{"id":"https://openalex.org/W7133325585","doi":"https://doi.org/10.1109/tnsm.2026.3669870","title":"AnalyticalSAR: Analytical Modeling for Blocking Performance With Security-Aware Reconfiguration in Spectrally-Spatially Elastic Optical Networks","display_name":"AnalyticalSAR: Analytical Modeling for Blocking Performance With Security-Aware Reconfiguration in Spectrally-Spatially Elastic Optical Networks","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7133325585","doi":"https://doi.org/10.1109/tnsm.2026.3669870"},"language":null,"primary_location":{"id":"doi:10.1109/tnsm.2026.3669870","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tnsm.2026.3669870","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1109/tnsm.2026.3669870","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101712006","display_name":"Imran Ahmed","orcid":"https://orcid.org/0000-0001-8538-3538"},"institutions":[{"id":"https://openalex.org/I22299242","display_name":"Kyoto University","ror":"https://ror.org/02kpeqv85","country_code":"JP","type":"education","lineage":["https://openalex.org/I22299242"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Imran Ahmed","raw_affiliation_strings":["Graduate School of Informatics, Kyoto University, Yoshida-honmachi, Sakyo-ku, Kyoto, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Informatics, Kyoto University, Yoshida-honmachi, Sakyo-ku, Kyoto, Japan","institution_ids":["https://openalex.org/I22299242"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060706588","display_name":"Bijoy Chand Chatterjee","orcid":"https://orcid.org/0000-0002-9363-9289"},"institutions":[{"id":"https://openalex.org/I90425906","display_name":"South Asian University","ror":"https://ror.org/02kjyst95","country_code":"IN","type":"education","lineage":["https://openalex.org/I90425906"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Bijoy Chand Chatterjee","raw_affiliation_strings":["Department of Computer Science and Engineering, South Asian University, Delhi, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, South Asian University, Delhi, India","institution_ids":["https://openalex.org/I90425906"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5128014721","display_name":"Eiji Oki","orcid":null},"institutions":[{"id":"https://openalex.org/I22299242","display_name":"Kyoto University","ror":"https://ror.org/02kpeqv85","country_code":"JP","type":"education","lineage":["https://openalex.org/I22299242"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Eiji Oki","raw_affiliation_strings":["Graduate School of Informatics, Kyoto University, Yoshida-honmachi, Sakyo-ku, Kyoto, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Informatics, Kyoto University, Yoshida-honmachi, Sakyo-ku, Kyoto, Japan","institution_ids":["https://openalex.org/I22299242"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5101712006"],"corresponding_institution_ids":["https://openalex.org/I22299242"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.77664075,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"23","issue":null,"first_page":"2935","last_page":"2951"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10847","display_name":"Advanced Optical Network Technologies","score":0.8385000228881836,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10847","display_name":"Advanced Optical Network Technologies","score":0.8385000228881836,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10232","display_name":"Optical Network Technologies","score":0.09560000151395798,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10767","display_name":"Advanced Photonic Communication Systems","score":0.015599999576807022,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/control-reconfiguration","display_name":"Control reconfiguration","score":0.8312000036239624},{"id":"https://openalex.org/keywords/blocking","display_name":"Blocking (statistics)","score":0.6434999704360962},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.5065000057220459},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.44769999384880066},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.4156000018119812},{"id":"https://openalex.org/keywords/markov-chain","display_name":"Markov chain","score":0.41499999165534973},{"id":"https://openalex.org/keywords/resource-allocation","display_name":"Resource allocation","score":0.4122999906539917},{"id":"https://openalex.org/keywords/resource-management","display_name":"Resource management (computing)","score":0.3986000120639801}],"concepts":[{"id":"https://openalex.org/C119701452","wikidata":"https://www.wikidata.org/wiki/Q5165881","display_name":"Control reconfiguration","level":2,"score":0.8312000036239624},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8216999769210815},{"id":"https://openalex.org/C144745244","wikidata":"https://www.wikidata.org/wiki/Q4927286","display_name":"Blocking (statistics)","level":2,"score":0.6434999704360962},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5508999824523926},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.5065000057220459},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.44769999384880066},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.4156000018119812},{"id":"https://openalex.org/C98763669","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov chain","level":2,"score":0.41499999165534973},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.4122999906539917},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4075999855995178},{"id":"https://openalex.org/C2780609101","wikidata":"https://www.wikidata.org/wiki/Q17156588","display_name":"Resource management (computing)","level":2,"score":0.3986000120639801},{"id":"https://openalex.org/C134579502","wikidata":"https://www.wikidata.org/wiki/Q1455619","display_name":"Frequency allocation","level":2,"score":0.39629998803138733},{"id":"https://openalex.org/C200157131","wikidata":"https://www.wikidata.org/wiki/Q4854763","display_name":"Bandwidth allocation","level":3,"score":0.3896999955177307},{"id":"https://openalex.org/C159886148","wikidata":"https://www.wikidata.org/wiki/Q176645","display_name":"Markov process","level":2,"score":0.3686000108718872},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.34599998593330383},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3244999945163727},{"id":"https://openalex.org/C203274722","wikidata":"https://www.wikidata.org/wiki/Q7001161","display_name":"Network performance","level":2,"score":0.3111000061035156},{"id":"https://openalex.org/C179799912","wikidata":"https://www.wikidata.org/wiki/Q205084","display_name":"Computational complexity theory","level":2,"score":0.30979999899864197},{"id":"https://openalex.org/C19499675","wikidata":"https://www.wikidata.org/wiki/Q232207","display_name":"Monte Carlo method","level":2,"score":0.3061000108718872},{"id":"https://openalex.org/C159694833","wikidata":"https://www.wikidata.org/wiki/Q2321565","display_name":"Iterative method","level":2,"score":0.27630001306533813},{"id":"https://openalex.org/C5119721","wikidata":"https://www.wikidata.org/wiki/Q220501","display_name":"Quality of service","level":2,"score":0.25459998846054077},{"id":"https://openalex.org/C137246740","wikidata":"https://www.wikidata.org/wiki/Q583970","display_name":"Spectral efficiency","level":3,"score":0.25270000100135803},{"id":"https://openalex.org/C163836022","wikidata":"https://www.wikidata.org/wiki/Q6771326","display_name":"Markov model","level":3,"score":0.2524999976158142}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tnsm.2026.3669870","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tnsm.2026.3669870","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/tnsm.2026.3669870","is_oa":true,"landing_page_url":"https://doi.org/10.1109/tnsm.2026.3669870","pdf_url":null,"source":{"id":"https://openalex.org/S173527311","display_name":"IEEE Transactions on Network and Service Management","issn_l":"1932-4537","issn":["1932-4537","2373-7379"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network and Service Management","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W637574335","https://openalex.org/W1973457482","https://openalex.org/W2025553036","https://openalex.org/W2026655233","https://openalex.org/W2029558989","https://openalex.org/W2039558389","https://openalex.org/W2089983976","https://openalex.org/W2089994492","https://openalex.org/W2103372693","https://openalex.org/W2133401839","https://openalex.org/W2224102690","https://openalex.org/W2337522906","https://openalex.org/W2344321131","https://openalex.org/W2491453265","https://openalex.org/W2546737202","https://openalex.org/W2554756037","https://openalex.org/W2606371578","https://openalex.org/W2625102803","https://openalex.org/W2740170107","https://openalex.org/W2893488022","https://openalex.org/W2908419411","https://openalex.org/W2919918189","https://openalex.org/W2930870850","https://openalex.org/W2943263866","https://openalex.org/W3006908190","https://openalex.org/W3039333341","https://openalex.org/W3088133383","https://openalex.org/W3133737434","https://openalex.org/W3141661789","https://openalex.org/W4231384169","https://openalex.org/W4380303688","https://openalex.org/W4388623082","https://openalex.org/W4391888463","https://openalex.org/W4399620364","https://openalex.org/W4407950924","https://openalex.org/W4414941065","https://openalex.org/W4416513550"],"related_works":[],"abstract_inverted_index":{"Spectrally-spatially":[0],"elastic":[1],"optical":[2],"networks":[3],"(SS-EONs)":[4],"enable":[5],"ultra-high":[6],"data":[7],"rate":[8],"transmission,":[9],"which":[10],"raises":[11],"critical":[12],"concerns":[13],"about":[14],"physical-layer":[15],"security":[16,37,89,103,219,256],"vulnerabilities,":[17],"particularly":[18],"against":[19],"eavesdropping":[20],"and":[21,60,104,111,125,145,164,185,201,238,242,258],"unauthorized":[22],"network":[23,102,192,239],"access.":[24],"Dynamic":[25],"resource":[26,62,267],"allocation":[27,59,139],"through":[28],"lightpath":[29],"reconfiguration":[30,46,76,99,123,216],"presents":[31],"an":[32,68,181,252],"effective":[33,253],"approach":[34,184,189],"to":[35,53,86,129,190],"improving":[36],"by":[38],"reducing":[39],"request":[40],"exposure":[41],"windows.":[42],"However,":[43],"implementing":[44],"secure":[45,266],"in":[47,78,176,269],"SS-EONs":[48,79],"introduces":[49],"significant":[50],"complexity":[51,174],"due":[52],"the":[54,197],"complex":[55],"relationships":[56],"between":[57,255],"spectral":[58],"spatial":[61],"management":[63,268],"constraints.":[64],"This":[65],"paper":[66],"proposes":[67],"analytical":[69,94],"model":[70,115,152],"for":[71,109,121,206,265],"blocking":[72,105,224],"performance":[73,106,228],"with":[74,160],"security-aware":[75],"(AnalyticalSAR)":[77],"based":[80],"on":[81,232],"continuous-time":[82],"Markov":[83],"chain":[84],"analysis":[85,134],"tackle":[87],"these":[88],"challenges.":[90],"The":[91,114,246],"AnalyticalSAR":[92,250],"provides":[93],"assessment":[95],"of":[96,234],"how":[97],"spectrum":[98,122,138,215,235],"affects":[100],"both":[101],"while":[107,221],"accounting":[108,120],"inter-core":[110],"intermode":[112],"crosstalks.":[113],"generates":[116],"all":[117],"viable":[118],"states":[119],"processes":[124],"their":[126],"corresponding":[127],"transitions":[128],"establish":[130],"state":[131],"probabilities.":[132],"Our":[133,151],"incorporates":[135],"two":[136],"distinct":[137],"policies:":[140],"core-modespectrum":[141],"random":[142,214],"fit":[143,148],"(CMS-RF)":[144],"core-mode-spectrum":[146],"first":[147],"(CMS-FF)":[149],"policies.":[150],"supports":[153],"diverse":[154],"traffic":[155],"scenarios,":[156],"including":[157,167],"single-class":[158],"requests":[159,166],"uniform":[161],"slot":[162],"requirements":[163],"multi-class":[165],"heterogeneous":[168],"bandwidth":[169],"demands.":[170],"To":[171],"overcome":[172],"computational":[173],"limitations":[175],"single-hop":[177,208],"analyses,":[178],"we":[179],"develop":[180],"heuristic":[182,198],"iterative":[183,199],"subsequently":[186],"extend":[187],"this":[188],"multi-hop":[191],"scenarios.":[193],"We":[194],"compare":[195],"AnalyticalSAR,":[196],"approach,":[200],"Monte":[202],"Carlo":[203],"simulation":[204],"studies":[205],"a":[207,262],"link.":[209],"Analytical":[210],"evaluation":[211],"reveals":[212],"that":[213,249],"substantially":[217],"improves":[218],"metrics":[220],"introducing":[222],"minimal":[223],"probability":[225],"increases.":[226],"These":[227],"trade-offs":[229],"depend":[230],"critically":[231],"number":[233],"reconfiguration,":[236],"link":[237,244],"load":[240],"conditions,":[241],"available":[243],"capacity.":[245],"results":[247],"validate":[248],"achieves":[251],"compromise":[254],"enhancement":[257],"operational":[259],"performance,":[260],"providing":[261],"practical":[263],"framework":[264],"SS-EON":[270],"deployments.":[271]},"counts_by_year":[],"updated_date":"2026-03-12T06:13:28.667946","created_date":"2026-03-04T00:00:00"}
