Open Access
ARTICLE
Dingwen Wang, Ming Zhao*
Journal of Cyber Security, Vol.2, No.2, pp. 63-68, 2020, DOI:10.32604/jcs.2020.07229
Abstract Mobile crowdsensing is a new paradigm with powerful performance
for data collection through a large number of smart devices. It is essential to
obtain high quality data in crowdsensing campaign. Most of the existing specs
ignore users’ diversity, focus on solving complicated optimization problem, and
consider devices as instances of intelligent software agents which can make
reasonable choices on behalf of users. Thus, the efficiency and quality of
contributed data cannot be preserved simultaneously. In this paper, we propose a
new scheme for improving the quality of contributed data, which recommends
tasks to users based on calculated score that jointly… More >
Open Access
REVIEW
Xiaojun Pan, Zhuoran Wang, Yanbin Sun*
Journal of Cyber Security, Vol.2, No.2, pp. 69-83, 2020, DOI:10.32604/jcs.2020.010045
Abstract Programmable Logic Controllers (PLC), core of industrial control
systems, is widely used in industrial control systems. The security of PLC is the
key to the security of industrial control systems. Nowadays, a large number of
industrial control systems are connected to the Internet which exposes the PLC
equipment to the Internet, and thus raising security concerns. First of all, we
introduce the basic principle of PLC in this paper. Then we analyze the PLC
code security, firmware security, network security, virus vulnerability and
Modbus communication protocol by reviewing the previous related work.
Finally, we make a summary of the current… More >
Open Access
ARTICLE
Hanzhong Zheng1, Dejie Shi2,*
Journal of Cyber Security, Vol.2, No.2, pp. 85-96, 2020, DOI:10.32604/jcs.2020.010086
Abstract Distributed wireless sensor networks have been shown to be effective
for environmental monitoring tasks, in which multiple sensors are deployed in a
wide range of the environments to collect information or monitor a particular
event, Wireless sensor networks, consisting of a large number of interacting
sensors, have been successful in a variety of applications where they are able to
share information using different transmission protocols through the
communication network. However, the irregular and dynamic environment
requires traditional wireless sensor networks to have frequent communications to
exchange the most recent information, which can easily generate high
communication cost through the collaborative… More >
Open Access
ARTICLE
Chengshan Qian1,2, Xue Li1,*, Ning Sun2, Yuqing Tian1
Journal of Cyber Security, Vol.2, No.2, pp. 97-106, 2020, DOI:10.32604/jcs.2020.010548
Abstract With the development of the Internet of Things, the edge devices are
increasing. Cyber security issues in edge computing have also emerged and
caused great concern. We propose a defense strategy based on Mean field game
to solve the security issues of edge user data during edge computing. Firstly, an
individual cost function is formulated to build an edge user data security defense
model. Secondly, we research the More >
Open Access
ARTICLE
Jiuliang Liu1,*, Xingming Sun1, Ke Song2
Journal of Cyber Security, Vol.2, No.2, pp. 107-113, 2020, DOI:10.32604/jcs.2020.011222
Abstract In recent years, food safety problems have become increasingly serious.
The traditional supply chain traceability solution faces some serious problems,
such as centralization, data tampering, and high communication costs. To solve
these problems, this paper proposes a food traceability framework based on
permissioned blockchain. The proposed framework is decentralized, and the supply
chain data of the framework cannot be tampered with. The framework divides
supply chain entities into five organizations, and each organization deploys its own
chaincode onto the blockchain. The chaincode specifies the query permission of
each organization, which can effectively protect the user’s sensitive information.
The PBFT consensus… More >