Home / Journals / JCS / Vol.2, No.2, 2020
  • Open Access

    ARTICLE

    Preserving the Efficiency and Quality of Contributed Data in MCS via User and Task Profiling

    Dingwen Wang, Ming Zhao*
    Journal of Cyber Security, Vol.2, No.2, pp. 63-68, 2020, DOI:10.32604/jcs.2020.07229
    Abstract Mobile crowdsensing is a new paradigm with powerful performance for data collection through a large number of smart devices. It is essential to obtain high quality data in crowdsensing campaign. Most of the existing specs ignore users’ diversity, focus on solving complicated optimization problem, and consider devices as instances of intelligent software agents which can make reasonable choices on behalf of users. Thus, the efficiency and quality of contributed data cannot be preserved simultaneously. In this paper, we propose a new scheme for improving the quality of contributed data, which recommends tasks to users based on calculated score that jointly… More >

  • Open Access

    REVIEW

    Review of PLC Security Issues in Industrial Control System

    Xiaojun Pan, Zhuoran Wang, Yanbin Sun*
    Journal of Cyber Security, Vol.2, No.2, pp. 69-83, 2020, DOI:10.32604/jcs.2020.010045
    Abstract Programmable Logic Controllers (PLC), core of industrial control systems, is widely used in industrial control systems. The security of PLC is the key to the security of industrial control systems. Nowadays, a large number of industrial control systems are connected to the Internet which exposes the PLC equipment to the Internet, and thus raising security concerns. First of all, we introduce the basic principle of PLC in this paper. Then we analyze the PLC code security, firmware security, network security, virus vulnerability and Modbus communication protocol by reviewing the previous related work. Finally, we make a summary of the current… More >

  • Open Access

    ARTICLE

    A Multi-Agent System for Environmental Monitoring Using Boolean Networks and Reinforcement Learning

    Hanzhong Zheng1, Dejie Shi2,*
    Journal of Cyber Security, Vol.2, No.2, pp. 85-96, 2020, DOI:10.32604/jcs.2020.010086
    Abstract Distributed wireless sensor networks have been shown to be effective for environmental monitoring tasks, in which multiple sensors are deployed in a wide range of the environments to collect information or monitor a particular event, Wireless sensor networks, consisting of a large number of interacting sensors, have been successful in a variety of applications where they are able to share information using different transmission protocols through the communication network. However, the irregular and dynamic environment requires traditional wireless sensor networks to have frequent communications to exchange the most recent information, which can easily generate high communication cost through the collaborative… More >

  • Open Access

    ARTICLE

    Data Security Defense and Algorithm for Edge Computing Based on Mean Field Game

    Chengshan Qian1,2, Xue Li1,*, Ning Sun2, Yuqing Tian1
    Journal of Cyber Security, Vol.2, No.2, pp. 97-106, 2020, DOI:10.32604/jcs.2020.010548
    Abstract With the development of the Internet of Things, the edge devices are increasing. Cyber security issues in edge computing have also emerged and caused great concern. We propose a defense strategy based on Mean field game to solve the security issues of edge user data during edge computing. Firstly, an individual cost function is formulated to build an edge user data security defense model. Secondly, we research the More >

  • Open Access

    ARTICLE

    A Food Traceability Framework Based on Permissioned Blockchain

    Jiuliang Liu1,*, Xingming Sun1, Ke Song2
    Journal of Cyber Security, Vol.2, No.2, pp. 107-113, 2020, DOI:10.32604/jcs.2020.011222
    Abstract In recent years, food safety problems have become increasingly serious. The traditional supply chain traceability solution faces some serious problems, such as centralization, data tampering, and high communication costs. To solve these problems, this paper proposes a food traceability framework based on permissioned blockchain. The proposed framework is decentralized, and the supply chain data of the framework cannot be tampered with. The framework divides supply chain entities into five organizations, and each organization deploys its own chaincode onto the blockchain. The chaincode specifies the query permission of each organization, which can effectively protect the user’s sensitive information. The PBFT consensus… More >

Share Link

WeChat scan