Article
Engineering, Electrical & Electronic
Xinyin Xiang, Jin Cao
Summary: Smart grid integrates information and communication technology with traditional grid architecture to enhance efficiency and reliability of power systems. A secure authentication method is essential to prevent data tampering in smart grid communications. The proposed AKA scheme in this paper supports privacy preservation and enables secure communication between SG devices and service providers.
ELECTRIC POWER SYSTEMS RESEARCH
(2022)
Article
Computer Science, Information Systems
Ashish Tomar, Sachin Tripathi
Summary: Research on integrating fog computing with blockchain to address latency, single point of failure, and centralization has been expanding, with limited focus on authentication and key establishment for blockchain-based smart grid under fog environment. This paper introduces a mutual authentication and key agreement scheme for blockchain-based smart grid environment, reducing dependency on single trusted authorities and establishing secure shared keys among smart meter, fog node, and cloud server for message confidentiality. Evaluations using hyperledger fabric and cryptographic libraries show the proposed scheme to be efficient in computational and communication costs, meeting predefined security goals.
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Venkatasamy Sureshkumar, S. Mugunthan, Ruhul Amin
Summary: Vehicle-to-Grid (V2G) is the convergence of smart grid, electric vehicle, and information and communication technology, enabling communication between the smart grid and electric vehicles to provide various services. Researchers are addressing the challenge of communication security in the V2G environment and proposing new communication architectures and authentication protocols.
PEER-TO-PEER NETWORKING AND APPLICATIONS
(2022)
Article
Computer Science, Information Systems
Egide Nkurunziza, Tandoh Lawrence, Elfadul Issameldeen, Gervais Mwitende
Summary: The smart grid is a significant IoT application involving various smart devices. Existing security protocols are mostly homogeneous and centralized, posing vulnerabilities. To address this, an authentication protocol for the smart grid using blockchain technology is designed, offering decentralized, lightweight, and SM-compatible solutions.
COMPUTER COMMUNICATIONS
(2023)
Article
Automation & Control Systems
Xiaohan Hao, Wei Ren, Kim-Kwang Raymond Choo, Naixue Xiong
Summary: “The increasing volume of user and household data and number of smart meters pose challenges to ensuring efficiency and privacy protection in electricity trading. This article introduces a new architecture for smart meters, utilizing blockchain-based wallets for transactions and smart contracts for transmission switch instructions. The proposed scheme includes a decentralized peer-to-peer electricity trading scheme and a blockchain-based anonymous authentication scheme to achieve automated electricity transmission and privacy protection.”
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
(2022)
Article
Computer Science, Hardware & Architecture
Yulei Chen, Jianhua Chen
Summary: This study introduces a new authentication protocol for e-Health clouds, which has stronger security and performance compared to previous protocols. It can resist various attacks, provide user anonymity and untraceability.
JOURNAL OF SUPERCOMPUTING
(2021)
Article
Computer Science, Information Systems
Liping Zhang, Yue Zhu, Wei Ren, Yinghan Wang, Kim-Kwang Raymond Choo, Neal N. Xiong
Summary: Existing authentication schemes for electric vehicle charging face limitations such as lack of anonymity and failure to consider charging peaks, resulting in potential inability to meet low energy consumption requirements in smart grid environments. To address these limitations, an efficient Chebyshev polynomials algorithm has been proposed, leading to the construction of an energy-efficient authentication and key negotiation scheme for smart grid environments.
IEEE INTERNET OF THINGS JOURNAL
(2021)
Article
Computer Science, Information Systems
Venkatasamy Sureshkumar, S. Anandhi, Ruhul Amin, N. Selvarajan, R. Madhumathi
Summary: This article explores the importance of smart grid in the Internet of Things and the security issues in its communication system, proposing a mutually authenticated key establishment protocol to ensure the communication security between the service provider and smart meters.
IEEE SYSTEMS JOURNAL
(2021)
Article
Engineering, Electrical & Electronic
Shafiq Ahmed, Salman Shamshad, Zahid Ghaffar, Khalid Mahmood, Neeraj Kumar, Reza M. Parizi, Kim-Kwang Raymond Choo
Summary: The paper introduces a robust authentication protocol for Vehicle-to-Grid (V2G) communication, utilizing lightweight and secure cryptographic primitives. The introduced framework shows resilience against known security attacks, and the performance analysis demonstrates its efficiency and reliability compared to related protocols, despite slightly higher energy and computation costs.
IEEE TRANSACTIONS ON SMART GRID
(2021)
Article
Computer Science, Information Systems
Seyed Hamid Baghestani, Farokhlagha Moazami, Mahdi Tahavori
Summary: This article discusses the research in the field of smart grid, focusing on the security of data transfer in smart grids and the existing protocol's limitations. The authors propose a lightweight authentication and key agreement protocol based on elliptic curve cryptography and demonstrate its security and efficiency.
IEEE SYSTEMS JOURNAL
(2022)
Article
Computer Science, Artificial Intelligence
Thokozani Felix Vallent, Damien Hanyurwimfura, Hyunsung Kim, Chomora Mikeka
Summary: This paper proposes a novel authenticated key agreement scheme with anonymity based on widely acceptable elliptic curve cryptography. The scheme ensures optimal computation and communication overload while achieving mutual authentication and anonymity. It satisfies the standard and extended security requirements and has advantages over related schemes.
JOURNAL OF INTELLIGENT & FUZZY SYSTEMS
(2022)
Article
Computer Science, Theory & Methods
Qing Yang, Xiaoqian Zhu, Xiaoliang Wang, Junjie Fu, Jing Zheng, Yuzhen Liu
Summary: This paper proposes a mutual anonymous authentication and key agreement scheme based on an elliptic curve for the vehicular ad-hoc networks to enable vehicles to quickly join the network. The scheme divides identity authentication into initial authentication and subsequent authentication, and ensures the confidentiality of communication data using lightweight operations and the elliptic curve discrete logarithm problem. The security of the scheme is also analyzed and verified, and performance analysis demonstrates its superiority.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2023)
Article
Computer Science, Information Systems
Shouqin Lu, Xiangxue Li
Summary: A microgrid is a flexible and localized grid that can operate independently or in coordination with the main grid. Privacy and security of user information and energy usage are important considerations. A quantum-resistant lightweight authentication and key agreement protocol based on fog computing is proposed, providing mutual authentication and session key generation while being able to resist quantum computing attacks.
Article
Green & Sustainable Science & Technology
Baijie Zhao, Siming Zeng, Haiyan Feng, Ze Chen, Zhihui Wang, Jingjing Yang, Jianli Zhao
Summary: A Cloud-assisted Authenticated Key Agreement Protocol (CAAKA) for smart devices is proposed in this paper based on ECDH, which shows high safety and low resource consumption. The security of the CAAKA protocol is verified using Formal Real-Or-Random (ROR) model and informal methods, while its resource consumption is evaluated based on computation, communication, and memory indicators.
SUSTAINABLE ENERGY TECHNOLOGIES AND ASSESSMENTS
(2021)
Article
Computer Science, Information Systems
Akber Ali Khan, Vinod Kumar, Musheer Ahmad
Summary: Smart grid adjusts power generation by supervising consumer behavior and promoting cultural heritage. Ensuring environmental security and privacy are key concerns in smart systems, with authentication protocols enabling secure communication.
JOURNAL OF KING SAUD UNIVERSITY-COMPUTER AND INFORMATION SCIENCES
(2022)
Article
Automation & Control Systems
Liping Zhang, Yixin Zhang, Shanyu Tang, He Luo
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS
(2018)
Article
Health Care Sciences & Services
Liping Zhang, He Luo, Lanchao Zhao, Yixin Zhang
JOURNAL OF MEDICAL SYSTEMS
(2018)
Article
Computer Science, Information Systems
Liping Zhang, Yue Zhu, Wei Ren, Yixin Zhang, Kim-Kwang Raymond Choo
Summary: E-health systems are important during the COVID-19 pandemic, but ensuring data security is challenging, especially when data comes from insecure devices. This study proposes a lightweight privacy-preserving three-factor authenticated key agreement scheme for resource-constrained e-health systems, with minimal computational cost.
IEEE TRANSACTIONS ON SERVICES COMPUTING
(2023)
Article
Engineering, Geological
Liang-Tong Zhan, Yu-Qing You, Rui Zhao, Cheng Chen, Yun-min Chen
Summary: This study compares the performance of a loess-amended SB wall with a conventional SB wall over a period of 50 years. The results show that the loess-amended SB wall has better control over heavy metal migration compared to the conventional SB wall.
INTERNATIONAL JOURNAL OF PHYSICAL MODELLING IN GEOTECHNICS
(2022)
Editorial Material
Computer Science, Theory & Methods
Kiho Lim, Christian Esposito, Tian Wang, Chang Choi
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Editorial Material
Computer Science, Theory & Methods
Jesus Carretero, Dagmar Krefting
Summary: Computational methods play a crucial role in bioinformatics and biomedicine, especially in managing large-scale data and simulating complex models. This special issue focuses on security and performance aspects in infrastructure, optimization for popular applications, and the integration of machine learning and data processing platforms to improve the efficiency and accuracy of bioinformatics.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Renhao Lu, Weizhe Zhang, Qiong Li, Hui He, Xiaoxiong Zhong, Hongwei Yang, Desheng Wang, Zenglin Xu, Mamoun Alazab
Summary: Federated Learning allows collaborative training of AI models with local data, and our proposed FedAAM scheme improves convergence speed and training efficiency through an adaptive weight allocation strategy and asynchronous global update rules.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Qiangqiang Jiang, Xu Xin, Libo Yao, Bo Chen
Summary: This paper proposes a multi-objective energy-efficient task scheduling technique (METSM) for edge heterogeneous multiprocessor systems. A mathematical model is established for the task scheduling problem, and a problem-specific algorithm (IMO) is designed for optimizing task scheduling and resource allocation. Experimental results show that the proposed algorithm can achieve optimal Pareto fronts and significantly save time and power consumption.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Editorial Material
Computer Science, Theory & Methods
Weimin Li, Lu Liu, Kevin I. K. Wang, Qun Jin
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Mohammed Riyadh Abdmeziem, Amina Ahmed Nacer, Nawfel Moundji Deroues
Summary: Internet of Things (IoT) devices have become ubiquitous and brought the need for group communications. However, security in group communications is challenging due to the asynchronous nature of IoT devices. This paper introduces an innovative approach using blockchain technology and smart contracts to ensure secure and scalable group communications.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Robert Sajina, Nikola Tankovic, Ivo Ipsic
Summary: This paper presents and evaluates a novel approach that utilizes an encoder-only transformer model to enable collaboration between agents learning two distinct NLP tasks. The evaluation results demonstrate that collaboration among agents, even when working towards separate objectives, can result in mutual benefits.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Hebert Cabane, Kleinner Farias
Summary: Event-driven architecture has been widely adopted in the software industry for its benefits in software modularity and performance. However, there is a lack of empirical evidence to support its impact on performance. This study compares the performance of an event-driven application with a monolithic application and finds that the monolithic architecture consumes fewer computational resources and has better response times.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Haroon Wahab, Irfan Mehmood, Hassan Ugail, Javier Del Ser, Khan Muhammad
Summary: Wireless capsule endoscopy (WCE) is a revolutionary diagnostic method for small bowel pathology. However, the manual analysis of WCE videos is cumbersome and the privacy concerns of WCE data hinder the adoption of AI-based diagnoses. This study proposes a federated learning framework for collaborative learning from multiple data centers, demonstrating improved anomaly classification performance while preserving data privacy.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Maruf Monem, Md Tamjid Hossain, Md. Golam Rabiul Alam, Md. Shirajum Munir, Md. Mahbubur Rahman, Salman A. AlQahtani, Samah Almutlaq, Mohammad Mehedi Hassan
Summary: Bitcoin, the largest cryptocurrency, faces challenges in broader adaption due to long verification times and high transaction fees. To tackle these issues, researchers propose a learning framework that uses machine learning to predict the ideal block size in each block generation cycle. This model significantly improves the block size, transaction fees, and transaction approval rate of Bitcoin, addressing the long wait time and broader adaption problem.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Rafael Duque, Crescencio Bravo, Santos Bringas, Daniel Postigo
Summary: This paper introduces the importance of user interfaces for digital twins and presents a technique called ADD for modeling requirements of Human-DT interaction. A study is conducted to assess the feasibility and utility of ADD in designing user interfaces, using the virtualization of a natural space as a case study.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Xiulin Li, Li Pan, Wei Song, Shijun Liu, Xiangxu Meng
Summary: This article proposes a novel multiclass multi-pool analytical model for optimizing the quality of composite service applications deployed in the cloud. By considering embarrassingly parallel services and using differentiated parallel processing mechanisms, the model provides accurate prediction results and significantly reduces job response time.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Seongwan Park, Woojin Jeong, Yunyoung Lee, Bumho Son, Huisu Jang, Jaewook Lee
Summary: In this paper, a novel MEV detection model called ArbiNet is proposed, which offers a low-cost and accurate solution for MEV detection without requiring knowledge of smart contract code or ABIs.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Sacheendra Talluri, Nikolas Herbst, Cristina Abad, Tiziano De Matteis, Alexandru Iosup
Summary: Serverless computing is increasingly used in data-processing applications. This paper presents ExDe, a framework for systematically exploring the design space of scheduling architectures and mechanisms, to help system designers tackle complexity.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)
Article
Computer Science, Theory & Methods
Chao Wang, Hui Xia, Shuo Xu, Hao Chi, Rui Zhang, Chunqiang Hu
Summary: This paper introduces a Federated Learning framework called FedBnR to address the issue of potential data heterogeneity in distributed entities. By breaking up the original task into multiple subtasks and reconstructing the representation using feature extractors, the framework improves the learning performance on heterogeneous datasets.
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE
(2024)