Research article Special Issues

A Lightweight authentication scheme for IoT against Rogue Base Station Attacks

  • Internet of Things (IoT) devices supporting intelligent cloud applications such as healthcare for hospitals rely on connecting with local base stations and access points to provide rich data analysis and real-time services to users. Devices authenticate with local base stations and perform handover operations to connect with access points with higher signal strength. Attackers disguise as valid base stations and access points using publicly accessible SSID information connect with local IoT devices during the handover process and give rise to data integrity and privacy concerns. This paper proposes a lightweight authentication scheme for private blockchain-based networks for securing devices from rogue base stations during the handover process. An authentication certificate is designed for base stations and machines in local clusters using SHA256 and modulo operations for enabling quick handover operations. The keys assigned to each device and base station joining the network are hashed, and their sizes are reduced using modulo operations. Furthermore, the compressed key size forms a certificate, which is used by the machines and the base stations to authenticate mutually. In comparison with existing studies, the performance analysis of the proposed scheme is based on the transmission of three messages required for completing the authentication process. Evaluation based on the Communication Overhead demonstrates a minimum improvement of 99.30% fewer bytes exchanged during the handover process and 89.58% reduced Storage Overhead compared with existing studies.

    Citation: Mikail Mohammed Salim, Jungho Kang, Yi Pan, Jong Hyuk Park. A Lightweight authentication scheme for IoT against Rogue Base Station Attacks[J]. Mathematical Biosciences and Engineering, 2022, 19(11): 11735-11755. doi: 10.3934/mbe.2022546

    Related Papers:

    [1] Mengting Sui, Yanfei Du . Bifurcations, stability switches and chaos in a diffusive predator-prey model with fear response delay. Electronic Research Archive, 2023, 31(9): 5124-5150. doi: 10.3934/era.2023262
    [2] Yujia Xiang, Yuqi Jiao, Xin Wang, Ruizhi Yang . Dynamics of a delayed diffusive predator-prey model with Allee effect and nonlocal competition in prey and hunting cooperation in predator. Electronic Research Archive, 2023, 31(4): 2120-2138. doi: 10.3934/era.2023109
    [3] Jiani Jin, Haokun Qi, Bing Liu . Hopf bifurcation induced by fear: A Leslie-Gower reaction-diffusion predator-prey model. Electronic Research Archive, 2024, 32(12): 6503-6534. doi: 10.3934/era.2024304
    [4] Fengrong Zhang, Ruining Chen . Spatiotemporal patterns of a delayed diffusive prey-predator model with prey-taxis. Electronic Research Archive, 2024, 32(7): 4723-4740. doi: 10.3934/era.2024215
    [5] Yichao Shao, Hengguo Yu, Chenglei Jin, Jingzhe Fang, Min Zhao . Dynamics analysis of a predator-prey model with Allee effect and harvesting effort. Electronic Research Archive, 2024, 32(10): 5682-5716. doi: 10.3934/era.2024263
    [6] Xiaowen Zhang, Wufei Huang, Jiaxin Ma, Ruizhi Yang . Hopf bifurcation analysis in a delayed diffusive predator-prey system with nonlocal competition and schooling behavior. Electronic Research Archive, 2022, 30(7): 2510-2523. doi: 10.3934/era.2022128
    [7] Miao Peng, Rui Lin, Zhengdi Zhang, Lei Huang . The dynamics of a delayed predator-prey model with square root functional response and stage structure. Electronic Research Archive, 2024, 32(5): 3275-3298. doi: 10.3934/era.2024150
    [8] Yuan Tian, Yang Liu, Kaibiao Sun . Complex dynamics of a predator-prey fishery model: The impact of the Allee effect and bilateral intervention. Electronic Research Archive, 2024, 32(11): 6379-6404. doi: 10.3934/era.2024297
    [9] Kimun Ryu, Wonlyul Ko . Global existence of classical solutions and steady-state bifurcation in a prey-taxis predator-prey system with hunting cooperation and a logistic source for predators. Electronic Research Archive, 2025, 33(6): 3811-3833. doi: 10.3934/era.2025169
    [10] Yuan Tian, Hua Guo, Wenyu Shen, Xinrui Yan, Jie Zheng, Kaibiao Sun . Dynamic analysis and validation of a prey-predator model based on fish harvesting and discontinuous prey refuge effect in uncertain environments. Electronic Research Archive, 2025, 33(2): 973-994. doi: 10.3934/era.2025044
  • Internet of Things (IoT) devices supporting intelligent cloud applications such as healthcare for hospitals rely on connecting with local base stations and access points to provide rich data analysis and real-time services to users. Devices authenticate with local base stations and perform handover operations to connect with access points with higher signal strength. Attackers disguise as valid base stations and access points using publicly accessible SSID information connect with local IoT devices during the handover process and give rise to data integrity and privacy concerns. This paper proposes a lightweight authentication scheme for private blockchain-based networks for securing devices from rogue base stations during the handover process. An authentication certificate is designed for base stations and machines in local clusters using SHA256 and modulo operations for enabling quick handover operations. The keys assigned to each device and base station joining the network are hashed, and their sizes are reduced using modulo operations. Furthermore, the compressed key size forms a certificate, which is used by the machines and the base stations to authenticate mutually. In comparison with existing studies, the performance analysis of the proposed scheme is based on the transmission of three messages required for completing the authentication process. Evaluation based on the Communication Overhead demonstrates a minimum improvement of 99.30% fewer bytes exchanged during the handover process and 89.58% reduced Storage Overhead compared with existing studies.



    1. Synaptic plasticity as a mechanism for hippocampal encoding of events

    Half a century after long-term potentiation (LTP) was first observed in the rabbit hippocampus [1], researchers continue to uncover new facets of this phenomenon. The specific role that LTP plays in hippocampal-dependent learning and memory processes has been extensively debated [5,6]. Despite continuing uncertainty about exactly how hippocampal circuits contribute to different memory abilities [7], most researchers no longer question that hippocampal LTP reflects changes in synaptic strength that serve to encode experienced events or associations between such events [8]. The research and hypotheses described by Mitsushima [8,9] follow in this tradition by showing that rapid avoidance conditioning leads to selective strengthening of synapses within hippocampal circuits, and by suggesting that these synaptic changes constitute a memory trace for the events experienced during training.

    Mitsushima [8,9] reports that both excitatory and inhibitory synapses on CA1 neurons in rats were strengthened by a training experience in which a shock was paired with a behavior that would normally be reinforcing (moving from a lighted area to a darker one). These synaptic changes were correlated with behavioral changes,indicating that rats learned from this experience. When the synaptic changes were prevented from occurring,training did not change rats’ behavior. Together,these findings show that when rats are learning,their hippocampal connections are changing,and that interfering with hippocampal processing can disrupt avoidance learning. Mitsushima also notes that there was considerable variability in terms of how synapses changed at any given neuron,and that only a subset of hippocampal neurons (in the dorsal region) showed such changes. These observations are consistent with past reports implicating hippocampal LTP in learning [10,11].

    2. Cholinergic modulation as a trigger for memory storage

    One novel aspect of the studies by Mitsushima [8] is the measurement of acetylcholine (ACh) levels in CA1 before,during,and after conditioning. Less than a minute of training led to significant increases in hippocampal ACh levels. Surprisingly,levels remained elevated for an hour or more after training. Allowing rats to explore a chamber or mildly shocking rats in the chamber led to increases in ACh levels that lasted less than 15 min. Mitsushima [8,9] speculates that long-lasting increases in ACh levels in the hippocampus triggered learning-related LTP. This interpretation is indirectly supported by studies showing that controlling cholinergic levels in auditory cortex during sound presentations can enhance experience-dependent changes in cortical sensitivities [12,13]. ACh-dependent cortical plasticity can be attributed,at least in part,to changes in excitatory and inhibitory synapses within cortical circuits [14,15]. Increases in ACh levels within the hippocampus may be accompanied by increases in A Ch levels within cortical networks [16],which could in turn affect qualities of the cortical activity patterns that drive hippocampal activity. Thus,learning-related changes in hippocampal synapses might depend on both heightened cholinergic levels in CA1 and changes to incoming activity patterns.

    Cholinergic modulation could potentially contribute to learning and memory processes through several different corticohippocampal mechanisms [17]. One issue not directly addressed by Mitsushima [8] is what determines the amount and duration of ACh release into the hippocampus by medial septum neurons. The activity of these neurons may be partly determined by hippocampal activity [18,19]. Specifically,hippocampal circuits could drive activity in the medial septum,thereby controlling which experiences lead to large changes in synapses within CA1. Another feature of cholinergic modulation that is unclear from Mitsushima’s microdialysis measures is whether tonic changes in ACh levels drove the observed synaptic changes in CA1,or whether these changes resulted from more phasic ACh release [20]. Mitsushima notes that electrophysiological recordings in CA1 show intermittent bursts of high-frequency ripples after training. Increased cholinergic levels should suppress such firing patterns [21],suggesting that transient rather than constant changes in medial septum activity may be responsible for the observed increases in cholinergic levels.

    3. Effects of cholinergic modulation on corticohippocampal traveling waves

    Numerous lines of evidence,including the findings reviewed by Mitsushima [8],show that: (1) learning experiences can lead to increases and decreases in the strength of excitatory and inhibitory connections between neurons; and (2) manipulations that disrupt synaptic plasticity processes can disrupt learning and memory performances. Such findings have led many researchers to conclude that memories are encoded in the hippocampus as sets of synaptic strengths. Other evidence raises questions,however,about whether synaptic modifications should be viewed as a memory storage mechanism. First,many of the changes observed in synapses,including a subset of those described by Mitsushima,dissipate more quickly than the behavioral changes produced by training. Second,evidence from motor system research suggests that synaptic strengths can continuously fluctuate without affecting recall [22]. Observations of dendritic spine turnover in neural circuits have similarly led some to suggest that dynamic configurations of connections between neurons rather than fixed changes in connectivity may give rise to stable memories [23,24,25,26]. Finally,recent work implicating glial function in both sensory [27] and motor plasticity [28] in cortical networks,suggests that learning-related changes in behavior are probably not simply a function of changing connectivity between neurons.

    How might dynamic constellations of synaptic strengths contribute to learning if not by encoding memories? Ajemian and colleagues [22] proposed that dynamic patterns of connections might fluctuate coherently,preserving static input-output mappings. Routtenberg [25]hypothesized that memory traces are constantly being duplicated such that memories are preserved despite the impermanence of synaptic changes. Both of these explanations replace static synaptic memory traces with persistent synaptic “swarms” that play an equivalent functional role (see also [4]). An alternative possibility is that neither individual synapses nor dynamic sets of synapses serve to encode and store memories. Instead,synaptic dynamics and other forms of neural and glial plasticity may be a side effect of memory processes rather than a mechanism for representing either past events or associations. Consideration of the properties and correlates of traveling waves of neural activity within the hippocampus and cortex provides important clues about how and why such waves might drive synaptic changes even if synapses are not functioning as memory traces.

    Increases in ACh levels like those reported by Mitsushima [8] after training are associated with increased hippocampal theta activity [17,20]. Recent studies have shown that theta waves propagate in predictable directions and at predictable rates within the hippocampus [29,30],and that concurrent activity in cortical networks is often phase locked to hippocampal theta [31,32,33]. In some cases,theta activity within cortical networks appears to propagate from hippocampal circuits via volume conduction [33]. Theta activity in the hippocampus [17,34] and cortex [35] has often been associated with learning processes. Collectively,these findings predict that traveling waves in cortical and hippocampal networks are likely to be spatiotemporally coordinated [36],and to be more prevalent after experiences that increase ACh levels. Several current theories of hippocampal function suggest that coordinated,recurrent waves of activity that occur within and across hippocampal and cortical circuits should lead to significant changes in synaptic connections [4,37,38]. Computational simulations of retinal waves show that variations in extracellular levels of ACh can affect when traveling waves arise as well as their qualities [39]; cholinergic levels in the hippocampus might similarly influence the prevalence and properties of traveling theta waves.

    4. Effects of synaptic plasticity on wave propagation

    Historically,hippocampal theta activity has been thought to contribute to learning by coordinating information transfer and encoding [17,38],thereby facilitating memory trace formation via synaptic plasticity in hippocampal circuits. The fact that theta-related modes of processing in the hippocampus are associated with synaptic changes does not,however,imply that such changes encode records of experienced events that will later be reactivated to recreate internal states associated with those experiences. Instead,learning-related changes in cortical and hippocampal synapses may change how traveling waves propagate through these circuits [40,41]. In Pavlov’s cortical theory of conditioned response formation,learning-related changes in neural connections modulate the qualities of traveling wave patterns in cortex. Similarly,synaptic changes in hippocampal circuits could affect patterns of theta wave propagation,modulating the rate,direction,or strength of these traveling waves.

    Few researchers have studied the effects of synaptic changes on the qualities of traveling waves within the brain. However,in developing animals there is clear evidence that changes in the strengths of both excitatory and inhibitory synapses can lead to variations in wave propagation [42,43],and vice versa [44]. Studies of compensatory plasticity also suggest that synaptic changes affect how cortical waves propagate [45]. Recurrent,traveling corticohippocampal waves,or states associated with those waves such as elevated cholinergic levels,may lead to changes in synaptic connections [46],which in turn may affect how subsequent waves propagate. These synaptic changes might then be viewed as a consequence of traveling wave propagation that can potentially affect future activity patterns (e.g.,trajectories),without synapses storing any specific information about the events that initiated those waves. Under this interpretation,the effects of propagating corticohippocampal waves on syna ptic strengths are loosely analogous to the effects of ocean waves on the configuration of sand along a shoreline. The activity of different wave patterns might “shift the sands” in predictable ways,but which specific synapses are affected may be less relevant to the neural encoding of events than the overall effects of these changes on future wave propagation [47]. Dynamic changes in synaptic strengths might reflect the variability of wave patterns rather than encoding of unique events. This interpretation is similar to Miller’s (1989) proposal that self-organizing corticohippocampal loops resonate at particular frequencies (e.g.,theta) to encode the environment,and that the spatiotemporal distribution of theta-related activity becomes shifted during learning. In this scenario,the qualities of waves rather than the strengths of individual neural connections encode events [48,49].

    5. Conclusion

    Experiences that quickly generate long-lasting changes in behavior,such as the inhibitory avoidance task used by Mitsushima [8],undoubtedly are associated with complex,temporally dynamic changes in neuromodulatory activity and synaptic connections in multiple brain regions. A major challenge in learning and memory research is to understand what functions (if any) such chemical and structural changes serve. Although many findings are consistent with the hypothesis that synapses within the hippocampus function as engrams of varying longevity,it remains possible that the specific changes in synaptic strengths caused by learning experiences are less critical to determining the contents of representations of past experiences than is generally assumed.

    Acknowledgments

    This work was supported in part by NSF grant #SBE-0542013 to the Temporal Dynamics of Learning Center, an NSF Science of Learning Center.

    Conflict of Interest

    The author declares no conflicts of interest in this paper.



    [1] S. Selvaraj, S. Sundaravaradhan, Challenges and opportunities in IoT healthcare systems: A systematic review, SN Appl. Sci., 2 (2020), 1–8. https://doi.org/10.1007/s42452-019-1925-y doi: 10.1007/s42452-019-1925-y
    [2] K. R. Cho, J. J. Lee, E. S. Lee, A study on the design of test item framework for the reliability of frozen and refrigerated products with IoT function, KIPS Transact. Software Data Eng., 10 (2021), 211–222. https://doi.org/10.3745/KTSDE.2021.10.6.211 doi: 10.3745/KTSDE.2021.10.6.211
    [3] H. Alshammari, S. A. El-Ghany, A. Shehab, Big IoT healthcare data analytics framework based on Fog and cloud computing, J. Inform. Process. Syst., 16 (2020), 1238–1249. https://doi.org/10.3745/JIPS.04.0193 doi: 10.3745/JIPS.04.0193
    [4] T. Almalki, S. Alzahrani, W. Alhakami, Healthcare Security based on Blockchain, J. Inform. Process. Syst., 21 (2021), 149–160. https://doi.org/10.22937/IJCSNS.2021.21.8.20 doi: 10.22937/IJCSNS.2021.21.8.20
    [5] X. Wang, S. Cai, Secure healthcare monitoring framework integrating NDN-based IoT with edge cloud, Future Gener. Computer Syst., 112 (2020), 320–329. https://doi.org/10.1016/j.future.2020.05.042 doi: 10.1016/j.future.2020.05.042
    [6] R. M. Abdelmoneem, A. Benslimane, E. Shaaban, Mobility-aware task scheduling in cloud-Fog IoT-based healthcare architectures, 179 (2020), 107348. https://doi.org/10.1016/j.comnet.2020.107348
    [7] M. Haghi, S. Neubert, A. Geissler, H. Fleisher, N. Stoll, R. Stoll, et al., A flexible and pervasive IoT-based healthcare platform for physiological and environmental parameters monitoring, IEEE Int. Things J., 7 (2020), 5628–5647. https://doi.org/10.1109/JIOT.2020.2980432 doi: 10.1109/JIOT.2020.2980432
    [8] J. H. Im, H. R. Oh, Y. R. Seong, Simulation of a mobile IoT system using the DEVS formalism, J. Inform. Process. Syst., 17 (2020), 28–36. https://doi.org/10.3745/JIPS.03.0155 doi: 10.3745/JIPS.03.0155
    [9] H. N. Qureshi, M. Manalastas, S. M. A. Zaidi, A. Imran, M. O. A. Kalaa, Service level agreements for 5G and beyond: Overview, challenges and enablers of 5G-healthcare systems, IEEE Access, 9 (2020), 1044–1061. https://doi.org/10.1109/ACCESS.2020.3046927 doi: 10.1109/ACCESS.2020.3046927
    [10] J. H. Park, S. Rathore, S. K. Singh, M. M. Salim, A. E. Azzaoui, T. Kim, et al., A comprehensive survey on core technologies and services for 5G security: Taxonomies, issues, and solutions, Human-centric Comput. Inform. Sci., 11 (2021), 1–23. https://doi.org/10.22967/HCIS.2021.11.003 doi: 10.22967/HCIS.2021.11.003
    [11] Y. Zhang, R. H. Deng, E. Bertino, D. Zheng, Robust and universal seamless handover authentication in 5G HetNets, IEEE Transact. Depend. Secure Comput., 18 (2019), 858–874. https://doi.org/10.1109/TDSC.2019.2927664 doi: 10.1109/TDSC.2019.2927664
    [12] A. Calhan, M. Cicioglu, Handover scheme for 5G small cell networks with non-orthogonal multiple access, Computer Networks, 183 (2020), 107601. https://doi.org/10.1016/j.comnet.2020.107601 doi: 10.1016/j.comnet.2020.107601
    [13] J. Cao, M. Ma, Y. Fu, H. Li, Y. Zhang, CPPHA: Capability-based privacy-protection handover authentication mechanism for SDN-based 5G HetNets, IEEE Transact. Depend. Secure Comput., 18 (2021), 1182–1195. https://doi.org/10.1109/TDSC.2019.2916593 doi: 10.1109/TDSC.2019.2916593
    [14] P. Ziayi, S. M. Farmanbar, M. Rezvani, YAICD: Yet another IMSI catcher detector in GSM, Secur. Commun. Networks, (2021). https://doi.org/10.1155/2021/8847803
    [15] A. S. Abdalla, K. Powell, V. Marojevic, G. Geraci, UAV-assisted attack prevention, detection, and recovery of 5G networks, IEEE Wireless Commun., 27 (2020), 40–47. https://doi.org/10.1109/MWC.01.1900545 doi: 10.1109/MWC.01.1900545
    [16] D. J. Jeyakumar, S. Lingeshwari, Fake sensor detection and secure data transmission based on predictive parser in WSNs, Wireless Personal Commun., 110 (2020), 531–544. https://doi.org/10.1007/s11277-019-06740-0 doi: 10.1007/s11277-019-06740-0
    [17] Y. Kim, J. Park, Hybrid decentralized PBFT blockchain framework for openstack message queue, Human-centric Comput. Inform. Sci., 10 (2020), 1–12. https://doi.org/10.1186/s13673-020-00238-6 doi: 10.1186/s13673-020-00238-6
    [18] V. Gomathy, N. Padhy, D. Samanta, M. Sivaram, V. Jain, I. S. Amiri, Malicious node detection using heterogeneous cluster based secure routing protocol (HCBS) in wireless adhoc sensor networks, J. Ambient Intell. Human. Comput., 11 (2020), 4995–5001. https://doi.org/10.1007/s12652-020-01797-3 doi: 10.1007/s12652-020-01797-3
    [19] H. Khan, K. M. Martin, A survey of subscription privacy on the 5G radio interface—The past, present and future, J. Inform. Secur. Appl., 53 (2020), 102537. https://doi.org/10.1016/j.jisa.2020.102537 doi: 10.1016/j.jisa.2020.102537
    [20] S. Mondal, S. A. Rubaye, A. Tsourdos, Handover prediction for aircraft dual connectivity using model predictive control, IEEE Access, 9 (2021), 44463–44475. https://doi.org/10.1109/ACCESS.2021.3066554 doi: 10.1109/ACCESS.2021.3066554
    [21] K. W. Huang, H. M. Wang, Identifying the fake base station: A location based approach, IEEE Commun. Letters, 22 (2018), 1604–1607. https://doi.org/10.1109/LCOMM.2018.2843334 doi: 10.1109/LCOMM.2018.2843334
    [22] Q. Bin, C. Ziwen, X. Yong, H. Liang, S. Sheng, Rogue base stations detection for advanced metering infrastructure based on signal strength clustering, IEEE Access, 8 (2019), 158798–158805. https://doi.org/10.1109/ACCESS.2019.2934222 doi: 10.1109/ACCESS.2019.2934222
    [23] Y. Xiao, B. Qian, Z. Cai, L. Hong, S. Su, Eliminating rogue femtocells for iot open meter system based on expert system, J. Eng., (2019). https://doi.org/10.1155/2019/4910232
    [24] R. Ma, J. Cao, D. Feng, H. Li, Y. Zhang, X. Lv, PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks, Ad Hoc Networks, 87 (2019), 49–60. https://doi.org/10.1016/j.adhoc.2018.11.012 doi: 10.1016/j.adhoc.2018.11.012
    [25] Y. Qiu, M. Ma, X. Wang, A proxy signature-based handover authentication scheme for LTE wireless networks, J. Network Computer Appl., 83 (2017), 63–71. https://doi.org/10.1016/j.jnca.2017.01.023 doi: 10.1016/j.jnca.2017.01.023
    [26] J. Cao, H. Li, M. Ma, Y. Zhang, C. Lai, A simple and robust handover authentication between HeNB and eNB in LTE networks, Computer Networks, 56 (2012), 2119–2131. https://doi.org/10.1016/j.comnet.2012.02.012 doi: 10.1016/j.comnet.2012.02.012
    [27] M. C. Chow, M. Ma, A secure blockchain-based authentication and key agreement scheme for 3GPP 5G networks, Sensors, 22 (2022), 4525. https://doi.org/10.3390/s22124525 doi: 10.3390/s22124525
    [28] X. Yang, X. Yang, X. Yi, I. Khalil, X. Zhou, D. He, et al., Blockchain-based secure and lightweight authentication for Internet of Things, IEEE Int. Things J., 9 (2022), 3321–3332. https://doi.org/10.1109/JIOT.2021.3098007 doi: 10.1109/JIOT.2021.3098007
    [29] S. Koteshwara, A. Das, K. K. Parhi, Architecture optimization and performance comparison of Nonce-misuse-resistant authenticated encryption algorithms, IEEE Transact. Very Large Scale Integr. (VLSI) Syst., 27 (2019), 1053–1066. https://doi.org/10.1109/TVLSI.2019.2894656 doi: 10.1109/TVLSI.2019.2894656
  • This article has been cited by:

    1. Yuying Liu, Qi Cao, Wensheng Yang, Influence of Allee effect and delay on dynamical behaviors of a predator–prey system, 2022, 41, 2238-3603, 10.1007/s40314-022-02118-4
    2. Chenxuan Nie, Dan Jin, Ruizhi Yang, Hopf bifurcation analysis in a delayed diffusive predator-prey system with nonlocal competition and generalist predator, 2022, 7, 2473-6988, 13344, 10.3934/math.2022737
    3. Xiaowen Zhang, Wufei Huang, Jiaxin Ma, Ruizhi Yang, Hopf bifurcation analysis in a delayed diffusive predator-prey system with nonlocal competition and schooling behavior, 2022, 30, 2688-1594, 2510, 10.3934/era.2022128
    4. Kuldeep Singh, Mukesh Kumar, Ramu Dubey, Teekam Singh, Untangling role of cooperative hunting among predators and herd behavior in prey with a dynamical systems approach, 2022, 162, 09600779, 112420, 10.1016/j.chaos.2022.112420
    5. Xubin Jiao, Li Liu, Xiao Yu, Rich dynamics of a reaction–diffusion Filippov Leslie–Gower predator–prey model with time delay and discontinuous harvesting, 2025, 228, 03784754, 339, 10.1016/j.matcom.2024.09.022
    6. Ben Chu, Guangyao Tang, Changcheng Xiang, Binxiang Dai, Dynamic Behaviours and Bifurcation Analysis of a Filippov Ecosystem with Fear Effect, 2023, 2023, 1607-887X, 1, 10.1155/2023/9923003
    7. Yunzhuo Zhang, Xuebing Zhang, Shunjie Li, The effect of self-memory-based diffusion on a predator–prey model, 2024, 75, 0044-2275, 10.1007/s00033-024-02256-1
    8. Hongyan Sun, Pengmiao Hao, Jianzhi Cao, Dynamics analysis of a diffusive prey-taxis system with memory and maturation delays, 2024, 14173875, 1, 10.14232/ejqtde.2024.1.40
    9. Ruying Dou, Chuncheng Wang, Bifurcation analysis of a predator–prey model with memory-based diffusion, 2024, 75, 14681218, 103987, 10.1016/j.nonrwa.2023.103987
    10. Yujia Wang, Chuncheng Wang, Dejun Fan, Yuming Chen, Dynamics of a Predator–Prey Model with Memory-Based Diffusion, 2023, 1040-7294, 10.1007/s10884-023-10305-y
    11. Debasish Bhattacharjee, Dipam Das, Santanu Acharjee, Tarini Kumar Dutta, Two predators, one prey model that integrates the effect of supplementary food resources due to one predator's kleptoparasitism under the possibility of retribution by the other predator, 2024, 10, 24058440, e28940, 10.1016/j.heliyon.2024.e28940
    12. L. R. Ibrahim, D. K. Bahlool, Exploring the Role of Hunting Cooperation, and Fear in a Prey-Predator Model with Two Age Stages, 2024, 18, 1823-8343, 727, 10.47836/mjms.18.4.03
    13. Li Zou, Zhengdi Zhang, Miao Peng, Stability analysis of an eco-epidemic predator–prey model with Holling type-I and type-III functional responses, 2025, 99, 0973-7111, 10.1007/s12043-024-02877-1
  • Reader Comments
  • © 2022 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(2839) PDF downloads(83) Cited by(1)

Article outline

Figures and Tables

Figures(5)  /  Tables(3)

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog