Annals of Telecommunications最新文献

筛选
英文 中文
Hotspot analysis and prediction for mobile networking applications 移动网络应用的热点分析与预测
IF 2.2 4区 计算机科学
Annals of Telecommunications Pub Date : 2026-01-24 DOI: 10.1007/s12243-026-01144-1
Gwladys Ornella Djuikom Foka, Sachit Mishra, Razvan Stanica, Diala Naboulsi
{"title":"Hotspot analysis and prediction for mobile networking applications","authors":"Gwladys Ornella Djuikom Foka,&nbsp;Sachit Mishra,&nbsp;Razvan Stanica,&nbsp;Diala Naboulsi","doi":"10.1007/s12243-026-01144-1","DOIUrl":"10.1007/s12243-026-01144-1","url":null,"abstract":"<div><p>Understanding the dynamics of mobile traffic is highly valuable for a variety of fields, such as transportation and networking. In particular, analyzing <i>hotspots</i>, i.e., areas presenting an increased popularity at certain times, is crucial for adequate planning and management operations. Yet, despite its importance, we lack today a precise definition of the term <i>hotspot</i> in the community. The essence of this contribution is based on a unique mobile phone dataset collected by a French mobile operator in the city of Paris. In this work, we propose a new definition for the hotspot concept while highlighting the major weaknesses of the literature. Moreover, we provide an extensive benchmarking for the hotspot forecasting problem. Our results show that Long Short-Term Memory (LSTM) gives the best performance for the hotspot prediction problem, and we consider it for a Robotic Aerial Base Station (RABS) deployment application. In order to minimize the RABSs’ travel distances, we mathematically model the problem and introduce a greedy and Particle Swarm Optimization (PSO) algorithms to solve it. The results in terms of coverage ratio and travel distance showcase the difference between a prediction-based approach and a non-prediction-based approach.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"81 1-2","pages":"133 - 148"},"PeriodicalIF":2.2,"publicationDate":"2026-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147617982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial to the special issue on AI for cybersecurity (CSNet 2024) 人工智能网络安全特刊社论(CSNet 2024)
IF 2.2 4区 计算机科学
Annals of Telecommunications Pub Date : 2026-01-03 DOI: 10.1007/s12243-025-01141-w
Hassan N. Noura, Guy Pujolle, Ola Salman, Nicolas Puech
{"title":"Editorial to the special issue on AI for cybersecurity (CSNet 2024)","authors":"Hassan N. Noura,&nbsp;Guy Pujolle,&nbsp;Ola Salman,&nbsp;Nicolas Puech","doi":"10.1007/s12243-025-01141-w","DOIUrl":"10.1007/s12243-025-01141-w","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"929 - 931"},"PeriodicalIF":2.2,"publicationDate":"2026-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963714","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new similarity-based classification scheme of drone network attacks 基于相似度的无人机网络攻击分类新方案
IF 2.2 4区 计算机科学
Annals of Telecommunications Pub Date : 2025-12-10 DOI: 10.1007/s12243-025-01139-4
Salah-Dine Maham, Guy Pujolle, Atiq Ahmed, Dominique Gaiti
{"title":"A new similarity-based classification scheme of drone network attacks","authors":"Salah-Dine Maham,&nbsp;Guy Pujolle,&nbsp;Atiq Ahmed,&nbsp;Dominique Gaiti","doi":"10.1007/s12243-025-01139-4","DOIUrl":"10.1007/s12243-025-01139-4","url":null,"abstract":"<div><p>The Internet of drones (IoD) paradigm is an emerging technology that has gained significant attention from the research community in the recent years. Drone networks are now widely utilized in various sectors and industries. However, like all emerging technologies, these networks face numerous challenges, with security being the most critical. The wireless nature of drone communication makes them vulnerable to a variety of cyber attacks. In addition, the limited resources of drones pose challenges in implementing effective security solutions. This paper proposes a new approach to classifying drone cyber-attacks based on their similarities. We introduce a new step-by-step framework model to classify cyber attacks. Then, we highlight the existence of commonalities between different cyber attacks that can occur in drone network systems. This classification will serve as the foundation for the development of future unified solutions capable of efficiently mitigating multiple attack types simultaneously.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1121 - 1141"},"PeriodicalIF":2.2,"publicationDate":"2025-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Large language models: applications, limitations, challenges, and recommendations in cybersecurity, digital forensics, and ethical hacking 大型语言模型:网络安全、数字取证和道德黑客中的应用、限制、挑战和建议
IF 2.2 4区 计算机科学
Annals of Telecommunications Pub Date : 2025-11-21 DOI: 10.1007/s12243-025-01134-9
Jean Paul A. Yaacoub, Hassan N. Noura, Ola Salman, Guy Pujolle
{"title":"Large language models: applications, limitations, challenges, and recommendations in cybersecurity, digital forensics, and ethical hacking","authors":"Jean Paul A. Yaacoub,&nbsp;Hassan N. Noura,&nbsp;Ola Salman,&nbsp;Guy Pujolle","doi":"10.1007/s12243-025-01134-9","DOIUrl":"10.1007/s12243-025-01134-9","url":null,"abstract":"<div><p>Large Language Models (LLMs) are a significant leap in Artificial Intelligence (AI), providing tremendous capabilities for understanding and creating human-like language. LLMs offer significant advantages in automating and enhancing cybersecurity practices, but their deployment in sensitive domains like cybersecurity, ethical hacking, and digital forensics is a challenge. LLMs improve cybersecurity, digital forensics, and ethical hacking by automating processes such as reconnaissance and advanced attack simulation to confront new digital threats. This study examines LLMs’ strengths and weaknesses and proposes mitigation strategies, such as encryption, adversarial training, and strict data governance, to ensure their safe and effective integration in high-stakes situations. The results highlight the necessity of ongoing improvement, supervision, and ethical concerns to fully utilise LLM while reducing dangers and guaranteeing its appropriate deployment.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"933 - 973"},"PeriodicalIF":2.2,"publicationDate":"2025-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SDN-API-Sec-Fast: a performance-enhanced conflict-free blockchain-based authorization for cross-domain SDNs SDN-API-Sec-Fast:针对跨域sdn的基于区块链的性能增强无冲突授权
IF 2.2 4区 计算机科学
Annals of Telecommunications Pub Date : 2025-11-18 DOI: 10.1007/s12243-025-01133-w
Majd Latah, Kubra Kalkan
{"title":"SDN-API-Sec-Fast: a performance-enhanced conflict-free blockchain-based authorization for cross-domain SDNs","authors":"Majd Latah,&nbsp;Kubra Kalkan","doi":"10.1007/s12243-025-01133-w","DOIUrl":"10.1007/s12243-025-01133-w","url":null,"abstract":"<div><p>Software-defined networking (SDN) is a pioneering paradigm that adds a new level of management and programmability to computer networks. Despite its benefits, SDN opens the door for new attacks against the network by targeting different SDN components, especially when they need to interact with each other through application programming interfaces (APIs). In this work, we focus on protecting those APIs by proposing SDN-API-Sec-Fast, a cross-domain access control method based on the key characteristics of blockchain technology. We enhance our previous work SDN-API-Sec by introducing SDN-API-Sec-Fast, which combines conflict detection with read-only mode to achieve better performance. We investigate the performance of the blockchain side and the overall authorization process.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"997 - 1014"},"PeriodicalIF":2.2,"publicationDate":"2025-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An FCM-based hybrid method for DDoS attack detection in resource-constrained devices 一种基于fcm的资源受限设备DDoS攻击检测混合方法
IF 2.2 4区 计算机科学
Annals of Telecommunications Pub Date : 2025-10-27 DOI: 10.1007/s12243-025-01130-z
Prathibha Keshavamurthy, Sarvesh Kulkarni
{"title":"An FCM-based hybrid method for DDoS attack detection in resource-constrained devices","authors":"Prathibha Keshavamurthy,&nbsp;Sarvesh Kulkarni","doi":"10.1007/s12243-025-01130-z","DOIUrl":"10.1007/s12243-025-01130-z","url":null,"abstract":"<div><p>Smart interconnected devices belonging to the Internet of Things ecosystem are resource-constrained in terms of hardware and software. They are also prime attack targets for malicious parties. Although there has been an extensive exploration of attack detection methods rooted in machine learning, such approaches necessitate high processing overhead, which is ill-suited for devices of modest processing capabilities. Furthermore, machine learning algorithms are opaque black boxes. Therefore, we present a novel hybrid approach to detect distributed denial-of-service attacks using fuzzy cognitive maps paired with machine learning feature selection. Our approach incorporates contextual information (features) drawn from network packets. We utilize feature selection methods to compute the weights of the features. The weights capture the influence of each input feature on the target output feature that determines the classification of any packet as malicious or benign. The features and weights are used to construct a fuzzy cognitive map for each type of attack. The fuzzy cognitive map is then used to train and test the dataset. We also auto-compute a threshold value that allows our model to classify a packet as malicious or benign. Our model performs best using the weights computed by two particular statistical feature selection algorithms, namely, SelectKBest-Classification and SelectKBest Chi-squared, combined with FCM. Our experiments show that this hybrid approach is simple, reliable, and transparent with a low memory footprint, and therefore well-suited for devices with limited resources.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1071 - 1094"},"PeriodicalIF":2.2,"publicationDate":"2025-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-025-01130-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced data-driven anomalies detection and diagnosis for cyber-physical energy systems 先进的数据驱动的网络物理能源系统异常检测和诊断
IF 2.2 4区 计算机科学
Annals of Telecommunications Pub Date : 2025-10-21 DOI: 10.1007/s12243-025-01123-y
Hassan N. Noura, Zaid Allal, Ola Salman, Ali Chehab
{"title":"Advanced data-driven anomalies detection and diagnosis for cyber-physical energy systems","authors":"Hassan N. Noura,&nbsp;Zaid Allal,&nbsp;Ola Salman,&nbsp;Ali Chehab","doi":"10.1007/s12243-025-01123-y","DOIUrl":"10.1007/s12243-025-01123-y","url":null,"abstract":"<div><p>Cyber-physical energy systems (CPES) are the core components of an energy system. A CPES is characterized by a high level of complexity and uncertainty, while ensuring a more resilient and efficient distributed energy system, including robust energy security and economic viability. This work presents a novel and effective approach for anomaly detection in CPES systems using advanced tree-based machine learning models. The proposed approach is centralized with a minimal set of features that achieve a maximum detection rate and system performance. The results emphasize the effectiveness of ML methods in this domain, showcasing their ability to handle complex, high-dimensional datasets while providing interpretability and efficiency. The study also highlights associated challenges such as scalability and adversarial resilience, proposing future research directions such as hybrid models and interpretable AI for real-world deployment.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1159 - 1182"},"PeriodicalIF":2.2,"publicationDate":"2025-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-empowered e-ticket distribution system for secure and efficient transactions, validation, and audits 区块链授权的电子票务分发系统,用于安全高效的交易、验证和审计
IF 2.2 4区 计算机科学
Annals of Telecommunications Pub Date : 2025-10-21 DOI: 10.1007/s12243-025-01125-w
Adrián Guayasamín, Walter Fuertes, Nahir Carrera, Luis Tello-Oquendo, Valeria Suango
{"title":"Blockchain-empowered e-ticket distribution system for secure and efficient transactions, validation, and audits","authors":"Adrián Guayasamín,&nbsp;Walter Fuertes,&nbsp;Nahir Carrera,&nbsp;Luis Tello-Oquendo,&nbsp;Valeria Suango","doi":"10.1007/s12243-025-01125-w","DOIUrl":"10.1007/s12243-025-01125-w","url":null,"abstract":"<div><p>Secure and efficient electronic ticket (e-ticket) management in the entertainment industry is important for both the compliance of service-level agreements and the pride of those involved. Despite its numerous benefits, the ease of duplication, fraud, and illegal resale poses several issues in the industry, which can adversely impact event organizers and legitimate buyers. Furthermore, security breaches could compromise buyers’ personal and financial information. An e-ticketing system based on blockchain is implemented, mainly designed for managing raffles. This system issues e-tickets recorded in encrypted form in a blockchain with multiple blocks. The system digitally signs each ticket, links it to the buyer, records the data on-chain, and conducts draws using secure cryptographic randomness. At the end of the process, the system provides an option to download an audit chain that facilitates the validation and audit of the draws. We used the agile Scrum methodology and Java to develop the e-ticket system, implementing the blockchain with a PostgreSQL database and a custom hash function. We store each block in an unstructured JSON-type field. To optimize response times in processing the proof-of-work (PoW) blockchain, a Java socket server was implemented to manage mining pools and distribute the load among miners. We organized the load into groups by applying the <i>K</i>-means algorithm to historical performance data. This classification enabled the formation of efficient groups that accelerated PoW resolution, enhancing the security and performance of raffle creation, signing, and execution, particularly under increased hash difficulty. Each miner received rewards based on their contribution, fostering community participation and encouraging continuous improvement in individual performance. We evaluated the system with an average block time of 30 s and a cost of <span>($ )</span>0.005, demonstrating economic viability for popular raffles with affordable ticket prices. In security tests, 10% of counterfeit tickets were successfully injected and rejected, demonstrating tamper resistance. These results confirm the feasibility of open, secure, and auditable raffles through blockchain verification, strengthening trust in public systems based on distributed technologies.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1195 - 1220"},"PeriodicalIF":2.2,"publicationDate":"2025-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight hybrid lattice–based session key agreement protocol for multimedia IoT 多媒体物联网的轻量级混合格会话密钥协议
IF 2.2 4区 计算机科学
Annals of Telecommunications Pub Date : 2025-10-20 DOI: 10.1007/s12243-025-01122-z
Akanksha Singh, Harish Chandra, Saurabh Rana
{"title":"Lightweight hybrid lattice–based session key agreement protocol for multimedia IoT","authors":"Akanksha Singh,&nbsp;Harish Chandra,&nbsp;Saurabh Rana","doi":"10.1007/s12243-025-01122-z","DOIUrl":"10.1007/s12243-025-01122-z","url":null,"abstract":"<div><p>In this study, we introduce a quantum-resistant and lightweight authenticated key agreement protocol tailored for the Multimedia Internet of Things (MIoT) environment. MIoT devices gather and send sensitive multimedia data to cloud servers, which means that secure mutual authentication and quick session key creation are needed. To accomplish feasible lattice-based key exchange, our scheme uses a reconciliation technique and the Ring Learning With Errors (RLWE) assumption. While informal analysis demonstrates resilience to common threats like replay and impersonation, the random oracle model formally proves security. The robustness of the protocol against a variety of active attacks is confirmed through additional verification using the AVISPA tool. Further performance analysis shows that the suggested method clearly improves post-quantum security and computational efficiency when compared to current authenticated key agreement schemes, while facing slightly higher communication costs to ensure stronger security. In general, this work strengthens the provable security of smart devices enabled by the MIoT. Future research will investigate more extensive MIoT applications and energy-efficient optimizations.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1033 - 1051"},"PeriodicalIF":2.2,"publicationDate":"2025-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed zero trust architecture based on policy negotiation secured by DPP in blockchain b区块链中基于DPP安全策略协商的分布式零信任体系结构
IF 2.2 4区 计算机科学
Annals of Telecommunications Pub Date : 2025-10-18 DOI: 10.1007/s12243-025-01124-x
Fatemeh Stodt, Philipp Ruf, Christoph Reich, Fabrice Theoleyre
{"title":"Distributed zero trust architecture based on policy negotiation secured by DPP in blockchain","authors":"Fatemeh Stodt,&nbsp;Philipp Ruf,&nbsp;Christoph Reich,&nbsp;Fabrice Theoleyre","doi":"10.1007/s12243-025-01124-x","DOIUrl":"10.1007/s12243-025-01124-x","url":null,"abstract":"<div><p>Distributed policy negotiation is a key issue in modern manufacturing landscapes. However, existing solutions struggle with ensuring efficient policy negotiation and enforcement across entities while maintaining device authentication and trust in dynamic, cross-organizational environments. Specifically, the reliance on distributed architectures introduces challenges related to scalability, data fairness, and implementation complexity, limiting its applicability in large-scale industrial networks. This paper provides an overview of foundational concepts critical to understanding the proposed distributed policy consensus with blockchain integration: the proposed architecture leverages the decentralized and immutable nature of blockchain to achieve secure and transparent consensus among the distributed policy engines (PE), addressing challenges in policy negotiation within a distributed zero trust architecture (ZTA). The proposed methodology is applied in the context of a multinational supply chain network, involving various stakeholders such as manufacturers, suppliers, logistics providers, distributors, and retailers. The methodology provides a scalable foundation for advancing secure cross-company interactions in increasingly interconnected systems.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 -","pages":"1053 - 1070"},"PeriodicalIF":2.2,"publicationDate":"2025-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145963711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书