Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (2,138)

Search Parameters:
Keywords = communication resource optimization

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 2516 KB  
Article
Responses of Soil Enzyme Activities and Microbial Community Structure and Functions to Cyclobalanopsis gilva Afforestation in Infertile Mountainous Areas of Eastern Subtropical China
by Shengyi Huang, Yafei Ding, Yonghong Xu, Yuequn Bao, Yukun Lin, Zhichun Zhou and Bin Wang
Forests 2026, 17(2), 154; https://doi.org/10.3390/f17020154 - 23 Jan 2026
Viewed by 58
Abstract
The effect of afforestation in infertile mountainous areas is closely related to the soil ecological environment. Soil enzyme activities and the structure and functions of microbial communities are core indicators reflecting soil quality. Clarifying the response patterns of the two to Cyclobalanopsis gilva [...] Read more.
The effect of afforestation in infertile mountainous areas is closely related to the soil ecological environment. Soil enzyme activities and the structure and functions of microbial communities are core indicators reflecting soil quality. Clarifying the response patterns of the two to Cyclobalanopsis gilva afforestation in infertile mountainous areas can provide a key scientific basis for targeted improvement of the cultivation efficiency of C. gilva plantations under different site conditions in the eastern subtropical region of China. In this study, 7-year-old C. gilva young forests in infertile mountainous areas and control woodland areas were selected in Shouchang Forest Farm, Jiande, Zhejiang Province, located in the subtropical region of China. Soil enzyme activities and microbial biomass in different soil layers, as well as metagenomes of rhizosphere and bulk soils, were determined to explore the effects and internal correlations of site conditions on soil enzyme activities and microbial community characteristics of C. gilva forests. The results showed that the activities of urease and catalase, as well as the content of microbial biomass nitrogen in the surface soil of infertile mountainous areas, were significantly lower than those in control woodland areas. The shared dominant phyla in the two types of sites included Proteobacteria and Acidobacteria, and the shared dominant genera included Bradyrhizobium. In addition, the relative abundances of three unclassified populations of Proteobacteria and functional genes related to cofactor and vitamin metabolism in the rhizosphere soil of infertile mountainous areas were significantly higher than those in control woodland areas. Meanwhile, the dominant microbial phyla in the rhizosphere soil of infertile mountainous areas had a closer correlation with soil enzyme activities and microbial biomass. This study clarified the ecological strategy of C. gilva young forests adapting to infertile mountainous areas: by increasing the relative abundances of functional genes related to cofactor and vitamin metabolism in rhizosphere microorganisms, promoting the enrichment of microorganisms associated with soil nitrogen cycling, and enhancing the correlations between dominant microbial phyla and soil enzyme activities and microbial biomass, the nitrogen resource limitation on soil microbial activity in infertile mountainous areas is balanced. This finding provides direct guidance for optimizing the afforestation and management techniques of C. gilva in infertile mountainous areas and has important practical value for promoting forest ecological restoration. Full article
(This article belongs to the Section Forest Soil)
Show Figures

Figure 1

31 pages, 8592 KB  
Review
Research Progress and the Prospect of Artificial Reef Preparation and Its Impact on the Marine Ecological Environment
by Hao-Tian Li, Ya-Jun Wang, Jian-Bao Zhang, Peng Yu, Yi-Tong Wang, Jun-Guo Li, Shu-Hao Zhang, Zi-Han Tang and Jie Yang
Materials 2026, 19(3), 447; https://doi.org/10.3390/ma19030447 - 23 Jan 2026
Viewed by 70
Abstract
Artificial reefs are an important tool for marine ecological restoration and fishery resource proliferation, and are widely used around the world. Among them, Japan, the United States, China, South Korea, Australia, and the Mediterranean coastal countries have particularly invested in scientific research and [...] Read more.
Artificial reefs are an important tool for marine ecological restoration and fishery resource proliferation, and are widely used around the world. Among them, Japan, the United States, China, South Korea, Australia, and the Mediterranean coastal countries have particularly invested in scientific research and practice in this field, and the reefs’ material selection, structural performance, and ecological benefits have attracted much attention. The purpose of this paper is to summarize the preparation methods, characterization methods (such as microstructure analysis and mechanical tests) and mechanical properties (such as compressive strength and durability) of new concrete materials (steel slag-blast furnace slag concrete, oyster shell concrete, sulfoaluminate cement concrete, recycled brick concrete, silica fume concrete, and banana peel filler concrete) that artificial reefs and ceramic artificial reefs developed in recent years, and to explore the resource utilization potential of different waste materials. At the same time, the biostatistical methods (such as species abundance and community diversity) of wood, shipwreck, steel, rock, waste tire, and ordinary concrete artificial reefs and their effects on the marine environment were compared and analyzed. In addition, the potential impact of artificial reef deployment on local fishermen’s income was also assessed. It is found that the use of steel slag, blast furnace slag, sulfoaluminate cement, and silica fume instead of traditional Portland cement can better improve the mechanical properties of concrete artificial reefs (compressive strength can be increased by up to 20%) and reduce the surface pH to neutral, which is more conducive to the adhesion and growth of marine organisms. The compressive strength of oyster shell concrete and banana peel filler concrete artificial reef is not as good as that of traditional Portland cement concrete artificial reef, but it still avoids the waste of a large amount of solid waste resources, provides necessary nutritional support for aquatic organisms, and also improves its chemical erosion resistance. The deployment of artificial reefs of timber, wrecks, steel, rock, waste tires, and ordinary concrete has significantly increased the species richness and biomass in the adjacent waters and effectively promoted the development of fisheries. Cases show that artificial reefs can significantly increase fishermen’s income (such as an increase of about EUR 13 in the value of a unit effort in a certain area), but the long-term benefits depend on effective supervision and community co-management mechanisms. This paper provides a scientific basis for the research and development of artificial reef materials and the optimization of ecological benefits, and promotes the sustainable development of marine ecological restoration technology and fishery economy. Full article
(This article belongs to the Section Green Materials)
Show Figures

Graphical abstract

42 pages, 1535 KB  
Article
Probabilistic Bit-Similarity-Based Key Agreement Protocol Employing Fuzzy Extraction for Secure and Lightweight Wireless Sensor Networks
by Sofia Sakka, Vasiliki Liagkou, Yannis Stamatiou and Chrysostomos Stylios
J. Cybersecur. Priv. 2026, 6(1), 22; https://doi.org/10.3390/jcp6010022 - 22 Jan 2026
Viewed by 38
Abstract
Wireless sensor networks comprise many resource-constrained nodes that must protect both local readings and routing metadata. The sensors collect data from the environment or from the individual to whom they are attached and transmit it to the nearest gateway node via a wireless [...] Read more.
Wireless sensor networks comprise many resource-constrained nodes that must protect both local readings and routing metadata. The sensors collect data from the environment or from the individual to whom they are attached and transmit it to the nearest gateway node via a wireless network for further delivery to external users. Due to wireless communication, the transmitted messages may be intercepted, rerouted, or even modified by an attacker. Consequently, security and privacy issues are of utmost importance, and the nodes must be protected against unauthorized access during transmission over a public wireless channel. To address these issues, we propose the Probabilistic Bit-Similarity-Based Key Agreement Protocol (PBS-KAP). This novel method enables two nodes to iteratively converge on a shared secret key without transmitting it or relying on pre-installed keys. PBS-KAP enables two nodes to agree on a symmetric session key using probabilistic similarity alignment with explicit key confirmation (MAC). Optimized Garbled Circuits facilitate secure computation with minimal computational and communication overhead, while Secure Sketches combined with Fuzzy Extractors correct residual errors and amplify entropy  producing reliable and uniformly random session keys. The resulting protocol provides a balance between security, privacy, and usability, standing as a practical solution for real-world WSN and IoT applications without imposing excessive computational or communication burdens. Security relies on standard computational assumptions via a one-time elliptic–curve–based base Oblivious Transfer, followed by an IKNP Oblivious Transfer extension and a small garbled threshold circuit. No pre-deployed long-term keys are required. After the bootstrap, only symmetric operations are used. We analyze confidentiality in the semi-honest model. However, entity authentication, though feasible, requires an additional Authenticated Key Exchange step or malicious-secure OT/GC. Under the semi-honest OT/GC assumption, we prove session-key secrecy/indistinguishability; full entity authentication requires an additional AKE binding step or malicious-secure OT/GC.  Full article
(This article belongs to the Special Issue Data Protection and Privacy)
28 pages, 1515 KB  
Article
Supply Chain Integration for Sustainability in Belt and Road Initiative EPC Projects: A Multi-Stakeholder Perspective
by Jiaxin Huang and Kelvin K. Orisaremi
Sustainability 2026, 18(2), 1081; https://doi.org/10.3390/su18021081 - 21 Jan 2026
Viewed by 81
Abstract
This study investigates critical research gaps in procurement management challenges faced by Chinese contractors in international engineering–procurement–construction (EPC) projects under the Belt and Road Initiative (BRI), with a particular focus on sustainability-oriented outcomes. It examines the following: (1) prevalent procurement inefficiencies, such as [...] Read more.
This study investigates critical research gaps in procurement management challenges faced by Chinese contractors in international engineering–procurement–construction (EPC) projects under the Belt and Road Initiative (BRI), with a particular focus on sustainability-oriented outcomes. It examines the following: (1) prevalent procurement inefficiencies, such as communication delays and material shortages, encountered in international EPC projects; (2) the role of supply chain INTEGRATION in enhancing procurement performance; (3) the application of social network analysis (SNA) to reveal inter-organizational relationships in procurement systems; and (4) the influence of stakeholder collaboration on achieving efficient and sustainable procurement processes. The findings demonstrate that effective supply chain integration significantly improves procurement efficiency, reduces delays, and lowers costs, thereby contributing to more sustainable project delivery. Strong collaboration and transparent communication among key stakeholders—including contractors, suppliers, subcontractors, and designers—are shown to be essential for mitigating procurement risks and supporting resilient supply chain operations. SNA results highlight the critical roles of central stakeholders and their relational structures in optimizing resource allocation and enhancing risk management capabilities. Evidence from case studies further indicates that Chinese contractors increasingly adopt sustainability-oriented practices, such as just-in-time inventory management, strategic supplier relationship management, and digital procurement platforms, to reduce inefficiencies and environmental impacts. Overall, this study underscores that supply chain INTEGRATION, combined with robust stakeholder collaboration, is a key enabler of sustainable procurement and long-term competitiveness for Chinese contractors in the global EPC market. The purpose of this study is to identify critical procurement management challenges and propose evidence-based solutions for Chinese contractors. It further aims to develop a sustainability-oriented framework integrating supply chain integration and stakeholder collaboration to enhance competitiveness. Full article
Show Figures

Figure 1

50 pages, 5994 KB  
Perspective
Smart Grids and Renewable Energy Communities in Pakistan and the Middle East: Present Situation, Perspectives, Future Developments, and Comparison with EU
by Ateeq Ur Rehman, Dario Atzori, Sandra Corasaniti and Paolo Coppa
Energies 2026, 19(2), 535; https://doi.org/10.3390/en19020535 - 21 Jan 2026
Viewed by 110
Abstract
The shift towards the integration of and transition to renewable energy has led to an increase in renewable energy communities (RECs) and smart grids (SGs). The significance of these RECs is mainly energy self-sufficiency, energy independence, and energy autonomy. Despite this, in low- [...] Read more.
The shift towards the integration of and transition to renewable energy has led to an increase in renewable energy communities (RECs) and smart grids (SGs). The significance of these RECs is mainly energy self-sufficiency, energy independence, and energy autonomy. Despite this, in low- and middle-income countries and regions like Pakistan and the Middle East, SGs and RECs are still in their initial stage. However, they have potential for green energy solutions rooted in their unique geographic and climatic conditions. SGs offer energy monitoring, communication infrastructure, and automation features to help these communities build flexible and efficient energy systems. This work provides an overview of Pakistani and Middle Eastern energy policies, goals, and initiatives while aligning with European comparisons. This work also highlights technical, regulatory, and economic challenges in those regions. The main objectives of the research are to ensure that residential service sizes are optimized to maximize the economic and environmental benefits of green energy. Furthermore, in line with SDG 7, affordable and clean energy, the focus in this study is on the development and transformation of energy systems for sustainability and creating synergies with other SDGs. The paper presents insights on the European Directive, including the amended Renewable Energy Directive (RED II and III), to recommend policy enhancements and regulatory changes that could strengthen the growth of RECs in Asian countries, Pakistan, and the Middle East, paving the way for a more inclusive and sustainable energy future. Additionally, it addresses the main causes that hinder the expansion of RECs and SGs, and offers strategic recommendations to support their development in order to reduce dependency on national electric grids. To perform this, a perspective study of Pakistan’s indicative generation capacity by 2031, along with comparisons of energy capacity in the EU, the Middle East, and Asia, is presented. Pakistan’s solar, wind, and hydro potential is also explored in detail. This study is a baseline and informative resource for policy makers, researchers, industry stakeholders, and energy communities’ promoters, who are committed to the task of promoting sustainable renewable energy solutions. Full article
(This article belongs to the Section B: Energy and Environment)
Show Figures

Figure 1

27 pages, 3582 KB  
Article
Multi-Objective Joint Optimization for Microservice Deployment and Request Routing
by Zhengying Cai, Fang Yu, Wenjuan Li, Junyu Liu and Mingyue Zhang
Symmetry 2026, 18(1), 195; https://doi.org/10.3390/sym18010195 - 20 Jan 2026
Viewed by 75
Abstract
Microservice deployment and request routing can help improve server efficiency and the performance of large-scale mobile edge computing (MEC). However, the joint optimization of microservice deployment and request routing is extremely challenging, as dynamic request routing easily results in asymmetric network structures and [...] Read more.
Microservice deployment and request routing can help improve server efficiency and the performance of large-scale mobile edge computing (MEC). However, the joint optimization of microservice deployment and request routing is extremely challenging, as dynamic request routing easily results in asymmetric network structures and imbalanced microservice workloads. This article proposes multi-objective joint optimization for microservice deployment and request routing based on structural symmetry. Firstly, the structural symmetry of microservice deployment and request routing is defined, including spatial symmetry and temporal symmetry. A constrained nonlinear multi-objective optimization model was constructed to jointly optimize microservice deployment and request routing, where the structural symmetric metrics take into account the flow-aware routing distance, workload balancing, and request response delay. Secondly, an improved artificial plant community algorithm is designed to search for the optimal route to achieve structural symmetry, including the environment preparation and dependency installation, service packaging and image orchestration, arrangement configuration and dependency management, deployment execution and status monitoring. Thirdly, a benchmark experiment is designed to compare with baseline algorithms. Experimental results show that the proposed algorithm can effectively optimize structural symmetry and reduce the flow-aware routing distance, workload imbalance, and request response delay, while the computational overhead is small enough to be easily deployed on resource-constrained edge computing devices. Full article
Show Figures

Figure 1

14 pages, 4934 KB  
Article
Optimal Schemes for the Enrichment Zones of Co-Rich Ferromanganese Crusts on Seamounts
by Yonggang Liu, Yong Yang, Gaowen He, Zhenquan Wei, Weilin Ma, Kehong Yang, Donghong Liang, Shuang Hong and Ranran Du
J. Mar. Sci. Eng. 2026, 14(2), 209; https://doi.org/10.3390/jmse14020209 - 20 Jan 2026
Viewed by 85
Abstract
The optimization of enrichment zones for Co-rich crusts involves multiple factors such as crust thickness, elemental content, topography, slope, and biological distribution, making it a complicated research endeavor. Based on survey data from the contract area, the present study pioneers the integration of [...] Read more.
The optimization of enrichment zones for Co-rich crusts involves multiple factors such as crust thickness, elemental content, topography, slope, and biological distribution, making it a complicated research endeavor. Based on survey data from the contract area, the present study pioneers the integration of environmental factors into enrichment zone selection. It conducts a comprehensive analysis of resource, environment, and mining considerations, alongside optimization methodologies. Quantitative indicators for resource, environment, and mining are spatially correlated and assigned to corresponding grid cells. A weighted scoring method is proposed to compare enrichment zone selection results under different weightings, finally forming the optimal enrichment zone selection scheme. This scheme fully achieves the maximization of resource reserves, the protection of biological communities, and the safeguarding of future mineral development. It also provides technical reference for enrichment zone selection of deep-sea minerals such as polymetallic nodules and hydrothermal sulphides. Full article
(This article belongs to the Section Geological Oceanography)
Show Figures

Figure 1

18 pages, 1201 KB  
Article
Federated Learning Semantic Communication in UAV Systems: PPO-Based Joint Trajectory and Resource Allocation Optimization
by Shuang Du, Yue Zhang, Zhen Tao, Han Li and Haibo Mei
Sensors 2026, 26(2), 675; https://doi.org/10.3390/s26020675 - 20 Jan 2026
Viewed by 84
Abstract
Semantic Communication (SC), driven by a deep learning (DL)-based “understand-before-transmit” paradigm, transmits lightweight semantic information (SI) instead of raw data. This approach significantly reduces data volume and communication overhead while maintaining performance, making it particularly suitable for UAV communications where the platform is [...] Read more.
Semantic Communication (SC), driven by a deep learning (DL)-based “understand-before-transmit” paradigm, transmits lightweight semantic information (SI) instead of raw data. This approach significantly reduces data volume and communication overhead while maintaining performance, making it particularly suitable for UAV communications where the platform is constrained by size, weight, and power (SWAP) limitations. To alleviate the computational burden of semantic extraction (SE) on the UAV, this paper introduces federated learning (FL) as a distributed training framework. By establishing a collaborative architecture with edge users, computationally intensive tasks are offloaded to the edge devices, while the UAV serves as a central coordinator. We first demonstrate the feasibility of integrating FL into SC systems and then propose a novel solution based on Proximal Policy Optimization (PPO) to address the critical challenge of ensuring service fairness in UAV-assisted semantic communications. Specifically, we formulate a joint optimization problem that simultaneously designs the UAV’s flight trajectory and bandwidth allocation strategy. Experimental results validate that our FL-based training framework significantly reduces computational resource consumption, while the PPO-based algorithm approach effectively minimizes both energy consumption and task completion time while ensuring equitable quality-of-service (QoS) across all edge users. Full article
(This article belongs to the Special Issue 6G Communication and Edge Intelligence in Wireless Sensor Networks)
Show Figures

Figure 1

24 pages, 6437 KB  
Article
Wildfire Mitigation in Small-to-Medium-Scale Industrial Hubs Using Cost-Effective Optimized Wireless Sensor Networks
by Juan Luis Gómez-González, Effie Marcoulaki, Alexis Cantizano, Myrto Konstantinidou, Raquel Caro and Mario Castro
Fire 2026, 9(1), 43; https://doi.org/10.3390/fire9010043 - 19 Jan 2026
Viewed by 206
Abstract
Wildfires are increasingly recognized as a climatological hazard, able to threaten industrial and critical infrastructure safety and operations and lead to Natech disasters. Future projections of exacerbated fire regimes increase the likelihood of Natech disasters, therefore increasing expected direct damage costs, clean-up costs, [...] Read more.
Wildfires are increasingly recognized as a climatological hazard, able to threaten industrial and critical infrastructure safety and operations and lead to Natech disasters. Future projections of exacerbated fire regimes increase the likelihood of Natech disasters, therefore increasing expected direct damage costs, clean-up costs, and long-term economic losses due to business interruption and environmental remediation. While large industrial complexes, such as oil, gas, and chemical facilities have sufficient resources for the implementation of effective prevention and mitigation plans, small-to-medium-sized industrial hubs are particularly vulnerable due to their scattered distribution and limited resources for investing in comprehensive fire prevention systems. This study targets the vulnerability of these communities by proposing the deployment of Wireless Sensor Networks (WSNs) as cost-effective Early Wildfire Detection Systems (EWDSs) to safeguard wildland and industrial domains. The proposed approach leverages wildland–industrial interface (WII) geospatial data, simulated wildfire dynamics data, and mathematical optimization to maximize detection efficiency at minimal cost. The WII delimits the boundary where the presence of wildland fires impacts industrial activity, thus representing a proxy for potential Natech disasters. The methodology is tested in Cocentaina, Spain, a municipality characterized by a highly flammable Mediterranean landscape and medium-scale industrial parks. Results reveal the complex trade-offs between detection characteristics and the degree of protection in the combined wildland and WII areas, enabling stakeholders to make informed decisions. This methodology is easily replicable for any municipality and industrial installation, or for generic wildland–human interface (WHI) scenarios, provided there is access to wildfire dynamics data and geospatial boundaries delimiting the areas to protect. Full article
(This article belongs to the Section Fire Science Models, Remote Sensing, and Data)
Show Figures

Figure 1

15 pages, 2074 KB  
Article
Research on Encryption and Decryption Technology of Microservice Communication Based on Block Cipher
by Shijie Zhang, Xiaolan Xie, Ting Fan and Yu Wang
Electronics 2026, 15(2), 431; https://doi.org/10.3390/electronics15020431 - 19 Jan 2026
Viewed by 162
Abstract
The efficiency optimization of encryption and decryption algorithms in cloud environments is addressed in this study, where the processing speed of encryption and decryption is enhanced through the application of multi-threaded parallel technology. In view of the high-concurrency and distributed storage characteristics of [...] Read more.
The efficiency optimization of encryption and decryption algorithms in cloud environments is addressed in this study, where the processing speed of encryption and decryption is enhanced through the application of multi-threaded parallel technology. In view of the high-concurrency and distributed storage characteristics of cloud platforms, a multi-threaded concurrency mechanism is adopted for the direct processing of data streams. Compared with the traditional serial processing mode, four distinct encryption algorithms, namely AES, DES, SM4 and Ascon, are employed, and different data units are processed concurrently by means of multithreaded technology. Based on multi-dimensional performance evaluation indicators (including throughput, memory footprint and security level), comparative analyses are carried out to optimize the design scheme; accordingly, multi-threaded collaborative encryption is realized to improve the overall operation efficiency. Experimental results indicate that, in comparison with the traditional serial encryption method, the encryption and decryption latency of the algorithm is reduced by around 50%, which significantly lowers the time overhead associated with encryption and decryption processes. Simultaneously, the throughput of AES and DES algorithms is observed to be doubled, which leads to a remarkable improvement in communication efficiency. Moreover, under the premise that the original secure communication capability is guaranteed, system resource overhead is effectively reduced by SM4 and Ascon algorithms. On this basis, a quantitative reference basis is provided for cloud platforms to develop targeted encryption strategies tailored to diverse business demands. In conclusion, the proposed approach is of profound significance for advancing the synergistic optimization of security and performance in cloud-native data communication scenarios. Full article
(This article belongs to the Special Issue AI for Wireless Communications and Security)
Show Figures

Figure 1

17 pages, 468 KB  
Article
A Traceable Ring Signcryption Scheme Based on SM9 for Privacy Protection
by Liang Qiao, Xuefeng Zhang and Beibei Li
Information 2026, 17(1), 100; https://doi.org/10.3390/info17010100 - 19 Jan 2026
Viewed by 159
Abstract
To address the issues of insufficient privacy protection, lack of confidentiality, and absence of traceability mechanisms in resource-constrained application scenarios such as IoT nodes or mobile network group communications, this paper proposes a traceable ring signcryption privacy protection scheme based on the SM9 [...] Read more.
To address the issues of insufficient privacy protection, lack of confidentiality, and absence of traceability mechanisms in resource-constrained application scenarios such as IoT nodes or mobile network group communications, this paper proposes a traceable ring signcryption privacy protection scheme based on the SM9 algorithm. In detail, the ring signcryption structure is designed based on the SM9 identity-based cryptography algorithm framework. Additionally, the scheme introduces a dynamic accumulator to compress ciphertext length and optimizes the algorithm to improve computational efficiency. Under the random oracle model, it is proved that the scheme has unforgeability, confidentiality, and conditional anonymity, and it is also demonstrated that conditional anonymity can be used to trace the identity of the actual signcryptor in the event of a dispute. Performance analysis shows that, compared with related schemes, this scheme improves the efficiency of signcryption, and the size of the signcryption ciphertext remains at a constant level. Full article
(This article belongs to the Special Issue Privacy-Preserving Data Analytics and Secure Computation)
Show Figures

Graphical abstract

17 pages, 2562 KB  
Article
A Game Theory Model for Network Attack–Defense Strategy Selection in Power Internet of Things
by Danni Liu, Ting Lv, Weijia Su, Li Cong and Di Wu
Electronics 2026, 15(2), 426; https://doi.org/10.3390/electronics15020426 - 19 Jan 2026
Viewed by 206
Abstract
As the digitalization and intelligent transformation of power systems accelerates, the Power Internet of Things (PIoT) plays a pivotal role in ensuring efficient energy transmission and real-time regulation. However, this openness and interconnectivity also expose the system to diverse cyber threats, where attackers [...] Read more.
As the digitalization and intelligent transformation of power systems accelerates, the Power Internet of Things (PIoT) plays a pivotal role in ensuring efficient energy transmission and real-time regulation. However, this openness and interconnectivity also expose the system to diverse cyber threats, where attackers can disrupt stable power communication and dispatch operations through means such as data tampering, denial-of-service attacks, and control intrusion. To characterize the dynamic adversarial process between attackers and defenders in the PIoT, this paper constructs a zero-sum differential game model for cyber attack–defense strategy selection. To achieve equilibrium in the formulated differential game, optimal control theory is employed to solve the optimization problems of the game participants, thereby deriving the optimal strategies for both attackers and defenders. Finally, simulation results illustrate the evolution of network resource competition between attackers and defenders in the PIoT. The results also demonstrate that our proposed model can effectively and accurately describe the evolution of the system security state and the impact of strategic interactions between attackers and defenders. Full article
(This article belongs to the Special Issue Intelligent Solutions for Network and Cyber Security)
Show Figures

Figure 1

26 pages, 2937 KB  
Article
Secure Implementation of RISC-V’s Scalar Cryptography Extension Set
by Asmaa Kassimi, Abdullah Aljuffri, Christian Larmann, Said Hamdioui and Mottaqiallah Taouil
Cryptography 2026, 10(1), 6; https://doi.org/10.3390/cryptography10010006 - 17 Jan 2026
Viewed by 175
Abstract
Instruction Set Architecture (ISA) extensions, particularly scalar cryptography extensions (Zk), combine the performance advantages of hardware with the adaptability of software, enabling the direct and efficient execution of cryptographic functions within the processor pipeline. This integration eliminates the need to communicate with external [...] Read more.
Instruction Set Architecture (ISA) extensions, particularly scalar cryptography extensions (Zk), combine the performance advantages of hardware with the adaptability of software, enabling the direct and efficient execution of cryptographic functions within the processor pipeline. This integration eliminates the need to communicate with external cores, substantially reducing latency, power consumption, and hardware overhead, making it especially suitable for embedded systems with constrained resources. However, current scalar cryptography extension implementations remain vulnerable to physical threats, notably power side-channel attacks (PSCAs). These attacks allow adversaries to extract confidential information, such as secret keys, by analyzing the power consumption patterns of the hardware during operation. This paper presents an optimized and secure implementation of the RISC-V scalar Advanced Encryption Standard (AES) extension (Zkne/Zknd) using Domain-Oriented Masking (DOM) to mitigate first-order PSCAs. Our approach features optimized assembly implementations for partial rounds and key scheduling alongside pipeline-aware microarchitecture optimizations. We evaluated the security and performance of the proposed design using the Xilinx Artix7 FPGA platform. The results indicate that our design is side-channel-resistant while adding a very low area overhead of 0.39% to the full 32-bit CV32E40S RISC-V processor. Moreover, the performance overhead is zero when the extension-related instructions are properly scheduled. Full article
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)
Show Figures

Figure 1

31 pages, 2717 KB  
Perspective
Artificial Intelligence in Local Energy Systems: A Perspective on Emerging Trends and Sustainable Innovation
by Sára Ferenci, Florina-Ambrozia Coteț, Elena Simina Lakatos, Radu Adrian Munteanu and Loránd Szabó
Energies 2026, 19(2), 476; https://doi.org/10.3390/en19020476 - 17 Jan 2026
Viewed by 181
Abstract
Local energy systems (LESs) are becoming larger and more heterogeneous as distributed energy resources, electrified loads, and active prosumers proliferate, increasing the need for reliable coordination of operation, markets, and community governance. This Perspective synthesizes recent literature to map how artificial intelligence (AI) [...] Read more.
Local energy systems (LESs) are becoming larger and more heterogeneous as distributed energy resources, electrified loads, and active prosumers proliferate, increasing the need for reliable coordination of operation, markets, and community governance. This Perspective synthesizes recent literature to map how artificial intelligence (AI) supports forecasting and situational awareness, optimization, and real-time control of distributed assets, and community-oriented markets and engagement, while arguing that adoption is limited by system-level credibility rather than model accuracy alone. The analysis highlights interlocking deployment barriers, such as governance-integrated explainability, distributional equity, privacy and data governance, robustness under non-stationarity, and the computational footprint of AI. Building on this diagnosis, the paper proposes principles-as-constraints for sustainable, trustworthy LES AI and a deployment-oriented validation and reporting framework. It recommends evaluating LES AI with deployment-ready evidence, including stress testing under shift and rare events, calibrated uncertainty, constraint-violation and safe-fallback behavior, distributional impact metrics, audit-ready documentation, edge feasibility, and transparent energy/carbon accounting. Progress should be judged by measurable system benefits delivered under verifiable safeguards. Full article
(This article belongs to the Section A1: Smart Grids and Microgrids)
Show Figures

Graphical abstract

26 pages, 2039 KB  
Article
Modeling and Optimization of AI-Based Centralized Energy Management for a Community PV-Battery System Using PSO
by Sree Lekshmi Reghunathan Pillai Sree Devi, Chinmaya Krishnan, Preetha Parakkat Kesava Panikkar and Jayesh Santhi Bhavan
Energies 2026, 19(2), 439; https://doi.org/10.3390/en19020439 - 16 Jan 2026
Viewed by 176
Abstract
The rapid rise in energy demand, urban electrification, and the increasing prevalence of Electric Vehicles (EV) have intensified the need for reliable and decentralized energy management solutions. This study proposes an AI-driven centralized control architecture for a community-based photovoltaic–battery energy storage system (PV–BESS) [...] Read more.
The rapid rise in energy demand, urban electrification, and the increasing prevalence of Electric Vehicles (EV) have intensified the need for reliable and decentralized energy management solutions. This study proposes an AI-driven centralized control architecture for a community-based photovoltaic–battery energy storage system (PV–BESS) to enhance energy efficiency and self-sufficiency. The framework integrates a central controller which utilizes the Particle Swarm Optimization (PSO) technique which receives the Long Short-Term Memory (LSTM) forecasting output to determine optimal photovoltaic generation, battery charging, and discharging schedules. The proposed system minimizes the grid dependence, reduces the operational costs and a stable power output is ensured under dynamic load conditions by coordinating the renewable resources in the community microgrid. This system highlights that the AI-based Particle Swarm Optimization will reduce the peak load import and it maximizes the energy utilization of the system compared to the conventional optimization techniques. Full article
Show Figures

Graphical abstract

Back to TopTop