Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (1,530)

Search Parameters:
Keywords = secure preservation

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
58 pages, 1897 KiB  
Review
Fabrication and Application of Bio-Based Natural Polymer Coating/Film for Food Preservation: A Review
by Nosipho P. Mbonambi, Jerry O. Adeyemi, Faith Seke and Olaniyi A. Fawole
Processes 2025, 13(8), 2436; https://doi.org/10.3390/pr13082436 (registering DOI) - 1 Aug 2025
Abstract
Food waste has emerged as a critical worldwide concern, resulting in environmental deterioration and economic detriment. Bio-based natural polymer coatings and films have emerged as a sustainable solution to food preservation challenges, particularly in reducing postharvest losses and extending shelf life. Compared to [...] Read more.
Food waste has emerged as a critical worldwide concern, resulting in environmental deterioration and economic detriment. Bio-based natural polymer coatings and films have emerged as a sustainable solution to food preservation challenges, particularly in reducing postharvest losses and extending shelf life. Compared to their synthetic counterparts, these polymers, such as chitosan, starch, cellulose, proteins, and alginate, are derived from renewable sources that are biodegradable, safe, and functional. Within this context, this review examines the various bio-based natural polymer coatings and films as biodegradable, edible alternatives to conventional packaging solutions. It examines the different fabrication methods, like solution casting, electrospinning, and spray coating, and incorporates antimicrobial agents to enhance performance. Emphasis is placed on their mechanical, barrier, and antimicrobial properties, their application in preserving fresh produce, how they promote food safety and environmental sustainability, and accompanying limitations. This review highlights the importance of bio-based natural polymer coatings and films as a promising, eco-friendly solution to enhancing food quality, safety, and shelf life while addressing global sustainability challenges. Full article
(This article belongs to the Section Food Process Engineering)
Show Figures

Figure 1

22 pages, 6172 KiB  
Article
Ethnomedicinal Properties of Wild Edible Fruit Plants and Their Horticultural Potential Among Indigenous Isan Communities in Roi Et Province, Northeastern Thailand
by Piyaporn Saensouk, Surapon Saensouk, Thawatphong Boonma, Auemporn Junsongduang, Min Khant Naing and Tammanoon Jitpromma
Horticulturae 2025, 11(8), 885; https://doi.org/10.3390/horticulturae11080885 (registering DOI) - 1 Aug 2025
Abstract
Wild edible fruit plants are integral to the cultural, nutritional, medicinal, and economic practices of Indigenous Isan communities in Roi Et Province, northeastern Thailand, a region characterized by plateau and lowland topography and a tropical monsoon climate. This study aimed to document the [...] Read more.
Wild edible fruit plants are integral to the cultural, nutritional, medicinal, and economic practices of Indigenous Isan communities in Roi Et Province, northeastern Thailand, a region characterized by plateau and lowland topography and a tropical monsoon climate. This study aimed to document the diversity, traditional uses, phenology, and conservation status of these species to inform sustainable management and conservation efforts. Field surveys and ethnobotanical interviews with 200 informants (100 men, 100 women; random ages) were conducted across 20 local communities to identify species diversity and usage patterns, while phenological observations and conservation assessments were performed to understand reproductive cycles and species vulnerability between January and December 2023. A total of 68 species from 32 families were recorded, with peak flowering in March–April and fruiting in May–June. Analyses of Species Use Value (0.19–0.48) and Relative Frequency of Citation (0.15–0.44) identified key species with significant roles in food security and traditional medicine. Uvaria rufa had the highest SUV (0.48) and RFC (0.44). Informant consensus on medicinal applications was strong for ailments such as gastrointestinal and lymphatic disorders. Economically important species were also identified, with some contributing notable income through local trade. Conservation proposed one species as Critically Endangered and several others as Vulnerable. The results highlight the need for integrated conservation strategies, including community-based initiatives and recognition of Other Effective area-based Conservation Measures (OECMs), to ensure the preservation of biodiversity, traditional knowledge, and local livelihoods. Full article
(This article belongs to the Section Medicinals, Herbs, and Specialty Crops)
Show Figures

Figure 1

21 pages, 2909 KiB  
Article
Novel Federated Graph Contrastive Learning for IoMT Security: Protecting Data Poisoning and Inference Attacks
by Amarudin Daulay, Kalamullah Ramli, Ruki Harwahyu, Taufik Hidayat and Bernardi Pranggono
Mathematics 2025, 13(15), 2471; https://doi.org/10.3390/math13152471 (registering DOI) - 31 Jul 2025
Abstract
Malware evolution presents growing security threats for resource-constrained Internet of Medical Things (IoMT) devices. Conventional federated learning (FL) often suffers from slow convergence, high communication overhead, and fairness issues in dynamic IoMT environments. In this paper, we propose FedGCL, a secure and efficient [...] Read more.
Malware evolution presents growing security threats for resource-constrained Internet of Medical Things (IoMT) devices. Conventional federated learning (FL) often suffers from slow convergence, high communication overhead, and fairness issues in dynamic IoMT environments. In this paper, we propose FedGCL, a secure and efficient FL framework integrating contrastive graph representation learning for enhanced feature discrimination, a Jain-index-based fairness-aware aggregation mechanism, an adaptive synchronization scheduler to optimize communication rounds, and secure aggregation via homomorphic encryption within a Trusted Execution Environment. We evaluate FedGCL on four benchmark malware datasets (Drebin, Malgenome, Kronodroid, and TUANDROMD) using 5 to 15 graph neural network clients over 20 communication rounds. Our experiments demonstrate that FedGCL achieves 96.3% global accuracy within three rounds and converges to 98.9% by round twenty—reducing required training rounds by 45% compared to FedAvg—while incurring only approximately 10% additional computational overhead. By preserving patient data privacy at the edge, FedGCL enhances system resilience without sacrificing model performance. These results indicate FedGCL’s promise as a secure, efficient, and fair federated malware detection solution for IoMT ecosystems. Full article
Show Figures

Figure 1

36 pages, 2671 KiB  
Article
DIKWP-Driven Artificial Consciousness for IoT-Enabled Smart Healthcare Systems
by Yucong Duan and Zhendong Guo
Appl. Sci. 2025, 15(15), 8508; https://doi.org/10.3390/app15158508 (registering DOI) - 31 Jul 2025
Abstract
This study presents a DIKWP-driven artificial consciousness framework for IoT-enabled smart healthcare, integrating a Data–Information–Knowledge–Wisdom–Purpose (DIKWP) cognitive architecture with a software-defined IoT infrastructure. The proposed system deploys DIKWP agents at edge and cloud nodes to transform raw sensor data into high-level knowledge and [...] Read more.
This study presents a DIKWP-driven artificial consciousness framework for IoT-enabled smart healthcare, integrating a Data–Information–Knowledge–Wisdom–Purpose (DIKWP) cognitive architecture with a software-defined IoT infrastructure. The proposed system deploys DIKWP agents at edge and cloud nodes to transform raw sensor data into high-level knowledge and purpose-driven actions. This is achieved through a structured DIKWP pipeline—from data acquisition and information processing to knowledge extraction, wisdom inference, and purpose-driven decision-making—that enables semantic reasoning, adaptive goal-driven responses, and privacy-preserving decision-making in healthcare environments. The architecture integrates wearable sensors, edge computing nodes, and cloud services to enable dynamic task orchestration and secure data fusion. For evaluation, a smart healthcare scenario for early anomaly detection (e.g., arrhythmia and fever) was implemented using wearable devices with coordinated edge–cloud analytics. Simulated experiments on synthetic vital sign datasets achieved approximately 98% anomaly detection accuracy and up to 90% reduction in communication overhead compared to cloud-centric solutions. Results also demonstrate enhanced explainability via traceable decisions across DIKWP layers and robust performance under intermittent connectivity. These findings indicate that the DIKWP-driven approach can significantly advance IoT-based healthcare by providing secure, explainable, and adaptive services aligned with clinical objectives and patient-centric care. Full article
(This article belongs to the Special Issue IoT in Smart Cities and Homes, 2nd Edition)
Show Figures

Figure 1

16 pages, 2174 KiB  
Article
TwinFedPot: Honeypot Intelligence Distillation into Digital Twin for Persistent Smart Traffic Security
by Yesin Sahraoui, Abdessalam Mohammed Hadjkouider, Chaker Abdelaziz Kerrache and Carlos T. Calafate
Sensors 2025, 25(15), 4725; https://doi.org/10.3390/s25154725 (registering DOI) - 31 Jul 2025
Abstract
The integration of digital twins (DTs) with intelligent traffic systems (ITSs) holds strong potential for improving real-time management in smart cities. However, securing digital twins remains a significant challenge due to the dynamic and adversarial nature of cyber–physical environments. In this work, we [...] Read more.
The integration of digital twins (DTs) with intelligent traffic systems (ITSs) holds strong potential for improving real-time management in smart cities. However, securing digital twins remains a significant challenge due to the dynamic and adversarial nature of cyber–physical environments. In this work, we propose TwinFedPot, an innovative digital twin-based security architecture that combines honeypot-driven data collection with Zero-Shot Learning (ZSL) for robust and adaptive cyber threat detection without requiring prior sampling. The framework leverages Inverse Federated Distillation (IFD) to train the DT server, where edge-deployed honeypots generate semantic predictions of anomalous behavior and upload soft logits instead of raw data. Unlike conventional federated approaches, TwinFedPot reverses the typical knowledge flow by distilling collective intelligence from the honeypots into a central teacher model hosted on the DT. This inversion allows the system to learn generalized attack patterns using only limited data, while preserving privacy and enhancing robustness. Experimental results demonstrate significant improvements in accuracy and F1-score, establishing TwinFedPot as a scalable and effective defense solution for smart traffic infrastructures. Full article
Show Figures

Figure 1

24 pages, 1537 KiB  
Article
Privacy-Aware Hierarchical Federated Learning in Healthcare: Integrating Differential Privacy and Secure Multi-Party Computation
by Jatinder Pal Singh, Aqsa Aqsa, Imran Ghani, Raj Sonani and Vijay Govindarajan
Future Internet 2025, 17(8), 345; https://doi.org/10.3390/fi17080345 (registering DOI) - 31 Jul 2025
Abstract
The development of big data analytics in healthcare has created a demand for privacy-conscious and scalable machine learning algorithms that can allow the use of patient information across different healthcare organizations. In this study, the difficulties that come with traditional federated learning frameworks [...] Read more.
The development of big data analytics in healthcare has created a demand for privacy-conscious and scalable machine learning algorithms that can allow the use of patient information across different healthcare organizations. In this study, the difficulties that come with traditional federated learning frameworks in healthcare sectors, such as scalability, computational effectiveness, and preserving patient privacy for numerous healthcare systems, are discussed. In this work, a new conceptual model known as Hierarchical Federated Learning (HFL) for large, integrated healthcare organizations that include several institutions is proposed. The first level of aggregation forms regional centers where local updates are first collected and then sent to the second level of aggregation to form the global update, thus reducing the message-passing traffic and improving the scalability of the HFL architecture. Furthermore, the HFL framework leveraged more robust privacy characteristics such as Local Differential Privacy (LDP), Gaussian Differential Privacy (GDP), Secure Multi-Party Computation (SMPC) and Homomorphic Encryption (HE). In addition, a Novel Aggregated Gradient Perturbation Mechanism is presented to alleviate noise in model updates and maintain privacy and utility. The performance of the proposed HFL framework is evaluated on real-life healthcare datasets and an artificial dataset created using Generative Adversarial Networks (GANs), showing that the proposed HFL framework is better than other methods. Our approach provided an accuracy of around 97% and 30% less privacy leakage compared to the existing models of FLBM-IoT and PPFLB. The proposed HFL approach can help to find the optimal balance between privacy and model performance, which is crucial for healthcare applications and scalable and secure solutions. Full article
(This article belongs to the Special Issue Security and Privacy in AI-Powered Systems)
Show Figures

Graphical abstract

35 pages, 4050 KiB  
Article
Blockchain-Based Secure and Reliable High-Quality Data Risk Management Method
by Chuan He, Yunfan Wang, Tao Zhang, Fuzhong Hao and Yuanyuan Ma
Electronics 2025, 14(15), 3058; https://doi.org/10.3390/electronics14153058 - 30 Jul 2025
Abstract
The collaborative construction of large-scale, diverse datasets is crucial for developing high-performance machine learning models. However, this collaboration faces significant challenges, including ensuring data security, protecting participant privacy, maintaining high dataset quality, and aligning economic incentives among multiple stakeholders. Effective risk management strategies [...] Read more.
The collaborative construction of large-scale, diverse datasets is crucial for developing high-performance machine learning models. However, this collaboration faces significant challenges, including ensuring data security, protecting participant privacy, maintaining high dataset quality, and aligning economic incentives among multiple stakeholders. Effective risk management strategies are essential to systematically identify, assess, and mitigate potential risks associated with data collaboration. This study proposes a federated blockchain-based framework designed to manage multiparty dataset collaborations securely and transparently, explicitly incorporating comprehensive risk management practices. The proposed framework involves six core entities—key distribution center (KDC), researcher (RA), data owner (DO), consortium blockchain, dataset evaluation platform, and the orchestrating model itself—to ensure secure, privacy-preserving and high-quality dataset collaboration. In addition, the framework uses blockchain technology to guarantee the traceability and immutability of data transactions, integrating token-based incentives to encourage data contributors to provide high-quality datasets. To systematically mitigate dataset quality risks, we introduced an innovative categorical dataset quality assessment method leveraging label reordering to robustly evaluate datasets. We validated this quality assessment approach using both publicly available (UCI) and privately constructed datasets. Furthermore, our research implemented the proposed blockchain-based management system within a consortium blockchain infrastructure, benchmarking its performance against existing methods to demonstrate enhanced security, reliability, risk mitigation effectiveness, and incentive alignment in dataset collaboration. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

24 pages, 1806 KiB  
Article
Optimization of Cleaning and Hygiene Processes in Healthcare Using Digital Technologies and Ensuring Quality Assurance with Blockchain
by Semra Tebrizcik, Süleyman Ersöz, Elvan Duman, Adnan Aktepe and Ahmet Kürşad Türker
Appl. Sci. 2025, 15(15), 8460; https://doi.org/10.3390/app15158460 - 30 Jul 2025
Abstract
Many hospitals still lack digital traceability in hygiene and cleaning management, leading to operational inefficiencies and inconsistent quality control. This study aims to establish cleaning and hygiene processes in healthcare services that are planned in accordance with standards, as well as to enhance [...] Read more.
Many hospitals still lack digital traceability in hygiene and cleaning management, leading to operational inefficiencies and inconsistent quality control. This study aims to establish cleaning and hygiene processes in healthcare services that are planned in accordance with standards, as well as to enhance the traceability and sustainability of these processes through digitalization. This study proposes a Hyperledger Fabric-based blockchain architecture to establish a reliable and transparent quality assurance system in process management. The proposed Quality Assurance Model utilizes digital technologies and IoT-based RFID devices to ensure the transparent and reliable monitoring of cleaning processes. Operational data related to cleaning processes are automatically recorded and secured using a decentralized blockchain infrastructure. The permissioned nature of Hyperledger Fabric provides a more secure solution compared to traditional data management systems in the healthcare sector while preserving data privacy. Additionally, the execute–order–validate mechanism supports effective data sharing among stakeholders, and consensus algorithms along with chaincode rules enhance the reliability of processes. A working prototype was implemented and validated using Hyperledger Caliper under resource-constrained cloud environments, confirming the system’s feasibility through over 100 TPS throughput and zero transaction failures. Through the proposed system, cleaning/hygiene processes in patient rooms are conducted securely, contributing to the improvement of quality standards in healthcare services. Full article
Show Figures

Figure 1

31 pages, 1317 KiB  
Article
Privacy-Preserving Clinical Decision Support for Emergency Triage Using LLMs: System Architecture and Real-World Evaluation
by Alper Karamanlıoğlu, Berkan Demirel, Onur Tural, Osman Tufan Doğan and Ferda Nur Alpaslan
Appl. Sci. 2025, 15(15), 8412; https://doi.org/10.3390/app15158412 - 29 Jul 2025
Viewed by 190
Abstract
This study presents a next-generation clinical decision-support architecture for Clinical Decision Support Systems (CDSS) focused on emergency triage. By integrating Large Language Models (LLMs), Federated Learning (FL), and low-latency streaming analytics within a modular, privacy-preserving framework, the system addresses key deployment challenges in [...] Read more.
This study presents a next-generation clinical decision-support architecture for Clinical Decision Support Systems (CDSS) focused on emergency triage. By integrating Large Language Models (LLMs), Federated Learning (FL), and low-latency streaming analytics within a modular, privacy-preserving framework, the system addresses key deployment challenges in high-stakes clinical settings. Unlike traditional models, the architecture processes both structured (vitals, labs) and unstructured (clinical notes) data to enable context-aware reasoning with clinically acceptable latency at the point of care. It leverages big data infrastructure for large-scale EHR management and incorporates digital twin concepts for live patient monitoring. Federated training allows institutions to collaboratively improve models without sharing raw data, ensuring compliance with GDPR/HIPAA, and FAIR principles. Privacy is further protected through differential privacy, secure aggregation, and inference isolation. We evaluate the system through two studies: (1) a benchmark of 750+ USMLE-style questions validating the medical reasoning of fine-tuned LLMs; and (2) a real-world case study (n = 132, 75.8% first-pass agreement) using de-identified MIMIC-III data to assess triage accuracy and responsiveness. The system demonstrated clinically acceptable latency and promising alignment with expert judgment on reviewed cases. The infectious disease triage case demonstrates low-latency recognition of sepsis-like presentations in the ED. This work offers a scalable, audit-compliant, and clinician-validated blueprint for CDSS, enabling low-latency triage and extensibility across specialties. Full article
(This article belongs to the Special Issue Large Language Models: Transforming E-health)
Show Figures

Figure 1

13 pages, 5152 KiB  
Article
FEM-Based Design and Micromachining of a Ratchet Click Mechanism in Mechanical Watch Movements
by Alessandro Metelli, Giuseppe Soardi, Andrea Abeni and Aldo Attanasio
Micromachines 2025, 16(8), 875; https://doi.org/10.3390/mi16080875 - 29 Jul 2025
Viewed by 164
Abstract
The ratchet click mechanism in mechanical watch movements is a micro-component essential to prevent the unwinding of the caliber mainspring, providing secure energy storage during recharging. Despite its geometrical simplicity, the ratchet click undergoes to a complex distribution of stress, elevated strains, and [...] Read more.
The ratchet click mechanism in mechanical watch movements is a micro-component essential to prevent the unwinding of the caliber mainspring, providing secure energy storage during recharging. Despite its geometrical simplicity, the ratchet click undergoes to a complex distribution of stress, elevated strains, and cyclical mechanical deformations, affecting its long-term reliability. Despite being a crucial element in all mechanical watch movements, the non-return system appears to have been overlooked in scientific literature, with no studies available on its design, modeling, and micromachining. In this work, we introduce a novel Finite Element Method (FEM) -based design strategy for the ratchet click, systematically refining its geometry and dimensional parameters to minimize peak stress and improve durability. A mechanical simulation model was created to simulate the boundary conditions, contact interactions, and stress distributions on the part. If compared with the standard component, the optimized design exhibits a decrease in peak stress values. The mechanism was micro-machined, and it was experimentally tested to validate the numerical model outputs. The integrated digital–physical approach not only underscores the scientific contribution of coupling advanced simulation with experimental validation of complex micromechanisms but also provides a generalizable method for enhancing performance of micro-mechanical components while preserving their historical design heritage. Full article
Show Figures

Figure 1

32 pages, 3956 KiB  
Article
Privacy-Preserving Federated Unlearning with Ontology-Guided Relevance Modeling for Secure Distributed Systems
by Naglaa E. Ghannam and Esraa A. Mahareek
Future Internet 2025, 17(8), 335; https://doi.org/10.3390/fi17080335 - 27 Jul 2025
Viewed by 150
Abstract
Federated Learning (FL) is a privacy-focused technique for training models; however, most existing unlearning techniques in FL fall significantly short of the efficiency and situational awareness required by the GDPR. The paper introduces two new unlearning methods: EG-FedUnlearn, a gradient-based technique that eliminates [...] Read more.
Federated Learning (FL) is a privacy-focused technique for training models; however, most existing unlearning techniques in FL fall significantly short of the efficiency and situational awareness required by the GDPR. The paper introduces two new unlearning methods: EG-FedUnlearn, a gradient-based technique that eliminates the effect of specific target clients without retraining, and OFU-Ontology, an ontology-based approach that ranks data importance to facilitate forgetting contextually. EG-FedUnlearn directly eliminates the contributions of specific target data by reversing the gradient, whereas OFU-Ontology utilizes semantic relevance to prioritize forgetting data of the least importance, thereby minimizing the unlearning-induced degradation of models. The results of experiments on seven benchmark datasets demonstrate the good performance of both algorithms. OFU-Ontology yields 98% accuracy of unlearning while maintaining high model utility with very limited accuracy loss under class-based deletion on MNIST (e.g., 95%), surpassing FedEraser and VeriFi on the multiple metrics of residual influence, communication overhead, and computational cost. These results indicate that the cooperation of efficient unlearning algorithms with semantic reasoning, minimized unlearning costs, and operational performance in a distributed environment. This paper becomes the first to incorporate ontological knowledge into federated unlearning, thereby opening new avenues for scalable and intelligent private machine learning systems. Full article
(This article belongs to the Special Issue Privacy and Security Issues in IoT Systems)
Show Figures

Figure 1

29 pages, 2060 KiB  
Review
Integrated Management Practices Foster Soil Health, Productivity, and Agroecosystem Resilience
by Xiongwei Liang, Shaopeng Yu, Yongfu Ju, Yingning Wang and Dawei Yin
Agronomy 2025, 15(8), 1816; https://doi.org/10.3390/agronomy15081816 - 27 Jul 2025
Viewed by 337
Abstract
Sustainable farmland management is vital for global food security and for mitigating environmental degradation and climate change. While individual practices such as crop rotation and no-tillage are well-documented, this review synthesizes current evidence to illuminate the critical synergistic effects of integrating four key [...] Read more.
Sustainable farmland management is vital for global food security and for mitigating environmental degradation and climate change. While individual practices such as crop rotation and no-tillage are well-documented, this review synthesizes current evidence to illuminate the critical synergistic effects of integrating four key strategies: crop rotation, conservation tillage, organic amendments, and soil microbiome management. Crop rotation enhances nutrient cycling and disrupts pest cycles, while conservation tillage preserves soil structure, reduces erosion, and promotes carbon sequestration. Organic amendments replenish soil organic matter and stimulate biological activity, and a healthy soil microbiome boosts plant resilience to stress and enhances nutrient acquisition through key functional groups like arbuscular mycorrhizal fungi (AMFs). Critically, the integration of these practices yields amplified benefits that far exceed their individual contributions. Integrated management systems not only significantly increase crop yields (by up to 15–30%) and soil organic carbon but also deliver profound global ecosystem services, with a potential to sequester 2.17 billion tons of CO2 and reduce soil erosion by 2.41 billion tons annually. Despite challenges such as initial yield variability, leveraging these synergies through precision agriculture represents the future direction for the field. This review concludes that a holistic, systems-level approach is essential for building regenerative and climate-resilient agroecosystems. Full article
(This article belongs to the Special Issue Advances in Tillage Methods to Improve the Yield and Quality of Crops)
Show Figures

Figure 1

22 pages, 3082 KiB  
Article
A Lightweight Intrusion Detection System with Dynamic Feature Fusion Federated Learning for Vehicular Network Security
by Junjun Li, Yanyan Ma, Jiahui Bai, Congming Chen, Tingting Xu and Chi Ding
Sensors 2025, 25(15), 4622; https://doi.org/10.3390/s25154622 - 25 Jul 2025
Viewed by 282
Abstract
The rapid integration of complex sensors and electronic control units (ECUs) in autonomous vehicles significantly increases cybersecurity risks in vehicular networks. Although the Controller Area Network (CAN) is efficient, it lacks inherent security mechanisms and is vulnerable to various network attacks. The traditional [...] Read more.
The rapid integration of complex sensors and electronic control units (ECUs) in autonomous vehicles significantly increases cybersecurity risks in vehicular networks. Although the Controller Area Network (CAN) is efficient, it lacks inherent security mechanisms and is vulnerable to various network attacks. The traditional Intrusion Detection System (IDS) makes it difficult to effectively deal with the dynamics and complexity of emerging threats. To solve these problems, a lightweight vehicular network intrusion detection framework based on Dynamic Feature Fusion Federated Learning (DFF-FL) is proposed. The proposed framework employs a two-stream architecture, including a transformer-augmented autoencoder for abstract feature extraction and a lightweight CNN-LSTM–Attention model for preserving temporal and local patterns. Compared with the traditional theoretical framework of the federated learning, DFF-FL first dynamically fuses the deep feature representation of each node through the transformer attention module to realize the fine-grained cross-node feature interaction in a heterogeneous data environment, thereby eliminating the performance degradation caused by the difference in feature distribution. Secondly, based on the final loss LAEX,X^ index of each node, an adaptive weight adjustment mechanism is used to make the nodes with excellent performance dominate the global model update, which significantly improves robustness against complex attacks. Experimental evaluation on the CAN-Hacking dataset shows that the proposed intrusion detection system achieves more than 99% F1 score with only 1.11 MB of memory and 81,863 trainable parameters, while maintaining low computational overheads and ensuring data privacy, which is very suitable for edge device deployment. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

23 pages, 16115 KiB  
Article
Image Privacy Protection Communication Scheme by Fibonacci Interleaved Diffusion and Non-Degenerate Discrete Chaos
by Zhiyu Xie, Weihong Xie, Xiyuan Cheng, Zhengqin Yuan, Wenbin Cheng and Yiting Lin
Entropy 2025, 27(8), 790; https://doi.org/10.3390/e27080790 - 25 Jul 2025
Viewed by 135
Abstract
The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to [...] Read more.
The rapid development of network communication technology has led to an increased focus on the security of image storage and transmission in multimedia information. This paper proposes an enhanced image security communication scheme based on Fibonacci interleaved diffusion and non-degenerate chaotic system to address the inadequacy of current image encryption technology. The scheme utilizes a hash function to extract the hash characteristic values of the plaintext image, generating initial perturbation keys to drive the chaotic system to generate initial pseudo-random sequences. Subsequently, the input image is subjected to a light scrambling process at the bit level. The Q matrix generated by the Fibonacci sequence is then employed to diffuse the obtained intermediate cipher image. The final ciphertext image is then generated by random direction confusion. Throughout the encryption process, plaintext correlation mechanisms are employed. Consequently, due to the feedback loop of the plaintext, this algorithm is capable of resisting known-plaintext attacks and chosen-plaintext attacks. Theoretical analysis and empirical results demonstrate that the algorithm fulfils the cryptographic requirements of confusion, diffusion, and avalanche effects, while also exhibiting a robust password space and excellent numerical statistical properties. Consequently, the security enhancement mechanism based on Fibonacci interleaved diffusion and non-degenerate chaotic system proposed in this paper effectively enhances the algorithm’s resistance to cryptographic attacks. Full article
Show Figures

Figure 1

2 pages, 130 KiB  
Correction
Correction: Kumar et al. A Novel Decentralized Blockchain Architecture for the Preservation of Privacy and Data Security Against Cyberattacks in Healthcare. Sensors 2022, 22, 5921
by Ajitesh Kumar, Akhilesh Kumar Singh, Ijaz Ahmad, Pradeep Kumar Singh, Anushree, Pawan Kumar Verma, Khalid A. Alissa, Mohit Bajaj, Ateeq Ur Rehman and Elsayed Tag-Eldin
Sensors 2025, 25(15), 4597; https://doi.org/10.3390/s25154597 - 25 Jul 2025
Viewed by 129
Abstract
In the published publication [...] Full article
(This article belongs to the Section Internet of Things)
Back to TopTop