Blockchain technology has a unique ability to automate accounting processes that are a part of regulatory requirements in all commercial enterprises.Moreover,it can hold verified accounting records and eliminate the n...Blockchain technology has a unique ability to automate accounting processes that are a part of regulatory requirements in all commercial enterprises.Moreover,it can hold verified accounting records and eliminate the need for a trusted third party.Despite blockchain’s potential to transform the nature of traditional accountancy procedures,adoption by the accounting industry is somewhat limited.Knowledge in this domain is lacking,and research on the antecedents influencing the adoption of blockchainbased accounting systems is scarce.This study is rooted in the technology-organization-environment(TOE)framework,presenting a trust-centric adoption model based on diligent analysis of blockchain and technology adoption literature.The model proposes that TOE factors mediate trust’s role in adopting blockchain for accounting applications.The model was validated based on qualitative semi-structured interviews of twelve industry leaders and was comprehensively tested using a quantitative surveybased methodology with accounting professionals knowledgeable about blockchain technology.The data collected was analyzed using PLS-SEM.The results demonstrate the role of trust and the mediating effect of the theorized TOE variables on adopting blockchain-based accounting solutions.The results’implications for research and practice are discussed.展开更多
By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined publi...By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided.展开更多
The year 2025 marks both the 25th anniversary of the Forum on China-Africa Cooperation(FOCAC)and the first year of implementation of the outcomes of the 2024 FOCAC Beijing Summit.Throughout the year,China has supporte...The year 2025 marks both the 25th anniversary of the Forum on China-Africa Cooperation(FOCAC)and the first year of implementation of the outcomes of the 2024 FOCAC Beijing Summit.Throughout the year,China has supported Africa in addressing historical injustices at diplomatic and political levels and firmly backed South Africa in hosting the G20 Leaders’Summit,further deepening China-Africa strategic mutual trust.展开更多
With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Further...With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Furthermore,given the open environment and a multitude of devices,enhancing the security of ICPS is an urgent concern.To address these issues,this paper proposes a novel trusted virtual network embedding(T-VNE)approach for ICPS based combining blockchain and edge computing technologies.Additionally,the proposed algorithm leverages a deep reinforcement learning(DRL)model to optimize decision-making processes.It employs the policygradient-based agent to compute candidate embedding nodes and utilizes a breadth-first search(BFS)algorithm to determine the optimal embedding paths.Finally,through simulation experiments,the efficacy of the proposed method was validated,demonstrating outstanding performance in terms of security,revenue generation,and virtual network request(VNR)acceptance rate.展开更多
This mixed-methods study investigated how AI-enhanced English as a Foreign Language(EFL)learning environments influence students’psychological well-being through the mediating roles of motivation and language learnin...This mixed-methods study investigated how AI-enhanced English as a Foreign Language(EFL)learning environments influence students’psychological well-being through the mediating roles of motivation and language learning anxiety and the moderating role of trust.Participants were Chinese university students(N=310,62%female,mean age=18.9,SD=0.8),of whom 15 completed interviews to both add to and to clarify the evidence from the surveys.Structural equation modeling results revealed that AI use had significant indirect effects on well-being through increased motivation and reduced language learning anxiety.Trust in AI significantly moderated both paths,amplifying the motivational benefits and anxiety reduction associated with AI use.Thematic analysis supported these results,identifying three experiential themes:(1)motivational empowerment through personalization,(2)anxiety regulation through safe practice and feedback,and(3)trust as the emotional bridge between AI and well-being.The study extends AI psychology applications by empirically linking technology engagement with affective outcomes and underscores the need for human-centered and trust-enhancing design in AI-supported education.From these findings,we conclude that adaptive,transparent,and autonomy-supportive AI systems promote self-determined motivation,emotional safety,and overall psychological health among EFL learners.展开更多
This paper examines Hernán Díaz’s novel Trust (2022) through the lens of cultural deconstruction, analyzing how its four nested narratives systematically dismantle the American Dream ideology. The novel Bon...This paper examines Hernán Díaz’s novel Trust (2022) through the lens of cultural deconstruction, analyzing how its four nested narratives systematically dismantle the American Dream ideology. The novel Bonds and autobiography My Life collaboratively construct a financial myth portraying protagonist Andrew Bevel as an exemplar of self-made success. Subsequently, Ida’s Memoir exposes the subjective construction of history, declaring the American Dream’s bankruptcy at the epistemological level, while Mildred’s diary Futures deconstructs the myth from within by revealing that Bevel’s financial genius was built upon appropriation of his wife’s intellectual labor. This paper argues that Trust reveals the American Dream as an ideological illusion-narratively constructed, practically dependent on structural injustice, and essentially serving power reproduction.展开更多
With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT termi...With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT terminals have security risks and vulnerabilities,and limited resources make it impossible to deploy costly security protection methods on the terminal.In order to cope with these problems,this paper proposes a lightweight trust evaluation model TCL,which combines three network models,TCN,CNN,and LSTM,with stronger feature extraction capability and can score the reliability of the device by periodically analyzing the traffic behavior and activity logs generated by the terminal device,and the trust evaluation of the terminal’s continuous behavior can be achieved by combining the scores of different periods.After experiments,it is proved that TCL can effectively use the traffic behaviors and activity logs of terminal devices for trust evaluation and achieves F1-score of 95.763,94.456,99.923,and 99.195 on HDFS,BGL,N-BaIoT,and KDD99 datasets,respectively,and the size of TCL is only 91KB,which can achieve similar or better performance than CNN-LSTM,RobustLog and other methods with less computational resources and storage space.展开更多
To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply rel...To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply relationships in the automotive market,improving data sharing and interactions across various platforms,and achieving more detailed integration of data and operations.We propose a trust evaluation permission delegation method based on the automotive industry chain.The proposed method combines smart contracts with trust evaluation mechanisms,dynamically calculating the trust value of users based on the historical behavior of the delegated entity,network environment,and other factors to avoid malicious node attacks during the permission delegation process.We also introduce strict control over the cross-domain permission granting and revocation mechanisms to manage the delegation path,prevent information leakage caused by malicious node interception,and effectively protect data integrity and privacy.Experimental analysis shows that this method meets the realtime requirements of collaborative interaction in the automotive industry chain and provides a feasible solution to permission delegation issues in the automotive industry chain,offering dynamic flexibility in authorization and scalability compared to most existing solutions.展开更多
Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,com...Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,communicating in a distributed dynamic environment,face several security challenges,with trust being one of the most important issues in inter-domain routing.Existing research,which performs trust evaluation when exchanging routing information to suppress malicious routing behavior,cannot meet the scalability requirements of BGP nodes.In this paper,we propose a blockchain-based trust model for inter-domain routing.Our model achieves scalability by allowing the master node of an AS alliance to transmit the trust evaluation data of its member nodes to the blockchain.The BGP nodes can expedite the trust evaluation process by accessing a global view of other BGP nodes through the master node of their respective alliance.We incorporate security service evaluation before direct evaluation and indirect recommendations to assess the security services that BGP nodes provide for themselves and prioritize to guarantee their security of routing service.We forward the trust evaluation for neighbor discovery and prioritize the nodes with high trust as neighbor nodes to reduce the malicious exchange routing behavior.We use simulation software to simulate a real BGP environments and employ a comparative experimental research approach to demonstrate the performance evaluation of our trust model.Compared with the classical trust model,our trust model not only saves more storage overhead,but also provides higher security,especially reducing the impact of collusion attacks.展开更多
GS1 is an international standards organization,which focuses on product identification and product data,helping businesses and governments to improve commerce and supply chain.Why trusted data is essential to high-qua...GS1 is an international standards organization,which focuses on product identification and product data,helping businesses and governments to improve commerce and supply chain.Why trusted data is essential to high-quality development?More than 50 years ago,GS1 was initiated with the bar code,a profound transformation of the way we work and live.From then on,a simple scan connected a physical product to its digital identity.It transformed commerce,improving supply chains and enabling safer healthcare.Collaboration between industry and governments,and a strong partnership with ISO and IEC laid the foundations for the global adoption of a common product identification over the past 50 years and all around the world.展开更多
Today,I want to share how international standards can forge trust and fuel innovation,laying the foundation for a future where AI benefits everyone,everywhere.First,AI standards,developed jointly by ISO and IEC-the In...Today,I want to share how international standards can forge trust and fuel innovation,laying the foundation for a future where AI benefits everyone,everywhere.First,AI standards,developed jointly by ISO and IEC-the International Electrotechnical Commission-help build global trust and enable responsible innovation by bringing clarity and coherence to an ever-changing AI landscape.As developments in AI continue to emerge at speed,regulation is struggling to keep up and the proliferation of competing standards has created confusion rather than clarity.ISO and our partner IEC are addressing this challenge through the work of our expert committee on AI,SC 42,which takes a holistic,cohesive approach to AI standardization.展开更多
Nowadays,we are witnessing the tremendous changes brought by AI technologies.What role can standards play in this process?How can we build global trust and enable responsible innovation?
With the introduction of 5G,users and devices can access the industrial network from anywhere in the world.Therefore,traditional perimeter-based security technologies for industrial networks can no longer work well.To...With the introduction of 5G,users and devices can access the industrial network from anywhere in the world.Therefore,traditional perimeter-based security technologies for industrial networks can no longer work well.To solve this problem,a new security model called Zero Trust(ZT)is desired,which believes in“never trust and always verify”.Every time the asset in the industrial network is accessed,the subject is authenticated and its trustworthiness is assessed.In this way,the asset in industrial network can be well protected,whether the subject is in the internal network or the external network.However,in order to construct the zero trust model in the 5G Industrial Internet collaboration system,there are still many problems to be solved.In this paper,we first introduce the security issues in the 5G Industrial Internet collaboration system,and illustrate the zero trust architecture.Then,we analyze the gap between existing security techniques and the zero trust architecture.Finally,we discuss several potential security techniques that can be used to implement the zero trust model.The purpose of this paper is to point out the further direction for the realization of the Zero Trust Architecture(ZTA)in the 5G Industrial Internet collaboration system.展开更多
In the complex environment of Wireless Sensor Networks(WSNs),various malicious attacks have emerged,among which internal attacks pose particularly severe security risks.These attacks seriously threaten network stabili...In the complex environment of Wireless Sensor Networks(WSNs),various malicious attacks have emerged,among which internal attacks pose particularly severe security risks.These attacks seriously threaten network stability,data transmission reliability,and overall performance.To effectively address this issue and significantly improve intrusion detection speed,accuracy,and resistance to malicious attacks,this research designs a Three-level Intrusion Detection Model based on Dynamic Trust Evaluation(TIDM-DTE).This study conducts a detailed analysis of how different attack types impact node trust and establishes node models for data trust,communication trust,and energy consumption trust by focusing on characteristics such as continuous packet loss and energy consumption changes.By dynamically predicting node trust values using the grey Markov model,the model accurately and sensitively reflects changes in node trust levels during attacks.Additionally,DBSCAN(Density-Based Spatial Clustering of Applications with Noise)data noise monitoring technology is employed to quickly identify attacked nodes,while a trust recovery mechanism restores the trust of temporarily faulty nodes to reduce False Alarm Rate.Simulation results demonstrate that TIDM-DTE achieves high detection rates,fast detection speed,and low False Alarm Rate when identifying various network attacks,including selective forwarding attacks,Sybil attacks,switch attacks,and black hole attacks.TIDM-DTE significantly enhances network security,ensures secure and reliable data transmission,moderately improves network energy efficiency,reduces unnecessary energy consumption,and provides strong support for the stable operation of WSNs.Meanwhile,the research findings offer new ideas and methods for WSN security protection,possessing important theoretical significance and practical application value.展开更多
True friendship is like a strong tree-its roots grow deep through trust,loyalty and care.Unlike casual acquaintances(泛泛之交),real friends stay by your side through life's storms and sunshine.A genuine friendship...True friendship is like a strong tree-its roots grow deep through trust,loyalty and care.Unlike casual acquaintances(泛泛之交),real friends stay by your side through life's storms and sunshine.A genuine friendship begins with honesty.Friends who truly care about you will tell you the truth kindly,even when it's hard.For example,if you make a mistake,a real friend won't laugh but will help you learn.They create a safe space where you can share fears or dreams without judgment-this is called emotional safety.展开更多
Measuring the impact of AI systems The recent 2025 AI Index Report from Stanford University revealed that skepticism about the ethical conduct of AI companies is growing,and trust in fairness is shrinking.There is als...Measuring the impact of AI systems The recent 2025 AI Index Report from Stanford University revealed that skepticism about the ethical conduct of AI companies is growing,and trust in fairness is shrinking.There is also less confidence that personal data will be protected and fewer people believe AI systems are unbiased and free of discrimination.Trust and transparency are essential for AI to deliver on its promises in a safe and responsible way.Governments are stepping up with new AI-related regulations,and international standards such as ISO/IEC 42001 have been developed to support them,but a lot more needs to be done to reduce potential risks and address societal concerns.展开更多
文摘Blockchain technology has a unique ability to automate accounting processes that are a part of regulatory requirements in all commercial enterprises.Moreover,it can hold verified accounting records and eliminate the need for a trusted third party.Despite blockchain’s potential to transform the nature of traditional accountancy procedures,adoption by the accounting industry is somewhat limited.Knowledge in this domain is lacking,and research on the antecedents influencing the adoption of blockchainbased accounting systems is scarce.This study is rooted in the technology-organization-environment(TOE)framework,presenting a trust-centric adoption model based on diligent analysis of blockchain and technology adoption literature.The model proposes that TOE factors mediate trust’s role in adopting blockchain for accounting applications.The model was validated based on qualitative semi-structured interviews of twelve industry leaders and was comprehensively tested using a quantitative surveybased methodology with accounting professionals knowledgeable about blockchain technology.The data collected was analyzed using PLS-SEM.The results demonstrate the role of trust and the mediating effect of the theorized TOE variables on adopting blockchain-based accounting solutions.The results’implications for research and practice are discussed.
基金supported by the 863 Program under Grant No. 2008AA04A107
文摘By analyzing existed Internet of Things' system security vulnerabilities, a security architecture on trusting one is constructed. In the infrastructure, an off-line identity authentication based on the combined public key (CPK) mechanism is proposed, which solves the problems about a mass amount of authentications and the cross-domain authentication by integrating nodes' validity of identity authentication and uniqueness of identification. Moreover, the proposal of constructing nodes' authentic identification, valid authentication and credible communication connection at the application layer through the perception layer impels the formation of trust chain and relationship among perceptional nodes. Consequently, a trusting environment of the Internet of Things is built, by which a guidance of designing the trusted one would be provided.
文摘The year 2025 marks both the 25th anniversary of the Forum on China-Africa Cooperation(FOCAC)and the first year of implementation of the outcomes of the 2024 FOCAC Beijing Summit.Throughout the year,China has supported Africa in addressing historical injustices at diplomatic and political levels and firmly backed South Africa in hosting the G20 Leaders’Summit,further deepening China-Africa strategic mutual trust.
基金supported by the National Natural Science Foundation of China under Grant 62471493supported by the Natural Science Foundation of Shandong Province under Grant ZR2023LZH017,ZR2024MF066。
文摘With the rapid development of intelligent cyber-physical systems(ICPS),diverse services with varying Quality of Service(QoS)requirements have brought great challenges to traditional network resource allocation.Furthermore,given the open environment and a multitude of devices,enhancing the security of ICPS is an urgent concern.To address these issues,this paper proposes a novel trusted virtual network embedding(T-VNE)approach for ICPS based combining blockchain and edge computing technologies.Additionally,the proposed algorithm leverages a deep reinforcement learning(DRL)model to optimize decision-making processes.It employs the policygradient-based agent to compute candidate embedding nodes and utilizes a breadth-first search(BFS)algorithm to determine the optimal embedding paths.Finally,through simulation experiments,the efficacy of the proposed method was validated,demonstrating outstanding performance in terms of security,revenue generation,and virtual network request(VNR)acceptance rate.
文摘This mixed-methods study investigated how AI-enhanced English as a Foreign Language(EFL)learning environments influence students’psychological well-being through the mediating roles of motivation and language learning anxiety and the moderating role of trust.Participants were Chinese university students(N=310,62%female,mean age=18.9,SD=0.8),of whom 15 completed interviews to both add to and to clarify the evidence from the surveys.Structural equation modeling results revealed that AI use had significant indirect effects on well-being through increased motivation and reduced language learning anxiety.Trust in AI significantly moderated both paths,amplifying the motivational benefits and anxiety reduction associated with AI use.Thematic analysis supported these results,identifying three experiential themes:(1)motivational empowerment through personalization,(2)anxiety regulation through safe practice and feedback,and(3)trust as the emotional bridge between AI and well-being.The study extends AI psychology applications by empirically linking technology engagement with affective outcomes and underscores the need for human-centered and trust-enhancing design in AI-supported education.From these findings,we conclude that adaptive,transparent,and autonomy-supportive AI systems promote self-determined motivation,emotional safety,and overall psychological health among EFL learners.
文摘This paper examines Hernán Díaz’s novel Trust (2022) through the lens of cultural deconstruction, analyzing how its four nested narratives systematically dismantle the American Dream ideology. The novel Bonds and autobiography My Life collaboratively construct a financial myth portraying protagonist Andrew Bevel as an exemplar of self-made success. Subsequently, Ida’s Memoir exposes the subjective construction of history, declaring the American Dream’s bankruptcy at the epistemological level, while Mildred’s diary Futures deconstructs the myth from within by revealing that Bevel’s financial genius was built upon appropriation of his wife’s intellectual labor. This paper argues that Trust reveals the American Dream as an ideological illusion-narratively constructed, practically dependent on structural injustice, and essentially serving power reproduction.
基金supported by National Key R&D Program of China(No.2022YFB3105101).
文摘With more and more IoT terminals being deployed in various power grid business scenarios,terminal reliability has become a practical challenge that threatens the current security protection architecture.Most IoT terminals have security risks and vulnerabilities,and limited resources make it impossible to deploy costly security protection methods on the terminal.In order to cope with these problems,this paper proposes a lightweight trust evaluation model TCL,which combines three network models,TCN,CNN,and LSTM,with stronger feature extraction capability and can score the reliability of the device by periodically analyzing the traffic behavior and activity logs generated by the terminal device,and the trust evaluation of the terminal’s continuous behavior can be achieved by combining the scores of different periods.After experiments,it is proved that TCL can effectively use the traffic behaviors and activity logs of terminal devices for trust evaluation and achieves F1-score of 95.763,94.456,99.923,and 99.195 on HDFS,BGL,N-BaIoT,and KDD99 datasets,respectively,and the size of TCL is only 91KB,which can achieve similar or better performance than CNN-LSTM,RobustLog and other methods with less computational resources and storage space.
基金funded by the Sichuan Science and Technology Program,Grant Nos.2024NSFSC0515,2024ZHCG0182 and MZGC20230013.
文摘To solve the challenges of connecting and coordinating multiple platforms in the automotive industry and to enhance collaboration among different participants,this research focuses on addressing the complex supply relationships in the automotive market,improving data sharing and interactions across various platforms,and achieving more detailed integration of data and operations.We propose a trust evaluation permission delegation method based on the automotive industry chain.The proposed method combines smart contracts with trust evaluation mechanisms,dynamically calculating the trust value of users based on the historical behavior of the delegated entity,network environment,and other factors to avoid malicious node attacks during the permission delegation process.We also introduce strict control over the cross-domain permission granting and revocation mechanisms to manage the delegation path,prevent information leakage caused by malicious node interception,and effectively protect data integrity and privacy.Experimental analysis shows that this method meets the realtime requirements of collaborative interaction in the automotive industry chain and provides a feasible solution to permission delegation issues in the automotive industry chain,offering dynamic flexibility in authorization and scalability compared to most existing solutions.
基金funded by the National Natural Science Foundation of China,grant numbers(62272007,62001007)the Natural Science Foundation of Beijing,grant numbers(4234083,4212018)The authors also extend their appreciation to King Khalid University for funding this work through the Large Group Project under grant number RGP.2/373/45.
文摘Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,communicating in a distributed dynamic environment,face several security challenges,with trust being one of the most important issues in inter-domain routing.Existing research,which performs trust evaluation when exchanging routing information to suppress malicious routing behavior,cannot meet the scalability requirements of BGP nodes.In this paper,we propose a blockchain-based trust model for inter-domain routing.Our model achieves scalability by allowing the master node of an AS alliance to transmit the trust evaluation data of its member nodes to the blockchain.The BGP nodes can expedite the trust evaluation process by accessing a global view of other BGP nodes through the master node of their respective alliance.We incorporate security service evaluation before direct evaluation and indirect recommendations to assess the security services that BGP nodes provide for themselves and prioritize to guarantee their security of routing service.We forward the trust evaluation for neighbor discovery and prioritize the nodes with high trust as neighbor nodes to reduce the malicious exchange routing behavior.We use simulation software to simulate a real BGP environments and employ a comparative experimental research approach to demonstrate the performance evaluation of our trust model.Compared with the classical trust model,our trust model not only saves more storage overhead,but also provides higher security,especially reducing the impact of collusion attacks.
文摘GS1 is an international standards organization,which focuses on product identification and product data,helping businesses and governments to improve commerce and supply chain.Why trusted data is essential to high-quality development?More than 50 years ago,GS1 was initiated with the bar code,a profound transformation of the way we work and live.From then on,a simple scan connected a physical product to its digital identity.It transformed commerce,improving supply chains and enabling safer healthcare.Collaboration between industry and governments,and a strong partnership with ISO and IEC laid the foundations for the global adoption of a common product identification over the past 50 years and all around the world.
文摘Today,I want to share how international standards can forge trust and fuel innovation,laying the foundation for a future where AI benefits everyone,everywhere.First,AI standards,developed jointly by ISO and IEC-the International Electrotechnical Commission-help build global trust and enable responsible innovation by bringing clarity and coherence to an ever-changing AI landscape.As developments in AI continue to emerge at speed,regulation is struggling to keep up and the proliferation of competing standards has created confusion rather than clarity.ISO and our partner IEC are addressing this challenge through the work of our expert committee on AI,SC 42,which takes a holistic,cohesive approach to AI standardization.
文摘Nowadays,we are witnessing the tremendous changes brought by AI technologies.What role can standards play in this process?How can we build global trust and enable responsible innovation?
基金supported by the National Natural Science Foundation of China(U22B2026)the ZTE Industry-Academia-Research Project(HC-CN-20221029003,IA20230628015)。
文摘With the introduction of 5G,users and devices can access the industrial network from anywhere in the world.Therefore,traditional perimeter-based security technologies for industrial networks can no longer work well.To solve this problem,a new security model called Zero Trust(ZT)is desired,which believes in“never trust and always verify”.Every time the asset in the industrial network is accessed,the subject is authenticated and its trustworthiness is assessed.In this way,the asset in industrial network can be well protected,whether the subject is in the internal network or the external network.However,in order to construct the zero trust model in the 5G Industrial Internet collaboration system,there are still many problems to be solved.In this paper,we first introduce the security issues in the 5G Industrial Internet collaboration system,and illustrate the zero trust architecture.Then,we analyze the gap between existing security techniques and the zero trust architecture.Finally,we discuss several potential security techniques that can be used to implement the zero trust model.The purpose of this paper is to point out the further direction for the realization of the Zero Trust Architecture(ZTA)in the 5G Industrial Internet collaboration system.
基金supported by Gansu Provincial Higher Education Teachers’Innovation Fund under Grant 2025A-124Key Research Project of Gansu University of Political Science and Law under Grant No.GZF2022XZD08Soft Science Special Project of Gansu Basic Research Plan under Grant No.22JR11RA106.
文摘In the complex environment of Wireless Sensor Networks(WSNs),various malicious attacks have emerged,among which internal attacks pose particularly severe security risks.These attacks seriously threaten network stability,data transmission reliability,and overall performance.To effectively address this issue and significantly improve intrusion detection speed,accuracy,and resistance to malicious attacks,this research designs a Three-level Intrusion Detection Model based on Dynamic Trust Evaluation(TIDM-DTE).This study conducts a detailed analysis of how different attack types impact node trust and establishes node models for data trust,communication trust,and energy consumption trust by focusing on characteristics such as continuous packet loss and energy consumption changes.By dynamically predicting node trust values using the grey Markov model,the model accurately and sensitively reflects changes in node trust levels during attacks.Additionally,DBSCAN(Density-Based Spatial Clustering of Applications with Noise)data noise monitoring technology is employed to quickly identify attacked nodes,while a trust recovery mechanism restores the trust of temporarily faulty nodes to reduce False Alarm Rate.Simulation results demonstrate that TIDM-DTE achieves high detection rates,fast detection speed,and low False Alarm Rate when identifying various network attacks,including selective forwarding attacks,Sybil attacks,switch attacks,and black hole attacks.TIDM-DTE significantly enhances network security,ensures secure and reliable data transmission,moderately improves network energy efficiency,reduces unnecessary energy consumption,and provides strong support for the stable operation of WSNs.Meanwhile,the research findings offer new ideas and methods for WSN security protection,possessing important theoretical significance and practical application value.
文摘True friendship is like a strong tree-its roots grow deep through trust,loyalty and care.Unlike casual acquaintances(泛泛之交),real friends stay by your side through life's storms and sunshine.A genuine friendship begins with honesty.Friends who truly care about you will tell you the truth kindly,even when it's hard.For example,if you make a mistake,a real friend won't laugh but will help you learn.They create a safe space where you can share fears or dreams without judgment-this is called emotional safety.
文摘Measuring the impact of AI systems The recent 2025 AI Index Report from Stanford University revealed that skepticism about the ethical conduct of AI companies is growing,and trust in fairness is shrinking.There is also less confidence that personal data will be protected and fewer people believe AI systems are unbiased and free of discrimination.Trust and transparency are essential for AI to deliver on its promises in a safe and responsible way.Governments are stepping up with new AI-related regulations,and international standards such as ISO/IEC 42001 have been developed to support them,but a lot more needs to be done to reduce potential risks and address societal concerns.