首页 > 最新文献

Annals of Telecommunications最新文献

英文 中文
A real-time autonomic architecture for detection and defeat of open-access chess bots 用于检测和击败开放访问国际象棋机器人的实时自主架构
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-10-11 DOI: 10.1007/s12243-025-01120-1
Andrew Bengtson, Ali Tekeoglu, Christopher Rouff

With the rise of online chess, the increasing prevalence of automated chess bots, and recent high-profile cheating controversies, there is growing interest in developing effective methods for detecting bots in chess. Current approaches in this domain largely depend on analyzing player history, detecting anomalies, and conducting engine analysis to identify bot-like behavior after a game has concluded. However, these post-hoc techniques struggle to adapt to real-time detection scenarios, such as those required in dynamic cybersecurity contexts. This paper introduces a novel challenge: detecting bots during an ongoing game, enabling adaptive strategies based on the real-time identification of an opponent’s behavior. It further proposes an autonomic system leveraging self-adaptive properties to address this challenge as well as discussing the application of this bot detection to other domains.

随着在线国际象棋的兴起,自动化国际象棋机器人的日益普及,以及最近备受瞩目的作弊争议,人们对开发有效的方法来检测国际象棋中的机器人越来越感兴趣。目前这一领域的方法主要依赖于分析玩家历史,检测异常,并在游戏结束后进行引擎分析以识别类似机器人的行为。然而,这些事后技术很难适应实时检测场景,例如动态网络安全环境中需要的实时检测场景。本文介绍了一个新的挑战:在正在进行的游戏中检测机器人,基于对对手行为的实时识别实现自适应策略。它进一步提出了一个利用自适应特性的自主系统来应对这一挑战,并讨论了这种机器人检测在其他领域的应用。
{"title":"A real-time autonomic architecture for detection and defeat of open-access chess bots","authors":"Andrew Bengtson,&nbsp;Ali Tekeoglu,&nbsp;Christopher Rouff","doi":"10.1007/s12243-025-01120-1","DOIUrl":"10.1007/s12243-025-01120-1","url":null,"abstract":"<div><p>With the rise of online chess, the increasing prevalence of automated chess bots, and recent high-profile cheating controversies, there is growing interest in developing effective methods for detecting bots in chess. Current approaches in this domain largely depend on analyzing player history, detecting anomalies, and conducting engine analysis to identify bot-like behavior after a game has concluded. However, these post-hoc techniques struggle to adapt to real-time detection scenarios, such as those required in dynamic cybersecurity contexts. This paper introduces a novel challenge: detecting bots during an ongoing game, enabling adaptive strategies based on the real-time identification of an opponent’s behavior. It further proposes an autonomic system leveraging self-adaptive properties to address this challenge as well as discussing the application of this bot detection to other domains.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1183 - 1193"},"PeriodicalIF":2.2,"publicationDate":"2025-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A versatile XAI-based framework for efficient and explainable intrusion detection systems 一个通用的基于xai的框架,用于高效和可解释的入侵检测系统
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-09-29 DOI: 10.1007/s12243-025-01118-9
Beny Nugraha, Abhishek Venkatesh Jnanashree, Thomas Bauschert

Artificial intelligence (AI)-based intrusion detection systems (IDSs) markedly advance network security by leveraging machine learning (ML) and deep learning (DL) models for accurate, adaptive threat detection. Their main drawback, however, is an inherent “black-box” character that impedes trust, traceability, and regulatory compliance. To overcome this limitation, we propose an efficient explainable-AI (XAI) framework that enhances both robustness and interpretability. The two-stage process first couples a statistical selector (ANOVA) with global SHAP scores to retain only the ten most informative features, an approximately 70% dimensionality reduction, then retrains a lightweight XGBoost detector whose decisions are explained locally by SHAP and LIME. Cross-validating the two explanation modalities adds a reliability check absent from earlier hybrids, while the inclusion of a time-efficiency evaluation for explanation generation provides a new performance dimension that prior XAI-IDS studies have not addressed. To our knowledge, this is the first framework to jointly apply dual-stage statistical–model-based feature selection and SHAP–LIME cross-validation in IDS, enabling near-real-time explainability without sacrificing accuracy. Comprehensive experiments on three representative traces, CIC-DDoS2019 (legacy IP DDoS), CICIoT2023 (IoT malware), and 5 G PFCP (control-plane attacks), confirm the framework’s versatility: it sustains an F1 Score of at least 99 % while accelerating LIME explanation time from 36 to 4.9 s, an 87 % speed-up. These results demonstrate that high detection accuracy and transparent, near-real-time interpretability can be achieved simultaneously in modern IDS deployments.

基于人工智能(AI)的入侵检测系统(ids)通过利用机器学习(ML)和深度学习(DL)模型进行准确、自适应的威胁检测,显著提高了网络安全性。然而,它们的主要缺点是固有的“黑盒”特性,它阻碍了信任、可追溯性和法规遵从性。为了克服这一限制,我们提出了一个有效的可解释ai (XAI)框架,增强了鲁棒性和可解释性。这个两阶段的过程首先将统计选择器(ANOVA)与全局SHAP分数结合起来,只保留十个最具信息量的特征,大约减少70%的维数,然后重新训练一个轻量级的XGBoost检测器,其决策由SHAP和LIME在本地解释。交叉验证两种解释模式增加了早期混合模式所缺乏的可靠性检查,而解释生成的时间效率评估提供了一个新的性能维度,这是以前的XAI-IDS研究没有解决的。据我们所知,这是第一个在IDS中联合应用基于统计模型的双阶段特征选择和shape - lime交叉验证的框架,在不牺牲准确性的情况下实现了近乎实时的可解释性。在CIC-DDoS2019(传统IP DDoS)、CICIoT2023(物联网恶意软件)和5g PFCP(控制平面攻击)这三个代表性痕迹上进行的综合实验证实了该框架的多功能性:它保持了至少99%的F1分数,同时将LIME解释时间从36秒加速到4.9秒,加速了87%。这些结果表明,在现代IDS部署中,可以同时实现高检测精度和透明、近实时的可解释性。
{"title":"A versatile XAI-based framework for efficient and explainable intrusion detection systems","authors":"Beny Nugraha,&nbsp;Abhishek Venkatesh Jnanashree,&nbsp;Thomas Bauschert","doi":"10.1007/s12243-025-01118-9","DOIUrl":"10.1007/s12243-025-01118-9","url":null,"abstract":"<div><p>Artificial intelligence (AI)-based intrusion detection systems (IDSs) markedly advance network security by leveraging machine learning (ML) and deep learning (DL) models for accurate, adaptive threat detection. Their main drawback, however, is an inherent “black-box” character that impedes trust, traceability, and regulatory compliance. To overcome this limitation, we propose an efficient explainable-AI (XAI) framework that enhances both robustness and interpretability. The two-stage process first couples a statistical selector (ANOVA) with global SHAP scores to retain only the ten most informative features, an approximately 70% dimensionality reduction, then retrains a lightweight XGBoost detector whose decisions are explained locally by SHAP and LIME. Cross-validating the two explanation modalities adds a reliability check absent from earlier hybrids, while the inclusion of a time-efficiency evaluation for explanation generation provides a new performance dimension that prior XAI-IDS studies have not addressed. To our knowledge, this is the first framework to jointly apply dual-stage statistical–model-based feature selection and SHAP–LIME cross-validation in IDS, enabling near-real-time explainability without sacrificing accuracy. Comprehensive experiments on three representative traces, CIC-DDoS2019 (legacy IP DDoS), CICIoT2023 (IoT malware), and 5 G PFCP (control-plane attacks), confirm the framework’s versatility: it sustains an F1 Score of at least 99 % while accelerating LIME explanation time from 36 to 4.9 s, an 87 % speed-up. These results demonstrate that high detection accuracy and transparent, near-real-time interpretability can be achieved simultaneously in modern IDS deployments.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1095 - 1120"},"PeriodicalIF":2.2,"publicationDate":"2025-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-025-01118-9.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SBRC 2024 special issue—cross-layer advances for resilient and intelligent communication systems SBRC 2024专题——弹性和智能通信系统的跨层进展
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-09-26 DOI: 10.1007/s12243-025-01116-x
Célio Albuquerque, Katia Obraczka, Diogo Menezes Ferrazani Mattos
{"title":"SBRC 2024 special issue—cross-layer advances for resilient and intelligent communication systems","authors":"Célio Albuquerque,&nbsp;Katia Obraczka,&nbsp;Diogo Menezes Ferrazani Mattos","doi":"10.1007/s12243-025-01116-x","DOIUrl":"10.1007/s12243-025-01116-x","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 9-10","pages":"711 - 713"},"PeriodicalIF":2.2,"publicationDate":"2025-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards identification of network applications in encrypted traffic 在加密流量中识别网络应用
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-09-03 DOI: 10.1007/s12243-025-01114-z
Ivana Burgetová, Petr Matoušek, Ondřej Ryšavý

Network traffic monitoring for security threat detection and network performance management is challenging due to the encryption of most communications. This article addresses the problem of identifying network applications associated with Transport Layer Security (TLS) connections. The evaluation of three primary approaches to classifying TLS-encrypted traffic was carried out: fingerprinting methods, Server Name Indication (SNI)–based identification, and machine learning–based classifiers. Each method has its own strengths and limitations: fingerprinting relies on a regularly updated database of known hashes, SNI is vulnerable to obfuscation or missing information, and AI techniques such as machine learning require sufficient labeled training data. A comparison of these methods highlights the challenges of identifying individual applications, as the TLS properties are significantly shared between applications. Nevertheless, even when identifying a collection of candidate applications, a valuable insight into network monitoring can be gained, and this can be achieved with high accuracy by all the methods considered. To facilitate further research in this area, a novel publicly available dataset of TLS communications has been created, with the communications annotated for popular desktop and mobile applications. Furthermore, the results of three different approaches to refine TLS traffic classification based on a combination of basic classifiers and context are presented. Finally, practical use cases are proposed, and future research directions are identified to further improve application identification methods.

由于大多数通信都是加密的,因此对网络流量进行安全威胁检测和网络性能管理具有挑战性。本文讨论识别与传输层安全性(TLS)连接相关的网络应用程序的问题。对tls加密流量分类的三种主要方法进行了评估:指纹方法、基于服务器名称指示(SNI)的识别和基于机器学习的分类器。每种方法都有自己的优势和局限性:指纹识别依赖于定期更新的已知散列数据库,SNI容易受到混淆或信息缺失的影响,而机器学习等人工智能技术需要足够的标记训练数据。这些方法的比较突出了识别单个应用程序的挑战,因为TLS属性在应用程序之间显着共享。然而,即使在确定候选应用程序的集合时,也可以获得对网络监视的有价值的见解,并且可以通过所考虑的所有方法以高精度实现这一点。为了促进这一领域的进一步研究,已经创建了一个新的公开可用的TLS通信数据集,并为流行的桌面和移动应用程序注释了通信。此外,给出了基于基本分类器和上下文相结合的三种不同的TLS流量分类改进方法的结果。最后,提出了实际用例,并确定了未来的研究方向,以进一步改进应用识别方法。
{"title":"Towards identification of network applications in encrypted traffic","authors":"Ivana Burgetová,&nbsp;Petr Matoušek,&nbsp;Ondřej Ryšavý","doi":"10.1007/s12243-025-01114-z","DOIUrl":"10.1007/s12243-025-01114-z","url":null,"abstract":"<div><p>Network traffic monitoring for security threat detection and network performance management is challenging due to the encryption of most communications. This article addresses the problem of identifying network applications associated with Transport Layer Security (TLS) connections. The evaluation of three primary approaches to classifying TLS-encrypted traffic was carried out: fingerprinting methods, Server Name Indication (SNI)–based identification, and machine learning–based classifiers. Each method has its own strengths and limitations: fingerprinting relies on a regularly updated database of known hashes, SNI is vulnerable to obfuscation or missing information, and AI techniques such as machine learning require sufficient labeled training data. A comparison of these methods highlights the challenges of identifying individual applications, as the TLS properties are significantly shared between applications. Nevertheless, even when identifying a collection of candidate applications, a valuable insight into network monitoring can be gained, and this can be achieved with high accuracy by all the methods considered. To facilitate further research in this area, a novel publicly available dataset of TLS communications has been created, with the communications annotated for popular desktop and mobile applications. Furthermore, the results of three different approaches to refine TLS traffic classification based on a combination of basic classifiers and context are presented. Finally, practical use cases are proposed, and future research directions are identified to further improve application identification methods.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1015 - 1032"},"PeriodicalIF":2.2,"publicationDate":"2025-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-025-01114-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EWMAX and NDIST: RSSI filtering mechanisms for handoff algorithms in dense networks EWMAX和NDIST:密集网络中切换算法的RSSI过滤机制
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-08-01 DOI: 10.1007/s12243-025-01112-1
Helga D. Balbi, Eduardo C. A. dos Santos, Diego Passos, Luiz C. S. Magalhães, Célio Albuquerque

Handoffs are common in wireless networks with high device density. Since the IEEE 802.11 standard does not specify the criteria for initiating these handoffs, their implementation varies by manufacturer. Most current solutions rely on the Received Signal Strength Indicator (RSSI) as a key performance metric, which often leads to unstable associations—a phenomenon often referred to as the “ping-pong” effect. To address this effect, we propose EWMAX and NDIST, two RSSI filtering mechanisms designed to enhance association stability with minimal delay in handoff triggering. Comparative tests demonstrate that both EWMAX and NDIST improve stability without significantly increasing delay. However, a comprehensive evaluation reveals that EWMAX dominates the majority of results on the Pareto frontier, often generating the best solutions. Specifically, EWMAX matched NDIST in stability and outperformed it with a 24.64% reduction in delay, demonstrating superior performance in the evaluated scenario.

切换在高设备密度的无线网络中很常见。由于IEEE 802.11标准没有指定启动这些切换的标准,因此它们的实现因制造商而异。大多数当前的解决方案依赖于接收信号强度指示器(RSSI)作为关键的性能度量,这通常会导致不稳定的关联——一种通常被称为“乒乓”效应的现象。为了解决这种影响,我们提出了EWMAX和NDIST,这两种RSSI过滤机制旨在通过最小的切换触发延迟来增强关联稳定性。对比测试表明,EWMAX和NDIST在不显著增加延迟的情况下提高了稳定性。然而,综合评价表明,EWMAX在Pareto边界上主导了大多数结果,通常产生最佳解决方案。具体而言,EWMAX在稳定性上与NDIST相当,并且延迟减少24.64%,在评估场景中表现出优越的性能。
{"title":"EWMAX and NDIST: RSSI filtering mechanisms for handoff algorithms in dense networks","authors":"Helga D. Balbi,&nbsp;Eduardo C. A. dos Santos,&nbsp;Diego Passos,&nbsp;Luiz C. S. Magalhães,&nbsp;Célio Albuquerque","doi":"10.1007/s12243-025-01112-1","DOIUrl":"10.1007/s12243-025-01112-1","url":null,"abstract":"<div><p>Handoffs are common in wireless networks with high device density. Since the IEEE 802.11 standard does not specify the criteria for initiating these handoffs, their implementation varies by manufacturer. Most current solutions rely on the Received Signal Strength Indicator (RSSI) as a key performance metric, which often leads to unstable associations—a phenomenon often referred to as the “ping-pong” effect. To address this effect, we propose EWMAX and NDIST, two RSSI filtering mechanisms designed to enhance association stability with minimal delay in handoff triggering. Comparative tests demonstrate that both EWMAX and NDIST improve stability without significantly increasing delay. However, a comprehensive evaluation reveals that EWMAX dominates the majority of results on the Pareto frontier, often generating the best solutions. Specifically, EWMAX matched NDIST in stability and outperformed it with a 24.64% reduction in delay, demonstrating superior performance in the evaluated scenario.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 9-10","pages":"759 - 774"},"PeriodicalIF":2.2,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and privacy-preserving for machine learning models: attacks, countermeasures, and future directions 机器学习模型的安全和隐私保护:攻击、对策和未来方向
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-07-16 DOI: 10.1007/s12243-025-01107-y
Fatema EL-Husseini, Hassan N. Noura, Flavien Vernier

Machine learning(ML) has emerged as a fundamental element of innovation in several industries, providing unparalleled powers in data processing, decision-making, and automation. The growing use of ML systems has presented considerable security and privacy challenges, especially in resource-limited contexts such as IoT devices and edge computing platforms. This work examines lightweight security and privacy-preserving solutions designed to mitigate these vulnerabilities, emphasizing both cryptographic and non-cryptographic methods. The work presents a detailed classification of security vulnerabilities aimed at ML systems, encompassing data poisoning, adversarial attacks, model inversion, and training data breaches. It assesses cryptographic methods, including homomorphic encryption and safe multi-party computation, alongside non-cryptographic strategies such as differential privacy, defensive distillation, and federated learning. The work delineates significant obstacles, including processing overhead, adversarial robustness, scalability, and interaction with legacy systems, and proposes specific countermeasures to address these concerns. Additionally, the work integrates empirical evaluations and comparative benchmarks to guide practical deployment and indicates future research areas, highlighting the necessity for scalable cryptographic methodologies, sophisticated adversarial defenses, and interdisciplinary approaches to augment machine learning security and privacy. This article seeks to reconcile stringent security requirements with practical deployment limitations by offering actionable insights and novel methodologies, hence enabling the secure and dependable utilization of ML systems across many applications.

机器学习(ML)已经成为许多行业创新的基本要素,在数据处理、决策和自动化方面提供了无与伦比的能力。越来越多的机器学习系统的使用带来了相当大的安全和隐私挑战,特别是在资源有限的环境中,如物联网设备和边缘计算平台。这项工作研究了旨在减轻这些漏洞的轻量级安全和隐私保护解决方案,强调了加密和非加密方法。这项工作提出了针对ML系统的安全漏洞的详细分类,包括数据中毒、对抗性攻击、模型反转和训练数据泄露。它评估了密码学方法,包括同态加密和安全多方计算,以及非密码学策略,如差分隐私、防御蒸馏和联邦学习。该工作描述了重要的障碍,包括处理开销、对抗性健壮性、可伸缩性以及与遗留系统的交互,并提出了解决这些问题的具体对策。此外,该工作还整合了经验评估和比较基准,以指导实际部署,并指出未来的研究领域,强调了可扩展的加密方法、复杂的对抗性防御和跨学科方法的必要性,以增强机器学习的安全性和隐私性。本文试图通过提供可操作的见解和新颖的方法来协调严格的安全需求和实际的部署限制,从而支持跨许多应用程序安全可靠地使用ML系统。
{"title":"Security and privacy-preserving for machine learning models: attacks, countermeasures, and future directions","authors":"Fatema EL-Husseini,&nbsp;Hassan N. Noura,&nbsp;Flavien Vernier","doi":"10.1007/s12243-025-01107-y","DOIUrl":"10.1007/s12243-025-01107-y","url":null,"abstract":"<div><p>Machine learning(ML) has emerged as a fundamental element of innovation in several industries, providing unparalleled powers in data processing, decision-making, and automation. The growing use of ML systems has presented considerable security and privacy challenges, especially in resource-limited contexts such as IoT devices and edge computing platforms. This work examines lightweight security and privacy-preserving solutions designed to mitigate these vulnerabilities, emphasizing both cryptographic and non-cryptographic methods. The work presents a detailed classification of security vulnerabilities aimed at ML systems, encompassing data poisoning, adversarial attacks, model inversion, and training data breaches. It assesses cryptographic methods, including homomorphic encryption and safe multi-party computation, alongside non-cryptographic strategies such as differential privacy, defensive distillation, and federated learning. The work delineates significant obstacles, including processing overhead, adversarial robustness, scalability, and interaction with legacy systems, and proposes specific countermeasures to address these concerns. Additionally, the work integrates empirical evaluations and comparative benchmarks to guide practical deployment and indicates future research areas, highlighting the necessity for scalable cryptographic methodologies, sophisticated adversarial defenses, and interdisciplinary approaches to augment machine learning security and privacy. This article seeks to reconcile stringent security requirements with practical deployment limitations by offering actionable insights and novel methodologies, hence enabling the secure and dependable utilization of ML systems across many applications.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"975 - 996"},"PeriodicalIF":2.2,"publicationDate":"2025-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource management for multi-service coexistence in 5 G/6 G NFV-MEC networks 5g / 6g NFV-MEC网络中多业务共存的资源管理
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-06-28 DOI: 10.1007/s12243-025-01105-0
Caio Bruno B. de Souza, Marcos Rocha de M. Falcão, Maria G. Lima Damasceno, Renata K. Gomes Dos Reis, Andson M. Balieiro

Enabling the coexistence of multiple services on the same NFV-MEC network is challenging due to conflicting resource requirements, virtualization overhead, and potential processing failures, all within the strict resource constraints of the NFV-MEC node. Additionally, the critical nature of URLLC services often necessitates service prioritization, which can adversely impact the performance of eMBB applications. This paper addresses these challenges by designing a continuous-time Markov chain (CTMC)-based model that incorporates these features to analyze resource allocation for multiple coexisting services in an NFV-MEC system. Extensive analyses of energy consumption, availability, response time, and memory consumption are conducted across various system configurations. Results reveal that higher loads of URLLC services decrease system availability and increase response times for both service types. The study also finds that an increase in the number of containers does not necessarily lead to a proportional increase in energy consumption, and energy and memory consumption exhibit similar patterns due to their common usage during setup and active processing states. While increasing buffer size slightly improves service availability with minimal impact on energy consumption (as buffered requests do not use resources while in the queue), it negatively affects service response times.

在NFV-MEC节点严格的资源限制下,由于资源需求冲突、虚拟化开销和潜在的处理故障,在同一个NFV-MEC网络上实现多个业务共存是一项挑战。此外,URLLC服务的关键性质通常需要服务优先级,这可能会对eMBB应用程序的性能产生不利影响。本文通过设计一个基于连续时间马尔可夫链(CTMC)的模型来解决这些挑战,该模型结合了这些特征来分析NFV-MEC系统中多个共存服务的资源分配。对各种系统配置的能耗、可用性、响应时间和内存消耗进行了广泛的分析。结果表明,较高的URLLC服务负载会降低系统可用性,并增加两种服务类型的响应时间。该研究还发现,容器数量的增加并不一定会导致能源消耗的比例增加,并且由于在设置和活动处理状态期间的共同使用,能源和内存消耗表现出相似的模式。虽然增加缓冲区大小会略微提高服务可用性,同时对能耗的影响最小(因为缓存的请求在队列中不使用资源),但它会对服务响应时间产生负面影响。
{"title":"Resource management for multi-service coexistence in 5 G/6 G NFV-MEC networks","authors":"Caio Bruno B. de Souza,&nbsp;Marcos Rocha de M. Falcão,&nbsp;Maria G. Lima Damasceno,&nbsp;Renata K. Gomes Dos Reis,&nbsp;Andson M. Balieiro","doi":"10.1007/s12243-025-01105-0","DOIUrl":"10.1007/s12243-025-01105-0","url":null,"abstract":"<div><p>Enabling the coexistence of multiple services on the same NFV-MEC network is challenging due to conflicting resource requirements, virtualization overhead, and potential processing failures, all within the strict resource constraints of the NFV-MEC node. Additionally, the critical nature of URLLC services often necessitates service prioritization, which can adversely impact the performance of eMBB applications. This paper addresses these challenges by designing a continuous-time Markov chain (CTMC)-based model that incorporates these features to analyze resource allocation for multiple coexisting services in an NFV-MEC system. Extensive analyses of energy consumption, availability, response time, and memory consumption are conducted across various system configurations. Results reveal that higher loads of URLLC services decrease system availability and increase response times for both service types. The study also finds that an increase in the number of containers does not necessarily lead to a proportional increase in energy consumption, and energy and memory consumption exhibit similar patterns due to their common usage during setup and active processing states. While increasing buffer size slightly improves service availability with minimal impact on energy consumption (as buffered requests do not use resources while in the queue), it negatively affects service response times.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 9-10","pages":"835 - 850"},"PeriodicalIF":2.2,"publicationDate":"2025-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the quality of WebRTC-based videoconferencing under adverse and mobility scenarios 不利和移动场景下基于webbrtc的视频会议质量研究
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-06-20 DOI: 10.1007/s12243-025-01102-3
Arthur Böckmann Grossi, Roberto Irajá Tavares da Costa Filho, Luciano Paschoal Gaspary

Given the widespread adoption of video conferencing platforms in recent years, the quality of the provided service has become crucial. The exchange of data, including audio and video, among participants in a video conference relies on a series of mechanisms and protocols that must operate properly to prevent communication degradation. This study examines the behavior of WebRTC-based video conferencing platforms when subjected to bandwidth restrictions. In this investigation, an analysis is carried out on Elos and Google Meet platforms using a cross-layer indicator-based approach to evaluate the quality of service of video conferencing applications. The results suggest that the platforms employ distinct approaches to handle scenarios of limited network capacity. By considering user mobility, our investigation allows to assess the quality of service delivered by each platform when subjected to varying network performance conditions within a videoconferencing session.

鉴于近年来视频会议平台的广泛采用,所提供的服务质量变得至关重要。视频会议参与者之间的数据交换(包括音频和视频)依赖于一系列机制和协议,这些机制和协议必须正确运行以防止通信退化。本研究考察了基于webbrtc的视频会议平台在受到带宽限制时的行为。本研究采用基于跨层指标的方法,对Elos和谷歌会议平台进行了分析,以评估视频会议应用的服务质量。结果表明,平台采用不同的方法来处理网络容量有限的场景。通过考虑用户移动性,我们的调查可以评估每个平台在视频会议会话中受到不同网络性能条件时提供的服务质量。
{"title":"On the quality of WebRTC-based videoconferencing under adverse and mobility scenarios","authors":"Arthur Böckmann Grossi,&nbsp;Roberto Irajá Tavares da Costa Filho,&nbsp;Luciano Paschoal Gaspary","doi":"10.1007/s12243-025-01102-3","DOIUrl":"10.1007/s12243-025-01102-3","url":null,"abstract":"<div><p>Given the widespread adoption of video conferencing platforms in recent years, the quality of the provided service has become crucial. The exchange of data, including audio and video, among participants in a video conference relies on a series of mechanisms and protocols that must operate properly to prevent communication degradation. This study examines the behavior of WebRTC-based video conferencing platforms when subjected to bandwidth restrictions. In this investigation, an analysis is carried out on Elos and Google Meet platforms using a cross-layer indicator-based approach to evaluate the quality of service of video conferencing applications. The results suggest that the platforms employ distinct approaches to handle scenarios of limited network capacity. By considering user mobility, our investigation allows to assess the quality of service delivered by each platform when subjected to varying network performance conditions within a videoconferencing session.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 9-10","pages":"851 - 866"},"PeriodicalIF":2.2,"publicationDate":"2025-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Inferring change points in unlabelled time series data collected from the network diagnosis tool 推断从网络诊断工具收集的未标记时间序列数据中的变化点
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-06-18 DOI: 10.1007/s12243-025-01103-2
Cleiton M. de Almeida, Rosa M. M. Leão, Edmundo de Souza e Silva

Detecting significant statistical changes in time series data, such as change points and anomalies, is crucial for various applications, including computer network performance monitoring. Despite the availability of many detection algorithms, applying these techniques to real-world data remains a challenging topic due to their distinct effectiveness in different domains. This study focuses on identifying change points and anomalies in throughput and latency time series data from residential networks, emphasizing online methods. We evaluate well-established methods like Shewhart, EWMA, and CUSUM, which are simple to implement, and identify their limitations in real-world scenarios. We propose simple modifications to these classical methods to enhance their effectiveness when applied to data from network measurements. Furthermore, we introduce a new and flexible method, based on the concept of weighted voting. It is designed to detect change points while providing useful information to assess confidence in the results. Our methods were evaluated on two datasets: one we collected using the NDT protocol in Brazil and another from the publicly available Shao Dataset, which includes labeled time series of latency. We discuss the limitations of traditional methods, the effectiveness of our proposed approaches, and how to apply those for real-time network quality monitoring.

检测时间序列数据中的重大统计变化,例如变化点和异常,对于包括计算机网络性能监测在内的各种应用至关重要。尽管有许多检测算法可用,但由于这些技术在不同领域的有效性不同,将这些技术应用于实际数据仍然是一个具有挑战性的主题。本研究侧重于识别来自住宅网络的吞吐量和延迟时间序列数据的变化点和异常,强调在线方法。我们评估了诸如Shewhart、EWMA和CUSUM等易于实现的成熟方法,并确定了它们在实际场景中的局限性。我们对这些经典方法进行了简单的修改,以提高它们在处理网络测量数据时的有效性。此外,我们还引入了一种新的灵活的方法,基于加权投票的概念。它旨在检测变化点,同时提供有用的信息来评估结果的可信度。我们的方法在两个数据集上进行了评估:一个是我们在巴西使用NDT协议收集的数据集,另一个是来自公开可用的Shao数据集,其中包括标记的延迟时间序列。我们讨论了传统方法的局限性,我们提出的方法的有效性,以及如何将这些方法应用于实时网络质量监测。
{"title":"Inferring change points in unlabelled time series data collected from the network diagnosis tool","authors":"Cleiton M. de Almeida,&nbsp;Rosa M. M. Leão,&nbsp;Edmundo de Souza e Silva","doi":"10.1007/s12243-025-01103-2","DOIUrl":"10.1007/s12243-025-01103-2","url":null,"abstract":"<div><p>Detecting significant statistical changes in time series data, such as change points and anomalies, is crucial for various applications, including computer network performance monitoring. Despite the availability of many detection algorithms, applying these techniques to real-world data remains a challenging topic due to their distinct effectiveness in different domains. This study focuses on identifying change points and anomalies in throughput and latency time series data from residential networks, emphasizing online methods. We evaluate well-established methods like Shewhart, EWMA, and CUSUM, which are simple to implement, and identify their limitations in real-world scenarios. We propose simple modifications to these classical methods to enhance their effectiveness when applied to data from network measurements. Furthermore, we introduce a new and flexible method, based on the concept of weighted voting. It is designed to detect change points while providing useful information to assess confidence in the results. Our methods were evaluated on two datasets: one we collected using the NDT protocol in Brazil and another from the publicly available Shao Dataset, which includes labeled time series of latency. We discuss the limitations of traditional methods, the effectiveness of our proposed approaches, and how to apply those for real-time network quality monitoring.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 9-10","pages":"775 - 792"},"PeriodicalIF":2.2,"publicationDate":"2025-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISIVC 2024 special issue—signal and audio processing, digital communications, and networking ISIVC 2024特刊-信号和音频处理,数字通信和网络
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-05-24 DOI: 10.1007/s12243-025-01099-9
Abdellah Adib, Sofia Ben Jebara, Raja Elassali, Khalid Minaoui, Samir Saoudi
{"title":"ISIVC 2024 special issue—signal and audio processing, digital communications, and networking","authors":"Abdellah Adib,&nbsp;Sofia Ben Jebara,&nbsp;Raja Elassali,&nbsp;Khalid Minaoui,&nbsp;Samir Saoudi","doi":"10.1007/s12243-025-01099-9","DOIUrl":"10.1007/s12243-025-01099-9","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 and networking","pages":"375 - 377"},"PeriodicalIF":2.2,"publicationDate":"2025-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145169779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Annals of Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1