You are currently viewing a new version of our website. To view the old version click .

387 Results Found

  • Article
  • Open Access
1,047 Views
24 Pages

Privacy-Preserving AI Collaboration on Blockchain Using Aggregate Signatures with Public Key Aggregation

  • Mohammed Abdelhamid Nedioui,
  • Ali Khechekhouche,
  • Konstantinos Karampidis,
  • Giorgos Papadourakis and
  • Talal Guia

2 November 2025

The integration of artificial intelligence (AI) and blockchain technology opens new avenues for decentralized, transparent, and secure data-driven systems. However, ensuring privacy and verifiability in collaborative AI environments remains a key cha...

  • Article
  • Open Access
7 Citations
9,037 Views
18 Pages

As targeted attacks continue to threaten electricity infrastructure, the North American Electricity Reliability Corporation (NERC) and private utilities companies are revising and updating the physical and cybersecurity standards for grid infrastruct...

  • Article
  • Open Access
966 Views
19 Pages

Physics-Informed Multi-Agent DRL-Based Active Distribution Network Zonal Balancing Control Strategy for Security and Supply Preservation

  • Bingxu Zhai,
  • Yuanzhuo Li,
  • Wei Qiu,
  • Rui Zhang,
  • Zhilin Jiang,
  • Wei Wang,
  • Tao Qian and
  • Qinran Hu

4 June 2025

When large-scale and clustered distributed photovoltaic devices are connected to an active distribution network, the safe and stable operation of the distribution network is seriously threatened, and it is difficult to satisfy the demand for preserva...

  • Article
  • Open Access
10 Citations
3,969 Views
16 Pages

Blockchain-Based Secure Firmware Update Using an UAV

  • Jong Wan Seo,
  • Anik Islam,
  • Md Masuduzzaman and
  • Soo Young Shin

This paper proposes a blockchain-based firmware update method using unmanned aerial vehicles (UAVs) to solve one of the security issues arising in the Internet of Things (IoT) environment, which is the firmware security problem. It has high scalabili...

  • Article
  • Open Access
8 Citations
7,987 Views
37 Pages

Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks

  • Farzan Doroodgar,
  • Mohammad Abdur Razzaque and
  • Ismail Fauzi Isnin

11 March 2014

Over-the-air dissemination of code updates in wireless sensor networks have been researchers’ point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majorit...

  • Article
  • Open Access
2,444 Views
18 Pages

The integration of 5G technology with existing LTE architectures has facilitated the widespread adoption of firmware over-the-air (FOTA) updates across Android-based devices, including mobile and automotive infotainment systems. While 5G enhances com...

  • Article
  • Open Access
2,061 Views
22 Pages

12 October 2024

A rapid dynamic security assessment (DSA) is crucial for online preventive and restoration decision-making. The deep learning-based DSA models have high efficiency and accuracy. However, the complex model structure and high training cost make them ha...

  • Article
  • Open Access
328 Views
29 Pages

17 November 2025

In federated learning, secure aggregation is essential to protect the confidentiality of local model updates, ensuring that the server can access only the aggregated result without exposing individual contributions. However, conventional secure aggre...

  • Article
  • Open Access
9 Citations
6,174 Views
39 Pages

Blockchain-Based Security Model for LoRaWAN Firmware Updates

  • Njabulo Sakhile Mtetwa,
  • Paul Tarwireyi,
  • Cecilia Nombuso Sibeko,
  • Adnan Abu-Mahfouz and
  • Matthew Adigun

The Internet of Things (IoT) is changing the way consumers, businesses, and governments interact with the physical and cyber worlds. More often than not, IoT devices are designed for specific functional requirements or use cases without paying too mu...

  • Article
  • Open Access
18 Citations
2,881 Views
25 Pages

1 July 2023

We propose an optimized Clockwork Recurrent Neural Network (CW-RNN) based approach to address temporal dynamics and nonlinearity in network security situations, improving prediction accuracy and real-time performance. By leveraging the clock-cycle RN...

  • Article
  • Open Access
698 Views
24 Pages

28 March 2025

In response to the issues of high transaction transparency and regulatory difficulties in blockchain account-model transactions, this paper presents a supervised blockchain anonymous transaction model based on certificateless signcryption aimed at en...

  • Article
  • Open Access
2 Citations
2,816 Views
31 Pages

30 December 2024

Federated learning (FL) has gained significant attention in distributed machine learning due to its ability to protect data privacy while enabling model training across decentralized data sources. However, traditional FL methods face challenges in en...

  • Review
  • Open Access
41 Citations
11,035 Views
22 Pages

14 December 2020

New generation Industrial Automation and Control Systems (IACS) are providing advanced connectivity features, enabling new automation applications, services and business models in the Industrial Internet of Things (IIoT) era. Nevertheless, due to the...

  • Article
  • Open Access
11 Citations
2,155 Views
21 Pages

A Dynamic Trust Model for Underwater Sensor Networks Fusing Deep Reinforcement Learning and Random Forest Algorithm

  • Beibei Wang,
  • Xiufang Yue,
  • Yonglei Liu,
  • Kun Hao,
  • Zhisheng Li and
  • Xiaofang Zhao

17 April 2024

Underwater acoustic sensor networks (UASNs) are vital for applications like marine environmental monitoring, disaster prediction, and national defense security. Due to the prolonged exposure of underwater sensor nodes in unattended and potentially ho...

  • Article
  • Open Access
27 Citations
6,146 Views
16 Pages

Secure Video Surveillance Framework in Smart City

  • Hao Li,
  • Tianhao Xiezhang,
  • Cheng Yang,
  • Lianbing Deng and
  • Peng Yi

28 June 2021

In the construction process of smart cities, more and more video surveillance systems have been deployed for traffic, office buildings, shopping malls, and families. Thus, the security of video surveillance systems has attracted more attention. At pr...

  • Article
  • Open Access
15 Citations
4,083 Views
13 Pages

25 November 2022

Over-the-air (OTA) updating is a critical mechanism for secure internet of things (IoT) systems for remotely updating the firmware (or keys) of IoT devices. Message queue telemetry transport (MQTT) is a very popular internet of things (IoT) communica...

  • Article
  • Open Access
628 Views
24 Pages

RBAU: Noval Redactable Model with Audit Mechanism and Key Update for Alliance Chain

  • Yineng Chen,
  • Ting Guo,
  • Qingshan Ren,
  • Xiwen Yang,
  • Xiaoxuan Chen,
  • Shukun Liu and
  • Fanzai Zeng

30 April 2025

With the widespread application of alliance chain technology in diverse scenarios, its immutability has gradually revealed certain limitations in practical use. To address this challenge, a redactable alliance chain innovatively introduces functional...

  • Article
  • Open Access
8 Citations
4,323 Views
23 Pages

Cluster-Based Secure Aggregation for Federated Learning

  • Jien Kim,
  • Gunryeong Park,
  • Miseung Kim and
  • Soyoung Park

In order to protect each node’s local learning parameters from model inversion attacks, secure aggregation has become the essential technique for federated learning so that the federated learning server knows only the combined result of all loc...

  • Article
  • Open Access
6 Citations
3,511 Views
34 Pages

18 August 2023

The automotive industry has seen a dynamic transformation from traditional hardware-defined to software-defined architecture enabling higher levels of autonomy and connectivity, better safety and security features, as well as new in-vehicle experienc...

  • Article
  • Open Access
1 Citations
1,161 Views
16 Pages

2 February 2025

IoT-based applications require effective anonymous authentication and key agreement (AKA) protocols to secure data and protect user privacy due to open communication channels and sensitive data. While AKA protocols for these applications have been ex...

  • Article
  • Open Access
1 Citations
1,249 Views
26 Pages

Short-Term Optimal Scheduling of Power Grids Containing Pumped-Storage Power Station Based on Security Quantification

  • Hua Li,
  • Xiangfei Qiu,
  • Qiuyi Xi,
  • Ruogu Wang,
  • Gang Zhang,
  • Yanxin Wang and
  • Bao Zhang

3 September 2024

In order to improve grid security while pursuing a grid operation economy and new energy consumption rates, this paper proposes a short-term optimal scheduling method based on security quantification for the grid containing a pumped-storage power pla...

  • Article
  • Open Access
1 Citations
6,597 Views
32 Pages

Enhancing Data Security Through VLSM Subnetting and TCP/IP Model in an ENT

  • Caxton Okoh,
  • Waba Nasali Theophilus,
  • Paul Dawkins and
  • Sebamalai Paheerathan

26 November 2024

Data in-transit from an at-rest state can be securely transmitted and managed within a network. Background: This work covers the design and simulation of an Enhanced Network Topology (ENT) with multiple components that connects multiple locations of...

  • Article
  • Open Access
1 Citations
2,670 Views
32 Pages

The rapid evolution and deployment of 5G networks have introduced complex security challenges due to their reliance on dynamic network slicing, ultra-low latency communication, decentralized architectures, and highly diverse use cases. Traditional pe...

  • Article
  • Open Access
12 Citations
4,202 Views
14 Pages

8 November 2022

Machine learning (ML) models are now widely used in digital twins of water treatment facilities. These models are commonly trained based on historical datasets, and their predictions serve various important objectives, such as anomaly detection and o...

  • Article
  • Open Access
707 Views
20 Pages

4 December 2025

Over-the-air (OTA) firmware updating has become a fundamental requirement in modern Internet of Things (IoT) deployments, where thousands of heterogeneous embedded devices operate in remote and distributed environments. Manual firmware maintenance in...

  • Article
  • Open Access
8 Citations
5,652 Views
14 Pages

Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing

  • Chen Guo,
  • Xingbing Fu,
  • Yaojun Mao,
  • Guohua Wu,
  • Fagen Li and
  • Ting Wu

28 September 2018

With the advent of cloud computing, more and more users begin to outsource encrypted files to cloud servers to provide convenient access and obtain security guarantees. Searchable encryption (SE) allows a user to search the encrypted files without le...

  • Article
  • Open Access
3 Citations
3,640 Views
21 Pages

A Secure and Privacy-Preserving Approach to Healthcare Data Collaboration

  • Amna Adnan,
  • Firdous Kausar,
  • Muhammad Shoaib,
  • Faiza Iqbal,
  • Ayesha Altaf and
  • Hafiz M. Asif

16 July 2025

Combining a large collection of patient data and advanced technology, healthcare organizations can excel in medical research and increase the quality of patient care. At the same time, health records present serious privacy and security challenges be...

  • Article
  • Open Access
3 Citations
3,563 Views
30 Pages

17 February 2021

Recent years have seen an increasing emphasis on information security, and various encryption methods have been proposed. However, for symmetric encryption methods, the well-known encryption techniques still rely on the key space to guarantee securit...

  • Review
  • Open Access
45 Citations
28,470 Views
29 Pages

Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation Drones

  • Vikas Sihag,
  • Gaurav Choudhary,
  • Pankaj Choudhary and
  • Nicola Dragoni

28 June 2023

Cyber Security and forensics for Unmanned Aerial Vehicles (UAVs) pose unique requirements, solutions, and challenges. As UAVs become increasingly prevalent for legitimate and illegal use, ensuring their security and data integrity is important. Solut...

  • Article
  • Open Access
24 Citations
5,709 Views
20 Pages

30 March 2023

In the post pandemic era, the telecommuting of business employees has widely become acceptable in organizations, which demands extensive dependence on digital technologies. In addition, this poses additional security threats for business employees as...

  • Article
  • Open Access
5 Citations
4,358 Views
15 Pages

Edge-Cloud Collaborative Defense against Backdoor Attacks in Federated Learning

  • Jie Yang,
  • Jun Zheng,
  • Haochen Wang,
  • Jiaxing Li,
  • Haipeng Sun,
  • Weifeng Han,
  • Nan Jiang and
  • Yu-An Tan

17 January 2023

Federated learning has a distributed collaborative training mode, widely used in IoT scenarios of edge computing intelligent services. However, federated learning is vulnerable to malicious attacks, mainly backdoor attacks. Once an edge node implemen...

  • Article
  • Open Access
2 Citations
2,352 Views
19 Pages

9 June 2021

Focusing on the diversified demands of location privacy in mobile social networks (MSNs), we propose a privacy-enhancing k-nearest neighbors search scheme over MSNs. First, we construct a dual-server architecture that incorporates location privacy an...

  • Article
  • Open Access
2 Citations
1,887 Views
24 Pages

Network Security Prediction of Industrial Control Based on Projection Equalization Optimization Algorithm

  • Guoxing Li,
  • Yuhe Wang,
  • Shiming Li,
  • Chao Yang,
  • Qingqing Yang and
  • Yanbin Yuan

20 July 2024

This paper predicts the network security posture of an ICS, focusing on the reliability of Industrial Control Systems (ICSs). Evidence reasoning (ER) and belief rule base (BRB) techniques are employed to establish an ICS network security posture pred...

  • Review
  • Open Access
1 Citations
6,616 Views
39 Pages

Federated learning (FL) is an advanced distributed machine learning method that effectively solves the data silo problem. With the increasing popularity of federated learning and the growing importance of privacy protection, federated learning method...

  • Article
  • Open Access
740 Views
26 Pages

24 May 2025

Multi-hop inter-domain wireless networks play a vital role in future heterogeneous communication systems by improving data transmission efficiency and security assurance. Despite the advances in secure routing techniques in areas such as node authent...

  • Article
  • Open Access
2 Citations
2,058 Views
24 Pages

The development of big data analytics in healthcare has created a demand for privacy-conscious and scalable machine learning algorithms that can allow the use of patient information across different healthcare organizations. In this study, the diffic...

  • Feature Paper
  • Article
  • Open Access
3 Citations
2,650 Views
24 Pages

Cybersecurity Certification Requirements for Distributed Energy Resources: A Survey of SunSpec Alliance Standards

  • Sean Tsikteris,
  • Odyssefs Diamantopoulos Pantaleon and
  • Eirini Eleni Tsiropoulou

9 October 2024

This survey paper explores the cybersecurity certification requirements defined by the SunSpec Alliance for Distributed Energy Resource (DER) devices, focusing on aspects such as software updates, device communications, authentication mechanisms, dev...

  • Article
  • Open Access
9 Citations
6,994 Views
22 Pages

We present the first linkable ring signature scheme with both unconditional anonymity and forward-secure key update: a powerful tool which has direct applications in elegantly addressing a number of simultaneous constraints in remote electronic votin...

  • Article
  • Open Access
649 Citations
108,905 Views
17 Pages

IoT Privacy and Security: Challenges and Solutions

  • Lo’ai Tawalbeh,
  • Fadi Muheidat,
  • Mais Tawalbeh and
  • Muhannad Quwaider

15 June 2020

Privacy and security are among the significant challenges of the Internet of Things (IoT). Improper device updates, lack of efficient and robust security protocols, user unawareness, and famous active device monitoring are among the challenges that I...

  • Article
  • Open Access
1 Citations
1,289 Views
15 Pages

28 September 2024

As technology advances rapidly, a diverse array of Internet of Things (IoT) devices finds widespread application across numerous fields. The intelligent nature of these devices not only gives people more convenience, but also introduces new challenge...

  • Article
  • Open Access
105 Citations
8,511 Views
29 Pages

Deep Learning Based Homomorphic Secure Search-Able Encryption for Keyword Search in Blockchain Healthcare System: A Novel Approach to Cryptography

  • Aitizaz Ali,
  • Muhammad Fermi Pasha,
  • Jehad Ali,
  • Ong Huey Fang,
  • Mehedi Masud,
  • Anca Delia Jurcut and
  • Mohammed A. Alzain

11 January 2022

Due to the value and importance of patient health records (PHR), security is the most critical feature of encryption over the Internet. Users that perform keyword searches to gain access to the PHR stored in the database are more susceptible to secur...

  • Review
  • Open Access
4 Citations
5,540 Views
23 Pages

In the rapidly evolving landscape of drone technology, securing unmanned aerial vehicles (UAVs) presents critical challenges and demands unique solutions. This paper offers a thorough examination of the security requirements, threat models, and solut...

  • Article
  • Open Access
10 Citations
3,327 Views
14 Pages

Secure and Efficient Federated Learning Schemes for Healthcare Systems

  • Cheng Song,
  • Zhichao Wang,
  • Weiping Peng and
  • Nannan Yang

The swift advancement in communication technology alongside the rise of the Medical Internet of Things (IoT) has spurred the extensive adoption of diverse sensor-driven healthcare and monitoring systems. While the rapid development of healthcare syst...

  • Article
  • Open Access
491 Views
23 Pages

19 October 2025

Aiming at the problem that it is difficult to balance security defense and quality of service in a dynamic cloud-native environment, an adaptive dynamic defense strategy (AD2S) for microservices based on deep reinforcement learning is proposed. First...

  • Article
  • Open Access
11 Citations
4,580 Views
15 Pages

Reliable Delay Based Algorithm to Boost PUF Security Against Modeling Attacks

  • Fathi Amsaad,
  • Mohammed Niamat,
  • Amer Dawoud and
  • Selcuk Kose

3 September 2018

Silicon Physical Unclonable Functions (sPUFs) are one of the security primitives and state-of-the-art topics in hardware-oriented security and trust research. This paper presents an efficient and dynamic ring oscillator PUFs (d-ROPUFs) technique to i...

  • Article
  • Open Access
23 Citations
8,121 Views
34 Pages

22 January 2023

Authentication and authorization constitute the essential security component, access control, for preventing unauthorized access to cloud services in mobile cloud computing (MCC) environments. Traditional centralized access control models relying on...

  • Article
  • Open Access
6 Citations
2,607 Views
20 Pages

An Improved Federated Learning-Assisted Data Aggregation Scheme for Smart Grids

  • Bo Pang,
  • Hui-Hui Liang,
  • Ling-Hao Zhang,
  • Yu-Fei Teng,
  • Zheng-Wei Chang,
  • Ze-Wei Liu,
  • Chun-Qiang Hu and
  • Wen-Hao Mou

30 August 2023

In the context of rapid advancements in artificial intelligence (AI) technology, new technologies, such as federated learning and edge computing, have been widely applied in the power Internet of Things (PIoT). When compared to the traditional centra...

  • Article
  • Open Access
5 Citations
3,207 Views
33 Pages

6 September 2024

Privacy must be preserved when working with client data in machine learning. Federated learning (FL) provides a way to preserve user data privacy by aggregating locally trained models without sharing the user data. Still, the privacy of user identity...

  • Article
  • Open Access
6 Citations
5,658 Views
23 Pages

14 November 2024

Federated learning avoids centralizing data in a central server by distributing the model training process across devices, thus protecting privacy to some extent. However, existing research shows that model updates (e.g., gradients or weights) exchan...

  • Article
  • Open Access
3 Citations
1,931 Views
20 Pages

A Secure Secret Key Agreement Scheme among Multiple Twinning Superlattice PUF Holders

  • Jing Liu,
  • Jianguo Xie,
  • Junwei Zhang,
  • Biao Liu,
  • Xiaoming Chen and
  • Huamin Feng

12 May 2023

Modern cryptography attributes the security of a cryptographic system to the security of the key. How to securely distribute the key has always been a bottleneck in key management. This paper proposes a secure group key agreement scheme for multiple...

of 8