Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (276)

Search Parameters:
Keywords = key-exchange protocols

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 3072 KB  
Review
Organic Grafting of Clay Minerals with Organo-Alkoxides, Silanes and Amines: Structure–Performance Relationships and Implications for Water Treatment
by Marzhan S. Kalmakhanova, Aizhan M. Serikbayeva, Nursulu K. Sarypbekova, Karashash B. Adikhodzhayeva, Nazgul S. Murzakasymova, Seitzhan A. Orynbayev and Helder T. Gomes
Water 2026, 18(8), 895; https://doi.org/10.3390/w18080895 - 9 Apr 2026
Viewed by 224
Abstract
This review provides a comprehensive analysis of organically grafted clay minerals modified with organo-alkoxides, silanes, and amine-based compounds for water treatment applications. Emphasis is placed on per- and polyfluoroalkyl substances (PFAS) as representative emerging contaminants due to their persistence and environmental relevance. The [...] Read more.
This review provides a comprehensive analysis of organically grafted clay minerals modified with organo-alkoxides, silanes, and amine-based compounds for water treatment applications. Emphasis is placed on per- and polyfluoroalkyl substances (PFAS) as representative emerging contaminants due to their persistence and environmental relevance. The review systematically examines synthesis strategies, surface functionalization mechanisms, and structure–performance relationships governing adsorption behavior. The analysis demonstrates that adsorption performance is controlled by the interplay between grafting chemistry, surface accessibility, and environmental conditions rather than adsorption capacity alone. While ion-exchange organoclays exhibit high adsorption capacities under controlled conditions, covalently grafted and polymer-modified systems provide superior stability and resistance to leaching. However, discrepancies in experimental conditions across studies limit direct comparison of reported adsorption capacities. The review identifies key challenges related to regeneration efficiency, environmental safety, and scalability, and highlights that long-term stability and compatibility with realistic water matrices are decisive factors for practical implementation. Future research should focus on standardized testing protocols, pilot-scale validation, and comprehensive environmental risk assessment. Full article
(This article belongs to the Section Wastewater Treatment and Reuse)
Show Figures

Figure 1

24 pages, 444 KB  
Article
A Novel IoT Security Framework Combining X25519 with NIST Lightweight Ascon Encryption and Hybrid Transform-Domain Steganography
by Mohammed Al Saleh, Rima Shbaro and Joseph Azar
Telecom 2026, 7(2), 40; https://doi.org/10.3390/telecom7020040 - 8 Apr 2026
Viewed by 185
Abstract
This paper aims to secure sensitive data generated by IoT devices by introducing a lightweight hybrid approach that combines steganography and cryptography. While classical cryptography offers confidentiality guarantees, the visibility of the produced ciphertexts keeps them at risk of traffic analysis, which could [...] Read more.
This paper aims to secure sensitive data generated by IoT devices by introducing a lightweight hybrid approach that combines steganography and cryptography. While classical cryptography offers confidentiality guarantees, the visibility of the produced ciphertexts keeps them at risk of traffic analysis, which could reveal communication patterns. Although some studies use Curve25519-based protocols, ECC paired with RDWT, or VLSB-based steganography, there is no complete approach that combines cryptographic and steganographic methods that is tailored to IoT devices. Our proposed scheme addresses this gap by integrating X25519 with Elligator 2 for efficient key exchange, using Ascon-AEAD128 for encryption, and finally hiding the encrypted payload within cover images using hybrid DWT-DCT steganography. When compared to similar hybrid approaches, our method achieves better performance, with results showing high imperceptibility, low computational overhead, and good resistance to noise. The cryptographic-steganographic combo adopted by our proposed framework improves confidentiality, integrity, and resistance to detection in resource-constrained IoT systems. Full article
Show Figures

Figure 1

36 pages, 3666 KB  
Article
StegoPadding: A Steganographic Channel with QoS Support and Encryption for Smart Grids Based on Wi-Fi Networks
by Paweł Rydz and Marek Natkaniec
Electronics 2026, 15(7), 1504; https://doi.org/10.3390/electronics15071504 - 3 Apr 2026
Viewed by 284
Abstract
Wi-Fi networks used in smart grids are essential for enabling communication between smart meters and data aggregation units. A key challenge, however, is the ability to hide the existence and traffic patterns of these communications, so that sensitive information exchanges cannot be easily [...] Read more.
Wi-Fi networks used in smart grids are essential for enabling communication between smart meters and data aggregation units. A key challenge, however, is the ability to hide the existence and traffic patterns of these communications, so that sensitive information exchanges cannot be easily detected or intercepted. Unfortunately, most existing solutions do not provide support for traffic prioritization and steganographic channel encryption. In this paper, we propose a novel covert channel with Quality of Service (QoS) and encryption support for smart grid environments based on the IEEE 802.11 standard. We introduce an original steganographic approach that leverages the backoff mechanism, the Enhanced Distributed Channel Access (EDCA) function, frame aggregation, and the StegoPaddingCipher algorithm. This design ensures QoS-aware traffic handling while enhancing security through encryption of the transmitted covert data. The proposed protocol was implemented and evaluated using the ns-3 simulator, where it achieved excellent performance results. The system maintained high efficiency even under heavily saturated network conditions with additional background traffic generated by other nodes. The proposed covert channel offers an innovative and secure method for transmitting substantial volumes of QoS-related data within smart grid environments. Full article
(This article belongs to the Special Issue Communication Technologies for Smart Grid Application)
Show Figures

Figure 1

17 pages, 786 KB  
Article
Exploring Blockchain Interoperability: Frameworks, Use Cases, and Future Challenges
by Stanly Wilson, Kwabena Adu-Duodu, Yinhao Li, Ellis Solaiman, Omer Rana and Rajiv Ranjan
Systems 2026, 14(4), 388; https://doi.org/10.3390/systems14040388 - 2 Apr 2026
Viewed by 350
Abstract
Blockchain adoption across industries has led to the emergence of multiple independent blockchain platforms, creating challenges for cross-chain data exchange and system interoperability. This paper addresses this challenge by examining interoperability frameworks that enable communication between heterogeneous blockchain networks. We adopt a platform-oriented [...] Read more.
Blockchain adoption across industries has led to the emergence of multiple independent blockchain platforms, creating challenges for cross-chain data exchange and system interoperability. This paper addresses this challenge by examining interoperability frameworks that enable communication between heterogeneous blockchain networks. We adopt a platform-oriented analysis to study widely used blockchain ecosystems, focusing on the mechanisms they employ for cross-chain communication and asset transfer. To demonstrate practical applicability, we present a conceptual supply chain scenario that illustrates how interoperable architectures enable interactions among multiple blockchain entities. Finally, we identify key open research challenges, including data management, cross-chain query processing, privacy, governance, scalability, and protocol standardisation. The findings highlight both the capabilities and limitations of existing interoperability solutions and outline directions for future research. Full article
(This article belongs to the Section Systems Engineering)
Show Figures

Figure 1

22 pages, 14184 KB  
Review
Heterogeneous Solid Acid Catalysts for the Hock Cleavage of Cumene Hydroperoxide: Mechanism, Catalyst Design, and Industrial Perspectives
by Kai Yang, Feng Shi and Guochao Yang
Catalysts 2026, 16(4), 329; https://doi.org/10.3390/catal16040329 - 2 Apr 2026
Viewed by 270
Abstract
The cleavage of cumene hydroperoxide (CHP) via the Hock rearrangement is a cornerstone process in the chemical industry, responsible for over 90% of global phenol and acetone production. Despite its industrial significance, the conventional use of homogeneous sulfuric acid catalysis presents critical drawbacks, [...] Read more.
The cleavage of cumene hydroperoxide (CHP) via the Hock rearrangement is a cornerstone process in the chemical industry, responsible for over 90% of global phenol and acetone production. Despite its industrial significance, the conventional use of homogeneous sulfuric acid catalysis presents critical drawbacks, including severe equipment corrosion, generation of hazardous waste, and the need for complex neutralization steps. This review explores the transition toward heterogeneous solid acid catalysts as a sustainable alternative, emphasizing the relationship between catalyst structure, surface acidity, and reaction performance. Key catalyst families—such as ion-exchange resins, zeolites, and heteropolyacids—are systematically evaluated, with a focus on how Brønsted acid site density and porous architecture influence catalytic activity and selectivity. Particular attention is given to deactivation mechanisms, including coking, leaching of active species, and poisoning by inorganic cations, alongside mitigation strategies enabled by rational catalyst design and regeneration protocols. Additionally, we highlight recent progress in reactor engineering, particularly the integration of solid acid catalysts in reactive distillation and microchannel configurations. These insights offer a strategic perspective for developing more efficient and environmentally benign industrial processes for the Hock cleavage of cumene hydroperoxide. Full article
(This article belongs to the Special Issue Feature Papers in "Industrial Catalysis" Section, 3rd Edition)
Show Figures

Figure 1

15 pages, 311 KB  
Article
IB-TOT: Identity-Based Traceable Oblivious Transfer and Its Applications
by Weiwei Liu, Yankang Zhang and Kunhao Yang
Axioms 2026, 15(3), 233; https://doi.org/10.3390/axioms15030233 - 20 Mar 2026
Viewed by 155
Abstract
Oblivious Transfer (OT) is a fundamental cryptographic primitive for privacy-preserving data exchange. While traditional OT protocols guarantee unconditional receiver anonymity, they inherently lack the mechanisms to prevent abusive mass data harvesting. Traceable Oblivious Transfer (TOT) addresses this by introducing “conditional anonymity,” revoking the [...] Read more.
Oblivious Transfer (OT) is a fundamental cryptographic primitive for privacy-preserving data exchange. While traditional OT protocols guarantee unconditional receiver anonymity, they inherently lack the mechanisms to prevent abusive mass data harvesting. Traceable Oblivious Transfer (TOT) addresses this by introducing “conditional anonymity,” revoking the privacy of malicious users. However, existing TOT mechanisms either rely on computationally expensive dynamic assumptions or require continuous interaction with a Trusted Third Party (TTP) to manage credentials. To overcome these limitations, we present an Identity-Based Traceable Oblivious Transfer (IB-TOT) protocol. By synergizing polynomial-based secret sharing with Blind Identity-Based Encryption (Blind IBE), our scheme completely eliminates the TTP during the data transfer stage. The Blind IBE extraction algorithm serves as the primary oblivious channel, utilizing data indices as user identities. We strictly bound the receiver’s query quota by embedding a degree-k tracing polynomial directly into the key issuance phase. Honest clients enjoy fully protected retrieval of up to k items, whereas any attempt to exceed this quota deterministically exposes the violator’s identity. Comprehensive security proofs demonstrate that IB-TOT satisfies sender privacy, receiver privacy, and strict accountability under standard static assumptions (DBDH and DL). Full article
Show Figures

Figure 1

31 pages, 24139 KB  
Article
Renewable Energy Communities: An Opportunity for Multi-Benefit Urban Sustainability
by Renata Valente, Louise Anna Mozingo, Salvatore Losco, Maria Rosaria Alfano, Cristiana Donati, Roberto Bosco, Savino Giacobbe, Cipriano Cerullo and Mihaela Bianca Maienza
Energies 2026, 19(5), 1324; https://doi.org/10.3390/en19051324 - 5 Mar 2026
Viewed by 370
Abstract
Public buildings and open spaces form key elements in an exchange system of both tangible resources (energy, water, physical spaces) and intangible assets (services, skills, time). This study presents an innovative protocol (AGAPE—Automatic GIS Assessment Protocol for Energy and environment) to regenerate metropolitan [...] Read more.
Public buildings and open spaces form key elements in an exchange system of both tangible resources (energy, water, physical spaces) and intangible assets (services, skills, time). This study presents an innovative protocol (AGAPE—Automatic GIS Assessment Protocol for Energy and environment) to regenerate metropolitan suburbs by managing common resources and support sustainable communities. It tackles energy poverty by integrating urban planning, environmental design, and economics into geographic information science. This expedites public well-being by redesigning public facilities to enhance community connections and improve bioclimatic resilience. The model test site is a peripheral suburban area, Melito di Napoli, within the Metropolitan City of Naples (Italy), characterized by high population density and ongoing suburban expansion. The protocol evaluates temporal scenarios for implementing multi-purpose solutions, supporting public agencies in strategic intervention assessments, optimizing funding allocation and community benefits. The modeling of redesigned community assets reveal key outcomes: renewed land-use opportunities, reduced spatial inequities, and increased climate change resilience. The transformation of public buildings and facilities into multi-benefit community cores catalyzes virtuous urban regeneration processes. The model AGAPE provides a replicable decision framework to transform existing settlements and to drive the transition towards more sustainable, equitable urban communities. Full article
Show Figures

Figure 1

31 pages, 1339 KB  
Article
Quantum Secure Authentication and Key Exchange Protocol for UAV-Assisted VANETs
by Hyewon Park and Yohan Park
Mathematics 2026, 14(5), 820; https://doi.org/10.3390/math14050820 - 28 Feb 2026
Viewed by 296
Abstract
The integration of unmanned aerial vehicles (UAVs) into vehicular ad hoc networks (VANETs) has emerged as a promising solution to overcome the limited coverage of conventional roadside unit (RSU)-based infrastructures. However, UAVs operate in open environments and cannot be fully trusted, while the [...] Read more.
The integration of unmanned aerial vehicles (UAVs) into vehicular ad hoc networks (VANETs) has emerged as a promising solution to overcome the limited coverage of conventional roadside unit (RSU)-based infrastructures. However, UAVs operate in open environments and cannot be fully trusted, while the rapid advancement of quantum computing threatens the long-term security of classical public-key cryptographic systems. As a result, many existing UAV-based VANET authentication schemes face fundamental limitations in future deployments. Most existing schemes either lack post-quantum security or incur excessive computational and communication overhead, making them unsuitable for real-time and high-mobility vehicular environments. In addition, the common assumptions of trusted UAVs do not align with realistic threat models. To address these issues, this paper proposes a lightweight post-quantum authentication and key exchange protocol based on the module learning with errors (MLWE) problem and physically unclonable functions (PUFs). The proposed scheme treats UAVs as untrusted relay nodes and excludes them from session key generation. Its security is evaluated using informal analysis, the real-or-random (RoR) model, BAN logic, and AVISPA, while performance evaluation indicates improved efficiency compared to existing schemes. Full article
Show Figures

Figure 1

29 pages, 5316 KB  
Article
Supervisory Monitoring and Control Using Chemical Process Simulators and SCADA Systems
by Rebecca Bastos Boschoski and Lizandro de Sousa Santos
Methane 2026, 5(1), 8; https://doi.org/10.3390/methane5010008 - 5 Feb 2026
Viewed by 749
Abstract
A digital twin (DT) is an automation strategy that integrates a physical plant with an adaptive, real-time simulation environment, with bidirectional communication between them. In process engineering, DTs promise real-time monitoring, prediction of future conditions, predictive maintenance, process optimization, and control. Dashboards for [...] Read more.
A digital twin (DT) is an automation strategy that integrates a physical plant with an adaptive, real-time simulation environment, with bidirectional communication between them. In process engineering, DTs promise real-time monitoring, prediction of future conditions, predictive maintenance, process optimization, and control. Dashboards for process monitoring are becoming increasingly relevant for tracking key metrics and supervising industrial units in real time. Supervisory Control and Data Acquisition (SCADA) systems are widely used for process automation, with ScadaBR, an open-source, freely licensed platform. This work presents the development of a computational tool that integrates the Aspen HYSYS/Python with the ScadaBR system for real-time monitoring and supervision of dynamic models. The virtual plant, which replicates the system’s physical behavior, was connected to the SCADA platform via the Modbus protocol, enabling bidirectional data exchange between the simulated model and the supervisory interface. The system supports operational analysis and control strategy validation. Two case studies were analyzed: (i) a simplified catalytic hydrocracking process, implemented in the Python environment, and (ii) a heat exchanger networks process, simulated using the HYSYS simulator. In the second case, the process was dynamically simulated, with real-time monitoring of a simple dynamic indicator that correlates the feed methane concentration with heat transfer fluids. The results demonstrate the feasibility and applicability of the proposed approach for educational purposes, operator training, and process engineering validation, fostering a more realistic and interactive simulation environment. Furthermore, the results show that the tool is promising for dynamic monitoring of environmental and energy indices, demonstrating that methane consumption relative to process feed can be evaluated and controlled over time. Full article
Show Figures

Figure 1

24 pages, 3764 KB  
Article
Metabolic Adaptation and Pulmonary ceRNA Network Plasticity in Orientallactaga sibirica During Water Deprivation Stress
by Yongling Jin, Rong Zhang, Xin Li, Linlin Li, Dong Zhang, Yu Ling, Shuai Yuan, Xueying Zhang, Heping Fu and Xiaodong Wu
Int. J. Mol. Sci. 2026, 27(3), 1458; https://doi.org/10.3390/ijms27031458 - 1 Feb 2026
Viewed by 324
Abstract
Rising global temperatures lead to a continuous increase in the frequency and intensity of extreme weather events, such as droughts and floods, posing serious threats to terrestrial homeotherms. However, adaptive changes in respiratory metabolism and molecular mechanisms in lung tissues of small mammals [...] Read more.
Rising global temperatures lead to a continuous increase in the frequency and intensity of extreme weather events, such as droughts and floods, posing serious threats to terrestrial homeotherms. However, adaptive changes in respiratory metabolism and molecular mechanisms in lung tissues of small mammals under extreme water shortage conditions remain unclear. This study hypothesized that small desert mammals can adapt to extreme water shortage environments by regulating the plasticity of lung tissue gene expression and respiratory metabolism. Using 29 wild-caught Siberian jerboas (Orientallactaga sibirica) as subjects, we implemented a 12-day complete water deprivation protocol to simulate extreme aridity. Body weight, food intake, and daily energy expenditure (DEE) were monitored throughout the experiment. Whole-transcriptome sequencing of lung tissues was performed to profile mRNA, circRNA, and miRNA expression, with competitive endogenous RNA (ceRNA) network analysis to explore molecular mechanisms underlying lung adaptation to water deprivation. Over the 12-day water deprivation (WS) period, Orientallactaga sibirica (O. sibirica) exhibited a 30.3% reduction in body mass and a 68.1% decrease in food intake relative to the baseline level. DEE during the peak activity period at the end of the experiment was 12.6% lower in the WS group compared to the control group. In lung tissue, structural integrity-related genes (Mybl2, Ccnb1) were downregulated. A key finding was that circ_0015576 exhibits a significant positive correlation with the potassium channel gene Kcnk15 and a robust negative correlation with miR-503-5p—suggesting that circ_0015576 functions as a competing endogenous RNA (ceRNA) to sequester miR-503-5p and thereby derepress Kcnk15 expression. Core regulatory genes (ApoA4, Dusp15 etc.) were also coordinately downregulated. Collectively, these results indicate that O. sibirica reduces overall energy expenditure, which may be associated with lung gene expression plasticity, such as those related with lung cell proliferation, pulmonary function, and gas exchange efficiency. This metabolic downregulation facilitates energy conservation under severe water scarcity. Full article
(This article belongs to the Special Issue Advances in Molecular Research of Animal Genetics and Genomics)
Show Figures

Graphical abstract

11 pages, 254 KB  
Article
Revisiting a Proof of Security for the SM2 Key Exchange Protocol
by Qianying Zhang, Yuting Wang and Shijun Zhao
Information 2026, 17(2), 124; https://doi.org/10.3390/info17020124 - 28 Jan 2026
Viewed by 390
Abstract
The SM2 key exchange protocol, proposed by the Chinese State Cryptography Administration and adopted as a national standard, is extensively deployed in commercial applications across China. It has also been incorporated by global industrial organizations and integrated into numerous international products, such as [...] Read more.
The SM2 key exchange protocol, proposed by the Chinese State Cryptography Administration and adopted as a national standard, is extensively deployed in commercial applications across China. It has also been incorporated by global industrial organizations and integrated into numerous international products, such as TPM. Today, any cryptographic protocol aspiring to become widely adopted and standardized requires a rigorous security proof within a modern security model. Although Yang et al. claimed to have established such a proof for the SM2 key exchange protocol in the Bellare–Rogaway (BR) model, we show that their proof is flawed. Moreover, we present a group representation attack against the SM2 key exchange protocol, illustrating that the protocol cannot be proven secure in any contemporary security models. Our findings thus delineate the security boundary of the SM2 key exchange protocol. Full article
(This article belongs to the Section Information Security and Privacy)
Show Figures

Figure 1

31 pages, 6017 KB  
Review
Progress in the Expression, Purification, and Characterization of Recombinant Collagen
by Youlin Deng, Jiyao Kang, Xiaoqun Duan, Yingjun Kong, Weiquan Xie, Dongjie Lei, Tingchun Wang and Guifeng Zhang
Bioengineering 2026, 13(2), 159; https://doi.org/10.3390/bioengineering13020159 - 28 Jan 2026
Viewed by 914
Abstract
Synthesized by expressing natural collagen sequences in specific hosts, recombinant collagen exhibits multiple advantages, encompassing a higher content of bioactive domains, enhanced antioxidant activity, the absence of viral pathogens, favorable hydrophilicity, reproducible production, and low immunogenicity. Consequently, it has found extensive use in [...] Read more.
Synthesized by expressing natural collagen sequences in specific hosts, recombinant collagen exhibits multiple advantages, encompassing a higher content of bioactive domains, enhanced antioxidant activity, the absence of viral pathogens, favorable hydrophilicity, reproducible production, and low immunogenicity. Consequently, it has found extensive use in applications ranging from biomaterials and pharmaceuticals to skincare. This review systematically explores various expression systems for recombinant collagen, including those utilizing Escherichia coli, Pichia pastoris, plants, insect baculovirus, and mammalian cells. It provides a detailed comparison of their differences and commonalities in terms of production efficiency, post-translational modification capability, and cost-effectiveness. Key separation and purification techniques for recombinant collage-notably precipitation, affinity chromatography, ion-exchange chromatography, and gel filtration chromatography are further introduced, with an in-depth analysis of the applicable scenarios and purification outcomes for each method. Finally, the review comprehensively summarizes the characterization methods for both the physicochemical properties and biological functions of recombinant collagen. For physicochemical properties, techniques covered include scanning electron microscopy, micro-differential thermal analysis, circular dichroism spectroscopy, SDS-PAGE, mass spectrometry, and Fourier-transform infrared spectroscopy. For biological functions, the focus is on its roles and the corresponding assessment methods in processes such as cell proliferation, migration, adhesion, and wound healing. Building upon this comprehensive overview, current challenges facing recombinant collagen are identified, and future directions are proposed, emphasizing the need to reduce R&D costs, refine testing methods for cosmetic products, and improve safety evaluation protocols to advance the field. Full article
(This article belongs to the Topic Advances in Biomaterials—2nd Edition)
Show Figures

Graphical abstract

26 pages, 4950 KB  
Study Protocol
An Integrated Monitoring Protocol to Study the Effects of Management on the C Sequestration Potential of Mediterranean Pine Ecosystems
by Nikoleta Eleftheriadou, Efstathia D. Mantzari, Natasa Kiorapostolou, Christodoulos I. Sazeides, Georgios Xanthopoulos, Nikos Markos, Gavriil Spyroglou, Evdoxia Bintsi-Frantzi, Alexandros Gouvas, Panayiotis G. Dimitrakopoulos, Mariangela N. Fotelli, Kalliopi Radoglou and Nikolaos M. Fyllas
Methods Protoc. 2026, 9(1), 18; https://doi.org/10.3390/mps9010018 - 26 Jan 2026
Cited by 1 | Viewed by 1227
Abstract
This article describes a field- and laboratory-based framework that can be used to monitor the C balance in Mediterranean pine forest ecosystems under different management practices that determine their structure and function. By jointly monitoring stand structure, gas exchange, litter, and decomposition dynamics, [...] Read more.
This article describes a field- and laboratory-based framework that can be used to monitor the C balance in Mediterranean pine forest ecosystems under different management practices that determine their structure and function. By jointly monitoring stand structure, gas exchange, litter, and decomposition dynamics, this protocol enables the assessment of how management-driven changes regulate carbon uptake, turnover, and losses, thereby affecting carbon sequestration potential. As an example, we suggest the implementation of the protocol at ten (10) permanent monitoring plots across three study areas located in Greece. The first group of plots represents a post-fire chronosequence in pine stands with no management interventions. The second group includes pine stands that exhibit variation in overstory and understory density driven by differences in microclimate and management history. The third group consists of peri-urban pine stands subjected to thinning of varying intensity. The monitoring protocol is implemented across all plots and the collected data can be classified into three analytical domains: (a) demography, encompassing measurements of tree growth and mortality; (b) litter and decomposition dynamics, involving the quantification of litterfall and its seasonality and the estimation of its decomposition rates; and (c) gas exchange, focusing on measurements of leaf photosynthesis and respiration (including relevant leaf functional traits) and monitoring of soil respiration. These three data domains can be used to comparatively consider the effect of forest management on key ecosystem processes and to constrain local-scale vegetation dynamics models. Full article
(This article belongs to the Section Synthetic and Systems Biology)
Show Figures

Figure 1

41 pages, 1318 KB  
Article
Probabilistic Bit-Similarity-Based Key Agreement Protocol Employing Fuzzy Extraction for Secure and Lightweight Wireless Sensor Networks
by Sofia Sakka, Vasiliki Liagkou, Yannis Stamatiou and Chrysostomos Stylios
J. Cybersecur. Priv. 2026, 6(1), 22; https://doi.org/10.3390/jcp6010022 - 22 Jan 2026
Viewed by 531
Abstract
Wireless sensor networks comprise many resource-constrained nodes that must protect both local readings and routing metadata. The sensors collect data from the environment or from the individual to whom they are attached and transmit it to the nearest gateway node via a wireless [...] Read more.
Wireless sensor networks comprise many resource-constrained nodes that must protect both local readings and routing metadata. The sensors collect data from the environment or from the individual to whom they are attached and transmit it to the nearest gateway node via a wireless network for further delivery to external users. Due to wireless communication, the transmitted messages may be intercepted, rerouted, or even modified by an attacker. Consequently, security and privacy issues are of utmost importance, and the nodes must be protected against unauthorized access during transmission over a public wireless channel. To address these issues, we propose the Probabilistic Bit-Similarity-Based Key Agreement Protocol (PBS-KAP). This novel method enables two nodes to iteratively converge on a shared secret key without transmitting it or relying on pre-installed keys. PBS-KAP enables two nodes to agree on a symmetric session key using probabilistic similarity alignment with explicit key confirmation (MAC). Optimized Garbled Circuits facilitate secure computation with minimal computational and communication overhead, while Secure Sketches combined with Fuzzy Extractors correct residual errors and amplify entropy, producing reliable and uniformly random session keys. The resulting protocol provides a balance between security, privacy, and usability, standing as a practical solution for real-world WSN and IoT applications without imposing excessive computational or communication burdens. Security relies on standard computational assumptions via a one-time elliptic–curve–based base Oblivious Transfer, followed by an IKNP Oblivious Transfer extension and a small garbled threshold circuit. No pre-deployed long-term keys are required. After the bootstrap, only symmetric operations are used. We analyze confidentiality in the semi-honest model. However, entity authentication, though feasible, requires an additional Authenticated Key Exchange step or malicious-secure OT/GC. Under the semi-honest OT/GC assumption, we prove session-key secrecy/indistinguishability; full entity authentication requires an additional AKE binding step or malicious-secure OT/GC. Full article
(This article belongs to the Special Issue Data Protection and Privacy)
Show Figures

Figure 1

22 pages, 3750 KB  
Article
An Improved DHKE-Based Encryption–Decryption Mechanism for Formation Control of MASs Under Hybrid Attacks
by Kairui Liu, Ruimei Zhang and Linli Zhang
Electronics 2026, 15(2), 401; https://doi.org/10.3390/electronics15020401 - 16 Jan 2026
Viewed by 246
Abstract
This work studies the formation control problem of general linear multi-agent systems (MASs) under hybrid attacks that include man-in-the-middle attacks (MITM) and denial-of-service attacks (DoS). First, an improved Diffie–Hellman key exchange (DHKE)-based encryption–decryption mechanism is proposed. This mechanism combines the challenge–response mechanism and [...] Read more.
This work studies the formation control problem of general linear multi-agent systems (MASs) under hybrid attacks that include man-in-the-middle attacks (MITM) and denial-of-service attacks (DoS). First, an improved Diffie–Hellman key exchange (DHKE)-based encryption–decryption mechanism is proposed. This mechanism combines the challenge–response mechanism and hash function, which can achieve identity authentication, detect MITM attacks and ensure the confidentiality and integrity of information. Second, considering that DoS attacks on different channels are independent, a division model for distributed DoS attacks is established, which can classify attacks into different patterns. Third, an edge-based event-triggered (ET) formation control scheme is proposed. This control method only relies on the information of neighbor agents, which not only saves communication resources but also resists distributed DoS attacks. Finally, sufficient conditions for the implementation of formation control for MASs under hybrid attacks are provided, and the effectiveness and advantages of the proposed strategy are verified by simulation. Full article
(This article belongs to the Special Issue Multi-Agent Systems: Applications and Directions)
Show Figures

Figure 1

Back to TopTop