With the continuous development of Airborne Wireless Sensor Networks (AWSN) in airplane monitoring systems, security isolation is facing increasingly serious insider threats. Due to the real-time bi-directional data exchange, attackers can exploit compromised nodes as the springboard to infiltrate the aircraft control domain and airline information services domain, thus stealing sensitive data or doing damage. However, existing zero-trust schemes have centralized deployment bottlenecks and static identity authentication problems, so it is difficult to combat insider threats caused by compromised nodes in the AWSN environments. In this paper, we propose a distributed zero-trust scheme with dynamic identity authentication called DzTrust in airborne wireless sensor networks. Distributed cross-domain deployment of zero-trust engines around dense AWSN nodes can decentralize the zero-trust processing load of centralized deployment. A lightweight Certificateless Aggregation Signcryption (CLASC) model suitable for AWSN is constructed to ensure the secure transmission of information flow. Meanwhile, we maintain a Regularized Behaviors Data Blockchain (RBD_chain) to securely store the behavioral data of AWSN nodes, which facilitates traceability and prevents information tampering. Incorporating dynamic trust evaluation with certificateless authentication, a dynamic identity authentication method is designed, which effectively identifies and mitigates compromised nodes. Security analysis shows that the DzTrust scheme has high security against eavesdropping attack, replay attack, impersonation attack, and man in the middle attack. Performance analysis shows that the DzTrust scheme has good performance in identifying compromised nodes, as well as high computational and communication efficiency.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11889118PMC
http://dx.doi.org/10.1038/s41598-025-91957-2DOI Listing

Publication Analysis

Top Keywords

identity authentication
16
compromised nodes
16
airborne wireless
12
wireless sensor
12
sensor networks
12
dynamic identity
12
distributed zero-trust
8
zero-trust scheme
8
insider threats
8
centralized deployment
8

Similar Publications

With the continuous development of Airborne Wireless Sensor Networks (AWSN) in airplane monitoring systems, security isolation is facing increasingly serious insider threats. Due to the real-time bi-directional data exchange, attackers can exploit compromised nodes as the springboard to infiltrate the aircraft control domain and airline information services domain, thus stealing sensitive data or doing damage. However, existing zero-trust schemes have centralized deployment bottlenecks and static identity authentication problems, so it is difficult to combat insider threats caused by compromised nodes in the AWSN environments.

View Article and Find Full Text PDF

Background: Byadagi chilli, a Geographical Indication (GI)-tagged chilli variety known for its special aroma and bright red colour, was accorded the GI tag in February 2011 with the GI number 129. The two traditional varieties of Byadagi chilli, namely: Dabbi and Kaddi, are the GI-tagged varieties. In this study, GI-tagged Byadagi Dabbi, Byadagi Kaddi and other cultivars of Byadagi chilli, such as Byadagi Lali (BL), Byadagi HPH 2043 (B2), Byadagi BSS 355 (B3) and another popular GI-tagged chilli variety, Guntur Sannam, were analysed to assess their inter-relationships.

View Article and Find Full Text PDF

Biometric authentication relies on an individual's physiological or behavioral traits to verify their identity before granting access permission to a system or device without remembering anything. Although electrocardiograms (ECGs) have been considered a biometric trait, an ECG biometric recognition system that operates in verification mode is rarely considered. This study proposes two two-factor cancelable biometric verification schemes that enable identity recognition using ECGs.

View Article and Find Full Text PDF

Innovative assessment for learning is an important part of professional medical and health professions education programmes. We propose that student poster conferences are a formative, authentic, inclusive and sustainable assessment practice that has the potential to support research competency development and professional identity formation. Of primary importance, the poster conference is a safe-to-fail formative experiential learning opportunity, with opportunities for feedback from peers and key stakeholders.

View Article and Find Full Text PDF

Handwriting verification has stood as a steadfast identity authentication method for decades. However, this technique risks potential privacy breaches due to the inclusion of personal information in handwritten biometrics such as signatures. To address this concern, we propose using the Random Digit String (RDS) for privacy-preserving handwriting verification.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!