Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (907)

Search Parameters:
Keywords = attack resilience

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 1354 KB  
Article
Chaos Theory with AI Analysis in IoT Network Scenarios
by Antonio Francesco Gentile and Maria Cilione
Cryptography 2026, 10(2), 25; https://doi.org/10.3390/cryptography10020025 - 10 Apr 2026
Abstract
While general network dynamics have been extensively modeled using stochastic methods, the emergence of dense Internet of Things (IoT) ecosystems demands a more specialized analytical framework. IoT environments are characterized by extreme non-linearity and sensitivity to initial conditions, where traditional models often fail [...] Read more.
While general network dynamics have been extensively modeled using stochastic methods, the emergence of dense Internet of Things (IoT) ecosystems demands a more specialized analytical framework. IoT environments are characterized by extreme non-linearity and sensitivity to initial conditions, where traditional models often fail to account for chaotic latency and packet loss. This paper introduces a specialized approach that integrates Chaos Theory with the innovative paradigm of Vibe Coding—an AI-assisted development and analysis methodology that allows for the `encoding’ and interpretation of the dynamic `vibe’ or signature of network fluctuations in real-time. By categorizing network behavior into four distinct scenarios (quiescent, perturbed, attacked, and perturbed–Attacked), the proposed framework utilizes deep learning to transform chaotic signals into actionable intelligence. Our findings demonstrate that this specialized synergy between chaos analysis and Vibe Coding provides superior classification of adversarial threats, such as DoS and injection attacks, fostering intelligent native security for next-generation IoT infrastructures. Full article
26 pages, 10818 KB  
Article
Public Health Safety Governance and System Resilience in Petrochemical Plants Based on STAMP/STPA and Complex Networks: A Case Study from China
by Zhiqian Hu, Jie Hou, Yunsheng Su, Yuqing Wang, Wei Dai and Jie Yang
Sustainability 2026, 18(8), 3754; https://doi.org/10.3390/su18083754 - 10 Apr 2026
Abstract
As a highly integrated and increasingly complex high-risk process industry, the petrochemical sector plays a critical role in industrial continuity and social stability, yet faces significant governance adaptability challenges under normalized public health emergencies. Taking a Chinese petrochemical enterprise as a case study, [...] Read more.
As a highly integrated and increasingly complex high-risk process industry, the petrochemical sector plays a critical role in industrial continuity and social stability, yet faces significant governance adaptability challenges under normalized public health emergencies. Taking a Chinese petrochemical enterprise as a case study, this paper develops an integrated framework combining STAMP/STPA, complex network analysis, and robustness analysis. Based on a reconstructed four-level hierarchical control and feedback structure, STPA was applied to identify 20 unsafe control actions (UCAs). These UCAs and their precursor factors were further abstracted into a relational network of control deficiencies for topological analysis and Monte Carlo-based robustness testing under random failure and targeted attack. The results show pronounced small-world and core–periphery structural characteristics, with vulnerability concentrated in a limited number of high-centrality source and hub nodes. Systemic resilience constraints mainly arise from governmental deficiencies in response experience and training, enterprise-level amplification at hub nodes, and pressure accumulation at frontline execution nodes. Accordingly, three resilience protocols are proposed: distributed authorization for source nodes; digitized dual-channel feedback for hub nodes; and minimum operational redundancy with cross-replacement for terminal nodes. This study provides theoretical basis and strategies for high-risk industrial systems to enhance resilience and sustainable development in uncertain environments. Full article
Show Figures

Figure 1

20 pages, 1504 KB  
Article
Decision-Support Framework for Cybersecurity Risk Assessment in EV Charging Infrastructure
by Roberts Grants, Nadezhda Kunicina, Rasa Brūzgienė, Šarūnas Grigaliūnas and Andrejs Romanovs
Energies 2026, 19(8), 1814; https://doi.org/10.3390/en19081814 - 8 Apr 2026
Viewed by 160
Abstract
Rapid expansion of electric vehicle adoption has led to increased dependence on a charging infrastructure that is tightly integrated with energy distribution systems and digital communication networks. As electric vehicle charging stations evolve into complex cyber–physical systems, cybersecurity risks pose a growing threat [...] Read more.
Rapid expansion of electric vehicle adoption has led to increased dependence on a charging infrastructure that is tightly integrated with energy distribution systems and digital communication networks. As electric vehicle charging stations evolve into complex cyber–physical systems, cybersecurity risks pose a growing threat to grid reliability and user trust. This paper presents a hybrid decision-support framework for cybersecurity risk assessment in EV charging infrastructure that advances beyond prior multi-criteria decision-making approaches by combining interpretability with data-driven validation. Specifically, the framework integrates the Analytic Hierarchy Process (AHP) for expert-driven weighting of cybersecurity attributes with PROMETHEE for flexible threat prioritization, enabling transparent and auditable risk rankings. The framework categorizes cybersecurity criteria across four infrastructure layers—transmission, distribution, consumer, and electric vehicle charging stations—and assigns relative weights through expert-driven pairwise comparisons. PROMETHEE is then applied to rank potential cyber threats based on these weights, allowing for flexible prioritization of cybersecurity interventions. The methodology is validated using the real-world WUSTL-IIoT-2018 SCADA dataset, which includes simulated reconnaissance (network scanning), device identification, and exploitation attacks. While this dataset does not natively include OCPP 2.0 or ISO 15118 protocols, the experimental results demonstrate strong discrimination power (AUC = 0.99, recall = 95%) and provide a basis for extension to modern EVSE communication standards. The results identify critical metrics such as anomalous source packet behavior and encryption reliability as key vulnerability markers, aligning with documented EV charging attack scenarios. By bridging expert judgment with empirical traffic data, the proposed framework offers both technical robustness and explainability, supporting grid operators, SOC teams, and infrastructure planners in systematically assessing risks, allocating resources, and enhancing the resilience of EV charging ecosystems against evolving cyber threats. Full article
Show Figures

Figure 1

19 pages, 352 KB  
Article
Enhancing Polynomial Multiplication in Post-Quantum Cryptography for IoT Applications: A Hybrid Serial–Parallel Systolic Architecture
by Atef Ibrahim and Fayez Gebali
Computers 2026, 15(4), 224; https://doi.org/10.3390/computers15040224 - 3 Apr 2026
Viewed by 300
Abstract
The rapid growth of the Internet of Things (IoT) is fundamentally altering industrial and economic landscapes by embedding smart, connected devices into everyday operations. Despite these benefits, significant concerns regarding data protection and user privacy continue to obstruct the widespread use of these [...] Read more.
The rapid growth of the Internet of Things (IoT) is fundamentally altering industrial and economic landscapes by embedding smart, connected devices into everyday operations. Despite these benefits, significant concerns regarding data protection and user privacy continue to obstruct the widespread use of these technologies, particularly with the looming threat of quantum computing. Implementing post-quantum cryptographic (PQC) solutions is vital for addressing these risks, yet the limited resources found in IoT edge devices present major deployment challenges. Lattice-based cryptography has become a leading solution to these problems, largely because it depends on efficient polynomial multiplication. Enhancing the execution of this mathematical operation is crucial for improving the overall performance of PQC protocols. In this work, we introduce a hybrid serial–parallel systolic architecture specifically engineered for polynomial multiplication within the Binary Ring Learning With Errors (BRLWE) scheme. Designed for the security processors used in IoT hardware, this architecture significantly increases processing speeds while minimizing the use of hardware resources and reducing energy consumption. Such improvements are critical for establishing a secure IoT infrastructure that is resilient against quantum-era attacks and capable of supporting industrial expansion. Moreover, this research aligns with global Sustainable Development Goals (SDGs) 8 and 9 by building trust in innovative systems and fostering a more secure, sustainable, and productive digital economy. Full article
Show Figures

Figure 1

17 pages, 340 KB  
Article
Efficient Serial Systolic Polynomial Multiplier for Lattice-Based Post-Quantum Cryptographic Schemes in IoT Edge Node
by Atef Ibrahim and Fayez Gebali
Network 2026, 6(2), 21; https://doi.org/10.3390/network6020021 - 1 Apr 2026
Viewed by 149
Abstract
The rapid development of the Internet of Things (IoT) is transforming various economic and industrial sectors by embedding interconnected devices within their operational processes. However, security and privacy risks associated with these interconnected devices pose significant barriers to widespread adoption, particularly in light [...] Read more.
The rapid development of the Internet of Things (IoT) is transforming various economic and industrial sectors by embedding interconnected devices within their operational processes. However, security and privacy risks associated with these interconnected devices pose significant barriers to widespread adoption, particularly in light of potential quantum threats. To mitigate these challenges, it is imperative to employ post-quantum cryptographic schemes. However, essential constraints on IoT edge nodes complicate the effective implementation of such schemes. Among the most promising approaches in post-quantum cryptography are lattice-based schemes, which rely heavily on polynomial multiplication operations at their core. Improving the implementation of polynomial multiplication will significantly enhance the performance of these schemes. Therefore, this paper proposes an efficent low-complexity serial systolic array optimized for polynomial multiplication, particularly tailored for the Binary Ring Learning With Errors (BRLWE) scheme. Designed for cryptographic processors targeting capable IoT edge nodes, the proposed architecture demonstrates remarkable performance improvements, achieving a maximum operating frequency of 280 MHz for a field size of 256, while requiring only 8232 lookup tables (LUTs) and 2616 flip-flops (FFs). These results reflect a 16.8% reduction in LUT usage and a 19% reduction in FFs compared to the nearest competing designs, all while maintaining high throughput and low area utilization. This work significantly advances the establishment of secure and efficient infrastructure for IoT systems, bolstering their resilience against post-quantum attacks and supporting the growth of a robust digital economy. Furthermore, it aligns with sustainable development goals 8 and 9 by fostering trust and facilitating the adoption of cutting-edge IoT technologies, ultimately promoting more resilient and innovative economic activities. Full article
Show Figures

Figure 1

26 pages, 423 KB  
Article
Hardware-Anchored ES-SPA: A Dynamic Zero-Trust Architecture for Secure eSIM Provisioning in 6G IoT via Moving Target Defense
by Hari N. N., Kurunandan Jain, Prabu P and Prabhakar Krishnan
Future Internet 2026, 18(4), 187; https://doi.org/10.3390/fi18040187 - 1 Apr 2026
Viewed by 369
Abstract
The rapid evolution of 6G networks and large-scale Internet of Things (IoT) deployments intensifies security and privacy challenges in embedded SIM (eSIM) Remote SIM Provisioning (RSP), particularly during the bootstrap and profile delivery phases. Traditional perimeter-based and VPN-centric approaches expose static attack surfaces, [...] Read more.
The rapid evolution of 6G networks and large-scale Internet of Things (IoT) deployments intensifies security and privacy challenges in embedded SIM (eSIM) Remote SIM Provisioning (RSP), particularly during the bootstrap and profile delivery phases. Traditional perimeter-based and VPN-centric approaches expose static attack surfaces, making provisioning workflows vulnerable to denial-of-service (DoS) attacks, reconnaissance, and profile lock-in risks. This paper presents MTD-SDP-eSIM, a hardware-anchored Zero Trust Architecture that secures eSIM provisioning by integrating the embedded Universal Integrated Circuit Card (eUICC) as a root of trust with Software-Defined Perimeter (SDP), Software-Defined Networking (SDN), and Moving Target Defense (MTD). The framework introduces Hardware-Anchored Single Packet Authorization (ES-SPA), which cryptographically binds initial access to tamper-resistant eUICC credentials and enforces an authenticate-before-connect model. A unified Zero Trust controller dynamically orchestrates SDP access control, SDN-based micro-segmentation, and MTD-driven Network Address Shuffling during high-risk provisioning phases. This framework is validated on a high-fidelity 6G testbed built using ns-3, Open5GS, and P4-programmable switches. Experimental results demonstrate a 90% DoS survival rate during provisioning, a 35% scalability improvement over VPN-based baselines, and a 75% reduction in profile lock-in failures through runtime deletion verification. These findings confirm that anchoring dynamic network defenses in hardware-rooted identity significantly enhances the resilience, scalability, and privacy of eSIM provisioning for massive 6G IoT deployments. Full article
Show Figures

Graphical abstract

32 pages, 7391 KB  
Article
Robust and Noise-Resilient Botnet Detection Framework Using Heterogeneous Radial Basis Function Neural Network
by Lama Awad, Sherenaz Al-Haj Baddar and Azzam Sleit
Appl. Sci. 2026, 16(7), 3379; https://doi.org/10.3390/app16073379 - 31 Mar 2026
Viewed by 157
Abstract
The rapid evolution of botnet attacks poses a critical challenge facing cybersecurity, necessitating the development of intrusion detection models that are both highly accurate and computationally efficient. This paper proposes a heterogeneous radial basis function neural network structure that employs non-uniform RBF kernels [...] Read more.
The rapid evolution of botnet attacks poses a critical challenge facing cybersecurity, necessitating the development of intrusion detection models that are both highly accurate and computationally efficient. This paper proposes a heterogeneous radial basis function neural network structure that employs non-uniform RBF kernels to enhance discriminative capability between normal and botnet activities, leveraging flow-level packet length distribution features derived from the CTU-13 dataset, which encompasses 30 distinct botnet types, to ensure comprehensive detection across several botnet behaviors. The model was accurately evaluated across several dimensions, including training stability, robustness to noise, and overall detection accuracy and generalization performance. Experimental results demonstrate that the proposed model achieves a superior accuracy of 97.86%, with an AUC of 0.9968 and a notably low false-positive rate of 0.02. The model effectively mitigates class-imbalance bias, with an average detection rate of 94.62% even for minority botnet classes. Furthermore, inference-time evaluation showed a latency of approximately 1.0118 microseconds, confirming that the model is well-suited for high-speed networks. In addition, robustness analysis under controlled noise injection revealed a smooth degradation in performance, with accuracy remaining at 96%, highlighting the structural resilience of the proposed model and making it a robust solution for detecting modern botnet attacks. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

30 pages, 1666 KB  
Article
Cryptanalysis and Improvement of the SMEP-IoV Protocol: A Secure and Lightweight Protocol for Message Exchange in IoV Paradigm
by Gelare Oudi Ghadim, Parvin Rastegari, Mohammad Dakhilalian, Faramarz Hendessi, Shahrzad Saremi, Rania Shibl, Yassine Himeur, Shadi Atalla and Wathiq Mansoor
IoT 2026, 7(2), 31; https://doi.org/10.3390/iot7020031 - 31 Mar 2026
Viewed by 224
Abstract
The Internet of Vehicles (IoV) is a rapidly evolving technology that provides real-time connectivity, enhanced road safety, and reduced traffic congestion; however, its inherently open communication channels expose it to serious security and privacy threats. In 2021, Chaudhry proposed SMEP-IoV, a lightweight message [...] Read more.
The Internet of Vehicles (IoV) is a rapidly evolving technology that provides real-time connectivity, enhanced road safety, and reduced traffic congestion; however, its inherently open communication channels expose it to serious security and privacy threats. In 2021, Chaudhry proposed SMEP-IoV, a lightweight message authentication protocol designed to satisfy essential security requirements. This paper presents a comprehensive security analysis of SMEP-IoV and reveals several serious vulnerabilities. Specifically, sensitive credentials are stored in plaintext without tamper-resistant protection, and both authentication and session key derivation depend directly on these credentials. These structural flaws allow an adversary to extract the stored secrets, generate valid authentication messages, and derive the established session key, enabling vehicle impersonation and session key disclosure attacks. Moreover, compromise of long-term secrets facilitates key compromise impersonation attacks. It also fails to ensure anonymity and perfect forward secrecy. To address these issues, we propose an enhanced authentication protocol for resource-constrained IoV environments, leveraging a three-factor authentication mechanism combined with lightweight cryptographic primitives. Formal security analyses using BAN logic, Tamarin, and ProVerif confirm its resilience against known attacks, while NS-3 simulations validate its scalability, high throughput, and low End-to-End Delay (E2ED). The results highlight the protocol as a robust, efficient, and scalable solution for large-scale IoV deployments. Full article
(This article belongs to the Special Issue Internet of Vehicles (IoV))
Show Figures

Figure 1

7 pages, 1907 KB  
Proceeding Paper
Adaptive Phishing Detection and Mitigation System Using Huawei Mind Reinforcement Learning with Human Feedback
by Jesher Immanuel B. Hael, Mark Daniel S. Ortiz and Dionis A. Padilla
Eng. Proc. 2026, 134(1), 13; https://doi.org/10.3390/engproc2026134013 - 30 Mar 2026
Viewed by 216
Abstract
Phishing remains a persistent cybersecurity threat, exploiting social engineering to bypass traditional defenses. We developed a phishing detection system that integrates baseline supervised learning with Reinforcement Learning through human feedback (RLHF) to improve adaptability against evolving attack strategies. Implemented using the Huawei MindRLHF [...] Read more.
Phishing remains a persistent cybersecurity threat, exploiting social engineering to bypass traditional defenses. We developed a phishing detection system that integrates baseline supervised learning with Reinforcement Learning through human feedback (RLHF) to improve adaptability against evolving attack strategies. Implemented using the Huawei MindRLHF framework and deployed on Raspberry Pi hardware, the system was evaluated using a dataset of 135,325 email samples consisting of both phishing and legitimate messages. The baseline supervised model achieved 94.3% accuracy, while the RLHF-enhanced model, through 74 iterations, achieved improved adaptability, reaching a 96.8% accuracy with balanced precision and recall. A multi-component reward function was designed to incorporate correct classification, human agreement, confidence matching, and consistency, enabling the model to refine its decision boundaries beyond automated optimization. Real-time monitoring and feedback were facilitated through a hardware-integrated LCD interface. The results confirm enhanced detection accuracy and reduced error rates, demonstrating its viability for deployment. The findings highlight the potential of human-centered RLHF the resilience and scalability of phishing mitigation systems against emerging cyber threats. Full article
Show Figures

Figure 1

34 pages, 863 KB  
Review
Secure Communication Protocols and AI-Based Anomaly Detection in UAV-GCS
by Dimitrios Papathanasiou, Evangelos Zacharakis, John Liaperdos, Theodore Kotsilieris, Ioannis E. Livieris and Konstantinos Ioannou
Appl. Sci. 2026, 16(7), 3339; https://doi.org/10.3390/app16073339 - 30 Mar 2026
Viewed by 388
Abstract
Unmanned Aerial Vehicles (UAVs) are increasingly integrated into critical applications ranging from logistics and agriculture to defence and security operations, surveillance and emergency response. At the core of these systems lies the communication link between the UAV and its ground control station (GCS), [...] Read more.
Unmanned Aerial Vehicles (UAVs) are increasingly integrated into critical applications ranging from logistics and agriculture to defence and security operations, surveillance and emergency response. At the core of these systems lies the communication link between the UAV and its ground control station (GCS), which serves as the backbone for command, control and data exchange. However, communications links remain highly vulnerable to cyber-threats, including eavesdropping, signal falsification, radio frequency interference (RFI) and hijacking. These risks highlight the urgent need for secure communication protocols and effective defence mechanisms capable of protecting data confidentiality, integrity, availability and authentication. This study performs a comprehensive survey of secure UAV-GCS communication protocols and artificial intelligence (AI)-driven intrusion detection techniques. Initially, we review widely used communication protocols, examining their security features, vulnerabilities and existing countermeasures. Accordingly, a taxonomy of UAV-GCS security threats is proposed, structured around confidentiality, integrity, availability and authentication and map these threats to relevant attacks and defences. In parallel, our study examines state-of-the-art intrusion detection systems for UAVs, while particular emphasis is placed on emerging methods such as deep learning, federated learning, tiny machine learning and explainable AI, which hold promise for lightweight and real-time threat detection. The survey concludes by identifying open challenges, including resource constraints, lack of standardised secure protocols, scarcity of UAV-specific datasets and the evolving sophistication of attackers. Finally, we outline research directions for next-generation UAV architectures that integrate secure communication protocols with AI-based anomaly detection to achieve resilient and intelligent drone ecosystems. Full article
(This article belongs to the Special Issue Integration of AI in Signal and Image Processing)
Show Figures

Figure 1

26 pages, 12944 KB  
Article
A 5D Fractional-Order Memristive Neural Network for Satellite Image Encryption Using Dynamic DNA Encoding and Bidirectional Diffusion
by Jinghui Ding, Yanping Zhu, Weiquan Yin, Dazhe He, Fayu Wan and Gangyi Tu
Fractal Fract. 2026, 10(4), 216; https://doi.org/10.3390/fractalfract10040216 - 26 Mar 2026
Viewed by 355
Abstract
To address the high redundancy and weak security inherent in satellite image transmission, this paper proposes an image encryption algorithm founded on a novel five-dimensional fractional-order cosine memristive Hopfield neural network (5D-FOCMHNN). The constructed hyperchaotic system exhibits long-term memory and multistability, capable of [...] Read more.
To address the high redundancy and weak security inherent in satellite image transmission, this paper proposes an image encryption algorithm founded on a novel five-dimensional fractional-order cosine memristive Hopfield neural network (5D-FOCMHNN). The constructed hyperchaotic system exhibits long-term memory and multistability, capable of generating reconfigurable multi-scroll attractors. A multivariate bit-level scrambling strategy effectively disrupts pixel correlations using neuron state sequences. Furthermore, the system’s chaotic output dynamically governs DNA encoding rules, while a bidirectional diffusion mechanism ensures strong randomization and resistance to differential attacks. Comprehensive experiments demonstrate that the 5D-FOCMHNN-based scheme provides a key space of 2256, has an information entropy approaching the ideal value of 8, and exhibits robust resilience against cropping, noise, and statistical cryptanalysis, thereby providing a highly secure solution for satellite image transmission. Full article
Show Figures

Figure 1

33 pages, 2907 KB  
Article
Reimagining Bitcoin Mining as a Virtual Energy Storage Mechanism in Grid Modernization: Enhancing Security, Sustainability, and Resilience of Smart Cities Against False Data Injection Cyberattacks
by Ehsan Naderi
Electronics 2026, 15(7), 1359; https://doi.org/10.3390/electronics15071359 - 25 Mar 2026
Viewed by 472
Abstract
The increasing penetration of intermittent renewable energy demands innovative solutions to maintain grid stability, resilience, and security in the body of smart cities. This paper presents a novel framework that redefines Bitcoin mining as a form of virtual energy storage, a flexible and [...] Read more.
The increasing penetration of intermittent renewable energy demands innovative solutions to maintain grid stability, resilience, and security in the body of smart cities. This paper presents a novel framework that redefines Bitcoin mining as a form of virtual energy storage, a flexible and controllable load capable of delivering large-scale demand response services, positioning it as a competitive alternative to traditional energy storage systems, including electrical, mechanical, thermal, chemical, and electrochemical storage solutions. By strategically aligning mining activities with grid conditions, Bitcoin mining can absorb excess electricity during periods of oversupply, converting it into digital assets, and reduce operations during times of scarcity, effectively emulating the behavior of conventional energy storage systems without the associated capital expenditures and material requirements. Beyond its operational flexibility, this paper explores the cyber–physical benefits of integrating Bitcoin mining into the power transmission systems as a defensive mechanism against false data injection (FDI) cyberattacks in smart city infrastructure. To achieve this goal, a decentralized and adaptive control strategy is proposed, in which mining loads dynamically adjust based on authenticated grid-state information, thereby improving system observability and hindering adversarial efforts to disrupt state estimation. In addition, to handle the proposed approach, this paper introduces a high-performance algorithm, a combination of quantum-augmented particle swarm optimization and wavelet-oriented whale optimization (QAPSO-WOWO). Simulation results confirm that strategic deployment of mining loads improves grid sustainability by utilizing curtailed renewables, enhances resilience by mitigating load-generation imbalances, and bolsters cybersecurity by reducing the impacts of FDI attacks. This work lays the foundation for a transdisciplinary paradigm shift, positioning Bitcoin mining not as a passive energy consumer but as an active participant in securing and stabilizing the future power grid in smart cities. Full article
Show Figures

Figure 1

38 pages, 4089 KB  
Article
A Mobility-Aware Zone-Based Key Management Scheme with Dynamic Key Refinement for Large-Scale Mobile Wireless Sensor Networks
by Abdelbassette Chenna, Djallel Eddine Boubiche, Abderrezak Benyahia, Homero Toral-Cruz, Rafael Martínez-Peláez and Pablo Velarde-Alvarado
Future Internet 2026, 18(3), 175; https://doi.org/10.3390/fi18030175 - 23 Mar 2026
Viewed by 312
Abstract
Mobile Wireless Sensor Networks (MWSNs) enhance traditional wireless sensor networks by allowing sensor nodes to move, resulting in continuously changing network topologies. Although this mobility enables advanced applications such as disaster response, intelligent transportation systems, and mission-critical monitoring, it poses major challenges for [...] Read more.
Mobile Wireless Sensor Networks (MWSNs) enhance traditional wireless sensor networks by allowing sensor nodes to move, resulting in continuously changing network topologies. Although this mobility enables advanced applications such as disaster response, intelligent transportation systems, and mission-critical monitoring, it poses major challenges for secure and scalable key management in large-scale deployments. Most existing key management and key pre-distribution schemes are tailored to static or lightly mobile networks and therefore suffer from limited scalability, excessive memory consumption, inefficient key utilization, and increased vulnerability to node capture when applied to highly mobile environments. This paper proposes a mobility-aware, zone-based key management scheme that integrates an enhanced composite key distribution mechanism with dynamic key refinement. The network is partitioned into logical zones, each maintaining an independent key pool to confine security breaches and improve scalability. To adapt to mobility-induced topology changes, sensor nodes continuously refine their key rings by preserving only the cryptographic keys associated with persistent neighbor relationships. This selective retention strategy significantly reduces storage overhead while strengthening resilience against key compromise and unauthorized access. Comprehensive analytical modeling and performance evaluations demonstrate that the proposed scheme achieves higher secure connectivity, stronger resistance to node capture attacks, and improved scalability compared to existing approaches, particularly in dense and highly mobile MWSN scenarios. Full article
Show Figures

Graphical abstract

19 pages, 2944 KB  
Article
LSTM-Based Early Jamming Threat Detection Scheme for Drone Ad-Hoc Networks
by Chungman Oh and Seokjoong Kang
Appl. Sci. 2026, 16(6), 3046; https://doi.org/10.3390/app16063046 - 21 Mar 2026
Viewed by 196
Abstract
Drone ad-hoc networks are inherently vulnerable to performance-degradation attacks such as jamming, packet disruption, and routing interference due to dynamic topology changes and unstable wireless channels. In such environments, conventional threshold-based detection schemes often fail to identify threats in their early stages because [...] Read more.
Drone ad-hoc networks are inherently vulnerable to performance-degradation attacks such as jamming, packet disruption, and routing interference due to dynamic topology changes and unstable wireless channels. In such environments, conventional threshold-based detection schemes often fail to identify threats in their early stages because individual performance metrics remain within normal ranges despite emerging abnormal temporal patterns. To address this limitation, this study proposes an LSTM-based early threat detection method that learns the temporal dynamics of network performance indicators, including packet delivery ratio (PDR), connection reliability (CR), and delay. By modeling inter-metric correlations and evolving degradation trends, the proposed approach enables probabilistic inference of abnormal state transitions prior to explicit threshold violations. The proposed method is validated through simulation experiments conducted in a drone ad-hoc network environment under jamming attack scenarios, and its performance is compared with that of conventional threshold-based schemes. The results show that while the threshold-based approach first detected the attack at t = 65 s when predefined metric boundaries were exceeded, the proposed LSTM-based detector identified the attack at t = 45 s with an estimated attack probability of 0.63, achieving approximately 20 s earlier detection. This improvement is attributed to the LSTM’s capability to capture subtle temporal dependencies, directional trends, and cross-metric interactions that precede abrupt metric degradation. Furthermore, the LSTM output probabilities exhibited monotonic growth during the attack period and gradual decay during recovery, indicating robust tracking of network state transitions rather than isolated event detection. These results demonstrate that the proposed method not only enhances early threat awareness but also contributes to resilience-oriented operation by enabling proactive mitigation in drone ad-hoc networks. This study provides quantitative evidence that sequence learning over performance metrics can overcome the structural limitations of threshold-based detection and enable effective early threat detection in drone ad-hoc network environments. Full article
Show Figures

Figure 1

20 pages, 2673 KB  
Article
TAFL-UWSN: A Trust-Aware Federated Learning Framework for Securing Underwater Sensor Networks
by Raja Waseem Anwar, Mohammad Abrar, Abdu Salam and Faizan Ullah
Network 2026, 6(1), 18; https://doi.org/10.3390/network6010018 - 19 Mar 2026
Viewed by 338
Abstract
Underwater Acoustic Sensor Networks (UASNs) are pivotal for environmental monitoring, surveillance, and marine data collection. However, their open and largely unattended operational settings, constrained communication capabilities, limited energy resources, and susceptibility to insider attacks make it difficult to achieve safe, secure, and efficient [...] Read more.
Underwater Acoustic Sensor Networks (UASNs) are pivotal for environmental monitoring, surveillance, and marine data collection. However, their open and largely unattended operational settings, constrained communication capabilities, limited energy resources, and susceptibility to insider attacks make it difficult to achieve safe, secure, and efficient collaborative learning. Federated learning (FL) offers a privacy-preserving method for decentralized model training but is inherently vulnerable to Byzantine threats and malicious participants. This paper proposes trust-aware FL for underwater sensor networks (TAFL-UWSN), a trust-aware FL framework designed to improve security, reliability, and energy efficiency in UASNs by incorporating trust evaluation directly into the FL process. The goal is to mitigate the impact of adversarial nodes while maintaining model performance in low-resource underwater environments. TAFL-UWSN integrates continuous trust scoring based on packet forwarding reliability, sensing consistency, and model deviation. Trust scores are used to weight or filter model updates both at the node level and the edge layer, where Autonomous Underwater Vehicles (AUVs) act as mobile aggregators. A trust-aware federated averaging algorithm is implemented, and extensive simulations are conducted in a custom Python-based environment, comparing TAFL-UWSN to standard FedAvg and Byzantine-resilient FL approaches under various attack conditions. TAFL-UWSN achieved a model accuracy exceeding 92% with up to 30% malicious nodes while maintaining a false positive rate below 5.5%. Communication overhead was reduced by 28%, and energy usage per node dropped by 33% compared to baseline methods. The TAFL-UWSN framework demonstrates that integrating trust into FL enables secure, efficient, and resilient underwater intelligence, validating its potential for broader application in distributed, resource-constrained environments. Full article
Show Figures

Figure 1

Back to TopTop