Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (458)

Search Parameters:
Keywords = Data Tampering

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
28 pages, 1727 KiB  
Article
Detecting Jamming in Smart Grid Communications via Deep Learning
by Muhammad Irfan, Aymen Omri, Javier Hernandez Fernandez, Savio Sciancalepore and Gabriele Oligeri
J. Cybersecur. Priv. 2025, 5(3), 46; https://doi.org/10.3390/jcp5030046 - 15 Jul 2025
Viewed by 142
Abstract
Power-Line Communication (PLC) allows data transmission through existing power lines, thus avoiding the expensive deployment of ad hoc network infrastructures. However, power line networks remain vastly unattended, which allows tampering by malicious actors. In fact, an attacker can easily inject a malicious signal [...] Read more.
Power-Line Communication (PLC) allows data transmission through existing power lines, thus avoiding the expensive deployment of ad hoc network infrastructures. However, power line networks remain vastly unattended, which allows tampering by malicious actors. In fact, an attacker can easily inject a malicious signal (jamming) with the aim of disrupting ongoing communications. In this paper, we propose a new solution to detect jamming attacks before they significantly affect the quality of the communication link, thus allowing the detection of a jammer (geographically) far away from a receiver. We consider two scenarios as a function of the receiver’s ability to know in advance the impact of the jammer on the received signal. In the first scenario (jamming-aware), we leverage a classifier based on a Convolutional Neural Network, which has been trained on both jammed and non-jammed signals. In the second scenario (jamming-unaware), we consider a one-class classifier based on autoencoders, allowing us to address the challenge of jamming detection as a classical anomaly detection problem. Our proposed solution can detect jamming attacks on PLC networks with an accuracy greater than 99% even when the jammer is 68 m away from the receiver while requiring training only on traffic acquired during the regular operation of the target PLC network. Full article
Show Figures

Figure 1

20 pages, 2883 KiB  
Article
Sustainable Daily Mobility and Bike Security
by Sergej Gričar, Christian Stipanović and Tea Baldigara
Sustainability 2025, 17(14), 6262; https://doi.org/10.3390/su17146262 - 8 Jul 2025
Viewed by 179
Abstract
As climate change concerns, urban congestion, and environmental degradation intensify, cities prioritise cycling as a sustainable transport option to reduce CO2 emissions and improve quality of life. However, rampant bicycle theft and poor security infrastructure often deter daily commuters and tourists from [...] Read more.
As climate change concerns, urban congestion, and environmental degradation intensify, cities prioritise cycling as a sustainable transport option to reduce CO2 emissions and improve quality of life. However, rampant bicycle theft and poor security infrastructure often deter daily commuters and tourists from cycling. This study explores how advanced security measures can bolster sustainable urban mobility and tourism by addressing these challenges. A mixed-methods approach is utilised, incorporating primary survey data from Slovenia and secondary data on bicycle sales, imports and thefts from 2015 to 2024. Findings indicate that access to secure parking substantially enhances users’ sense of safety when commuting by bike. Regression analysis shows that for every 1000 additional bicycles sold, approximately 280 more thefts occur—equivalent to a 0.28 rise in reported thefts—highlighting a systemic vulnerability associated with sustainability-oriented behaviour. To bridge this gap, the study advocates for an innovative security framework that combines blockchain technology and Non-Fungible Tokens (NFTs) with encrypted Quick Response (QR) codes. Each bicycle would receive a tamper-proof QR code connected to a blockchain-verified NFT documenting ownership and usage data. This system facilitates real-time authentication, enhances traceability, deters theft, and builds trust in cycling as a dependable transport alternative. The proposed solution merges sustainable transport, digital identity, and urban security, presenting a scalable model for individual users and shared mobility systems. Full article
(This article belongs to the Collection Reshaping Sustainable Tourism in the Horizon 2050)
Show Figures

Figure 1

31 pages, 2044 KiB  
Article
Optimized Two-Stage Anomaly Detection and Recovery in Smart Grid Data Using Enhanced DeBERTa-v3 Verification System
by Xiao Liao, Wei Cui, Min Zhang, Aiwu Zhang and Pan Hu
Sensors 2025, 25(13), 4208; https://doi.org/10.3390/s25134208 - 5 Jul 2025
Viewed by 235
Abstract
The increasing sophistication of cyberattacks on smart grid infrastructure demands advanced anomaly detection and recovery systems that balance high recall rates with acceptable precision while providing reliable data restoration capabilities. This study presents an optimized two-stage anomaly detection and recovery system combining an [...] Read more.
The increasing sophistication of cyberattacks on smart grid infrastructure demands advanced anomaly detection and recovery systems that balance high recall rates with acceptable precision while providing reliable data restoration capabilities. This study presents an optimized two-stage anomaly detection and recovery system combining an enhanced TimerXL detector with a DeBERTa-v3-based verification and recovery mechanism. The first stage employs an optimized increment-based detection algorithm achieving 95.0% for recall and 54.8% for precision through multidimensional analysis. The second stage leverages a modified DeBERTa-v3 architecture with comprehensive 25-dimensional feature engineering per variable to verify potential anomalies, improving the precision to 95.1% while maintaining 84.1% for recall. Key innovations include (1) a balanced loss function combining focal loss (α = 0.65, γ = 1.2), Dice loss (weight = 0.5), and contrastive learning (weight = 0.03) to reduce over-rejection by 73.4%; (2) an ensemble verification strategy using multithreshold voting, achieving 91.2% accuracy; (3) optimized sample weighting prioritizing missed positives (weight = 10.0); (4) comprehensive feature extraction, including frequency domain and entropy features; and (5) integration of a generative time series model (TimER) for high-precision recovery of tampered data points. Experimental results on 2000 hourly smart grid measurements demonstrate an F1-score of 0.873 ± 0.114 for detection, representing a 51.4% improvement over ARIMA (0.576), 621% over LSTM-AE (0.121), 791% over standard Anomaly Transformer (0.098), and 904% over TimesNet (0.087). The recovery mechanism achieves remarkably precise restoration with a mean absolute error (MAE) of only 0.0055 kWh, representing a 99.91% improvement compared to traditional ARIMA models and 98.46% compared to standard Anomaly Transformer models. We also explore an alternative implementation using the Lag-LLaMA architecture, which achieves an MAE of 0.2598 kWh. The system maintains real-time capability with a 66.6 ± 7.2 ms inference time, making it suitable for operational deployment. Sensitivity analysis reveals robust performance across anomaly magnitudes (5–100 kWh), with the detection accuracy remaining above 88%. Full article
(This article belongs to the Section Electronic Sensors)
Show Figures

Figure 1

24 pages, 3773 KiB  
Article
Smart Grid System Based on Blockchain Technology for Enhancing Trust and Preventing Counterfeiting Issues
by Ala’a Shamaseen, Mohammad Qatawneh and Basima Elshqeirat
Energies 2025, 18(13), 3523; https://doi.org/10.3390/en18133523 - 3 Jul 2025
Viewed by 342
Abstract
Traditional systems in real life lack transparency and ease of use due to their reliance on centralization and large infrastructure. Furthermore, many sectors that rely on information technology face major challenges related to data integrity, trust, and counterfeiting, limiting scalability and acceptance in [...] Read more.
Traditional systems in real life lack transparency and ease of use due to their reliance on centralization and large infrastructure. Furthermore, many sectors that rely on information technology face major challenges related to data integrity, trust, and counterfeiting, limiting scalability and acceptance in the community. With the decentralization and digitization of energy transactions in smart grids, security, integrity, and fraud prevention concerns have increased. The main problem addressed in this study is the lack of a secure, tamper-resistant, and decentralized mechanism to facilitate direct consumer-to-prosumer energy transactions. Thus, this is a major challenge in the smart grid. In the blockchain, current consensus algorithms may limit the scalability of smart grids, especially when depending on popular algorithms such as Proof of Work, due to their high energy consumption, which is incompatible with the characteristics of the smart grid. Meanwhile, Proof of Stake algorithms rely on energy or cryptocurrency stake ownership, which may make the smart grid environment in blockchain technology vulnerable to control by the many owning nodes, which is incompatible with the purpose and objective of this study. This study addresses these issues by proposing and implementing a hybrid framework that combines the features of private and public blockchains across three integrated layers: user interface, application, and blockchain. A key contribution of the system is the design of a novel consensus algorithm, Proof of Energy, which selects validators based on node roles and randomized assignment, rather than computational power or stake ownership. This makes it more suitable for smart grid environments. The entire framework was developed without relying on existing decentralized platforms such as Ethereum. The system was evaluated through comprehensive experiments on performance and security. Performance results show a throughput of up to 60.86 transactions per second and an average latency of 3.40 s under a load of 10,000 transactions. Security validation confirmed resistance against digital signature forgery, invalid smart contracts, race conditions, and double-spending attacks. Despite the promising performance, several limitations remain. The current system was developed and tested on a single machine as a simulation-based study using transaction logs without integration of real smart meters or actual energy tokenization in real-time scenarios. In future work, we will focus on integrating real-time smart meters and implementing full energy tokenization to achieve a complete and autonomous smart grid platform. Overall, the proposed system significantly enhances data integrity, trust, and resistance to counterfeiting in smart grids. Full article
Show Figures

Figure 1

31 pages, 28041 KiB  
Article
Cyberattack Resilience of Autonomous Vehicle Sensor Systems: Evaluating RGB vs. Dynamic Vision Sensors in CARLA
by Mustafa Sakhai, Kaung Sithu, Min Khant Soe Oke and Maciej Wielgosz
Appl. Sci. 2025, 15(13), 7493; https://doi.org/10.3390/app15137493 - 3 Jul 2025
Viewed by 357
Abstract
Autonomous vehicles (AVs) rely on a heterogeneous sensor suite of RGB cameras, LiDAR, GPS/IMU, and emerging event-based dynamic vision sensors (DVS) to perceive and navigate complex environments. However, these sensors can be deceived by realistic cyberattacks, undermining safety. In this work, we systematically [...] Read more.
Autonomous vehicles (AVs) rely on a heterogeneous sensor suite of RGB cameras, LiDAR, GPS/IMU, and emerging event-based dynamic vision sensors (DVS) to perceive and navigate complex environments. However, these sensors can be deceived by realistic cyberattacks, undermining safety. In this work, we systematically implement seven attack vectors in the CARLA simulator—salt and pepper noise, event flooding, depth map tampering, LiDAR phantom injection, GPS spoofing, denial of service, and steering bias control—and measure their impact on a state-of-the-art end-to-end driving agent. We then equip each sensor with tailored defenses (e.g., adaptive median filtering for RGB and spatial clustering for DVS) and integrate a unsupervised anomaly detector (EfficientAD from anomalib) trained exclusively on benign data. Our detector achieves clear separation between normal and attacked conditions (mean RGB anomaly scores of 0.00 vs. 0.38; DVS: 0.61 vs. 0.76), yielding over 95% detection accuracy with fewer than 5% false positives. Defense evaluations reveal that GPS spoofing is fully mitigated, whereas RGB- and depth-based attacks still induce 30–45% trajectory drift despite filtering. Notably, our research-focused evaluation of DVS sensors suggests potential intrinsic resilience advantages in high-dynamic-range scenarios, though their asynchronous output necessitates carefully tuned thresholds. These findings underscore the critical role of multi-modal anomaly detection and demonstrate that DVS sensors exhibit greater intrinsic resilience in high-dynamic-range scenarios, suggesting their potential to enhance AV cybersecurity when integrated with conventional sensors. Full article
(This article belongs to the Special Issue Intelligent Autonomous Vehicles: Development and Challenges)
Show Figures

Figure 1

31 pages, 759 KiB  
Article
Secure Optimization Dispatch Framework with False Data Injection Attack in Hybrid-Energy Ship Power System Under the Constraints of Safety and Economic Efficiency
by Xiaoyuan Luo, Weisong Zhu, Shaoping Chang and Xinyu Wang
Electricity 2025, 6(3), 38; https://doi.org/10.3390/electricity6030038 - 3 Jul 2025
Viewed by 251
Abstract
Hybrid-energy vessels offer significant advantages in reducing carbon emissions and air pollutants by integrating traditional internal combustion engines, electric motors, and new energy technologies. However, during operation, the high reliance of hybrid-energy ships on networks and communication systems poses serious data security risks. [...] Read more.
Hybrid-energy vessels offer significant advantages in reducing carbon emissions and air pollutants by integrating traditional internal combustion engines, electric motors, and new energy technologies. However, during operation, the high reliance of hybrid-energy ships on networks and communication systems poses serious data security risks. Meanwhile, the complexity of energy scheduling presents challenges in obtaining feasible solutions. To address these issues, this paper proposes an innovative two-stage security optimization scheduling framework aimed at simultaneously improving the security and economy of the system. Firstly, the framework employs a CNN-LSTM hybrid model (WOA-CNN-LSTM) optimized using the whale optimization algorithm to achieve real-time detection of false data injection attacks (FDIAs) and post-attack data recovery. By deeply mining the spatiotemporal characteristics of the measured data, the framework effectively identifies anomalies and repairs tampered data. Subsequently, based on the improved multi-objective whale optimization algorithm (IMOWOA), rapid optimization scheduling is conducted to ensure that the system can maintain an optimal operational state following an attack. Simulation results demonstrate that the proposed framework achieves a detection accuracy of 0.9864 and a recovery efficiency of 0.969 for anomaly data. Additionally, it reduces the ship’s operating cost, power loss, and carbon emissions by at least 1.96%, 5.67%, and 1.65%, respectively. Full article
Show Figures

Figure 1

47 pages, 6244 KiB  
Review
Toward the Mass Adoption of Blockchain: Cross-Industry Insights from DeFi, Gaming, and Data Analytics
by Shezon Saleem Mohammed Abdul, Anup Shrestha and Jianming Yong
Big Data Cogn. Comput. 2025, 9(7), 178; https://doi.org/10.3390/bdcc9070178 - 3 Jul 2025
Viewed by 997
Abstract
Blockchain’s promise of decentralised, tamper-resistant services is gaining real traction in three arenas: decentralized finance (DeFi), blockchain gaming, and data-driven analytics. These sectors span finance, entertainment, and information services, offering a representative setting in which to study real-world adoption. This survey analyzes how [...] Read more.
Blockchain’s promise of decentralised, tamper-resistant services is gaining real traction in three arenas: decentralized finance (DeFi), blockchain gaming, and data-driven analytics. These sectors span finance, entertainment, and information services, offering a representative setting in which to study real-world adoption. This survey analyzes how each domain implements blockchain, identifies the incentives that accelerate uptake, and maps the technical and organizational barriers that still limit scale. By examining peer-reviewed literature and recent industry developments, this review distils common design features such as token incentives, verifiable digital ownership, and immutable data governance. It also pinpoints the following domain-specific challenges: capital efficiency in DeFi, asset portability and community engagement in gaming, and high-volume, low-latency querying in analytics. Moreover, cross-sector links are already forming, with DeFi liquidity tools supporting in-game economies and analytics dashboards improving decision-making across platforms. Building on these findings, this paper offers guidance on stronger interoperability and user-centered design and sets research priorities in consensus optimization, privacy-preserving analytics, and inclusive governance. Together, the insights equip developers, policymakers, and researchers to build scalable, interoperable platforms and reuse proven designs while avoiding common pitfalls. Full article
(This article belongs to the Special Issue Application of Cloud Computing in Industrial Internet of Things)
Show Figures

Figure 1

22 pages, 557 KiB  
Article
Using Blockchain Ledgers to Record AI Decisions in IoT
by Vikram Kulothungan
IoT 2025, 6(3), 37; https://doi.org/10.3390/iot6030037 - 3 Jul 2025
Viewed by 439
Abstract
The rapid integration of AI into IoT systems has outpaced the ability to explain and audit automated decisions, resulting in a serious transparency gap. We address this challenge by proposing a blockchain-based framework to create immutable audit trails of AI-driven IoT decisions. In [...] Read more.
The rapid integration of AI into IoT systems has outpaced the ability to explain and audit automated decisions, resulting in a serious transparency gap. We address this challenge by proposing a blockchain-based framework to create immutable audit trails of AI-driven IoT decisions. In our approach, each AI inference comprising key inputs, model ID, and output is logged to a permissioned blockchain ledger, ensuring that every decision is traceable and auditable. IoT devices and edge gateways submit cryptographically signed decision records via smart contracts, resulting in an immutable, timestamped log that is tamper-resistant. This decentralized approach guarantees non-repudiation and data integrity while balancing transparency with privacy (e.g., hashing personal data on-chain) to meet data protection norms. Our design aligns with emerging regulations, such as the EU AI Act’s logging mandate and GDPR’s transparency requirements. We demonstrate the framework’s applicability in two domains: healthcare IoT (logging diagnostic AI alerts for accountability) and industrial IoT (tracking autonomous control actions), showing its generalizability to high-stakes environments. Our contributions include the following: (1) a novel architecture for AI decision provenance in IoT, (2) a blockchain-based design to securely record AI decision-making processes, and (3) a simulation informed performance assessment based on projected metrics (throughput, latency, and storage) to assess the approach’s feasibility. By providing a reliable immutable audit trail for AI in IoT, our framework enhances transparency and trust in autonomous systems and offers a much-needed mechanism for auditable AI under increasing regulatory scrutiny. Full article
(This article belongs to the Special Issue Blockchain-Based Trusted IoT)
Show Figures

Figure 1

17 pages, 2101 KiB  
Article
Enhancing DDoS Attacks Mitigation Using Machine Learning and Blockchain-Based Mobile Edge Computing in IoT
by Mahmoud Chaira, Abdelkader Belhenniche and Roman Chertovskih
Computation 2025, 13(7), 158; https://doi.org/10.3390/computation13070158 - 1 Jul 2025
Viewed by 286
Abstract
The widespread adoption of Internet of Things (IoT) devices has been accompanied by a remarkable rise in both the frequency and intensity of Distributed Denial of Service (DDoS) attacks, which aim to overwhelm and disrupt the availability of networked systems and connected infrastructures. [...] Read more.
The widespread adoption of Internet of Things (IoT) devices has been accompanied by a remarkable rise in both the frequency and intensity of Distributed Denial of Service (DDoS) attacks, which aim to overwhelm and disrupt the availability of networked systems and connected infrastructures. In this paper, we present a novel approach to DDoS attack detection and mitigation that integrates state-of-the-art machine learning techniques with Blockchain-based Mobile Edge Computing (MEC) in IoT environments. Our solution leverages the decentralized and tamper-resistant nature of Blockchain technology to enable secure and efficient data collection and processing at the network edge. We evaluate multiple machine learning models, including K-Nearest Neighbors (KNN), Support Vector Machine (SVM), Decision Tree (DT), Random Forest (RF), Transformer architectures, and LightGBM, using the CICDDoS2019 dataset. Our results demonstrate that Transformer models achieve a superior detection accuracy of 99.78%, while RF follows closely with 99.62%, and LightGBM offers optimal efficiency for real-time detection. This integrated approach significantly enhances detection accuracy and mitigation effectiveness compared to existing methods, providing a robust and adaptive mechanism for identifying and mitigating malicious traffic patterns in IoT environments. Full article
(This article belongs to the Section Computational Engineering)
Show Figures

Figure 1

20 pages, 3502 KiB  
Article
Blockchain-Enabled Cross-Chain Coordinated Trading Strategy for Electricity-Carbon-Green Certificate in Virtual Power Plants: Multi-Market Coupling and Low-Carbon Operation Optimization
by Chao Zheng, Wei Huang, Suwei Zhai, Kaiyan Pan, Xuehao He, Xiaojie Liu, Shi Su, Cong Shen and Qian Ai
Energies 2025, 18(13), 3443; https://doi.org/10.3390/en18133443 - 30 Jun 2025
Viewed by 186
Abstract
In the context of global climate governance and the low-carbon energy transition, virtual power plant (VPP), a key technology for integrating distributed energy resources, is urgently needed to solve the problem of decentralization and lack of synergy in electricity, carbon, and green certificate [...] Read more.
In the context of global climate governance and the low-carbon energy transition, virtual power plant (VPP), a key technology for integrating distributed energy resources, is urgently needed to solve the problem of decentralization and lack of synergy in electricity, carbon, and green certificate trading. Existing studies mostly focus on single energy or carbon trading scenarios and lack a multi-market coupling mechanism supported by blockchain technology, resulting in low transaction transparency and a high risk of information tampering. For this reason, this paper proposes a synergistic optimization strategy for electricity/carbon/green certificate virtual power plants based on blockchain cross-chain transactions. First, Latin Hypercubic Sampling (LHS) is used to generate new energy output and load scenarios, and the K-means clustering method with improved particle swarm optimization are combined to cut down the scenarios and improve the prediction accuracy; second, a relay chain cross-chain trading framework integrating quota system is constructed to realize organic synergy and credible data interaction among electricity, carbon, and green certificate markets; lastly, the multi-energy optimization model of the virtual power plant is designed to integrate carbon capture, Finally, a virtual power plant multi-energy optimization model is designed, integrating carbon capture, power-to-gas (P2G) and other technologies to balance the economy and low-carbon goals. The simulation results show that compared with the traditional model, the proposed strategy reduces the carbon emission intensity by 13.3% (1.43 tons/million CNY), increases the rate of new energy consumption to 98.75%, and partially offsets the cost through the carbon trading revenue, which verifies the Pareto improvement of environmental and economic benefits. This study provides theoretical support for the synergistic optimization of multi-energy markets and helps to build a low-carbon power system with a high proportion of renewable energy. Full article
Show Figures

Figure 1

32 pages, 7929 KiB  
Article
Enhancing Security in Augmented Reality Through Hash-Based Data Hiding and Hierarchical Authentication Techniques
by Chia-Chen Lin, Aristophane Nshimiyimana, Chih-Cheng Chen and Shu-Han Liao
Symmetry 2025, 17(7), 1027; https://doi.org/10.3390/sym17071027 - 30 Jun 2025
Viewed by 186
Abstract
With the increasing integration of augmented reality (AR) in various applications, ensuring secure access and content authenticity has become a critical challenge. This paper proposes an innovative and robust authentication framework for protecting AR multimedia content through a hash-based data-hiding technique. Leveraging the [...] Read more.
With the increasing integration of augmented reality (AR) in various applications, ensuring secure access and content authenticity has become a critical challenge. This paper proposes an innovative and robust authentication framework for protecting AR multimedia content through a hash-based data-hiding technique. Leveraging the Discrete Wavelet Transform (DWT) in the YCbCr color space, the method embeds multiple cryptographic hash signatures directly into the AR visual data. This design not only utilizes the symmetric property between two consecutive AR contents but also allows users to verify the connectivity between two AR digital contents by checking the embedded hash values. These embedded signatures support hierarchical, multi-level authentication, verifying not only the integrity and authenticity of individual AR objects but also their contextual relationships within the AR environment. The proposed system exhibits exceptional resilience to tampering, effectively identifying whether two consecutive e-pages in the AR content have been altered, while preserving high perceptual quality with PSNR values above 45 dB and SSIM scores consistently exceeding 0.98. This work presents a practical, real-time solution for enhancing AR content security, contributing significantly to the advancement of secure multimedia systems in next-generation interactive platforms. Full article
(This article belongs to the Section Computer)
Show Figures

Figure 1

20 pages, 3008 KiB  
Article
Computation Offloading Strategy Based on Improved Polar Lights Optimization Algorithm and Blockchain in Internet of Vehicles
by Yubao Liu, Bocheng Yan, Benrui Wang, Quanchao Sun and Yinfei Dai
Appl. Sci. 2025, 15(13), 7341; https://doi.org/10.3390/app15137341 - 30 Jun 2025
Viewed by 190
Abstract
The rapid growth of computationally intensive tasks in the Internet of Vehicles (IoV) poses a triple challenge to the efficiency, security, and stability of Mobile Edge Computing (MEC). Aiming at the problems that traditional optimization algorithms tend to fall into, where local optimum [...] Read more.
The rapid growth of computationally intensive tasks in the Internet of Vehicles (IoV) poses a triple challenge to the efficiency, security, and stability of Mobile Edge Computing (MEC). Aiming at the problems that traditional optimization algorithms tend to fall into, where local optimum in task offloading and edge computing nodes are exposed to the risk of data tampering, this paper proposes a secure offloading strategy that integrates the Improved Polar Lights Optimization algorithm (IPLO) and blockchain. First, the truncation operation when a particle crosses the boundary is improved to dynamic rebound by introducing a rebound boundary processing mechanism, which enhances the global search capability of the algorithm; second, the blockchain framework based on the Delegated Byzantine Fault Tolerance (dBFT) consensus is designed to ensure data tampering and cross-node trustworthy sharing in the offloading process. Simulation results show that the strategy significantly reduces the average task processing latency (64.4%), the average system energy consumption (71.1%), and the average system overhead (75.2%), and at the same time effectively extends the vehicle’s power range, improves the real-time performance of the emergency accident warning and dynamic path planning, and significantly reduces the cost of edge computing usage for small and medium-sized fleets, providing an efficient, secure, and stable collaborative computing solution for IoV. Full article
Show Figures

Figure 1

31 pages, 4258 KiB  
Article
MZAP—Mobile Application for Basketball Match Tracking and Digitalization of Endgame Reports
by Predrag Pecev and Branko Markoski
Appl. Sci. 2025, 15(13), 7339; https://doi.org/10.3390/app15137339 - 30 Jun 2025
Viewed by 188
Abstract
This paper presents MZAP, a mobile application designed to digitalize basketball match tracking and generate secure, searchable endgame reports. Used by the Basketball League of Serbia, MZAP creates tamper-proof digitally signed records stored as password-protected PDFs with unique UUIDs, digital signatures, and QR [...] Read more.
This paper presents MZAP, a mobile application designed to digitalize basketball match tracking and generate secure, searchable endgame reports. Used by the Basketball League of Serbia, MZAP creates tamper-proof digitally signed records stored as password-protected PDFs with unique UUIDs, digital signatures, and QR codes. Each report is accompanied by a JSON file containing match data, enabling efficient validation through hashed checksums and facilitating data extraction and searchability. The system supports both online and offline modes, bilingual interfaces, mobile and tablet use, and includes features such as WiFi-based monitoring, physical printing, and various sharing options. The solution aims to reduce officials’ working time and increase data accuracy by minimizing human error through structural and UI-level validation methods and real-time monitoring by multiple observers during games. As part of the MZAP software suite, MZAP Converter is under development to support the digitization of legacy paper-based reports using custom CRNN neural networks to optically recognize and digitize historical paper-based reports, bringing them to the same standard as newly created digital ones. The paper also reflects on the broader impact of digital transformation within the Basketball League of Serbia. Full article
Show Figures

Figure 1

19 pages, 1850 KiB  
Article
GDM-DTM: A Group Decision-Making-Enabled Dynamic Trust Management Method for Malicious Node Detection in Low-Altitude UAV Networks
by Yabao Hu, Yulong Gan, Haoyu Wu, Cong Wang, Maode Ma and Cheng Xiong
Sensors 2025, 25(13), 3982; https://doi.org/10.3390/s25133982 - 26 Jun 2025
Viewed by 272
Abstract
As a core enabler of the emerging low-altitude economy, UAV networks face significant security risks during operation, including malicious node infiltration and data tampering. Existing trust management schemes suffer from deficiencies such as strong reliance on infrastructure, insufficient capability for multi-dimensional trust evaluation, [...] Read more.
As a core enabler of the emerging low-altitude economy, UAV networks face significant security risks during operation, including malicious node infiltration and data tampering. Existing trust management schemes suffer from deficiencies such as strong reliance on infrastructure, insufficient capability for multi-dimensional trust evaluation, and vulnerability to collusion attacks. To address these issues, this paper proposes a group decision-making (GDM)-enabled dynamic trust management method, termed GDM-DTM, for low-altitude UAV networks. GDM-DTM comprises four core parts: Subjective Consistency Evaluation, Objective Consistency Evaluation, Global Consistency Evaluation, and Self-Proof Consistency Evaluation. Furthermore, the method integrates a Dynamic Trust Adjustment Mechanism with multi-attribute trust computation, enabling efficient trust evaluation independent of ground infrastructure and thereby facilitating effective malicious UAV detection. The experimental results demonstrate that under identical conditions with a malicious node ratio of 30%, GDM-DTM achieves an accuracy of 85.04% and an F-score of 91.66%. Compared to the current state-of-the-art methods, this represents an improvement of 6.04 percentage points in accuracy and 3.71 percentage points in F-score. Full article
Show Figures

Figure 1

30 pages, 4009 KiB  
Article
Secure Data Transmission Using GS3 in an Armed Surveillance System
by Francisco Alcaraz-Velasco, José M. Palomares, Fernando León-García and Joaquín Olivares
Information 2025, 16(7), 527; https://doi.org/10.3390/info16070527 - 23 Jun 2025
Viewed by 222
Abstract
Nowadays, the evolution and growth of machine learning (ML) algorithms and the Internet of Things (IoT) are enabling new applications. Smart weapons and people detection systems are examples. Firstly, this work takes advantage of an efficient, scalable, and distributed system, named SmartFog, which [...] Read more.
Nowadays, the evolution and growth of machine learning (ML) algorithms and the Internet of Things (IoT) are enabling new applications. Smart weapons and people detection systems are examples. Firstly, this work takes advantage of an efficient, scalable, and distributed system, named SmartFog, which identifies people with weapons by leveraging edge, fog, and cloud computing paradigms. Nevertheless, security vulnerabilities during data transmission are not addressed. Thus, this work bridges this gap by proposing a secure data transmission system integrating a lightweight security scheme named GS3. Therefore, the main novelty is the evaluation of the GS3 proposal in a real environment. In the first fog sublayer, GS3 leads to a 14% increase in execution time with respect to no secure data transmission, but AES results in a 34.5% longer execution time. GS3 achieves a 70% reduction in decipher time and a 55% reduction in cipher time compared to the AES algorithm. Furthermore, an energy consumption analysis shows that GS3 consumes 31% less power than AES. The security analysis confirms that GS3 detects tampering, replaying, forwarding, and forgery attacks. Moreover, GS3 has a key space of 2544 permutations, slightly larger than those of Chacha20 and Salsa20, with a faster solution than these methods. In addition, GS3 exhibits strength against differential cryptoanalysis. This mechanism is a compelling choice for energy-constrained environments and for securing event data transmissions with a short validity period. Moreover, GS3 maintains full architectural transparency with the underlying armed detection system. Full article
Show Figures

Graphical abstract

Back to TopTop