标签可以在不产生任何无线电波和不使用电池的情况下向读取器发送消息。因此,这样的通信系统是用于超低能量无线通信的有前途的技术。在这种系统的最简单实现中,标签通过在两种状态之间振荡来发送二进制消息,读取器通过比较两种不同的接收功率来检测比特。在本文中,我们首次提出分析向所有方向散射的散射平板表面的形状对环境反向散射通信系统的影响。通过考虑矩形表面和圆盘形表面,我们建立了平板存在下功率对比度的解析闭合表达式,并表明散射表面改善了功率对比度。此外,我们的方法允许我们表达对比噪声比,从而建立BER性能。此外,我们还表明,由于散射表面,它可以提高能量性能。对于任何以固定源、标签和读取器为特征的配置,我们还确定了散射表面的精确位置,无论波长如何,这都会导致表面的最大效率。此外,我们表明,由于对比度功率的表达式,可以容易地确定使对比度功率最大化的最佳频率。
{"title":"Backscatter communication system efficiency with diffusing surfaces","authors":"Jean-Marc Kelif,&nbsp;Dinh-Thuy Phan-Huy,&nbsp;Philippe Ratajczak,&nbsp;Orange Innovation/Networks","doi":"10.1007/s12243-023-00955-w","DOIUrl":"10.1007/s12243-023-00955-w","url":null,"abstract":"<div><p>In an ambient backscatter communication system, the waves generated by a source are reflected by a tag, in a variable manner in time. Therefore, the tag can transmit a message to a reader, without generating any radio wave and without battery. As a consequence, such a communication system is a promising technology for ultra-low energy wireless communications. In the simplest implementation of such a system, the tag sends a binary message by oscillating between two states and the reader detects the bits by comparing the two distinct received powers. In this paper, for the first time, we propose to analyze the impact of the shape of diffusing flat panel surfaces that diffuse in all directions, on an ambient backscatter communication system. We establish the analytical closed form expression of the power contrast in the presence of flat panels, by considering a rectangular surface and a disk-shaped surface, and we show that diffusing surfaces improve the power contrast. Moreover, our approach allows us to express the contrast to noise ratio, and therefore to establish the BER performance. Furthermore, we show that it makes it possible to improve the energetic performance, thanks to diffusing surfaces. For any configuration characterized by a fixed source, tag and reader, we moreover determine the precise locations of diffusing surfaces, which induce a maximum efficiency of the surfaces, whatever the wavelength. Furthermore, we show that it becomes possible to easily determine an optimal frequency which maximizes the contrast power, thanks to the expression of the contrast power.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"561 - 576"},"PeriodicalIF":1.9,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50472317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Social network malicious insider detection using time-based trust evaluation 基于时间信任评估的社交网络内部恶意检测
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-04-24 DOI: 10.1007/s12243-023-00959-6
T. Nathezhtha, D. Sangeetha, V. Vaidehi

In recent years, malicious insider attacks have become a common fraudulent activity in which an attacker is often perceived as a trusted entity in Social Networks (SNs). At present, machine learning (ML) approaches are widely used to identify the behavior of users in the network. From this perspective, this paper presents an integrated approach, namely, Social network malicious insider detection (SID), which consists of long short-term memory (LSTM) and time-based trust evaluation (TBTE). The proposed SID aims to identify deviations in SN user behavior by monitoring their data. The proposed SID uses LSTM, an advanced version of the recurrent neural network (RNN), which precisely predicts the behavior of users and identifies the anomaly pattern in SNs. A time-based trust evaluation method is integrated with LSTM, which not only differentiates the abnormal behavior of SN users but also precisely categorizes an anomaly node as a malicious node, a new user or a broken node. Moreover, the proposed SID detects insiders accurately and reduces false alarms by providing a novel quantitative analysis for computing the balancing factor according to time, which avoids the misinterpretation of normal user patterns as anomalies. The performance of the proposed SID is evaluated in real time, which demonstrates that the detection accuracy for attacks is 96% for normal users and 98% for new users with a smaller time span.

近年来,恶意内部攻击已成为一种常见的欺诈活动,攻击者通常被视为社交网络中的可信实体。目前,机器学习(ML)方法被广泛用于识别网络中用户的行为。从这个角度出发,本文提出了一种综合方法,即社交网络恶意内部检测(SID),它由长短期记忆(LSTM)和基于时间的信任评估(TBTE)组成。所提出的SID旨在通过监测SN用户的数据来识别SN用户行为的偏差。所提出的SID使用LSTM,这是递归神经网络(RNN)的高级版本,可以精确预测用户的行为并识别SN中的异常模式。将基于时间的信任评估方法与LSTM相结合,不仅可以区分SN用户的异常行为,还可以将异常节点准确地分类为恶意节点、新用户或坏节点。此外,所提出的SID通过提供一种新的定量分析来根据时间计算平衡因子,准确地检测内部人员,并减少误报,避免了将正常用户模式误解为异常。实时评估了所提出的SID的性能,表明对于正常用户和时间跨度较小的新用户,攻击的检测准确率分别为96%和98%。
{"title":"Social network malicious insider detection using time-based trust evaluation","authors":"T. Nathezhtha,&nbsp;D. Sangeetha,&nbsp;V. Vaidehi","doi":"10.1007/s12243-023-00959-6","DOIUrl":"10.1007/s12243-023-00959-6","url":null,"abstract":"<div><p>In recent years, malicious insider attacks have become a common fraudulent activity in which an attacker is often perceived as a trusted entity in Social Networks (SNs). At present, machine learning (ML) approaches are widely used to identify the behavior of users in the network. From this perspective, this paper presents an integrated approach, namely, Social network malicious insider detection (SID), which consists of long short-term memory (LSTM) and time-based trust evaluation (TBTE). The proposed SID aims to identify deviations in SN user behavior by monitoring their data. The proposed SID uses LSTM, an advanced version of the recurrent neural network (RNN), which precisely predicts the behavior of users and identifies the anomaly pattern in SNs. A time-based trust evaluation method is integrated with LSTM, which not only differentiates the abnormal behavior of SN users but also precisely categorizes an anomaly node as a malicious node, a new user or a broken node. Moreover, the proposed SID detects insiders accurately and reduces false alarms by providing a novel quantitative analysis for computing the balancing factor according to time, which avoids the misinterpretation of normal user patterns as anomalies. The performance of the proposed SID is evaluated in real time, which demonstrates that the detection accuracy for attacks is 96% for normal users and 98% for new users with a smaller time span.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"585 - 597"},"PeriodicalIF":1.9,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-023-00959-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50509323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A modular pipeline for enforcement of security properties at runtime 用于在运行时强制执行安全属性的模块化管道
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-04-17 DOI: 10.1007/s12243-023-00952-z
Rania Taleb, Sylvain Hallé, Raphaël Khoury

Runtime enforcement ensures the respect of a user-specified security policy by a program by providing a valid replacement for any misbehaving sequence of events that may occur during that program’s execution. However, depending on the capabilities of the enforcement mechanism, multiple possible replacement sequences may be available, and the current literature is silent on the question of how to choose the optimal one. Furthermore, the current design of runtime monitors imposes a substantial burden on the designer, since the entirety of the monitoring task is accomplished by a monolithic construct, usually an automata-based model. In this paper, we propose a new modular model of enforcement monitors, in which the tasks of altering the execution, ensuring compliance with the security policy, and selecting the optimal replacement are split into three separate modules, which simplifies the creation of runtime monitors. We implement this approach by using the event stream processor BeepBeep and a use case is presented. Experimental evaluation shows that our proposed framework can dynamically select an adequate enforcement actions at runtime, without the need to manually define an enforcement monitor.

运行时强制通过为程序执行期间可能发生的任何不当行为的事件序列提供有效替换,确保程序尊重用户指定的安全策略。然而,根据执行机制的能力,可能会有多个可能的替换序列,而目前的文献对如何选择最佳替换序列的问题只字未提。此外,当前运行时监视器的设计给设计者带来了巨大的负担,因为整个监视任务都是由单片结构完成的,通常是基于自动机的模型。在本文中,我们提出了一种新的强制监控器模块化模型,其中更改执行、确保遵守安全策略和选择最佳替换的任务被拆分为三个独立的模块,这简化了运行时监控器的创建。我们使用事件流处理器BeepBeep实现了这种方法,并给出了一个用例。实验评估表明,我们提出的框架可以在运行时动态选择适当的强制操作,而无需手动定义强制监视器。
{"title":"A modular pipeline for enforcement of security properties at runtime","authors":"Rania Taleb,&nbsp;Sylvain Hallé,&nbsp;Raphaël Khoury","doi":"10.1007/s12243-023-00952-z","DOIUrl":"10.1007/s12243-023-00952-z","url":null,"abstract":"<div><p>Runtime enforcement ensures the respect of a user-specified security policy by a program by providing a valid replacement for any misbehaving sequence of events that may occur during that program’s execution. However, depending on the capabilities of the enforcement mechanism, multiple possible replacement sequences may be available, and the current literature is silent on the question of how to choose the optimal one. Furthermore, the current design of runtime monitors imposes a substantial burden on the designer, since the entirety of the monitoring task is accomplished by a monolithic construct, usually an automata-based model. In this paper, we propose a new modular model of enforcement monitors, in which the tasks of altering the execution, ensuring compliance with the security policy, and selecting the optimal replacement are split into three separate modules, which simplifies the creation of runtime monitors. We implement this approach by using the event stream processor BeepBeep and a use case is presented. Experimental evaluation shows that our proposed framework can dynamically select an adequate enforcement actions at runtime, without the need to manually define an enforcement monitor.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 7-8","pages":"429 - 457"},"PeriodicalIF":1.9,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-023-00952-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50488358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of SNR penalty in coherent WDM receiver system for detection of QPSK signal with component crosstalk 相干WDM接收系统中检测分量串扰QPSK信号的信噪比惩罚分析
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-04-03 DOI: 10.1007/s12243-023-00958-7
Pinakpani Mukherjee, Santu Sarkar, Nikhil R. Das

Abstract

We propose analytical modelling of component crosstalk on the performance of wavelength division multiplexed (WDM) receiver with generalized quadrature phase shift keying (QPSK) signal and coherent detection. A comprehensive study on the signal-to-noise ratio (SNR) penalty is conducted, which can be used to balance SNR values and the system's power budget in the presence of finite crosstalk sources. Results express that, in the presence of five crosstalk interferers, the crosstalk level leading to 1-dB of SNR penalty must be less than -23.8 to -26.5 dB for bit error rate (BER) from 10–7 to 10–13. For the BER of 10–9, the QPSK signal has a component crosstalk tolerance of -21.7 dB for a 1 dB SNR penalty with a single interferer. Furthermore, the study of spectral efficiency reveals that crosstalk level, SNR, and the number of active interferers perform a vital role in determining the bandwidth efficiency of the system. The analysis exploits the characteristic function method and Maclaurin series expansion to compute a closed form expression of BER over additive white Gaussian noise (AWGN) channel. Following the analysis, the SNR and bandwidth expenses of the system are examined numerically through the estimated BER and binary entropy function. The estimated values of the BER using the proposed model are in close agreement with a similar theoretical investigation for a single interferer.

摘要我们提出了分量串扰对具有广义正交相移键控(QPSK)信号和相干检测的波分复用(WDM)接收机性能的分析建模。对信噪比惩罚进行了全面的研究,该惩罚可用于在存在有限串扰源的情况下平衡信噪比值和系统的功率预算。结果表明,在存在五个串扰干扰的情况下,对于10–7到10–13的误码率(BER),导致1 dB SNR损失的串扰水平必须小于-23.8到-26.5 dB。对于10–9的BER,对于单个干扰的1 dB SNR惩罚,QPSK信号的分量串扰容限为-21.7 dB。此外,对频谱效率的研究表明,串扰水平、信噪比和有源干扰的数量在决定系统的带宽效率方面起着至关重要的作用。该分析利用特征函数法和Maclaurin级数展开来计算加性高斯白噪声(AWGN)信道上BER的闭合表达式。在分析之后,通过估计的误码率和二进制熵函数对系统的信噪比和带宽开销进行了数值检验。使用所提出的模型的BER估计值与针对单个干扰的类似理论研究非常一致。
{"title":"Analysis of SNR penalty in coherent WDM receiver system for detection of QPSK signal with component crosstalk","authors":"Pinakpani Mukherjee,&nbsp;Santu Sarkar,&nbsp;Nikhil R. Das","doi":"10.1007/s12243-023-00958-7","DOIUrl":"10.1007/s12243-023-00958-7","url":null,"abstract":"<div><h2>Abstract\u0000</h2><div><p>We propose analytical modelling of component crosstalk on the performance of wavelength division multiplexed (WDM) receiver with generalized quadrature phase shift keying (QPSK) signal and coherent detection. A comprehensive study on the signal-to-noise ratio (SNR) penalty is conducted, which can be used to balance SNR values and the system's power budget in the presence of finite crosstalk sources. Results express that, in the presence of five crosstalk interferers, the crosstalk level leading to 1-dB of SNR penalty must be less than -23.8 to -26.5 dB for bit error rate (BER) from 10<sup>–7</sup> to 10<sup>–13</sup>. For the BER of 10<sup>–9</sup>, the QPSK signal has a component crosstalk tolerance of -21.7 dB for a 1 dB SNR penalty with a single interferer. Furthermore, the study of spectral efficiency reveals that crosstalk level, SNR, and the number of active interferers perform a vital role in determining the bandwidth efficiency of the system. The analysis exploits the characteristic function method and Maclaurin series expansion to compute a closed form expression of BER over additive white Gaussian noise (AWGN) channel. Following the analysis, the SNR and bandwidth expenses of the system are examined numerically through the estimated BER and binary entropy function. The estimated values of the BER using the proposed model are in close agreement with a similar theoretical investigation for a single interferer.</p></div></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"577 - 584"},"PeriodicalIF":1.9,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50443612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Annals of Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1