Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (2,157)

Search Parameters:
Keywords = cyber security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
42 pages, 13108 KiB  
Article
AMBWO: An Augmented Multi-Strategy Beluga Whale Optimization for Numerical Optimization Problems
by Guoping You, Zengtong Lu, Zhipeng Qiu and Hao Cheng
Biomimetics 2024, 9(12), 727; https://doi.org/10.3390/biomimetics9120727 - 28 Nov 2024
Viewed by 76
Abstract
Beluga whale optimization (BWO) is a swarm-based metaheuristic algorithm inspired by the group behavior of beluga whales. BWO suffers from drawbacks such as an insufficient exploration capability and the tendency to fall into local optima. To address these shortcomings, this paper proposes augmented [...] Read more.
Beluga whale optimization (BWO) is a swarm-based metaheuristic algorithm inspired by the group behavior of beluga whales. BWO suffers from drawbacks such as an insufficient exploration capability and the tendency to fall into local optima. To address these shortcomings, this paper proposes augmented multi-strategy beluga optimization (AMBWO). The adaptive population learning strategy is proposed to improve the global exploration capability of BWO. The introduction of the roulette equilibrium selection strategy allows BWO to have more reference points to choose among during the exploitation phase, which enhances the flexibility of the algorithm. In addition, the adaptive avoidance strategy improves the algorithm’s ability to escape from local optima and enriches the population quality. In order to validate the performance of the proposed AMBWO, extensive evaluation comparisons with other state-of-the-art improved algorithms were conducted on the CEC2017 and CEC2022 test sets. Statistical tests, convergence analysis, and stability analysis show that the AMBWO exhibits a superior overall performance. Finally, the applicability and superiority of the AMBWO was further verified by several engineering optimization problems. Full article
Show Figures

Figure 1

Figure 1
<p>The flowchart of AMBWO.</p>
Full article ">Figure 2
<p>Ranking of AMBWO and six variants based on the Friedman test.</p>
Full article ">Figure 3
<p>Ranking of AMBWO and competitors based on CEC2017. (<b>a</b>) D = 10; (<b>b</b>) D = 30; (<b>c</b>) D = 50; (<b>d</b>) D = 100.</p>
Full article ">Figure 4
<p>The visualization of Wilcoxon rank-sum test results for CEC2017. (<b>a</b>) D = 10; (<b>b</b>) D = 30; (<b>c</b>) D = 50; (<b>d</b>) D = 100.</p>
Full article ">Figure 5
<p>The visualization of Friedman test results for CEC2017.</p>
Full article ">Figure 6
<p>The convergence curves of AMBWO and competitors for CEC2017.</p>
Full article ">Figure 7
<p>The boxplots of the AMBWO and competitors for CEC2017.</p>
Full article ">Figure 7 Cont.
<p>The boxplots of the AMBWO and competitors for CEC2017.</p>
Full article ">Figure 8
<p>The ranking of AMBWO and competitors for CEC2022. (<b>a</b>) D = 10, (<b>b</b>) D = 20.</p>
Full article ">Figure 9
<p>The Friedman scores of AMBWO and competitors for CEC2022.</p>
Full article ">Figure 10
<p>The visualization of the Wilcoxon rank-sum test results for CEC2022. (<b>a</b>) D = 10, (<b>b</b>) D = 20.</p>
Full article ">Figure 11
<p>Problem with tension compression spring design.</p>
Full article ">Figure 12
<p>Problem with pressure vessel design.</p>
Full article ">Figure 13
<p>Problem with three-bar truss design.</p>
Full article ">Figure A1
<p>The convergence curves of AMBWO and other competitors based on CEC2017 (D = 10).</p>
Full article ">Figure A2
<p>The convergence curves of AMBWO and other competitors based on CEC2017 (D = 30).</p>
Full article ">Figure A3
<p>The convergence curves of AMBWO and other competitors based on CEC2017 (D = 50).</p>
Full article ">Figure A4
<p>The convergence curves of AMBWO and other competitors based on CEC2017 (D = 100).</p>
Full article ">Figure A5
<p>The boxplots of AMBWO and other competitors based on CEC2017 (D = 10).</p>
Full article ">Figure A5 Cont.
<p>The boxplots of AMBWO and other competitors based on CEC2017 (D = 10).</p>
Full article ">Figure A6
<p>The boxplots of AMBWO and other competitors based on CEC2017 (D = 30).</p>
Full article ">Figure A6 Cont.
<p>The boxplots of AMBWO and other competitors based on CEC2017 (D = 30).</p>
Full article ">Figure A7
<p>The boxplots of AMBWO and other competitors based on CEC2017 (D = 50).</p>
Full article ">Figure A7 Cont.
<p>The boxplots of AMBWO and other competitors based on CEC2017 (D = 50).</p>
Full article ">Figure A8
<p>The boxplots of AMBWO and other competitors based on CEC2017 (D = 100).</p>
Full article ">Figure A8 Cont.
<p>The boxplots of AMBWO and other competitors based on CEC2017 (D = 100).</p>
Full article ">
24 pages, 1229 KiB  
Article
Asymmetric Bidirectional Quantum Communication with Device Authentication in IoT
by Yonghao Zhu, Dongfen Li, Yangyang Jiang, Xiaoyu Hua, You Fu, Jie Zhou, Yuqiao Tan and Xiaolong Yang
Symmetry 2024, 16(12), 1589; https://doi.org/10.3390/sym16121589 - 28 Nov 2024
Viewed by 66
Abstract
Quantum communication holds great potential for enhancing the security and efficiency of the Internet of Things (IoT). However, existing schemes often overlook device identity authentication, leaving systems vulnerable to unauthorized access, and rely on third-party controllers, which increase complexity and undermine trust. This [...] Read more.
Quantum communication holds great potential for enhancing the security and efficiency of the Internet of Things (IoT). However, existing schemes often overlook device identity authentication, leaving systems vulnerable to unauthorized access, and rely on third-party controllers, which increase complexity and undermine trust. This paper proposes a novel asymmetric bidirectional quantum communication scheme tailored for IoT, integrating device identity authentication and information transmission without requiring third-party controllers. We provide a detailed description of the scheme’s application scenarios in IoT, conduct a security analysis of the identity authentication module, and experimentally validate the feasibility of the information transmission module. Additionally, we analyze the impact of quantum noise on the proposed scheme and compare it with existing approaches, highlighting its advantages in terms of resource consumption and efficiency. Full article
(This article belongs to the Section Physics)
Show Figures

Figure 1

Figure 1
<p>Show the overall process of the scheme and the connection between modules. After sending the communication request, the devices’ identities are verified before transmitting any information. The transmission only occurs after successful device authentication.</p>
Full article ">Figure 2
<p>Show the deform process. <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> </mrow> <msub> <mi>τ</mi> <mi>A</mi> </msub> <msub> <mrow> <mo>〉</mo> </mrow> <mrow> <msub> <mi>a</mi> <mn>1</mn> </msub> <msub> <mi>a</mi> <mn>2</mn> </msub> <msub> <mi>a</mi> <mn>3</mn> </msub> <msub> <mi>a</mi> <mn>4</mn> </msub> <msub> <mi>a</mi> <mn>5</mn> </msub> </mrow> </msub> </mrow> </semantics></math> is transformed into direct product state of quantum states <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> </mrow> <msub> <mi>τ</mi> <mi>A</mi> </msub> <msub> <mrow> <mo>〉</mo> </mrow> <mrow> <msub> <mi>a</mi> <mn>1</mn> </msub> <msub> <mi>a</mi> <mn>4</mn> </msub> </mrow> </msub> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> </mrow> <msub> <mi>τ</mi> <mi>A</mi> </msub> <msub> <mrow> <mo>〉</mo> </mrow> <mrow> <msub> <mi>a</mi> <mn>3</mn> </msub> <msub> <mi>a</mi> <mn>2</mn> </msub> <msub> <mi>a</mi> <mn>5</mn> </msub> </mrow> </msub> </mrow> </semantics></math>; <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> </mrow> <msub> <mi>τ</mi> <mi>B</mi> </msub> <msub> <mrow> <mo>〉</mo> </mrow> <mrow> <msub> <mi>b</mi> <mn>1</mn> </msub> <msub> <mi>b</mi> <mn>2</mn> </msub> <msub> <mi>b</mi> <mn>3</mn> </msub> </mrow> </msub> </mrow> </semantics></math> is transformed into <math display="inline"><semantics> <mrow> <mrow> <mo>|</mo> </mrow> <msub> <mi>τ</mi> <mi>B</mi> </msub> <msub> <mrow> <mo>〉</mo> </mrow> <msub> <mi>b</mi> <mn>1</mn> </msub> </msub> </mrow> </semantics></math> and <math display="inline"><semantics> <msub> <mrow> <mo>|</mo> <mn>00</mn> <mo>〉</mo> </mrow> <mrow> <msub> <mi>b</mi> <mn>2</mn> </msub> <msub> <mi>b</mi> <mn>3</mn> </msub> </mrow> </msub> </semantics></math>.</p>
Full article ">Figure 3
<p>The process of controller-free bidirectional quantum teleportation is shown in the figure. Alice and Bob share a six-qubit state <math display="inline"><semantics> <msub> <mrow> <mo>|</mo> <mi>ψ</mi> <mo>〉</mo> </mrow> <mn>123456</mn> </msub> </semantics></math>, where qubits 1, 3, and 6 belong to Alice, and qubits 2, 4, and 5 belong to Bob. The Z and X in the figure represent single-particle measurements on the Z basis and X basis, respectively. The unitary operation on qubit 6 is a function of the measurement results of qubits 2 and <math display="inline"><semantics> <msub> <mi>b</mi> <mn>1</mn> </msub> </semantics></math>. Similarly, the unitary operation on qubits 4 and 5 is a function of the measurement results of qubits 1, 3, <math display="inline"><semantics> <msub> <mi>a</mi> <mn>1</mn> </msub> </semantics></math>, and <math display="inline"><semantics> <msub> <mi>a</mi> <mn>4</mn> </msub> </semantics></math>. Dashed arrows represent classical communication.</p>
Full article ">Figure 4
<p>Show the reconstruct process. Alice introduces two auxiliary qubits <math display="inline"><semantics> <msub> <mrow> <mo>|</mo> <mn>00</mn> <mo>〉</mo> </mrow> <mrow> <mi>c</mi> <mi>d</mi> </mrow> </msub> </semantics></math> for collapsed qubit 6 and finally obtains <math display="inline"><semantics> <msub> <mrow> <mo>|</mo> <mi>χ</mi> <mo>〉</mo> </mrow> <mrow> <mn>6</mn> <mi>c</mi> <mi>d</mi> </mrow> </msub> </semantics></math>. Bob introduces three auxiliary qubits <math display="inline"><semantics> <msub> <mrow> <mo>|</mo> <mn>000</mn> <mo>〉</mo> </mrow> <mrow> <mi>e</mi> <mi>f</mi> <mi>g</mi> </mrow> </msub> </semantics></math> for collapsed quantum bits 4 and 5 and finally obtains <math display="inline"><semantics> <msub> <mrow> <mo>|</mo> <mi>χ</mi> <mo>〉</mo> </mrow> <mrow> <mn>4</mn> <mi>f</mi> <mi>e</mi> <mn>5</mn> <mi>g</mi> </mrow> </msub> </semantics></math>.</p>
Full article ">Figure 5
<p>Circuit diagram for six-qubit channel preparation. First, apply H gates to <math display="inline"><semantics> <mrow> <msub> <mi>q</mi> <mn>3</mn> </msub> <mo>,</mo> <msub> <mi>q</mi> <mn>4</mn> </msub> </mrow> </semantics></math>, and <math display="inline"><semantics> <msub> <mi>q</mi> <mn>5</mn> </msub> </semantics></math>; then implement CNOT operations on qubit pairs (<math display="inline"><semantics> <mrow> <msub> <mi>q</mi> <mn>3</mn> </msub> <mo>,</mo> <msub> <mi>q</mi> <mn>0</mn> </msub> </mrow> </semantics></math>), (<math display="inline"><semantics> <mrow> <msub> <mi>q</mi> <mn>4</mn> </msub> <mo>,</mo> <msub> <mi>q</mi> <mn>1</mn> </msub> </mrow> </semantics></math>), and (<math display="inline"><semantics> <mrow> <msub> <mi>q</mi> <mn>5</mn> </msub> <mo>,</mo> <msub> <mi>q</mi> <mn>2</mn> </msub> </mrow> </semantics></math>) with <math display="inline"><semantics> <mrow> <msub> <mi>q</mi> <mn>3</mn> </msub> <mo>,</mo> <msub> <mi>q</mi> <mn>4</mn> </msub> </mrow> </semantics></math> and <math display="inline"><semantics> <msub> <mi>q</mi> <mn>5</mn> </msub> </semantics></math> as control qubits, <math display="inline"><semantics> <mrow> <msub> <mi>q</mi> <mn>0</mn> </msub> <mo>,</mo> <msub> <mi>q</mi> <mn>1</mn> </msub> </mrow> </semantics></math> and <math display="inline"><semantics> <msub> <mi>q</mi> <mn>2</mn> </msub> </semantics></math> as target qubits; and finally, the SWAP gate is applied to <math display="inline"><semantics> <msub> <mi>q</mi> <mn>0</mn> </msub> </semantics></math> and <math display="inline"><semantics> <msub> <mi>q</mi> <mn>1</mn> </msub> </semantics></math>.</p>
Full article ">Figure 6
<p>Channel preparation measurements are plotted, and the occurrence probabilities of eight collapsed states from left to right are 0.124, 0.122, 0.126, 0.125, 0.125, 0.124, 0.128, and 0.126, respectively. Collapse probabilities are essentially the same and satisfy normalization.</p>
Full article ">Figure 7
<p>From left to right, the first part in the figure is the preparation of transmitted quantum states and quantum channel; the second part is the deformation of the quantum states; the third part is the Z-based measurement and the unitary operations based on measurement results; the fourth part is the X-based measurement and the unitary operation based on measurement results; the fifth part is the measurement verification after the transmission is completed.</p>
Full article ">Figure 8
<p>Histogram of the experimental results of bidirectional quantum teleportation based on Schrödinger wave function simulator. It can be seen that <math display="inline"><semantics> <msub> <mi>τ</mi> <mi>B</mi> </msub> </semantics></math> has successfully collapsed to qubit 6, owned by Alice, and <math display="inline"><semantics> <msub> <mi>τ</mi> <mi>A</mi> </msub> </semantics></math> has successfully collapsed to qubits 4 and 5, owned by Bob.</p>
Full article ">Figure 9
<p>Bit-flip noise channel fidelity analysis diagram.</p>
Full article ">Figure 10
<p><math display="inline"><semantics> <mrow> <mi>x</mi> <mo>=</mo> <mi>μ</mi> <mo>,</mo> <mi>y</mi> <mo>=</mo> <msub> <mi>α</mi> <mn>0</mn> </msub> <mo>,</mo> <msub> <mi>β</mi> <mn>0</mn> </msub> <mo>=</mo> <mstyle scriptlevel="0" displaystyle="true"> <mfrac> <mn>1</mn> <mn>2</mn> </mfrac> </mstyle> <mo>,</mo> <msub> <mi>α</mi> <mn>3</mn> </msub> <mo>=</mo> <mstyle scriptlevel="0" displaystyle="true"> <mfrac> <mn>1</mn> <mn>2</mn> </mfrac> </mstyle> <mo>,</mo> <msub> <mi>β</mi> <mn>1</mn> </msub> <mo>=</mo> <msqrt> <mrow> <mn>1</mn> <mo>−</mo> <msubsup> <mi>α</mi> <mn>0</mn> <mn>2</mn> </msubsup> </mrow> </msqrt> </mrow> </semantics></math>.</p>
Full article ">Figure 11
<p>Effect of amplitude-damping noise on bidirectional quantum teleportation.</p>
Full article ">Figure 12
<p>Changing trends in fidelity and decoherence rate under three different noise environments.</p>
Full article ">
25 pages, 7600 KiB  
Article
Optimizing Radio Access for Massive IoT in 6G Through Highly Dynamic Cooperative Software-Defined Sharing of Network Resources
by Faycal Bouhafs, Alessandro Raschella, Michael Mackay, Max Hashem Eiza and Frank den Hartog
Future Internet 2024, 16(12), 442; https://doi.org/10.3390/fi16120442 - 28 Nov 2024
Viewed by 107
Abstract
The Internet of Things (IoT) has been a major part of many use cases for 5G networks. From several of these use cases, it follows that 5G should be able to support at least one million devices per km2. In this [...] Read more.
The Internet of Things (IoT) has been a major part of many use cases for 5G networks. From several of these use cases, it follows that 5G should be able to support at least one million devices per km2. In this paper, we explain that the 5G radio access schemes as used today cannot support such densities. This issue will have to be solved by 6G. However, this requires a fundamentally different approach to accessing the wireless medium compared to current generation networks: they are not designed to support many thousands of devices in each other’s vicinity, attempting to send/receive data simultaneously. In this paper, we present a 6G system architecture for trading wireless network resources in massive IoT scenarios, inspired by the concept of the sharing economy, and using the novel concept of spectrum programming. We simulated a truly massive IoT network and evaluated the scalability of the system when managed using our proposed 6G platform, compared to standard 5G deployments. The experiments showed how the proposed scheme can improve network resource allocation by up to 80%. This is accompanied by similarly significant improvements in interference and device energy consumption. Finally, we performed evaluations that demonstrate that the proposed platform can benefit all the stakeholders that decide to join the scheme. Full article
(This article belongs to the Special Issue Moving towards 6G Wireless Technologies—Volume II)
Show Figures

Figure 1

Figure 1
<p>Transmission success rate as a function of the number of attempts to access the medium.</p>
Full article ">Figure 2
<p>Number of attempts necessary to achieve 100% satisfaction as a function of the number of gNBs.</p>
Full article ">Figure 3
<p>Cost incurred by operators to increase the success rate of IoT devices for accessing the RANs.</p>
Full article ">Figure 4
<p>Degree of uncertainty of telecommunication landscape drivers and their degree of impact [<a href="#B26-futureinternet-16-00442" class="html-bibr">26</a>].</p>
Full article ">Figure 5
<p>Factors behind the adoption of programmability in telecommunications with the massive IoT as a major driver behind this trend [<a href="#B40-futureinternet-16-00442" class="html-bibr">40</a>].</p>
Full article ">Figure 6
<p>Depiction of the Wi-5 architecture and programmability [<a href="#B34-futureinternet-16-00442" class="html-bibr">34</a>].</p>
Full article ">Figure 7
<p>Illustration of using LVAPs to manage connectivity in Wi-5.</p>
Full article ">Figure 8
<p>Depiction of the heterogeneous infrastructure plane, heterogeneous spectrum plane, and LVAN in the proposed solution.</p>
Full article ">Figure 9
<p>Description of the deployment of the connectivity application as part of the proposed solution. (<b>a</b>) Use of the controller’s monitoring information and LVAN to manage the connectivity between IoT networks and RANs. (<b>b</b>) Use of the connectivity application in the application plane on top of the controller.</p>
Full article ">Figure 10
<p>Description of the brokering plane and its interaction with operators and the connectivity application.</p>
Full article ">Figure 11
<p>Measured SINR when using 5G and sharing economy for M = 1000.</p>
Full article ">Figure 12
<p>Measured SINR when using 5G and sharing economy for M = 2000.</p>
Full article ">Figure 13
<p>Measured SINR when using 5G and sharing economy for M = 3000.</p>
Full article ">Figure 14
<p>Probability of unsuccessful connectivity for different numbers of IoT nodes.</p>
Full article ">Figure 15
<p>Percentage of satisfied IoT nodes as a function of IoT network density.</p>
Full article ">Figure 16
<p>Number of iterations in relation to success rate.</p>
Full article ">Figure 17
<p>Energy averaged for different numbers of connected IoT nodes.</p>
Full article ">Figure 18
<p>Ops’ gains and costs for M = 1000.</p>
Full article ">Figure 19
<p>OPs’ gains and costs for M = 2000.</p>
Full article ">Figure 20
<p>OPs’ gains and costs for M = 3000.</p>
Full article ">
21 pages, 3699 KiB  
Article
A Distributed RF Threat Sensing Architecture
by Georgios Michalis, Andreas Rousias, Loizos Kanaris, Akis Kokkinis , Pantelis Kanaris  and Stavros Stavrou
Information 2024, 15(12), 752; https://doi.org/10.3390/info15120752 - 26 Nov 2024
Viewed by 245
Abstract
The scope of this work is to propose a distributed RF sensing architecture that interconnects and utilizes a cyber security operations center (SOC) to support long-term RF threat monitoring, alerting, and further centralized processing. For the purpose of this work, RF threats refer [...] Read more.
The scope of this work is to propose a distributed RF sensing architecture that interconnects and utilizes a cyber security operations center (SOC) to support long-term RF threat monitoring, alerting, and further centralized processing. For the purpose of this work, RF threats refer mainly to RF jamming, since this can jeopardize multiple wireless systems, either directly as a Denial of Service (DoS) attack, or as a means to force a cellular or WiFi wireless client to connect to a malicious system. Furthermore, the possibility of the suggested architecture to monitor signals from malicious drones in short distances is also examined. The work proposes, develops, and examines the performance of RF sensing sensors that can monitor any frequency band within the range of 1 MHz to 8 GHz, through selective band pass RF filtering, and subsequently these sensors are connected to a remote SOC. The proposed sensors incorporate an automatic calibration and time-depended environment RF profiling algorithm and procedure for optimizing RF jamming detection in a dense RF spectrum, occupied by heterogeneous RF technologies, thus minimizing false-positive alerts. The overall architecture supports TCP/IP interconnections of multiple RF jamming detection sensors through an efficient MQTT protocol, allowing the collaborative operation of sensors that are distributed in different areas of interest, depending on the scenario of interest, offering holistic monitoring by the centralized SOC. The incorporation of the centralized SOC in the overall architecture allows also the centralized application of machine learning algorithms on all the received data. Full article
(This article belongs to the Special Issue Emerging Information Technologies in the Field of Cyber Defense)
Show Figures

Figure 1

Figure 1
<p>RF sensor connectivity outline.</p>
Full article ">Figure 2
<p>RF sensor to SOC connectivity outline.</p>
Full article ">Figure 3
<p>RF sensor system calibration.</p>
Full article ">Figure 4
<p>Vivaldi directional antenna.</p>
Full article ">Figure 5
<p>Min and Max RF input levels.</p>
Full article ">Figure 6
<p>Visualized sensor data in a SOC.</p>
Full article ">Figure 7
<p>Small city airfield.</p>
Full article ">Figure 8
<p>High-power sweep jamming detection at 2.4 GHz band.</p>
Full article ">Figure 9
<p>High-power sweep jamming detection at 5.8 GHz band.</p>
Full article ">Figure 10
<p>Low-power jamming detection at 5.8 GHz band.</p>
Full article ">Figure 11
<p>DJI Mavic 3 Pro RF signals at 150 m.</p>
Full article ">
20 pages, 4057 KiB  
Article
Cybersecurity in Smart Grids: Detecting False Data Injection Attacks Utilizing Supervised Machine Learning Techniques
by Anwer Shees, Mohd Tariq and Arif I. Sarwat
Energies 2024, 17(23), 5870; https://doi.org/10.3390/en17235870 - 22 Nov 2024
Viewed by 450
Abstract
By integrating advanced technologies and data-driven systems in smart grids, there has been a significant revolution in the energy distribution sector, bringing a new era of efficiency and sustainability. Nevertheless, with this advancement comes vulnerability, particularly in the form of cyber threats, which [...] Read more.
By integrating advanced technologies and data-driven systems in smart grids, there has been a significant revolution in the energy distribution sector, bringing a new era of efficiency and sustainability. Nevertheless, with this advancement comes vulnerability, particularly in the form of cyber threats, which have the potential to damage critical infrastructure. False data injection attacks are among the threats to the cyber–physical layer of smart grids. False data injection attacks pose a significant risk, manipulating the data in the control system layer to compromise the grid’s integrity. An early detection and mitigation of such cyberattacks are crucial to ensuring the smart grid operates securely and reliably. In this research paper, we demonstrate different machine learning classification models for detecting false data injection attacks, including the Extra Tree, Random Forest, Extreme Gradient Boosting, Logistic Regression, Decision Tree, and Bagging Classifiers, to secure the integrity of smart grids. A comprehensive dataset of various attack scenarios provides insights to explore and develop effective detection models. Results show that the Extra Tree, Random Forest, and Extreme Gradient Boosting models’ accuracy in detecting the attack outperformed the existing literature, an achieving accuracy of 98%, 97%, and 97%, respectively. Full article
(This article belongs to the Section A1: Smart Grids and Microgrids)
Show Figures

Figure 1

Figure 1
<p>Smart grid under FDIA scenario in the Cyber Layer.</p>
Full article ">Figure 2
<p>Flow diagram of the work conducted.</p>
Full article ">Figure 3
<p>Process of decision-making by Extra Tree Classifier.</p>
Full article ">Figure 4
<p>Comparison of ROC curves with different classifiers.</p>
Full article ">Figure 5
<p>Confusion matrix showing TP, TN, FP, and FN.</p>
Full article ">Figure 6
<p>Line graph of performance.</p>
Full article ">Figure 7
<p>Depicts the performance of different techniques.</p>
Full article ">Figure 8
<p>The network topology.</p>
Full article ">Figure 9
<p>Comparison of accuracy of different states of the art, from left [<a href="#B44-energies-17-05870" class="html-bibr">44</a>,<a href="#B45-energies-17-05870" class="html-bibr">45</a>,<a href="#B46-energies-17-05870" class="html-bibr">46</a>,<a href="#B47-energies-17-05870" class="html-bibr">47</a>,<a href="#B48-energies-17-05870" class="html-bibr">48</a>,<a href="#B49-energies-17-05870" class="html-bibr">49</a>], and our proposed models.</p>
Full article ">
22 pages, 1621 KiB  
Article
Intelligent Energy Management Systems in Industry 5.0: Cybersecurity Applications in Examples
by Barbara Wyrzykowska, Hubert Szczepaniuk, Edyta Karolina Szczepaniuk, Anna Rytko and Marzena Kacprzak
Energies 2024, 17(23), 5871; https://doi.org/10.3390/en17235871 - 22 Nov 2024
Viewed by 357
Abstract
The article examines modern approaches to energy management in the context of the development of Industry 5.0 with a particular focus on cybersecurity. Key tenets of Industry 5.0 are discussed, including the integration of advanced technologies with intelligent energy management systems (IEMSs) and [...] Read more.
The article examines modern approaches to energy management in the context of the development of Industry 5.0 with a particular focus on cybersecurity. Key tenets of Industry 5.0 are discussed, including the integration of advanced technologies with intelligent energy management systems (IEMSs) and the growing need to protect data in the face of increasing cyber threats. The challenges faced by small and medium-sized enterprises (SMEs) using solutions based on renewable energy sources, such as photovoltaic farms, are also analyzed. The article presents examples of IEMS applications and discusses methods for securing these systems, offering an overview of cyber threat protection tools in the context of modern energy management. The analysis carried out provided information that will help businesses make rational decisions and contribute to shaping the state’s macroeconomic policy on cybersecurity and energy savings. The results of this research can also help develop more effective strategies for managing technology and IT infrastructure, which is crucial in the digital age of Industry 5.0. Full article
(This article belongs to the Section F5: Artificial Intelligence and Smart Energy)
Show Figures

Figure 1

Figure 1
<p>Research algorithm. Source: own work.</p>
Full article ">Figure 2
<p>Energy production from photovoltaic panels at company (A) in 2023. Source: own compilation based on research.</p>
Full article ">Figure 3
<p>Energy production from photovoltaic panels at company (B) in 2023. Source: own compilation based on research.</p>
Full article ">Figure 4
<p>Data protection and cybersecurity methods used in surveyed companies. Source: own compilation, based on research.</p>
Full article ">
12 pages, 408 KiB  
Article
Privacy-Preserving Data Sharing in Telehealth Services
by Ammar Odeh, Eman Abdelfattah and Walid Salameh
Appl. Sci. 2024, 14(23), 10808; https://doi.org/10.3390/app142310808 - 22 Nov 2024
Viewed by 416
Abstract
In today’s healthcare industry, safeguarding patient data is critical due to the increasing digitization of medical records, which makes them vulnerable to cyber threats. Telehealth services, while providing immense benefits in terms of accessibility and efficiency, introduce complex challenges in maintaining data privacy [...] Read more.
In today’s healthcare industry, safeguarding patient data is critical due to the increasing digitization of medical records, which makes them vulnerable to cyber threats. Telehealth services, while providing immense benefits in terms of accessibility and efficiency, introduce complex challenges in maintaining data privacy and security. This paper proposes a privacy-preserving framework for secure data sharing within telehealth services, employing blockchain technology and advanced cryptographic techniques. The framework ensures that all patient health data are encrypted using homomorphic encryption before storage on the blockchain, guaranteeing confidentiality and protecting data from unauthorized access. Secure multi-party computation (SMPC) is integrated for encrypted data computations, maintaining data confidentiality even during operations. Smart contracts enforce access control, ensuring that patient preferences and regulatory requirements such as the HIPAA and the GDPR are met. Furthermore, the framework includes auditing and verifying data integrity mechanisms, making it resilient against cyber threats such as impersonation, replay, and Man-In-The-Middle attacks. The analysis demonstrates the framework’s superior performance in addressing these challenges compared to that of existing systems. Future work suggests integrating AI-driven threat detection and quantum-resistant cryptographic techniques to enhance security further and adapt to the evolving telehealth landscape. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>Sequence diagram for the proposed algorithm.</p>
Full article ">
25 pages, 2657 KiB  
Article
Domain-Specific Modeling Language for Security Analysis of EV Charging Infrastructure
by Anas Motii, Mahmoud El Hamlaoui and Robert Basmadjian
Energies 2024, 17(23), 5832; https://doi.org/10.3390/en17235832 - 21 Nov 2024
Viewed by 339
Abstract
Electric vehicles (EVs) and their ecosystem have unquestionably made significant technological strides. Indeed, EVs have evolved into sophisticated computer systems with extensive internal and external communication capabilities. This interconnection raises concerns about security, privacy, and the expanding risk of cyber-attacks within the electric [...] Read more.
Electric vehicles (EVs) and their ecosystem have unquestionably made significant technological strides. Indeed, EVs have evolved into sophisticated computer systems with extensive internal and external communication capabilities. This interconnection raises concerns about security, privacy, and the expanding risk of cyber-attacks within the electric vehicle landscape. In particular, the charging infrastructure plays a crucial role in the electric mobility ecosystem. With the proliferation of charging points, new attack vectors are opened up for cybercriminals. The threat landscape targeting charging systems encompasses various types of attacks ranging from physical attacks to data breaches including customer information. In this paper, we aim to leverage the power of model-driven engineering to model and analyze EV charging systems at early stages. We employ domain-specific modeling language (DSML) techniques for the early security modeling and analysis of EV charging infrastructure. We accomplish this by integrating the established EMSA model for electric mobility, which encapsulates all key stakeholders in the ecosystem. To our knowledge, this represents the first instance in the literature of applying DSML within the electric mobility ecosystem, highlighting its innovative nature. Moreover, as our formalization based on DSML is an iterative, continuous, and evolving process, this approach guarantees that our proposed framework adeptly tackles the evolving cyber threats confronting the EV industry. Specifically, we use the Object Constraint Language (OCL) for precise specification and verification of security threats as properties of a modeled system. To validate our framework, we explore a set of representative threats targeting EV charging systems from real-world scenarios. To the best of our knowledge, this is the first attempt to provide a comprehensive security modeling framework for the electric mobility ecosystem. Full article
(This article belongs to the Section E: Electric Vehicles)
Show Figures

Figure 1

Figure 1
<p>On the left side of the figure lies the component layer within the EMSA model, delineating the diverse zones and domains constituting the electric mobility ecosystem. Represented by blue boxes are the actors and stakeholders, interconnected by arrows to showcase the dynamic relationships among them. On the right side, the EMSA model unfolds its five interoperability layers, commencing from the uppermost tier, business, and cascading down to the lowermost tier, component. Each layer embodies distinct functionalities and interactions crucial for seamless operations within the electric mobility landscape.</p>
Full article ">Figure 2
<p>A methodology to analyze EV infrastructure.</p>
Full article ">Figure 3
<p>The considered extraction process based on a threat identified in [<a href="#B15-energies-17-05832" class="html-bibr">15</a>].</p>
Full article ">Figure 4
<p>E-mobility metamodel kernel.</p>
Full article ">Figure 5
<p>E-mobility metamodel—energy transfer element view.</p>
Full article ">Figure 6
<p>E-mobility metamodel—EV user element view.</p>
Full article ">Figure 7
<p>E-mobility metamodel—data view.</p>
Full article ">Figure 8
<p>EV charging infrastructure model instance and security analysis results.</p>
Full article ">Figure 9
<p>Excerpt of the grammar implemented with Xtext.</p>
Full article ">Figure 10
<p>Screenshot of our prototype showing the textual editor, the auto completion, and the result.</p>
Full article ">Figure 11
<p>Threats formalization with OCL in Obeo Designer.</p>
Full article ">Figure 12
<p>At the upper part of the figure, security needs for each component, communication and data are described. Threats, STRIDE category, risk level, and mitigations are shown at the lower part.</p>
Full article ">Figure 13
<p>Risk matrix showing the risks, their likelihood, severity, and risk level.</p>
Full article ">Figure 14
<p>ISO 21434 [<a href="#B36-energies-17-05832" class="html-bibr">36</a>] standard components highlighting in the red colored box the positioning of our approach.</p>
Full article ">
29 pages, 5030 KiB  
Article
The Design and Implementation of Kerberos-Blockchain Vehicular Ad-Hoc Networks Authentication Across Diverse Network Scenarios
by Maya Rahayu, Md. Biplob Hossain, Samsul Huda, Yuta Kodera, Md. Arshad Ali and Yasuyuki Nogami
Sensors 2024, 24(23), 7428; https://doi.org/10.3390/s24237428 - 21 Nov 2024
Viewed by 410
Abstract
Vehicular Ad-Hoc Networks (VANETs) play an essential role in the intelligent transportation era, furnishing users with essential roadway data to facilitate optimal route selection and mitigate the risk of accidents. However, the network exposure makes VANETs susceptible to cyber threats, making authentication crucial [...] Read more.
Vehicular Ad-Hoc Networks (VANETs) play an essential role in the intelligent transportation era, furnishing users with essential roadway data to facilitate optimal route selection and mitigate the risk of accidents. However, the network exposure makes VANETs susceptible to cyber threats, making authentication crucial for ensuring security and integrity. Therefore, joining entity verification is essential to ensure the integrity and security of communication in VANETs. However, to authenticate the entities, authentication time should be minimized to guarantee fast and secure authentication procedures. We propose an authentication system for VANETs using blockchain and Kerberos for storing authentication messages in a blockchain ledger accessible to Trusted Authentication Servers (TASs) and Roadside Units (RSUs). We evaluate the system in three diverse network scenarios: suburban, urban with 1 TAS, and urban with 2 TASs. The findings reveal that this proposal is applicable in diverse network scenarios to fulfill the network requirements, including authentication, handover, and end-to-end delay, considering an additional TAS for an increasing number of vehicles. The system is also practicable in storing the authentication message in blockchain considering the gas values and memory size for all scenarios. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>The vulnerability of VANET.</p>
Full article ">Figure 2
<p>Resume of initial authentication phase and handover process.</p>
Full article ">Figure 3
<p>Main parts of the Kerberos-blockchain VANETs system.</p>
Full article ">Figure 4
<p>Experiment case scenarios: (<b>a</b>) suburban, (<b>b</b>) urban with 1 TAS, and (<b>c</b>) urban with 2 TASs.</p>
Full article ">Figure 5
<p>Maps for the scenario of (<b>a</b>) suburban and (<b>b</b>) urban with 1 TAS and (<b>c</b>) urban with 2 TASs.</p>
Full article ">Figure 6
<p>Initial authentication phase.</p>
Full article ">Figure 7
<p>Handover signaling procedure.</p>
Full article ">Figure 8
<p>Off-chain and on-chain environment of the proposed system.</p>
Full article ">Figure 9
<p>Comparison of several delays of different scenarios.</p>
Full article ">Figure 10
<p>Signalling overhead.</p>
Full article ">Figure 11
<p>Number of vehicles vs. gas values.</p>
Full article ">Figure 12
<p>Memory size required for the block to store various authentication message.</p>
Full article ">
15 pages, 2716 KiB  
Article
Understanding the Nature of the Transnational Scam-Related Fraud: Challenges and Solutions from Vietnam’s Perspective
by Hai Thanh Luong and Hieu Minh Ngo
Laws 2024, 13(6), 70; https://doi.org/10.3390/laws13060070 - 21 Nov 2024
Viewed by 438
Abstract
Practical challenges and special threats from scam-related fraud exist for regional and local communities in Southeast Asia during and after the COVID-19 pandemic. The rise in pig-butchering operations in Southeast Asia is a major concern due to the increased use of digital technology [...] Read more.
Practical challenges and special threats from scam-related fraud exist for regional and local communities in Southeast Asia during and after the COVID-19 pandemic. The rise in pig-butchering operations in Southeast Asia is a major concern due to the increased use of digital technology and online financial transactions. Many of these operations are linked to organized crime syndicates operating across borders, posing challenges for law enforcement. As a first study in Vietnam, we combined the primary and secondary databases to unveil the nature of transnational scam-related fraud. Findings show that scammers are using advanced methods such as phishing, fraudulent investments, and identity theft to maximize their sophisticated tactics for achieving financial possession. There are organized crime rings operating in Vietnam and Cambodia, with Chinese groups playing a leading role behind the scenes. Social media and its various applications have become common platforms for these criminal activities. This study also calls for practical recommendations to consider specific challenges in combating these crimes, including building a strong framework with clear policies, encouraging multiple educational awareness campaigns in communities, enhancing effective cooperation among law enforcement and others, and supporting evidence-based approaches in research and application. While we recognized and assumed that pig-butchering operations with scam-related fraud are a complex problem that requires a well-rounded and coordinated response, the exact approach would depend on each country’s specific circumstances. Full article
Show Figures

Figure 1

Figure 1
<p>Most Vietnamese receive scam-relate frauds, and different colors mean different levels of respondent rate (Source: Data from the Chongluadao project and its design, which align with the GASA format).</p>
Full article ">Figure 2
<p>The most used platforms by scammers in Vietnam, different colors mean different levels of respondent rate. (Source: Data from the Chongluadao project and its design, which align with the GASA format).</p>
Full article ">Figure 3
<p>The matrix of the second-by-second conversations among members in the ‘money-making group’, which is excerpted from the second author’s records (Note: All those names are fake names or nicknames of scammers, not victims).</p>
Full article ">Figure 4
<p>Part of the Vietnamese detailed scripts used for processing of pig-butchering scams (Sources: The second author’s records).</p>
Full article ">Figure 5
<p>The original trajectory of the scam-only fraud operation (Source: The authors’ own visualizations).</p>
Full article ">Figure 6
<p>A translated text from Vietnamese to English. Left: Facebook’s public group (2.6k members joined)—Sell Kidney without Legal Barriers. Right: @NOLAW: I work at the YANHE International Hospital. The price is VND 930 million (around USD 40,000). After transplanting your kidney, we will offer money (Source: <a href="https://congan.kontum.gov.vn/an-ninh-trat-tu/canh-giac-voi-toi-pham-mua-ban-nguoi-qua-thu-doan-mua-than-gia-cao-.html" target="_blank">https://congan.kontum.gov.vn/an-ninh-trat-tu/canh-giac-voi-toi-pham-mua-ban-nguoi-qua-thu-doan-mua-than-gia-cao-.html</a> (assessed on 10 August 2024)).</p>
Full article ">
16 pages, 4570 KiB  
Article
Study of the Possibility to Combine Deep Learning Neural Networks for Recognition of Unmanned Aerial Vehicles in Optoelectronic Surveillance Channels
by Vladislav Semenyuk, Ildar Kurmashev, Dmitriy Alyoshin, Liliya Kurmasheva, Vasiliy Serbin and Alessandro Cantelli-Forti
Modelling 2024, 5(4), 1773-1788; https://doi.org/10.3390/modelling5040092 - 21 Nov 2024
Viewed by 346
Abstract
This article explores the challenges of integrating two deep learning neural networks, YOLOv5 and RT-DETR, to enhance the recognition of unmanned aerial vehicles (UAVs) within the optical-electronic channels of Sensor Fusion systems. The authors conducted an experimental study to test YOLOv5 and Faster [...] Read more.
This article explores the challenges of integrating two deep learning neural networks, YOLOv5 and RT-DETR, to enhance the recognition of unmanned aerial vehicles (UAVs) within the optical-electronic channels of Sensor Fusion systems. The authors conducted an experimental study to test YOLOv5 and Faster RT-DETR in order to identify the average accuracy of UAV recognition. A dataset in the form of images of two classes of objects, UAVs, and birds, was prepared in advance. The total number of images, including augmentation, amounted to 6337. The authors implemented training, verification, and testing of the neural networks exploiting PyCharm 2024 IDE. Inference testing was conducted using six videos with UAV flights. On all test videos, RT-DETR-R50 was more accurate by an average of 18.7% in terms of average classification accuracy (Pc). In terms of operating speed, YOLOv5 was 3.4 ms more efficient. It has been established that the use of RT-DETR as the only module for UAV classification in optical-electronic detection channels is not effective due to the large volumes of calculations, which is due to the relatively large number of parameters. Based on the obtained results, an algorithm for combining two neural networks is proposed, which allows for increasing the accuracy of UAV and bird classification without significant losses in speed. Full article
Show Figures

Figure 1

Figure 1
<p>Data set preparation in Roboflow.com service: (<b>a</b>) Annotation of UAVs and birds; (<b>b</b>) Data set partitioning interface for training, validation, and testing of neural networks.</p>
Full article ">Figure 2
<p>Metrics of the results of training the YOLOv5 neural network for 100 epochs (O<span class="html-italic">x</span>-axis): (<b>a</b>) Precision; (<b>b</b>) Recall; (<b>c</b>) mAP50; (<b>d</b>) mAP50-95.</p>
Full article ">Figure 2 Cont.
<p>Metrics of the results of training the YOLOv5 neural network for 100 epochs (O<span class="html-italic">x</span>-axis): (<b>a</b>) Precision; (<b>b</b>) Recall; (<b>c</b>) mAP50; (<b>d</b>) mAP50-95.</p>
Full article ">Figure 3
<p>Metrics of the results of training the RT-DETR neural network for 100 epochs (axis Ox): (<b>a</b>) Precision; (<b>b</b>) Recall; (<b>c</b>) mAP50; (<b>d</b>) mAP50-95.</p>
Full article ">Figure 3 Cont.
<p>Metrics of the results of training the RT-DETR neural network for 100 epochs (axis Ox): (<b>a</b>) Precision; (<b>b</b>) Recall; (<b>c</b>) mAP50; (<b>d</b>) mAP50-95.</p>
Full article ">Figure 4
<p>Example of data obtained as a result of validation of the YOLOv5 experimental model.</p>
Full article ">Figure 5
<p>Example of data obtained from the validation of the RT-DETR experimental model.</p>
Full article ">Figure 6
<p>Frames from inference tests of trained neural network models: (<b>a</b>,<b>c</b>) RT-DETR-R50; (<b>b</b>,<b>d</b>) YOLOv5s.</p>
Full article ">Figure 6 Cont.
<p>Frames from inference tests of trained neural network models: (<b>a</b>,<b>c</b>) RT-DETR-R50; (<b>b</b>,<b>d</b>) YOLOv5s.</p>
Full article ">Figure 7
<p>Comparative diagram of the values of the average class probability in UAV recognition by trained neural network models.</p>
Full article ">Figure 8
<p>Algorithm for combining trained neural network models YOLOv5s and RT-DETR-R50.</p>
Full article ">
25 pages, 1580 KiB  
Review
Near-Field Communication (NFC) Cyber Threats and Mitigation Solutions in Payment Transactions: A Review
by Princewill Onumadu and Hossein Abroshan
Sensors 2024, 24(23), 7423; https://doi.org/10.3390/s24237423 - 21 Nov 2024
Viewed by 680
Abstract
Today, many businesses use near-field communications (NFC) payment solutions, which allow them to receive payments from customers quickly and smoothly. However, this technology comes with cyber security risks which must be analyzed and mitigated. This study explores the cyber risks associated with NFC [...] Read more.
Today, many businesses use near-field communications (NFC) payment solutions, which allow them to receive payments from customers quickly and smoothly. However, this technology comes with cyber security risks which must be analyzed and mitigated. This study explores the cyber risks associated with NFC transactions and examines strategies for mitigating these risks, focusing on payment devices. This paper provides an overview of NFC technology, related security vulnerabilities, privacy concerns, and fraudulent activities. It then investigates payment devices such as smartphones, contactless cards, and wearables, highlighting their features and vulnerabilities. The study also examines encryption, authentication, tokenization, biometric authentication, and fraud detection methods as risk mitigation strategies. The paper synthesizes theoretical frameworks to provide insights into NFC transaction security and offers stakeholder recommendations. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

Figure 1
<p>Number of selected studies by year.</p>
Full article ">Figure 2
<p>Schematic diagram PRISMA Literature Review.</p>
Full article ">Figure 3
<p>High-resolution block diagram of key NFC security technologies.</p>
Full article ">
22 pages, 945 KiB  
Review
Resilience in the Internet of Medical Things: A Review and Case Study
by Vikas Tomer, Sachin Sharma and Mark Davis
Future Internet 2024, 16(11), 430; https://doi.org/10.3390/fi16110430 - 20 Nov 2024
Viewed by 619
Abstract
The Internet of Medical Things (IoMT), an extension of the Internet of Things (IoT), is still in its early stages of development. Challenges that are inherent to IoT, persist in IoMT as well. The major focus is on data transmission within the healthcare [...] Read more.
The Internet of Medical Things (IoMT), an extension of the Internet of Things (IoT), is still in its early stages of development. Challenges that are inherent to IoT, persist in IoMT as well. The major focus is on data transmission within the healthcare domain due to its profound impact on health and public well-being. Issues such as latency, bandwidth constraints, and concerns regarding security and privacy are critical in IoMT owing to the sensitive nature of patient data, including patient identity and health status. Numerous forms of cyber-attacks pose threats to IoMT networks, making the reliable and secure transmission of critical medical data a challenging task. Several other situations, such as natural disasters, war, construction works, etc., can cause IoMT networks to become unavailable and fail to transmit the data. The first step in these situations is to recover from failure as quickly as possible, resume the data transfer, and detect the cause of faults, failures, and errors. Several solutions exist in the literature to make the IoMT resilient to failure. However, no single approach proposed in the literature can simultaneously protect the IoMT networks from various attacks, failures, and faults. This paper begins with a detailed description of IoMT and its applications. It considers the underlying requirements of resilience for IoMT networks, such as monitoring, control, diagnosis, and recovery. This paper comprehensively analyzes existing research efforts to provide IoMT network resilience against diverse causes. After investigating several research proposals, we identify that the combination of software-defined networks (SDNs), machine learning (ML), and microservices architecture (MSA) has the capabilities to fulfill the requirements for achieving resilience in the IoMT networks. It mainly focuses on the analysis of technologies, such as SDN, ML, and MSA, separately, for meeting the resilience requirements in the IoMT networks. SDN can be used for monitoring and control, and ML can be used for anomaly detection and diagnosis, whereas MSA can be used for bringing distributed functionality and recovery into the IoMT networks. This paper provides a case study that describes the remote patient monitoring (RPM) of a heart patient in IoMT networks. It covers the different failure scenarios in IoMT infrastructure. Finally, we provide a proposed methodology that elaborates how distributed functionality can be achieved during these failures using machine learning, software-defined networks, and microservices technologies. Full article
(This article belongs to the Special Issue The Future Internet of Medical Things II)
Show Figures

Figure 1

Figure 1
<p>Possible issues of remote patient monitoring.</p>
Full article ">Figure 2
<p>Functional components of IoMT.</p>
Full article ">Figure 3
<p>Mapping of critical requirements into key technologies for resilient IoMT networks.</p>
Full article ">Figure 4
<p>Failure scenario in a general layerwise architecture.</p>
Full article ">Figure 5
<p>A single-point-of-failure issue in an IoMT network.</p>
Full article ">Figure 6
<p>An expected framework of IoMT networks with distributed functionality and resilience.</p>
Full article ">Figure 7
<p>Proposed architecture by using the combination of SDN, ML, and MSA.</p>
Full article ">
21 pages, 748 KiB  
Article
How Cyber Security Enhances Trust and Commitment to Customer Retention: The Mediating Role of Robotic Service Quality
by Roshan Panditharathna, Yang Liu, Fabio Vinicius de Macedo Bergamo, Dominic Appiah, Peter R. J. Trim and Yang-Im Lee
Big Data Cogn. Comput. 2024, 8(11), 165; https://doi.org/10.3390/bdcc8110165 - 20 Nov 2024
Viewed by 485
Abstract
Cyber security is supportive of robotic service provision, the objective of which is to help marketers achieve their aim of providing a high level of service. Marketers need to be aware of cyber security issues and adhere to established cyber security policies. We [...] Read more.
Cyber security is supportive of robotic service provision, the objective of which is to help marketers achieve their aim of providing a high level of service. Marketers need to be aware of cyber security issues and adhere to established cyber security policies. We investigate trust and commitment in relation to customer retention while assessing the mediating role of robotic service quality (RSQ). We employ a survey-based study that utilises 231 valid responses from customers in São Paulo, Brazil. To analyse the data, we used partial least squares structural equation modelling (PLS-SEM). The results show that trust and commitment have a positive impact on customer retention. RSQ has a partial mediation effect on the relationship between the latent constructs of trust, commitment, and customer retention. Thus, it can be suggested that RSQ, which embeds trust and commitment, assists in building a loyal customer base. Marketers outside the Latin American region can benefit from the results of this study since it incorporates cyber security awareness and policy within marketing strategy implementation, ensuring that RSQ is aligned in terms of the digitalisation goals of the company. Full article
Show Figures

Figure 1

Figure 1
<p>Graphic representation of the conceptual framework used in this study.</p>
Full article ">Figure 2
<p>Bootstrapped path model.</p>
Full article ">
17 pages, 852 KiB  
Article
Boosting Few-Shot Network Intrusion Detection with Adaptive Feature Fusion Mechanism
by Jue Bo, Kai Chen, Shenghui Li and Pengyi Gao
Electronics 2024, 13(22), 4560; https://doi.org/10.3390/electronics13224560 - 20 Nov 2024
Viewed by 310
Abstract
In network security, intrusion detection systems (IDSs) are essential for maintaining network integrity. Traditional IDSs primarily use supervised learning, relying on extensive datasets for effective training, which limits their ability to address rapidly evolving cyber threats, especially with limited data samples. To overcome [...] Read more.
In network security, intrusion detection systems (IDSs) are essential for maintaining network integrity. Traditional IDSs primarily use supervised learning, relying on extensive datasets for effective training, which limits their ability to address rapidly evolving cyber threats, especially with limited data samples. To overcome this, prior research has applied meta-learning methods to distinguish between normal and malicious network traffic, showing promising results mainly in binary classification scenarios. However, challenges remain in model information acquisition within few-shot learning (FSL) frameworks. This study introduces a metric-based meta-learning strategy that constructs prototypes for each sample category, improving the model’s ability to manage multi-class scenarios. Additionally, we propose an Adaptive Feature Fusion (AFF) mechanism that dynamically integrates statistical features and binary data streams to extract meaningful insights from limited datasets, thereby enhancing the effectiveness of IDSs in few-shot learning contexts. By introducing a metric-based meta-learning method and the Adaptive Feature Fusion mechanism, this study provides a feasible solution for developing a high-accuracy, multi-class few-shot intrusion detection system. A series of experiments show that this approach significantly improves the effectiveness of the intrusion detection system, achieving an impressive accuracy of 97.78% in multi-class tasks, even when the sample size is reduced to just one. Full article
Show Figures

Figure 1

Figure 1
<p>An abstract illustration demonstrating the meta-learning process. G represents normal traffic, A, B, C and F represent malicious traffic, with F having very few samples. The symbol ? denotes the classification of the sample into its respective category.</p>
Full article ">Figure 2
<p>Segmentation and examples of binary data stream representation.</p>
Full article ">Figure 3
<p>Pipeline of handling a binary data stream representation.</p>
Full article ">Figure 4
<p>Overall architecture of AFF.</p>
Full article ">Figure 5
<p>Accuracy of ablation experiments for binary and multi-class tasks. This figure shows the accuracy results from the ablation experiments.</p>
Full article ">Figure 6
<p>Accuracy and recall of feasibility experiments on the reconstructed ISCX2012 dataset.</p>
Full article ">
Back to TopTop