Pub Date : 2023-06-13DOI: 10.1007/s12243-023-00961-y
Dominique Chiaroni, Raffaele Luca Amalfi, Jos George, Maximilian Riegel
One of the most important challenges of this century will be to minimise as much as possible the energy consumption of the worldwide digital infrastructure to have a significant contribution on our emissions of CO2 reduction since energy consumption and emission of CO2 are directly linked. Therefore, after an introduction (part 1), in part 2 of this paper, we will describe the status of the worldwide production of electricity, the contribution of information and communications technology (ICT) in terms of electricity consumption, and the identification of the critical network segments that can have a significant environmental impact. In part 3, we will focus on the data centres and core services that represent important network segments responsible for the largest emission of CO2. In part 4, we will address the access and aggregation part, which represents the second important network segment to optimise. Part 5 will focus on the home networking and enterprise. And before an estimation of the energy savings obtained when adopting the innovations proposed, the impact of the vertical market will be discussed in part 6. Finally, the conclusion (part 7) will summarise the results and perspectives will be proposed to complete the analysis.
{"title":"Towards greener digital infrastructures for ICT and vertical markets","authors":"Dominique Chiaroni, Raffaele Luca Amalfi, Jos George, Maximilian Riegel","doi":"10.1007/s12243-023-00961-y","DOIUrl":"10.1007/s12243-023-00961-y","url":null,"abstract":"<div><p>One of the most important challenges of this century will be to minimise as much as possible the energy consumption of the worldwide digital infrastructure to have a significant contribution on our emissions of CO<sub>2</sub> reduction since energy consumption and emission of CO<sub>2</sub> are directly linked. Therefore, after an introduction (part 1), in part 2 of this paper, we will describe the status of the worldwide production of electricity, the contribution of information and communications technology (ICT) in terms of electricity consumption, and the identification of the critical network segments that can have a significant environmental impact. In part 3, we will focus on the data centres and core services that represent important network segments responsible for the largest emission of CO<sub>2</sub>. In part 4, we will address the access and aggregation part, which represents the second important network segment to optimise. Part 5 will focus on the home networking and enterprise. And before an estimation of the energy savings obtained when adopting the innovations proposed, the impact of the vertical market will be discussed in part 6. Finally, the conclusion (part 7) will summarise the results and perspectives will be proposed to complete the analysis.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 5-6","pages":"255 - 275"},"PeriodicalIF":1.9,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50477759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-12DOI: 10.1007/s12243-023-00966-7
Yuxi Du, Weijia Cui, Fengtong Mei, Chunxiao Jian, Bin Ba
Aiming at the problem of beamforming performance degradation under the coherent signals model, this paper proposes an adaptive beamforming algorithm based on the virtual array. Compared with previous work, the creative construction of virtual arrays in this paper allows the algorithm to ensure strong coherent signal processing and superior output performance with no degradation in coherence capability. The proposed algorithm firstly constructs a virtual array symmetric to the physical array to form a virtual antenna array model; secondly, a full-rank covariance matrix is obtained by matrix reconstruction; then, the direction vector and power of the signals are estimated; finally, the estimated parameters are used to reconstruct the interference plus noise covariance matrix (INCM) and calculate the weight vector. Simulation analysis verifies the superiority of the algorithm and the validity of theoretical analysis.
{"title":"Robust adaptive beamforming algorithm for coherent signals based on virtual array","authors":"Yuxi Du, Weijia Cui, Fengtong Mei, Chunxiao Jian, Bin Ba","doi":"10.1007/s12243-023-00966-7","DOIUrl":"10.1007/s12243-023-00966-7","url":null,"abstract":"<div><p>Aiming at the problem of beamforming performance degradation under the coherent signals model, this paper proposes an adaptive beamforming algorithm based on the virtual array. Compared with previous work, the creative construction of virtual arrays in this paper allows the algorithm to ensure strong coherent signal processing and superior output performance with no degradation in coherence capability. The proposed algorithm firstly constructs a virtual array symmetric to the physical array to form a virtual antenna array model; secondly, a full-rank covariance matrix is obtained by matrix reconstruction; then, the direction vector and power of the signals are estimated; finally, the estimated parameters are used to reconstruct the interference plus noise covariance matrix (INCM) and calculate the weight vector. Simulation analysis verifies the superiority of the algorithm and the validity of theoretical analysis.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"641 - 651"},"PeriodicalIF":1.9,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50475666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-12DOI: 10.1007/s12243-023-00967-6
Cédric Ware, Marceau Coupechoux, Ekram Hossain, Carmen Mas-Machuca, Vinod Sharma, Anna Tzanakaki
{"title":"Introduction to the special issue: 5+G network energy consumption, energy efficiency and environmental impact","authors":"Cédric Ware, Marceau Coupechoux, Ekram Hossain, Carmen Mas-Machuca, Vinod Sharma, Anna Tzanakaki","doi":"10.1007/s12243-023-00967-6","DOIUrl":"10.1007/s12243-023-00967-6","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 5-6","pages":"249 - 251"},"PeriodicalIF":1.9,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50474537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-31DOI: 10.1007/s12243-023-00968-5
Mohamed Hamidi, Ouissam Zealouk, Hassan Satori
Abstract
This paper is a part of our contribution to research on the enhancement of network automatic speech recognition system performance. We built a highly configurable platform by using hidden Markov models, Gaussian mixture models, and Mel frequency spectral coefficients, in addition to VoIP G.711-u and GSM codecs. To determine the optimal values for maximum performance, different acoustic models are prepared by varying the hidden Markov models (from 3 to 5) and Gaussian mixture models (8–16-32) with 13 feature extraction coefficients. Additionally, our generated acoustic models are tested by unencoded and encoded speech data based on G.711 and GSM codecs. The best parameterization performance is obtained for 3 HMM, 8–16 GMMs, and G.711 codecs.
{"title":"Telephony speech system performance based on the codec effect","authors":"Mohamed Hamidi, Ouissam Zealouk, Hassan Satori","doi":"10.1007/s12243-023-00968-5","DOIUrl":"10.1007/s12243-023-00968-5","url":null,"abstract":"<div><h2>Abstract\u0000</h2><div><p>This paper is a part of our contribution to research on the enhancement of network automatic speech recognition system performance. We built a highly configurable platform by using hidden Markov models, Gaussian mixture models, and Mel frequency spectral coefficients, in addition to VoIP G.711-u and GSM codecs. To determine the optimal values for maximum performance, different acoustic models are prepared by varying the hidden Markov models (from 3 to 5) and Gaussian mixture models (8–16-32) with 13 feature extraction coefficients. Additionally, our generated acoustic models are tested by unencoded and encoded speech data based on G.711 and GSM codecs. The best parameterization performance is obtained for 3 HMM, 8–16 GMMs, and G.711 codecs.</p></div></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"617 - 625"},"PeriodicalIF":1.9,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50529706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-31DOI: 10.1007/s12243-023-00963-w
Geo Francis E, S. Sheeja
Outstanding progress in unsolicited intrusions along with security threats, which interrupt the normal operations of wireless sensor networks (WSNs), have been attracted by the proliferation of WSNs and their applications. In WSNs, this demands an intrusion detection system (IDS), which can detect such attacks with higher detection accuracy. Designing an effective model for IDS using the SDK-LSHB-based SHAKE-ESDRL algorithm to improve accuracy and lessen training time and response time is the goal of this work. At first, duplicate removal, missing data removal, and data transfer are the steps through which the dataset was processed. From the processed data, by providing the extracted attributes as input to the entropy-based generalized discriminant analysis (E-GDA) method, the number of attributes is reduced. After that, the LogSwish-based deep reinforcement learning algorithm (LS-DRLA) method wielded the reduced attributes for intrusion detection (ID). By utilizing the SHAKE 256 algorithm, the attributes that fall into the attacked class label are hashed and stored in the hash table during this process. Next, to test the real-time data with the trained IDS, the WSN nodes are initialized. For this, by utilizing the supremum distance (SD-K-Means) algorithm, the sensor nodes (SNs) are clustered centered on the cluster heads (CHs) selected by the linear scaling-based honey badger optimization algorithm (LS-HBOA) method. At last, utilizing real-world-based datasets, the proposed algorithms are evaluated and the results are compared using statistical metrics.
{"title":"SHAKE-ESDRL-based energy efficient intrusion detection and hashing system","authors":"Geo Francis E, S. Sheeja","doi":"10.1007/s12243-023-00963-w","DOIUrl":"10.1007/s12243-023-00963-w","url":null,"abstract":"<div><p>Outstanding progress in unsolicited intrusions along with security threats, which interrupt the normal operations of wireless sensor networks (WSNs), have been attracted by the proliferation of WSNs and their applications. In WSNs, this demands an intrusion detection system (IDS), which can detect such attacks with higher detection accuracy. Designing an effective model for IDS using the SDK-LSHB-based SHAKE-ESDRL algorithm to improve accuracy and lessen training time and response time is the goal of this work. At first, duplicate removal, missing data removal, and data transfer are the steps through which the dataset was processed. From the processed data, by providing the extracted attributes as input to the entropy-based generalized discriminant analysis (E-GDA) method, the number of attributes is reduced. After that, the LogSwish-based deep reinforcement learning algorithm (LS-DRLA) method wielded the reduced attributes for intrusion detection (ID). By utilizing the SHAKE 256 algorithm, the attributes that fall into the attacked class label are hashed and stored in the hash table during this process. Next, to test the real-time data with the trained IDS, the WSN nodes are initialized. For this, by utilizing the supremum distance (SD-K-Means) algorithm, the sensor nodes (SNs) are clustered centered on the cluster heads (CHs) selected by the linear scaling-based honey badger optimization algorithm (LS-HBOA) method. At last, utilizing real-world-based datasets, the proposed algorithms are evaluated and the results are compared using statistical metrics.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 5-6","pages":"381 - 396"},"PeriodicalIF":1.8,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72509855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-18DOI: 10.1007/s12243-023-00949-8
Shengzhou Hu, Tingting Zhong, Hua He, Wenhao Li
Attribute-based encryption (ABE) allows users to encrypt and decrypt data based on attributes. It realizes fine-grained access control and can effectively solve the one-to-many encryption and decryption problem in open cloud application. Linear secret sharing scheme (LSSS) is the common access structure with a matrix on the attributes in ABE schemes, which may depict AND, OR, threshold operations, etc. However, LSSS access structure does not depict the complex and dynamic access policy of attributes, such as the complicated relationship of different attributes and the generation of dynamic attributes. It severely restricts the expansion of the practical application of ABE. Besides, there exists another problem; attribute authority (AA) in traditional ABE has a concentration of power and easily suffers from single-point failure or privacy leakage for being attacked or corrupted. Blockchain is a decentralized, tamper-free, traceable, and multi-party distributed database technology. Consortium blockchain (CB) is a partially centralized blockchain, whose openness is between the public blockchain and the private blockchain. In this paper, an ABE scheme on LSSS access structure with expressive dynamic attributes (EDA) based on CB (LSSS-EDA-ABE-CB) was proposed to resolve the above issues. EDA can construct the comprehensive attribute calculation expressions by conducting various operations, such as arithmetic operations, relational operations, and string operations. In virtue of the application of EDA, the proposed scheme can reconstruct new composite attributes to realize the dynamic adjustment of attributes. A partitioning method of EDA avoids one attribute appearing in two different EDA expressions. The CB technology enhanced the authority and trustworthiness of AA by openly recording AA’s attribute key distributions in CB transactions. The scheme in the paper was proven CPA-secure under the decision q-PBDHE assumption in standard model in the CB application environment. The scheme provides a more general data access policy and maintains the fine-grained character of ABE simultaneously. Finally, the security and performance analysis shows that the proposed scheme is secure and highly efficient.
{"title":"Attribute-based encryption of LSSS access structure with expressive dynamic attributes based on consortium blockchain","authors":"Shengzhou Hu, Tingting Zhong, Hua He, Wenhao Li","doi":"10.1007/s12243-023-00949-8","DOIUrl":"10.1007/s12243-023-00949-8","url":null,"abstract":"<div><p>Attribute-based encryption (ABE) allows users to encrypt and decrypt data based on attributes. It realizes fine-grained access control and can effectively solve the one-to-many encryption and decryption problem in open cloud application. Linear secret sharing scheme (LSSS) is the common access structure with a matrix on the attributes in ABE schemes, which may depict AND, OR, threshold operations, etc. However, LSSS access structure does not depict the complex and dynamic access policy of attributes, such as the complicated relationship of different attributes and the generation of dynamic attributes. It severely restricts the expansion of the practical application of ABE. Besides, there exists another problem; attribute authority (AA) in traditional ABE has a concentration of power and easily suffers from single-point failure or privacy leakage for being attacked or corrupted. Blockchain is a decentralized, tamper-free, traceable, and multi-party distributed database technology. Consortium blockchain (CB) is a partially centralized blockchain, whose openness is between the public blockchain and the private blockchain. In this paper, an ABE scheme on LSSS access structure with expressive dynamic attributes (EDA) based on CB (LSSS-EDA-ABE-CB) was proposed to resolve the above issues. EDA can construct the comprehensive attribute calculation expressions by conducting various operations, such as arithmetic operations, relational operations, and string operations. In virtue of the application of EDA, the proposed scheme can reconstruct new composite attributes to realize the dynamic adjustment of attributes. A partitioning method of EDA avoids one attribute appearing in two different EDA expressions. The CB technology enhanced the authority and trustworthiness of AA by openly recording AA’s attribute key distributions in CB transactions. The scheme in the paper was proven CPA-secure under the decision q-PBDHE assumption in standard model in the CB application environment. The scheme provides a more general data access policy and maintains the fine-grained character of ABE simultaneously. Finally, the security and performance analysis shows that the proposed scheme is secure and highly efficient.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 7-8","pages":"509 - 524"},"PeriodicalIF":1.9,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50494392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-11DOI: 10.1007/s12243-023-00955-w
Jean-Marc Kelif, Dinh-Thuy Phan-Huy, Philippe Ratajczak, Orange Innovation/Networks
In an ambient backscatter communication system, the waves generated by a source are reflected by a tag, in a variable manner in time. Therefore, the tag can transmit a message to a reader, without generating any radio wave and without battery. As a consequence, such a communication system is a promising technology for ultra-low energy wireless communications. In the simplest implementation of such a system, the tag sends a binary message by oscillating between two states and the reader detects the bits by comparing the two distinct received powers. In this paper, for the first time, we propose to analyze the impact of the shape of diffusing flat panel surfaces that diffuse in all directions, on an ambient backscatter communication system. We establish the analytical closed form expression of the power contrast in the presence of flat panels, by considering a rectangular surface and a disk-shaped surface, and we show that diffusing surfaces improve the power contrast. Moreover, our approach allows us to express the contrast to noise ratio, and therefore to establish the BER performance. Furthermore, we show that it makes it possible to improve the energetic performance, thanks to diffusing surfaces. For any configuration characterized by a fixed source, tag and reader, we moreover determine the precise locations of diffusing surfaces, which induce a maximum efficiency of the surfaces, whatever the wavelength. Furthermore, we show that it becomes possible to easily determine an optimal frequency which maximizes the contrast power, thanks to the expression of the contrast power.
{"title":"Backscatter communication system efficiency with diffusing surfaces","authors":"Jean-Marc Kelif, Dinh-Thuy Phan-Huy, Philippe Ratajczak, Orange Innovation/Networks","doi":"10.1007/s12243-023-00955-w","DOIUrl":"10.1007/s12243-023-00955-w","url":null,"abstract":"<div><p>In an ambient backscatter communication system, the waves generated by a source are reflected by a tag, in a variable manner in time. Therefore, the tag can transmit a message to a reader, without generating any radio wave and without battery. As a consequence, such a communication system is a promising technology for ultra-low energy wireless communications. In the simplest implementation of such a system, the tag sends a binary message by oscillating between two states and the reader detects the bits by comparing the two distinct received powers. In this paper, for the first time, we propose to analyze the impact of the shape of diffusing flat panel surfaces that diffuse in all directions, on an ambient backscatter communication system. We establish the analytical closed form expression of the power contrast in the presence of flat panels, by considering a rectangular surface and a disk-shaped surface, and we show that diffusing surfaces improve the power contrast. Moreover, our approach allows us to express the contrast to noise ratio, and therefore to establish the BER performance. Furthermore, we show that it makes it possible to improve the energetic performance, thanks to diffusing surfaces. For any configuration characterized by a fixed source, tag and reader, we moreover determine the precise locations of diffusing surfaces, which induce a maximum efficiency of the surfaces, whatever the wavelength. Furthermore, we show that it becomes possible to easily determine an optimal frequency which maximizes the contrast power, thanks to the expression of the contrast power.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"561 - 576"},"PeriodicalIF":1.9,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50472317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-24DOI: 10.1007/s12243-023-00959-6
T. Nathezhtha, D. Sangeetha, V. Vaidehi
In recent years, malicious insider attacks have become a common fraudulent activity in which an attacker is often perceived as a trusted entity in Social Networks (SNs). At present, machine learning (ML) approaches are widely used to identify the behavior of users in the network. From this perspective, this paper presents an integrated approach, namely, Social network malicious insider detection (SID), which consists of long short-term memory (LSTM) and time-based trust evaluation (TBTE). The proposed SID aims to identify deviations in SN user behavior by monitoring their data. The proposed SID uses LSTM, an advanced version of the recurrent neural network (RNN), which precisely predicts the behavior of users and identifies the anomaly pattern in SNs. A time-based trust evaluation method is integrated with LSTM, which not only differentiates the abnormal behavior of SN users but also precisely categorizes an anomaly node as a malicious node, a new user or a broken node. Moreover, the proposed SID detects insiders accurately and reduces false alarms by providing a novel quantitative analysis for computing the balancing factor according to time, which avoids the misinterpretation of normal user patterns as anomalies. The performance of the proposed SID is evaluated in real time, which demonstrates that the detection accuracy for attacks is 96% for normal users and 98% for new users with a smaller time span.
{"title":"Social network malicious insider detection using time-based trust evaluation","authors":"T. Nathezhtha, D. Sangeetha, V. Vaidehi","doi":"10.1007/s12243-023-00959-6","DOIUrl":"10.1007/s12243-023-00959-6","url":null,"abstract":"<div><p>In recent years, malicious insider attacks have become a common fraudulent activity in which an attacker is often perceived as a trusted entity in Social Networks (SNs). At present, machine learning (ML) approaches are widely used to identify the behavior of users in the network. From this perspective, this paper presents an integrated approach, namely, Social network malicious insider detection (SID), which consists of long short-term memory (LSTM) and time-based trust evaluation (TBTE). The proposed SID aims to identify deviations in SN user behavior by monitoring their data. The proposed SID uses LSTM, an advanced version of the recurrent neural network (RNN), which precisely predicts the behavior of users and identifies the anomaly pattern in SNs. A time-based trust evaluation method is integrated with LSTM, which not only differentiates the abnormal behavior of SN users but also precisely categorizes an anomaly node as a malicious node, a new user or a broken node. Moreover, the proposed SID detects insiders accurately and reduces false alarms by providing a novel quantitative analysis for computing the balancing factor according to time, which avoids the misinterpretation of normal user patterns as anomalies. The performance of the proposed SID is evaluated in real time, which demonstrates that the detection accuracy for attacks is 96% for normal users and 98% for new users with a smaller time span.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"585 - 597"},"PeriodicalIF":1.9,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-023-00959-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50509323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-17DOI: 10.1007/s12243-023-00952-z
Rania Taleb, Sylvain Hallé, Raphaël Khoury
Runtime enforcement ensures the respect of a user-specified security policy by a program by providing a valid replacement for any misbehaving sequence of events that may occur during that program’s execution. However, depending on the capabilities of the enforcement mechanism, multiple possible replacement sequences may be available, and the current literature is silent on the question of how to choose the optimal one. Furthermore, the current design of runtime monitors imposes a substantial burden on the designer, since the entirety of the monitoring task is accomplished by a monolithic construct, usually an automata-based model. In this paper, we propose a new modular model of enforcement monitors, in which the tasks of altering the execution, ensuring compliance with the security policy, and selecting the optimal replacement are split into three separate modules, which simplifies the creation of runtime monitors. We implement this approach by using the event stream processor BeepBeep and a use case is presented. Experimental evaluation shows that our proposed framework can dynamically select an adequate enforcement actions at runtime, without the need to manually define an enforcement monitor.
{"title":"A modular pipeline for enforcement of security properties at runtime","authors":"Rania Taleb, Sylvain Hallé, Raphaël Khoury","doi":"10.1007/s12243-023-00952-z","DOIUrl":"10.1007/s12243-023-00952-z","url":null,"abstract":"<div><p>Runtime enforcement ensures the respect of a user-specified security policy by a program by providing a valid replacement for any misbehaving sequence of events that may occur during that program’s execution. However, depending on the capabilities of the enforcement mechanism, multiple possible replacement sequences may be available, and the current literature is silent on the question of how to choose the optimal one. Furthermore, the current design of runtime monitors imposes a substantial burden on the designer, since the entirety of the monitoring task is accomplished by a monolithic construct, usually an automata-based model. In this paper, we propose a new modular model of enforcement monitors, in which the tasks of altering the execution, ensuring compliance with the security policy, and selecting the optimal replacement are split into three separate modules, which simplifies the creation of runtime monitors. We implement this approach by using the event stream processor BeepBeep and a use case is presented. Experimental evaluation shows that our proposed framework can dynamically select an adequate enforcement actions at runtime, without the need to manually define an enforcement monitor.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 7-8","pages":"429 - 457"},"PeriodicalIF":1.9,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-023-00952-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50488358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-03DOI: 10.1007/s12243-023-00958-7
Pinakpani Mukherjee, Santu Sarkar, Nikhil R. Das
Abstract
We propose analytical modelling of component crosstalk on the performance of wavelength division multiplexed (WDM) receiver with generalized quadrature phase shift keying (QPSK) signal and coherent detection. A comprehensive study on the signal-to-noise ratio (SNR) penalty is conducted, which can be used to balance SNR values and the system's power budget in the presence of finite crosstalk sources. Results express that, in the presence of five crosstalk interferers, the crosstalk level leading to 1-dB of SNR penalty must be less than -23.8 to -26.5 dB for bit error rate (BER) from 10–7 to 10–13. For the BER of 10–9, the QPSK signal has a component crosstalk tolerance of -21.7 dB for a 1 dB SNR penalty with a single interferer. Furthermore, the study of spectral efficiency reveals that crosstalk level, SNR, and the number of active interferers perform a vital role in determining the bandwidth efficiency of the system. The analysis exploits the characteristic function method and Maclaurin series expansion to compute a closed form expression of BER over additive white Gaussian noise (AWGN) channel. Following the analysis, the SNR and bandwidth expenses of the system are examined numerically through the estimated BER and binary entropy function. The estimated values of the BER using the proposed model are in close agreement with a similar theoretical investigation for a single interferer.
摘要我们提出了分量串扰对具有广义正交相移键控(QPSK)信号和相干检测的波分复用(WDM)接收机性能的分析建模。对信噪比惩罚进行了全面的研究,该惩罚可用于在存在有限串扰源的情况下平衡信噪比值和系统的功率预算。结果表明,在存在五个串扰干扰的情况下,对于10–7到10–13的误码率(BER),导致1 dB SNR损失的串扰水平必须小于-23.8到-26.5 dB。对于10–9的BER,对于单个干扰的1 dB SNR惩罚,QPSK信号的分量串扰容限为-21.7 dB。此外,对频谱效率的研究表明,串扰水平、信噪比和有源干扰的数量在决定系统的带宽效率方面起着至关重要的作用。该分析利用特征函数法和Maclaurin级数展开来计算加性高斯白噪声(AWGN)信道上BER的闭合表达式。在分析之后,通过估计的误码率和二进制熵函数对系统的信噪比和带宽开销进行了数值检验。使用所提出的模型的BER估计值与针对单个干扰的类似理论研究非常一致。
{"title":"Analysis of SNR penalty in coherent WDM receiver system for detection of QPSK signal with component crosstalk","authors":"Pinakpani Mukherjee, Santu Sarkar, Nikhil R. Das","doi":"10.1007/s12243-023-00958-7","DOIUrl":"10.1007/s12243-023-00958-7","url":null,"abstract":"<div><h2>Abstract\u0000</h2><div><p>We propose analytical modelling of component crosstalk on the performance of wavelength division multiplexed (WDM) receiver with generalized quadrature phase shift keying (QPSK) signal and coherent detection. A comprehensive study on the signal-to-noise ratio (SNR) penalty is conducted, which can be used to balance SNR values and the system's power budget in the presence of finite crosstalk sources. Results express that, in the presence of five crosstalk interferers, the crosstalk level leading to 1-dB of SNR penalty must be less than -23.8 to -26.5 dB for bit error rate (BER) from 10<sup>–7</sup> to 10<sup>–13</sup>. For the BER of 10<sup>–9</sup>, the QPSK signal has a component crosstalk tolerance of -21.7 dB for a 1 dB SNR penalty with a single interferer. Furthermore, the study of spectral efficiency reveals that crosstalk level, SNR, and the number of active interferers perform a vital role in determining the bandwidth efficiency of the system. The analysis exploits the characteristic function method and Maclaurin series expansion to compute a closed form expression of BER over additive white Gaussian noise (AWGN) channel. Following the analysis, the SNR and bandwidth expenses of the system are examined numerically through the estimated BER and binary entropy function. The estimated values of the BER using the proposed model are in close agreement with a similar theoretical investigation for a single interferer.</p></div></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"577 - 584"},"PeriodicalIF":1.9,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50443612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}