Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (56)

Search Parameters:
Keywords = Byzantine attack

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
23 pages, 1961 KB  
Article
Quantum-Resilient Federated Learning for Multi-Layer Cyber Anomaly Detection in UAV Systems
by Canan Batur Şahin
Sensors 2026, 26(2), 509; https://doi.org/10.3390/s26020509 (registering DOI) - 12 Jan 2026
Abstract
Unmanned Aerial Vehicles (UAVs) are increasingly used in civilian and military applications, making their communication and control systems targets for cyber attacks. The emerging threat of quantum computing amplifies these risks. Quantum computers could break the classical cryptographic schemes used in current UAV [...] Read more.
Unmanned Aerial Vehicles (UAVs) are increasingly used in civilian and military applications, making their communication and control systems targets for cyber attacks. The emerging threat of quantum computing amplifies these risks. Quantum computers could break the classical cryptographic schemes used in current UAV networks. This situation underscores the need for quantum-resilient, privacy-preserving security frameworks. This paper proposes a quantum-resilient federated learning framework for multi-layer cyber anomaly detection in UAV systems. The framework combines a hybrid deep learning architecture. A Variational Autoencoder (VAE) performs unsupervised anomaly detection. A neural network classifier enables multi-class attack categorization. To protect sensitive UAV data, model training is conducted using federated learning with differential privacy. Robustness against malicious participants is ensured through Byzantine-robust aggregation. Additionally, CRYSTALS-Dilithium post-quantum digital signatures are employed to authenticate model updates and provide long-term cryptographic security. Researchers evaluated the proposed framework on a real UAV attack dataset containing GPS spoofing, GPS jamming, denial-of-service, and simulated attack scenarios. Experimental results show the system achieves 98.67% detection accuracy with only 6.8% computational overhead compared to classical cryptographic approaches, while maintaining high robustness under Byzantine attacks. The main contributions of this study are: (1) a hybrid VAE–classifier architecture enabling both zero-day anomaly detection and precise attack classification, (2) the integration of Byzantine-robust and privacy-preserving federated learning for UAV security, and (3) a practical post-quantum security design validated on real UAV communication data. Full article
(This article belongs to the Section Vehicular Sensing)
Show Figures

Figure 1

25 pages, 692 KB  
Article
Decentralized Dynamic Heterogeneous Redundancy Architecture Based on Raft Consensus Algorithm
by Ke Chen and Leyi Shi
Future Internet 2026, 18(1), 20; https://doi.org/10.3390/fi18010020 - 1 Jan 2026
Viewed by 192
Abstract
Dynamic heterogeneous redundancy (DHR) architectures combine heterogeneity, redundancy, and dynamism to create security-centric frameworks that can be used to mitigate network attacks that exploit unknown vulnerabilities. However, conventional DHR architectures rely on centralized control modules for scheduling and adjudication, leading to significant single-point [...] Read more.
Dynamic heterogeneous redundancy (DHR) architectures combine heterogeneity, redundancy, and dynamism to create security-centric frameworks that can be used to mitigate network attacks that exploit unknown vulnerabilities. However, conventional DHR architectures rely on centralized control modules for scheduling and adjudication, leading to significant single-point failure risks and trust bottlenecks that severely limit their deployment in security-critical scenarios. To address these challenges, this paper proposes a decentralized DHR architecture based on the Raft consensus algorithm. It deeply integrates the Raft consensus mechanism with the DHR execution layer to build a consensus-centric control plane and designs a dual-log pipeline to ensure all security-critical decisions are executed only after global consistency via Raft. Furthermore, we define a multi-dimensional attacker model—covering external, internal executor, internal node, and collaborative Byzantine adversaries—to analyze the security properties and explicit defense boundaries of the architecture under Raft’s crash-fault-tolerant assumptions. To assess the effectiveness of the proposed architecture, a prototype consisting of five heterogeneous nodes was developed for thorough evaluation. The experimental results show that, for non-Byzantine external and internal attacks, the architecture achieves high detection and isolation rates, maintains high availability, and ensures state consistency among non-malicious nodes. For stress tests in which a minority of nodes exhibit Byzantine-like behavior, our prototype preserves log consistency and prevents incorrect state commitments; however, we explicitly treat these as empirical observations under a restricted adversary rather than a general Byzantine fault tolerance guarantee. Performance testing revealed that the system exhibits strong security resilience in attack scenarios, with manageable performance overhead. Instead of turning Raft into a Byzantine-fault-tolerant consensus protocol, the proposed architecture preserves Raft’s crash-fault-tolerant guarantees at the consensus layer and achieves Byzantine-resilient behavior at the execution layer through heterogeneous redundant executors and majority-hash validation. To support evaluation during peer review, we provide a runnable prototype package containing Docker-based deployment scripts, pre-built heterogeneous executors, and Raft control-plane images, enabling reviewers to observe and assess the representative architectural behaviors of the system under controlled configurations without exposing the internal source code. The complete implementation will be made available after acceptance in accordance with institutional IP requirements, without affecting the scope or validity of the current evaluation. Full article
(This article belongs to the Section Cybersecurity)
Show Figures

Figure 1

32 pages, 1365 KB  
Article
Risk-Aware Privacy-Preserving Federated Learning for Remote Patient Monitoring: A Multi-Layer Adaptive Security Framework
by Fatiha Benabderrahmane, Elhillali Kerkouche and Nardjes Bouchemal
Appl. Sci. 2026, 16(1), 29; https://doi.org/10.3390/app16010029 - 19 Dec 2025
Viewed by 203
Abstract
The integration of artificial intelligence into remote patient monitoring (RPM) offers significant benefits for proactive and continuous healthcare, but also raises critical concerns regarding privacy, integrity, and robustness. Federated Learning (FL) provides a decentralized approach to model training that preserves data locality, yet [...] Read more.
The integration of artificial intelligence into remote patient monitoring (RPM) offers significant benefits for proactive and continuous healthcare, but also raises critical concerns regarding privacy, integrity, and robustness. Federated Learning (FL) provides a decentralized approach to model training that preserves data locality, yet most existing solutions address only isolated security aspects and lack contextual adaptability for clinical use. This paper presents MedGuard-FL, a context-aware FL framework tailored to e-healthcare environments. Spanning device, edge, and cloud layers, it integrates encryption, adaptive differential privacy, anomaly detection, and Byzantine-resilient aggregation. At its core, a policy engine dynamically adjusts privacy and robustness parameters based on the patient’s status and the system’s risk. Evaluations on real-world clinical datasets show MedGuard-FL maintains high model accuracy while neutralizing various adversarial attacks (e.g., label-flip, poisoning, backdoor, membership inference), all with manageable latency. Compared to static defenses, it offers improved trade-offs between privacy, utility, and responsiveness. Additional edge-level privacy analyses confirm its resilience, with attack effectiveness near random. By embedding clinical risk awareness into adaptive defense mechanisms, MedGuard-FL lays a foundation for secure, real-time federated intelligence in RPM. Full article
(This article belongs to the Special Issue Applications in Neural and Symbolic Artificial Intelligence)
Show Figures

Figure 1

23 pages, 733 KB  
Article
Robust Learning-Based Detection with Cost Control and Byzantine Mitigation
by Chen Zhong, M. Cenk Gursoy and Senem Velipasalar
Sensors 2026, 26(1), 5; https://doi.org/10.3390/s26010005 - 19 Dec 2025
Viewed by 257
Abstract
To address the state estimation and detection problem in the presence of noisy sensor observations, probing costs, and communication noise, we in this paper propose a soft actor-critic (SAC) deep reinforcement learning (DRL) framework for dynamically scheduling sensors and sequentially probing the state [...] Read more.
To address the state estimation and detection problem in the presence of noisy sensor observations, probing costs, and communication noise, we in this paper propose a soft actor-critic (SAC) deep reinforcement learning (DRL) framework for dynamically scheduling sensors and sequentially probing the state of a stochastic system. Moreover, considering Byzantine attacks, we design a generative adversarial network (GAN)-based framework to identify the Byzantine sensors. The GAN-based Byzantine detector and SAC-DRL-based agent are developed to operate in coordination to detect the state of the system reliably and fast while incurring small sensing cost. To evaluate the proposed framework, we measure the performance in terms of detection accuracy, stopping time, and the total probing cost needed for detection. Via simulation results, we analyze the performances and demonstrate that soft actor–critic algorithms are flexible and effective in action selection in imperfectly known environments due to the maximum entropy strategy and they can achieve stable performance levels in challenging test cases (e.g., involving jamming attacks, imperfectly known noise power levels, and high sensing cost scenarios). We also provide comparisons between the performances of the proposed soft actor–critic and conventional actor–critic algorithms as well as fixed scheduling strategies. Finally, we analyze the impact of Byzantine attacks and identify the reliability and accuracy improvements achieved by the GAN-based approach when combined with the SAC-DRL-based decision-making agent. Full article
(This article belongs to the Special Issue Anomaly Detection and Fault Diagnosis in Sensor Networks)
Show Figures

Figure 1

60 pages, 1591 KB  
Article
IoT Authentication in Federated Learning: Methods, Challenges, and Future Directions
by Arwa Badhib, Suhair Alshehri and Asma Cherif
Sensors 2025, 25(24), 7619; https://doi.org/10.3390/s25247619 - 16 Dec 2025
Viewed by 811
Abstract
The Internet of Things (IoT) has established an exceptional ecosystem of interconnected devices where a vast multitude of heterogeneous devices can communicate, collect, and share data for enhanced decision-making processes. To effectively analyze this immense volume of data, researchers have deployed advanced machine [...] Read more.
The Internet of Things (IoT) has established an exceptional ecosystem of interconnected devices where a vast multitude of heterogeneous devices can communicate, collect, and share data for enhanced decision-making processes. To effectively analyze this immense volume of data, researchers have deployed advanced machine learning algorithms and deep neural networks. However, these approaches typically rely on centralized data storage for training, which raises significant privacy concerns. Federated Learning (FL) addresses this issue by allowing devices to train local models on their own data and share only model updates. Despite this advantage, FL remains vulnerable to several security threats, including model poisoning, data manipulation, and Byzantine attacks. Therefore, robust and scalable authentication mechanisms are essential to ensure secure participation in FL environments. This study provides a comprehensive survey of authentication in FL. We examine the authentication process, discuss the associated key challenges, and analyze architectural considerations relevant to securing FL deployments. Existing authentication schemes are reviewed and evaluated in terms of their effectiveness, limitations, and practicality. To provide deeper insight, we classify these schemes along two dimensions as follows: their underlying enabling technologies, such as blockchain, cryptography, and AI-based methods, and the system contexts in which FL operates. Furthermore, we analyze the datasets and experimental environments used in current research, identify open research challenges, and highlight future research directions. To the best of our knowledge, this study presents the first structured and comprehensive analysis of authentication mechanisms in FL, offering a foundational reference for advancing secure and trustworthy federated learning systems. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

49 pages, 1583 KB  
Review
Federated Learning for Smart Cities: A Thematic Review of Challenges and Approaches
by Laila Alterkawi and Fadi K. Dib
Future Internet 2025, 17(12), 545; https://doi.org/10.3390/fi17120545 - 28 Nov 2025
Viewed by 1027
Abstract
Federated Learning (FL) offers a promising way to train machine learning models collaboratively on decentralized edge devices, addressing key privacy, communication, and regulatory challenges in smart city environments. This survey adopts a narrative approach, guided by systematic review principles such as PRISMA and [...] Read more.
Federated Learning (FL) offers a promising way to train machine learning models collaboratively on decentralized edge devices, addressing key privacy, communication, and regulatory challenges in smart city environments. This survey adopts a narrative approach, guided by systematic review principles such as PRISMA and Kitchenham, to synthesize current FL research in urban contexts. Unlike prior domain-focused surveys, this work introduces a challenge-oriented taxonomy and integrates an explicit analysis of reproducibility, including datasets and deployment artifacts, to assess real-world readiness. The review begins by examining how FL supports the privacy-preserving analysis of environmental and mobility data. It then explores strategies for resource optimization, including load balancing, model compression, and hierarchical aggregation. Applications in anomaly and event detection across power grids, water infrastructure, and surveillance systems are also discussed. In the energy sector, the survey emphasizes the role of FL in demand forecasting, renewable integration, and sustainable logistics. Particular attention is given to security issues, including defenses against poisoning attacks, Byzantine faults, and inference threats. The study identifies ongoing challenges such as data heterogeneity, scalability, resource limitations at the edge, privacy–utility trade-offs, and lack of standardization. Finally, it outlines a structured roadmap to guide the development of reliable, scalable, and sustainable FL solutions for smart cities. Full article
(This article belongs to the Special Issue Distributed Machine Learning and Federated Edge Computing for IoT)
Show Figures

Figure 1

19 pages, 1666 KB  
Article
Improved Trust Evaluation Model Based on PBFT and Zero Trust Integrated Power Network Security Defense Method
by Xiaoyun Liao, Sen Yang, Jun Xu, Li Liu, Wei Liang, Shengjie Yu, Yimu Ji and Shangdong Liu
Symmetry 2025, 17(11), 1982; https://doi.org/10.3390/sym17111982 - 16 Nov 2025
Viewed by 394
Abstract
In traditional power networks, security protection models primarily rely on perimeter-based defenses, utilizing firewalls, virtual private networks (VPNs), and identity authentication to block external threats. However, once a node within the power system is compromised, attackers can exploit it as a pivot to [...] Read more.
In traditional power networks, security protection models primarily rely on perimeter-based defenses, utilizing firewalls, virtual private networks (VPNs), and identity authentication to block external threats. However, once a node within the power system is compromised, attackers can exploit it as a pivot to launch lateral movement attacks from within the system, posing serious threats to the core operations of the power grid. To address the increasingly complex cybersecurity landscape, this paper proposes a security defense approach that integrates an improved trust evaluation model based on the Practical Byzantine Fault Tolerance (PBFT) algorithm with a zero-trust architecture, leveraging the structural and functional symmetry among network nodes. The PBFT algorithm’s fault tolerance and consensus mechanisms are leveraged to ensure dynamic trust scoring across multiple nodes. This approach guarantees that each node has an equal role in the system’s operations, maintaining fairness and security across the network. Furthermore, the primary node in the PBFT consensus process is redefined as the arbitration node in the zero-trust framework, and faulty nodes can be automatically replaced through the view change protocol, thereby mitigating the centralization risk inherent in traditional zero-trust models. Experimental results demonstrate that the proposed approach achieves high accuracy and robustness in defending against both internal and external attacks in power network scenarios, highlighting the role of symmetry in enhancing secure and balanced system operations. Full article
(This article belongs to the Special Issue Symmetry and Asymmetry in Data Analysis)
Show Figures

Figure 1

24 pages, 1998 KB  
Article
NetTopoBFT: Network Topology-Aware Byzantine Fault Tolerance for High-Coverage Consortium Blockchains
by Runyu Chen, Rangang Zhu and Lunwen Wang
Entropy 2025, 27(11), 1088; https://doi.org/10.3390/e27111088 - 22 Oct 2025
Viewed by 663
Abstract
The Practical Byzantine Fault Tolerance (PBFT) algorithm, while fundamental to consortium blockchains, suffers from performance degradation and vulnerability of leader nodes in large-scale scenarios. Existing improvements often prioritize performance while lacking systematic consideration of the structural characteristics of the nodes and network coverage. [...] Read more.
The Practical Byzantine Fault Tolerance (PBFT) algorithm, while fundamental to consortium blockchains, suffers from performance degradation and vulnerability of leader nodes in large-scale scenarios. Existing improvements often prioritize performance while lacking systematic consideration of the structural characteristics of the nodes and network coverage. In this paper, a new network topology-aware Byzantine fault-tolerant algorithm NetTopoBFT is proposed for the supply chain and other application scenarios that require strict transaction finality but moderate throughput. Firstly, it innovatively combines the weighted signed network with the consortium chain, constructs a two-layer Bayesian smoothing node evaluation model, and evaluates the nodes through the two-dimensional evaluation of ‘behavioral reputation plus structural importance’. Then, to reduce the risk of being attacked, it uses Verifiable Random Function (VRF) to decide the leader. Furthermore, it uses a duplicate coverage-driven waitlisting mechanism to enhance the robustness and connectivity of the system. Theoretical analysis and experiment results show that NetTopoBFT significantly improves the quality of consensus nodes under the premise of guaranteeing decentralization, realizes the simultaneous optimization of communication overhead, security and network coverage. It provides a new idea for designing consensus mechanism of consortium blockchains. Full article
(This article belongs to the Section Complexity)
Show Figures

Figure 1

31 pages, 1516 KB  
Article
Federated Quantum Machine Learning for Distributed Cybersecurity in Multi-Agent Energy Systems
by Kwabena Addo, Musasa Kabeya and Evans Eshiemogie Ojo
Energies 2025, 18(20), 5418; https://doi.org/10.3390/en18205418 - 14 Oct 2025
Cited by 2 | Viewed by 883
Abstract
The increasing digitization and decentralization of modern energy systems have heightened their vulnerability to sophisticated cyber threats, necessitating advanced, scalable, and privacy-preserving detection frameworks. This paper introduces a novel Federated Quantum Machine Learning (FQML) framework tailored for anomaly detection in multi-agent energy environments. [...] Read more.
The increasing digitization and decentralization of modern energy systems have heightened their vulnerability to sophisticated cyber threats, necessitating advanced, scalable, and privacy-preserving detection frameworks. This paper introduces a novel Federated Quantum Machine Learning (FQML) framework tailored for anomaly detection in multi-agent energy environments. By integrating parameterized quantum circuits (PQCs) at the local agent level with secure federated learning protocols, the framework enhances detection accuracy while preserving data privacy. A trimmed-mean aggregation scheme and differential privacy mechanisms are embedded to defend against Byzantine behaviors and data-poisoning attacks. The problem is formally modeled as a constrained optimization task, accounting for quantum circuit depth, communication latency, and adversarial resilience. Experimental validation on synthetic smart grid datasets demonstrates that FQML achieves high detection accuracy (≥96.3%), maintains robustness under adversarial perturbations, and reduces communication overhead by 28.6% compared to classical federated baselines. These results substantiate the viability of quantum-enhanced federated learning as a practical, hardware-conscious approach to distributed cybersecurity in next-generation energy infrastructures. Full article
Show Figures

Graphical abstract

40 pages, 2153 KB  
Review
DeepChainIoT: Exploring the Mutual Enhancement of Blockchain and Deep Neural Networks (DNNs) in the Internet of Things (IoT)
by Sabina Sapkota, Yining Hu, Asif Gill and Farookh Khadeer Hussain
Electronics 2025, 14(17), 3395; https://doi.org/10.3390/electronics14173395 - 26 Aug 2025
Viewed by 891
Abstract
The Internet of Things (IoT) is widely used across domains such as smart homes, healthcare, and grids. As billions of devices become connected, strong privacy and security measures are essential to protect sensitive information and prevent cyber-attacks. However, IoT devices often have limited [...] Read more.
The Internet of Things (IoT) is widely used across domains such as smart homes, healthcare, and grids. As billions of devices become connected, strong privacy and security measures are essential to protect sensitive information and prevent cyber-attacks. However, IoT devices often have limited computing power and storage, making it difficult to implement robust security and manage large volumes of data. Existing studies have explored integrating blockchain and Deep Neural Networks (DNNs) to address security, storage, and data dissemination in IoT networks, but they often fail to fully leverage the mutual enhancement between them. This paper proposes DeepChainIoT, a blockchain–DNN integrated framework designed to address centralization, latency, throughput, storage, and privacy challenges in generic IoT networks. It integrates smart contracts with a Long Short-Term Memory (LSTM) autoencoder for anomaly detection and secure transaction encoding, along with an optimized Practical Byzantine Fault Tolerance (PBFT) consensus mechanism featuring transaction prioritization and node rating. On a public pump sensor dataset, our LSTM autoencoder achieved 99.6% accuracy, 100% recall, 97.95% precision, and a 98.97% F1-score, demonstrating balanced performance, along with a 23.9× compression ratio. Overall, DeepChainIoT enhances IoT security, reduces latency, improves throughput, and optimizes storage while opening new directions for research in trustworthy computing. Full article
(This article belongs to the Special Issue Emerging IoT Sensor Network Technologies and Applications)
Show Figures

Figure 1

12 pages, 759 KB  
Article
Privacy-Preserving Byzantine-Tolerant Federated Learning Scheme in Vehicular Networks
by Shaohua Liu, Jiahui Hou and Gang Shen
Electronics 2025, 14(15), 3005; https://doi.org/10.3390/electronics14153005 - 28 Jul 2025
Viewed by 906
Abstract
With the rapid development of vehicular network technology, data sharing and collaborative training among vehicles have become key to enhancing the efficiency of intelligent transportation systems. However, the heterogeneity of data and potential Byzantine attacks cause the model to update in different directions [...] Read more.
With the rapid development of vehicular network technology, data sharing and collaborative training among vehicles have become key to enhancing the efficiency of intelligent transportation systems. However, the heterogeneity of data and potential Byzantine attacks cause the model to update in different directions during the iterative process, causing the boundary between benign and malicious gradients to shift continuously. To address these issues, this paper proposes a privacy-preserving Byzantine-tolerant federated learning scheme. Specifically, we design a gradient detection method based on median absolute deviation (MAD), which calculates MAD in each round to set a gradient anomaly detection threshold, thereby achieving precise identification and dynamic filtering of malicious gradients. Additionally, to protect vehicle privacy, we obfuscate uploaded parameters to prevent leakage during transmission. Finally, during the aggregation phase, malicious gradients are eliminated, and only benign gradients are selected to participate in the global model update, which improves the model accuracy. Experimental results on three datasets demonstrate that the proposed scheme effectively mitigates the impact of non-independent and identically distributed (non-IID) heterogeneity and Byzantine behaviors while maintaining low computational cost. Full article
(This article belongs to the Special Issue Cryptography in Internet of Things)
Show Figures

Figure 1

26 pages, 1627 KB  
Article
RVR Blockchain Consensus: A Verifiable, Weighted-Random, Byzantine-Tolerant Framework for Smart Grid Energy Trading
by Huijian Wang, Xiao Liu and Jining Chen
Computers 2025, 14(6), 232; https://doi.org/10.3390/computers14060232 - 13 Jun 2025
Viewed by 1562
Abstract
Blockchain technology empowers decentralized transactions in smart grids, but existing consensus algorithms face efficiency and security bottlenecks under Byzantine attacks. This article proposes the RVR consensus algorithm, which innovatively integrates dynamic reputation evaluation, verifiable random function (VRF), and a weight-driven probability election mechanism [...] Read more.
Blockchain technology empowers decentralized transactions in smart grids, but existing consensus algorithms face efficiency and security bottlenecks under Byzantine attacks. This article proposes the RVR consensus algorithm, which innovatively integrates dynamic reputation evaluation, verifiable random function (VRF), and a weight-driven probability election mechanism to achieve (1) behavior-aware dynamic adjustment of reputation weights and (2) manipulation-resistant random leader election via VRF. Experimental verification shows that under a silence attack, the maximum latency is reduced by 37.88% compared to HotStuff, and under a forking attack, the maximum throughput is increased by 50.66%, providing an efficient and secure new paradigm for distributed energy trading. Full article
Show Figures

Figure 1

17 pages, 1082 KB  
Article
FedOPCS: An Optimized Poisoning Countermeasure for Non-IID Federated Learning with Privacy-Preserving Stability
by Fenhua Bai, Yinqi Zhao, Tao Shen, Kai Zeng, Xiaohui Zhang and Chi Zhang
Symmetry 2025, 17(5), 782; https://doi.org/10.3390/sym17050782 - 19 May 2025
Viewed by 1191
Abstract
Federated learning (FL), as a distributed machine learning framework, enables multiple participants to jointly train models without sharing data, thereby ensuring data privacy and security. However, FL systems still struggle to escape the typical poisoning threat launched by Byzantine nodes. The current defence [...] Read more.
Federated learning (FL), as a distributed machine learning framework, enables multiple participants to jointly train models without sharing data, thereby ensuring data privacy and security. However, FL systems still struggle to escape the typical poisoning threat launched by Byzantine nodes. The current defence measures almost all rely on the anomaly detection of local gradients in a plaintext state, which not only weakens privacy protection but also allows malicious clients to upload malicious ciphertext gradients once they are encrypted, which thus easily evade existing screenings. At the same time, mainstream aggregation algorithms are generally based on the premise that “each client’s data satisfy an independent and identically distributed (IID)”, which is obviously difficult to achieve in real scenarios where large-scale terminal devices hold their own data. Symmetry in data distribution and model updates across clients is crucial for achieving robust and fair aggregation, yet non-IID data and adversarial attacks disrupt this balance. To address these challenges, we propose FedOPCS, an optimized poisoning countermeasure for non-IID FL algorithms with privacy-preserving stability by introducing three key innovations: Conditional Generative Adversarial Network (CGAN)-based data augmentation with conditional variables to simulate global distribution, a dynamic weight adjustment mechanism with homomorphic encryption, and two-stage anomaly detection combining gradient analysis and model performance evaluation. Extensive experiments on MNIST and CIFAR-10 show that, in the model poisoning and mixed poisoning environments, FedOPCS outperforms the baseline methods by 11.4% and 4.7%, respectively, while maintaining the same efficiency as FedAvg. FedOPCS therefore offers a privacy-preserving, Byzantine-robust, and communication-efficient solution for future heterogeneous FL deployments. Full article
Show Figures

Figure 1

21 pages, 9384 KB  
Article
Consensus Optimization Algorithm for Distributed Intelligent Medical Diagnostic Collaborative Systems Based on Verifiable Random Functions and Reputation Mechanisms
by Shizhuang Liu, Yang Zhang and Yating Zhao
Electronics 2025, 14(10), 2020; https://doi.org/10.3390/electronics14102020 - 15 May 2025
Viewed by 908
Abstract
With the deep integration of distributed network technology and intelligent medical care, how to achieve efficient collaboration under the premise of safeguarding data security and system efficiency has become an important challenge for intelligent medical diagnosis systems. The traditional practical Byzantine fault tolerance [...] Read more.
With the deep integration of distributed network technology and intelligent medical care, how to achieve efficient collaboration under the premise of safeguarding data security and system efficiency has become an important challenge for intelligent medical diagnosis systems. The traditional practical Byzantine fault tolerance (PBFT) algorithm has difficulty meeting the demands of large-scale distributed medical scenarios due to high communication overhead and poor scalability. In addition, the existing improvement schemes are still deficient in dynamic node management and complex attack defence. To this end, this paper proposes the VS-PBFT consensus algorithm, which fuses a verifiable random function (VRF) and reputation mechanism, and designs a distributed intelligent medical diagnosis collaboration system based on this algorithm. Firstly, we introduce the VRF technique to achieve random and unpredictable selection of master nodes, which reduces the risk of fixed verification nodes being attacked. Secondly, we construct a dynamic reputation evaluation model to quantitatively score the nodes’ historical behaviors and then adjust their participation priority in the consensus process, thus reducing malicious node interference and redundant communication overhead. In the application of an intelligent medical diagnosis collaboration system, the VS-PBFT algorithm effectively improves the security and efficiency of diagnostic data sharing while safeguarding patient privacy. The experimental results show that in a 40-node network environment, the transaction throughput of VS-PBFT is 21.05% higher than that of PBFT, the delay is reduced by 33.62%, the communication overhead is reduced by 8.63%, and the average number of message copies is reduced by about 7.90%, which demonstrates stronger consensus efficiency and anti-attack capability, providing the smart medical diagnosis collaboration system with the first VS-PBFT algorithm-based technical support. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

52 pages, 11802 KB  
Article
Nazfast: An Exceedingly Scalable, Secure, and Decentralized Consensus for Blockchain Network Powered by S&SEM and Sea Shield
by Sana Naz and Scott Uk-Jin Lee
Appl. Sci. 2025, 15(10), 5400; https://doi.org/10.3390/app15105400 - 12 May 2025
Viewed by 1126
Abstract
Blockchain technology uses a consensus mechanism to create and finalize blocks. The consensus mechanism affects the total performance parameters of the blockchain network, such as throughput. In this paper, we present “Nazfast”, a simplified proof of stake—Byzantine fault tolerance based consensus mechanism to [...] Read more.
Blockchain technology uses a consensus mechanism to create and finalize blocks. The consensus mechanism affects the total performance parameters of the blockchain network, such as throughput. In this paper, we present “Nazfast”, a simplified proof of stake—Byzantine fault tolerance based consensus mechanism to create and finalize blocks. The presented consensus is completed in multiple folds. For block producer and validation committee selection, we used a secure and speeded-up election mechanism, S&Sem, in Nazfast. The consensus is designed for fast block finalization in a malicious environment. The simulation result shows that we approximately achieved three block finalizations in 1 s with almost similar latency. We reduced and fixed the number of validators in the consensus to improve the throughput. We achieved a higher throughput among other consensus of the same family. Because we reduced the number of validators, the safety parameters of the consensus are at risk, so we used Sea Shield to improve the overall consensus safety. This is another blockchain to save nodes’ details when they join/unjoin the network as validators. By using all three parts together, our system is protected from 28-plus different attacks, and we maintain a high decentralization by using S&Sem. Finally, we also enhance the incentive mechanism of consensus to improve the liveness of the network. Full article
Show Figures

Figure 1

Back to TopTop