Hardware and Chip Security in Cyber Physical System
A special issue of Sensors (ISSN 1424-8220).
Deadline for manuscript submissions: closed (30 April 2023) | Viewed by 11126
Special Issue Editors
2. College of Software, Fuzhou University, Fuzhou 350000, China
Interests: applied cryptography; cloud security; big data security; privacy-preserving data mining/machine learning techniques; network security
Special Issues, Collections and Topics in MDPI journals
Interests: applied cryptography; data mining; blockchain
Special Issues, Collections and Topics in MDPI journals
Interests: blockchain; federal learning; attribute encryption
Special Issues, Collections and Topics in MDPI journals
Special Issue Information
Dear Colleagues,
With the rapid development of cyber-physical systems, electronic device popularity is soaring. In daily life, people use electronic devices to shop, transfer money, take videos, and record information. In companies and banks, data are processed and stored using electronic equipment. Even in military defense, electronic devices are also inevitably employed. Concepts such as smart Earth, smart cities, Industry 4.0, intelligent robots, autonomous vehicles, etc., which people will come to realize in the future, are all products of highly used electronic devices. It can be stated that people’s lives have become increasingly more convenient due to electronic devices, with reliance on them differing to various degrees. In recent years, experts and scholars have carried out research on hardware security, especially that of chips, as the core of hardware. As we know, the whole design and manufacturing process of chips is very complicated. Obviously, offshore foundry technologies bring high-security risks to the entire electronics manufacturing industry. As the scale of integrated circuits (ICs) grows rapidly and the manufacturing mode becomes more flexible, the main security issues of ICs are caused by the implantation of malicious circuits named hardware trojans (HTs). The development trend of ICs results in them being extremely vulnerable to attack by HTs. The prevention and control of HTs is a tough problem, and is predicted to continue to be a persistent complicated issue in the future. It is extremely urgent to study how to detect hidden HTs in ICs quickly and precisely, ensuring hardware security. For this Special Issue, we are interested in inviting researchers in the field to gather recent privacy and security methods in chips and IoTs and their applications to address these challenges and opportunities differently from traditional architectures. Topics of interest include, but are not limited to:
- Hardware security primitives;
- Applications of secure hardware;
- Attacks against hardware implementations and countermeasures;
- Hardware trojans—backdoor and detection techniques;
- IC trust and anticounterfeiting;
- Reverse engineering and hardware obfuscation;
- Security architectures in embedded systems;
- Protection of the industrial Internet of Things (IIoT);
- Protection of the Internet of Things (IoT);
- Security architectures for pervasive computing and wireless applications/protocols;
- Secure system-on-chip (SoC) designs;
- Lightweight cryptography and implementations;
- FPGA and reconfigurable fabric security;
- Cyber-physical system security.
Prof. Dr. Ximeng Liu
Dr. Yinbin Miao
Dr. Zuobin Ying
Guest Editors
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Keywords
- system-on-chip
- hardware security
- Internet of Things
- hardware trojans
- chip security
- cyber-physical system
- lightweight cryptography
Benefits of Publishing in a Special Issue
- Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
- Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
- Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
- External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
- e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.
Further information on MDPI's Special Issue polices can be found here.