Drone-Captured Wildlife Data Encryption: A Hybrid 1D–2D Memory Cellular Automata Scheme with Chaotic Mapping and SHA-256 DOI Creative Commons
Akram Belazi, Héctor Migallón

Mathematics, Journal Year: 2024, Volume and Issue: 12(22), P. 3602 - 3602

Published: Nov. 18, 2024

In contemporary wildlife conservation, drones have become essential for the non-invasive monitoring of animal populations and habitats. However, sensitive data captured by drones, including images videos, require robust encryption to prevent unauthorized access exploitation. This paper presents a novel algorithm designed specifically safeguarding data. The proposed approach integrates one-dimensional two-dimensional memory cellular automata (1D MCA 2D MCA) with bitwise XOR operation as an intermediate confusion layer. MCA, guided chaotic rules from sine-exponential (SE) map, utilizes varying neighbor configurations enhance both diffusion confusion, making more resilient attacks. A final layer 1D controlled pseudo-random number generators, ensures comprehensive across image. SHA-256 hash input image is used derive parameters, providing resistance against plaintext Extensive performance evaluations demonstrate effectiveness scheme, which balances security complexity while outperforming existing algorithms.

Language: Английский

Federated Learning-enabled Network Incident Anomaly Detection Optimization for Drone Swarms DOI
Kevin Kostage,

R S Adepu,

Jenaya Monroe

et al.

Published: Jan. 2, 2025

Language: Английский

Citations

0

The Implementation of U-space: Open Challenges from the Legal-Private Perspective DOI Creative Commons
Yolanda B. Bustos Moreno

Law, governance and technology series, Journal Year: 2025, Volume and Issue: unknown, P. 489 - 515

Published: Jan. 1, 2025

Language: Английский

Citations

0

Artificial intelligence in low-altitude flight: Developmental opportunity or ethical challenge? DOI
Jin Li, Shuangxi Liu, Wei Huang

et al.

The Aeronautical Journal, Journal Year: 2025, Volume and Issue: unknown, P. 1 - 19

Published: March 3, 2025

Abstract In recent years, the rapid convergence of artificial intelligence (AI) and low-altitude flight technology has driven significant transformations across various industries. These advancements have showcased immense potential in areas such as logistics distribution, urban air mobility (UAM) national defense. By adopting AI technology, can achieve high levels automation operate coordinated swarms, thereby enhancing efficiency precision. However, these technologies become more pervasive, they also raise pressing ethical or moral concerns, particularly regarding privacy, public safety, well risks militarisation weaponisation. issues sparked extensive debates. summary, while integration presents revolutionary opportunities, it introduces complex challenges. This article will explore opportunities challenges depth, focusing on privacy protection, military applications legal regulation, propose strategies to ensure that technological remain aligned with principles.

Language: Английский

Citations

0

Progress and Obstacles in Cloud Computing for Healthcare DOI

Abu Jor Al Gefari,

Imran Hasan,

Md Amin Ullah Sheikh

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 347 - 368

Published: Feb. 14, 2025

Since the invention of Internet Things (IoT), people are seeing a new world in healthcare. The rapid growth IoT has brought with it solutions to dilemmas and few challenges cloud devices. But keeping mind benefits these devices, need be solved efficiency security. Putting place storage analysis for specific periods is very popular medicine. On other hand, creating big data, considering sensitivity, some limitations have accepted. use latency, throughput, bandwidth increases cost Internet. Numerous alternative paradigms, most notably edge computing fog computing, evolved solve shortcomings. Consequently, studies shown an increase hybrid based.

Language: Английский

Citations

0

Future Trends in AI Security DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Navid Ali Khan

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 229 - 262

Published: Feb. 14, 2025

Cybersecurity is enriched due to Artificial Intelligence (AI), which provides better real-time threat detection and anomaly identification, response systems. As attackers grow more sophisticated leverage AI in creating malware. The present study gives an overview of the future threats associated with AI-driven attacks challenges faced by existing cybersecurity countermeasures. Additionally, it also analyses feasibility using capabilities like predictive intelligence, advanced quantum computing for some these emerging threats. For such as, we need user permissions rights on this application, should take into consideration privacy policies while designing security as well. To end, get ready against risks a proactive adaptive approach needed stressing collaboration between industry, academia well global entities.

Language: Английский

Citations

0

Blockchain in Cybersecurity Enhancing Data Integrity and Transaction Security DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Sayan Kumar Ray

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 1 - 40

Published: Feb. 14, 2025

The technology is becoming a little more widely known with its data security and hyper-transaction reliability. By very design of decentralization implementation cryptographic principles to maintain integrity, blockchain eliminates central points failure making tampering unauthorized changes virtually impossible as well. This part the diary will discuss how giving our financial transactions, providing safety identities agreements seamless smart contracts. From healthcare supply chain management, it amazing witness many industries are beginning incorporate decree validity information, prevent fraud. But you know what they say — new tech has ways break. ride been accompanied by scalability challenges, energy consumption worries, regulation problems so on. There also some promising prospects, quantum-resistant algorithms enhanced interoperability may resolve these widen blockchain's influence.

Language: Английский

Citations

0

Cybersecurity in IoT Ecosystems Managing Device Vulnerabilities and Data Exposure DOI
Siva Raja Sindiramutty, N. Z. Jhanjhi, Sayan Kumar Ray

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 63 - 98

Published: Feb. 14, 2025

The proliferation of IoT devices and sensors leads to greater efficiency but also greatly increased attack surfaces. In this part the series, we delve into some key security issues that plague ecosystems with a solution- understanding device vulnerabilities how they led data exposure. are frequently built without strong defences in place, lack secure firmware combined weak authentication making them top list for attackers. We will turn real-world threats, such as distributed denial service (DDoS) attacks launched by botnets breaches disclose personal information or sensitive business information. Although chapter certainly warns risks, it is no means doom-and-gloom line reasoning. paper outlines best practices systems, from security-by-design principles leveraging AI blockchain technologies.

Language: Английский

Citations

0

Current Security Issues and Vulnerabilities Associated With Mobile Application DOI

Abdullahi Adewole Zakariyah,

Muhammand Intizar Ali,

Nima Yoezer

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2025, Volume and Issue: unknown, P. 41 - 62

Published: Feb. 14, 2025

Mobile applications have become a crucial part of modern life, facilitating everything from social interactions to financial transactions. However, this ubiquity also presents significant security challenge. The landscape mobile app is fraught with vulnerabilities and threats that can compromise user data, privacy, the overall integrity applications. This paper delves into issues affect It provides an in-depth analysis various attack methods used by cybercriminals extract data explores how users protect their information being compromised. discussion will cover common tactics employed attackers, potential consequences losing application these threats, critical measures necessary for safeguarding against such attacks.

Language: Английский

Citations

0

Future Trends and Challenges in Cybersecurity and Generative AI DOI
Azeem Khan, N. Z. Jhanjhi,

Dayang H. T. B. A. Haji Hamid

et al.

Advances in information security, privacy, and ethics book series, Journal Year: 2024, Volume and Issue: unknown, P. 491 - 522

Published: July 26, 2024

The chapter presents a comprehensive exploration of the changing dynamics at intersection between rapidly growing landscape interconnectivity various devices—the internet things—and innovations piloted by advancements in generative artificial intelligence. In following background-focused analysis, significance enactment new levels security details this fast-growing and virulently expansive is emphasized, with AI ultimately serving as highlight. conversation consequently shifts to threats. This includes detailed depiction cybersecurity threats rooted AI, featuring malicious actors incidents, such increasingly popular phenomenon ransomware-as-a-service mirror illustrations dynamic multifaceted character these class further proceeds more in-depth detail about most contemporary platforms adversarial networks, variational autoencoders, reinforcement learning—all relevant identifying emerging solutions advance strategies cybersecurity. simultaneously conducts an opportunity threat analysis merger regard ethics, regulations, overall touchpoints tactics. concludes call for unity discourse action industry, academia, government stakeholders summary essential cross-disciplinary aspect that must drive narrative confronting overcoming from research. Having presented structure, has allowed coverage major issues opportunities heart cybersecurity-generative combination. Additionally, it provided forum collaborative fortified efforts regarding securing defending uncertainties unpredictable digital store world.

Language: Английский

Citations

3

Exploring advancements and emerging trends in robotic swarm coordination and control of swarm flying robots: A review DOI

Yunes Alqudsi,

Murat Makaracı

Proceedings of the Institution of Mechanical Engineers Part C Journal of Mechanical Engineering Science, Journal Year: 2024, Volume and Issue: unknown

Published: Sept. 22, 2024

Swarm Robotics (SR) is an interdisciplinary field that rapidly advancing to address complex industrial challenges. This paper provides a comprehensive review of recent advancements and emerging trends in SR, with specific focus on the coordination control Flying Robots (SFRs). The motivation behind this explore scalable robust solutions for SFRs enhance their performance adaptability across various applications. Key objectives include examining characteristics essential behaviors analyzing challenges so lutions implementing SR (FRs), highlighting current future research directions. delves into critical areas such as multiple robot path planning, Intelligence (SI), combinatorial optimization, formation flying using SFR. Special attention given techniques, including GPS-denied environments, underscore significance SR. also addresses ethical, privacy, security considerations, emphasizing importance responsible practices development. Major takeaways from identification key technical potential SFR, exploration SI algorithms, directions necessary fully realizing technologies. By offering detailed insights state-of-the-art its implications, serves foundational guide studies dynamic promising domain swarm robotics.

Language: Английский

Citations

3