Emerging Trends and Approaches to Cyber Security

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (20 April 2023) | Viewed by 7948

Special Issue Editors


E-Mail Website
Guest Editor
Faculty of Science and Technology, University of Central Lancashire, Preston PR1 2HE, UK
Interests: cyber-security; physical layer security; Internet of Things (IoT); Internet of Vehicles (IoV)
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Mechanical and Construction Engineering, Northumbria University, Newcastle upon Tyne, United Kingdom
Interests: mathematical modeling; nonlinear control design; chaotic cryptography

Special Issue Information

Dear Colleagues,

Cyber security in general has attracted massive interest from academia, government and industry in recent years, because of the advent of future internet, pervasive connection of devices and high-profile cyberattacks. The threat landscape is ever increasing with cyber attackers being proactive every day and utilizing the latest technologies such as AI and Machine Learning together with the intrinsic vulnerabilities that exists in the current hyper-connected world and Internet of Things/Everything. This is fueled further by the rapid development and deployment of 5G related technologies. This provides opportunities for the research communities to keep acquainted with the latest, ever increasing and emerging threat landscapes for a securer, safer and more resilient digital system and digital infrastructure. Moreover, the threat landscape spans multilayer in the infrastructure from physical, network and to the application layer thus making this an interdisciplinary research area. 

This special issue focusses on emerging trends and technologies in the broad area of cyber security and include all aspects of the modelling, design, implementation, deployment, and management of security algorithms, protocols, architectures, and system, from physical-layer technology to the application layer.

The topics of interest include, but are not limited to:

* Physical layer security on 5G and beyond 5G technology

* IoT security and privacy

* Resilient IoT framework based on AI/Machine Learning

* Threat detection with AI/ML

* Lightweight cryptographic algorithms for IoT devices

* Biometric and emerging authentication technologies

* Malware detection

* Security and privacy in fog/edge computing

* Security in connected and autonomous vehicles

* Cyber Threat Intelligence

* Secure software development framework

* Social aspects to cyber security

* Cyber crime law

Dr. Rupak Kharel
Prof. Dr. Krishna Busawon
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 4253 KiB  
Article
Compliance with HIPAA and GDPR in Certificateless-Based Authenticated Key Agreement Using Extended Chaotic Maps
by Tian-Fu Lee, I-Pin Chang and Guo-Jun Su
Electronics 2023, 12(5), 1108; https://doi.org/10.3390/electronics12051108 - 23 Feb 2023
Cited by 6 | Viewed by 1636
Abstract
Electronically protected health information is held in computerized healthcare records that contain complete healthcare information and are easily shareable or retrieved by various health care providers via the Internet. The two most important concerns regarding their use involve the security of the Internet [...] Read more.
Electronically protected health information is held in computerized healthcare records that contain complete healthcare information and are easily shareable or retrieved by various health care providers via the Internet. The two most important concerns regarding their use involve the security of the Internet and the privacy of patients. To protect the privacy of patients, various regions of the world maintain privacy standards. These are set, for example, by the Health Insurance Portability and Accountability Act (HIPAA) in the United States and the General Data Protection Regulation (GDPR) in Europe. Most recently developed authenticated key agreement schemes for HIPAA and GDPR privacy/security involve modular exponential computations or scalar multiplications on elliptic curves to provide higher security, but they are computationally heavy and therefore costly to implement. Recent studies have shown that cryptosystems that use modular exponential computation and scalar multiplication on elliptic curves are less efficient than those based on Chebyshev chaotic maps. Therefore, this investigation develops a secure and efficient non-certificate-based authenticated key agreement scheme that uses lightweight operations, including Chebyshev chaotic maps and hash operations. The proposed scheme overcomes the limitations of alternative schemes, is computationally more efficient, and provides more functionality. The proposed scheme complies with the privacy principles of HIPAA and GDPR. Full article
(This article belongs to the Special Issue Emerging Trends and Approaches to Cyber Security)
Show Figures

Figure 1

20 pages, 1723 KiB  
Article
A Distributed Observer-Based Cyber-Attack Identification Scheme in Cooperative Networked Systems under Switching Communication Topologies
by Anass Taoufik, Michael Defoort, Krishna Busawon, Laurent Dala and Mohamed Djemai
Electronics 2020, 9(11), 1912; https://doi.org/10.3390/electronics9111912 - 13 Nov 2020
Cited by 6 | Viewed by 2238
Abstract
This paper studies an approach for detecting cyber attacks against networked cooperative systems (NCS) that are assumed to be working in a cyber-physical environment. NCS are prone to anomalies both due to cyber and physical attacks and faults. Cyber-attacks being more hazardous given [...] Read more.
This paper studies an approach for detecting cyber attacks against networked cooperative systems (NCS) that are assumed to be working in a cyber-physical environment. NCS are prone to anomalies both due to cyber and physical attacks and faults. Cyber-attacks being more hazardous given the cooperative nature of the NCS may lead to disastrous consequences and thus need to be detected as soon as they occur by all systems in the network. Our approach deals with two types of malicious attacks aimed at compromising the stability of the NCS: intrusion attacks/local malfunctions on individual systems and deception/cyber-attacks on the communication between the systems. In order to detect and identify such attacks under switching communication topologies, this paper proposes a new distributed methodology that solves global state estimation of the NCS where the aim is identifying anomalies in the networked system using residuals generated by monitoring agents such that coverage of the entire network is assured. A cascade of predefined-time sliding mode switched observers is introduced for each agent to achieve a fast estimate of the global state whereby the settling time is an a priori defined parameter independently of the initial conditions. Then, using the conventional consensus algorithm, a set of residuals are generated by the agents that is capable of detecting and isolating local intrusion attacks and communication cyber-attacks in the network using only locally exchanged information. In order to prove the effectiveness of the proposed method, the framework is tested for a velocity synchronization seeking network of mobile robots. Full article
(This article belongs to the Special Issue Emerging Trends and Approaches to Cyber Security)
Show Figures

Figure 1

17 pages, 2478 KiB  
Article
Distance-Based Resource Allocation for Vehicle-to-Pedestrian Safety Communication
by Usman Ali Khan and Sang Sun Lee
Electronics 2020, 9(10), 1640; https://doi.org/10.3390/electronics9101640 - 5 Oct 2020
Cited by 6 | Viewed by 2880
Abstract
Cellular Vehicle to Everything (V2X) has redefined the vehicular communication architecture as something that needs an ultra-reliable link, high capacity, and fast message delivery in vehicular networks. The V2X scenarios are broadly categorized as Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), Vehicle [...] Read more.
Cellular Vehicle to Everything (V2X) has redefined the vehicular communication architecture as something that needs an ultra-reliable link, high capacity, and fast message delivery in vehicular networks. The V2X scenarios are broadly categorized as Vehicle to Vehicle (V2V), Vehicle to Infrastructure (V2I), Vehicle to Pedestrians (V2P), and Vehicle to Network (V2N). Vulnerable pedestrians belong to the V2P category and hence require an ultra-reliable link and a fast message delivery in case the moving vehicle is in the close proximity of the pedestrian. However, congestion in the network calls for an optimized resource allocation that would allow a fast and secure connection between a vehicle and the pedestrian. In this paper, we have proposed a distance-based resource allocation that classifies the pedestrians in different categories, performs a one-to-many weighted bipartite matching, and finally a reinforcement learning based power allocation. Full article
(This article belongs to the Special Issue Emerging Trends and Approaches to Cyber Security)
Show Figures

Figure 1

Back to TopTop