https://arxiv.org/api/9RUplAyjIcSkFcy8ggWtV4c0kIk2026-03-22T13:04:08Z2679612015http://arxiv.org/abs/2601.18315v2CovertComBench: A First Domain-Specific Testbed for LLMs in Wireless Covert Communication2026-03-10T04:33:37ZThe integration of Large Language Models (LLMs) into wireless networks presents significant potential for automating system design. However, unlike conventional throughput maximization, Covert Communication (CC) requires optimizing transmission utility under strict detection-theoretic constraints, such as Kullback-Leibler divergence limits. Existing benchmarks primarily focus on general reasoning or standard communication tasks and do not adequately evaluate the ability of LLMs to satisfy these rigorous security constraints. To address this limitation, we introduce CovertComBench, a unified benchmark designed to assess LLM capabilities across the CC pipeline, encompassing conceptual understanding (MCQs), optimization derivation (ODQs), and code generation (CGQs). Furthermore, we analyze the reliability of automated scoring within a detection-theoretic ``LLM-as-Judge'' framework. Extensive evaluations across state-of-the-art models reveal a significant performance discrepancy. While LLMs achieve high accuracy in conceptual identification (81%) and code implementation (83%), their performance in the higher-order mathematical derivations necessary for security guarantees ranges between 18% and 55%. This limitation indicates that current LLMs serve better as implementation assistants rather than autonomous solvers for security-constrained optimization. These findings suggest that future research should focus on external tool augmentation to build trustworthy wireless AI systems.2026-01-26T09:51:29Z6 pages, corrected a typo: "DeepSeek-R1:70B" was previously incorrectly written as "DeepSeek-V3.2:70B"Zhaozhi LiuJiaxin ChenYuanai XieYuna JiangMinrui XuXiao ZhangPan LaiZan Zhouhttp://arxiv.org/abs/2603.09082v1PPO-Based Hybrid Optimization for RIS-Assisted Semantic Vehicular Edge Computing2026-03-10T01:47:10ZTo support latency-sensitive Internet of Vehicles (IoV) applications amidst dynamic environments and intermittent links, this paper proposes a Reconfigurable Intelligent Surface (RIS)-aided semantic-aware Vehicle Edge Computing (VEC) framework. This approach integrates RIS to optimize wireless connectivity and semantic communication to minimize latency by transmitting semantic features. We formulate a comprehensive joint optimization problem by optimizing offloading ratios, the number of semantic symbols, and RIS phase shifts. Considering the problem's high dimensionality and non-convexity, we propose a two-tier hybrid scheme that employs Proximal Policy Optimization (PPO) for discrete decision-making and Linear Programming (LP) for offloading optimization. {The simulation results have validated the proposed framework's superiority over existing methods. Specifically, the proposed PPO-based hybrid optimization scheme reduces the average end-to-end latency by approximately 40% to 50% compared to Genetic Algorithm (GA) and Quantum-behaved Particle Swarm Optimization (QPSO). Moreover, the system demonstrates strong scalability by maintaining low latency even in congested scenarios with up to 30 vehicles.2026-03-10T01:47:10ZThis paper has been accepted by electronics. The source code has been released at: https://github.com/qiongwu86/PPO-Based-Hybrid-Optimization-for-RIS-Assisted-Semantic-Vehicular-Edge-ComputingWei FengJingbo ZhangQiong WuPingyi FanQiang Fanhttp://arxiv.org/abs/2603.08931v1Optimizing Reinforcement Learning Training over Digital Twin Enabled Multi-fidelity Networks2026-03-09T20:59:23ZIn this paper, we investigate a novel digital network twin (DNT) assisted deep learning (DL) model training framework. In particular, we consider a physical network where a base station (BS) uses several antennas to serve multiple mobile users, and a DNT that is a virtual representation of the physical network. The BS must adjust its antenna tilt angles to optimize the data rates of all users. Due to user mobility, the BS may not be able to accurately track network dynamics such as wireless channels and user mobilities. Hence, a reinforcement learning (RL) approach is used to dynamically adjust the antenna tilt angles. To train the RL, we can use data collected from the physical network and the DNT. The data collected from the physical network is more accurate but incurs more communication overhead compared to the data collected from the DNT. Therefore, it is necessary to determine the ratio of data collected from the physical network and the DNT to improve the training of the RL model. We formulate this problem as an optimization problem whose goal is to jointly optimize the tilt angle adjustment policy and the data collection strategy, aiming to maximize the data rates of all users while constraining the time delay introduced by collecting data from the physical network. To solve this problem, we propose a hierarchical RL framework that integrates robust adversarial loss and proximal policy optimization (PPO). Simulation results show that our proposed method reduces the physical network data collection delay by up to 28.01% and 1x compared to a hierarchical RL that uses vanilla PPO as the first level RL, and the baseline that uses robust-RL at the first level and selects the data collection ratio randomly.2026-03-09T20:59:23ZHanzhi YuHasan FarooqJulien ForgeatShruti BotheKristijonas CyrasMd Moin Uddin ChowdhuryMingzhe Chenhttp://arxiv.org/abs/2603.08865v1Why Channel-Centric Models are not Enough to Predict End-to-End Performance in Private 5G: A Measurement Campaign and Case Study2026-03-09T19:27:00ZCommunication-aware robot planning requires accurate predictions of wireless network performance. Current approaches rely on channel-level metrics such as received signal strength and signal-to-noise ratio, assuming these translate reliably into end-to-end throughput. We challenge this assumption through a measurement campaign in a private 5G industrial environment. We evaluate throughput predictions from a commercial ray-tracing simulator as well as data-driven Gaussian process regression models against measurements collected using a mobile robot. The study uses off-the-shelf user equipment in an underground, radio-shielded facility with detailed 3D modeling, representing a best-case scenario for prediction accuracy. The ray-tracing simulator captures the spatial structure of indoor propagation and predicts channel-level metrics with reasonable fidelity. However, it systematically over-predicts throughput, even in line-of-sight regions. The dominant error source is shown to be over-estimation of sustainable MIMO spatial layers: the simulator assumes near-uniform four-layer transmission while measurements reveal substantial adaptation between one and three layers. This mismatch inflates predicted throughput even when channel metrics appear accurate. In contrast, a Gaussian process model with a rational quadratic kernel achieves approximately two-thirds reduction in prediction error with near-zero bias by learning end-to-end throughput directly from measurements. These findings demonstrate that favorable channel conditions do not guarantee high throughput; communication-aware planners relying solely on channel-centric predictions risk overly optimistic trajectories that violate reliability requirements. Accurate throughput prediction for 5G systems requires either extensive calibration of link-layer models or data-driven approaches that capture real system behavior.2026-03-09T19:27:00ZNils Jörgensenhttp://arxiv.org/abs/2603.10056v1OAuthHub: Mitigating OAuth Data Overaccess through a Local Data Hub2026-03-09T18:43:12ZMost OAuth service providers, such as Google and Microsoft, offer only a limited range of coarse-grained data access. As a result, third-party OAuth applications often end up accessing more user data than necessary, even if their developers want to minimize data access. We present OAuthHub, a development framework that leverages users' personal devices as the intermediary controller for OAuth-based data sharing between cloud services. The key innovations of OAuthHub are: (1) the insight that discretionary data access is largely unnecessary for most OAuth apps, which typically only require access at three well-defined moments-during installation, in response to user actions, and at scheduled intervals; (2) a development framework that requires explicit declarations of intended data access and supports the three common access patterns through intermittently available personal devices; and (3) a centralized runtime permission model for managing OAuth access across providers. We evaluated OAuthHub with three real-world apps on both PCs and mobile phones and found that OAuthHub requires moderate changes to the application code and imposes insignificant performance overheads. Our study with 18 developers showed that participants completed programming tasks significantly faster (9.1 vs. 18.0 minutes) with less code (4.7 vs. 15.8 lines) using OAuthHub than conventional OAuth APIs.2026-03-09T18:43:12ZAccepted to PETS 2026Qiyu LiYuhe TianHaojian Jinhttp://arxiv.org/abs/2603.08828v1Mobile Base Station Optimal Tour in Wide Area IoT Sensor Networks2026-03-09T18:38:25ZWide-area IoT sensor networks require efficient data collection mechanisms when sensors are dispersed over large regions with limited communication infrastructure. Unmanned aerial vehicle (UAV)-mounted Mobile Base Stations (MBSs) provide a flexible solution; however, their limited onboard energy and the strict energy budgets of sensors necessitate carefully optimized tour planning. In this paper, we introduce the Mobile Base Station Optimal Tour (MOT) problem, which seeks a minimum-cost, non-revisiting tour over a subset of candidate stops such that the union of their coverage regions ensures complete sensor data collection under a global sensor energy constraint. The tour also avoids restricted areas. We formally model the MOT problem as a combinatorial optimization problem, which is NP-complete. Owing to its computational intractability, we develop a polynomial-time greedy heuristic that jointly considers travel cost and incremental coverage gain while avoiding restricted areas. Using simulations, we obtain tours with low cost, complete sensor coverage, and faster execution. Our proposed greedy algorithm outperforms state-of-the-art approaches in terms of a performance indicator defined as the product of tour length and algorithm execution time, achieving an improvement of 39.15%. The proposed framework provides both theoretical insight into the structural complexity of MBS-assisted data collection and a practical algorithmic solution for large-scale IoT deployments.2026-03-09T18:38:25Z5 pages, 2 figuresSachin Kadamhttp://arxiv.org/abs/2603.08685v1Predicting Conflict Impact on Performance in O-RAN2026-03-09T17:52:19ZThe O-RAN Alliance promotes the integration of intelligent autonomous agents to control the Radio Access Network (RAN). This improves flexibility, performance, and observability in the RAN, but introduces new challenges, such as the detection and management of conflicts among the intelligent autonomous agents. A solution consists of profiling the agents before deployment to gather statistical information about their decision-making behavior, then using the information to estimate the level of conflict among agents with different goals. This approach enables determining the occurrence of conflicts among agents, but does not provide information about the impact on RAN performance, including potential service degradation. The problem becomes more complex when agents generate control actions at different timescales, which makes conflict severity hard to predict. In this paper, we present a novel approach that fills this gap. Our solution leverages the same data used to determine conflict severity but extends its use to predict the impact of such conflicts on RAN performance based on the frequency at which each agent generates actions, giving more weight to faster applications, which exert control more frequently. Via a prototype, we demonstrate that our solution is viable and accurately predicts conflict impact on RAN performance.2026-03-09T17:52:19ZINFOCOM 2026 Workshop - 6G AI-RAN: AI Native Distributed Intelligence for 6G Networks. 6 pages, 5 figures, 3 tablesPietro Brach del PreverNiloofar MohamadiSalvatore D'OroLeonardo BonatiMichele PoleseŁukasz KułaczPiotr JaworskiAdrian KliksHeiko LehmannTommaso Melodiahttp://arxiv.org/abs/2603.08623v1Time-based Fairness Improves Performance in Multi-rate WLANs2026-03-09T17:03:46ZThe performance seen by individual clients on a wireless local area network (WLAN) is heavily influenced by the manner in which wireless channel capacity is allocated. The popular MAC protocol DCF (Distributed Coordination Function) used in 802.11 networks provides equal long-term transmission opportunities to competing nodes when all nodes experience similar channel conditions. When similar-sized packets are also used, DCF leads to equal achieved throughputs (throughput-based fairness) among contending nodes. Because of varying indoor channel conditions, the 802.11 standard supports multiple data transmission rates to exploit the trade-off between data rate and bit error rate. This leads to considerable rate diversity, particularly when the network is congested. Under such conditions, throughput-based fairness can lead to drastically reduced aggregate throughput.
In this paper, we argue the advantages of time-based fairness, in which each competing node receives an equal share of the wireless channel occupancy time. We demonstrate that this notion of fairness can lead to significant improvements in aggregate performance while still guaranteeing that no node receives worse channel access than it would in a single-rate WLAN. We also describe our algorithm, TBR (Time-based Regulator), which runs on the AP and works with any MAC protocol to provide time-based fairness by regulating packets. Through experiments, we show that our practical and backward compatible implementation of TBR in conjunction with an existing implementation of DCF achieves time-based fairness.2026-03-09T17:03:46ZPublished in the Proceedings of Usenix Annual Technical Conference in 2004Proc. USENIX Annual Technical Conference (ATC 04), pp. 23-36 (2004)Godfrey TanJohn Guttag10.5555/1247415.1247438http://arxiv.org/abs/2603.10051v1Where Do Flow Semantics Reside? A Protocol-Native Tabular Pretraining Paradigm for Encrypted Traffic Classification2026-03-09T15:15:23ZSelf-supervised masked modeling shows promise for encrypted traffic classification by masking and reconstructing raw bytes. Yet recent work reveals these methods fail to reduce reliance on labeled data despite costly pretraining: under frozen encoder evaluation, accuracy drops from greater than 0.9 to less than 0.47. We argue the root cause is inductive bias mismatch: flattening traffic into byte sequences destroys protocol-defined semantics. We identify three specific issues: 1) field unpredictability, random fields like ip.id are unlearnable yet treated as reconstruction targets; 2) embedding confusion, semantically distinct fields collapse into a unified embedding space; 3) metadata loss, capture-time metadata essential for temporal analysis is discarded. To address this, we propose a protocol-native paradigm that treats protocol-defined field semantics as architectural priors, reformulating the task to align with the data's intrinsic tabular modality rather than incrementally adapting sequence-based architectures. Instantiating this paradigm, we introduce FlowSem-MAE, a tabular masked autoencoder built on Flow Semantic Units (FSUs). It features predictability-guided filtering that focuses on learnable FSUs, FSU-specific embeddings to preserve field boundaries, and dual-axis attention to capture intra-packet and temporal patterns. FlowSem-MAE significantly outperforms state-of-the-art across datasets. With only half labeled data, it outperforms most existing methods trained on full data.2026-03-09T15:15:23ZSizhe HuangShujie Yanghttp://arxiv.org/abs/2603.08292v1Silicone Ethernet (SEth): a Nervous System for Robotic Touch2026-03-09T12:11:56ZFine-grained robotic touch sensing is essential for tasks such as robot-human interaction and the handling of hazardous materials. Yet, the sense of touch of robots is limited by the cost and complexity of routing cables to embedded sensors. This paper tackles this problem by contributing Silicone Ethernet (SEth), a wireless solution for touch sensing, communication and power transfer within a conductive silicone substrate. SEth~\emph{neurons} require no battery and deliver computation, communication, sensing and energy harvesting within a compact package. These neurons are placed into an undifferentiated conductive silicone substrate which may form the entire body of a soft robot, or an outer `skin' for hard robots. Our evaluation shows that SEth achieves data rates of 100\,kbps with sub-$μ$W receive and mW-scale transmit power. Exploiting the unique properties of the conductive silicone substrate, SEth provides prioritized traffic arbitration similar to that found in wired control networks such as CAN. The SEth network inherently supports capacitive touch and presence sensing and neurons can harvest sufficient energy to transmit 10s of messages per second at a range of 1\,m. Considered in sum, these features open new degrees of freedom in touch sensing for soft robots.2026-03-09T12:11:56ZMengyao LiuDag MalstafJonathan OostvogelsSam MichielsAlexander Badri-SpröwitzDanny Hugheshttp://arxiv.org/abs/2512.23718v2Network Traffic Analysis with Process Mining: The UPSIDE Case Study2026-03-09T11:04:18ZOnline gaming is a popular activity involving the adoption of complex systems and network infrastructures. The relevance of gaming, which generates large amounts of market revenue, drove research in modeling network devices' behavior to evaluate bandwidth consumption, predict and sustain high loads, and detect malicious activity. In this context, process mining appears promising due to its ability to combine data-driven analyses with model-based insights. In this paper, we propose a process mining-based method that analyzes gaming network traffic, allowing: unsupervised characterization of different states from gaming network data; encoding such states through process mining into interpretable Petri nets; and classification of gaming network traffic data to identify different video games being played. We apply the method to the UPSIDE case study, involving gaming network data of several devices interacting with two video games: Clash Royale and Rocket League. Results demonstrate that the gaming network behavior can be effectively and interpretably modeled through states represented as Petri nets with sufficient coherence and specificity while maintaining a good classification accuracy of the two different video games.2025-12-10T19:40:53ZAccepted to the 2026 IEEE International Instrumentation and Measurement Technology Conference (I2MTC 2026)Francesco VitalePaolo PalmieroMassimiliano RakNicola Mazzoccahttp://arxiv.org/abs/2603.08218v1A Comparative Study of Recent Advances in Internet of Intrusion Detection Things2026-03-09T10:49:20ZThe Internet of Things (IoT) has revolutionized the way devices communicate and interact with each other, but it has also created new challenges in terms of security. In this context, intrusion detection has become a crucial mechanism to ensure the safety of IoT systems. To address this issue, a comprehensive comparative study of advanced techniques and types of IoT intrusion detection systems (IDS) has been conducted. The study delves into various architectures, classifications, and evaluation methodologies of IoT IDS. This paper provides a valuable resource for researchers and practitioners interested in IoT security and intrusion detection.2026-03-09T10:49:20Z2025 International Wireless Communications and Mobile Computing (IWCMC), May 2025, Abu Dhabi, United Arab Emirates. pp.473-478Marianna RezkIRIMASHassan HarbIRIMASIsmail BennisIRIMASSebastien BindelIRIMASHafid AbouaissaIRIMAShttp://arxiv.org/abs/2603.03638v2Exploring Multiple Converged States of Network Configurations2026-03-09T10:25:25ZDue to the policy-rich BGP, multiple stable forwarding states might exist for the same network topology and configuration, rendering the network convergence non-deterministic. This paper proves that any network with multiple converged states possesses a specific set of critical links which, when flipped (disconnect then reconnect), shifts the network between different stable states. We establish this result under the Stable Path Problem (SPP) framework, and also examine a real-world corner case where SPP doesn't apply.
Building on this theoretical foundation, we propose a tentative theoretical verification method for non-determinism with $O(n)$ complexity, where $n$ is the number of edges in a network. Specifically, we separately flip each link in the network and observe whether new converged states emerge. If no new states are discovered, the network is guaranteed to be free of non-determinism. This approach is proved correct when the set of critical links reduces to a single link -- usually the case in the real-world deployments.2026-03-04T01:59:01ZIssue with formal method establishment logic flowShunyu YangDan WangPeng Zhanghttp://arxiv.org/abs/2603.08192v1A Hodge-Based Framework for Service Operational Analysis in Serverless Platforms2026-03-09T10:19:46ZIn this paper we propose a method for analyzing services deployed in serverless platforms. These services typically consists of orchestrated functions that can exhibit complex and non-conservative information flows due to the interaction of independently deployed functions under coarse-grained control mechanisms. We introduce a topological model of serverless services and make use of the Hodge decomposition to partition observed operational flows into locally correctable components and globally persistent harmonic modes. Our analysis shows that harmonic flows naturally arise from different kind of interactions among functions and should be interpreted as structural properties of serverless systems rather than configuration errors. We present a systematic methodology for analyzing inter-function flows and deriving actionable remediation strategies, including dumping effects to contain the effects of harmonic inefficiencies as an alternative to completely restructure the topological model of the service. Experimental results confirm that the proposed approach can uncover latent architectural structures leading to inefficiencies.2026-03-09T10:19:46ZSubmitted for journal publicationGianluca RealiMauro Femminellahttp://arxiv.org/abs/2504.02637v3Medium Access for Push-Pull Data Transmission in 6G Wireless Systems2026-03-09T09:21:20ZMedium access in 5G systems was tailored to accommodate diverse traffic classes through network resource slicing. 6G wireless systems are expected to be significantly reliant on Artificial Intelligence (AI), leading to data-driven and goal-oriented communication. This leads to augmentation of the design space for Medium Access Control (MAC) protocols, which is the focus of this article. We introduce a taxonomy based on push-based and pull-based communication, which is useful to categorize both the legacy and the AI-driven access schemes. We provide MAC protocol design guidelines for pull- and push-based communication in terms of goal-oriented criteria, such as timing and data relevance. We articulate a framework for co-existence between pull and push-based communications in 6G systems, combining their advantages. We highlight the design principles and main tradeoffs, as well as the architectural considerations for integrating these designs in Open-Radio Access Network (O-RAN) and 6G systems.2025-04-03T14:34:38ZAccepted for publication in the IEEE Communications Magazine. Copyright might be transferred without noticeShashi Raj PandeyFabio SaggeseJunya ShiraishiFederico ChiariottiPetar Popovski10.1109/MCOM.001.2500233