Emerging Trends in Secure and Mobile Networking

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: closed (15 September 2023) | Viewed by 7134

Special Issue Editor


E-Mail Website
Guest Editor
Department of Electronics and Telecommunications and Computer Engineering, Instituto Politécnico de Lisboa, 1959-007 Lisboa, Portugal
Interests: networking, mobile computing; cybersecurity; Internet of Things; smart cities; intelligent transportation systems
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

We invite you to submit your work to this Special Issue of Electronics on the subject area of “Emerging Trends in Secure and Mobile Networking”. Secure and mobile networks are a pillar in modern society that, together with current events, pushes research to new unpreceded requirements. Combining secure networking with mobility requires hardware, software, and networks that fulfil requirements such as energy efficiency, long range, high throughput, and low delay, which at first seem impossible to combine. These requirements are the basis of all current research trends related to 5G, FRMCSs (future railway mobile communication systems), the Internet of Things, Smart Everything (Cities, Healthcare, Homes, Logistics, Environment, Industry and Agriculture), and ITS (intelligent transportation systems).

This Special Issue aims to showcase state-of-the-art research on how secure mobile networking supports research in other domains and leads the way for a combination of secure solutions that support future society requirements.

We aim to promote combined research on the following topics:

  • Optimization of secure network protocols for constrained environments;
  • Data privacy concerns induced by 5G mobile networking;
  • ITS G5 and 5G security in mass deployments;
  • FRMCS security aspects;
  • IoT and LPWAN technologies security (NB-IoT, LoRaWAN);
  • Secure elements for IoT devices;
  • Securing multi-protocol LPWAN networks;
  • Satellite for long-range secure communications;
  • Secure edge computing elements.

Prof. Dr. Nuno Cruz
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • 5G
  • G5
  • ITS
  • Internet of Things and its verticals (smart cities, healthcare, homes, logistics, environment, industry and agriculture)
  • LoRaWAN
  • NB-IoT
  • FRMCS
  • edge computing
  • intrusion detection systems
  • cyber threats
  • data privacy

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

26 pages, 4076 KiB  
Article
A Business Process-Based Security Enhancement Scheme for the Network Function Service Access Procedure in the 5G Core Network
by Ying Zhu, Caixia Liu, Wei You, Yiming Zhang and Weicheng Zhang
Electronics 2023, 12(3), 576; https://doi.org/10.3390/electronics12030576 - 23 Jan 2023
Viewed by 1751
Abstract
As the signaling processing center of 5G, the security and stability of the 5G Core Network (5GC) are of great importance for 5G. The current 5GC consists of multiple mutually independent Network Functions (NFs). However, the NF service access procedure does not match [...] Read more.
As the signaling processing center of 5G, the security and stability of the 5G Core Network (5GC) are of great importance for 5G. The current 5GC consists of multiple mutually independent Network Functions (NFs). However, the NF service access procedure does not match NF service requests and business processes. NFs can request authorized services for access at any time, which poses a security threat to NFs and user data. This paper proposes a security enhancement scheme for NF service access procedures based on the business process, which realizes the management of the NF business process. The NRF adds a token identifier field bound to the business process in the access token and establishes an access token repository to store the token identifier. NF Service Producer introduces an access token re-signature mechanism and a shared repository of responded access tokens. The security of the proposed scheme is verified by theoretical analysis and formal analysis, and the performance of the proposed scheme is evaluated in terms of response rate and resource consumption. The experimental results show that the proposed scheme can meet the security requirement with little efficiency degradation under the condition of increasing certain resource loss. Full article
(This article belongs to the Special Issue Emerging Trends in Secure and Mobile Networking)
Show Figures

Figure 1

Review

Jump to: Research

18 pages, 481 KiB  
Review
Blockchain-Based Decentralized Identification in IoT: An Overview of Existing Frameworks and Their Limitations
by Seyed Mohammad Hosseini, Joaquim Ferreira and Paulo C. Bartolomeu
Electronics 2023, 12(6), 1283; https://doi.org/10.3390/electronics12061283 - 7 Mar 2023
Cited by 5 | Viewed by 4860
Abstract
The popularity of the Internet of Things (IoT) and Industrial IoT (IIoT) has caused a rapid increase in connected entities and exposed its lack of adequate Identity Management (IdM). Traditional IdM systems are highly dependent on central authorities; any failure can potentially compromise [...] Read more.
The popularity of the Internet of Things (IoT) and Industrial IoT (IIoT) has caused a rapid increase in connected entities and exposed its lack of adequate Identity Management (IdM). Traditional IdM systems are highly dependent on central authorities; any failure can potentially compromise the entire system. To eliminate the drawback of central authorities and evolve IdM systems to meet increasingly stringent security requirements, the Decentralized Identification approach has been proposed. This approach often relies on blockchain technology to provide a secure and tamper-proof method of managing and verifying identities. Therefore, this article investigates the capabilities of blockchain-based decentralized identification for the IoT domain, with an emphasis on the heterogeneity of online devices. It describes a number of features and specifications of decentralized identification with a specific focus on Self-Sovereign Identity (SSI), a model in which entities own their identities. The article concludes with a discussion of technical aspects as well as potential obstacles and constraints to the implementation of decentralized identification in the context of the Internet of Things. Full article
(This article belongs to the Special Issue Emerging Trends in Secure and Mobile Networking)
Show Figures

Figure 1

Back to TopTop