Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (131)

Search Parameters:
Keywords = swarm network security

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
58 pages, 7149 KB  
Review
Secure Communication in Drone Networks: A Comprehensive Survey of Lightweight Encryption and Key Management Techniques
by Sayani Sarkar, Sima Shafaei, Trishtanya S. Jones and Michael W. Totaro
Drones 2025, 9(8), 583; https://doi.org/10.3390/drones9080583 - 18 Aug 2025
Viewed by 412
Abstract
Deployment of Unmanned Aerial Vehicles (UAVs) continues to expand rapidly across a wide range of applications, including environmental monitoring, precision agriculture, and disaster response. Despite their increasing ubiquity, UAVs remain inherently vulnerable to security threats due to resource-constrained hardware, energy limitations, and reliance [...] Read more.
Deployment of Unmanned Aerial Vehicles (UAVs) continues to expand rapidly across a wide range of applications, including environmental monitoring, precision agriculture, and disaster response. Despite their increasing ubiquity, UAVs remain inherently vulnerable to security threats due to resource-constrained hardware, energy limitations, and reliance on open wireless communication channels. These factors render traditional cryptographic solutions impractical, thereby necessitating the development of lightweight, UAV-specific security mechanisms. This review article presents a comprehensive analysis of lightweight encryption techniques and key management strategies designed for energy-efficient and secure UAV communication. Special emphasis is placed on recent cryptographic advancements, including the adoption of the ASCON family of ciphers and the emergence of post-quantum algorithms that can secure UAV networks against future quantum threats. Key management techniques such as blockchain-based decentralized key exchange, Physical Unclonable Function (PUF)-based authentication, and hierarchical clustering schemes are evaluated for their performance and scalability. To ensure comprehensive protection, this review introduces a multilayer security framework addressing vulnerabilities from the physical to the application layer. Comparative analysis of lightweight cryptographic algorithms and multiple key distribution approaches is conducted based on energy consumption, latency, memory usage, and deployment feasibility in dynamic aerial environments. Unlike design- or implementation-focused studies, this work synthesizes existing literature across six interconnected security dimensions to provide an integrative foundation. Our review also identifies key research challenges, including secure and efficient rekeying during flight, resilience to cross-layer attacks, and the need for standardized frameworks supporting post-quantum cryptography in UAV swarms. By highlighting current advancements and research gaps, this study aims to guide future efforts in developing secure communication architectures tailored to the unique operational constraints of UAV networks. Full article
Show Figures

Figure 1

36 pages, 8958 KB  
Article
Dynamic Resource Target Assignment Problem for Laser Systems’ Defense Against Malicious UAV Swarms Based on MADDPG-IA
by Wei Liu, Lin Zhang, Wenfeng Wang, Haobai Fang, Jingyi Zhang and Bo Zhang
Aerospace 2025, 12(8), 729; https://doi.org/10.3390/aerospace12080729 - 17 Aug 2025
Viewed by 414
Abstract
The widespread adoption of Unmanned Aerial Vehicles (UAVs) in civilian domains, such as airport security and critical infrastructure protection, has introduced significant safety risks that necessitate effective countermeasures. High-Energy Laser Systems (HELSs) offer a promising defensive solution; however, when confronting large-scale malicious UAV [...] Read more.
The widespread adoption of Unmanned Aerial Vehicles (UAVs) in civilian domains, such as airport security and critical infrastructure protection, has introduced significant safety risks that necessitate effective countermeasures. High-Energy Laser Systems (HELSs) offer a promising defensive solution; however, when confronting large-scale malicious UAV swarms, the Dynamic Resource Target Assignment (DRTA) problem becomes critical. To address the challenges of complex combinatorial optimization problems, a method combining precise physical models with multi-agent reinforcement learning (MARL) is proposed. Firstly, an environment-dependent HELS damage model was developed. This model integrates atmospheric transmission effects and thermal effects to precisely quantify the required irradiation time to achieve the desired damage effect on a target. This forms the foundation of the HELS–UAV–DRTA model, which employs a two-stage dynamic assignment structure designed to maximize the target priority and defense benefit. An innovative MADDPG-IA (I: intrinsic reward, and A: attention mechanism) algorithm is proposed to meet the MARL challenges in the HELS–UAV–DRTA problem: an attention mechanism compresses variable-length target states into fixed-size encodings, while a Random Network Distillation (RND)-based intrinsic reward module delivers dense rewards that alleviate the extreme reward sparsity. Large-scale scenario simulations (100 independent runs per scenario) involving 50 UAVs and 5 HELS across diverse environments demonstrate the method’s superiority, achieving mean damage rates of 99.65% ± 0.32% vs. 72.64% ± 3.21% (rural), 79.37% ± 2.15% vs. 51.29% ± 4.87% (desert), and 91.25% ± 1.78% vs. 67.38% ± 3.95% (coastal). The method autonomously evolved effective strategies such as delaying decision-making to await the optimal timing and cross-region coordination. The ablation and comparison experiments further confirm MADDPG-IA’s superior convergence, stability, and exploration capabilities. This work bridges the gap between complex mathematical and physical mechanisms and real-time collaborative decision optimization. It provides an innovative theoretical and methodological basis for public-security applications. Full article
Show Figures

Figure 1

18 pages, 2954 KB  
Article
A Multi-Objective Decision-Making Method for Optimal Scheduling Operating Points in Integrated Main-Distribution Networks with Static Security Region Constraints
by Kang Xu, Zhaopeng Liu and Shuaihu Li
Energies 2025, 18(15), 4018; https://doi.org/10.3390/en18154018 - 28 Jul 2025
Viewed by 330
Abstract
With the increasing penetration of distributed generation (DG), integrated main-distribution networks (IMDNs) face challenges in rapidly and effectively performing comprehensive operational risk assessments under multiple uncertainties. Thereby, using the traditional hierarchical economic scheduling method makes it difficult to accurately find the optimal scheduling [...] Read more.
With the increasing penetration of distributed generation (DG), integrated main-distribution networks (IMDNs) face challenges in rapidly and effectively performing comprehensive operational risk assessments under multiple uncertainties. Thereby, using the traditional hierarchical economic scheduling method makes it difficult to accurately find the optimal scheduling operating point. To address this problem, this paper proposes a multi-objective dispatch decision-making optimization model for the IMDN with static security region (SSR) constraints. Firstly, the non-sequential Monte Carlo sampling is employed to generate diverse operational scenarios, and then the key risk characteristics are extracted to construct the risk assessment index system for the transmission and distribution grid, respectively. Secondly, a hyperplane model of the SSR is developed for the IMDN based on alternating current power flow equations and line current constraints. Thirdly, a risk assessment matrix is constructed through optimal power flow calculations across multiple load levels, with the index weights determined via principal component analysis (PCA). Subsequently, a scheduling optimization model is formulated to minimize both the system generation costs and the comprehensive risk, where the adaptive grid density-improved multi-objective particle swarm optimization (AG-MOPSO) algorithm is employed to efficiently generate Pareto-optimal operating point solutions. A membership matrix of the solution set is then established using fuzzy comprehensive evaluation to identify the optimal compromised operating point for dispatch decision support. Finally, the effectiveness and superiority of the proposed method are validated using an integrated IEEE 9-bus and IEEE 33-bus test system. Full article
Show Figures

Figure 1

18 pages, 1261 KB  
Article
Firmware Attestation in IoT Swarms Using Relational Graph Neural Networks and Static Random Access Memory
by Abdelkabir Rouagubi, Chaymae El Youssofi and Khalid Chougdali
AI 2025, 6(7), 161; https://doi.org/10.3390/ai6070161 - 21 Jul 2025
Viewed by 594
Abstract
The proliferation of Internet of Things (IoT) swarms—comprising billions of low-end interconnected embedded devices—has transformed industrial automation, smart homes, and agriculture. However, these swarms are highly susceptible to firmware anomalies that can propagate across nodes, posing serious security threats. To address this, we [...] Read more.
The proliferation of Internet of Things (IoT) swarms—comprising billions of low-end interconnected embedded devices—has transformed industrial automation, smart homes, and agriculture. However, these swarms are highly susceptible to firmware anomalies that can propagate across nodes, posing serious security threats. To address this, we propose a novel Remote Attestation (RA) framework for real-time firmware verification, leveraging Relational Graph Neural Networks (RGNNs) to model the graph-like structure of IoT swarms and capture complex inter-node dependencies. Unlike conventional Graph Neural Networks (GNNs), RGNNs incorporate edge types (e.g., Prompt, Sensor Data, Processed Signal), enabling finer-grained detection of propagation dynamics. The proposed method uses runtime Static Random Access Memory (SRAM) data to detect malicious firmware and its effects without requiring access to firmware binaries. Experimental results demonstrate that the framework achieves 99.94% accuracy and a 99.85% anomaly detection rate in a 4-node swarm (Swarm-1), and 100.00% accuracy with complete anomaly detection in a 6-node swarm (Swarm-2). Moreover, the method proves resilient against noise, dropped responses, and trace replay attacks, offering a robust and scalable solution for securing IoT swarms. Full article
Show Figures

Figure 1

14 pages, 1922 KB  
Article
Asymmetric Protocols for Mode Pairing Quantum Key Distribution with Finite-Key Analysis
by Zhenhua Li, Tianqi Dou, Yuheng Xie, Weiwen Kong, Yang Liu, Haiqiang Ma and Jianjun Tang
Entropy 2025, 27(7), 737; https://doi.org/10.3390/e27070737 - 9 Jul 2025
Viewed by 349
Abstract
The mode pairing quantum key distribution (MP-QKD) protocol has attracted considerable attention for its capability to ensure high secure key rates over long distances without requiring global phase locking. However, ensuring symmetric channels for the MP-QKD protocol is challenging in practical quantum communication [...] Read more.
The mode pairing quantum key distribution (MP-QKD) protocol has attracted considerable attention for its capability to ensure high secure key rates over long distances without requiring global phase locking. However, ensuring symmetric channels for the MP-QKD protocol is challenging in practical quantum communication networks. Previous studies on the asymmetric MP-QKD protocol have relied on ideal decoy state assumptions and infinite-key analysis, which are unattainable for real-world deployment. In this paper, we conduct a security analysis of the asymmetric MP-QKD protocol with the finite-key analysis, where we discard the previously impractical assumptions made in the decoy state method. Combined with statistical fluctuation analysis, we globally optimized the 10 independent parameters in the asymmetric MP-QKD protocol by employing our modified particle swarm optimization. Through further analysis, the simulation results demonstrate that our work achieves improved secure key rates and transmission distances compared to the strategy with additional attenuation. We further investigate the relationship between the intensities and probabilities of signal, decoy, and vacuum states with transmission distance, facilitating their more efficient deployment in future quantum networks. Full article
(This article belongs to the Section Quantum Information)
Show Figures

Figure 1

24 pages, 2163 KB  
Article
Bi-Level Interactive Optimization of Distribution Network–Agricultural Park with Distributed Generation Support
by Ke Xu, Chang Liu, Shijun Chen, Weiting Xu, Chuan Yuan, Dengli Jiang, Peilin Li and Youbo Liu
Sustainability 2025, 17(11), 5228; https://doi.org/10.3390/su17115228 - 5 Jun 2025
Viewed by 788
Abstract
The large-scale integration of renewable energy and the use of high-energy-consuming equipment in agricultural parks have a great influence on the security of rural distribution networks. To ensure reliable power delivery for residential and agricultural activities and sustainable management of distributed energy resources, [...] Read more.
The large-scale integration of renewable energy and the use of high-energy-consuming equipment in agricultural parks have a great influence on the security of rural distribution networks. To ensure reliable power delivery for residential and agricultural activities and sustainable management of distributed energy resources, this paper develops a distributed generation-supported interactive optimization framework coordinating distribution networks and agricultural parks. Specifically, a wind–photovoltaic scenario generation method based on Copula functions is first proposed to characterize the uncertainties of renewable generation. Based on the generated scenario, a bi-level interactive optimization framework consisting of a distribution network and agricultural park is constructed. At the upper level, the distribution network operators ensure the security of the distribution network by reconfiguration, coordinated distributed resource dispatch, and dynamic price compensation mechanisms to guide the agricultural park’s electricity consumption strategy. At the lower level, the agricultural park users maximize their economic benefits by adjusting controllable loads in response to price compensation incentives. Additionally, an improved particle swarm optimization combined with a Gurobi solver is proposed to obtain equilibrium by iterative solving. The simulation analysis demonstrates that the proposed method can reduce the operation costs of the distribution network and improve the satisfaction of users in agricultural parks. Full article
(This article belongs to the Special Issue Sustainable Management for Distributed Energy Resources)
Show Figures

Figure 1

46 pages, 2221 KB  
Article
A Novel Metaheuristic-Based Methodology for Attack Detection in Wireless Communication Networks
by Walaa N. Ismail
Mathematics 2025, 13(11), 1736; https://doi.org/10.3390/math13111736 - 24 May 2025
Cited by 1 | Viewed by 570
Abstract
The landscape of 5G communication introduces heightened risks from malicious attacks, posing significant threats to network security and availability. The unique characteristics of 5G networks, while enabling advanced communication, present challenges in distinguishing between legitimate and malicious traffic, making it more difficult to [...] Read more.
The landscape of 5G communication introduces heightened risks from malicious attacks, posing significant threats to network security and availability. The unique characteristics of 5G networks, while enabling advanced communication, present challenges in distinguishing between legitimate and malicious traffic, making it more difficult to detect anonymous traffic. Current methodologies for intrusion detection within 5G communication exhibit limitations in accuracy, efficiency, and adaptability to evolving network conditions. In this study, we explore the application of an adaptive optimized machine learning-based framework to improve intrusion detection system (IDS) performance in wireless network access scenarios. The framework used involves developing a lightweight model based on a convolutional neural network with 11 layers, referred to as CSO-2D-CNN, which demonstrates fast learning rates and excellent generalization capabilities. Additionally, an optimized attention-based XGBoost classifier is utilized to improve model performance by combining the benefits of parallel gradient boosting and attention mechanisms. By focusing on the most relevant features, this attention mechanism makes the model suitable for complex and high-dimensional traffic patterns typical of 5G communication. As in previous approaches, it eliminates the need to manually select features such as entropy, payload size, and opcode sequences. Furthermore, the metaheuristic Cat Swarm Optimization (CSO) algorithm is employed to fine-tune the hyperparameters of both the CSO-2D-CNN and the attention-based XGBoost classifier. Extensive experiments conducted on a recent dataset of network traffic demonstrate that the system can adapt to both binary and multiclass classification tasks for high-dimensional and imbalanced data. The results show a low false-positive rate and a high level of accuracy, with a maximum of 99.97% for multilabel attack detection and 99.99% for binary task classification, validating the effectiveness of the proposed framework in the 5G wireless context. Full article
Show Figures

Figure 1

18 pages, 2884 KB  
Article
Efficient Approach for the Sectorization of Water Distribution Systems: Integrating Graph Theory and Binary Particle Swarm Optimization
by Sabrina da Silva Corrêa Raimundo, Elizabeth Amaral Pastich and Saulo de Tarso Marques Bezerra
Sustainability 2025, 17(9), 4231; https://doi.org/10.3390/su17094231 - 7 May 2025
Viewed by 483
Abstract
The accelerated expansion of urban areas has significantly increased the complexity of managing water distribution systems. Network sectorization into smaller, independently controlled areas is often highlighted as an important measure to enhance operational security and reduce water losses in networks. However, identifying the [...] Read more.
The accelerated expansion of urban areas has significantly increased the complexity of managing water distribution systems. Network sectorization into smaller, independently controlled areas is often highlighted as an important measure to enhance operational security and reduce water losses in networks. However, identifying the optimal sectorization strategy is challenging due to the vast number of possible combinations, and existing methods still present practical limitations. This study proposes a hybrid model for the optimal design of district-metered areas in water distribution systems. The methodology combines graph theory, the Dijkstra shortest path algorithm (DSP), and the meta-heuristic binary particle swarm optimization (BPSO) algorithm. Structuring the topology of the water distribution network using graphs allows the identification of existing connections between the network components. By DSP, the shortest paths from the reservoir to the consumption points were determined, while the proposed BPSO sought the best combination of pipe conditions (open or closed) while meeting the constraint conditions. The application of the model to three real water distribution systems in João Pessoa, in northeastern Brazil, demonstrated its efficiency in sectorization projects, providing optimal solutions that meet the imposed constraints. The results highlight the model’s potential to optimize costs and enhance decision-making in water utility projects. Full article
(This article belongs to the Special Issue Sustainable Water Resources Management and Water Supply)
Show Figures

Figure 1

22 pages, 2987 KB  
Article
Optimal Configuration Method of Energy Routers in Active Distribution Network Considering Demand Response
by Junqing Jia, Tianyu Wu, Jia Zhou, Wenchao Cai, Zehua Wang, Junda Lu, Chen Shao and Jiaoxin Jia
Processes 2025, 13(4), 1248; https://doi.org/10.3390/pr13041248 - 20 Apr 2025
Viewed by 394
Abstract
The energy router (ER) is a crucial component in smart distribution networks, and its optimal configuration is essential for enhancing the operational efficiency, economy, and security of the grid. However, existing research rarely considers both the location and sizing costs of the ER [...] Read more.
The energy router (ER) is a crucial component in smart distribution networks, and its optimal configuration is essential for enhancing the operational efficiency, economy, and security of the grid. However, existing research rarely considers both the location and sizing costs of the ER in conjunction with flexible load demand response. Therefore, this paper proposes an optimal configuration method for the energy router in active distribution networks, incorporating demand response. First, to balance the comprehensive operational characteristics of the active distribution network throughout the year with computational efficiency, an improved K-means clustering algorithm is employed to construct multiple representative scenarios. Then, a bi-level programming model is established for ER location and sizing, considering demand response. The upper level optimizes the location and capacity configuration of the ER to minimize the overall cost of the distribution network. The lower level focuses on multi-objective optimization, including peak shaving, valley filling, network losses, and voltage deviations, to achieve energy scheduling within the distribution network. Finally, an improved bi-level particle swarm optimization algorithm is employed to solve the model. Simulation results based on the IEEE 33-node system demonstrate that the peak shaving and valley filling optimization rate after ER integration into the active distribution network is at least 9.19%, and it is improved to 14.35% when combined with demand response. Concurrently, the integration of the ER enhances the distribution network’s ability to absorb renewable energy, reduces network losses, and improves power quality. Full article
(This article belongs to the Special Issue Modeling, Optimization, and Control of Distributed Energy Systems)
Show Figures

Figure 1

27 pages, 7099 KB  
Article
Diabetes: Non-Invasive Blood Glucose Monitoring Using Federated Learning with Biosensor Signals
by Narmatha Chellamani, Saleh Ali Albelwi, Manimurugan Shanmuganathan, Palanisamy Amirthalingam and Anand Paul
Biosensors 2025, 15(4), 255; https://doi.org/10.3390/bios15040255 - 16 Apr 2025
Cited by 1 | Viewed by 1955
Abstract
Diabetes is a growing global health concern, affecting millions and leading to severe complications if not properly managed. The primary challenge in diabetes management is maintaining blood glucose levels (BGLs) within a safe range to prevent complications such as renal failure, cardiovascular disease, [...] Read more.
Diabetes is a growing global health concern, affecting millions and leading to severe complications if not properly managed. The primary challenge in diabetes management is maintaining blood glucose levels (BGLs) within a safe range to prevent complications such as renal failure, cardiovascular disease, and neuropathy. Traditional methods, such as finger-prick testing, often result in low patient adherence due to discomfort, invasiveness, and inconvenience. Consequently, there is an increasing need for non-invasive techniques that provide accurate BGL measurements. Photoplethysmography (PPG), a photosensitive method that detects blood volume variations, has shown promise for non-invasive glucose monitoring. Deep neural networks (DNNs) applied to PPG signals can predict BGLs with high accuracy. However, training DNN models requires large and diverse datasets, which are typically distributed across multiple healthcare institutions. Privacy concerns and regulatory restrictions further limit data sharing, making conventional centralized machine learning (ML) approaches less effective. To address these challenges, this study proposes a federated learning (FL)-based solution that enables multiple healthcare organizations to collaboratively train a global model without sharing raw patient data, thereby enhancing model performance while ensuring data privacy and security. In the data preprocessing stage, continuous wavelet transform (CWT) is applied to smooth PPG signals and remove baseline drift. Adaptive cycle-based segmentation (ACBS) is then used for signal segmentation, followed by particle swarm optimization (PSO) for feature selection, optimizing classification accuracy. The proposed system was evaluated on diverse datasets, including VitalDB and MUST, under various conditions with data collected during surgery and anesthesia. The model achieved a root mean square error (RMSE) of 19.1 mg/dL, demonstrating superior predictive accuracy. Clarke error grid analysis (CEGA) confirmed the model’s clinical reliability, with 99.31% of predictions falling within clinically acceptable limits. The FL-based approach outperformed conventional deep learning models, making it a promising method for non-invasive, privacy-preserving glucose monitoring. Full article
(This article belongs to the Section Biosensors and Healthcare)
Show Figures

Figure 1

16 pages, 9459 KB  
Article
Key Calibration Strategies for Mitigation of Water Scarcity in the Water Supply Macrosystem of a Brazilian City
by Jefferson S. Rocha, José Gescilam S. M. Uchôa, Bruno M. Brentan and Iran E. Lima Neto
Water 2025, 17(6), 883; https://doi.org/10.3390/w17060883 - 19 Mar 2025
Cited by 1 | Viewed by 678
Abstract
This study focuses on Fortaleza, the largest metropolis in Brazil’s semi-arid region. Due to recurrent droughts, massive infrastructure like high-density reservoir networks, inter-municipal and interstate water transfer systems, and a seawater desalination plant have been implemented to ensure the city’s water security. To [...] Read more.
This study focuses on Fortaleza, the largest metropolis in Brazil’s semi-arid region. Due to recurrent droughts, massive infrastructure like high-density reservoir networks, inter-municipal and interstate water transfer systems, and a seawater desalination plant have been implemented to ensure the city’s water security. To evaluate the quantitative and qualitative impact of introducing these diverse water sources into Fortaleza’s water supply macrosystem, adequate calibration of the operating and demand parameters is required. In this study, the macrosystem was calibrated using the Particle Swarm Optimization (PSO) method based on hourly data from 50 pressure head monitoring points and 40 flow rate monitoring points over two typical operational days. The calibration process involved adjusting the operational rules of typical valves in large-scale Water Distribution Systems (WDS). After parameterization, the calibration presented the following results: R2 of 88% for pressure head and 96% for flow rate, with average relative errors of 13% for the pressure head and flow rate. In addition, with NSE values above 0.80 after calibration for the flow rate and pressure head, the PSO method suggests a significant improvement in the simulation model’s performance. These results offer a methodology for calibrating real WDS to simulate various water injection scenarios in the Fortaleza macrosystem. Full article
(This article belongs to the Special Issue Advances in Management and Optimization of Urban Water Networks)
Show Figures

Figure 1

28 pages, 4600 KB  
Article
Power System Loss Reduction Strategy Considering Security Constraints Based on Improved Particle Swarm Algorithm and Coordinated Dispatch of Source–Grid–Load–Storage
by Shuolin Zhang, Jiongcheng Yan, Pengteng Xie, Pengming Zhai and Ye Tao
Processes 2025, 13(3), 831; https://doi.org/10.3390/pr13030831 - 12 Mar 2025
Cited by 4 | Viewed by 792
Abstract
Coordinating various controllable distributed resources to reduce network losses is crucial to the secure and economical operation of modern power systems. This paper proposes a bi-level optimization model for power system loss reduction based on “source-grid-load-storage” coordinated optimization. The upper level aims to [...] Read more.
Coordinating various controllable distributed resources to reduce network losses is crucial to the secure and economical operation of modern power systems. This paper proposes a bi-level optimization model for power system loss reduction based on “source-grid-load-storage” coordinated optimization. The upper level aims to minimize the total annual planning cost of the system, determining the location and capacity of distributed photovoltaic systems, energy storage devices, and electric vehicle charging stations. The lower level aims to minimize the load curve smoothness and node voltage deviation of the distribution network, optimizing intraday operation strategies. For this complex optimization problem, this paper designs a particle swarm optimization (PSO) algorithm with adaptive weights and improved evolutionary strategies. The simulation results of case studies demonstrate that the proposed method has significant loss reduction effects in distribution networks of various scales and complexities. The algorithm performance comparison results show that the improved particle swarm algorithm outperforms traditional algorithms in terms of solution quality and computational efficiency, providing an effective solution for the coordinated optimization of “source-grid-load-storage”. Full article
(This article belongs to the Section Energy Systems)
Show Figures

Figure 1

17 pages, 2026 KB  
Article
Network Security Situational Awareness Based on Improved Particle Swarm Algorithm and Bidirectional Long Short-Term Memory Modeling
by Peng Zheng, Yun Cheng, Wei Zhu, Bo Liu, Shuhong Liu, Shijie Wang and Jinyin Bai
Appl. Sci. 2025, 15(4), 2082; https://doi.org/10.3390/app15042082 - 17 Feb 2025
Cited by 1 | Viewed by 705
Abstract
With the continuous development of information technology, network security risks are also rising, and the ability to quickly perceive network threats has become an important prerequisite and an important means to cope with network risks. Currently, there are various types of network attacks [...] Read more.
With the continuous development of information technology, network security risks are also rising, and the ability to quickly perceive network threats has become an important prerequisite and an important means to cope with network risks. Currently, there are various types of network attacks and complex attacking techniques, and the large differences between them have led to the difficulty of collecting and recognizing the common characteristics of network attacks. Considering the regular temporal fluctuations in network attacks, a method for network security situational awareness, based on an enhanced Particle Swarm Optimization Bidirectional Long Short-Term Memory (BiLSTM) network model, is proposed. By gathering and organizing critical information within the network, an encapsulated Wrapper feature selection algorithm is utilized for the extraction of element features. The refined Particle Swarm Optimization algorithm is applied to optimize the parameters of the BiLSTM network, enabling a rapid convergence and enhancing the training efficiency, thus effectively identifying the categories of network attacks. The experimental results show that the MAPE for the proposed model has been diminished to 0.36%, while the sMAPE is 2.654%. Additionally, the fitting coefficient attains a value of 0.92. This indicates a high level of recognition and precision exhibited by the proposed model in detecting network security risk behaviors. Furthermore, in contrast to the traditional CNN neural network, the proposed model is more compact, which significantly reduces the computational overhead and allows for efficient network security situational awareness. Full article
Show Figures

Figure 1

43 pages, 2428 KB  
Review
A Survey on Directed Acyclic Graph-Based Blockchain in Smart Mobility
by Yuhao Bai, Soojin Lee and Seung-Hyun Seo
Sensors 2025, 25(4), 1108; https://doi.org/10.3390/s25041108 - 12 Feb 2025
Cited by 3 | Viewed by 2032
Abstract
This systematic review examines the integration of directed acyclic graph (DAG)-based blockchain technology in smart mobility ecosystems, focusing on electric vehicles (EVs), robotic systems, and drone swarms. Adhering to PRISMA guidelines, we conducted a comprehensive literature search across Web of Science, Scopus, IEEE [...] Read more.
This systematic review examines the integration of directed acyclic graph (DAG)-based blockchain technology in smart mobility ecosystems, focusing on electric vehicles (EVs), robotic systems, and drone swarms. Adhering to PRISMA guidelines, we conducted a comprehensive literature search across Web of Science, Scopus, IEEE Xplore, and ACM Digital Library, screening 1248 records to identify 47 eligible studies. Our analysis demonstrates that DAG-based blockchain addresses critical limitations of traditional blockchains by enabling parallel transaction processing, achieving high throughput (>1000 TPS), and reducing latency (<1 s), which are essential for real-time applications like autonomous vehicle coordination and microtransactions in EV charging. Key technical challenges include consensus mechanism complexity, probabilistic finality, and vulnerabilities to attacks such as double-spending and Sybil attacks. This study identifies five research priorities: (1) standardized performance benchmarks, (2) formal security proofs for DAG protocols, (3) hybrid consensus models combining DAG with Byzantine fault tolerance, (4) privacy-preserving cryptographic techniques, and (5) optimization of feeless microtransactions. These advancements are critical for deploying robust, scalable DAG-based solutions in smart mobility, and fostering secure and efficient urban transportation networks. Full article
(This article belongs to the Special Issue Feature Review Papers in Intelligent Sensors)
Show Figures

Figure 1

19 pages, 734 KB  
Article
Secure and Intelligent Single-Channel Blind Source Separation via Adaptive Variational Mode Decomposition with Optimized Parameters
by Meishuang Yan, Lu Chen, Wei Hu, Zhihong Sun and Xueguang Zhou
Sensors 2025, 25(4), 1107; https://doi.org/10.3390/s25041107 - 12 Feb 2025
Cited by 1 | Viewed by 1022
Abstract
Emerging intelligent systems rely on secure and efficient signal processing to ensure reliable operation in environments where there is limited prior knowledge and significant interference. Single-channel blind source separation (SCBSS) is critical for applications such as wireless communication and sensor networks, where signals [...] Read more.
Emerging intelligent systems rely on secure and efficient signal processing to ensure reliable operation in environments where there is limited prior knowledge and significant interference. Single-channel blind source separation (SCBSS) is critical for applications such as wireless communication and sensor networks, where signals are often mixed and corrupted. Variational mode decomposition (VMD) has proven effective for SCBSS, but its performance depends heavily on selecting the optimal modal component count k and quadratic penalty parameter α. To address this challenge, we propose a secure and intelligent SCBSS algorithm leveraging adaptive VMD optimized with Improved Particle Swarm Optimization (IPSO). The IPSO dynamically determines the optimal k and α parameters, enabling VMD to filter noise and create a virtual multi-channel signal. This signal is then processed using improved Fast Independent Component Analysis (IFastICA) for high-fidelity source isolation. Experiments on the RML2016.10a dataset demonstrate a 15.7% improvement in separation efficiency over conventional methods, with robust performance for BPSK and QPSK signals, achieving correlation coefficients above 0.9 and signal-to-noise ratio (SNR) improvements of up to 24.66 dB. Full article
(This article belongs to the Special Issue Advances in Security for Emerging Intelligent Systems)
Show Figures

Figure 1

Back to TopTop