Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
A brain–edge co-evolution framework for zero-trust real-time hot patching in power equipment
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 24 March 2026

A brain–edge co-evolution framework for zero-trust real-time hot patching in power equipment

  • Zhenwan Zou1,
  • Bin Wang1,
  • Tao Chen2,
  • Shuming Fan1 &
  • …
  • Bo Ye1 

Scientific Reports , Article number:  (2026) Cite this article

  • 371 Accesses

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Engineering
  • Mathematics and computing

Abstract

Under current zero-trust security architectures, real-time hot patching of power field equipment remains constrained by three critical technological limitations: excessive authentication latency that violates millisecond-level control requirements, the lack of quantitative mechanisms to prevent runtime structural disorder during patch injection, and the absence of effective integration between human operational expertise and automated decision systems. These limitations make existing zero-trust and fully automated hot patching approaches unsuitable for safety-critical power equipment operating under strict real-time and fault-intolerant conditions. To address these gaps, this paper proposes a brain–computer co-evolution–driven negative entropy zero-trust hot patching framework. Compared with conventional zero-trust implementations and automated reinforcement learning–based patching strategies, the proposed method introduces human EEG-derived risk intuition into the security decision loop and establishes a multidimensional negative entropy model to explicitly quantify and constrain system structural order during runtime updates. By combining these mechanisms with millisecond-level eBPF-based atomic code replacement, the framework aligns strong security verification with real-time operational constraints. Experimental results on an RTDS simulation platform and a real IED cluster (1,200 hot patching operations) demonstrate that the proposed framework reduces high-risk security decision latency to 12.3 ms—significantly lower than current zero-trust baselines—while limiting entropy increase risk to 3.5% and maintaining 99.99% service availability. These results indicate that the proposed approach bridges a critical gap between current zero-trust standards and the practical requirements of real-time, safety-critical power equipment updates.

Data availability

The data that support the findings of this study are openly available in Science Data Bank at https://doi.org/10.57760/sciencedb.28813.

References

  1. Murtaza, A. A. et al. Paradigm shift for predictive maintenance and condition monitoring from Industry 4.0 to Industry 5.0: A systematic review, challenges and case study. Results Eng. 24, 102935 (2024).

    Google Scholar 

  2. Ledmaoui, Y., El Maghraoui, A., El Aroussi, M. & Saadane, R. Review of Recent Advances in Predictive Maintenance and Cybersecurity for Solar Plants. Sensors 25 (1), 206 (2025).

    Google Scholar 

  3. Suresh, K. P., Senthilkumar, R., Saravanan, S., Suresh, M. & Jamuna, P. Challenges and Opportunities for Predictive Maintenance of Solar Plants 65–83 (Photovoltaic Systems, 2022).

  4. Geng, S. & Wang, X. Predictive maintenance scheduling for multiple power equipment based on data-driven fault prediction. Comput. Ind. Eng. 164, 107898 (2022).

    Google Scholar 

  5. Schwartz, J. A., Ricks, W., Kolemen, E. & Jenkins, J. D. Valuing maintenance strategies for fusion plants as part of a future electricity grid. arXiv preprint arXiv :240501514. (2024).

  6. Salehi, M. & Pattabiraman, K. AutoPatch: Automated Generation of Hotpatches for Real-Time Embedded Devices. In Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security (pp. 2370–2384). (2024, December).

  7. Xi, Z., Zhang, B., Bhattacharjya, A., Wang, Y. & He, C. Research on a Secure and Reliable Runtime Patching Method for Cyber–Physical Systems and Internet of Things Devices. Symmetry 17 (7), 983 (2025).

    Google Scholar 

  8. Wang, M. et al. Study on the Preparation and Aging Performance of Temperature-Indicating Patch Used for Thermal Defect Detection of Transformer Bushing Cylinder Head. Processes 12 (4), 736 (2024).

    Google Scholar 

  9. Lickert, H., Lachnit, T. & Dietrich, F. Approach for Structured Repairability Assessment for Automated Repair Processes. In Global Conference on Sustainable Manufacturing (pp. 391–398). Cham: Springer Nature Switzerland. (2023, December).

  10. Al Ameeri, T. A., Ab Rahman, M. N. & Muhamad, N. Analysing effective and ineffective impacts of maintenance strategies on electric power plants: A comprehensive approach. Energies 16 (17), 6243 (2023).

    Google Scholar 

  11. Dissanayake, N., Zahedi, M., Jayatilaka, A. & Babar, M. A. Why, how and where of delays in software security patch management: An empirical investigation in the healthcare sector. Proceedings of the ACM on Human-computer Interaction, 6(CSCW2), 1–29. (2022).

  12. Wetzels, J., Dos Santos, D. & Ghafari, M. Insecure by design in the backbone of critical infrastructure. In Proceedings of Cyber-Physical Systems and Internet of Things Week 2023 (pp. 7–12). (2023).

  13. Dissanayake, N., Jayatilaka, A., Zahedi, M. & Babar, M. A. Software security patch management-A systematic literature review of challenges, approaches, tools and practices. Inf. Softw. Technol. 144, 106771 (2022).

    Google Scholar 

  14. Adinolfi, G., Ciavarella, R., Graditi, G., Ricca, A. & Valenti, M. Innovative Method for Reliability Assessment of Power Systems: From Components Modeling to Key Indicators Evaluation. Electronics 13 (2), 275 (2024).

    Google Scholar 

  15. Jalilian, A., Taheri, B. & Molzahn, D. K. Co-Optimization of Damage Assessment and Restoration: A Resilience-Driven Dynamic Crew Allocation for Power Distribution Systems. IEEE Trans. Power Syst. 40 (1), 676–688 (2024).

    Google Scholar 

  16. Ul Haq, S., Singh, Y., Sharma, A., Gupta, R. & Gupta, D. A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks. Discover Internet Things. 3 (1), 17 (2023).

    Google Scholar 

  17. Urblik, L., Kajati, E., Papcun, P. & Zolotová, I. Containerization in edge intelligence: A review. Electronics 13 (7), 1335 (2024).

    Google Scholar 

  18. Liu, C. et al. Dissecting zero trust: Research landscape and its implementation in IoT. Cybersecurity 7 (1), 20 (2024).

    Google Scholar 

  19. Molęda, M., Małysiak-Mrozek, B., Ding, W., Sunderam, V. & Mrozek, D. From corrective to predictive maintenance—A review of maintenance approaches for the power industry. Sensors 23 (13), 5970 (2023).

    Google Scholar 

  20. Mohsin, A., Janicke, H., Ibrahim, A., Sarker, I. H. & Camtepe, S. A Unified Framework for Human AI Collaboration in Security Operations Centers with Trusted Autonomy. (2025). arXiv preprint arXiv:2505.23397.

  21. Huang, Z., Sheng, Z., Ma, C. & Chen, S. Human as AI mentor: Enhanced human-in-the-loop reinforcement learning for safe and efficient autonomous driving. Commun. Transp. Res. 4, 100127 (2024).

    Google Scholar 

  22. Karunamurthy, A., Kiruthivasan, R. & Gauthamkrishna, S. Human-in-the-loop intelligence: Advancing AI-centric cybersecurity for the future. Quing: Int. J. Multidisciplinary Sci. Res. Dev. 2 (3), 20–43 (2023).

    Google Scholar 

  23. Alahaideb, L., Al-Nafjan, A., Aljumah, H. & Aldayel, M. Brain–Computer Interface for EEG-Based Authentication: Advancements and Practical Implications. Sensors 25 (16), 4946 (2025).

    Google Scholar 

  24. Seyfizadeh, A. et al. Enhancing security in brain–computer interface applications with deep learning: Electroencephalogram-based user identification. Expert Syst. Appl. 253, 124218 (2024).

    Google Scholar 

  25. Brocal, F. Brain-computer interfaces in safety and security fields: risks and applications. Saf. Sci. 160, 106051 (2023).

    Google Scholar 

  26. Yu, H. et al. Lyapunov exponents and Lagrangian chaos suppression in compressible homogeneous isotropic turbulence. Phys. Fluids, 35(12). (2023):125114-125114.

  27. Winter, L., Taylor, P., Bellenger, C., Grimshaw, P. & Crowther, R. G. The application of the Lyapunov Exponent to analyse human performance: A systematic review. J. Sports Sci. 41 (22), 1994–2013 (2023).

    Google Scholar 

  28. Zhang, Y. C. & Zhang, Y. Y. Lyapunov exponent, mobility edges, and critical region in the generalized Aubry-André model with an unbounded quasiperiodic potential. Phys. Rev. B. 105 (17), 174206 (2022).

    Google Scholar 

  29. Irani, H. & Metsis, V. Enhancing time-series prediction with temporal context modeling: A Bayesian and deep learning synergy. In The International FLAIRS Conference Proceedings (Vol. 37). (2024).

  30. Nikookar, S., Namazi Nia, S., Basu Roy, S., Amer-Yahia, S. & Omidvar-Tehrani, B. Model reusability in Reinforcement Learning. VLDB J. 34 (4), 41 (2025).

    Google Scholar 

  31. Abolfathi, M., Inturi, S., Banaei-Kashani, F. & Jafarian, J. H. Toward enhancing web privacy on HTTPS traffic: A novel SuperLearner attack model and an efficient defense approach with adversarial examples. Computers Secur. 139, 103673 (2024).

    Google Scholar 

  32. Vaziri, A. & Fang, H. Optimal inferential control of convolutional neural networks. In 2025 American Control Conference (ACC) (pp. 2603–2610). IEEE. (2025), July.

  33. Aqajari, S. A. H. Robust, Personalized, and Context-Aware Affect Monitoring in Daily-Life (Doctoral dissertation, University of California, Irvine). (2024).

  34. Choudhry, A. et al. Integration of EEG-based BCI Technology in IoT enabled Smart Home Environment: An in-depth comparative analysis on Human-Computer Interaction Techniques. (2025). Expert Systems with Applications, 128730.

  35. Qi, Y. et al. Dynamic ensemble Bayesian filter for robust control of a human brain-machine interface. IEEE Trans. Biomed. Eng. 69 (12), 3825–3835 (2022).

    Google Scholar 

  36. Ma, Q. et al. Directly wireless communication of human minds via non-invasive brain-computer-metasurface platform. elight 2 (1), 11 (2022).

    Google Scholar 

  37. Wang, R., Li, C., Zhang, K. & Tu, B. Zero-trust based dynamic access control for cloud computing. Cybersecurity 8 (1), 12 (2025).

    Google Scholar 

  38. Wu, X. et al. Hi-SAM: A high-scalable authentication model for satellite-ground Zero-Trust system using mean field game. J. Netw. Syst. Manage. 33 (3), 72 (2025).

    Google Scholar 

  39. Yeoh, W., Liu, M., Shore, M. & Jiang, F. Zero trust cybersecurity: Critical success factors and a maturity assessment framework. Computers Secur. 133, 103412 (2023).

    Google Scholar 

  40. Liu, Y., Lan, Y. & Xia, Y. The evolutionary mechanism of information negentropy spurred by emergencies. Sci. Rep. 15 (1), 31886 (2025).

    Google Scholar 

  41. Durán, O., Sáez, G. & Durán, P. Negentropy as a Measure to Evaluate the Resilience in Industrial Plants. Mathematics 11 (12), 2707 (2023).

    Google Scholar 

  42. Liu, S. & Motani, M. Improving Mutual Information based Feature Selection by Boosting Unique Relevance. J. Artif. Intell. Res. 82, 1267–1292 (2025).

    Google Scholar 

  43. Gowri, G., Lun, X., Klein, A. & Yin, P. Approximating mutual information of high-dimensional variables using learned representations. Adv. Neural. Inf. Process. Syst. 37, 132843–132875 (2024).

    Google Scholar 

  44. Tuononen, M. & Hautamäki, V. Improving Numerical Stability of Normalized Mutual Information Estimator on High Dimensions (IEEE Signal Processing Letters, 2025).

  45. Roveda, L., Testa, A., Shahid, A. A., Braghin, F. & Piga, D. Q-Learning-based model predictive variable impedance control for physical human-robot collaboration. Artif. Intell. 312, 103771 (2022).

    Google Scholar 

  46. Islam, M. S. et al. Human-AI collaboration in real-world complex environment with reinforcement learning. Neural Comput. Appl., 37,1–31. (2025).

  47. Korivand, S., Galvani, G., Ajoudani, A., Gong, J. & Jalili, N. Optimizing Human–Robot Teaming Performance through Q-Learning-Based Task Load Adjustment and Physiological Data Analysis. Sensors 24 (9), 2817 (2024).

    Google Scholar 

  48. Ma, H., Vo, T. V. & Leong, T. Y. Hierarchical Reinforcement Learning with Human-AI Collaborative Sub-Goals Optimization. In Proceedings of the 2023 international conference on autonomous agents and multiagent systems (pp. 2310–2312). (2023).

  49. Gu, S. et al. A human-centered safe robot reinforcement learning framework with interactive behaviors. Front. Neurorobotics. 17, 1280341 (2023).

    Google Scholar 

  50. Huang, K. et al. SoK: Challenges and Paths Toward Memory Safety for eBPF. In 2025 IEEE Symposium on Security and Privacy (SP) (pp. 848–866). IEEE. (2025).

  51. Craun, M., Oswald, A. & Williams, D. Enabling eBPF on Embedded Systems Through Decoupled Verification. In Proceedings of the 1st Workshop on eBPF and Kernel Extensions (pp. 63–69). (2023).

  52. Wang, Z. et al. When eBPF Meets Machine Learning: On-the-fly OS Kernel Compartmentalization. arXiv preprint arXiv:2401.05641. (2024).

Download references

Funding

This work was supported by the Science and Technology Project of State Grid Xinjiang Electric Power Co., Ltd. [grant number: SGXJDK00DWJS2500136]

Author information

Authors and Affiliations

  1. Electric Power Research Institute of State Grid Xinjiang Electric Power Co., Ltd., Urumqi, 830000, Xinjiang, China

    Zhenwan Zou, Bin Wang, Shuming Fan & Bo Ye

  2. State Grid Xinjiang Electric Power Co., Ltd., Urumqi, 830000, Xinjiang, China

    Tao Chen

Authors
  1. Zhenwan Zou
    View author publications

    Search author on:PubMed Google Scholar

  2. Bin Wang
    View author publications

    Search author on:PubMed Google Scholar

  3. Tao Chen
    View author publications

    Search author on:PubMed Google Scholar

  4. Shuming Fan
    View author publications

    Search author on:PubMed Google Scholar

  5. Bo Ye
    View author publications

    Search author on:PubMed Google Scholar

Contributions

Zou Z W: Conceptualization, Experiments, Writing-Original Draft, Revision.Wang B: Data Curation, Formal Analysis, Writing-Review & Editing.Chen T: Supervision, Funding Acquisition, Writing-Review & EditingFan S M: Visualization, MethodologyYe B: Model Design, Project Administration.

Corresponding author

Correspondence to Zhenwan Zou.

Ethics declarations

Competing interests

The authors declare no competing interests.

Ethics, Consent to Participate, and Consent to Publish declarations

This study was approved by the Ethics Committee of State Grid Xinjiang Electric Power Co., Ltd. All methods were performed in accordance with the relevant guidelines and regulations, including the Declaration of Helsinki and the policies of this ethics committee. Informed consent was obtained from all participants in accordance with ethical standards. Participants were fully informed of their rights, and a sample consent form was available upon request. All participants were adults.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zou, Z., Wang, B., Chen, T. et al. A brain–edge co-evolution framework for zero-trust real-time hot patching in power equipment. Sci Rep (2026). https://doi.org/10.1038/s41598-026-45643-6

Download citation

  • Received: 01 December 2025

  • Accepted: 20 March 2026

  • Published: 24 March 2026

  • DOI: https://doi.org/10.1038/s41598-026-45643-6

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Brain-computer co-evolution
  • Negative entropy measurement model
  • Zero-trust architecture
  • Power field equipment
  • Real-time hot patching
Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com footer links

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics