Pub Date : 2024-07-01DOI: 10.1007/s12243-024-01049-x
Diogo Menezes Ferrazani Mattos, Marc-Oliver Pahl, Carol Fung
{"title":"CSNet 2022 special issue—decentralized and data-driven security in networking","authors":"Diogo Menezes Ferrazani Mattos, Marc-Oliver Pahl, Carol Fung","doi":"10.1007/s12243-024-01049-x","DOIUrl":"10.1007/s12243-024-01049-x","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141699289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-26DOI: 10.1007/s12243-024-01044-2
Govinda M. G. Bezerra, Nicollas R. de Oliveira, Tadeu N. Ferreira, Diogo M. F. Mattos
Fifth-generation (5G) mobile networks offer flexibility to address various emerging use cases. Radio virtualization enhances flexibility by enabling multiple heterogeneous virtual radios to coexist on the same hardware. One method for virtualizing radio devices involves using virtual machines and containers to multiplex software radio implementations over generic multipurpose radio hardware. This paper reviews security issues in this context, evaluates the experimental bounds of communication for software-defined radio (SDR) devices, and assesses virtualization’s impact on radio virtualization’s performance. This study aims to determine the suitability of virtual environments for SDR applications. The results indicate that container-based radio virtualization performance is comparable to SDR applications running on native Linux.
第五代(5G)移动网络可灵活应对各种新兴用例。无线电虚拟化可使多个异构虚拟无线电在同一硬件上共存,从而提高灵活性。无线电设备虚拟化的一种方法是使用虚拟机和容器在通用多用途无线电硬件上复用软件无线电实施。本文回顾了这方面的安全问题,评估了软件定义无线电(SDR)设备的通信实验界限,并评估了虚拟化对无线电虚拟化性能的影响。这项研究旨在确定虚拟环境是否适合 SDR 应用。结果表明,基于容器的无线电虚拟化性能可与在本地 Linux 上运行的 SDR 应用程序相媲美。
{"title":"A comprehensive evaluation of software-defined radio performance in virtualized environments for radio access networks","authors":"Govinda M. G. Bezerra, Nicollas R. de Oliveira, Tadeu N. Ferreira, Diogo M. F. Mattos","doi":"10.1007/s12243-024-01044-2","DOIUrl":"10.1007/s12243-024-01044-2","url":null,"abstract":"<div><p>Fifth-generation (5G) mobile networks offer flexibility to address various emerging use cases. Radio virtualization enhances flexibility by enabling multiple heterogeneous virtual radios to coexist on the same hardware. One method for virtualizing radio devices involves using virtual machines and containers to multiplex software radio implementations over generic multipurpose radio hardware. This paper reviews security issues in this context, evaluates the experimental bounds of communication for software-defined radio (SDR) devices, and assesses virtualization’s impact on radio virtualization’s performance. This study aims to determine the suitability of virtual environments for SDR applications. The results indicate that container-based radio virtualization performance is comparable to SDR applications running on native Linux.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141507289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-18DOI: 10.1007/s12243-024-01045-1
Renato S. Silva, Felipe M. F. de Assis, Evandro L. C. Macedo, Luís Felipe M. de Moraes
Border Gateway Protocol (BGP) is increasingly becoming a multipurpose protocol. However, it keeps suffering from security issues such as bogus announcements for malicious goals. Some of these security breaches are especially critical for distributed intrusion detection systems that use BGP as the underlay network for interchanging alarms. In this sense, assessing the confidence level of detection alarms transported via BGP messages is critical to prevent internal attacks. Most of the proposals addressing the confidence level of detection alarms rely on complex and time-consuming mechanisms that can also be a potential target for further attacks. In this paper, we propose an out-of-band system based on machine learning to infer the confidence level of BGP messages, using just the mandatory fields of the header. Tests using two different data sets, (i) from the indirect effects of a widespread worm attack and (ii) using up-to-date data from the IPTraf Project, show promising results, considering well-known performance metrics, such as recall, accuracy, receiver operating characteristics (ROC), and f1-score.
{"title":"Inferring the confidence level of BGP-based distributed intrusion detection systems alarms","authors":"Renato S. Silva, Felipe M. F. de Assis, Evandro L. C. Macedo, Luís Felipe M. de Moraes","doi":"10.1007/s12243-024-01045-1","DOIUrl":"https://doi.org/10.1007/s12243-024-01045-1","url":null,"abstract":"<p>Border Gateway Protocol (BGP) is increasingly becoming a multipurpose protocol. However, it keeps suffering from security issues such as bogus announcements for malicious goals. Some of these security breaches are especially critical for distributed intrusion detection systems that use BGP as the underlay network for interchanging alarms. In this sense, assessing the confidence level of detection alarms transported via BGP messages is critical to prevent internal attacks. Most of the proposals addressing the confidence level of detection alarms rely on complex and time-consuming mechanisms that can also be a potential target for further attacks. In this paper, we propose an out-of-band system based on machine learning to infer the confidence level of BGP messages, using just the mandatory fields of the header. Tests using two different data sets, (<i>i</i>) from the indirect effects of a widespread worm attack and (<i>ii</i>) using up-to-date data from the IPTraf Project, show promising results, considering well-known performance metrics, such as recall, accuracy, receiver operating characteristics (ROC), and f1-score.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141507290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-17DOI: 10.1007/s12243-024-01048-y
F. Sinhababu, A. Mukherjee, S. Sarkar, B. Chatterjee, A. Sarkar
In the present work, a modified Costas loop is presented with the help of mathematical modeling and numerical simulation. The voltage-controlled oscillator output phase along with frequency is controlled using the input control voltage. The modified loop is tested as frequency demodulator circuit where the improvement in sideband attenuation is clearly visible using an additional phase control arrangement. Numerical simulation result leads to a similar conclusion when the ratio of third harmonic to first harmonic and the ratio of first sideband attenuation to carrier are obtained for different proportions of the phase control. Noise bandwidth and lock range of the modified loop are investigated with special emphasis on the dependence of these parameters on the phase modulator gain. Lock range of the loop is evaluated analytically. An excellent demodulation capability of the loop has been reported in the presence of the additional phase control. Analytical results coupled with numerical findings presented are in good agreement.
{"title":"Impact of phase modulator on the performance of Costas loop","authors":"F. Sinhababu, A. Mukherjee, S. Sarkar, B. Chatterjee, A. Sarkar","doi":"10.1007/s12243-024-01048-y","DOIUrl":"https://doi.org/10.1007/s12243-024-01048-y","url":null,"abstract":"<p> In the present work, a modified Costas loop is presented with the help of mathematical modeling and numerical simulation. The voltage-controlled oscillator output phase along with frequency is controlled using the input control voltage. The modified loop is tested as frequency demodulator circuit where the improvement in sideband attenuation is clearly visible using an additional phase control arrangement. Numerical simulation result leads to a similar conclusion when the ratio of third harmonic to first harmonic and the ratio of first sideband attenuation to carrier are obtained for different proportions of the phase control. Noise bandwidth and lock range of the modified loop are investigated with special emphasis on the dependence of these parameters on the phase modulator gain. Lock range of the loop is evaluated analytically. An excellent demodulation capability of the loop has been reported in the presence of the additional phase control. Analytical results coupled with numerical findings presented are in good agreement.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141507291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-13DOI: 10.1007/s12243-024-01043-3
Cherifa Hamroun, Ahmed Amamou, Kamel Haddadou, Hayat Haroun, Guy Pujolle
Nowadays, domain names are becoming crucial digital assets for any business. However, the media never stopped reporting phishing and identity theft attacks held by third-party entities that rely on domain names to mislead Internet users. Thus, Palo Alto Networks revealed in their studies 20 largely cyber-squatted domain names targeting popular brands. Based on their behavior, domain names appear in public lists that objectively evaluate their reputation. Blacklists contain domain names that have previously committed suspicious acts, whereas whitelists include the most popular and trustworthy domain names. For a long time, this listing technique has been used as a reactive approach to counter domain name-based attacks. However, it suffers from the limitation of responding late to attacks. Nowadays, techniques tend to be much more proactive. They operate before any attack occurs. As part of the CSNET conference, we published a short paper that describes a plethora of domain name attacks and their associated detection techniques using their lexical features (Hamroun et al. 2022). In this paper, we present an extended version of the original one which discusses the previously mentioned points in more detail and adds some elements of understanding when it comes to malicious domain name detection. Hence, we provide a literature review of malicious domain name detection techniques that use only the lexical features of domain names. These features are available, privacy-preserving, and highly improve detection results. The review covers recent works that report relevant performance categorized according to a new taxonomy. Moreover, we introduce a new criterion for comparing all the existing works based on targeted maliciousness type before discussing the limitations and the newly emerging research directions in this field.
{"title":"A review on lexical based malicious domain name detection methods","authors":"Cherifa Hamroun, Ahmed Amamou, Kamel Haddadou, Hayat Haroun, Guy Pujolle","doi":"10.1007/s12243-024-01043-3","DOIUrl":"10.1007/s12243-024-01043-3","url":null,"abstract":"<div><p>Nowadays, domain names are becoming crucial digital assets for any business. However, the media never stopped reporting phishing and identity theft attacks held by third-party entities that rely on domain names to mislead Internet users. Thus, Palo Alto Networks revealed in their studies 20 largely cyber-squatted domain names targeting popular brands. Based on their behavior, domain names appear in public lists that objectively evaluate their reputation. Blacklists contain domain names that have previously committed suspicious acts, whereas whitelists include the most popular and trustworthy domain names. For a long time, this listing technique has been used as a reactive approach to counter domain name-based attacks. However, it suffers from the limitation of responding late to attacks. Nowadays, techniques tend to be much more proactive. They operate before any attack occurs. As part of the CSNET conference, we published a short paper that describes a plethora of domain name attacks and their associated detection techniques using their lexical features (Hamroun et al. 2022). In this paper, we present an extended version of the original one which discusses the previously mentioned points in more detail and adds some elements of understanding when it comes to malicious domain name detection. Hence, we provide a literature review of malicious domain name detection techniques that use only the lexical features of domain names. These features are available, privacy-preserving, and highly improve detection results. The review covers recent works that report relevant performance categorized according to a new taxonomy. Moreover, we introduce a new criterion for comparing all the existing works based on targeted maliciousness type before discussing the limitations and the newly emerging research directions in this field.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"2024-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141507292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the growth of computer networks worldwide, there has been a greater need to protect local networks from malicious data that travel over the network. The increase in volume, speed, and variety of data requires a more robust, accurate intrusion detection system capable of analyzing a huge amount of data. This work proposes the creation of an intrusion detection system using stream classifiers and three classification layers—with and without a reduction in the number of features of the records and three classifiers in parallel with a voting system. The results obtained by the proposed system are compared against other models proposed in the literature, using two datasets to validate the proposed system. In all cases, gains in accuracy of up to 18.52% and 3.55% were obtained, using the datasets NSL-KDD and CICIDS2017, respectively. Reductions in classification time up to 35.51% and 94.90% were also obtained using the NSL-KDD and CICIDS2017 datasets, respectively.
{"title":"A distributed platform for intrusion detection system using data stream mining in a big data environment","authors":"Fábio César Schuartz, Mauro Fonseca, Anelise Munaretto","doi":"10.1007/s12243-024-01046-0","DOIUrl":"10.1007/s12243-024-01046-0","url":null,"abstract":"<div><p>With the growth of computer networks worldwide, there has been a greater need to protect local networks from malicious data that travel over the network. The increase in volume, speed, and variety of data requires a more robust, accurate intrusion detection system capable of analyzing a huge amount of data. This work proposes the creation of an intrusion detection system using stream classifiers and three classification layers—with and without a reduction in the number of features of the records and three classifiers in parallel with a voting system. The results obtained by the proposed system are compared against other models proposed in the literature, using two datasets to validate the proposed system. In all cases, gains in accuracy of up to 18.52% and 3.55% were obtained, using the datasets NSL-KDD and CICIDS2017, respectively. Reductions in classification time up to 35.51% and 94.90% were also obtained using the NSL-KDD and CICIDS2017 datasets, respectively.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"2024-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141553139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-07DOI: 10.1007/s12243-024-01047-z
João Vitorino, Miguel Silva, Eva Maia, Isabel Praça
The growing cybersecurity threats make it essential to use high-quality data to train machine learning (ML) models for network traffic analysis, without noisy or missing data. By selecting the most relevant features for cyber-attack detection, it is possible to improve both the robustness and computational efficiency of the models used in a cybersecurity system. This work presents a feature selection and consensus process that combines multiple methods and applies them to several network datasets. Two different feature sets were selected and were used to train multiple ML models with regular and adversarial training. Finally, an adversarial evasion robustness benchmark was performed to analyze the reliability of the different feature sets and their impact on the susceptibility of the models to adversarial examples. By using an improved dataset with more data diversity, selecting the best time-related features and a more specific feature set, and performing adversarial training, the ML models were able to achieve a better adversarially robust generalization. The robustness of the models was significantly improved without their generalization to regular traffic flows being affected, without increases of false alarms, and without requiring too many computational resources, which enables a reliable detection of suspicious activity and perturbed traffic flows in enterprise computer networks.
网络安全威胁与日俱增,因此必须使用高质量数据来训练用于网络流量分析的机器学习(ML)模型,而不能使用嘈杂或缺失的数据。通过选择与网络攻击检测最相关的特征,可以提高网络安全系统所用模型的鲁棒性和计算效率。本作品介绍了一种结合多种方法的特征选择和共识流程,并将其应用于多个网络数据集。我们选择了两种不同的特征集,并将其用于训练常规和对抗性训练的多个 ML 模型。最后,进行了对抗性规避鲁棒性基准测试,以分析不同特征集的可靠性及其对模型易受对抗性示例影响的程度。通过使用具有更多数据多样性的改进数据集、选择最佳时间相关特征和更具体的特征集以及进行对抗训练,ML 模型能够实现更好的对抗鲁棒泛化。这些模型的鲁棒性得到了显著提高,对常规流量的泛化没有受到影响,误报率没有增加,也不需要过多的计算资源,从而能够可靠地检测企业计算机网络中的可疑活动和扰动流量。
{"title":"Reliable feature selection for adversarially robust cyber-attack detection","authors":"João Vitorino, Miguel Silva, Eva Maia, Isabel Praça","doi":"10.1007/s12243-024-01047-z","DOIUrl":"https://doi.org/10.1007/s12243-024-01047-z","url":null,"abstract":"<p>The growing cybersecurity threats make it essential to use high-quality data to train machine learning (ML) models for network traffic analysis, without noisy or missing data. By selecting the most relevant features for cyber-attack detection, it is possible to improve both the robustness and computational efficiency of the models used in a cybersecurity system. This work presents a feature selection and consensus process that combines multiple methods and applies them to several network datasets. Two different feature sets were selected and were used to train multiple ML models with regular and adversarial training. Finally, an adversarial evasion robustness benchmark was performed to analyze the reliability of the different feature sets and their impact on the susceptibility of the models to adversarial examples. By using an improved dataset with more data diversity, selecting the best time-related features and a more specific feature set, and performing adversarial training, the ML models were able to achieve a better adversarially robust generalization. The robustness of the models was significantly improved without their generalization to regular traffic flows being affected, without increases of false alarms, and without requiring too many computational resources, which enables a reliable detection of suspicious activity and perturbed traffic flows in enterprise computer networks.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141553196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With the increasing sophistication and heterogeneity of network infrastructures, the need for Virtual Network Embedding (VNE) is becoming more critical than ever. VNE consists of mapping virtual networks on top of the physical infrastructure to optimize network resource use and improve overall network performance. Considered as one of the most important bricks of network slicing, it has been proven to be an NP-hard problem with no exact solution. Several heuristics and meta-heuristics were proposed to solve it. As heuristics do not provide satisfactory solutions, meta-heuristics allow a good exploration of the solutions’ space, though they require testing several solutions, which is generally unfeasible in a real world environment. Other methods relying on deep reinforcement learning (DRL) and combined with heuristics yield better performance without revealing issues such as sticking at local minima or poor space exploration limits. Nevertheless, these algorithms present varied performances according to the employed approach and the problem to be treated, resulting in robustness problems. To overcome these limits, we propose a robust placement approach based on the Algorithm Selection paradigm. The main idea is to dynamically select the best algorithm from a set of learning strategies regarding reward and sample efficiency at each time step. The proposed strategy acts as a meta-algorithm that brings more robustness to the network since it dynamically selects the best solution for a specific scenario. We propose two selection algorithms. First, we consider an offline selection in which the placement strategies are updated outside the selection period. In the second algorithm, the different agents are updated simultaneously with the selection process, which we call an online selection. Both solutions proved their efficiency and managed to dynamically select the best algorithm regarding acceptance ratio of the deployed services. Besides, the proposed solutions succeed in commuting to the best placement strategy depending on the strategies’ strengths while outperforming all standalone algorithms.
{"title":"A dynamic AI-based algorithm selection for Virtual Network Embedding","authors":"Abdelmounaim Bouroudi, Abdelkader Outtagarts, Yassine Hadjadj-Aoul","doi":"10.1007/s12243-024-01040-6","DOIUrl":"https://doi.org/10.1007/s12243-024-01040-6","url":null,"abstract":"<p>With the increasing sophistication and heterogeneity of network infrastructures, the need for Virtual Network Embedding (VNE) is becoming more critical than ever. VNE consists of mapping virtual networks on top of the physical infrastructure to optimize network resource use and improve overall network performance. Considered as one of the most important bricks of network slicing, it has been proven to be an NP-hard problem with no exact solution. Several heuristics and meta-heuristics were proposed to solve it. As heuristics do not provide satisfactory solutions, meta-heuristics allow a good exploration of the solutions’ space, though they require testing several solutions, which is generally unfeasible in a real world environment. Other methods relying on deep reinforcement learning (DRL) and combined with heuristics yield better performance without revealing issues such as sticking at local minima or poor space exploration limits. Nevertheless, these algorithms present varied performances according to the employed approach and the problem to be treated, resulting in robustness problems. To overcome these limits, we propose a robust placement approach based on the Algorithm Selection paradigm. The main idea is to dynamically select the best algorithm from a set of learning strategies regarding reward and sample efficiency at each time step. The proposed strategy acts as a meta-algorithm that brings more robustness to the network since it dynamically selects the best solution for a specific scenario. We propose two selection algorithms. First, we consider an offline selection in which the placement strategies are updated outside the selection period. In the second algorithm, the different agents are updated simultaneously with the selection process, which we call an online selection. Both solutions proved their efficiency and managed to dynamically select the best algorithm regarding acceptance ratio of the deployed services. Besides, the proposed solutions succeed in commuting to the best placement strategy depending on the strategies’ strengths while outperforming all standalone algorithms.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141255332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-29DOI: 10.1007/s12243-024-01042-4
Nagendra Kumar
In this study, we examine the performance of higher-order quadrature amplitude modulation (QAM) schemes in a two-way multiple-relay network. This network employs three-phase analog network coding and an opportunistic relay selection algorithm while dealing with imperfect channel state information (CSI) and nonlinear power amplifiers (NLPA). Specifically, we derive lower-bound expressions for general-order rectangular QAM, hexagonal QAM, and cross QAM schemes. We assess performance over Nakagami-m fading channels with integer-valued fading parameters that are independently and non-identically distributed. Our analysis focuses on variable-gain amplify-and-forward relaying combined with maximal ratio combining receivers. To calculate closed-form average symbol error rate (ASER) expressions, we utilize a well-established approach based on cumulative distribution functions. We validate the accuracy of our derived expressions by comparing them to results obtained through Monte Carlo simulations. Furthermore, we investigate how fading parameters, the number of relay nodes, imperfect CSI, and NLPA affect the network’s performance.
{"title":"Impact of NLPA and imperfect CSI on ASER performance of QAM schemes for two-way 3P-ANC multiple-relay network","authors":"Nagendra Kumar","doi":"10.1007/s12243-024-01042-4","DOIUrl":"https://doi.org/10.1007/s12243-024-01042-4","url":null,"abstract":"<p>In this study, we examine the performance of higher-order quadrature amplitude modulation (QAM) schemes in a two-way multiple-relay network. This network employs three-phase analog network coding and an opportunistic relay selection algorithm while dealing with imperfect channel state information (CSI) and nonlinear power amplifiers (NLPA). Specifically, we derive lower-bound expressions for general-order rectangular QAM, hexagonal QAM, and cross QAM schemes. We assess performance over Nakagami-<i>m</i> fading channels with integer-valued fading parameters that are independently and non-identically distributed. Our analysis focuses on variable-gain amplify-and-forward relaying combined with maximal ratio combining receivers. To calculate closed-form average symbol error rate (ASER) expressions, we utilize a well-established approach based on cumulative distribution functions. We validate the accuracy of our derived expressions by comparing them to results obtained through Monte Carlo simulations. Furthermore, we investigate how fading parameters, the number of relay nodes, imperfect CSI, and NLPA affect the network’s performance.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141169274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}