Methods, Challenges and Opportunities in IoT/Network Security for Post-quantum World

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: closed (30 April 2022) | Viewed by 6003

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Engineering, Ondokuz Mayis University, 55139 Samsun, Turkey
Interests: post-quantum cryptography; algorithms and architectures for computations in finite fields; cryptographic protocols for cyber security; malware analysis; IoT security
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues, 

The definition of security has been modified with the recent advances in quantum computations. As a result of quantum computing, traditional public key cryptosystems will become insecure. This is a breakthrough for the security of IoT or any (distributed) network. Post-quantum cryptographic protocols and their applications are needed in the quantum era. In this Special Issue, our aim is to present/provide the new methods, advances, explorations, challenges, and solutions in applications, services, implementations of mathematical modelling, computing methods, security research and development for IoT, and 5G and beyond in post-quantum world. The topics in this Special Issue include but are not limited to:

  • Quantum secure cryptographic protocols
  • IoT security in post-quantum world
  • Authentication and access control in IoT/5G and beyond
  • Post-quantum cryptosystems for IoT/5G and beyond
  • Blockchain-based solutions for IoT/5G and beyond
  • Homomorphic encryption
  • Search in encrypted data
  • Distributed architectures for IoT/5G and beyond security
  • Cloud computing security

Prof. Dr. Cheng-Chi Lee
Prof. Dr. Sedat Akleylek
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Quantum secure cryptographic protocols
  • IoT security in post-quantum world
  • Authentication and access control in IoT/5G and beyond
  • Post-quantum cryptosystems for IoT/5G and beyond
  • Blockchain-based solutions for IoT/5G and beyond
  • Homomorphic encryption
  • Search in encrypted data
  • Distributed architectures for IoT/5G and beyond security
  • Cloud computing security

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

15 pages, 3775 KiB  
Article
Empowering the Internet of Things Using Light Communication and Distributed Edge Computing
by Abdelhamied A. Ateya, Mona Mahmoud, Adel Zaghloul, Naglaa. F. Soliman and Ammar Muthanna
Electronics 2022, 11(9), 1511; https://doi.org/10.3390/electronics11091511 - 9 May 2022
Cited by 5 | Viewed by 2376
Abstract
With the rapid growth of connected devices, new issues emerge, which will be addressed by boosting capacity, improving energy efficiency, spectrum usage, and cost, besides offering improved scalability to handle the growing number of linked devices. This can be achieved by introducing new [...] Read more.
With the rapid growth of connected devices, new issues emerge, which will be addressed by boosting capacity, improving energy efficiency, spectrum usage, and cost, besides offering improved scalability to handle the growing number of linked devices. This can be achieved by introducing new technologies to the traditional Internet of Things (IoT) networks. Visible light communication (VLC) is a promising technology that enables bidirectional transmission over the visible light spectrum achieving many benefits, including ultra-high data rate, ultra-low latency, high spectral efficiency, and ultra-high reliability. Light Fidelity (LiFi) is a form of VLC that represents an efficient solution for many IoT applications and use cases, including indoor and outdoor applications. Distributed edge computing is another technology that can assist communications in IoT networks and enable the dense deployment of IoT devices. To this end, this work considers designing a general framework for IoT networks using LiFi and a distributed edge computing scheme. It aims to enable dense deployment, increase reliability and availability, and reduce the communication latency of IoT networks. To meet the demands, the proposed architecture makes use of MEC and fog computing. For dense deployment situations, a proof-of-concept of the created model is presented. The LiFi-integrated fog-MEC model is tested in a variety of conditions, and the findings show that the model is efficient. Full article
Show Figures

Figure 1

15 pages, 606 KiB  
Article
Non-Interactive and Secure Data Aggregation Scheme for Internet of Things
by Yanxia Fu, Yanli Ren, Guorui Feng, Xinpeng Zhang and Chuan Qin
Electronics 2021, 10(20), 2464; https://doi.org/10.3390/electronics10202464 - 11 Oct 2021
Cited by 3 | Viewed by 2067
Abstract
The popularity of mobile devices in Internet of Things has brought great convenience to the lives of the people. Massive data generated in the IoT are outsourced and stored on cloud platforms so that data aggregation and analysis can be performed on the [...] Read more.
The popularity of mobile devices in Internet of Things has brought great convenience to the lives of the people. Massive data generated in the IoT are outsourced and stored on cloud platforms so that data aggregation and analysis can be performed on the massive data. However, these data often contain sensitive information of mobile devices, so effective protection of mobile user privacy is the primary condition for further development of IoT. Most of the current data aggregation schemes require a lot of interactions between users, and thus this paper designs a non-interactive secure multidimensional data aggregation scheme. This scheme adopts an additive secret sharing technique to mask the shared data and send it to two non-colluding servers, and then the servers aggregate the ciphertext respectively. Different from the existing schemes, our proposed scheme achieves non-interaction between users, and the aggregation result is kept confidential to the server and supports mobile users offline. Finally, we perform an experimental evaluation which proves the effectiveness of our scheme. Full article
Show Figures

Figure 1

Back to TopTop