With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices ge...With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices generatemassive data,but data security and privacy protection have become a serious challenge.Federated learning(FL)can achieve many intelligent IoT applications by training models on local devices and allowing AI training on distributed IoT devices without data sharing.This review aims to deeply explore the combination of FL and the IoT,and analyze the application of federated learning in the IoT from the aspects of security and privacy protection.In this paper,we first describe the potential advantages of FL and the challenges faced by current IoT systems in the fields of network burden and privacy security.Next,we focus on exploring and analyzing the advantages of the combination of FL on the Internet,including privacy security,attack detection,efficient communication of the IoT,and enhanced learning quality.We also list various application scenarios of FL on the IoT.Finally,we propose several open research challenges and possible solutions.展开更多
Black soils represent only one-sixth of the global arable land area but play an important role in maintaining world food security due to their high fertility and gigantic potential for food production.With the ongoing...Black soils represent only one-sixth of the global arable land area but play an important role in maintaining world food security due to their high fertility and gigantic potential for food production.With the ongoing intensification of agricultural practices and negative natural factors,black soils are confronting enhanced degradation.The holistic overview of black soil degradation and the underlying mechanisms for soil health improvement will be key for agricultural sustainability and food security.In this review,the current status and driving factors of soil degradation in the four major black soil regions of the world are summarized,and effective measures for black soil conservation are proposed.The Northeast Plain of China is the research hotspot with 41.5%of the published studies related to black soil degradation,despite its relatively short history of agricultural reclamation,followed by the East European Plain(28.3%),the Great Plains of North America(20.7%),and the Pampas of South American(7.9%).Among the main types of soil degradation,soil erosion and soil fertility decline(especially organic matter loss)have been reported as the most common problems,with 27.6%and 39.4%of the published studies,respectively.In addition to the natural influences of climate and topography,human activities have been reported to have great influences on the degradation of black soils globally.Unsustainable farming practices and excess in agrochemical applications are common factors reported to accelerate the degradation process and threaten the sustainable use of black soils.Global efforts for black soil conservation and utilization should focus on standardizing evaluation criteria including real-time monitoring and the measures of prevention and restoration for sustainable management.International cooperation in technology and policy is crucial for overcoming the challenges and thus achieving the protection,sustainable use,and management of global black soil resources.展开更多
The national grid and other life-sustaining critical infrastructures face an unprecedented threat from prolonged blackouts,which could last over a year and pose a severe risk to national security.Whether caused by phy...The national grid and other life-sustaining critical infrastructures face an unprecedented threat from prolonged blackouts,which could last over a year and pose a severe risk to national security.Whether caused by physical attacks,EMP(electromagnetic pulse)events,or cyberattacks,such disruptions could cripple essential services like water supply,healthcare,communication,and transportation.Research indicates that an attack on just nine key substations could result in a coast-to-coast blackout lasting up to 18 months,leading to economic collapse,civil unrest,and a breakdown of public order.This paper explores the key vulnerabilities of the grid,the potential impacts of prolonged blackouts,and the role of AI(artificial intelligence)and ML(machine learning)in mitigating these threats.AI-driven cybersecurity measures,predictive maintenance,automated threat response,and EMP resilience strategies are discussed as essential solutions to bolster grid security.Policy recommendations emphasize the need for hardened infrastructure,enhanced cybersecurity,redundant power systems,and AI-based grid management to ensure national resilience.Without proactive measures,the nation remains exposed to a catastrophic power grid failure that could have dire consequences for society and the economy.展开更多
This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA f...This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA framework integrates security by design principles, micro-segmentation, and Island Mode Operation (IMO) to enhance cyber resilience and ensure continuous, secure operations. The methodology deploys a Forward-Thinking Architecture Strategy (FTAS) algorithm, which utilises an industrial Intrusion Detection System (IDS) implemented with Python’s Network Intrusion Detection System (NIDS) library. The FTAS algorithm successfully identified and responded to cyber-attacks, ensuring minimal system disruption. ISERA has been validated through comprehensive testing scenarios simulating Denial of Service (DoS) attacks and malware intrusions, at both the IT and OT layers where it successfully mitigates the impact of malicious activity. Results demonstrate ISERA’s efficacy in real-time threat detection, containment, and incident response, thus ensuring the integrity and reliability of critical infrastructure systems. ISERA’s decentralised approach contributes to global net zero goals by optimising resource use and minimising environmental impact. By adopting a decentralised control architecture and leveraging virtualisation, ISERA significantly enhances the cyber resilience and sustainability of critical infrastructure systems. This approach not only strengthens defences against evolving cyber threats but also optimises resource allocation, reducing the system’s carbon footprint. As a result, ISERA ensures the uninterrupted operation of essential services while contributing to broader net zero goals.展开更多
The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facili...The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facilitating fine-grained access control,Ciphertext Policy Attribute-Based Encryption(CP-ABE)can effectively ensure the confidentiality of shared data.Nevertheless,the conventional centralized CP-ABE scheme is plagued by the issues of keymisuse,key escrow,and large computation,which will result in security risks.This paper suggests a lightweight IoT data security sharing scheme that integrates blockchain technology and CP-ABE to address the abovementioned issues.The integrity and traceability of shared data are guaranteed by the use of blockchain technology to store and verify access transactions.The encryption and decryption operations of the CP-ABE algorithm have been implemented using elliptic curve scalarmultiplication to accommodate lightweight IoT devices,as opposed to themore arithmetic bilinear pairing found in the traditional CP-ABE algorithm.Additionally,a portion of the computation is delegated to the edge nodes to alleviate the computational burden on users.A distributed key management method is proposed to address the issues of key escrow andmisuse.Thismethod employs the edge blockchain to facilitate the storage and distribution of attribute private keys.Meanwhile,data security sharing is enhanced by combining off-chain and on-chain ciphertext storage.The security and performance analysis indicates that the proposed scheme is more efficient and secure.展开更多
Land use transformations in Sonipat District,Haryana,driven by urbanization,industrialization,and land acquisitions,have posed significant ecological and socio-economic challenges,particularly concerning food security...Land use transformations in Sonipat District,Haryana,driven by urbanization,industrialization,and land acquisitions,have posed significant ecological and socio-economic challenges,particularly concerning food security.This study investigates the interplay between these land use changes and their environmental implications at macro(district)and micro(village)levels,focusing on agricultural productivity and resource sustainability.The study employs a mixed-method approach,integrating secondary data from official datasets and primary data gathered through structured household surveys,focus group discussions,and visual analysis techniques.Data from 20 villages,selected based on predominant land use characteristics,were analysed using statistical and geospatial tools,including ArcGIS and STATA,to quantify food grain losses and evaluate environmental degradation.Findings of this study reveal a 19%reduction in agricultural land over two decades(2000-2024),correlating with increased residential and industrial areas.Groundwater resources face severe overexploitation,with pollution from industrial clusters further degrading water and soil quality.The study estimates a total food grain loss of 1.5 million kilograms across surveyed villages due to land acquisitions.A strong positive correlation(R^(2)=0.98)between land acquisition and food loss underscores the direct impact of urbanization on agricultural output.The research underscores the urgency of sustainable land management practices,including preserving agricultural lands,optimizing groundwater usage,and enhancing community involvement in planning.By addressing these challenges,the study advocates for balanced urban expansion and food security to ensure ecological and economic resilience in the region.展开更多
The integration of artificial intelligence(AI)technology,particularly large language models(LLMs),has become essential across various sectors due to their advanced language comprehension and generation capabilities.De...The integration of artificial intelligence(AI)technology,particularly large language models(LLMs),has become essential across various sectors due to their advanced language comprehension and generation capabilities.Despite their transformative impact in fields such as machine translation and intelligent dialogue systems,LLMs face significant challenges.These challenges include safety,security,and privacy concerns that undermine their trustworthiness and effectiveness,such as hallucinations,backdoor attacks,and privacy leakage.Previous works often conflated safety issues with security concerns.In contrast,our study provides clearer and more reasonable definitions for safety,security,and privacy within the context of LLMs.Building on these definitions,we provide a comprehensive overview of the vulnerabilities and defense mechanisms related to safety,security,and privacy in LLMs.Additionally,we explore the unique research challenges posed by LLMs and suggest potential avenues for future research,aiming to enhance the robustness and reliability of LLMs in the face of emerging threats.展开更多
Global crop productivity faces a significant threat from climate change-induced drought stress(DS),which is vital for sustainable agriculture and global food security.Uncovering DS adaptation and tolerance mechanisms ...Global crop productivity faces a significant threat from climate change-induced drought stress(DS),which is vital for sustainable agriculture and global food security.Uncovering DS adaptation and tolerance mechanisms in crops is necessary to alleviate climate challenges.Innovative plant breeding demands revolutionary approaches to develop stress-smart plants.Metabolomics,a promising field in plant breeding,offers a predictive tool to identify metabolic markers associated with plant performance under DS,enabling accelerated crop improvement.Central to DS adaptation is metabolomics-driven metabolic regulation,which is critical for maintaining cell osmotic potential in crops.Recent innovations allow rapid mapping of specific metabolites to their genetic pathways,providing a valuable resource for plant scientists.Metabolomics-driven molecular breeding,integrating techniques such as mQTL and mGWAS,enhances our ability to discover key genetic elements linked to stress-responsive metabolites.This integration offers a beneficial platform for plant scientists,yielding significant insights into the complex metabolic networks underlying DS tolerance.Therefore,this review discusses(1)insights into metabolic regulation for DS adaptation,(2)the multifaceted role of metabolites in DS tolerance and nutritional/yield trait improvement,(3)the potential of single-cell metabolomics and imaging,(4)metabolomics-driven molecular breeding,and(5)the application of metabolic and genetic engineering for DS-tolerant crops.We finally propose that the metabolomics-driven approach positions drought-smart crops as key contributors to future food production,supporting the vital goal of achieving“zero hunger”.展开更多
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ...Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research.展开更多
ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential sec...ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential security risks that need to be carefully evaluated and addressed. In this survey, we provide an overview of the current state of research on security of using ChatGPT, with aspects of bias, disinformation, ethics, misuse,attacks and privacy. We review and discuss the literature on these topics and highlight open research questions and future directions.Through this survey, we aim to contribute to the academic discourse on AI security, enriching the understanding of potential risks and mitigations. We anticipate that this survey will be valuable for various stakeholders involved in AI development and usage, including AI researchers, developers, policy makers, and end-users.展开更多
The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,s...The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,such as Artificial Intelligence(AI)and machine learning,to make accurate decisions.Data science is the science of dealing with data and its relationships through intelligent approaches.Most state-of-the-art research focuses independently on either data science or IIoT,rather than exploring their integration.Therefore,to address the gap,this article provides a comprehensive survey on the advances and integration of data science with the Intelligent IoT(IIoT)system by classifying the existing IoT-based data science techniques and presenting a summary of various characteristics.The paper analyzes the data science or big data security and privacy features,including network architecture,data protection,and continuous monitoring of data,which face challenges in various IoT-based systems.Extensive insights into IoT data security,privacy,and challenges are visualized in the context of data science for IoT.In addition,this study reveals the current opportunities to enhance data science and IoT market development.The current gap and challenges faced in the integration of data science and IoT are comprehensively presented,followed by the future outlook and possible solutions.展开更多
Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating autonomously.This connectivitymakes it possible to harvest vast quantities of data,creating new opportunities f...Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating autonomously.This connectivitymakes it possible to harvest vast quantities of data,creating new opportunities for the emergence of unprecedented knowledge.To ensure IoT securit,various approaches have been implemented,such as authentication,encoding,as well as devices to guarantee data integrity and availability.Among these approaches,Intrusion Detection Systems(IDS)is an actual security solution,whose performance can be enhanced by integrating various algorithms,including Machine Learning(ML)and Deep Learning(DL),enabling proactive and accurate detection of threats.This study proposes to optimize the performance of network IDS using an ensemble learning method based on a voting classification algorithm.By combining the strengths of three powerful algorithms,Random Forest(RF),K-Nearest Neighbors(KNN),and Support Vector Machine(SVM)to detect both normal behavior and different categories of attack.Our analysis focuses primarily on the NSL-KDD dataset,while also integrating the recent Edge-IIoT dataset,tailored to industrial IoT environments.Experimental results show significant enhancements on the Edge-IIoT and NSL-KDD datasets,reaching accuracy levels between 72%to 99%,with precision between 87%and 99%,while recall values and F1-scores are also between 72%and 99%,for both normal and attack detection.Despite the promising results of this study,it suffers from certain limitations,notably the use of specific datasets and the lack of evaluations in a variety of environments.Future work could include applying this model to various datasets and evaluating more advanced ensemble strategies,with the aim of further enhancing the effectiveness of IDS.展开更多
Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniq...Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists.展开更多
This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology.By combining the strengths of blockchain an...This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology.By combining the strengths of blockchain and generative AI,the research team aimed to address the timely challenge of safeguarding visual medical content.The participating researchers conducted a comprehensive analysis,examining the vulnerabilities of medical AI services,personal information protection issues,and overall security weaknesses.This multi faceted exploration led to an indepth evaluation of the model’s performance and security.Notably,the correlation between accuracy,detection rate,and error rate was scrutinized.This analysis revealed insights into the model’s strengths and limitations,while the consideration of standard deviation shed light on the model’s stability and performance variability.The study proposed practical improvements,emphasizing the reduction of false negatives to enhance detection rate and leveraging blockchain technology to ensure visual data integrity in medical applications.Applying blockchain to generative AI-created medical content addresses key personal information protection issues.By utilizing the distributed ledger system of blockchain,the research team aimed to protect the privacy and integrity of medical data especially medical images.This approach not only enhances security but also enables transparent and tamperproof record-keeping.Additionally,the use of generative AI models ensures the creation of novel medical content without compromising personal information,further safeguarding patient privacy.In conclusion,this study showcases the potential of blockchain-based solutions in the medical field,particularly in securing sensitive medical data and protecting patient privacy.The proposed approach,combining blockchain and generative AI,offers a promising direction toward more robust and secure medical content management.Further research and advancements in this area will undoubtedly contribute to the development of robust and privacy-preserving healthcare systems,and visual diagnostic systems.展开更多
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection.Current research emphasizes data security and use...As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection.Current research emphasizes data security and user privacy concerns within smart grids.However,existing methods struggle with efficiency and security when processing large-scale data.Balancing efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent challenge.This paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data modalities.The approach optimizes data preprocessing,integrates Long Short-Term Memory(LSTM)networks for handling time-series data,and employs homomorphic encryption to safeguard user privacy.It also explores the application of Boneh Lynn Shacham(BLS)signatures for user authentication.The proposed scheme’s efficiency,security,and privacy protection capabilities are validated through rigorous security proofs and experimental analysis.展开更多
This study focuses on urgent research on restoring and enhancing carbon storage capacity in the Beibu Gulf Urban Agglomer-ation of China,a key area in the‘Belt and Road’Initiative,which aligns with carbon peaking an...This study focuses on urgent research on restoring and enhancing carbon storage capacity in the Beibu Gulf Urban Agglomer-ation of China,a key area in the‘Belt and Road’Initiative,which aligns with carbon peaking and neutrality goals.This research ana-lyzes the spatial characteristics of carbon metabolism from 2000 to 2020 and uses models to identify stable carbon sink areas,positive carbon flow corridors,and carbon sequestration nodes.The goal is to construct a carbon metabolism spatial security pattern(CMSSP)and propose territorial ecological restoration strategies under different development demand scenarios.The results show the following:1)in 2020,the study area’s carbon sink decreased by 8.29×10^(4) t C/yr compared with that in 2010 and by 10.83×10^(4) t C/yr compared with that in 2000.High-carbon sinks were found mainly in mountainous areas,whereas low-carbon sinks are concentrated in urban con-struction land,rural residential areas,and land margins.2)From 2000 to 2020,the spatial security pattern of carbon metabolism tended to be‘high in the middle of the east and west and low in the gulf.’In 2000,2010,and 2020,16 stable carbon sinks were identified.The carbon energy flow density in Guangxi was greater than that in Guangdong and Hainan,with positive carbon flow corridors located primarily in Guangxi and Guangdong.The number of carbon sequestration nodes remained stable at approximately 15,mainly in Guangxi and Hainan.3)Scenario simulations revealed that under the Nature-based mild restoration scenario,the carbon sink rate will reach 611.85×10^(4) t C/yr by 2030 and increase to 612.45×10^(4) t C/yr by 2060,with stable carbon sinks increasing to 18.In the restora-tion scenario based on Anti-globalization,the carbon sink will decrease from 610.24×10^(4) t C/yr in 2030 to 605.19×10^(4) t C/yr in 2060,with the disappearance of some positive carbon flow corridors and stable carbon sinks.Under the Human-based sustainable restoration scenario,the carbon sink area will decrease from 607.00×10^(4) t C/yr in 2030 to 596.39×10^(4) t C/yr in 2060,with carbon sink areas frag-menting and positive carbon flow corridors becoming less dense.4)On the basis of the current and predicted CMSSPs,this study ex-plores spatial ecological restoration strategies for high-carbon storage areas in bay urban agglomerations at four levels:the land control region,urban agglomeration structure system,carbon sink structure and bay structure control region.展开更多
The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile networks.These networks are sufficiently scaled to interconnect billions of user...The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile networks.These networks are sufficiently scaled to interconnect billions of users and devices.Researchers in academia and industry are focusing on technological advancements to achieve highspeed transmission,cell planning,and latency reduction to facilitate emerging applications such as virtual reality,the metaverse,smart cities,smart health,and autonomous vehicles.NextG continuously improves its network functionality to support these applications.Multiple input multiple output(MIMO)technology offers spectral efficiency,dependability,and overall performance in conjunctionwithNextG.This article proposes a secure channel estimation technique in MIMO topology using a norm-estimation model to provide comprehensive insights into protecting NextG network components against adversarial attacks.The technique aims to create long-lasting and secure NextG networks using this extended approach.The viability of MIMO applications and modern AI-driven methodologies to combat cybersecurity threats are explored in this research.Moreover,the proposed model demonstrates high performance in terms of reliability and accuracy,with a 20%reduction in the MalOut-RealOut-Diff metric compared to existing state-of-the-art techniques.展开更多
This work focuses on maximizing the minimum user’s security energy efficiency(SEE)in an unmanned aerial vehicle-mounted reconfigurable intelligent surface(UAV-RIS)enhanced short-packet communication(SPC)system.The ba...This work focuses on maximizing the minimum user’s security energy efficiency(SEE)in an unmanned aerial vehicle-mounted reconfigurable intelligent surface(UAV-RIS)enhanced short-packet communication(SPC)system.The base station(BS)provides short packet services to ground users using the non-orthogonal multiple access(NOMA)protocol through UAV-RIS,while preventing eavesdropper attacks.To optimize SEE,a joint optimization is performed concerning power allocation,UAV position,decoding order,and RIS phase shifts.An iterative algorithm based on block coordinate descent is proposed for mixed-integer non-convex SEE optimization problem.The original problem is decomposed into three sub-problems,solved alternately using successive convex approximation(SCA),quadratic transformation,penalty function,and semi-definite programming(SDP).Simulation results demonstrate the performance of the UAV-RIS-enhanced short-packet system under different parameters and verify the algorithm’s convergence.Compared to benchmark schemes such as orthogonal multiple access,long packet communication,and sum SEE,the proposed UAV-RIS-enhanced short-packet scheme achieves the higher minimum user’s SEE.展开更多
Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intellig...Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers(ES).However,securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic.Additionally,managing attributes,including addition,deletion,and modification,is a crucial issue in the access control scheme for RES.To address these security concerns,a trust-based ciphertext-policy attribute-based encryption(CP-ABE)device access control scheme is proposed for RES(TB-CP-ABE).This scheme effectivelymanages the distribution and control of encrypted data on the cloud through robust attribute key management.By introducing trust management mechanisms and outsourced decryption technology,the ES system can effectively assess and manage the trust worthiness of terminal devices,ensuring that only trusted devices can participate in data exchange and access sensitive information.Besides,the ES system dynamically evaluates trust scores to set decryption trust thresholds,thereby regulating device data access permissions and enhancing the system’s security.To validate the security of the proposed TB-CP-ABE against chosen plaintext attacks,a comprehensive formal security analysis is conducted using the widely accepted random oraclemodel under the decisional q-Bilinear Diffie-Hellman Exponent(q-BDHE)assumption.Finally,comparative analysis with other schemes demonstrates that the TB-CP-ABE scheme cuts energy/communication costs by 43%,and scaleswell with rising terminals,maintaining average latency below 50ms,ensuring real-time service feasibility.The proposed scheme not only provides newinsights for the secure management of RES but also lays a foundation for future secure energy solutions.展开更多
基金supported by the Shandong Province Science and Technology Project(2023TSGC0509,2022TSGC2234)Qingdao Science and Technology Plan Project(23-1-5-yqpy-2-qy)Open Topic Grants of Anhui Province Key Laboratory of Intelligent Building&Building Energy Saving,Anhui Jianzhu University(IBES2024KF08).
文摘With the rapid development of artificial intelligence,the Internet of Things(IoT)can deploy various machine learning algorithms for network and application management.In the IoT environment,many sensors and devices generatemassive data,but data security and privacy protection have become a serious challenge.Federated learning(FL)can achieve many intelligent IoT applications by training models on local devices and allowing AI training on distributed IoT devices without data sharing.This review aims to deeply explore the combination of FL and the IoT,and analyze the application of federated learning in the IoT from the aspects of security and privacy protection.In this paper,we first describe the potential advantages of FL and the challenges faced by current IoT systems in the fields of network burden and privacy security.Next,we focus on exploring and analyzing the advantages of the combination of FL on the Internet,including privacy security,attack detection,efficient communication of the IoT,and enhanced learning quality.We also list various application scenarios of FL on the IoT.Finally,we propose several open research challenges and possible solutions.
基金funded by the Science and Technology Plan for the Belt and Road Innovation Cooperation Project of Jiangsu Province,China(No.BZ2023003)the National Key Research and Development Program of China(No.2021YFD1500202)+2 种基金the Strategic Priority Research Program of Chinese Academy of Sciences(No.XDA28010100)the“14th Five-Year Plan”Self-Deployment Project of the Institute of Soil Science,Chinese Academy of Sciences(No.ISSAS2418)the National Natural Science Foundation of China(No.42107334)。
文摘Black soils represent only one-sixth of the global arable land area but play an important role in maintaining world food security due to their high fertility and gigantic potential for food production.With the ongoing intensification of agricultural practices and negative natural factors,black soils are confronting enhanced degradation.The holistic overview of black soil degradation and the underlying mechanisms for soil health improvement will be key for agricultural sustainability and food security.In this review,the current status and driving factors of soil degradation in the four major black soil regions of the world are summarized,and effective measures for black soil conservation are proposed.The Northeast Plain of China is the research hotspot with 41.5%of the published studies related to black soil degradation,despite its relatively short history of agricultural reclamation,followed by the East European Plain(28.3%),the Great Plains of North America(20.7%),and the Pampas of South American(7.9%).Among the main types of soil degradation,soil erosion and soil fertility decline(especially organic matter loss)have been reported as the most common problems,with 27.6%and 39.4%of the published studies,respectively.In addition to the natural influences of climate and topography,human activities have been reported to have great influences on the degradation of black soils globally.Unsustainable farming practices and excess in agrochemical applications are common factors reported to accelerate the degradation process and threaten the sustainable use of black soils.Global efforts for black soil conservation and utilization should focus on standardizing evaluation criteria including real-time monitoring and the measures of prevention and restoration for sustainable management.International cooperation in technology and policy is crucial for overcoming the challenges and thus achieving the protection,sustainable use,and management of global black soil resources.
文摘The national grid and other life-sustaining critical infrastructures face an unprecedented threat from prolonged blackouts,which could last over a year and pose a severe risk to national security.Whether caused by physical attacks,EMP(electromagnetic pulse)events,or cyberattacks,such disruptions could cripple essential services like water supply,healthcare,communication,and transportation.Research indicates that an attack on just nine key substations could result in a coast-to-coast blackout lasting up to 18 months,leading to economic collapse,civil unrest,and a breakdown of public order.This paper explores the key vulnerabilities of the grid,the potential impacts of prolonged blackouts,and the role of AI(artificial intelligence)and ML(machine learning)in mitigating these threats.AI-driven cybersecurity measures,predictive maintenance,automated threat response,and EMP resilience strategies are discussed as essential solutions to bolster grid security.Policy recommendations emphasize the need for hardened infrastructure,enhanced cybersecurity,redundant power systems,and AI-based grid management to ensure national resilience.Without proactive measures,the nation remains exposed to a catastrophic power grid failure that could have dire consequences for society and the economy.
基金funded by the Office of Gas and Electricity Markets(Ofgem)and supported by De Montfort University(DMU)and Nottingham Trent University(NTU),UK.
文摘This paper introduces the Integrated Security Embedded Resilience Architecture (ISERA) as an advanced resilience mechanism for Industrial Control Systems (ICS) and Operational Technology (OT) environments. The ISERA framework integrates security by design principles, micro-segmentation, and Island Mode Operation (IMO) to enhance cyber resilience and ensure continuous, secure operations. The methodology deploys a Forward-Thinking Architecture Strategy (FTAS) algorithm, which utilises an industrial Intrusion Detection System (IDS) implemented with Python’s Network Intrusion Detection System (NIDS) library. The FTAS algorithm successfully identified and responded to cyber-attacks, ensuring minimal system disruption. ISERA has been validated through comprehensive testing scenarios simulating Denial of Service (DoS) attacks and malware intrusions, at both the IT and OT layers where it successfully mitigates the impact of malicious activity. Results demonstrate ISERA’s efficacy in real-time threat detection, containment, and incident response, thus ensuring the integrity and reliability of critical infrastructure systems. ISERA’s decentralised approach contributes to global net zero goals by optimising resource use and minimising environmental impact. By adopting a decentralised control architecture and leveraging virtualisation, ISERA significantly enhances the cyber resilience and sustainability of critical infrastructure systems. This approach not only strengthens defences against evolving cyber threats but also optimises resource allocation, reducing the system’s carbon footprint. As a result, ISERA ensures the uninterrupted operation of essential services while contributing to broader net zero goals.
文摘The accelerated advancement of the Internet of Things(IoT)has generated substantial data,including sensitive and private information.Consequently,it is imperative to guarantee the security of data sharing.While facilitating fine-grained access control,Ciphertext Policy Attribute-Based Encryption(CP-ABE)can effectively ensure the confidentiality of shared data.Nevertheless,the conventional centralized CP-ABE scheme is plagued by the issues of keymisuse,key escrow,and large computation,which will result in security risks.This paper suggests a lightweight IoT data security sharing scheme that integrates blockchain technology and CP-ABE to address the abovementioned issues.The integrity and traceability of shared data are guaranteed by the use of blockchain technology to store and verify access transactions.The encryption and decryption operations of the CP-ABE algorithm have been implemented using elliptic curve scalarmultiplication to accommodate lightweight IoT devices,as opposed to themore arithmetic bilinear pairing found in the traditional CP-ABE algorithm.Additionally,a portion of the computation is delegated to the edge nodes to alleviate the computational burden on users.A distributed key management method is proposed to address the issues of key escrow andmisuse.Thismethod employs the edge blockchain to facilitate the storage and distribution of attribute private keys.Meanwhile,data security sharing is enhanced by combining off-chain and on-chain ciphertext storage.The security and performance analysis indicates that the proposed scheme is more efficient and secure.
文摘Land use transformations in Sonipat District,Haryana,driven by urbanization,industrialization,and land acquisitions,have posed significant ecological and socio-economic challenges,particularly concerning food security.This study investigates the interplay between these land use changes and their environmental implications at macro(district)and micro(village)levels,focusing on agricultural productivity and resource sustainability.The study employs a mixed-method approach,integrating secondary data from official datasets and primary data gathered through structured household surveys,focus group discussions,and visual analysis techniques.Data from 20 villages,selected based on predominant land use characteristics,were analysed using statistical and geospatial tools,including ArcGIS and STATA,to quantify food grain losses and evaluate environmental degradation.Findings of this study reveal a 19%reduction in agricultural land over two decades(2000-2024),correlating with increased residential and industrial areas.Groundwater resources face severe overexploitation,with pollution from industrial clusters further degrading water and soil quality.The study estimates a total food grain loss of 1.5 million kilograms across surveyed villages due to land acquisitions.A strong positive correlation(R^(2)=0.98)between land acquisition and food loss underscores the direct impact of urbanization on agricultural output.The research underscores the urgency of sustainable land management practices,including preserving agricultural lands,optimizing groundwater usage,and enhancing community involvement in planning.By addressing these challenges,the study advocates for balanced urban expansion and food security to ensure ecological and economic resilience in the region.
基金supported by the National Key R&D Program of China under Grant No.2022YFB3103500the National Natural Science Foundation of China under Grants No.62402087 and No.62020106013+3 种基金the Sichuan Science and Technology Program under Grant No.2023ZYD0142the Chengdu Science and Technology Program under Grant No.2023-XT00-00002-GXthe Fundamental Research Funds for Chinese Central Universities under Grants No.ZYGX2020ZB027 and No.Y030232063003002the Postdoctoral Innovation Talents Support Program under Grant No.BX20230060.
文摘The integration of artificial intelligence(AI)technology,particularly large language models(LLMs),has become essential across various sectors due to their advanced language comprehension and generation capabilities.Despite their transformative impact in fields such as machine translation and intelligent dialogue systems,LLMs face significant challenges.These challenges include safety,security,and privacy concerns that undermine their trustworthiness and effectiveness,such as hallucinations,backdoor attacks,and privacy leakage.Previous works often conflated safety issues with security concerns.In contrast,our study provides clearer and more reasonable definitions for safety,security,and privacy within the context of LLMs.Building on these definitions,we provide a comprehensive overview of the vulnerabilities and defense mechanisms related to safety,security,and privacy in LLMs.Additionally,we explore the unique research challenges posed by LLMs and suggest potential avenues for future research,aiming to enhance the robustness and reliability of LLMs in the face of emerging threats.
基金supported by Chinese National Key R&DProject for Synthetic Biology(2018YFA0902500)National Natural Science Foundation of China(32273118)+3 种基金The Guangdong Key R&D Project(2022B1111070005)Shenzhen Special Fund for Sustainable Development(KCXFZ20211020164013021)Shenzhen University 2035 Program for Excellent Research(2022B010)supported by a startup grant from the Food Futures Institute of Murdoch University,Australia.
文摘Global crop productivity faces a significant threat from climate change-induced drought stress(DS),which is vital for sustainable agriculture and global food security.Uncovering DS adaptation and tolerance mechanisms in crops is necessary to alleviate climate challenges.Innovative plant breeding demands revolutionary approaches to develop stress-smart plants.Metabolomics,a promising field in plant breeding,offers a predictive tool to identify metabolic markers associated with plant performance under DS,enabling accelerated crop improvement.Central to DS adaptation is metabolomics-driven metabolic regulation,which is critical for maintaining cell osmotic potential in crops.Recent innovations allow rapid mapping of specific metabolites to their genetic pathways,providing a valuable resource for plant scientists.Metabolomics-driven molecular breeding,integrating techniques such as mQTL and mGWAS,enhances our ability to discover key genetic elements linked to stress-responsive metabolites.This integration offers a beneficial platform for plant scientists,yielding significant insights into the complex metabolic networks underlying DS tolerance.Therefore,this review discusses(1)insights into metabolic regulation for DS adaptation,(2)the multifaceted role of metabolites in DS tolerance and nutritional/yield trait improvement,(3)the potential of single-cell metabolomics and imaging,(4)metabolomics-driven molecular breeding,and(5)the application of metabolic and genetic engineering for DS-tolerant crops.We finally propose that the metabolomics-driven approach positions drought-smart crops as key contributors to future food production,supporting the vital goal of achieving“zero hunger”.
文摘Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research.
文摘ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential security risks that need to be carefully evaluated and addressed. In this survey, we provide an overview of the current state of research on security of using ChatGPT, with aspects of bias, disinformation, ethics, misuse,attacks and privacy. We review and discuss the literature on these topics and highlight open research questions and future directions.Through this survey, we aim to contribute to the academic discourse on AI security, enriching the understanding of potential risks and mitigations. We anticipate that this survey will be valuable for various stakeholders involved in AI development and usage, including AI researchers, developers, policy makers, and end-users.
基金supported in part by the National Natural Science Foundation of China under Grant 62371181in part by the Changzhou Science and Technology International Cooperation Program under Grant CZ20230029+1 种基金supported by a National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(2021R1A2B5B02087169)supported under the framework of international cooperation program managed by the National Research Foundation of Korea(2022K2A9A1A01098051)。
文摘The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,such as Artificial Intelligence(AI)and machine learning,to make accurate decisions.Data science is the science of dealing with data and its relationships through intelligent approaches.Most state-of-the-art research focuses independently on either data science or IIoT,rather than exploring their integration.Therefore,to address the gap,this article provides a comprehensive survey on the advances and integration of data science with the Intelligent IoT(IIoT)system by classifying the existing IoT-based data science techniques and presenting a summary of various characteristics.The paper analyzes the data science or big data security and privacy features,including network architecture,data protection,and continuous monitoring of data,which face challenges in various IoT-based systems.Extensive insights into IoT data security,privacy,and challenges are visualized in the context of data science for IoT.In addition,this study reveals the current opportunities to enhance data science and IoT market development.The current gap and challenges faced in the integration of data science and IoT are comprehensively presented,followed by the future outlook and possible solutions.
文摘Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating autonomously.This connectivitymakes it possible to harvest vast quantities of data,creating new opportunities for the emergence of unprecedented knowledge.To ensure IoT securit,various approaches have been implemented,such as authentication,encoding,as well as devices to guarantee data integrity and availability.Among these approaches,Intrusion Detection Systems(IDS)is an actual security solution,whose performance can be enhanced by integrating various algorithms,including Machine Learning(ML)and Deep Learning(DL),enabling proactive and accurate detection of threats.This study proposes to optimize the performance of network IDS using an ensemble learning method based on a voting classification algorithm.By combining the strengths of three powerful algorithms,Random Forest(RF),K-Nearest Neighbors(KNN),and Support Vector Machine(SVM)to detect both normal behavior and different categories of attack.Our analysis focuses primarily on the NSL-KDD dataset,while also integrating the recent Edge-IIoT dataset,tailored to industrial IoT environments.Experimental results show significant enhancements on the Edge-IIoT and NSL-KDD datasets,reaching accuracy levels between 72%to 99%,with precision between 87%and 99%,while recall values and F1-scores are also between 72%and 99%,for both normal and attack detection.Despite the promising results of this study,it suffers from certain limitations,notably the use of specific datasets and the lack of evaluations in a variety of environments.Future work could include applying this model to various datasets and evaluating more advanced ensemble strategies,with the aim of further enhancing the effectiveness of IDS.
文摘Software-related security aspects are a growing and legitimate concern,especially with 5G data available just at our palms.To conduct research in this field,periodic comparative analysis is needed with the new techniques coming up rapidly.The purpose of this study is to review the recent developments in the field of security integration in the software development lifecycle(SDLC)by analyzing the articles published in the last two decades and to propose a way forward.This review follows Kitchenham’s review protocol.The review has been divided into three main stages including planning,execution,and analysis.From the selected 100 articles,it becomes evident that need of a collaborative approach is necessary for addressing critical software security risks(CSSRs)through effective risk management/estimation techniques.Quantifying risks using a numeric scale enables a comprehensive understanding of their severity,facilitating focused resource allocation and mitigation efforts.Through a comprehensive understanding of potential vulnerabilities and proactive mitigation efforts facilitated by protection poker,organizations can prioritize resources effectively to ensure the successful outcome of projects and initiatives in today’s dynamic threat landscape.The review reveals that threat analysis and security testing are needed to develop automated tools for the future.Accurate estimation of effort required to prioritize potential security risks is a big challenge in software security.The accuracy of effort estimation can be further improved by exploring new techniques,particularly those involving deep learning.It is also imperative to validate these effort estimation methods to ensure all potential security threats are addressed.Another challenge is selecting the right model for each specific security threat.To achieve a comprehensive evaluation,researchers should use well-known benchmark checklists.
文摘This study presents an innovative approach to enhancing the security of visual medical data in the generative AI environment through the integration of blockchain technology.By combining the strengths of blockchain and generative AI,the research team aimed to address the timely challenge of safeguarding visual medical content.The participating researchers conducted a comprehensive analysis,examining the vulnerabilities of medical AI services,personal information protection issues,and overall security weaknesses.This multi faceted exploration led to an indepth evaluation of the model’s performance and security.Notably,the correlation between accuracy,detection rate,and error rate was scrutinized.This analysis revealed insights into the model’s strengths and limitations,while the consideration of standard deviation shed light on the model’s stability and performance variability.The study proposed practical improvements,emphasizing the reduction of false negatives to enhance detection rate and leveraging blockchain technology to ensure visual data integrity in medical applications.Applying blockchain to generative AI-created medical content addresses key personal information protection issues.By utilizing the distributed ledger system of blockchain,the research team aimed to protect the privacy and integrity of medical data especially medical images.This approach not only enhances security but also enables transparent and tamperproof record-keeping.Additionally,the use of generative AI models ensures the creation of novel medical content without compromising personal information,further safeguarding patient privacy.In conclusion,this study showcases the potential of blockchain-based solutions in the medical field,particularly in securing sensitive medical data and protecting patient privacy.The proposed approach,combining blockchain and generative AI,offers a promising direction toward more robust and secure medical content management.Further research and advancements in this area will undoubtedly contribute to the development of robust and privacy-preserving healthcare systems,and visual diagnostic systems.
基金supported by the National Key R&D Program of China(No.2023YFB2703700)the National Natural Science Foundation of China(Nos.U21A20465,62302457,62402444,62172292)+4 种基金the Fundamental Research Funds of Zhejiang Sci-Tech University(Nos.23222092-Y,22222266-Y)the Program for Leading Innovative Research Team of Zhejiang Province(No.2023R01001)the Zhejiang Provincial Natural Science Foundation of China(Nos.LQ24F020008,LQ24F020012)the Foundation of State Key Laboratory of Public Big Data(No.[2022]417)the“Pioneer”and“Leading Goose”R&D Program of Zhejiang(No.2023C01119).
文摘As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection.Current research emphasizes data security and user privacy concerns within smart grids.However,existing methods struggle with efficiency and security when processing large-scale data.Balancing efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent challenge.This paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data modalities.The approach optimizes data preprocessing,integrates Long Short-Term Memory(LSTM)networks for handling time-series data,and employs homomorphic encryption to safeguard user privacy.It also explores the application of Boneh Lynn Shacham(BLS)signatures for user authentication.The proposed scheme’s efficiency,security,and privacy protection capabilities are validated through rigorous security proofs and experimental analysis.
基金Under the auspices of the National Natural Science Foundation of China(No.52268008)。
文摘This study focuses on urgent research on restoring and enhancing carbon storage capacity in the Beibu Gulf Urban Agglomer-ation of China,a key area in the‘Belt and Road’Initiative,which aligns with carbon peaking and neutrality goals.This research ana-lyzes the spatial characteristics of carbon metabolism from 2000 to 2020 and uses models to identify stable carbon sink areas,positive carbon flow corridors,and carbon sequestration nodes.The goal is to construct a carbon metabolism spatial security pattern(CMSSP)and propose territorial ecological restoration strategies under different development demand scenarios.The results show the following:1)in 2020,the study area’s carbon sink decreased by 8.29×10^(4) t C/yr compared with that in 2010 and by 10.83×10^(4) t C/yr compared with that in 2000.High-carbon sinks were found mainly in mountainous areas,whereas low-carbon sinks are concentrated in urban con-struction land,rural residential areas,and land margins.2)From 2000 to 2020,the spatial security pattern of carbon metabolism tended to be‘high in the middle of the east and west and low in the gulf.’In 2000,2010,and 2020,16 stable carbon sinks were identified.The carbon energy flow density in Guangxi was greater than that in Guangdong and Hainan,with positive carbon flow corridors located primarily in Guangxi and Guangdong.The number of carbon sequestration nodes remained stable at approximately 15,mainly in Guangxi and Hainan.3)Scenario simulations revealed that under the Nature-based mild restoration scenario,the carbon sink rate will reach 611.85×10^(4) t C/yr by 2030 and increase to 612.45×10^(4) t C/yr by 2060,with stable carbon sinks increasing to 18.In the restora-tion scenario based on Anti-globalization,the carbon sink will decrease from 610.24×10^(4) t C/yr in 2030 to 605.19×10^(4) t C/yr in 2060,with the disappearance of some positive carbon flow corridors and stable carbon sinks.Under the Human-based sustainable restoration scenario,the carbon sink area will decrease from 607.00×10^(4) t C/yr in 2030 to 596.39×10^(4) t C/yr in 2060,with carbon sink areas frag-menting and positive carbon flow corridors becoming less dense.4)On the basis of the current and predicted CMSSPs,this study ex-plores spatial ecological restoration strategies for high-carbon storage areas in bay urban agglomerations at four levels:the land control region,urban agglomeration structure system,carbon sink structure and bay structure control region.
基金funding from King Saud University through Researchers Supporting Project number(RSP2024R387),King Saud University,Riyadh,Saudi Arabia.
文摘The emergence of next generation networks(NextG),including 5G and beyond,is reshaping the technological landscape of cellular and mobile networks.These networks are sufficiently scaled to interconnect billions of users and devices.Researchers in academia and industry are focusing on technological advancements to achieve highspeed transmission,cell planning,and latency reduction to facilitate emerging applications such as virtual reality,the metaverse,smart cities,smart health,and autonomous vehicles.NextG continuously improves its network functionality to support these applications.Multiple input multiple output(MIMO)technology offers spectral efficiency,dependability,and overall performance in conjunctionwithNextG.This article proposes a secure channel estimation technique in MIMO topology using a norm-estimation model to provide comprehensive insights into protecting NextG network components against adversarial attacks.The technique aims to create long-lasting and secure NextG networks using this extended approach.The viability of MIMO applications and modern AI-driven methodologies to combat cybersecurity threats are explored in this research.Moreover,the proposed model demonstrates high performance in terms of reliability and accuracy,with a 20%reduction in the MalOut-RealOut-Diff metric compared to existing state-of-the-art techniques.
基金co-supported by the National Natural Science Foundation of China(Nos.U23A20279,62271094)the National Key R&D Program of China(No.SQ2023YFB2500024)+2 种基金the Science Foundation for Youths of Natural Science Foundation of Sichuan Provincial,China(No.2022NSFSC0936)the China Postdoctoral Science Foundation(No.2022M720666)the Open Fund of Key Laboratory of Big Data Intelligent Computing,Chongqing University of Posts and Telecommunications,China(No.BDIC-2023-B-002).
文摘This work focuses on maximizing the minimum user’s security energy efficiency(SEE)in an unmanned aerial vehicle-mounted reconfigurable intelligent surface(UAV-RIS)enhanced short-packet communication(SPC)system.The base station(BS)provides short packet services to ground users using the non-orthogonal multiple access(NOMA)protocol through UAV-RIS,while preventing eavesdropper attacks.To optimize SEE,a joint optimization is performed concerning power allocation,UAV position,decoding order,and RIS phase shifts.An iterative algorithm based on block coordinate descent is proposed for mixed-integer non-convex SEE optimization problem.The original problem is decomposed into three sub-problems,solved alternately using successive convex approximation(SCA),quadratic transformation,penalty function,and semi-definite programming(SDP).Simulation results demonstrate the performance of the UAV-RIS-enhanced short-packet system under different parameters and verify the algorithm’s convergence.Compared to benchmark schemes such as orthogonal multiple access,long packet communication,and sum SEE,the proposed UAV-RIS-enhanced short-packet scheme achieves the higher minimum user’s SEE.
基金supported by the Science and Technology Project of the State Grid Corporation of China,Grant number 5700-202223189A-1-1-ZN.
文摘Renewable Energy Systems(RES)provide a sustainable solution to climate warming and environmental pollution by enhancing stability and reliability through status acquisition and analysis on cloud platforms and intelligent processing on edge servers(ES).However,securely distributing encrypted data stored in the cloud to terminals that meet decryption requirements has become a prominent research topic.Additionally,managing attributes,including addition,deletion,and modification,is a crucial issue in the access control scheme for RES.To address these security concerns,a trust-based ciphertext-policy attribute-based encryption(CP-ABE)device access control scheme is proposed for RES(TB-CP-ABE).This scheme effectivelymanages the distribution and control of encrypted data on the cloud through robust attribute key management.By introducing trust management mechanisms and outsourced decryption technology,the ES system can effectively assess and manage the trust worthiness of terminal devices,ensuring that only trusted devices can participate in data exchange and access sensitive information.Besides,the ES system dynamically evaluates trust scores to set decryption trust thresholds,thereby regulating device data access permissions and enhancing the system’s security.To validate the security of the proposed TB-CP-ABE against chosen plaintext attacks,a comprehensive formal security analysis is conducted using the widely accepted random oraclemodel under the decisional q-Bilinear Diffie-Hellman Exponent(q-BDHE)assumption.Finally,comparative analysis with other schemes demonstrates that the TB-CP-ABE scheme cuts energy/communication costs by 43%,and scaleswell with rising terminals,maintaining average latency below 50ms,ensuring real-time service feasibility.The proposed scheme not only provides newinsights for the secure management of RES but also lays a foundation for future secure energy solutions.