Philippe Ratajczak, Ramiz Bennadji, Eric Séguenot, Dinh-Thuy Phan-Huy
{"title":"Experimental demonstration of reflected beamforming and interference nulling at sub6GHz thanks to varactor-based reconfigurable intelligent surface","authors":"Philippe Ratajczak, Ramiz Bennadji, Eric Séguenot, Dinh-Thuy Phan-Huy","doi":"10.1007/s12243-024-01037-1","DOIUrl":"10.1007/s12243-024-01037-1","url":null,"abstract":"<div><p>Reconfigurable intelligent surface (RIS) is a promising solution to boost coverage sustainably by reflecting waves from a transmitter to a receiver and acting as a low-power and passive relay. In this paper, for the first time, we demonstrate experimentally that a reconfigurable intelligent surface designed for sub6GHz, and using varactor technology, can perform three-dimensional reflective beamforming and interference nulling. This result is achieved with a RIS prototype of 984 unit-cells, thanks to a compact control circuit individually addressing and configuring the voltage of each unit-cell, with a distinct voltage. To our knowledge, this prototype configures 17 to 70 times more distinct voltages than in the state-of-the-art. The experimental results in an indoor environment show a 10-dB gain. They also show, for the first time, that producing such a new prototype is feasible with minimal energy footprint and environmental impact, thanks to refurbishing. Indeed, a reflectarray antenna originally designed for three-dimensional beamforming has been turned into a RIS.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 9-10","pages":"633 - 648"},"PeriodicalIF":1.8,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140610878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Personal data filtering: a systematic literature review comparing the effectiveness of XSS attacks in web applications vs cookie stealing","authors":"Germán Rodríguez-Galán, Jenny Torres","doi":"10.1007/s12243-024-01022-8","DOIUrl":"https://doi.org/10.1007/s12243-024-01022-8","url":null,"abstract":"<p>Cross-site scripting (XSS) attacks pose a significant threat to the security of web applications, as they compromise personal information by stealing cookies. This study investigates the relationship between XSS attacks targeting websites versus XSS attacks aimed at stealing cookies to leak personal information. A systematic literature review has been conducted, analyzing 96 scientific articles from 2018 to 2023. Three complementary research questions have been proposed to address trends in methods and tools to detect vulnerabilities or mitigate XSS attacks, techniques to steal cookies, and leakage of personal data through cookie theft. Rayyan Intelligent Systematic Literature, Atlas.ti, and Research Rabbit tool supported our analysis, using sources such as IEEE Digital Xplore, ACM Digital Library, Springer Link, Web of Science, and Mendeley. The snowballing technique was applied using the Research Rabbit tool to find related articles, avoid inconsistent parameters and publications, and reduce the risk of bias. The ratio between XSS attacks on websites and cookie theft through XSS attacks is 5:1. It is crucial to persist in studying and introducing novel methods or tools to address this problem and provide better protection against cookie hijacking through XSS attacks. The research gap lies in understanding how our personal information is filtered by the theft of cookies through XSS attacks. More research is needed to fill this gap and to develop novel techniques or tools that teach the end user how their personal information is leaked by stealing cookies using XSS attacks.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"38 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140611368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FATE: flexible attribute-based traceable encrypted data sharing scheme using smart contracts in wireless medical sensor networks","authors":"Aparna Singh, Geetanjali Rathee","doi":"10.1007/s12243-024-01038-0","DOIUrl":"https://doi.org/10.1007/s12243-024-01038-0","url":null,"abstract":"<p>Given the adaptability and effectiveness of the smart health sector, it has gained much momentum in the last few years, particularly during the COVID-19 pandemic. However, the security and privacy of data sent through a public communication channel are gravely threatened by adopting cloud services for data sharing. The security and privacy of the data are also in jeopardy, as the owners lose full ownership of the material once it is uploaded to the cloud. In recent years, ciphertext policy attribute-based encryption (CP-ABE) has shown great potential as a privacy-preserving encryption mechanism. In this paper, a decentralized method of large-scale data storage has been introduced using the interplanetary file system (IPFS), thereby eliminating the issue of centralized storage and frequent data unavailability. A reliable third-party hospital node in a secure environment is adopted in the proposed model to guarantee data integrity and to reduce the load on the resource-constrained devices of the user. Simulation using the Charm-Crypto framework and Pairing-Based Cryptography library using the SS512 curve proves its performance and efficiency. The proposed scheme’s encryption time is constant at 46.96 ms regardless of the size of the attribute set, the key generation time is reduced by 79.09%, and the storage overhead is reduced by 71.3% as compared to the existing schemes.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"81 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140611019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A multi-agent deep Q-learning-based joint relay and jammer selection in dual-hop wireless networks","authors":"Anil Kumar Kamboj, Poonam Jindal, Pankaj Verma","doi":"10.1007/s12243-024-01034-4","DOIUrl":"https://doi.org/10.1007/s12243-024-01034-4","url":null,"abstract":"<p>Physical layer security (PLS) has cropped up as a promising solution to secure the wireless network. Cooperative communication is capable of improving the PLS, in addition to increasing the coverage area and reliability. It applies to diverse wireless systems, including long-term evolution (LTE) cellular systems, mobile ad hoc networks, and wireless sensor networks. The selection of relay and jammer nodes from the cluster of intermediate nodes can easily counter the strong eavesdroppers. Existing techniques of joint relay and jammer selection (JRJS) solve the optimization problem to find near-optimal secrecy. However, due to their computational complexity, most of these algorithms are not scalable for large networks. In this manuscript, we introduced the multi-agent deep Q-learning (MADQL) algorithm for secure joint relay and jammer selection in dual-hop wireless cooperative networks. The JRJS is transformed into a prediction-based problem and solved using deep Q-learning algorithms. The proposed reinforcement learning technique is model-free and best suited for situations where the exact global channel state information (CSI) for all the links is unavailable. The secrecy performance of the introduced algorithm is compared with the existing techniques. Simulation results confirmed that the MADQL-JRJS algorithm outperformed the existing algorithms.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"4 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140611023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marius Corici, Fabian Eichhorn, Hauke Buhr, Thomas Magedanz
{"title":"Organic 6G networks: ultra-flexibility through extensive stateless functional split","authors":"Marius Corici, Fabian Eichhorn, Hauke Buhr, Thomas Magedanz","doi":"10.1007/s12243-024-01024-6","DOIUrl":"10.1007/s12243-024-01024-6","url":null,"abstract":"<div><p>With the increase in hardware performance, the 5G mobile network architecture shifted from physical components to software-only micro-services. The very modular network functions can be deployed flexibly on commodity hardware. However, the extensive modularity of these network functions is increasing the number of managed entities, and the core network request latency. Also, it requires extensive procedures to be able to re-select the components for specific devices, a fundamental condition for a potential system scale-down. In this paper, we propose a new organic 6G network architecture that handles these challenges through a new functionality split based on the experience of IT software services. Furthermore, we provide an analysis based on main 5G procedures, showing that the newly proposed architecture is handling the re-selection of functionality significantly better, which is a cornerstone of high-speed scaling (especially scaling-out), as well as migration of functionality and users.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 9-10","pages":"605 - 619"},"PeriodicalIF":1.8,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-024-01024-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140573363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khaled A. M. Al Soufy, Faisal S. Al-Kamali, Claude D’Amours, Nagi H. N. Al-Ashwal, Farhan M. Nashwan, Mohamed A. Swillam
{"title":"Performance evaluation of DFT/DCT/DST-based SC-FDMA systems in the presence of CFOs for wireless images transmission","authors":"Khaled A. M. Al Soufy, Faisal S. Al-Kamali, Claude D’Amours, Nagi H. N. Al-Ashwal, Farhan M. Nashwan, Mohamed A. Swillam","doi":"10.1007/s12243-024-01020-w","DOIUrl":"https://doi.org/10.1007/s12243-024-01020-w","url":null,"abstract":"<p>Single carrier frequency division multiple access (SC-FDMA) has become increasingly popular in broadband data transmission systems due to its many advantages. One of the main advantages is the lower peak-to-average power ratio (PAPR), which significantly benefits the mobile terminal station in terms of transmit power efficiency. However, SC-FDMA is susceptible to carrier frequency offsets (CFOs) which affect the orthogonality between subcarriers and cause inter-carrier interference (ICI) and multiple access interference (MAI). In this paper, we analyze and evaluate the performance of SC-FDMA in the presence of CFOs for wireless image transmission with different basis functions, different subcarrier mapping techniques, and different modulation schemes over vehicular A and SUI3 channel models. This study focuses on evaluating the performance of SC-FDMA using wireless image transmission. The evaluation is conducted based on two performance metrics, namely peak signal-to-noise ratio (PSNR) and mean square error (MSE). Specifically, we consider the following three cases: the no CFOs case, the case when CFOs are present but without compensation, and the case when CFOs are present and CFO compensation is used. The CFO compensation technique used in this work is the joint mean minimum squared error (JMMSE) method. The results showed that JMMSE with DFT can provide better performance in the presence of CFOs compared to DCT and DST. Additionally, the choice of interleaved subcarrier mapping technique provides better performance compared to localized subcarrier mapping. Furthermore, the impact of the modulation scheme and the channel model on system performance is also evaluated, with the results showing that QPSK is more robust to CFOs compared to 16QAM modulation and the performance is better transmitting over the SU13 model rather than the vehicular A channel model. Simulation results demonstrate the effectiveness of JMMSE combined with DFT and interleaved subcarrier mapping in mitigating the effects of CFOs and multipath channels, especially with the SUI3 channel model and QPSK modulation.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"46 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140573491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Guarding 6G use cases: a deep dive into AI/ML threats in All-Senses meeting","authors":"Leyli Karaçay, Zakaria Laaroussi, Sonika ujjwal, Elif Ustundag Soykan","doi":"10.1007/s12243-024-01031-7","DOIUrl":"10.1007/s12243-024-01031-7","url":null,"abstract":"<div><p>With the recent advances in 5G and 6G communications and the increasing need for immersive interactions due to pandemic, new use cases such as All-Senses meeting are emerging. To realize these use cases, numerous sensors, actuators, and virtual reality devices are used. Additionally, artificial intelligence (AI) and machine learning (ML) including generative AI can be used to analyze large amount of data generated by 6G networks and devices to enable new applications and services. While AI/ML technologies are evolving, they do not have the same level of security as well-known information technology components. So, AI/ML threats and their impacts can be overlooked. On the other hand, due to inherent characteristics of AI/ML components and design of AI/ML pipeline, AI/ML services can be a target for sophisticated attacks. In order to provide a holistic security view, the effect of AI/ML components should be investigated, threats should be identified, and countermeasures should be planned. Therefore, in this study, which is an extended version of our recent study (Karaçay et al. 2023), we shed the light on the use of AI/ML services including generative large language model scenarios in All-Senses meeting use case and their security aspects by carrying out a threat modeling using the STRIDE framework and attack tree methodology. Additionally, we point out some countermeasures for identified threats.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 9-10","pages":"663 - 677"},"PeriodicalIF":1.8,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140573503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The use of statistical features for low-rate denial-of-service attack detection","authors":"Ramin Fuladi, Tuncer Baykas, Emin Anarim","doi":"10.1007/s12243-024-01027-3","DOIUrl":"10.1007/s12243-024-01027-3","url":null,"abstract":"<div><p>Low-rate denial-of-service (LDoS) attacks can significantly reduce network performance. These attacks involve sending periodic high-intensity pulse data flows, sharing similar harmful effects with traditional DoS attacks. However, LDoS attacks have different attack modes, making detection particularly challenging. The high level of concealment associated with LDoS attacks makes them extremely difficult to identify using traditional DoS detection methods. In this paper, we explore the potential of using statistical features for LDoS attack detection. Our results demonstrate the promising performance of statistical features in detecting these attacks. Furthermore, through ANOVA, mutual information, RFE, and SHAP analysis, we find that entropy and L-moment-based features play a crucial role in LDoS attack detection. These findings provide valuable insights into utilizing statistical features enhancing network security, thereby improving the overall resilience and stability of networks against various types of attacks.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 9-10","pages":"679 - 691"},"PeriodicalIF":1.8,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140573612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rodrigo S. Couto, Pedro Cruz, Roberto G. Pacheco, Vivian Maria S. Souza, Miguel Elias M. Campista, Luís Henrique M. K. Costa
{"title":"A survey of public datasets for O-RAN: fostering the development of machine learning models","authors":"Rodrigo S. Couto, Pedro Cruz, Roberto G. Pacheco, Vivian Maria S. Souza, Miguel Elias M. Campista, Luís Henrique M. K. Costa","doi":"10.1007/s12243-024-01029-1","DOIUrl":"10.1007/s12243-024-01029-1","url":null,"abstract":"<div><p>The O-RAN architecture allows for unprecedented flexibility in Radio Access Networks (RANs). O-RAN’s components designed to control RANs, such as RAN Intelligent Controllers (RICs), places intelligence at the center of the management and orchestration of 5 G/6 G cellular networks. RICs run applications based on machine learning models, which require massive RAN data for training. Nonetheless, building testbeds to collect these data is challenging since RANs use expensive hardware and operate under a licensed spectrum, usually not available for the academy. Even though producing RAN datasets is challenging, some research groups have already made their data available. In this paper, we survey the primary public datasets available online that are considered in O-RAN papers. We identify the main characteristics and purpose of each dataset, contributing with a complement to their documentation. Also, we empirically showcase the viability of using publicly available datasets for machine learning applications within the O-RAN domain, such as spectrum and traffic classification.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 9-10","pages":"649 - 662"},"PeriodicalIF":1.8,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140573489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"NestedChain: “Blockchain-inside-a-Blockchain” new generation prototype","authors":"","doi":"10.1007/s12243-024-01030-8","DOIUrl":"https://doi.org/10.1007/s12243-024-01030-8","url":null,"abstract":"<h3>Abstract</h3> <p>New developments of blockchain designs, for both research and commercial environments, focus on improving security and energy consumption. Indeed, these implementations are based on managing a single type of information linked to a single blockchain. In this paper, we propose a new design called NestedChain. This proposal creates a system that allows two completely different types of information to be held in the same physical structure, enabling the creation of a blockchain within a blockchain. The new blockchain design can be implemented in various environments where it is necessary to have two different and parallel sets of information in the same network infrastructure. This new conception of blockchain offers a new way to understand the limitations of existing implementations and suggests how the evolution of the blockchain environment could be enhanced.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"35 1","pages":""},"PeriodicalIF":1.9,"publicationDate":"2024-04-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140573616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}