Voici notre dernière sélection de publications et de brevets mondiaux en anglais sur la sécurité de l'information (InfoSec), parmi de nombreuses revues scientifiques en ligne, classées et axées sur la sécurité de l'information, infosec, ransomware, authentification, phishing, malware, firewall, cryptage, détection d'intrusion, prévention d'intrusion, zero-day exploit, authentification multifactorielle, clé publique, clé privée, contrôle d'accès, déni de service, ingénierie sociale, sensibilisation à la sécurité, cryptage, triade de la CIA, antivirus et cryptogramme.
Blockchain-Based, Dynamic Attribute-Based Access Control for Smart Home Energy Systems
Published on 2025-04-11 by Urooj Waheed, Sadiq Ali Khan, Muhammad Masud, Huma Jamshed, Touqeer Ahmed Jumani, Najeeb Ur Rehman Malik @MDPI
Abstract: The adoption of the Internet of Things (IoT) in smart household energy systems offers new opportunities for efficiency and automation, while also posing substantial security challenges. These systems utilize diverse standards and protocols to autonomously access, collect, and share energy-related data over distributed networks. However, this interconnectivity increases their vulnerability to cyber threats, making the system vulnerable to cyber threats. The literature reveals numerous cases of cy[...]
Our summary: The paper proposes a dynamic attribute-based access control model using blockchain to enhance security in smart household energy systems, addressing cyber threats and ensuring efficient access control.
Blockchain-Based, Dynamic Attribute-Based Access Control, Smart Home Energy Systems, IoT
Publication
Zero-Trust Mechanisms for Securing Distributed Edge and Fog Computing in 6G Networks
Published on 2025-04-09 by Abdulrahman K. Alnaim, Ahmed M. Alwakeel @MDPI
Abstract: The rapid advancement in 6G networks, driven by the proliferation of distributed edge and fog computing, has introduced unprecedented challenges in securing these decentralized architectures. Traditional security paradigms are inadequate for protecting the dynamic and heterogeneous environments of 6G-enabled systems. In this context, we propose ZTF-6G (Zero-Trust Framework for 6G Networks), a novel model that integrates Zero-Trust principles to secure distributed edge and fog computing environme[...]
Our summary: Zero-Trust Framework for 6G Networks integrates Zero-Trust principles to secure distributed edge and fog computing environments, ensuring robust security through adaptive authentication, continuous verification, and fine-grained access control. The framework utilizes multi-layering, AI-driven anomaly detection, and blockchain-based identity management to reduce latency, improve throughput, resource utilization, trust score accuracy, energy efficiency, threat detection accuracy, and insider threat mitigation in 6G networks.
Zero-Trust, Edge Computing, Fog Computing, 6G Networks
Publication
Embedding Security Awareness into a Blockchain-Based Dynamic Access Control Framework for the Zero Trust Model in Distributed Systems
Published on 2025-03-11 by Avoy Mohajan, Sharmin Jahan @MDPI
Abstract: The Zero Trust (ZT) model is pivotal in enhancing the security of distributed systems by emphasizing rigorous identity verification, granular access control (AC), and continuous monitoring. To address the complexity and scalability challenges of modern distributed systems, we propose a blockchain-based dynamic access control scheme (DACS) as a practical solution for implementing ZT principles. This framework dynamically manages access control lists (ACLs) and enforces policies through smart cont[...]
Our summary: Enhancing security in distributed systems with a blockchain-based dynamic access control framework that incorporates security awareness for risk assessment and trust evaluation.
blockchain, security awareness, dynamic access control, zero trust
Publication
Takagi–Sugeno–Kang Fuzzy Neural Network for Nonlinear Chaotic Systems and Its Utilization in Secure Medical Image Encryption
Published on 2025-03-11 by Duc Hung Pham, Mai The Vu @MDPI
Abstract: This study introduces a novel control framework based on the Takagi–Sugeno–Kang wavelet fuzzy neural network, integrating brain imitated network and cerebellar network. The proposed controller demonstrates high robustness, making it an excellent candidate for handling intricate nonlinear dynamics, effectively mapping input–output relationships and efficiently learning from data. To enhance its performance, the controller’s parameters are fi[...]
Our summary: Novel control framework based on Takagi-Sugeno-Kang wavelet fuzzy neural network, high robustness, parameters fine-tuned using Lyapunov stability theory, superior learning capabilities and outstanding performance metrics, synchronization technique applied to secure transmission of medical images, experimental results confirm effectiveness and reliability.
Takagi-Sugeno-Kang, Fuzzy Neural Network, Secure Medical Image Encryption, Nonlinear Chaotic Systems
Publication
A Reliable and Privacy-Preserving Framework for Federated Learning-Based IoT Malware Detection
Published on 2025-03-10 by Mohammed Asiri, Maher A. Khemakhem, Reemah M. Alhebshi, Bassma S. Alsulami, Fathy E. Eassa @MDPI
Abstract: The proliferation of Internet of Things (IoT) devices and their vulnerability to malware infections pose critical security challenges in IoT networks and multi-access edge computing (MEC). Traditional federated learning-based IoT malware detection (FL-IMD) methods face limitations in privacy, reliability, and client authentication, necessitating innovative solutions. This study proposes a reliable and privacy-preserving federated learning framework (RPFL) that integrates elliptic curve digital s[...]
Our summary: A study proposes a reliable and privacy-preserving federated learning framework integrating ECDSA, homomorphic encryption, and blockchain technology. Experimental results show RPFL achieves high accuracy in IoT malware detection while enhancing reliability and privacy. RPFL outperforms BCFL in reducing communication costs and latency.
federated learning, IoT malware detection, privacy-preserving framework, reliability
Publication
A High-Entropy True Random Number Generator with Keccak Conditioning for FPGA
Published on 2025-03-08 by Valeria Piscopo, Alessandra Dolmeta, Mattia Mirigaldi, Maurizio Martina, Guido Masera @MDPI
Abstract: Any cryptographic system strongly relies on randomness to ensure robust encryption and masking methods. True Random Number Generators play a fundamental role in this context. The National Institute of Standards and Technology (NIST) and the Bundesamt für Sicherheit in der Informationstechnik (BSI) provide guidelines for designing reliable entropy sources to fuel cryptographic Random Bit Generators. This work presents a highly parameterized, open-source implementation of a TRNG based[...]
Our summary: Implementation of a highly parameterized TRNG with optimized Keccak conditioning unit, meeting NIST and BSI guidelines, achieving high min-entropy per bit.
True Random Number Generator, High-Entropy, Keccak Conditioning, FPGA
Publication
Network-independent dynamic encryption
Patent published on the 2025-03-06 in WO under Ref WO2025049427 by CONC3AL INC [US] (Ilic Igor [us], Quinn Cary [us], Chase Charles [us], Nastasi Franklin [us])
Abstract: A computer-implemented method to improve the safety of digital documents and assets, including for example digital tickets, may include the steps of: generating a salt/public key by obtaining a longitude and latitude of an event attendee smart device GPS chip and obtaining a time stamp from the smart device operating system; creating a static and unique ID; creating a data carrier/glyph/code, such creating a new quick response code, in intervals using data to be rehashed comprising the unique ID[...]
Our summary: A method for enhancing digital document safety by generating unique IDs and using GPS data to create dynamic encryption codes for validation.
dynamic encryption, digital documents, GPS chip, quick response code
Patent
Audible indicator for access control systems
Patent published on the 2025-03-06 in WO under Ref WO2025050116 by SCHLAGE LOCK COMPANY LLC [US] (Palmer Phillip [us], Stalter John [us], Nagaraju Naveena [in], Lehner Jack [us], Roberts Rockwood [us])
Abstract: A motor assembly is provided that includes an audible indicator for an access control device for a door, such as an exit device or an auto-operator. The audible indicator is configured to provide an audible output in response to a signal that initiates operation of the motor to change a state of a latch or open the door.[...]
Our summary: Motor assembly with audible indicator for access control devices, provides audible output in response to signal, changes state of latch or opens door.
audible indicator, access control systems, motor assembly, exit device
Patent