Information-Theoretic Security II
A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Information Theory, Probability and Statistics".
Deadline for manuscript submissions: closed (31 August 2019) | Viewed by 69265
Special Issue Editors
Interests: information theory, communication theory, physical layer security
Special Issues, Collections and Topics in MDPI journals
Interests: applied information theory, signal processing for communications and networks, communication theory, physical layer security
Special Issues, Collections and Topics in MDPI journals
Interests: communication theory, signal processing for communications, physical layer security
Special Issues, Collections and Topics in MDPI journals
Special Issue Information
Dear Colleagues,
Security is one the main challenges for future wireless communications systems, including 5G and beyond, cyber-physical systems, and the Internet of Things. In today’s communications systems, there is a clear separation between data-encryption and error-correction. Error-correction is implemented at the physical layer allowing higher layers to abstract the physical layer as an ideal bit pipe. Encryption, based on cryptographic principles, then takes place on higher layers. This separation has long been an obvious solution in most systems, but there is growing interest in providing security directly at the physical layer by exploiting the properties of the underlying communication channel. In this approach, the security is ensured by information-theoretic arguments that do not require hardy computable functions as in traditional cryptography. This new paradigm is explored from both an information-theoretic and practical point of view, and some preliminary integrations with traditional security systems based on cryptography are investigated. Still, many open questions remain to be addressed for a full integration of information-theoretic security into future communication systems.
Previously unpublished contributions in information theoretic security are solicited, including (but not limited to) the following:
- The secrecy capacity of wireless channels
- Secure communication under adversarial attacks
- Security in distributed storage systems
- Secret key generation and agreement
- Secret sharing in multi-party and multi-user networks
- Security with quantum channels and resources
- Wireless, biometric, and physical unclonable functions (PUF)-based authentication
- Private information retrieval (PIR)
- Security and privacy in distributed storage
- Code design for physical layer security
- Joint cryptography and physical layer security
- Differential, privacy-based schemes
- Anonymity and unlinkability
- Covert and stealth communications
- Unconditional security
- Analysis of physical layer security experiments
- Cross-layer security
Prof. Dr. Rafael F. Schaefer
Prof. Dr. Eduard A. Jorswieck
Prof. Dr. Stefano Tomasin
Guest Editors
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Keywords
- physical layer security
- secret key
- secrecy capacity
- authentication
- physical unclonable functions (PUFs)
- private information retrieval (PIR)
- information theory
- communication theory
- wireless communication
Benefits of Publishing in a Special Issue
- Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
- Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
- Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
- External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
- e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.
Further information on MDPI's Special Issue polices can be found here.