Advances in Mathematical Cryptography and Information Security Toward Industry 5.0
1. Introduction
2. Contributions
3. Conclusions and Future Scope
Funding
Acknowledgments
Conflicts of Interest
List of Contributions
- Rybin, V.; Babkin, I.; Bobrova, Y.; Galchenko, M.; Mikhailov, A.; Karimov, T. Variable-Step Semi-Implicit Solver with Adjustable Symmetry and Its Application for Chaos-Based Communication. Mathematics 2025, 13, 1229. https://doi.org/10.3390/math13081229.
- Ju, S.; Park, H.; Son, S.; Kim, H.; Park, Y.; Park, Y. Blockchain-Assisted Secure and Lightweight Authentication Scheme for Multi-Server Internet of Drones Environments. Mathematics 2024, 12, 3965. https://doi.org/10.3390/math12243965.
- Rai, H.M.; Yoo, J.; Agarwal, S. The Improved Network Intrusion Detection Techniques Using the Feature Engineering Approach with Boosting Classifiers. Mathematics 2024, 12, 3909. https://doi.org/10.3390/math12243909.
- Kwon, D.; Son, S.; Park, K.; Park, Y. A Secure Authentication Scheme with Local Differential Privacy in Edge Intelligence-Enabled VANET. Mathematics 2024, 12, 2383. https://doi.org/10.3390/math12152383.
- Xu, S.; Liu, J.-C.; Chang, C.-C.; Chang, C.-C. Covert Communication for Dual Images with Two-Tier Bits Flipping. Mathematics 2024, 12, 2219. https://doi.org/10.3390/math12142219.
- Oh, J.; Son, S.; Kwon, D.; Kim, M.; Park, Y.; Park, Y. Design of Secure and Privacy-Preserving Data Sharing Scheme Based on Key Aggregation and Private Set Intersection in Medical Information System. Mathematics 2024, 12, 1717. https://doi.org/10.3390/math12111717.
- Makhmudov, F.; Privalov, A.; Privalov, A.; Kazakevich, E.; Bekbaev, G.; Boldinov, A.; Kim, K.H.; Im-Cho, Y. Mathematical Model of the Process of Data Transmission over the Radio Channel of Cyber-Physical Systems. Mathematics 2024, 12, 1452. https://doi.org/10.3390/math12101452.
- Kim, M.; Park, K.; Park, Y. A Reliable and Privacy-Preserving Vehicular Energy Trading Scheme Using Decentralized Identifiers. Mathematics 2024, 12, 1450. https://doi.org/10.3390/math12101450.
- Lin, Y.; Liu, J.-C.; Chang, C.-C.; Chang, C.-C. Embedding Secret Data in a Vector Quantization Codebook Using a Novel Thresholding Scheme. Mathematics 2024, 12, 1332. https://doi.org/10.3390/math12091332.
- Rath, S.; Ramalingam, J.; Lee, C.-C. On Efficient Parallel Secure Outsourcing of Modular Exponentiation to Cloud for IoT Applications. Mathematics 2024, 12, 713. https://doi.org/10.3390/math12050713.
References
- Tallat, R.; Hawbani, A.; Wang, X.; Al-Dubai, A.; Zhao, L.; Liu, Z.; Min, G.; Zomaya, A.Y.; Alsamhi, S.H. Navigating Industry 5.0: A Survey of Key Enabling Technologies, Trends, Challenges, and Opportunities. IEEE Commun. Surv. Tutor. 2024, 26, 1080–1126. [Google Scholar] [CrossRef]
- Sharma, M.; Tomar, A.; Hazra, A. Edge Computing for Industry 5.0: Fundamental, Applications, and Research Challenges. IEEE Internet Things J. 2024, 11, 19070–19093. [Google Scholar] [CrossRef]
- Xu, X.; Lu, Y.; Vogel-Heuser, B.; Wang, L. Industry 4.0 and Industry 5.0—Inception, conception and perception. J. Manuf. Syst. 2021, 61, 530–535. [Google Scholar] [CrossRef]
- Aleisa, M.A. Enhancing Security in CPS Industry 5.0 using Lightweight MobileNetV3 with Adaptive Optimization Technique. Sci. Rep. 2025, 15, 18677. [Google Scholar] [CrossRef] [PubMed]
- Ajani, T.S.; Imoize, A.L.; Atayero, A.A. An Overview of Machine Learning within Embedded and Mobile Devices–Optimizations and Applications. Sensors 2021, 21, 4412. [Google Scholar] [CrossRef] [PubMed]
- Rani, S.; Srivastava, G. Secure hierarchical fog computing-based architecture for industry 5.0 using an attribute-based encryption scheme. Expert Syst. Appl. 2024, 235, 121180. [Google Scholar] [CrossRef]
- Ramachandran, K.K.; Nagarjuna, B.; Akram, S.V.; Bhalani, J.; Raju, A.M.; Ponnusamy, R. Innovative Cyber Security Solutions Built on Blockchain Technology for Industrial 5.0 Applications. In Proceedings of the 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), Greater Noida, India, 27–29 January 2023; pp. 643–650. [Google Scholar] [CrossRef]
- Shaikh, Z.A.; Hajjej, F.; Uslu, Y.D.; Yüksel, S.; Dınçer, H.; Alroobaea, R.; Baqasah, A.M.; Chinta, U. A new trend in cryptographic information security for industry 5.0: A systematic review. IEEE Access 2024, 12, 7156–7169. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Lee, C.-C.; Do, D.-T.; Imoize, A.L. Advances in Mathematical Cryptography and Information Security Toward Industry 5.0. Mathematics 2025, 13, 2660. https://doi.org/10.3390/math13162660
Lee C-C, Do D-T, Imoize AL. Advances in Mathematical Cryptography and Information Security Toward Industry 5.0. Mathematics. 2025; 13(16):2660. https://doi.org/10.3390/math13162660
Chicago/Turabian StyleLee, Cheng-Chi, Dinh-Thuan Do, and Agbotiname Lucky Imoize. 2025. "Advances in Mathematical Cryptography and Information Security Toward Industry 5.0" Mathematics 13, no. 16: 2660. https://doi.org/10.3390/math13162660
APA StyleLee, C.-C., Do, D.-T., & Imoize, A. L. (2025). Advances in Mathematical Cryptography and Information Security Toward Industry 5.0. Mathematics, 13(16), 2660. https://doi.org/10.3390/math13162660