Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (4,716)

Search Parameters:
Keywords = security attacks

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
19 pages, 1331 KiB  
Article
Hybrid Neural Network-Based Intrusion Detection System: Leveraging LightGBM and MobileNetV2 for IoT Security
by Yi-Min Yang, Ko-Chin Chang and Jia-Ning Luo
Symmetry 2025, 17(3), 314; https://doi.org/10.3390/sym17030314 - 20 Feb 2025
Abstract
The rapid expansion of the Internet of Things (IoT) has uncovered a significant asymmetry in cybersecurity, where low-power edge devices must face sophisticated threats from adversaries backed by ample resources. In our study, we employ a symmetry-based approach to rebalance these uneven scenarios. [...] Read more.
The rapid expansion of the Internet of Things (IoT) has uncovered a significant asymmetry in cybersecurity, where low-power edge devices must face sophisticated threats from adversaries backed by ample resources. In our study, we employ a symmetry-based approach to rebalance these uneven scenarios. We propose a Hybrid Neural Network Intrusion Detection System (Hybrid NNIDS) that uses LightGBM to filter anomalies at the traffic level and MobileNetV2 for further detection at the packet level, creating a viable compromise between detection accuracy and computational cost. Additionally, the proposed Hybrid NNIDS model, on the ACI-IoT-2023 dataset, outperformed other intrusion detection models with an accuracy of 94%, an F1-score of 91%, and a precision rate of 93% in attack detection. The results indicate the developed asymmetry algorithm can greatly reduce processing overhead while still being able to be implemented in IoT environments. The focus of future work will be on the real-world deployment of these security infrastructures in the IoT and their adaptation to newer types of attack vectors that may be developed by malware. Full article
(This article belongs to the Special Issue Symmetry and Asymmetry in Cyber Security, IoTs and Privacy)
Show Figures

Figure 1

Figure 1
<p>EER-based threshold determination with LightGBM.</p>
Full article ">Figure 2
<p>Confusion matrix for LightGBM model.</p>
Full article ">Figure 3
<p>Confusion matrix for MobileNetV2 model.</p>
Full article ">Figure 4
<p>Hybrid inference confusion matrix.</p>
Full article ">
25 pages, 1212 KiB  
Article
TOCA-IoT: Threshold Optimization and Causal Analysis for IoT Network Anomaly Detection Based on Explainable Random Forest
by Ibrahim Gad
Algorithms 2025, 18(2), 117; https://doi.org/10.3390/a18020117 - 19 Feb 2025
Abstract
The Internet of Things (IoT) is developing quickly, which has led to the development of new opportunities in many different fields. As the number of IoT devices continues to expand, particularly in transportation and healthcare, the need for efficient and secure operations has [...] Read more.
The Internet of Things (IoT) is developing quickly, which has led to the development of new opportunities in many different fields. As the number of IoT devices continues to expand, particularly in transportation and healthcare, the need for efficient and secure operations has become critical. In the next few years, IoT connections will continue to expand across different fields. In contrast, a number of problems require further attention to be addressed to provide safe and effective operations, such as security, interoperability, and standards. This research investigates the efficacy of integrating explainable artificial intelligence (XAI) techniques and causal inference methods to enhance network anomaly detection. This study proposes a robust TOCA-IoT framework that utilizes the linear non-Gaussian acyclic model (LiNGAM) to find causal relationships in network traffic data, thereby improving the accuracy and interpretability of anomaly detection. A refined threshold optimization strategy is employed to address the challenge of selecting optimal thresholds for anomaly classification. The performance of the TOCA-IoT model is evaluated on an IoT benchmark dataset known as CICIoT2023. The results highlight the potential of combining causal discovery with XAI for building more robust and transparent anomaly detection systems. The results showed that the TOCA-IoT framework achieved the highest accuracy of 100% and an F-score of 100% in classifying the IoT attacks. Full article
(This article belongs to the Section Evolutionary Algorithms and Machine Learning)
Show Figures

Figure 1

Figure 1
<p>The main steps of the TOCA-IoT model.</p>
Full article ">Figure 2
<p>The graphical illustration of the imbalanced CICIoT2023 dataset.</p>
Full article ">Figure 3
<p>Causal inference.</p>
Full article ">Figure 4
<p>The causal inference model using Direct LiNGAM. (<b>a</b>) The causal inference diagram (<b>b</b>) Zoom in.</p>
Full article ">Figure 5
<p>The model’s classification performance using a confusion matrix and the distribution of prediction probabilities across different true class labels before applying SMOTE. (<b>a</b>) The distribution of prediction probabilities. (<b>b</b>) The confusion matrix.</p>
Full article ">Figure 6
<p>The ROC curves, distribution of prediction probabilities across different thresholds, and the model’s classification performance using a confusion matrix before SMOTE.</p>
Full article ">Figure 7
<p>The AUC for the RF model before and after SMOTE.</p>
Full article ">Figure 8
<p>The confusion matrix for the machine learning models after SMOTE. (<b>a</b>) Logistic regression model. (<b>b</b>) KNN model. (<b>c</b>) XGB model. (<b>d</b>) RF model.</p>
Full article ">Figure 9
<p>The summary plot for the RF model with feature importance and impact magnitude before and after SMOTE. (<b>a</b>) The summary plot before SMOTE. (<b>b</b>) The summary plot after SMOTE.</p>
Full article ">Figure A1
<p>The ROC curves, distribution of prediction probabilities across different thresholds, and the model’s classification performance using a confusion matrix after SMOTE.</p>
Full article ">
31 pages, 622 KiB  
Article
A Survey on Energy Drainage Attacks and Countermeasures in Wireless Sensor Networks
by Joon-Ku Lee, You-Rak Choi, Beom-Kyu Suh, Sang-Woo Jung and Ki-Il Kim
Appl. Sci. 2025, 15(4), 2213; https://doi.org/10.3390/app15042213 - 19 Feb 2025
Abstract
Owing to limited resources, implementing conventional security components in wireless sensor networks (WSNs) rather than wireless networks is difficult. Because most sensor nodes are typically powered by batteries, the battery power should be sufficiently long to prevent the shortening of the network lifetime. [...] Read more.
Owing to limited resources, implementing conventional security components in wireless sensor networks (WSNs) rather than wireless networks is difficult. Because most sensor nodes are typically powered by batteries, the battery power should be sufficiently long to prevent the shortening of the network lifetime. Therefore, many studies have focused on detecting and avoiding energy drainage attacks in WSNs. However, a survey paper has yet to be published for energy drain attacks in WSNs since 2019. Therefore, we present a novel comprehensive survey paper for energy drainage attacks in WSNs. First, we address an overview of WSNs and their security issues. Next, we explain the methodology for this study and explain the existing approaches for energy drainage attacks in layered architectures. Based on the results of this analysis, open issues and further research directions are presented. Full article
(This article belongs to the Special Issue Trends and Prospects for Wireless Sensor Networks and IoT)
Show Figures

Figure 1

Figure 1
<p>Components on a sensor node.</p>
Full article ">Figure 2
<p>Research classification in [<a href="#B11-applsci-15-02213" class="html-bibr">11</a>].</p>
Full article ">Figure 3
<p>Number of papers in research areas.</p>
Full article ">Figure 4
<p>Number of papers in published years.</p>
Full article ">Figure 5
<p>Categorization of EDAs in [<a href="#B23-applsci-15-02213" class="html-bibr">23</a>].</p>
Full article ">Figure 6
<p>Example of SFA detection in E-watchdog.</p>
Full article ">Figure 7
<p>Example of a wormhole attack.</p>
Full article ">
28 pages, 432 KiB  
Article
A Dynamic Risk Assessment and Mitigation Model
by Pavlos Cheimonidis and Konstantinos Rantos
Appl. Sci. 2025, 15(4), 2171; https://doi.org/10.3390/app15042171 - 18 Feb 2025
Abstract
In the current operational landscape, organizations face a growing and diverse array of cybersecurity challenges, necessitating the development and implementation of innovative and effective security solutions. This paper presents a novel methodology for dynamic risk assessment and mitigation suggestions aimed at assessing and [...] Read more.
In the current operational landscape, organizations face a growing and diverse array of cybersecurity challenges, necessitating the development and implementation of innovative and effective security solutions. This paper presents a novel methodology for dynamic risk assessment and mitigation suggestions aimed at assessing and reducing cyber risks. The proposed approach gathers information from publicly available cybersecurity-related open sources and integrates it with environment-specific data to generate a comprehensive understanding of potential risks. It creates multiple distinct risk scenarios based on the identification of vulnerabilities, network topology, and the attacker’s perspective. The methodology employs Bayesian networks to proactively and dynamically estimate the probability of threats and Fuzzy Cognitive Maps to dynamically update vulnerability severity values for each risk scenario. These elements are combined with impact estimations to provide dynamic risk assessments. Furthermore, the methodology offers mitigation suggestions for each identified vulnerability across all risk scenarios, enabling organizations to effectively address the assessed cybersecurity risks. To validate the effectiveness of the proposed methodology, a case study is presented, demonstrating its practical application and efficacy. Full article
Show Figures

Figure 1

Figure 1
<p>Proposed methodology flowchart.</p>
Full article ">Figure 2
<p>Multiple vulnerabilities—risk scenarios.</p>
Full article ">Figure 3
<p>Multiple pathways—risk scenarios.</p>
Full article ">Figure 4
<p>Experimental environment.</p>
Full article ">Figure 5
<p>FCM models.</p>
Full article ">Figure 6
<p>RS1: FCM Expert—results.</p>
Full article ">Figure 7
<p>Bayesian network structure.</p>
Full article ">Figure 8
<p>GeNIe results.</p>
Full article ">
19 pages, 1823 KiB  
Article
A Secure and Efficient Access-Control Scheme Based on Blockchain and CP-ABE for UAV Swarm
by Pengbin Han, Aina Sui and Jiang Wu
Drones 2025, 9(2), 148; https://doi.org/10.3390/drones9020148 - 18 Feb 2025
Abstract
With the continuous development of UAV technology, the application of UAV swarm has gradually become the focus of research all over the world. Although UAV swarm provides some advantages in terms of autonomous collaboration, the traditional UAV management technology suffers from security challenges, [...] Read more.
With the continuous development of UAV technology, the application of UAV swarm has gradually become the focus of research all over the world. Although UAV swarm provides some advantages in terms of autonomous collaboration, the traditional UAV management technology suffers from security challenges, including the risk of single points of failure due to centralized control, which makes UAV swarm susceptible to hacker attacks. Due to some advantages of blockchain, such as decentralization, tamper-proof characteristics, and traceability, it is applied to the drone swarm to solve some security challenges brought about by centralized management. However, blockchain cannot achieve secure access control on the data it stores, which may leak some crucial data. Therefore, a secure and efficient access-control model based on blockchain and ciphertext-policy attribute-based encryption (CP-ABE) is proposed, and a secure data-access scheme is designed under this model, which can not only prevent the leakage of critical data but also realize lightweight access control. Moreover, to improve the decryption efficiency of the data user, an outsourcing-based data decryption scheme is also studied, in which the complex calculations are completed by the data user agency. The experiments show that when the number of attributes is 60, the computation cost of the proposed scheme is 0.404 s, which is much lower than the existing research, and is more suitable for the UAV swarm with limited computing power. Moreover, the communication cost of the proposed scheme is reduced by about 30% compared with the existing scheme under the same conditions. The security analysis also shows that the proposed scheme is secure and reliable, and can resist a variety of attacks such as collusion attacks, man-in-the-middle attacks, and forgery attacks. Full article
Show Figures

Figure 1

Figure 1
<p>Access tree.</p>
Full article ">Figure 2
<p>Access-tree marker results.</p>
Full article ">Figure 3
<p>System model.</p>
Full article ">Figure 4
<p>The proposed scheme work processing.</p>
Full article ">Figure 5
<p>Computation cost comparison [<a href="#B39-drones-09-00148" class="html-bibr">39</a>,<a href="#B41-drones-09-00148" class="html-bibr">41</a>].</p>
Full article ">Figure 6
<p>Encryptiontime comparison [<a href="#B39-drones-09-00148" class="html-bibr">39</a>,<a href="#B41-drones-09-00148" class="html-bibr">41</a>].</p>
Full article ">Figure 7
<p>Pre-decryption time comparison [<a href="#B39-drones-09-00148" class="html-bibr">39</a>,<a href="#B41-drones-09-00148" class="html-bibr">41</a>].</p>
Full article ">Figure 8
<p>Communication cost comparison by varying number of attributes [<a href="#B39-drones-09-00148" class="html-bibr">39</a>,<a href="#B41-drones-09-00148" class="html-bibr">41</a>].</p>
Full article ">
30 pages, 5036 KiB  
Article
Chaotic Hénon–Logistic Map Integration: A Powerful Approach for Safeguarding Digital Images
by Abeer Al-Hyari, Mua’ad Abu-Faraj, Charlie Obimbo and Moutaz Alazab
J. Cybersecur. Priv. 2025, 5(1), 8; https://doi.org/10.3390/jcp5010008 - 18 Feb 2025
Abstract
This paper presents an integrated chaos-based algorithm for image encryption that combines the chaotic Hénon map and chaotic logistic map (CLM) to enhance the security of digital image communication. The proposed method leverages chaos theory to generate cryptographic keys, utilizing a 1D key [...] Read more.
This paper presents an integrated chaos-based algorithm for image encryption that combines the chaotic Hénon map and chaotic logistic map (CLM) to enhance the security of digital image communication. The proposed method leverages chaos theory to generate cryptographic keys, utilizing a 1D key from the logistic map generator and a 2D key from the chaotic Hénon map generator. These chaotic maps produce highly unpredictable and complex keys essential for robust encryption. Extensive experiments demonstrate the algorithm’s resilience against various attacks, including chosen-plaintext, noise, clipping, occlusion, and known-plaintext attacks. Performance evaluation in terms of encryption time, throughput, and image quality metrics validates the effectiveness of the proposed integrated approach. The results indicate that the chaotic Hénon–logistic map integration provides a powerful and secure method for safeguarding digital images during transmission and storage with a key space that reaches up to 2200. Moreover, the algorithm has potential applications in secure image sharing, cloud storage, and digital forensics, inspiring new possibilities. Full article
(This article belongs to the Special Issue Cybersecurity in the Age of AI and IoT: Challenges and Innovations)
Show Figures

Figure 1

Figure 1
<p>Graphical abstract of the proposed method.</p>
Full article ">Figure 2
<p>The proposed encryption method.</p>
Full article ">Figure 3
<p>The proposed decryption method.</p>
Full article ">Figure 4
<p>Key generation and structure.</p>
Full article ">Figure 5
<p>Key-space analysis.</p>
Full article ">Figure 6
<p>Histogram analysis.</p>
Full article ">Figure 7
<p>The correlation coefficient analysis across the three color channels.</p>
Full article ">Figure 8
<p>The impact of a slight change in the private key on the decrypted image.</p>
Full article ">Figure 9
<p>All-black image encryption using the proposed method.</p>
Full article ">Figure 10
<p>All-white image encryption using the proposed method.</p>
Full article ">Figure 11
<p>Robustness analysis of salt-and-pepper noise.</p>
Full article ">Figure 12
<p>Robustness analysis of Gaussian noise.</p>
Full article ">Figure 13
<p>Low occlusion values.</p>
Full article ">Figure 14
<p>High occlusion values.</p>
Full article ">Figure 15
<p>Different dynamic range values.</p>
Full article ">
25 pages, 4368 KiB  
Article
Investigation of Smart Machines with DNAs in SpiderNet
by Mo Adda and Nancy Scheidt
Future Internet 2025, 17(2), 92; https://doi.org/10.3390/fi17020092 - 17 Feb 2025
Abstract
The advancement of Internet of Things (IoT), robots, drones, and vehicles signifies ongoing progress, accompanied by increasing complexities and challenges in forensic investigations. Globally, investigators encounter obstacles when extracting evidence from these vast landscapes, which include diverse devices, networks, and cloud environments. Of [...] Read more.
The advancement of Internet of Things (IoT), robots, drones, and vehicles signifies ongoing progress, accompanied by increasing complexities and challenges in forensic investigations. Globally, investigators encounter obstacles when extracting evidence from these vast landscapes, which include diverse devices, networks, and cloud environments. Of particular concern is the process of evidence collection, especially regarding fingerprints and facial recognition within the realm of vehicle forensics. Moreover, ensuring the integrity of forensic evidence is a critical issue, as it is vulnerable to attacks targeting data centres and server farms. Mitigating these challenges, along with addressing evidence mobility, presents additional complexities. This paper introduces a groundbreaking infrastructure known as SpiderNet, which is based on cloud computing principles. We will illustrate how this architecture facilitates the identification of devices, secures the integrity of evidence both at its source and during transit, and enables investigations into individuals involved in criminal activities. Through case studies, we will demonstrate the potential of SpiderNet to assist law enforcement agencies in addressing crimes perpetrated within IoT environments. Full article
(This article belongs to the Special Issue Security and Privacy Issues in the Internet of Cloud)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>The infrastructure of the SpiderNet.</p>
Full article ">Figure 2
<p>DNA structure for IoT devices and users.</p>
Full article ">Figure 3
<p>Operation phases of the SpiderNet.</p>
Full article ">Figure 4
<p>Impact of time frame and saved locations.</p>
Full article ">Figure 5
<p>Impact of saving data on the SpiderNet’s capacity.</p>
Full article ">Figure 6
<p>Storage evolution for 5 devices with a random radius between 10 and 100 m.</p>
Full article ">
25 pages, 15167 KiB  
Article
Innovative Quantum Encryption Method for RGB Images Based on Bit-Planes and Logistic Maps
by Saeed Basiri, Laleh Farhang Matin and Mosayeb Naseri
Computation 2025, 13(2), 56; https://doi.org/10.3390/computation13020056 - 17 Feb 2025
Abstract
This study presents a novel encryption method for RGB (Red–Green–Blue) color images that combines scrambling techniques with the logistic map equation. In this method, image scrambling serves as a reversible transformation, rendering the image unintelligible to unauthorized users and thus enhancing security against [...] Read more.
This study presents a novel encryption method for RGB (Red–Green–Blue) color images that combines scrambling techniques with the logistic map equation. In this method, image scrambling serves as a reversible transformation, rendering the image unintelligible to unauthorized users and thus enhancing security against potential attacks. The proposed encryption scheme, called Bit-Plane Representation of Quantum Images (BRQI), utilizes quantum operations in conjunction with a one-dimensional chaotic system to increase encryption efficiency. The encryption algorithm operates in two phases: first, the quantum image undergoes scrambling through bit-plane manipulation, and second, the scrambled image is mixed with a key image generated using the logistic map. To assess the performance of the algorithm, simulations and analyses were conducted, evaluating parameters such as entropy (a measure of disorder) and correlation coefficients to confirm the effectiveness and robustness of this algorithm in safeguarding and encoding color images. The results show that the proposed quantum color image encryption algorithm surpasses classical methods in terms of security, robustness, and computational complexity. Full article
(This article belongs to the Section Computational Engineering)
Show Figures

Figure 1

Figure 1
<p>Bit-planes of a grayscale image.</p>
Full article ">Figure 2
<p>A 4 × 2 grayscale image.</p>
Full article ">Figure 3
<p>Illustration of the BRQI encoding process in the proposed scheme, formulated based on Equation (14). The circuit initializes spatial and bit-plane quantum registers into superposition states using Hadamard gates. The quantum registers encode pixel values <math display="inline"><semantics> <mrow> <mi>g</mi> <mfenced separators="|"> <mrow> <mi>x</mi> <mo>,</mo> <mi>y</mi> </mrow> </mfenced> </mrow> </semantics></math> into bit-planes, and the scrambling operators <math display="inline"><semantics> <mrow> <mo>(</mo> <msub> <mrow> <mi>U</mi> </mrow> <mrow> <mi>s</mi> </mrow> </msub> </mrow> </semantics></math>) apply controlled transformations across the bit-planes. Each bit-plane undergoes a quantum-controlled operation to alter its state while preserving reversibility, ensuring the possibility of perfect decryption.</p>
Full article ">Figure 4
<p>The BRQI abbreviation sub-circuit designed for grayscale images is represented within the red dashed box, denoted as <math display="inline"><semantics> <mrow> <msub> <mrow> <mi mathvariant="normal">U</mi> </mrow> <mrow> <mi mathvariant="normal">G</mi> </mrow> </msub> </mrow> </semantics></math>.</p>
Full article ">Figure 5
<p>The circuit design for the implementation of BRQI in the context of grayscale images.</p>
Full article ">Figure 6
<p>The circuit implementation of BRQI for RGB color images being discussed.</p>
Full article ">Figure 7
<p>A 2 × 2 color image.</p>
Full article ">Figure 8
<p>The process of swapping bit-planes involves the following components: (<b>a</b>) The implementation circuit of <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>U</mi> </mrow> <mrow> <mi>S</mi> </mrow> </msub> </mrow> </semantics></math>, (<b>b</b>) a 256 × 256 color image, and (<b>c</b>) the outcome of the bit-planes swap operation.</p>
Full article ">Figure 9
<p>The process of transferring image bit-planes. (<b>a</b>) The circuit design of <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>U</mi> </mrow> <mrow> <mi>X</mi> <mi>B</mi> </mrow> </msub> </mrow> </semantics></math>. (<b>b</b>) A color image with dimensions of 256 × 256. (<b>c</b>) The outcome of the image bit-planes transfer process.</p>
Full article ">Figure 10
<p>A 4 × 4 color image with alternating markings on even and odd pixels.</p>
Full article ">Figure 11
<p>The functioning of color inversion. (<b>a</b>) The execution circuit of <math display="inline"><semantics> <mrow> <msub> <mrow> <mi>U</mi> </mrow> <mrow> <mi>X</mi> <mi>C</mi> <mi>E</mi> <mi>P</mi> </mrow> </msub> </mrow> </semantics></math>. (<b>b</b>) A 256 × 256 image with colors. (<b>c</b>) The outcome of the color inversion process.</p>
Full article ">Figure 12
<p>An image scrambling algorithm that operates on bit-planes. Diagram (<b>a</b>) showcases the implementation circuit of the image scrambling process. In addition, the Lena image is presented in diagram (<b>b</b>). Lastly, diagram (<b>c</b>) demonstrates the encryption of Lena’s image through the utilization of the initial phase algorithm.</p>
Full article ">Figure 13
<p>The key image is formed by utilizing the logistic map equation as its foundation. It comprises four distinct components: (<b>a</b>) the image in the red channel, (<b>b</b>) the image in the green channel, (<b>c</b>) the image in the blue channel, and (<b>d</b>) the outcome of the second stage encryption, which is referred to as the key image.</p>
Full article ">Figure 14
<p>(<b>a</b>) The circuit for implementing the image scrambling algorithm. (<b>b</b>) The encrypted image after the final processing.</p>
Full article ">Figure 15
<p>(<b>a</b>) A quantum comparator circuit for two images of size (<math display="inline"><semantics> <mrow> <msup> <mrow> <mn>2</mn> </mrow> <mrow> <mi>n</mi> <mo>−</mo> <mi>k</mi> </mrow> </msup> <mo>×</mo> <msup> <mrow> <mn>2</mn> </mrow> <mrow> <mi>k</mi> </mrow> </msup> </mrow> </semantics></math>) utilizing BRQI. (<b>b</b>) A quantum comparator circuit incorporating the Binary XOR (exclusive OR) operation for the key image and the image encrypted by the initial phase algorithm.</p>
Full article ">Figure 16
<p>The image decoding process is shown. The diagram (<b>a</b>) shows the quantum circuit of the image decoding process. (<b>b</b>) Lena’s encrypted image (<b>c</b>) Lena’s decrypted image.</p>
Full article ">Figure 17
<p>Histogram: (<b>a</b>) before encryption; (<b>b</b>) after encryption.</p>
Full article ">Figure 18
<p>Correlation distributions of Lena’s image in each direction. (<b>a</b>–<b>c</b>) for the red color channel. (<b>d</b>–<b>f</b>) for the green color channel. (<b>g</b>–<b>i</b>) for the blue color channel.</p>
Full article ">Figure 19
<p>Correlation distributions of the encrypted Lena image in each direction. (<b>a</b>–<b>c</b>) for the red color channel. (<b>d</b>–<b>f</b>) for the green color channel. (<b>g</b>–<b>i</b>) for the blue color channel.</p>
Full article ">Figure 19 Cont.
<p>Correlation distributions of the encrypted Lena image in each direction. (<b>a</b>–<b>c</b>) for the red color channel. (<b>d</b>–<b>f</b>) for the green color channel. (<b>g</b>–<b>i</b>) for the blue color channel.</p>
Full article ">Figure 20
<p>Multiple images prior to and following the encryption process: (<b>a</b>) Lena; (<b>b</b>) Image-1; (<b>c</b>) Image-2; (<b>d</b>) Image-3; (<b>e</b>) Image-4; (<b>f</b>) Image-5; (<b>g</b>) encrypted Lena; (<b>h</b>) encrypted Image-1; (<b>i</b>) encrypted Image-2; (<b>j</b>) encrypted Image-3; (<b>k</b>) encrypted Image-4; (<b>l</b>) encrypted Image-5.</p>
Full article ">Figure 20 Cont.
<p>Multiple images prior to and following the encryption process: (<b>a</b>) Lena; (<b>b</b>) Image-1; (<b>c</b>) Image-2; (<b>d</b>) Image-3; (<b>e</b>) Image-4; (<b>f</b>) Image-5; (<b>g</b>) encrypted Lena; (<b>h</b>) encrypted Image-1; (<b>i</b>) encrypted Image-2; (<b>j</b>) encrypted Image-3; (<b>k</b>) encrypted Image-4; (<b>l</b>) encrypted Image-5.</p>
Full article ">
34 pages, 3835 KiB  
Article
A Privacy-Preserving RL-Based Secure Charging Coordinator Using Efficient FL for Smart Grid Home Batteries
by Amr A. Elshazly, Islam Elgarhy, Mohamed Mahmoud, Mohamed I. Ibrahem and Maazen Alsabaan
Energies 2025, 18(4), 961; https://doi.org/10.3390/en18040961 - 17 Feb 2025
Abstract
Smart power grids (SGs) enhance efficiency, reliability, and sustainability by integrating distributed energy resources (DERs) such as solar panels and wind turbines. A key challenge in SGs is managing home battery charging during periods of insufficient renewable energy generation to ensure fairness, efficiency, [...] Read more.
Smart power grids (SGs) enhance efficiency, reliability, and sustainability by integrating distributed energy resources (DERs) such as solar panels and wind turbines. A key challenge in SGs is managing home battery charging during periods of insufficient renewable energy generation to ensure fairness, efficiency, and customer satisfaction. This paper introduces a secure reinforcement learning (RL)-based framework for optimizing battery charging coordination while addressing privacy concerns and false data injection (FDI) attacks. Privacy is preserved through Federated Learning (FL), enabling collaborative model training without sharing sensitive State of Charge (SoC) data that could reveal personal routines. To combat FDI attacks, Deep Learning (DL)-based detectors are deployed to identify malicious SoC data manipulation. To improve FL efficiency, the Change and Transmit (CAT) technique reduces communication overhead by transmitting only model parameters that experience enough change comparing to the last round. Extensive experiments validate the framework’s efficacy. The RL-based charging coordinator ensures fairness by maintaining SoC levels within thresholds and reduces overall power utilization through optimal grid power allocation. The CAT-FL approach achieves up to 93.5% communication overhead reduction, while DL-based detectors maintain high accuracy, with supervised models reaching 99.84% and anomaly detection models achieving 92.1%. Moreover, the RL agent trained via FL demonstrates strong generalization, achieving high cumulative rewards and equitable power allocation when applied to new data owners which did not participate in FL training. This framework provides a scalable, privacy-preserving, and efficient solution for energy management in SGs, offering high accuracy against FDI attacks and paving the way for the future of smart grid deployments. Full article
Show Figures

Figure 1

Figure 1
<p>Secure RL-based Home Battery Charging Coordination.</p>
Full article ">Figure 2
<p>The system model considered in the paper.</p>
Full article ">Figure 3
<p>Illustration for the FL training process.</p>
Full article ">Figure 4
<p>The typical architecture of a DAE.</p>
Full article ">Figure 5
<p>Block diagram summarizing the research methodology.</p>
Full article ">Figure 6
<p>Net meter readings for five randomly selected households (one from each DO). Positive values indicate grid consumption exceeds solar generation; negative values indicate surplus solar power.</p>
Full article ">Figure 7
<p>Auto-Correlation Functions (ACFs) for a random consumer from each DO. Shaded regions indicate 95% confidence intervals. (<b>a</b>) Consumer 1. (<b>b</b>) Consumer 13. (<b>c</b>) Consumer 27. (<b>d</b>) Consumer 36. (<b>e</b>) Consumer 44.</p>
Full article ">Figure 8
<p>Total net power consumption over time for different DOs; each serving 10 consumers along with average consumption. (<b>a</b>) Total net consumption for first 10 consumers. (<b>b</b>) Total net consumption for second 10 consumers. (<b>c</b>) Total net consumption for third 10 consumers. (<b>d</b>) Total net consumption for fourth 10 consumers. (<b>e</b>) Total net consumption for fifth 10 consumers. (<b>f</b>) Total net consumption for sixth 10 consumers.</p>
Full article ">Figure 9
<p>Cumulative reward during training of the global model with five data owners using the traditional FL approach.</p>
Full article ">Figure 10
<p>Cumulative reward during training of the global model with five data owners using CAT-FL with 5% threshold.</p>
Full article ">Figure 11
<p>Cumulative reward during training of the global model with five data owners using CAT-FL with 15% threshold.</p>
Full article ">Figure 12
<p>Cumulative reward during training of the global model with five data owners using CAT-FL with 20% threshold.</p>
Full article ">Figure 13
<p>Total communication overhead reduction by each round for different CAT thresholds (5%, 15%, and 20%).</p>
Full article ">Figure 14
<p>Cumulative reward for local and global models, including FL with different CAT thresholds, tested on a different data owner.</p>
Full article ">Figure 15
<p>Fairness evaluation for local and global models, including FL with different CAT thresholds, tested on a different data owner.</p>
Full article ">Figure 16
<p>Comparison of power utilization between a local model, a global model, and FL with CAT across different thresholds.</p>
Full article ">
20 pages, 2002 KiB  
Article
Implementing Anomaly-Based Intrusion Detection for Resource-Constrained Devices in IoMT Networks
by Georgios Zachos, Georgios Mantas, Kyriakos Porfyrakis and Jonathan Rodriguez
Sensors 2025, 25(4), 1216; https://doi.org/10.3390/s25041216 - 17 Feb 2025
Abstract
Internet of Medical Things (IoMT) technology has emerged from the introduction of the Internet of Things in the healthcare sector. However, the resource-constrained characteristics and heterogeneity of IoMT networks make these networks susceptible to various types of threats. Thus, it is necessary to [...] Read more.
Internet of Medical Things (IoMT) technology has emerged from the introduction of the Internet of Things in the healthcare sector. However, the resource-constrained characteristics and heterogeneity of IoMT networks make these networks susceptible to various types of threats. Thus, it is necessary to develop novel security solutions (e.g., efficient and accurate Anomaly-based Intrusion Detection Systems), considering the inherent limitations of IoMT networks, before these networks reach their full potential in the market. In this paper, we propose an AIDS specifically designed for resource-constrained devices within IoMT networks. The proposed lightweight AIDS leverages novelty detection and outlier detection algorithms instead of conventional classification algorithms to achieve (a) enhanced detection performance against both known and unknown attack patterns and (b) minimal computational costs. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

Figure 1
<p>Architecture of the proposed AIDS in the IoMT network.</p>
Full article ">Figure 2
<p>The Monitoring and Data Acquisition (MDA) component.</p>
Full article ">Figure 3
<p>The Remote Detection Engine (RDE) component.</p>
Full article ">Figure 4
<p>Internal architecture of the “Detection Engine” module of the RDE component.</p>
Full article ">Figure 5
<p>Runtime evaluation results of the six detection algorithms when integrated into the “Detection Engine” module of the RDE component of the AIDS.</p>
Full article ">Figure 6
<p>CPU consumption of the RDE component for different detection algorithms.</p>
Full article ">Figure 7
<p>Memory consumption of the RDE component for different detection algorithms.</p>
Full article ">
20 pages, 817 KiB  
Review
Cryptography Based on (Idempotent) Semirings: Abandoning Tropicality?
by Mariana Durcheva
Encyclopedia 2025, 5(1), 26; https://doi.org/10.3390/encyclopedia5010026 - 17 Feb 2025
Abstract
This review explores the current state of public key cryptography based on idempotent semirings, with an emphasis on tropical semirings. It examines key hard problems, such as the tropical discrete logarithm problem, semidirect tropical product problem, the factorization of tropical polynomials, and the [...] Read more.
This review explores the current state of public key cryptography based on idempotent semirings, with an emphasis on tropical semirings. It examines key hard problems, such as the tropical discrete logarithm problem, semidirect tropical product problem, the factorization of tropical polynomials, and the matrix power function, that underpin the security of these protocols. Given the significant number of compromised protocols based on tropical semirings, most of which are variations of the Stickel protocol, we present three algorithms and classify schemes of this type. The analysis is further illustrated with a figure that maps the relationships between tropical Stickel’s-like protocols and the attacks targeting them. Additionally, the review provides an in-depth exploration of the vulnerabilities that have led to many tropical semiring-based cryptosystems being compromised. To address these challenges, the review highlights promising alternative approaches, including non-tropical idempotent platforms and non-idempotent options, such as supertropical semirings, which offer potential solutions to overcome known limitations. Furthermore, a discussion on the interplay between tropical cryptography and post-quantum cryptography is presented, raising the following question: what is the future of tropical cryptography? Full article
(This article belongs to the Section Mathematics & Computer Science)
Show Figures

Figure 1

Figure 1
<p>Tropical Stickel’s-like protocols [<a href="#B24-encyclopedia-05-00026" class="html-bibr">24</a>,<a href="#B25-encyclopedia-05-00026" class="html-bibr">25</a>,<a href="#B26-encyclopedia-05-00026" class="html-bibr">26</a>,<a href="#B27-encyclopedia-05-00026" class="html-bibr">27</a>,<a href="#B28-encyclopedia-05-00026" class="html-bibr">28</a>,<a href="#B30-encyclopedia-05-00026" class="html-bibr">30</a>,<a href="#B31-encyclopedia-05-00026" class="html-bibr">31</a>,<a href="#B32-encyclopedia-05-00026" class="html-bibr">32</a>,<a href="#B33-encyclopedia-05-00026" class="html-bibr">33</a>,<a href="#B34-encyclopedia-05-00026" class="html-bibr">34</a>,<a href="#B36-encyclopedia-05-00026" class="html-bibr">36</a>] and attacks on them [<a href="#B38-encyclopedia-05-00026" class="html-bibr">38</a>,<a href="#B39-encyclopedia-05-00026" class="html-bibr">39</a>,<a href="#B40-encyclopedia-05-00026" class="html-bibr">40</a>,<a href="#B41-encyclopedia-05-00026" class="html-bibr">41</a>,<a href="#B42-encyclopedia-05-00026" class="html-bibr">42</a>,<a href="#B43-encyclopedia-05-00026" class="html-bibr">43</a>,<a href="#B44-encyclopedia-05-00026" class="html-bibr">44</a>].</p>
Full article ">
24 pages, 1945 KiB  
Article
Signature-Based Security Analysis and Detection of IoT Threats in Advanced Message Queuing Protocol
by Mohammad Emran Hashimyar, Mahdi Aiash, Ali Khoshkholghi and Giacomo Nalli
Network 2025, 5(1), 5; https://doi.org/10.3390/network5010005 - 17 Feb 2025
Abstract
The Advanced Message Queuing Protocol (AMQP) is a widely used communication standard in IoT systems due to its robust and reliable message delivery capabilities. However, its increasing adoption has made it a target for various cyber threats, including Distributed Denial of Service (DDoS), [...] Read more.
The Advanced Message Queuing Protocol (AMQP) is a widely used communication standard in IoT systems due to its robust and reliable message delivery capabilities. However, its increasing adoption has made it a target for various cyber threats, including Distributed Denial of Service (DDoS), Man-in-the-Middle (MitM), and brute force attacks. This study presents a comprehensive analysis of AMQP-specific vulnerabilities and introduces a statistical model for the detection and classification of malicious activities in IoT networks. Leveraging a custom-designed IoT testbed, realistic attack scenarios were simulated, and a dataset encompassing normal, malicious, and mixed traffic was generated. Unique attack signatures were identified and validated through repeated experiments, forming the foundation of a signature-based detection mechanism tailored for AMQP networks. The proposed model demonstrated high accuracy in detecting and classifying attack-specific traffic while maintaining a low false positive rate for benign traffic. Notable results include effective detection of RST packets in DDoS scenarios, precise classification of MitM attack patterns, and identification of brute force attempts on AMQP systems. This research highlights the efficacy of signature-based approaches in enhancing IoT security and offers a benchmark for future machine learning-driven detection systems. By addressing AMQP-specific challenges, the study contributes to the development of resilient and secure IoT ecosystems. Full article
Show Figures

Figure 1

Figure 1
<p>Normal network traffic packets for AMQP.</p>
Full article ">Figure 2
<p>Normal network data exchange traffic for AMQP.</p>
Full article ">Figure 3
<p>DoS attack TCP handshake flags.</p>
Full article ">Figure 4
<p>DoS attack data exchange packets (Experiment 1).</p>
Full article ">Figure 5
<p>DoS attack data exchange packets (Experiment 2).</p>
Full article ">Figure 6
<p>DoS attack data exchange packets (Experiment 3).</p>
Full article ">Figure 7
<p>Analysis of AMQP MiTM packets.</p>
Full article ">Figure 8
<p>Analysis of AMQP brute force attack packets.</p>
Full article ">Figure 9
<p>DoS attack signature.</p>
Full article ">Figure 10
<p>Classification results of network traces for DoS attacks (normal, malicious, and RST).</p>
Full article ">Figure 11
<p>Detection of normal packets in AMQP traffic dataset.</p>
Full article ">Figure 12
<p>Detection results for malicious packets in DoS dataset.</p>
Full article ">Figure 13
<p>MiTM attack signature.</p>
Full article ">Figure 14
<p>Detection results for MiTM attack packets in normal and malicious datasets.</p>
Full article ">Figure 15
<p>Detection results for normal packets in AMQP traffic.</p>
Full article ">Figure 16
<p>Detection results for malicious packets in MiTM dataset.</p>
Full article ">Figure 17
<p>Brute force attack signature.</p>
Full article ">Figure 18
<p>Detection results for normal and malicious packets in brute force attacks.</p>
Full article ">Figure 19
<p>Detection results for normal packets in AMQP brute force dataset.</p>
Full article ">Figure 20
<p>Detection results for malicious packets in AMQP brute force dataset.</p>
Full article ">
33 pages, 6514 KiB  
Article
IoT-Driven Resilience Monitoring: Case Study of a Cyber-Physical System
by Ali Aghazadeh Ardebili, Cristian Martella, Antonella Longo, Chiara Rucco, Federico Izzi and Antonio Ficarella
Appl. Sci. 2025, 15(4), 2092; https://doi.org/10.3390/app15042092 - 17 Feb 2025
Abstract
This study focuses on Digital Twin-integrated smart energy systems, which serve as an example of Next-Generation Critical Infrastructures (CI). The resilience of these systems is influenced by a variety of internal features and external interactions, all of which are subject to change following [...] Read more.
This study focuses on Digital Twin-integrated smart energy systems, which serve as an example of Next-Generation Critical Infrastructures (CI). The resilience of these systems is influenced by a variety of internal features and external interactions, all of which are subject to change following cyber-physical disturbances. This necessitates real-time resilience monitoring for CI during crises; however, a significant gap remains in resilience monitoring. To address this gap, this study leverages the role of Internet of Things (IoT) in monitoring complex systems to enhance resilience through critical indicators relevant to cyber-physical safety and security. The study empirically implements Resilience-Key Performance Indicators (R-KPIs) from the domain, including Functionality Loss, Minimum Performance, and Recovery Time Duration. The main goal is to examine real-time IoT-based resilience monitoring in a real-life context. A cyber-physical system equipped with IoT-driven Digital Twins, data-driven microservices, and a False Data Injection Attack (FDIA) scenario is simulated to assess the real-time resilience of this smart system. The results demonstrate that real-time resilience monitoring provides actionable insights into resilience performance based on the selected R-KPIs. These findings contribute to a systematic and reusable model for enhancing the resilience of IoT-enabled CI, advancing efforts to ensure service continuity and secure essential services for society. Full article
(This article belongs to the Special Issue The Internet of Things (IoT) and Its Application in Monitoring)
Show Figures

Figure 1

Figure 1
<p>Illustration of recovery time. The red box highlights the point on the resilience curve where the recovery phases duration can be identified.</p>
Full article ">Figure 2
<p>Illustration of minimum performance level. The red box highlights the point on the resilience curve where the minimum performance level can be identified.</p>
Full article ">Figure 3
<p>(<b>a</b>,<b>b</b>) Graphical illustration of different behaviors after disturbance [<a href="#B68-applsci-15-02092" class="html-bibr">68</a>].</p>
Full article ">Figure 4
<p>Graphical illustration of Loss of Functionality [<a href="#B67-applsci-15-02092" class="html-bibr">67</a>].</p>
Full article ">Figure 5
<p>Conceptual model of the proposed system [<a href="#B82-applsci-15-02092" class="html-bibr">82</a>].</p>
Full article ">Figure 6
<p>SPVS physical asset implementation. (<b>a</b>) Control system (<a href="#applsci-15-02092-t001" class="html-table">Table 1</a>). (<b>b</b>) Motion mechanism. (<b>c</b>) Assembled view (back view).</p>
Full article ">Figure 7
<p>The logical model of the smart PV system [<a href="#B45-applsci-15-02092" class="html-bibr">45</a>,<a href="#B82-applsci-15-02092" class="html-bibr">82</a>].</p>
Full article ">Figure 8
<p>Dynamic 3D model with 2 degrees of freedom (Dof) that is used to visualize the current gradient of the PV module [<a href="#B45-applsci-15-02092" class="html-bibr">45</a>,<a href="#B82-applsci-15-02092" class="html-bibr">82</a>].</p>
Full article ">Figure 9
<p>Data Connector flowchart.</p>
Full article ">Figure 10
<p>Interactive Platform Interface [<a href="#B82-applsci-15-02092" class="html-bibr">82</a>].</p>
Full article ">Figure 11
<p>The equivalent circuit of the PV module with the load.</p>
Full article ">Figure 12
<p>The block diagram of Kalman filter method that is used in current approach.</p>
Full article ">Figure 13
<p>Mapping of the Edge-cloud architectural framework. (<b>a</b>) Scope of the European Industrial cloud and edge Roadmap [<a href="#B90-applsci-15-02092" class="html-bibr">90</a>]. (<b>b</b>) Edge-cloud architecture of the system [<a href="#B82-applsci-15-02092" class="html-bibr">82</a>].</p>
Full article ">Figure 14
<p>Solar Elevation on Monday, 18 December 2023 in Lecce.</p>
Full article ">Figure 15
<p>Cloud Cover on Monday, 18 December 2023 in Lecce.</p>
Full article ">Figure 16
<p>Temperature on Monday, 18 December 2023 in Lecce.</p>
Full article ">Figure 17
<p>The voltage of the panel on Monday, 18 December 2023 in Lecce influenced by a dynamic environment including sunrise and sunset <a href="#applsci-15-02092-f014" class="html-fig">Figure 14</a>, cloud cover <a href="#applsci-15-02092-f015" class="html-fig">Figure 15</a>, and temperature <a href="#applsci-15-02092-f016" class="html-fig">Figure 16</a>.</p>
Full article ">Figure 18
<p>Panel voltage (on Monday, 18 December 2023): comparison between original data and rolling average.</p>
Full article ">Figure 19
<p>PV panel output and battery level.</p>
Full article ">Figure 20
<p>Sunset: PV output and air temperature.</p>
Full article ">Figure 21
<p>Bus voltage measurement during the disturbance (voltate in volts).</p>
Full article ">Figure 22
<p>The irregular behaviour of the system after disturbance.</p>
Full article ">Figure 23
<p>The resilience curve (fitted by SVR).</p>
Full article ">Figure 24
<p>Functionality Loss calculation using the resilience curve fitted by SVR.</p>
Full article ">Figure 25
<p>Functionality Loss calculation using the resilience curve fitted by Least Squares.</p>
Full article ">
17 pages, 2026 KiB  
Article
Network Security Situational Awareness Based on Improved Particle Swarm Algorithm and Bidirectional Long Short-Term Memory Modeling
by Peng Zheng, Yun Cheng, Wei Zhu, Bo Liu, Shuhong Liu, Shijie Wang and Jinyin Bai
Appl. Sci. 2025, 15(4), 2082; https://doi.org/10.3390/app15042082 - 17 Feb 2025
Abstract
With the continuous development of information technology, network security risks are also rising, and the ability to quickly perceive network threats has become an important prerequisite and an important means to cope with network risks. Currently, there are various types of network attacks [...] Read more.
With the continuous development of information technology, network security risks are also rising, and the ability to quickly perceive network threats has become an important prerequisite and an important means to cope with network risks. Currently, there are various types of network attacks and complex attacking techniques, and the large differences between them have led to the difficulty of collecting and recognizing the common characteristics of network attacks. Considering the regular temporal fluctuations in network attacks, a method for network security situational awareness, based on an enhanced Particle Swarm Optimization Bidirectional Long Short-Term Memory (BiLSTM) network model, is proposed. By gathering and organizing critical information within the network, an encapsulated Wrapper feature selection algorithm is utilized for the extraction of element features. The refined Particle Swarm Optimization algorithm is applied to optimize the parameters of the BiLSTM network, enabling a rapid convergence and enhancing the training efficiency, thus effectively identifying the categories of network attacks. The experimental results show that the MAPE for the proposed model has been diminished to 0.36%, while the sMAPE is 2.654%. Additionally, the fitting coefficient attains a value of 0.92. This indicates a high level of recognition and precision exhibited by the proposed model in detecting network security risk behaviors. Furthermore, in contrast to the traditional CNN neural network, the proposed model is more compact, which significantly reduces the computational overhead and allows for efficient network security situational awareness. Full article
Show Figures

Figure 1

Figure 1
<p>Network characteristics data collection process.</p>
Full article ">Figure 2
<p>Schematic diagram of BiLSTM neural network operation. Cyan circles indicate the original input data, grey circles indicate the data after model calculation.</p>
Full article ">Figure 3
<p>Improved particle swarm optimization and BiLSTM neural network implementation flowchart.</p>
Full article ">Figure 4
<p>Comparison of the recognition rate of network security threat categories by this model.</p>
Full article ">Figure 5
<p>Comparison of the experimental results of the four models. Visual comparison of the performance differences of the models in question by protesting the results of the four models run on a common dataset. (<b>a</b>) Detailed schematic of MAPE values for each model; (<b>b</b>) Detailed schematic of sMAPE values for each model.</p>
Full article ">Figure 6
<p>Variation of the accuracy performance of each model with the number of iterations. The horizontal coordinate is the number of iterations, and the vertical coordinate is the sMAPE value (×100) for each model.</p>
Full article ">
28 pages, 6007 KiB  
Article
Improving the CRCC-DHR Reliability: An Entropy-Based Mimic-Defense-Resource Scheduling Algorithm
by Xinghua Wu, Mingzhe Wang, Yun Cai, Xiaolin Chang and Yong Liu
Entropy 2025, 27(2), 208; https://doi.org/10.3390/e27020208 - 16 Feb 2025
Abstract
With more China railway business information systems migrating to the China Railway Cloud Center (CRCC), the attack surface is expanding and there are increasing security threats for the CRCC to deal with. Cyber Mimic Defense (CMD) technology, as an active defense strategy, can [...] Read more.
With more China railway business information systems migrating to the China Railway Cloud Center (CRCC), the attack surface is expanding and there are increasing security threats for the CRCC to deal with. Cyber Mimic Defense (CMD) technology, as an active defense strategy, can counter these threats by constructing a Dynamic Heterogeneous Redundancy (DHR) architecture. However, there are at least two challenges posed to the DHR deployment, namely, the limited number of available schedulable heterogeneous resources and memorization-based attacks. This paper aims to address these two challenges to improve the CRCC-DHR reliability and then facilitate the DHR deployment. By reliability, we mean that the CRCC-DHR with the limited number of available heterogeneous resources can effectively resist memorization-based attacks. We first propose three metrics for assessing the reliability of the CRCC-DHR architecture. Then, we propose an incomplete-information-based game model to capture the relationships between attackers and defenders. Finally, based on the proposed metrics and the captured relationship, we propose a redundant-heterogeneous-resources scheduling algorithm, called the Entropy Weight Scheduling Algorithm (REWS). We evaluate the capability of REWS with the three existing algorithms through simulations. The results show that REWS can achieve a better reliability than the other algorithms. In addition, REWS demonstrates a lower time complexity compared with the existing algorithms. Full article
(This article belongs to the Special Issue Entropy Method for Decision Making with Uncertainty)
Show Figures

Figure 1

Figure 1
<p>The architecture of the CRCC.</p>
Full article ">Figure 2
<p>Dynamic Heterogeneous Redundancy model structures.</p>
Full article ">Figure 3
<p>Attack chain.</p>
Full article ">Figure 4
<p>(<b>a</b>) Trend of information entropy loss during the scheduling of redundant systems under infinite resources. (<b>b</b>) Trend of information entropy loss during the scheduling of redundant systems under finite resources.</p>
Full article ">Figure 5
<p>The flow chart of the algorithm.</p>
Full article ">Figure 6
<p>(<b>a</b>) Weights and scheduling time functions for <math display="inline"><semantics> <mi>η</mi> </semantics></math> of 1. (<b>b</b>) Weights and scheduling times functions for <math display="inline"><semantics> <mi>η</mi> </semantics></math> of 0.25.</p>
Full article ">Figure 7
<p>(<b>a</b>) CRS algorithm scheduling period for m = 3. (<b>b</b>) HCDC algorithm scheduling period for <span class="html-italic">m</span> = 3. (<b>c</b>) HHAC algorithm scheduling period for <span class="html-italic">m</span> = 3. (<b>d</b>) REWS algorithm scheduling period for <span class="html-italic">m</span> = 3.</p>
Full article ">Figure 8
<p>(<b>a</b>) Average number of scheduling states for the CRS algorithm for <span class="html-italic">m</span> = 3. (<b>b</b>) Average number of scheduling states for the HCDC algorithm for <span class="html-italic">m</span> = 3. (<b>c</b>) Average number of scheduling states for the HHAC algorithm for <span class="html-italic">m</span> = 3. (<b>d</b>) Average number of scheduling states for the REWS algorithm for m = 3.</p>
Full article ">Figure 8 Cont.
<p>(<b>a</b>) Average number of scheduling states for the CRS algorithm for <span class="html-italic">m</span> = 3. (<b>b</b>) Average number of scheduling states for the HCDC algorithm for <span class="html-italic">m</span> = 3. (<b>c</b>) Average number of scheduling states for the HHAC algorithm for <span class="html-italic">m</span> = 3. (<b>d</b>) Average number of scheduling states for the REWS algorithm for m = 3.</p>
Full article ">Figure 9
<p>(<b>a</b>) CRS algorithm scheduling period for <span class="html-italic">m</span> = 4. (<b>b</b>) HCDC algorithm scheduling period for <span class="html-italic">m</span> = 4. (<b>c</b>) HHAC algorithm scheduling period for <span class="html-italic">m</span> = 4. (<b>d</b>) REWS algorithm scheduling period for <span class="html-italic">m</span> = 4.</p>
Full article ">Figure 10
<p>(<b>a</b>) Average number of scheduling states for the CRS algorithm for <span class="html-italic">m</span> = 4. (<b>b</b>) Average number of scheduling states for the HCDC algorithm for <span class="html-italic">m</span> = 4. (<b>c</b>) Average number of scheduling states for the HHAC algorithm for <span class="html-italic">m</span> = 4. (<b>d</b>) Average number of scheduling states for the REWS algorithm for <span class="html-italic">m</span> = 4.</p>
Full article ">Figure 11
<p>(<b>a</b>) Experiments on different algorithms against memorization-based attacks for <span class="html-italic">m</span> = 3. (<b>b</b>) Experiments on different algorithms against memorization-based attacks for <span class="html-italic">m</span> = 4.</p>
Full article ">
Back to TopTop