首页 > 最新文献

Annals of Telecommunications最新文献

英文 中文
Towards efficient conflict mitigation in the converged 6G Open RAN control plane 在融合型 6G 开放 RAN 控制平面中实现高效冲突缓解
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-05-16 DOI: 10.1007/s12243-024-01036-2
Marius Corici, Ramona Modroiu, Fabian Eichhorn, Eric Troudt, Thomas Magedanz

With the centralization of the RAN control functionality, a very large number of near real-time network optimization use cases have emerged. Until now, each of them has been implemented and validated as isolated network management functions, named xApps in Open RAN terminology. To be able to progress towards realistic, commercially deployable functionality, comprehensive conflict mitigation is needed, because the complete isolation of these xApps would result in conflicting decisions and instability. In this article, we study how the majority of these use cases can be implemented harmoniously, to create an enhanced RAN control plane, underlining the functionality required from the central units of the RAN, the grouping, and the interaction of the network management decision. Analyzing the gap existing in the O-RAN architecture, we identify the functionality needed and propose a management framework. Furthermore, we present an implementation roadmap for the development of such functionality as part of the Fraunhofer FOKUS Open5GCore toolkit, as a reference for how such functionality can be prototyped, validated, and integrated with external algorithms easily, to benefit from the large body of academic research.

随着 RAN 控制功能的集中化,出现了大量近乎实时的网络优化用例。到目前为止,每个用例都是作为孤立的网络管理功能(在开放 RAN 术语中称为 xApps)来实施和验证的。由于这些 xApps 的完全隔离会导致决策冲突和不稳定性,因此需要全面的冲突缓解措施,才能逐步实现可商业部署的现实功能。在本文中,我们将研究如何协调实施这些用例中的大多数,以创建增强型 RAN 控制平面,同时强调 RAN 中央单元、分组和网络管理决策交互所需的功能。通过分析 O-RAN 架构中存在的差距,我们确定了所需的功能,并提出了一个管理框架。此外,我们还提出了开发此类功能的实施路线图,作为弗劳恩霍夫 FOKUS Open5GCore 工具包的一部分,以此作为参考,说明此类功能如何能够轻松地进行原型开发、验证并与外部算法集成,从而从大量的学术研究中获益。
{"title":"Towards efficient conflict mitigation in the converged 6G Open RAN control plane","authors":"Marius Corici,&nbsp;Ramona Modroiu,&nbsp;Fabian Eichhorn,&nbsp;Eric Troudt,&nbsp;Thomas Magedanz","doi":"10.1007/s12243-024-01036-2","DOIUrl":"10.1007/s12243-024-01036-2","url":null,"abstract":"<div><p>With the centralization of the RAN control functionality, a very large number of near real-time network optimization use cases have emerged. Until now, each of them has been implemented and validated as isolated network management functions, named xApps in Open RAN terminology. To be able to progress towards realistic, commercially deployable functionality, comprehensive conflict mitigation is needed, because the complete isolation of these xApps would result in conflicting decisions and instability. In this article, we study how the majority of these use cases can be implemented harmoniously, to create an enhanced RAN control plane, underlining the functionality required from the central units of the RAN, the grouping, and the interaction of the network management decision. Analyzing the gap existing in the O-RAN architecture, we identify the functionality needed and propose a management framework. Furthermore, we present an implementation roadmap for the development of such functionality as part of the Fraunhofer FOKUS Open5GCore toolkit, as a reference for how such functionality can be prototyped, validated, and integrated with external algorithms easily, to benefit from the large body of academic research.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 9-10","pages":"621 - 631"},"PeriodicalIF":1.8,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-024-01036-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140969437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing the principle of least administrative privilege on operating systems: challenges and perspectives 在操作系统中执行最小管理权限原则:挑战与展望
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-05-16 DOI: 10.1007/s12243-024-01033-5
Eddie Billoir, Romain Laborde, Ahmad Samer Wazan, Yves Rütschlé, Abdelmalek Benzekri

With the new personal data protection or export control regulations, the principle of least privilege is mandatory and must be applied even for system administrators. This article explores the different approaches implemented by the main operating systems (namely Linux, Windows, FreeBSD, and Solaris) to control the privileges of system administrators in order to enforce the principle of least privilege. We define a set of requirements to manage these privileges properly, striving to balance adherence to the principle of least privilege and usability. We also present a deep analysis of each administrative privilege system based on these requirements and exhibit their benefits and limitations. This evaluation also covers the efficiency of the currently available solutions to assess the difficulty of performing administrative privileges management tasks. Following the results, the article presents the RootAsRole project, which aims to simplify Linux privilege management. We describe the new features introduced by the project and the difficulties we faced. This concrete experience allows us to highlight research challenges.

随着新的个人信息保护或出口管制条例的出台,最小特权原则是强制性的,即使是系统管理员也必须适用。本文探讨了主要操作系统(即Linux、Windows、FreeBSD和Solaris)为控制系统管理员的特权而实现的不同方法,以便执行最小特权原则。我们定义了一组需求来正确地管理这些特权,努力平衡遵守最小特权原则和可用性。我们还根据这些要求对每种管理特权制度进行了深入分析,并展示了它们的优点和局限性。该评估还涵盖了当前可用解决方案的效率,以评估执行管理特权管理任务的难度。根据结果,本文将介绍RootAsRole项目,该项目旨在简化Linux权限管理。我们描述了项目引入的新功能和我们面临的困难。这种具体的经验使我们能够突出研究的挑战。
{"title":"Implementing the principle of least administrative privilege on operating systems: challenges and perspectives","authors":"Eddie Billoir,&nbsp;Romain Laborde,&nbsp;Ahmad Samer Wazan,&nbsp;Yves Rütschlé,&nbsp;Abdelmalek Benzekri","doi":"10.1007/s12243-024-01033-5","DOIUrl":"10.1007/s12243-024-01033-5","url":null,"abstract":"<div><p>With the new personal data protection or export control regulations, the principle of least privilege is mandatory and must be applied even for system administrators. This article explores the different approaches implemented by the main operating systems (namely Linux, Windows, FreeBSD, and Solaris) to control the privileges of system administrators in order to enforce the principle of least privilege. We define a set of requirements to manage these privileges properly, striving to balance adherence to the principle of least privilege and usability. We also present a deep analysis of each administrative privilege system based on these requirements and exhibit their benefits and limitations. This evaluation also covers the efficiency of the currently available solutions to assess the difficulty of performing administrative privileges management tasks. Following the results, the article presents the RootAsRole project, which aims to simplify Linux privilege management. We describe the new features introduced by the project and the difficulties we faced. This concrete experience allows us to highlight research challenges.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 11-12","pages":"857 - 880"},"PeriodicalIF":1.8,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140968647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fixed-text keystroke dynamics authentication data set—collection and analysis 固定文字按键动态验证数据集收集与分析
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-05-15 DOI: 10.1007/s12243-024-01039-z
Halvor Nybø Risto, Olaf Hallan Graven

Keystroke dynamics authentication is a method of authenticating a user and could be an alternative or addition to one-time codes, with minimal user inconvenience. In this study, a new data set was collected for 6 unique passwords, adding to the limited available data sets for keystroke dynamics available for researchers. Data was collected by emulating legitimate users familiar with the passwords and a wider range of attackers with limited login attempts. The data set is analyzed with the use of various methods, and the effects of password length and complexity are investigated. Two algorithms were employed, one achieving an average equal error rate varying between 10.2 and 18.1% depending on the password, and the other method achieving an average true accept rate of 98% and true reject rate of 90.4% by comparing across multiple individuals in the data set. These results provide a benchmark for further studies on this data set.

击键动力学身份验证是对用户进行身份验证的一种方法,可以作为一次性代码的替代方法或附加方法,给用户带来的不便最小。在这项研究中,收集了6个唯一密码的新数据集,增加了研究人员可用的击键动力学有限的可用数据集。数据是通过模拟熟悉密码的合法用户和登录尝试次数有限的更大范围的攻击者收集的。使用各种方法对数据集进行分析,并研究了密码长度和复杂度的影响。采用了两种算法,一种算法根据密码的不同实现了10.2%到18.1%的平均相等错误率,另一种方法通过对数据集中多个个体的比较实现了98%的平均真实接受率和90.4%的真实拒绝率。这些结果为进一步研究该数据集提供了一个基准。
{"title":"Fixed-text keystroke dynamics authentication data set—collection and analysis","authors":"Halvor Nybø Risto,&nbsp;Olaf Hallan Graven","doi":"10.1007/s12243-024-01039-z","DOIUrl":"10.1007/s12243-024-01039-z","url":null,"abstract":"<div><p>Keystroke dynamics authentication is a method of authenticating a user and could be an alternative or addition to one-time codes, with minimal user inconvenience. In this study, a new data set was collected for 6 unique passwords, adding to the limited available data sets for keystroke dynamics available for researchers. Data was collected by emulating legitimate users familiar with the passwords and a wider range of attackers with limited login attempts. The data set is analyzed with the use of various methods, and the effects of password length and complexity are investigated. Two algorithms were employed, one achieving an average equal error rate varying between 10.2 and 18.1% depending on the password, and the other method achieving an average true accept rate of 98% and true reject rate of 90.4% by comparing across multiple individuals in the data set. These results provide a benchmark for further studies on this data set.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 11-12","pages":"731 - 743"},"PeriodicalIF":1.8,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-024-01039-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140975659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards intent-based management for Open Radio Access Networks: an agile framework for detecting service-level agreement conflicts 实现开放式无线接入网基于意图的管理:检测服务级协议冲突的敏捷框架
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-05-10 DOI: 10.1007/s12243-024-01035-3
Nicollas R. de Oliveira, Dianne S. V. Medeiros, Igor M. Moraes, Martin Andreonni, Diogo M. F. Mattos

Radio Access Networks (RAN) management and orchestration are challenging due to the network’s complexity and dynamics. Management and orchestration rely on enforcing complex policies derived from mapping high-level intents, expressed as Service-Level Agreements (SLAs), into low-level actions to be deployed on the network. Such mapping is human-made and frequently leads to errors. This paper proposes the AGility in Intent-based management of service-level agreement Refinements (AGIR) system for implementing automated intent-based management in Open Radio Access Networks (Open RAN). The proposed system is modular and relies on Natural Language Processing (NLP) to allow operators to specify Service-Level Objectives (SLOs) for the RAN to fulfill without explicitly defining how to achieve these SLOs. It is possible because the AGIR system translates imprecise intents into configurable network instructions, detecting conflicts among the received intents. To develop the conflict detection module, we propose to use two deep neural network models, Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU). The deep neural network model determines whether intents and policies are conflicting. Our results reveal that the proposed system reaches more than 80% recall in detecting conflicting intents when deploying an LSTM model with 256 neurons.

由于网络的复杂性和动态性,无线接入网络(RAN)的管理和协调具有挑战性。管理和协调依赖于执行复杂的策略,这些策略来自于将高级意图(表现为服务级别协议(SLA))映射为网络上部署的低级操作。这种映射是人为的,经常会导致错误。本文提出了基于意图的服务级协议细化管理(AGility in Intent-based management of service-level agreement Refinements,AGIR)系统,用于在开放无线接入网络(Open RAN)中实施基于意图的自动化管理。建议的系统是模块化的,依赖于自然语言处理(NLP),允许运营商指定 RAN 要实现的服务级目标(SLO),而无需明确定义如何实现这些 SLO。之所以能做到这一点,是因为 AGIR 系统能将不精确的意图转化为可配置的网络指令,并检测接收到的意图之间的冲突。为了开发冲突检测模块,我们建议使用两种深度神经网络模型:长短期记忆(LSTM)和门控循环单元(GRU)。深度神经网络模型可确定意图和策略是否存在冲突。我们的研究结果表明,当使用具有 256 个神经元的 LSTM 模型时,所提出的系统在检测冲突意图方面的召回率超过了 80%。
{"title":"Towards intent-based management for Open Radio Access Networks: an agile framework for detecting service-level agreement conflicts","authors":"Nicollas R. de Oliveira,&nbsp;Dianne S. V. Medeiros,&nbsp;Igor M. Moraes,&nbsp;Martin Andreonni,&nbsp;Diogo M. F. Mattos","doi":"10.1007/s12243-024-01035-3","DOIUrl":"10.1007/s12243-024-01035-3","url":null,"abstract":"<div><p>Radio Access Networks (RAN) management and orchestration are challenging due to the network’s complexity and dynamics. Management and orchestration rely on enforcing complex policies derived from mapping high-level intents, expressed as Service-Level Agreements (SLAs), into low-level actions to be deployed on the network. Such mapping is human-made and frequently leads to errors. This paper proposes the AGility in Intent-based management of service-level agreement Refinements (AGIR) system for implementing automated intent-based management in Open Radio Access Networks (Open RAN). The proposed system is modular and relies on Natural Language Processing (NLP) to allow operators to specify Service-Level Objectives (SLOs) for the RAN to fulfill without explicitly defining how to achieve these SLOs. It is possible because the AGIR system translates imprecise intents into configurable network instructions, detecting conflicts among the received intents. To develop the conflict detection module, we propose to use two deep neural network models, Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU). The deep neural network model determines whether intents and policies are conflicting. Our results reveal that the proposed system reaches more than 80% recall in detecting conflicting intents when deploying an LSTM model with 256 neurons.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 9-10","pages":"693 - 706"},"PeriodicalIF":1.8,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140925789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital credentials management system using rejectable soulbound tokens 使用可拒绝灵魂绑定令牌的数字凭证管理系统
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-23 DOI: 10.1007/s12243-024-01032-6
Rosa Pericàs-Gornals, Macià Mut-Puigserver, M. Magdalena Payeras-Capellá, Miquel Á. Cabot-Nadal, Jaume Ramis-Bibiloni

Digital credentials are being issued by authorized entities to facilitate the digital identification of their users. Blockchain offers some inherent features that are highly advantageous for the management of credentials. Non-fungible tokens, or NFTs, might seem to be a perfect fit for the implementation of digital credentials. However, some crucial requirements for credentials are the non-transferability of the credential and that the authorized entity should receive explicit acceptance from the user who will own the new credential, which are features lacking in the current NFTs. This paper introduces a management system focused on issuing digital access credentials, enhancing traditional features by enabling the association of terms and conditions (T &C) during issuance and providing users with non-repudiation of reception evidence upon acceptance. Leveraging an enhanced version of the soulbound tokens (SBTs), called RejSBTs, introduced in our previous work, the new system guarantees non-repudiation of reception and origin proofs. Furthermore, we provide a detailed implementation of the system, including solidity smart contracts, accompanied by a comprehensive cost and security analysis.

数字证书由授权实体颁发,以方便对其用户进行数字识别。区块链提供了一些对凭据管理非常有利的固有特性。不可替代的令牌(nft)似乎非常适合数字凭证的实现。然而,凭证的一些关键要求是凭证的不可转移性,并且授权实体应该得到将拥有新凭证的用户的明确接受,这些都是当前nft所缺乏的特性。本文介绍了一个专注于颁发数字访问凭证的管理系统,通过在颁发过程中启用条款和条件(T &;C)关联来增强传统功能,并在接受时为用户提供不可否认的接收证据。利用我们之前工作中引入的灵魂绑定令牌(sbt)的增强版本,称为rejsbt,新系统保证了接收和起源证明的不可否认性。此外,我们还提供了系统的详细实施,包括可靠的智能合约,并附有全面的成本和安全分析。
{"title":"Digital credentials management system using rejectable soulbound tokens","authors":"Rosa Pericàs-Gornals,&nbsp;Macià Mut-Puigserver,&nbsp;M. Magdalena Payeras-Capellá,&nbsp;Miquel Á. Cabot-Nadal,&nbsp;Jaume Ramis-Bibiloni","doi":"10.1007/s12243-024-01032-6","DOIUrl":"10.1007/s12243-024-01032-6","url":null,"abstract":"<div><p>Digital credentials are being issued by authorized entities to facilitate the digital identification of their users. Blockchain offers some inherent features that are highly advantageous for the management of credentials. Non-fungible tokens, or NFTs, might seem to be a perfect fit for the implementation of digital credentials. However, some crucial requirements for credentials are the non-transferability of the credential and that the authorized entity should receive explicit acceptance from the user who will own the new credential, which are features lacking in the current NFTs. This paper introduces a management system focused on issuing digital access credentials, enhancing traditional features by enabling the association of terms and conditions (T &amp;C) during issuance and providing users with non-repudiation of reception evidence upon acceptance. Leveraging an enhanced version of the soulbound tokens (SBTs), called RejSBTs, introduced in our previous work, the new system guarantees non-repudiation of reception and origin proofs. Furthermore, we provide a detailed implementation of the system, including solidity smart contracts, accompanied by a comprehensive cost and security analysis.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 11-12","pages":"843 - 855"},"PeriodicalIF":1.8,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-024-01032-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140667267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental demonstration of reflected beamforming and interference nulling at sub6GHz thanks to varactor-based reconfigurable intelligent surface 基于变容二极管的可重构智能表面在 6GHz 以下频率实现反射波束成形和干扰消除的实验演示
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-18 DOI: 10.1007/s12243-024-01037-1
Philippe Ratajczak, Ramiz Bennadji, Eric Séguenot, Dinh-Thuy Phan-Huy

Reconfigurable intelligent surface (RIS) is a promising solution to boost coverage sustainably by reflecting waves from a transmitter to a receiver and acting as a low-power and passive relay. In this paper, for the first time, we demonstrate experimentally that a reconfigurable intelligent surface designed for sub6GHz, and using varactor technology, can perform three-dimensional reflective beamforming and interference nulling. This result is achieved with a RIS prototype of 984 unit-cells, thanks to a compact control circuit individually addressing and configuring the voltage of each unit-cell, with a distinct voltage. To our knowledge, this prototype configures 17 to 70 times more distinct voltages than in the state-of-the-art. The experimental results in an indoor environment show a 10-dB gain. They also show, for the first time, that producing such a new prototype is feasible with minimal energy footprint and environmental impact, thanks to refurbishing. Indeed, a reflectarray antenna originally designed for three-dimensional beamforming has been turned into a RIS.

可重构智能表面(RIS)是一种很有前途的解决方案,它能将电波从发射器反射到接收器,并充当低功耗和无源中继器,从而持续提高覆盖率。在本文中,我们首次通过实验证明,针对 6GHz 以下频率设计的可重构智能表面采用变容二极管技术,可以进行三维反射波束成形和干扰消除。这一成果是在一个由 984 个单元单元组成的 RIS 原型上实现的,这要归功于一个紧凑的控制电路,它可以单独寻址和配置每个单元单元的电压,并赋予其不同的电压。据我们所知,该原型配置的不同电压是最先进技术的 17 到 70 倍。室内环境下的实验结果显示,增益为 10 分贝。实验结果还首次表明,通过翻新,生产这种新的原型是可行的,而且能源足迹和环境影响最小。事实上,一个原本为三维波束成形而设计的反射阵列天线已经变成了一个 RIS。
{"title":"Experimental demonstration of reflected beamforming and interference nulling at sub6GHz thanks to varactor-based reconfigurable intelligent surface","authors":"Philippe Ratajczak,&nbsp;Ramiz Bennadji,&nbsp;Eric Séguenot,&nbsp;Dinh-Thuy Phan-Huy","doi":"10.1007/s12243-024-01037-1","DOIUrl":"10.1007/s12243-024-01037-1","url":null,"abstract":"<div><p>Reconfigurable intelligent surface (RIS) is a promising solution to boost coverage sustainably by reflecting waves from a transmitter to a receiver and acting as a low-power and passive relay. In this paper, for the first time, we demonstrate experimentally that a reconfigurable intelligent surface designed for sub6GHz, and using varactor technology, can perform three-dimensional reflective beamforming and interference nulling. This result is achieved with a RIS prototype of 984 unit-cells, thanks to a compact control circuit individually addressing and configuring the voltage of each unit-cell, with a distinct voltage. To our knowledge, this prototype configures 17 to 70 times more distinct voltages than in the state-of-the-art. The experimental results in an indoor environment show a 10-dB gain. They also show, for the first time, that producing such a new prototype is feasible with minimal energy footprint and environmental impact, thanks to refurbishing. Indeed, a reflectarray antenna originally designed for three-dimensional beamforming has been turned into a RIS.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 9-10","pages":"633 - 648"},"PeriodicalIF":1.8,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140610878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personal data filtering: a systematic literature review comparing the effectiveness of XSS attacks in web applications vs cookie stealing 个人数据过滤:比较网络应用程序中 XSS 攻击与 Cookie 窃取有效性的系统性文献综述
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-18 DOI: 10.1007/s12243-024-01022-8
Germán Rodríguez-Galán, Jenny Torres

Cross-site scripting (XSS) attacks pose a significant threat to the security of web applications, as they compromise personal information by stealing cookies. This study investigates the relationship between XSS attacks targeting websites versus XSS attacks aimed at stealing cookies to leak personal information. A systematic literature review has been conducted, analyzing 96 scientific articles from 2018 to 2023. Three complementary research questions have been proposed to address trends in methods and tools to detect vulnerabilities or mitigate XSS attacks, techniques to steal cookies, and leakage of personal data through cookie theft. Rayyan Intelligent Systematic Literature, Atlas.ti, and Research Rabbit tool supported our analysis, using sources such as IEEE Digital Xplore, ACM Digital Library, Springer Link, Web of Science, and Mendeley. The snowballing technique was applied using the Research Rabbit tool to find related articles, avoid inconsistent parameters and publications, and reduce the risk of bias. The ratio between XSS attacks on websites and cookie theft through XSS attacks is 5:1. It is crucial to persist in studying and introducing novel methods or tools to address this problem and provide better protection against cookie hijacking through XSS attacks. The research gap lies in understanding how our personal information is filtered by the theft of cookies through XSS attacks. More research is needed to fill this gap and to develop novel techniques or tools that teach the end user how their personal information is leaked by stealing cookies using XSS attacks.

跨站脚本(XSS)攻击通过窃取 cookie 来泄露个人信息,对网络应用程序的安全性构成重大威胁。本研究调查了针对网站的XSS攻击与旨在窃取cookie以泄露个人信息的XSS攻击之间的关系。本研究进行了系统的文献综述,分析了 2018 年至 2023 年的 96 篇科学文章。针对检测漏洞或缓解XSS攻击的方法和工具、窃取cookie的技术以及通过窃取cookie泄露个人信息的趋势,提出了三个互补的研究问题。Rayyan Intelligent Systematic Literature、Atlas.ti 和 Research Rabbit 工具利用 IEEE Digital Xplore、ACM Digital Library、Springer Link、Web of Science 和 Mendeley 等资源为我们的分析提供了支持。使用 Research Rabbit 工具采用了滚雪球技术,以查找相关文章,避免参数和出版物不一致,并降低偏差风险。对网站的 XSS 攻击与通过 XSS 攻击窃取 cookie 的比例为 5:1。因此,必须坚持不懈地研究和引入新方法或工具来解决这一问题,并提供更好的保护,防止通过 XSS 攻击劫持 cookie。研究缺口在于了解通过 XSS 攻击窃取 cookie 是如何过滤我们的个人信息的。需要开展更多研究来填补这一空白,并开发新型技术或工具,让最终用户了解他们的个人信息是如何通过 XSS 攻击窃取 cookie 而泄露的。
{"title":"Personal data filtering: a systematic literature review comparing the effectiveness of XSS attacks in web applications vs cookie stealing","authors":"Germán Rodríguez-Galán,&nbsp;Jenny Torres","doi":"10.1007/s12243-024-01022-8","DOIUrl":"10.1007/s12243-024-01022-8","url":null,"abstract":"<div><p>Cross-site scripting (XSS) attacks pose a significant threat to the security of web applications, as they compromise personal information by stealing cookies. This study investigates the relationship between XSS attacks targeting websites versus XSS attacks aimed at stealing cookies to leak personal information. A systematic literature review has been conducted, analyzing 96 scientific articles from 2018 to 2023. Three complementary research questions have been proposed to address trends in methods and tools to detect vulnerabilities or mitigate XSS attacks, techniques to steal cookies, and leakage of personal data through cookie theft. Rayyan Intelligent Systematic Literature, Atlas.ti, and Research Rabbit tool supported our analysis, using sources such as IEEE Digital Xplore, ACM Digital Library, Springer Link, Web of Science, and Mendeley. The snowballing technique was applied using the Research Rabbit tool to find related articles, avoid inconsistent parameters and publications, and reduce the risk of bias. The ratio between XSS attacks on websites and cookie theft through XSS attacks is 5:1. It is crucial to persist in studying and introducing novel methods or tools to address this problem and provide better protection against cookie hijacking through XSS attacks. The research gap lies in understanding how our personal information is filtered by the theft of cookies through XSS attacks. More research is needed to fill this gap and to develop novel techniques or tools that teach the end user how their personal information is leaked by stealing cookies using XSS attacks.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 11-12","pages":"763 - 802"},"PeriodicalIF":1.8,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140611368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FATE: flexible attribute-based traceable encrypted data sharing scheme using smart contracts in wireless medical sensor networks FATE:无线医疗传感器网络中使用智能合约的基于属性的灵活可追踪加密数据共享方案
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-18 DOI: 10.1007/s12243-024-01038-0
Aparna Singh, Geetanjali Rathee

Given the adaptability and effectiveness of the smart health sector, it has gained much momentum in the last few years, particularly during the COVID-19 pandemic. However, the security and privacy of data sent through a public communication channel are gravely threatened by adopting cloud services for data sharing. The security and privacy of the data are also in jeopardy, as the owners lose full ownership of the material once it is uploaded to the cloud. In recent years, ciphertext policy attribute-based encryption (CP-ABE) has shown great potential as a privacy-preserving encryption mechanism. In this paper, a decentralized method of large-scale data storage has been introduced using the interplanetary file system (IPFS), thereby eliminating the issue of centralized storage and frequent data unavailability. A reliable third-party hospital node in a secure environment is adopted in the proposed model to guarantee data integrity and to reduce the load on the resource-constrained devices of the user. Simulation using the Charm-Crypto framework and Pairing-Based Cryptography library using the SS512 curve proves its performance and efficiency. The proposed scheme’s encryption time is constant at 46.96 ms regardless of the size of the attribute set, the key generation time is reduced by 79.09%, and the storage overhead is reduced by 71.3% as compared to the existing schemes.

鉴于智能卫生部门的适应性和有效性,它在过去几年,特别是在 COVID-19 大流行期间获得了巨大的发展势头。然而,采用云服务共享数据会严重威胁通过公共通信渠道发送数据的安全性和隐私性。数据的安全性和隐私性也岌岌可危,因为一旦上传到云端,数据的所有者就失去了对数据的完全所有权。近年来,基于密文策略属性的加密(CP-ABE)作为一种保护隐私的加密机制已显示出巨大的潜力。本文介绍了一种利用星际文件系统(IPFS)进行大规模数据存储的去中心化方法,从而消除了集中存储和数据经常不可用的问题。所提出的模型采用了安全环境中可靠的第三方医院节点,以保证数据的完整性,并减轻用户资源受限设备的负荷。使用 Charm-Crypto 框架和基于配对的加密库(使用 SS512 曲线)进行的仿真证明了其性能和效率。与现有方案相比,无论属性集大小如何,拟议方案的加密时间都保持在 46.96 毫秒,密钥生成时间减少了 79.09%,存储开销减少了 71.3%。
{"title":"FATE: flexible attribute-based traceable encrypted data sharing scheme using smart contracts in wireless medical sensor networks","authors":"Aparna Singh, Geetanjali Rathee","doi":"10.1007/s12243-024-01038-0","DOIUrl":"https://doi.org/10.1007/s12243-024-01038-0","url":null,"abstract":"<p>Given the adaptability and effectiveness of the smart health sector, it has gained much momentum in the last few years, particularly during the COVID-19 pandemic. However, the security and privacy of data sent through a public communication channel are gravely threatened by adopting cloud services for data sharing. The security and privacy of the data are also in jeopardy, as the owners lose full ownership of the material once it is uploaded to the cloud. In recent years, ciphertext policy attribute-based encryption (CP-ABE) has shown great potential as a privacy-preserving encryption mechanism. In this paper, a decentralized method of large-scale data storage has been introduced using the interplanetary file system (IPFS), thereby eliminating the issue of centralized storage and frequent data unavailability. A reliable third-party hospital node in a secure environment is adopted in the proposed model to guarantee data integrity and to reduce the load on the resource-constrained devices of the user. Simulation using the Charm-Crypto framework and Pairing-Based Cryptography library using the SS512 curve proves its performance and efficiency. The proposed scheme’s encryption time is constant at 46.96 ms regardless of the size of the attribute set, the key generation time is reduced by 79.09%, and the storage overhead is reduced by 71.3% as compared to the existing schemes.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"81 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140611019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-agent deep Q-learning-based joint relay and jammer selection in dual-hop wireless networks 双跳无线网络中基于多代理深度 Q 学习的联合中继和干扰器选择
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-18 DOI: 10.1007/s12243-024-01034-4
Anil Kumar Kamboj, Poonam Jindal, Pankaj Verma

Physical layer security (PLS) has cropped up as a promising solution to secure the wireless network. Cooperative communication is capable of improving the PLS, in addition to increasing the coverage area and reliability. It applies to diverse wireless systems, including long-term evolution (LTE) cellular systems, mobile ad hoc networks, and wireless sensor networks. The selection of relay and jammer nodes from the cluster of intermediate nodes can easily counter the strong eavesdroppers. Existing techniques of joint relay and jammer selection (JRJS) solve the optimization problem to find near-optimal secrecy. However, due to their computational complexity, most of these algorithms are not scalable for large networks. In this manuscript, we introduced the multi-agent deep Q-learning (MADQL) algorithm for secure joint relay and jammer selection in dual-hop wireless cooperative networks. The JRJS is transformed into a prediction-based problem and solved using deep Q-learning algorithms. The proposed reinforcement learning technique is model-free and best suited for situations where the exact global channel state information (CSI) for all the links is unavailable. The secrecy performance of the introduced algorithm is compared with the existing techniques. Simulation results confirmed that the MADQL-JRJS algorithm outperformed the existing algorithms.

物理层安全(PLS)已成为确保无线网络安全的一种有前途的解决方案。除了扩大覆盖范围和提高可靠性之外,合作通信还能改善物理层安全。它适用于各种无线系统,包括长期演进(LTE)蜂窝系统、移动 ad hoc 网络和无线传感器网络。从中间节点集群中选择中继节点和干扰节点,可以轻松对付强大的窃听者。现有的联合中继和干扰器选择(JRJS)技术可以解决优化问题,找到接近最优的保密性。然而,由于其计算复杂性,这些算法大多无法扩展到大型网络。在本手稿中,我们引入了多代理深度 Q-learning 算法(MADQL),用于双跳无线合作网络中的安全联合中继和干扰器选择。JRJS 被转化为一个基于预测的问题,并使用深度 Q-learning 算法来解决。所提出的强化学习技术不需要模型,最适用于无法获得所有链路的精确全局信道状态信息(CSI)的情况。引入算法的保密性能与现有技术进行了比较。仿真结果证实,MADQL-JRJS 算法的性能优于现有算法。
{"title":"A multi-agent deep Q-learning-based joint relay and jammer selection in dual-hop wireless networks","authors":"Anil Kumar Kamboj, Poonam Jindal, Pankaj Verma","doi":"10.1007/s12243-024-01034-4","DOIUrl":"https://doi.org/10.1007/s12243-024-01034-4","url":null,"abstract":"<p>Physical layer security (PLS) has cropped up as a promising solution to secure the wireless network. Cooperative communication is capable of improving the PLS, in addition to increasing the coverage area and reliability. It applies to diverse wireless systems, including long-term evolution (LTE) cellular systems, mobile ad hoc networks, and wireless sensor networks. The selection of relay and jammer nodes from the cluster of intermediate nodes can easily counter the strong eavesdroppers. Existing techniques of joint relay and jammer selection (JRJS) solve the optimization problem to find near-optimal secrecy. However, due to their computational complexity, most of these algorithms are not scalable for large networks. In this manuscript, we introduced the multi-agent deep Q-learning (MADQL) algorithm for secure joint relay and jammer selection in dual-hop wireless cooperative networks. The JRJS is transformed into a prediction-based problem and solved using deep Q-learning algorithms. The proposed reinforcement learning technique is model-free and best suited for situations where the exact global channel state information (CSI) for all the links is unavailable. The secrecy performance of the introduced algorithm is compared with the existing techniques. Simulation results confirmed that the MADQL-JRJS algorithm outperformed the existing algorithms.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"4 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140611023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Organic 6G networks: ultra-flexibility through extensive stateless functional split 有机 6G 网络:通过广泛的无状态功能拆分实现超灵活性
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-04-12 DOI: 10.1007/s12243-024-01024-6
Marius Corici, Fabian Eichhorn, Hauke Buhr, Thomas Magedanz

With the increase in hardware performance, the 5G mobile network architecture shifted from physical components to software-only micro-services. The very modular network functions can be deployed flexibly on commodity hardware. However, the extensive modularity of these network functions is increasing the number of managed entities, and the core network request latency. Also, it requires extensive procedures to be able to re-select the components for specific devices, a fundamental condition for a potential system scale-down. In this paper, we propose a new organic 6G network architecture that handles these challenges through a new functionality split based on the experience of IT software services. Furthermore, we provide an analysis based on main 5G procedures, showing that the newly proposed architecture is handling the re-selection of functionality significantly better, which is a cornerstone of high-speed scaling (especially scaling-out), as well as migration of functionality and users.

随着硬件性能的提高,5G 移动网络架构从物理组件转向纯软件的微服务。非常模块化的网络功能可以灵活地部署在商品硬件上。然而,这些网络功能的广泛模块化增加了管理实体的数量和核心网络请求延迟。此外,要为特定设备重新选择组件还需要大量的程序,而这正是潜在系统缩放的基本条件。在本文中,我们提出了一种新的有机 6G 网络架构,通过基于 IT 软件服务经验的新功能拆分来应对这些挑战。此外,我们还基于主要的 5G 程序进行了分析,结果表明新提出的架构能更好地处理功能的重新选择,而这正是高速扩展(尤其是向外扩展)以及功能和用户迁移的基石。
{"title":"Organic 6G networks: ultra-flexibility through extensive stateless functional split","authors":"Marius Corici,&nbsp;Fabian Eichhorn,&nbsp;Hauke Buhr,&nbsp;Thomas Magedanz","doi":"10.1007/s12243-024-01024-6","DOIUrl":"10.1007/s12243-024-01024-6","url":null,"abstract":"<div><p>With the increase in hardware performance, the 5G mobile network architecture shifted from physical components to software-only micro-services. The very modular network functions can be deployed flexibly on commodity hardware. However, the extensive modularity of these network functions is increasing the number of managed entities, and the core network request latency. Also, it requires extensive procedures to be able to re-select the components for specific devices, a fundamental condition for a potential system scale-down. In this paper, we propose a new organic 6G network architecture that handles these challenges through a new functionality split based on the experience of IT software services. Furthermore, we provide an analysis based on main 5G procedures, showing that the newly proposed architecture is handling the re-selection of functionality significantly better, which is a cornerstone of high-speed scaling (especially scaling-out), as well as migration of functionality and users.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 9-10","pages":"605 - 619"},"PeriodicalIF":1.8,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-024-01024-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140573363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Annals of Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1