Mobile ad hoc networks (MANETs), which correspond to a novel wireless technology, are widely used in Internet of Things (IoT) systems such as drones, wireless sensor networks, and military or disaster relief communication. From the perspective of communication and data collection, the success rate of collaborations between nodes in mobile ad hoc networks and reliability of data collection mainly depend on whether the nodes in the network operate normally, namely, according to the established network rules. However, mobile ad hoc networks are vulnerable to attacks targeting transmission channels and nodes owing to their dynamic evolution, openness, and distributed characteristics. Therefore, during the network operation, it is necessary to classify and detect the behavior and characteristics of each node. However, most existing research only analyzes and considers responses against a single or small number of attacks. To address these issues, this article first systematically analyzed and classified common active attacks in MANETs. Then, a node trust model was proposed based on the characteristics of various attacks; subsequently, a new secure routing protocol, namely, TC-AODV, was proposed. This protocol has minimal effect on the original communication dynamics and can effectively deal with Packet drop, wormhole, Session hijacking, and other main attacks in MANETs. The NS3 simulation results show that the proposed routing protocol attains good transmission performance, can effectively identify various attacks and bypass malicious nodes, and securely complete the communication process.
The inefficiency of Consensus protocols is a significant impediment to blockchain and IoT convergence development. To solve the problems like inefficiency and poor dynamics of the Practical Byzantine Fault Tolerance (PBFT) in IoT scenarios, a hierarchical consensus protocol called DCBFT is proposed. Above all, we propose an improved k-sums algorithm to build a two-level consensus cluster, achieving an hierarchical management for IoT devices. Next, A scalable two-level consensus protocol is proposed, which uses a multi-primary node mechanism to solve the single-point-of-failure problem. In addition, a data synchronization process is introduced to ensure the consistency of block data after view changes. Finally, A dynamic reputation evaluation model is introduced to update the nodes’ reputation values and complete the rotation of consensus nodes at the end of each consensus round. The experimental results show that DCBFT has a more robust dynamic and higher consensus efficiency. Moreover, After running for some time, the performance of DCBFT shows some improvement.
In the field of food safety testing, variety, brand, origin, and adulteration are four important factors. In this study, a novel food safety testing method based on infrared spectroscopy is proposed to investigate these factors. Fourier transform infrared spectroscopy data are analyzed using negentropy-sorted kernel independent component analysis (NS-kICA) as the feature optimization method. To rank the components, negentropy is performed to measure the non-Gaussian independent components. In our experiment, the proposed method was run on four datasets to comprehensively investigate the variety, brand, origin, and adulteration of agricultural products. The experimental results show that NS-kICA outperforms conventional feature selection methods. The support vector machine model outperforms the backpropagation artificial neural network and partial least squares models. The combination of NS-kICA and support vector machine (SVM) is the best method for achieving high, stable, and efficient recognition performance. These findings are of great importance for food safety testing.
As the communication needs in the smart distribution grid continue to rise, using existing resources to meet this growing demand poses a significant challenge. This paper researches on spectrum allocation strategies utilizing cognitive radio (CR) technology. We consider a model containing strong time-sensitive and regular communication service requirements such as distribution terminal communication services, which can be seen as a user with primary data (PD) and weak time-sensitive services such as power quality monitoring, which can be seen as a user with secondary data (SD). To fit the diversity of services in smart distribution grids (SDGs), we formulate an optimization problem with two indicators, including the sum of SD transmission rates and the maximum latency of them. Then, we analyze the two convex sub-problems and utilize convex optimization methods to obtain the optimal power and frequency bandwidth allocation for the users with SD. The simulation results indicate that, when the available transmission power of SD is low, Maximization of Transmission Sum Rate (MTSR) achieves lower maximum transmit time. Conversely, when the available transmission power is high, the performance of Minimization of the Maximum Latency (MML) is better, compared with MTSR.
With the wide application of the Internet of Things (IoT), storing large amounts of IoT data and protecting data privacy has become a meaningful issue. In general, the access control mechanism is used to prevent illegal users from accessing private data. However, traditional data access control schemes face some non-ignorable problems, such as only supporting coarse-grained access control, the risk of centralization, and high trust issues. In this paper, an attribute-based data access control scheme using blockchain technology is proposed. To address these problems, attribute-based encryption (ABE) has become a promising solution for encrypted data access control. Firstly, we utilize blockchain technology to construct a decentralized access control scheme, which can grant data access with transparency and traceability. Furthermore, our scheme also guarantees the privacy of policies and attributes on the blockchain network. Secondly, we optimize an ABE scheme, which makes the size of system parameters smaller and improves the efficiency of algorithms. These optimizations enable our proposed scheme supports large attribute universe requirements in IoT environments. Thirdly, to prohibit attribute impersonation and attribute replay attacks, we design a challenge-response mechanism to verify the ownership of attributes. Finally, we evaluate the security and performance of the scheme. And comparisons with other related schemes show the advantages of our proposed scheme. Compared to existing schemes, our scheme has more comprehensive advantages, such as supporting a large universe, full security, expressive policy, and policy hiding.
Bundle recommendation offers users more holistic insights by recommending multiple compatible items at once. However, the intricate correlations between items, varied user preferences, and the pronounced data sparsity in combinations present significant challenges for bundle recommendation algorithms. Furthermore, current bundle recommendation methods fail to identify mismatched items within a given set, a process termed as “outlier item detection”. These outlier items are those with the weakest correlations within a bundle. Identifying them can aid users in refining their item combinations. While the correlation among items can predict the detection of such outliers, the adaptability of combinations might not be adequately responsive to shifts in individual items during the learning phase. This limitation can hinder the algorithm’s performance. To tackle these challenges, we introduce an encoder-decoder architecture tailored for outlier item detection. The encoder learns potential item correlations through a self-attention mechanism. Concurrently, the decoder garners efficient inference frameworks by directly assessing item anomalies. We have validated the efficacy and efficiency of our proposed algorithm using real-world datasets.
In recent years, with the development of blockchain, electronic bidding auction has received more and more attention. Aiming at the possible problems of privacy leakage in the current electronic bidding and auction, this paper proposes an electronic bidding auction system based on blockchain against malicious adversaries, which uses the secure multi-party computation to realize secure bidding auction protocol without any trusted third party. The protocol proposed in this paper is an electronic bidding auction scheme based on the threshold elliptic curve cryptography. It can be implemented without any third party to complete the bidding auction for some malicious behaviors of the participants, which can solve the problem of resisting malicious adversary attacks. The security of the protocol is proved by the real/ideal model paradigm, and the efficiency of the protocol is analyzed. The efficiency of the protocol is verified by simulating experiments, and the protocol has practical value.
Recently, vehicles have experienced a rise in networking and informatization, leading to increased security concerns. As the most widely used automotive bus network, the Controller Area Network (CAN) bus is vulnerable to attacks, as security was not considered in its original design. This paper proposes SIDuBzip2, a traffic anomaly detection method for the CAN bus based on the bzip2 compression algorithm. The proposed method utilizes the pseudo-periodic characteristics of CAN bus traffic, constructing time series of CAN IDs and calculating the similarity between adjacent time series to identify abnormal traffic. The method consists of three parts: the conversion of CAN ID values to characters, the calculation of similarity based on bzip2 compression, and the optimal solution of model parameters. The experimental results demonstrate that the proposed SIDuBzip2 method effectively detects various attacks, including Denial of Service, replay, basic injection, mixed injection, and suppression attacks. In addition, existing CAN bus traffic anomaly detection methods are compared with the proposed method in terms of performance and delay, demonstrating the feasibility of the proposed method.
The Connected Sensor Problem (CSP) presents a prevalent challenge in the realms of communication and Internet of Things (IoT) applications. Its primary aim is to maximize the coverage of users while maintaining connectivity among K sensors. Addressing the challenge of managing a large user base alongside a finite number of candidate locations, this paper proposes an extension to the CSP: the h-hop independently submodular maximization problem characterized by curvature α. We have developed an approximation algorithm that achieves a ratio of $\frac{1-e^{-\alpha}}{(2 h+3) \alpha}$. The efficacy of this algorithm is demonstrated on the CSP, where it shows superior performance over existing algorithms, marked by an average enhancement of 8.4%.
Energy systems are currently undergoing a transformation towards new paradigms characterized by decarbonization, decentralization, democratization, and digitalization. In this evolving context, energy blockchain, aiming to enhance efficiency, transparency, and security, emerges as an integrated technological solution designed to address the diverse challenges in this field. Data security is essential for the reliable and efficient functioning of energy blockchain. The pressing need to address challenges related to secure data storage, effective data management, and efficient data utilization is increasingly vital. This paper offers a comprehensive survey of academic discourse on energy blockchain data security over the past five years, adopting an all-encompassing perspective that spans data storage, management, and utilization. Our work systematically evaluates and contrasts the strengths and weaknesses of various research methodologies. Additionally, this paper proposes an integrated hierarchical on-chain and off-chain security energy blockchain architecture, specifically designed to meet the complex security requirements of multi-blockchain business environments. Concludingly, this paper identifies key directions for future research, particularly in advancing the integration of storage, management, and utilization of energy blockchain data security.
Building Automation Systems (BASs) are seeing increased usage in modern society due to the plethora of benefits they provide such as automation for climate control, HVAC systems, entry systems, and lighting controls. Many BASs in use are outdated and suffer from numerous vulnerabilities that stem from the design of the underlying BAS protocol. In this paper, we provide a comprehensive, up-to-date survey on BASs and attacks against seven BAS protocols including BACnet, EnOcean, KNX, LonWorks, Modbus, ZigBee, and Z-Wave. Holistic studies of secure BAS protocols are also presented, covering BACnet Secure Connect, KNX Data Secure, KNX/IP Secure, ModBus/TCP Security, EnOcean High Security and Z-Wave Plus. LonWorks and ZigBee do not have security extensions. We point out how these security protocols improve the security of the BAS and what issues remain. A case study is provided which describes a real-world BAS and showcases its vulnerabilities as well as recommendations for improving the security of it. We seek to raise awareness to those in academia and industry as well as highlight open problems within BAS security.
Decentralized Storage Networks (DSNs) represent a paradigm shift in data storage methodology, distributing and housing data across multiple network nodes rather than relying on a centralized server or data center architecture. The fundamental objective of DSNs is to enhance security, reinforce reliability, and mitigate censorship risks by eliminating a single point of failure. Leveraging blockchain technology for functions such as access control, ownership validation, and transaction facilitation, DSN initiatives aim to provide users with a robust and secure alternative to traditional centralized storage solutions. This paper conducts a comprehensive analysis of the developmental trajectory of DSNs, focusing on key components such as Proof of Storage protocols, consensus algorithms, and incentive mechanisms. Additionally, the study explores recent optimization tactics, encountered challenges, and potential avenues for future research, thereby offering insights into the ongoing evolution and advancement within the DSN domain.
Pervasive Computing has become more personal with the widespread adoption of the Internet of Things (IoT) in our day-to-day lives. The emerging domain that encompasses devices, sensors, storage, and computing of personal use and surroundings leads to Personal IoT (PIoT). PIoT offers users high levels of personalization, automation, and convenience. This proliferation of PIoT technology has extended into society, social engagement, and the interconnectivity of PIoT objects, resulting in the emergence of the Social Internet of Things (SIoT). The combination of PIoT and SIoT has spurred the need for autonomous learning, comprehension, and understanding of both the physical and social worlds. Current research on PIoT is dedicated to enabling seamless communication among devices, striking a balance between observation, sensing, and perceiving the extended physical and social environment, and facilitating information exchange. Furthermore, the virtualization of independent learning from the social environment has given rise to Artificial Social Intelligence (ASI) in PIoT systems. However, autonomous data communication between different nodes within a social setup presents various resource management challenges that require careful consideration. This paper provides a comprehensive review of the evolving domains of PIoT, SIoT, and ASI. Moreover, the paper offers insightful modeling and a case study exploring the role of PIoT in post-COVID scenarios. This study contributes to a deeper understanding of the intricacies of PIoT and its various dimensions, paving the way for further advancements in this transformative field.