This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the fi...This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the first proposal to integrate IOTA’s Directed Acyclic Graph(DAG)-based identity framework into satellite IoT environments,enabling lightweight and distributed authentication under intermittent connectivity.The system leverages Decentralized Identifiers(DIDs)and Verifiable Credentials(VCs)over the Tangle,eliminating the need for mining and sequential blocks.An identity management workflow is implemented that supports the creation,validation,deactivation,and reactivation of IoT devices,and is experimentally validated on the Shimmer Testnet.Three metrics are defined and measured:resolution time,deactivation time,and reactivation time.To improve robustness,an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation.The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility.Unlike blockchain-based approaches,which typically suffer from high confirmation delays and scalability constraints,the proposed DAG architecture provides fast,cost-free operations suitable for resource-constrained IoT devices.The results show that authentication can be efficiently performed within satellite connectivity windows,positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks.展开更多
The proliferation of wearable biodevices has boosted the development of soft,innovative,and multifunctional materials for human health monitoring.The integration of wearable sensors with intelligent systems is an over...The proliferation of wearable biodevices has boosted the development of soft,innovative,and multifunctional materials for human health monitoring.The integration of wearable sensors with intelligent systems is an overwhelming tendency,providing powerful tools for remote health monitoring and personal health management.Among many candidates,two-dimensional(2D)materials stand out due to several exotic mechanical,electrical,optical,and chemical properties that can be efficiently integrated into atomic-thin films.While previous reviews on 2D materials for biodevices primarily focus on conventional configurations and materials like graphene,the rapid development of new 2D materials with exotic properties has opened up novel applications,particularly in smart interaction and integrated functionalities.This review aims to consolidate recent progress,highlight the unique advantages of 2D materials,and guide future research by discussing existing challenges and opportunities in applying 2D materials for smart wearable biodevices.We begin with an in-depth analysis of the advantages,sensing mechanisms,and potential applications of 2D materials in wearable biodevice fabrication.Following this,we systematically discuss state-of-the-art biodevices based on 2D materials for monitoring various physiological signals within the human body.Special attention is given to showcasing the integration of multi-functionality in 2D smart devices,mainly including self-power supply,integrated diagnosis/treatment,and human–machine interaction.Finally,the review concludes with a concise summary of existing challenges and prospective solutions concerning the utilization of2D materials for advanced biodevices.展开更多
A functional interlayer based on two-dimensional(2D)porous modified vermiculite nanosheets(PVS)was obtained by acid-etching vermiculite nanosheets.The as-obtained 2D porous nanosheets exhibited a high specific surface...A functional interlayer based on two-dimensional(2D)porous modified vermiculite nanosheets(PVS)was obtained by acid-etching vermiculite nanosheets.The as-obtained 2D porous nanosheets exhibited a high specific surface area of 427 m^(2)·g^(-1)and rich surface active sites,which help restrain polysulfides(LiPSs)through good physi-cal and chemical adsorption,while simultaneously accelerating the nucleation and dissolution kinetics of Li_(2)S,effec-tively suppressing the shuttle effect.The assembled lithium-sulfur batteries(LSBs)employing the PVS-based inter-layer delivered a high initial discharge capacity of 1386 mAh·g^(-1)at 0.1C(167.5 mAh·g^(-1)),long-term cycling stabil-ity,and good rate property.展开更多
This paper investigates ruin,capital injection,and dividends for a two-dimensional risk model.The model posits that surplus levels of insurance companies are governed by a perturbed composite Poisson risk model.This m...This paper investigates ruin,capital injection,and dividends for a two-dimensional risk model.The model posits that surplus levels of insurance companies are governed by a perturbed composite Poisson risk model.This model introduces a dependence between the two surplus levels,present in both the associated perturbations and the claims resulting from common shocks.Critical levels of capital injection and dividends are established for each of the two risks.The surplus levels are observed discretely at fixed intervals,guiding decisions on capital injection,dividends,and ruin at these junctures.This study employs a two-dimensional Fourier cosine series expansion method to approximate the finite time expected discounted operating cost until ruin.The ensuing approximation error is also quantified.The validity and accuracy of the method are corroborated through numerical examples.Furthermore,the research delves into the optimal capital allocation problem.展开更多
Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more s...Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more susceptible to appealing attacks like relay attacks and critical fob hacking. These weaknesses present considerable security threats, resulting in unauthorized entry and car theft. The suggested approach combines a conventional keyless entry feature with an extra security measure. Implementing multi-factor authentication significantly improves the security of systems that allow keyless entry by reducing the likelihood of unauthorized access. Research shows that the benefits of using two-factor authentication, such as a substantial increase in security, far outweigh any minor drawbacks.展开更多
To ensure the access security of 6G,physical-layer authentication(PLA)leverages the randomness and space-time-frequency uniqueness of the channel to provide unique identity signatures for transmitters.Furthermore,the ...To ensure the access security of 6G,physical-layer authentication(PLA)leverages the randomness and space-time-frequency uniqueness of the channel to provide unique identity signatures for transmitters.Furthermore,the introduction of artificial intelligence(AI)facilitates the learning of the distribution characteristics of channel fingerprints,effectively addressing the uncertainties and unknown dynamic challenges in wireless link modeling.This paper reviews representative AI-enabled PLA schemes and proposes a graph neural network(GNN)-based PLA approach in response to the challenges existing methods face in identifying mobile users.Simulation results demonstrate that the proposed method outperforms six baseline schemes in terms of authentication accuracy.Furthermore,this paper outlines the future development directions of PLA.展开更多
Lithium-sulfur(Li-S)batteries with high energy density and capacity have garnered significant research attention among various energy storage devices.However,the shuttle effect of polysulfides(LiPSs)remains a major ch...Lithium-sulfur(Li-S)batteries with high energy density and capacity have garnered significant research attention among various energy storage devices.However,the shuttle effect of polysulfides(LiPSs)remains a major challenge for their practical application.The design of battery separators has become a key aspect in addressing the challenge.MXenes,a promising two-dimensional(2D)material,offer exceptional conductivity,large surface area,high mechanical strength,and active sites for surface reactions.When assembled into layered films,MXenes form highly tunable two-dimensional channels ranging from a few angstroms to over 1 nm.These nanoconfined channels are instrumental in facilitating lithium-ion transport while effectively impeding the shuttle effect of LiPSs,which are essential for improving the specific capacity and cyclic stability of Li-S batteries.Substantial progress has been made in developing MXenes-based separators for Li-S batteries,yet there remains a research gap in summarizing advancements from the perspective of interlayer engineering.This entails maintaining the 2D nanochannels of layered MXenes-based separators while modulating the physicochemical environment within the MXenes interlayers through targeted modifications.This review highlights advancements in in situ modification of MXenes and their integration with 0D,1D,and 2D materials to construct laminated nanocomposite separators for Li-S batteries.The future development directions of MXenes-based materials in Li-S energy storage devices are also outlined,to drive further advancements in MXenes for Li-S battery separators.展开更多
With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehi...With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehicles are mobile entities,they move across different domains and need to communicate with the Roadside Unit(RSU)in various regions.However,open environments are highly susceptible to becoming targets for attackers,posing significant risks of malicious attacks.Therefore,it is crucial to design a secure authentication protocol to ensure the security of communication between vehicles and RSUs,particularly in scenarios where vehicles cross domains.In this paper,we propose a provably secure cross-domain authentication and key agreement protocol for IoV.Our protocol comprises two authentication phases:intra-domain authentication and cross-domain authentication.To ensure the security of our protocol,we conducted rigorous analyses based on the ROR(Real-or-Random)model and Scyther.Finally,we show in-depth comparisons of our protocol with existing ones from both security and performance perspectives,fully demonstrating its security and efficiency.展开更多
As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on vari...As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on various aspects of security,gaps remain in addressing both high security requirements and the resource-constrained nature of VANET environments.This paper proposes an extended-Kerberos protocol that integrates Physical Unclonable Function(PUF)for authentication and key agreement,offering a comprehensive solution to the security challenges in VANETs.The protocol facilitates mutual authentication and secure key agreement between vehicles and APPs,ensuring the confidentiality and integrity of vehicle-to-network(V2N)communications and preventing malicious data injection.Notably,by replacing traditional Kerberos password authentication with Challenge-Response Pairs(CRPs)generated by PUF,the protocol significantly reduces the risk of key leakage.The inherent properties of PUF—such as unclonability and unpredictability—make it an ideal defense against physical attacks,including intrusion,semi-intrusion,and side-channel attacks.The results of this study demonstrate that this approach not only enhances security but also optimizes communication efficiency,reduces latency,and improves overall user experience.The analysis proves that our protocol achieves at least 86%improvement in computational efficiency compared to some existed protocols.This is particularly crucial in resource-constrained VANET environments,where it enables efficient data transmission between vehicles and applications,reduces latency,and enhances the overall user experience.展开更多
As a model for the next generation of the Internet,the metaverse—a fully immersive,hyper-temporal virtual shared space—is transitioning from imagination to reality.At present,the metaverse has been widely applied in...As a model for the next generation of the Internet,the metaverse—a fully immersive,hyper-temporal virtual shared space—is transitioning from imagination to reality.At present,the metaverse has been widely applied in a variety of fields,including education,social entertainment,Internet of vehicles(IoV),healthcare,and virtual tours.In IoVs,researchers primarily focus on using the metaverse to improve the traffic safety of vehicles,while paying limited attention to passengers’social needs.At the same time,Social Internet ofVehicles(SIoV)introduces the concept of social networks in IoV to provide better resources and services for users.However,the problem of single interaction between SIoVand users has become increasingly prominent.In this paper,we first introduce a SIoVenvironment combined with the metaverse.In this environment,we adopt blockchain as the platform of the metaverse to provide a decentralized environment.Concerning passengers’social data may contain sensitive/private information,we then design an authentication and key agreement protocol calledMSIoV-AKAto protect the communications.Through formal security verifications in the real-or-random(ROR)model and using the AVISPA(Automated Validation of Internet Security Protocols and Applications)tool,we firmly verify the security of the protocol.Finally,detailed comparisons are made between our protocol and robust protocols/schemes in terms of computational cost and communication cost.In addition,we implement the MSIoV-AKA protocol in the Ethereum test network and Hyperledger Sawtooth to show the practicality.展开更多
Vehicular Ad-hoc Network(VANET)is a platform that facilitates Vehicle-to-Everything(V2X)interconnection.However,its open communication channels and high-speed mobility introduce security and privacy vulnerabilities.An...Vehicular Ad-hoc Network(VANET)is a platform that facilitates Vehicle-to-Everything(V2X)interconnection.However,its open communication channels and high-speed mobility introduce security and privacy vulnerabilities.Anonymous authentication is crucial in ensuring secure communication and privacy protection in VANET.However,existing anonymous authentication schemes are prone to single points of failure and often overlook the efficient tracking of the true identities of malicious vehicles after pseudonym changes.To address these challenges,we propose an efficient anonymous authentication scheme for blockchain-based VANET.By leveraging blockchain technology,our approach addresses the challenges of single points of failure and high latency,thereby enhancing the service stability and scalability of VANET.The scheme integrates homomorphic encryption and elliptic curve cryptography,allowing vehicles to independently generate new pseudonyms when entering a new domain without third-party assistance.Security analyses and simulation results demonstrate that our scheme achieves effective anonymous authentication in VANET.Moreover,the roadside unit can process 500 messages per 19 ms.As the number of vehicles in the communication domain grows,our scheme exhibits superior messageprocessing capabilities.展开更多
How to ensure the security of device access is a common concern in the Internet of Things(IoT)scenario with extremely high device connection density.To achieve efficient and secure network access for IoT devices with ...How to ensure the security of device access is a common concern in the Internet of Things(IoT)scenario with extremely high device connection density.To achieve efficient and secure network access for IoT devices with constrained resources,this paper proposes a lightweight physical-layer authentication protocol based on Physical Unclonable Function(PUF)and channel pre-equalization.PUF is employed as a secret carrier to provide authentication credentials for devices due to its hardware-based uniqueness and unclonable property.Meanwhile,the short-term reciprocity and spatio-temporal uniqueness of wireless channels are utilized to attach an authentication factor related to the spatio-temporal position of devices and to secure the transmission of authentication messages.The proposed protocol is analyzed formally and informally to prove its correctness and security against typical attacks.Simulation results show its robustness in various radio environments.Moreover,we illustrate the advantages of our protocol in terms of security features and complexity through performance comparison with existing authentication schemes.展开更多
Titanium dioxide(TiO_(2))has been an important protective ingredient in mineral-based sunscreens since the 1990s.However,traditional TiO_(2)nanoparticle formulations have seen little improvement over the past decades ...Titanium dioxide(TiO_(2))has been an important protective ingredient in mineral-based sunscreens since the 1990s.However,traditional TiO_(2)nanoparticle formulations have seen little improvement over the past decades and continue to face persistent challenges related to light transmission,biosafety,and visual appearance.Here,we report the discovery of two-dimensional(2D)TiO_(2),characterized by a micro-sized lateral dimension(~1.6μm)and atomic-scale thickness,which fundamentally resolves these long-standing issues.The 2D structure enables exceptional light management,achieving 80%visible light transparency—rendering it nearly invisible on the skin—while maintaining UV-blocking performance comparable to unmodified rutile TiO_(2)nanoparticles.Its larger lateral size results in a two-orders-of-magnitude reduction in skin penetration(0.96 w/w%),significantly enhancing biosafety.Moreover,the unique layered architecture inherently suppresses the generation of reactive oxygen species(ROS)under sunlight exposure,reducing the ROS generation rate by 50-fold compared to traditional TiO_(2)nanoparticles.Through precise metal element modulation,we further developed the first customizable sunscreen material capable of tuning UV protection ranges and automatically matching diverse skin tones.The 2D TiO_(2)offers a potentially transformative approach to modern sunscreen formulation,combining superior UV protection,enhanced safety and a natural appearance.展开更多
To date,many previous studies have been proposed for driver authentication;however,these solutions have many shortcomings and are still far from practical for real-world applications.In this paper,we tackle the shortc...To date,many previous studies have been proposed for driver authentication;however,these solutions have many shortcomings and are still far from practical for real-world applications.In this paper,we tackle the shortcomings of the existing solutions and reach toward proposing a lightweight and practical authentication system,dubbed DriveMe,for identifying drivers on cars.Our novelty aspects are 1⃝Lightweight scheme that depends only on a single sensor data(i.e.,pressure readings)attached to the driver’s seat and belt.2⃝Practical evaluation in which one-class authentication models are trained from only the owner users and tested using data collected from both owners and attackers.3⃝Rapid Authentication to quickly identify drivers’identities using a few pressure samples collected within short durations(1,2,3,5,or 10 s).4⃝Realistic experiments where the sensory data is collected from real experiments rather than computer simulation tools.We conducted real experiments and collected about 13,200 samples and 22,800 samples of belt-only and seat-only datasets from all 12 users under different settings.To evaluate system effectiveness,we implemented extensive evaluation scenarios using four one-class detectors One-Class Support Vector Machine(OCSVM),Local Outlier Factor(LOF),Isolation Forest(IF),and Elliptic Envelope(EE),three dataset types(belt-only,seat-only,and fusion),and four different dataset sizes.Our average experimental results show that the system can authenticate the driver with an F1 score of 93.1%for seat-based data using OCSVM classifier,an F1 score of 98.53%for fusion-based data using LOF classifier,an F1 score of 91.65%for fusion-based data using IF classifier,and an F1 score of 95.79%for fusion-based data using EE classifier.展开更多
The Internet of Things(IoT)is extensively applied across various industrial domains,such as smart homes,factories,and intelligent transportation,becoming integral to daily life.Establishing robust policies for managin...The Internet of Things(IoT)is extensively applied across various industrial domains,such as smart homes,factories,and intelligent transportation,becoming integral to daily life.Establishing robust policies for managing and governing IoT devices is imperative.Secure authentication for IoT devices in resource-constrained environments remains challenging due to the limitations of conventional complex protocols.Prior methodologies enhanced mutual authentication through key exchange protocols or complex operations,which are impractical for lightweight devices.To address this,our study introduces the privacy-preserving software-defined range proof(SDRP)model,which achieves secure authentication with low complexity.SDRP minimizes the overhead of confidentiality and authentication processes by utilizing range proof to verify whether the attribute information of a user falls within a specific range.Since authentication is performed using a digital ID sequence generated from indirect personal data,it can avoid the disclosure of actual individual attributes.Experimental results demonstrate that SDRP significantly improves security efficiency,increasing it by an average of 93.02%compared to conventional methods.It mitigates the trade-off between security and efficiency by reducing leakage risk by an average of 98.7%.展开更多
The integration of artificial intelligence(AI)with advanced power technologies is transforming energy system management,particularly through real-time data monitoring and intelligent decision-making driven by Artifici...The integration of artificial intelligence(AI)with advanced power technologies is transforming energy system management,particularly through real-time data monitoring and intelligent decision-making driven by Artificial Intelligence Generated Content(AIGC).However,the openness of power system channels and the resource-constrained nature of power sensors have led to new challenges for the secure transmission of power data and decision instructions.Although traditional public key cryptographic primitives can offer high security,the substantial key management and computational overhead associated with these primitives make them unsuitable for power systems.To ensure the real-time and security of power data and command transmission,we propose a lightweight identity authentication scheme tailored for power AIGC systems.The scheme utilizes lightweight symmetric encryption algorithms,minimizing the resource overhead on power sensors.Additionally,it incorporates a dynamic credential update mechanism,which can realize the rotation and update of temporary credentials to ensure anonymity and security.We rigorously validate the security of the scheme using the Real-or-Random(ROR)model and AVISPA simulation,and the results show that our scheme can resist various active and passive attacks.Finally,performance comparisons and NS3 simulation results demonstrate that our proposed scheme offers enhanced security features with lower overhead,making it more suitable for power AIGC systems compared to existing solutions.展开更多
Owing to their rolling friction,two-dimensional piston pumps are highly suitable as power components for electro-hydrostatic actuators(EHAs).These pumps are particularly advantageous for applications requiring high ef...Owing to their rolling friction,two-dimensional piston pumps are highly suitable as power components for electro-hydrostatic actuators(EHAs).These pumps are particularly advantageous for applications requiring high efficiency and reliability.However,the ambiguity surrounding the output flow characteristics of individual two-dimensional pumps poses a significant challenge in achieving precise closed-loop control of the EHA positions.To address this issue,this study established a comprehensive numerical model that included gap leakage to analyze the impact of leakage on the output flow characteristics of a two-dimensional piston pump.The validity of the numerical analysis was indirectly confirmed through meticulous measurements of the leakage and volumetric efficiency,ensuring robust results.The research findings indicated that,at lower pump speeds,leakage significantly affected the output flow rate,leading to potential inefficiencies in the system.Conversely,at higher rotational speeds,the impact of leakage was less pronounced,implying that the influence of leakage on the pump outlet flow must be carefully considered and managed for EHAs to perform position servo control.Additionally,the research demonstrates that two-dimensional motion does not have a unique or additional effect on pump leakage,thus simplifying the design considerations.Finally,the study concluded that maintaining an oil-filled leakage environment is beneficial because it helps reduce the impact of leakage and enhances the overall volumetric efficiency of the pump system.展开更多
Environmental catalysis has been considered one of the important research topics.Some technologies(e.g.,photocatalysis and electrocatalysis)have been intensively developed with the advance of synthetic technologies of...Environmental catalysis has been considered one of the important research topics.Some technologies(e.g.,photocatalysis and electrocatalysis)have been intensively developed with the advance of synthetic technologies of catalytical materials.In 2019,we discussed the development trend of this field,and wrote a roadmap on this topic in Chinese Chemical Letters(30(2019)2065-2088).Nowadays,we discuss it again from a new viewpoint along this road.In this paper,several subtopics are discussed,e.g.,photocatalysis based on titanium dioxide,violet phosphorus,graphitic carbon and covalent organic frameworks,electrocatalysts based on carbon,metal-and covalent-organic framework.Finally,we hope that this roadmap can enrich the development of two-dimensional materials in environmental catalysis with novel understanding,and give useful inspiration to explore new catalysts for practical applications.展开更多
It is a key challenge to prepare two-dimensional diamond(2D-diamond).Herein,we develop a method for synthesizing 2D-diamond by depositing monodisperse tantalum(Ta)atoms onto graphene substrates using a hot-filament ch...It is a key challenge to prepare two-dimensional diamond(2D-diamond).Herein,we develop a method for synthesizing 2D-diamond by depositing monodisperse tantalum(Ta)atoms onto graphene substrates using a hot-filament chemical vapor deposition setup,followed by annealing treatment under different temperatures at ambient pressure.The results indicate that when the annealing temperature increases from 700℃ to 1000℃,the size of the 2D-diamond found in the samples gradually increases from close to 20 nm to around 30 nm.Meanwhile,the size and number of amorphous carbon spheres and Ta-containing compounds between the graphene layers gradually increase.As the annealing temperature continues to rise to 1100℃,a significant aggregation of Ta-containing compounds is observed in the samples,with no diamond structure detected.This further confirms that monodisperse Ta atoms play a key role in graphene phase transition into 2D-diamond.This study provides a novel method for the ambient-pressure phase transition of graphene into 2D-diamond.展开更多
In the rapidly evolving landscape of intelligent transportation systems,the security and authenticity of vehicular communication have emerged as critical challenges.As vehicles become increasingly interconnected,the n...In the rapidly evolving landscape of intelligent transportation systems,the security and authenticity of vehicular communication have emerged as critical challenges.As vehicles become increasingly interconnected,the need for robust authentication mechanisms to safeguard against cyber threats and ensure trust in an autonomous ecosystem becomes essential.On the other hand,using intelligence in the authentication system is a significant attraction.While existing surveys broadly address vehicular security,a critical gap remains in the systematic exploration of Deep Learning(DL)-based authentication methods tailored to these communication paradigms.This survey fills that gap by offering a comprehensive analysis of DL techniques—including supervised,unsupervised,reinforcement,and hybrid learning—for vehicular authentication.This survey highlights novel contributions,such as a taxonomy of DL-driven authentication protocols,real-world case studies,and a critical evaluation of scalability and privacy-preserving techniques.Additionally,this paper identifies unresolved challenges,such as adversarial resilience and real-time processing constraints,and proposes actionable future directions,including lightweight model optimization and blockchain integration.By grounding the discussion in concrete applications,such as biometric authentication for driver safety and adaptive key management for infrastructure security,this survey bridges theoretical advancements with practical deployment needs,offering a roadmap for next-generation secure intelligent vehicular ecosystems for the modern world.展开更多
基金This work is part of the‘Intelligent and Cyber-Secure Platform for Adaptive Optimization in the Simultaneous Operation of Heterogeneous Autonomous Robots(PICRAH4.0)’with reference MIG-20232082,funded by MCIN/AEI/10.13039/501100011033supported by the Universidad Internacional de La Rioja(UNIR)through the Precompetitive Research Project entitled“Nuevos Horizontes en Internet de las Cosas y NewSpace(NEWIOT)”,reference PP-2024-13,funded under the 2024 Call for Research Projects.
文摘This work evaluates an architecture for decentralized authentication of Internet of Things(IoT)devices in Low Earth Orbit(LEO)satellite networks using IOTA Identity technology.To the best of our knowledge,it is the first proposal to integrate IOTA’s Directed Acyclic Graph(DAG)-based identity framework into satellite IoT environments,enabling lightweight and distributed authentication under intermittent connectivity.The system leverages Decentralized Identifiers(DIDs)and Verifiable Credentials(VCs)over the Tangle,eliminating the need for mining and sequential blocks.An identity management workflow is implemented that supports the creation,validation,deactivation,and reactivation of IoT devices,and is experimentally validated on the Shimmer Testnet.Three metrics are defined and measured:resolution time,deactivation time,and reactivation time.To improve robustness,an algorithmic optimization is introduced that minimizes communication overhead and reduces latency during deactivation.The experimental results are compared with orbital simulations of satellite revisit times to assess operational feasibility.Unlike blockchain-based approaches,which typically suffer from high confirmation delays and scalability constraints,the proposed DAG architecture provides fast,cost-free operations suitable for resource-constrained IoT devices.The results show that authentication can be efficiently performed within satellite connectivity windows,positioning IOTA Identity as a viable solution for secure and scalable IoT authentication in LEO satellite networks.
基金the support from the National Natural Science Foundation of China(22272004,62272041)the Fundamental Research Funds for the Central Universities(YWF-22-L-1256)+1 种基金the National Key R&D Program of China(2023YFC3402600)the Beijing Institute of Technology Research Fund Program for Young Scholars(No.1870011182126)。
文摘The proliferation of wearable biodevices has boosted the development of soft,innovative,and multifunctional materials for human health monitoring.The integration of wearable sensors with intelligent systems is an overwhelming tendency,providing powerful tools for remote health monitoring and personal health management.Among many candidates,two-dimensional(2D)materials stand out due to several exotic mechanical,electrical,optical,and chemical properties that can be efficiently integrated into atomic-thin films.While previous reviews on 2D materials for biodevices primarily focus on conventional configurations and materials like graphene,the rapid development of new 2D materials with exotic properties has opened up novel applications,particularly in smart interaction and integrated functionalities.This review aims to consolidate recent progress,highlight the unique advantages of 2D materials,and guide future research by discussing existing challenges and opportunities in applying 2D materials for smart wearable biodevices.We begin with an in-depth analysis of the advantages,sensing mechanisms,and potential applications of 2D materials in wearable biodevice fabrication.Following this,we systematically discuss state-of-the-art biodevices based on 2D materials for monitoring various physiological signals within the human body.Special attention is given to showcasing the integration of multi-functionality in 2D smart devices,mainly including self-power supply,integrated diagnosis/treatment,and human–machine interaction.Finally,the review concludes with a concise summary of existing challenges and prospective solutions concerning the utilization of2D materials for advanced biodevices.
文摘A functional interlayer based on two-dimensional(2D)porous modified vermiculite nanosheets(PVS)was obtained by acid-etching vermiculite nanosheets.The as-obtained 2D porous nanosheets exhibited a high specific surface area of 427 m^(2)·g^(-1)and rich surface active sites,which help restrain polysulfides(LiPSs)through good physi-cal and chemical adsorption,while simultaneously accelerating the nucleation and dissolution kinetics of Li_(2)S,effec-tively suppressing the shuttle effect.The assembled lithium-sulfur batteries(LSBs)employing the PVS-based inter-layer delivered a high initial discharge capacity of 1386 mAh·g^(-1)at 0.1C(167.5 mAh·g^(-1)),long-term cycling stabil-ity,and good rate property.
基金supported by the Shihezi University High-Level Talents Research Startup Project(Project No.RCZK202521)the National Natural Science Foundation of China(Grant Nos.12271066,11871121,12171405)+1 种基金the Chongqing Natural Science Foundation Joint Fund for Innovation and Development Project(Project No.CSTB2024NSCQLZX0085)the Chongqing Normal University Foundation(Grant No.23XLB018).
文摘This paper investigates ruin,capital injection,and dividends for a two-dimensional risk model.The model posits that surplus levels of insurance companies are governed by a perturbed composite Poisson risk model.This model introduces a dependence between the two surplus levels,present in both the associated perturbations and the claims resulting from common shocks.Critical levels of capital injection and dividends are established for each of the two risks.The surplus levels are observed discretely at fixed intervals,guiding decisions on capital injection,dividends,and ruin at these junctures.This study employs a two-dimensional Fourier cosine series expansion method to approximate the finite time expected discounted operating cost until ruin.The ensuing approximation error is also quantified.The validity and accuracy of the method are corroborated through numerical examples.Furthermore,the research delves into the optimal capital allocation problem.
文摘Car manufacturers aim to enhance the use of two-factor authentication (2FA) to protect keyless entry systems in contemporary cars. Despite providing significant ease for users, keyless entry systems have become more susceptible to appealing attacks like relay attacks and critical fob hacking. These weaknesses present considerable security threats, resulting in unauthorized entry and car theft. The suggested approach combines a conventional keyless entry feature with an extra security measure. Implementing multi-factor authentication significantly improves the security of systems that allow keyless entry by reducing the likelihood of unauthorized access. Research shows that the benefits of using two-factor authentication, such as a substantial increase in security, far outweigh any minor drawbacks.
文摘To ensure the access security of 6G,physical-layer authentication(PLA)leverages the randomness and space-time-frequency uniqueness of the channel to provide unique identity signatures for transmitters.Furthermore,the introduction of artificial intelligence(AI)facilitates the learning of the distribution characteristics of channel fingerprints,effectively addressing the uncertainties and unknown dynamic challenges in wireless link modeling.This paper reviews representative AI-enabled PLA schemes and proposes a graph neural network(GNN)-based PLA approach in response to the challenges existing methods face in identifying mobile users.Simulation results demonstrate that the proposed method outperforms six baseline schemes in terms of authentication accuracy.Furthermore,this paper outlines the future development directions of PLA.
基金supported by Beijing Natural Science Foundation(Nos.2232037 and 2242035)the National Natural Science Foundation of China(Nos.22005012,22105012 and 51803183)+1 种基金Chunhui Plan Cooperative Project of Ministry of Education(No.202201298)the China Postdoctoral Science Foundation Funded Project(No.2023M733520).
文摘Lithium-sulfur(Li-S)batteries with high energy density and capacity have garnered significant research attention among various energy storage devices.However,the shuttle effect of polysulfides(LiPSs)remains a major challenge for their practical application.The design of battery separators has become a key aspect in addressing the challenge.MXenes,a promising two-dimensional(2D)material,offer exceptional conductivity,large surface area,high mechanical strength,and active sites for surface reactions.When assembled into layered films,MXenes form highly tunable two-dimensional channels ranging from a few angstroms to over 1 nm.These nanoconfined channels are instrumental in facilitating lithium-ion transport while effectively impeding the shuttle effect of LiPSs,which are essential for improving the specific capacity and cyclic stability of Li-S batteries.Substantial progress has been made in developing MXenes-based separators for Li-S batteries,yet there remains a research gap in summarizing advancements from the perspective of interlayer engineering.This entails maintaining the 2D nanochannels of layered MXenes-based separators while modulating the physicochemical environment within the MXenes interlayers through targeted modifications.This review highlights advancements in in situ modification of MXenes and their integration with 0D,1D,and 2D materials to construct laminated nanocomposite separators for Li-S batteries.The future development directions of MXenes-based materials in Li-S energy storage devices are also outlined,to drive further advancements in MXenes for Li-S battery separators.
基金supported by the Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology and Natural Science Foundation of Shandong Province,China(Grant no.ZR202111230202).
文摘With the rapid development and widespread adoption of Internet of Things(IoT)technology,the innovative concept of the Internet of Vehicles(IoV)has emerged,ushering in a new era of intelligent transportation.Since vehicles are mobile entities,they move across different domains and need to communicate with the Roadside Unit(RSU)in various regions.However,open environments are highly susceptible to becoming targets for attackers,posing significant risks of malicious attacks.Therefore,it is crucial to design a secure authentication protocol to ensure the security of communication between vehicles and RSUs,particularly in scenarios where vehicles cross domains.In this paper,we propose a provably secure cross-domain authentication and key agreement protocol for IoV.Our protocol comprises two authentication phases:intra-domain authentication and cross-domain authentication.To ensure the security of our protocol,we conducted rigorous analyses based on the ROR(Real-or-Random)model and Scyther.Finally,we show in-depth comparisons of our protocol with existing ones from both security and performance perspectives,fully demonstrating its security and efficiency.
基金supported in part by the Jiangsu“Qing Lan Project”,Natural Science Foundation of the Jiangsu Higher Education Institutions of China(Major Research Project:23KJA520007)Postgraduate Research&Practice Innovation Program of Jiangsu Province(No.SJCX25_1303).
文摘As the adoption of Vehicular Ad-hoc Networks(VANETs)grows,ensuring secure communication between smart vehicles and remote application servers(APPs)has become a critical challenge.While existing solutions focus on various aspects of security,gaps remain in addressing both high security requirements and the resource-constrained nature of VANET environments.This paper proposes an extended-Kerberos protocol that integrates Physical Unclonable Function(PUF)for authentication and key agreement,offering a comprehensive solution to the security challenges in VANETs.The protocol facilitates mutual authentication and secure key agreement between vehicles and APPs,ensuring the confidentiality and integrity of vehicle-to-network(V2N)communications and preventing malicious data injection.Notably,by replacing traditional Kerberos password authentication with Challenge-Response Pairs(CRPs)generated by PUF,the protocol significantly reduces the risk of key leakage.The inherent properties of PUF—such as unclonability and unpredictability—make it an ideal defense against physical attacks,including intrusion,semi-intrusion,and side-channel attacks.The results of this study demonstrate that this approach not only enhances security but also optimizes communication efficiency,reduces latency,and improves overall user experience.The analysis proves that our protocol achieves at least 86%improvement in computational efficiency compared to some existed protocols.This is particularly crucial in resource-constrained VANET environments,where it enables efficient data transmission between vehicles and applications,reduces latency,and enhances the overall user experience.
基金supported by the Startup Foundation for Introducing Talent of Nanjing University of Information Science and Technology and Natural Science Foundation of Shandong Province,China(Grant no.ZR202111230202).
文摘As a model for the next generation of the Internet,the metaverse—a fully immersive,hyper-temporal virtual shared space—is transitioning from imagination to reality.At present,the metaverse has been widely applied in a variety of fields,including education,social entertainment,Internet of vehicles(IoV),healthcare,and virtual tours.In IoVs,researchers primarily focus on using the metaverse to improve the traffic safety of vehicles,while paying limited attention to passengers’social needs.At the same time,Social Internet ofVehicles(SIoV)introduces the concept of social networks in IoV to provide better resources and services for users.However,the problem of single interaction between SIoVand users has become increasingly prominent.In this paper,we first introduce a SIoVenvironment combined with the metaverse.In this environment,we adopt blockchain as the platform of the metaverse to provide a decentralized environment.Concerning passengers’social data may contain sensitive/private information,we then design an authentication and key agreement protocol calledMSIoV-AKAto protect the communications.Through formal security verifications in the real-or-random(ROR)model and using the AVISPA(Automated Validation of Internet Security Protocols and Applications)tool,we firmly verify the security of the protocol.Finally,detailed comparisons are made between our protocol and robust protocols/schemes in terms of computational cost and communication cost.In addition,we implement the MSIoV-AKA protocol in the Ethereum test network and Hyperledger Sawtooth to show the practicality.
基金supported by the National Natural Science Foundation of China under Grant U2001213.
文摘Vehicular Ad-hoc Network(VANET)is a platform that facilitates Vehicle-to-Everything(V2X)interconnection.However,its open communication channels and high-speed mobility introduce security and privacy vulnerabilities.Anonymous authentication is crucial in ensuring secure communication and privacy protection in VANET.However,existing anonymous authentication schemes are prone to single points of failure and often overlook the efficient tracking of the true identities of malicious vehicles after pseudonym changes.To address these challenges,we propose an efficient anonymous authentication scheme for blockchain-based VANET.By leveraging blockchain technology,our approach addresses the challenges of single points of failure and high latency,thereby enhancing the service stability and scalability of VANET.The scheme integrates homomorphic encryption and elliptic curve cryptography,allowing vehicles to independently generate new pseudonyms when entering a new domain without third-party assistance.Security analyses and simulation results demonstrate that our scheme achieves effective anonymous authentication in VANET.Moreover,the roadside unit can process 500 messages per 19 ms.As the number of vehicles in the communication domain grows,our scheme exhibits superior messageprocessing capabilities.
基金supported by National Natural Science Foundation of China(No.61931020,No.U19B2024 and No.62371462).
文摘How to ensure the security of device access is a common concern in the Internet of Things(IoT)scenario with extremely high device connection density.To achieve efficient and secure network access for IoT devices with constrained resources,this paper proposes a lightweight physical-layer authentication protocol based on Physical Unclonable Function(PUF)and channel pre-equalization.PUF is employed as a secret carrier to provide authentication credentials for devices due to its hardware-based uniqueness and unclonable property.Meanwhile,the short-term reciprocity and spatio-temporal uniqueness of wireless channels are utilized to attach an authentication factor related to the spatio-temporal position of devices and to secure the transmission of authentication messages.The proposed protocol is analyzed formally and informally to prove its correctness and security against typical attacks.Simulation results show its robustness in various radio environments.Moreover,we illustrate the advantages of our protocol in terms of security features and complexity through performance comparison with existing authentication schemes.
基金supported by the National Key Research and Development Project(No.2019YFA0705403)the National Natural Science Foundation of China(No.T2293693,52273311)+2 种基金the Guangdong Basic and Applied Basic Research Foundation(No.2020B0301030002)and the Shenzhen Basic Research Project(Nos.WDZC20200824091903001,JSGG20220831105402004,JCYJ20220818100806014)Shenzhen Major Science and Technology Projects(Nos.KCXFZ20240903094013018,KCXFZ20240903094203005)。
文摘Titanium dioxide(TiO_(2))has been an important protective ingredient in mineral-based sunscreens since the 1990s.However,traditional TiO_(2)nanoparticle formulations have seen little improvement over the past decades and continue to face persistent challenges related to light transmission,biosafety,and visual appearance.Here,we report the discovery of two-dimensional(2D)TiO_(2),characterized by a micro-sized lateral dimension(~1.6μm)and atomic-scale thickness,which fundamentally resolves these long-standing issues.The 2D structure enables exceptional light management,achieving 80%visible light transparency—rendering it nearly invisible on the skin—while maintaining UV-blocking performance comparable to unmodified rutile TiO_(2)nanoparticles.Its larger lateral size results in a two-orders-of-magnitude reduction in skin penetration(0.96 w/w%),significantly enhancing biosafety.Moreover,the unique layered architecture inherently suppresses the generation of reactive oxygen species(ROS)under sunlight exposure,reducing the ROS generation rate by 50-fold compared to traditional TiO_(2)nanoparticles.Through precise metal element modulation,we further developed the first customizable sunscreen material capable of tuning UV protection ranges and automatically matching diverse skin tones.The 2D TiO_(2)offers a potentially transformative approach to modern sunscreen formulation,combining superior UV protection,enhanced safety and a natural appearance.
基金supported by the Institute of Information&Communications Technology Planning&Evaluation(1ITP)(Project Nos.RS-2024-00438551,30%,2022-11220701,30%,2021-0-01816,30%)the National Research Foundation of Korea(NRF)grant funded by the Korean Government(Project No.RS2023-00208460,10%).
文摘To date,many previous studies have been proposed for driver authentication;however,these solutions have many shortcomings and are still far from practical for real-world applications.In this paper,we tackle the shortcomings of the existing solutions and reach toward proposing a lightweight and practical authentication system,dubbed DriveMe,for identifying drivers on cars.Our novelty aspects are 1⃝Lightweight scheme that depends only on a single sensor data(i.e.,pressure readings)attached to the driver’s seat and belt.2⃝Practical evaluation in which one-class authentication models are trained from only the owner users and tested using data collected from both owners and attackers.3⃝Rapid Authentication to quickly identify drivers’identities using a few pressure samples collected within short durations(1,2,3,5,or 10 s).4⃝Realistic experiments where the sensory data is collected from real experiments rather than computer simulation tools.We conducted real experiments and collected about 13,200 samples and 22,800 samples of belt-only and seat-only datasets from all 12 users under different settings.To evaluate system effectiveness,we implemented extensive evaluation scenarios using four one-class detectors One-Class Support Vector Machine(OCSVM),Local Outlier Factor(LOF),Isolation Forest(IF),and Elliptic Envelope(EE),three dataset types(belt-only,seat-only,and fusion),and four different dataset sizes.Our average experimental results show that the system can authenticate the driver with an F1 score of 93.1%for seat-based data using OCSVM classifier,an F1 score of 98.53%for fusion-based data using LOF classifier,an F1 score of 91.65%for fusion-based data using IF classifier,and an F1 score of 95.79%for fusion-based data using EE classifier.
基金funding from the Korea Institute for Advancement of Technology(KIAT)through a grant provided by the Korean Government Ministry of Trade,Industry,and Energy(MOTIE)(RS-2024-00415520,Training Industrial Security Specialist for High-Tech Industry)Additional support was received from the Ministry of Science and ICT(MSIT)under the ICAN(ICT Challenge and Advanced Network of HRD)program(No.IITP-2022-RS-2022-00156310)overseen by the Institute of Information&Communication Technology Planning and Evaluation(IITP).
文摘The Internet of Things(IoT)is extensively applied across various industrial domains,such as smart homes,factories,and intelligent transportation,becoming integral to daily life.Establishing robust policies for managing and governing IoT devices is imperative.Secure authentication for IoT devices in resource-constrained environments remains challenging due to the limitations of conventional complex protocols.Prior methodologies enhanced mutual authentication through key exchange protocols or complex operations,which are impractical for lightweight devices.To address this,our study introduces the privacy-preserving software-defined range proof(SDRP)model,which achieves secure authentication with low complexity.SDRP minimizes the overhead of confidentiality and authentication processes by utilizing range proof to verify whether the attribute information of a user falls within a specific range.Since authentication is performed using a digital ID sequence generated from indirect personal data,it can avoid the disclosure of actual individual attributes.Experimental results demonstrate that SDRP significantly improves security efficiency,increasing it by an average of 93.02%compared to conventional methods.It mitigates the trade-off between security and efficiency by reducing leakage risk by an average of 98.7%.
文摘The integration of artificial intelligence(AI)with advanced power technologies is transforming energy system management,particularly through real-time data monitoring and intelligent decision-making driven by Artificial Intelligence Generated Content(AIGC).However,the openness of power system channels and the resource-constrained nature of power sensors have led to new challenges for the secure transmission of power data and decision instructions.Although traditional public key cryptographic primitives can offer high security,the substantial key management and computational overhead associated with these primitives make them unsuitable for power systems.To ensure the real-time and security of power data and command transmission,we propose a lightweight identity authentication scheme tailored for power AIGC systems.The scheme utilizes lightweight symmetric encryption algorithms,minimizing the resource overhead on power sensors.Additionally,it incorporates a dynamic credential update mechanism,which can realize the rotation and update of temporary credentials to ensure anonymity and security.We rigorously validate the security of the scheme using the Real-or-Random(ROR)model and AVISPA simulation,and the results show that our scheme can resist various active and passive attacks.Finally,performance comparisons and NS3 simulation results demonstrate that our proposed scheme offers enhanced security features with lower overhead,making it more suitable for power AIGC systems compared to existing solutions.
基金Supported by National Natural Science Foundation of China(Grant No.52205072).
文摘Owing to their rolling friction,two-dimensional piston pumps are highly suitable as power components for electro-hydrostatic actuators(EHAs).These pumps are particularly advantageous for applications requiring high efficiency and reliability.However,the ambiguity surrounding the output flow characteristics of individual two-dimensional pumps poses a significant challenge in achieving precise closed-loop control of the EHA positions.To address this issue,this study established a comprehensive numerical model that included gap leakage to analyze the impact of leakage on the output flow characteristics of a two-dimensional piston pump.The validity of the numerical analysis was indirectly confirmed through meticulous measurements of the leakage and volumetric efficiency,ensuring robust results.The research findings indicated that,at lower pump speeds,leakage significantly affected the output flow rate,leading to potential inefficiencies in the system.Conversely,at higher rotational speeds,the impact of leakage was less pronounced,implying that the influence of leakage on the pump outlet flow must be carefully considered and managed for EHAs to perform position servo control.Additionally,the research demonstrates that two-dimensional motion does not have a unique or additional effect on pump leakage,thus simplifying the design considerations.Finally,the study concluded that maintaining an oil-filled leakage environment is beneficial because it helps reduce the impact of leakage and enhances the overall volumetric efficiency of the pump system.
基金supported by the National Natural Science Foundation of China(Nos.52272290,21972030,52073119,and 52373210)the Natural Science Foundation of Jilin Province(No.20230101029JC)+1 种基金the Fundamental Research Program of Shanxi Province(No.202303021212159)the Monash University Malaysia–ASEAN grant(No.ASE-000010)。
文摘Environmental catalysis has been considered one of the important research topics.Some technologies(e.g.,photocatalysis and electrocatalysis)have been intensively developed with the advance of synthetic technologies of catalytical materials.In 2019,we discussed the development trend of this field,and wrote a roadmap on this topic in Chinese Chemical Letters(30(2019)2065-2088).Nowadays,we discuss it again from a new viewpoint along this road.In this paper,several subtopics are discussed,e.g.,photocatalysis based on titanium dioxide,violet phosphorus,graphitic carbon and covalent organic frameworks,electrocatalysts based on carbon,metal-and covalent-organic framework.Finally,we hope that this roadmap can enrich the development of two-dimensional materials in environmental catalysis with novel understanding,and give useful inspiration to explore new catalysts for practical applications.
基金supported by the Key Project of the National Natural Science Foundation of China(Grant No.U1809210)the International Science Technology Cooperation Program of China(Grant No.2014DFR51160)+3 种基金the One Belt and One Road International Cooperation Project from the Key Research and Development Program of Zhejiang Province,China(Grant No.2018C04021)the National Natural Science Foundation of China(Grant Nos.50972129,50602039,and 52102052)the Fund from Institute of Wenzhou,Zhejiang University(Grant Nos.XMGL-CX-202305 and XMGLKJZX-202307)the Project from Tanghe Scientific&Technology Company(Grant No.KYY-HX-20230024).
文摘It is a key challenge to prepare two-dimensional diamond(2D-diamond).Herein,we develop a method for synthesizing 2D-diamond by depositing monodisperse tantalum(Ta)atoms onto graphene substrates using a hot-filament chemical vapor deposition setup,followed by annealing treatment under different temperatures at ambient pressure.The results indicate that when the annealing temperature increases from 700℃ to 1000℃,the size of the 2D-diamond found in the samples gradually increases from close to 20 nm to around 30 nm.Meanwhile,the size and number of amorphous carbon spheres and Ta-containing compounds between the graphene layers gradually increase.As the annealing temperature continues to rise to 1100℃,a significant aggregation of Ta-containing compounds is observed in the samples,with no diamond structure detected.This further confirms that monodisperse Ta atoms play a key role in graphene phase transition into 2D-diamond.This study provides a novel method for the ambient-pressure phase transition of graphene into 2D-diamond.
基金funded and supported by the UCSI University Research Excellence&Innovation Grant(REIG),REIG-ICSDI-2024/044.
文摘In the rapidly evolving landscape of intelligent transportation systems,the security and authenticity of vehicular communication have emerged as critical challenges.As vehicles become increasingly interconnected,the need for robust authentication mechanisms to safeguard against cyber threats and ensure trust in an autonomous ecosystem becomes essential.On the other hand,using intelligence in the authentication system is a significant attraction.While existing surveys broadly address vehicular security,a critical gap remains in the systematic exploration of Deep Learning(DL)-based authentication methods tailored to these communication paradigms.This survey fills that gap by offering a comprehensive analysis of DL techniques—including supervised,unsupervised,reinforcement,and hybrid learning—for vehicular authentication.This survey highlights novel contributions,such as a taxonomy of DL-driven authentication protocols,real-world case studies,and a critical evaluation of scalability and privacy-preserving techniques.Additionally,this paper identifies unresolved challenges,such as adversarial resilience and real-time processing constraints,and proposes actionable future directions,including lightweight model optimization and blockchain integration.By grounding the discussion in concrete applications,such as biometric authentication for driver safety and adaptive key management for infrastructure security,this survey bridges theoretical advancements with practical deployment needs,offering a roadmap for next-generation secure intelligent vehicular ecosystems for the modern world.