Privacy and Authentication for Communication Networks

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Cybersecurity".

Deadline for manuscript submissions: closed (29 February 2024) | Viewed by 3685

Special Issue Editors


E-Mail Website
Guest Editor
Program of Artificial Intelligence and Information Security, Fu Jen Catholic University, New Taipei City 242062, Taiwan
Interests: information and network security; wireless sensor networks; mobile computing security; Internet of Things security; cloud computing security; blockchain security and its application; RFID security and its application; telemedicine information system security; security protocols for ad hoc networks; information retrieval and dictionary search
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Engineering, University of Mount Union, Alliance, OH 44601-3993, USA
Interests: ML/federated learning in wireless systems; heterogeneous networks; massive MIMO; reconfigurable intelligent surface-assisted networks; mmWave communication networks; energy harvesting; full-duplex communications; cognitive radio; small cell; non-orthogonal multiple access (NOMA); physical layer security; UAV networks; visible light communication; IoT system
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Bachelor's Program of Artificial Intelligence and Information Security, College of Science and Engineering, Fu Jen Catholic University, New Taipei City 242062, Taiwan
Interests: information security; cryptography; blockchain; smart communications; healthcare communication security; smart grid communication
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Electrical and Electronics Engineering, Faculty of Engineering, University of Lagos, Akoka, Lagos 100213, Nigeria
Interests: 6G wireless communication systems; cell-free massive MIMO systems; energy-efficient wireless systems; propagation measurements; channel modeling; artificial intelligence; machine learning; wireless security systems; cryptography; chaotic communication; sustainable communication; blockchain technology
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Privacy and authentication are crucial aspects of modern communication networks, which are becoming increasingly interconnected and ubiquitous. With the proliferation of smart devices, IoT applications, and cloud-based services, ensuring privacy and authentication is of paramount importance. In recent years, many research works have been proposed to address the multiple security and privacy issues in communication networks. Unfortunately, the existing works still have drawbacks and limitations in terms of functionality or performance when considering the security of the designs. This Special Issue aims to explore the latest advancements, challenges, and solutions in the fields of privacy and authentication for communication networks. We invite original research contributions, reviews, and case studies on, but not limited to, the following topics:

  1. Privacy-preserving protocols for communication networks;
  2. Authentication mechanisms for 5G and beyond;
  3. Privacy and security issues in IoT networks and edge computing;
  4. Privacy-aware data sharing in cloud-based services;
  5. Threat modeling and risk assessment for communication networks;
  6. Biometric-based authentication and identification methods;
  7. Machine learning approaches to enhance privacy and authentication;
  8. Blockchain-based solutions for secure communication;
  9. Privacy-enhancing technologies for social networks and messaging apps;
  10. Usability and user-centric design of authentication systems;
  11. Cryptographic algorithms and systems for secure communication.

Prof. Dr. Cheng-Chi Lee
Prof. Dr. Chun-Ta Li
Dr. Dinh-Thuan Do
Dr. Tuan-Vinh Le
Dr. Agbotiname Lucky Imoize
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • privacy
  • authentication
  • cryptography
  • IoT
  • cloud systems
  • edge computing
  • machine learning
  • blockchain
  • 5G/6G
  • secure sharing

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

22 pages, 864 KiB  
Article
Securing Network Traffic Classification Models against Adversarial Examples Using Derived Variables
by James Msughter Adeke, Guangjie Liu, Junjie Zhao, Nannan Wu and Hafsat Muhammad Bashir
Future Internet 2023, 15(12), 405; https://doi.org/10.3390/fi15120405 - 16 Dec 2023
Cited by 1 | Viewed by 2844
Abstract
Machine learning (ML) models are essential to securing communication networks. However, these models are vulnerable to adversarial examples (AEs), in which malicious inputs are modified by adversaries to produce the desired output. Adversarial training is an effective defense method against such attacks but [...] Read more.
Machine learning (ML) models are essential to securing communication networks. However, these models are vulnerable to adversarial examples (AEs), in which malicious inputs are modified by adversaries to produce the desired output. Adversarial training is an effective defense method against such attacks but relies on access to a substantial number of AEs, a prerequisite that entails significant computational resources and the inherent limitation of poor performance on clean data. To address these problems, this study proposes a novel approach to improve the robustness of ML-based network traffic classification models by integrating derived variables (DVars) into training. Unlike adversarial training, our approach focuses on enhancing training using DVars, introducing randomness into the input data. DVars are generated from the baseline dataset and significantly improve the resilience of the model to AEs. To evaluate the effectiveness of DVars, experiments were conducted using the CSE-CIC-IDS2018 dataset and three state-of-the-art ML-based models: decision tree (DT), random forest (RF), and k-neighbors (KNN). The results show that DVars can improve the accuracy of KNN under attack from 0.45% to 0.84% for low-intensity attacks and from 0.32% to 0.66% for high-intensity attacks. Furthermore, both DT and RF achieve a significant increase in accuracy when subjected to attack of different intensity. Moreover, DVars are computationally efficient, scalable, and do not require access to AEs. Full article
(This article belongs to the Special Issue Privacy and Authentication for Communication Networks)
Show Figures

Figure 1

Back to TopTop