Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (5)

Search Parameters:
Keywords = anti-collaborative attack

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
33 pages, 5362 KiB  
Article
A Method for Trust-Based Collaborative Smart Device Selection and Resource Allocation in the Financial Internet of Things
by Bo Wang, Jiesheng Wang and Mingchu Li
Sensors 2025, 25(13), 4082; https://doi.org/10.3390/s25134082 - 30 Jun 2025
Viewed by 238
Abstract
With the rapid development of the Financial Internet of Things (FIoT), many intelligent devices have been deployed in various business scenarios. Due to the unique characteristics of these devices, they are highly vulnerable to malicious attacks, posing significant threats to the system’s stability [...] Read more.
With the rapid development of the Financial Internet of Things (FIoT), many intelligent devices have been deployed in various business scenarios. Due to the unique characteristics of these devices, they are highly vulnerable to malicious attacks, posing significant threats to the system’s stability and security. Moreover, the limited resources available in the FIoT, combined with the extensive deployment of AI algorithms, can significantly reduce overall system availability. To address the challenge of resisting malicious behaviors and attacks in the FIoT, this paper proposes a trust-based collaborative smart device selection algorithm that integrates both subjective and objective trust mechanisms with dynamic blacklists and whitelists, leveraging domain knowledge and game theory. It is essential to evaluate real-time dynamic trust levels during system execution to accurately assess device trustworthiness. A dynamic blacklist and whitelist transformation mechanism is also proposed to capture the evolving behavior of collaborative service devices and update the lists accordingly. The proposed algorithm enhances the anti-attack capabilities of smart devices in the FIoT by combining adaptive trust evaluation with blacklist and whitelist strategies. It maintains a high task success rate in both single and complex attack scenarios. Furthermore, to address the challenge of resource allocation for trusted smart devices under constrained edge resources, a coalition game-based algorithm is proposed that considers both device activity and trust levels. Experimental results demonstrate that the proposed method significantly improves task success rates and resource allocation performance compared to existing approaches. Full article
(This article belongs to the Special Issue Network Security and IoT Security: 2nd Edition)
Show Figures

Figure 1

21 pages, 9384 KiB  
Article
Consensus Optimization Algorithm for Distributed Intelligent Medical Diagnostic Collaborative Systems Based on Verifiable Random Functions and Reputation Mechanisms
by Shizhuang Liu, Yang Zhang and Yating Zhao
Electronics 2025, 14(10), 2020; https://doi.org/10.3390/electronics14102020 - 15 May 2025
Viewed by 413
Abstract
With the deep integration of distributed network technology and intelligent medical care, how to achieve efficient collaboration under the premise of safeguarding data security and system efficiency has become an important challenge for intelligent medical diagnosis systems. The traditional practical Byzantine fault tolerance [...] Read more.
With the deep integration of distributed network technology and intelligent medical care, how to achieve efficient collaboration under the premise of safeguarding data security and system efficiency has become an important challenge for intelligent medical diagnosis systems. The traditional practical Byzantine fault tolerance (PBFT) algorithm has difficulty meeting the demands of large-scale distributed medical scenarios due to high communication overhead and poor scalability. In addition, the existing improvement schemes are still deficient in dynamic node management and complex attack defence. To this end, this paper proposes the VS-PBFT consensus algorithm, which fuses a verifiable random function (VRF) and reputation mechanism, and designs a distributed intelligent medical diagnosis collaboration system based on this algorithm. Firstly, we introduce the VRF technique to achieve random and unpredictable selection of master nodes, which reduces the risk of fixed verification nodes being attacked. Secondly, we construct a dynamic reputation evaluation model to quantitatively score the nodes’ historical behaviors and then adjust their participation priority in the consensus process, thus reducing malicious node interference and redundant communication overhead. In the application of an intelligent medical diagnosis collaboration system, the VS-PBFT algorithm effectively improves the security and efficiency of diagnostic data sharing while safeguarding patient privacy. The experimental results show that in a 40-node network environment, the transaction throughput of VS-PBFT is 21.05% higher than that of PBFT, the delay is reduced by 33.62%, the communication overhead is reduced by 8.63%, and the average number of message copies is reduced by about 7.90%, which demonstrates stronger consensus efficiency and anti-attack capability, providing the smart medical diagnosis collaboration system with the first VS-PBFT algorithm-based technical support. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

16 pages, 554 KiB  
Article
Optimal Weighted Voting-Based Collaborated Malware Detection for Zero-Day Malware: A Case Study on VirusTotal and MalwareBazaar
by Naonobu Okazaki, Shotaro Usuzaki, Tsubasa Waki, Hyoga Kawagoe, Mirang Park, Hisaaki Yamaba and Kentaro Aburada
Future Internet 2024, 16(8), 259; https://doi.org/10.3390/fi16080259 - 23 Jul 2024
Viewed by 1570
Abstract
We propose a detection system incorporating a weighted voting mechanism that reflects the vote’s reliability based on the accuracy of each detector’s examination, which overcomes the problem of cooperative detection. Collaborative malware detection is an effective strategy against zero-day attacks compared to one [...] Read more.
We propose a detection system incorporating a weighted voting mechanism that reflects the vote’s reliability based on the accuracy of each detector’s examination, which overcomes the problem of cooperative detection. Collaborative malware detection is an effective strategy against zero-day attacks compared to one using only a single detector because the strategy might pick up attacks that a single detector overlooked. However, cooperative detection is still ineffective if most anti-virus engines lack sufficient intelligence to detect zero-day malware. Most collaborative methods rely on majority voting, which prioritizes the quantity of votes rather than the quality of those votes. Therefore, our study investigated the zero-day malware detection accuracy of the collaborative system that optimally rates their weight of votes based on their malware categories of expertise of each anti-virus engine. We implemented the prototype system with the VirusTotal API and evaluated the system using real malware registered in MalwareBazaar. To evaluate the effectiveness of zero-day malware detection, we measured recall using the inspection results on the same day the malware was registered in the MalwareBazaar repository. Through experiments, we confirmed that the proposed system can suppress the false negatives of uniformly weighted voting and improve detection accuracy against new types of malware. Full article
Show Figures

Figure 1

14 pages, 2680 KiB  
Article
AAJS: An Anti-Malicious Attack Graphic Similarity Judgment System in Cloud Computing Environments
by Xin Liu, Xiaomeng Liu, Neal Xiong, Dan Luo, Gang Xu and Xiubo Chen
Electronics 2023, 12(9), 1983; https://doi.org/10.3390/electronics12091983 - 24 Apr 2023
Cited by 1 | Viewed by 1274
Abstract
With the rapid development of cloud computing and other modern technologies, collaborative computing between data is increasing, and privacy protection and secure multi-party computation are also attracting more attention. The emergence of cloud computing provides new options for data holders to perform complex [...] Read more.
With the rapid development of cloud computing and other modern technologies, collaborative computing between data is increasing, and privacy protection and secure multi-party computation are also attracting more attention. The emergence of cloud computing provides new options for data holders to perform complex computing problems and to store images; however, data privacy issues cannot be ignored. If a graphic is encrypted and stored in the cloud, the cloud server will perform confidential similar matching when the user searches. At present, most research on searchable encryption is focused on text search, with few schemes researched on how to finish the graphic search. To solve this problem, this paper proposes a secure search protocol based on graph shape under the semi-honest model. Using the cut-choose method and zero-knowledge proof, further designs of the anti-malicious attack graphic similarity judgment system (AAJS) based on the Paillier encryption algorithm, can achieve the secure search and matching of the graph while resisting malicious adversary attacks. The proposed protocol’s security is proved by the real/ideal model paradigm. This paper conducts performance analysis and experimental simulation on the existing scheme and the experiments demonstrate that the system achieves high execution efficiency. Full article
(This article belongs to the Section Artificial Intelligence)
Show Figures

Figure 1

25 pages, 798 KiB  
Article
Fast, Resource-Saving, and Anti-Collaborative Attack Trust Computing Scheme Based on Cross-Validation for Clustered Wireless Sensor Networks
by Chuanyi Liu and Xiaoyong Li
Sensors 2020, 20(6), 1592; https://doi.org/10.3390/s20061592 - 12 Mar 2020
Cited by 5 | Viewed by 3193
Abstract
The trust computing mechanism has an increasing role in the cooperative work of wireless sensor networks. However, the computing speed, resource overhead, and anti-collaborative attack ability of a trust mechanism itself are three key challenging issues for any open and resource-constrained wireless sensor [...] Read more.
The trust computing mechanism has an increasing role in the cooperative work of wireless sensor networks. However, the computing speed, resource overhead, and anti-collaborative attack ability of a trust mechanism itself are three key challenging issues for any open and resource-constrained wireless sensor networks. In this study, we propose a fast, resource-saving, and anti-collaborative attack trust computing scheme (FRAT) based on across-validation mechanism for clustered wireless sensor networks. First, according to the inherent relationship among three network entities (which are made up of three types of network nodes, namely base stations, cluster heads, and cluster members), we propose the cross-validation mechanism, which is effective and reliable against collaborative attacks caused by malicious nodes. Then, we adopt a fast and resource-saving trust computing scheme for cooperation between between cluster heads or cluster members. This scheme is suitable for wireless sensor networks because it facilitates resource-saving. Through theoretical analysis and experiments, the feasibility and effectiveness of the trust computing scheme proposed in this study are verified. Full article
(This article belongs to the Special Issue Vehicular Sensor Networks: Applications, Advances and Challenges)
Show Figures

Figure 1

Back to TopTop