Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (6,017)

Search Parameters:
Keywords = secure communication

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
28 pages, 16471 KiB  
Article
An Institutional Theory Framework for Leveraging Large Language Models for Policy Analysis and Intervention Design
by J. de Curtò, I. de Zarzà, Leandro Sebastián Fervier, Victoria Sanagustín-Fons and Carlos T. Calafate
Future Internet 2025, 17(3), 96; https://doi.org/10.3390/fi17030096 - 20 Feb 2025
Abstract
This study proposes a comprehensive framework for integrating data-driven approaches into policy analysis and intervention strategies. The methodology is structured around five critical components: data collection, historical analysis, policy impact assessment, predictive modeling, and intervention design. Leveraging data-driven approaches capabilities, the line of [...] Read more.
This study proposes a comprehensive framework for integrating data-driven approaches into policy analysis and intervention strategies. The methodology is structured around five critical components: data collection, historical analysis, policy impact assessment, predictive modeling, and intervention design. Leveraging data-driven approaches capabilities, the line of work enables advanced multilingual data processing, advanced statistics in population trends, evaluation of policy outcomes, and the development of evidence-based interventions. A key focus is on the theoretical integration of social order mechanisms, including communication modes as institutional structures, token optimization as an efficiency mechanism, and institutional memory adaptation. A mixed methods approach was used that included sophisticated visualization techniques and use cases in the hospitality sector, in global food security, and in educational development. The framework demonstrates its capacity to inform government and industry policies by leveraging statistics, visualization, and AI-driven decision support. We introduce the concept of “institutional intelligence”—the synergistic integration of human expertise, AI capabilities, and institutional theory—to create adaptive yet stable policy-making systems. This research highlights the transformative potential of data-driven approaches combined with large language models in supporting sustainable and inclusive policy-making processes. Full article
(This article belongs to the Special Issue Generative Artificial Intelligence in Smart Societies)
Show Figures

Figure 1

Figure 1
<p><b>High-level framework for policy analysis and intervention design.</b> This diagram shows the core progression through the five main stages of the framework.</p>
Full article ">Figure 2
<p><b>Detailed components of the framework stages.</b> This diagram details the specific elements and interconnections within each framework stage.</p>
Full article ">Figure 3
<p><b>High-level communication structure.</b> This diagram presents an overview of how communication structure integrates determination, efficiency, and interaction layers, leading to output formation and social order impact.</p>
Full article ">Figure 4
<p><b>Detailed layer components of communication structure.</b> This diagram expands on the three primary layers—determination, efficiency, and interaction—detailing their internal components and interconnections.</p>
Full article ">Figure 5
<p><b>Interconnected insights into the hospitality market.</b> These visualizations collectively offer a comprehensive view of the spatial, typological, and temporal dimensions of the hospitality industry. Interactive version available at: <a href="https://public.flourish.studio/story/2733675/" target="_blank">https://public.flourish.studio/story/2733675/</a>, accessed on 1 January 2025.</p>
Full article ">Figure 6
<p><b>Visualization story with five acts developed in Tableau.</b> This multi-layered narrative explores temporal, regional, and demographic aspects of cancellations in the hospitality sector. Interactive version available at: <a href="https://public.tableau.com/app/profile/decurto/viz/Tendnciesdereservesdhotelsilescancellacions/Story1" target="_blank">https://public.tableau.com/app/profile/decurto/viz/Tendnciesdereservesdhotelsilescancellacions/Story1</a>, accessed on 1 January 2025.</p>
Full article ">Figure 7
<p><b>Interactive sunburst plot developed in D3.js of hotel reservation cancellations.</b> Interactive version available at: <a href="https://decurto01.netlify.app/" target="_blank">https://decurto01.netlify.app/</a>, accessed on accessed on 1 January 2025.</p>
Full article ">Figure 8
<p><b>Training dynamics across five-fold cross-validation of the GNN model.</b> Interactive visualization: <a href="https://api.wandb.ai/links/decurto-universidad-pontificia-comillas/kvhl87um" target="_blank">https://api.wandb.ai/links/decurto-universidad-pontificia-comillas/kvhl87um</a>, accessed on 1 January 2025.</p>
Full article ">Figure 9
<p><b>Left</b>: <b>Global food security choropleth map showing worldwide distribution of security metrics.</b> Interactive version available at: <a href="https://public.tableau.com/app/profile/decurto/viz/GlobalFoodSecurityComparingKeyIndicatorsAcrossCountries/Sheet1" target="_blank">https://public.tableau.com/app/profile/decurto/viz/GlobalFoodSecurityComparingKeyIndicatorsAcrossCountries/Sheet1</a>, accessed on 1 January 2025. <b>Right</b>: <b>Adult literacy rates visualization, focusing on sub-Saharan Africa.</b> Interactive version available at: <a href="https://public.tableau.com/app/profile/dezarza/viz/AdultLiteracyRatesinSub-SaharanAfrica/Sheet1" target="_blank">https://public.tableau.com/app/profile/dezarza/viz/AdultLiteracyRatesinSub-SaharanAfrica/Sheet1</a>, accessed on 1 January 2025.</p>
Full article ">Figure 10
<p><b>Visualization dashboard of global food security showing comparative metrics across countries.</b> Interactive version available at: <a href="https://foodsecurity-decurto.streamlit.app/" target="_blank">https://foodsecurity-decurto.streamlit.app/</a>, accessed on 1 January 2025.</p>
Full article ">Figure 11
<p><b>Dashboard of educational development tracking, focusing on literacy rates.</b> Interactive version available at: <a href="https://globaleducation-dezarza.streamlit.app/" target="_blank">https://globaleducation-dezarza.streamlit.app/</a>, accessed on 1 January 2025.</p>
Full article ">
19 pages, 1061 KiB  
Article
Decentralized Trace-Resistant Self-Sovereign Service Provisioning for Next-Generation Federated Wireless Networks
by Efat Fathalla and Mohamed Azab
Information 2025, 16(3), 159; https://doi.org/10.3390/info16030159 - 20 Feb 2025
Abstract
With the advent of NextG wireless networks, the reliance on centralized identity and service management systems poses significant challenges, including limited interoperability, increased privacy vulnerabilities, and the risk of unauthorized tracking or monitoring of user activity. To address these issues, there is a [...] Read more.
With the advent of NextG wireless networks, the reliance on centralized identity and service management systems poses significant challenges, including limited interoperability, increased privacy vulnerabilities, and the risk of unauthorized tracking or monitoring of user activity. To address these issues, there is a critical need for a decentralized framework that empowers users with self-sovereignty over their subscription information while maintaining trust and privacy among network entities. This article presents a novel framework to enable Self-Sovereign Federated NextG (SSFXG) wireless communication networks. The SSFXG framework separates identity management from the service management layer typically controlled by network operators to foster interoperability functionalities with enhanced privacy and trace-resistant assurances in the NextG landscape. The proposed model relies on blockchain technology as an infrastructure to enable single-authority-free service provisioning and boost mutual trust among federated network components. Further, the SSFXG framework facilitates subscribers’ self-sovereignty over their subscription information while ensuring anonymity and enhanced privacy preservation, avoiding unnecessary network activity monitoring or tracking. Preliminary evaluations demonstrated the effectiveness and efficiency of the proposed framework, making it a promising solution for advancing secure and interoperable NextG wireless networks. Full article
(This article belongs to the Special Issue Cybersecurity, Cybercrimes, and Smart Emerging Technologies)
Show Figures

Figure 1

Figure 1
<p>Proposed federated NextG NWs: High-level architecture and system components.</p>
Full article ">Figure 2
<p>Subscribers’ identity issuance and credentials storage and management stages.</p>
Full article ">Figure 3
<p>Subscription identity verification stage.</p>
Full article ">Figure 4
<p>NW service provisioning bidding scenario.</p>
Full article ">Figure 5
<p>Voice call requesting service.</p>
Full article ">Figure 6
<p>System scalability analysis.</p>
Full article ">Figure 7
<p>Operational cost analysis.</p>
Full article ">
16 pages, 2526 KiB  
Article
Network Architecture of a Fog–Cloud-Based Smart Farming System
by Alain Biheng, Chunling Tu, Pius Adewale Owolawi, Deon Du Plessis and Shengzhi Du
IoT 2025, 6(1), 17; https://doi.org/10.3390/iot6010017 - 20 Feb 2025
Abstract
With the rapid increase in the human population and urbanization worldwide, the demand for food production has played a significant role in driving the integration of technology into agriculture. Various Cloud-based systems, such as livestock tracking systems, have been proposed. In those systems, [...] Read more.
With the rapid increase in the human population and urbanization worldwide, the demand for food production has played a significant role in driving the integration of technology into agriculture. Various Cloud-based systems, such as livestock tracking systems, have been proposed. In those systems, data were collected by the sensors and sent to the Cloud for processing. However, significant issues with those systems were noted, such as high bandwidth utilization and security concerns, such as a high volume of row data traveling from the data collection devices (such as sensors) to the Cloud through the Internet. Additionally, the long distance between the Cloud and the data collection devices makes it unsuitable for latency-sensitive livestock disease monitoring and tracking systems. Therefore, this paper proposes a Fog–Cloud-based approach, where the processing is conducted at the Fog layer, closer to the data collection devices, and only the result is sent to the Cloud for remote viewing. The proposed method aims to reduce power consumption and latency in communication. To validate the proposed method, both the Cloud-based and Fog–Cloud-based scenarios are simulated using iFogSim (a novel simulation tool for IoT and Cloud computing), and the result shows that there is less than twice the power consumption in some scenarios and that the time consumed in the proposed Fog–Cloud-based system, depending on the number of sensors, is five to ten times lower. This study further supports the point that the Fog–Cloud-based is suitable for latency-dependent farming systems such as livestock tracking systems. Full article
Show Figures

Figure 1

Figure 1
<p>Structure of the proposed Fog–Cloud-based livestock farming system.</p>
Full article ">Figure 2
<p>Basic structure of a data collection module.</p>
Full article ">Figure 3
<p>Signal flow graph of the proposed system.</p>
Full article ">Figure 4
<p>Cloud-based design.</p>
Full article ">Figure 5
<p>Fog–Cloud-based design.</p>
Full article ">Figure 6
<p>Cloud-based and Fog–Cloud-based overall system delay.</p>
Full article ">Figure 7
<p>Cloud-based and Fog–Cloud-based energy consumption.</p>
Full article ">
22 pages, 8222 KiB  
Article
Formalization and Verification of PaxosStore from Process Algebra Perspective
by Wanling Xie, Yang Yuan and Chenyang Zhu
Electronics 2025, 14(5), 823; https://doi.org/10.3390/electronics14050823 - 20 Feb 2025
Abstract
PaxosStore is a high-availability storage system developed to support the comprehensive business of WeChat. With the widespread application of WeChat, it is particularly important to verify the safety of PaxosStore. This work proposes a formal model for the storage system PaxosStore using the [...] Read more.
PaxosStore is a high-availability storage system developed to support the comprehensive business of WeChat. With the widespread application of WeChat, it is particularly important to verify the safety of PaxosStore. This work proposes a formal model for the storage system PaxosStore using the process algebra Communicating Sequential Processes (CSP) to clearly reflect the interactions of the components in PaxosStore. More importantly, we utilize the model checker Process Analysis Toolkit (PAT) to simulate and verify the constructed CSP model. We specifically verify the validity of six properties: deadlock-freeness, divergence-freeness, robustness, consistency, nontriviality and liveness. Through the verification results, we demonstrate that our formalization model successfully satisfies these properties, confirming the correctness and effectiveness of the framework in ensuring secure interactions among the PaxosStore storage system components. Full article
Show Figures

Figure 1

Figure 1
<p>The overall architecture of PaxosStore.</p>
Full article ">Figure 2
<p>The Paxos procedure.</p>
Full article ">Figure 3
<p>Reading a value.</p>
Full article ">Figure 4
<p>Basic process of the model checking approach.</p>
Full article ">Figure 5
<p>The framework of the PaxosStore model.</p>
Full article ">Figure 6
<p>The message communication.</p>
Full article ">Figure 7
<p>A simulation for PaxosStore.</p>
Full article ">Figure 8
<p>Verification results for PaxosStore.</p>
Full article ">Figure 9
<p>Detailed verification results of deadlock-freeness and divergence-freeness.</p>
Full article ">Figure 10
<p>Detailed verification result of robustness.</p>
Full article ">Figure 11
<p>Detailed verification result of consistency.</p>
Full article ">Figure 12
<p>Detailed verification result of nontriviality.</p>
Full article ">Figure 13
<p>Detailed verification result of liveness.</p>
Full article ">
20 pages, 613 KiB  
Article
Max-Min Secrecy Rate for UAV-Assisted Energy Harvesting IoT Networks
by Mingrui Zheng, Tianrui Feng and Tengjiao He
Information 2025, 16(2), 158; https://doi.org/10.3390/info16020158 - 19 Feb 2025
Abstract
The future Internet of Things (IoT) will consist of energy harvesting devices and Unmanned Aerial Vehicles (UAVs) to support applications in remote areas. However, as UAVs communicate with IoT devices using broadcast channels, information leakage emerges as a critical security threat. This paper [...] Read more.
The future Internet of Things (IoT) will consist of energy harvesting devices and Unmanned Aerial Vehicles (UAVs) to support applications in remote areas. However, as UAVs communicate with IoT devices using broadcast channels, information leakage emerges as a critical security threat. This paper considers the problem of maximizing the minimum secrecy rate in an energy harvesting IoT network supported by two UAVs, where one acts as a server to collect data from devices, and the other is an eavesdropper to intercept data transmission. It presents a novel Mixed-Integer Nonlinear Program (MINLP), which we then linearize into a Mixed-Integer Linear Program (MILP) problem. It also proposes a heuristic solution called Fly Nearest Location (FNL). Both solutions determine (i) the UAV server’s flight routing, flight time, and computation time, as well as (ii) the energy usage and operation mode of IoT devices. Our results show that FNL achieves on average 78.15% of MILP’s performance. Full article
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>An example UAV-assisted IoT network with solar-powered devices. The hovering locations of UAV-S are labeled as A, B, and C. The red dotted line indicates a possible trajectory for UAV-S, and the green dotted lines indicate jamming transmissions. Blue solid lines represent data transmissions.</p>
Full article ">Figure 2
<p>Frame structure: each frame includes a <span class="html-italic">flight</span> slot and a <span class="html-italic">data</span> slot.</p>
Full article ">Figure 3
<p>Impact of number of locations <math display="inline"><semantics> <mrow> <mo>|</mo> <mi mathvariant="script">M</mi> <mo>|</mo> </mrow> </semantics></math> on max-min secrecy rate.</p>
Full article ">Figure 4
<p>Impact of number of devices <math display="inline"><semantics> <mrow> <mo>|</mo> <mi mathvariant="script">V</mi> <mo>|</mo> </mrow> </semantics></math> on max-min secrecy rate.</p>
Full article ">Figure 5
<p>Impact of number of locations <math display="inline"><semantics> <mrow> <mo>|</mo> <mi mathvariant="script">T</mi> <mo>|</mo> </mrow> </semantics></math> on max-min secrecy rate.</p>
Full article ">Figure 6
<p>Impact of transmit power of devices <math display="inline"><semantics> <msub> <mi>P</mi> <mn>0</mn> </msub> </semantics></math> on max-min secrecy rate.</p>
Full article ">Figure 7
<p>Impact of network bandwidth <span class="html-italic">W</span> on max-min secrecy rate.</p>
Full article ">Figure 8
<p>Impact of energy harvesting efficiency on max-min secrecy rate.</p>
Full article ">
19 pages, 552 KiB  
Article
Securing Automatic Identification System Communications Using Physical-Layer Key Generation Protocol
by Jingyu Sun, Zhimin Yi, Ziyi Zhuang and Shengming Jiang
J. Mar. Sci. Eng. 2025, 13(2), 386; https://doi.org/10.3390/jmse13020386 - 19 Feb 2025
Abstract
The automatic identification system (AIS) is an essential tool for modern ships, enabling the broadcast of identification and location information. However, the current AIS standard lacks security features, meaning that messages exchanged via AISs are transmitted in plaintext, which leads to security issues [...] Read more.
The automatic identification system (AIS) is an essential tool for modern ships, enabling the broadcast of identification and location information. However, the current AIS standard lacks security features, meaning that messages exchanged via AISs are transmitted in plaintext, which leads to security issues such as privacy leakage. Most existing solutions rely on public key cryptography. This paper proposes a physical-layer key generation protocol based on the current AIS standard (ITU-R M.1371-5). In the case of unicast AIS communication, the protocol utilizes channel randomness to generate symmetric keys for securing communications. Compared to public key cryptography, the proposed protocol offers advantages such as low overhead, elimination of third parties, and ease of implementation. Finally, this paper discusses the security of the protocol against various threats as well as evaluates its performance and overhead. Under common speed and signal-to-noise ratio (SNR) conditions, The protocol generates Advanced Encryption Standard (AES) keys of different lengths in under 4000 ms, and these keys successfully pass the National Institute of Standards and Technology (NIST) randomness test. Full article
(This article belongs to the Section Ocean Engineering)
Show Figures

Figure 1

Figure 1
<p>Communication scenarios for key generation.</p>
Full article ">Figure 2
<p>Key generation process.</p>
Full article ">Figure 3
<p>(<b>a</b>) Full-duplex probing and (<b>b</b>) half-duplex probing.</p>
Full article ">Figure 4
<p>Correlation time at different relative speeds.</p>
Full article ">Figure 5
<p>Channel probing.</p>
Full article ">Figure 6
<p>Simulation of received signal.</p>
Full article ">Figure 7
<p>Curves showing changes in key generation rate with SNR at different relative speeds.</p>
Full article ">Figure 8
<p>The time cost of generating keys of different bit numbers at different relative speeds.</p>
Full article ">
15 pages, 1028 KiB  
Article
Food Security in Brazil: Evaluation of the Effectiveness of Community Restaurants in the North and Northeast Regions
by Mateus Santana Sousa, Rita de Cássia Akutsu, Calliandra Maria de Souza Silva, Camila Silveira Silva Teixeira and Izabel Cristina Rodrigues da Silva
Int. J. Environ. Res. Public Health 2025, 22(2), 315; https://doi.org/10.3390/ijerph22020315 - 19 Feb 2025
Abstract
Community Restaurants (CRs), part of the Brazilian government’s Popular Restaurant Program (PRP), provide free and/or affordable nutritionally balanced meals as an essential strategy to meet the most vulnerable population’s basic needs and rights. This cross-sectional study evaluated the effectiveness of these CRs’ proposed [...] Read more.
Community Restaurants (CRs), part of the Brazilian government’s Popular Restaurant Program (PRP), provide free and/or affordable nutritionally balanced meals as an essential strategy to meet the most vulnerable population’s basic needs and rights. This cross-sectional study evaluated the effectiveness of these CRs’ proposed objectives in cities with ≥100,000 inhabitants in Brazil’s northern and northeastern regions—Brazil’s most vulnerable and historically unequal regions. Effectiveness was assessed using a CR evaluation matrix-based indicator system to classify CRs as “not very effective”, “effective”, or “very effective”. Among the 94 CRs assessed (north: n = 23, 24.5%; northeast: n = 71, 75.5%), most were classified as “effective” or “very effective”, except for the northern states of Amapá and Tocantins, whose only CR was rated as “not very effective” and the northeastern state of Sergipe, which had a PR considered “not very effective”. State-operated CRs predominated (north: 82.6%; northeast: 76.1%) and primarily operated Monday to Friday (north: 87.0%; northeast: 59.2%), with 35.2% of the northeast CRs operating daily, serving lunch as the main meal (100%). Average daily meal counts were 486.5 (north) and 926.9 (northeast), and the average meal offering time was from 10:55 am to 1:21 pm in the north and from 10:35 am to 2:00 pm in the northeast region, with costs averaging USD 0.27 and USD 0.20, respectively. All CRs employed a nutritionist as a technical manager responsible for menu planning and demonstrated compliance with essential infrastructure criteria, including regular waste collection, water supply, and proximity to public transport. Most were in areas with sanitary sewage coverage (north: 91.3%; northeast: 98.6%) and had monitoring mechanisms (91.3% north; 94.4% northeast) and prioritization systems for vulnerable populations (north: 73.9%; northeast: 80.0%). These findings indicate that CRs in these regions effectively strive to address food security goals, demonstrating tangible outcomes that benefit society. Full article
Show Figures

Figure 1

Figure 1
<p>Description of the data collection process, Brazil, 2024.</p>
Full article ">Figure 2
<p>Distribution and percentage of Community Restaurants according to the states of the north and northeast regions of Brazil, 2024.</p>
Full article ">
28 pages, 474 KiB  
Article
Security Performance Analysis of Downlink Double Intelligent Reflecting Surface Non-Orthogonal Multiple Access Network for Edge Users
by Nguyen Thai Anh, Nguyen Hoang Viet, Dinh-Thuan Do and Adão Silva
Sensors 2025, 25(4), 1274; https://doi.org/10.3390/s25041274 - 19 Feb 2025
Abstract
In this work, we study the security performance of a double intelligent reflecting surface non-orthogonal multiple access (DIRS-NOMA) wireless communication system supporting communication for a group of two NOMA users (UEs) at the edge, with the existence of an eavesdropping device (ED). We [...] Read more.
In this work, we study the security performance of a double intelligent reflecting surface non-orthogonal multiple access (DIRS-NOMA) wireless communication system supporting communication for a group of two NOMA users (UEs) at the edge, with the existence of an eavesdropping device (ED). We also assume that there is no direct connection between the BS and the UEs. From the proposed model, we compute closed-form expressions for the secrecy outage probability (SOP) and the average security rate (ASR) for each UE. After that, we discuss and analyze the system security performance according to the NOMA power allocation for each user and the number of IRS counter-emission elements. In addition, we analyze the SOP of both the considered DIRS-NOMA and conventional NOMA systems to demonstrate that DIRS-NOMA systems have much better security than conventional NOMA systems. Based on the analytical results, we develop an ASR optimization algorithm using the alternating optimization method, combining NOMA power allocation factor optimization and IRS passive beam optimization through the Lagrange double transform. The derived analytical expressions are validated through Monte Carlo simulations. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

Figure 1
<p>DIRS-NOMA network model.</p>
Full article ">Figure 2
<p>Alternating optimization for (42a)–(42c).</p>
Full article ">Figure 3
<p>Alternating optimization for (59a)–(59c).</p>
Full article ">Figure 4
<p><math display="inline"><semantics> <mrow> <mi>S</mi> <mi>O</mi> <mi>P</mi> </mrow> </semantics></math> of UEs with different numbers of IRS reflection elements.</p>
Full article ">Figure 5
<p>SOP of UEs with different power allocation factors.</p>
Full article ">Figure 6
<p>Comparison of SOPs between DIRS-NOMA and NOMA systems.</p>
Full article ">Figure 7
<p>ASR of UEs with different numbers of IRS reflection elements.</p>
Full article ">Figure 8
<p>ASR of UEs with different NOMA power allocation factors.</p>
Full article ">
22 pages, 658 KiB  
Article
An SSI-Based Solution to Support Lawful Interception
by Francesco Buccafurri, Aurelio Loris Canino, Vincenzo De Angelis, Annunziata Laurenda and Gianluca Lax
Appl. Sci. 2025, 15(4), 2206; https://doi.org/10.3390/app15042206 - 19 Feb 2025
Abstract
Lawful Interception refers to the acquisition of the contents of communications between private individuals or organizations by subjects authorized by law. It involves three actors: the network operator (NO), the Law Enforcement Agency (LEA), and the Law Enforcement Monitoring Facility (LEMF). In the [...] Read more.
Lawful Interception refers to the acquisition of the contents of communications between private individuals or organizations by subjects authorized by law. It involves three actors: the network operator (NO), the Law Enforcement Agency (LEA), and the Law Enforcement Monitoring Facility (LEMF). In the literature, standards and scientific solutions are proposed for the interception procedure and the interaction between the NO and the LEMF. However, no standard has been proposed for the interaction between the LEMF and the LEA. The absence of standards for controlling LEA (or a delegated agency) access to intercepted contents stored by the LEMF is a significant gap that should be overcome. This prevents the implementation of secure, interoperable, and automated procedures, leading to inefficiencies and security risks. In this paper, we propose to cover the above gap by adopting the Self-Sovereign Identity (SSI) paradigm. The adopted research methodology follows a multi-phase approach that includes studying existing solutions, system design, and technical feasibility testing. The study first examines existing standards and identity management frameworks and their limitations. Next, an SSI-based architecture is proposed to manage the interactions between LEA (or a delegated agency) and LEMF. Finally, a proof of concept of the proposed solution written in Python and using the Hyperledger Indy blockchain has been implemented to assess whether our proposal is technically feasible. The proposed solution enhances automation, security, and interoperability in lawful interception. Indeed, it enables machine-readable authorizations, reducing errors and improving efficiency by eliminating manual operations. Additionally, verifiable credentials and decentralized identifiers strengthen security and standardize interactions across jurisdictions, ensuring privacy-preserving identity management. By standardizing interactions between LEA and LEMF, this research contributes to a more secure, privacy-preserving, and legally compliant lawful interception process. Full article
Show Figures

Figure 1

Figure 1
<p>Sequence diagram of the Setup in the LI procedure.</p>
Full article ">Figure 2
<p>Sequence diagram of the EA integration in the LI procedure.</p>
Full article ">Figure 3
<p>Comparison between the general SSI stack (<b>a</b>) and its instantiated version (<b>b</b>).</p>
Full article ">Figure 4
<p>Registration of LEA, LEMF, and NA Agency.</p>
Full article ">Figure 5
<p>Fields of NA Agency registration.</p>
Full article ">Figure 6
<p>Overview of the Employee Credential (<b>a</b>) and X Credential Verification (<b>b</b>).</p>
Full article ">Figure 7
<p>Overview of QR Code (<b>a</b>) and Verifiable Presentation (<b>b</b>).</p>
Full article ">Figure 8
<p>Overview of the X Credential issuance process (<b>a</b>) and its storage in Bob’s wallet (<b>b</b>).</p>
Full article ">Figure 9
<p>Overview of the policy for the Y Credential (<b>a</b>) and the Y Credential itself (<b>b</b>).</p>
Full article ">Figure 10
<p>Indy Scan.</p>
Full article ">
11 pages, 4311 KiB  
Article
Electrically Tunable Metasurface for Multi-Polarized Reflection
by Bing Li, Yunhan Wang, Chunan Wang and Shiqi Liu
Remote Sens. 2025, 17(4), 700; https://doi.org/10.3390/rs17040700 - 18 Feb 2025
Abstract
Most electromagnetic metasurfaces only control a single property of electromagnetic waves, such as the phase, amplitude, polarization or frequency, leading to a shortage in capacity and security in communication and a decrease in radar imaging efficiency. By switching the states of four PIN [...] Read more.
Most electromagnetic metasurfaces only control a single property of electromagnetic waves, such as the phase, amplitude, polarization or frequency, leading to a shortage in capacity and security in communication and a decrease in radar imaging efficiency. By switching the states of four PIN diodes soldered between adjacent resonant arms, cross-polarization and co-polarization reflected waves both with a 1-bit phase can be implemented. The simulation results demonstrate that the proposed metasurface operates within a frequency band of 5.7 GHz to 5.88 GHz, covering ISM 5.8 GHz. Within its operational frequency range, in the cross-polarization reflection case, the losses of the 1-bit phase reflected wave are from 1 dB to 1.5 dB, with a high polarization conversion rate exceeding 91% and even reaching 99%. For the co-polarization reflection case, the losses of the 1-bit reflected wave are from 0.3 dB to 2 dB, and the polarization conversion is almost 100%. The phase difference of the reflected wave in both cases can be realized as about 180°, which satisfies the 1-bit phase requirement for building a good property of beam steering. Upon constructing a 10 × 10 small array, the cross-polarized reflection beam can be steered within the range of elevation angle from 0° to 45° and the elevation angle from 0° to 30° in the co-polarized reflection case. Full article
Show Figures

Figure 1

Figure 1
<p>Structure of the metasurface’s unit cell. p = 25 mm, h = 1.6 mm, l = 10.4 mm, w = 0.7 mm, d = 2 mm, R = 0.5 mm, and r = 0.3 mm.</p>
Full article ">Figure 2
<p>Reflection coefficient and phase difference in (<b>a</b>) CP1, (<b>b</b>) CP2, (<b>c</b>) CoP1 and (<b>d</b>) CoP2. Rectangle shadow is working band (5.7~5.88 GHz).</p>
Full article ">Figure 3
<p>Reflection loss in (<b>a</b>) CP1 and CP2 and (<b>b</b>) CoP1 and CoP2. (<b>c</b>) PCR in CP1, CP2, CoP1 and CoP2. Rectangle shadow is working band (5.7~5.88 GHz).</p>
Full article ">Figure 4
<p>Phase difference in CP case and CoP case. Rectangle shadow is working band (5.7~5.88 GHz).</p>
Full article ">Figure 5
<p>Surface current at 5.8 GHz. (<b>a</b>) CP1. (<b>b</b>) CP2. (<b>c</b>) CoP1. The dashed circular outlines indicate the current loop. (<b>d</b>) CoP2. The closed dashed lines indicate the self-resonant current path.</p>
Full article ">Figure 6
<p>The total reflected far-field at 5.8 GHz shaped in different angles. (<b>a</b>) CP case. (<b>b</b>) CoP case. Near the far-field is the metasurface’s configuration. “0” represents CP1 or CoP1, and “1” illustrates CP2 or CoP2.</p>
Full article ">Figure 6 Cont.
<p>The total reflected far-field at 5.8 GHz shaped in different angles. (<b>a</b>) CP case. (<b>b</b>) CoP case. Near the far-field is the metasurface’s configuration. “0” represents CP1 or CoP1, and “1” illustrates CP2 or CoP2.</p>
Full article ">
19 pages, 1823 KiB  
Article
A Secure and Efficient Access-Control Scheme Based on Blockchain and CP-ABE for UAV Swarm
by Pengbin Han, Aina Sui and Jiang Wu
Drones 2025, 9(2), 148; https://doi.org/10.3390/drones9020148 - 18 Feb 2025
Abstract
With the continuous development of UAV technology, the application of UAV swarm has gradually become the focus of research all over the world. Although UAV swarm provides some advantages in terms of autonomous collaboration, the traditional UAV management technology suffers from security challenges, [...] Read more.
With the continuous development of UAV technology, the application of UAV swarm has gradually become the focus of research all over the world. Although UAV swarm provides some advantages in terms of autonomous collaboration, the traditional UAV management technology suffers from security challenges, including the risk of single points of failure due to centralized control, which makes UAV swarm susceptible to hacker attacks. Due to some advantages of blockchain, such as decentralization, tamper-proof characteristics, and traceability, it is applied to the drone swarm to solve some security challenges brought about by centralized management. However, blockchain cannot achieve secure access control on the data it stores, which may leak some crucial data. Therefore, a secure and efficient access-control model based on blockchain and ciphertext-policy attribute-based encryption (CP-ABE) is proposed, and a secure data-access scheme is designed under this model, which can not only prevent the leakage of critical data but also realize lightweight access control. Moreover, to improve the decryption efficiency of the data user, an outsourcing-based data decryption scheme is also studied, in which the complex calculations are completed by the data user agency. The experiments show that when the number of attributes is 60, the computation cost of the proposed scheme is 0.404 s, which is much lower than the existing research, and is more suitable for the UAV swarm with limited computing power. Moreover, the communication cost of the proposed scheme is reduced by about 30% compared with the existing scheme under the same conditions. The security analysis also shows that the proposed scheme is secure and reliable, and can resist a variety of attacks such as collusion attacks, man-in-the-middle attacks, and forgery attacks. Full article
Show Figures

Figure 1

Figure 1
<p>Access tree.</p>
Full article ">Figure 2
<p>Access-tree marker results.</p>
Full article ">Figure 3
<p>System model.</p>
Full article ">Figure 4
<p>The proposed scheme work processing.</p>
Full article ">Figure 5
<p>Computation cost comparison [<a href="#B39-drones-09-00148" class="html-bibr">39</a>,<a href="#B41-drones-09-00148" class="html-bibr">41</a>].</p>
Full article ">Figure 6
<p>Encryptiontime comparison [<a href="#B39-drones-09-00148" class="html-bibr">39</a>,<a href="#B41-drones-09-00148" class="html-bibr">41</a>].</p>
Full article ">Figure 7
<p>Pre-decryption time comparison [<a href="#B39-drones-09-00148" class="html-bibr">39</a>,<a href="#B41-drones-09-00148" class="html-bibr">41</a>].</p>
Full article ">Figure 8
<p>Communication cost comparison by varying number of attributes [<a href="#B39-drones-09-00148" class="html-bibr">39</a>,<a href="#B41-drones-09-00148" class="html-bibr">41</a>].</p>
Full article ">
21 pages, 783 KiB  
Article
Robust Beamfocusing for Secure NFC with Imperfect CSI
by Weijian Chen, Zhiqiang Wei and Zai Yang
Sensors 2025, 25(4), 1240; https://doi.org/10.3390/s25041240 - 18 Feb 2025
Abstract
In this paper, we consider the issue of the physical layer security (PLS) problem between two nodes, i.e., transmitter (Alice) and receiver (Bob), in the presence of an eavesdropper (Eve) in a near-field communication (NFC) system. Notably, massive multiple-input multiple-output (MIMO) arrays significantly [...] Read more.
In this paper, we consider the issue of the physical layer security (PLS) problem between two nodes, i.e., transmitter (Alice) and receiver (Bob), in the presence of an eavesdropper (Eve) in a near-field communication (NFC) system. Notably, massive multiple-input multiple-output (MIMO) arrays significantly increase array aperture, thereby rendering the eavesdroppers more inclined to lurk near the transmission end. This situation necessitates using near-field channel models to more accurately describe channel characteristics. We consider two schemes with imperfect channel estimation information (CSI). The first scheme involves a conventional multiple-input multiple-output multiple-antenna eavesdropper (MIMOME) setup, where Alice simultaneously transmits information signal and artificial noise (AN). In the second scheme, Bob operates in a full-duplex (FD) mode, with Alice transmitting information signal while Bob emits AN. We then jointly design beamforming and AN vectors to degrade the reception signal quality at Eve, based on the signal-to-interference-plus-noise ratio (SINR) of each node. To tackle the power minimization problem, we propose an iterative algorithm that includes an additional constraint to ensure adherence to specified quality-of-service (QoS) metrics. Additionally, we decompose the robust optimization problem of the two schemes into two sub-problems, with one that can be solved using generalized Rayleigh quotient methods and the other that can be addressed through semi-definite programming (SDP). Finally, our simulation results confirm the viability of the proposed approach and demonstrate the effectiveness of the protection zone for NFC systems operating with CSI. Full article
(This article belongs to the Special Issue Secure Communication for Next-Generation Wireless Networks)
Show Figures

Figure 1

Figure 1
<p>The near-field secure wireless communication system.</p>
Full article ">Figure 2
<p>Convergence behavior of the proposed algorithm for both schemes. (<b>a</b>) When Eve is within the near-field region of Alice. (<b>b</b>) When Eve is within the near-field region of Bob.</p>
Full article ">Figure 3
<p>The average transmit power versus minimum required SINR <math display="inline"><semantics> <msub> <mo>Γ</mo> <mi>Req</mi> </msub> </semantics></math>.</p>
Full article ">Figure 4
<p>(<b>a</b>) The average transmit power versus number of Alice’s antennas <math display="inline"><semantics> <msub> <mi>N</mi> <mi mathvariant="normal">A</mi> </msub> </semantics></math>. (<b>b</b>) The average transmit power versus number of Eve’s antennas <math display="inline"><semantics> <msub> <mi>N</mi> <mi mathvariant="normal">E</mi> </msub> </semantics></math>.</p>
Full article ">Figure 5
<p>The average transmit power versus the distance between Alice and Eve.</p>
Full article ">Figure 6
<p>Normalized power heat maps for Scheme I. (<b>a</b>) Desired signal power. (<b>b</b>) Interference-plus-noise power.</p>
Full article ">Figure 7
<p>Normalized power heat maps for scheme II. (<b>a</b>) Desired signal power. (<b>b</b>) Interference-plus-noise power.</p>
Full article ">
30 pages, 5036 KiB  
Article
Chaotic Hénon–Logistic Map Integration: A Powerful Approach for Safeguarding Digital Images
by Abeer Al-Hyari, Mua’ad Abu-Faraj, Charlie Obimbo and Moutaz Alazab
J. Cybersecur. Priv. 2025, 5(1), 8; https://doi.org/10.3390/jcp5010008 - 18 Feb 2025
Abstract
This paper presents an integrated chaos-based algorithm for image encryption that combines the chaotic Hénon map and chaotic logistic map (CLM) to enhance the security of digital image communication. The proposed method leverages chaos theory to generate cryptographic keys, utilizing a 1D key [...] Read more.
This paper presents an integrated chaos-based algorithm for image encryption that combines the chaotic Hénon map and chaotic logistic map (CLM) to enhance the security of digital image communication. The proposed method leverages chaos theory to generate cryptographic keys, utilizing a 1D key from the logistic map generator and a 2D key from the chaotic Hénon map generator. These chaotic maps produce highly unpredictable and complex keys essential for robust encryption. Extensive experiments demonstrate the algorithm’s resilience against various attacks, including chosen-plaintext, noise, clipping, occlusion, and known-plaintext attacks. Performance evaluation in terms of encryption time, throughput, and image quality metrics validates the effectiveness of the proposed integrated approach. The results indicate that the chaotic Hénon–logistic map integration provides a powerful and secure method for safeguarding digital images during transmission and storage with a key space that reaches up to 2200. Moreover, the algorithm has potential applications in secure image sharing, cloud storage, and digital forensics, inspiring new possibilities. Full article
(This article belongs to the Special Issue Cybersecurity in the Age of AI and IoT: Challenges and Innovations)
Show Figures

Figure 1

Figure 1
<p>Graphical abstract of the proposed method.</p>
Full article ">Figure 2
<p>The proposed encryption method.</p>
Full article ">Figure 3
<p>The proposed decryption method.</p>
Full article ">Figure 4
<p>Key generation and structure.</p>
Full article ">Figure 5
<p>Key-space analysis.</p>
Full article ">Figure 6
<p>Histogram analysis.</p>
Full article ">Figure 7
<p>The correlation coefficient analysis across the three color channels.</p>
Full article ">Figure 8
<p>The impact of a slight change in the private key on the decrypted image.</p>
Full article ">Figure 9
<p>All-black image encryption using the proposed method.</p>
Full article ">Figure 10
<p>All-white image encryption using the proposed method.</p>
Full article ">Figure 11
<p>Robustness analysis of salt-and-pepper noise.</p>
Full article ">Figure 12
<p>Robustness analysis of Gaussian noise.</p>
Full article ">Figure 13
<p>Low occlusion values.</p>
Full article ">Figure 14
<p>High occlusion values.</p>
Full article ">Figure 15
<p>Different dynamic range values.</p>
Full article ">
41 pages, 2893 KiB  
Systematic Review
Impact of Information and Communication Technologies on Democratic Processes and Citizen Participation
by George Asimakopoulos, Hera Antonopoulou, Konstantinos Giotopoulos and Constantinos Halkiopoulos
Societies 2025, 15(2), 40; https://doi.org/10.3390/soc15020040 - 18 Feb 2025
Abstract
Background: This systematic review will address the influence of Information and Communication Technologies (ICTs) on democratic processes and citizens’ participation, which is enabled by such tools as social media, e-voting systems, e-government initiatives, and e-participation platforms. Methods: Based on an in-depth analysis of [...] Read more.
Background: This systematic review will address the influence of Information and Communication Technologies (ICTs) on democratic processes and citizens’ participation, which is enabled by such tools as social media, e-voting systems, e-government initiatives, and e-participation platforms. Methods: Based on an in-depth analysis of 46 peer-reviewed articles published between 1999 and 2024, this review emphasizes how ICTs have improved democratic engagement quality, efficiency, and transparency, but highlights key challenges and research gaps. Results: From this angle, ICT tools have great potential to nurture civic engagement and good governance through transparency. Challenges persist with the ethical and social implications of surveillance technologies, security concerns about digital voting systems, and the widening digital divide disproportionately affecting marginalized populations. The current regulatory framework dealing with privacy and misinformation issues is relatively weak, and there is also a lack of understanding about ICTs’ long-term effects on democratic governance. Conclusions: This review underlines the duality of the roles played by ICT as both an enabler and a challenge to democratic processes. It calls for regulatory measures to protect privacy, fight disinformation, and reduce the digital divide. Future research in this area should focus on the long-term effects of ICTs and how they can be equitably and efficiently integrated into democratic systems, with strategies aimed at maximizing benefits while minimizing risks. Full article
Show Figures

Figure 1

Figure 1
<p>Annual publication trends on ICTs and democratic processes.</p>
Full article ">Figure 2
<p>Flowchart of PRISMA methodology.</p>
Full article ">Figure 3
<p>Distribution of themes in ICT tools discussed in the studies.</p>
Full article ">Figure 4
<p>Impacts and challenges of ICT tools in democratic processes.</p>
Full article ">Figure 5
<p>Challenges highlighted in studies on ICT and democratic processes.</p>
Full article ">Figure 6
<p>ICT impact on democratic participation.</p>
Full article ">Figure 7
<p>Heatmap of ICT impact and challenges in democratic processes.</p>
Full article ">
13 pages, 2881 KiB  
Article
Can Climate-Resilient Tilapia Cage Culture Support Sustainable Livelihoods in Flood-Prone Bangladesh?
by Mohammed Ariful Islam, Mrityunjoy Kunda, Ahmed Harun-Al-Rashid, Atiqur Rahman Sunny, Mahmudul Hasan Mithun, Sharif Ahmed Sazzad and Md Khurshid Alam Bhuiyan
Water 2025, 17(4), 585; https://doi.org/10.3390/w17040585 - 18 Feb 2025
Abstract
The Haor region in northeastern Bangladesh, characterized by seasonal wetlands and a heavy reliance on fisheries, faces significant challenges due to climate change. Erratic rainfall, prolonged flooding, and ecosystem degradation threaten traditional fishing practices and community livelihoods. This study investigates the potential of [...] Read more.
The Haor region in northeastern Bangladesh, characterized by seasonal wetlands and a heavy reliance on fisheries, faces significant challenges due to climate change. Erratic rainfall, prolonged flooding, and ecosystem degradation threaten traditional fishing practices and community livelihoods. This study investigates the potential of climate-resilient cage aquaculture as a sustainable, alternative income-generating solution for vulnerable Haor communities. An 80-day experiment was conducted in five villages of Sunamganj district, Sylhet division, Bangladesh, where tilapia (Oreochromis niloticus) fry were reared in climate-resilient floating cages at five stocking densities: T1 (800 fry/m3), T2 (900 fry/m3), T3 (1000 fry/m3), T4 (1100 fry/m3), and T5 (1200 fry/m3). Key environmental parameters, including temperature (28.12–29.55 °C), dissolved oxygen (4.61–6.55 mg/L), pH (7.53–7.72), and ammonia (0.05–0.76 mg/L), remained within optimal ranges across treatments. Growth performance, survival rate, and economic feasibility were evaluated with T5 yielding the highest gross production (51.77 ± 4.80 kg/m3) and net benefits (7500 ± 500 BDT/m3), achieving a benefit–cost ratio of 1:2.86. The survey findings revealed that a majority of fishers (82%) identified tilapia cage culture as a promising alternative livelihood, yet financial constraints and limited access to credit hinder adoption. Despite these socioeconomic challenges, our findings suggest that tilapia cage culture offers a viable income-generating solution, particularly during flood periods. The study highlights floating cage aquaculture as a climate-resilient strategy to mitigate climate impacts, enhance food security, and improve economic resilience in flood-prone and ecologically sensitive regions. Full article
(This article belongs to the Special Issue Impact of Climate Change on Marine Ecosystems)
Show Figures

Figure 1

Figure 1
<p>Study area of Derai Upazila of Sunamganj district, Bangladesh, showing the water bodies of five selected villages.</p>
Full article ">Figure 2
<p>Low-cost climate-resilient floating cages are constructed with bamboo. (<b>A</b>) Schematic of cage construction, (<b>B</b>) Cage construction in real life.</p>
Full article ">Figure 3
<p>Preferred alternative income-generating activities (AIGAs) among fishers.</p>
Full article ">Figure 4
<p>Growth performance (±SD) of tilapia fry in floating cage over 80 days of nursing.</p>
Full article ">Figure 5
<p>Economic evaluation of tilapia fry production in five treatments based on m<sup>3</sup> area.</p>
Full article ">
Back to TopTop