liu.seSök publikationer i DiVA
Ändra sökning
Länk till posten
Permanent länk

Direktlänk
Publikationer (10 of 43) Visa alla publikationer
Hagl, M., Boonsong, S., Stelkens-Kobsch, T.-H., Ruediger, T., Gurtov, A. & Singh Gaba, G. (2026). Fake Aircraft, Real Threats: Training Air Traffic Controllers for Cyberattacks. In: Tareq Ahram, Waldemar Karwowski, Laura Giraldi, Elisabetta Benelli (Ed.), Intelligent Human Systems Integration (IHSI 2026): Disruptive and Innovative Technologies. Paper presented at Intelligent Human Systems Integration (IHSI 2026): Disruptive and Innovative Technologies, Florence, Italy (pp. 148-158). USA: AHFE International, 200
Öppna denna publikation i ny flik eller fönster >>Fake Aircraft, Real Threats: Training Air Traffic Controllers for Cyberattacks
Visa övriga...
2026 (Engelska)Ingår i: Intelligent Human Systems Integration (IHSI 2026): Disruptive and Innovative Technologies / [ed] Tareq Ahram, Waldemar Karwowski, Laura Giraldi, Elisabetta Benelli, USA: AHFE International , 2026, Vol. 200, s. 148-158Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

As part of the modernisation of air traffic management, a growing number of infrastructures and technologies are being deployed to improve air traffic services. While these developments can improve situation awareness and operational efficiency, they also come along with increasing cybersecurity risks. This study presents a half-day training concept for air traffic controllers to identify cyberattacks exploiting ADS-B vulnerabilities. Eight experienced Swedish Air Traffic Controllers (ATCOs) participated in three simulation runs using the Attack Simulator, a cybersecurity training platform that simulates various cyberattacks. Performance was measured by the correct identification of six probabilistically occurring attacks, with weighted scores reflecting the difficulty of each event. Knowledge transfer through briefing and video-based training aimed to educate ATCOs about cyberattacks that they could realistically face during their duties. Subjective assessments of situation awareness, workload, and stress were generally acceptable. Results suggest that training significantly improves ATCOs’ ability to respond to cyberattacks.

Ort, förlag, år, upplaga, sidor
USA: AHFE International, 2026
Serie
Intelligent Human Systems Integration (IHSI) ; 200
Nyckelord
Cybersecurity, Risk, Human factors, Training, Air traffic management, Digitalisation
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
urn:nbn:se:liu:diva-220303 (URN)10.54941/ahfe1007074 (DOI)9781964867762 (ISBN)
Konferens
Intelligent Human Systems Integration (IHSI 2026): Disruptive and Innovative Technologies, Florence, Italy
Forskningsfinansiär
EU, Horisont Europa, 101114635
Anmärkning

This publication is based on the work performed in the SEC-AIRSPACE project, which has received funding from the SESAR 3 Joint Undertaking under grant agreement No 101114635 under European Union’s Horizon Europe research and innovation programme. 

Tillgänglig från: 2026-01-09 Skapad: 2026-01-09 Senast uppdaterad: 2026-01-12
Rosén, A., Singh Gaba, G. & Gurtov, A. (2025). A Strategic Roadmap For Phased Zero Trust Architecture Implementation In Organizations. In: 2025 IEEE Conference on Communications and Network Security (CNS): . Paper presented at IEEE Conference on Communications and Network Security (CNS), Avignon, France, 08-11 September, 2025 (pp. 1-6). Avignon, France: IEEE
Öppna denna publikation i ny flik eller fönster >>A Strategic Roadmap For Phased Zero Trust Architecture Implementation In Organizations
2025 (Engelska)Ingår i: 2025 IEEE Conference on Communications and Network Security (CNS), Avignon, France: IEEE, 2025, s. 1-6Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Traditional perimeter-based security models, which implicitly trust internal networks, are vulnerable to modern cyber threats such as ransomware and credential misuse, allowing lateral movement and large-scale breaches. Zero Trust Architecture (ZTA) mitigates these risks by enforcing continuous authentication and least-privilege access for all devices. However, organizations face challenges in adopting ZTA without disrupting operations or incurring high costs, and existing research lacks actionable guidance. Through extensive literature analysis, semi-structured interviews with diverse organizational staff, and evaluation of Zero Trust maturity across seven pillars, this article proposes a practical, phased roadmap tailored to the needs of an organization. The approach prioritizes operational continuity and minimizes implementation barriers, enabling robust and sustainable cybersecurity.

Ort, förlag, år, upplaga, sidor
Avignon, France: IEEE, 2025
Nyckelord
Micro-Segmentation, Network Security, Operational Continuity, Phased Implementation, Zero Trust Architecture (ZTA)
Nationell ämneskategori
Datorsystem
Identifikatorer
urn:nbn:se:liu:diva-219042 (URN)10.1109/CNS66487.2025.11194934 (DOI)9798331538569 (ISBN)9798331538576 (ISBN)
Konferens
IEEE Conference on Communications and Network Security (CNS), Avignon, France, 08-11 September, 2025
Tillgänglig från: 2025-10-27 Skapad: 2025-10-27 Senast uppdaterad: 2025-10-30
Singh Gaba, G., Sari, A., Butun, I., Singh, P., Gurtov, A. & Liyanage, M. (2025). A Survey on Security and Privacy of Industry 4.0 and Beyond: Technical Aspects, Use Cases, Challenges, and Research Directions. IEEE Open Journal of the Communications Society, 6, 8865-8929
Öppna denna publikation i ny flik eller fönster >>A Survey on Security and Privacy of Industry 4.0 and Beyond: Technical Aspects, Use Cases, Challenges, and Research Directions
Visa övriga...
2025 (Engelska)Ingår i: IEEE Open Journal of the Communications Society, E-ISSN 2644-125X, Vol. 6, s. 8865-8929Artikel, forskningsöversikt (Refereegranskat) Published
Abstract [en]

Industry 4.0 and 5.0 offer a promising framework for connecting electro-mechanical systems to cyberspace, enabling real-time access, telecontrol, human-machine collaboration, and intelligent automation of industrial operations. While horizontal and vertical interoperability serve as critical enablers of this ecosystem, heterogeneity among entities and the lack of standardized governance in interoperability allow cybercriminals to exploit structural vulnerabilities. These weaknesses and unknown bugs provide avenues for cyber-attackers to breach systems, conduct espionage, sabotage assets, and extort organizations, threatening IT and OT infrastructures, finances, reputations, and even human lives. This survey paper discusses cybersecurity and privacy threats within the Industry 4.0 and 5.0 ecosystems, their potential impact on industrial processes and peripherals, and the security challenges associated with the transition from Industry 4.0 to 5.0. To identify research gaps and vulnerabilities, we examine the architecture and components of diverse industrial frameworks and establish functional mappings using IIRA and RAMI models. Following a comprehensive threat modeling approach, we present a layered taxonomy of cyber-threats, classified based on their nature, behavior, and execution characteristics. To assist network administrators and security professionals, we propose a threat prioritization framework based on likelihood, detectability, impact severity, and operational consequences. Furthermore, we outline perspective-based cybersecurity challenges that expose deficiencies in current protective measures. As countermeasures, we advocate for AI-driven, blockchain-enabled, edge-computing-based, and privacy-preserving security solutions to defend against threats and mitigate potential damages. We also elaborate on key standardization initiatives, nation-specific privacy regulations, and ongoing research efforts focused on safeguarding the security and privacy of Industry 4.0 and beyond. The paper concludes by summarizing key lessons learned, identifying unresolved research questions, and suggesting future directions for a secure and resilient Industry 5.0 paradigm.

Ort, förlag, år, upplaga, sidor
IEEE Communications Society, 2025
Nyckelord
Cybersecurity, cyber-physical systems (CPS), Industry 4.0, industrial Internet, privacy
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer
urn:nbn:se:liu:diva-219282 (URN)10.1109/ojcoms.2025.3616289 (DOI)001604873900001 ()2-s2.0-105018097890 (Scopus ID)
Forskningsfinansiär
Finlands Akademi, 318927ELLIIT - The Linköping‐Lund Initiative on IT and Mobile Communications, A4Stiftelsen för internationalisering av högre utbildning och forskning (STINT), IB2019-8185
Anmärkning

Funding Agencies|Swedish Foundation for International Cooperation in Research and Higher Education (STINT) through the Initiation Grants Program [IB2019-8185]; Science Foundation Ireland through the CONNECT Phase 2 [13/RC/2077_P2]; Academy of Finland through the 6Genesis Project [318927]; CENIIT Project [17.01]; European Cooperation in Science and Technology [10.13039/501100000921]; COST Action CA22104 - Behavioral Next Generation in Wireless Networks for Cyber Security (BEiNG-WISE); Excellence Center at Linkping-Lund in IT under Project A4

Tillgänglig från: 2025-11-04 Skapad: 2025-11-04 Senast uppdaterad: 2025-12-07
Stelkens-Kobsch, T. H., Hagl, M., Meland, P. H., Singh Gaba, G., Bernsmed, K., Dambra, C., . . . Gurtov, A. (2025). Air Traffic Management Security in the Digital Age: A Proactive Risk Management Strategy. In: 2025 AIAA DATC/IEEE 44th Digital Avionics Systems Conference (DASC): . Paper presented at 2025 AIAA DATC/IEEE 44th Digital Avionics Systems Conference (DASC), Montreal, QC, Canada, 14-18 September 2025. IEEE conference proceedings
Öppna denna publikation i ny flik eller fönster >>Air Traffic Management Security in the Digital Age: A Proactive Risk Management Strategy
Visa övriga...
2025 (Engelska)Ingår i: 2025 AIAA DATC/IEEE 44th Digital Avionics Systems Conference (DASC), IEEE conference proceedings, 2025Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

The security risk management discipline has historically been less developed than safety management systems, but the rapid digitalization of industries creates an urgent need for more proactive approaches. Current methods often rely on outdated lists and paper-based processes, leading to overlooked vulnerabilities and delayed responses to emerging threats. This paper presents a possible enhancement of the existing cyber and physical Security Risk Assessment Methodology (SecRAM). The enhanced SecRAM is currently validated through dedicated exercises and expert input. The approach considers cascading effects for attack and impact propagation, and is embedded within a system framework that recognizes interconnections and dependencies between services, systems, procedures, roles, and functions. With its web-based tool and user-friendly interface, the enhanced SecRAM proves its general applicability and shows potential for broader adoption across sectors, particularly aviation. Future work will focus on integrating automation and AI to improve efficiency and accuracy in risk assessments.

Ort, förlag, år, upplaga, sidor
IEEE conference proceedings, 2025
Serie
Conference on Digital Avionics Systems (DASC), ISSN 2155-7195, E-ISSN 2155-7209
Nyckelord
cyber, security, risk assessment, risk management, tool support
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
urn:nbn:se:liu:diva-220306 (URN)10.1109/DASC66011.2025.11257275 (DOI)9798331525194 (ISBN)9798331525200 (ISBN)
Konferens
2025 AIAA DATC/IEEE 44th Digital Avionics Systems Conference (DASC), Montreal, QC, Canada, 14-18 September 2025
Forskningsfinansiär
EU, Horisont Europa, 101114635
Anmärkning

This project has received funding from the SESAR Joint Undertaking under the European Union’s Horizon Europe research and innovation programme under grant agreement No 101114635. 

Tillgänglig från: 2026-01-09 Skapad: 2026-01-09 Senast uppdaterad: 2026-01-12
Martintoni, D., Senni, V., Singh Gaba, G. & Gurtov, A. (2025). On the Role of SecRAM Catalogues in ATM Cyber Risk Assessment and Improvement Opportunities. In: 2025 Integrated Communications, Navigation and Surveillance Conference (ICNS): . Paper presented at The 25th Integrated Communications, Navigation and Surveillance Conference (ICNS), EuroControl, Belgium, 08-10 April, 2025. Belgium: Institute of Electrical and Electronics Engineers (IEEE)
Öppna denna publikation i ny flik eller fönster >>On the Role of SecRAM Catalogues in ATM Cyber Risk Assessment and Improvement Opportunities
2025 (Engelska)Ingår i: 2025 Integrated Communications, Navigation and Surveillance Conference (ICNS), Belgium: Institute of Electrical and Electronics Engineers (IEEE) , 2025Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Current Air Traffic Management (ATM) systems are undergoing significant evolution due to increased traffic volumes, the introduction of diverse airborne systems such as Unmanned Aerial Vehicles (UAVs), technological advancements, and the potential to optimize operations through data-driven approaches. These advancements offer benefits in terms of efficiency, safety, and sustainability, but they also expose the systems to heightened cybersecurity risks. This paper analyzes the Security Risk Assessment Methodology (SecRAM) proposed by SESAR, focusing specifically on its use of complementary catalogs of threats and vulnerabilities. By validating the SecRAM approach in a contemporary ATM scenario, this paper identifies gaps in the framework that could be addressed to better meet the security needs of a modern and complex ATM ecosystem. Finally, this work proposes a set of enhancements to the SecRAM catalogs that will enable security professionals to design and develop secure and resilient modern ATM environments.

Ort, förlag, år, upplaga, sidor
Belgium: Institute of Electrical and Electronics Engineers (IEEE), 2025
Serie
Integrated Communications, Navigation and Surveillance Conference, ICNS, ISSN 2155-4943, E-ISSN 2155-4951
Nyckelord
ATM, FCI, risk-assessment, security, SecRAM
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
urn:nbn:se:liu:diva-213530 (URN)10.1109/ICNS65417.2025.10976972 (DOI)001516425900133 ()2-s2.0-105005194320 (Scopus ID)9798331534738 (ISBN)9798331534745 (ISBN)
Konferens
The 25th Integrated Communications, Navigation and Surveillance Conference (ICNS), EuroControl, Belgium, 08-10 April, 2025
Forskningsfinansiär
EU, Horisont Europa, 101114635
Anmärkning

Funding Agencies|SESAR Joint Undertaking under the EU's Horizon Europe programme [101114635]

Tillgänglig från: 2025-05-12 Skapad: 2025-05-12 Senast uppdaterad: 2025-08-29Bibliografiskt granskad
Borhani, M., Avgouleas, I., Liyanage, M. & Gurtov, A. (2025). Secure Scalable VPLS: A Lagrangian Relaxation Approach to Tunnel Relaying Optimization. IEEE Transactions on Networking
Öppna denna publikation i ny flik eller fönster >>Secure Scalable VPLS: A Lagrangian Relaxation Approach to Tunnel Relaying Optimization
2025 (Engelska)Ingår i: IEEE Transactions on Networking, E-ISSN 2998-4157Artikel i tidskrift (Refereegranskat) Epub ahead of print
Abstract [en]

Virtual Private LAN Service (VPLS) is commonly used for secure multi-point communication across geographically scattered industrial sites, simulating a unified LAN broadcast domain for Industrial IoT (IIoT)-type devices. This configuration demands a fully-connected overlay network with encrypted Host Identity Protocol (HIP)/IPsec tunnels exhibiting quadratic scalability to the number of tunnels and a significant increase in forwarding table entries. Herein, we introduce Tunnel Relay Nodes (TRNs) as selected routers that maintain full-mesh connectivity. This approach allows non-TRN routers, or Provider Equipment (PEs) acting as spoke PEs, to connect via a TRN. We explore the challenges of using TRNs in secure HIP-based VPLS (HIPLS) networks, including (i) placing reliable TRNs within provider networks and (ii) scheduling TRNs to minimize their activation/deactivation costs as well as the connection cost among PEs. We then demonstrate how (i) can be addressed in polynomial time using a modified general median problem approach. Additionally, we formulate (ii) as a Mixed Integer Linear Programming (MILP) scheduling problem and prove its NP-completeness. Furthermore, we introduce an algorithm based on Lagrangian relaxation to address the intractability in large-scale deployments. This algorithm offers fast, near-optimal solutions while simultaneously balancing solution quality and execution time. Our simulations on three real-world network topologies with real network demands show a 92% average reduction in forwarding table entries on PE. Compared to existing solutions, our method reduces the number of tunnels established by up to 95%, at the expense of a 1.39-fold increase in tunnel path length.

Ort, förlag, år, upplaga, sidor
IEEE, 2025
Nyckelord
Industrial Internet of Things; Hip; Scalability; Relays; Costs; Virtual private networks; Local area networks; Peer-to-peer computing; Computer crime; Routing protocols; IIoT; VPLS; HIPLS; network design; optimization
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer
urn:nbn:se:liu:diva-219328 (URN)10.1109/ton.2025.3617789 (DOI)001610960000001 ()2-s2.0-105020935510 (Scopus ID)
Forskningsfinansiär
CUGS (National Graduate School in Computer Science)ELLIIT - The Linköping‐Lund Initiative on IT and Mobile Communications, A.4 Project
Anmärkning

Funding Agencies|Graduate School in Computer Science (CUGS); Excellence Center at Linkoping-Lund in Information Technology (ELLIIT) A.4 Project

Tillgänglig från: 2025-11-07 Skapad: 2025-11-07 Senast uppdaterad: 2025-12-18
Boonsong, S., Hagl, M., Stelkens-Kobsch, T. H., Ruediger, T., Gurtov, A. & Singh Gaba, G. (2025). Validation Exercise: Strengthening Cybersecurity Awareness in Air Traffic Control through Simulation-Based Training. In: : . Paper presented at SESAR Innovation Days (SID). Belgium
Öppna denna publikation i ny flik eller fönster >>Validation Exercise: Strengthening Cybersecurity Awareness in Air Traffic Control through Simulation-Based Training
Visa övriga...
2025 (Engelska)Konferensbidrag, Poster (med eller utan abstract) (Refereegranskat)
Abstract [en]

This exercise validated an enhanced Attack Simulator that strengthens ATCOs cybersecurity awareness and response to ADS-B threats through realistic, simulation-based training. The research assessed the Attack Simulator's effectiveness in improving ATCOs' cyberattack recognition/response and to evaluate behavioural and performance changes pre-and post-knowledge transfer.

Ort, förlag, år, upplaga, sidor
Belgium: , 2025
Nyckelord
Aviation, Cybersecurity
Nationell ämneskategori
Datavetenskap (datalogi)
Identifikatorer
urn:nbn:se:liu:diva-219562 (URN)10.13140/RG.2.2.20341.23524 (DOI)
Konferens
SESAR Innovation Days (SID)
Tillgänglig från: 2025-11-18 Skapad: 2025-11-18 Senast uppdaterad: 2025-11-18
Khan, S., Wang, Y., Singh Gaba, G., Gurtov, A. & Kumar, P. (2024). A Secure Framework For Controller Pilot Data Link Communications in Aviation Network. In: 2024 AIAA DATC/IEEE 43rd Digital Avionics Systems Conference (DASC): . Paper presented at AIAA DATC/IEEE 43rd Digital Avionics Systems Conference (DASC), 29 Sept-3 Oct 2024, San Diego, CA, USA. Institute of Electrical and Electronics Engineers (IEEE)
Öppna denna publikation i ny flik eller fönster >>A Secure Framework For Controller Pilot Data Link Communications in Aviation Network
Visa övriga...
2024 (Engelska)Ingår i: 2024 AIAA DATC/IEEE 43rd Digital Avionics Systems Conference (DASC), Institute of Electrical and Electronics Engineers (IEEE), 2024Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

Controller Pilot Data Link Communications (CPDLC) enhances air traffic communication by replacing traditional voice transmissions with digital messages over Very High Frequency (VHF) radio systems. This transition improves communication resilience by providing clear, text-based instructions that reduce misunderstandings and increase bandwidth efficiency by enabling more data to be transmitted simultaneously. It benefits congested airspace by reducing radio frequency congestion and minimizing communication errors. However, due to the plain-text nature of its messages, CPDLC faces significant security challenges, making it vulnerable to cyber-attacks such as eavesdropping, modification, injection, and man-in-the-middle (MITM) attacks. This vulnerability allows motivated attackers to intercept CPDLC messages using inexpensive devices like Software-Defined Radio (SDR), HACKRF-one, and an antenna. Such breaches can lead to fatal safety incidents, severely impacting passengers and the aviation industry. To address this, we proposed a robust security framework for securing CPDLC communication by implementing critical measures, including mutual authentication, secure key establishment, and handover. The proposed framework has been tested on hardware to verify its effectiveness in practical scenarios, ensuring it aligns with existing CPDLC standards and integrates seamlessly into current systems without impacting operational efficiency. Our findings indicate that the proposed security framework enhances CPDLC's defenses against potential cyber threats while maintaining system performance, making it feasible to protect global air traffic communications.

Ort, förlag, år, upplaga, sidor
Institute of Electrical and Electronics Engineers (IEEE), 2024
Serie
IEEE/AIAA Digital Avionics Systems Conference, ISSN 2155-7195, E-ISSN 2155-7209
Nyckelord
Aviation, CPDLC, Handover, Security, VHF
Nationell ämneskategori
Kommunikationssystem
Identifikatorer
urn:nbn:se:liu:diva-209995 (URN)10.1109/DASC62030.2024.10749527 (DOI)001453360400202 ()2-s2.0-85211215823 (Scopus ID)9798350349610 (ISBN)9798350349627 (ISBN)
Konferens
AIAA DATC/IEEE 43rd Digital Avionics Systems Conference (DASC), 29 Sept-3 Oct 2024, San Diego, CA, USA
Forskningsfinansiär
EU, Horisont Europa, 101114635
Anmärkning

Funding Agencies|SESAR Joint Undertaking [101114635]

Tillgänglig från: 2024-11-22 Skapad: 2024-11-22 Senast uppdaterad: 2025-08-29Bibliografiskt granskad
Zineddine, A., Chakir, O., Sadqi, Y., Maleh, Y., Singh Gaba, G., Gurtov, A. & Dev, K. (2024). A systematic review of cybersecurity assessment methods for HTTPS. Computers & electrical engineering, 115, Article ID 109137.
Öppna denna publikation i ny flik eller fönster >>A systematic review of cybersecurity assessment methods for HTTPS
Visa övriga...
2024 (Engelska)Ingår i: Computers & electrical engineering, ISSN 0045-7906, E-ISSN 1879-0755, Vol. 115, artikel-id 109137Artikel, forskningsöversikt (Refereegranskat) Published
Abstract [en]

Cybersecurity assessments are critical for ensuring that security measures in organizational infrastructures, systems, and applications meet necessary requirements. Given the significant HTTPS vulnerabilities exposed in recent years, assessing HTTPS deployments is increasingly important. However, there has been no systematic literature review (SLR) comparing different cybersecurity assessment methods specifically for HTTPS deployment security issues. This study aims to address this gap by identifying, analyzing, and comparing various HTTPS deployment assessment methods documented in scientific literature. Our approach involved a structured research methodology with specific inclusion and exclusion criteria for selecting relevant methods. The review utilizes 16 comparison metrics, divided into two categories: critical security metrics, focusing on assessment metrics adopted and the number of vulnerabilities evaluated by each method, and additional metrics assessing the methods’ applicability and effectiveness in real-world scenarios. The findings indicate varied adoption rates of these metrics among the reviewed cybersecurity assessment methods, highlighting the absence of a standardized approach using common, well-defined security metrics for HTTPS deployment assessment. In contrast, merging all the comparison metrics outlined in this review would enable a more in-depth assessment of HTTPS deployment security issues, enhance the quality of reported results, and lead to the development of a more practical assessment method.

Ort, förlag, år, upplaga, sidor
Elsevier, 2024
Nyckelord
Cybersecurity assessment, HTTPS deployment, Vulnerabilities, Security metrics, Applicability
Nationell ämneskategori
Data- och informationsvetenskap
Identifikatorer
urn:nbn:se:liu:diva-201159 (URN)10.1016/j.compeleceng.2024.109137 (DOI)001204147300001 ()2-s2.0-85185829023 (Scopus ID)
Tillgänglig från: 2024-02-24 Skapad: 2024-02-24 Senast uppdaterad: 2025-02-07Bibliografiskt granskad
Avgouleas, I., Pappas, N. & Gurtov, A. (2024). A Wireless Caching Helper System Serving Heterogeneous Traffic with Secrecy Constraints. In: Proceedings - IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, ChileCon: . Paper presented at 2023 IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, ChileCon 2023, Hybrid, Valdivia, 5 December 2023 through 7 December 2023. IEEE
Öppna denna publikation i ny flik eller fönster >>A Wireless Caching Helper System Serving Heterogeneous Traffic with Secrecy Constraints
2024 (Engelska)Ingår i: Proceedings - IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, ChileCon, IEEE, 2024Konferensbidrag, Publicerat paper (Refereegranskat)
Abstract [en]

In this paper, we analyze the performance of a wireless caching system with heterogeneous traffic and relaying capabilities satisfying secrecy constraints for one of two receiving users. In this setup, the second user has no secrecy requirements and receives cacheable content either from the relay helper or the core network through a wireless base station. The wireless relay helper can assist both users since it is equipped with finite storage that is split into cacheable and non-cacheable storage. Concurrently, a passive eavesdropper tries to overhear transmissions to the user with secrecy requirements. Consequently, we examine how this relay’s storage split and the eavesdropper affect the performance of the average throughput and delay of the system as the transmission powers, the relay’s transmission probability, and the relay’s cache size vary. © 2023 IEEE.

Ort, förlag, år, upplaga, sidor
IEEE, 2024
Serie
EEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, ISSN 2832-1529
Nyckelord
Caching system; Core networks; Delay; Heterogeneous traffic; Performance; Relaying; Secrecy; Wireless base stations; Wireless caching helper system; Wireless relays
Nationell ämneskategori
Kommunikationssystem
Identifikatorer
urn:nbn:se:liu:diva-202639 (URN)10.1109/CHILECON60335.2023.10418706 (DOI)2-s2.0-85189502898 (Scopus ID)9798350369533 (ISBN)
Konferens
2023 IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, ChileCon 2023, Hybrid, Valdivia, 5 December 2023 through 7 December 2023
Anmärkning

Cited by: 0; Conference name: 2023 IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, ChileCon 2023; Conference date: 5 December 2023 through 7 December 2023; Conference code: 197291

Tillgänglig från: 2024-04-17 Skapad: 2024-04-17 Senast uppdaterad: 2024-08-08
Organisationer
Identifikatorer
ORCID-id: ORCID iD iconorcid.org/0000-0002-9829-9287

Sök vidare i DiVA

Visa alla publikationer