You are currently viewing a new version of our website. To view the old version click .

58 Results Found

  • Article
  • Open Access
6 Citations
2,455 Views
16 Pages

The massive connectivity requirement and security issues have become major factors restricting the further development of the Internet of Things. Nonorthogonal multiple access (NOMA) can be combined with physical layer security (PLS) to achieve massi...

  • Article
  • Open Access
5 Citations
4,029 Views
16 Pages

Physical Layer Intercept Probability in Wireless Sensor Networks over Fisher–Snedecor \({\mathcal{F}}\) Fading Channels

  • Srđan Maričić,
  • Nenad Milošević,
  • Dejan Drajić,
  • Dejan Milić and
  • Jelena Anastasov

In this paper, we analyze the physical layer security (PLS) of an arbitrarily dimensioned wireless sensor network (WSN) in the presence of an unauthorized attacker. Various scheduling schemes have been exploited in order to enhance the secure transmi...

  • Article
  • Open Access
5 Citations
3,597 Views
15 Pages

Implications of Coding Layers on Physical-Layer Security: A Secrecy Benefit Approach

  • Willie K. Harrison,
  • Elise Beard,
  • Scott Dye,
  • Erin Holmes,
  • Kaela Nelson,
  • Marco A. C. Gomes and
  • João P. Vilela

1 August 2019

In this work, we consider the pros and cons of using various layers of keyless coding to achieve secure and reliable communication over the Gaussian wiretap channel. We define a new approach to information theoretic security, called practical secrecy...

  • Article
  • Open Access
27 Citations
7,456 Views
25 Pages

4 December 2012

Energy security is a difficult issue to evaluate due to its polysemic and multifaceted nature. Recent studies have evaluated energy security by considering a multitude of dimensions (i.e., availability, affordability, etc.). However, these works lack...

  • Article
  • Open Access
2 Citations
2,340 Views
20 Pages

Optimizing Conduit Hydropower Potential by Determining Pareto-Optimal Trade-Off Curve

  • Marco van Dijk,
  • Stefanus Johannes van Vuuren,
  • Giovanna Cavazzini,
  • Chantel Monica Niebuhr and
  • Alberto Santolin

28 June 2022

In numerous locations of bulk water supply/distribution systems, energy is dissipated by pressure-reducing devices, whereas it could be recovered by means of turbines or pumps as turbines. These pipe systems, owned and operated by municipalities, wat...

  • Article
  • Open Access
2 Citations
4,571 Views
23 Pages

Modern database systems are critical for storing sensitive information but are increasingly targeted by cyber threats, including SQL injection (SQLi) attacks. This research proposes a robust security framework leveraging Docker-based virtualisation t...

  • Article
  • Open Access
19 Citations
6,985 Views
15 Pages

3 April 2015

The imperative need for unconditional secure key exchange is expounded by the increasing connectivity of networks and by the increasing number and level of sophistication of cyberattacks. Two concepts that are theoretically information-secure are qua...

  • Article
  • Open Access
16 Citations
3,553 Views
19 Pages

14 August 2017

The large capacity transmission of power over long distance and the rapid development of renewable energy increase the probability of unexpected emergencies such as overload and under-voltage. To tackle these emergencies and defend future disturbance...

  • Article
  • Open Access
9 Citations
2,521 Views
25 Pages

3 April 2024

In the mobile edge computing (MEC) environment, the edge caching can provide the timely data response service for the intelligent scenarios. However, due to the limited storage capacity of edge nodes and the malicious node behavior, the question of h...

  • Article
  • Open Access
6 Citations
1,927 Views
23 Pages

25 September 2023

In this paper, we optimize the secrecy capacity of the legitimate user under resource allocation and security constraints for a multi-antenna environment for the simultaneous transmission of wireless information and power in a dynamic downlink scenar...

  • Proceeding Paper
  • Open Access
982 Views
8 Pages

9 September 2025

Cervical cancer has emerged as the most prevalent and deadly illness affecting women across the globe. Researchers are trying their best to detect this life-threatening illness accurately. In view of this only, machine learning approaches, multiple m...

  • Article
  • Open Access
1 Citations
1,604 Views
12 Pages

18 December 2024

In this article, we consider an UAV (unmanned aerial vehicle)-assisted free space optical (FSO) secure communication network. Since FSO signal is impossible to detect by eavesdroppers without proper beam alignment and security authentication, a BS em...

  • Article
  • Open Access
4 Citations
3,380 Views
20 Pages

An Efficient Privacy and Anonymity Setup on Hyperledger Fabric for Blockchain-Enabled Internet of Things (IoT) Devices

  • Muhammad Saad,
  • Saqib Ali Haidery,
  • Aavash Bhandari,
  • Muhammad Raheel Bhutta,
  • Dong-Joo Park and
  • Tae-Sun Chung

The rise in IoT (Internet of Things) devices poses a significant security challenge. Maintaining privacy and ensuring anonymity within the system is a sought-after feature with inevitable trade-offs, such as scalability and increased complexity, maki...

  • Article
  • Open Access
26 Citations
12,798 Views
15 Pages

On Improving Reliability of SRAM-Based Physically Unclonable Functions

  • Arunkumar Vijayakumar,
  • Vinay C. Patil and
  • Sandip Kundu

Physically unclonable functions (PUFs) have been touted for their inherent resistance to invasive attacks and low cost in providing a hardware root of trust for various security applications. SRAM PUFs in particular are popular in industry for key/ID...

  • Article
  • Open Access
360 Views
19 Pages

Assessment of Distribution Network Hosting Capacity Incorporating Multiple Uncertainty Factors

  • Haitao Liu,
  • Jinxiong He,
  • Liuyi Deng,
  • Jianyuan Xu and
  • Yikai Chen

18 November 2025

The integration of distributed generation (DG) and electric vehicles (EVs) introduces significant uncertainties, challenging traditional deterministic methods for assessing distribution network hosting capacity. This paper proposes a novel hosting ca...

  • Review
  • Open Access
5 Citations
5,234 Views
21 Pages

21 March 2025

Enterprise networking optimization has become crucial recently due to increasing demand for a secure, adaptable, reliable, and interoperable network infrastructure. Novel techniques to optimize network security and toimprove scalability and efficienc...

  • Review
  • Open Access
3,390 Views
59 Pages

Energy-Efficient Strategies in Wireless Body Area Networks: A Comprehensive Survey

  • Marwa Boumaiz,
  • Mohammed El Ghazi,
  • Anas Bouayad,
  • Younes Balboul and
  • Moulhime El Bekkali

29 August 2025

Wireless body area networks (WBANs) are a pivotal solution for continuous health monitoring, but their energy constraints pose a significant challenge for long-term operation. This paper provides a comprehensive review of state-of-the-art energy-effi...

  • Article
  • Open Access
37 Citations
13,069 Views
15 Pages

Access to reliable and affordable energy is vital for sustainable development. In the off-grid areas of developing countries, decentralized energy solutions have received increasing attention due to their contributions to reducing poverty. However, m...

  • Article
  • Open Access
36 Citations
3,910 Views
29 Pages

Efficient Image Encryption Scheme Using Novel 1D Multiparametric Dynamical Tent Map and Parallel Computing

  • Achraf Daoui,
  • Mohamed Yamni,
  • Samia Allaoua Chelloug,
  • Mudasir Ahmad Wani and
  • Ahmed A. Abd El-Latif

24 March 2023

In order to ensure reliable and secure image exchange, chaotic systems are often considered for their good performance in information security. In this work, we first propose an extended version of a chaotic tent map (TM)—the multiparametric 1D...

  • Article
  • Open Access
727 Views
26 Pages

24 May 2025

Multi-hop inter-domain wireless networks play a vital role in future heterogeneous communication systems by improving data transmission efficiency and security assurance. Despite the advances in secure routing techniques in areas such as node authent...

  • Article
  • Open Access
812 Views
41 Pages

27 November 2025

Climate change is intensifying droughts and threatening water security worldwide, particularly in arid and semi-arid regions. Israel’s innovative response has been to integrate large-scale desalination into its water supply and climate resilien...

  • Article
  • Open Access
2 Citations
3,452 Views
21 Pages

A PUF-Based Key Storage Scheme Using Fuzzy Vault

  • Jinrong Yang,
  • Shuai Chen and
  • Yuan Cao

26 March 2023

Physical Unclonable Functions (PUFs) are considered attractive low-cost security anchors in the key generation scheme. The helper data algorithm is usually used to transform the fuzzy responses extracted from PUF into a reproducible key. The generate...

  • Article
  • Open Access
10 Citations
3,463 Views
27 Pages

19 April 2023

Due to the enormous amounts of data being generated between users, Intelligent Transportation Systems (ITS) are complex Cyber-Physical Systems that necessitate a reliable and safe infrastructure. Internet of Vehicles (IoV) is the term that describes...

  • Article
  • Open Access
13 Citations
3,908 Views
16 Pages

14 December 2020

Authentication has three basic factors—knowledge, ownership, and inherence. Biometrics is considered as the inherence factor and is widely used for authentication due to its conveniences. Biometrics consists of static biometrics (physical chara...

  • Article
  • Open Access
4 Citations
2,709 Views
27 Pages

Application of Attribute-Based Encryption in Military Internet of Things Environment

  • Łukasz Pióro,
  • Jakub Sychowiec,
  • Krzysztof Kanciak and
  • Zbigniew Zieliński

10 September 2024

The Military Internet of Things (MIoT) has emerged as a new research area in military intelligence. The MIoT frequently has to constitute a federation-capable IoT environment when the military needs to interact with other institutions and organizatio...

  • Article
  • Open Access
1 Citations
1,525 Views
28 Pages

29 September 2024

Wireless hierarchical federated learning (WHFL) is an implementation of wireless federated Learning (WFL) on a cloud–edge–client hierarchical architecture that accelerates model training and achieves more favorable trade-offs between comm...

  • Article
  • Open Access
5 Citations
3,844 Views
21 Pages

26 December 2018

This paper investigates secure communications of energy harvesting untrusted relay networks, where the destination assists jamming signal to prevent the untrusted relay from eavesdropping and to improve the forwarding ability of the energy constraine...

  • Article
  • Open Access
1 Citations
2,080 Views
36 Pages

The Internet of Vehicles (IoV) presents a vast opportunity for optimised traffic flow, road safety, and enhanced usage experience with the influence of Federated Learning (FL). However, the distributed nature of IoV networks creates certain inherent...

  • Article
  • Open Access
12 Citations
5,813 Views
12 Pages

High Throughput PRESENT Cipher Hardware Architecture for the Medical IoT Applications

  • Jamunarani Damodharan,
  • Emalda Roslin Susai Michael and
  • Nasir Shaikh-Husin

The Internet of Things (IoT) is an intelligent technology applied to various fields like agriculture, healthcare, automation, and defence. Modern medical electronics is also one such field that relies on IoT. Execution time, data security, power, and...

  • Article
  • Open Access
5 Citations
3,870 Views
16 Pages

Quantum key distribution (QKD) can protect the exchange process of confidential information between communicating parties. By using the basic principles of quantum mechanics and combined with “one-time pad” cipher encryption, information...

  • Article
  • Open Access
19 Citations
3,471 Views
24 Pages

Rapid Restoration Techniques for Software-Defined Networks

  • Ali Malik,
  • Ruairí de Fréin and
  • Benjamin Aziz

14 May 2020

There is increasing demand in modern day business applications for communication networks to be robust and reliable due to the complexity and critical nature of such applications. As such, data delivery is expected to be reliable and secure even in t...

  • Article
  • Open Access
27 Citations
3,108 Views
23 Pages

2 March 2023

Liaoning Province, as an old industrial urban agglomeration since the founding of China, is an important link between the Bohai Economic Zone and the Northeast Economic Zone, and it has made great contributions to the economic development of China. T...

  • Article
  • Open Access
22 Citations
7,714 Views
30 Pages

21 October 2011

In view of the great contribution of coal-fired units to CO2 emissions, the coupled coal and power system with consideration of CO2 mitigation is a typical sub-system of the highly emitting Chinese energy system for low-carbon studies. In this study,...

  • Review
  • Open Access
6 Citations
10,578 Views
49 Pages

Evaluating Trustworthiness in AI: Risks, Metrics, and Applications Across Industries

  • Aleksandra Nastoska,
  • Bojana Jancheska,
  • Maryan Rizinski and
  • Dimitar Trajanov

Ensuring the trustworthiness of artificial intelligence (AI) systems is critical as they become increasingly integrated into domains like healthcare, finance, and public administration. This paper explores frameworks and metrics for evaluating AI tru...

  • Review
  • Open Access
1,014 Views
22 Pages

5 November 2025

Federated Learning (FL) has emerged as a promising framework for multi-institutional medical artificial intelligence, enabling collaborative model development while preserving data privacy and security. Despite increasing research on federated approa...

  • Article
  • Open Access
362 Views
16 Pages

23 November 2025

Developing conductive hydrogels that balance high conductivity, stretchability, transparency, and sensitivity for next-generation wearable sensors remains challenging due to inherent trade-offs. This study introduces a straightforward approach to fab...

  • Article
  • Open Access
1,021 Views
16 Pages

20 August 2025

Droughts present persistent and severe challenges to the security of regional water supplies, particularly in arid and semiarid regions such as northern China. Traditional reservoir operation models that prioritize water supply reliability or economi...

  • Review
  • Open Access
2 Citations
4,057 Views
19 Pages

Traditional vs. Modern Data Paths: A Comprehensive Survey

  • Ahmad Barghash,
  • Lina Hammad and
  • Ammar Gharaibeh

31 August 2022

Recently, many new network paths have been introduced while old paths are still in use. The trade-offs remain vague and should be further addressed. Since last decade, the Internet is playing a major role in people’s lives, and the demand on th...

  • Article
  • Open Access
29 Citations
4,930 Views
16 Pages

8 August 2024

Particularly in Internet of Things (IoT) scenarios, the rapid growth and diversity of network traffic pose a growing challenge to network intrusion detection systems (NIDs). In this work, we perform a comparative analysis of lightweight machine learn...

  • Article
  • Open Access
44 Citations
10,017 Views
18 Pages

5 January 2016

Dynamic monitoring of the spatial pattern of winter continuously flooded paddies (WFP) at regional scales is a challenging but highly necessary process in analyzing trace greenhouse gas emissions, water resource management, and food security. The pre...

  • Article
  • Open Access
15 Citations
3,471 Views
20 Pages

AUV-Aided Optical—Acoustic Hybrid Data Collection Based on Deep Reinforcement Learning

  • Fanfeng Bu,
  • Hanjiang Luo,
  • Saisai Ma,
  • Xiang Li,
  • Rukhsana Ruby and
  • Guangjie Han

4 January 2023

Autonomous underwater vehicles (AUVs)-assisted mobile data collection in underwater wireless sensor networks (UWSNs) has received significant attention because of their mobility and flexibility. To satisfy the increasing demand of diverse application...

  • Article
  • Open Access
2,140 Views
27 Pages

27 July 2025

The global transition to clean energy necessitates integrated solutions that ensure both environmental sustainability and energy security. This paper proposes a scenario-based modeling framework for urban hybrid energy systems combining small modular...

  • Article
  • Open Access
3 Citations
1,136 Views
37 Pages

Design Analysis for a Distributed Business Innovation System Employing Generated Expert Profiles, Matchmaking, and Blockchain Technology

  • Adrian Alexandrescu,
  • Delia-Elena Bărbuță,
  • Cristian Nicolae Buțincu,
  • Alexandru Archip,
  • Silviu-Dumitru Pavăl,
  • Cătălin Mironeanu and
  • Gabriel-Alexandru Scînteie

14 April 2025

Innovation ecosystems often face challenges such as inadequate coordination, insufficient protection of intellectual property, limited access to quality expertise, and inefficient matchmaking between innovators and experts. This paper provides an in-...

  • Article
  • Open Access
2 Citations
1,878 Views
18 Pages

Bootstrap and MRCD Estimators in Hotelling’s T2 Control Charts for Precise Intrusion Detection

  • Ichwanul Kahfi Prasetya,
  • Muhammad Ahsan,
  • Muhammad Mashuri and
  • Muhammad Hisyam Lee

6 September 2024

Intrusion detection systems (IDS) are crucial in safeguarding network security by identifying unauthorized access attempts through various techniques. Statistical Process Control (SPC), particularly Hotelling’s T2 control charts, is noted for m...

  • Review
  • Open Access
1 Citations
2,022 Views
39 Pages

18 July 2025

Incremental energy demand, environmental constraints, restrictions in the availability of energy resources, economic conditions, and political impact prompt the power sector toward deregulation. In addition to these impediments, electric power compet...

  • Article
  • Open Access
2 Citations
1,851 Views
27 Pages

Proof-of-Friendship Consensus Mechanism for Resilient Blockchain Technology

  • Jims Marchang,
  • Rengaprasad Srikanth,
  • Solan Keishing and
  • Indranee Kashyap

Traditional blockchain consensus mechanisms, such as Proof of Work (PoW) and Proof of Stake (PoS), face significant challenges related to the centralisation of validators and miners, environmental impact, and trustworthiness. While PoW is highly secu...

  • Article
  • Open Access
260 Views
30 Pages

Sensor Placement Optimization for Power Grid Condition Monitoring Based on a Backup Coverage Model: A Case Study of Guangzhou

  • Yuhang E,
  • Dachuan Xu,
  • Shijie Li,
  • Yanjie Zhao,
  • Zhaoping Liu,
  • Cheng Su,
  • Haojian Liang,
  • Xiaohan Jiang,
  • Linshuang Cui and
  • Shaohua Wang

27 November 2025

The increasing complexity and vulnerability of urban power grids necessitate advanced monitoring systems to ensure operational reliability and resilience. The optimal placement of sensors is a critical yet challenging task that directly impacts the e...

  • Review
  • Open Access
490 Views
49 Pages

28 November 2025

Federated Learning (FL) offers a promising way to train machine learning models collaboratively on decentralized edge devices, addressing key privacy, communication, and regulatory challenges in smart city environments. This survey adopts a narrative...

  • Article
  • Open Access
1 Citations
1,393 Views
22 Pages

23 May 2025

Vibration test jigs are essential components for evaluating the dynamic performance and durability of automotive parts, such as lamps. This study aimed to derive optimal jig configurations that simultaneously maximize natural frequency and minimize s...

  • Article
  • Open Access
7 Citations
2,837 Views
15 Pages

Inter-Multilevel Super-Orthogonal Space–Time Coding Scheme for Reliable ZigBee-Based IoMT Communications

  • Shang-Chih Ma,
  • Mohammad Alkhaleefah,
  • Yang-Lang Chang,
  • Joon Huang Chuah,
  • Wen-Yen Chang,
  • Chiung-Shen Ku,
  • Meng-Che Wu and
  • Lena Chang

31 March 2022

The Internet of Things (IoT) technology has revolutionized the healthcare industry by enabling a new paradigm for healthcare delivery. This paradigm is known as the Internet of Medical Things (IoMT). IoMT devices are typically connected via a wide ra...

of 2