Next Article in Journal
Humidity Diffusion Process Analysis and Life Prediction of a VSC-HVDC Control Protection Device Based on a Finite Element Simulation Method
Previous Article in Journal
Capacitance Evaluation of Metallized Polypropylene Film Capacitors Considering Cumulative Self-Healing Damage
Previous Article in Special Issue
Reconfigurable CAN Intrusion Detection and Response System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Editorial

Security and Privacy in Networks and Multimedia

Department of Computer and Control Engineering, Rzeszow University of Technology, Powstancow Warszawy 12, 35-959 Rzeszow, Poland
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(15), 2887; https://doi.org/10.3390/electronics13152887
Submission received: 17 July 2024 / Accepted: 18 July 2024 / Published: 23 July 2024
(This article belongs to the Special Issue Security and Privacy in Networks and Multimedia)

1. Introduction

The digital era has significantly transformed the dissemination of information and business operations, creating an intricate web of interconnected systems. As technology continues to advance, so do the complexities of maintaining robust security and privacy across these networks. This Special Issue, “Security and Privacy in Networks and Multimedia”, seeks to explore the forefront of research in protecting data networks and multimedia systems against evolving security threats. The articles included in this issue highlight innovative solutions and ongoing research aimed at enhancing security and privacy in various technological environments.

2. Resilient Forecasting and Supply Chain Security

In the realm of smart cities, accurate electricity load forecasting is crucial for grid stability. Mohd Hafizuddin Bin Kamilin and Shingo Yamaguchi present a resilient forecasting network that uses a collective intelligence predictor to mitigate the impact of missing values induced by cyberattacks. This approach decentralizes forecasting processes, achieving remarkable accuracy even under significant data loss scenarios.
Helen C. Leligou and colleagues delve into cybersecurity within supply chain systems, specifically focusing on the farm-to-fork use case. Their FISHY platform integrates machine learning and blockchain technologies to detect security threats and provide evidence for mitigation policies. This innovative approach ensures comprehensive protection for complex supply chain networks.

3. Advanced Detection Methods and Network Privacy

Addressing the threat of jamming in next-generation communication systems, Cem Örnek and Mesut Kartal propose a jamming detection method leveraging the Error Vector Magnitude metric. This method enhances sensitivity and provides critical jammer frequency information, ensuring robust protection for 5G and LTE networks.
Marko Mićović, Uroš Radenković, and Pavle Vuletić explore Format-Preserving Encryption for network layer privacy protection. Their LISPP system, implemented on smart network interface cards, achieves high throughput with minimal delay, proving effective for production networks.

4. Intrusion Detection and AI-Enhanced Security

Hyeon gy Shon and colleagues introduce a semi-supervised alert filtering method for network security. By incorporating semi-supervised clustering, their approach significantly reduces false alerts, conserving resources and improving detection accuracy.
The integration of artificial intelligence in network security is exemplified by Latifah Almuqren and her team’s Improved Sine Cosine Algorithm with Deep Learning-Enabled Security Solution (ISCA-DLESS). This method combines feature selection and hyperparameter tuning to enhance anomaly detection, achieving impressive accuracy on benchmark datasets.

5. Generative Approaches and Adversary Impact Mitigation

Hao Yang and co-authors tackle the class imbalance problem in Network Intrusion Detection Systems with their SPE-ACGAN method. This resampling approach improves detection performance across various classifiers, addressing the prevalent issue of imbalanced training samples.
Mohd Anjum and his team propose a Permutated Security Framework for IoT security, utilizing end-verifiable keys to manage transactions securely. Their approach adapts to system changes, mitigating adversary impact and service failures while enhancing transaction security.

6. Explainable Security Solutions and Advanced Cryptographic Techniques

Suleiman Y. Yerima and Abul Bashar focus on detecting evasive malicious PDF documents through explainable ensemble learning methods. Their system effectively detects hidden malicious content in PDFs, offering robust security against sophisticated attacks.
Maaz Ali Awan and colleagues discuss the potential of Radio Frequency Fingerprinting in enhancing the cybersecurity of smart grids. Their deployment framework leverages deep learning for effective classification and rogue device detection, bolstering smart grid security.

7. Network Layer Privacy and Anomaly Detection

Raad A. Muhajjar and his team present a hierarchical key management method for wireless sensor networks in medical environments. Their approach ensures data confidentiality and integrity, providing a secure framework for sensitive health data transmission.
Mohammad Jamoos and co-authors introduce a data-balancing approach based on Generative Adversarial Networks for network intrusion detection systems. Their model addresses imbalanced datasets, enhancing the detection rate of minority class attacks.
Saini and Islam focus on the security of the CAN bus, which is widely used in automotive applications. They propose a hardware prototype (FPGA) of an intrusion detection system for the CAN bus, enabling attack detection and response in case of bus-off attacks.

8. Conclusions

The articles in this Special Issue collectively advance the state of the art in network and multimedia security, offering innovative solutions to pressing challenges. From resilient forecasting networks and comprehensive supply chain security to advanced jamming detection and AI-enhanced anomaly detection, these studies contribute significantly to the ongoing efforts in securing our increasingly digital world.

Conflicts of Interest

The authors declare no conflicts of interest.

List of Contributions

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Rak, T.; Rzonca, D. Security and Privacy in Networks and Multimedia. Electronics 2024, 13, 2887. https://doi.org/10.3390/electronics13152887

AMA Style

Rak T, Rzonca D. Security and Privacy in Networks and Multimedia. Electronics. 2024; 13(15):2887. https://doi.org/10.3390/electronics13152887

Chicago/Turabian Style

Rak, Tomasz, and Dariusz Rzonca. 2024. "Security and Privacy in Networks and Multimedia" Electronics 13, no. 15: 2887. https://doi.org/10.3390/electronics13152887

APA Style

Rak, T., & Rzonca, D. (2024). Security and Privacy in Networks and Multimedia. Electronics, 13(15), 2887. https://doi.org/10.3390/electronics13152887

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop