Advanced Security, Trust and Privacy Solutions for Wireless Networks

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: closed (31 January 2022) | Viewed by 10982

Special Issue Editors


E-Mail Website
Guest Editor
School of Systems Information Science, Future University Hakodate, Hakodate 041-8655, Japan
Interests: wireless networks and wireless communications; network security; optical networks

E-Mail Website
Guest Editor
School of Computer Science and Technology, Xidian University, Xi'an 710075, China
Interests: 5G systems security; cloud computing security; big data analytics and security; IoT security
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Division of Information Science, Graduate School of Science and Technology, Nara Institute of Science and Techology, Nara 630-0192, Japan
Interests: wireless communication security; distributed ledger technology; access control

E-Mail Website1 Website2
Guest Editor
Department of Communications and Networking, Aalto University, 02150 Espoo, Finland
Interests: architectural enhancements to mobile core networks; mobile cloud networking; mobile multimedia streaming; social media networking
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

With the rapid proliferation of mobile devices (e.g., smart phones, smart watches, smart glasses, and other wearable healthcare devices), wireless communications have been indispensable in our daily life. To enable the fast deployment of various promising applications such as smart healthcare and smart manufacturing, these devices are usually designed without much security consideration, leading to critical security, trust, and privacy issues in wireless networks. Although there has been plenty of effort devoted to research on security, trust, and privacy for wireless networks, it is still necessary to address many existing challenges by utilizing ongoing works. On one hand, the application of low-cost security solutions, such as lightweight encryption and physical layer security, in wireless networks, especially in resource-constrained scenarios such as the Internet of Things, is still a big challenge. On the other hand, the lack of appropriate trust management and privacy-preserving solutions may hinder the application of wireless networks.

The goal of this Special Issue is to provide a forum for worldwide researchers to share their innovative ideas and latest findings in the areas of security, trust, and privacy for wireless networks covering (but not limited to) the following topics:

  • Lightweight encryption for wireless networks;
  • Physical layer security for wireless networks, including key-based/keyless secure communication and covert communication;
  • Physical layer authentication of mobile devices;
  • Trust management in wireless networks;
  • Privacy preservation in wireless networks;
  • Access control in wireless networks;
  • Application of distributed ledger technology and AI for security, trust, and privacy in wireless networks.

Prof. Dr. Xiaohong Jiang
Prof. Dr. Yulong Shen
Dr. Yuanyu Zhang
Prof. Dr. Tarik Taleb
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Lightweight encryption
  • Physical Layer Security
  • Trust management
  • Privacy preservation
  • Access control

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

19 pages, 3385 KiB  
Article
Sensitivity Analysis for Vulnerability Mitigation in Hybrid Networks
by Attiq Ur-Rehman, Iqbal Gondal, Joarder Kamruzzaman and Alireza Jolfaei
Electronics 2022, 11(2), 238; https://doi.org/10.3390/electronics11020238 - 12 Jan 2022
Cited by 3 | Viewed by 2120
Abstract
The development of cyber-assured systems is a challenging task, particularly due to the cost and complexities associated with the modern hybrid networks architectures, as well as the recent advancements in cloud computing. For this reason, the early detection of vulnerabilities and threat strategies [...] Read more.
The development of cyber-assured systems is a challenging task, particularly due to the cost and complexities associated with the modern hybrid networks architectures, as well as the recent advancements in cloud computing. For this reason, the early detection of vulnerabilities and threat strategies are vital for minimising the risks for enterprise networks configured with a variety of node types, which are called hybrid networks. Existing vulnerability assessment techniques are unable to exhaustively analyse all vulnerabilities in modern dynamic IT networks, which utilise a wide range of IoT and industrial control devices (ICS). This could lead to having a less optimal risk evaluation. In this paper, we present a novel framework to analyse the mitigation strategies for a variety of nodes, including traditional IT systems and their dependability on IoT devices, as well as industrial control systems. The framework adopts avoid, reduce, and manage as its core principles in characterising mitigation strategies. Our results confirmed the effectiveness of our mitigation strategy framework, which took node types, their criticality, and the network topology into account. Our results showed that our proposed framework was highly effective at reducing the risks in dynamic and resource constraint environments, in contrast to the existing techniques in the literature. Full article
(This article belongs to the Special Issue Advanced Security, Trust and Privacy Solutions for Wireless Networks)
Show Figures

Figure 1

10 pages, 1553 KiB  
Article
Small Prime Divisors Attack and Countermeasure against the RSA-OTP Algorithm
by Szymon Sarna and Robert Czerwinski
Electronics 2022, 11(1), 95; https://doi.org/10.3390/electronics11010095 - 28 Dec 2021
Cited by 1 | Viewed by 1638
Abstract
One-time password algorithms are widely used in digital services to improve security. However, many such solutions use a constant secret key to encrypt (process) one-time plaintexts. A paradigm shift from constant to one-time keys could introduce tangible benefits to the application security field. [...] Read more.
One-time password algorithms are widely used in digital services to improve security. However, many such solutions use a constant secret key to encrypt (process) one-time plaintexts. A paradigm shift from constant to one-time keys could introduce tangible benefits to the application security field. This paper analyzes a one-time password concept for the Rivest–Shamir–Adleman algorithm, in which each key element is hidden, and the value of the modulus is changed after each encryption attempt. The difference between successive moduli is exchanged between communication sides via an unsecure channel. Analysis shows that such an approach is not secure. Moreover, determining the one-time password element (Rivest–Shamir–Adleman modulus) can be straightforward. A countermeasure for the analyzed algorithm is proposed. Full article
(This article belongs to the Special Issue Advanced Security, Trust and Privacy Solutions for Wireless Networks)
Show Figures

Figure 1

21 pages, 1605 KiB  
Article
RPPUF: An Ultra-Lightweight Reconfigurable Pico-Physically Unclonable Function for Resource-Constrained IoT Devices
by Zhao Huang, Liang Li, Yin Chen, Zeyu Li, Quan Wang and Xiaohong Jiang
Electronics 2021, 10(23), 3039; https://doi.org/10.3390/electronics10233039 - 5 Dec 2021
Cited by 8 | Viewed by 2837
Abstract
With the advancement of the Internet of Things (IoTs) technology, security issues have received an increasing amount of attention. Since IoT devices are typically resource-limited, conventional security solutions, such as classical cryptography, are no longer applicable. A physically unclonable function (PUF) is a [...] Read more.
With the advancement of the Internet of Things (IoTs) technology, security issues have received an increasing amount of attention. Since IoT devices are typically resource-limited, conventional security solutions, such as classical cryptography, are no longer applicable. A physically unclonable function (PUF) is a hardware-based, low-cost alternative solution to provide security for IoT devices. It utilizes the inherent nature of hardware to generate a random and unpredictable fingerprint to uniquely identify an IoT device. However, despite existing PUFs having exhibited a good performance, they are not suitable for effective application on resource-constrained IoT devices due to the limited number of challenge-response pairs (CRPs) generated per unit area and the large hardware resources overhead. To solve these problems, this article presents an ultra-lightweight reconfigurable PUF solution, which is named RPPUF. Our method is built on pico-PUF (PPUF). By incorporating configurable logics, one single RPPUF can be instantiated into multiple samples through configurable information K. We implement and verify our design on the Xilinx Spartan-6 field programmable gate array (FPGA) microboards. The experimental results demonstrate that, compared to previous work, our method increases the uniqueness, reliability and uniformity by up to 4.13%, 16.98% and 10.5%, respectively, while dramatically reducing the hardware resource overhead by 98.16% when a 128-bit PUF response is generated. Moreover, the bit per cost (BPC) metric of our proposed RPPUF increased by up to 28.5 and 53.37 times than that of PPUF and the improved butterfly PUF, respectively. This confirms that the proposed RPPUF is ultra-lightweight with a good performance, making it more appropriate and efficient to apply in FPGA-based IoT devices with constrained resources. Full article
(This article belongs to the Special Issue Advanced Security, Trust and Privacy Solutions for Wireless Networks)
Show Figures

Figure 1

29 pages, 2920 KiB  
Article
FO-Sketch: A Fast Oblivious Sketch for Secure Network Measurement Service in the Cloud
by Lingtong Liu, Yulong Shen, Shuiguang Zeng and Zhiwei Zhang
Electronics 2021, 10(16), 2020; https://doi.org/10.3390/electronics10162020 - 20 Aug 2021
Cited by 1 | Viewed by 2016
Abstract
Network measurements are the foundation for network applications. The metrics generated by those measurements help applications improve their performance of the monitored network and harden their security. As severe network attacks using leaked information from a public cloud exist, it raises privacy and [...] Read more.
Network measurements are the foundation for network applications. The metrics generated by those measurements help applications improve their performance of the monitored network and harden their security. As severe network attacks using leaked information from a public cloud exist, it raises privacy and security concerns if directly deployed in network measurement services in a third-party public cloud infrastructure. Recent studies, most notably OblivSketch, demonstrated the feasibility of alleviating those concerns by using trusted hardware and Oblivious RAM (ORAM). As their performance is not good enough, and there are certain limitations, they are not suitable for broad deployment. In this paper, we propose FO-Sketch, a more efficient and general network measurement service that meets the most stringent security requirements, especially for a large-scale network with heavy traffic volume and burst traffic. Let a mergeable sketch update the local flow statistics in each local switch; FO-Sketch merges (in an Intel SGX-created enclave) these sketches obliviously to form a global “one big sketch” in the cloud. With the help of Oblivious Shuffle, Divide and Conquer, and SIMD speedup, we optimize all of the critical routines in our FO-Sketch to make it 17.3x faster than a trivial oblivious solution. While keeping the same level of accuracy and packet processing throughput as non-oblivious Elastic Sketch, our FO-Sketch needs only ∼4.5 MB enclave memory space in total to record metrics and for PORAM to store the global sketch in the cloud. Extensive experiments demonstrate that, for the recommended setting, it takes only ∼ 0.6 s in total to rebuild those data during each measurement interval. Full article
(This article belongs to the Special Issue Advanced Security, Trust and Privacy Solutions for Wireless Networks)
Show Figures

Figure 1

Back to TopTop