首页 > 最新文献

Internet of Things and Cyber-Physical Systems最新文献

英文 中文
Generative AI in cybersecurity: A comprehensive review of LLM applications and vulnerabilities 网络安全中的生成人工智能:法学硕士应用程序和漏洞的全面审查
Pub Date : 2025-01-01 Epub Date: 2025-02-02 DOI: 10.1016/j.iotcps.2025.01.001
Mohamed Amine Ferrag , Fatima Alwahedi , Ammar Battah , Bilel Cherif , Abdechakour Mechri , Norbert Tihanyi , Tamas Bisztray , Merouane Debbah
This paper provides a comprehensive review of the future of cybersecurity through Generative AI and Large Language Models (LLMs). We explore LLM applications across various domains, including hardware design security, intrusion detection, software engineering, design verification, cyber threat intelligence, malware detection, and phishing detection. We present an overview of LLM evolution and its current state, focusing on advancements in models such as GPT-4, GPT-3.5, Mixtral-8x7B, BERT, Falcon2, and LLaMA. Our analysis extends to LLM vulnerabilities, such as prompt injection, insecure output handling, data poisoning, DDoS attacks, and adversarial instructions. We delve into mitigation strategies to protect these models, providing a comprehensive look at potential attack scenarios and prevention techniques. Furthermore, we evaluate the performance of 42 LLM models in cybersecurity knowledge and hardware security, highlighting their strengths and weaknesses. We thoroughly evaluate cybersecurity datasets for LLM training and testing, covering the lifecycle from data creation to usage and identifying gaps for future research. In addition, we review new strategies for leveraging LLMs, including techniques like Half-Quadratic Quantization (HQQ), Reinforcement Learning with Human Feedback (RLHF), Direct Preference Optimization (DPO), Quantized Low-Rank Adapters (QLoRA), and Retrieval-Augmented Generation (RAG). These insights aim to enhance real-time cybersecurity defenses and improve the sophistication of LLM applications in threat detection and response. Our paper provides a foundational understanding and strategic direction for integrating LLMs into future cybersecurity frameworks, emphasizing innovation and robust model deployment to safeguard against evolving cyber threats.
本文通过生成式人工智能和大型语言模型(llm)对网络安全的未来进行了全面的回顾。我们探索法学硕士在各个领域的应用,包括硬件设计安全、入侵检测、软件工程、设计验证、网络威胁情报、恶意软件检测和网络钓鱼检测。我们概述了LLM的发展及其当前状态,重点介绍了GPT-4、GPT-3.5、Mixtral-8x7B、BERT、Falcon2和LLaMA等模型的进展。我们的分析扩展到LLM漏洞,例如提示注入、不安全的输出处理、数据中毒、DDoS攻击和对抗性指令。我们深入研究了保护这些模型的缓解策略,全面介绍了潜在的攻击场景和预防技术。此外,我们评估了42个LLM模型在网络安全知识和硬件安全方面的性能,突出了它们的优缺点。我们全面评估了LLM培训和测试的网络安全数据集,涵盖了从数据创建到使用的生命周期,并确定了未来研究的差距。此外,我们回顾了利用llm的新策略,包括半二次量化(HQQ)、人类反馈强化学习(RLHF)、直接偏好优化(DPO)、量化低秩适配器(QLoRA)和检索增强生成(RAG)等技术。这些见解旨在增强实时网络安全防御,提高LLM应用程序在威胁检测和响应方面的复杂性。我们的论文为将法学硕士整合到未来的网络安全框架中提供了基本的理解和战略方向,强调了创新和强大的模型部署,以抵御不断变化的网络威胁。
{"title":"Generative AI in cybersecurity: A comprehensive review of LLM applications and vulnerabilities","authors":"Mohamed Amine Ferrag ,&nbsp;Fatima Alwahedi ,&nbsp;Ammar Battah ,&nbsp;Bilel Cherif ,&nbsp;Abdechakour Mechri ,&nbsp;Norbert Tihanyi ,&nbsp;Tamas Bisztray ,&nbsp;Merouane Debbah","doi":"10.1016/j.iotcps.2025.01.001","DOIUrl":"10.1016/j.iotcps.2025.01.001","url":null,"abstract":"<div><div>This paper provides a comprehensive review of the future of cybersecurity through Generative AI and Large Language Models (LLMs). We explore LLM applications across various domains, including hardware design security, intrusion detection, software engineering, design verification, cyber threat intelligence, malware detection, and phishing detection. We present an overview of LLM evolution and its current state, focusing on advancements in models such as GPT-4, GPT-3.5, Mixtral-8x7B, BERT, Falcon2, and LLaMA. Our analysis extends to LLM vulnerabilities, such as prompt injection, insecure output handling, data poisoning, DDoS attacks, and adversarial instructions. We delve into mitigation strategies to protect these models, providing a comprehensive look at potential attack scenarios and prevention techniques. Furthermore, we evaluate the performance of 42 LLM models in cybersecurity knowledge and hardware security, highlighting their strengths and weaknesses. We thoroughly evaluate cybersecurity datasets for LLM training and testing, covering the lifecycle from data creation to usage and identifying gaps for future research. In addition, we review new strategies for leveraging LLMs, including techniques like Half-Quadratic Quantization (HQQ), Reinforcement Learning with Human Feedback (RLHF), Direct Preference Optimization (DPO), Quantized Low-Rank Adapters (QLoRA), and Retrieval-Augmented Generation (RAG). These insights aim to enhance real-time cybersecurity defenses and improve the sophistication of LLM applications in threat detection and response. Our paper provides a foundational understanding and strategic direction for integrating LLMs into future cybersecurity frameworks, emphasizing innovation and robust model deployment to safeguard against evolving cyber threats.</div></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"5 ","pages":"Pages 1-46"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143947102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LoRa for multihop communication in internet of underground things under fading environments 衰落环境下地下物联网多跳通信LoRa
Pub Date : 2025-01-01 Epub Date: 2025-05-25 DOI: 10.1016/j.iotcps.2025.05.001
Irfana Ilyas Jameela Manzil , Ruhul Amin Khalil , Nasir Saeed
This paper investigates the suitability of LoRa wireless technology for reliable underground-to-aboveground communication in the context of sustainable agricultural monitoring. We comprehensively analyze LoRa's performance in single-hop and multi-hop scenarios, considering complex environmental conditions and path loss. Mathematical expressions for the bit error rate (BER) are derived under both additive white Gaussian noise (AWGN) and Rayleigh fading, including multi-hop networks with decode-and-forward relays. Simulations under realistic Rayleigh fading scenarios validate our theoretical models. Our findings demonstrate that multi-hop LoRa networks significantly outperform single-hop systems in challenging underground environments, underscoring LoRa's potential for enhancing sustainability in various subterranean Internet of Underground Things (IoUT) agricultural applications.
本文研究了LoRa无线技术在可持续农业监测背景下的地对地可靠通信的适用性。考虑到复杂的环境条件和路径损失,综合分析了LoRa在单跳和多跳场景下的性能。推导了加性高斯白噪声(AWGN)和瑞利衰落下的误码率(BER)的数学表达式,包括带有译码转发中继的多跳网络。在实际瑞利衰落场景下的仿真验证了我们的理论模型。我们的研究结果表明,在具有挑战性的地下环境中,多跳LoRa网络明显优于单跳系统,强调了LoRa在各种地下物联网(IoUT)农业应用中提高可持续性的潜力。
{"title":"LoRa for multihop communication in internet of underground things under fading environments","authors":"Irfana Ilyas Jameela Manzil ,&nbsp;Ruhul Amin Khalil ,&nbsp;Nasir Saeed","doi":"10.1016/j.iotcps.2025.05.001","DOIUrl":"10.1016/j.iotcps.2025.05.001","url":null,"abstract":"<div><div>This paper investigates the suitability of LoRa wireless technology for reliable underground-to-aboveground communication in the context of sustainable agricultural monitoring. We comprehensively analyze LoRa's performance in single-hop and multi-hop scenarios, considering complex environmental conditions and path loss. Mathematical expressions for the bit error rate (BER) are derived under both additive white Gaussian noise (AWGN) and Rayleigh fading, including multi-hop networks with decode-and-forward relays. Simulations under realistic Rayleigh fading scenarios validate our theoretical models. Our findings demonstrate that multi-hop LoRa networks significantly outperform single-hop systems in challenging underground environments, underscoring LoRa's potential for enhancing sustainability in various subterranean Internet of Underground Things (IoUT) agricultural applications.</div></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"5 ","pages":"Pages 87-94"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144205480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AOA-SMA-EGRUAttNet: A hybrid feature selection and dual-stream attention-based intrusion detection framework for IIoT systems 面向工业物联网系统的混合特征选择和基于双流注意力的入侵检测框架
Pub Date : 2025-01-01 Epub Date: 2026-03-11 DOI: 10.1016/j.iotcps.2026.03.002
Yousef Sanjalawe , Salam Fraihat , Salam Al-E'mari , Sharif Naser Makhadmeh
The rapid expansion of the Industrial Internet of Things (IIoT) has introduced unprecedented opportunities for smart industrial automation. Yet, it also exposes critical systems to various sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) often struggle with the complexity, heterogeneity, and class imbalance inherent in IIoT environments, leading to high false alarm rates and suboptimal generalization. This paper addresses these limitations by proposing a novel hybrid intrusion detection framework, AOA-SMA-EGRUAttNet, that unites advanced feature selection and dual-stream deep learning to enhance detection accuracy and interpretability. The core motivation is to improve the computational efficiency and classification robustness of IDS models through targeted dimensionality reduction and context-aware temporal learning. The framework integrates the Archimedes Optimization Algorithm (AOA) and Slime Mould Algorithm (SMA) for hybrid feature selection, optimizing subsets based on classification relevance, redundancy, and processing cost. Selected features are fed into the Enhanced GRU-Attention Network (E-GRUAttNet), a lightweight dual-stream model combining gated recurrent units and parallel attention mechanisms. Experimental evaluation across four benchmark IIoT datasets: CICAPT-IIoT, Edge-IIoTset, X-IIoTID, and WUSTL-IIoT-2021, demonstrates that the proposed method consistently outperforms state-of-the-art baselines in accuracy (up to 98.9%) and macro-F1 score, while achieving over 55% feature reduction. Ablation studies and statistical analyses confirm the significance and robustness of each component. This paper contributes a scalable and interpretable IDS architecture that meets the evolving demands of industrial cybersecurity, providing a strong foundation for future adaptive detection systems in critical infrastructures.
工业物联网(IIoT)的快速发展为智能工业自动化带来了前所未有的机遇。然而,它也将关键系统暴露在各种复杂的网络威胁之下。传统的入侵检测系统(IDS)经常与工业物联网环境中固有的复杂性、异质性和类不平衡作斗争,导致高误报率和次优泛化。本文通过提出一种新的混合入侵检测框架AOA-SMA-EGRUAttNet来解决这些限制,该框架结合了先进的特征选择和双流深度学习来提高检测的准确性和可解释性。其核心动机是通过目标降维和上下文感知时态学习来提高IDS模型的计算效率和分类鲁棒性。该框架集成了阿基米德优化算法(AOA)和黏菌算法(SMA),用于混合特征选择,基于分类相关性、冗余度和处理成本优化子集。选择的特征被馈送到增强型GRU-Attention Network (E-GRUAttNet)中,这是一种轻量级的双流模型,结合了门控循环单元和并行注意机制。在四个基准IIoT数据集(CICAPT-IIoT、Edge-IIoTset、X-IIoTID和WUSTL-IIoT-2021)上进行的实验评估表明,所提出的方法在准确率(高达98.9%)和宏观f1分数方面始终优于最先进的基线,同时实现了55%以上的特征减少。消融研究和统计分析证实了每个组成部分的显著性和稳健性。本文提供了一个可扩展和可解释的IDS架构,满足工业网络安全不断发展的需求,为未来关键基础设施中的自适应检测系统提供了坚实的基础。
{"title":"AOA-SMA-EGRUAttNet: A hybrid feature selection and dual-stream attention-based intrusion detection framework for IIoT systems","authors":"Yousef Sanjalawe ,&nbsp;Salam Fraihat ,&nbsp;Salam Al-E'mari ,&nbsp;Sharif Naser Makhadmeh","doi":"10.1016/j.iotcps.2026.03.002","DOIUrl":"10.1016/j.iotcps.2026.03.002","url":null,"abstract":"<div><div>The rapid expansion of the Industrial Internet of Things (IIoT) has introduced unprecedented opportunities for smart industrial automation. Yet, it also exposes critical systems to various sophisticated cyber threats. Traditional Intrusion Detection Systems (IDS) often struggle with the complexity, heterogeneity, and class imbalance inherent in IIoT environments, leading to high false alarm rates and suboptimal generalization. This paper addresses these limitations by proposing a novel hybrid intrusion detection framework, AOA-SMA-EGRUAttNet, that unites advanced feature selection and dual-stream deep learning to enhance detection accuracy and interpretability. The core motivation is to improve the computational efficiency and classification robustness of IDS models through targeted dimensionality reduction and context-aware temporal learning. The framework integrates the Archimedes Optimization Algorithm (AOA) and Slime Mould Algorithm (SMA) for hybrid feature selection, optimizing subsets based on classification relevance, redundancy, and processing cost. Selected features are fed into the Enhanced GRU-Attention Network (E-GRUAttNet), a lightweight dual-stream model combining gated recurrent units and parallel attention mechanisms. Experimental evaluation across four benchmark IIoT datasets: CICAPT-IIoT, Edge-IIoTset, X-IIoTID, and WUSTL-IIoT-2021, demonstrates that the proposed method consistently outperforms state-of-the-art baselines in accuracy (up to 98.9%) and macro-F1 score, while achieving over 55% feature reduction. Ablation studies and statistical analyses confirm the significance and robustness of each component. This paper contributes a scalable and interpretable IDS architecture that meets the evolving demands of industrial cybersecurity, providing a strong foundation for future adaptive detection systems in critical infrastructures.</div></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"5 ","pages":"Pages 143-164"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147449042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advanced Machine Learning in Smart Grids: An overview 智能电网中的高级机器学习:概述
Pub Date : 2025-01-01 Epub Date: 2025-05-19 DOI: 10.1016/j.iotcps.2025.05.002
Hassan N. Noura , Jean Paul A. Yaacoub , Ola Salman , Ali Chehab
Adopting Advanced Machine Learning for Smart Grids (ML-SG) is a promising strategy that revolutionizes the energy industry to optimize energy usage, improve grid management, and foster sustainability. It also increases the efficiency, reliability, and sustainability of contemporary power systems. Furthermore, incorporating machine learning into smart grids has important practical ramifications and can help address some of the most pressing issues facing contemporary energy systems. By precisely forecasting consumption trends and facilitating dynamic pricing models that take into account current grid circumstances, Machine Learning (ML) can improve demand response tactics. Additionally, it is essential for preserving grid stability since it can promptly identify irregularities and react to system oscillations, preventing blackouts and equipment failures. Furthermore, through supply and demand balance, energy dispatch optimization, and solar and wind power forecasts, ML makes it easier to seamlessly integrate renewable energy sources. These characteristics facilitate the shift to a more robust, adaptable, and ecologically friendly energy infrastructure in addition to increasing operating efficiency. In this paper, we investigate the development of ML solutions that benefit from the enormous amounts of data generated by IoT devices in the smart grid. Furthermore, this study examines the benefits and drawbacks of the adoption of ML-SG and offers an outline of their use while highlighting the implications of integrating ML into smart grids. In addition, it explores and analyzes how ML algorithms can be used for load forecasting and enabling accurate and real-time decision making in smart grids. The objective of this work is to analyze smart grid operations at different levels, such as predicting energy demand, identifying abnormalities, and reducing cybersecurity threats by using sophisticated ML-based algorithms, especially discussing attacks and countermeasures against these ML models. This work concludes with suggestions and recommendations that highlight the importance of improving the security and accuracy of ML-SG, while shedding some light on future directions. In the future, this work aims to contribute to the development of efficient ML solutions for energy infrastructure to become more effective and sustainable, by discussing data science and ML issues related to smart grids.
采用先进的机器学习智能电网(ML-SG)是一项有前途的战略,它将彻底改变能源行业,优化能源使用,改善电网管理,促进可持续性。它还提高了当代电力系统的效率、可靠性和可持续性。此外,将机器学习纳入智能电网具有重要的实际影响,可以帮助解决当代能源系统面临的一些最紧迫的问题。通过精确预测消费趋势和促进考虑到当前电网环境的动态定价模型,机器学习(ML)可以改进需求响应策略。此外,它对于保持电网稳定性至关重要,因为它可以及时识别异常并对系统振荡做出反应,防止停电和设备故障。此外,通过供需平衡、能源调度优化以及太阳能和风能预测,ML使可再生能源的无缝整合变得更加容易。除了提高运营效率外,这些特点还有助于向更强大、适应性更强、更环保的能源基础设施转变。在本文中,我们研究了机器学习解决方案的开发,这些解决方案受益于智能电网中物联网设备生成的大量数据。此外,本研究考察了采用ML- sg的优点和缺点,并概述了其使用情况,同时强调了将ML集成到智能电网中的影响。此外,它还探讨和分析了机器学习算法如何用于负荷预测,并在智能电网中实现准确和实时的决策。这项工作的目标是分析不同层次的智能电网运行,例如预测能源需求,识别异常,并通过使用复杂的基于ML的算法减少网络安全威胁,特别是讨论针对这些ML模型的攻击和对策。本工作总结了建议和建议,强调了提高ML-SG的安全性和准确性的重要性,同时对未来的发展方向提出了一些建议。在未来,这项工作旨在通过讨论与智能电网相关的数据科学和机器学习问题,为能源基础设施开发高效的机器学习解决方案做出贡献,使其变得更加有效和可持续。
{"title":"Advanced Machine Learning in Smart Grids: An overview","authors":"Hassan N. Noura ,&nbsp;Jean Paul A. Yaacoub ,&nbsp;Ola Salman ,&nbsp;Ali Chehab","doi":"10.1016/j.iotcps.2025.05.002","DOIUrl":"10.1016/j.iotcps.2025.05.002","url":null,"abstract":"<div><div>Adopting Advanced Machine Learning for Smart Grids (ML-SG) is a promising strategy that revolutionizes the energy industry to optimize energy usage, improve grid management, and foster sustainability. It also increases the efficiency, reliability, and sustainability of contemporary power systems. Furthermore, incorporating machine learning into smart grids has important practical ramifications and can help address some of the most pressing issues facing contemporary energy systems. By precisely forecasting consumption trends and facilitating dynamic pricing models that take into account current grid circumstances, Machine Learning (ML) can improve demand response tactics. Additionally, it is essential for preserving grid stability since it can promptly identify irregularities and react to system oscillations, preventing blackouts and equipment failures. Furthermore, through supply and demand balance, energy dispatch optimization, and solar and wind power forecasts, ML makes it easier to seamlessly integrate renewable energy sources. These characteristics facilitate the shift to a more robust, adaptable, and ecologically friendly energy infrastructure in addition to increasing operating efficiency. In this paper, we investigate the development of ML solutions that benefit from the enormous amounts of data generated by IoT devices in the smart grid. Furthermore, this study examines the benefits and drawbacks of the adoption of ML-SG and offers an outline of their use while highlighting the implications of integrating ML into smart grids. In addition, it explores and analyzes how ML algorithms can be used for load forecasting and enabling accurate and real-time decision making in smart grids. The objective of this work is to analyze smart grid operations at different levels, such as predicting energy demand, identifying abnormalities, and reducing cybersecurity threats by using sophisticated ML-based algorithms, especially discussing attacks and countermeasures against these ML models. This work concludes with suggestions and recommendations that highlight the importance of improving the security and accuracy of ML-SG, while shedding some light on future directions. In the future, this work aims to contribute to the development of efficient ML solutions for energy infrastructure to become more effective and sustainable, by discussing data science and ML issues related to smart grids.</div></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"5 ","pages":"Pages 95-142"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144205481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
UMetaBE-DPPML: Urban metaverse & blockchain-enabled decentralised privacy-preserving machine learning verification and authentication with metaverse immersive devices UMetaBE-DPPML:支持城市元世界和区块链的去中心化保护隐私的机器学习验证和元世界沉浸式设备认证
Pub Date : 2025-01-01 Epub Date: 2025-03-06 DOI: 10.1016/j.iotcps.2025.02.001
Kaya Kuru, Kaan Kuru
It is anticipated that cybercrime activities will be widespread in the urban metaverse ecosystem due to its high economic value with new types of assets and its immersive nature with a variety of experiences. Ensuring reliable urban metaverse cyberspaces requires addressing two critical challenges, namely, cybersecurity and privacy protection. This study, by analysing potential cyberthreats in the urban metaverse cyberspaces, proposes a blockchain-based Decentralised Privacy-Preserving Machine Learning (DPPML) authentication and verification methodology, which uses the metaverse immersive devices and can be instrumented effectively against identity impersonation and theft of credentials, identity, or avatars. Blockchain technology and Federated Learning (FL) are merged in the developed DPPML approach not only to eliminate the requirement of a trusted third party for the verification of the authenticity of transactions and immersive actions, but also, to avoid Single Point of Failure (SPoF) and Generative Adversarial Networks (GAN) attacks by detecting malicious nodes. The developed methodology has been tested using Motion Capture Suits (MoCaps) in a co-simulation environment with the Proof-of-Work (PoW) consensus mechanism. The preliminary results suggest that the built techniques in the DPPML approach can prevent unreal transactions, impersonation, identity theft, and theft of credentials or avatars promptly before any transactions have been executed or immersive experiences have been shared with others. The proposed system will be tested with a larger number of nodes involving the Proof-of-Stake (PoS) consensus mechanism using several other metaverse immersive devices as a future job.
预计网络犯罪活动将在城市虚拟生态系统中广泛存在,因为它具有新型资产的高经济价值和各种体验的沉浸性。确保可靠的城市元宇宙网络空间需要解决两个关键挑战,即网络安全和隐私保护。本研究通过分析城市元宇宙网络空间中的潜在网络威胁,提出了一种基于区块链的去中心化隐私保护机器学习(DPPML)身份验证和验证方法,该方法使用元宇宙沉浸式设备,可以有效地防止身份冒充和盗窃凭证、身份或化身。区块链技术和联邦学习(FL)被合并到开发的DPPML方法中,不仅消除了对可信第三方验证交易和沉浸式操作真实性的要求,而且还通过检测恶意节点来避免单点故障(SPoF)和生成对抗网络(GAN)攻击。开发的方法已在具有工作量证明(PoW)共识机制的联合模拟环境中使用动作捕捉套装(MoCaps)进行了测试。初步结果表明,DPPML方法中的构建技术可以在执行任何事务或与其他人共享沉浸式体验之前及时防止不真实的事务、冒充、身份盗窃以及凭证或虚拟身份的盗窃。提议的系统将在涉及权益证明(PoS)共识机制的更多节点上进行测试,使用其他几个元世界沉浸式设备作为未来的工作。
{"title":"UMetaBE-DPPML: Urban metaverse & blockchain-enabled decentralised privacy-preserving machine learning verification and authentication with metaverse immersive devices","authors":"Kaya Kuru,&nbsp;Kaan Kuru","doi":"10.1016/j.iotcps.2025.02.001","DOIUrl":"10.1016/j.iotcps.2025.02.001","url":null,"abstract":"<div><div>It is anticipated that cybercrime activities will be widespread in the urban metaverse ecosystem due to its high economic value with new types of assets and its immersive nature with a variety of experiences. Ensuring reliable urban metaverse cyberspaces requires addressing two critical challenges, namely, cybersecurity and privacy protection. This study, by analysing potential cyberthreats in the urban metaverse cyberspaces, proposes a blockchain-based Decentralised Privacy-Preserving Machine Learning (DPPML) authentication and verification methodology, which uses the metaverse immersive devices and can be instrumented effectively against identity impersonation and theft of credentials, identity, or avatars. Blockchain technology and Federated Learning (FL) are merged in the developed DPPML approach not only to eliminate the requirement of a trusted third party for the verification of the authenticity of transactions and immersive actions, but also, to avoid Single Point of Failure (SPoF) and Generative Adversarial Networks (GAN) attacks by detecting malicious nodes. The developed methodology has been tested using Motion Capture Suits (MoCaps) in a co-simulation environment with the Proof-of-Work (PoW) consensus mechanism. The preliminary results suggest that the built techniques in the DPPML approach can prevent unreal transactions, impersonation, identity theft, and theft of credentials or avatars promptly before any transactions have been executed or immersive experiences have been shared with others. The proposed system will be tested with a larger number of nodes involving the Proof-of-Stake (PoS) consensus mechanism using several other metaverse immersive devices as a future job.</div></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"5 ","pages":"Pages 47-86"},"PeriodicalIF":0.0,"publicationDate":"2025-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144099446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-work conserving dynamic scheduling of moldable gang tasks on multicore systems 多核系统上可成型团伙任务的非工作保护动态调度
Pub Date : 2024-03-01 DOI: 10.1016/j.iotcps.2024.03.001
Tomoki Shimizu, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama
{"title":"Non-work conserving dynamic scheduling of moldable gang tasks on multicore systems","authors":"Tomoki Shimizu, Hiroki Nishikawa, Xiangbo Kong, Hiroyuki Tomiyama","doi":"10.1016/j.iotcps.2024.03.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2024.03.001","url":null,"abstract":"","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"5 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140270324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructing immersive toy trial experience in mobile augmented reality 在移动增强现实技术中构建身临其境的玩具试用体验
Pub Date : 2024-02-01 DOI: 10.1016/j.iotcps.2024.02.001
Lingxin Yu, Jiacheng Zhang, Xinyue Wang, Siru Chen, Xuehao Qin, Zhifei Ding, Jiahao Han
{"title":"Constructing immersive toy trial experience in mobile augmented reality","authors":"Lingxin Yu, Jiacheng Zhang, Xinyue Wang, Siru Chen, Xuehao Qin, Zhifei Ding, Jiahao Han","doi":"10.1016/j.iotcps.2024.02.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2024.02.001","url":null,"abstract":"","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139891880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review 物联网网络入侵检测的多目标优化算法:系统综述
Pub Date : 2024-02-01 DOI: 10.1016/j.iotcps.2024.01.003
Shubhkirti Sharma, Vijay Kumar, K. Dutta
{"title":"Multi-objective optimization algorithms for intrusion detection in IoT networks: A systematic review","authors":"Shubhkirti Sharma, Vijay Kumar, K. Dutta","doi":"10.1016/j.iotcps.2024.01.003","DOIUrl":"https://doi.org/10.1016/j.iotcps.2024.01.003","url":null,"abstract":"","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139871865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MalAware: A tabletop exercise for malware security awareness education and incident response training 恶意软件:恶意软件安全意识教育和事件响应培训桌面演练
Pub Date : 2024-01-01 Epub Date: 2024-03-13 DOI: 10.1016/j.iotcps.2024.02.003
Giddeon Angafor , Iryna Yevseyeva , Leandros Maglaras

Advancements in technology, including the Internet of Things (IoT) revolution, have enabled individuals and businesses to use systems and devices that connect, exchange data, and provide real-time information from far and near. Despite that, this interconnectivity and data sharing between systems and devices over the internet poses security and privacy risks as threat actors can intercept, steal, and use owners’ data for nefarious purposes. This paper discusses ’MalAware’, a ‘Malware Awareness Education’ and incident response (IR) scenario-based tabletop exercise and card game for malware threat mitigation training. It introduces the importance of incident management, highlights the dangers posed by malware for connected systems, and outlines the role of tabletop games and exercises in helping businesses mature their malware incident response capabilities. The study discusses the design of MalAware and summarises the results of 2 pilots undertaken to assess the concept, maintaining that the results highlighted the value of ‘MalAware’ as an essential tool to help students and staff master how to mitigate security threats caused by malware. It argues that MalAware can assist businesses in their IR preparedness endeavors, enabling incident management teams to review plans and processes to ensure they are fit for purpose. It enables staff to leverage scenario-based and simulated security breach examples, including role-play, to establish appropriate malware defences. MalAware’s practical hands-on exercises can assist trainees in gaining essential malware and other threat mitigation skills, helping to protect the security and privacy of IoTs.

技术的进步,包括物联网(IoT)革命,使个人和企业能够使用连接、交换数据和提供实时信息的系统和设备。尽管如此,系统和设备之间通过互联网实现的互联和数据共享也带来了安全和隐私风险,因为威胁行为者可以拦截、窃取和使用所有者的数据来达到邪恶目的。本文讨论的 "恶意软件 "是一种基于 "恶意软件意识教育 "和事件响应(IR)情景的桌面演练和卡片游戏,用于恶意软件威胁缓解培训。它介绍了事件管理的重要性,强调了恶意软件给联网系统带来的危险,并概述了桌面游戏和演习在帮助企业提高恶意软件事件响应能力方面的作用。该研究讨论了恶意软件的设计,总结了为评估这一概念而进行的两次试点的结果,认为这些结果突出了 "恶意软件 "作为帮助学生和教职员工掌握如何减轻恶意软件造成的安全威胁的重要工具的价值。报告认为,"恶意软件 "可以帮助企业做好爱尔兰共和军的准备工作,使事件管理团队能够审查计划和流程,确保其符合目的。它使员工能够利用基于场景和模拟的安全漏洞实例(包括角色扮演)建立适当的恶意软件防御。MalAware 的实际操作练习可以帮助学员获得基本的恶意软件和其他威胁缓解技能,从而帮助保护物联网的安全和隐私。
{"title":"MalAware: A tabletop exercise for malware security awareness education and incident response training","authors":"Giddeon Angafor ,&nbsp;Iryna Yevseyeva ,&nbsp;Leandros Maglaras","doi":"10.1016/j.iotcps.2024.02.003","DOIUrl":"https://doi.org/10.1016/j.iotcps.2024.02.003","url":null,"abstract":"<div><p>Advancements in technology, including the Internet of Things (IoT) revolution, have enabled individuals and businesses to use systems and devices that connect, exchange data, and provide real-time information from far and near. Despite that, this interconnectivity and data sharing between systems and devices over the internet poses security and privacy risks as threat actors can intercept, steal, and use owners’ data for nefarious purposes. This paper discusses ’MalAware’, a ‘Malware Awareness Education’ and incident response (IR) scenario-based tabletop exercise and card game for malware threat mitigation training. It introduces the importance of incident management, highlights the dangers posed by malware for connected systems, and outlines the role of tabletop games and exercises in helping businesses mature their malware incident response capabilities. The study discusses the design of MalAware and summarises the results of 2 pilots undertaken to assess the concept, maintaining that the results highlighted the value of ‘MalAware’ as an essential tool to help students and staff master how to mitigate security threats caused by malware. It argues that MalAware can assist businesses in their IR preparedness endeavors, enabling incident management teams to review plans and processes to ensure they are fit for purpose. It enables staff to leverage scenario-based and simulated security breach examples, including role-play, to establish appropriate malware defences. MalAware’s practical hands-on exercises can assist trainees in gaining essential malware and other threat mitigation skills, helping to protect the security and privacy of IoTs.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 280-292"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2667345224000063/pdfft?md5=61feca14037fa00f21581df14b5c4571&pid=1-s2.0-S2667345224000063-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140180017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DBSCAN inspired task scheduling algorithm for cloud infrastructure 基于DBSCAN的云基础设施任务调度算法
Pub Date : 2024-01-01 Epub Date: 2023-07-14 DOI: 10.1016/j.iotcps.2023.07.001
S.M.F D Syed Mustapha , Punit Gupta

Cloud computing in today's computing environment plays a vital role, by providing efficient and scalable computation based on pay per use model. To make computing more reliable and efficient, it must be efficient, and high resources utilized. To improve resource utilization and efficiency in cloud, task scheduling and resource allocation plays a critical role. Many researchers have proposed algorithms to maximize the throughput and resource utilization taking into consideration heterogeneous cloud environments. This work proposes an algorithm using DBSCAN (Density-based spatial clustering) for task scheduling to achieve high efficiency. The proposed DBScan-based task scheduling algorithm aims to improve user task quality of service and improve performance in terms of execution time, average start time and finish time. The experiment result shows proposed model outperforms existing ACO and PSO with 13% improvement in execution time, 49% improvement in average start time and average finish time. The experimental results are compared with existing ACO and PSO algorithms for task scheduling.

云计算在当今的计算环境中发挥着至关重要的作用,它提供了基于按次付费模型的高效和可扩展的计算。为了使计算更加可靠和高效,它必须高效,并充分利用资源。为了提高云计算中的资源利用率和效率,任务调度和资源分配起着至关重要的作用。许多研究人员提出了在考虑异构云环境的情况下最大化吞吐量和资源利用率的算法。本文提出了一种使用DBSCAN(基于密度的空间聚类)进行任务调度的算法,以实现高效率。所提出的基于DBScan的任务调度算法旨在提高用户任务的服务质量,并在执行时间、平均开始时间和完成时间方面提高性能。实验结果表明,该模型的执行时间提高了13%,平均开始时间和平均结束时间提高了49%,优于现有的ACO和PSO。将实验结果与现有的ACO算法和PSO算法进行了比较。
{"title":"DBSCAN inspired task scheduling algorithm for cloud infrastructure","authors":"S.M.F D Syed Mustapha ,&nbsp;Punit Gupta","doi":"10.1016/j.iotcps.2023.07.001","DOIUrl":"https://doi.org/10.1016/j.iotcps.2023.07.001","url":null,"abstract":"<div><p>Cloud computing in today's computing environment plays a vital role, by providing efficient and scalable computation based on pay per use model. To make computing more reliable and efficient, it must be efficient, and high resources utilized. To improve resource utilization and efficiency in cloud, task scheduling and resource allocation plays a critical role. Many researchers have proposed algorithms to maximize the throughput and resource utilization taking into consideration heterogeneous cloud environments. This work proposes an algorithm using DBSCAN (Density-based spatial clustering) for task scheduling to achieve high efficiency. The proposed DBScan-based task scheduling algorithm aims to improve user task quality of service and improve performance in terms of execution time, average start time and finish time. The experiment result shows proposed model outperforms existing ACO and PSO with 13% improvement in execution time, 49% improvement in average start time and average finish time. The experimental results are compared with existing ACO and PSO algorithms for task scheduling.</p></div>","PeriodicalId":100724,"journal":{"name":"Internet of Things and Cyber-Physical Systems","volume":"4 ","pages":"Pages 32-39"},"PeriodicalIF":0.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49884562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Internet of Things and Cyber-Physical Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1